ORGANIZATION OF AMERICAN STATES INTER-AMERICAN TELECOMMUNICATION COMMISSION PERMANENT CONSULTATIVE COMMITTEE I: TELECOMMUNICATION STANDARDIZATION Technical Notebook: NEXT GENERATION NETWORKS Standards Overview TECHNICAL NOTEBOOK-1 rev.113 (2011) Output of XVII CITEL PCC.I Meeting (Lima, Peru) Next Generation Networks – Standards Overview Reference: P1!T-478/04 & P1!T-581/05 & P1!T-686/05 & P1!T-776/06 & P1!T-863/06 & P1!T-991/07& P1!T-1206/07 & P1!T-1297/08 & P1!T-1438/08 & P1!T-1658/09 rev.2, & P1!T-1751/09, P1!T-1898/09, & P1!T-2120/10 CITEL Inter-American Telecommunication Commission 1889 F St.NW #1020 Washington, DC United States http://citel.oas.org For additional information please contact: Wayne Zeuch Tel: +1 732 290 0247 E-mail: waynezeuch@aol.com or Executive Secretary of CITEL Tel: +1 202 458 3004 Fax: +1 202 458 6854 E-mail: citel@oas.org @ CITEL, OctoberMarch 2011 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the CITEL. ii 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview TECHNICAL NOTEBOOK1 A Technical Notebook provides a formalised means of maintaining a file of a project’s technical information that will be available to the telecommunications industry in the Member States. CITEL uses Technical Notebooks when: a) Publishing technical information for network characterizations or service functionality for new or existing services. b) Describing/reporting the status of a study project for the current or future use of a Working Group. c) Publicizing findings of a study, review or survey. d) Documenting procedures, inter-working or interconnection issues which would benefit the industry but which are not adaptable or practical as a Coordinated Standard Document (CSD). e) Documenting standards, completed or in progress, for new or existing services, which may be considered for future development into a CSD in accordance with the approval procedures of the Technology Working Group. The members of CITEL have not approved the contents of this document. 1 PCC.I/RES. 142 (XV-01) iii 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview INDEX 1 NGN ARCHITECTURE .................................................................... Error! Bookmark not defined. 1.1 NGN Voice/Data Converged Architecture .................................... Error! Bookmark not defined. 1.2 NGN Service Converged Architecture .......................................... Error! Bookmark not defined. 1.3 NGN Release 1 Architecture ......................................................... Error! Bookmark not defined. 1.3.1 Transport Layer.............................................................................. Error! Bookmark not defined. 1.3.1.1 Transport Functions .......................................................... Error! Bookmark not defined. 1.3.1.1.1 Access network functions ............................................ Error! Bookmark not defined. 1.3.1.1.2 Edge functions ............................................................. Error! Bookmark not defined. 1.3.1.1.3 Core transport functions .............................................. Error! Bookmark not defined. 1.3.1.1.4 Gateway functions ....................................................... Error! Bookmark not defined. 1.3.1.2 Media handling functions ................................................. Error! Bookmark not defined. 1.3.2 Transport control functions ............................................................ Error! Bookmark not defined. 1.3.2.1 Resource and admission control functions (RACF) ......... Error! Bookmark not defined. 1.3.2.2 Network attachment control functions (NACFs) .............. Error! Bookmark not defined. 1.3.3 Service Layer functions ................................................................. Error! Bookmark not defined. 1.3.3.1 Service control functions .................................................. Error! Bookmark not defined. 1.3.3.2 Application support functions and service support functions .......... Error! Bookmark not defined. 1.3.4 End-user functions ......................................................................... Error! Bookmark not defined. 2 NGN SERVICE CAPABILITIES ...................................................... Error! Bookmark not defined. 2.1 ITU-T NGN Service Architecture ................................................. Error! Bookmark not defined. 2.2 Open Programmability Environment Standards ............................ Error! Bookmark not defined. 2.2.1 Parlay ............................................................................................. Error! Bookmark not defined. 2.2.1.1 Parlay Specifications......................................................... Error! Bookmark not defined. 2.2.2 Open Mobile Alliance (OMA) Service Environment .................... Error! Bookmark not defined. 2.3 IPTV............................................................................................... Error! Bookmark not defined. 2.3.1 ATIS IPTV Interoperability Forum (IIF) ....................................... Error! Bookmark not defined. 2.3.2 ITU-T Standardization ................................................................... Error! Bookmark not defined. 2.3.2.1 IPTV FG Working Groups................................................ Error! Bookmark not defined. 2.3.2.2 IPTV Global Standards Initiative (IPTV-GSI) ................. Error! Bookmark not defined. 2.4 Emergency Telecommunications Services .................................... Error! Bookmark not defined. 2.4.1 Emergency Telecommunications Services Types.......................... Error! Bookmark not defined. 2.4.2 Standardization Activity on Emergency Telecommunications ServicesError! Bookmark not defined. 2.4.2.1 ITU Activities ................................................................... Error! Bookmark not defined. 2.4.2.2 IETF Activities ................................................................. Error! Bookmark not defined. 2.4.2.3 ETSI Activities ................................................................. Error! Bookmark not defined. 2.4.2.4 ATIS Activities ................................................................. Error! Bookmark not defined. 2.4.2.5 Other Fora Activities ........................................................ Error! Bookmark not defined. 1 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 2.5 Service Oriented Networks ............................................................ Error! Bookmark not defined. 2.5.1 ATIS SON Forum .......................................................................... Error! Bookmark not defined. 2.5.2 Objectives ...................................................................................... Error! Bookmark not defined. 2.5.3 SON Framework ............................................................................ Error! Bookmark not defined. 2.5.4 SON Forum Task Forces ............................................................... Error! Bookmark not defined. 2.5.4.1 Policy and Data Models TF .............................................. Error! Bookmark not defined. 2.5.4.2 OSS/BSS and Virtualization TF ....................................... Error! Bookmark not defined. 2.5.4.3 Service Delivery Creation and Enablers TF ..................... Error! Bookmark not defined. 2.6 Home Networking...................................................................................................................... 2.5.5 SON Standards ............................................................................... Error! Bookmark not defined. 2.6.1 ATIS Home Networking (HNET) Forum ..................................................................................... 2.6 Cloud Computing ........................................................................... Error! Bookmark not defined. 2.6.2 HNET Forum Objectives ........................................................................................................... 2.6.1 ATIS Cloud Services Forum .......................................................... Error! Bookmark not defined. 2.6.3 HNET Work Plan.......................................................................................................................... 2.7 Home Networking.......................................................................... Error! Bookmark not defined. 3 NGN MOBILITY........................................................................................................................... 2.7.1 ATIS Home Networking (HNET) Forum .......................................... Error! Bookmark not defined. 4 NGN QUALITY OF SERVICE ..................................................................................................... 2.7.2 HNET Forum Objectives ................................................................... Error! Bookmark not defined. 5 NGN SIGNALING ........................................................................................................................ 2.7.3 HNET Work Plan ............................................................................... Error! Bookmark not defined. 5.1 Wireline Access ............................................................................................................................ 2.8 SMART GRID ............................................................................... Error! Bookmark not defined. 5.1.1 Metallic Access Standards ......................................................................................................... 2.8.1 U.S. Smart Grid Program (NIST) .................................................. Error! Bookmark not defined. 5.1.1.1 Testing and Maintenance ........................................................................................... 2.8.1.1 Standards Priorities ........................................................... Error! Bookmark not defined. 5.1.1.1.1 Basic Objective of L.75 Recommendation .............................................................. 2.8.2 Smart Grid Interoperability Panel (SGIP) ................... Error! Bookmark not defined. 5.1.2 Fiber Access Standards .................................................................................................................... 3 NGN MOBILITY .......................................................................... Error! Bookmark not defined. 5.1.3 Power Line Access Standards .......................................................................................................... 4 NGN QUALITY OF SERVICE .................................................... Error! Bookmark not defined. 5.2 Wireless Access ............................................................................................................................... 5 NGN SIGNALING ........................................................................ Error! Bookmark not defined. 5.2.1 WLAN (IEEE 802.11) Wi-Fi ........................................................................................................ 5.1 Wireline Access ............................................................................. Error! Bookmark not defined. 5.2.2 Mobile Broadband Wireless Access (IEEE 802.20) .................................................................. 5.1.1 Metallic Access Standards ............................................................. Error! Bookmark not defined. 2 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 5.3 6 Satellite ................................................................................................................................... 5.1.1.1 Testing and Maintenance ............................................................... Error! Bookmark not defined. SECURITY .............................................................................................................................. 5.1.1.1.1 Basic Objective of L.75 Recommendation......................................... Error! Bookmark not defined. 65.1 ITU-T Security.2Fiber Error! Bookmark not defined. Access Standards 6.1.1 Approved ITU-T Security Recommendations ........................................................................... 5.1.3 Power Line Access Standards ........................................................ Error! Bookmark not defined. 6.1.2 SG 17 Security Work in progress (selected items) ....................................................................... 5.2 Wireless Access ............................................................................. Error! Bookmark not defined. 6.1.3 SG 13 security work in progress (Q15/13) ............................................................................... 5.2.1 WLAN (IEEE 802.11) Wi-Fi ......................................................... Error! Bookmark not defined. 6.2 Identity Management ................................................................................................................. 5.2.2 Mobile Broadband Wireless Access (IEEE 802.20) ...................... Error! Bookmark not defined. 6.2.1 Identity Management Concepts .................................................................................................... 5.3 Satellite .......................................................................................... Error! Bookmark not defined. 6.2.2 Activities .......................................................................................................................................... 6 SECURITY .................................................................................... Error! Bookmark not defined. 6.2.2.1 ITU-T Security Standards bodies and similar organizations ........... Error! Bookmark not defined. 6.2.2.2 Research Activities ....................................................................................................... 6.1.1 Approved ITU-T Security Recommendations .................. Error! Bookmark not defined. 6.2.2.3 Other Identity Management Related Activities ............................................................ 6.1.2 SG 17 Security Work in progress (selected items) ........... Error! Bookmark not defined. ANNEX 1 - Standards Endorsed by CITEL PCC.I Resolutions .......................................................... 6.1.3 .................................................................................................... SG 13 security work in progress (Q15/13) .................................................................................................................... Error! Bookmark not defined. ANNEX 2 - NGN Library........................................................................................................................ 6.2 ...................................................................................................................................... Identity Management .................................................................................................................... Error! Bookmark not defined. 7 NGN Introduction .......................................................................................................................... 6.2.1 Identity Management Concepts .......................................................... Error! Bookmark not defined. 7.1 NGN Standards Efforts .............................................................................................................. 6.2.2 Activities ........................................................................................ Error! Bookmark not defined. 7.2 ITU .......................................................................................................................................... 6.2.2.1 Standards bodies and similar organizations ................................... Error! Bookmark not defined. 7.3 ETSI ........................................................................................................................................ 6.2.2.2 Research Activities ........................................................................ Error! Bookmark not defined. 7.4 ATIS........................................................................................................................................ 6.2.2.3 Other Identity Management Related Activities ............................. Error! Bookmark not defined. 3 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 7.5 8 IETF ................................................................................................................................................. 7 CONFORMANCE AND INTEROPERABILITY ........................ Error! Bookmark not defined. Signaling Standards ........................................................................................................................... 7.1 ITU-T Standardization ....................................................................... Error! Bookmark not defined. 8.1 SIGTRAN (SIGnaling TRANsport) .......................................................................................... 7.1.1 Joint Coordination Activity – Conformance and Interoperability TestingError! Bookmark not defined. 87.1.2 BICCITU-T Error! Bookmark not defined. 8.3 Study Group 11 Megaco/H.248............................................................................................................................ 7.1.3 ITU-T Approved Standards on Test Specifications ....................... Error! Bookmark not defined. 87.1.4 SIPITU-T Draft and Error! Bookmark not defined. Completed Standards on Test Specifications 8.4.1 SIP Operation ............................................................................................................................. 7.1.5 ITU-T Interoperability Events ....................................................... Error! Bookmark not defined. 8.5 SIP-TANNEX 1 Standards Error! Bookmark not defined. 8.6 Q.1912.5ANNEX 2 Error! Bookmark not defined. 8.7 H.323................................................................................................................................................ 8 NGN Introduction .......................................................................... Error! Bookmark not defined. 9 9.1 Endorsed - by CITEL PCC.I Resolutions NGN Library Access8.1 ..........................................................................................................NGN Standards Efforts Error! Bookmark not defined. Wired Access Standards .............................................................................................................. 8.2 ITU ................................................................................................. Error! Bookmark not defined. 9.1.1 Digital Subscriber Line (DSL) Access Standards ......................................................................... 8.3 ETSI ............................................................................................... Error! Bookmark not defined. 9.1.1.1 ATM over ADSL ............................................................................................................. 8.4 ATIS ................................................................................. Error! Bookmark not defined. 9.1.1.2 AAL5 over ATM ............................................................................................................. 8.5 IETF .................................................................................. Error! Bookmark not defined. 9.1.1.3 Protocol ‘x” over AAL5 ..................................................................................................... 9 Signaling Standards .......................................................... Error! Bookmark not defined. 9.1.2 IP Access Requirements ............................................................................................................... 9.1 SIGTRAN (SIGnaling TRANsport) .............................................. Error! Bookmark not defined. 9.1.2.1 PPP (Point-to-Point Protocol) ............................................................................................... BICC ................................................................................. Error! Bookmark not defined. 9.1.2.1.1 IP Considerations ........................................................................................................ 9.3 Megaco/H.248 ............................................................. Error! Bookmark not defined. 9.1.2.1.2 PPP over AAL5 .......................................................................................................... 9.4 SIP ............................................................................... Error! Bookmark not defined. 9.1.2.1.3 PPP over Ethernet .................................................................................................... 9.4.1 SIP Operation .............................................................. Error! Bookmark not defined. 4 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 9.1.2.1.4 9.1.2.16 9.1.2.1.6 IP over AAL5 ............................................................................................................. 9.5 SIP-T............................................................................ Error! Bookmark not defined. Q.1912.5 ........................................................................................ IP over Ethernet Error! Bookmark not defined. Layer 2 Tunneling Protocol (L2TP) ........................................................................... 9.7 H.323 ........................................................................... Error! Bookmark not defined. 9.1.3 Cable 10Access Error! Bookmark not defined. 9.2 Wireless10.1Wired Error! Bookmark not defined. 9.2.1 Broadband Wireless Access (IEEE 802.16) WiMAX ............................................................ 10.1.1 Digital Subscriber Line (DSL) Access Standards .......................... Error! Bookmark not defined. 9.2.2 IMT-2000 (3GPP, 3GPP2).................................................................................................... 10.1.1.1 ATM over ADSL ........................................................................... Error! Bookmark not defined. 9.2.2.1 3GPP ........................................................................................................................ 10.1.1.2 AAL5 over ATM .............................................................. Error! Bookmark not defined. 9.2.2.2 3GPP2 ...................................................................................................................... 10.1.1.3 Protocol ‘x” over AAL5 ................................................... Error! Bookmark not defined. 10 Transport Standards ..................................................................................................................... 10.1.2 IP Access Requirements ..................................................................... Error! Bookmark not defined. 10.1 Standards Access Standards Requirements for Transport Functions ................................................................................. 10.1.2.1 PPP (Point-to-Point Protocol) ........................................................ Error! Bookmark not defined. Transport Technologies and their evolution ................................................................................... 10.1.2.1.1 IP Considerations .................................................................................................................... Error! Bookmark not defined. 10.2 Circuit-switched technologies ............................................................................................ 10.1.2.1.2 PPP over AAL5 ............................................................................. Error! Bookmark not defined. 10.1.2.1 SONET/SDH .............................................................................................................................. .3 PPP over Ethernet ...................................................................... Error! Bookmark not defined. 10.2.2 Optical Transport Network (OTN) ................................................................................ 10.1.2.1.4 IP over AAL5 ............................................................................ Error! Bookmark not defined. 10.3 Packet-switched technologies ............................................................................................ 10.1.2.1.5 IP over Ethernet ............................................................................. Error! Bookmark not defined. 10.3.1 Ethernet as NGN transport technology .......................................................................... 10.1.2.1.6 Layer 2 Tunneling Protocol (L2TP) .......................................... Error! Bookmark not defined. 10.3.2 Ethernet network topologies ................................................................................................ 10.1.3 Cable Access Standards ............................................................. Error! Bookmark not defined. 10.3.3 Evolution to "Carrier-class" Ethernet ..................................................................................... 10.2 Wireless Access Standards ........................................................ Error! Bookmark not defined. 10.3.4 Issues that need to be completed in a “Carrier-class” Ethernet ........................................... 10.2.1 Broadband Wireless Access (IEEE 802.16) WiMAX .............. Error! Bookmark not defined. 5 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 10.3.5 Present standards activities on Ethernet .............................................................................. 10.2.2 IMT-2000 (3GPP, 3GPP2) ........................................................ Error! Bookmark not defined. 10.3.6 Similarities and differences between IP and “Carrier-class” Ethernet ............................. 10.2.2.1 3GPP .......................................................................................... Error! Bookmark not defined. 10.4 Transport MPLS (T-MPLS) .................................................................................................. 10.2.2.2 3GPP2 ............................................................................................ Error! Bookmark not defined. 11Transport Standards Error! Bookmark not defined. 10.4.1 11 landscape for MPLS-T Management Standards ................................................................................................................... 11.1 Requirements for Transport Functions ............................................... Error! Bookmark not defined. 11.1 ITU-T SG 4Transport Technologies Error! Bookmark not defined. 11.1.1 11.2 and their evolution NGN Network Management Focus Group ............................................................................. 11.2 Circuit-switched technologies ................................................... Error! Bookmark not defined. IETF ................................................................................................................................................ .1 SONET/SDH ................................................................................. Error! Bookmark not defined. 11.2.1 Simple2Optical Transport Error! Bookmark not defined. 11.2.2 NETCONF Configuration Protocol ........................................................................................ 11.3 Packet-switched technologies .................................................... Error! Bookmark not defined. 12 Management Protocol (SNMP(OTN) Service Creation Standards .......................................................................................................... 11.3.1 Ethernet as NGN transport technology .............................................. Error! Bookmark not defined. 12.1 13 Network Intelligent Network Capability Set (IN CS-4) ......................................................................... 11.3.2 Ethernet network topologies .......................................................... Error! Bookmark not defined. Security Standards ........................................................................................................................ 11.3.3 Evolution to "Carrier-class" Ethernet ................................................. Error! Bookmark not defined. 13.1 IP Security (IPSec) ................................................................................................................... 11.3.4 Issues that need to be completed in a “Carrier-class” Ethernet ..... Error! Bookmark not defined. 13.1.1 Security Associations (SAs) ................................................................................................ 11.3.5 Present standards activities on Ethernet .................................... Error! Bookmark not defined. 13.1.2 Authentication Header (AH) ............................................................................................... 11.3.6 Similarities and differences between IP and “Carrier-class” EthernetError! Bookmark not defined. 13.1.3 Encapsulation Security Payload (ESP) ................................................................................... 11.4 Transport MPLS (T-MPLS) ...................................................... Error! Bookmark not defined. 13.1.4 Key Management ................................................................................................................. 11.4.1 Standards landscape for MPLS-T .............................................. Error! Bookmark not defined. 13.1.5 Manual Key Exchange............................................................................................................... 12 Management Standards.............................................................. Error! Bookmark not defined. 6 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 13.2 Internet Key Exchange (IKE) ..................................................................................................... 12.1 ITU-T SG 4 .................................................................................... Error! Bookmark not defined. 13.2.1 Main Mode .......................................................................................................................... 12.1.1 NGN Network Management Focus Group ................................ Error! Bookmark not defined. 13.2.2 Aggressive Mode .................................................................................................................... 12.2 IETF........................................................................................... Error! Bookmark not defined. 13.2.3 Quick Mode ......................................................................................................................... 12.2.1 Simple Network Management Protocol (SNMP) ...................... Error! Bookmark not defined. 13.3 Security Architecture for Systems Providing End-to-End Communications ........................... 12.2.2 NETCONF Configuration Protocol ............................................... Error! Bookmark not defined. 13.3.1 Security Dimensions .................................................................................................................. 13 Service Creation Standards ........................................................ Error! Bookmark not defined. 13.3.2 Security Layers ....................................................................................................................... 13.1 Intelligent Network Capability Set (IN CS-4) ........................... Error! Bookmark not defined. 13.3.314 Security Planes .............................................................................................................. Standards Error! Bookmark not defined. 14 QoS and Performance Standards ..................................................................................................... 14.1 IP Security (IPSec) ............................................................................. Error! Bookmark not defined. 14.1 QoS in IP-based Networks ....................................................................................................... 14.1.1 Security Associations (SAs) .......................................................... Error! Bookmark not defined. 14.1.1 Achieving Traditional PSTN Service Quality in IP Networks ............................................ 14.1.2 Authentication Header (AH) ..................................................... Error! Bookmark not defined. 14.1.2 VoIP Service Characteristics and Expectations ................................................................... 14.1.3 Encapsulation Security Payload (ESP) ...................................... Error! Bookmark not defined. 14.1.3 Strategy for QoS in IP-based Networks............................................................................... 14.1.4 Key Management ....................................................................... Error! Bookmark not defined. 14.1.4 Technologies supporting QoS in IP Networks .................................................................... 14.1.5 Manual Key Exchange............................................................... Error! Bookmark not defined. 14.1.4.1 Integrated Services (Int-Serv) ........................................................................................ 14.2 Internet Key Exchange (IKE) ........................................... Error! Bookmark not defined. 14.1.4.2 Differentiated Services (Diff-Serv)............................................................................. 14.2.1 Main Mode........................................................................ Error! Bookmark not defined. 14.1.4.3 Quality-of-Service Policy ........................................................................................... 14.2.2 Aggressive Mode .............................................................. Error! Bookmark not defined. 14.1.4.4 Multi-Protocol Label Switching (MPLS) ................................................................... 14.2.3 Quick Mode ...................................................................... Error! Bookmark not defined. 14.2 Network Performance Objectives ............................................................................................... 14.3 Security Architecture for Systems Providing End-to-End CommunicationsError! Bookmark not defined. 14.23.1 Y.1540Security Error! Bookmark not defined. Dimensions 7 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 14.2.2 15 Y.1541 ................................................................................................................................. 14.3.2 Security Layers .......................................................................... Error! Bookmark not defined. Evolutionary Standards ................................................................................................................ 14.3.3 Security Planes ................................................................................... Error! Bookmark not defined. Internet Protocol version 6 (IPv6) .................................................................................................. 15 QoS and Performance Standards ................................................... Error! Bookmark not defined. 15.1 15.1.1 IPv4 Workarounds .................................................................................................................. 15.1 QoS in IP-based Networks ........................................................ Error! Bookmark not defined. 15.1.2 Location Tracking ............................................................................................................... 15.1.1 Achieving Traditional PSTN Service Quality in IP Networks .. Error! Bookmark not defined. 15.1.3 IPv6 Addressing .................................................................................................................. 15.1.2 VoIP Service Characteristics and Expectations ......................... Error! Bookmark not defined. 15.1.4 IPv6 Address Representation............................................................................................... 15.1.3 Strategy for QoS in IP-based Networks..................................... Error! Bookmark not defined. 15.1.5 IPv6 Address types .............................................................................................................. 15.1.4 Technologies supporting QoS in IP Networks .......................... Error! Bookmark not defined. 15.1.6 IPv6 Unicast Addresses .................................................................................................... 15.1.4.1 Integrated Services (Int-Serv) .................................................... Error! Bookmark not defined. 15.1.7 IPv6 Anycast Addresses ................................................................................................... 15.1.4.2 Differentiated Services (Diff-Serv) ........................................... Error! Bookmark not defined. 15.1.8 Multicast Addresses.......................................................................................................... 15.1.4.3 Quality-of-Service Policy .......................................................... Error! Bookmark not defined. 15.2 Electronic Numbering (ENUM) ........................................................................................... 15.1.4.4 Multi-Protocol Label Switching (MPLS) ...................................... Error! Bookmark not defined. Resolutions............................................................................................................................................... 15.2 ................................................................................................................... Network Performance Objectives .................................................................................................................... Error! Bookmark not defined. References ............................................................................................................................................. 15.2.1 ............................................................................................................................................................ Y.1540 .................................................................................................................... Error! Bookmark not defined. Acronyms and Abbreviations ............................................................................................................... 15.2.2 Y.1541 ....................................................................................... Error! Bookmark not defined. 16 Evolutionary Standards .................................................................................................................... 102 16.1 Internet Protocol version 6 (IPv6) ................................................................................................ 102 16.1.1 IPv4 Workarounds ................................................................................................................... 102 16.1.2 Location Tracking ................................................................................................................... 104 16.1.3 IPv6 Addressing ...................................................................................................................... 104 16.1.4 IPv6 Address Representation................................................................................................... 104 8 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview 16.1.5 IPv6 Address types .................................................................................................................. 105 16.1.6 IPv6 Unicast Addresses ........................................................................................................... 105 16.1.7 IPv6 Anycast Addresses .......................................................................................................... 105 16.1.8 Multicast Addresses................................................................................................................. 106 16.2 Electronic Numbering (ENUM) .................................................................................................. 106 Resolutions................................................................................................................................................ 108 References ................................................................................................................................................. 109 Acronyms and Abbreviations ................................................................................................................... 110 9 533576827 02.10.09 04.03.11 Next Generation Networks– Standards Overview NEXT GENERATION NETWORKS – STANDARDS OVERVIEW Summary Next Generation Networks (NGN) are converged voice/data multi-service networks that operate in a multi-vendor environment. NGNs require an architecture that provides seamless integration of both new and traditional telecommunications services across high-speed packet networks, interworking among clients of heterogeneous capabilities. This architecture is usually structured around four major layers of technology. The core connectivity layer includes routing and switching, network and access gateways. The access and customer-premises equipment (CPE) layer includes the various technologies used to reach customers. The application server layer contains enhanced services and value-added applications. The management layer provides network services and business management functions. Each of these layers is supported by a number of standards that are key to the successful implementation of an NGN. An emerging vision of an NGN, which is based on a wireless and wireline networks converged paradigm, is being actively developed by the ITU-T. The Next Generation Networks – Standards Overview document identifies NGN related standards that the Rapporteur Group on Standards, Conformance, and Interoperability is studying, including architecture, service capabilities, relevant protocols, and Internet Telephony. As relevant contributions are submitted and discussed by the Working Group on Deployment of Technologies and Services, this document will be updated on an ongoing basis. 10 533576827 02.10.09 04.03.11 1 NGN ARCHITECTURE The architecture and implementation of the Next Generation Network (NGN) must be based on open, standard-based interfaces and protocols. This is essential to achieve multi-vendor interworking and to accelerate the rate on innovation. It is also well accepted that the NGN must also be based on a distributed architecture that helps greatly to reduce the implementation costs while giving flexibility in the actual deployment. The ITU-T Recommendation Y.2001, “General Overview of NGN”, Dec. 2004, provides a definition of an NGN. The NGN must be able to support highly customizable services that are easily and rapidly created as well as deployed economically throughout the network. While it is important to enable new services, it is also critical to preserve the existing services provided by the legacy network. NGN and the Internet The phrase “Next Generation Network” (NGN) has both a generic and specific meaning. Generically, it is used to refer to “some future version of networking”, while specifically it refers to work described in ITU-T Recommendation Y.2001. When not used precisely, an impression is built that “the NGN” is intended to supplant “the Internet”. According to ITU-T Recommendation Y.2001, a Next Generation Network (NGN) is a packet-based network that separates services from underlying transport. This allows providers to develop and deploy new services without changing the underlying network hardware, in ways that are not possible with traditional circuit-switched networks. NGN-based networks provide Voice over IP (VoIP) on the packet-based network, rather than maintaining a separate voice network switching infrastructure. A focused definition of the Internet is that it is a global network of networks, consisting of millions of participating commercial, academic, public, and government networks using packet-switching technology based on the Internet Protocol (IP). As a network, it provides mechanisms for routing packets from one endpoint to another endpoint anywhere in the global network. It is defined independently of the underlying transmission layer and the applications and services that are defined to use it. Internet protocol specifications, including IP and MPLS, are developed and maintained by the Internet Engineering Task Force (IETF – http://www.ietf.org). Therefore, no choice is required between the Internet and the NGN. The NGN represents one, but not the only, set of applications and services that can be supported. [Ref: P1!T-1779_i.doc; 2009-09] 1.1 NGN Voice/Data Converged Architecture Figure 1 describes an NGN architecture of a converged voice/data network that is generally consistent with the vision that most operators have. The architecture can be decomposed into several layers: Core connectivity, Access and Customer Premise Equipment (CPE), Services, and Management. 11 533576827 02.10.09 04.03.11 Figure 1 - Next Generation Network Voice/Data Converged Architecture Core Connectivity Layer The core connectivity layer provides the general routing and switching of network traffic from one end of the network to the other. It is based on packet technology, either ATM or IP, providing maximum flexibility. The technology of choice will be dictated by business considerations, but service transparency and quality of service (QoS) have to be ensured in any case since quality disturbances such as delay, jitter and echo must not affect the customer traffic. At the edge of the packet backbone are the gateways: their main role is to adapt the customer and control traffic to the NGN technology. The gateways interface either with other networks, in which case they are called network gateways, or directly with end-user equipment, in which case they are called access gateways. The gateways interwork with the Service layer components using open protocols to deliver existing and new services. Access Layer The access layer includes the various technologies used to reach customers. Access was usually limited in the past to copper lines or DS1/E1. We now see a proliferation of technologies that have emerged to address the need for higher bandwidth and to provide competitive carriers with a means to directly reach customers. Cable, xDSL and wireless are among the most promising solutions that are experiencing rapid growth and innovation. Customer Premise Equipment, either owned or leased, provides the adaptation between the operator’s network and the customer’s network or equipment. It can be a simple phone, but we see a progressive migration toward intelligent devices supporting both voice and data services. 12 533576827 02.10.09 04.03.11 Service Layer This layer consists of the equipment that provides available services and applications to the network. Services will be available to the whole network, regardless of the user’s location. These services will be made as independent as possible from whatever access technology is used. The distributed nature of the NGN will make it possible to consolidate much of the equipment that delivers services in centrally located centers where greater efficiencies can be accomplished. In addition, it also makes it possible to distribute the services to the end users equipment rather than to the network. The types of service that will be offered include all of the existing voice services and a range of data and other new multimedia services. Management Layer Key to minimizing the operation costs of running an NGN, the management layer provides the network, service and business management functions. It allows end-to-end service provisioning, monitoring, recovery and performance analysis required to run the network. 1.2 NGN Service Converged Architecture While voice/data convergence has enabled new efficiencies, service convergence will enable service providers to deliver innovative new services to any device over any type of access network. Subscribers will define themselves by their network profile and presence rather than by their access line or their handset. At the heart of the converged network there will be a new services infrastructure known as the IP Multimedia Subsystem (IMS). IMS is a product of extensive work done by 3GPP and 3GPP2 to describe core network aspects for mobility standards and is now being used as a basis for converged networks in the NGN standards development of the ITU-T. Next Generation Networks will need to support a wide variety of access technologies and core services, and IMS is designed to satisfy this requirement. As shown in Figure 2, the IP Multimedia Subsystem is one of several possible subsystems envisioned in the evolution of an NGN architecture [13]. 13 533576827 02.10.09 04.03.11 Figure 2 - NGN Subsystem Architecture, showing IMS IMS enables network operators to offer multimedia services based on and built upon Internet applications, services and protocols. Examples of IP multimedia applications include speech communication, real time multimedia applications, and virtual meeting/conferencing applications. IMS enables IP multimedia sessions that support IP multimedia applications. Application of IMS to converged networks necessitates access independence and interoperability. In order to achieve access independence and ensure network interoperability, IMS is based on the widely accepted Internet standards of the Internet Engineering Task Force (IETF), Session Initiation Protocol (SIP) being one such example. IMS is intended to serve as the core network support for the development and delivery of services. IMS enables the convergence of, and access to, voice, video, messaging, data and web-based technologies for the end user. Standards Definition Challenges Standards Development Organizations (SDOs) face a number of challenges when specifying Next Generation Networks standards. Some of these are: smooth/seamless inter-working between the IP-based network and the PSTN; levels of service performance as currently offered by the legacy telephony infrastructure (e.g., call setup delays); interoperability across multiple administrative domains taking into account different signaling protocols; scalability to support very large number of customers; simplicity; and the ability to support new services. 14 533576827 02.10.09 04.03.11 It should be kept in mind that many of the standards used for NGN interfaces and applications are evolving/changing rapidly. 1.3 NGN Release 1 Architecture NGN Release 1 is structured in a two-layer model: Transport Layer (or Transport Stractum) and Service Layer (or Service Stractum). Transport layer is responsible to deal directly with end-user and other networks traffics, supporting the requirements of service layer. Service Layer is responsible to accommodate add-value services in NGN network, such as a telephone service, web service, etc. Service Layer Control, management and user services plan Control and Management Transport Layer Control, management and user data plan Figure 3 – NGN layered model overview Some logical functions have been defined by ITU for transport and services layers. Figure 3 is an example of functions in NGN Architecture. The following sub items describe the Transport and Service Layers in accordance with the text contained in Y.2006 [5] and Y.2012 [4] recommendations. 1.3.1 Transport Layer Transport layer is the part of NGN architecture responsible to provide the control and transfer data user functions, and the transport layer resources management. This layer includes two sub layers: transport functions and transport control functions. 1.3.1.1 Transport Functions Conform Y.2012; transport functions provide the connectivity for all components and physically separated functions within the NGN. These functions provide support for the transfer of media information, as well as the transfer of control and management information. Access network, edge, core transport, gateway and media handling functions are included in this sub layer. 15 533576827 02.10.09 04.03.11 Applications Application support functions and service support functions Service control functions (PSTN/ISDN emulation, IP multimedia service and service user profile functions) Service Layer Network Attachment Control Functions Resource and admission control functions Transport user profiles Transport control functions End-user functions Other Networks Transport functions (Access network, edge and core transport functions) Transport Layer Control Media Figure 4 – NGN architecture overview 1.3.1.1.1 Access network functions The access network functions are responsible to provide IP connectivity between end-users functions and the core transport functions. These functions take care of end-users access to the network as well as collecting and aggregating the traffic coming from these accesses towards the core network, where QoS control mechanisms dealing directly with user traffic can be performed. The access network includes access-technology dependent functions, e.g., for W-CDMA technology and xDSL access. Depending on the technology used for accessing NGN services, the access network may includes several capabilities. The following list, contained in Series Y Supplement 1[3], is the proposed technologies that implement access transport functions in the NGN Release 1 Architecture: Wire Technologies 16 533576827 02.10.09 04.03.11 o o o o o o xDSL: The NGN Release 1 includes ADSL (Recs. G.992.1, G.992.3 and G.992.5); SHDSL (Rec. G.991.2); and VDSL (Recs. G.993.1 and G.993.2). SDH. Optical Access: this covers point to point (IEEE 802.3ah 100Base-LX/BX) and xPON transport systems. Cable networks based on PacketCable multimedia specifications as another type of access transport function. LANs, including 10Base-T, Fast Ethernet, Gigabit Ethernet and 10 Gigabit Ethernet. PLC network. Wireless Technologies o IEEE 802.X wireless networks. o 3GPP or 3GPP2 IP-CAN. o Broadcast networks, for example, 3GPP/3GPP2 Internet broadcast/multicast. 1.3.1.1.2 Edge functions The edge functions are used for media and traffic processing when aggregated traffic coming from different access networks is merged into the core transport network; they include functions related to support for QoS and traffic control. The edge functions are also used between core transport networks. 1.3.1.1.3 Core transport functions The core transport functions are responsible to provide IP connectivity across the core network, ensuring information transport within the network. These functions provide QoS mechanisms dealing directly with user traffic within the network, including buffer management, queuing and scheduling, packet filtering, traffic classification, marking, policing, shaping, gate control and firewall capability. 1.3.1.1.4 Gateway functions The gateway functions are responsible to provide internetworking with end-user functions and/or other networks with NGN. These functions also provide internetworking with other types of NGN and many existing networks, such as the PSTN/ISDN, the public Internet, and so forth. Figure 5 – Example of gateway function Gateway functions can be controlled either directly from the service control functions or through the transport control functions. 1.3.1.2 Media handling functions Media handling functions provide media resource processing for service provision, such as generation of tone signals and transcoding. These functions are specific to media resource handling in the transport stratum. 17 533576827 02.10.09 04.03.11 1.3.2 Transport control functions Transport control functions layer is subdivided in two sub layers: transport functions and transport control functions. 1.3.2.1 Resource and admission control functions (RACF) Resource and admission control functions is a control layer that supports dynamic verification of resource availability and configuration of policy enforcement functional elements in the bearer path. These functions act as the arbitrator between service control functions and transport functions for QoS related transport resource control within access and core networks. RACF is responsible to perform the policy based transport resource control upon the request of the service control function, determines the transport resource availability and admission, and applies controls to the transport functions to enforce the policy decision, including resource reservation, admission control and gateway control, NAPT and firewall control, and NAPT traversal. The RACF interacts with transport functions for the purpose of controlling one or more of the following functions in the transport layer: bandwidth reservation and allocation, packet filtering; traffic classification, marking, policing, and priority handling; network address and port translation and firewall. The RACF takes into account the capabilities of transport networks and associated transport subscription information for subscribers in support of the transport resource control. Transport subscription information is the responsibility of the network attachment control functions (NACFs). The RACF and NACF interact to exchange relevant transport subscription information. 1.3.2.2 Network attachment control functions (NACFs) The network attachment control functions (NACFs) provide registration at the access level and initialization of end-user functions for accessing NGN services. These functions provide transport stratum level identification/authentication, manage the IP address space of the access network, and authenticate access sessions. They also announce the contact point of NGN functions in the service stratum to the end user. The Y.2012 Recommendation establishes the following NACF functionalities: • Dynamic provisioning of IP addresses and other user equipment configuration parameters. • By endorsement of user, auto-discovery of user equipment capabilities and other parameters. • Authentication of end user and network at the IP layer (and possibly other layers). Regarding the authentication, mutual authentication between end user and the network attachment is performed. • Authorization of network access, based on user profiles. • Access network configuration, based on user profiles. • Location management at the IP layer. The NACF includes transport user profile that takes the form of a functional database representing the combination of a user’s information and other control data into a single "user profile" function in the transport stratum. 18 533576827 02.10.09 04.03.11 1.3.3 Service Layer functions The service layer provides value-added services and operation support functions. The components of the service layer are: • Service control functions including service user profile functions; and • Application support functions and service support functions. 1.3.3.1 Service control functions The service control functions include resource control, registration, and authentication and authorization functions at the service level for both mediated and non-mediated services. They can also include functions for controlling media resources, i.e., specialized resources and gateways at the service-signaling level. The service control functions accommodate service user profiles that represent the combination of user information and other control data into a single user profile function in the service stratum, in the form of functional databases. 1.3.3.2 Application support functions and service support functions This sub layer includes functions such as the gateway, registration, authentication and authorization functions at the application level. These functions are available to the "applications" and "end-user" functional groups. The application support functions and service support functions work in conjunction with the service control functions to provide end-users and applications with the NGN services they request. 1.3.4 End-user functions End-users functions include diverse types of interfaces and equipments that users can use to access the NGN network. Y.2012 Recommendation does not made assumptions about the diverse end-user interfaces and end-user networks that may be connected to the NGN access network. Bibliography [1] ITU-T Y.2001 (12/2004) – Next Generation Networks - Frameworks and functional architecture models, available in http://www.itu.int. [2] ITU-T Y.2011 (10/2004) - General principles and general reference model for Next Generation Networks, available in http://www.itu.int. [3] ITU-T Series Y, Supplement 1 (07/2006) – NGN release 1 scope, available in http://www.itu.int. [4] ITU-T Y.2012 (09/2006) – Functional requirements and architecture of the NGN release 1, available in http://www.itu.int. [5] ITU-T Y.2006 (02/2008) – Description of capability set 1 of NGN release 1, available in http://www.itu.int. [6] Rosenber, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M. e Schooler, E.: SIP: Session Initiation Protocol – RFC 3261, Internet Engineering Task Force, June 2002. 19 533576827 02.10.09 04.03.11 [Ref: P1!T-1796_i.doc; 2009-09] 2 NGN SERVICE CAPABILITIES 2.1 ITU-T NGN Service Architecture The ITU-T NGN service architecture supports the Application Network Interface: Provides an abstraction of network capabilities (i.e., the interface is network agnostic). Provides access to such functions as authentication, authorization, and security to ensure that third-party service providers can make use of network capabilities. Applications ANI SNI Application Support Functions and Service Support Functions IdM Functions Service Control and Content Delivery Functions Management Functions Service User Profiles Service Control Functions Functions from other Service Providers Content Delivery Functions Service Stratum Network Attachment and Control Functions Transport User Profiles Mobility Management and Control Functions Resource and Admission control Functions Functions from Other Networks Transport Control Functions End-User Functions Transport Functions UNI NNI Transport Stratum Control Management Media IdM Figure 6 - NGN Architecture Overview [Source: ITU-T Rec Y.2012] • • • Rec. Y.2201 (NGN Requirements and capabilities for ITU-T NGN) supports Service Creation Environments as defined by Parlay/Parlay X, OMA, IMS, and IN Rec. Y.2234 (Open service environment capabilities for NGN) defines the interface between the network resources and 3rd party applications. The OMA Service Environment (OSE), Parlay/OSA APIs, Parlay X Web Service APIs, OASIS, OMG, and W3C and are referenced as resources for developing Rec Y.2234. Rec. Y.2232 (NGN convergence model and scenario using web services) defines a Web Services deployment model and Web Services based convergence service scenarios for NGN The NGN service architecture supports the Application Network Interface: 20 533576827 02.10.09 04.03.11 - Web Services is one of the appropriate solutions for service access. Use of Web Services is expanding rapidly as the need for application-to-application communication and interoperability grows. In order for an application to take advantage of web services, three behaviours must take place: the publication of service descriptions, the finding and retrieval of service descriptions, and the binding or invoking of services based on the service description. These behaviours can occur singly or iteratively, with any cardinality between the roles. In detail, these operations are: OI execution (binding or invoking) of services based on the service description OF finding and retrieval of service descriptions OP publication of service descriptions [Ref: P1!T-2021_i.doc; 2010-10] 21 533576827 02.10.09 04.03.11 Figure 7 - Conceptual NGN Web Services Architecture [Source: ITU-T Rec Y.2232] 2.2 Open Programmability Environment Standards The open programmability environment (OPE) provides application programming interfaces (APIs) and integration tools necessary to create and deliver new application services. The OPE must be based on open standards so that it can be extended and adapted easily as required. RMI The Remote Method Invocation (RMI) is a Java protocol that allows methods on an object that exists in another address space to be invoked remotely. RMI is used between the MGC and the application servers. XML The extended Markup Language is a subset of the Standard Generalized Markup Language (SGML) defined in ISO 8879. XML is used between components of the OPE as well as user/programmer servers and the OPE. APIs Application Programming Interfaces (APIs) are open interfaces for distributed system execution through the system. Two consortia have been developing specifications for APIs: JAIN (Java API for Integrated Networks) JAIN has created a set of integrated network APIs for the Java platform that provides a framework to build and integrate services that span across packets (e.g., IP or ATM), wireless and PSTN networks. The Java adaptors allow the OPE to inter-work with a wide variety of communication technologies such as email systems, voice mail systems, fax servers, video servers, and web servers. 2.2.1 Parlay The Parlay group was formed in April 1998 with the mandate of producing an API to enable access to and control of a wide range of network capabilities from a common framework that need not to be part of the network. The Parlay group is not a standards group itself, but it sees itself as a facilitator of needed interfaces. The Parlay APIs are said to complement and encourage the use of the Advanced Intelligent Networks (AIN) protocols. 2.2.1.1 Parlay Specifications Parlay Version 5.1 Specifications (The Parlay v5.1 Specifications were jointly published by Parlay & ETSI in 2006) Part 1 Part 2 Part 3 Part 4.1 Part 4.2 Part 4.3 Part 4.4 Part 4.5 Part 5 Overview Common Data Definition Framework Call Control – Common Call Control Definitions Multi-Party Call Control SCF Multi-Media Call Control SCF Conference Call Control SCF User Interaction SCF ES 203 915-1 ES 203 915-2 ES 203 915-3 ES 203 915-4-1 ES 203 915-4-2 ES 203 915-4-3 ES 203 915-4-4 ES 203 915-4-5 ES 203 915-7 22 533576827 02.10.09 04.03.11 Part 6 Part 7 Part 8 Part 9 Part 10 Part 11 Part 12 Part 13 Part 14 Part 15 Mobility SCF Terminal Capabilities SCF Data Session Control SCF Generic Messaging SCF Connectvity Manager SCF Account Manager SCF Charging SCF Presence and Availability Management SCF Policy Management SCF Multi-Media Messaging SCF ES 203 915-6 ES 203 915-7 ES 203 915-8 ES 203 915-9 ES 203 915-10 ES 203 915-11 ES 203 915-12 ES 203 915-13 ES 203 915-14 ES 203 915-15 23 533576827 02.10.09 04.03.11 Parlay X Version 3.0 API Specifications (ETSI ES 202-504 series) 2.2.2 • Third Party Call • Address List Management • Call Notification • Presence • Short Messaging • Message Broadcast • Multimedia Messaging • Geocoding • Payment • Application-driven QoS • Account Management • • Terminal Status Device Capabilities and Configuration • Terminal Location • Multimedia Streaming Control • Call Handling • • Audio Call Multimedia Multicast Session Management • Multimedia conference Open Mobile Alliance (OMA) Service Environment [Source: OMA-TP -2007-0499] OMA Service Environment (OSE) • OSE describes the logical interactions to, from and among OMA enablers and a logical architecture for OMA enabler implementations • It is a conceptual environment that provides interfaces to applications, interfaces to Service Providers' Execution Environment, and the interfaces to invoke and use underlying network capabilities and resources for enabler implementations OMA Service Enablers: Access to Content Personal Communications • Mobile Broadcast (BCAST) • Push-to-talk over Cellular (PoC) • Dynamic (DCD) • Multimedia Messaging Svc (MMS) • Converged IP Messaging (CPM) • Digital Rights Mgmt (DRM) • Mobile Email (MEM) • Mobile Advertising (MobAd) • Converged Address Book (CAB) • Data Synchronization • • Smart Card Web Server (SCWS) Instant Messaging Presence Svc (IMPS) • Rich Media Environment • Browser • Multimodal Multi-device Content Delivery 24 533576827 02.10.09 04.03.11 • Game Services Common Devices • Location • Device Management • Presence • Device Profiles Evolution • Policy, Evaluation, Enforcement, Mgmt (PEEM) • Look and Feel Customization • Security • Charging • SIP Push • Categorization Based Content Screening (CBCS) • Global Permissions Mgmt (GPM) • General Service Subscription Mgmt (GSSM) XML Doc. Mgmt (XDM) • [Ref: P1!T-1278_i.doc; 2008-03] 2.3 IPTV 2.3.1 ATIS IPTV Interoperability Forum (IIF) The ATIS IIF standards development has been defined in three phases: • Phase 1: Implementation of a standard TV service experience over IP networks. Phase 1 is complete • Specifications focus on basic attachment and access to “Linear” Broadcast IPTV over an NGN network, whether IMS or Non-IMS – Network Attachment – Service Provider Discovery and Attachment – Service Discovery and Attachment – Device Management – Authentication – Definition of all protocols used • Open Security Framework – Supports differentiated security solutions – Enables open-market devices • IPTV Ordering Framework • QoS Framework • Phase 2: – Distributed Content On Demand (CoD) architecture and data access – Internet-sourced content – Pay-Per-View – Push Content Delivery (background delivery to consumer's client) – Interactive Program Guide (Client/Server guide query) 25 533576827 02.10.09 04.03.11 – – – – – – • Phase 3: Interactive TV services, including consumer originated video. – – – – – – – – – • Fast channel change (aligning with DVB) Targeted ad insertion Open security framework QoE validation standard Stereoscopic 3D video Also considering impacts to existing work due to IPV6 Linear broadcast with trick mode Interactive TV Consumer-originated video Games Pictures Directory and direct mail advertising Advertising message logging Other advertising services Other 3rd party content services Task Forces – Architecture – IPTV Security Solutions – Quality of Service Metrics – Metadata and Transaction Delivery – Testing and Interoperability Completed Standards – ATIS-0800001, IPTV DRM Interoperability Requirements – ATIS-0800002, IPTV Architecture Requirements – ATIS-0800003, IPTV Architecture Roadmap – ATIS-0800004, A Framework for QoS Metrics and Measurements Supporting IPTV Services – ATIS-0800005, IPTV Packet Loss Issue Report – ATIS-0800006, IIF Default Scrambling Algorithm – ATIS-0800007, IPTV High Level Architecture – ATIS-0800008, QoS Metrics for Linear Broadcast IPTV – ATIS-080009, Remote Management of Devices in the Consumer Domain for IPTV Services – ATIS-0800010, Emergency Alert Provisioning Specification – ATIS-0800011, QoS Metrics for Public Services – ATIS-0800012, IPTV Emergency Alert System Metadata Specification – ATIS-0800013, Media Formats and Protocols for IPTV Services – ATIS-0800014, Secure Download and Messaging Interoperability Specification – ATIS-0800015, Certificate Trust Management Hierarchy Interoperability Specification – ATIS-0800016, Standard PKI Certificate Format Interoperability Specification – ATIS-0800017, Network Attachment and Initialization of Devices and Client Discovery of IPTV Services – ATIS-0800018, IPTV Linear TV Service – ATIS-0800019, Multicast Network Service Specification – ATIS-0800020, IPTV Electronic Program Guide Metadata Specification – ATIS-0800021, EPSNR Trial-Use Standard 26 533576827 02.10.09 04.03.11 – – – – – – – – – – – – – – ATIS-0800022, IPTV Consumer Domain Device Configuration Metadata ATIS-0800024, Security Robustness Rules Interoperability Specification ATIS-0800025, Test Plan for Evaluation of Quality Models for IPTV Services ATIS-0800027, IPTV Glossary ATIS-0800028, Fault Codes for IPTV ATIS-0800029, IPTV Terminal Metadata Specification ATIS-0800030, Technical Report on IPTV Advertising ATIS-0800032, Metadata for IPTV Fault Codes ATIS-0800033 [trial-use], A-POD: An IPTV Separable Security Interface Specification ATIS-0800035, Technical Report on a Validation Process for IPTV Perceptual Quality Measurements ATIS-0800036, XML Schema for ITF Execution Environment ATIS-0800039, DRM Server-Side Application Programming Interfaces ATIS-0800040, IPTV MPEG Transport Stream Monitoring ATIS-0800041, Implementer's Guide to QoS Metrics [Ref: P1!T-986_i.doc; 2007-03] [Ref: P1!T-1621_i.doc; 2009-04] [Ref: P1!T-2045_i.doc; 2010-11] ***** 2.3.2 ITU-T Standardization 2.3.2.1 IPTV FG Working Groups The IPTV Focus Group (FG IPTV) was established in 2006. The mission of IPTV Focus Group was to coordinate and promote the development of global IPTV standards taking into account the existing work of the ITU-T study groups as well as standards development organizations (SDOs), Fora and Consortia. The FG IPTV was comprised of six working groups covering all aspects related to IPTV. The first meeting of the focus group was held from 10 to 14 July 2006 in Geneva and its seventh and the last meeting was held in Malta in December 2007. The following provides summary of activities and achievements of the six FG IPTV working groups. Working group 1: Architecture and Requirements WG1 activities concentrated on defining and describing IPTV services requirements, IPTV framework architecture (NGN and non-NGN) and IPTV service scenarios. WG1 specification was driven by a systemic IPTV service-wise approach, based upon practical experience and global expertise. It prepared three documents as follows: IPTV services requirements: The IPTV services requirements document provides a list of requirements that have been elaborated according to an IPTV service-wise, global and systemic approach. These requirements have been organized according to a functional taxonomy (e.g. QoS requirements, security requirements, middleware requirements, etc.), and further classified into required, recommended and optional requirements. 27 533576827 02.10.09 04.03.11 IPTV architecture: This document describes the IPTV functional architecture intended to support IPTV services based on the IPTV service requirements and definitions. Starting from a basic description of IPTV players, roles and services, a high level IPTV functional model is outlined. This model is then developed into a set of functional architectures which support NGN and non-NGN transport networks, as well as operation modes with or without IMS. IPTV service scenarios: The IPTV service scenarios document provides a list of IPTV use cases that are meant to illustrate how IPTV services can be designed, deployed and operated. From this perspective, use cases have been classified according to an IPTV service taxonomy that includes (but is not limited to) ondemand services, advertising services and broadcast services 28 533576827 02.10.09 04.03.11 Working group 2: QoS and Performance Aspects WG2 championed and promoted the development of global QoS and performance standards necessary to ensure high end-user satisfaction, and hence high end-user acceptance, for IPTV services. WG2 produced the four following documents: Quality of experience requirements for IPTV services: This document defines user requirements for quality of experience for IPTV services. The QoE requirements are defined from an end user perspective and are agnostic to network deployment architectures and transport protocols. The QoE requirements are specified as end-to-end and information is provided on how they influence network transport and application layer behaviour. QoE requirements for video, audio, text, graphics, control functions and meta-data are provided. Traffic management mechanisms for the support of IPTV services: This document describes a set of traffic management mechanisms which are aimed to facilitate the efficient support of IPTV services over the network infrastructure. Traffic management mechanisms for the home, access, and core networks are discussed. The network supporting IPTV services will span a number of network domains which may be designed, deployed and operated by different providers and which may differ in their traffic management capabilities. Therefore, it is expected that the network provider(s) will implement a subset of these mechanisms to ensure IPTV service objectives are satisfied efficiently. Furthermore the traffic management mechanisms also depend on the specific network architectures used for IPTV services as defined in the IPTV architecture specification. The document further provides mappings of IPTV service components to the IP network QoS classes defined in ITU-T Y.1541. Application layer error recovery mechanisms for IPTV services: This document describes specific mechanisms and the applicability of these mechanisms to IPTV services and network conditions, and provides recommendations and guidance on their use. It has been determined that with the use of these mechanisms, consumer television quality can be achieved using the standard Y.1541 QoS classes 0 and 1. Performance monitoring for IPTV: This document defines monitoring points, monitoring parameters and monitoring methods for IPTV services. It covers both network and service related performance monitoring parameters from the physical up to the application layers. Working group 3: Service Security and Content Protection WG3 focused on addressing the urgent needs for globally acceptable IPTV security standards as the market demands. It identified security requirements, defined the security architecture and described security mechanisms to satisfy the business & security requirements for the IPTV system architecture. WG3 produced the following document. IPTV security aspects: This document addresses threats, requirements, architecture, and mechanisms that pertain to security and protection aspects of IPTV content, services, networks, terminal devices, and subscriber (end-users). Working group 4: IPTV Network Control WG4 focused on specifying detailed functional requirements of network control and multicast capability. It described various aspects of IPTV network control. It also described functional requirements and 29 533576827 02.10.09 04.03.11 frameworks for supporting multicast capabilities in terms of IPTV network control. Finally identified protocols relevant to IPTV services and categorized these protocols relative to their specific functions in relation to IPTV services. WG4 received 178 contributions and produced three documents. WG4 produced the following three documents. IPTV network control aspects: This document describes various aspects of IPTV network control. It provides a list of detailed requirements to address control and signalling matters related to authentication and authorization, content delivery, consumer domain attachment and initialization, quality of service (QoS), quality of experience (QoE) and security. IPTV multicast frameworks: This document on IPTV multicast frameworks describes functional requirements and frameworks for supporting multicast capabilities in terms of IPTV network control. IPTV related protocols: This document identifies protocols relevant to IPTV services and categorizes these protocols relative to their specific functions in relation to IPTV services. Working group 5: End Systems and Interoperability Aspects WG5 scope included IPTV terminal devices and the home network which would support IPTV services. It provided terminal device and home network architectures, and identified interfaces and service/functional requirements in harmonization with other ITU-T study groups and other SDOs. The home network activities were based most significantly on the HGI work. WG5 progressed particularly in the area of defining and describing the basic framework and architecture for a home network, as well as defining and describing the many interfaces between different devices within a home network. WG5 produced the following two documents. Aspects of IPTV end system – Terminal device: This document outlines functional requirements of the terminal device, capabilities expected to be supported by the terminal device, and the terminal device architecture. Aspects of home network supporting IPTV services: This document addresses the home network architecture aspects in the context of IPTV. Working group 6: Middleware, Application and Content Platforms WG6 identified and defined middleware platforms, including applications, content formats, and their uses to facilitate effective and interoperable use of an IPTV system for presenting and interacting with IPTV services. It studied aspects of services which were relevant to discovery, navigation, selection, acquisition, delivery and presentation including interaction, of content. WG6 produced the following five documents. IPTV middleware, applications and content platforms: This document identifies and defines middleware platforms, including applications, content formats, and their uses, that facilitate effective and interoperable use of an IPTV system for presenting and interacting with IPTV services. This document is a general document for IPTV middleware, application and content platforms. It describes content provisioning, service discovery, channel and content identification and location resolution, and profiling. This document refers to text on middleware, content coding, metadata, which can be found in other documents. 30 533576827 02.10.09 04.03.11 Toolbox for content coding: This document addresses the use of video and audio coding in services delivered over Internet Protocols (IP). It describes the use of H.264/AVC video, VC 1 video, AVS video, HE AAC v2 audio, HE AAC v2 audio, Extended AMR WB (AMR WB+) audio, and AC-3 and Enhanced AC-3 audio. In addition, this document describes the use of speech codecs within an IPTV environment and the specified codecs for this use. This document adopts a "toolbox" approach for the general case of IPTV applications delivered directly over IP and MPEG2 -TS. This document is not a specification for the use of Audio and Video Codec’s for use in IPTV Services. IPTV middleware: This document identifies those aspects of architecture specific to IPTV middleware and describes the various functions with explanatory definitions where appropriate. IPTV metadata: This document gives the overview of the metadata for IPTV services and describes its elements and delivery protocols, identifying relevant standards. The IPTV metadata, the information on services and contents processed by the service and content delivery infrastructure, provides descriptive and structural framework for managing IPTV services. Aspects of transport, representation, content provisioning, and security of metadata are covered. Standards for IPTV multimedia application platforms: This document identifies and analyzes the relevant standards for IPTV multimedia application platforms. FG IPTV documents are available to the public at: http://www.itu.int/ITU-T/IPTV/ 2.3.2.2 IPTV Global Standards Initiative (IPTV-GSI) In accordance with decisions taken at the April 2007 meeting of Study Group 13 the work of the FG IPTV ended in December 2007 and its deliverables were transferred to the appropriate study groups via Study Group 13 for further consideration and, when appropriate to develop draft Recommendations based on the focus group deliverables. Based on proposals developed by the chairman of Study Group 13 and the chairman of the FG IPTV (and with the support of all study group chairmen and endorsement by TSAG) the ongoing work will be carried out under the umbrella of a Global Standards Initiative (the IPTV-GSI). This means that the ongoing work on the FG IPTV deliverables will be done by the ITU-T study groups (based on allocation developed by a coordination group, the Joint coordination Activity on IPTV (JCA-IPTV)) with coordinated planning and through co-located meetings of the involved study groups and/or rapporteur groups The first IPTV-GSI event took place in Seoul, Korea, from 15-22 January 2008. Several of FG IPTV documents became draft Recommendation in this meeting paving the way for speedy progress. [Ref: P1!T-1227_i.doc; 2008-03] 2.4 Emergency Telecommunications Services The purpose of emergency telecommunications services is to facilitate communications during emergency situations as well as to provide emergency response and recovery operations for restoring the community infrastructure and for returning the population to normal living conditions after serious disasters and emergency events. As emergency telecommunications covers all communications services, including voice and non-voice, data, location, etc., a number of challenges and considerations need to be addressed 31 533576827 02.10.09 04.03.11 in defining and establishing the functional capabilities for emergency telecommunications services in NGN. Many different standards development activities will be involved in the establishment of a global emergency telecommunications capability. 2.4.1 Emergency Telecommunications Services Types In a telecommunication network there are four distinct types of generally agreed emergency communications services which represent the possible combinations of two entities; citizens and authorities. It is worth noticing that in this context, the use of the term citizen encompasses actual citizens, people that may not have status of citizen of a given state, and private organizations. 2.4.2 Standardization Activity on Emergency Telecommunications Services The establishment of a comprehensive family of industry standards for effective emergency telecommunications services in Next Generation Networks (NGN) is an effort that addresses many issues in many industry activities. Over the past few years, considerable progress has been made in pursuing the task of establishing a family of standards for emergency telecommunications services. These activities have been undertaken at the international, regional and national levels within Standards Development Organizations (SDO) and other relevant organizations to establish internationally agreed means to operate systems for public protection and disaster relief on a harmonized and coordinated basis. What follows is a summary of important standards and relevant activity within the telecommunications sector. It is not meant to be a comprehensive list, as this is an evolving and dynamic area of activity. 2.4.2.1 ITU Activities The International Telecommunication Union (ITU) consists of three sectors: ITU-T, ITU-R and ITU-D. Each sector works on emergency telecommunications services (ETS) and/or telecommunications for disaster relief (TDR) activities [1], but ITU-T is mainly in charge of these activities. A number of Study Groups are involved with aspects relating to ETS. Such aspects would involve functional requirements, telephony call control, backbone signalling, QoS, architecture/framework, customer service management, emergency services and preference capabilities, multimedia services, security, etc. The following are some of the ITU-T materials addressing emergency telecommunications: ITU-T Rec. E.106, “International Emergency Preference Scheme for Disaster Relief Operations (IEPS)”. IEPS is needed when there is a crisis situation causing an increased demand for telecommunications when use of the International Telephone Service may be restricted due to damage, reduced capacity, congestion or faults. In crisis situations there is a requirement for IEPS users of public telecommunications to have preferential treatment. ITU-T Rec. E.107, “Emergency Telecommunications Service (ETS) and interconnection framework for national implementations of ETS”. E.107 provides guidance that will enable telecommunications between one ETS National Implementation and another one, in addition to providing description of ETS. ITU-T Rec. H.246 Amendment 1, “Mapping of user priority level and country/international network of call origination between H.225 and ISUP". ITU-T Rec. H.248.44, “Gateway control protocol: Multi-Level Precedence and Pre-emption Package". ITU-T Rec. H.460.4, "Call priority designation and country/international network of call origination identification for H.323 priority calls" 32 533576827 02.10.09 04.03.11 ITU-T Rec. H.460.14, "Support for Multi-Level Precedence and Preemption (MLPP) within H.323 Systems" ITU-T Rec. H.460.21, "Message Broadcast for H.323 Systems" ITU-T Rec. J.260, "Requirements for Emergency/Disaster Communications over IPCablecom Networks" ITU-T Rec. M.3350, "TMN service management requirements for information interchange across the TMN X-interface to support provisioning of Emergency Telecommunication Service (ETS)" Signalling for IEPS support in ISUP: Q.761 Amd.3, Q.762 Amd.3, Q.763 Amd.4, and Q.764 Amd.4 Signalling for IEPS support in BICC: Q1902.1 Amd.2, Q.1902.2 Amd.3, Q.1902.3 Amd.3, and Q.1902.4 Amd.3 Signalling for IEPS support in CBC: Q.1950 Amd.1 Annex G Signalling for IEPS support in ATM AAL2: Q.2630.3 Amd.1 Signalling for IEPS support in DSS2: Q.2391 Amd.5 ITU-T Rec. Y.1271, "Framework(s) on network requirements and capabilities to support emergency communications over evolving circuit-switched and packed-switched networks" ITU-T Rec. Y.2205, “Next Generation Networks – Emergency telecommunications – Technical considerations”. In addition to these Recommendations, there are two non-normative publications: Supplement 47 to ITU-T Q-Series Recommendations, "Emergency services for IMT-2000 networks – Requirements for harmonization and convergence" Supplement 53 to ITU-T Q-Series Recommendations, "Signalling requirements to support the International Emergency Preferential Scheme (IEPS)". Supplement 57 to ITU-T Q-Series Recommendations, " Signalling requirements to support the emergency telecommunications service (ETS) in IP networks”. 2.4.2.2 IETF Activities The Internet Engineering Task Force (IETF) has developed a number of Internet Drafts (I-Ds) and published several informational RFCs on emergency services. The Emergency Content Resolution with Internet Technology (ecrit) working group is currently active in developing requirements for Internet emergency calling services that require both association of the physical location of the originator with an appropriate emergency service center. Some of the RFCs that deal with aspects of ETS are: RFC 3523: “Internet Emergency Preparedness (IEPREP) Telephony Topology Terminology”, April 2003. RFC 3689: “General Requirements for Emergency Telecommunication Service (ETS)”. February 2004. RFC 3690: “IP Telephony Requirements for Emergency Telecommunications Service (ETS)”, Feruary, 2004 33 533576827 02.10.09 04.03.11 RFC 4190: “Framework for Supporting Emergency Telecommunications Service (ETS) in IP Telephony”, November 2005. RFC 4375: “Emergency Telecommunications Services (ETS) Requirements for a Single Administrative Domain”, Jan 2006. RFC 4542: “Implementing an Emergency Telecommunications Service (ETS) for Real-Time Services in the Internet Protocol Suite”, May 2006. RFC 4958: “A Framework for Supporting Emergency Telecommunications Services (ETS) within a Single Administrative Domain”, July 2007. 2.4.2.3 ETSI Activities The Special Group on Emergency Communications (EMTEL) of the European Telecommunications Standards Institute (ETSI) acts as coordinator in getting requirements on emergency communications, outside ETSI (i.e., from different stakeholders) and inside ETSI (i.e., ETSI bodies). This group has published a number of documents on different aspects of emergency telecommunications. The following is a short list of some of these documents: TS 102 181: “Requirements for Communications between Authorities/Organizations during Emergencies”, Dec. 2005. TS 102 182: “Requirements for Communications from Authorities/Organizations to Individuals, Groups or the General Public During Emergencies”, Dec. 2006 TR 102 180: “Basis of Requirements for Communication of Individuals with Authorities/ Organizations in Case of Distress (Emergency call handling)”, Feb 2007. TR 102 299: “Collection of European Regualtory Texts and Orientations”, April 2008. TR 102 410: “Basis of Requirements for Communication between Individuals and between Individuals and Authorities whilst Emergencies are in Progress”, Aug 2007. TR 102 444: “Analysis of the Short Message Service (SMS) and Cell Broadcast Service (CBS) for Emergency Messaging Applications”, Mar 2006. TR 102 445: “Overview of Emergency Communications Network Resilience and Preparedness”, Nov. 2006. TR 102 476: “Emergency Calls and VoIP Possible Short and Long Term Solutions and Standarddization Activities”, July 2008. 2.4.2.4 ATIS Activities The main groups of the Alliance for Telecommunications Industry Solutions (ATIS) that are involved in emergency telecommunications activities are: the Emergency Services Interconnection Forum (ESIF), the Wireless Technologies and Systems Committee (WTSC), the Network Performance, Reliability, and Quality of Service Committee (PRQC) and the Packet Technologies and Systems Committee (PTSC). ATIS has published a number of documents on different aspects of emergency telecommunications. Some of these documents are: ATIS-01000011.2006; “ETS Packet Priority for IP NNI Interfaces – Use of Existing DiffServ Per Hop Behaviours”, ATIS-01000010.2006; “Support for ETS in IP Networks”, ATIS-0100006.2006; “Service Restoration Priority Levels for IP Networks”, 34 533576827 02.10.09 04.03.11 ATIS-0100004.2006; “Availability and Restorability Aspects of ETS”, ATIS-0100009.2003; “Overview of Standards in Support of ETS”, ATIS-0500008.2006; “Emergency Services Network Interfaces (ESNI) Framework”, ATIS-0100003.2006; “User Plane Priority Levels in IP Networks and Services”. 2.4.2.5 Other Fora Activities At the present time, there are many other SDOs working on different aspects of emergency telecommunications services or telecommunications for disaster relief/early warning. The efforts of these organizations and agencies can be divided into international (e.g., Global Standards Collaboration, United Nation’s Work Group on Emergency Telecommunications), regional (e.g., Asia-Pacific Telecommunity Standardization Program), and national. In the case of national efforts it is worth mentioning the following organizations that are active in ETS: Telecommunications Industry Association and the National Communications System in the USA; ICT Standards Advisory Council of Canada; and the Telecommunications Technology Committee in Japan. [Ref: P1!T-1106_i.doc; 2007-09] 2.5 Service Oriented Networks 2.5.1 ATIS SON Forum ATIS found major disparities in the coverage of standards across the broad landscape of SON. Where standards are in place, they are often inconsistent, incomplete, or non-interoperable especially across the Telco, IT, and web domains. A list of work items was identified and it was determined that several of the work items identified were beyond the scope of activities of existing industry groups. The SON Forum was launched to facilitate dialogue between the IT space and the Telecom space and create standards regarding next-generation services. These services include the ability to manage back-end systems to support services and applications from across domains, develop and bring services to market efficiently, and to reuse essential sources of information. The SON Forum develops new standards and integrates existing standards that promote Web 2.0, IMS, and SOA interworking 2.5.2 Objectives The SON Forum will provide industry leadership toward the vision of an open and flexible standards based service development environment. The SON Forum will address the following high priority areas of standardization: • Service creation • Common service enabler description including non-functional aspects • Standardization of WS-* specifications • Consistency of 3rd-party interfaces • Service oriented infrastructure standardization • Packaging of OSS/BSS components as service enablers • Common policy reference model In addition, the Forum will identify the way in which Telco services can be enhanced to offer new and personalized services to the end consumer, based upon service-oriented networks and establish a common dialogue and advance standardization efforts as needed for ATIS member companies with a number of SDOs and developer groups including key relationships and collaboration with TMF, OASIS, OMG, ITU-T, OMA and the Web 2.0 communities. 35 533576827 02.10.09 04.03.11 2.5.3 SON Framework Figure 8 – SON Framework 2.5.4 SON Forum Task Forces Three Task Forces (TFs) are established to progress the initial work. Proposed mission statements are currently under development 2.5.4.1 Policy and Data Models TF Proposed Issues Under Consideration for Approval: Assessment of User Domain Standards Gaps Common Data Model Requirements Common Name Space Requirements Common Reference Model, Syntax and Semantics 2.5.4.2 OSS/BSS and Virtualization TF Proposed Issues Under Consideration for Approval: Packaging of OSS/BSS Components as Service Enablers IT Infrastructure Virtualization 2.5.4.3 Service Delivery Creation and Enablers TF Proposed Issues Under Consideration for Approval: Common Product Data Catalog Repository Common Service Enabler Description Consistency of 3rd Party Interfaces Standardization of WS-* Specifications 36 533576827 02.10.09 04.03.11 [Ref: P1!T-1623_i.doc; 2009-05] 2.5.5 SON Standards ATIS-0200001: Service Enabler (SE) Characterization Technical Report – Provides a standard format for capturing the SE information – Can be used by any/all SE providers – The provider of a particular SE would fill out and publish the SE Characterization XML document with the details for that SE – Can be used to help partially automate the search process for a suitable SE SE Characteristics a. SE unique name m. Capacity b. SE short name n. Response time c. Keywords o. Failure/failover/degradation behavior d. Lifecycle information p. Security policy e. Chargeability q. User profile dependencies f. Interface unique name r. Consuming entity dependencies g. Interface short name s. Intermediate systems dependencies h. URI of the Interface t. i. Description of the functionality u. Eligibility dependencies j. SE performance measurements v. SE Creator Test environment k. Additional SE characteristic w. SE Provider contact info l. x. Terms & Conditions Planned availability [Ref: P1!T-2046_i.doc; 2010-11] 2.6 Cloud Computing 2.6.1 ATIS Cloud Services Forum ATIS’ Service Oriented Networks (SON) Forum has transformed into the Cloud Services Forum (CSF) to address Cloud Computing services. The CSFwill address ways in which service providers need to leverage core, network and service attributes to adopt, advance and deliver Cloud Computing services. To address the initial priority of Cloud-Based Inter-Provider Telepresence: Access Agnostic End to end service flow, the following areas of focus were identified: Service Architecture Document; Cloud Services Network-Network Interconnect, to include service definitions and resource requirements; Control Plane Aspects; Network Authentication, Authorization, and Accounting; Quality of Service; Border Security; Network Policy; Charging for Cloud Services, to include Service Definition and Resource Requirements; 37 533576827 02.10.09 04.03.11 Service Management; Logging and auditing; and Operations Support Systems. [Ref: P1!T-2213_i.doc; 2011-03] 2.7 Home Networking The Home Network is the “Network Environment” on the subscriber side of the access network termination, determined by logical interface(s). It may itself be an access point for services involving multiple SPs (i.e. cellular SPs, Mobile SPs, etc.). The Home Network can include multiple devices, representing different transport media, performing many different functions. The Home Network utilizes different physical media to connect devices or, in some cases, provides the necessary mechanisms to classify and prioritize different traffic types (i.e., video, voice, data). Figure 9 2.7.1 ATIS Home Networking (HNET) Forum The ATIS Home Networking Forum enables the interoperability, interconnection, and implementation of IP-based home networking systems/services by proactively examining technologies and services and developing solutions supporting the rollout of these technologies and services when appropriate. The ATIS HNET Forum was required to overcome a lack of industry cohesion to enable a quality consumer experience within the home network. ATIS determined that there is no single organization taking a holistic approach to home networking to ensure cross-technology interoperability/compatibility 38 533576827 02.10.09 04.03.11 of common functions or elements. Aspects of the issues are spread across multiple external industry groups with each group developing standards from their technology perspective. There is no assurance that end-to-end specifications can be deployed with reasonable effort, and be easily maintained. Prior to the creation of the HNET Forum, ATIS: • Investigated and discussed the issues associated with the deployment of IP-based Services in the Home Network in order to ensure a cohesive home networking infrastructure exists • Assessed the technical landscape of the Home Network by developing a High Level Framework including essential Building Blocks (logical and functional) for IP Home Networking • Performed an in-depth standards analysis of the industry that revealed 34 different Standards Development Organizations (SDOs) and Special Interest Groups (SIGs) with study programs relevant to the elements of a Home Network • Analyzed how each organization’s standards development activity relates to each of the 8 functional layers of the building blocks Figure 10 2.7.2 HNET Forum Objectives SDO Coordination – Track and assess relevant standardsfor Home Networking from an end-to-end perspective – Establish relationships with industry-wide forums to enable the dynamic development of cohesive Home Networking standards Standards Development 39 533576827 02.10.09 04.03.11 – – 2.7.3 Continually identify standards gaps in the industry Develop standards only when deemed necessary to fill gaps on technology solutions in order to provide an end-to-end home networking product in the industry HNET Work Plan The HNET Forum will be addressing these high priority issues in 2Q-4Q 2009: • Coordination of all HNET standards activities • Service Provider Remote Management – Assessment of Industry Standards Work Pertaining to Remote Device Management • Energy Consumption – Different Energy Allowances – Global Coordination of Power Level Requirements [Ref: P1!T-1622_i.doc; 2009-05] 2.8 SMART GRID 2.8.1 U.S. Smart Grid Program (NIST) Efforts are well underway in the U.S. to enable Smart Grid technologies., and both public and private sector stakeholders (including ICT and power/utility companies) are participating in standardization activities. The National Institute of Standards and Technology (NIST), under the U.S. Department of Commerce, has created a multifaceted program to define the Smart Grid, identify standards requirements and identify or develop standards to enable deployment and interoperability of Smart Grid devices and systems. 2.8.1.1 • • • • • • • • Standards Priorities Demand Response and Consumer Energy Efficiency Wide Area Situational Awareness Electric Storage Electric Transportation Advanced Metering Infrastructure Distribution Grid Management Cyber Security Network Communications 2.8.2 Smart Grid Interoperability Panel (SGIP) • • • • Public-private partnership created in Nov. 2009 Broad range of stakeholders in SGIP developing consensus about standards needed to build a smarter grid – Nearly 600 member organizations (with over 50 international organizations) & over 1700 participants from 22 stakeholder categories Coordinates the development of standards by Standards Development Organizations (SDOs) – Identifies Requirements – Prioritizes standards development programs – Works with over 20 SDOs including IEC, ISO, ITU, IEEE, … Open, transparent & inclusive process – SGIP Twiki: http://collaborate.nist.gov/twiki-sggrid/bin/view/SmartGrid/SGIP 40 533576827 02.10.09 04.03.11 SGIP ORGANIZATION PRIORITY ACTION PLANS (PAPs) # Priority Action Plan # Priority Action Plan 0 Meter Upgradeability Standard 9 Standard DR and DER Signals 1 Role of IP in the Smart Grid 10 Standard Energy Usage Information 2 Wireless Communication for the Smart Grid 11 Common Object Transportation 3 Common Price Communication Model 12 IEC 61850 Objects/DNP3 Mapping 4 Common Scheduling Mechanism 13 Time Synchronization, IEC 62850 Objects/ IEEE C37.118 Harmonization 5 Standard Meter Data Profiles 14 Transmission and Distribution Systems Model Mapping 6 Common Semantic Model for Meter Data tables 15 Harmonize Power Line Carrier Standards for Appliance Communications in the Home Models for Electric Power 41 533576827 02.10.09 04.03.11 7 Electric Storage Interconnection Guidelines 16 Wind Plant Communications 8 CIM for Distribution Grid Management 17 Customer Facility Smart Grid Information • NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0, published January 2010 – Smart Grid Vision & Reference Model – Identified 75 existing standards • Guidelines for Smart Grid Cyber Security, pulished August 2010 – Risk assessment guidance for implementers – Recommended security requirements – Privacy recommendations [Ref: P1!T-2234_i.doc; 2011-03] 3 NGN MOBILITY 4 NGN QUALITY OF SERVICE 5 NGN SIGNALING 5.1 Wireline Access 5.1.1 Metallic Access Standards 5.1.1.1 Testing and Maintenance The transport technologies used to transmit data are Digital Subscriber Line – DSL – families (ex. ADSL, VDSL2, etc.). DSL signals share the same metallic cable network used by fixed telephony signals. Originally, this network was projected only for transmission of voice signals, but today xDSL is used for the transmission of data through the old telephony network. This network normally is very old and therefore its initial transmission characteristics may have been modified, affecting the performance of the data transmission. Before using a metallic cable network for data transmission with xDSL technology, it is necessary to ensure that the network has been qualified for this purpose. ITU-T Study Group 5 issued, in 2008, a metallic networks qualifying methodology for use of xDSL technology, before and after its installation in the access network: Recommendation L.75 - Test, acceptance and maintenance methods of copper subscriber pairs (05/2008). 42 533576827 02.10.09 04.03.11 5.1.1.1.1 Basic Objective of L.75 Recommendation Recommendation L.75 describes a qualify methodology of metallic cable network for xDSL signals transport before and after the installation in the access network. This evaluation process is based on measurement of transmission rate obtained in the worse case of transmission in the network, i.e., when all the other pairs are being used for data transmission at the same time. This methodology of evaluation and qualification is known as Spectral Emulation Method (SEM), and may be applied to older networks designed to transport telephony services, as well as to new metallic cable networks intended to support broadband Internet. SEM Overview SEM is based on Nyquist and Shannon Theories. The Nyquist Theory establishes that a digitized signal shall be recovered without distortions only when the sampling frequency is, at least, two times the maximum frequency of the transmitted signal. The following equation expresses the Nyquist Theory: C = 2.B.log2n Where: B → Bandwidth C → Channel Capacity n → number of simbols Shannon, using the Nyquist Theory, established that the signal-to-noise ratio affects the channel transmission capacity. The equation below expresses the Shannon Theory: C = B.log2(1 + S/N) Where: S/N → Signal-to-noise ratio. In the SEM, one cable pair is chosen for the measurement of the transmission rate, noise power spectral density (N-PSD) and signal-to-noise ratio (S/N). This pair is called the victim pair (VP). The other cables are loaded with controlled xDSL signals, with limited power spectrum density, according to the xDSL technology under evaluation. This process is repeated, changing the VP, until all pairs have been measured. Example of Test Procedure Before installing any new cable on a network or xDSL signals in an existent network, all pairs should be tested to prevent detecting possible problems only after the system is installed. It is recommended that SEM be applied only to groups of up to 600 pairs. The following test procedure is an example of SEM application to a 50-pair cable: 1. Select one pair as VP. Feed the others pairs, at the near-end side, with non-coherent signals, with power spectrum density (PSD) limited according to the ITU Recommendation applicable to the xDSL technology under evaluation. At the other side, these pairs must be properly terminated with a resistive load, as indicated. 2. Connect one DSLAM port at the near-end side and a modem at the other side of the VP. This will be the pair under test. 3. Measure the highest TR and S/N in VP. 4. Shut off the DSLAM port and measure the N-PSD at the VP far-end side using a spectrum analyzer. 43 533576827 02.10.09 04.03.11 5. Repeat the steps above until all pairs have been measured. Bibliography [1] ITU-T L.75 (05/2008) – Test, acceptance and maintenance methods of copper subscriber pairs, available in http://www.itu.int. [Ref: P1!T-1793_i.doc; 2009-09] 5.1.2 Fiber Access Standards 5.1.3 Power Line Access Standards 5.2 Wireless Access 5.2.1 WLAN (IEEE 802.11) Wi-Fi 5.2.2 Mobile Broadband Wireless Access (IEEE 802.20) 5.3 Satellite 44 533576827 02.10.09 04.03.11 6 SECURITY To secure information in a network [11] there are three critical components that need to be considered. Authentication validates the identity of the party or parties participating in the exchange of information. Confidentiality protects against eavesdropping or monitoring of the information exchange. Integrity assures that the information has not been altered during transmission. The nature of IP makes it difficult to verify where the information comes from, and easy for an attacker to take advantage of this weakness by spoofing the IP address. Spoofing occurs when an attacker changes the source address in the IP packet. Determining where the attack is coming from is very difficult as the attacker keeps changing the source address. The importance of security is recognized by both the IETF and the ITU-T. There is a need to further understand all of the issues and implications. To address the Security problem, the IEFT created the Security Area and further subdivided the area into working groups. The ITU-T SG 17 (Data Networks and Telecommunication Software) has a security study group that targets security issues at all levels. The role of each organization is somewhat different. The IETF Security Area Advisory Group primary role is to provide help to IETF working groups on how to provide for security in the protocols they design. On the other hand, the ITU-T is focusing on the need for a global approach to the dissemination of information regarding the security of critical network infrastructures and ways to stimulate international or regional cooperation with respect to critical network infrastructure. 6.1 ITU-T Security Standards Study Group 17 is the Lead SG for Security [Editor’s Note: Information from P1!T-1604 will be used to update this section. ] ITU-T SG 17 work on security Q1/17 - Communications systems security project Q2/17 - Security architecture and framework Q3/17 - Security management Q4/17 - Cybersecurity Q5/17 - Countering spam by technical means Q7/17 - Secure application services Q9/17 – Telebiometrics Q10/17 – Identity management architecture and mechanisms 6.1.1 Approved ITU-T Security Recommendations M.3016.0, 1, 2, 3, 4 Security for the management plane: Overview, Security requirements, Security services, Security mechanism, Profile proforma X.509 Information technology – Open Systems Interconnection – The Directory: Publickey and attribute certificate frameworks X.805 Security architecture for systems providing end-to-end communications X.893 Information technology – Generic applications of ASN.1: Fast infoset security X.1035 Password-authenticated key exchange (PAK) protocol 45 533576827 02.10.09 04.03.11 X.1051 Information security management system - Requirements for telecommunications (ISMS-T) X.1055 Risk management guidelines for telecommunications organizations X.1056 Security incident management guidelines for telecommunications organizations X.1081 The telebiometric multimodal model - A framework for the specification of security and safety aspects of telebiometrics X.1111 Framework for security technologies for home network X.1114 Certificate profile for the device in the home network, User authentication mechanisms for home network service, Authorization framework for home network X.1121 Framework of security technologies for mobile end-to-end communications X.1122 Guideline for implementing secure mobile systems based on PKI X.1141 Security Assertion Markup Language (SAML 2.0) X.1142 eXtensible Access Control Markup Language (XACML 2.0) X.1191 Functional requirements and architecture for IPTV security aspects X.1205 Overview of cybersecurity X.1242 Short message service (SMS) spam filtering system X.1244 Overall aspects of countering spam in IP-based multi-media applications Y.2270 NGN Identity Management Framework Y.2701 Security requirements for NGN release 1 X.1250 Requirements for global identity management trust and interoperability X.1251 Framework for user control of digital identity Y.2702 Authentication and authorization requirements for NGN release 1 Y.2703 The application of AAA service in NGN Y.2704 Security mechanisms and procedures for NGN Y.2720 NGN identity management framework Y.2721 NGN identity management requirements and use cases [Ref: P1!T-2021_i.doc; 2010-10] 46 533576827 02.10.09 04.03.11 6.1.2 SG 17 Security Work in progress (selected items) Draft Rec. Title or Subject X.1034 Framework for EAP-based authentication and key management in a data communication network X.1205 Guideline on preventing worm spreading in a data communication network X.1245 Framework for countering IP based multimedia spam X.1243 Interactive gateway system for countering spam X.tpp-2 Telebiometrics protection procedures – Part 2: A guideline for data protection X.1089 Telebiometrics authentication infrastructure X.tsm-2 Telebiometrics system mechanism – Part 2:Protection profile for client terminals X.1275 Guideline on protection of personally identifiable information in the application of RFID technology [Ref: P1!T-2021_i.doc; 2010-10] 6.1.3 SG 13 security work in progress (Q15/13) Draft Rec. Title or Subject Y.mobSec Mobility security framework in NGN Y.NGN Sec risk Security risk assessment in NGN Y.NGN Certificate Management NGN certificate management Y.2722 NGN identity management mechanisms Y.SecReqR2 Security requirements for NGN release 2 Y.2740 Security requirements for mobile remote financial transactions in the next generation network (NGN) Y.2741 Architecture of secure mobile financial transactions in the next generation network (NGN) [Ref: P1!T-2021_i.doc; 2010-10] 47 533576827 02.10.09 04.03.11 6.2 Identity Management Identity management, a cornerstone of establishing trust in the evolving Information and Communications Technologies (ICT) infrastructure, is necessary to control access to services and infrastructures, to protect personal information, to perform online transactions, and to comply with legal and regulatory requirements. A diverse set of identity management (IdM) solutions existing for specific market segments and perspectives. Many of these solutions are highly distributed and autonomous, resulting in a need to establish a trusted, global, and interoperable IdM capability. This section provides an overview of key concepts associated with identity management and outlines current activities related to identity management. 6.2.1 Identity Management Concepts Identity may be viewed as an attribute of a specific entity – a human, an organization, a service provider, an application, a process, a sensor – in a specific context. While the term “identity” has been used extensively in international standards documents, it is often never explicitly defined. The ITU-T has recently initiated an activity related to identity management (see Section 3 for more details). As part of this effort, one objective is to develop a common understanding of the term “identity” that can be expressed in one or more ways to meet the needs and expectations of ITU members. Recent (draft) conclusions of this work indicate that identity, as used in current standards, is a concept that allows for various kinds of representations of an entity at some point in time and space with some degree of desired consistency. An ontology of identity is proposed as shown in Figure 1. 48 533576827 02.10.09 04.03.11 Figure 11 - Ontology of Identity [Reference: ITU-T Correspondence Group Report on the Definition of the Term “Identity”, draft version 0.7, 22 February 2008] According to this ontology, an entity is a real person, legal person or object – which in turn can consist of anything physical, network elements, or software or content. Identity is a set of representations that are either asserted (e.g., an entity saying “this is my identity”) or manifested by an entity. Representations take some kind of physical or electro-optical form – some of which may consist of digital expressions. There are four distinct kinds of representations: identifiers, authenticators or credentials, attributes, and patterns. Identifiers are universally regarded as “names, numbers, or addresses” which may arise in two different ways, such as assigned, registered by some authority, or self-issued. Authenticators or credentials are certificates (e.g., ITU-T X.509 digital certificates) or tokens which may be issued by established authority or self-issued. Attributes consist of any kind of information with a binding to an identifier or authenticator that is either registered or captured in conjunction with their use (e.g., geospatial location, transactional activity, and images). Patterns take the form of either signatures derived from activity or reputation when asserted by an entity for identity purposes. Based on this ontology, the ITU-T Correspondence Group Draft Report defines identity as [Reference: ITU-T Correspondence Group Report on the Definition of the Term “Identity”, draft version 0.7, 22 February 2008]: Identity- The assertion or manifestation of a structured representation of an entity in the form of one or more credentials, identifiers, attributes, or patterns. Such representations can take any physical or electro-optical form or syntax, and have associated implicit or explicit time-stamp and location specifications. It should also be noted that at the TSAG meeting December 2007, it was agreed, for ITU-T purposes, that the identity asserted by an entity represents the uniqueness of that entity in a specific context and is not intended to indicate positive validation of a person. The recent results of the Correspondence Group activity will be presented to TSAG for further deliberation. T The Correspondence Group Draft Report also defined identity management as: identity management - The diverse arrays of different technical, operational, and legal systems and practices involving the structured capture, syntactical expression, storage, tagging, retrieval, and destruction of entity identities. A large number of industry groups and standards organizations are working on standardizing aspects of identity management. Generally, different groups develop optimum solutions for specific market segments and perspectives (e.g., user-centric, application-centric [web services and electronic commerce], and network-centric perspectives). The result is a variety of identity-based solutions that ultimately should interoperate with each other. 49 533576827 02.10.09 04.03.11 The ITU-T surveyed many of these initiatives and identified seven groups of common global IdM requirements, although there were diverse existing capabilities within each group [Reference: ITU-T Focus Group Identity Management Output: Report on Requirements for Global Interoperable Identity Management, September 2007]: 1. A common, structured identity management model and identity management plane. 2. Provision of core credential, identifier, attribute, and pattern identity services with known assurance levels to all entities. 3. Discovery of authoritative identify provider resources, services, and federations. 4. Interoperability among authorization privilege management platforms, identity providers and provider federations, including identity bridge providers. 5. Security and other measures for reduction of identity threats and risks, including protection of identity resources and personally identifiable information. 6. Auditing and compliance, including policy enforcement protection of personally identifiable information. 7. Usability, scalability, performance, reliability, availability, internationalization, and disaster recovery. Identity management therefore provides assurance of identity information that supports secure, trusted access control. Identity management supports a multitude of identity-based services that includes targeted advertising, personalized services based on geo-location and interest, and authenticated services to decrease fraud and identity theft. A trusted, global, interoperable IdM capability is a goal that would help meet the needs of the evolving, hyper-connected ICT infrastructure and services. 6.2.2 Activities As previously noted, there are many activities that relate to identity management standardization. A nonexhaustive list of identity management activities is presented below in three categorizes: • Standardization bodies and similar organizations: de jure/de facto standards including standard development organizations such as ITU-T, partnership projects such as 3GPP, and wellestablished open communities such as IETF and Liberty Alliance Project. • Research activities: aimed at developing IdM technologies. • Other IdM related activities: examples include open source projects and advocacy groups. IdM-GSI is a grouping of ITU-T Study Group Rapporteurs working on Identity Management (IdM) for telecommunications. i.e. Joint Rapporteur Group (JRG). The objective is to progress IdM technical work in the various SG Questions in a well-coordinated/complementary manner and avoid duplication and conflict. The following is a graphical summary of status of ITU-T work on IdM: 50 533576827 02.10.09 04.03.11 Figure 12 – Status of ITU-T Work on IdM [Source: GSC-13 Meeting, Document GSC13-PLEN-12] The ITU-T Focus Group on Identity Management (FG IdM) produced six deliverable reports that document the work it accomplished in fulfillment of its terms of reference. The FG IdM was chartered by ITU-T Study Group 17 in December 2006 and worked through September 2007. The results of the FG IdM work are documented in the following freely available reports which can be downloaded from its web site. Report Title Deliverables from ITU-T IdM Focus Group Report Contents FG IdM Report No. 1: Report on Activities Completed and Proposed FG IdM Report No. 2: Overview Report on the Deliverables FG IdM Report No. 3: Report on Identity Management Ecosystem and Lexicon • • • List of completed activities List of proposed activities • Living List of organizations working on IdM related subjects. IdM related terms and definitions in use Identifies, describes and analyzes IdM gaps, Documents example use cases illustrating the gaps. Used to derive the requirements for a generic IdM framework Provides a global analysis on IdM requirements and Identity Management Use Cases and Gap Analysis • • • • FG IdM Report No. 5: Report on • FG IdM Report No. 4: Report on Summarizes the deliverables of the FG IdM and provides an assessment of the completeness of the deliverables. 51 533576827 02.10.09 04.03.11 Requirements for Global Interoperable Identity Management FG IdM Report No. 6: Report on Identity Management Framework for Global Interoperability • • capabilities, Includes requirements for the protection of personally identifiable information (PII). Describes an extensible, platform-independent, identity protocol-independent, IdM Framework to support existing and new IdM solutions. [Ref: P1!T-2021_i.doc; 2010-10] More complete information and pointers to these activities are listed in the document ITU-T Focus Group Identity Management Output: Report on Identity Management Ecosystem and Lexicon, September 2007. 6.2.2.1 Standards bodies and similar organizations • 3GPP: Developed specifications related to Subscription Management (SuM); • ATIS: Packet Technologies and Systems Committee (PTSC) is studying IdM; • ETSI: TIPSAN developed specifications related to Subscription Management (SuM); • IETF: Developed many resource/entity identification specifications, including Uniform Resource Identifier/Name, Internationalized Resource Identifier, Uniform Resource Name, Universally Unique Identifier, Enhancements for Authenticated Identity Management in the Session Initiation Protocol, etc. • ISO/IEC: ISO/IEC JTC 1/SC 27 (Information Technology – Security Techniques) has approved a new project on IdM. • ITU-T: a number of Study Groups deal with various aspects of Identity Management. The Telecommunication Standardization Bureau has recently created the Identity Management Global Standards Initiative (IdM-GSI) to focus on developing the detailed standards necessary for deployment of IdM capabilities that enables secure and trustworthy assertions about digital identities used in telecommunications, control networks, and a variety of service offerings. IdMGSI harmonizes, in collaboration with other bodies, different approaches to IdM worldwide. • Liberty Alliance Project: Specified an open standard for federated network identity that is intended to support current and emerging network devices, offering a secure way to control digital identity information. • OASIS (Organization for the Advancement of Structured Information Standards): Developed identity management platforms including: Security Assertion Markup Language, eXtensible Access Control Markup Language, Service Provisioning Markup Language, eXtensible Resource Identifier, and Web Services Security. • OECD: Identity management in the online environment is seen as a key enabler for electronic business and electronic government because it facilitates the expansion of information systems and network boundaries and increases access points. A workshop was held and brought together experts from government, industry and civil society to explore the main information security and privacy issues surrounding digital identity management. • Open Mobile Alliance: Developed specifications related to IdM including Identity Management Framework Requirements document. • World Wide Web Consortium (W3C): Developed recommendations for XML aspects of IdM. 52 533576827 02.10.09 04.03.11 6.2.2.2 Research Activities • Archival Resource Key is naming scheme is designed to facilitate the high-quality and persistent identification of information objects. • The European Union / European Commission supports a number of projects relating to IdM, including: o Future of Identity in the Information Society (FIDIS): shaping the requirements for the future management of identity in the European Information Society and contributing to the technologies and infrastructures needed; o GUIDE: conducting research and technological development with the aim of creating architecture for secure and interoperable e-government electronic identity services and transactions for Europe o Privacy and Identity Management for Europe (PRIME): aims to develop a working prototype of a privacy-enhancing Identity Management System 6.2.2.3 Other Identity Management Related Activities • Higgins: A framework that will enable users and enterprises to integrate identity, profile, and relationship information across multiple systems. Using context providers, existing and new systems such as directories, collaboration spaces, and communications technologies (e.g. Microsoft/IBM WS-*, LDAP, email, IM, etc.) can be plugged into the Higgins framework. Applications written to the Higgins API can virtually integrate the identity, profile, and relationship information across these heterogeneous systems. • OpenID: open source community solution for IdM. It is a lightweight method of identifying individuals that uses the same technology framework that is used to identify websites. • Shibboleth: Standards-based, open source middleware software which provides Web Single SignOn (SSO) across or within organizational boundaries. The Shibboleth software implements the OASIS SAML specification, providing a federated Single-SignOn and attribute exchange framework. This list is only a sample of the many activities underway in the identity management area. Harmonization of these different approaches, while leveraging research and deployment experiences, is a key goal for the international community. [Ref: P1!T-1249_i.doc; 2008-03] 53 533576827 02.10.09 04.03.11 7 CONFORMANCE AND INTEROPERABILITY 7.1 ITU-T Standardization 7.1.1 Joint Coordination Activity – Conformance and Interoperability Testing Objectives Collect and disseminate information about testing activities and testing methodologies Provide feedback on collected information as appropriate Seek input on the implementation of tasks within WTSA-08 Resolution 76 Develop a common understanding of Conformance vs. Interoperability testing Develop requirements placed on writing Recommendations to accommodate testing Provide technical assistance to Rapporteurs and editors writing Recommendations for testing Provide technical assistance to Rapporteurs and editors writing test specifications Assist in the interpretation of the X.290- and Z.160/170-series of Recommendations Provide input towards the evolution of Recommendations that define testing methodology Disseminate information about testing across other SDOs, e.g. ISO, ETSI Prepare material for tutorials, workshops, conferences and make presentations as appropriate Promote of the use of a common terminology and methodology of testing Find working methods to co-ordinate activities and improve sharing of results Give guidance on testing in NGN, IPTV, Home Networking and other areas 7.1.2 ITU-T Study Group 11 (Lead Study Group for Conformance Testing) Q 8/11 Protocol Test Specifications for NGN Q 9/11 Monitoring parameters for NGN protocols Q 10/11 Service test specification for NGN Q 11/11 QoS tests specification for NGN Q 12/11 NID and USN test specification 7.1.3 ITU-T Approved Standards on Test Specifications A partial list includes: Q.3900 Methods of testing and model network architecture for NGN technical means testing as applied to public telecommunication networks Q.3900 Methods of testing and model network architecture for NGN technical means testing as applied to public telecommunication networks Q.3901 Distribution of tests and services for NGN technical means testing in the model and operator networks Q.3902 Parameters to be monitored in the process of operation when implementing NGN technical means in public telecommunication networks Q.3903 Formalized presentation of testing results Q.3904 The scenarios, list and types of tests for TM local and NUT testing for IMS on the model networks Q.3910 Monitoring parameters set for NGN protocols Q.3911 Monitoring parameters set for voice services in NGN 7.1.4 ITU-T Draft and Completed Standards on Test Specifications A partial list includes: Q.1912.5 Interworking between SIP and BICC or ISUP: Part 5 (Abstract Test Suite and PIXIT) 54 533576827 02.10.09 04.03.11 7.1.5 Q.3930 Performance Testing of distributed systems Concept and Terminology Q.3931.1 IMS/PES Performance Benchmark: Part 1 (Core Concepts) Q.3931.2 IMS/PES Performance Benchmark: Part 2 (Subsystem Configurations and Benchmarks) Q.3931.2 IMS/PES Performance Benchmark: Part 2 (Subsystem Configurations and Benchmarks) Q.3940 NGN Interconnection Testing Q.3941.1 Network Integration Testing between SIP and ISDN/PSTN network signalling protocol. Part 1 TSS & TP Q.3941.2 Network Integration Testing between SIP and ISDN/PSTN network signalling protocols. Part 2: PIXIT & ATS Q.3945 Types and list of NGN services testing on the Model networks Q.3948 VoIP services testing at NGN UNI ITU-T Interoperability Events IPTV Interop Event (July 2010; Geneva) - testing ITU-T’s IPTV suite of standards: H.721 et al IPTV Interop Event (September 2010; Singapore) IPTV Interop Event (December 2010; Pune, India) Future Interop Events may address: - Home networking - VDSL 2 - GPON (Gigabit Passive Optical Networks) [Ref: P1!T-2244_i.doc; 2011-03] 55 533576827 02.10.09 04.03.11 ANNEX 1 - Standards Endorsed by CITEL PCC.I Resolutions Standard Resolution Date Chapter Gateway Control Protocol PCC.I/RES.104 (XIV-01) March 2001 10.3 Intelligent Networks Capability Set 3 PCC.I/RES.105 (XIV-01) March 2001 14 Intelligent Networks Capability Set 4 PCC.I/RES.1 (I-02) Dec 2002 14.1 ITU-T Y.2000-Series Recs for NGN (SG13) PCC.I/RES. 25 (III-03) Sept 2003 9 ANSI-41 Evolved Core Network with CDMA2000 Access Network PCC.I/RES. 27 (III-03) Sept 2003 11.2.2.2 GSM Evolved UMTS Core Network with UTRAN Access Network PCC.I/RES. 28 (III-03) Sept 2003 11.2.2.1 Packet-Based Multimedia Communications Systems (ITU-T Rec. H.323) PCC.I/RES. 44 (IV-04) March 2004 10.7 Security Architecture for Systems Providing End-to-End Communications (ITU-T Rec. X.805) PCC.I/RES. 45 (IV-04) March 2004 15.3 Security Architecture for the Internet Protocol (IPsec) PCC.I/RES. 46 (IV-04) March 2004 15.1 Interworking Between SIP and BICC Protocols or ISUP (Rec. Q.1912.5) PCC.I/RES. 55 (V-04) Sept 2004 10.6 56 533576827 02.10.09 04.03.11 SIP: Session Initiation Protocol PCC.I/RES. 68 (VI-05) April 2005 10.4 ITU-T Rec. G.993.2, VDSL2: Very High Speed DSL-2 Transceivers PCC.I/RES. 98 (IX-06) Sept 2006 11.1.1 ITU-T Rec. J.122, “SecondGeneration Transmission Systems for Interactive Cable Television Services – IP Cable Modems” PCC.I/RES.99 (IX-06) Sept 2006 11.1.2 Internet Protocol Version 6 (IPv6) PCC.I/RES.100 (IX-06) Sept 2006 17.1 E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM) PCC.I/Res. 116 (XI-07) Sept 2007 17.2 ITU-T Rec. E.106, “International Emergency Preference Scheme for Disaster Relief Operations” PCC.I/RES. 130 (XII-08) March 2008 2.4.2.1 ITU-T Rec. E.107, “Emergency Telecommunications Service (ETS) and Interconnection Framework for National Implementations of ETS” PCC.I/RES. 131 (XII-08) March 2008 2.4.2.1 ITU-T Recommendation Y.1910, “IPTV Functional Architecture” PCC.I/RES. 145 (XIV-09) May 2009 2.3.2 ITU-T Recommendation Y.2270, “NGN Identity Management Framework” PCC.I/RES. 146 (XIV-09) May 2009 6.2 ITU-T Recommendation L.75 ”Test acepptance and maintenance methods of copper subscriber pairs “ PCC.I/RES 162 (XVI-10) May 2010 5.1 57 533576827 02.10.09 04.03.11 ANNEX 2 - NGN Library 8 NGN Introduction The architecture and implementation of the Next Generation Network (NGN) must be based on open, standard-based interfaces and protocols. This is essential to achieve multi-vendor interworking and to accelerate the rate on innovation. It is also well accepted that the NGN must also be based on a distributed architecture that helps greatly to reduce the implementation costs while giving flexibility in the actual deployment. The ITU-T Recommendation Y.2001, “General Overview of NGN”, Dec. 2004, provides a definition of an NGN. The NGN must be able to support highly customizable services that are easily and rapidly created as well as deployed economically throughout the network. While it is important to enable new services, it is also critical to preserve the existing services provided by the legacy network. 8.1 NGN Standards Efforts NGN standardization is being addressed in a range of international, regional and national standardization bodies. Work to develop and refine standards for NGNs is ongoing in the ITU-T and other fora such as ETSI, IETF, ATIS and others. It is worth noticing that considerable collaboration and interaction have occurred among these SDOs. These new standards are important to ensure that existing networks can be integrated with the networks that include voice over packet into a single new generation network. Taking into account the importance of these standards and their potential impact on the region, the Rapporteur Group on Standards Coordination has been studying these evolving standards and preparing Standards Coordination Documents (SCD) to highlight and endorse the most significant examples. 8.2 ITU In early 2002 the ITU began work on NGN standards. Since that time a number of workshops on NGN have been organized in order to address issues that impact both ITU and other SDOs. Two years later the ITU established a focus group (FGNGN) to work on both fixed and mobile networks as well as QoS in DSL, authentication, security, and signalling. Currently, several ITU-T study groups (SG), such as 2, 9, 11, 12, 13, 15, 16 and 17 are involved in NGN standardization work and SG 13 is the Lead SG in NGN. TheFGNGN completed its work on the first set of standards for NGN in Novemeber 2005. This specification, known as NGN Release 1, provides a comprehensive framework of services, capabilities and network functions that constitute an NGN, as described in Y.2001. ITU’s next phase of NGN work, called the NGN-GSI (Global Standards Initiative), focuses on the detailed protocols required to offer the wide range of services expected in NGN. 8.3 ETSI ETSI has been looking at NGN standardization issues since 2001. The TISPAN technical committee has responsibility for all aspects of standardization for present and future converged networks, including Voice over IP (VoIP), and NGN. TISPAN selected 3GPP release 6 IMS to be the baseline for the SIP service machinery in fixed networks. 8.4 ATIS ATIS has produced an NGN framework that provides high-level requirements and guiding principles. The first part of this framework deals with NGN definition requirements and architecture of future network 58 533576827 02.10.09 04.03.11 services in new networks to interface seamlessly with communications systems. The second part documents the phasing and prioritization of network capabilities to ensure the deployment of the NGN and its services in a coherent manner. ATIS has been collaborating with the ITU-T, TISPAN, and 3GGP to develop a consistent global view of the NGN. ATIS advocates the IMS architecture and views it as the appropriate technology of choice to consistently support new value-added services. 8.5 IETF The Internet Engineering Task Force is not working on NGN as an individual topic, but its Working Groups have responsibility for developing or extending existing protocols to meet requirements such as those agreed for NGN in other standardization bodies. Some of the standardization activities undertaken by the IETF related to NGN are SIP (session initiation protocol), MEGACO (Media Gateway Control), SIPPING (Session Initiation Proposal Investigation), NSIS (Next Steps in Signaling), IPv6, MPLS (Multiprotocol Label Switching), ENUM (Telephone Number Mapping), etc. In addition to the above mentioned SDOs, there are other industry consortia and fora that actively work on NGN related standards. Among them we have the Multiservice Switching Forum (MSF), the Telecommunications Industry Association (TIA), the DSL Forum (DSL-F), the Institute for Electric and Electronic Engineers (IEEE), Cable Television Laboratories, Inc. (CableLabs), the Telecommunications Management Forum (TMF), and Parlay/OSA. The following sections provide an outline of the NGN relevant standards. These standards cover network aspects such as signaling, access, service creation, management, security, and quality of service. ***** 59 533576827 02.10.09 04.03.11 9 Signaling Standards This section is based on CITEL contribution PCC.1/doc.957/00 (Evolving Standards for Internet Telephony) [1, 2]. Some sections of that document have been expanded but others remain as they are in the original CITEL contribution PCC.I/doc.957/00. ITU-T Study Groups 11 and 16 have been actively working on IP telephony signaling. SG 16 developed Recommendation H.323 (Packet-based Multimedia Communications Systems). More recently, Study Group 11 has developed another approach to supporting telephony over packet networks: namely, that of introducing a core packet network into existing circuit-switched networks. The protocol developed for communicating between telephone exchanges in this case is known as the Bearer Independent Call Control (BICC) protocol. In addition, SG 11 has also been working on SIP related matters and Recommendation Q.1912.5 defines the signaling interworking between BICC or ISUP protocols and SIP with its associated Session Description Protocol (SDP) at an Interworking Unit (IWU). Internet Engineering Task Force (IETF) working groups such as iptel (IP-telephony), pint (PSTNInternet), sigtran (signaling transport), megaco (Media Gateway Control) and mmusic (Multiparty Multimedia Session Control) have also been working on various Internet Telephony related protocols such as Session Initiation Protocol (SIP), Session Initiation Protocol for Telephony (SIP-T), Stream Control Transport Protocol (SCTP), and Media Gateway Control (Megaco) protocol. It is worthwhile to notice that the H.248/Megaco protocol, used for coordinating media gateways from a media gateway controller, has been developed jointly by the ITU-T Study Group 16 and the IETF Megaco working group. 9.1 SIGTRAN (SIGnaling TRANsport) The mandate of the IETF Sigtran working group was to develop protocols that address the transport of packet-based PSTN signaling over IP Networks, taking into account functional and performance requirements of the PSTN signaling. These protocols support communications between the Media Gateway Controller and the Signaling Gateway. The sigtran working group specified SCTP (Stream Control Transmission Protocol), RFC 4960 (proposed standard), and several adaptation layers for transmission of SS7 over IP-based networks. Some adaptation layers are: SS7 MTP2 - User Adaptation Layer, RFC 3331 (proposed standard), which transports MTP2 user signaling information between the SG and the MGC; SS7 MTP3 - User Adaptation Layer, RFC 4666 (proposed standard), which transports ISUP and SCCP messages between the SG and the MGC. ISDN Q.921-User Adaptation Layer, RFC 5133 (proposed standard), which defines a protocol for backhauling of ISDN Q.921 User messages over IP using SCTP. V5.2 - User Application Layer (V5UA), RFC 3807 (proposed standard), which defines a mechanism for backhauling of V5.2 messages over IP using SCTP. RFC 2719 (informational) provides the architectural framework for signaling transport and RFC 3257 (informational) describes the applicability of the Stream Control Transmission Protocol. RFC 3868 (proposed standard) defines a protocol for the transport of any Signaling Connection Control Part-User signaling over IP using SCTP. 60 533576827 02.10.09 04.03.11 9.2 BICC The Bearer Independent Call Control (BICC) protocol, being developed by ITU-T Study Group 11, provides a means for existing operators of the PSTN, based upon circuit switched technology, to evolve their networks towards support for Voice over Packet services with minimal impact on their operations. Although there exists some overlap in functionality between SG 11’s BICC and SG 16’s H.323, the H.323 specification is focused on small and new telecommunications carriers while the BICC specification is focused on the needs of large, incumbent network operators who have installed ISUP networks and want to delay their migration to SIP / SIP-T. The BICC protocol is based on the CCS7 ISDN User Part (ISUP) protocol and is specified in ITU-T Recommendation Q.1901. The BICC is transported using the Application Transport Mechanism (APM). The BICC protocol is an application of the ISUP protocol definition, but it is not peer to peer compatible with ISUP. This protocol used to be referred to as ISUP+. BICC Capability Set one (CS1), which supports communications between Media Gateway Controllers, was decided (approved) by SG 11 on June 15th, 2000. BICC CS2 (ITU-T Recommendation Q.1902) focuses on other bearer networks including IP networks. It addresses interface and interactions between the Media Gateway Controller and the Media Gateway. BICC CS2 was approved in July 2001. BICC CS3, currently under development, adds support mechanisms for end-to-end QoS and interworking with SIP. 9.3 Megaco/H.248 The IETF Megaco (MEdia GAteway COntrol) working group and ITU-T Study Group 16 jointly worked on defining the Megaco/H.248 protocol. The work originated in the IETF Megaco working group, and most technical discussion and issues closure took place in that environment. The Megaco/H.248 is a broadly applicable gateway control protocol. It can be used for a wide range of gateway applications moving information streams from IP networks to PSTN, ATM, and others. The standard employs a master-slave model in which the source terminal and/or the gateway is a slave of the media gateway controller. ITU-T approved Recommendation H.248 June 15, 2000 and the IETF issued a Megaco protocol RFC 2885 shortly after. RFC 2886 (Errata) records the errors found in the Megaco/H.248 protocol document [RFC 2885], along with the changes proposed in the text of that document to resolve them. RFC 3015 (proposed standard) is the result of applying the changes in RFC 2886 to the text of RFC 2885. RFC 3015 obsoletes RFC 2885 and RFC 2886. The ITU-T H.248 Packages Guide Release 1 summarizes packages that have been standardized in the time frame from 06/2000 to 06/2001. RFC 3525 - Gateway Control Protocol Version 1 replaces RFC 3015. RFC 3525 incorporates the original text of RFC 3015, modified by corrections and clarifications discussed on the Megaco E-mail list. H.248 version 2 was completed at the SG 16 meeting of Feb. 2002. RFC 3525/H.248v2 includes correction updates to RFC 3015/H.248v1 which were in the Implementors’ Guide plus other changes such as: Deprecation of the Modem Descriptor; Clarification of Audit text, and addition of directed audits; Enhancement of Digit Collection; and Addition of Nx64 multiplexing to the Multiplex Descriptor. RFC 5125 onsoletes RFC 3525, H.248 was renumbered when revised on 2002-03-29. H.248 main body, Annexes A to E and Appendix I were included in H.248.1 - “Gateway Control Protocol Version 1”. Subsequent annexes were sequentially numbered in the series, e.g. H.248 Annex F became H.248.2. 61 533576827 02.10.09 04.03.11 In May 22, 2002, H.248.1 – “Gateway Control Protocol Version 2” was approved. Version 2 include several enhancements to Version 1, such as individual property, signal, event and statistic auditing; improved multiplex handling; topology for streams; improved description of profiles; and ServiceChange capability change. Currently the last Annex added is H.248.78 (“Bearer-level application level gateway”). H.248.1 – Gateway Control Protocol Version 3” was approved in September 2010. Version 3 includes several enhancements, clarifications and corrections. 9.4 SIP The Session Initiation Protocol (SIP), [3], developed by the IETF Multiparty Multimedia Session Control (MMUSIC) working group and currently specified as a Proposed Standard (RFC 3261), builds on a simple text-based request-response architecture similar to other Internet protocols such as HTTP. The proposed standard was published in June 2002. The SIP work drew enough attention to create a separate SIP working group to continue the development. Since its publication, it has been recognized that SIP needs extensions in order to offer carrier-grade telephony applications. The SIP working group is considering proposals to achieve this. These proposals add new functionality to the base SIP protocol, such as the use of MCUs for multiparty conferences; call transfer functionality, reliable provisional responses ("Call proceeding") and pre-call media cut-through. The Session Description Protocol (SDP), RFC 4566 (proposed standard), is used in SIP to convey session parameters such as media encoding. The MMUSIC group is working to enhance the functionality of SDP. PacketCable, a project conducted by CableLabs and its members, is the most significant early adopter of SIP. In the PacketCable initiative it was also recognized that SIP has to be extended to offer carrier-grade services. This resulted in the PacketCable Distributed Call Signaling (DCS) specification. Some of the ideas put forward in the DCS specification have been published as Internet Drafts. The PacketCable Call Management Server to CMS protocol uses the Session Initiation Protocol 2.0 (SIP) specification with extensions and usage rules that support commonly available local and CLASS services. This protocol is referred to as the Call Management Server Signaling (CMSS) protocol. SIP is a peer-to-peer signaling control protocol for creating, modifying and terminating sessions (e.g., conferences, telephone calls and multimedia distribution) with one or more participants. These sessions include Internet multimedia conferences, Internet telephone calls and multimedia distribution. Members in a session can communicate via multicast or via a mesh of unicast relations, or a combination of these. SIP invitations used to create sessions carry session descriptions, which allow participants to agree on a set of compatible media types. SIP supports user mobility by proxying and redirecting requests to the user's current location. Users can register their current location. SIP is not tied to any particular conference control protocol. SIP is designed to be independent of the lower-layer transport protocol and can be extended with additional capabilities. RFC 3261 covers basic functionality and there are several related Internet drafts covering services. SIP has rapidly growing industry momentum at the system and device level. There have been several bakeoffs with different vendors demonstrating interoperability of basic calls. Currently there are several proposals for extensions waiting for discussion in the working group. 9.4.1 SIP Operation Callers and callees are identified by SIP addresses. The "objects" addressed by SIP are users at hosts, identified by a SIP URL. The SIP URL takes a form similar to a mailto or telnet URL, i.e., user@host. The user part is a user name or a telephone number. The host part is either a domain name or a numeric network address. 62 533576827 02.10.09 04.03.11 When making a SIP call, a caller first locates the appropriate server (A) and then sends a SIP request (B). The most common SIP operation is the invitation (C). Instead of directly reaching the intended callee, a SIP request may be redirected or may trigger a chain of new SIP requests by proxies (D). Users can register their location(s) with SIP servers (E). A. Locating a SIP Server When a client wishes to send a request, the client either sends it to a locally configured SIP proxy server (as in HTTP), or sends it to the IP address and port corresponding to the Request-URI. B. SIP Request Once the host part has been resolved to a SIP server, the client sends one or more SIP requests to that server and receives one or more responses from the server. A request (and its retransmissions) together with the responses triggered by that request make up a SIP transaction. All responses to a request contain the same values in the Call-ID, CSeq, To, and From fields. This allows responses to be matched with requests. The ACK request following an INVITE is not part of the transaction since it may traverse a different set of hosts. C. SIP INVITE A successful SIP invitation consists of two requests, INVITE followed by ACK. The INVITE request asks the callee to join a particular conference or establish a two-party conversation. After the callee has agreed to participate in the call, the caller confirms that it has received that response by sending an ACK request. If the caller no longer wants to participate in the call, it sends a BYE request instead of an ACK. D. Locating a User A callee may move between a number of different end systems over time. The locations of these can be dynamically registered with the SIP server. A location server may use a multicast-based protocol to actively determine the end system where a user might be reachable. If a proxy server forwards a SIP request, it must add itself to the beginning of the list of forwarders noted in the headers. The RecordRoute option ensures that replies can take the same path back, ensuring correct operation through compliant firewalls and avoiding request loops. E. REGISTER A client uses the REGISTER method to register the address listed in the To header field with a SIP server. A user agent may register with a local server on startup by sending a REGISTER request to the wellknown "all SIP servers" multicast address "sip.mcast.net" (224.0.1.75), depending on what is implemented in the network. SIP user agents may listen to that address and use it to become aware of the location of other local users; however, they do not respond to the request. A user agent MAY also be configured with the address of a registrar server to which it sends a REGISTER request upon startup. Note: As SIP is implemented within the various networks of the Americas, rigorous test specifications are being performed. For example, Brazil (utilizing ETSI TS 102 027-2 V4.1.1 (2006-07), Conformance Test Specification for SIP) has reported that modifications were required to accommodate the realities of implementation. The Standards Coordination Group has encouraged contributions regarding experiences in implementation of standards, creation of test specifications, and recommendations for modifications to standards. 9.5 SIP-T The IETF Session Initiation Protocol Project INvestiGation (SIPPING) working group is chartered to document the use of SIP for several applications related to telephony and multimedia, and to develop 63 533576827 02.10.09 04.03.11 requirements for any extensions to SIP needed for those applications. One of those extensions is to support call/session control. SIP-T (SIP-Telephony) formerly known as SIP-BCP-T (SIP Best Current Practice for Telephony interworking) is a mechanism that uses SIP to facilitate the interconnection of the PSTN with SIP networks. SIP-T is more of an interface agreement on a collection of standards as opposed to a separate protocol. SIP-T messages carry further sub-messages, such as the complete PSTN User Part message for signaling information and SDP (Session Description Protocol) messages for conveying connectivity end-point information and media-path characteristics. As with SIP, SIP-T directly negotiates a media connection between gateways. Endpoint information is carried in SDP from which can describe both IP and ATM endpoints. SIP-T is still a work in progress in the IETF. RFC 3372 (best current practice) provides a description of the uses of PSTN-SIP gateways, uses cases, and identifies mechanisms necessary for interworking. RFC 3398 (proposed standard) describes a way to perform the mapping between the Session Initiation Protocol (SIP) and the ISDN User Part (ISUP) of Signaling System No. 7 (SS7). In addition, RFC 3578 (proposed standard) describes a way to map ISUP overlap signaling to Session Initiation Protocol (SIP). 9.6 Q.1912.5 ITU-T Recommendation Q.1912.5 (Interworking between Session Initiation Protocol (SIP) and Bearer Independent Call Control or ISDN User Part) defines the signalling interworking between BICC or ISUP protocols and SIP with its associated Session Description Protocol (SDP) at an Interworking Unit (IWU). TRQ.2815 (Requirements for Interworking BICC/ISUP Network with Originating/Destination Networks based on SIP and SDP) specifies the set of common capabilities required to interwork between SIP and BICC.ISUP for three different profiles. Profile A was defined to satisfy the demand represented by 3GPP in TA 24.229 V5.1.0 (2002-06). The work on this protocol was driven by mobile operators and vendors. Profile B complements Profile A, and both of them are intended to support traffic that terminates within the SIP network. Profile C supports the trunking of traffic via transit SIP networks using MIME encoded encapsulated ISUP (SIP-I). Figure 3 describes the main scope of each profile defined in TRQ.2815. An agreement between the IETF and ITU-T on how to align these efforts (SIP-T and Q.1912.5) has not been reached. Q.1912.5 was approved on March 2004. Use of SIP/SIP-I Interworking 64 533576827 02.10.09 04.03.11 9.7 H.323 ITU-T Recommendation H.323 (Packet-based Multimedia Communications Systems), [4], addresses how PC telephones or existing telephones via adaptors can be connected to packet networks and inter-work with circuit-switched public telephony networks through gateways. H.323 is part of a larger series of standards that enable videoconferencing across a range of networks. Known as H.32X, this series includes H.320 for narrowband ISDN (N-ISDN), H.321 for broadband ISDN (B-ISDN) and H.324 for General Switched Telephone Network (GSTN) communications. The following diagram illustrates the H.323 protocol stack. Audio Video G.711 G.722 G.723 G.728 G.729 H.261 H.263 Data System Control User Interface H.225 T.120 Call Control RAS H.245 Control RTP/RTCP UDP or TCP UDP IP Lower Layers Vary H.323 Protocol Stack Communications under H.323 are a mix of audio, video, data and control signals. H.323 includes: H.245 for control, H.225.0 for connection establishment, H.332 for large conferences, H.450.1, H450.2 and H.450.3 for supplementary services, H.235 for security, and H.246 for interoperability with circuit-switched services. Audio capabilities, RTP/RTCP media transport, call setup, Registration, Admission and Status (RAS) control and H.245 signaling are required components; all other capabilities, including video and data are optional. The H.323 standard employs a peer-to-peer model in which the source terminal and/or the gateway is a peer of the destination terminal and/or gateway. It optionally requires a gatekeeper function analogous to a connection manager. H.323 is most applicable for implementation in end-points that have integrated 65 533576827 02.10.09 04.03.11 processing power. These include PC-based Internet Telephony clients and VoIP gateways integrated with PBX and key systems with inherent call-processing power. H.323 is the most widely employed standard among first-generation Internet Telephony solutions. H.323 is a relatively mature set of standards. The first version was approved in 1996 by the ITU-T Study Group 16. Version 2 was approved in January 1998 and version 3 in September 1999. SG 16 approved version 4 in November 2000, Version 5, in July 2003 and Version 6 in June 2006. Version 7 was approved in December 2009. The Implementer’s Guide for H.323 Systems document contains a compilation of reported defects identified in the versions of ITU-T Recommendation H.323 and its related Recommendations currently in force. One of the advantages of using a more mature protocol such as H.323 is that there has been significant interoperability testing leading to multi-vendor interworking. The International Multimedia Teleconferencing Consortium (IMTC) holds several H.323 interoperability events each year since October 1996. These vendor-only events allow developers to do pair-wise testing with other vendors and lead to multi-vendor inter-working as well help to fix inconsistencies in the standard. More than 50 vendors have participated in these events. One of the biggest advantages of H.323 is the maturity and the large degree of multi-vendor interoperability. Further enhancing the domain of H.323, both the IMTC and iNOW! Working Group have been developing profiles of the H.323 standard for specific applications. Interoperability testing of iNOW! profiles is currently being included in the IMTC interoperability events. Note: As H.323 is implemented within the various networks of the Americas, rigorous test specifications are being performed. For example, Brazil (utilizing ETSI TS 101 804-2 V2.1.1 (2004-11) – Conformance Test Specification for ITU-T H.225.0 (Terminal, Gatekeeper and Gateway) has reported that modifications were required to accommodate the realities of implementation. The Standards Coordination Group has encouraged contributions regarding experiences in implementation of standards, creation of test specifications, and recommendations for modifications to standards. ***** 66 533576827 02.10.09 04.03.11 10 Access Standards A proliferation of access technologies has emerged to address the need for higher bandwidth and to provide competitive carriers with a means to directly reach customers. Among the different wired infrastructure technologies we have Cable, xDSL, fiber and power lines. In the wireless infrastructure space we have satellite, wireless LAN, IMT-2000 and Fixed Wireless. Within the ITU-T, the study and development of Recommendations related to access networks standards is being carried out in a number of different Study Groups, e.g., SG 9, 13, 15, 19. Moreover, ITU-R (SG 8 and 9) and other standards bodies, forums and consortia are also active in this area. 10.1 Wired Access Standards 10.1.1 Digital Subscriber Line (DSL) Access Standards DSL services [10] of various types (HDSL, SDSL, ADSL, and VDSL) can be provided via the NGN by developing corresponding cards in the access gateways. High Data Rate DSL (HDSL) is an alternative form of T1, using more advanced techniques than the original T12, extending the range to 12,000 feet. However, it requires two copper pairs. HDSL is not well suited for residential broadband access application. HDSL is sometimes deployed for PBX access, and within the feeder network for aggregation of ISDN BRI lines. Single Line DSL (SDSL) is the single line version of HDSL. SDSL is somewhat more suitable for residential usage since it only requires one copper pair. However, since much higher downstream rates can be achieved by ADSL, it is unlikely that SDSL will be used for residential access. Asymmetric DSL (ADSL) is the technology most suitable for residential access, with rates of up to 6 Mbit/s for downstream and up to 640 kbit/s for upstream, depending on distance and configuration options. ADSL operates in a frequency band above POTS, leaving POTS service independent and undisturbed; even if a premise’s ADSL modem fails. Most ADSL systems are still centralized around central offices, where Asymmetric Digital Subscriber Line Access Mulitplexors (ADSLAMs) are installed. The use of remote ADSLAMs would allow higher penetration of DSL systems into rural areas. However, the length of the line is not the only consideration or impediment to ADSL provisioning. Another consideration is the number of pairs used for ADSL in a given cable due to interference considerations. Thus, larger pair cables do not necessarily carry larger number of DSL circuits. The following distance limits are typical under favorable circumstances: 1.5 Mbit/s up to 18,000 feet and six Mbit/s up to 9,000 feet. The requirements for ADSL systems are specified in ANSI T1.413-1998 -Network and Customer Installation Interfaces – Asymmetric Digital Subscriber Line (ADSL) Metallic Interface. ITU-T Recommendations G.992 appears to be the most suitable for residential broadband access. It is expected that G.992.2 will be the standard of choice for the immediate future, being the simplest solution capable of meeting the 1.5 Mbit/s near term requirement. It is understood that the ITU-T recommendations G.992 are compatible with ANSI T1.413-1998. VDSL (Very high speed DSL) standards have been developed in various standards bodies. ITU-T Recommendation G.993.1 (approved in June 2004), known as VDSL or VDSL1, supports up to 26 Mb/s over distances up to 50 meters on short loop such as from fiber to the curb. VDSL is currently being introduced to deliver video services over existing phone lines. 2 T1 operates at 1.544 Mbit/s and requires repeaters every mile or so. 67 533576827 02.10.09 04.03.11 VDSL2 (an enhancement to G.993.1) is specified by ITU-T Recommendation G.993.2 (approved in Feb. 2006). This standard specifies 8 profiles that address a range of applications including up to 100 Mb/s symmetric transmission loops about 100 meters long, and asymmetric operation with downstream rates in the range of 10 – 40 MB/s on loop of lengths ranging from 3 km to 1 km. VDSL2 will allow operators to offer services such as high-definition TV (HDTV), video-on-demand, videoconferencing, high speed Internet access and advanced voice services like VoIP, over standard copper telephone lines. The DSL Forum has produced a number of Technical Reports (TR), containing requirements for ADSL and support for IP access over DSL. Conformance requirements for both ANSI T1.413 and G.992.2 are specified in TR-026 and TR-033 respectively. Testing requirements are specified in TR-023, TR-029, and TR-031. 10.1.1.1 ATM over ADSL The recommendations for the ATM capabilities are described in DSL Forum TR-017. TR-017 addresses the control and management planes as well as the ATM user (data) plane. It includes ATM PVC support, signaling for SVC support and operations and maintenance functionality to support ATM over DSL. Note: According to information obtained from the DSL Forum, most deployments of DSL using ATM use PVCs with Unspecified Bit Rate (UBR). SVCs with specific QoS are expected to be widely deployed. The scope of TR-017 is to provide a specification for the transport of ATM over ADSL that is consistent with the ADSL PHY Recommendations ANSI T1.413, ITU-T G.992.1, and ITU-T G.992.2. 10.1.1.2 AAL5 over ATM ATM Adaptation Layer 5 (AAL5) is defined in I.363.5, Type 5 AAL, and provides a frame based transport mechanism. 10.1.1.3 Protocol ‘x” over AAL5 RFC 2684 (Proposed Standard), Multi-protocol Encapsulation over AAL5, is the standard for encapsulating protocols over AAL5. Note: When PPP is to be carried over ATM, RFC 2364 applies (see section 10.1.2.1.2). 10.1.2 IP Access Requirements TR-043, Protocols at the U Interface for Accessing data Networks using ATM/DSL, describes five different protocol stacks for access. These are shown in Figure 5 below. 68 533576827 02.10.09 04.03.11 PPPoA IP/ Eth PPPoE IP/AAL5 L2TPoA IP PPP PPP PPPoA Ethernet PPPoE PPP Ethernet L2TP LLC or VC Mux AAL5 ATM DSL Protocol stacks for Access to IP networks All five stacks utilize AAL5 over ATM over DSL. Using ATM over the DSL segment has the advantage of being compatible with ATM networks. Thus, in some cases the DSL portion of the access may feed into an ATM network for connection to an ISPs point-of-presence. In other cases, the ISPs POP may be connected to the DSL termination point, either directly or indirectly without the use of an intervening ATM network. Three of the stacks make use of PPP (Point-to-Point Protocol). Once ATM layer connectivity is established between the customer premises and the service provider network, the session setup and release phases at the link level and network level can be established using PPP. Two of the stacks encapsulate Ethernet over AAL5, allowing the Ethernet used within the end-customer premises to be bridged on to the access network. DSL Forum Technical Report TR-044 specifies procedures for auto-configuration. As far as IP is concerned, in three cases it is carried over PPP. In one case, it is carried over Ethernet, and in the other, it is carried directly over AAL5. As far as ATM is concerned the requirements are as specified by the ATM Forum. The ATM service may be SVC or PVC. For ATM SVC service, use of UNI 3.1 (ATM Forum af-uni-0010.002, 1994) is mandatory and UNI 4.0 (ATM Forum af-sig-0061.000, July 1996) may be required and it is strongly recommended. Notes: 69 533576827 02.10.09 04.03.11 (1) (2) At the user’s premises some modems may include options to accommodate various stacks, and yet deliver at the T interface a simple IP over Ethernet interface. Network Interface Cards (NICs) may also be inserted directly into PCs. The precise arrangements vary not only from network to network but also on the packaging of transmission and protocol functionalities, among the modem, router, and/or PC components. At the concentration point, ADSL Access Multiplexors (ADSLAMs or just called DSLAMs) will be used. Again, the bundling or packaging of transmission and protocol functions may vary, and this may affect the nature of third party peering arrangements. 10.1.2.1 PPP (Point-to-Point Protocol) PPP allows specific sessions to be set up and torn down. This means that a session does not have to be permanently “on” and PPP provides mean for security, and authentication, authorization and accounting. It is particularly useful for “dial up” connections, and in this case for ATM SVCs, but it can also be used in other situations. PPP is specified in RFC 1661 (Standard). RFC 2153 – PPP Vendor Extensions, provides updates to RFC 1661 10.1.2.1.1 IP Considerations The PPP protocol suite offers a number of IP “helper” functions as outlined above. Other considerations include address allocation/resolution. The Dynamic Host Configuration Protocol (DHCP) specified in RFC 2131 (Draft Standard) is commonly employed for address configuration. In systems where DHCP is not used, manual allocation and configuration may be necessary. In some cases the Address Resolution Protocol defined in RFC 826 (Standard) may be required. RFC 3396 Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4), provides updates to RFC 826. Note: PPP may become the protocol of choice because of its session related capabilities. 10.1.2.1.2 PPP over AAL5 This is specified in RFC 2364 (Proposed Standard), PPP over AAL5. This approach is used when the ATM network is used as a point-to-point link and PPP functions are required. The DSL Forum requires the null encapsulation (VC multiplexing) form to be the default. 10.1.2.1.3 PPP over Ethernet This is specified in RFC 2516 (Informational), Method for Transmitting PPP Over Ethernet (PPPoE). PPPoE allows session features of PPP to be used (see 10.1.2.1). 10.1.2.1.4 IP over AAL5 IP can be encapsulated directly over AAL5 without an intervening Ethernet or PPP, as specified in RFC 2684. There is no session demarcation in this case. 70 533576827 02.10.09 04.03.11 10.1.2.1.5 IP over Ethernet This is a well-established solution, and is specified in RFC 1042 (Standard), “Standard for the transmission of IP datagrams over IEEE 802 networks”. 10.1.2.1.6 Layer 2 Tunneling Protocol (L2TP) RFC 2661 (Proposed Standard) defines a Layer 2 Tunneling Protocol (L2TP). This protocol allows an L2TP Access Concentrator (LAC) to be inserted between the user and the network server for the carriage of PPP. 10.1.3 Cable Access Standards The CableLabs PacketCable initiative is aimed at developing interoperable interface specifications for delivering real-time multimedia services over two-way cable plants. Built on top of cable modem infrastructure, PacketCable networks will use IP technology to enable a wide range of multimedia services, such as IP telephony, multimedia conferencing, interactive gaming, and general multimedia applications. CableLabs has taken the approach for defining specifications relating to the entire VoIP architecture where the only type of line access considered is via Cable HFC. These specifications are undergoing some maintenance but are relatively stable. Data Over Cable Service Interface Specification (DOCSIS) was developed by CableLabs to define the access network between the head end or cable-modem termination system (CMTS) and the home modem interface. Three successive DOCSIS versions have been issued: DOCSIS 1.0 (High Speed Internet Access) and 1.1 (Voice, Gaming, Streaming) can deliver up to 40Mbps downstream and 10Mbps per channel upstream (shared bandwidth). ). This version was ratified as ITU-T Rec. J.112 in 1998. DOCSIS 2.0 (Capacity for Symmetric Services) supports a peak upstream rate of 30Mbps. This specification was approved by the ITU-T as J.122 in 2007. DOCSIS 3.0 (Management over IPv6 and channel bonding) supports a peak upstream rate of 30Mbps. This specification was approved by the ITU-T as J.222 in 2007. 10.2 Wireless Access Standards The main areas of ITU standards activities on IMT-2000 are distributed in Telecommunications Standardization (ITU-T), the Radiocommunication (ITU-R) and the Telecommunications Development (ITU-D) Sectors. The ITU-T Study Group 13 "Future networks including mobility and NGN", among its responsibilities, includes responsibility for studies related to network aspects of mobile telecommunications networks, including International Mobile Telecommunications, wireless Internet, convergence of mobile and fixed networks, mobility management, mobile multimedia network functions, internetworking, interoperability and enhancements to existing ITU-T Recommendations on IMT. In order to obtain Global Roaming, the IMT-2000 project formed two groups for the standardization of terrestrial networks: 1) 3GPP (3rd Generation Partnership Project) to develop the evolution of the Global System for Mobile Communications (GSM) towards the Universal Mobile Telecommunications System (UMTS) and 2) 3GPP2 to develop the evolution of the Interim Standard 95 (IS-95) towards the Code Division Multiplex Access 2000 (CDMA 2000). 71 533576827 02.10.09 04.03.11 Another wireless access standard is IEEE.802.16, nicknamed WiMAX and also called now “World Interoperability for Microwave Access”. This standard enables broadband speeds over wireless networks. The ITU-R has recently approved Recommendation F.1763 on "Radio interface standards for broadband wireless access systems in the fixed service operating below 66 GHz" which recommends IEEE Std 802.16-2004. 10.2.1 Broadband Wireless Access (IEEE 802.16) WiMAX There is a tremendous growth in wireless applications and services and the world is witnessing increasing demand for multimedia and broadband applications. Networks are moving towards packet-based services and are becoming IP centric and worldwide convergence is taking place in which wireless medium plays a critical role. In this respect the boundaries between 3G and Broadband Wireless Access (BWA) are rapidly being blurred and that these solutions can complement each other very effectively. The IEEE 802.16e Task Group (Mobile WirelessMan) released on February 2006 its standard “Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands”. The first IEEE 802.16 standard was approved in December 2001 and was followed by three amendments – 802.16a, 802.16b and 802.16c to address issues of radio spectrum, quality of service and inter-operability, respectively. Another amendment, 802.16e addressing mobility was finalized in 2005. Although the 802.16 family of standards is officially called WirelessMAN, it has been dubbed WiMAX by an industry group called The WiMax Forum. The mission of the Forum is to promote and certify compatibility and interoperability of broadband wireless products. Now the acronym WiMAX expands to "Worldwide Interoperability for Microwave Access". WiMAX is a wireless broadband technology, which supports point to multi-point (PMP) broadband wireless access over long distances with high throughput. WiMAX works in a very different way than Wi-Fi (IEEE Wireless LAN standard 802.11). WiFi uses contention access through its Media Access Controller (MAC), meaning that all subscriber stations compete for access points on a random basis, which can cause that distant nodes maybe interrupted more than closer nodes, reducing their throughput and for that not very suitable for services such as VoIP, IPTV, etc. WiMAX instead, uses a scheduling MAC, meaning that subscriber stations only compete once for the initial entry into the network. Once they enter, they are allocated a time slot by the base station. This time slot is not always the same length but it remains assigned to the subscriber station, not being able to be used by others. The scheduling mechanism allows the base station to control the Quality of Service (QoS). The ITU-R approved on April 2006 Recommendation ITU-R F.1763 on "Radio interface standards for broadband wireless access systems in the fixed service operating below 66 GHz." This standard, developed by ITU-R Study Group 5, recommends IEEE Std 802.16-2004 as well as the compatible ETSI BRAN HIPERMAN standard. 10.2.2 IMT-2000 (3GPP, 3GPP2) 10.2.2.1 3GPP The 3GPP is an organization formed by several partners. These are: the Association of Radio Industries and Businesses (ARIB) and the Telecommunication Technology Committee (TTC) of Japan; the 72 533576827 02.10.09 04.03.11 European Telecommunications Standards Institute (ETSI); the Alliance for Telecommunications Industry Solutions (ATIS) of USA and the Telecommunications Technology Association (TTA) of Korea. As mentioned above, 3GPP is developing the evolution of GSM towards UMTS. GSM uses Time Division Multiplexing (TDMA) to allocate the different voice and signaling channels and it has digital call quality on both types of channels, which means that it is considered a second generation (2G) mobile phone system. GSM is an open standard developed by the 3rd Generation Partnership Project (3GPP). Most GSM networks operate in the 900 MHz or 1800 MHz bands. UMTS represents an evolution in terms of capacity, data speeds and new service capabilities from second generation mobile networks. UMTS is a key member of the global family of third generation (3G) mobile technologies. 3G/UMTS offers mobile operators significant capacity and broadband capabilities to support greater number of voice and data customers plus higher data rates at lower incremental cost than 2G. 3G/UMTS has been specified as an integrated solution for mobile voice and data with wide area coverage. 3G/UMTS uses WCDMA (Wideband Code Division Multiple Access) as the radio access technology. This technology is based on a radio technique with a wideband spread-spectrum proposed by ETSI Alpha group and its specification was finalized in 1999.While using an automatic international roaming, 3G/UMTS ads integral security and billing functions, allowing operators to migrate easily from 2G to 3G. 10.2.2.2 3GPP2 GPP2 is also an organization formed by several partners. They are: the Telecommunications Industry Association (TIA) of US, the ARIB/TTC of Japan, the TTA of Korea and the China Wireless Telecommunication Standard Group (CWTS). As also mentioned before, 3GPP2 is developing the evolution of IS-95 towards CDMA 2000. IS-95 (Interim Standard 95) is the first Code Division Multiplex Access (CDMA) based digital cellular standard pioneered by Qualcomm. IS-95 is also known as TIA-EIA-95. [3] It is a 2G mobile telecommunications standard that uses CDMA a multiple access scheme for digital radio to send voice, data and signaling data (such as a dialed telephone number) between mobile phones and cell sites. The transmission is done in streams of bits. CDMA permits several radios to share the same frequencies and unlike TDMA (Time Division Multiple Access), a competing system used in GSM, all radios can be active all the time, because network capacity does not directly limit the number of active radios. Since larger numbers of phones can be served by smaller numbers of cell-sites, CDMA-based standards have a significant economic advantage over TDMA-based standards, or the oldest cellular standards that used frequency division multiplexing. IS-95 is now being supplanted by IS-2000 (CDMA2000), a later CDMA-based standard. It is used in the USA, South Korea, Canada, Mexico, India, Israel, Australia, Venezuela and China. CDMA2000 has already been implemented to several networks and is fully backwards compatible with IS-95B. CDMA2000 is not constrained to only the IMT-2000 band, but operators can also overlay a CDMA2000 1x system, which supports 144 kbps now and data rates up to 307 kbps in the future, on top of their existing previous versions of CDMA networks. 73 533576827 02.10.09 04.03.11 The evolution of CDMA2000 1x is labeled CDMA2000 1xEV. 1xEV will be implemented in steps: 1xEV-DO and 1xEV-DV. 1xEV-DO stands for "1x Evolution Data Only". 1xEV-DV stands for "1x Evolution Data and Voice". Both 1xEV CDMA2000 evolution steps will use a standard 1.25 MHz carrier. 1xEV-DO probably will be available for CDMA2000 operators during 2002 and 1xEV-DV solutions will be available approximately late 2003 or early 2004. CDMA2000 1x EV-DO and CDMA2000 3x are ITU-approved, IMT-2000 (3G) standards. CDMA2000 3x is part of what the ITU has termed IMT-2000 CDMA MC (Multi Carrier). It uses less that 5 MHz spectrum (3x 1.25 MHz channels) to give speeds of over 2 Mbps. CDMA2000 1x with lower data speed is considered to be a 2.5G technology. 3GPP updates a new release of the UMTS standard almost each year, the first one was R99 and then there were: Rel4, Rel 5, Rel 6, Rel 7, Rel 8, Rel 9 and now is currently working on Rel 10. 3GPP is now working on Long Term Evolution (LTE), which will build on UMTS, as the industry looks beyond 3G. ITU-T Recommendation Q.1741.6 “IMT-2000 References to Release 8 of GSM evolved UMTS Core Network” was prepared by ITU-T SG 19 but uses parts of the 3GPP organization standards. The Core Network for this IMT-2000 family member referred to as “3GPP Release 6” is based on evolved Core Network from the 3rd generation release 1999. This core network supports both 2nd and 3rd generation radio access networks as options. This Recommendation identifies a release of the IMT-2000 Family Member, “GSM evolved UMTS Core Network”. This release of the Family Member is known to the Standards Development Organizations (i.e., ARIB, CCSA, ETSI, ATIS, TTA, and TTC) as the “3GPP Release 6”. Earlier releases, known as “3GPP Release 99”, “3GPP Release 4”, “3GPP Release 5”, “3GPP Release 6”, “3GPP Release 7” of this Family Member are specified in the Recommendation Q.1741.1, Q.1741.2, Q.1741.3, Q.1741.4, and Q.1741.5, respectively, while other IMT-2000 Family Members are specified in other Recommendations in the Q.174x series. Previous versions of this Recommendation were called “GSM evolved UMTS Core Network with UTRAN Access Network” where UTRAN stands for UMTS Terrestrial Radio Access Network. UTRAN is a wireless access network that can carry many traffic types including Circuit Switched and IP Packet Switched data flows. UTRAN allows connectivity between the UE (user equipment) and the core network. As explained above, UMTS uses code division multiple access (CDMA). The UTRAN contains the base stations, which are called Node Bs and Radio Network Controllers (RNC). Nodes Bs are base transceiver stations which uses WCDMA as air transport technology. The RNC provides control functionalities for one or more Node Bs. A Node B and an RNC can be the same device, although typical implementations have a separate RNC located in a central office serving multiple Node B's. Despite the fact that they do not have to be physically separated, there is a logical interface between them known as the Iub. The RNC and its corresponding Node Bs are called the Radio Network Subsystem (RNS). There can be more than one RNS present in an UTRAN. ITU-T Draft new Recommendation Q.1742.8: IMT-2000 References to ANSI-41 (approved January 31, 2010) evolved Core Network with cdma2000 Access Network has been submitted for consent by ITU-T SG 13 in July 2010. This Recommendation identifies the IMT-2000 Family Member; “ANSI-41 evolved 74 533576827 02.10.09 04.03.11 Core Network with cdma2000 Access Network.” This set of referenced specifications includes those 3GPP2 specifications that were approved as of 31 January 2010. The Core Network interfaces identified in this recommendation and the radio interfaces and radio access network interfaces identified in ITU-R Recommendation M.1457, Specifications of the radio interfaces of International Mobile Telecommunications-2000 (IMT-2000), constitute a complete system specification for the 3rd generation mobile system for terrestrial usage of this IMT-2000 Family Member. In the event that a referenced specification also includes material that specifies any of the radio aspects of this IMT2000 family member, ITU-R Recommendation M.1457, shall take precedence. ***** 75 533576827 02.10.09 04.03.11 11 Transport Standards Next Generation Networks (NGN) are IP-based networks that are able to provide a wide variety of services, which can be carried over multiple broadband transport technologies. The main characteristic in the architecture of NGN is that service-related functions are independent from underlying transportrelated technologies by separating them into two distinct strata: 1) the service stratum and 2) the transport stratum, as it is explained in ITU-T Recommendation Y.2011, General principles and general reference model for NGN [1]. 11.1 Requirements for Transport Functions Transport networks should be able to carry any service over IP, whatever technology they are based on. They provide connectivity for all components and physically separated functions within the NGN. Transport functions include access network functions, edge functions, core transport functions and gateway functions. These functions are defined and described in ITU-T Recommendation Y.2012, Functional Requirements and Architecture of the NGN [2]. 1) 2) 3) 4) The access network functions provide end users’ access to the networks and also collect and aggregate traffic from/to end users to/from the core network. The edge functions aggregate traffic coming from different access networks and merge them into the core transport network. These functions are also present between core transport networks. The core transport functions should provide QoS mechanisms on user traffic within the core network. The gateway functions should provide capabilities to interwork with end-user functions and/or other networks. Transport Technologies and their evolution The services provided by an NGN, can be carried over multiple broadband transport technologies. IP is a layer 3 technology in the OSI model. It can be transported over layer 2 technologies, such as Ethernet (MAC layer), MPLS, etc., and these can be carried over layer 1 (physical layer) technologies, such as Ethernet-PHY, SDH, OTN. IP can also be carried directly over SONET/SDH and OTN, but in this case, as in the case of MPLS, the transport network will need the help of frame delineating protocols, such as the Generic Framing Procedure (GFP) [3] or Point-to-Point Protocol (PPP) [4]. 11.2 Circuit-switched technologies Traditional SONET/SDH and OTN (Optical Transport Networks) are L1 (physical) circuit switched technologies, however, at present these technologies are provided with packet capabilities at the edge of the circuit transport network. 11.2.1 SONET/SDH SONET (Synchronous Optical Network) was specified by North American standards bodies in the late 1980s. It was submitted to the international standards bodies as a proposed international standard. After some negotiation, SDH (Synchronous Digital Hierarchy) emerged as the international standard, of which SONET can be considered a subset. The main reason for developing the SONET/SDH standards [5], was to allow the deployment of multivendor optical networks. SONET/SDH has also more comprehensive network management features. 76 533576827 02.10.09 04.03.11 SONET/SDH has been later adapted to transport packet protocols such as IP. The protocol that allows the transport of packets over SONET/SDH is called Packet over SONET/SDH (PoS); it is highly scalable and provides legacy support, by interworking with existing SONET/SDH architectures. 11.2.2 Optical Transport Network (OTN) The Optical Transport Network (OTN), or digital wrapper, is defined and specified in ITU-T Recommendations G.709 [6] and G.798 [7]. It provides an efficient way to multiplex services onto optical light paths. OTN can transport side-by-side, synchronous services with different clock sources, and it can also mix both synchronous and asynchronous signal types on a common wavelength. But, the main advantage claimed by OTN enthusiasts of OTN over SONET/SDH networks, is service transparency and multiple monitoring levels. SONET/SDH has only two monitoring levels (at the section and multiplex levels). NGN are multi-service networks. When they are transported over SONET/SDH, they cannot access SONET/SDH overhead bytes or the DCC (Data Control Channel) that carries all the management bytes. A traditional SONET/SDH network, strips out these bytes and breaks the end to end communication and topology discovery. OTN, instead, has its own separate overhead for performance monitoring and fault signalling. It also has a General Communication Channel (GCC) for remote management, software downloads and other control functions. 11.3 Packet-switched technologies In packet switching technologies such as Ethernet, ATM, MPLS, etc, many users share common physical resources, so that the infrastructure provided by a carrier can be more efficiently utilized. 11.3.1 Ethernet as NGN transport technology Ethernet has been the technology of choice for private and enterprise LANs and now multi-protocol Ethernet services are being offered over public transport networks. Public Ethernet services, the transport of Ethernet frames and implementation agreements are being debated in ITU-T, MEF, IEEE and other standards organizations. Specifically, the ITU-T SG15 is focused on developing Recommendations related to the support and definition of Ethernet services over traditional telecommunications transport, such as PDH, SDH, and OTN. 11.3.2 Ethernet network topologies Ethernet network topologies should be in support of the provided services. Ethernet services are being categorized in three types: Line services (E-line), which are point-to-point and include Ethernet private and virtual lines. These services are now being called “Duplex Ethernet”. LAN services (E-LAN), which are multi-point-to-multi-point (such as virtual LAN services). Access services (E-tree) are of hub-and-spoke nature and enable single ISP/ASP to serve multiple, distinct, customers. The Metro Ethernet Forum (MEF) has been modeling Ethernet service instances called Ethernet Virtual Circuits (EVCs). The services can be provided with different QoSs. A circuit switched technology, like SDH, provides always a guaranteed bit rate service, while a packet switched technology, like MPLS, can provide various service qualities from best effort traffic to a guaranteed bit rate service. Ethernet services can be provided for the Ethernet MAC layer (L2) or Ethernet physical layer (L1). 77 533576827 02.10.09 04.03.11 The Ethernet MAC layer provides end-to-end transmission of Ethernet MAC frames between Ethernet end-points of individual services, identified by their MAC addresses. Ethernet MAC layer services can be provided as Line, LAN and Access services over circuit switched technologies. 11.3.3 Evolution to "Carrier-class" Ethernet Although Ethernet was originally designed to be used in a LAN environment, it has become widely used in network operator's backbone or metro area networks. In addition, Ethernet can easily realize multipoint to multipoint connectivity. Carrier-class Ethernet is defined by five main attributes: 1) Standardized Services: E-LINE (Private line, Virtual Private Line); E-LAN (Private LAN and Virtual Private LAN); E-TREE (Hub and Spoke, work in progress in MEF). A ubiquitous service providing globally & locally via standardized equipment. Requires no changes to customer LAN equipment or networks and accommodates existing network connectivity including time-sensitive, TDM traffic and signaling. 2) Quality of Service Options of granularity of bandwidth and quality of service. Meeting requirements of Service Level Agreements (SLAs) for voice, video and data over converged business and residential networks. In alignment with SLAs, provide end-to-end performance based on the Committed Information Rate (CIR), frame loss, delay and delay variation characteristics. 3) Service Management Provides the ability to monitor, diagnose and centrally manage the network, using standards-based vendor independent implementations. Carrier-class OAM Rapid service provisioning 4) Scalability The possibility for network service usage by millions since carrier-class Ethernet can provide for a wide variety of business, information, communications and entertainment applications with voice, video and data. Being able to be transported by a wide variety of physical infrastructures implemented by a wide range of Service Providers. Scalability of bandwidth from 1 Mbps to 10 Gbps and beyond, in granular increments. 5) Reliability The ability for the network to detect & recover from faults without impacting users. Recovery time as low as 50 msecs. Some of the enhancements that “carrier-class” Ethernet has introduced to Ethernet are: 1) High bit rate and long reach interfaces Ethernet interfaces up to 10 Gbps and up to 40 km have been standardized by IEEE 802.3 working group (WG). Also, LAN-PHY (10GBASE-R) and WAN-PHY (10GBASE-W) have been standardized. WAN-PHY can be connected to SONET/SDH interfaces. 2) Ethernet-based access networks Ethernet capabilities as access networks have been enhanced by IEEE 802.3 WG (IEEE 802.3ah, defining point-to-point and point-to-multipoint optical transmission methods and link level Ethernet OAM. 3) Enhancement of scalability 78 533576827 02.10.09 04.03.11 VLAN technology is widely used to provide customers with logically independent networks, while sharing network resource physically. The use of two VLAN IDs in a frame allows the network to provide up to 4094 Service VLANs, each of which can accommodate up to 4094 Customer VLANs. 11.3.4 Issues that need to be completed in a “Carrier-class” Ethernet 1) Number of MAC addresses to be learned by bridges Bridges in a network automatically learn the source MAC addresses of incoming frames, but when there are many stations, in order to avoid consuming lots of resources of each bridge by the MAC learning, IEEE 802.1ah [8], Backbone Provider Bridges, is standardizing a method which encapsulates MAC addresses of user stations by backbone MAC addresses. In this way, bridges inside the backbone network do not learn MAC addresses of user stations. 2) Network Level OAM Network level OAM functions are being standardized in question 5 of ITU-T SG 13 and in IEEE 802.1ag [9] in close cooperation, in order to enable network operators manage their networks by detecting, localizing and, when possible, correcting faults and measuring their network performance. 3) Fast protection switching Fast protection switching (ITU-T Recommendation G.8031, [10] was standardized in question 9 of ITU-G SG 15. This survivability technology is added to the existing Link Aggregation and Rapid Spanning Tree protocol [11]. 4) QoS traffic control / traffic conditioning QoS, traffic control and traffic conditioning issues are being studied by ITU-T (SG12), IEEE 802.3 and the Metro Ethernet Forum (MEF). 11.3.5 Present standards activities on Ethernet In ITU-T: ITU-T SG 15 approved the following Recommendations in June, 2006: 1) 2) 3) G.8001/Y.1354,Terms and definitions for Ethernet frames over Transport (EoT) [12]. G.8031/Y.1342, Ethernet Protection Switching [13]. G.8601/Y.1391, Architecture of service management in multi bearer, multi-carrier environment [14]. ITU-T SG 13 approved Recommendation Y.1731, OAM Functions and Mechanisms for Ethernet based networks in May 2006 [15]. Multiple Domain Management is work in progress to be included in next version of Y.1731. In IETF: IETF published RFC 4448, Encapsulation Methods for Transport of Ethernet over MPLS Networks in April 2006 [16]. This RFC has been discussed in PWE3 Working Group. IETF L2VPN Working Group is discussing several drafts on Virtual Private LAN Service (VPLS) In IEEE: There are two Working and Technical Advisory Groups: 802.1 is the High Level Interface Working Group that standardizes higher layers above the MAC (including Network level Ethernet OAM) mechanisms, Provider bridges and Provider Backbone bridges). 79 533576827 02.10.09 04.03.11 802.1ag is working on Service OAM flows at multiple levels. 802.3 is the CSMA/CD Working Group that standardizes the MAC and the Physical layer Ethernet, including Ethernet in the First Mile (this one was completed in 2004). In MEF: MEF has defined the different Ethernet services, is working on definition of E-TREE type of service (as seen above) and also on Multiple Domain Management for Ethernet. MEF is working on carrier-class Ethernet in its phase 2, MEF services, providing QoS models for multipoint and definitions of availability. 11.3.6 Similarities and differences between IP and “Carrier-class” Ethernet Ethernet is a L2 and IP is a L3 technology, however both of them are packet switched technologies, they scale globally, they both use dynamic topology protocols and both can provide protection, QoS and traffic engineering. But the differences between them are: 1) Connectivity IP can provide global any to any connectivity. Carrier-class Ethernet can provide global connectivity between provisioned sets of network interfaces. 2) Type of technology IP is a global network technology. Carrier-class Ethernet is a global Virtual Private Ethernet multiplexing technology. Each Virtual Private Ethernet is provisioned by the carrier. 3) Transport networks In the Enterprise, IP runs over Ethernet networks. In the Metro, IP will run over carrier-class Ethernet Virtual Private networks. 11.4 Transport MPLS (T-MPLS) MPLS was originally developed by IETF [17], [18], in order to address core IP router performance issues, however it has been used widely in carriers' converged IP/MPLS core networks, and as a platform for services such as IP-VPN. Transport MPLS (T-MPLS) is being standardized by ITU-T, which has adapted MPLS in order to obtain a “carrier-class” network. T-MPLS is purely connection-oriented packet transport network based on MPLS. It provides managed point to point connections to different client layer networks. It does not support connectionless packet technologies. T-MPLS is packet-based transport technology but it follows the same architectural, management and operational models than the classical circuit-based transport networks. T-MPLS is intended to provide an optimum evolution path for many carriers in their metro and access networks, as they transition to a packet-based future. T-MPLS is being offered as a possible solution to carriers concerns about strategy development for NGN evolution and PSTN replacements. It also considers scalability and management and reduction of OPEX. T-MPLS supports point-to-point and multi-point to multi-point Ethernet services. Discussions on TMPLS are taking place in ITU-T, MEF, IEEE and IETF. 80 533576827 02.10.09 04.03.11 11.4.1 Standards landscape for MPLS-T In ITU-T MPLS-T is being developed in SG 15: ITU-T Recommendation G.8101/Y.1355, Terms and Definitions for Transport MPLS [19], was approved in December 2006, and Recommendation G.8131, Protection switching for Transport MPLS networks [20], has just been approved in February 2007. ITU-T Recommendations G.8110.1/Y.1370.1, Architecture of Transport MPLS (T-MPLS) Layer Network [21] was approved in November 2006; G.8112/Y.1371, Interfaces for the Transport MPLS (T-MPLS) Hierarchy [22], in October 2006, and G.8121, Characteristics of multi-protocol label switched (MPLS) equipment functional blocks [23]; was approved in March 2006. In IETF: The T-MPLS concept was first developed in PWE3 working group. This concept is known as pseudowires in IETF. RFC 3985, The Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture [24] was approved in March 2005. All T-MPLS related work is being carried out at the PWE3 working group. CONCLUSIONS At present the preferred NGN transport technology seems to be Carrier-Grade Ethernet, however, it is not yet possible to consider it as the technology of choice to transport NGN services, as the Management of Ethernet networks and services is still under development. The management of networks and services is key to provide NGN services as these ones are mainly distinguished based on their QoS. T-MPLS is still under development but, so far, this technology does not seem to offer any special benefit, as it is mainly focused on the transport of Ethernet services. This means that if T-MPLS is used as a transport network, Ethernet will need to run over it to transport NGN services. SONET/SDH, OTN and/or Physical layer Ethernet will be the physical layer technologies over which any chosen transport technology for NGN, will be transported. REFERENCES [1] ITU-T Recommendation Y.2011, General principles and general reference model for Next Generation Networks (2004). [2] ITU-T Draft Recommendation Y.2012, Functional Requirements and Architecture of the NGN (formerly Y.NGN-FRA) version 0.8, July 2006. [3] ITU-T Recommendation G.7041, Generic Framing Procedure (GFP), Aug. 2005. [4] IETF RFC 1661, Point-to-Point Protocol, July 1994. [5] ITU-T Recommendation G.707, Network Node Interface for the Synchronous Digital Hierarchy (SDH), December, 2003. [6] ITU-T Recommendation G.709, Interfaces for the Optical Transport Network (OTN), March, 2003. [7] ITU-T Recommendation G.798, Characteristics of Optical Transport Network Hierarchy Equipment Functional Blocks, June 2004. [8] IEEE PAR approved, draft 3.3 of standard 802.1ah, Provider Backbone Bridges, Dec 2006. [9] IEEE PAR approved, draft 7.1 of standard 802.1ag, Connectivity Fault Management, Dec. 2006. [10] ITU-T Recommendation G.8031, Ethernet Protection Switching, pre-published, June 2006. 81 533576827 02.10.09 04.03.11 [11] IEEE supplement 802.1w, Rapid Reconfiguration of Spanning Tree, incorporated to 802.1D, MAC Bridges, 2004. [12] ITU-T Recommendation G.8001/Y.1354, Terms and definitions for Ethernet frames over Transport (EoT), June 2006 [13] ITU-T Recommendation G.8031/Y.1342, Ethernet Protection Switching, June 2006. [14] ITU-T Recommendation G.8601/Y.1391, Architecture of service management in multi bearer, multi-carrier environment, June 2006 [15] ITU-T Recommendation Y.1731, OAM Functions and Mechanisms for Ethernet based networks, May 2006. [16] IETF RFC 4448, Encapsulation Methods for Transport of Ethernet over MPLS Networks, April 2006. [17] IETF RFC 3031, Multiprotocol Label Switching Architecture, January 2001. [18] IETF RFC 3032, MPLS Label Stack Encoding, January 2001. [19] ITU-T Recommendation G.8101/Y.1355,Terms and Definitions for Transport MPLS, Dec. 2006. [20] ITU-T Recommendation G.8131/Y.1382, Linear protection switching for Transport MPLS (TMPLS) networks, Feb. 2007. [21] ITU-T Recommendations G.8110.1/Y.1370.1, Architecture of Transport MPLS (T-MPLS) Layer Network, November 2006. [22] ITU-T Recommendation G.8112/Y.1371, Interfaces for the Transport MPLS (T-MPLS) Hierarchy, October 2006. [23] ITU-T Recommendation G.8121/Y.1381, Characteristics of multi-protocol label switched (MPLS) equipment functional blocks, March 2006. [24] IETF RFC 3985, The Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture, March 2005. [Ref: P1!T-966_i.doc; 2007-03] 82 533576827 02.10.09 04.03.11 12 Management Standards 12.1 ITU-T SG 4 ITU-T SG 4 has published a roadmap identifying NGN management specifications. This roadmap provides an insight into how NGN management will differ from the management of traditional telecommunication. The NGN Management Specification Roadmap is an output of the NGN Management Focus Group, a group sponsored by ITU-T SG 4. The document identifies the various existing, or work-in-progress specifications relevant to NGN management. These specifications are not only ITU-T Recommendations, but also they come from other standards development bodies with expertise in defining management interfaces. For example, the roadmap tags the 3GPP (3rd Generation Partnership Project) specs for mobile telephony relevant to the IMS (IP Multimedia Subsystem) management. An additional and important feature of the document is that it provides gap analysis, identifying areas where standards are still needed, and also identifies overlapping specifications requiring harmonization. As NGN is expected to provide a wide variety of services with different QoS, it is essential for these networks to have effective Network Management for networks and services. Network Management includes: Operation and Management (OAM) mechanisms. These mechanisms allow to diagnose, monitor and measure impairments and the performance of networks and network elements (NEs) by using “horizontal” or East-West (between NEs) management information that follows the same path as the traffic information. This information results from specific OAM requirements. NGN Management related to FCAPS interfaces. FCAPS is the abbreviation for Fault, Configuration, Accounting, Performance and Security and, although in ITU-T terminology, FCAPS interfaces generally mean the “vertical” or North-South interfaces (NE to OS interfaces), and the interfaces between Operation Systems (OSs). This name is somehow misleading as the OAM functionality also provides information that is related to FCAPS. On the other hand, outside ITU-T the acronym FCAPS has different meanings. As a consequence, ITU-T has agreed, in its document called Terms of Reference v4.0 [1] of the NGN Management Focus Group, to call “management interfaces” to the ones that go from the Network Element (NE) to the Operation System (OS) or between different OSs. 12.1.1 NGN Network Management Focus Group The NGNMFG establishment was confirmed by SG 4 in February 2005 and re-confirmed in September 2005 and in May 2006. NGNMFG completed its activities in May 2008. The NGNMFG activities are part of the ITU-T NGN-GSI (NGN Global Standards Initiative). The general objective of the NGNMFG was to develop a solution for the management of NGN services and networks. This solution is a set of interoperable specifications, defining the management interface capabilities needed to support the ITU-T (including NGN-GSI) objectives for NGN Release 1. The solution is documented in the NGN Management Specification Roadmap [2]. [1] NGN Management Focus Group, Terms of Reference v.4.0. [2] NGN Management Focus Group, NGN Management Specification Roadmap v2.1, May 2006. 83 533576827 02.10.09 04.03.11 12.2 IETF 12.2.1 Simple Network Management Protocol (SNMP) The Simple Network Management Protocol (SNMP) consists of a simply composed set of network communication specifications that cover all the basics of network management in a method that poses little stress on an existing network. The largest advantage of using SNMP is that its design is simple, hence it is easy to implement on +a large network, for it neither takes a long time to set up nor poses a lot of stress on the network. SNMP provides for effective monitoring and control of heterogeneous devices on both local and wide area networks. The protocol is composed of 3 elements: the MIB, the manager, and the agent. IETF RFC 3410 (Informational) describes the SNMPv3. 12.2.2 NETCONF Configuration Protocol The IETF Network Configuration (netconf) Working Group is developing the NETCONF configuration protocol that provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML) based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized on top of a simple Remote Procedure Call (RPC) layer. ***** 84 533576827 02.10.09 04.03.11 13 Service Creation Standards 13.1 Intelligent Network Capability Set (IN CS-4) The ITU-T IN Capability Set 4 (IN CS-4), [5] represents an evolution from IN CS-3 (1997) and IN CS-3 (2000). The ITU-T IN CS- 4 Recommendations (Q.124x series) were frozen in December 2000 and got consent approval (second stage of the approval under the traditional approval process) in May 2001. IN CS-4 specifically related recommendations are: Q.1241, Introduction to Intelligent Network Capability Set-4; Q.1244, Distributed functional plane for intelligent network capability set-4; and Q.1248, Interface Specifications for Capability Set-4. Key features identified for IN CS-4 include enhancements to IN CS-2 and IN CS-3 capabilities, multiple points of control, feature interaction, IN-ISDN interworking (including supplementary services), number portability, support for operator services (e.g., prepaid, freephone), support for mobility (e.g., Virtual Home Environment), interworking with private networks, and support for IP networks. In particular, IN CS-4 support for IP networks includes many aspects of interworking between IP network services/applications and Intelligent Network services/ features. This includes full support for accessing IN from a SIP Proxy for implementing services that do not require explicit handling of the call configuration, full support for inter-working IN with Call Servers, based on the H.248 architecture for all types of services, and minimal support for accessing IN from H.323 Gatekeepers/SIP Proxy Server for implementing services that do not require explicit handling of the call configuration. Draft Recommendation Q.1244 describes in detail the distributed functional architecture for IN CS-4. The functional model for IN CS-4 is an extension of the IN CS-2 model, supporting the benchmark services discussed above. A large portion of Q.1244 addresses IN/IP interworking scenarios for a variety of systems including SIP systems, H.323 systems, PINT-based systems, SPIRITS-based systems. Distributed Service Logic Servers are also supported via standard API-based platforms (e.g., CORBA, JAIN). For each set of interworking scenarios functional entities are defined, functional models are created, requirements are listed, and issues affecting implementation are discussed. As an example of these scenarios, the functional architecture defined for IN/IP interworking to support SIP (Session Initiation Protocol) systems is shown below: 85 533576827 02.10.09 04.03.11 Intelligent Network IP Network SDF Signalling Transport Gateway Service/Application Layer SCF IF4 Intelligent SIP Proxy and Bearer Controller IF7 SRF SSF CCF IF5 SSF IF13 IF10 Call/Bearer Layer SIP SM CCF SIP TE UA IF12 MG RTP/RTCP Media Gateway Legend: IF4: INAP Signalling Service Control Bearer IF5: ISUP/BICC/SIP IF7: Extended INAP IF10: ISUP User Plane IF13: H.ISUP Use plane IF12: H.248/H.225 (ffs) A SIP based call control configuration using an intelligent SIP Proxy and Bearer Control Function Each interface between an IN network and IP-based network functional entity is defined with specific properties. Once these generic relationships are defined, specific services interworking between networks can be defined. To illustrate service interworking, it is instructive to look at the PINT and SPIRITS model. Functional entities are introduced to support PSTN/IN Interworking (PINT) and for a Service in the PSTN/IN Requesting InTernet Service (SPIRITS). The IETF PINT Working Group has developed a set of protocol extensions based on the Session Initiation and Session Description Protocols (SIP and SDP). A PINT server accepts PINT requests from PINT clients. It processes the requests and returns responses to the clients. Additionally, this function transfers data between IP-networks and the IN, and associates IP-network entities with the related entities in the gateway function. This function is situated at the edge of the IP-network domain, where the Application Association with the PINT Client/Server is the subject of standardization of the IETF and the Application Association with SCF in the IN domain is the subject of standardization in the ITU-T. The IETF SPIRITS Working Group defines services originating in the PSTN and requiring interactions between the PSTN and an IP network. This work is closely associated with PINT. To support these services (e.g., Internet Call Waiting, Internet Caller-ID Delivery, and Internet Call Forwarding), the following functional model was created: 86 533576827 02.10.09 04.03.11 Intelligent Network IP Network SDF IF17 SPIRITS Proxy IF16 SPIRITS Client Service/Application Layer IF1 IF15 SPIRITS Server PINT Client PINT Server PINT Gateway IF3 SCF IF2 IF4 SRF Call/Bearer Layer SSF CCF Legend: Management Signalling Bearer PINT/SPIRITS Example Configuration Support for third-party application development is a key component of next-generation networks and an important aspect of IN CS-4. Support for distributed logic servers requires the creation of the Service Application Gateway Function. This allows inter-working: (1) (2) between the service control layer in Intelligent and Distributed Service Logic applications. [These are Application Programming Interface (API)-based functions], and between the Call Manager Function and Distributed Service Logic. For IN CS-4, on the application level, the types of API based functionality may include: CORBA platforms, JAVA platforms, JAIN platforms, and other API based platforms. Additionally this functionality may provide protocol mapping/service mediation. Given the Interface between the “API for accessing Service Provider Applications” and the IP call control the following network architecture depicts the distribution of network intelligence. The Gateway Function (GF) will provide firewall/security functions necessary for the distributed service logic platform. 87 533576827 02.10.09 04.03.11 Intelligent Network IP Network IF9 SA GF GF Distributed Service Logic IF8 Service/Application Layer IF9 SCF SA GF SSF Call/Bearer Layer Legend: CCF CCF Management Signalling Bearer SA-GF implementation for distributed service logic support ***** 88 533576827 02.10.09 04.03.11 14 Security Standards To secure information in a network [11] there are three critical components that need to be considered. Authentication validates the identity of the party or parties participating in the exchange of information. Confidentiality protects against eavesdropping or monitoring of the information exchange. Integrity assures that the information has not been altered during transmission. The nature of IP makes it difficult to verify where the information comes from, and easy for an attacker to take advantage of this weakness by spoofing the IP address. Spoofing occurs when an attacker changes the source address in the IP packet. Determining where the attack is coming from is very difficult as the attacker keeps changing the source address. The importance of security is recognized by both the IETF and the ITU-T. There is a need to further understand all of the issues and implications. To address the Security problem, the IEFT created the Security Area and further subdivided the area into working groups. The ITU-T SG 17 (Data Networks and Telecommunication Software) has a security study group that targets security issues at all levels. The role of each organization is somewhat different. The IETF Security Area Advisory Group primary role is to provide help to IETF working groups on how to provide for security in the protocols they design. On the other hand, the ITU-T is focusing on the need for a global approach to the dissemination of information regarding the security of critical network infrastructures and ways to stimulate international or regional cooperation with respect to critical network infrastructure. 14.1 IP Security (IPSec) IPSec refers to a suite of IETF security protocols, RFC 4301 (Proposed Standard), that protect Internet communications through encryption, authentication, confidentiality, data integrity, anti-replay protection, and protection against traffic flow analysis. IPSec supports popular encryption methods at the network layer—such as Diffie-Hellman, DES, 3DES, MD5, and SHA1—and can adapt to new algorithms and standards as they emerge. The protocol suite provides the five components described below. 14.1.1 Security Associations (SAs) The function of the SAs is to provide a method for two parties to exchange secure data while both parties need to agree on the security parameters. "SAs" are defined for one-way traffic only, therefore for bidirectional traffic requires two "SAs" to be defined. The IPSec SA specifies the following parameters: AH authentication mode (Algorithm and Keys) ESP Encryption Algorithm How to exchange Keys How often the Keys are changed SA Lifetime SA source address 14.1.2 Authentication Header (AH) AH, defined in IEFT RFC 2402 (Proposed Standard) lets parties communicating using IP to verify that the data was not modified during transmission and that it comes from the original source of the information. The AH provides connectionless data integrity, data authentication and protects against replay attacks. The AH adds a block of code to the data packet that is the result of a “hash” function applied to the entire packet. There are 2 fields in the AH header that are important: Security parameter Index (SPI) specifies to the receiving device what group of security protocols the sender is using. 89 533576827 02.10.09 04.03.11 Sequence Number is used to prevent replay attacks by preventing the reprocessing of a packet multiple times. The Authenticator Field on the AH is only 96-bits long. The “sender” runs the “hash” functions, truncates the resulting number to fit in to the AH Authenticator field, and sends it off. On the other side, the receiver runs the same “hash” algorithm (as specified in the SPI) on the packet and truncates the resulting number accordingly. The receiver then compares both numbers. If they match it means that the number in the packet, has not being altered. The 2 most widely used AH “hash” algorithms are, Message Digest 5 (MD5) defined by IETF RFC 2403 (Proposed Standard) produces a 128-bit authenticator and Secure Hashing Algorithm (SHA-1) defined by RFC 2404 (Standard) produces a 160-bit authenticator. The AH does not keep the data confidential, and is meant for occasions when “ONLY” authentication is needed. 14.1.3 Encapsulation Security Payload (ESP) ESP, defined in IETF RFC 4303 (Proposed Standard), encrypts the information to prevent monitoring by a non-trusted entity. ESP can also be used for authentication. The ESP authentication field contains the cryptographic checksum that is computed over the remaining part of the ESP (minus the ESP authentication field itself). AH authentication differs from the ESP’s version in that the ESP authentication does not protect the IP header that precedes the ESP header. The ESP authentication can be used instead of the AH to reduce the packet processing as it performs one “transform” operation instead of two steps. It also prevents replay attacks by keeping track of the sequence number much like AH does, however this would compromise the validity of the header. There are two types of tunnel mode in both, the original IP header information is encrypted; the down side is that this does not work across NAT (Network Address Translation). In the transport mode the original IP header is not encrypted and it may work across NAT. ESP most widely used encryption schemes are: Data-Encryption Standard (DES) uses a 56-bit encryption IETF RFC 2405 (Proposed Standard) Triple DES (3DES) uses 168-bit encryption by passing the data through the DES algorithm 3 times IETF RFC 2405 14.1.4 Key Management The two most commonly used methods for key exchange are manual keying, which is suitable for a small number of sites; and Key Exchange by a protocol defined by IETF RFC 4306 (Proposed Standard) “Internet Key Exchange (IKE)”. “IKE” is the combination of “ISAKMP” and “Oakley”, the “Internet Security Association and Key Management Protocol (ISAKMP)” defined by IETF RFC 4306 (Proposed Standard) provides the framework for authentication and key exchange, and the Oakley protocol defined by IETF RFC 2412 (Informational) describes various modes of key exchange. 14.1.5 Manual Key Exchange Manual exchange is the easiest form of key management for a small number of sites. Both side of the IPSec tunnel must be configured manually with the appropriate keys. However there are many disadvantages with manual keying: Manual intervention is needed to update or change the keys. Since manual changing of keys is normally infrequent, the attacker has more time to crack the key and to decrypt data. There is a chance of error in configuration since the same key needs to be configured on the two different endpoints of the IPSec tunnel. 90 533576827 02.10.09 04.03.11 If the person with access to the keys leaves or becomes untrustworthy, lengthy configuration changes need to take place. The keys in the configuration need to be protected in some manner from outside attack. 14.2 Internet Key Exchange (IKE) “IKE” is defined in IETF RFC 4306 (Proposed Standard), and designed to provide four basic capabilities. A method for parties to agree on which protocols, algorithms and which keys to use, Assurances from the beginning of the exchange of the identity of the parties, Management of the keys, Assurance that key exchange is handled safely. “IKE” operates in two phases; in phase one, peers establish secure channels for performing key operations and negotiate general purpose “SAs” in phase two. There are three modes of exchanging keying information. The “Main Mode” establishes a secure channel with identity protection in phase one; the “Aggressive Mode” establishes a secure channel without identity protection in phase one; and the “Quick Mode” just negotiates general purpose “SAs” in phase two. 14.2.1 Main Mode The “Main Mode” provides a method for establishing the first phase of “IKE SA” which is used to negotiate future communication, in the first exchange the two parties agree on basic algorithm and hashes, in the second they exchange public keys for a “Diffie-Hellman” exchange and pass each other “nonce”. Nonce is a random number used by either party for verification purposes, or for adding randomness to a cryptographic key exchange. In “IKE” exchanges, one communicating party sends a “nonce” to the other party, which must be signed off with a digital signature by the other communicating party and send back to verify their identity. 14.2.2 Aggressive Mode In “Aggressive Mode” the proposing party generates a “Diffie-Hellman” pair at the beginning of the exchange proposing an “SA” and passing the “Diffie-Hellman” public value, then sending a “nonce” for the other party to sign, and sending an ID packet which the responder can use to check the identity with a third party. The responder then sends back all the information needed to complete the exchange. The end result is that it accomplishes the same as the main mode but with out identity protection for the communicating parties. 14.2.3 Quick Mode “Quick Mode” is used once the two communicating parties have established an “IKE SA” using “Aggressive Mode” or “Main Mode”. The main purpose of “Quick Mode” is to negotiate general-purpose “IPSec” services and the generation of fresh keys. “Quick Mode” works inside a secure tunnel and is less complex because all packets are encrypted starting with a hash payload composed of an agreed PRF (Pseudo Random Function) and the derived authentication key for the “IKE SA”. The hash payload is used to authenticate the rest of the packet. Key refreshing can be done by exchanging “nonces” through the secure channel and use it to hash the new keys; or to request an additional “Diffie-Hellman” exchange through the existing secure channel (SA) and change the key over the newly created secure channel. 14.3 Security Architecture for Systems Providing End-to-End Communications ITU-T Recommendation X.805, “Security Architecture for Systems Providing End-to-End Communications”, defines a network security architecture for providing end-to-end network security. This architecture can be applied to various kinds of networks where the end-to-end security is a concern 91 533576827 02.10.09 04.03.11 and is independent of the network’s underlying technology. This Recommendation defines the general security-related architectural elements that are necessary for providing end-to-end security. The objective of this Recommendation is to serve as a foundation for developing more detailed recommendations for the end-to-end network security. This security architecture was created to address the global security challenges of service providers, enterprises, and consumers and is applicable to wireless, optical and wire-line voice, data and converged networks. The architecture addresses security concerns for the management, control, and use of network infrastructure, services and applications. It provides a comprehensive, top-down, end-to-end perspective of network security and can be applied to network elements, services, and applications in order to detect, predict, and correct security vulnerabilities. The security architecture logically divides a complex set of end-to-end network security-related features into separate architectural components. This separation allows for a systematic approach to end-to-end security that can be used for planning of new security solutions as well as for assessing the security of the existing networks. Three architectural components are addressed: security dimensions, security layers and security planes. 14.3.1 Security Dimensions A security dimension is a set of security measures designed to address a particular aspect of the network security. This Recommendation X.805 identifies eight such sets that protect against all major security threats. The security dimensions are: 1. Access control 2. Authentication 3. Non-repudiation 4. Data confidentiality 5. Communication security 6. Data integrity 7. Availability 8. Privacy 14.3.2 Security Layers In order to provide an end-to-end security solution, the security dimensions must be applied to a hierarchy of network equipment and facility groupings, which are referred to as security layers. Recommendation X.805 defines three security layers: 1. Infrastructure Security Layer 2. Services Security Layer 3. Applications Security Layer The security layers are a series of enablers for secure network solutions: the infrastructure layer enables the services layer and the services layer enables the applications layer. The security layers identify where security must be addressed in products and solutions by providing a sequential perspective of network security. 14.3.3 Security Planes A security plane is a certain type of network activity protected by security dimensions. Recommendation X.805 defines three security planes to represent the three types of protected activities that take place on a network. The security planes are: 92 533576827 02.10.09 04.03.11 1. Management Plane 2. Control Plane 3. End-User Plane These security planes address specific security needs associated with network management activities, network control or signaling activities, and end-user activities correspondingly. Rec. X.805 summarizes the dimensions of the security architecture with the following figure: End-user plane Control plane THREATS Privacy Destruction Availability Data integrity Communication security Infrastructure security Non-repudiation VULNERABILITIES Data confidentiality Access control Services security Authentication Security layers Applications security Corruption Removal Disclosure Interruption ATTACKS 8 Security dimensions Management plane X.805_F3 X.805 – Security architecture for end-to-end network security The security architecture described in Rec. X.805 can be used to guide the development of comprehensive security policy definitions, incident response and recovery plans, and technology architectures by taking into account each security dimension at each security layer and plane during the definition and planning phase. The security architecture can also be used as the basis of a security assessment that would examine how the implementation of the security program addresses the security dimensions, layers and planes as policies and procedures are rolled out and technology is deployed. ***** 93 533576827 02.10.09 04.03.11 15 QoS and Performance Standards One of the biggest challenges for a Next Generation Network (NGN) is to provide a system or technique for Voice over IP (VoIP) that provides performance and quality of service (QoS) that are better than those provided by the present “best-effort” IP-based networks. For VoIP, the target is to provide service quality, which is equivalent to that of the current Public Switched Telephone Network (PSTN). NGNs have two flavours; one is ATM-centric while the other is IP-centric. Although both impose needs on a core network, the particular focus of this contribution is on the IP offering for NGNs. It is possible (and likely) that ultimately both flavours will converge at some future point in time, especially with respect to the core network. The IP-based architecture of NGNs can be sub-divided into a number of domains. This segmentation facilitates QoS conceptualization, strategic planning, and functional partitioning that networks are typically built upon. The following domains are part of an NGN IP architecture: Centralized Control: this contains the Media Gateway Controller along with some centralized (for maintenance reasons) service nodes and OAM elements; Media Gateway / Endpoints / Access: this contains the various gateways used to access the IP network; IP Aggregation: this contains the devices used to combine flows and physical interfaces into a manageable number of interfaces or nodes along with any partitioning or boundary (i.e. firewalling, central-office LAN support); IP Core Network / Interconnection: this contains devices used to carry IP traffic across the network and along with interconnection of domains / networks. An NGN IP solution contains basically two offers; one that contains "line side" subscribers and one that contains "trunking only" clients. From a core IP network perspective, there is relatively little difference between the two. However, from the perspective of end-to-end QoS, it is important to maintain an awareness of the differing requirements that the two offerings place on the network and its individual components. It should be noted that this section focuses on same-service-operator domains only. Interworking across multiple domains (i.e., involving different operators) at an IP level is not being addressed at this time – and so border (or boundary) nodes are not considered. It is likely that such nodes would have some special requirements with respect to QoS, and the matter should be deferred for future study. Moreover, this section is intended to describe QoS options for IP-centric NGNs. Other options for achieving Quality of Service in data networks do exist, most notably based on ATM; however, consideration of such alternative solutions is left for future study. 15.1 QoS in IP-based Networks 15.1.1 Achieving Traditional PSTN Service Quality in IP Networks First, it should be noted that the PSTN is a network that effectively carries a variety of services in addition to a simple “voice” service. Indeed, the traditional PSTN provides not only the basic service that everyone uses for basic voice communication with another human but also a set of "in-band" ancillary services that are typically used for non-human communication (e.g., FAX, dial-access modems, digital tones, etc). Most of these "in-band" services rely heavily on the inherent basic voice characteristics of the 94 533576827 02.10.09 04.03.11 Time-Division-Multiplexed PSTN to achieve a successful quality of service. These characteristics typically relate to bandwidth, frequency, propagation, modulation techniques and harmonics among other things. When providing voice over an IP transport network, operators can use high-rate codecs (e.g., ITU-T G.711) provided there is limited delay and jitter within and around the connecting IP network – in order to ensure that customers will receive PSTN-equivalent quality. However, because the chances of achieving comparable delay and jitter conditions over the general IP network (i.e., Internet) are quite small, various standards and alternative mechanisms have been proposed to better accommodate these types of services when a number of voice and data services are being carried together. Typically, these mechanisms involve using selected lower-rate voice codecs together with techniques for converting bit/bytes to equivalent ASCII information streams and sending the converted information as "out-band" or parallel IP data flows. For instance, FAX transmissions are converted at gateways and sent as ASCII data streams over an IP network to the far end gateway which converts the information back to FAX modem tones for final reception by the end terminal FAX modem. Other similar techniques have been proposed for various tones (e.g., DTMF, MF) that normally traverse the TDM PSTN utilizing the "voice band" of the voice service. It is likely that an NGN IP will need to support both "in-band" and "out of band" techniques. 15.1.2 VoIP Service Characteristics and Expectations In general, the VoIP service can be broken down into three components of data flows: the bearer/voice packets (normally carried as RTP packets), signalling/control (these may include H.323, H.248, SIP, SIP-T, BICC), and OAM (these include among others, SNMP, TFTP, COPS). Note that RTCP packet flows are currently not used but need consideration in future evolutionary work. When dealing with QoS for voice service, the focus tends to be on the bearer stream since this is typically, what will directly impact a subscriber (and more specifically his perception of the voice quality). The other components are equally important with respect to the overall QoS of the service. Without adequate QoS for signalling/control, calls may fail to setup or take significant time to setup. Similarly, from an operational point of view, without QoS for OAM, provisioning may fail or be significantly delayed, network failures may go undetected, proactive maintenance may not be possible, etc. All of these could ultimately be reflected in the subscriber's perception of the quality of the service being offered. Moreover, not all of these service components have the same QoS requirements and thus it is likely that each has a different data service need. This would appear to fit nicely into the "Differentiated Services" paradigm as laid out by the IP Diff-Serv framework, IETF RFC 2475 (Informational). Thus, the recommended approach is to understand the key characteristics of each component and to determine in quantitative terms the performance levels that can be provided by the underlying IP Diff-Serv framework. However, to complicate this a bit, end-user "expectations" (more precisely, the "changing expectations" of users) blur things so that the characteristics are not necessarily static or readily quantifiable for all users and service providers. Unlike the ubiquitous and mature PSTN voice service, which in general offers a constant (and somewhat singular) quality of service, the IP network and resulting VoIP service fortunately has the capability of being more flexibly managed. 95 533576827 02.10.09 04.03.11 In addition, performance regulations play an important role, insofar as they express the “ultimate public expectation” or formal user requirements. Some of them that ultimately relate to quality of the voice service, including signaling aspects, are listed below. Additional targets can be derived or have been recommended by various standards/regulatory bodies. - Dial Tone Delay: no more than 1.5% of calls (during busy hour) shall receive dial tone delay longer than 3 seconds - Echo Return Loss (line): greater than 20 dB - Loss: 3.0 dB at subscriber line (0 dB transmission level) - Noise: less than 20 dBrnC (trunk level) and less than 23 dBrnC (95% of lines) - Delay: - for national - less than 150 ms one way, - for international involving satellite connection - less than 400 ms one way, - for submarine cable - less than 170 ms one-way. - Post Dial Delay: nominally, - for local calls - less than 3 s, - for toll calls - less than 5 s, - for international calls - less than 8 s - Blocking/Matching Loss: network - 2% during average busy hour - Service Availability:: 99.999% Note: the above contain "thumb nail" views of some targets and are included here simply as an illustration. Details in specific situations should be obtained from the various applicable standards. By looking at the above targets, it can be seen that QoS attributes for each of the "components" are not always specifically identified. However, they can be derived or implied. For instance, the Post Dial Delay (i.e., time passed since the receipt of the last dialed digit until the far end party is notified) provides for a timing limit by which control messages are processed and propagated through a network to set up a connection between parties. Thus, this is an implied limit on the delay QoS that control messages can be expected to encounter as they traverse the IP network. Note that this is not an absolute value that is totally reflected in the QoS of the IP transport network, because it also includes processing times at various end points and nodes along the way. Similar interpretations exist for those targets that impact the characteristics of the bearer traffic. The EModel (ITU-T Recommendation G.107) is used to characterize the voice bearer packet "interpretations". In general, voice characteristics (what you hear on your phone) are impacted by a number of influences when a packet network is involved in the speech "path". The figure below provides a view of these impairments for a DSL access network example. 96 533576827 02.10.09 04.03.11 Voice Impairments in an IP network From the above figure, it can be seen that determining the expected voice quality of a VoIP call can be quite difficult from inspection of specific, individual values. In addition, other influences outside of the IP domain also have an impact. Hence, the E-model serves as an analytical role for being able to combine all these and produce expected results of theoretical quality of the voice speech. When compared with existing PSTN instantiations, one is able to determine a relative level of quality. 15.1.3 Strategy for QoS in IP-based Networks The basic strategy for addressing QoS in next-generation IP-based networks must be simple and consistent and yet be able to meet the needs of a wide range of services and business models. However, even the relatively simple voice service is a complex service that contains or needs various supporting data components to be successful. In addition to the bearer data (based on Real Time Protocol (RTP) packets); there are signalling / control packets (e.g., H.248, SIP-T) and OAM flows / packets. If all of these parameters are marked and treated the same way, it is likely that they would "conspire" amongst themselves to cause a conflict such that the VoIP service quality would not be acceptable. Similarly, if they are not melded together to form a managed functional service, a similar outcome is probable to happen (i.e., unacceptable service quality). In addition to these "internal service conflicts", there is the need for the VoIP service to co-exist with other services that are supported by the same unified managed IP network. The IETF has proposed that QoS be supported by an IP Traffic Engineering (IP TE) system. This system enables all services and the managed network to operate and exist together. General guidelines for an IP TE system have been produced by the IETF Internet Traffic Engineering (tewg) working group. 15.1.4 Technologies supporting QoS in IP Networks 15.1.4.1 Integrated Services (Int-Serv) Int-Serv, IETF RFC 1633 (Informational), provides a signaling method and network soft states for reservation of network resources. It can potentially provide hard QoS guarantees through the reservation 97 533576827 02.10.09 04.03.11 of resources. In Int-Serv, the applications explicitly signal their QoS requirements for a flow using the Resource Reservation Signalling Protocol (RSVP). Each Router along the route reviews this request and provides a pinned downed end-to-end path for that transaction (flow); routers along this path check the RSVP QoS request against the applicable policy and available network resources. If the request is within policy and resources are available, the request is granted; resources are then reserved by intervening nodes for the duration of the transaction. Though quite mature in terms of its specification, Int-Serv has never been deployed on a wide scale due to perceived drawbacks in a number of areas: scalability, overhead, route pinning, and host orientation. 15.1.4.2 Differentiated Services (Diff-Serv) Diff-Serv, (IETF RFC 2474 (Proposed Standard) and RFC 2475 (Informational), takes a more pragmatic approach and provides only soft guarantees by marking packets or flows for relative forwarding priority. Scalability problems are resolved by avoiding any form of resource reservation in the network. In addition, the Diff-Serv method is further premised on the fact that the underlying IP network is routed as this recommendations deal primarily with layer 3 of the communications protocol model. To complement this capability, the overall QoS strategy may be re-enforced with layer 2 capabilities (e.g., IEEE 802.1p, DOCSIS 1.0 / 1.1) that may apply to sub-network domains within the greater NGN IP network. In the Diff-Serv method, complicated functionality is moved to the edge of the network and simple functionality in the core operates on traffic aggregates. Edge devices classify and mark packets in the DS field of packet header (based on policy information provided by policy management), and core devices forward packets with certain Per Hop Behaviour (PHB) in accordance with packet marking. Properly selected combinations of PHB and policy rules result in an IP service with appreciable quality improvements as viewed by the end user – achieving significantly better performance than that achieved in existing best-effort networks. Diff-Serv includes three key components: Policy/Network management, edge device functionality and core device functionality. The IETF has been addressing a minimum set of PHBs, RFC 3246 (Proposed Standard) and RFC 3247 (Informational) and boundary mechanisms associated with the edge and core devices. Policy and network management aspects are left to individual network providers. The policy server provides a centralized point for the management of Diff-Serv policies, which determine the traffic profile and class of traffic into which traffic flows will be grouped. The Diff-Serv policies will be distributed by the policy server to individual edge devices and border routers so that these devices can police the flows and “tag” the packets with a “codepoint” which represents the per-hop behavior to be applied at the current node and every downstream node. 15.1.4.3 Quality-of-Service Policy QoS Policies define the service levels of different user groups for customer cost control, billing of service provider customers, and network traffic control purposes. For example, users can purchase policies from service providers that guarantee their priority and time-of-day service levels and control their service costs. The QoS policy could also include admission policy and service / network management policy since both have potential impact on the service QoS. Within this scope, a QoS Policy Server (QPS) would manage the quality of service policies and maintain logical maps for associating specific policies to routers, 98 533576827 02.10.09 04.03.11 gateways, controllers, and service management agents. QoS policies, implemented as data packet filters are downloaded to the applicable routers and gateways. When communicating to routers, it is expected that the QoS Policy server uses the IETF-standard Common Open Policy Service (COPS) protocol, IETF RFC 2748 (Proposed Standard). The QoS Policy server will likely use an ASCII command line interface (CLI) to communicate policy information to other routers. With other policies (admission, management), COPS is usually recommended but other interfaces are possible. 15.1.4.4 Multi-Protocol Label Switching (MPLS) MPLS, IETF RFC 3031 (Proposed Standard), is a simple way to forward information through networks by installing and then examining short, fixed-length ID markings called labels in packets. By relying on labels to forward information, MPLS usually does not use a packet’s IP header unless it is entering or leaving MPLS. To the IP stream passing through an MPLS network, the entire network looks like a single hop – MPLS in effect sets up a tunnel through the network where the route is pre-planned and mechanistically traversed. MPLS can be used to create paths whereby QoS parameters such as delay, loss and jitter have been ‘engineered’ and the MPLS path can guarantee these QoS parameters just like in a traffic-engineered ATM virtual circuit. MPLS can be used in conjunction with Diff-Serv to provide traffic-engineered paths for critical services. Diff-Serv still provides the overall end-to-end QoS architecture. The advantage of only using Dif-Serv is its simplicity. In a normally operating network, Diff-Serv provides consistent QoS behaviors across the network but cannot provide guarantees, i.e., it provides good QoS most of the time but cannot provide any guarantees. MPLS, on the other hand, can be used to engineer certain paths in order to achieve explicit guarantees – similar to that what it can be achieved in ATM networks or with any type of “connectionoriented” networking technology. Work to develop and define standards for Performance and Quality of Service (QoS) in Next Generation Networks (NGNs) is ongoing in the ITU-T, the IETF, and other fora. These new and enhanced standards are important to ensure that NGNs can support a large variety of evolving QoS-enabled (broadband and narrowband) services which include Voice over IP (VoIP) as well as multimedia services involving various combinations of voice, video and data. 15.2 Network Performance Objectives It is important that service providers work together to provide end-to-end communications and that each provider understands its fair allocation of the end-to-end performance objectives. Those allocations must be both adequate for the service being offered and feasible based on the available networking technologies. To satisfy QoS considerations for all transaction and customer types, a service provider needs to carefully examine and plan for the QoS requirements and customer expectations in a manageable number of unique and well-defined classes. These classes represent the desired performance QoS parameters for various types of telecommunications transactions [12]. 15.2.1 Y.1540 ITU-T Recommendation Y.1540 “Internet protocol data communication service - IP packet transfer and availability performance parameters” was first approved and published as I.380, and then renumbered as Y.1540 on 2000-03-10 without further modification. Y.1540 defines parameters that may be used in 99 533576827 02.10.09 04.03.11 specifying and assessing the performance of the speed, accuracy, dependability, and availability of IP packet transfer of international Internet Protocol (IP) data communication service. The defined parameters apply to end-to-end, point-to-point IP service and to the network portions that provide, or contribute to the provision of, such service. Y.1540 defines the following IP packet transfer performance parameters: IP packet transfer delay (IPTD): This is the delay for an IP datagram between two reference points. Typically, an end-to-end delay or a delay within one network. Mean IP packet transfer delay: The arithmetic average of IP packet transfer delays for a population of interest. IP packet delay variation (IPDV): The variations in IP packet transfer delay. IP packet error ratio (IPER): This is the ratio of errored packets of all received packets. IP packet loss ratio (IPLR): The ratio of lost packets from all packets transmitted in population of interest. IP packet reordered ratio (IPRR) The ratio of of the total reordered packet outcomes to the total of successful IP packet transfer outcomes in a population of interest. IP packet severe loss block ratio (IPSLBR) The ratio of the IP packet severe loss block outcomes to total blocks in a population of interest. IP packet duplicate ratio (IPDR The ratio of total duplicate IP packet outcomes to the total of successful IP packet transfer outcomes minus the duplicate IP packet outcomes in a population of interest. Replicated IP packet ratio (RIPR)T The ratio of total replicated IP packet outcomes to the total of successful IP packet transfer outcomes minus the duplicate IP packet outcomes in a population of interest. Spurious IP packet rate (SPR): The total number of spurious IP packets observed at that egress measurement point during a specified time interval divided by the time interval duration. Percent IP service unavailability (PIU): The percentage of total scheduled IP service time that is categorized as unavailable using the IP service availability function. The basis for the IP service availability function is a threshold on the IPLR performance. 15.2.2 Y.1541 ITU-T recommendation Y.1541, “Network Performance Objectives for IP-Based Services” was originally approved by ITU- SG 12 on May 2002 and its last revision was approved on February 2006. Y.1541 proposes grouping IP telecommunications transactions into six unique network QoS classes defined according to the desired performance QoS objectives. These classes serve as a basis for agreements between end-users and service providers, and between service providers. They support a wide range of traffic applications including point-to-point telephony, data transfer, and multimedia conferencing – applications whose performance needs are more demanding than others (future applications may require new or revised classification). The limited number of classes supports the requirement for feasible implementation, particularly with respect to scale in global networks. According to this recommendation, “a packet flow is the traffic associated with a given connection or connectionless stream having the same source host, destination host, class of service, and session 100 533576827 02.10.09 04.03.11 identification”. Thus a service provider and an end-user will have agreed upon the maximum capacity required to support the class of service requirements of the packet flow as defined by one of these six classes. The QoS objectives are applicable when access link speeds are at the T1 or E1 rate and higher. Brief comments on each class are provided here: Class 0: Real-time, highly interactive applications, sensitive to jitter Mean delay upper bound is 100 ms, delay variation is less than 50 ms, and loss ratio is less than 10-3. Application examples include Voice over IP (VoIP), Video Teleconference (VTC). Class 1: Real-time, interactive applications, sensitive to jitter Mean delay upper bound is 400 ms, delay variation is less than 50 ms, and loss ratio is less than 10-3. Application examples include VoIP, VTC. Class 2: Highly interactive transaction data Mean delay upper bound is 100 ms, delay variation is unspecified, and loss ratio is less than 10-3. Application examples include signaling. Class 3: Interactive transaction data Mean delay upper bound is 400 ms, delay variation is unspecified, and loss ratio is less than 10-3. Class 4: Low Loss Only applications Mean delay upper bound is 1 s, delay variation is unspecified, and loss ratio is less than 10-3. Application examples include Short Transactions, Bulk Data, and Video Streaming. Class 5: Traditional applications of default IP networks Applications with unspecified mean delay, delay variation, and loss ratio. Class 5: Traditional applications of default IP networks These six classes enable Service Level Agreements (SLA) to be struck between customers and network service providers with respect to QoS parameter requirements. The service provider then needs to ensure that the class of service requirements, for each customer are recognized and receive appropriate treatment across network layers. ***** 101 533576827 02.10.09 04.03.11 16 Evolutionary Standards 16.1 Internet Protocol version 6 (IPv6) Internet Protocol version 6 (IPv6), [6], started standardization as a replacement of the current IP version 4 (IPv4), described in RFC 791 (Standard), due to the depletion of the limited number of IPv4 addresses foreseen already in the 1990's. Up until present time, various techniques such as Classless Inter-Domain Routing (CIDR), Network Address Translation (NAT), and Multi Protocol Label switching (MPLS) have managed to delay this depletion. The IETF Internet next Generation (IPNG) working group developed IPv6, RFC 2460 (Draft Standard). The current Internet Protocol IPv4, supports up to 4 billion addresses with 32-bit address space. While 4 billion is a lot bigger than the currently estimated 2.5 billion addresses in use by several hundred million Internet users, in practice IPv4 supports a much lower number. That is because addresses are not used efficiently. They are allocated in regional blocks, and there is over supply in some areas of the world and other areas (e.g., Asian, Europe and Latin America) are close to running out. At the current rate of 60% efficiency, IP addresses will run out some time in the future.IPv6 128-bit address format allows for 340,232,366,920,938,463,374,607,431,768,211,456 IP addresses (340 duodecillion), enough to award one to every grain of sand on earth. Figure 11 depicts the IPv6 header format. 4 bytes (32 bits) Ver Traffic Class Flow Label Next Header Payload Length Hop Limit Basic Header 128-bit source address 128-bit destination address Payload (includes optional headers & data portion) IPv6 Header Format Besides a 128-bit wide address range, the TCP-UDP/IPv6 protocol suite provides additional features such as mandatory security and mobility, ease of administration and auto-configuration features, built-in QoS, and more scaleable routing and robustness to mention a few. Many of these have been retrofitted in IPv4 with various limitations and decreased functionality. Wireless will have the greatest impact on IP; the forthcoming 3G will make much greater use of IP than the previous generations of cellular radio. Until now IP has been used as an add-on to cellular networks, in the not too distant future cellular will be data oriented, as voice will be treated as another IP session within the network. The development of new radio protocols such as 802.11B (Wireless Ethernet) plus new wired serial interfaces such as IEEE 1394 (Firewire) will provide the opportunity for consumer products to require an IP address to connect to the net. 16.1.1 IPv4 Workarounds The Internet industry has been able to stretch the addressing space IPv4, by using a combination of the techniques listed below: 102 533576827 02.10.09 04.03.11 DHCP - Dynamic Host Configuration Protocol, RFC 2131 (Draft Standard) DHCP allows IP addresses to be assigned in three ways: 1. Manual Allocation: The network administrator keeps complete control over addresses by specifically assigning them to clients. The DHCP server uses this database to assign an IP address, which was assigned to a particular MAC (Media Access Control) address. 2. Automatic Allocation: The DHCP server permanently assigns an address from a pool of addresses. The administrator does not get involved in the details of assigning a client an address. 3. Dynamic Allocation: The DHCP server assigns an address to a DHCP client for a limited period of time. The server automatically reclaims the address after the lease expires or when the client disconnects. NAT - Network Address Translator, RFC 2663 (Informational) NAT is a method by which IP addresses are mapped from one realm to another, in an attempt to provide transparent routing to hosts. Traditionally, NAT devices are used to connect an isolated address realm with private unregistered addresses to an external realm with globally unique registered addresses. If a service provider owns a limited number of valid (registered) IP addresses, the provider will allocate private IP addresses to the user of the network via DHP to allow navigation within the network or within a VPN (Virtual Private Network). Once the user needs to access resources that are outside the provider’s network or VPN the egress device will NAT to a valid (registered) IP address so that the datagram is able to reach the final destination. NAT has also been considered as one of the methods to transition from IPv4 to IPv6, RFC 2766 (Proposed Standard). This could be done by performing Network Address Translation in an edge device located between an IPv6 domain and an IPv4 domain; the edge device would map IP addresses from one realm IPv4 network to an IPv6 network and vise-versa, as an attempt to provide transparent routing between the two. MPLS - Multiprotocol Label Switching Architecture, RFC 3031 (Proposed Standard) As a packet of a connectionless network layer protocol travels from one router to the next, each router makes an independent forwarding decision for that packet. That is, each router analyzes the packet's header, and each router runs a network layer routing algorithm. Each router independently chooses a next hop for the packet, based on its analysis of the packet's header and the results of running the routing algorithm. Packet headers contain considerably more information than is needed simply to choose the next hop. Choosing the next hop can therefore be thought of as the composition of two functions. The first function partitions the entire set of possible packets into a set of "Forwarding Equivalence Classes (FECs)". The second maps each FEC to a next hop. Insofar as the forwarding decision is concerned, different packets, which get mapped into the same FEC, are indistinguishable. All packets which belong to a particular FEC and which travel from a particular node will follow the same path (or if certain kinds of multi-path routing are in use, they will all follow one of a set of paths associated with the FEC). In conventional IP forwarding, a particular router will typically consider two packets to be in the same FEC if there is some address prefix X in that router's routing tables such that X is the "longest match" for each packet's destination address. As the packet traverses the network, each hop in turn reexamines the packet and assigns it to a FEC. In MPLS, the assignment of a particular packet to a particular FEC is done just once, as the packet enters the network. The FEC to which the packet is assigned is encoded as a short fixed length value known as a "label". When a packet is forwarded to its next hop, the label is sent along with it; that is, the packets are "labeled" before they are forwarded. At subsequent hops, there is no further 103 533576827 02.10.09 04.03.11 analysis of the packet's network layer header. Rather, the label is used as an index into a table, which specifies the next hop, and a new label. The old label is replaced with the new label, and the packet is forwarded to its next hop. In the MPLS forwarding paradigm, once a packet is assigned to a FEC, no further header analysis is done by subsequent routers; the labels drive all forwarding. This has a number of advantages over conventional network layer forwarding. By using local labels instead of IP addresses, it reduces the number of addresses that can be used. 16.1.2 Location Tracking VLR (Visitor Location Register) is a key technology used by the cellular network to route calls to and from a mobile user. In the current 2G cellular networks, calls to a mobile user are made possible by tracking their current whereabouts in a database called the VLR. When someone dials a number the information in the VLR is used to route the call through to the base-station closest to the caller’s current location and then to the mobile phone. This is a complicated procedure and simply keeping the VLR up to date places great load on the cellular network. With IPv6, it will be possible to assign not only an IP address to every device but to every device potential location. Giving each potential location its own address simplifies the tracking and routing of the calls. A call would be handle the same way a telephone a number is handled today, except that instead of using a phone number the network would be using IP addresses. A portion of the IP address would be constantly changing according to the mobile devices whereabouts. The Internet industry has been able to cope with changing locations by using Mobile IP, RFC 2794 (Proposed Standard), as an IPv4 workaround. Mobile IP specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet. The protocol provides for registering the care-of address with a home agent. The home agent sends datagrams destined for the mobile node through a tunnel to the care-of address. After arriving at the end of the tunnel, each datagram is then delivered to the mobile node. However the above mentioned workaround has problems, especially for applications that required that the user or end-point use a valid IP address and mobile users as Mobile IP will not be able to cope with the increased demand. 16.1.3 IPv6 Addressing The IPv6 addressing architecture is described in IETF RFC 2373 (Proposed Standard), “IP Version 6 Addressing Architecture”. The most obvious difference between IPv4 and IPv6 is their length, IPv4 is 32bit addresses and IPv6 is 128-bit addresses. While addresses in IPv4 can only be divided into two or three variable parts (the network identifier, the node identifier and sometimes the subnet identifier), in IPv6 the addresses are large enough to support fields within the address. 16.1.4 IPv6 Address Representation There are three conventional forms for representing IPv6 addresses as text strings. The preferred form is x:x:x:x:x:x:x:x, where the 'x's are the hexadecimal values of the eight 16-bit pieces of the address, however certain styles of IPv6 addresses may contain long strings of zero bits that can be represented by 104 533576827 02.10.09 04.03.11 "::". The third alternative is a mixed environment of IPv4 and IPv6 such as x: x:x:x:x:x:d.d.d.d, where the 'x's are the hexadecimal values of the six high-order 16-bit pieces of the address, and the 'd's are the decimal values of the four low-order 8-bit pieces of the address (standard IPv4 representation). 16.1.5 IPv6 Address types There are three types of addresses in IPv6: Unicast (an identifier for a single interface), Anycast (an identifier for a set of interfaces; typically belonging to different nodes) and Multicast (an identifier for a set of interfaces; typically belonging to different nodes). 16.1.6 IPv6 Unicast Addresses Unicast addresses specify a single IPv6 interface. A node can have more than one IPv6 network interface. Unicast addresses can be viewed as 128-bit field that identifies one particular interface. However, the data in the address field can be parsed out into smaller pieces of information, although all that information when put together will result in a 128-bit field that identifies a node’s interface. An IPv6 unicast address may be viewed as a two-field entity, with one field for the network and the other for an identifier of the node’s interface on that network. There are several forms of unicast address assignment in IPv6, including the global aggregatable global unicast address, the NSAP address, the IPX hierarchical address, the site-local address, the link-local address, and the IPv4-capable host address. Additional address types can be defined in the future. IPv6 nodes may have considerable or little knowledge of the internal structure of the IPv6 address, depending on the role the node plays (for instance, host versus router). Still more sophisticated hosts may be aware of other hierarchical boundaries in the unicast address. Though a very simple router may have no knowledge of the internal structure of IPv6 unicast addresses, routers will more generally have knowledge of one or more of the hierarchical boundaries for the operation of routing protocols. The known boundaries will differ from router to router, depending on what positions the router holds in the routing hierarchy. 16.1.7 IPv6 Anycast Addresses RFC 2373 defines an "anycast" address as an IPv6 address that is assigned to one or more network interfaces (typically belonging to different nodes), with the property that a packet sent to an anycast address is routed to the "nearest" interface having that address, according to the routing protocols' measure of distance. Multiple nodes may be sharing the same anycast address, like a multicast address. However only one of those nodes can expect to receive a datagram sent to the anycast address. Anycast is useful for providing certain types of services, in particular, services that do not require a particular relationship between the client and the server. For example a domain name server and a time server. The nearest name server can provide the same service as the furthest name server; however the nearest time server provides a more accurate time stamp than the one further away.. Anycast addresses are allocated out of the normal IPv6 unicast address space. Because anycast addresses cannot be differentiated in their own form from a unicast address, members of the anycast address must each be explicitly configured to recognize that address as an anycast address. IETF RFC 2526 (Proposed Standard) “Reserved IPv6 Subnet Anycast Addresses” defines a set of reserved anycast addresses within each subnet prefix, and lists the initial allocation of these reserved subnet anycast addresses. Another IETF RFC 3068 (Proposed Standard) “An Anycast Prefix for 6to4 105 533576827 02.10.09 04.03.11 Relay Routers” introduces an "IPv6 to IPv4 anycast address" in order to simplify the configuration of IPv6 to IPv4 routers. It also defines how this address will be used by IPv6 to IPv4 relay routers, how the corresponding "IPv6 to IPv4 anycast prefix" will be advertised in the IGP and in the EGP. The address assignment is based in IETF RFC 3056 (Proposed Standard) “Connection of IPv6 Domains via IPv4 Clouds”, in particular the definition of a 6to4 router and a 6to4 Relay Router. It adds the definition of the 6to4 Relay anycast prefix, 6to4 Relay anycast address, 6to4 IPv6 relay anycast address, and Equivalent IPv4 unicast address. 16.1.8 Multicast Addresses Like broadcast addresses, multicast addresses are used in local networks like Ethernet, where all nodes can sense all transmissions on wire. However, IP multicast is more complicated because all packets are not forwarded to all nodes in the network, instead they are only forward to members of the multicast group. When a node subscribes to a multicast address, it announces that it wants to become a member and any local router will subscribe on behalf of that node. Multicast addresses must not be used as source addresses in IPv6 packets or appear in any routing header. Pre-Defined Multicast Addresses are found in IETF RFC 2375 (Informational) “IPv6 Multicast Address Assignments”. Additional work continues on IETF RFC 3019 (Proposed Standard), “IP Version 6 Management Information Base for The Multicast”; IETF RFC 2908 (Informational), “The Internet Multicast Address Allocation Architecture”; and IETF RFC 3307 (Proposed Standard), “Allocation Guidelines for IPv6 Multicast Addresses”. 16.2 Electronic Numbering (ENUM) The ENUM protocol developed by the Internet Engineering Task Force (IETF) unifies traditional telephony and next-generation IP networks, and provides a critical framework for mapping and processing diverse network addresses. ENUM maps the E.164 telephone number—the most basic and commonly-used communications address—into a Universal Resource Identifier (URI) that can be used across many different devices and IP based applications (voice, fax, mobile, email, text messaging, location-based services and the Internet). The ENUM protocol, published in the Internet Engineering Task Force (IETF) standard document RFC 3761, is used for mapping ITU-T Recommendation E.164 telephone numbers into the Domain Name System (DNS). The ENUM protocol uses what are called naming authority pointer (NAPTR) DNS resource records to identify the available methods or services for contacting a specific network node identified through a Recommendation E.164 number. The ENUM protocol defines and uses a specific type of NAPTR service with the mnemonic "E2U" (E.164 to URI resolution). The result of an ENUM query can be one or more Uniform Resource Identifiers (URIs) with their order of processing and preference indicated by values in the naming authority pointer (NAPTR) records. These URIs are then used to reference resources or services associated with the E.164 number. Possible examples of resources or services include fax number, mobile number, e-mail address, GPS coordinates, phone redirection services, unified messaging services, voice mail and public key for asymmetric encryption applications. [Ref: P1!T-1039r3_i.doc; 2007-03] ***** 106 533576827 02.10.09 04.03.11 107 533576827 02.10.09 04.03.11 Resolutions 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. PCC.I/RES.104 (XIV-01), Gateway Control Protocol PCC.I/RES.105 (XIV-01), Intelligent Networks Capability Set 3 PCC.I/RES.155 (XVI-02), Network Performance objectives for IP-based Services PCC.I/RES.1 (I-02), Intelligent Networks Capability Set 4 PCC.I/RES. 25 (III-03), ITU-T Y.2000-Series Recs for NGN (SG13) PCC.I/RES.027 (III-03), ANSI-41 Evolved Core Network with CDMA2000 Access Network PCC.I/RES.028 (III-03), GSM Evolved Core Network with UTRAN Access Network PCC.I/RES.044 (IV-04), Packet-based Multimedia Communications Systems PCC.I/RES.045 (IV-04), CSD for ITU-T Recommendation X.805, “Security Architecture for Systems Providing End-to-End Communications PCC.I/RES.046 (IV-04), Security Architecture for the Internet Protocol PCC.I/RES.055 (V-04), CSD FOR Q.1912.5 – Interworking between Session Initiation Protocol (SIP) and Bearer Independent Call Control protocol or ISDN User Part PCC.I/RES.68 (VI-05), Session Initiation Protocol PCC.I/RES. 98 (IX-06), ITU-T Rec. G.993.2, VDSL2: Very High Speed DSL-2 Transceivers PCC.I/RES.99 (IX-06), ITU-T Rec. J.122, “Second-Generation Transmission Systems for Interactive Cable Television Services – IP Cable Modems” PCC.I/RES.100 (IX-06), Internet Protocol Version 6 (IPv6) PCC.I/Res. 116 (XI-07), E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM) PCC.I/RES. 130 (XII-08), ITU-T Rec. E.106, “International Emergency Preference Scheme for Disaster Relief Operations” PCC.I/RES. 131 (XII-08), ITU-T Rec. E.107, “Emergency Telecommunications Service (ETS) and Interconnection Framework for National Implementations of ETS” PCC.I/RES. 145 (XIV-09), ITU-T Recommendation Y.1910, “IPTV Functional Architecture” PCC.I/RES. 146 (XIV-09), ITU-T Recommendation Y.2270, “NGN Identity Management Framework” PCC.I/RES. 162 (XVI-10), ITU-T Recommendation L.75, ”Test acepptance and maintenance methods of copper subscriber pairs ” ***** 108 533576827 02.10.09 04.03.11 References 1. PCC.I/doc.957/00, “Evolving Standards for Internet Telephony” 2. PPC.I/doc.1107/00, “Updates to Contribution PCCI/doc.957/00” 3. PCC.I/doc.1112/01, “A brief explanation of SIP” 4. PCC.I/doc.1111/01, “Next Generation Voice Networks and Protocols” 5. PCC.I/doc.1258/01, “IN CS-4 Overview” 6. PCC.I/doc.1262/01, “The Protocol labelled IPv6” 7. PCC.I-TEL/doc.0776/06, “Next Generation Networks - Standards Overview (May 2006)” 8. PCC.I/doc.1344/01, “Next Generation Networks – Performance/QoS Standards” 9. PCC.I/doc.1382/01, “IPv6 Addressing” 10. PCC.1/doc.1472/02,”Standards Roadmap – Asymmetric Digital Subscriber Line System (ADSL) 11. PCC.I/doc.1518/02, “Security in the Internet” 12. PCC.1/doc.1477/02, “Network Performance Objectives in Next Generation Networks” 13. PCC.1/doc.0497/04, “Next Generation Networks: IP Multimedia Subsystem” 14. P1!T-1227_i.doc; 2008-03, “IPTV Standardization Activities in ITU-T” 15. P1!T-1249_i.doc; 2008-03, “Identity Management” 16. P1!T-1273_i.doc; 2008-03, “Security and Critical Infrastructure Protection Standards” 17. P1!T-1278_i.doc; 2008-03, “Generation Networks Application and Service Standards” ***** 109 533576827 02.10.09 04.03.11 Acronyms and Abbreviations 3GPP Third Generation Partnership Project 3GPP2 Third Generation Partnership Project 2 ADSL Asymmetric Digital Subscriber Line ADSLAM Asymmetric Digital Subscriber Line Access Multiplexor API Application Programming Interface APM Application Transport Mechanism ATM Asynchronous Transfer Mode BICC Bearer Independent Call Control B-ISDN Broadband ISDN CCS7 Common Channel Signaling #7 CPE Customer Premises Equipment CS1 Capability Set One Diff-Serv Differentiated Services DOCSIS Data Over Cable Service Interface Specification DQoS Dynamic Quality of Service DSL Digital Subscriber Line GSTN General Switched Telephone Network HDSL High-bit-rate DSL HFC Hybrid Fiber-Coax Cable HTTP HyperText Transfer Protocol IETF Internet Engineering Task Force IKE Internet Key Exchange IP Internet Protocol IPSec IP Security protocol IPv6 IP Version 6 protocol ISDN Integrated Service Digital Network ISUP ISDN User Part ITU International Telecommunications Union JAIN Java API for Integrated Networks MEGACO Media Gateway Control Protocol MIME Multipurpose Internet Mail Extensions MGC Media Gateway Controller, also know as Softswitch, Call Agent, or Call Server MPLS Multi-Protocol Label Switching MTP Message Transfer Part NGN Next Generation Network OPE Open Programmability Environment PSTN Public-Switched Telephone Network QoS Quality of Service RFC Request For Comments RMI Remote Method Invocation RSVP Resource Reservation Setup Protocol RTP Real-time Transport Protocol RTCP Real-time Control Protocol SCTP Stream Control Transmission Protocol SDO Standards Development Organization SDP Session Description Protocol SDSL Single-line Digital Subscriber Line SGML Standard Generalized Markup Language 110 533576827 02.10.09 04.03.11 SIP SIP-T SIP-I SNMP VDSL VoIP xDSL XML Session Initiation Protocol SIP-Telephony SIP with the MIME encoding of ISUP Simple Network Management Protocol Very high speed DSL Voice over IP Placeholder for any one of a family of Digital Subscriber Line Technologies Extended Markup Language ***** 111 533576827 02.10.09 04.03.11