Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
4Activity
×

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
T09-WTSA.12-C-0030MSW-E2

T09-WTSA.12-C-0030MSW-E2

Ratings: (0)|Views: 1,223|Likes:
Published by SNSR

More info:

Published by: SNSR on Dec 06, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

10/15/2013

pdf

text

original

 
Contact:
TSB Tel: +41 22 730 5126Fax: +41 22 730 5853Email:tsbsg13@itu.int 
World Telecommunication Standardization Assembly(WTSA-12)
 
Dubai, 20 November - 29 November 2012
 
PLENARY MEETING Document 30-E
 
July 2012
 
Original: English
ITU-T Study Group 13Future networks including mobile and NGN
DRAFT NEW RECOMMENDATION ITU-T Y.2770 PROPOSEDFOR APPROVAL AT THE WORLD TELECOMMUNICATIONSTANDARDIZATION CONFERENCE (WTSA-12)
 
2WTSA-12/30-E
ITU-T\CONF-T\WTSA12\000\030E.DOC
ADD
SG13/30/1
DRAFT NEW RECOMMENDATION ITU-T Y.2770 (FORMERLY Y.DPIREQ)
Requirements for Deep Packet Inspection in Next GenerationNetworks
Summary
This Recommendation specifies the requirements for Deep Packet Inspection (DPI) in NextGeneration Networks (NGN). This Recommendation primarily specifies the requirements for DeepPacket Inspection (DPI) entities in NGN, addressing, in particular, aspects such as applicationidentification, flow identification, inspected traffic types, signature management, reporting to thenetwork management system (NMS) and interaction with the policy decision functional entity.Although aimed at the NGN, the requirements may be applicable to other types of networks. ThisRecommendation also contains use cases and other complementary information as appendixes.
 
3WTSA-12/30-E
ITU-T\CONF-T\WTSA12\000\030E.DOC
CONTENTS
1
 
Scope ................................................................................................................ 9
 
1.1
 
Applicability ..................................................................................................... 9
 
1.2
 
Policy Rules ...................................................................................................... 10
 
2
 
References ........................................................................................................ 11
 
3
 
Definitions ........................................................................................................ 11
 
3.1
 
Terms defined elsewhere .................................................................................. 11
 
3.2
 
Terms defined in this Recommendation ........................................................... 12
 
4
 
Abbreviations and acronyms ............................................................................ 15
 
5
 
Conventions ...................................................................................................... 17
 
6
 
DPI functional entity requirements ................................................................... 18
 
6.1
 
Flow and application identification .................................................................. 18
 
6.2
 
DPI signature management ............................................................................... 18
 
6.2.1
 
General signature requirements ........................................................................ 19
 
6.2.2
 
Management of DPI signature library .............................................................. 19
 
6.2.3
 
Location of management function .................................................................... 20
 
6.2.4
 
Initiation of management actions ..................................................................... 20
 
6.3
 
Traffic inspection aspects ................................................................................. 20
 
6.3.1
 
Flow identification aspects ............................................................................... 20
 
6.3.2
 
Protocol-stack aware and protocol-stack agnostic DPI aspects........................ 21
 
6.3.3
 
DPI policy rule actions aspects ......................................................................... 21
 
6.4
 
Reporting capability ......................................................................................... 23
 
6.4.1
 
Reporting to the Network Management System (NMS) .................................. 23
 
6.4.2
 
Reporting of new, unknown or incorrect application ....................................... 24
 
6.4.3
 
Reporting of abnormal traffic ........................................................................... 24
 
6.4.4
 
Reporting of events related to the DPI-PE ....................................................... 24
 
6.5
 
Interaction with a policy decision function ...................................................... 25
 
6.6
 
Traffic control ................................................................................................... 26
 
6.7
 
Session identification ........................................................................................ 26
 
6.7.1
 
Requirements for session identification ........................................................... 26
 
6.7.2
 
DPI actions at ‘session level’............................................................................ 26
 
6.8
 
Inspection of encrypted traffic .......................................................................... 26
 
6.8.1
 
Extent of encryption ......................................................................................... 26
 

Activity (4)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
장중혁 liked this
Andrew Lindner liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->