Professional Documents
Culture Documents
communication Network
BTCS- 703
1
Next Generation Network
2
Objectives of subject
networks.
Mobile Computing
4
What Is Mobile Computing?
(Cont.)
6
What Is Mobile Computing? (Cont.)
. Mobile Computing is an umbrella term used to
describe technologies that enable people to access
network services anyplace, anytime, and anywhere.
7
Why Go Mobile?
Enable anywhere/anytime connectivity
Bring computer communications to areas
without pre-existing infrastructure
Enable mobility
Enable new applications
An exciting new research area
8
Advantages
Today many peoples use mobile computing for different purposes
1 Advances in technology
• More computing power in smaller devices ,Flat, lightweight displays
with low power consumption
• New user interfaces due to small dimensions
• More bandwidth (per second? per space?)
• Multiple wireless techniques
2. Technology in the background
• Device location awareness: computers adapt to their environment
• User location awareness: computers recognize the location of the
• user and react appropriately (call forwarding)
3. Computers” evolve Small, cheap, portable, replaceable Integration
or disintegration
9
Advantages of Mobile Computing
Ease of Research: Research has been made easier, since users earlier
were required to go to the field and search for facts and feed them back
into the system. It has also made it easier for field officers and
researchers to collect and feed data from wherever they are without
making unnecessary trips to and from the office to the field.
Entertainment
Video and audio recordings can now be streamed on-the-go using mobile
computing. It's easy to access a wide variety of movies, educational and
informative material
11
Conti……
With the improvement and availability of high speed data connections at
considerable cost, one is able to get all the entertainment they want as
they browse the internet for streamed data. One is able to watch news,
movies, and documentaries among other entertainment offers over the
internet. This was not possible before mobile computing dawned on the
computing world.
Streamlining of Business Processes: Business processes are now
easily available through secured connections. Looking into security
issues, adequate measures have been put in place to ensure
authentication and authorization of the user accessing the services.
Some business functions can be run over secure links and sharing of
information between business partners can also take place. Meetings,
seminars and other informative services can be conducted using video
and voice conferencing. Travel time and expenditure is also
considerably reduced.
12
• There are 2 aspects of mobile computing
13
Mobile Computing Functions
User mobility
Network mobility
Device Mobility
Bearer Mobility
Session Mobility
14
User Mobility
15
Network Mobility
16
Device Mobility
17
Bearer Mobility
18
Session Mobility
Mobile communication
Mobile hardware
Mobile software 20
Mobile communication
The mobile communication refers to the use of technology
that allows us to communicate with others in different
locations. The wireless networks carry the data where it
needs to go. Traditionally, data was routed through cell
towers in a particular provider’s physical network to
another user’s phone. With modern mobile computing,
data is also often delivered onto the Internet via the
provider’s telecom network. where users can access
individual Internet sites over their smart phones.
21
Since the media is unguided/ unbounded, the overlaying
infrastructure is basically radio wave-oriented. That means
the signals which help in sending and receiving similar kind
of signals are carried by air to those devices.
22
Mobile communication can be of one of the
following form as mentioned below.
23
Mobile and Wired : In this configuration, Some of the devices
are wired and some are mobile in nature. For Example :
Laptops.
. 24
Mobile Hardware
Mobile hardware includes mobile devices or device components capable
of operating, executing and providing services that receive or access the
service of mobility. They would range from portable laptops, smart phones,
tablet Pc's, Personal Digital Assistants. Above mentioned devices use an
existing and established network to operate on. In most cases, it would be
a wireless network.
25
Mobile software
Mobile software is an operating system that allows smart phones, tablet
PCs, and other devices to run applications and programs. It is the
actual program that runs on the mobile hardware. It deals with the
characteristics and requirements of mobile applications. This is the
engine of the mobile device. It is considered as the heart of the device
26
Applications of Mobile Computing
27
Figure shows a typical scenario for mobile
communications with many wireless devices.
28
Networks with a fixed infrastructure like cellular phones (GSM,
UMTS) will be interconnected with trunked radio systems
(TETRA) and wireless LANs (WLAN).
The networks between cars and inside each car will more likely
work in an ad-hoc fashion
29
Emergencies
An ambulance with a high-quality wireless connection to a
hospital can carry vital information about injured persons to
the hospital from the scene of the accident. All the necessary
steps for this particular type of accident can be prepared and
specialists can be consulted for an early diagnosis. Wireless
networks are the only means of communication in the case
of natural disasters such as hurricanes or earthquakes. In
the worst cases, only decentralized, wireless ad-hoc
networks survive.
30
Business
etc.
31
Figure shows what may happen when
employees try to communicate off
base.
32
At home, the laptop connects via a WLAN or LAN
and DSL to the Internet.
33
Credit Card Verification
34
Replacement of Wired Networks
35
Infotainment
36
Challenges
Disconnection
Low bandwidth
Low power and resources
Security risks
Wide variety terminals and devices with
different capabilities
Device attributes
Fit more functionality into single, smaller
device
37
Limitations and disadvantages of MC
Resource constraints: Battery needs and recharge requirements
are the biggest constraints of mobile computing.
Interference: Radio transmission cannot be protected against
interference using shielding and result in higher loss rates for
transmitted data or higher bit error rates respectively
38
Continue
Network Issues Due to the ad hoc networks some issues
relating discovery of connection, service to destination, and
connection stability.
Interoperability issues: the varying protocol standards
39
Disadvantages of MC
One of the disadvantages is that the mobile devices will need either
WiFi connectivity or mobile network connectivity such as GPRS, 3G and
in some countries even 4G connectivity that is why this is a
disadvantage because if you are not near any of these connections
your access to the internet is very limited.
Security Concerns
Mobile VPNs are unsafe to connect to, and also syncing devices
might also lead to security concerns. Accessing a WiFi network can
also be risky because WPA and WEP security can be bypassed easily.
Power Consumption
Due to the use of batteries in these devices, these do not tend to last
long, if in a situation where there is no source of power for charging
then that will certainly be a letdown. 40
EVOLUTION OF MOBILE COMPUTING
Mobile computing first came into the lights in the year 1990. The
devices which were first implemented on mobile computing technology
were two-way radios. These two-way radios were used to communicate
with the computers which were three inches long with the help of large
antennas. These three-inch-long computers were able to perform all
those tasks a normal person.
41
The advent of portable computers and laptops, Personal Digital
Assistants (PDA), PC tablets and smart phones, has made mobile
computing very convenient. Mobile devices have now become the
personal command centers for all other wearable and connected
devices.
The portability of these devices ensure and help the users to access all
the services as if they were working in the internal network of their
company. For example consider the use of Tablet PC and iPads. This
new technology helps the users to update documents, surf the internet,
send and receive e-mail, stream live video files, take photographs and
also support video and voice conferencing where it is easy for the
people to access.
42
Evaluation of devices
43
Future of Mobile Computing
44
Architecture for mobile computing
3) Data Tiers
45
46
3 Tiers Architecture
47
48
In three tier architecture, the first layer is User Interface or
Presentation Tier.
This layer deal with user facing device handling and rendering.
this tier includes a user system interface where user service
reside.
sits in middle between the operating system and the user facing
software.
1) Message –oriented Middle war
2) Transaction processing Middleware.
3) Database Middleware
4) Communication Middleware
5) Distributed Object and Components.
6) Transcoding Middleware.
The Data Tier is used to store data needed by the
application and acts as a repository for both
temporary and permanent data.
1
What Is Wireless n/w?
A wireless network is a computer network that uses
wireless data connections between network nodes
4
Features
1G technology uses FDMA for different Subscribers by single user
on single channel.
5
FDMA
Frequency Division Multiple Access (FDMA) is one of the most common
analogue multiple access methods. The frequency band is divided into
channels of equal bandwidth so that each conversation is carried on a
different frequency (as shown in the figure below).
6
DRAWBACKS OF 1G.
Voice quality is low and effect of noise is more as the FDMA is
analog communication.
Costly as 1 subscriber per carrier and hence less call are supported by
tower.
No Security.
Limited Capacity
Cell phones received their first major upgrade when their technology
went from 1G to 2G. This leap took place in Finland in 1991 on GSM
networks and effectively took cell phones from analog to digital
communications.
10
GSM
GSM stands for Global System for Mobile Communication. It is a digital
cellular technology used for transmitting mobile voice and data services.
The concept of GSM emerged from a cell-based mobile radio system at Bell
Laboratories in the early 1970s.
GSM is a circuit-switched system that divides each 200 kHz channel into
eight 25 kHz time-slots. GSM operates on the mobile communication bands
900 MHz and 1800 MHz in most parts of the world. In the US, GSM operates
in the bands 850 MHz and 1900 MHz.
GSM digitizes and compresses data, then sends it down through a channel
with two other streams of user data, each in its own timeslot
Why GSM?.
International roaming
High-quality speech
In 900 uplink i.e. from mobile to BTS is from 890-915 MHz and downlink
i.e. from BTS to mobile is from 935-960 MHz
In 2G two types of multiple Access are used TDMA Based GSM technology,
CDMA based IS 95.
In GSM different types of carriers of frequency 200 KHz are used and hence
in 900 frequency band 124 carriers are used and in 1800 band 373 carriers
can be used.
First Data service was started in the form of SMS and later GPRS was
introduced.
In CDMA Up to 61 users can be communicating simultaneously.
CDMA also has bandwidth of 20 MHz at 800 bands and 1900 band.
Multimedia services are not supported in this technology. 13
2G
FEATURES OF 2G TECHNOLOGY: It enables services such as
text messages, picture messages and MMS (multi media message). It
provides better quality and capacity .
14
2.5G and 2.75 G
“2.5G” using GPRS (General Packet Radio Service) technology is a
cellular wireless technology developed in between its predecessor, 2G, and
its successor, 3G. GPRS could provide data rates from 56 kbit/s up to 115
kbit/s. It can be used for services such as Wireless Application Protocol
(WAP) access, Multimedia Messaging Service (MMS), and for Internet
communication services such as email and World Wide Web access.
2.75 – EDGE is an abbreviation for Enhanced Data rates for GSM
Evolution. EDGE technology is an extended version of GSM. It allows the
clear and fast transmission of data and information up to 384kbit/s speed.
15
3G - Third Generation
16
3G Wireless Technology
3G technology works on 2100 MHz band.
Should support 2 Mbps for stationary users, 384 kbps for mobile users.
17
3G
FEATURES OF 3G TECHNOLOGY: Providing Faster
Communication , Send/Receive Large Email Messages High Speed
Web / More Security Video Conferencing / 3D Gaming, TV
Streaming/ Mobile TV/ Phone Calls, Large Capacities and Broadband
Capabilities, 11 sec – 1.5 min. time to download a 3 min Mp3 song.
18
4G - Fourth Generation
19
4G Wireless Technology
4G technology works on 1800 MHz, 2600 MHz band and 800 MHz
band.
20
4G
(Anytime, Anywhere) The next generations of wireless technology that
promises higher data rates and expanded multimedia services. Capable
to provide speed 100Mbps-1Gbps. High QOS and High Security
Provide any kind of service at any time as per user requirements,
anywhere. Features Include: More Security , High Speed, High
Capacity, Low Cost Per-bit etc.
21
COMPARISON BETWEEN 3G Vs 4G
The basic difference between 3G and 4G is in data transfer and
signal quality. 3G 4G Data Transfer Rate 3.1 MB/sec 100 MB/sec
Internet Services Broadband Ultra Broadband Low High
Bandwidth 5-20 MHz 100MHz Frequency 1.6-2 GHz 2-8 GHz
Download and upload 5.8 Mbps 14 Mbps Technology Mobile - TV
Resolution Countries Have 4-G Except for the Scandinavian
Countries (Northern Europe that includes Denmark and two of the
nations of Scandinavian , Norway and Sweden. ), a few countries
have started the 4G commercially. In the US, Sprint Nextel and
Others Germany , Spain, China , Japan and England are also
22
Short-Range Wireless
23
Bluetooth
1. A tangle of cables
2. Varying standard of cables and connectors
3. unreliable galvanic connections
4. re-configuration of units
5. manual switches when ports are not sufficient
6. Need of confirmation on both side
7. plugging of both device
29
Advantages of technology :
1. Simple setup
2. Compatibility
3. Less hardware
4. Security
5. Standard protocol
7. Economical
8. Upgrade able
9. Automatic
10. Simplify the communication during driving
11. Instant PAN
12. Don’t need to be face to face 30
Applications of The technology :
1. Wireless networking between laptop and desktop
2. Transfer of the data
3. Use in E-commerce ‘and retail in future
4. Home networking
5. cable -less connection to printer, fax, cameras
6. Dial-up and automatic e-mail
7. Use of PDA or PC as hands free phone
8. Automatic exchange of files
9. Bluetooth interface to office PBX
10. Use of cell phone as office cordless phone
31
RFID
32
How does RFID work?
RFID belongs to a group of technologies referred to as Automatic Identification and
Data Capture (AIDC). AIDC methods automatically identify objects, collect data about
them, and enter those data directly into computer systems with little or no human
intervention. RFID methods utilize radio waves to accomplish this. At a simple level,
RFID systems consist of three components: an RFID tag or smart label, an RFID reader,
and an antenna. RFID tags contain an integrated circuit and an antenna, which are used
to transmit data to the RFID reader (also called an interrogator). The reader then
converts the radio waves to a more usable form of data. Information collected from the
tags is then transferred through a communications interface to a host computer system,
where the data can be stored in a database and analyzed at a later time.
33
Radio Frequency Identification (RFID) refers to a wireless system
comprised of two components: tags and readers. The reader is a device
that has one or more antennas that emit radio waves and receive
signals back from the RFID tag. Tags, which use radio waves to
communicate their identity and other information to nearby readers, can
be passive or active. Passive RFID tags are powered by the reader and
do not have a battery. Active RFID tags are powered by batteries.
RFID tags can store a range of information from one serial number to
several pages of data. Readers can be mobile so that they can be
carried by hand, or they can be mounted on a post or overhead. Reader
systems can also be built into the architecture of a cabinet, room, or
building.
34
35
At a simple level, Radio-Frequency Identification systems
consist of three components:
An RFID tag – a transponder that has been programmed with
information.
An RFID reader – a transceiver with a decoder to interpret the
data.
A scanning antenna
36
Some Advantages of RFID:
RFID tags do not need batteries to operate (active RFID tags);
therefore may be used for very long periods of time.
Scanning antennas can be permanently affixed to a surface;
handheld antennas are also available
RFID Frequencies:
RFID readers, Tags, and Labels are designed with specific
frequencies, which are usually, but not always designed for specific
uses and applications. LF or Low Frequency which is usually 125.0
kHz and 134.2 kHz for most popular applications and actually goes
up to 150 kHz on the scale of frequencies. LF 125.0 KHz is mostly
used for industrial applications, where 134.2 kHz is used for animal
identification.
37
Uses
Inventory control
Equipment tracking
Personnel tracking
Monitoring patients
! Our goal for this session is to consider some ideas which may influence
what the Internet of the future will be.
! ITU-T SERIES Y: GLOBAL INFORMATION INFRUSTRUCTURE,
INTERNET PROTOCOL ASPECTS AND NEXT GENERATION
NETWORKS
! Y.2001: General overview of NGN
! A network with guaranteed QoS for different traffic types and SLAs
(SLA refers to service-level agreement)
! Simplification in
! (Operation and Manipulation)
! lowering OPEX.
! Benefits
! Worked well for stand-alone systems
! Challenges
! Many networks= high operational and interworking costs
! Benefits
! Rapid service deployment= new service revenues
! Challenges
! Legacy policy frameworks are challenged by the emerging telecommunications
model throughout the world
! VoIP
! Video calling
! Multimedia Messaging
! Games
! …
packet-
oriented
network
support
integration of broad
existing
variety of
infrastructure
services
NGN
concept openness
application and
focused - flexibility
access regarding
independent separation new
into different services
layers using
open
interfaces
! Customer benefits
! device independence
! access independence
! service variety
! enhanced usability
! Operator/ Provider benefits
! new revenue potential
! improves time-to-market
! easy integration of 3rd party services
! one platform for voice, data and multimedia
! Access Gateways
! Allows the connection of subscriber lines to the packet network
! Converts the traffic flows of analogue access (Pots) or 2 Mb/s access devices into
packets
! Provides subscriber access to NGN network and services
! Trunking Gateways
! Allows interworking between classical TDM telephony network and Packet-based NGN
networks,
! Converts TDM circuits/ trunks (64kbps) flows into data packets, and vice versa
Digital Media Lab - Sharif University of Technology
Network Architecture(cont.)
! Soft switch/MGC
! referred to as the Call Agent or Media Gateway Controller (MGC)
! provides the “service delivery control” within the network in charge of Call
Control and handling of Media Gateways control (Access and/or Trunking) via H.
248 protocol
! H.248 Protocol
! Known also as MEGACO: standard protocol, defined by ITU-T, for signaling and
session management needed during a communication between a media
gateway, and the media gateway controller managing it
! H.248/MEGACO allows to set up, keep, and terminate calls between multiple
endpoints as between telephone subscribers using the TDM
! SIP
! Session Initiation Protocol in order to handle call establishment, maintenance
and termination from packet mode terminals.
! MPLS
! Multiprotocol Label Switch or protocol that assigns labels to information packets in
order to allow the node routers to treat and route flows in the network paths according
to established priority for each category.
! CAC
! Call Acceptance Control function in order to accept/reject traffic in the network that
allows guarantee of QoS for services with a Service Level Agreement
! BGP
! Border Gateway Protocol to negotiate flow routing procedures and capacities across
different NGN network domains
! Release based (ETSI TISPAN r1, 3GPP r7, ITU NGN r1-3)
! Part of the 3GPP (and 3GPP2: MMD) vision for evolving mobile networks
beyond GSM
! Original formulation (Rel-5) an approach to deliver "Internet services" over
GPRS
! IMS in short…
! Open-system architecture that supports a range of I-based services over
the PS domain, employing both wireless and fixed access technologies
! Any-to-any connectivity
! Interconnect
! Charging models for multiple providers in an E2E service
! Pricing
! Standards
! Common standards
! Consumer interests
Introduction to Wireless
Application Protocol (WAP)
and WAP 2.O Standard
Presented by
Dragomanov Andon
Paunovski Ognen
This document may be downloaded from the IDA website at http://www.ida.gov.sg and shall not be distributed without written
permission from IDA
IDA RS NGN TECH FRAMEWORK: 2007
Contents
Page
1 Scope 3
3 NGN Functions 6
6 Security Considerations 13
9 References 17
2
IDA RS NGN TECH FRAMEWORK: 2007
1 Scope
1.1 This Reference Specification outlines the technical framework which is relevant
for developing the Next Generation Networks (NGN). It refers to the architecture
for NGN given in the ITU-T recommendation for Functional Requirements and
Architecture of the NGN for Release 1 (ITU-T Rec. Y.2012).
1.2 The architecture for NGN shown in section 2 of this Specification is a functional
architecture where a set of functions is used to describe the NGN structure. Each
function is defined and specified as a set of functional entities (outlined in
sections 3 and 4 of this Specification). Groupings of functional entities are used to
describe the physical NGN implementations, and determine the capabilities
supported in the NGN. Therefore network operators may choose and combine
the functional entities according to their business models, services and
capabilities to be supported.
1.3 NGN service-specific components required for the NGN to support services such
as the mediated multimedia services and the PSTN/ISDN service capabilities are
outlined in section 5 of this Specification. Security considerations are defined in
section 6 of this Specification.
1.4 This architecture for NGN allows for the support of services identified in the ITU-T
Y series Supplement 1 for the NGN Release 1 scope, which are outlined in
section 7 of this Specification. It also allows for the support of capabilities and
capability requirements identified in the ITU-T recommendation for the NGN
Release 1 requirements (ITU-T Rec. Y.2201), which are listed in section 8 of this
Specification.
1.5 This architecture for NGN does not restrict network operators’ freedom to deploy
capabilities or use capabilities of their business partners. Specific division of
functional entities between the core and access networks is based on operators’
business decisions rather than hard points of separation in the architecture.
Functional entities may be mixed and matched in different ways. Physical
equipment may have both the core and the access network functions.
1.6 Existing network operators may have adopted the overlay approach in which
legacy networks like the Public Switched Telephone Network (PSTN) / Integrated
Service Digital Network (ISDN) and Public Land Mobile Network (PLMN), will co-
exist with the NGN for some time. Therefore inter-working with PSTN/ISDN is an
important consideration in the architecture for NGN.
3
IDA RS NGN TECH FRAMEWORK: 2007
2.1 The architecture for NGN described in this Reference Specification conforms to
the NGN architecture as shown in Figure 1, which is a 2-layered NGN model,
structured according to a service stratum and transport stratum.
2.2 The set of functions within the transport stratum of the 2-layered NGN model is
supported by many protocols which together compose the NGN transport network.
The end of the transport stratum protocol stack is denoted by layer 3 of the Open
Systems Interconnection (OSI) Basic Reference Model (BRM) and the beginning
of the service stratum protocol stack is denoted by layer 4 of the OSI BRM (see
Figure 2). Layer 3 is the converging Internet Protocol (IP) layer where the IP-
based NGNs converge in providing IP connectivity across the NGN transport
network. Layer 4 is the Transmission Control Protocol (TCP) or User Datagram
Protocol (UDP) layer. A variety of layer 1 (Physical layer) and layer 2 (Data Link
layer) will exist depending on the underlying technologies used to support IP.
Open Standards
Two Service Domains
Interconnection (OSI)
Basic Reference Model
NGN Strata View
View
2.3 With a flexible architecture for NGN which supports multiple access network
technologies, a core network can be set apart from another core network
4
IDA RS NGN TECH FRAMEWORK: 2007
5
IDA RS NGN TECH FRAMEWORK: 2007
3 NGN Functions
3.1.1.1 Transport functions provide connectivity for all physically separated functions
within the NGN. These functions provide support for the transfer of media
information, as well as the transfer of control and management information.
Transport functions as defined in the ITU-T Rec. Y.2012 include access
network functions, edge functions, core transport functions, gateway functions
and media handling functions.
3.1.1.2 No assumptions are made about either the technologies to be used or the
internal structure, for example, the access transport network and the core
transport network.
6
IDA RS NGN TECH FRAMEWORK: 2007
(a) Within the NGN architecture, the Resource and Admission Control
Functions (RACF) act as the arbitrator between Service Control Functions
and Transport Functions for QoS (ITU-T Rec. Y.1291) related transport
resource control within access and core networks. The decision is based
on transport subscription information, Service Level Agreements (SLA),
network policy rules, service priority (defined by ITU-T Rec. Y.1571), and
transport resource status and utilization information.
(b) The RACF takes into account the capabilities of transport networks and
associated transport subscription information for subscribers in support of
the transport resource control. The RACF interacts with Network
Attachment Control Functions (NACF), including network access
registration, authentication and authorization, parameters configuration
etc, for checking transport subscription information.
(b) NACF includes Transport user profile which takes the form of a functional
database representing the combination of a user’s information and other
control data into a single "user profile" function in the transport layer. This
functional database may be specified and implemented as a set of
cooperating databases with functionalities residing in any part of the NGN.
7
IDA RS NGN TECH FRAMEWORK: 2007
Functional groups in the service layer include Service Control Functions and
Application Support and Service Support Functions.
3.2.1.1 Service Control Functions (SCF) include resource control, registration, and
authentication and authorization functions at the service level for both mediated
and non-mediated services. They can also include functions for controlling media
resources, i.e., specialized resources and gateways at the service-signalling level.
3.2.1.2 SCF accommodates service user profiles which represent the combination of
user information and other control data into a single user profile function in the
service layer in the form of functional databases. These functional databases may
be specified and implemented as a set of cooperating databases with
functionalities residing in any part of the NGN.
3.3.1 No assumptions are made about the diverse end-user interfaces and end-user
networks that may be connected to the NGN access network. End-user
equipment may be either mobile or fixed.
3.3.2 NGN support for user functions is limited to the control of user gateway functions
between the end user functions and the access transport functions. The device
implementing these gateway functions may be customer or access transport
provider managed. Management of customer networks is however outside of the
scope of the NGN Release 1.
3.4.1 Support for management is fundamental to the operation of the NGN. These
functions provide the ability to manage the NGN in order to provide NGN services
with the expected quality, security, and reliability.
3.4.2 These functions are allocated in a distributed manner to each functional entity
(FE), and they interact with network element (NE) management, network
management, and service management FEs. Further details of the management
functions, including their division into administrative domains, can be found in
ITU-T Rec. M.3060.
3.4.3 Management functions apply to the NGN service and transport layers. For each
of these layers, they cover the following areas:
8
IDA RS NGN TECH FRAMEWORK: 2007
3.4.4 The accounting management functions also include charging and accounting
functions (CAF). These interact with each other in the NGN to collect accounting
information, in order to provide the NGN service provider with appropriate
resource utilization data, enabling the service provider to properly bill the users of
the system. A detailed description of the CAF functions can be found in § 7.5/ITU-
T Rec. Y.2012.
9
IDA RS NGN TECH FRAMEWORK: 2007
10
IDA RS NGN TECH FRAMEWORK: 2007
4.4 Application Support and Service Support FEs defined in § 8.3.4/ITU-T Rec.
Y.2012:
11
IDA RS NGN TECH FRAMEWORK: 2007
Other NGN service components will be defined in the future to address other
services such content delivery, multimedia multicast or broadcast services, push
services, data retrieval applications, data communication services, online
applications, sensor network services, remote control services, and over-the-
network device management.
12
IDA RS NGN TECH FRAMEWORK: 2007
6 Security Considerations
(b) NGN security at the service layer addresses the security concerns of the
services provided by service providers to their customers. Services
include domain name services, value-added services and quality of
service etc. Security applied is to protect the service providers and their
customers.
(c) NGN security at the IP layer addresses the packet flow which is
supported by the network facilities in transporting information. Security is
focused on protecting the IP packets.
(d) NGN security at the data link layer focuses on protecting the data frames
within a single link.
13
IDA RS NGN TECH FRAMEWORK: 2007
7.1 The NGN Release 1 provides an extensible platform for services and an
architecture which is designed to be extensible, allowing new services to be
implemented as and when required. All services are carried over the Internet
Protocol (IP), which in turn may be carried over a number of underlying
technologies such as Asynchronous Transfer Mode (ATM), Ethernet, etc. The
functions supported by the NGN Release 1 specifications are again illustrated in
Figure 3, which includes interfaces between NGN and end-user functions,
between NGN and other networks, and between NGN and applications.
7.2 The NGN Release 1 extensible platform and architecture supports the following
services:
14
IDA RS NGN TECH FRAMEWORK: 2007
7.4 Figure 3 represents the compilation of user and other control data into two
functions: "service user profile" and "transport user profile" functions. These
functions may be specified and realised as a set of co-operating databases with
functionality residing in any part of the NGN.
7.5 End-user interfaces are supported by both physical and functional (control)
interfaces. All categories of customer equipment are supported in the NGN, from
single-line legacy telephones to complex corporate networks. Customer
equipment may be both mobile and fixed.
15
IDA RS NGN TECH FRAMEWORK: 2007
16
IDA RS NGN TECH FRAMEWORK: 2007
9 References
17
TCP/IP Networking for Wireless
Systems
Content
• TCP
– Basic Properties
– TCP Datagram Format
– Connection Setup and Release
– MTU and MSS
– Cumulative, Delayed and Duplicate Acknowledgements
– Sliding Window Mechanism
– Flow and Error Control
Implementations:
– De-facto standard: BSD 4.x implementations (Berkeley Software
Distribution)
– Subsequent versions come with new TCP features, e.g.
4.3 BSD Tahoe (1988): slow start, congestion avoidance, fast
retransmit
4.3 BSD Reno (1990): fast recovery
– Other TCP/IP stacks derived from BSD
– Implemented mechanisms, default parameter settings, and bugs
are different on different operating systems (e.g. versions of MS
Windows)!
Hardware interface
Link PPP, Ethernet, IEEE 802.x,
(2)
Packet transfer be-
ARP
tween network nodes
TCP/IP Encapsulation
user data
Example:
Application data Application
transfer using TCP appl.
user data
header
TCP
TCP
application data
header
20
TCP segment
IP
IP TCP
application data
header header
20
IP datagram Ethernet
20...65536 bytes Driver
Hardware
ARP
Interface ... Link Layer
Examples:
– Ethernet (encapsulation of higher layer packets is defined in RFC 894)
– PPP: Point-to-Point Protocol for serial lines (RFCs 1332, 1548)
MTU: Maximum Transfer Unit (or Max. Transmission Unit)
– Maximum IP packet size in bytes (e.g. for Ethernet: 1500, X.25 Frame Relay:
576)
Path MTU:
– Smallest MTU of any data link in the path between two hosts
– Used to avoid IP fragmentation
– TCP option: path MTU discovery (RFC 1191)
Loopback Interface:
– A client application can connect to the corresponding server application on the
same host by using the loopback IP address “localhost“ = 127.0.0.1
– Implemented at the link layer, i.e. full processing of transport and IP layers
ARP: Address Resolution Protocol (RFC 826)
– Address resolution from 32-bit IP addresses to hardware addresses (e.g. 48-
bit)
Advanced Mobile Communication Networks, Master Program 8
Integrated Communication Systems Group
Hardware
ARP ...
Interface Link Layer
IP Datagram Format
QoS - (reserved)
Number requirements; IP datagram “Real“ frag
- don‘t fragment
of 32-bit rarely used length in bytes ment offset /
- more
IPv4 words and supported (limit = 65536) 8
fragments
Unique 4-bit
4-bit
header 8-bit type of service 16-bit total length (in bytes)
identifier version
length
(counter)
3-bit
16-bit identification 13-bit fragment offset
flags
Limit on the 8-bit time to live 8-bit protocol 16-bit IP header checksum 20 bytes
number of
routers
(countdown) 32-bit source IP address
Hardware
ARP ...
Interface Link Layer
Used
Usedforfor
application
application
multiplexing
Hardware
ARP
Interface ... Link Layer
HTTP/1.0:
– Objects are (requested and received) serially
– For each object, a new TCP connection is established, used and
released
– Multiple connections: several TCP connections can be used in
parallel
Properties
Connection-oriented, reliable byte-stream service:
– Reliability by ARQ (Automatic Repeat reQuest):
• TCP receiver sends acknowledgements (acks) back to TCP sender to
confirm delivery of received data
• Cumulative, positive acks for all contiguously received data
• Timeout-based retransmission of segments
– TCP transfers a byte stream:
• Segmentation into TCP segments, based on MTU
• Header contains byte sequence numbers
Congestion avoidance + flow control mechanism
Cumulative Acknowledgements
TCP TCP
sender 40 39 Router 38 37 receiver
received:
...
33 34 35 36 35
timestep 36
41 40 39 38
received:
...
35
34 35 36 37 36
37
i data i ack
Delayed Acknowledgements
40 39 38 37
received:
...
35
33 35 36
41 40 39 38
received:
...
35
35 37 36
37
Duplicate Acknowledgements 1
40 39 38 37
received:
...
36
34 36
2 timesteps
42 41 40 39 received:
...
36
36 36 x
38
dupack
on receipt of 38
Duplicate Acknowledgements 2
41 40 39 37 received:
...
36
x
36 36 38
dupack
on receipt of 38
Duplicate Acknowledgements 3
40 37 39 38
received:
...
Number of
34 36 36 dupacks
depends on
41 40 37 39 how much
received:
... out-of-order
34 36 36 36 a packet is
x
38
dupack
42 41 40 37 received: A series of
...
36 36 36 36 dupacks
x
38
allows the
dupack dupack 39 sender to
43 42 41 40
guess that a
received:
... single
36 36 36 39 36
37
packet has
dupack dupack new ack
38 been lost
39
Advanced Mobile Communication Networks, Master Program 31
Integrated Communication Systems Group
1 2 3 4 5 6 7 8 9 10 11 12 13
TCP
TCP
40 39
38 37
Router receiver
sender
35 36
33 34
W = 8 segments (33...40)
TCP sender starts a timer for a segment (only one segment at a time)
If ack for the timed segment is not received before timer expires,
outstanding data are assumed to be lost and retransmitted
=> go-back-N ARQ
Retransmission timeout (RTO) is calculated dynamically based on
measured RTT:
– RTO = mean RTT + 4 * mean deviation of RTT
Mean deviation δ = average of |sample – mean| is easier to calculate than
•
standard deviation (and larger, i.e. more conservative)
– Large variations in the RTT increase the deviation, leading to larger RTO
– RTT is measured as a discrete variable, in multiples of a “tick”:
• 1 tick = 500 ms in many implementations
• smaller tick sizes in more recent implementations
– RTO is at least 2 clock ticks
Exponential Backoff
T1=RTO T2 = 2 * T1
Slow Start
Initially, congestion window size (cwnd) = 1 MSS
Increment cwnd by 1 MSS on each new ack
Slow start phase ends when cwnd reaches ssthresh (slow-start
threshold)
=> cwnd grows exponentially with time during slow start (in theory)
– Factor of 1.5 per RTT if every other segment is ack’d
– Factor of 2 per RTT if every segment is ack’d
– In practice: increase is slower because of network delays (see next slide)
Congestion Avoidance
On each new ack, increase cwnd by 1/cwnd segments
=> cwnd grows linearly with time during congestion avoidance (in
theory)
– 1/2 MSS per RTT if every other segment ack’d
– 1 MSS per RTT if every segment ack’d
Advanced Mobile Communication Networks, Master Program 37
Integrated Communication Systems Group
10
8 ssthresh
6 Slow Start
4
2
0
0 1 2 3 4 5 6 7 8 9
Time / RTT
• Theoretical assumption: after sending n segments, n acks arrive
within one RTT
• Note that Slow Start starts slowly, but speeds up quickly
Advanced Mobile Communication Networks, Master Program 38
Integrated Communication Systems Group
• Taking network delay into account, “cwnd increases exponentially” turns into:
– cwnd increases sub-exponentially
– pairs of segments are sent while pipe fills
sending rate > data rate (cwnd > 2)
• Simple example:
(timestep 4 onwards)
– one-way delay = 1 timestep => at some point in time there will
– data rate = 1 segment/timestep be a packet loss, causing TCP
to slow down
#segments
Time- #segments #segments recv'd and
step Sender action cwnd sent outstanding ack'd Receiver action
0 initial values 1 0
send segment 1 1 1
1 1 receive and ack segment 1
2 receive ack 1 2 0
send segments 2 and 3 2 2
3 1 receive and ack segment 2
Packet loss detected by ≥3 dupacks (=> single packet loss, but link is ok):
Fast Retransmit single missing segment
Initiate Fast Recovery:
– Set ssthresh and cwnd to half of window size before packet loss:
• ssthresh = max((min(cwnd, receiver’s advertised window)/2), 2 MSS)
• cwnd = ssthresh + number of dupacks
– When a new ack arrives: continue with Congestion Avoidance:
• cwnd = ssthresh
25 Timeout
cwnd = 20
cwnd (segments)
20
15
ssthresh = 10
10 ssthresh = 8
5
cwnd = 1
0
12
15
20
22
25
0
Time / RTT
Advanced Mobile Communication Networks, Master Program 41
Integrated Communication Systems Group
≥3 Dupacks
10
cwnd = 8
cwnd (segments)
8
6
ssthresh = 4
4
cwnd = 4
2 After Fast Recovery
0
0 2 4 6 10 12 14
Time / RTT
• After fast retransmit and fast recovery window size is reduced in half
• Multiple packet losses within one RTT can result in timeout
Advanced Mobile Communication Networks, Master Program 42
Integrated Communication Systems Group
mobile host
access point
(foreign agent) „wired“ Internet
access point1
socket migration
and state transfer Internet
access point2
mobile host
A handover between access points requires the migration of the TCP sockets
and the TCP state (buffers, etc.)!
• Advantages
– no changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work
– transmission errors on the wireless link do not propagate into the fixed
network
– simple to control, mobile TCP is used only for one hop between, e.g., a
foreign agent and mobile host
– therefore, a very fast retransmission of packets is possible, the short
delay on the mobile hop is known
• Disadvantages
– loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, e.g.
wireless link may drop or foreign agent might crash
– higher latency possible due to buffering of data within the foreign agent
and forwarding to a new foreign agent
– access point needs to be involved in security mechanisms (e.g. IPsec)
Snooping TCP
• Data transfer to the mobile host (downlink)
– FA buffers data until it receives ACK from the MH
– FA detects packet loss on wireless link via timeouts (smaller timeout
value than on CN) or DUPACKs from CN (which are discarded)
– FA employs fast retransmission, transparent for the fixed network
• Data transfer from the mobile host (uplink)
– FA detects packet loss on the wireless link via sequence numbers, FA
answers directly with a NACK to the MH
– MH can now retransmit data with only a very short delay
• Integration of the link layer
– link layer often has similar mechanisms to those of TCP
• Problems
– snooping TCP does not isolate the wireless link as good as I-TCP
– snooping might be useless depending on encryption schemes, e.g.
does not work with IPsec due to encryption of IP payload (including
TCP segment number)
Advanced Mobile Communication Networks, Master Program 48
Integrated Communication Systems Group
Mobile TCP
• Special handling of lengthy and/or frequent disconnections
• M-TCP splits control as I-TCP does
– unmodified TCP fixed network to supervisory host (SH)
– optimized TCP between SH and MH (no slow start)
• Supervisory host (SH)
– no caching, no retransmission (different from Indirect-TCP)
– monitors all packets, if disconnection detected
• set sender window size to 0
• sender automatically goes into persistent mode
– old or new SH reopens the window (set to old size)
• Advantages
– maintains semantics, supports disconnection, no buffer forwarding
• Disadvantages
– loss on wireless link propagated into fixed network (no buffering)
– adapted TCP on wireless link
Advanced Mobile Communication Networks, Master Program 49
Integrated Communication Systems Group
Transmission/timeout freezing
• Mobile hosts can be disconnected for a longer time
– no packet exchange possible, e.g.,
discontinued communication in a tunnel
disconnection due to overloaded cells
preemption by higher priority traffic (scheduling)
– TCP disconnects after time-out completely
• TCP freezing
– PHY/MAC layer is often able to detect interruption in advance
– PHY/MAC can inform TCP layer of upcoming loss of connection
– TCP stops sending, but does now not assume a congested link
– PHY/MAC layer signals again if reconnected
• Advantage: scheme is independent of data
• Disadvantage:
– TCP on mobile host has to be changed
– mechanism depends on lower layers
Selective retransmission
• TCP acknowledgements are often cumulative
– ACK n acknowledges correct and in-sequence receipt of packets up
to n
– if single packets are missing quite often a whole packet sequence
beginning at the gap has to be retransmitted (go-back-n), thus
wasting bandwidth
• Selective retransmission as one solution
– RFC2018 allows for acknowledgements of single packets, not only
acknowledgements of in-sequence packet streams without gaps
– sender can now retransmit only the missing packets
– mechanism is supported by newer TCP implementations
• Advantage
– much higher efficiency
• Disadvantage
– more complex software in a receiver, more buffers needed at the
receiver
Advanced Mobile Communication Networks, Master Program 52
Integrated Communication Systems Group
Summary: TCP
TCP provides a connection-oriented,
reliable byte-stream service:
– application data stream is transferred in segments based on
lower layer MTU
– receiver sends back cumulative acknowledgements (acks)
– sliding window mechanism with flow control based on
• receiver’s advertised window,
• sender’s Slow Start (timeout) and Congestion Avoidance
(3 DUPACKs) mechanisms
– Error control & packet loss detection based on
• adaptive retransmission timeout => back to Slow Start,
• duplicate acknowledgments (dupacks) => Fast Retransmit
& Fast Recovery
Pure performance over wireless due to misinterpretation of
DUPACKs and timeouts (loss instead of congestion)
References
NGN deployment
ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
Current Internet
Based on OSI model
Encapsulating data to packets
Find a route from source to
destination using routing
functions
Forwarding packets based on
route
application
transport
network
data link
physical
network network
data link data link
network
Network Layer
physical physical
data link
physical network network
data link data link
Protocol
network network
data link data link
physical physical
(TCP/IP)
network
data link
physical
application
network transport
data link network
network
physical data link
network data link
physical
data link physical
physical
KISS and Smart Network
• IP Philosophy
• KISS (Keep It Simple and
Stupid)
Coffee Bean
Deep Packet Inspection
Government Strategy (The 100th Monkey Effect)
Support
Integration of
broad
existing
infrastructure variety of
services
What is NGN?
NGN
=IP Based ISDN Application Openness
focused- and flexibility
access regarding
independent new services
Separation
into different
layers using
open
interfaces
Comparison between Current-Internet and
NGN
NGN – Main issues
• How to follow quick evolution of technology and services ?
• How to regulate multi-services including simultaneously voice/data/video ?
• How to define new reference networks, architectures and interfaces to new
players?
• How to define and quantify dimensioning and costing units for
interconnection ?
• How to ensure consistency for regulation principles when different network
types coexist in the migration phases ?
• How to consider different network players in the value chain at physical,
equipment and services layers ?
Vigorous activity to standardize NGN
Past
Present / Future
Main SGs addressing NGN
NGN deployment
ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
NGN Deployment – Case studies
• Communication in Enterprise
• IPTV deployment in NGN
• IMS-based multi-network convergence solution
• Fixed mobile convergence – FMC
• Communication between Corporate Telecommunication Network (CN) via NGN
Communication in Enterprise
• Apply in enterprise
communication to
improve collaboration
between regional
areas employers
• Using voice, video and
web conferencing
riding on a high-
performance
converged network
Source: http://huawei.com
IPTV deployment in NGN
• The IPTV system has
to integrate with
Softswitch systems
and intelligent
network (IN) platforms
to realize the video
communications as
well as other
communication
services via TV.
The NGN architecture for IPTV service
Source: http://wwwen.zte.com.cn
IMS-Based Multi-network Convergence
Solution
• IMS is basically a
signaling network
based on SIP and
Diameter.
• Designed to provide
robust multimedia
services across
roaming boundaries
and over diverse
access technologies
IMS deployment in China
Source: http://wwwen.zte.com.cn
Fixed mobile convergence - FMC
• FMC service enables
service providers to offer
subscribers seamless
access to enterprise
communications
services via any
subscriber-selected
phone device, whether a
mobile handset, IP
phone, softphone or
traditional PSTN handset
Fixed Mobile Convergence
New subscriber
2014.3 2011.12 Portion
Variation Ratio
Fixed 17,427,181 -1,205,320 -6.5% 18,632,501 24.0%
Feature phone 16,841,730 -13,086,655 -43.7% 29,928,385 23.2%
Mobile
Smartphone 38,320,657 15,742,249 41.1% 22,578,408 52.8%
Total 72,589,568 71,139,294 100%
Telecom related status in Korea (2)
Fixed phone in Telecom Operators
New subscriber
2014.3 2011.12 Portion
Variation Ratio
KT 14,156,694 -1,543,008 -9.3% 15,699,702 81.2%
SK Broadband 2,758,849 280,121 10.2% 2,478,728 15.8%
LGU+ 511,638 57,567 11.3% 454,071 3.0%
Total 17,427,181 -1,205,320 -9.3% 18,632,501 100%
Smartphone in Telecom Operators
New subscriber
2014.3 2011.12 Portion
Variation Ratio
SKT 26,075,598 1,787,500 6.9% 24,288,098 50.9%
KT 15,176,023 -1,113,723 -7.3% 16,289,746 29.6%
LGU+ 10,014,249 1,294,557 12.9% 8,719,692 19.5%
Total 51,265,870 1,968,334 3.8% 49,297,536 100.0%
Rate
2014.3 2011.12
Inc/Dec %
xDSL 1,396,672 -597,123 -42.8% 1,993,795
LAN 2,824,829 105,459 3.7% 2,719,370
KT HFC 0 0.0% 0
FTTH 3,815,025 705,865 18.5% 3,109,160
Satellite 373 -146 -39.1% 519
xDSL 197,541 -74,952 -37.9% 272,493
Telecom
LAN 1,016,831 -141,396 -13.9% 1,158,227
SK Broadband HFC 884,988 -333,735 -37.7% 1,218,723
FTTH 713,984 69,903 9.8% 644,081
related Satellite
xDSL 149,547
0
69,717
0.0%
46.6%
0
79,830
status in
LAN 785,086 419,592 53.4% 365,494
SKT (Resale) HFC 410,901 143,192 34.8% 267,709
Korea (3)
FTTH 473,315 287,980 60.8% 185,335
Satellite 0 0.0% 0
xDSL 0 0.0% 0
LAN 1,757,918 103,354 5.9% 1,654,564
LG U+ HFC 939,203 -110,512 -11.8% 1,049,715
FTTH 265,845 160,434 60.3% 105,411
Satellite 0 0.0% 0
xDSL 28,515 -49,003 -171.8% 77,518
LAN 614,974 263,932 42.9% 351,042
Cable HFC 2,450,790 21,936 0.9% 2,428,854
FTTH 0 0.0% 0
Satellite 0 0.0% 0
xDSL 1,734 -2,947 -170.0% 4,681
LAN 54,131 -51,704 -95.5% 105,835
Others HFC 38,711 -26,998 -69.7% 65,709
FTTH 4,754 3,297 69.4% 1,457
Satellite 0 0.0% 0
Index
NGN developments in other standardization bodies
NGN deployment
ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
NGN based services and economic benefits
NGN technology is deployed by
network operators because it is
cheaper to buy and can be
cheaper to operate.
The development of NGN services
has wider impacts on the overall
national economy because
broadband Internet access is an
enabler for so many other
business.
Economic parties of NGN migration issues
Policy makers:
◦ Set framework for developing NGN in their National Broadband Plan.
◦ Must consider how NGNs are used and impact to other sector: education, e-government, environment, healthcare, etc.
Regulator authorities:
◦ Set the practical framework for developing NGNs to meet the policy agenda.
◦ Ensure positive outcomes to encourage efficient competition, ensure interworking of systems and prices are set fairly.
Investors:
◦ NGNs require investment.
◦ A government views for making a return on this investment is different with a private investor on the time required for re-payment and
the acceptable risks and rewards.
The operators and service providers:
◦ Implement and manage the networks and services
◦ Make a profit in order to pay the investors and to continue business and expand
Consumer:
◦ Want the best quality at the lowest possible price.
Economic aspects of NGN migration issues
Funding the investment
◦ Building fibre to the premises is expensive.
◦ Wireless requires for the cost rises with the speed of access service and the number of customers
◦ Core network and service platforms
Technical
◦ Change from legacy technology to NGN needs for skills and training
Cost performance factors
Competition and regulation
◦ Encourage investment, innovation and so provide the best outcomes for citizens through competitive supply.
Demographics
◦ Speed performance of fibre is far better than copper, but is this enough to overcome its high investment costs
or to counter the benefits of wireless mobility?
Index
NGN developments in other standardization bodies
NGN deployment
ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
Traditional cost modelling
Separation of access and core networks
◦ Volume-based traffic costs and fixed access charges
NGN deployment
ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
ITU-T D.271 - Charging and Accounting Principles for
NGN
Session set-up
Session set-up Reservation-based
attempt charge
charge element charge element
element
• The reservation-based charge element relates to the duration of a session. The value of the reservation
charge parameter CP_R(.) may differ between charging periods.
• The reservation-based charge element to differ for different charging periods, the duration of the session
within each charging period must be known.
• This information can be derived by comparing the start date and time and the end date and time of the session to the charging periods.
• The usage-based element relates to the packets admitted into the network and packets delivered by the
network. The value of the usage charge parameter(s) CP_U(.) may differ between charging periods.
• In order to allow the usage-based charge element to differ for different charging periods, ITU-T Rec.
D.271 (04/2008) 5 the number of packets within each charging period must be known.
Recording interval
CDRs shall be generated immediately on
the following occasions:
• at session establishment (indication 0);
• at session release (indication 6);
• during the session's active phase;
• when any of the traffic contract parameters are
modified (if relevant signalling is supported);
• at the end of each recording interval (see
indications 2, 3, 4, 5).
Charging end-customers
The charges for services delivered to end-customers normally consist of the following
components:
NGN deployment
ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
What is CDN?
CDN is a system of computers (computing devices) networked together
(across the Internet) that cooperate to deliver content to end users.
Goals
◦ Load balancing
◦ Fast response
◦ High availability
◦ Handling flash crowd
Benefits to ISPs
◦ Efficient usage of internal network resources
◦ Traffic reduction
End-user
◦ Better enduser experience
◦ Content Provider
◦ Can serve the customer a high quality
Architecture of CDN
Global CDN Market (1)
Global CDN Market (2)
• Leading CDN Providers are as follows
• Akamai (US based)
• Limelight Networks (US based)
• Edgecast, Highwinds
• ChinaCache, CDNetworks in Asia
We can SAVE
◦ Cost of internet access
◦ Server capacity (hardware)
◦ Network resource
CDN Service Prices
• Classify in to
• Peak Traffic method
• Traffic Volume method
• Peak Traffic
• Based on average of the billing
• Traffic Volume
• Based on amount of usage traffic
• Traffic Volume based Pricing or Content Value based Pricing
NGN deployment
ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
Statement of the situation
Traditional
NGN networks
networks
NGN networks do not present the same cost Costs have virtually nothing to do with distance, and IP
structure as traditional networks. tariffs will of necessity have to take account of these
characteristics.
80
Statement of the situation
Advantages of adopting NGNs in developing countries:
81
Question for study
Effects or benefits of NGN The cost structure of NGN services New charging methods for services
migration for all stakeholders, compared to that of services provided over NGN networks and
including consumers. provided over traditional networks. practical case studies.
82
Expected output
83
charles@inje.ac.kr