SG13 Work Plan st (For the 1 phase of Study Period 2009 ~ 2012) Version 2, September 2009 1. Introduction During the last study period (2005 - 2008), ITU-T developed many Recommendations for NGN covering various aspects such as requirements, functional architectures, capabilities, detailed functions for supporting Mobility Management, QoS, Security, Resource Handling and Attachment Control with related protocol aspects in SG11. It was done with understanding that those Recommendations provide fundamental frameworks to industry and providers for the implementation and operation of their NGN. SG13 as a lead group on NGN standards should continue to develop NGN standards in order to enable NGN based telecommunication business and to facilitate the end user experiences to use NGN. This will continue through this study period. SG13 should be going into deeper functional aspects to support detailed operation and going into wider aspects in services for stimulating the use of NGN. ITU-T develops Recommendations, in principle, based on contributions submitted by the ITU-T members. SG13 at the January 2009 meeting in Geneva agreed to invite contributions to fulfil such aims of SG13 for this study period. As an initial attempt, Question groups in SG13 developed and proposed the work plan as shown in this document based on each Question mandates given by the WTSA-2008. 1.1 Objectives for Work Plan This work plan should be used for the following: Invite contributions with clear vision, scope and plan from members Identify candidate subjects for the future development in SG13 Identify which subject is still missing in SG13 Guide overall scopes of candidate deliverables and its target dates Identify the responsible Question for issues and relationship with other relevant Questions as appropriate Prepare for a consistent SG13 view for future deliverables on scenarios, requirements (high-level and detailed, service and functional) and architectures (global, component level) 1.2 Relationship between Work Programme and Work Plan The Work Plan includes candidate (or possible draft) Recommendations or supplements for which agreement to be developed as formal ITU-T deliverables (ITU-T Recommendations or Supplements) is yet to be reached. Draft Recommendations and supplements recognized as formal ITU-T deliverables are shown in SG13 Work Programme (refer http://www.itu.int/ITU-T/workprog/wp_search.aspx?isn_sp=545&isn_sg=552 ). Therefore, any work item included in the work plan will be moved to the Work Programme after agreement for being developed as a formal ITU-T deliverable (for ITU-T Recommendation or Supplement) is reached at a given meeting. Following Fig.1 shows the relationship between Work Program and Work Plan. SG13 Standard Roadmap Work Programme (Draft Recs. and Supplements) Work Plan (Identified issues and proposed deliverable) Transfer when meeting agreed Fig.1 Relationship between Work Programme and Work Plan 2. WP1 Work Plan Title: Coordination, Planning and Global Outreach of NGN including Mobile Questions: 1, 2, 10, 15 (details for question work scop, please look at COM13-C1) Q No Doc No Document Title Objectives and Scopes Stage Target date 1 TRY.NG N-newscope New NGN Scope This Supplement to ITU-T Y-Series Recommendations on the scope of beyond NGN release 2 of the Next Generation Network (NGN) provides business roles and use cases and discusses the value of the release. To clarify the scope of NGN release 2 of the Next Generation Network (NGN). To address a high-level overview of the functional - 2010,06 Location of Document planned Q No Doc No Document Title Objectives and Scopes 1 1 1 Y.NGNCap2 TRY.IP TV-newScope NGN roadmap Description of Capability Set 2 of NGN New IPTV Service Use Cases NGN Roadmap Stage Target date Location of Document independent 2009,09 TD61 R1 (WP 1/13) - 2010,06 Planned - - TD 48 (WP 1/13) features To show the environment, service descriptions and use cases of NGN Release 2 This Recommendation provides brief descriptions of Capability Set 2 of NGN in terms of the overall requirements and a highlevel overview of the functional features to be addressed. The descriptions are from the aspects of environment, capabilities, architecture, and technical specifications. To describe NGN Capability Set 2 within ITU-T in terms of the overall requirements (Y.NGN-Cap2 supersedes NGN capability set 1, and addresses IPTV-related Recs.) To list Recommendations relevant to NGN Capability Set 2 The IPTV Service Use Cases document provides a list of new IPTV use cases that are informative illustrations of how IPTV services can be designed, deployed and operated. From the enduser’s perspective, use cases have been categorized by distributed content services, interactive services, communication services, and others. To list IPTV use cases that are informative illustrations of how IPTV services can be designed, deployed and operated The NGN roadmap is an informative document that organizes NGN-related documents by each item and stage. To identify gaps between Recs. To manage all NGN-related work including other SGs and SDOs To specify Recs. to be reflected to NGN project management database Q No Doc No Document Title Objectives and Scopes Stage Target date 1 Y.NGNCap3 Description of Capability Set 3 of NGN This Recommendation provides brief descriptions of Capability Set 3 of NGN in terms of the overall requirements and a highlevel overview of the functional features to be addressed. The descriptions are from the aspects of environment, capabilities, architecture, and technical specifications. independent 2010,12 Location of Document planned independent 2011,06 Planned 1 Y.NGNCap4 Description of Capability Set 4 of NGN To describe NGN Capability Set 3 within ITU-T in terms of the overall requirements (Y.NGN-Cap3 supersedes NGN capability set 2, and addresses mobility-related Recs.) To list Recommendations relevant to NGN Capability Set 3 This Recommendation provides brief descriptions of Capability Set 4 of NGN in terms of the overall requirements and a highlevel overview of the functional features to be addressed. The descriptions are from the aspects of environment, capabilities, architecture, and technical specifications. To describe NGN Capability Set 3 within ITU-T in terms of the overall requirements (Y.NGN-Cap4 supersedes NGN capability set 3, and addresses USN-related Recs.) To list Recommendations relevant to NGN Capability Set 3 Q No Doc No Document Title Objectives and Scopes Stage Target date Location of Document planned 1 NGNMM scope Scope of Mobility management in NGN This Supplement to ITU-T Y-Series Recommendations on the scope of Mobility management in NGN provides business roles and use cases and discusses the value of the release. To clarify the scope of NGN mobility management. To address a high-level overview of the functional features To show the environment, service descriptions and mobility use cases - 2009,09 1 NGNMM roadmap Mobility management roadmap in NGN The NGN-MM roadmap is an informative document that organizes NGN-MM-related documents by each item and stage. To identify gaps between Recs. To manage all NGN-MM-related work including other SGs and SDOs To specify Recs. to be reflected to NGN project management database - - TD107 R1 (GEN/13) 1 TRY.FC -survey Draft Supplement of Global ICT fora/Consortia Survey independent TBD TD 62 (WP1/13) 2 Y.2091N ew Rev. Terms and definitions for Next Generation Networks This Supplement to ITU-T Y-Series Supplement on the Global ICT fora/Consortia Survey provides information of ICT-related fora and consortia. To clarify the scope of each global ICT forum and consortium. This Recommendation contains terms and definitions and a framework relevant to providing a general understanding of Next Generation Networks and a guide for the development of NGN documents in the ITU. It especially reflect the upcoming new definitions in the context of mobility management. This Recommendation is not simply a compendium of terms and definitions. The primary purpose of this Recommendation is to provide a context for the use of certain terms and definitions to avoid misunderstandings in NGN activities. Thus, the definitions are arranged in a specific order and certain necessary 2010,05 Y.2091 Q No 2 2 2 2 Doc No Y.2091 New Rev. Y.2091 Y.iptvter ms Ton FMC Document Title Terms and definitions for Next Generation Networks Terms and definitions for Next Generation Networks Terms and definitions for IPTV Terms and definitions for Fix Mobile Converged network architectures 2 tonubnw Terms and definitions for ubiquitous network architectures 10 15 RM15 Roadmap for Question 15/13 Y.IMT/I MS Develop GuideIM T/IMS Standardization inputs on IMT and IMS from Developing countries A guide for Developing countries on how to implement IMT and IMS 15 15 Objectives and Scopes Target date Location of Document relationships are illustrated. Additionally, explanatory notes are also included where deemed appropriate. New released NGN Recommendation 2011- 1 Y.2091 Multi-vendor Interoperability 2011-1 TD57 R1 (WP1/13) New Recommendation 2010-1 TD49 (WP1/13) This document provides the terms and definitions used in the context of fix mobile converged network architectures in order to provide a general understanding of FMC, to provide a context of certain terms and definitions This document provides the terms and definitions used in the context of ubiquitous network architectures in order to provide a general understanding the architecture, to provide a context of certain terms and definitions See Work program Annex 1 to COM 13 – R 13 Using inputs from Developing countries, develop a Roadmap for Question 15/13 which will be used to update the Study Group 13 Roadmap Encourage generation of contributions on implementation IMT and IMS from Developing countries 2011,05 tbd 2012,01 tbd Produce a guide for Developing countries on how to implement IMT and IMS using inputs from other SDOs, fora, associations, etc (in accordance with Res. 38 ), within and outside of ITU, that are doing similar. Stage Independent 2010, 04 Independent 2010, 04 Independent 2010, 09 3. WP2 Work Plan Title: Service requirements, scenarios and evolution aspects Questions: 3, 12, 13, 14, 18 (details for question work scope, please look at COM13-C1) Q No Doc No Document Title Objectives and Scopes Stage*1) 3/13 Various documents Work area: “Service and functional requirements of emerging applications/services and capabilities in NGN” - work area in line with continuation of Q.2/13 2005-2008 activities Topics • Emerging services in NGN • Composed services (NGN+legacy, Internet+Telecom+Broadcasting, SIP+nonSIP based) • 3rd party services (follow up of MDS etc.) • Emerging capabilities in NGN • Composed capabilities (NGN+Web 2.0/Internet capabilities) • Implementation scenarios 1 3/13 Various documents Work area: “Requirements for Applications<->NGN service interface (Telecom APIs for NGN providers and 3rd parties)” - new focus in line with Q.3/13 2009-2012 mandate Topics • Key Telecom APIs (common, specific to relevant applications) • Building on emerging services and capabilities, and on relevant use cases • Requirements for composed services and capabilities • Requirements for service interfaces among capabilities? 1 3/13 Various documents Work area: “Requirements and capabilities for a SOA enabled NGN open service delivery environment (NGN SDP? NGN Middleware?)” Topics • Key telecom reqts for SOA enabled NGN open service delivery environment • Application brokering requirements • Expansion of identified NGN capabilities (building on NGN OSE) 1 Target date Location of Document Q No Doc No Document Title - new focus in line with Q.3/13 2009-2012 mandate Objectives and Scopes • • • 12/13 Y.iptv-bs-arch (tentative) Service architecture for webbased IPTV brokering (tentative) 13/13 Y.NGNMMN (tentative) Migration from the existing mobile core network to NGN (tentative) 14/13 Y.usits Ubiquitous service scenario for ITS over NGN Stage*1) Target date Location of Document 1&2 2011-01 TD72 R1 (WP 2/13) (as a living list item) 2+3 2011-12 1 2010-12 NGN middleware aspects (common versus application-specific requirements?, other) Building on relevant use cases Framework aspects of NGN open service delivery environment This Recommendation describes interworking requirements, functional architecture, and procedures to support IPTV brokering service in the NGN environment The scope of this Recommendation covers: • Interworking requirements of the web-based IPTV brokering service • Interworking model and functional architecture of the web-based IPTV brokering service • Service procedures of the web-based IPTV brokering service This Recommendation is to study the migration solution (scenario, requirements and framework) from existing mobile core network to NGN infrastructure supporting multiple access technologies. The study is to define that ITS is to be operated on ubiquitous environments with ITS infrastructure , LBS/GIS, secured data processing, etc. TD194 (NGN-GSI) Q No Doc No Document Title Objectives and Scopes Stage*1) Target date 14/13 Y.ucs User-created scenarios for NGN Services 1 2010-12 14/13 Y.mvs Multi-media voice (Videphone) service among NGN operators using QoS class mapping 1 2011-03 TD194 (NGN-GSI) 14/13 Y.uws U-work service scenario 1 2011-03 14/13 Y.mis Mobile IPTV service scenario 1 2010-12 14/13 Y.ufs U-farm service scenario 1 2011-03 14/13 Y.hns NGN based home network service scenario 1 2010-12 14/13 Y.vpns NGN based VPN service scenario The objective of this work is to prepare a framework enabling users to create their own service scenarios for NGN services satisfying their demands. The scope includes reference model, features of the service components, and the format and transaction aspects of user-created scenario. The study is to define the multimedia voice(Videphone) service scenario and use - case among NGN operators by using QoS class mapping The study is to define the service scenario for work and collaboration in home and remote place on the USN over NGN. The study is to develop the multimedia services such as television/video/ audio/text/graphics/data delivered over IP based wireless networks managed to provide the required level of QoS/QoE, security, interactivity and mobility. The study is to develop the service scenario of the u-farm service which use the USN technology The study is to develop versatile service scenario of NGN based home network including CPN and corporate network. The study is to develop versatile service scenario of VPN in NGN environment. The objective of this work is to show the realization of VPN services in the NGN environment. Location of Document TD194 (NGN-GSI) 1 2010-12 *1) Stages are: Stage 1: service aspects Stage 2: functional network aspects Stage 3: network implementation aspects Stage independent: all stages are included. 4. WP3 Work Plan Title: Frameworks and Functional Architectures Questions: 5, 6, 8, 9, 11 (details for question work scop, please look at COM13-C1) Q No 9/13 Doc No Y.MC-POL Document Title Policy of Multi-connection 9/13 Y.MC-RM Routing Mechanism of Multiconnection Objectives and Scopes This Recommendation describes the policy of multi-connection, and information flow between different layers needed to be delivered to meet the requirements of multiple connections to support its services in the realm of heterogeneous accesses. To develop the policy of multiconnection, including operator and user policy for data sending and receiving etc. To develop information flow between different layers needed to be delivered to meet the requirements of multiple connections This Recommendation describes the routing mechanism to support the harmonization of multiple connections for multiple access technologies. For routing IP flows to appropriate connections, several aspects should be considered including identifiers of connections and IP flows, matching among these identifiers, etc. To develop the routing mechanism to support the harmonization of multiple connections for multiple access technologies. Stage*1) Stage independent Target date 2011-Q1 Location of Document Planned Stage independent 2011-Q3 Planned Q No 11/13 Doc No Y.FMC-IMS Rev1 Document Title Fixed mobile convergence with a common IMS session control domain – Revision 1 *1) Stages are: Stage 1: service aspects Stage 2: functional network aspects Stage 3: network implementation aspects Stage independent: all stages are included. Objectives and Scopes This Recommendation is the Revision 1 document of Y.FMC-IMS. More scenarios of FMC will be studied and seamless handover / QoS requirements from different FMC services will be investigated. Stage*1) 2 Target date TBD Location of Document Planned 4. WP4 Work Plan Title: QoS and Security Questions: 4, 16, 17 (details for question work scop, please look at COM13-C1) Q No 4/13 Doc No Y.2111 Document Title Resource and admission control functions in Next Generation Networks Objectives and Scopes This Recommendation specifies the resource and admission control functions (RACF) in support of end-to-end quality of service (QoS) and network border control (at access-core and inter-domain boundaries) in Next Generation Networks (NGNs). The RACF is aimed at providing real-time applicationdriven and policy-based transport resource management for a wide range of services and for a variety of transport technologies (fixed, mobile, etc.). Services can make use of RACF whether the IP multimedia subsystem is involved or not. This Recommendation defines the related requirements and functional architecture covering aspects such as resource reservation, admission control and gate control, network address port translation (NAPT) and firewall control, and network address translator (NAT) traversal. It also defines the reference points between different functional entities and the pertinent stage 2 requirements and describes the procedures for QoS-related transport resource control, NAPT control and NAT traversal. The pertinent protocol specifications are described in separate Recommendations. Endto-end information flows for representative applications, such as VoIP, bulk data transfer and video-on-demand, are for further study. Stage*1) 1&2 Target date Published (09/2006) Location of Document http://www.itu.int/rec/TREC-Y.2111-200609S/en Q No Doc No Document Title Objectives and Scopes Stage*1) Target date Location of Document Note that network management functionality is outside the scope of this Recommendation. 4/13 4/13 Y.2112 Y.2121 A QoS control architecture for Ethernet-based IP access network Requirements for the support of flow state aware transport technology in an NGN Administrations may require operators and service providers to take into account national regulatory and national policy requirements in implementing this Recommendation This Recommendation specifies a quality of service (QoS) control architecture and requirements covering aspects, such as resource reservation, admission control and gate control, for Ethernet-based IP access networks. Based on the resource and admission control functions (RACF) as defined in [ITU-T Y.2111], this Recommendation provides details specific to Ethernet-based IP access networks. An Ethernet-based IP access network is an IP access network which comprises the Ethernet aggregation network, access nodes, and edge nodes, and may also include the IP aggregation network. In this Recommendation, the Ethernet aggregation network supports VLANs as defined in [b-IEEE 802.1Q] and [bIEEE 802.1ad]. Note that the QoS mechanisms for the last mile user access segment are MAC technology-specific and as such are out of the scope of this Recommendation. This Recommendation provides flow-state-aware requirements in support of per-flow service options providing for edgeto-edge QoS and transport resource control (including resource reservation and admission 1&2 Published (06/2007) http://www.itu.int/rec/TREC-Y.2112/en 1 Published (01/2008) http://www.itu.int/rec/TREC-Y.2121/en Q No Doc No Document Title 4/13 Y.2171 Admission control priority levels in Next Generation Networks Objectives and Scopes control) in next generation networks (NGNs). The pertinent protocol specifications and measurement requirements will be described in separate Recommendations. Note that network management functionality is outside the scope of this Recommendation. Also out of scope are any edge functions at network domain boundaries needed for interworking QoS support between FSA and non-FSA networks. Similarly, out of scope are any edge functions at network domain boundaries needed for interworking between two FSA networks, where one uses in-band signalling exclusively for all FSA service support, and the other uses out-of-band signalling for resource reservation and clear-down coupled with in-band signalling to establish the agreed flow state in the involved FSA nodes. Administrations may require operators and service providers to take into account national regulatory and national policy requirements in implementing this Recommendation. According to ITU-T Rec. Y.1271 [Y.1271], enhanced priority treatment is an essential requirement for the assured capabilities needed for emergency telecommunications. A critical component of enhanced priority treatment is admission control for telecommunications services seeking entry into a network particularly during emergency conditions when network resources may be depleted. Admission control in the NGN can be enabled by: 1) development of admission control priority levels based on the Stage*1) 1 Target date Published (06/2007) Location of Document http://www.itu.int/rec/TREC-Y.2171/en Q No Doc No Document Title Objectives and Scopes criticality of services seeking entry in NGNs; 2) development of necessary extensions in signalling protocols that can indicate the desired service priority levels at NGN interfaces; 3) development of admission control mechanisms that can recognize the signalled priority levels and undertake necessary action. Stage*1) Target date Location of Document The scope of this Recommendation is limited to the development of priority levels for admission control. The purpose is to provide guidance for the subsequent development of the necessary signalling protocol extensions and the priority enabling mechanisms. 4/13 Y.2172 Service restoration priority levels in Next Generation Networks Administrations may require operators and service providers to take into account national regulatory and national policy requirements in implementing this Recommendation. As stated in ITU-T Recommendation Y.1271 [ITU-T Y.1271], enhanced priority treatment is an essential requirement for the assured capabilities needed for emergency telecommunications. One critical component is admission control and associated priorities as described in ITU-T Recommendation Y.2171 [ITU-T Y.2171]. Another critical component is service restoration particularly during emergency conditions with potentially reduced network bandwidth/resources. Under such conditions, emergency telecommunications interrupted by network failures require preferential restoration 1 Published (06/2007) http://www.itu.int/rec/TREC-Y.2172/en Q No Doc No Document Title Objectives and Scopes treatment. In the NGN, assured restoration can be enabled by: Stage*1) Target date Location of Document 1. Development of service restoration priority levels based on the criticality of services. 2. Development of the necessary extensions in signalling protocols that can indicate the restoration priority levels during call/session setup. 3. Development of restoration mechanisms that can recognize the signalled priority levels and undertake the necessary restoration/re-routing action. The scope of this Recommendation is limited to the development of priority levels for service restoration in the NGN. This guidance can be helpful in the development of the subsequent signalling extensions and restoration mechanisms. 4/13 Y.2173 Management of performance measurement for NGN Administrations may require operators and service providers to take into account national regulatory and national policy requirements in implementing this Recommendation. This document specifies the management aspects of performance measurement. Its scope is as follows: - Requirements for management of performance measurement. - A reference measurement network model as an extension of clause 8 specified in [ITU-T Y.1543], which allows for various measurement scenarios for NGN. - A general and functional architecture for the management of performance measurement 1&2 Pre-published (09/2008) http://www.itu.int/rec/TREC-Y.2173/en Q No 4/13 Doc No Y.2174 Document Title Distributed RACF architecture for MPLS networks Objectives and Scopes and the related stage-2 requirements - Management procedures covering various management scenarios such as discovery of measurement entities, initiation of measurement, and exchange of measurement data among different NGN domains. - - Application scenarios for management of performance measurement (MPM) use cases such as procedures for performance measurements degradation resolution and RTP/RTCP-based performance notification. Note that the pertinent protocol specifications for reference points and procedures are expected to be described in separate Recommendations. This Recommendation also describes the following MPM use cases: 1) Performance degradation resolution information reporting 2) RTP/RTCP-based performance notification Recommendation ITU-T Y.2111 [Y.2111] defines general requirements for resource and admission control functions for next generation networks (NGN). These requirements are independent of the underlying transport technology. Multi-protocol label switching (MPLS) is considered to be a key transport technology in core networks. In particular, networks which use MPLS with traffic engineering (MPLS-TE) capabilities provide significant assurance that the delivery of desired quality Stage*1) 1&2 Target date Pre-published (06/2008) Location of Document http://www.itu.int/rec/TREC-Y.2174/en Q No Doc No Document Title 4/13 Y.2175 Centralized RACF architecture for MPLS core networks Objectives and Scopes of service (QoS) for a variety of services and applications will occur. Resource and admission control functions (RACF) are used to control the flow of traffic from access networks into the MPLS core [Y.2111]. A distributed architectural structure of one RACF functional entity, the transport resource control functional entity (TRC-FE), is considered in this Recommendation. In this architectural arrangement, MPLS transport resource information is available in label edge routers (LER) and gateways connected to the LERs. This Recommendation defines the distributed architecture for the TRC-FE and specifies supporting requirements. Recommendation ITU-T Y.2111 [ITU-T Y.2111] defines general requirements for resource and admission control functions for Next Generation Networks (NGN). These requirements are independent of the underlying transport technology. Multi-protocol label switching (MPLS) is considered to be a key transport technology in core networks. In particular, networks which use MPLS with traffic engineering (MPLSTE) capabilities provide significant assurance that the delivery of desired quality of service (QoS) for a variety of services and applications will occur. Resource and admission control functions (RACF) are used to control the flow of traffic from access networks into the MPLS core [ITU-T Y.2111]. A centralized architectural structure of one RACF functional entity, the transport resource control functional entity Stage*1) 1&2 Target date Pre-published (11/2008) Location of Document http://www.itu.int/rec/TREC-Y.2175/en Q No Doc No Document Title Objectives and Scopes (TRC-FE), is considered in this Recommendation. In this architectural arrangement, MPLS transport resource is monitored and controlled by the centralized control entity. This Recommendation defines the centralized architecture for the TRC-FE and specifies supporting requirements. Stage*1) Target date Location of Document Q No 4/13 Doc No Y.2111Rev.1 Document Title Resource and admission control functions in Next Generation Networks Revision 1 Objectives and Scopes This Recommendation specifies the resource and admission control functions (RACF) in support of end-to-end quality of service (QoS) and network border control (at access-core and inter-domain boundaries) in Next Generation Networks (NGNs). The RACF is aimed at providing real-time applicationdriven and policy-based transport resource management for a wide range of services and for a variety of transport technologies (fixed, mobile, etc.). Services can make use of RACF whether the IP multimedia subsystem is involved or not. The Recommendation defines the related requirements and functional architecture covering aspects such as resource reservation, admission control and gate control, network address port translation (NAPT) and firewall control, and network address translator (NAT) traversal. It also defines the reference points between different functional entities and the pertinent stage 2 requirements and describes the procedures for QoS-related transport resource control, NAPT control and NAT traversal. The pertinent protocol specifications are described in separate Recommendations. Endto-end information flows for representative applications, such as VoIP, bulk data transfer and video on demand, are for further study. Note that network management functionality is outside the scope of this Recommendation. Administrations may require operators and service providers to take into account national regulatory and national policy requirements in implementing this Recommendation. Stage*1) 1&2 Target date Pre-published (09/2008) Location of Document http://www.itu.int/rec/TREC-Y.2111-200811P/en Q No 4/13 Doc No Y.2113 Document Title Ethernet QoS Control for Next Generation Networks 4/13 Y.2111Rev.2 Resource and admission control functions in Next Generation Networks, Rev.2 Objectives and Scopes This Recommendation addresses Ethernet Quality of Service (QoS) control for next generation networks. It specifies the following: Service definitions and general requirements for Ethernet-based NGNs Reference model of QoS architecture for Ethernet-based NGNs Traffic management mechanisms for Ethernet-based NGNs Operation, administration and maintenance (OAM) mechanisms for Ethernet-based NGNs Protection and restoration mechanisms for Ethernet-based NGNs The OAM and protection and restoration mechanisms are specified by reference to other Recommendations. Ethernet-based NGN is broadly characterized as the employment of IP protocols for the control of Ethernet data flows. In the data link layer, data link features and interfaces defined in IEEE 802.3 will not be altered. As considered in this Recommendation, the Ethernet network encompasses not only the customer’s local network but also the operator’s access and core networks, which are assumed to employ Ethernet technology. This Recommendation specifies the functional architecture and requirements for the resource and admission control functions in Next Generation Networks, which may involve a variety of access and core transport technologies and multiple domains. The Stage*1) 1&2 Target date Approved (01/2009) 1&2 2Q/2010 Location of Document http://www.itu.int/rec/TREC-Y.2113/en TD 81 R1 (WP 4/13) Q No Doc No Document Title 4/13 Y.2111Rev.1 Supplement Supplement to ITU-T Recommendation Y.2111 ( Resource and admission control functions in Next Generation Networks): Potential items for post-Revision 1 4/13 Y.2122 Flow Aggregate Information Exchange Functions in NGN Objectives and Scopes RACF provides real-time application-driven and policy-based transport resource management in support of end-to-end quality of service (QoS), gate control, network address translation, and traversal of remote network address translators. The RACF is not service-specific. Services can make use of RACF whether the IP multimedia subsystem is involved or not. In particular, this Recommendation includes extensions to Y.2111 to address issues related to multicast in support of IPTV services, nomadicity, and interactions between CPE/CPN and RACF. This document provides a tentative placeholder for the potential items for postrevision 1 of the RACF. The content is subject to further discussion, comment and modification before being accepted and incorporated into the new revisions or addendums of the Y.2111 revision 1. CPE/CPN and Mobility related materials are moved from the section 8 and 9 of the output of Seoul SG13 meeting. This Recommendation defines the network operating parameters of a flow aggregate (FA) to be exchanged among different network domains for various types of FAs in NGN, and defines the architecture for exchanging these parameters. It also defines, for informational purpose, the mapping of the transport technology specific parameters to the defined network operating parameters. Detail protocols are for further study and are out of scope. Usage examples of the Stage*1) Target date Location of Document 05/2009 (pre-published) http://www.itu.int/rec/TREC-Y.2122/en 1&2 1&2 Q No Doc No Document Title 4/13 Y.IPTV-TM Traffic management mechanisms and capabilities for the support of IPTV services 4/13 Amendment to Y.2111 R1 New Annex A, RACF Enhancement for Supporting Policy-based Charging Control 16/13 Y.2701 Security requirements for NGN release 1 Objectives and Scopes exchanged operating parameters are shown in Appendices. The document Recommendation describes specifies a set of traffic management mechanisms which are aimed to facilitate the efficient support of IPTV services over the network infrastructure. Traffic management mechanisms for the home, access, and core networks are discussed. The network supporting IPTV services will span a number of network domains which may be designed, deployed and operated by different providers and which may differ in their traffic management capabilities. Therefore, it is expected that the network provider(s) will implement a subset of these mechanisms to ensure IPTV service objectives are satisfied efficiently. Furthermore the traffic management mechanisms also depend on the specific network architectures used for IPTV services as defined in the IPTV architecture specification. This document specifies the extensions of policy-based charging and its associated control requirements and functional architecture to ITU-T Recommendation Y.2111 R1. This Recommendation provides security requirements for next generation networks (NGNs) against security threats. It is achieved by applying the principles of [ITU-T X.805], Security architecture for systems providing end-to-end communications to [ITU-T Y.2201], NGN release 1 requirements and [ITU-T Y.2012], Functional requirements and Stage*1) Target date Location of Document 1&2 1Q/2010 TD 80 R1 (WP 4/13) 1&2 2Q/2010 TD 281 (GEN/13) independent Published (04/2007) http://www.itu.int/rec/TREC-Y.2701/en Q No Doc No Document Title Objectives and Scopes architecture of the NGN release 1. The requirements are to protect the following in a multi-network environment: • network and service provider infrastructure and its assets (e.g., NGN assets and resources such as network elements, systems, components, interfaces, and data and information), its resources, its communications (i.e., signalling, management and data/bearer traffic) and its services; • NGN services and capabilities (e.g., voice, video and data services); • end user communication and information (e.g., private information). The requirements are to provide networkbased security of end user communications across multiple-network administrative domains. Security of customer assets and information in the customer domain (e.g., user network), and the use of peer-to-peer application capabilities on customer equipment are not within the scope of this Recommendation. The requirements specified in this Recommendation are applicable to an NGN, including user to network interfaces (UNIs), network-to-network interfaces (NNIs) and application to network interfaces (ANIs) in a multi-network environment. NGN service providers will be deploying "network elements" that support the functional entities defined in [ITU-T Y.2012]. The bundling of these functional entities to a given network element will vary, depending on the vendor. Therefore, this Recommendation will Stage*1) Target date Location of Document Q No Doc No Document Title 16/13 Y.2702 Authentication and authorization requirements for NGN release 1 Objectives and Scopes not attempt to show a strict and fixed bundling between logical functional entities and physical network elements. The requirements in this Recommendation should be treated as a minimum set of requirements for NGN security and should not be considered to be exhaustive. Therefore, an NGN provider may need to take additional measures beyond those specified in Recommendations for NGN security. In addition, the requirements in this Recommendation cover some of the technical aspects of what is generally known as IdM ("identity management"). A working definition of IdM is "management by NGN providers of trusted attributes of an entity such as: a subscriber, a device or a provider". This is not intended to indicate positive validation of a person. Administrations may require NGN providers to take into account national regulatory and national policy requirements in implementing this Recommendation. This Recommendation provides authentication and authorization requirements for Next Generation Network (NGN) based on Recommendation Y.2012, Functional requirements and architecture of the NGN release 1 [Y.2012]. This includes requirements forl authentication and authorization across the user-to-network interface (UNI), the network-to-network interface (NNI) and the application-tonetwork interface (ANI) as well as any entities internally with a network that may Stage*1) independent Target date Pre-published (09/2008) Location of Document http://www.itu.int/rec/TREC-Y.2702/en Q No Doc No Document Title Objectives and Scopes require authentication and authorization. The scope of this Recommendation includes: 1. Authentication and authorization of user for network access (e.g., authentication and authorization of an end user device, a home network gateway, or an enterprise gateway to obtain access or attachment to the network) 2. Service provider authentication and authorization of user for access to service/application (e.g., authentication and authorization of an user, a device or a combined user/device where the authentication and authorization apply to NGN service/application access) 3. User authentication and authorization of Network (e.g., user authenticating the identity of the connected NGN network or of the service provider) 4. User peer-to-peer authentication and authorization (e.g., authentication and authorization of the called user (or terminating entity), authentication and authorization of the originating entity, or data origin authentication as network functions) 5. Mutual network authentication and authorization (e.g., authentication and authorization across NNI interface at the transport level, or service/application level) 6. Authentication and authorization of Stage*1) Target date Location of Document Q No Doc No Document Title 16/13 Y.2703 The application of AAA service in NGN Objectives and Scopes service/application provider 7. Use of 3rd party authentication and authorization service. 8. Authentication of objects (e.g., application process, message content and data content identifiers). The items above include authentication of flows of the signalling, bearer and management traffic as applicable. In addition, this Recommendation also provides reference models for NGN authentication and authorization. NOTE 1. NGN authentication and authorization is viewed as part of the broader topic of NGN identity management (IdM). Specifically, the authentication and authorization functions and capabilities described in this Recommendation should be used to support identity assurance capabilities for NGN IdM. NOTE 2. In this Recommendation, the use of the term “user” is not intended to be restricted to a person. A user could be a person, groups, companies, or juridical entities. NOTE 3. Authentication of an entity is not intended to indicate positive validation of a person. This Recommendation describes an application for authentication, authorization and accounting (AAA) for Next Generation Networks (NGNs) based on Recommendation Y.2201 - NGN Release 1 Requirements, Y.2012 - Functional Requirements and Architecture of the NGN Release 1 (FRA), Stage*1) independent Target date 01/2009 (Approved) Location of Document http://www.itu.int/rec/TREC-Y.2703/en Q No Doc No Document Title Objectives and Scopes Y.2701 - Security Requirements for NGN Release 1 and Y.2702 - NGN Authentication. This Recommendation applies to the authentication, authorization and accounting process in accessing an NGN using the AAA client and AAA server. In particular, this Recommendation addresses the accounting function only from the standpoint of its contribution to security accounting. The scope of this Recommendation is; 1. The enrolment process 2. Authentication functions and procedures 3. Authorization functions and procedures 4. Security-accounting functions and procedures Stage*1) Target date Location of Document Q No 16/13 Doc No Y.2720 Document Title NGN identity management framework Objectives and Scopes This Recommendation provides an Identity Management (IdM) framework for Next Generation Network (NGN). The primary purpose of this Recommendation is to describe the fundamental concepts, functional components and capabilities of IdM that can be used to organize and guide structured solutions for NGN. The scope of this Recommendation includes to: Describe the business motivations, benefits, and advantages of IdM services, and the generic capabilities used to provide identity assurance and defining IdM concepts applicable to NGN and based on the NGN Functional Requirements and Architecture (FRA) as defined in Y.2012 Identify and describe the functional entities, roles, relationships, enablers and communications supporting IdM services and capabilities for NGN Identify and describe the (intranetwork) relationships for supporting IdM services and capabilities within an NGN, Identify and describe the relationships for supporting IdM services and capabilities between NGN providers (e.g., within a federation), and between NGN providers and other providers (e.g., inter-federation) The framework provided in this Recommendation is intended for NGN (i.e., managed packet networks) as defined in [ITUT Y.2001], General overview of NGN. However, it could be applied as appropriate to other types of networks (e.g., private corporation and enterprise networks). Stage*1) independent Target date 01/2009 (Approved) Location of Document http://www.itu.int/rec/TREC-Y.2720/en Q No 16/13 Doc No Y.2704 (Y.NGN Security Mechanisms) Document Title Security mechanisms and procedures for NGN 16/13 Y.NGN IdM Requirements NGN Identity management requirements and use cases Objectives and Scopes Y.2701, Security Requirements for NGN Release 1, provides security requirements for next generation networks (NGNs) and its interfaces (e.g., UNIs, NNIs and ANIs). This Recommendation describes some security mechanisms that can be used to fulfill the requirements described in Y.2701, Security Requirements for NGN Release 1, and specifies the suite of options for each selected mechanism. Specifically, this Recommendation describes identification, authentication and authorization mechanisms; then discusses transport security for signalling and OAMP, and media security. It then describes audit-trail-related mechanisms and finally describes the provisioning. The security mechanisms described in this recommendation are based on use of the trust model defined in [Y.2701]. The list of security mechanisms described in this Recommendation is not exhaustive. NGN providers are encouraged to support additional security tools, capabilities and operational measures as needed beyond the mechanisms specified in this Recommendation for NGN security protection. This Recommendation provides Identity Management (IdM) requirements and and example uses cases and guidelines for the Next Generation Network (NGN) and its interfaces. It is intended to facilitate a structured approach for the IdM of the identity or identities of an NGN entity such as: a. User/group b.Organization/federation/enterprise/ser Stage*1) independent Target date 09/2009 (Determination) Location of Document TD 58 R1 (PLEN/13) independent 01/2010 (Determination) TD 62 (WP 4/13) Q No Doc No Document Title Objectives and Scopes vice provider c. Device/network element/system d. Object (e.g., application process, content, data). The scope of this Recommendation includes objectives, requirements and example uses cases and guidelines addressing: Assurance of the identity or identities of an NGN entity (e.g., user, group, user device, service provider, enterprise, federation, network element and object). Secure management of the lifecycle (e.g., registration, validation, revocation) of an identity. IdM as an enabler of services (e.g., VoIP, Data, IPTV and identity-based services) including real-time communication sessions (e.g., SIP communication sessions) and near real-time communication sessions (e.g., web-based transactions). Secure discovery and exchange of information associated with an NGN entity’s identity or identities. This includes information that may be located within an NGN and across different administrative domains or federations. Interworking among the network elements within a NGN provider domain (i.e., intra-network), and among different provider domains or federations. Stage*1) Target date Location of Document Q No Doc No Document Title 16/13 Y.NGN Certificate Management Certificate management Objectives and Scopes Functions and capabilities for enforcement of applicable policy (e.g., privacy) associated with an entity’s identity or identity information. IdM as an enabler for security of services (e.g., VoIP, Data, IPTV and identity-based services) including real-time communication sessions (e.g., SIP communication sessions) and near real-time communication sessions (e.g., web-based transactions). Security of IdM functions, capabilities, data and communications. The objectives and requirements in this Recommendation are based on an analysis of Use Case examples relevant to NGN interoperability for Identity Management (IdM) This Recommendation defines the procedures for managing X.509 certificates used for NGN security. The Recommendation applies to NGN using certificates based on the framework for Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI) specified in X.509. The X.509 certificate may be used for identification, authentication, privilege/attribute management and/or encryption between network elements, and between user end-device and the NGN Provider CPE Provisioning Element. This includes use of X.509 certificates between Stage*1) Target date Location of Document independent 04/2010 (Determination) T05-SG13-080114-TDWP2-0435 Q No Doc No Document Title 16/13 Y.NGN IdM Mechanisms NGN identity management mechanisms 16/13 Y. mobSec Mobility Security Framework in NGN 16/13 Y.NGN mobile financial requirements Security Requirements for Mobile Remote Financial Transactions in NGN 16/13 Y.NGN mobile financial architecture Y.NGN trusted SP Architecture of Secure Mobile Financial Transactions in NGN 16/13 NGN Requirements and Use Cases for Trusted Service Objectives and Scopes network elements of peering providers based on policy and business agreements. Draft Y.idmRequirements, describes NGN IdM requirements. The IdM mechanisms selected to implement these requirements will contain options; however, mismatched options should be avoided since they tend to introduce security vulnerabilities and make it more difficult to achieve interoperability. This Recommendation describes the specific IdM mechanisms and suites of options that should be used to meet the requirements in Y.idmRequirements of NGN. In addition, it could provide best practices, guidelines to support interoperability and other needs. This Recommendation provides the mobility security framework in NGN transport stratum. The mobility scenarios include but no limited in intra-domain, inter-domain, intertechnology, intra-technology case. The document covers the security requirements and the security levels of the Mobile Banking and Mobile Commerce systems as well as their most probable risks. The three security levels described determine risk mitigation measures. The security level is determined by the means of Security Dimension implementation. The document specifies the general architecture of the security solution for Mobile Commerce and Mobile Banking Stage*1) Target date Location of Document independent 03/2010 (Determination) TD 63 (WP 4/13) independent 3Q/2010 TD 64 (WP 4/13) independent 2Q/2010 TD 65 (WP 4/13) independent 2Q/2010 TD 66 (WP 4/13) 4Q/2010 TD 60/NGN GSI Q No Doc No requirements Y.NGN Sec. Risk Document Title Provider Identity Security Risk Assessment in NGN 17/13 TR.dpias Application Scenarios of Deep Packet Inspection in packet based networks and NGN environment 17/13 Y.dpireq Requirements of Deep Packet Inspection in packet based networks and NGN environment 16/13 Objectives and Scopes This recommendation provides guideline for security risk assessment over NGN and may be used as practical usage. As such, it relies on the companion ITU-T Recommendations that define the architecture, requirements, and protocols for NGN, specifically those that are relevant to NGN security. The Technical Report is targeted primarily at the application scenarios and deployment models of DPI: To identify different user cases of DPI in packet based networks and NGN environment To describe the deploy models of DPI in heterogenous or distributed network environment The Recommendation is targeted primarily at the service requirements, capability requirements and functional requirements of DPI and performance requirements identifying and defining (if necessary) , standard interfaces to interconnect with other components, taking into account policy-based networks in both packet-based networks (e.g. IPv4/v6) and NGN environment. These requirements will of the Deep Packet Inspection (DPI), including: (1) provide realtime service awareness, and ,control and security by partial or entire packet scanning partial or the whole packet for service awareness and control based on static/dynamic rules in packet-based networks and NGN environment. Stage*1) Target date 2011 -- independent Location of Document TD 68 (WP 4/13) Planned 2010.1 TD 76 R1 (WP 4/13) Q No Q17/13 Doc No Y.dpifr Document Title Framework of Deep Packet Inspection in packet based networks and NGN environment *1) Stages are: Stage 1: service aspects Stage 2: functional network aspects Stage 3: network implementation aspects Stage independent: all stages are included. Objectives and Scopes The Recommendation is targeted primarily at the framework or architecture of DPI: To describe the functionalities of different DPI building blocks To define the standard interfaces, mechanisms and the interaction involving end users, control plane and management plane Stage*1) -- Target date 2010.9 Location of Document TD 75 (WP 4/13) 5. WP5 Work Plan Title: Future Networks Questions: 7, 19, 20, 21 (details for question work scop, please look at COM13-C1) Q No 7/13 Doc No Y.ipv6split 7/13 Y.ipv6-object 7/13 Y.ipv6-vmh 7/13 Y.ipv6migrati on Document Title Objectives and Scopes Framework of ID/LOC separation This Recommendation includes IPv6 addressing in IPv6-based NGN schemes for ID/LOC separation, mapping functions and procedures for ID/LOC separation in IPv6-based NGN, and its deployment scenarios for ID/LOC separation in IPv6-based NGN. Framework of object mapping This Recommendation specifies basic concept using IPv6 in NGN and requirements of object mapping using IPv6 in NGN in order to provide networking capabilities to all of objects. This Recommendation also describes mapping architecture, relationship between identities and relevant mechanisms and services for object mapping. Framework of Vertical MultiThis Recommendation describes a framework of homing in IPv6-based NGN vertical multi-homing in IPv6-based NGN. For this, Y.ipv6-vmh identifies the definition, requirements, functional architecture, and applications of vertical multi-homing in IPv6based NGN. Because the vertical multi-homing issue is also related with the scope of Q9/13, the work of this Recommendation will be coordinated with the work of multi-connection by Q9/13 Roadmap for IPv6 Migration This Recommendation is to give guidelines for from NGN operators’ NGN operators on how to migrate from IPv4perspectives based NGN to IPv6-based NGN. For this, Y.ipv6migration identifies the IPv6 migration phases and its migration strategies in each phase for NGN operators. Stage*1) 1 Target date 2010-9 Location of Document TD 42 (WP 5/13) 1 2010-4 TD 43 (WP 5/13) 1 2010-9 TD 46 (WP 5/13) 1 2010-9 TD 44 Rev.1 (WP5/13) Q No 7/13 Doc No Y.ipv6na Document Title Functional requirement for network access in IPv6-based NGN 7/13 Y.ipv6-adhoc Framework of ad-hoc network in IPv6-based NGN 7/13 Y.ipv6Transport Transport Stratum Extension in IPv6-based NGN 7/13 Y.ipv6Service Service Stratum Extension in IPv6-based NGN 7/13 Y.ipv6interworking Interworking with heterogeneous networks in IPv6-based NGN 19/13 Y.dsnscen Supplement on DSN use cases 19/13 Y.dsnreq Recommendation on DSN requirements 19/13 Y.dsnarch 19/13 Y.dsntocf Recommendation on DSN architecture Recommendation on Traffic Optimization Control Function Objectives and Scopes This Recommendation is to identify the impact on network access in IPv6-based NGN and to describe the relevant scenarios/models to find out its functional requirements. Features and requirements of ad-hoc network in IPv6-based NGN Functional architecture for IPv6 ad-hoc network Technical solutions: Ad-hoc routing and security, etc. IPv6-based Transport Functions IPv6 Enabled NACFs and RACFs Transport User Profiles in IPv6-based NGN IPv6 enabled Application and Service support functions Service User Profiles in IPv6-based NGN IPv6-based Applications Requirements for interworking Interworking mechanism with o Wireless PAN, ad-hoc network etc Interworking scenarios Technical considerations This supplement describes various use cases and scenarios for distributed services networks. This Recommendation describes the service requirement, network capability requirements of DSN This Recommendation describes the architecture of DSN The Recommendation defines the functional architecture covering aspects such as Stage*1) 1 Target date 2010-9 Location of Document TD 45 Rev. 1 (WP5/13) 1 TBD 2 TBD 2 TBD 1 TBD 1 2010-01 TD 52 Rev.2 (WP 5/13) 1 2010-01 TD 51 Rev.1 (WP 5/13) 2 2010-12 TD 50 R1 (WP 5/13) 2 2010-12 TD 53 (WP 5/13) Q No Doc No Document Title 20/13 Y.PTDN Y.PTDN: The general technical architecture for PTDN. 20/13 Y.iSCP_Scen Y.iSCP-scen: Draft supplement of Scenarios for independent scalable control plane in FPBN 20/13 Y.iSCP_Req Y.iSCP-req: Requirements of independent Scalable Control Plane (iSCP) in FPBN 20/13 Y.iSCP_Arch Y.iSCP-arch: Architecture of independent Scalable Control Plane (iSCP) in FPBN *1) Stages are: Stage 1: service aspects Stage 2: functional network aspects Objectives and Scopes topology-aware optimization and cache capability, as well as reference points between function entities. The objective of this document is to provide the technical architecture of PTDN, including the format of the data link frame and network packet, routing & forwarding mechanisms, as well as the OAM and interworking methods with other packet bearer networks. It also provides the performance requirements of the PTDN. This supplement describes the issues with current IP networks and provides application scenarios and improvements provided by an independent scalable control plane (iSCP) which separates the control plane from the data plane in the future packet based networks as described in [ITU-T Y.2601]. This Recommendation describes technical requirements of an independent scalable control plane (iSCP) by separating the control plane from the data plane in the future packet based networks (FPBN) as described in [ITUT Y.2601] This Recommendation describes the architecture, basic functional components, interfaces of independent scalable control plane (iSCP) by separating the control plane from the data plane in the future packet based networks (FPBN) as described in [ITU-T Y.2601] Stage*1) Target date Location of Document 2&3 2010-04 TD 59 (WP 5/13) 1 2010-01 TD 58 (WP 5/13) 1 2010-04 TD 57 (WP 5/13) 2&3 2010-12 TD 56 (WP 5/13) Stage 3: network implementation aspects Stage independent: all stages are included. _______________