ImageVerifierCode 换一换
格式:PDF , 页数:54 ,大小:1.01MB ,
资源ID:737232      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-737232.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 182 015-2006 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Next Generation Networks Architecture for Control of Processi_1.pdf)为本站会员(terrorscript155)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 182 015-2006 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Next Generation Networks Architecture for Control of Processi_1.pdf

1、 ETSI TR 182 015 V1.1.1 (2006-10)Technical Report Telecommunications and Internet converged Services andProtocols for Advanced Networking (TISPAN);Next Generation Networks;Architecture for Control of Processing OverloadETSI ETSI TR 182 015 V1.1.1 (2006-10) 2 Reference DTR/TISPAN-02026-NGN Keywords c

2、ontrol, architecture ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the p

3、resent document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In ca

4、se of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this a

5、nd other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authori

6、zed by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2006. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIP

7、HON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TR 182 015 V1.1.1 (2006-10) 3 Contents Intellectual Property Rights5 Foreword.5 Intr

8、oduction 5 1 Scope 7 2 References 7 3 Definitions and abbreviations.8 3.1 Definitions8 3.2 Abbreviations .8 4 Requirements for NGN overload controls9 4.1 NGN overload scenarios 9 4.1.1 Processing overload sizes .9 4.1.2 Media stimulated events .9 4.1.3 Disasters10 4.1.4 Network Failures 10 4.1.5 Con

9、clusion 10 4.2 Impact of overload on resources and customer behaviour .10 4.3 NGN Interfaces requiring overload controls 11 4.4 NGN architectural factors.12 4.5 GOCAP requirements.13 5 Overload control design rules.14 6 Detailed NGN overload control architecture16 6.1 Control architecture: General a

10、pproach16 6.2 Options for locating components (M, D and R) .17 6.2.1 Case 1: protocol supports reject of service requests by the target with an indication of overload17 6.2.2 Case 2: protocol supports an indication of overload, but not rejection of service requests 18 6.2.3 Case 3: protocol supports

11、 neither rejection of service requests nor indication of overload19 6.2.4 Preferred locations of components20 6.3 Destination load control .20 6.3.1 Control loops in series 21 6.3.2 Called address translation .21 6.4 Control of server overload22 6.4.1 Control loops in series 23 6.5 Joint control of

12、destination- and server-overload .23 6.6 AMG to MGC fan-in issue.24 6.7 Discriminating between importance levels.25 6.8 Interworking with load balancing and forking .25 6.9 Interworking with information hiding proxies .25 6.10 Multiple controls at an overloaded resource.27 6.11 Specification of stan

13、dardized control components .28 6.11.1 Mapping of the M, D Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the

14、 ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Fore

15、word This Technical Report (TR) has been produced by ETSI Technical Committee Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN). Introduction Next Generation Networks (NGN) are required to provide real-time services such as authentication, location, pr

16、esence information, user registration, accounting, and separation of bandwidth control from call/session control (as with the gateway control protocol H.248); and these functions will generally be distributed over a number of servers. The protocols used between the servers could comprise any, or all

17、, of the following: SIP, HTTP(S), Radius, Diameter, DNS, COPS, SNMP, SMPP, SAML, LDAP, Parlay, Java, SOAP, Midcom, H.248, SIP-I, INAP, etc. An analysis of IETF Working Groups suggests that much thought has been, and is being, given to the management of bandwidth and router congestion (see, for examp

18、le, RFC 3124 5 “The Congestion Manager“), but almost none to control of host and server processing overload. Indeed, although some of the above listed protocols (e.g. SIP and HTTP) do provide response or status codes that might be used to indicate processing overload, none explicitly specifies an ov

19、erload control mechanism. The same conclusion also seems to apply to the following non-IETF protocols: H.323 8, SOAP, SAML, SMPP, and Parlay. This contrasts with the telephony/ATM world where there are examples of protocols that have built-in overload control features: INAP, ISUP, BICC, PNNI and mor

20、e recently overload control package H.248.11 7. Such controls are crucial during extremes of network operation where surges of service requests (or Denial of Service attacks) can be an order of magnitude greater than normal demand levels. As a general rule, an NGNs servers can experience prolonged p

21、rocessing overload under the appropriate circumstances (e.g. partial, or full, server failure, high rates of incoming service requests). Consequently, it needs to be equipped with some form of overload detection and control (including expansive controls such as load balancing and resource replicatio

22、n), in order to keep response times just low enough under such processing overload to preclude customers abandoning their service requests prematurely. The usual way to provide load control is to build a mechanism into each protocol that needs it (for example ISUP ACC, and the H.248.11 7 Congestion

23、Control Package). However, rather than building a variety of mechanisms into a range of protocols, established through a number of standards fora, it ought to be quicker and cheaper to solve the problem once, in a way that is independent of the main protocols. This could be done by designing a separ

24、ate overload control protocol with associated load control functions which together detect processing overload, adapt and distribute restriction levels and apply restriction. This protocol is called GOCAP (Generic Overload Control Application Protocol). ETSI ETSI TR 182 015 V1.1.1 (2006-10) 6 The pe

25、rceived benefits are: 1) IT- and internet-based protocols will more easily transfer into the service-level assured world of the telecommunications operators. 2) Manufacturers have only one overload control mechanism to implement and maintain. 3) It would simplify the route through standards bodies.

26、4) It would provide flexibility of implementation (no need to implement if not required). The present document explores the some of the options for GOCAP and the functional entities required to support its use as an overload control. The specific NGN requirements and actual protocol specification of

27、 such an overload control will be described separately. ETSI ETSI TR 182 015 V1.1.1 (2006-10) 7 1 Scope The present document describes the architectural principles that are required to provide effective control of processing overload in networks compliant to the TISPAN NGN Architecture. As such it c

28、onstitutes a discussion of the requirements for the protocols required to support the NGN overload control architecture. The scope is limited to the control of processing overload at NGN processing resources caused by service requests coming from session-based or command-response applications by con

29、trolling the rate at which those applications send service requests to an overloaded resource. It does not extend to the overload of transmission bandwidth whether used for the user plane or for the control plane. 2 References For the purposes of this Technical Report (TR), the following references

30、apply: NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 1 ETSI ES 283 039-3: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Specification of protocols required

31、 to support the NGN Overload Control Architecture; Part 3: Overload and Congestion Control for H.248 MG/MGC“. 2 Whitehead M J and Williams P M, “Adaptive Network Overload Controls“, BT Technology Journal, Vol. 20, No. 3, July 2002. 3 ITU-T Recommendation E.412 (01/2003): “Network management controls

32、“. 4 ETSI TR 180 001: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Release 1; Release definition“. 5 IETF RFC 3124: “The Congestion Manager“. 6 ITU-T Recommendation H.248.10: “Gateway control protocol: Media gateway resource congestion handl

33、ing package“. 7 ITU-T Recommendation H.248.11: “Gateway control protocol: Media gateway overload control package“. 8 ITU-T Recommendation H.323: “Packet-based multimedia communications systems“. 9 ITU-T Recommendation H.248.1: “Gateway control protocol: Version 3“. 10 ITU-T Recommendation E.164: “Th

34、e international public telecommunication numbering plan“. 11 ETSI EN 383 001: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Interworking between Session Initiation Protocol (SIP) and Bearer Independent Call Control (BICC) Protocol or ISDN User Pa

35、rt (ISUP) ITU-T Recommendation Q.1912.5, modified“. ETSI ETSI TR 182 015 V1.1.1 (2006-10) 8 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: admission control: control that accepts or rejects request on the basis of

36、system load state NOTE: This “admission control“ relates only to requests accepted and rejected on the basis load state of processing resource. This is a separate control to that used to manage access to transport resource. 3.2 Abbreviations For the purposes of the present document, the following ab

37、breviations apply: A Admission (control, function) ACC Automatic Congestion Control ACL Access Control List ADC Automatic Destination Control AF Application Function AMG Access Media Gateway API Application Programming Interface A-RACF Access Resource Admission Contol Function ATM Asynchronous Trans

38、fer Mode BGF Border Gateway Function BICC Bearer Independent Call Control C Communication (applications) C Control (variable) CA Call Agent COPS Common Open Policy Service D Distribution (function)DNS Domain Name System DoS Denial of Service GOCAP Generic Overload Control Application Protocol HTTP H

39、yperText Transfer Protocol IETF Internet Engineering Task Force IMS Internet protocol based Multimedia core network Subsystem INAP Intelligent Network Application Protocol IP Internet ProtocolISUP ISDN User Part IT Information Technology LDAP Lightweight Directory Access Protocol M Monitor (reject M

40、onitor and restriction Mastering function) MGC Media Gateway Controller NGN Next Generation Network NOCA NGN Overload Control Architecture OSA Open Service Access pA pseudo-AdmissionPDU Packet Data Unit PNNI Private Network to Network Interface PSTN Public Switched Telephone Network R Restrictor, Re

41、striction (method) RACS Resource and Admission Control Subsystem RADIUS Remote Authentication Dial-in User Service SAML Security Access Markup Language SCP Service Control Point SCTP Stream Contol Transmission Protocol SIP Session Initiation Protocol ETSI ETSI TR 182 015 V1.1.1 (2006-10) 9 SIP-I SIP

42、 profile C of EN 383 001 11 SLA Service Level Agreement SMPP Short Message Peer to Peer Protocol SNMP Simple Network Management Protocol SOAP Simple Object Access Protocol SPDF Service Policy Decision Function TCP Transmission Contol ProtocolTISPAN Telecommunications and Internet converged Services

43、and Protocols for Advanced Networking TLS Transaction Layer Security UDP User Datagram Protocol URI Uniform Resource Identifier VoIP Voice-over-IP 4 Requirements for NGN overload controls 4.1 NGN overload scenarios 4.1.1 Processing overload sizes Overloads peak at calling rates much greater than the

44、 predictable daily profile peak to which the network can be economically dimensioned. Table 1 taken from 2 shows the range of calling rate measurements taken from BTs network (based on 15 minute samples). We can see that overload can exceed 64 times the systematic peak calling rate for six 15 minute

45、s periods a year. While, during such an overload we might expect a large proportion of call attempts to fail, however, it would be unacceptable for the network to fail completely due to processing overload. In particular, the network would prioritize service of emergency traffic and other important

46、streams. The reality of massive overloads has been demonstrated by data from PSTN networks, how do these overloads occur? Table 1: Extremes of the calling rate distribution Calling rate expressed as a multiple of systematic quarter hour peak Number of quarter hours per year calling rate is exceeded

47、(% of quarter hours) 2 344 (1 %) 4 139 (0,4 %) 8 51 (0,1 %) 16 22 (0,06 %) 32 17 (0,05 %) 64 6 (0,02 %) 4.1.2 Media stimulated events This is a family of events such as televotes for TV programmes, ticket sales and phone-ins which can all generate high calling rates to particular small ranges of num

48、bers. In 2, it is reported that these events occur with a frequency of several thousand a month. Some of the largest events are televotes stimulated by TV programmes, and such events can have a very rapid onset, with the calling rate increasing at a rate of 4 k calls per second per second over 6 sec

49、onds observed in parts of BTs network. Often these events are known about in advance, so steps can be taken to prepare the overload controls. Also they are usually focussed on a small range of destinations, so controls like ADC 3 may help to reject sessions unlikely to succeed early in the call setup process. ETSI ETSI TR 182 015 V1.1.1 (2006-10) 104.1.3 Disasters Disasters, such as major accidents, terrorist attacks or extreme weather, may stimulate overloads, some times focussed on a few destinations (emergency services, information line

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1