ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAE.IT-Y2014 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑ ÆäÀÌÁö 69
ÇÑ±Û Ç¥Áظí NGN ³×Æ®¿öÅ© Á¢¼ÓÁ¦¾î ±¸Á¶
¿µ¹® Ç¥Áظí Network Attachment Control Function in NGN
ÇÑ±Û ³»¿ë¿ä¾à ³×Æ®¿öÅ© Á¢¼Ó±â´ÉÀº NGN ¼­ºñ½º¿¡ Á¢¼ÓÇϱâ À§ÇØ ÇÊ¿äÇÑ ¾×¼¼½º µî·Ï°ú ´Ü¸» ÃʱâÈ­¸¦ Á¦°øÇÏ°í, ³×Æ®¿öÅ© ½Äº° ¹× ÀÎÁõ Á¦°ø, ¾×¼¼½º ³×Æ®¿öÅ©ÀÇ IP ÁÖ¼Ò °ø°£ °ü¸®, ¾×¼¼½º ¼¼¼ÇÀÇ ÀÎÁõ, ±×¸®°í NGN ¼­ºñ½º ¹× ÀÀ¿ë ±â´ÉÀ» ¾×¼¼½ºÇϱâ À§ÇØ ÇÊ¿äÇÑ Á¤º¸¸¦ ´Ü¸»¿¡°Ô Á¦°øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The NACF provides the following functionalities:
- Dynamic provisioning of IP addresses and other CPE configuration parameters
- By endorsement of user, auto-discovery of CPE capabilities and other parameters
- Authentication of end user and network at the IP layer (and possibly other layers). Regarding the authentication, mutual authentication between end user and the network attachment is performed
- Authorization of network access, based on user profiles
- Access network configuration, based on user profiles
- Location management at the IP layer.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAE.IT-Y2014.zip TTAE.IT-Y2014.zip
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
NGN ³×Æ®¿öÅ© Á¢¼ÓÁ¦¾î ±â´É TTAE.IT-Y2014/R1 2010-12-23 °³Á¤ À¯È¿ ¾øÀ½ TTAE.IT-Y2014_R1.pdf
NGN ³×Æ®¿öÅ© Á¢¼ÓÁ¦¾î ±¸Á¶ TTAE.IT-Y2014 2009-12-22 Á¦Á¤ À¯È¿ ¾øÀ½ TTAE.IT-Y2014.zip