Skip to content

Commit a55523e

Browse files
committed
fixed sidebar
1 parent f52d6d8 commit a55523e

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

systems.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -557,9 +557,9 @@ first-generation security algorithms—including Wired Equivalent
557557
Privacy (WEP)—that are now known to have major security flaws. We will
558558
focus here on 802.11i’s newer, stronger algorithms.
559559

560-
.. admonition:: Securing Mobile Cellular Networks
560+
.. sidebar:: Securing Mobile Cellular Networks
561561

562-
The other widely used wireless networking technology is the Mobile
562+
*The other widely used wireless networking technology is the Mobile
563563
Cellular Network, today ubiquitously known as 5G. The biggest
564564
difference between 5G and Wi-Fi is that the Mobile Network Operator
565565
(MNO)—the counterpart of an enterprise network administrator—has
@@ -568,9 +568,9 @@ focus here on 802.11i’s newer, stronger algorithms.
568568
Module (SIM) card that must be present in the mobile device. This
569569
SIM hosts a small database that includes a globally unique
570570
identifier (known as an IMSI, for International Mobile Subscriber
571-
Identifier) and a secret key.
571+
Identifier) and a secret key.*
572572

573-
When a device first becomes active, it communicates with a nearby
573+
*When a device first becomes active, it communicates with a nearby
574574
base station over an unauthenticated radio channel. The base
575575
station forwards the request to a backend server over a secure
576576
backhaul connection, and that server (assuming it recognizes the
@@ -580,9 +580,9 @@ focus here on 802.11i’s newer, stronger algorithms.
580580
in the clear since the base station to device channel is not yet
581581
secure. (The 5G specification uses significantly more precise
582582
terminology for all its components, but "backend server" conveys
583-
the basic idea; it is analogous to the AS used by Wi-Fi.)
583+
the basic idea; it is analogous to the AS used by Wi-Fi.)*
584584

585-
Once the device and backend server are satisfied with each other's
585+
*Once the device and backend server are satisfied with each other's
586586
identity, the server informs the other 5G components of the
587587
parameters they will need to service the device (e.g., the IP
588588
address assigned to the device and the appropriate QoS
@@ -593,7 +593,7 @@ focus here on 802.11i’s newer, stronger algorithms.
593593
key of the device, so only the device can decrypt it. It does this
594594
using the secret key on its SIM card. Once complete, the device can
595595
use this encrypted channel to send and receive data over the
596-
wireless link to the base station.
596+
wireless link to the base station.*
597597

598598
802.11i authentication supports two modes. In either mode, the end
599599
result of successful authentication is a shared Pairwise Master Key.

0 commit comments

Comments
 (0)