Backhaul Characteristics_Attributes Definition Final v1

advertisement
Backhaul Characteristics/Attributes Definition
Definition
1. Performance
Bitrate
actual data transmission capability per unit time.
Latency
time interval starting when the last bit of the input frame reaches the backhaul input port and
ending when the first bit of the output frame is seen on the backhaul output port
Reference (RFC 1242)
For store and forward devices:
The time interval starting when the last bit of the input frame reaches the input port and
ending when the first bit of the output frame is seen on the output port.
For bit forwarding devices:
The time interval starting when the end of the first bit of the input frame reaches the input
port and ending when the start of the first bit of the output frame is seen on the output port.
Frame loss
rate of frames that should have been forwarded by a network device under steady state
(constant) load that were not forwarded due to lack of resources
Reference RFC1242
Availability
ratio of uptime of a system to the aggregate time of the uptime and downtime
i.e. Availability = uptime/(uptime+downtime)
Redundancy
multiple devices that are used for backup purposes.
NOTE: The goal of redundancy is to prevent or recover from the failure of a specific component
or system
Distance
extent of space between two objects or places; an intervening space.
NOTE: In backhaul perspective, this word means the extent between two BHIs in communicating
CCDs.
1
Final v1
3 March 2014
Backhaul Characteristics/Attributes Definition
Mobility
capability to allow mobile devices to communicate with other device via the backhaul network
Dynamic Routing
function, which provides optimal data routing dynamically and automatically
NOTE: Unlike static routing, dynamic routing enables routers to select paths according to
real-time logical network layout changes. It is mainly used to improve the network availability.
2. Flow Control
Intentional Loss
Function, which intentionally limit incoming frame rate to prevent overflow of output queue
Bandwidth Control
function, which allows users to manage network bandwidth consumption
NOTE: It is used to assure the latency in expected range of time by assigning a dedicated
bandwidth to the particular traffic.
Priority Control
function, which allows users to prioritize particular packets to other packets sharing a given
bandwidth. It is used to assure the latency in expected range of time as far as possible while
allowing other packets with lower priority.
3. Security
Encryption path on L2
function, which encrypt the frames in Layer 2 of OSI Model. It provides confidentiality and
integrity for the packets
NOTE: The encryption path is available within one hop.
e.g. In WIFI communications, the frames between Access point and terminal are encrypted in
Layer 2.
Layer 3 VPN (IPsec)
function, which encrypt the frames in Layer 3 of OSI Model to provide confidentiality and integrity
for the packets
NOTE: In Backhaul perspective Layer 3 VPN can be used to provide conduit between BHIs.
2
Final v1
3 March 2014
Backhaul Characteristics/Attributes Definition
Layer 4 VPN (SSL VPN)
function, which encrypts the frames in Layer 4 of OSI Model to provide confidentiality and
integrity for the packets.
NOTE: In Backhaul perspective Layer 4 VPN can be used to provide conduit between BHIs.
4. Packet Inspection
Stateless Filtering
function, which provides access control for the packets in the network regardless the
communication status
NOTE: It passes or drops the packets by matching the packets’ attributes with pre-defined
access control rules. This technique decides the behavior against the packets with only the
attributes (e.g., source or destination address, source or destination port, protocol) on each
packets.
Stateful Filtering
function, which provides access control for the packets in the network based on communication
status
NOTE: It passes or drops the packets by matching the packets’ attributes with pre-defined
access control rules. This technique decides the behavior against the packets with both of the
attributes on each packets and packet sequence. For example, by tracking the packet sequence,
it can pass the solicited UDP packet, while dropping the unsolicited UDP packet. In addition, it
can detect malicious TCP packets by tracking TCP sequence number.
IPS (Intrusion Protection System)
function, which prevents network attacks when malicious or security policy violation packets are
detected
NOTE: It monitors to examine the network by comparing to already known packet patterns.
When it found the malicious packet, it can drop the packets or terminate the communicating TCP
session to prevent the attack.
IDS (Intrusion Detection System)
function, which is designed to alert administrators when malicious or security policy violation
packets are detected
NOTE: It monitors to examine the network by comparing to already known packet patterns.
3
Final v1
3 March 2014
Backhaul Characteristics/Attributes Definition
Virus Check
function, which detects and remove computer virus transporting in the packet
NOTE: The virus check function has a database to store the bit patterns of virus so called
signature. It monitors to examine the network by comparing to already known signatures.
5. Management
Authentication
function to determine an object, including human, device, service, etc...
NOTE: The authenticating function requires a pair of identification and credential. The pair is
bond to the object to be authenticated.
Authorization
function to give the permission to an object
NOTE: The permission is predefined for each object. In some case, the permission is defined to
the role in which the object is assigned.
Monitoring & Reporting (Statistics)
function to monitor the device or system to make report of the network status and/or history
NOTE: Monitoring function collects the system status, such as activities, performance, events.
The reporting function summarizes the collected information and alert the administrator if
required.
Prioritization Rule (for Flow Control)
function to configure the prioritization rule for flow control functionalities such as IEEE802.11Q or
Diffserv
NOTE: The rule would have packet priority and attributes to classify the packets.
Resource Reservation (for Flow Control)
function to configure the bandwidth rule for flow control functionalities, such as Diffserv or Intserv
NOTE: Each rule has assigned bandwidth and attributes to classify the packets. The
configuration feature could be provided in either manual or automatic manner.
4
Final v1
3 March 2014
Backhaul Characteristics/Attributes Definition
Bandwidth Management (Bandwidth Broker)
function to manage the bandwidth of each link
NOTE: As some portion of bandwidth on each link is assigned to particular communication, the
authentication and authorization to the object would be required. In addition the remaining
bandwidth need to be managed. A function to configure the prioritization rule for flow control
functionalities, such as IEEE802.11Q or Diffserv. The rule would have packet priority and
attributes to classify the packets.
Flow Control Management (Policy Manager for Flow Control)
function to manage the flow control policy
NOTE: It can help collaborative work among bandwidth management, authentication,
authorization, dynamic routing, etc… In addition, it can provide priority mapping function
between IEEE802.11Q and Diffserv.
Routing
function to configure the dynamic routing protocol in Backhaul network
NOTE: When the BHI is a member of routing domain in the Backhaul network, it could be
required depending on BHI operator’s requirement. E.g., configuring OSPF, IS-IS, etc..
Address Assignment (BHI-IF1)
function to assign the IP address and netmask on Backhaul side interface of BHI automatically.
e.g., DHCP client on corresponding interface
Policy Manager
function to manage the security policy by describing how the BHI protects the assets within the
corresponding CCD
NOTE: Typically, the policy includes selector (to classify the traffic) and procedure (to specify
how to handle the traffic). Policy manager may consist of two functions of Policy Information
Point and Policy Definition Point depending on users environment.
Separate VPN for Management
dedicated secure path (conduit) to manage the BHI
NOTE: When the administrator configures the BHI via network, it is recommended to provide
encrypted communications and high priority of flow control (or separated bandwidth) to ensure
5
Final v1
3 March 2014
Backhaul Characteristics/Attributes Definition
the secure and stable configuration.
Provisioning and Commissioning
function to configure the interface of BHI attaching to the Backhaul
NOTE: Typically, the Backhaul service provider runs authentication process before accepting the
BHI to connect the network. Therefore, the identifier and credential need to be configured on BHI
to pass the authentication process.
6
Final v1
3 March 2014
Download