30
1 18.05.229-10 July 2003 Workshop on Next Generation Networks: What, When & How? ITU-T System Architecture for IP-based Seamless and Ubiquitous Networks Shiro Sakata NEC Laboratories [email protected]

Download

  • Upload
    ronny72

  • View
    627

  • Download
    0

Embed Size (px)

DESCRIPTION

 

Citation preview

  • 1. System Architecture for IP-based Seamless and Ubiquitous Networks ShiroSakataNEC [email protected]

2.

  • 1.Network and IT Market Trend
  • 2.System Architecture for Ubiquitous Services
  • - Ubiquitous Platform-
  • 3.Application to Wireless & Mobile Networks
  • Application to Photonic & Broadband
  • Networks
  • 5.Standardization Issues
  • 6.Conclusions

3. 1.Network and IT Market Trend - Value shifts from core to user, network to services - New business opportunities with network and serviceintegration caused by deregulation Unbundling network resources & functions and then on-demand rebundlingthem in a multi-carrier environment- Emerging Dynamic Collaboration in enterprise systems through the integration of IT and network technologies - Versatile service support in a ubiquitous networkenvironment Requirement for adaptation to a wide variety of networks andterminals Networks: Wired broadband and wireless networks (wireless LAN,cellular network, adhoc personal area network, sensornetwork) Terminals: PC, digital home appliances/digital TV/home server, PDA,cellular phone, wearable terminal, embedded car terminal 4. Traditional Network Future Network Bundled network resources Operators A Operators C Operators B Networks dedicated to individual operators and user services Interoperability between different operators and dynamic network resource allocation Operator A Operator B Operator C e.g, Virtual Network Operator VNO) Web service logical NW Content delivery logical NW Storage service logical NW Other ubiquitousService logical NW

  • - NW resource virtualization
  • and brokerage
  • Service continuity and
  • portability
  • NW security and
  • traceability
  • - Policy management
  • ......

Unbundling Resource rebundling adapted to individual services Potential New Business Model by Network Unbundling & Rebundling 5. Core competence R&D Planning, Production Enterprise A Business function outsourcing Business activities in which an enterprise enhances itsown core competence and reacts dynamically to drastic changes through the flexible collaboration with partners Self-support of all functions Outsourcing Next Generation Management Style Development partner Customers Logistics partner Sales partner Joint productization Realtime Info. sharing Order management Realtime info. sharing, Inventory management Joint productization,Technology sharing 6. Dynamic Collaboration through IT and NW Integration -Multivendor Support for Customer System- - 24 hours, 365 days system support and on-demand bandwidth utilization - Remote conference system with tele-existence/virtual reality capabilityBroadband VPN Mobile VPN DB Call Center Customer Window Support Center WEB I/F Maintenance Center Distributed & Collaborative AP From overseas VoIP Web Head office Alliance partner IP Network Remote maintenance Customer VLAN VPN VLAN: Virtual LAN 7. Ubiquitous Services over Versatile Networks & TerminalsCellular phone PDA Laptop PC Wearable Terminal Home appliance Digital TV Home server Sensors Car terminal : Servers Versatile networks Terminals ADSL FTTH Wired LAN MAN(Wide area Ether) Wireless LAN IMT2000 Wireless LAN Core Network Bidirectional Communication(*) Storage Service Location/PresenceInfo. Service Home Control and Security(*) Electronic Ticketing Content Delivery Ubiquitous Services 8. Bidirectional Communication Home User Office User Office On the move PublicWireless LAN 9. Home Control and Security

  • Robot-type Home server
    • User controls robot from outside through the
    • Internet
    • The robot controls home appliances with
    • IrDA, RFID, etc.
    • The robot automatically acts in accordance
    • with users presence
    • Example:
    • On the travel or on the way back home
    • - Confirmation of door locking
    • - Monitoring and taking care of pets,
    • gardens, etc.
    • - Automatic video recording
    • - Warming bath when approaching the
    • home
    • - Automatic switching-on of lights when
    • approaching the home

Light HDTV and HDVideo recorder Door lock anddoor phone Feeding Warming bath Internet Maid robot 10. 2.System Architecture for Ubiquitous Services [Network Technology Trend] - Increasing requirements for guaranteed multimedia services intransition to all IP networks Video streaming by CDN (Content Delivery Network), IP phone, Digital broadcast (data broadcast), etc. - Higher-flexible and lower-cost enterprise systems VPN(IP, SSL), wide area Ethernet - Requirements for Robust & Secure open mission critical system emerging into distributed wide-area business environment - Emerging wireless LAN and interworking with 3G cellular and other networks for supporting versatile ubiquitous services - Context Awareness is a key term in ubiquitous services context includes users situation such as location, presence, preferences,various sensed data, etc. - Requirements for VoIP as a short-term killer application End-to-End QoS, e.g. small delay, low jitter, guaranteed bandwidth Context transfer for network-network roaming 11. 1.From best-effort to high-quality support in response to individual service requirements 2.Seamless service continuity in mobile and muti-network/carrier environments 3.End-to-end enhanced robustness and security in an open network - providing robust & secure capability adapted to individualservices [Design Principles] Ubiquitous platform as middleware- enabling on-demand network resource allocation betweendifferent operators environment 12. Ubiquitous Platform (1) Application-Network Collaboration - Dynamic network resource management and allocation as requestedby individual applications Load balancing and dynamic routing control Common API(Application Programming Interface) for accepting appli-cation requests and network control interface for network resourcemanagement (2) Network-Network Collaboration - Seamless interoperability between different operators Roaming: service portability, common authentication (single sign-on), etc. Media handover: low latency handover, audio & video quality assurance- End-to-end network control GMPLS/ASON, NNI/UNI (3) Network Traceability - End-to-end traceability Enhancing robustness against cyber attacks and system faults throughTCP session management 13. Ubiquitous Platform API NCI (Network Control I/F) Server Terminal Network node (Router, Switch, etc.) Bidirectional Communication Storage Service Location/Presence Info. Service Home Control and Security Electronic Ticketing Content Delivery Ubiquitous Services Ubiquitous Platform Cellular phone PDA Laptop PC Wearable Terminal Home appliance Digital TV Home server Sensors Car terminal : Servers Versatile networks Terminals ADSL FTTH Wired LAN MAN(Wide area Ether) Wireless LAN IMT2000 Wireless LAN Core Network (1) Application-Network Collab. (3) Network Traceability (2) Network-Network Collab. 14. (1)Application-Network Collaboration Background: Required technologies:

  • Enabling user service to submit requirements to network in
  • a heterogeneous operator environment
  • Easing of tight coupling between a user service and the
  • network control functions provided by the network
  • operator
  • Facilitating load balancing regardless of user service location
  • Optimizing the network resource selection and allocation adapted
  • to user requirements
  • Requirements for user service flexibility such as
  • on-demand network resource control, e.g. bandwidth,
  • session path, etc., have been increasing.

15. Allowing to select best-effort or guarantee on-demand for each service (1)Application-Network Collaboration Virtualization of network resource management to services Service requirements Instruction to networks regarding resource allocationInternet connection VoIP CDN VPN Mobilephone /PDA PC/Home appliance Sensor Servers Terminals Ubiquitous Platform SONET Wide-areaEther FTTH ADSL PDC IMT2000 Wireless LAN

  • Existing operators
  • New common carriers
  • Mobile carriers

Conventional router Router with ubiquitous platform API NCI(Network Control Interface) Networks 16. (2)Network-Network Collaboration Background: Required technologies:

  • Network resource management for each session
  • Handover while holding network resources in an end-to-end
  • session without content quality degradation
  • High-speed network switching through context transfer
  • Exchanging network and service attribute information including
  • user authentication information between different operators
  • Service portability and continuity, e.g., providing seamless
  • roaming and handover in a wireless environment, will be
  • achievable through the operator-to-operator collaboration

17. Assuring Service Portability and Media Handover (2) Network-Network Collaboration Acquisition of AccessNetwork As AttributeRoaming in Transport Level Context(Session Info.) Transfer Bandwidth AV coding Authentication Security level etc. Move e.g., WirelessLAN e.g.,3G Cellular Dual-mode phone Operator A Operator B Confirmation ofService Continuity Access rights, Resource, etc. Negotiation Restart based onAccess Network AsAttribute in AccessNetwork B Resource Allocation 18. Transition from Unbundling to Rebundlingof Network Resources resources Operator A Operator X . resources Resources are bundled Unbundle + API NCI Rebundle for each service with resource negotiation/brokerage, and resource managementvirtualization to services For service B For service Y decomposed 19. (3) Network Traceability Background: Required technologies:

  • IP packet level monitoring has been becoming impossible
  • because of explosive traffic increase. TCP session level,
  • for example, monitoring is expected to enhance the security
  • in terms oftraceability of attack sources, i.e. to facilitate
  • the attack source identification.
  • One of the possible solutions:Segmentation of an end-to-
  • end TCP session into multiple TCP sessions and traffic
  • monitoring and access control at concatenation points.
  • Session access control at concatenation points enables the
  • protection from cyber attacks including DoS(Denial of
  • Service) attacks before such attacks reach the end user
  • node.

20. IDC IDC Unknown Intrusion Pattern Detection Quick Trace and Identification of Source of Attacks or Faults Connection Setup UnsuccessfulConnectionin case of Fraud IP Attacker Attacker Session Admission Control TCP Relay Network (3) Network Traceability

  • Quick Trace and Identification of Source of Attacks or Faults
  • Traffic monitoring and tracing TCP session by session, not IP packet-
  • wise
  • Shut-out of Attack or Fault-caused Traffic assuring Service
  • Survivability

Session concatenationpoint 21. 3.Application to Wireless & Mobile Networks All IP Architecture (3GPP) CS Domain PS Domain Wireless Access (Cellular, Wireless LAN) IP backbone ISDN /PSDN Internet MGW MGW Mobile Switch Server GW Switch Server Mobile Packet Server SGSN) GW Packet Server GGSN) Data Communication Circuit-switched Communication Application Server IMS (IP MultimediaSubsystem) HSS (HLR+ AAA ) SIP Server MGW Controller Signaling GW CS: Circuit Switched PS: Packet switched 22. Integration of 3G and Wireless LAN Communication area, Mobility, Portability High speed, High quality 3G Wireless LAN Hotel Station Airport Cafe Public Space Internet 3G Service area Hotspot Enterprise Network ISP Content Provider ASPs User info., Authentication, Accounting Content Delivery Internet Access VPN 23. Integration Scenarios discussed in 3GPP Scenario 1 Common Billing and Customer Care Scenario 2 3GPP system based Access Controland Charging Scenario 3 Access to 3GPP system PS based services Scenario 4 Service Continuity Scenario 5 Seamless Services Scenario 6 Access to 3GPP CS Services Feasible solutions in mid-term 24. 3G - WLAN Interworking Scenarios

  • Grant access to 3G CS based services through CSedWLAN access

6

  • Seamlessservice continuityandhandover
  • Non-real-time services:Mobile IP
  • Real-time services: FastMobile IPprotocols,Context Transferprotocol,
  • Access Router discovery schemes

5

  • Handover for specific services
  • Change of service quality in mobility across 3G and WLAN
  • Both service continuities between 3G & WLAN and WLANs

4

  • Operators grants access to 3G PS based services through WLAN
  • Service continuity between 3G and WLAN is not required
  • IMS based/location based/instant messaging/presence based services

3

  • AAAare provided by 3G system, e.g.EAP(EAP-AKA for GPRS/USIM and
  • EAP-SIM for GSM/SIM) is used for authenticating user by 3G server
  • Reuse 3G access control and charging principles (HSS/HLR, etc.) for the
  • benefit of 3G system operators and users

2 - Security level of 3G and WLAN are independent- No new requirements on 3G spec. 1 25. (1) Plug & Service - On-site real-time service download to mobile terminal- Service description/registration/retrieval/discovery/creation (2) Seamless Roaming - Service roaming achieving WLAN(Hotspot)-WLAN orWLAN-3G service continuity and eventual fast handover- Authentication roaming achieving single sign-on in a multi-network (WLANs and 3G) environment (3) Privacy Protection - Utilization of user profile information for personalizedservices - Privacy information description/negotiation/protectionbased on W3C P3P (Platform for Privacy Preferences)Wireless LAN Solution Example WLAN: Wireless LAN 26. Public Wireless LAN Solution Image Local Server Mobile Terminal (Station, Airport, Train, Hotel, Restaurant, Caf, etc.) IP Network Application Server ISP Server Hotspot Laptop PC,PDA, etc. Wireless LAN Content Server including local content AccessPoint Local Server Mobile Terminal Wireless LAN Service Providers 3G service area dual- mode 27. Middleware Architecture forWireless LAN Solution Mobile Terminal Local Server (Access Point) Remote Server Applications (Applications & Content) Applications & Content API NCI IP IP CSMA/CA (IEEE802.11) 3G,ADSL/FTTH Middleware OS &Devices OS &Devices OS &Devices

  • Plug &
  • Service
  • Seamless
  • Roaming
  • Privacy
  • Protection
  • Plug &
  • Service
  • Seamless
  • Roaming
  • Privacy
  • Protection
  • Plug &
  • Service
  • Seamless
  • Roaming
  • Privacy
  • Protection

Wireless LAN IP Network Protocols Protocols 28.

  • Network/Transport functions need to be seamlessly controlled from services such as bandwidth on demand and VPN
  • ASON plays an important role for dynamic network resource assignment

4.Application to Photonic & Broadband Networks ASON Networking Software (NMS, EMS, NNI, GMPLS, UNI, NE Software, etc) QoS SLA Protection Integrated Management Rapid Provisioning, Multi-Vendor Interoperability Network Design/Optimization, Full Turnkey Service, Customization Bandwidth on Demand, VPN Core Network Other Network Function Plug & Play Service Support Operation Support Network Design Support Service Distribution Wavelength Transport Service Multi-Service Transport Ethernet Transport Service ASON: Automatic Switched Optical Network 29. 5.Standardization Issues ITU 3GPP/ 3GPP2 IETF IEEE802.11 W3C OMA

  • Location info. management
  • - Digital rights management (DRM)
  • Privacy protection (P3P)
  • Web service (XML, SOAP, UDDI)
  • - xHTML
  • Security (802.11i, 1x/EAP)
  • Roaming (802.11f)
  • QoS control(802.11e)
  • SIP, Presence service (SIMPLE)
  • Wireless-profiled TCP
  • Security (AAA, PANA)
  • Mobile IP
  • - GMPLS
  • Content caching, content adaptation (CDN)
  • - Network control interface

OIF

  • Network control interface

Digital broadcast DVB (Europe) ARIB (Japan) ATSC (US) - xHTML 30. 6.Conclusions

  • Deregulation-caused potential new business opportunities
  • On-demand network resource control for individual services
  • Dynamic Collaboration for future enterprise environment
  • Support for wireless network-involved ubiquitous services
  • - End-to-end robust and secure capability enhancements

Ubiquitous Platform All IP network - Wireless LAN - 3G - GMPLS optical network