ABSTRACT

For network Attachment and Authentication processes, the general principles common to all access methods are described first, and then specifications for 3G Mobile and NGN are detailed separately, to explain the different treatment of these functions according to the particular technologies and their own terminology. Also discussed are the procedures for nomadic and roaming users and early implementation methods of “Early IMS” and “NASS bundled authentication.”