The search functionality is under construction.

Author Search Result

[Author] Takeshi SUGIYAMA(2hit)

1-2hit
  • A Study of Virtual Home Environment (VHE) in IMT-2000--Requirements, Issues and Resolution for Realization of VHE--

    Takeshi SUGIYAMA  Kazuhiko NAKADA  Shigefusa SUZUKI  

     
    PAPER

      Vol:
    E82-A No:7
      Page(s):
    1269-1277

    This article clarifies the requirements of VHE (Virtual Home Environment), issues and resolution for realization of VHE, when the environment will use Intelligent Network (IN) within IMT-2000 networks that is targeted to start in the year 2000. The IN aims the applicability of it's architecture to any kind of network. However, the following subjects need to be considered when IN will be used in the IMT-2000 network; The approach of the service related capabilities' extraction and specification; security management; cooperation between the service switching function within a core network and the IN function(s); cooperation between the mobility management function and the IN function(s); and consideration of mobile and fixed network convergence/integration. This article mainly focuses on these subjects. Some open issues like service/feature interaction and their tentative solutions are identified. Main results are; expandability of current IN to supporting IMT-2000 requirements, identification of key issues in providing VHE in IMT-2000, identification of candidate relationships, and associated issues for VHE. The currently available scenarios for VHE are evaluated from these points, and it is proposed that the specification to be common both for mobile and fixed network.

  • A Modeling and Protocol of the Out-Channel Interaction for PCS in Intelligent Network

    Takeshi SUGIYAMA  Tomoki OMIYA  Kazumasa TAKAMI  Shuji ESAKI  

     
    PAPER-Network architecture, signaling and protocols for PCS

      Vol:
    E79-B No:9
      Page(s):
    1388-1393

    We discuss the requirements, a model and protocol for the out-channel interaction for PCS in Intelligent Networks. As PCS can utilize the DSSI function (i.e. location update, authentication), it is reasonable to consider a model and protocol of the interaction for PCS as well as DSSI. To obtain the model/protocol, two types of interactions, call-related and call-unrelated, are considered. It is necessary to enhance the Basic Call State Model (BCSM) for the former, and to introduce a state model similar to BCSM for the latter, which represents association management and component exchange between a user and the network. The authentication function allocation for the dominant traffic, location update, is discussed based on the model and protocol, and this can co-exist with the proposed generic model and protocol.