Nokia brings mobility to ADSL connections

Nokia has shown how users could access broadband services from any location, including a friend's PC or laptop or even a wireless...

Nokia has shown how users could access broadband services from any location, including a friend's PC or laptop or even a wireless connection, using their own username and password to access their personal profiles.

In a demonstration at the Broadband World Forum in Berlin, Germany, Nokia linked its D500 multiservice access broadband platform, operator WLAN (wireless LAN) access point and controller, "intelligent edge" products and the Nokia authentication server for user mobility to illustrate a converged service portfolio that combines subscriber, terminal and service mobility across broadband networks.

For example, a wireless user looking to access their broadband services could use a friend's Asymmetric Digital Subscriber Line connection if their mobile operator and their friend's network operator had a commercial agreement.

By basing roaming capabilities on the use of SIM authentication, mobile subscribers do not need fixed-line broadband accounts to use other people's laptops and PCs.

Nokia's converged broadband service could also allow users to access their own service level, even if they tapped into a network connection with a lower service level.

Nokia did not say when its converged broadband service portfolio might become commercially available.

The Broadband World Forum runs until Thursday.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Network hardware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...