Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Wireless Edge: Mobile Computing Policy and De-Perimeterization: Page 2 of 2

At the same meeting, Boeing described its implementation of an inverted mobile network architecture based on the Open Group Secure Mobile Architecture design. The core networking protocol used within SMA is Host Identity Protocol, a variant of IPSec that addresses mobility by relying on names rather than IP addresses to identify endpoints. This enables roaming across subnets and is an elegant alternative to using the Mobile IP protocol. HIP is currently an IETF draft RFC. The Boeing mobile architecture also implements policy in the form of location. Mobilized equipment connected over Wi-Fi can only communicate when it's in an authorized location. I found the Boeing mobile network architecture quite impressive, and it's no surprise given Boeing's active involvement in key underlying standards and wireless technology evaluation. My first discussions with its wireless architects date back to 1993.

Policy and de-perimeterization are just two instances illustrating how mobile and wireless technology implementation is much more than just a discussion of wireless links. It's easy to get fixated on the wireless link, as wireless technology is so sophisticated and so interesting. But ultimately, that wireless link just replaces a wire, and a complete, managed and secure system for mobile workers requires many ancillary components.

Peter Rysavy is the president of Rysavy Research (http://www.rysavy.com/), a consulting firm that specializes in wireless technology assessment and integration.