ETSI TS 182 018-2008 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Control of Processing Overload Stage 2 Requirements《电信和互联网融合业.pdf

上传人:sumcourage256 文档编号:744154 上传时间:2019-01-11 格式:PDF 页数:11 大小:62.24KB
下载 相关 举报
ETSI TS 182 018-2008 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Control of Processing Overload Stage 2 Requirements《电信和互联网融合业.pdf_第1页
第1页 / 共11页
ETSI TS 182 018-2008 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Control of Processing Overload Stage 2 Requirements《电信和互联网融合业.pdf_第2页
第2页 / 共11页
ETSI TS 182 018-2008 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Control of Processing Overload Stage 2 Requirements《电信和互联网融合业.pdf_第3页
第3页 / 共11页
ETSI TS 182 018-2008 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Control of Processing Overload Stage 2 Requirements《电信和互联网融合业.pdf_第4页
第4页 / 共11页
ETSI TS 182 018-2008 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) Control of Processing Overload Stage 2 Requirements《电信和互联网融合业.pdf_第5页
第5页 / 共11页
点击查看更多>>
资源描述

1、 ETSI TS 182 018 V2.0.0 (2008-01)Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN);Control of Processing Overload;Stage 2 RequirementsETSI ETSI TS 182 018 V2.0.0 (2008-01) 2 Reference DTS/TISPAN-02035-NGN-R2 Keywords architectur

2、e, control, functional ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the

3、 present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In

4、case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this

5、 and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as autho

6、rized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2008. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the T

7、IPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 182 018 V2.0.0 (2008-01) 3 Contents Intellectual Property Rights4 Foreword.4 1

8、Scope 5 2 References 5 2.1 Normative references .5 3 Abbreviations .5 4 TISPAN NGN overload control requirements .6 4.1 High level overload control requirements 6 4.2 General requirements for Nearest Neighbour load control.7 4.3 Deployment specific requirements .8 4.4 Application specific requiremen

9、ts8 Annex A (informative): Comparison between RACS and nearest neighbour overload control .10 History 11 ETSI ETSI TS 182 018 V2.0.0 (2008-01) 4 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to

10、these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Lat

11、est updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the update

12、s on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technical Committee Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN). ETSI ETSI TS 1

13、82 018 V2.0.0 (2008-01) 5 1 Scope The present document describes the specific TISPAN requirements for controls to manage overload of processing resources in NGNs. In particular, it addresses overload control between nearest neighbours. 2 References References are either specific (identified by date

14、of publication and/or edition number or version number) or non-specific. For a specific reference, subsequent revisions do not apply. Non-specific reference may be made only to a complete document or a part thereof and only in the following cases: - if it is accepted that it will be possible to use

15、all future changes of the referenced document for the purposes of the referring document; - for informative references. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. For online referenced documents, infor

16、mation sufficient to identify and locate the source shall be provided. Preferably, the primary source of the referenced document should be cited, in order to ensure traceability. Furthermore, the reference should, as far as possible, remain valid for the expected life of the document. The reference

17、shall include the method of access to the referenced document and the full network address, with the same punctuation and use of upper case and lower case letters. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity.

18、 2.1 Normative references The following referenced documents are indispensable for the application of the present document. For dated references, only the edition cited applies. For non-specific references, the latest edition of the referenced document (including any amendments) applies. 1 ITU-T rec

19、ommendation E.412: “Network management controls“. 2 ETSI TR 182 015: “Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Next Generation Networks; Architecture for Control of Processing Overload“. 3 ETSI ES 282 003: “ Telecommunications and Internet co

20、nverged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control Sub-system (RACS); Functional Architecture“. 4 ETSI TS 181 005 V2.4.0 (2007-11): “Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Service and Capability

21、Requirements“. 3 Abbreviations For the purposes of the present document, the following abbreviations apply: IMS IP Multimedia Subsystem ISDN Integrated Service Digital Network NGN Next Generation Network ETSI ETSI TS 182 018 V2.0.0 (2008-01) 6 PSTN Public Switched Telecommunication Network QoS Quali

22、ty of Service RACS Resource Admission Subsystem SCF Session Control Function SIP Session Initiation Protocol SLA Service Level Agreement 4 TISPAN NGN overload control requirements 4.1 High level overload control requirements In TS 181 005 4 we have the following requirements for overload control. Th

23、e NGN shall have mechanisms available to control overload that: 1) automatically maximize effective throughput (i.e. admitted service requests/sec) at an overloaded resource; 2) achieve this throughout the duration of an overload event, and irrespective of the overloaded resources capacity or of the

24、 number of sources of overload; 3) are configurable by the service provider so that, under processing overload, a high proportion of response times at overloaded resources are low enough so as not to cause customers to prematurely abandon service requests; 4) should be possible to be applied within

25、a service providers NGN, and between different service providers NGNs; 5) should be possible to be applied within an NGN subsystem (e.g. IMS, PSTN/ISDN emulation) and between different NGN subsystems. NOTE: As a general rule, an NGNs call, session and command processing resources can experience prol

26、onged processing overload under the appropriate circumstances (e.g. partial, or full, server failure, high rates of incoming service requests). Consequently, it needs to be equipped with some form of overload detection and control (including expansive controls such as load balancing and resource rep

27、lication), in order to keep response times just low enough under such processing overload to preclude customers abandoning their service requests prematurely. Many pieces of equipment will have internal load control, which aims to meet the ideal behaviour described in ITU-T recommendation E.412 1 an

28、d shown graphically in figure 1. The object of these internal controls is to bound the system response time by rejecting some of the workload (because rejecting workload requires less effort than accepting it). As the load increases requests are rejected, but because the rejected requests still cons

29、ume some processing resource, the rate at which requests can be accepted falls. As a consequence, such internal load control can only protect the physical host against overload to a limited extent. Severe overloads will reduce the rate at which useful work can be done, and very severe overloads may

30、cause the system to operate incorrectly or with unacceptably long response times. ETSI ETSI TS 182 018 V2.0.0 (2008-01) 7 Figure 1: hedoo Typical overload behaviour in a host with internal load control. By deploying a distributed overload control, in which systems suppress some service requests befo

31、re they reach an overloaded neighbour, the overloaded system is protected from more extreme overloads thus enabling it to operate at near optimum load. For the fulfilment of these NGN requirements, the use of such nearest neighbour overload controls an essential component. The issues regarding overl

32、oad controls for NGNs have been discussed at some length in 2 which provides some initial requirements for overload controls. These requirements are further elaborated in the present document and allocated into different categories. The requirements are also extended to cover the case where an overl

33、oaded target has a non-enumerable set of sources (e.g. SIP user agents overloading an SCF) The overload control requirements for systems loaded by a set of non-enumerable sources may be similar to those for a source loaded by a known, enumerable set of sources, but the approach may be very different

34、. In the enumerable sources case, we may want to control the relative performance seen by each source, offer SLAs to particular sources and have a variety of fairness criteria to use. In the non-enumerable sources case, the issue is one of reducing the aggregate demand, and the fate of individual so

35、urces is less predictable. The definition of fairness would perhaps depend on ensuring equitable treatment over a series of overloads, rather than trying to meet fairness criteria between many sources over a single overload event. Those requirements that are not appropriate for non-enumerable source

36、s are labelled as such. 4.2 General requirements for Nearest Neighbour load control These requirements are general, and any overload control should address these requirements. REQ 1 A control shall automatically reduce the load that is sent to an overloaded host. REQ 2 A control shall aim to maximiz

37、e the number of fully processed service requests at an overloaded host, subject to meeting any QoS constraints for the application (e.g. response times). REQ 3 The overload control restriction shall apply only to defined events which will depend on the reference point that is being controlled. NOTE

38、1: This information may be thought of as within the domain of the applications on the NGN servers. It is the application that “knows“ which requests to offer to the control for possible rejection, the control provides the infrastructure for the restriction to occur. REQ 4 A control shall be aware of

39、 differing importance levels of service requests, and be configurable to reject lower importance service requests in favour of service requests of higher importance level (for example to protect calls to emergency services). REQ 5 When several inter-acting controls are active at an overloaded host a

40、t the same time, they shall converge to an acceptable steady-state when the amount of work sent by each of the sources is constant. REQ 6 A control shall be configurable by the service provider to enable the enforcement of SLAs i.e. to divide the capacity of an overloaded resource between hosts from

41、 which requests are received (or groups of hosts) according to agreed policies. NOTE 2: It is inappropriate to attempt to manage SLAs for individual sources from a set of non-enumerable sources. ETSI ETSI TS 182 018 V2.0.0 (2008-01) 8 REQ 7 A control shall enforce fair allocation of overloaded proce

42、ssing resources between competing request sources (a request source in this context means the host from which the overloaded resource receives the request, not necessarily the originating host). NOTE 3: It is the SLA that defines the resources allocated to a request source by an overloaded resource.

43、 A fair allocation of resources implies that the resource consumed by every source is appropriate given the SLA allocated to that source. It does not necessarily require that the each request source obtains the same amount of processing resource. REQ 8 The behaviour of the control shall be fully-spe

44、cified. REQ 9 A control shall allow manual configuration of the overload controls components via a management interface. REQ 10 A control shall operate (optionally) without manual configuration of the overload control parameters. REQ 11 A control shall output network management data on event occurre

45、nce (e.g. control activation/termination) and on demand from network management (e.g. counts of service requests admitted and rejected by the overload control). REQ 12 A control shall have adequate security from malicious actions. It shall not be possible for a host to instantiate a restriction able

46、 to reject service requests destined for a different host. NOTE 4: This implies that a mechanism for the verification of the identity of hosts originating restriction messages is required. REQ 13 A control shall be applicable within a network, and between networks. REQ 14 It should be possible to ap

47、ply overload control between different NGN subsystems. REQ 15 A control shall react quickly to changes in the workload sent to the host it is protecting. REQ 16 A control shall be capable of dealing with work received from hosts which do not support it. Such hosts that are part of a finite set of so

48、urces shall not receive disproportionate benefit (i.e. requirements 6 and 7 shall still hold). 4.3 Deployment specific requirements The following requirements relate to different deployment options of the protected host and its traffic sources. Particular controls will need to address these deployme

49、nts, so any overload control architecture must support or enable these requirements. REQ 17 Controls are required for scenarios where hosts receive service requests from an uncountable number of unknown sources as well as scenarios where hosts receive service requests from a known set of sources. A particular overload target may have a mixture of known, enumerable sources as well as an unknown, non-enumerable set of sources. In those cases, it shall be possible for the controls to inter-work, such that the SLAs for the enumerable sources are protected and

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1