Backhaul Characteristics/Attributes Definition Definition 1. Performance Bitrate actual data transmission capability per unit time. Latency time interval starting when the last bit of the input frame reaches the backhaul input port and ending when the first bit of the output frame is seen on the backhaul output port Reference (RFC 1242) For store and forward devices: The time interval starting when the last bit of the input frame reaches the input port and ending when the first bit of the output frame is seen on the output port. For bit forwarding devices: The time interval starting when the end of the first bit of the input frame reaches the input port and ending when the start of the first bit of the output frame is seen on the output port. Frame loss rate of frames that should have been forwarded by a network device under steady state (constant) load that were not forwarded due to lack of resources Reference RFC1242 Availability ratio of uptime of a system to the aggregate time of the uptime and downtime i.e. Availability = uptime/(uptime+downtime) Redundancy multiple devices that are used for backup purposes. NOTE: The goal of redundancy is to prevent or recover from the failure of a specific component or system Distance extent of space between two objects or places; an intervening space. NOTE: In backhaul perspective, this word means the extent between two BHIs in communicating CCDs. 1 Final v1 3 March 2014 Backhaul Characteristics/Attributes Definition Mobility capability to allow mobile devices to communicate with other device via the backhaul network Dynamic Routing function, which provides optimal data routing dynamically and automatically NOTE: Unlike static routing, dynamic routing enables routers to select paths according to real-time logical network layout changes. It is mainly used to improve the network availability. 2. Flow Control Intentional Loss Function, which intentionally limit incoming frame rate to prevent overflow of output queue Bandwidth Control function, which allows users to manage network bandwidth consumption NOTE: It is used to assure the latency in expected range of time by assigning a dedicated bandwidth to the particular traffic. Priority Control function, which allows users to prioritize particular packets to other packets sharing a given bandwidth. It is used to assure the latency in expected range of time as far as possible while allowing other packets with lower priority. 3. Security Encryption path on L2 function, which encrypt the frames in Layer 2 of OSI Model. It provides confidentiality and integrity for the packets NOTE: The encryption path is available within one hop. e.g. In WIFI communications, the frames between Access point and terminal are encrypted in Layer 2. Layer 3 VPN (IPsec) function, which encrypt the frames in Layer 3 of OSI Model to provide confidentiality and integrity for the packets NOTE: In Backhaul perspective Layer 3 VPN can be used to provide conduit between BHIs. 2 Final v1 3 March 2014 Backhaul Characteristics/Attributes Definition Layer 4 VPN (SSL VPN) function, which encrypts the frames in Layer 4 of OSI Model to provide confidentiality and integrity for the packets. NOTE: In Backhaul perspective Layer 4 VPN can be used to provide conduit between BHIs. 4. Packet Inspection Stateless Filtering function, which provides access control for the packets in the network regardless the communication status NOTE: It passes or drops the packets by matching the packets’ attributes with pre-defined access control rules. This technique decides the behavior against the packets with only the attributes (e.g., source or destination address, source or destination port, protocol) on each packets. Stateful Filtering function, which provides access control for the packets in the network based on communication status NOTE: It passes or drops the packets by matching the packets’ attributes with pre-defined access control rules. This technique decides the behavior against the packets with both of the attributes on each packets and packet sequence. For example, by tracking the packet sequence, it can pass the solicited UDP packet, while dropping the unsolicited UDP packet. In addition, it can detect malicious TCP packets by tracking TCP sequence number. IPS (Intrusion Protection System) function, which prevents network attacks when malicious or security policy violation packets are detected NOTE: It monitors to examine the network by comparing to already known packet patterns. When it found the malicious packet, it can drop the packets or terminate the communicating TCP session to prevent the attack. IDS (Intrusion Detection System) function, which is designed to alert administrators when malicious or security policy violation packets are detected NOTE: It monitors to examine the network by comparing to already known packet patterns. 3 Final v1 3 March 2014 Backhaul Characteristics/Attributes Definition Virus Check function, which detects and remove computer virus transporting in the packet NOTE: The virus check function has a database to store the bit patterns of virus so called signature. It monitors to examine the network by comparing to already known signatures. 5. Management Authentication function to determine an object, including human, device, service, etc... NOTE: The authenticating function requires a pair of identification and credential. The pair is bond to the object to be authenticated. Authorization function to give the permission to an object NOTE: The permission is predefined for each object. In some case, the permission is defined to the role in which the object is assigned. Monitoring & Reporting (Statistics) function to monitor the device or system to make report of the network status and/or history NOTE: Monitoring function collects the system status, such as activities, performance, events. The reporting function summarizes the collected information and alert the administrator if required. Prioritization Rule (for Flow Control) function to configure the prioritization rule for flow control functionalities such as IEEE802.11Q or Diffserv NOTE: The rule would have packet priority and attributes to classify the packets. Resource Reservation (for Flow Control) function to configure the bandwidth rule for flow control functionalities, such as Diffserv or Intserv NOTE: Each rule has assigned bandwidth and attributes to classify the packets. The configuration feature could be provided in either manual or automatic manner. 4 Final v1 3 March 2014 Backhaul Characteristics/Attributes Definition Bandwidth Management (Bandwidth Broker) function to manage the bandwidth of each link NOTE: As some portion of bandwidth on each link is assigned to particular communication, the authentication and authorization to the object would be required. In addition the remaining bandwidth need to be managed. A function to configure the prioritization rule for flow control functionalities, such as IEEE802.11Q or Diffserv. The rule would have packet priority and attributes to classify the packets. Flow Control Management (Policy Manager for Flow Control) function to manage the flow control policy NOTE: It can help collaborative work among bandwidth management, authentication, authorization, dynamic routing, etc… In addition, it can provide priority mapping function between IEEE802.11Q and Diffserv. Routing function to configure the dynamic routing protocol in Backhaul network NOTE: When the BHI is a member of routing domain in the Backhaul network, it could be required depending on BHI operator’s requirement. E.g., configuring OSPF, IS-IS, etc.. Address Assignment (BHI-IF1) function to assign the IP address and netmask on Backhaul side interface of BHI automatically. e.g., DHCP client on corresponding interface Policy Manager function to manage the security policy by describing how the BHI protects the assets within the corresponding CCD NOTE: Typically, the policy includes selector (to classify the traffic) and procedure (to specify how to handle the traffic). Policy manager may consist of two functions of Policy Information Point and Policy Definition Point depending on users environment. Separate VPN for Management dedicated secure path (conduit) to manage the BHI NOTE: When the administrator configures the BHI via network, it is recommended to provide encrypted communications and high priority of flow control (or separated bandwidth) to ensure 5 Final v1 3 March 2014 Backhaul Characteristics/Attributes Definition the secure and stable configuration. Provisioning and Commissioning function to configure the interface of BHI attaching to the Backhaul NOTE: Typically, the Backhaul service provider runs authentication process before accepting the BHI to connect the network. Therefore, the identifier and credential need to be configured on BHI to pass the authentication process. 6 Final v1 3 March 2014