You are on page 1of 296

Next Generation Tele

communication Network
BTCS- 703

Mr. Shyam Gehlot

1
Next Generation Network

A Next-Generation Network (NGN) is a packet


based telecommunication network that handles
multiple types of traffic (such as voice, data, and
multimedia).

2
Objectives of subject

Understand the importance of next generation wireless

networks.

Define the term “Next Generation Network” and it’s main


characteristics.

Describe the main architectural elements of a Next


Generation Network and explain the logic behind it.

Understand the principles of mobile networks and they


relate to NGN.
3
Unit -1

Mobile Computing

Basic history of Mobile Computing Architecture for mobile


computing, Three tier architecture, design considerations for
mobile computing, mobile computing through internet, Wireless
network architecture, Applications, Security, Concerns and
Standards, Benefits, Future. Evolution of mobile computing.

4
What Is Mobile Computing?
(Cont.)

Mobile Computing : A technology that allows transmission


of data, via a computer, without having to be connected to
a fixed physical link.

Mobile data communication has become a very important


and rapidly evolving technology as it allows users to
transmit data from remote locations to other remote or
fixed locations

6
What Is Mobile Computing? (Cont.)
. Mobile Computing is an umbrella term used to
describe technologies that enable people to access
network services anyplace, anytime, and anywhere.

A technology that is capable of providing an


environment which enables users to transmit data
from one device to other device without the use of any
physical link/cables is known as Mobile Computing. . It
means, data transmission is done wirelessly with the
help of wireless devices such as mobiles, laptops etc.

7
Why Go Mobile?
Enable anywhere/anytime connectivity
Bring computer communications to areas
without pre-existing infrastructure
Enable mobility
Enable new applications
An exciting new research area

8
Advantages
Today many peoples use mobile computing for different purposes
1 Advances in technology
• More computing power in smaller devices ,Flat, lightweight displays
with low power consumption
• New user interfaces due to small dimensions
• More bandwidth (per second? per space?)
• Multiple wireless techniques
2. Technology in the background
• Device location awareness: computers adapt to their environment
• User location awareness: computers recognize the location of the
• user and react appropriately (call forwarding)
3. Computers” evolve Small, cheap, portable, replaceable Integration
or disintegration

9
Advantages of Mobile Computing

Location Flexibility: This has enabled users to work from anywhere

as long as there is a connection established. A user can work without


being in a fixed position. Their mobility ensures that they are able to
carry out numerous tasks at the same time and perform their stated
jobs.

Saves Time: The time consumed or wasted while travelling from


different locations or to the office and back, has been slashed. One can
now access all the important documents and files over a secure
channel or portal and work as if they were on their computer. It has
enhanced telecommuting in many companies. It has also reduced
unnecessary incurred expenses.
10
Conti….
Enhanced Productivity: Users can work efficiently and effectively from
whichever location they find comfortable. This in turn enhances their
productivity level.

Ease of Research: Research has been made easier, since users earlier
were required to go to the field and search for facts and feed them back
into the system. It has also made it easier for field officers and
researchers to collect and feed data from wherever they are without
making unnecessary trips to and from the office to the field.
Entertainment
Video and audio recordings can now be streamed on-the-go using mobile
computing. It's easy to access a wide variety of movies, educational and
informative material

11
Conti……
With the improvement and availability of high speed data connections at

considerable cost, one is able to get all the entertainment they want as
they browse the internet for streamed data. One is able to watch news,
movies, and documentaries among other entertainment offers over the
internet. This was not possible before mobile computing dawned on the
computing world.
Streamlining of Business Processes: Business processes are now
easily available through secured connections. Looking into security
issues, adequate measures have been put in place to ensure
authentication and authorization of the user accessing the services.
Some business functions can be run over secure links and sharing of
information between business partners can also take place. Meetings,
seminars and other informative services can be conducted using video
and voice conferencing. Travel time and expenditure is also
considerably reduced.
12
• There are 2 aspects of mobile computing

– User mobility: users communicate “anytime,


anywhere, with anyone” (example: read/write email
on web browser)

– Device portability: devices can be connected


anytime, anywhere to the network

13
Mobile Computing Functions

We can define a computing environment as mobile if it


supports one or more of the following characteristics:

User mobility

Network mobility

Device Mobility

Bearer Mobility

Session Mobility

14
User Mobility

User should be able to move from one physical location


to another location and use the same service.

The service could be in the home network or a remote


network.

For example a user moves from India to New York and


uses Internet to access the corporate application the
same way the user uses in the home office.

15
Network Mobility

User should be able to move from one network to


another network and use the same service.

For example a user moves from Hong Kong to New


Delhi and uses the same GSM phone to access the
corporate application through WAP (Wireless
Application Protocol). In home network he uses this
service over GPRS (General Packet Radio Service)
whereas in Delhi he accesses it over the GSM
network.

16
Device Mobility

User should be able to move from one device to another


and use the same service.

For example a sales representatives using their


desktop computer in home office. During the day while
they are on the street they would like to use their

Palmtop to access the application.

17
Bearer Mobility

User should be able to move from one bearer to another


and use the same service.

For example a user was using a service through WAP


bearer in his home network in Bangalore. He moves to
Coimbatore, where WAP is not supported, he switch
over to voice or SMS(Short Message Service) bearer
to access the same application.

18
Session Mobility

A user session should be able to move from one user-


agent environment to another.

For example a user was using his service through a


CDMA (Code Division Multiple Access) IX network.
The user entered into the basement to park the car
and got disconnected from his CDMA network. User
goes to home office and starts using the desktop. The
unfinished session in the CDMA device moves from
the mobile device to the desktop computer.
19
What is mobile computing? How does
it work?
Mobile Computing is a human-computer interaction that
allows transmission of data, voice and video via a computer
or any other wireless device without connecting to a fixed
physical link. It also allows people to access data and
information from wherever they are. The main concept
involves −

Mobile communication

Mobile hardware

Mobile software 20
Mobile communication
The mobile communication refers to the use of technology
that allows us to communicate with others in different
locations. The wireless networks carry the data where it
needs to go. Traditionally, data was routed through cell
towers in a particular provider’s physical network to
another user’s phone. With modern mobile computing,
data is also often delivered onto the Internet via the
provider’s telecom network. where users can access
individual Internet sites over their smart phones.

21
Since the media is unguided/ unbounded, the overlaying
infrastructure is basically radio wave-oriented. That means
the signals which help in sending and receiving similar kind
of signals are carried by air to those devices.

22
Mobile communication can be of one of the
following form as mentioned below.

23
Mobile and Wired : In this configuration, Some of the devices
are wired and some are mobile in nature. For Example :
Laptops.

Fixed and Wired : In this configuration, The devices are fixed


at a position and are connected through a physical link for
communication. For Example : Office/Desktop Computer.

Mobile and Wireless : In this configuration, devices can


communicate(data transmission) with each other irrespective
of their position and can connect to any network without the
use of any wired device. For Example : WiFi and GSM

. 24
Mobile Hardware
Mobile hardware includes mobile devices or device components capable
of operating, executing and providing services that receive or access the
service of mobility. They would range from portable laptops, smart phones,
tablet Pc's, Personal Digital Assistants. Above mentioned devices use an
existing and established network to operate on. In most cases, it would be
a wireless network.

25
Mobile software
Mobile software is an operating system that allows smart phones, tablet
PCs, and other devices to run applications and programs. It is the
actual program that runs on the mobile hardware. It deals with the
characteristics and requirements of mobile applications. This is the
engine of the mobile device. It is considered as the heart of the device

that operates the mobile device.

26
Applications of Mobile Computing

Vehicles. The current position of the car is determined


via the global positioning system (GPS). Cars driving in
the same area build a local ad-hoc network for the fast
exchange of information in emergency situations or to
help each other keep a safe distance. In case of an
accident, not only will the airbag be triggered, but the
police and ambulance service will be informed via an
emergency call to a service provider

27
Figure shows a typical scenario for mobile
communications with many wireless devices.

28
Networks with a fixed infrastructure like cellular phones (GSM,
UMTS) will be interconnected with trunked radio systems
(TETRA) and wireless LANs (WLAN).

Satellite communication links can also be used.

The networks between cars and inside each car will more likely
work in an ad-hoc fashion

Wireless networks inside a car can made up of personal digital


assistants (PDA), laptops, or mobile phones, e.g., connected with
each other using the Bluetooth technology.

So we can say that local ad-hoc network with vehicles close-by


to prevent accidents, guidance system redundancy

29
Emergencies
An ambulance with a high-quality wireless connection to a
hospital can carry vital information about injured persons to
the hospital from the scene of the accident. All the necessary
steps for this particular type of accident can be prepared and
specialists can be consulted for an early diagnosis. Wireless
networks are the only means of communication in the case
of natural disasters such as hurricanes or earthquakes. In
the worst cases, only decentralized, wireless ad-hoc
networks survive.

30
Business

A travelling salesman today needs instant access to


the company’s database: to ensure that files on his or
her laptop reflect the current situation, to enable the
company to keep track of all activities of their
travelling employees, to keep databases consistent

etc.

31
Figure shows what may happen when
employees try to communicate off
base.

32
At home, the laptop connects via a WLAN or LAN
and DSL to the Internet.

Leaving home requires a handover to another


technology,

mobile communications should always offer as good


connectivity as possible to the internet, the
company’s intranet, or the telephone network.

33
Credit Card Verification

At Point of Sale (POS) terminals in shops and supermarkets,


when customers use credit cards for transactions, the
intercommunication required between the bank central computer
and the POS terminal, in order to effect verification of the card
usage, can take place quickly and securely over cellular
channels using a mobile computer unit. This can speed up the
transaction process and relieve congestion at the POS
terminals.

34
Replacement of Wired Networks

wireless networks can also be used to replace wired networks,


e.g., remote sensors, for tradeshows, or in historic buildings.
Due to economic reasons, it is often impossible to wire remote
sensors for weather forecasts, earthquake detection, or to
provide environmental information. Wireless connections, e.g.,
via satellite, can help in this situation. Other examples for
wireless networks are computers, sensors, or information
displays in historical buildings, where excess cabling may
destroy valuable walls or floors.

35
Infotainment

. wireless networks can provide up-to-date information at any


appropriate location. The travel guide might tell you something
history of a building (knowing via GPS, contact to a local base
station, or triangulation where you are) downloading information
about a concert in the building at the same evening via a local
wireless network. Another growing field of wireless network
applications lies in entertainment and games to enable, e.g., ad-
hoc gaming networks as soon as people meet to play together

36
Challenges
Disconnection
Low bandwidth
Low power and resources
Security risks
Wide variety terminals and devices with
different capabilities
Device attributes
Fit more functionality into single, smaller
device

37
Limitations and disadvantages of MC
Resource constraints: Battery needs and recharge requirements
are the biggest constraints of mobile computing.
Interference: Radio transmission cannot be protected against
interference using shielding and result in higher loss rates for
transmitted data or higher bit error rates respectively

Bandwidth: Although they are continuously increasing,


transmission rates are still very low for wireless devices
compared to desktop systems. Researchers look for more

efficient communication protocols with low overhead.


Dynamic changes in communication environment: variations in
signal power within a region, thus link delays and connection
losses.

38
Continue
Network Issues Due to the ad hoc networks some issues
relating discovery of connection, service to destination, and
connection stability.
Interoperability issues: the varying protocol standards

Security constraints: Not only can portable devices be stolen


more easily, but the radio interface is also prone to the dangers of
eaves dropping. Wireless access must always include encryption,
authentication, and other security mechanisms that must be
efficient and simple to use.

39
Disadvantages of MC
One of the disadvantages is that the mobile devices will need either
WiFi connectivity or mobile network connectivity such as GPRS, 3G and
in some countries even 4G connectivity that is why this is a
disadvantage because if you are not near any of these connections
your access to the internet is very limited.
Security Concerns
Mobile VPNs are unsafe to connect to, and also syncing devices
might also lead to security concerns. Accessing a WiFi network can
also be risky because WPA and WEP security can be bypassed easily.
Power Consumption
Due to the use of batteries in these devices, these do not tend to last
long, if in a situation where there is no source of power for charging
then that will certainly be a letdown. 40
EVOLUTION OF MOBILE COMPUTING

Mobile computing first came into the lights in the year 1990. The
devices which were first implemented on mobile computing technology
were two-way radios. These two-way radios were used to communicate
with the computers which were three inches long with the help of large
antennas. These three-inch-long computers were able to perform all
those tasks a normal person.

The introduction of computers and laptops brought a drastic change in


the computing industry. In earlier times, machines of very big size were
used for doing small tasks. But, at present, a small microprocessor can
do big tasks within minutes.nal computer can do.

41
The advent of portable computers and laptops, Personal Digital
Assistants (PDA), PC tablets and smart phones, has made mobile
computing very convenient. Mobile devices have now become the
personal command centers for all other wearable and connected
devices.

The portability of these devices ensure and help the users to access all
the services as if they were working in the internal network of their
company. For example consider the use of Tablet PC and iPads. This
new technology helps the users to update documents, surf the internet,
send and receive e-mail, stream live video files, take photographs and
also support video and voice conferencing where it is easy for the
people to access.
42
Evaluation of devices

43
Future of Mobile Computing

Use of Artificial Intelligence


Integrated Circuitry -> Compact Size
Increases in Computer Processor
speeds

44
Architecture for mobile computing

Mobile computation architecture refer to define various layers


b/w user application interfaces ,devices and network hard ware.

A well define architecture is required for systematic computation


and access data and software objects.

The network-centric mobile computing architecture uses


three-tierarchitecture.
1) Présentation Tiers
2) Application Tiers

3) Data Tiers

45
46
3 Tiers Architecture

47
48
In three tier architecture, the first layer is User Interface or
Presentation Tier.

 This layer deal with user facing device handling and rendering.
this tier includes a user system interface where user service

reside.

The second tier is the Process Management or Application Tier



This layer is capable of accommodating hundreds of users.

 The middle process management tier controls transaction and


asynchronous queuing to ensure reliable completion of
 transaction
The third final tier is the Database Management or Data Tier.

This Layer is for database access and management. The three-tier


architecture is better suited for an effective networked client/server

design. It provide increased performance , flexibility , maintainability ,
 reusability and scalability , while hiding the complexity of distributed

processing from user.

All these characteristic have made three-tier architecture a popular


choice for Inter application and net-centric information
 system

3 Tier
Architecture

This is user facing System in the first tier. This is the
layer of agent application and system.

These applications run on the client device and offer
 all the user interface.

 This tier is responsible for presenting the information to the end


user.
Presentation Tier include web browsers (like Mozilla, Internet
Explorer etc…)WAP browsers and customized client programs.
It performs the business logic of processing user input , obtaining

data, and making decision

In certain case, this layer will do the transconding of data for



appropriate rendering in the presentation Tier.

In mobile computing environment in addition to the business logic


there are quite a few additional management function that need

to be performed
These function relate to decision on renderinal ,
network management , security, data store access,
etc.

Most of these function are implemented using different


middleware software.

 Middleware frame work is defined as a layer of software , which

sits in middle between the operating system and the user facing

software.
1) Message –oriented Middle war
2) Transaction processing Middleware.
3) Database Middleware
4) Communication Middleware
5) Distributed Object and Components.
6) Transcoding Middleware.
 The Data Tier is used to store data needed by the
application and acts as a repository for both
temporary and permanent data.

 These can range from sophisticate relational


database, legacy hierarchical database , to even
simple text files.
Database middle ware allows the business
logic to be independent and transparent of the

database technology and the database vendor.

Database middle ware runs between the


application program and the database.

Example of such middle ware will be ODBC,JDBC,



etc.
Using this middle ware , the application will be able to
access data from any source.

Data source ca be text files, spreadsheets or a network,


relational , indexed, hierarchical, XML database, object
database, etc.., fro vendors like Oracle, SQL , Sybase , etc.
Unit -3
Wireless n/w. and Technologies

Wireless n/w. and Technologies Introduction, Different generations.


Introduction to 1G, 2G, 3G and
4G, Bluetooth, Radio frequency identification(Rfid),Wireless Broadband,
MobileIP : Introduction,
Advertisement, Registration, TCP connections, two level addressing, abstract
mobility management
model, performance issue, routing in mobile host, Adhoc networks, Mobile
transport layer: Indirect
TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission,
transaction oriented
TCP. ,IPv6

1
What Is Wireless n/w?
A wireless network is a computer network that uses
wireless data connections between network nodes

In telecommunications networks, a node is either a


redistribution point or a communication endpoint.

Wireless telecommunications networks are generally


implemented and administered using radio communication.

Examples of wireless networks are cell phone networks,


wireless local area networks (WLANs), wireless sensor
networks, satellite communication networks, and terrestrial
microwave networks. 2
Introduction to 1G, 2G, 3G and 4G
The aim of wireless communication is to provide high quality, reliable
communication just like wired communication(optical fibre) and each
new generation of services represents a big step in that direction. the
"G" stands for "GENERATION.

.Each Generation is defined as a set of telephone network standards ,


which detail the technological implementation of a particular mobile
phone system. In simple words as the number before ‘G’ increases, the
speed and the technology used to achieve the high speed. For eg, 1G
offers 2.4 kbps, 2G offers 64 Kbps and is based on GSM, 3G offers 144
kbps-2 mbps whereas 4G offers 100 Mbps - 1 Gbps and is based on LTE
technology
3
1G - First Generation
This was the first generation of cell phone technology .

It was introduced in 1987 by Telecom (known today as Telstra),


Australia received its first cellular mobile phone network utilizing a 1G
analog system.
1G network use Analog Signal. AMPS was first launched in USA in 1G
mobile systems.
These are the analog telecommunications standards that were
introduced in the 1980s and continued until being replaced by 2G
digital telecommunications. The maximum speed of 1G is 2.4 Kbps .

4
Features
1G technology uses FDMA for different Subscribers by single user
on single channel.

In this system Voice is modulated to higher frequency up to 150


MHz or even more.

It offers 2.4 kbps data speed or capacity .


The 1G mobile phones used a single , universal network standard , It is
known as the Advanced Mobile Phone System (AMPS) , This analog network
saw adoption around the world & brought different cell phone service
providers together under a single network , allowing for shared cost of
network development & maintenance.

5
FDMA
Frequency Division Multiple Access (FDMA) is one of the most common
analogue multiple access methods. The frequency band is divided into
channels of equal bandwidth so that each conversation is carried on a
different frequency (as shown in the figure below).

FDMA is a basic technology in the analog Advanced Mobile Phone


Service (AMPS), the most widely-installed cellular phone system
installed in North America.

6
DRAWBACKS OF 1G.
Voice quality is low and effect of noise is more as the FDMA is
analog communication.

Data is not supported.

Mobile handset battery will give less backup.

Costly as 1 subscriber per carrier and hence less call are supported by
tower.

Large Phone Size

No Security.

Limited Capacity

Poor Handoff Reliability of 1G Wireless System.


7
8
The main drawback of 1g technology is that it uses analog signals
rather than digital signals , This is a less effective means of
transmitting information , It is slower , and the signals can not reach
as far in terms of secluded areas and such 2G and 3G signal is far
more widespread . The analogue signals are more likely to suffer
interference problems , It makes the use of the mobile phone with
the analog signal more difficult. It has low capacity , unreliable hand
off , It offers poor voice links , It has no security at all since the
voice calls were played back in the radio towers , So , these calls are
susceptible to the unwanted eavesdropping by the third parties .
9
2G - Second Generation

2G technology refers to the 2nd generation which is based on GSM.

Cell phones received their first major upgrade when their technology
went from 1G to 2G. This leap took place in Finland in 1991 on GSM
networks and effectively took cell phones from analog to digital
communications.

The 2G telephone technology introduced call and text encryption,


along with data services such as SMS, picture messages, and MMS.

The maximum speed of 2G with General Packet Radio Service


(GPRS) is 50 Kbps. The speed is 1 Mbps with Enhanced Data Rates
for GSM Evolution (EDGE)

10
GSM
GSM stands for Global System for Mobile Communication. It is a digital
cellular technology used for transmitting mobile voice and data services.

The concept of GSM emerged from a cell-based mobile radio system at Bell
Laboratories in the early 1970s.

GSM is a circuit-switched system that divides each 200 kHz channel into
eight 25 kHz time-slots. GSM operates on the mobile communication bands
900 MHz and 1800 MHz in most parts of the world. In the US, GSM operates
in the bands 850 MHz and 1900 MHz.

GSM makes use of narrowband Time Division Multiple Access (TDMA)


technique for transmitting signals.

GSM was developed using digital technology. It has an ability to carry 64


kbps to 120 Mbps of data rates.
11
GSM provides basic to advanced voice and data services including roaming
service. Roaming is the ability to use your GSM phone number in another
GSM network.

GSM digitizes and compresses data, then sends it down through a channel
with two other streams of user data, each in its own timeslot

Why GSM?.

Improved spectrum efficiency

International roaming

Low-cost mobile sets and base stations (BSs)

High-quality speech

Compatibility with Integrated Services Digital Network (ISDN) and other


telephone company services

Support for new services


12
2G Wireless Technology
In second generation communications phone conversations were digitally
encrypted.

2G GSM Technology operates on different frequency bands 900/1800.

In 900 uplink i.e. from mobile to BTS is from 890-915 MHz and downlink
i.e. from BTS to mobile is from 935-960 MHz
In 2G two types of multiple Access are used TDMA Based GSM technology,
CDMA based IS 95.
In GSM different types of carriers of frequency 200 KHz are used and hence
in 900 frequency band 124 carriers are used and in 1800 band 373 carriers
can be used.
First Data service was started in the form of SMS and later GPRS was
introduced.
In CDMA Up to 61 users can be communicating simultaneously.
CDMA also has bandwidth of 20 MHz at 800 bands and 1900 band.
Multimedia services are not supported in this technology. 13
2G
FEATURES OF 2G TECHNOLOGY: It enables services such as
text messages, picture messages and MMS (multi media message). It
provides better quality and capacity .

DRAWBACKS OF 2G : 2G requires strong digital signals to help


mobile phones work. If there is no network coverage in any specific
area , digital signals would weak. These systems are unable to handle
complex data such as Videos.

14
2.5G and 2.75 G
“2.5G” using GPRS (General Packet Radio Service) technology is a
cellular wireless technology developed in between its predecessor, 2G, and
its successor, 3G. GPRS could provide data rates from 56 kbit/s up to 115
kbit/s. It can be used for services such as Wireless Application Protocol
(WAP) access, Multimedia Messaging Service (MMS), and for Internet
communication services such as email and World Wide Web access.
2.75 – EDGE is an abbreviation for Enhanced Data rates for GSM
Evolution. EDGE technology is an extended version of GSM. It allows the
clear and fast transmission of data and information up to 384kbit/s speed.

15
3G - Third Generation

3G technology refer to third generation which was


introduced in year 2000s. Data Transmission speed
increased from 144kbps- 2Mbps. Typically called Smart
Phones and features increased its bandwidth and data
transfer rates to accommodate web-based applications
and audio and video files

16
3G Wireless Technology
3G technology works on 2100 MHz band.

3G supports Multimedia services such as video calling, internet services,


music on demand, and videos on demand.

Should support 2 Mbps for stationary users, 384 kbps for mobile users.

The technologies supporting 3G are CDMA 2000, EVDO, UMTS,


HSPA, HSDPA and WCDMA.

It does not support existing 2G infrastructure, the size of the cell is


relatively smaller compared to 2G and hence more towers are required
for better coverage & performance.

Power consumption is more.

17
3G
FEATURES OF 3G TECHNOLOGY: Providing Faster
Communication , Send/Receive Large Email Messages High Speed
Web / More Security Video Conferencing / 3D Gaming, TV
Streaming/ Mobile TV/ Phone Calls, Large Capacities and Broadband
Capabilities, 11 sec – 1.5 min. time to download a 3 min Mp3 song.

DRAWBACKS OF 3G TECHNOLOGY: Expensive fees for 3G


Licenses Services, It was challenge to build the infrastructure for 3G ,

High Bandwidth Requirement, Expensive 3G Phones.

18
4G - Fourth Generation

4G technology refer to or short name of fourth Generation which was


started from late 2000s. Capable of providing 100Mbps – 1Gbps speed.
One of the basic term used to describe 4G is MAGIC. MAGIC: Mobile
Multimedia Anytime Anywhere Global Mobility Support Integrated
Wireless Solution Customized Personal Services Also known as Mobile
Broadband Everywhere.

19
4G Wireless Technology

4G technology works on 1800 MHz, 2600 MHz band and 800 MHz
band.

LTE and WiMAX are two main 4G technologies.

4G Supports OFDM, MIMO, S-FDMA technologies for services.

Supports very high data rates for moving vehicles up to 350


mph.According to ITU-R the standard rate of data for moving systems
such as car, bus and train should support 100 Mbps and stationary
users or low mobility users such as pedestrians should support 1000
Mbps/1 Gbps.

Supports up to 200 voice call simultaneously on single carrier.

20
4G
(Anytime, Anywhere) The next generations of wireless technology that
promises higher data rates and expanded multimedia services. Capable
to provide speed 100Mbps-1Gbps. High QOS and High Security
Provide any kind of service at any time as per user requirements,
anywhere. Features Include: More Security , High Speed, High
Capacity, Low Cost Per-bit etc.

DRAWBACKS OF 4G: Battery uses is more Hard to implement Need


complicated hardware Expensive equipment required to implement next
generation network.

21
COMPARISON BETWEEN 3G Vs 4G
The basic difference between 3G and 4G is in data transfer and
signal quality. 3G 4G Data Transfer Rate 3.1 MB/sec 100 MB/sec
Internet Services Broadband Ultra Broadband Low High
Bandwidth 5-20 MHz 100MHz Frequency 1.6-2 GHz 2-8 GHz
Download and upload 5.8 Mbps 14 Mbps Technology Mobile - TV
Resolution Countries Have 4-G Except for the Scandinavian
Countries (Northern Europe that includes Denmark and two of the
nations of Scandinavian , Norway and Sweden. ), a few countries
have started the 4G commercially. In the US, Sprint Nextel and
Others Germany , Spain, China , Japan and England are also

using the 4G services and mobiles .

22
Short-Range Wireless

A number of different wireless technologies have been


developed for very short distances. These are referred to as
'short-range wireless communication.' Signals travel from a
few centimeters to several meters.

Examples of short-range wireless communications are


Bluetooth, infrared, near field communication, ultraband and
Zigbee.

23
Bluetooth

Bluetooth is a type of wireless communication used to transmit voice


and data at high speeds using radio waves. It is a standard protocol
for short-range radio communications between many different types
of devices, including mobile phones, computers, entertainment
systems and other electronics. Devices need to be within
approximately 10 meters of each other, and the typical data transfer
rate is around 2 megabits per second (Mbps).
This technology is use to transfer the data at the rate of 720 kbps
within the range of 10 to 100 meters. By using this technology, you
share voice, music,photos, and other type of the data wireless with
much security between two paired devices.
24
• The technology is named after the Danish King Harold Bluetooth
• Blue tooth signals operate in the 2.45 GHz frequency band.
• Every device using Bluetooth has a small microchip that can send
both voice and data signals.
• In a typical setup, one device operates as the master, and one or
more other devices operate as slaves. The master device uses link
manager software to identify other Bluetooth devices to create links
with them to be able to send and receive data.
• Bluetooth uses a spread-spectrum frequency-hopping technology.
• Bluetooth is widely used in mobile phones. Bluetooth to set up a
link between your mobile phone and you car's audio system,
25
26
27
Features of the Bluetooth technology :

.Ultra-low peak, average, and idle mode power consumption


. Low cost
Enhanced range
. Global usages
. Voice and data handling
. The ability to establish ad-hoc connections
. Very small in size
. Secure transfer of data between many devices
. Available in almost all type of mobile hand-set.
. Less time consuming
. Flexible and reliable data transfer
. Ensure confirmation form both connecting device
. 1 Mb/sec. Transmission/reception rates
. short packet maximizing capacity
. low power minimizing interference
. fast frequency hopping minimizing interference 28
Problems with Bluetooth technology :

1. A tangle of cables
2. Varying standard of cables and connectors
3. unreliable galvanic connections
4. re-configuration of units
5. manual switches when ports are not sufficient
6. Need of confirmation on both side
7. plugging of both device

29
Advantages of technology :
1. Simple setup
2. Compatibility
3. Less hardware
4. Security
5. Standard protocol
7. Economical
8. Upgrade able
9. Automatic
10. Simplify the communication during driving
11. Instant PAN
12. Don’t need to be face to face 30
Applications of The technology :
1. Wireless networking between laptop and desktop
2. Transfer of the data
3. Use in E-commerce ‘and retail in future
4. Home networking
5. cable -less connection to printer, fax, cameras
6. Dial-up and automatic e-mail
7. Use of PDA or PC as hands free phone
8. Automatic exchange of files
9. Bluetooth interface to office PBX
10. Use of cell phone as office cordless phone
31
RFID

RFID is an acronym for “radio-frequency identification” and refers


to a technology whereby digital data encoded in RFID tags or smart
labels (defined below) are captured by a reader via radio waves.
RFID is similar to barcoding in that data from a tag or label are
captured by a device that stores the data in a database.

32
How does RFID work?
RFID belongs to a group of technologies referred to as Automatic Identification and
Data Capture (AIDC). AIDC methods automatically identify objects, collect data about
them, and enter those data directly into computer systems with little or no human
intervention. RFID methods utilize radio waves to accomplish this. At a simple level,
RFID systems consist of three components: an RFID tag or smart label, an RFID reader,
and an antenna. RFID tags contain an integrated circuit and an antenna, which are used
to transmit data to the RFID reader (also called an interrogator). The reader then
converts the radio waves to a more usable form of data. Information collected from the
tags is then transferred through a communications interface to a host computer system,
where the data can be stored in a database and analyzed at a later time.

33
Radio Frequency Identification (RFID) refers to a wireless system
comprised of two components: tags and readers. The reader is a device
that has one or more antennas that emit radio waves and receive
signals back from the RFID tag. Tags, which use radio waves to
communicate their identity and other information to nearby readers, can
be passive or active. Passive RFID tags are powered by the reader and
do not have a battery. Active RFID tags are powered by batteries.

RFID tags can store a range of information from one serial number to
several pages of data. Readers can be mobile so that they can be
carried by hand, or they can be mounted on a post or overhead. Reader
systems can also be built into the architecture of a cabinet, room, or
building.
34
35
At a simple level, Radio-Frequency Identification systems
consist of three components:
An RFID tag – a transponder that has been programmed with
information.
An RFID reader – a transceiver with a decoder to interpret the
data.
A scanning antenna

36
Some Advantages of RFID:
RFID tags do not need batteries to operate (active RFID tags);
therefore may be used for very long periods of time.
Scanning antennas can be permanently affixed to a surface;
handheld antennas are also available
RFID Frequencies:
RFID readers, Tags, and Labels are designed with specific
frequencies, which are usually, but not always designed for specific
uses and applications. LF or Low Frequency which is usually 125.0
kHz and 134.2 kHz for most popular applications and actually goes
up to 150 kHz on the scale of frequencies. LF 125.0 KHz is mostly
used for industrial applications, where 134.2 kHz is used for animal
identification.

37
Uses

RFID systems use radio waves at several different frequencies to transfer


data. In health care and hospital settings, RFID technologies include the
following applications:

Inventory control

Equipment tracking

Out-of-bed detection and fall detection

Personnel tracking

Ensuring that patients receive the correct medications and medical


devices

Preventing the distribution of counterfeit drugs and medical devices

Monitoring patients

Providing data for electronic medical records systems 38


What is NGN?
Hamid R. Rabiee
Spring 2013
Outlines

! Next Generation Network (NGN)


!  Definition
!  Applications
!  Requirements
!  Network Architecture
!  QoS
!  Issues

Digital Media Lab - Sharif University of Technology


What is NGN?

!  The network of 10 years from now won’t be the network of today.

!  Our goal for this session is to consider some ideas which may influence
what the Internet of the future will be.
!  ITU-T SERIES Y: GLOBAL INFORMATION INFRUSTRUCTURE,
INTERNET PROTOCOL ASPECTS AND NEXT GENERATION
NETWORKS
!  Y.2001: General overview of NGN

!  Y.2011: General principles and general reference model for NGN

Digital Media Lab - Sharif University of Technology


NGN Definitions

!  NGN Definition (Y.2001): A packet based network able to provide


telecommunication services and able to make use of multiple
broadband, QoS-enabled transport technologies and in which service-
related functions are independent from underlying transport-related
technologies

!  Practical description (ETSI): the convergence of the public switched


telephone network, the voice network, the wireless network (Wi-Fi,
WiMAX, GSM,..) and the data network

!  IP based packet switched network that provides a single network


capable of carrying any and all services
Digital Media Lab - Sharif University of Technology
NGN Concepts

!  A multi-service network able to support voice, data and video

!  A network with a control plane (signaling, control) separated from the


transport/switching plane

!  A network with open interfaces between transport, control and


applications

!  A network using packet mode technology to transport of all kind of


information

!  A network with guaranteed QoS for different traffic types and SLAs
(SLA refers to service-level agreement)

Digital Media Lab - Sharif University of Technology


Why NGN?

! Flexibility for service building and offering

! Expectation of cost reductions by sharing infrastructure


and systems

! Simplification in
!  (Operation and Manipulation)

! lowering OPEX.

! Use of open interfaces leads for:


!  quick deployment of services and applications

!  new services (third parties)

Digital Media Lab - Sharif University of Technology


Existing Telecommunications

!  Benefits
!  Worked well for stand-alone systems

!  Challenges
!  Many networks= high operational and interworking costs

!  Slow to introduce new services

!  Users require different devices for different services

Difficult to integrate new services or technologies

Digital Media Lab - Sharif University of Technology


Emerging Telecommunications

!  Benefits
!  Rapid service deployment= new service revenues

!  Allowed continued growth of network

!  Flexible architecture for future growth and new technologies

!  Allows for competition at individual layers

!  Challenges
!  Legacy policy frameworks are challenged by the emerging telecommunications
model throughout the world

Digital Media Lab - Sharif University of Technology


Drivers and motivation for NGN deployment

!  External drivers and internal motivation put pressure on operators’


NGN deployments
Drivers Operators’ Motivation

"  massive growth of data "  develop new services easier


traffic and faster
"  flat growth of voice market "  enhance flexibility
"  massive access competition "  reduce operational
"  maturity of IP technology expenditures
"  open standards and "  replace of old platforms at
architectures their end of lifecycle

Deployment of Next Generation Network

Digital Media Lab - Sharif University of Technology


NGN Applications

!  www access (browsing, information, e-commerce…)

!  VoIP

!  Video calling

!  Video on Demand (VoD)

!  Broadcast television (IPTV, unicast, multicast)

!  Multimedia Messaging

!  Games

!  …

Digital Media Lab - Sharif University of Technology


NGN Applications

Digital Media Lab - Sharif University of Technology


NGN Requirements

!  Business Continuity required to maintain ongoing dominant services


and customers that require carrier-grade service

!  Flexibility to incorporate existing new services and react quickly to the


ones that appear on real time (main advantage of IP mode)

!  Profitability to allow feasible return on investments and in the best


practices market values

!  Privacy and security to ensure appropriate use and also protection of


information

Digital Media Lab - Sharif University of Technology


NGN Requirements

!  Survivability to allow service assurance in case of failures and external


unexpected events

!  Quality of Service to guarantee the Service Level Agreements for


different traffic mixes, conditions and overload.

!  Interoperability across networks to allow to carry end to end services


for flows in different network domains

Digital Media Lab - Sharif University of Technology


Basic Concepts of NGN

!  A Next Generation Network can be defined by six key criteria.

packet-
oriented
network
support
integration of broad
existing
variety of
infrastructure
services
NGN
concept openness
application and
focused - flexibility
access regarding
independent separation new
into different services
layers using
open
interfaces

Digital Media Lab - Sharif University of Technology


One schematic view of NGN

Digital Media Lab - Sharif University of Technology


Main idea!

Digital Media Lab - Sharif University of Technology


NGN Layers

Digital Media Lab - Sharif University of Technology


NGN layers and functions

!  Application layer enables the provisioning of services and provides the


control and logic for the execution of services

!  Control layer controls the elements of the network, establishes and


tears down media connections
!  Access Independent layer is responsible for the transport of media and
signaling messages
!  Access Dependent layer connects customer networks or terminals with
the components of the NGN network and aggregate the dedicated
traffic type
!  Management layer covers network management ensuring service
fulfillment, service assurance and billing

Digital Media Lab - Sharif University of Technology


Customer & Operator benefits

! Customer benefits
! device independence
! access independence
! service variety
! enhanced usability
! Operator/ Provider benefits
! new revenue potential
! improves time-to-market
! easy integration of 3rd party services
! one platform for voice, data and multimedia

Digital Media Lab - Sharif University of Technology


Network Architecture

Digital Media Lab - Sharif University of Technology


Network Architecture(cont.)

!  Packet based networks


!  Trend is to use IP based networks over various transport possibilities (ATM, SDH,
WDM…)
!  IP based networks must offer guarantees of Quality of Service (QoS) regarding the
real time characteristics of voice, video and multimedia

!  Access Gateways
!  Allows the connection of subscriber lines to the packet network
!  Converts the traffic flows of analogue access (Pots) or 2 Mb/s access devices into
packets
!  Provides subscriber access to NGN network and services

!  Trunking Gateways
!  Allows interworking between classical TDM telephony network and Packet-based NGN
networks,
!  Converts TDM circuits/ trunks (64kbps) flows into data packets, and vice versa
Digital Media Lab - Sharif University of Technology
Network Architecture(cont.)

!  Soft switch/MGC
!  referred to as the Call Agent or Media Gateway Controller (MGC)

!  provides the “service delivery control” within the network in charge of Call
Control and handling of Media Gateways control (Access and/or Trunking) via H.
248 protocol

!  performs signaling gateway functionality or uses a signaling gateway for


interworking with PSTN N7 signaling network

!  provides connection to Intelligent Network /applications servers to offer the


same services as those available to TDM subscribers

!  Application Server (AS)


!  A unit that supports service execution, e.g. to control Call Servers and NGN
special resources (e.g. media server, message server).

Digital Media Lab - Sharif University of Technology


Network Architecture(cont.)

!  H.248 Protocol
!  Known also as MEGACO: standard protocol, defined by ITU-T, for signaling and
session management needed during a communication between a media
gateway, and the media gateway controller managing it

!  H.248/MEGACO allows to set up, keep, and terminate calls between multiple
endpoints as between telephone subscribers using the TDM

!  SIP
!  Session Initiation Protocol in order to handle call establishment, maintenance
and termination from packet mode terminals.

!  Signaling Gateway (SG)


!  A unit that provides signaling conversion between the NGN and the other
networks (e.g. STP in SS7).

Digital Media Lab - Sharif University of Technology


Network Architecture(cont.)
!  ENUM
!  Electronic NUMbering: Protocol that allows to establish a correspondance between
the traditional telafone numbering (E.164 ) and the network addresses related to the
packet mode networks ( RFC 2916 "E.164 number and DNS" IETF).

!  MPLS
!  Multiprotocol Label Switch or protocol that assigns labels to information packets in
order to allow the node routers to treat and route flows in the network paths according
to established priority for each category.

!  CAC
!  Call Acceptance Control function in order to accept/reject traffic in the network that
allows guarantee of QoS for services with a Service Level Agreement

!  BGP
!  Border Gateway Protocol to negotiate flow routing procedures and capacities across
different NGN network domains

Digital Media Lab - Sharif University of Technology


Areas of interest for NGN standards activity

!  International Telecommunications Union (ITU-T)


!  Telecommunication Standardization Advisory Group (TSAG)

!  Study Groups (SG13 lead SG for NGN)

!  NGN Global Standards Initiative (NGN-GSI), since Jan 2006

!  European Telecommunications Standards Institute (ETSI)


!  TISPAN, 3GPP / IMS

!  Internet Engineering Task Force (IETF)


!  Protocols (IP, SIP, MGCP, ENUM, etc)

!  Global Standards Collaboration (GSC)

!  Asia-Pacific Economic Cooperation (APEC) Telecommunications and


Information Working Group APEC TEL

Digital Media Lab - Sharif University of Technology


Defining Standards

!  Smaller industry for a have helped shape international standards.


!  IETF have developed many of the core NGN technologies (IP, MPLS, SIP, etc.)

!  3GPP integrated IP-based technologies into a building block of the NGN, IP


Multimedia Subsystem (IMS)

!  Release based (ETSI TISPAN r1, 3GPP r7, ITU NGN r1-3)

!  ITU involvement is necessary at the international level to define an


evolutionary framework to help solve interworking, mobility and service
definitions issues, but…

!  There could be more pro-active cooperation between the ‘telco’ and


internet stakeholders

Digital Media Lab - Sharif University of Technology


IP Multimedia Subsystem (IMS)

!  What is the IP Multimedia Subsystem?


!  An architectural framework for delivering IP multimedia services in the
3GPP environment

!  Part of the 3GPP (and 3GPP2: MMD) vision for evolving mobile networks
beyond GSM
!  Original formulation (Rel-5) an approach to deliver "Internet services" over
GPRS

!  Updated by 3GPP, 3GPP2, TISPAN through including support of other


access network technologies, e.g., Wireless LAN, CDMA2000, fixed line,
xDSL, etc.

Digital Media Lab - Sharif University of Technology


IP Multimedia Subsystem (IMS)

!  IMS builds on IETF protocols


!  Based upon SIP, SDP, COPs and Diameter protocols

!  3GPP have enhanced these IETF protocols for mobility

!  IMS in short…
!  Open-system architecture that supports a range of I-based services over
the PS domain, employing both wireless and fixed access technologies

Digital Media Lab - Sharif University of Technology


IMS Layers

!  IMS consists of three planes:


!  Application plane

!  Control plane (or core IMS): The IMS


control plane is used in the service
stratum

!  IP transport plane: Resource


control and admission based on the
negotiated QoS parameters are
mainly executed in the transport
stratum

Digital Media Lab - Sharif University of Technology


NGN Competition Issues

!  Market power and network effects


!  Implications for existing and future customer access services

!  Any-to-any connectivity

!  Interconnect
!  Charging models for multiple providers in an E2E service

!  Pricing

!  Standards

!  Australian Competition and Consumer Commission (ACCC) has


begun canvassing some of the issues in discussion with stakeholders
and public

Digital Media Lab - Sharif University of Technology


Longer-term NGN Issues

!  Implications for competition policy

!  Jurisdiction and extraterritoriality

!  Privacy and security

!  Digital rights management

!  Access and interoperability

!  Common standards

!  Consumer interests

!  International and domestic governance issues

!  Scope for industry self-regulation

Digital Media Lab - Sharif University of Technology


Next Session

QoS Control Mechanisms

Digital Media Lab - Sharif University of Technology


1st International Student Spring
Symposium on Internet &
Web Technologies

Introduction to Wireless
Application Protocol (WAP)
and WAP 2.O Standard

Presented by

Dragomanov Andon
Paunovski Ognen

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


Agenda
• What is WAP?
• Development and Objectives
• WAP Concept
• WAP 1.0 Architecture
• WAP 2.0 Architecture
• WAP 2.0 Features
• WML
• Real Life Examples

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


Definition of WAP
“Wireless application protocol (WAP)
is an application environment and set of
communication protocols for wireless devices
designed to enable access to the Internet
and advanced telephony services
to the wireless community. “
W@P Forum

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


Development of WAP

• WAP Forum, Summer 1997


• WAP 1.0 Standard, 1998
– Open Standard
– Industry-Wide Specification
• WAP 2.0 Standard, 2002

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


Objectives of WAP

• Initial focus on wireless phones


– Low bandwidth, high latency, low connection stability
• To provide Internet access for wireless
devices
• Device & Network Independent
• To create Wireless Application Environment
– Micro-browser, e-mail, www, mobile to fax access etc.
– WML and WML script.

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


WAP Concept Overview

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


WAP 1.0 Protocol Architecture
• WSP - Wireless Session protocol
• WTP - Wireless Transaction Protocol
• WTLS - Wireless transport layer security
• WDP - Wireless datagram protocol

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


WAP 2.0 Protocol Architecture
• Optional Proxy
• Internet Protocols
• Proxy required for WAP 2.0 technologies

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


WAP 2.0 Features
• WAP Push
• User Agent Profile
• Wireless Telephony Application
• Multimedia Messaging Service
• Supports High-Speed Technology (3G)

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


WML – Wireless Markup Language
• Based on HTML
• WML Script based on Java Script
• Technical collaboration with W3C
• Micro Browser Technology
First story
<WML>
<TEMPLATE>

<DO TYPE="OPTIONS" LABEL="Main">
<GO URL="main_menu.wml"/>
</DO>
___________
</TEMPLATE> Next Main
<CARD NAME="msg1">
<DO TYPE="ACCEPT" LABEL="Next">
<GO URL="#msg2"/>
</DO>
Second story
First story ...
</CARD>
<CARD NAME="msg2">
Second story ___________
</CARD>
</WML>
OK Main

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


Real Life Examples

You will be able:


• to check your bank account balance while
drinking coffee with your friends
• to reserve place in the restaurant without
making any calls
• Watch 100m sprint race live while you are
stuck in traffic jam

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


THANK YOU

24 May 2002 Dragomanov Andon :: Paunovski Ognen S3IWT02


Reference Specification
for

Next Generation Networks (NGN)


Technical Framework

IDA RS NGN Tech Framework


Issue 1, February 2007

Info-Communications Development Authority of Singapore


Resource Management & Standards
8 Temasek Boulevard
#14-00 Suntec Tower Three
Singapore 038988

© Copyright of IDA, 2007

This document may be downloaded from the IDA website at http://www.ida.gov.sg and shall not be distributed without written
permission from IDA
IDA RS NGN TECH FRAMEWORK: 2007

Contents
Page

1 Scope 3

2 NGN Architecture Overview 4

3 NGN Functions 6

3.1 Transport Layer Functions 6

3.2 Service Layer Functions 8

3.3 End-User Functions 8

3.4 Management Functions 8

4 NGN Functional Entities 10

5 NGN Service-specific Components 12

6 Security Considerations 13

7 NGN Release 1 Services 14

8 Capability Requirements for NGN Release 1 16

9 References 17

This Reference Specification is a living document which is subject to


review and revision.

Reference Specifications and Guides are informative documents and are


not used for approval of customer equipment. They are either one of the
following types of documents:

i Informative and interim documents on customer equipment


standards which are yet to be adopted by network operators, and
where standardisation is still in progress.

ii Informative documents describing network standards adopted by the


public telecommunication networks in Singapore.

2
IDA RS NGN TECH FRAMEWORK: 2007

1 Scope

1.1 This Reference Specification outlines the technical framework which is relevant
for developing the Next Generation Networks (NGN). It refers to the architecture
for NGN given in the ITU-T recommendation for Functional Requirements and
Architecture of the NGN for Release 1 (ITU-T Rec. Y.2012).

1.2 The architecture for NGN shown in section 2 of this Specification is a functional
architecture where a set of functions is used to describe the NGN structure. Each
function is defined and specified as a set of functional entities (outlined in
sections 3 and 4 of this Specification). Groupings of functional entities are used to
describe the physical NGN implementations, and determine the capabilities
supported in the NGN. Therefore network operators may choose and combine
the functional entities according to their business models, services and
capabilities to be supported.

1.3 NGN service-specific components required for the NGN to support services such
as the mediated multimedia services and the PSTN/ISDN service capabilities are
outlined in section 5 of this Specification. Security considerations are defined in
section 6 of this Specification.

1.4 This architecture for NGN allows for the support of services identified in the ITU-T
Y series Supplement 1 for the NGN Release 1 scope, which are outlined in
section 7 of this Specification. It also allows for the support of capabilities and
capability requirements identified in the ITU-T recommendation for the NGN
Release 1 requirements (ITU-T Rec. Y.2201), which are listed in section 8 of this
Specification.

1.5 This architecture for NGN does not restrict network operators’ freedom to deploy
capabilities or use capabilities of their business partners. Specific division of
functional entities between the core and access networks is based on operators’
business decisions rather than hard points of separation in the architecture.
Functional entities may be mixed and matched in different ways. Physical
equipment may have both the core and the access network functions.

1.6 Existing network operators may have adopted the overlay approach in which
legacy networks like the Public Switched Telephone Network (PSTN) / Integrated
Service Digital Network (ISDN) and Public Land Mobile Network (PLMN), will co-
exist with the NGN for some time. Therefore inter-working with PSTN/ISDN is an
important consideration in the architecture for NGN.

3
IDA RS NGN TECH FRAMEWORK: 2007

2 Architecture for NGN

2.1 The architecture for NGN described in this Reference Specification conforms to
the NGN architecture as shown in Figure 1, which is a 2-layered NGN model,
structured according to a service stratum and transport stratum.

Figure 1: NGN Architecture Overview (ITU-T Y.2012)

2.2 The set of functions within the transport stratum of the 2-layered NGN model is
supported by many protocols which together compose the NGN transport network.
The end of the transport stratum protocol stack is denoted by layer 3 of the Open
Systems Interconnection (OSI) Basic Reference Model (BRM) and the beginning
of the service stratum protocol stack is denoted by layer 4 of the OSI BRM (see
Figure 2). Layer 3 is the converging Internet Protocol (IP) layer where the IP-
based NGNs converge in providing IP connectivity across the NGN transport
network. Layer 4 is the Transmission Control Protocol (TCP) or User Datagram
Protocol (UDP) layer. A variety of layer 1 (Physical layer) and layer 2 (Data Link
layer) will exist depending on the underlying technologies used to support IP.

Layer 7 – Application Any Service &


Layer 6 – Presentation Services Stratum Every Service
Layer 5 – SIP
Layer 4 – TCP/UDP
Scope
Internet
Layer 3 – IP layer of
Protocol (IP)
NGN
Layers 2 & 1 – Transport Stratum
Underlying technologies Any Transport &
that support IP e.g. SDH Every Transport
over Optical, Ethernet over Technology
Optical

Open Standards
Two Service Domains
Interconnection (OSI)
Basic Reference Model
NGN Strata View
View

Figure 2: Generic Layered Protocol Stack Architecture

2.3 With a flexible architecture for NGN which supports multiple access network
technologies, a core network can be set apart from another core network

4
IDA RS NGN TECH FRAMEWORK: 2007

according to administrative needs or ownership. Access networks can be set


apart from core networks in that they do not provide end-user services directly
other than transport. Access networks can be set apart according to
technologies, administrative needs or ownership.

5
IDA RS NGN TECH FRAMEWORK: 2007

3 NGN Functions

3.1 Transport Layer Functions

The transport layer includes transport functions and transport control


functions.

3.1.1 Transport Functions

3.1.1.1 Transport functions provide connectivity for all physically separated functions
within the NGN. These functions provide support for the transfer of media
information, as well as the transfer of control and management information.
Transport functions as defined in the ITU-T Rec. Y.2012 include access
network functions, edge functions, core transport functions, gateway functions
and media handling functions.

3.1.1.2 No assumptions are made about either the technologies to be used or the
internal structure, for example, the access transport network and the core
transport network.

(a) Access Transport Functions (Network Dependent)

NGN Release 1 supports access transport functions of diverse


technologies and capabilities. An access transport function provides
IP connectivity at the transport stratum, between the end-user
functions and the NGN core transport functions. The following is a list
of proposed technologies which implement the access transport
functions for the NGN Release 1:

xDSL: ADSL (ITU-T Recs. G.992.1, G.992.3 and G.992.5),


SHDSL (ITU-T Rec. G.991.2), and VDSL (ITU-T
Recs. G.993.1 and G.993.2) transport systems and
supporting connection/multiplexing technologies
SDH: SDH dedicated bandwidth access (ITU-T Rec. G.707)
Optical access: Point-to-point (IEEE 802.3ah 100Base-LX/BX), and
xPON transport systems such as BPON (ITU-T Recs.
G.983 series), GPON (ITU-T Recs. G.984 series),
EPON (Gigabit EPON is sometimes called GEPON),
(IEEE 802.3ah 1000Base-PX)
Cable: Cable networks based on PacketCable multimedia
specifications as another type of access transport
function (ITU-T Rec. J.179)
LANs: LANs using either coaxial or twisted pair cable,
including 10Base-T Ethernet (IEEE 802.3), Fast
Ethernet (IEEE 802.3u), Gigabit Ethernet (IEEE
802.3z), 10 Gigabit Ethernet (IEEE 802.3ae)
PLC: Power Line Carrier (PLC) networks transmitting and
receiving data over the power line
IEEE 802.X: Wireless networks (various publications for wireless
LAN and broadband wireless access)
3GPP IP-CAN: Mobile networks (IP connectivity access networks)
Broadcast: Broadcast networks (Internet broadcast/multicast, DVB,
ISDB-T, various publications related to broadcasting)

6
IDA RS NGN TECH FRAMEWORK: 2007

(b) NGN Core Transport Functions (Network Independent)

NGN core transport functions provide IP connectivity at the transport


stratum across the core network.

3.1.2 Transport Control Functions

Transport control functions include Resource and Admission Control Functions


and Network Attachment Control Functions.

3.1.2.1 Resource and Admission Control Functions (RACF)

(a) Within the NGN architecture, the Resource and Admission Control
Functions (RACF) act as the arbitrator between Service Control Functions
and Transport Functions for QoS (ITU-T Rec. Y.1291) related transport
resource control within access and core networks. The decision is based
on transport subscription information, Service Level Agreements (SLA),
network policy rules, service priority (defined by ITU-T Rec. Y.1571), and
transport resource status and utilization information.

(b) The RACF takes into account the capabilities of transport networks and
associated transport subscription information for subscribers in support of
the transport resource control. The RACF interacts with Network
Attachment Control Functions (NACF), including network access
registration, authentication and authorization, parameters configuration
etc, for checking transport subscription information.

(c) For delivering of those services across multiple providers or operators,


SCF, RACF and Transport Functions may interact with the corresponding
functions in other NGNs. The details and other aspects of the RACF are
specified in ITU-T Rec. Y.2111.

3.1.2.2 Network Attachment Control Functions (NACF)

(a) The Network Attachment Control Functions (NACF) provide registration at


the access level and initialization of end-user functions for accessing
NGN services. These functions provide transport layer level
identification/authentication, manage the IP address space of the access
network, and authenticate access sessions. These functions include:

− Dynamic provisioning of IP addresses and other user equipment


configuration parameters
− With endorsement of user, auto-discovery of user equipment
capabilities and other parameters
− Authentication of end user and network at the IP layer (and possibly
other layers)
− Authorization of network access based on user profiles
− Access network configuration based on user profiles
− Location management at the IP layer

(b) NACF includes Transport user profile which takes the form of a functional
database representing the combination of a user’s information and other
control data into a single "user profile" function in the transport layer. This
functional database may be specified and implemented as a set of
cooperating databases with functionalities residing in any part of the NGN.

3.2 Service Layer Functions

7
IDA RS NGN TECH FRAMEWORK: 2007

Functional groups in the service layer include Service Control Functions and
Application Support and Service Support Functions.

3.2.1 Service Control Functions

3.2.1.1 Service Control Functions (SCF) include resource control, registration, and
authentication and authorization functions at the service level for both mediated
and non-mediated services. They can also include functions for controlling media
resources, i.e., specialized resources and gateways at the service-signalling level.

3.2.1.2 SCF accommodates service user profiles which represent the combination of
user information and other control data into a single user profile function in the
service layer in the form of functional databases. These functional databases may
be specified and implemented as a set of cooperating databases with
functionalities residing in any part of the NGN.

3.2.2 Application Support Functions and Service Support Functions

The Application Support functions and Service Support functions include


functions such as the gateway, registration, authentication and authorization
functions at the application level. These functions are available to the
“Applications” and “End-User” functional groups. The Application Support
functions and Service Support functions work in conjunction with the Service
Control Functions to provide end-users and applications with the NGN services
they request.

3.3 End-User Functions

3.3.1 No assumptions are made about the diverse end-user interfaces and end-user
networks that may be connected to the NGN access network. End-user
equipment may be either mobile or fixed.

3.3.2 NGN support for user functions is limited to the control of user gateway functions
between the end user functions and the access transport functions. The device
implementing these gateway functions may be customer or access transport
provider managed. Management of customer networks is however outside of the
scope of the NGN Release 1.

3.4 Management Functions

3.4.1 Support for management is fundamental to the operation of the NGN. These
functions provide the ability to manage the NGN in order to provide NGN services
with the expected quality, security, and reliability.

3.4.2 These functions are allocated in a distributed manner to each functional entity
(FE), and they interact with network element (NE) management, network
management, and service management FEs. Further details of the management
functions, including their division into administrative domains, can be found in
ITU-T Rec. M.3060.

3.4.3 Management functions apply to the NGN service and transport layers. For each
of these layers, they cover the following areas:

(a) Fault management


(b) Configuration management
(c) Accounting management
(d) Performance management

8
IDA RS NGN TECH FRAMEWORK: 2007

(e) Security management

3.4.4 The accounting management functions also include charging and accounting
functions (CAF). These interact with each other in the NGN to collect accounting
information, in order to provide the NGN service provider with appropriate
resource utilization data, enabling the service provider to properly bill the users of
the system. A detailed description of the CAF functions can be found in § 7.5/ITU-
T Rec. Y.2012.

9
IDA RS NGN TECH FRAMEWORK: 2007

4 NGN Functional Entities

The NGN architecture given in Figure 1 is a service and technology independent


architecture which can be customised according to services to be offered and
technologies to be used. It is a generalised NGN functional architecture where
functional entities (NGN FEs) are generic FE, which can become technology-
oriented according to context. Most of the NGN transport layer functions (such as
the RACF or NACF) will support different types of NGN services in a common
way. However, NGN implementations need not implement certain transport layer
functions such as gateway FEs with respect to PSTN/ISDN, if they do not require
the support of such capabilities.

4.1 Transport processing FEs defined in § 8.3.1/ITU-T Rec. Y.2012:

T-1 Access Media Gateway Functional Entity (AMG-FE)


T-2 Access Node Functional Entity (AN-FE)
T-3 Edge Node Functional Entity (EN-FE)
T-4 Access Relay Functional Entity (AR-FE)
T-5 Access Border Gateway Functional Entity (ABG-FE)
T-6 Interconnection Border Gateway Functional Entity (IBG-FE)
T-7 Trunking Media Gateway Functional Entity (TMG-FE)
T-8 Media Resource Processing Functional Entity (MRP-FE)
T-9 Signalling Gateway Functional Entity (SG-FE)

4.2 Transport control FEs defined in § 8.3.2/ITU-T Rec. Y.2012:

T-10 Network Access Configuration Functional Entity (NAC-FE)


T-11 Transport Authentication and Authorization Functional Entity (TAA-FE)
T-12 Transport User Profile Functional Entity (TUP-FE)
T-13 Transport Location Management Functional Entity (TLM-FE)
T-14 Access Management Functional Entity (AM-FE)
T-15 Home GateWay Configuration Functional Entity (HGWC-FE)
T-16 Policy Decision Functional Entity (PD-FE)
T-17 Transport Resource Control Functional Entity (TRC-FE)

4.3 Service control FEs defined in § 8.3.3/ITU-T Rec. Y.2012:

S-1 Serving Call Session Control Functional Entity (S-CSC-FE)


S-2 Proxy Call Session Control Functional Entity (P-CSC-FE)
S-3 Interrogating Call Session Control Functional Entity (I-CSC-FE)
S-4 Subscription Locator Functional Entity (SL-FE)
S-5 Service User Profile Functional Entity (SUP-FE)
S-6 Service Authentication and Authorization Functional Entity (SAA-FE)
S-7 Interconnection Border Gateway Control Functional Entity (IBC-FE)
S-8 Access Gateway Control Functional Entity (AGC-FE)
S-9 Media Gateway Control Functional Entity (MGC-FE)
S-10 Breakout Gateway Control Functional Entity (BGC-FE)
S-11 User Signalling Interworking Functional Entity (USIW-FE)
S-12 Network Signalling Interworking Functional Entity (NSIW-FE)
S-13 Media Resource Control Functional Entity (MRC-FE)
S-14 Media Resource Broker Functional Entity (MRB-FE)
S-15 General Services Control Functional Entity (GSC-FE)

10
IDA RS NGN TECH FRAMEWORK: 2007

4.4 Application Support and Service Support FEs defined in § 8.3.4/ITU-T Rec.
Y.2012:

A-1: Application Support Functional Entity (AS-FE)


A-2: Application Gateway Functional Entity (APL-GW-FE)
A-3: Application Service Coordination Manager Functional Entity (APL-SCM-FE)
A-4: Service Switching Functional Entity (SS-FE)

11
IDA RS NGN TECH FRAMEWORK: 2007

5 NGN Service-specific Components

5.1 IP Multimedia Service Component

The IP multimedia service (IMS) component provides mediated services including


the control and delivery of real-time conversational services based on the re-use
of the IMS. The IMS is extended in NGN to support additional access network
types such as xDSL and WLAN. PSTN/ISDN simulation service is also provided
by this component. PSTN/ISDN simulation service refers to the provision of
PSTN/ISDN like services to advanced terminals such as IP phones. The IMS
component is specified further in ITU-T Rec. Y.2021.

5.2 PSTN/ISDN Emulation Service Component

The PSTN/ISDN emulation (PES) service component enables the support of


legacy terminals connected through a gateway to an IP network. All PSTN/ISDN
services remain available and identical such that end-users are unaware that they
are not connected to a TDM-based PSTN/ISDN. The PES component is specified
further in ITU-T Rec. Y.2031.

5.3 Other NGN Service Components

Other NGN service components will be defined in the future to address other
services such content delivery, multimedia multicast or broadcast services, push
services, data retrieval applications, data communication services, online
applications, sensor network services, remote control services, and over-the-
network device management.

12
IDA RS NGN TECH FRAMEWORK: 2007

6 Security Considerations

Security requirements within the functional requirements and architecture of the


NGN are addressed by the Security Requirements for NGN Release 1 (ITU-T
Rec. Y.2701). Security requirements are voluntarily implemented by network
operators or service providers to protect their customers and the networks. NGN
security is based on a four layer conceptual model.

(a) NGN security at the application layer focuses on network-based


applications accessed by service providers’ customers. Applications
include web browsing, email, basic file transfer etc. Security applied is to
protect the customers and the networks.

(b) NGN security at the service layer addresses the security concerns of the
services provided by service providers to their customers. Services
include domain name services, value-added services and quality of
service etc. Security applied is to protect the service providers and their
customers.

(c) NGN security at the IP layer addresses the packet flow which is
supported by the network facilities in transporting information. Security is
focused on protecting the IP packets.

(d) NGN security at the data link layer focuses on protecting the data frames
within a single link.

13
IDA RS NGN TECH FRAMEWORK: 2007

7 NGN Release 1 Services

7.1 The NGN Release 1 provides an extensible platform for services and an
architecture which is designed to be extensible, allowing new services to be
implemented as and when required. All services are carried over the Internet
Protocol (IP), which in turn may be carried over a number of underlying
technologies such as Asynchronous Transfer Mode (ATM), Ethernet, etc. The
functions supported by the NGN Release 1 specifications are again illustrated in
Figure 3, which includes interfaces between NGN and end-user functions,
between NGN and other networks, and between NGN and applications.

Figure 3: Transport and Service Configuration of the NGN


(ITU-T Y series – Supplement 1)

7.2 The NGN Release 1 extensible platform and architecture supports the following
services:

(a) Multimedia services (including PSTN/ISDN simulation services);


(b) PSTN/ISDN replacement support (emulation services);
(c) Data communication services; and
(d) Public Interest Aspects (for both multimedia services and PSTN/ISDN
replacement support)

7.3 The NGN Release 1 supports the following functions:

a) Control of access and core transport networks (QoS, admission control,


authentication, etc.);
b) Co-ordination of multiple control components to a single core transport
network for resource control;
c) Inter-working and interoperability with legacy networks;
d) Mutual de-coupling of the application support functions from the service
control functions and the transport layer; and
e) Access technology independence of service control functions and application
support functions.

14
IDA RS NGN TECH FRAMEWORK: 2007

7.4 Figure 3 represents the compilation of user and other control data into two
functions: "service user profile" and "transport user profile" functions. These
functions may be specified and realised as a set of co-operating databases with
functionality residing in any part of the NGN.

7.5 End-user interfaces are supported by both physical and functional (control)
interfaces. All categories of customer equipment are supported in the NGN, from
single-line legacy telephones to complex corporate networks. Customer
equipment may be both mobile and fixed.

15
IDA RS NGN TECH FRAMEWORK: 2007

8 Capability Requirements for NGN Release 1


The high level requirements and related capabilities for enabling the NGN
Release 1 services (identified in ITU-T Y series – Supplement 1) are defined in
ITU-T Rec. Y.2201. Selection of services to be included in any specific network is
a deployment decision of the operator. The list of network capabilities for NGN is
as follows:

(a) Transport connectivity (IPv4 and IPv6)


(b) Communication modes
(c) Media resource management
(d) Codecs
(e) Access network and network attachment
(f) User networks
(g) Interconnection, interoperability and interworking
(h) Routing
(i) Quality of service
(j) Accounting and charging
(k) Numbering, naming and addressing
(l) Identification, authentication and authorization
(m) Security
(n) Mobility management
(o) OAM
(p) Survivability
(q) Management
(r) Open service environment
(s) Profile management
(t) Policy management
(u) Service enablers
(v) PSTN/ISDN emulation and simulation
(w) Public interest aspects
(x) Critical infrastructure protection
(y) Non disclosure of information across NNI interfaces
(z) Inter-provider exchange of user-related information

16
IDA RS NGN TECH FRAMEWORK: 2007

9 References

Requirements given in this Specification are based on the following reference


documents:

ITU-T Rec. Y.2012 (2006) Functional Requirements and Architecture


of the NGN

ITU-T Rec. Y.2201 (2006) NGN Release 1 Requirements

ITU-T Series Y – NGN Release 1 Scope


Supplement 1 (2006)

17
TCP/IP Networking for Wireless
Systems

Integrated Communication Systems Group


Ilmenau University of Technology
Integrated Communication Systems Group

Content

• Internet Protocol Suite


– Link Layer: Ethernet, PPP, ARP, MAC Addressing
– Network Layer: IP, ICMP, Routing
– Transport Layer: TCP, UDP, Port Numbers, Sockets
– Application Layer: FTP, Telnet & Rlogin, HTTP, RTP

• TCP
– Basic Properties
– TCP Datagram Format
– Connection Setup and Release
– MTU and MSS
– Cumulative, Delayed and Duplicate Acknowledgements
– Sliding Window Mechanism
– Flow and Error Control

Advanced Mobile Communication Networks, Master Program 2


Integrated Communication Systems Group

Internet Protocol Suite

TCP/IP = the “Internet protocol suite“ = a family of protocols for the


“Internet”
Internet guesstimates 2003:
– 800 million users (x 2 each two years), 200 million permanent hosts
Standardisation:
– ISOC: Internet Society
– IAB: Internet Architecture Board
• IETF: Internet Engineering Task Force: http://www.ietf.org
– Standards & other informations are published as RFCs:
Requests for Comments
• IRTF: Internet Research Task Force

Advanced Mobile Communication Networks, Master Program 3


Integrated Communication Systems Group

Internet Protocol Suite

Implementations:
– De-facto standard: BSD 4.x implementations (Berkeley Software
Distribution)
– Subsequent versions come with new TCP features, e.g.
4.3 BSD Tahoe (1988): slow start, congestion avoidance, fast
retransmit
4.3 BSD Reno (1990): fast recovery
– Other TCP/IP stacks derived from BSD
– Implemented mechanisms, default parameter settings, and bugs
are different on different operating systems (e.g. versions of MS
Windows)!

Advanced Mobile Communication Networks, Master Program 4


Integrated Communication Systems Group

TCP/IP Layer Overview

TCP/IP Layers Tasks Protocol Examples


(OSI model*)

Application Telnet, rlogin, FTP, SMTP,


Application specific
(7) SNMP, HTTP, ...
End-to-end flow of data
Transport between application TCP, UDP
(4)
processes

Network Routing of packets


IP, ICMP
(3) between hosts

Hardware interface
Link PPP, Ethernet, IEEE 802.x,
(2)
Packet transfer be-
ARP
tween network nodes

* Mapping between TCP/IP and OSI layers is not always exact.


Advanced Mobile Communication Networks, Master Program 5
Integrated Communication Systems Group

TCP/IP Encapsulation
user data
Example:
Application data Application
transfer using TCP appl.
user data
header

TCP
TCP
application data
header
20
TCP segment
IP
IP TCP
application data
header header
20
IP datagram Ethernet
20...65536 bytes Driver

eth IP TCP eth


application data
header header header trailer
14 20 20 4
Ethernet frame
Ethernet: 46...1500 bytes

Advanced Mobile Communication Networks, Master Program 6


Integrated Communication Systems Group

TCP/IP Basics: Link Layer

User User User User


Process Process Process Application Layer
Process

TCP UDP Transport Layer

ICMP ...IP Network Layer

Hardware
ARP
Interface ... Link Layer

Advanced Mobile Communication Networks, Master Program 7


Integrated Communication Systems Group

Link Layer Protocols

Examples:
– Ethernet (encapsulation of higher layer packets is defined in RFC 894)
– PPP: Point-to-Point Protocol for serial lines (RFCs 1332, 1548)
MTU: Maximum Transfer Unit (or Max. Transmission Unit)
– Maximum IP packet size in bytes (e.g. for Ethernet: 1500, X.25 Frame Relay:
576)
Path MTU:
– Smallest MTU of any data link in the path between two hosts
– Used to avoid IP fragmentation
– TCP option: path MTU discovery (RFC 1191)
Loopback Interface:
– A client application can connect to the corresponding server application on the
same host by using the loopback IP address “localhost“ = 127.0.0.1
– Implemented at the link layer, i.e. full processing of transport and IP layers
ARP: Address Resolution Protocol (RFC 826)
– Address resolution from 32-bit IP addresses to hardware addresses (e.g. 48-
bit)
Advanced Mobile Communication Networks, Master Program 8
Integrated Communication Systems Group

TCP/IP Basics: Network Layer

User User User User


Process Process Process Application Layer
Process

TCP UDP Transport Layer

ICMP IP ... Network Layer

Hardware
ARP ...
Interface Link Layer

Advanced Mobile Communication Networks, Master Program 9


Integrated Communication Systems Group

IP: Internet Protocol

IP provides forwarding between hosts:


– Based on 32-bit IP addresses *
– Hop-by-hop using routing tables
Unreliable, connectionless datagram delivery service:
– packet loss, out-of-order delivery, duplication
IP fragmentation: used on any link with MTU < original datagram
length:
– Duplicates IP header for each fragment and sets flags for re-
assembly
– Re-assembly at the receiving host only, never in the network
RFC 791
Applications use the Domain Name Service (DNS) to convert
hostnames (e.g. “www.lucent.com“) into IP addresses
(135.112.22.95) and vice-versa

* IPv6 uses 128-bit addresses


Advanced Mobile Communication Networks, Master Program 10
Integrated Communication Systems Group

IP Datagram Format
QoS - (reserved)
Number requirements; IP datagram “Real“ frag
- don‘t fragment
of 32-bit rarely used length in bytes ment offset /
- more
IPv4 words and supported (limit = 65536) 8
fragments

Unique 4-bit
4-bit
header 8-bit type of service 16-bit total length (in bytes)
identifier version
length
(counter)
3-bit
16-bit identification 13-bit fragment offset
flags

Limit on the 8-bit time to live 8-bit protocol 16-bit IP header checksum 20 bytes
number of
routers
(countdown) 32-bit source IP address

32-bit destination IP address


Higher layer
identifier, options (if any)
e.g.:
ICMP=1
TCP=6
data
UDP=17 16-bit one‘s complement sum
of the IP header only

checksum error =>


discard datagram & try to
send ICMP message
Advanced Mobile Communication Networks, Master Program 11
Integrated Communication Systems Group

ICMP: Internet Control Message Protocol

ICMP packet consists of IP header + ICMP message


Used for queries and to communicate error messages back to the
sender, e.g.:
– “Bad IP header“
– “echo request“ (or reply)
– “host unreachable“
– Mobile IP messages
Messages are used by higher layers, e.g.:
– ping, traceroute, TCP, ... HTTP
RFC 792

Advanced Mobile Communication Networks, Master Program 12


Integrated Communication Systems Group

TCP/IP Basics: Transport Layer

User User User User


Process Process Process Application Layer
Process

TCP UDP Transport Layer

ICMP ...IP Network Layer

Hardware
ARP ...
Interface Link Layer

Advanced Mobile Communication Networks, Master Program 13


Integrated Communication Systems Group

UDP vs. TCP

UDP: User Datagram Protocol (RFC 768)


– Simple, unreliable, datagram-oriented transport of application data
blocks
TCP: Transmission Control Protocol (RFC 793 + others)
– Connection-oriented, reliable byte stream service
– Details: see section on TCP
Port numbers are used for application multiplexing:
– Unique address = IP address + port number = “socket“
– Concept of well-known ports, e.g. TCP port 21 for FTP (RFC 1340)

Popular API for TCP and UDP connections: Socket API


– “Stream sockets“ use TCP
– “Datagram sockets“ use UDP

Advanced Mobile Communication Networks, Master Program 14


Integrated Communication Systems Group

UDP Datagram Format

Used
Usedforfor
application
application
multiplexing

16-bit source port number 16-bit destination port number


8 bytes
UDP datagram 16-bit UDP length 16-bit UDP checksum
length in bytes
(redundant)

data (if any)

Optional 16-bit one‘s complement sum


of UDP pseudo-header (12 bytes of the
IP header) + UDP header + data
(padded to 16-bit multiple)

checksum error =>


discard datagram silently

Advanced Mobile Communication Networks, Master Program 15


Integrated Communication Systems Group

TCP/IP Basics: Selected Applications

User User User User Application


Process Process Process Process
Layer

TCP UDP Transport Layer

ICMP ...IP Network Layer

Hardware
ARP
Interface ... Link Layer

Advanced Mobile Communication Networks, Master Program 16


Integrated Communication Systems Group

FTP: File Transfer Protocol

File transfer based on TCP


TCP control connection:
– To well-known server port 21
– ASCII commands
TCP data connection
QoS requirements:
– High throughput (optimise TCP bulk data flow)
RFC 959

Advanced Mobile Communication Networks, Master Program 17


Integrated Communication Systems Group

Telnet and Rlogin

Used for remote login based on TCP


– Rlogin (RFC 1282):
• Simple protocol designed for UNIX hosts
– Telnet (RFC 854):
• Any OS
• Option negotiation
• More flexible and better performance
Client operation principle:
– Send each keystroke to the server
– Option: TCP’s Nagle algorithm groups multiple bytes into one
segment
– Display every response from the server
QoS requirements:
– Low-RTT transport of small packets (optimise TCP interactive data
flow)
• RTT = round-trip-time (sender – receiver – sender)
Advanced Mobile Communication Networks, Master Program 18
Integrated Communication Systems Group

HTTP: Hypertext Transfer Protocol

Transfer of webpages based on TCP:


– Webpage typically consists of an HTML (Hyper Text Markup
Language) document + various embedded objects, e.g. pictures

HTTP/1.0:
– Objects are (requested and received) serially
– For each object, a new TCP connection is established, used and
released
– Multiple connections: several TCP connections can be used in
parallel

Advanced Mobile Communication Networks, Master Program 19


Integrated Communication Systems Group

HTTP: Hypertext Transfer Protocol

HTTP/1.1 (RFC 2068): performance improvements by


– Persistent Connections:
• TCP connections are not released after each object, but used for
the next one
– avoids TCP connection establishment and termination
– avoids slow start for each new connection
– Pipelining:
• Multiple objects can be requested in one packet
• Requested objects are sent sequentially over one TCP
connection

HTTP/2 (RFC 7540): decreased latency due to


– Parallel loading of page elements over single TCP connection
– header compression
– Server initiated data transmission (push technology)

Advanced Mobile Communication Networks, Master Program 20


Integrated Communication Systems Group

RTP: Real-time Transport Protocol

Transfer of real-time data based on UDP


RTP:
– for media with real-time characteristics (audio/video)
– services: payload type specification, sequence numbering, timestamping,
source identification & synchronization, delivery monitoring
– no guaranteed quality of service (QoS)

RTCP (Real-time Transport Control Protocol):


– QoS monitoring & periodic feedback:
• Sender report (synchronisation, expected rates, distance)
• Receiver report (loss ratios, jitter)
Network independent: on top of unreliable, low-delay transport
service
RFC 1889
ITU-T H.225.0 Annex A => H.323 => e.g. MS Netmeeting, VoIP
Advanced Mobile Communication Networks, Master Program 21
Integrated Communication Systems Group

Summary: Internet Protocol Suite

The TCP/IP protocol suite is a heterogenous


family of protocols for the global Internet
At the center and always used: IP
– Routing between hosts
Application data transport by
– UDP: unreliable datagram service
– TCP: reliable byte-stream service
TCP/IP stack is part of each operating system:
– Numerous different implementations and bugs exist
TCP performance is extremely important!
– TCP carries 62% of the flows, 85% of the packets,
and 96% of the bytes of Internet traffic
(http://www.cs.columbia.edu/~hgs/internet/traffic.html)
– TCP’s complex error control mechanisms are designed for wired networks
=> special problems for wireless transport

Advanced Mobile Communication Networks, Master Program 22


Integrated Communication Systems Group

TCP (Transmission Control Protocol)

Properties
Connection-oriented, reliable byte-stream service:
– Reliability by ARQ (Automatic Repeat reQuest):
• TCP receiver sends acknowledgements (acks) back to TCP sender to
confirm delivery of received data
• Cumulative, positive acks for all contiguously received data
• Timeout-based retransmission of segments
– TCP transfers a byte stream:
• Segmentation into TCP segments, based on MTU
• Header contains byte sequence numbers
Congestion avoidance + flow control mechanism

In the following examples:


– Packet sequence numbers (instead of byte sequence numbers)
– ack i acknowledges receipt of packets through packet i (instead of
bytes)
Advanced Mobile Communication Networks, Master Program 23
Integrated Communication Systems Group

TCP is full duplex:


TCP Segment Format Each segment contains an ack for the reverse link
Identifies the A ”pure” ack is a segment with empty data
number of the
first data byte
in this segment 16-bit source port number 16-bit destination port number
within the byte
stream 32-bit sequence number

Ack for the 32-bit acknowledgment number 20 bytes


reverse link:
next sequence 4-bit
6 bits
number that is header 6-bit flags 16-bit window size
reserved
expected to be length
received 16-bit TCP checksum 16-bit urgent pointer

options (if any) Advertised


Number of 32- window
bit words size:
number of
data (if any) bytes the
16-bit one‘s complement sum of
receiver is
TCP pseudo-header (12 bytes of
willing to
the IP header) + TCP header + data
accept
(padded to 16-bit multiple)
URG: Urgent Pointer field significant - urgent data are outstanding
checksum error ACK: Acknowledgment field significant
=> discard datagram silently! PSH: Push Function - push to indicate prompt transmission of
data
=> using an erroneous header is
dangerous; loss will be detected RST: Reset the connection
by other mechanismsUrgent SYN: Synchronize sequence numbers
Pointer (2 Byte): FIN: No more data from sender
Advanced Mobile Communication Networks, Master Program 24
Integrated Communication Systems Group

TCP Connection Establishment and Termination


Active open: Client Server

Segment 1: Three-way handshake Passive open:


SYN + ISN* +
Segment 2:
options, e.g. MSS
SYN, ACK + ISN +
options, e.g. MSS
Segment 3: ACK

*ISN: initial sequence number


(RFC 793)
Passive close:
Active close:
=> Send EOF to
Application close application
=> Segment 1: FIN
Half-close #1 Segment 2: ACK;
application can still send
data

Half-close #2 Application close =>


Segment 4: ACK
Segment 3: FIN

=> Connection establishment & termination take at least 1 RTT


Advanced Mobile Communication Networks, Master Program 25
Integrated Communication Systems Group

MTU and MSS: Maximum Segment Size


Client Server
Application
Request to connect to Server

find SYN, MSS=536


TCP Connection
network
establishment
interface SYN, ACK, MSS=1460

MSS = 536 TCP MSS = 1460

- Fixed TCP header = 20 - Fixed TCP header = 20

- Fixed IP header = 20 IP - Fixed IP header = 20

MTU = 576 (e.g. modem) MTU = 1500 (e.g. ethernet)


Link Layer

MSS is optionally announced (not negotiated) by each host at TCP connection


establishment. The smaller value is used by both ends, i.e. 536 in the above example.
Note that “real“ TCP payload is smaller if TCP options are used.
Advanced Mobile Communication Networks, Master Program 26
Integrated Communication Systems Group

Cumulative Acknowledgements

A new cumulative ack is generated only on receipt of a new in-


sequence segment

TCP TCP
sender 40 39 Router 38 37 receiver

received:
...
33 34 35 36 35
timestep 36

41 40 39 38
received:
...
35
34 35 36 37 36
37

i data i ack

Advanced Mobile Communication Networks, Master Program 27


Integrated Communication Systems Group

Delayed Acknowledgements

Delaying acks reduces ack traffic


An ack is delayed until
– another segment is received, or
New ack not produced
– delayed ack timer expires (200 ms typical) on receipt of segment 36,
but on receipt of 37

40 39 38 37
received:
...
35
33 35 36

41 40 39 38
received:
...
35
35 37 36
37

Advanced Mobile Communication Networks, Master Program 28


Integrated Communication Systems Group

Duplicate Acknowledgements 1

A dupack is generated whenever an out-of-order segment arrives at


the receiver (packet 37 gets lost)
packet loss

40 39 38 37
received:
...
36
34 36
2 timesteps

42 41 40 39 received:
...
36
36 36 x
38
dupack
on receipt of 38

Advanced Mobile Communication Networks, Master Program 29


Integrated Communication Systems Group

Duplicate Acknowledgements 2

Dupacks are not delayed


Dupacks may be generated when
– a segment is lost (see previous slide), or
– a segment is delivered out-of-order:
40 39 37 38
received:
...
36
34 36
1 timestep

41 40 39 37 received:
...
36
x
36 36 38
dupack
on receipt of 38

Advanced Mobile Communication Networks, Master Program 30


Integrated Communication Systems Group

Duplicate Acknowledgements 3
40 37 39 38
received:
...
Number of
34 36 36 dupacks
depends on
41 40 37 39 how much
received:
... out-of-order
34 36 36 36 a packet is
x
38
dupack

42 41 40 37 received: A series of
...
36 36 36 36 dupacks
x
38
allows the
dupack dupack 39 sender to
43 42 41 40
guess that a
received:
... single
36 36 36 39 36
37
packet has
dupack dupack new ack
38 been lost
39
Advanced Mobile Communication Networks, Master Program 31
Integrated Communication Systems Group

Window Based Flow Control 1

Sliding window protocol


Sender’s window

1 2 3 4 5 6 7 8 9 10 11 12 13

Acks received Not transmitted

Window size W is minimum of


– receiver’s advertised window - determined by available buffer
space at the receiver and signaled with each ack
– congestion window - determined by the sender, based on received
acks
TCP’s window based flow control is “self-clocking”:
– New segments are sent when outstanding segments are ack’d

Advanced Mobile Communication Networks, Master Program 32


Integrated Communication Systems Group

Window Based Flow Control 2


packet
dimensions:
Optimum window size: rate size
– W = data rate * RTT = “bandwidth-delay product” transmit
(optimum use of link capacity: “pipe is full”) time

TCP
TCP
40 39
38 37
Router receiver
sender

35 36
33 34
W = 8 segments (33...40)

What if window size is too large?


 Queuing at intermediate routers (e.g. at wireless access point)
=> increased RTT due to queuing delays
=> potential of packet loss
What if window size is too small?
 Inefficiency: unused link capacity
Advanced Mobile Communication Networks, Master Program 33
Integrated Communication Systems Group

Packet Loss Detection Based on Timeout

TCP sender starts a timer for a segment (only one segment at a time)
If ack for the timed segment is not received before timer expires,
outstanding data are assumed to be lost and retransmitted
=> go-back-N ARQ
Retransmission timeout (RTO) is calculated dynamically based on
measured RTT:
– RTO = mean RTT + 4 * mean deviation of RTT
Mean deviation δ = average of |sample – mean| is easier to calculate than

standard deviation (and larger, i.e. more conservative)
– Large variations in the RTT increase the deviation, leading to larger RTO
– RTT is measured as a discrete variable, in multiples of a “tick”:
• 1 tick = 500 ms in many implementations
• smaller tick sizes in more recent implementations
– RTO is at least 2 clock ticks

Advanced Mobile Communication Networks, Master Program 34


Integrated Communication Systems Group

Exponential Backoff

Double RTO on successive timeouts:

T1=RTO T2 = 2 * T1

Timeout interval doubled


Segment
transmitted
Timeout occurs
before ack received,
segment retransmitted

Total time until TCP gives up is up to 9 min


Rationale: allow an intermediate, congested router to recover
Problem: if ack is lost, TCP (sender) just waits for the next timeout

Advanced Mobile Communication Networks, Master Program 35


Integrated Communication Systems Group

Packet Loss Detection Based on Dupacks:


Fast Retransmit Mechanism
TCP sender considers timeout as a strong indication that there is a
severe link problem
On the other hand, continuous reception of dupacks indicates that
following segments are delivered, and the link is ok
=> TCP sender assumes that a (single) packet loss has occurred if it
receives three dupacks consecutively
=> Only the (single) missing segment is retransmitted
=> selective-repeat ARQ

Note: 3 dupacks are also generated if a segment is delivered at least


3 places out-of-order
=> Fast retransmit useful only if lower layers deliver packets
“almost ordered” - otherwise, unnecessary fast retransmit

Advanced Mobile Communication Networks, Master Program 36


Integrated Communication Systems Group

Flow Control by the Sender

Slow Start
Initially, congestion window size (cwnd) = 1 MSS
Increment cwnd by 1 MSS on each new ack
Slow start phase ends when cwnd reaches ssthresh (slow-start
threshold)
=> cwnd grows exponentially with time during slow start (in theory)
– Factor of 1.5 per RTT if every other segment is ack’d
– Factor of 2 per RTT if every segment is ack’d
– In practice: increase is slower because of network delays (see next slide)

Congestion Avoidance
On each new ack, increase cwnd by 1/cwnd segments
=> cwnd grows linearly with time during congestion avoidance (in
theory)
– 1/2 MSS per RTT if every other segment ack’d
– 1 MSS per RTT if every segment ack’d
Advanced Mobile Communication Networks, Master Program 37
Integrated Communication Systems Group

Slow Start & Congestion Avoidance – Theory


Receiver’s
14 Congestion
advertised
window = 12
12 Avoidance
cwnd (segments)

10
8 ssthresh

6 Slow Start

4
2
0
0 1 2 3 4 5 6 7 8 9
Time / RTT
• Theoretical assumption: after sending n segments, n acks arrive
within one RTT
• Note that Slow Start starts slowly, but speeds up quickly
Advanced Mobile Communication Networks, Master Program 38
Integrated Communication Systems Group

Slow Start – Reality (Including Network Delay)

• Taking network delay into account, “cwnd increases exponentially” turns into:
– cwnd increases sub-exponentially
– pairs of segments are sent while pipe fills
sending rate > data rate (cwnd > 2)
• Simple example:
(timestep 4 onwards)
– one-way delay = 1 timestep => at some point in time there will
– data rate = 1 segment/timestep be a packet loss, causing TCP
to slow down

#segments
Time- #segments #segments recv'd and
step Sender action cwnd sent outstanding ack'd Receiver action
0 initial values 1 0
send segment 1 1 1
1 1 receive and ack segment 1

2 receive ack 1 2 0
send segments 2 and 3 2 2
3 1 receive and ack segment 2

4 receive ack 2 3 1 1 receive and ack segment 3


send segments 4 and 5 2 3
5 receive ack 3 4 2 1 receive and ack segment 4
send segments 6 and 7 2 4
6 receive ack 4 5 3 1 receive and ack segment 5
send segments 8 and 9 2 5
Advanced Mobile Communication Networks, Master Program 39
Integrated Communication Systems Group

Congestion Control after Packet Loss

Packet loss detected by timeout (=> severe link problem):


Retransmit lost segments
Go back to Slow Start:
– Reduce cwnd to initial value of 1 MSS
– Set ssthresh to half of window size before packet loss:
• ssthresh = max((min(cwnd, receiver’s advertised window)/2), 2 MSS)

Packet loss detected by ≥3 dupacks (=> single packet loss, but link is ok):
Fast Retransmit single missing segment
Initiate Fast Recovery:
– Set ssthresh and cwnd to half of window size before packet loss:
• ssthresh = max((min(cwnd, receiver’s advertised window)/2), 2 MSS)
• cwnd = ssthresh + number of dupacks
– When a new ack arrives: continue with Congestion Avoidance:
• cwnd = ssthresh

Advanced Mobile Communication Networks, Master Program 40


Integrated Communication Systems Group

Packet Loss Detected by Timeout

25 Timeout
cwnd = 20
cwnd (segments)

20

15
ssthresh = 10
10 ssthresh = 8

5
cwnd = 1
0
12

15

20

22

25
0

Time / RTT
Advanced Mobile Communication Networks, Master Program 41
Integrated Communication Systems Group

Packet Loss Detected by ≥3 Dupacks

≥3 Dupacks

10
cwnd = 8
cwnd (segments)

8
6
ssthresh = 4
4
cwnd = 4
2 After Fast Recovery

0
0 2 4 6 10 12 14
Time / RTT
• After fast retransmit and fast recovery window size is reduced in half
• Multiple packet losses within one RTT can result in timeout
Advanced Mobile Communication Networks, Master Program 42
Integrated Communication Systems Group

Influence of wireless transmission on TCP

• TCP assumes congestion if packets are dropped


– typically wrong in wireless networks, here we often have packet loss
due to transmission errors
– furthermore, mobility itself can cause packet loss, if e.g. a mobile
node roams from one access point (e.g. foreign agent in Mobile IP) to
another while there are still packets in transit to the wrong access
point and forwarding is not possible

• The performance of an unchanged TCP degrades severely


– however, TCP cannot be changed fundamentally due to the large
base of installations in the fixed network, TCP for mobility has to
remain compatible
– TCP on server does not know whether peers are mobile or not
– the basic TCP mechanisms keep the whole Internet together

Advanced Mobile Communication Networks, Master Program 43


Integrated Communication Systems Group

Indirect TCP – Principle

• Indirect TCP (I-TCP) segments the connection


– no changes to the TCP protocol for hosts connected to the wired
Internet, millions of computers use (variants of) this protocol
– optimized TCP protocol for mobile hosts
– splitting of the TCP connection at, e.g., the foreign agent into 2 TCP
connections, no real end-to-end connection any longer
– hosts in the fixed part of the net do not notice the characteristics of
the wireless part

mobile host
access point
(foreign agent) „wired“ Internet

„wireless“ TCP standard TCP

Advanced Mobile Communication Networks, Master Program 44


Integrated Communication Systems Group

Indirect TCP – Socket and state migration due to handover

access point1

socket migration
and state transfer Internet

access point2
mobile host

A handover between access points requires the migration of the TCP sockets
and the TCP state (buffers, etc.)!

Advanced Mobile Communication Networks, Master Program 45


Integrated Communication Systems Group

Indirect TCP – Discussion

• Advantages
– no changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work
– transmission errors on the wireless link do not propagate into the fixed
network
– simple to control, mobile TCP is used only for one hop between, e.g., a
foreign agent and mobile host
– therefore, a very fast retransmission of packets is possible, the short
delay on the mobile hop is known
• Disadvantages
– loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, e.g.
wireless link may drop or foreign agent might crash
– higher latency possible due to buffering of data within the foreign agent
and forwarding to a new foreign agent
– access point needs to be involved in security mechanisms (e.g. IPsec)

Advanced Mobile Communication Networks, Master Program 46


Integrated Communication Systems Group

Snooping TCP – Principle

• „Transparent“ extension of TCP within the foreign agent


– buffering of packets sent to the mobile host
– lost packets on the wireless link (both directions!) will be retransmitted
immediately by the mobile host or foreign agent, respectively (so
called “local” retransmission)
– the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
– changes of TCP only within the foreign agent

local retransmission correspondent


foreign host
agent
„wired“ Internet

snooping of ACKs buffering of data


mobile
host
end-to-end TCP connection

Advanced Mobile Communication Networks, Master Program 47


Integrated Communication Systems Group

Snooping TCP
• Data transfer to the mobile host (downlink)
– FA buffers data until it receives ACK from the MH
– FA detects packet loss on wireless link via timeouts (smaller timeout
value than on CN) or DUPACKs from CN (which are discarded)
– FA employs fast retransmission, transparent for the fixed network
• Data transfer from the mobile host (uplink)
– FA detects packet loss on the wireless link via sequence numbers, FA
answers directly with a NACK to the MH
– MH can now retransmit data with only a very short delay
• Integration of the link layer
– link layer often has similar mechanisms to those of TCP

• Problems
– snooping TCP does not isolate the wireless link as good as I-TCP
– snooping might be useless depending on encryption schemes, e.g.
does not work with IPsec due to encryption of IP payload (including
TCP segment number)
Advanced Mobile Communication Networks, Master Program 48
Integrated Communication Systems Group

Mobile TCP
• Special handling of lengthy and/or frequent disconnections
• M-TCP splits control as I-TCP does
– unmodified TCP fixed network to supervisory host (SH)
– optimized TCP between SH and MH (no slow start)
• Supervisory host (SH)
– no caching, no retransmission (different from Indirect-TCP)
– monitors all packets, if disconnection detected
• set sender window size to 0
• sender automatically goes into persistent mode
– old or new SH reopens the window (set to old size)
• Advantages
– maintains semantics, supports disconnection, no buffer forwarding
• Disadvantages
– loss on wireless link propagated into fixed network (no buffering)
– adapted TCP on wireless link
Advanced Mobile Communication Networks, Master Program 49
Integrated Communication Systems Group

Transmission/timeout freezing
• Mobile hosts can be disconnected for a longer time
– no packet exchange possible, e.g.,
 discontinued communication in a tunnel
 disconnection due to overloaded cells
 preemption by higher priority traffic (scheduling)
– TCP disconnects after time-out completely
• TCP freezing
– PHY/MAC layer is often able to detect interruption in advance
– PHY/MAC can inform TCP layer of upcoming loss of connection
– TCP stops sending, but does now not assume a congested link
– PHY/MAC layer signals again if reconnected
• Advantage: scheme is independent of data
• Disadvantage:
– TCP on mobile host has to be changed
– mechanism depends on lower layers

Advanced Mobile Communication Networks, Master Program 50


Integrated Communication Systems Group

Forced fast retransmit/fast recovery


• Change of foreign agent often results in packet loss
– TCP reacts with slow-start although there is no congestion
• Forced fast retransmit
– as soon as the mobile host has registered with a new foreign agent
(Mobile IP), the MH sends DUPACKs on purpose
– this forces the fast retransmit mode at the communication partners
(instead of slow start)
– additionally, the TCP on the MH is forced to continue sending with the
actual window size and not to go into slow-start after registration
• Advantage
– simple changes result in significant higher performance
• Disadvantage
– focus on problems due to (fast) handover, not on temporarily poor
wireless link quality
– mix of Mobile IP and TCP, no transparent approach

Advanced Mobile Communication Networks, Master Program 51


Integrated Communication Systems Group

Selective retransmission
• TCP acknowledgements are often cumulative
– ACK n acknowledges correct and in-sequence receipt of packets up
to n
– if single packets are missing quite often a whole packet sequence
beginning at the gap has to be retransmitted (go-back-n), thus
wasting bandwidth
• Selective retransmission as one solution
– RFC2018 allows for acknowledgements of single packets, not only
acknowledgements of in-sequence packet streams without gaps
– sender can now retransmit only the missing packets
– mechanism is supported by newer TCP implementations
• Advantage
– much higher efficiency
• Disadvantage
– more complex software in a receiver, more buffers needed at the
receiver
Advanced Mobile Communication Networks, Master Program 52
Integrated Communication Systems Group

Comparison of different approaches for a “mobile” TCP

Advanced Mobile Communication Networks, Master Program 53


Integrated Communication Systems Group

Summary: TCP
TCP provides a connection-oriented,
reliable byte-stream service:
– application data stream is transferred in segments based on
lower layer MTU
– receiver sends back cumulative acknowledgements (acks)
– sliding window mechanism with flow control based on
• receiver’s advertised window,
• sender’s Slow Start (timeout) and Congestion Avoidance
(3 DUPACKs) mechanisms
– Error control & packet loss detection based on
• adaptive retransmission timeout => back to Slow Start,
• duplicate acknowledgments (dupacks) => Fast Retransmit
& Fast Recovery
Pure performance over wireless due to misinterpretation of
DUPACKs and timeouts (loss instead of congestion)

Advanced Mobile Communication Networks, Master Program 54


Integrated Communication Systems Group

References

• Jochen Schiller: Mobile Communications (German and English), Addison-Wesley,


2005 (chapter 9 provides an overview on different approaches)
• Ramjee Prasad, Marina Ruggieri: Technology Trends in Wireless Communications,
Artech House, 2003
• The bible: W. Richard Stevens, “TCP/IP Illustrated, Volume 1: The Protocols“
• Douglas E. Comer: Computernetzwerke und Internets. 3. Auflage, Pearson
Studium, Prentice Hall, 2002
• Standards (RFCs): http://www.ietf.org/
• Selected papers on TCP over wireless:
– Balakrishnan et al, “A comparison of mechanisms for improving TCP
performance over wireless links”, IEEE/ACM Transactions on Networking,
Dec. 1997
– Xylomenos et al, “TCP performance issues over wireless links”, IEEE
Communications Magazine, April 2001
– Balakrishnan et al, “How network asymmetry affects TCP”, IEEE
Communications Magazine, April 2001

Advanced Mobile Communication Networks, Master Program 55


Review and Remaining Issues
of New Generation Network
(NGN)
MAY, 2014
CHUL-SOO KIM
INJE UNIVERSITY
Index
NGN developments in other standardization bodies

NGN deployment

NGN and Economic Issues

NGN Costing Model Issues

ITU-T D.271 Key aspects

Content Delivery Network (CDN) and Charging Issues

ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
Current Internet
Based on OSI model
Encapsulating data to packets
Find a route from source to
destination using routing
functions
Forwarding packets based on
route
application
transport
network
data link
physical
network network
data link data link
network

Network Layer
physical physical
data link
physical network network
data link data link

and Internet physical physical

Protocol
network network
data link data link
physical physical

(TCP/IP)
network
data link
physical
application
network transport
data link network
network
physical data link
network data link
physical
data link physical
physical
KISS and Smart Network
• IP Philosophy
• KISS (Keep It Simple and
Stupid)
Coffee Bean
Deep Packet Inspection
Government Strategy (The 100th Monkey Effect)

The Japanese monkey, had been observed in the wild for


a period of over 30 years.
In 1952, on the island of Koshima, scientists were
providing monkeys with sweet potatoes dropped in the
sand. The monkey liked the taste of the raw sweet
potatoes, but they found the dirt unpleasant.
An 18-month-old female named Imo found she could
solve the problem by washing the potatoes in a nearby
Then something startling took place. In the autumn of 1958,
stream. She taught this trick to her mother. Her
a certain number of Koshima monkeys were washing sweet
playmates also learned this new way and they taught
potatoes -- the exact number is not known.
their mothers too.
This cultural innovation was gradually picked up by
A most surprising thing observed by these scientists was
various monkeys before the eyes of the scientists.
that the habit by a troop of monkeys at Takasakiyama of
Between 1952 and 1958 all the young monkeys learned to
washing their sweet potatoes began.
wash the sandy sweet potatoes to make them more
palatable. Only the adults who imitated their children
learned this social improvement. Other adults kept eating Thus, when a certain critical number achieves an
the dirty sweet potatoes. awareness, this new awareness may be communicated
from mind to mind.
Government Strategy

AT&T: "We have


more bars in
more places."
NGN – Six keys criteria
Packet-
oriented
network

Support
Integration of
broad
existing
infrastructure variety of
services

What is NGN?
NGN
=IP Based ISDN Application Openness
focused- and flexibility
access regarding
independent new services
Separation
into different
layers using
open
interfaces
Comparison between Current-Internet and
NGN
NGN – Main issues
• How to follow quick evolution of technology and services ?
• How to regulate multi-services including simultaneously voice/data/video ?
• How to define new reference networks, architectures and interfaces to new
players?
• How to define and quantify dimensioning and costing units for
interconnection ?
• How to ensure consistency for regulation principles when different network
types coexist in the migration phases ?
• How to consider different network players in the value chain at physical,
equipment and services layers ?
Vigorous activity to standardize NGN

IMS: IP Multimedia Subsystem


SIP: Session Initiation protocol
ITU-T NGN Milestones
2003 2006
2004-2005
JRG-NGN NGN-GSI ..on going..
FG-NGN
Y.2001 Many Recs.
Y. 2011 30 documents collected in
the Proceeding book approved
11 draft Recs
in various SGs

Past
Present / Future
Main SGs addressing NGN

Almost ALL Study Groups include NGN aspects

SG 13 “Lead study group for NGN”


Functional requirements, services and architectures
SG13 – Work Highlights
• Achieve standards to enable interworking between two dominant technologies in
next-generation networks, Ethernet and MPLS.
• Continue studying NGN evolution; standardizing enhancements to NGNs as new
services and applications emerge.
• Focuses on future networks (FNs)
• Focuses on cloud computing, ubiquitous networking, distributed service
networking, ad-hoc networks, network virtualization, software-defined networking,
the Internet of Things, and energy saving networks
NGN Evolution in SG13 (1)
Question 3/13 - Functional architecture for NGN evolution (NGN-
e) including support of IoT and use of software-defined
networking
◦ Study on general reference models of the NGN evolution for support of IPTV and
emerging industry needs.
◦ Preparation of frameworks to identify the basic architectural compositions of the
NGN evolutions such as NICE for support of IPTV.
◦ Study on general reference models of the NGN evolution for support of IoT.
◦ Identification of entities, their functions, and reference points, required to provide
telecommunications services to support IoT.
NGN Evolution in SG13 (2)
• Study on using of SDN technologies on the architecture of NGN and
its evolution.
• Implementation framework related to provision of emergency
telecommunications in Maintenance of existing Recommendations.
• Maintenance and enhancement of the following Recommendations
are included: Table 1, Table 2
SG13 – Table 1
SG13 – Table 2
SG2 related to NGN
• Proposal to add a new clause to Recommendation ITU-T M.1400 with function
codes for Optical Transport Networks
• Proposal to modify Gigabit Ethernet function codes in Recommendation ITU-T
M.1400
• Operational aspects of telecommunication services provision and management
SG9 related to NGN
• Proposed System Requirements for Stereoscopic Three Dimensional Television
Service over Hybrid Fiber and Coaxial based networks.
• Proposed RCAS network protocol security specification.
• Transmission of multichannel analogue and/or digital television signals over optical
access networks.
• Integrated broadband cable networks in the Democratic Republic of the Congo.
• Proposed new text for Draft New Recommendation J.atrans-spec “Advanced digital
downstream transmission systems for television, sound and data services for cable
distribution”.
SG11 related to NGN
• Report of the NGN testing and showcasing during APT/ITU Conformance and Interoperability event and proposal.
• Proposal to start a new work item on ITU-T M.3170 series of Recommendations conformance testing pilot project.
• Proposed Text for New Work Item “MP2P protocols: Peer Activity Management Protocol (PAMP)” for Nov. 2013
meeting.
• Proposed Update of Q.rrp “Request routing protocol for content delivery”.
• Proposal of initiating a new Recommendation on Signaling Architecture and requirement for IP based Short Message
Service.
• Proposal for scenario and requirements on the orchestration function based on the cloud services.
• Proposed signaling scenarios in Q.IPv6UIP
• Proposal for an IMEI Global System for combating the trade in counterfeit mobile devices.
SG12 related to NGN
• Propose to change to Recommendation P.863.
• Add appending 3 “Prediction of acoustically recorded narrowband speech”.
• And appendix IV provides reference speech files for use with Rec. P.863.
SG16 related to NGN
• Continue develop standards gateway protocol in ITU-T H.248 series, especially for
NGN for OpenFlow, Cloud, DTLS etc
• Procedures for the control of de-jitter buffers used in PSTN-IP gateways carrying
voice-band data.
• H.248.Cloud: Gateway control protocol: Cloudification of packet gateway
• H.248.Shaper: “Gateway control protocol: Traffic shaping (guidelines/packages?)”
• H.248.TLS: TLS session negotiation - Modeling data object “TLS profile”.
SG17 related to NGN
• Proposals on Cloud Security Components.
• Proposed revision of Draft X.mgv6 (Security management guideline for implementation of
IPv6 environment in telecommunications organizations).
• Proposal of new work item - Guidelines for Personal Information Protection in Cloud
Computing.
• Proposal for a new work item on guidelines for using object identifiers (OID) for the Internet of
Things.
• Security implication on Software-Defined Networking (SDN).
• Proposal for modifications of X.sgsec-1 : Security functional architecture for smart grid services
using the telecommunication network.
• Basic principles to study new security issues (e.g. security for ITS and SDN).
Development of NGN in ETSI
TISPAN is the ETSI body that specifies:
◦ Standards for Fixed networks and internet convergence
◦ Developed the Convergence work Item (FMC)
◦ Specifies the Next Generation of Networks: IP Multimedia
Subsystem (IMS) that provides an access independent platform for a
variety of access technologies (GSM, 3G, 4G, wifi, Cable, fiber and
xDSL).
TISPAN – NGN Release
• NGN-Release 1: Dec 2005, defines the overall architecture including IMS re-use and
other subsystems. (completion)
• NGN-Release 2: Apr 2008, builds upon Rel-1, adding in initial applications like home
gateway, IPTV, corporate networks
• NGN-Release 3: working from 2009, some release related to IPTV service solution,
VoIP consolidation, Home Network interconnection, IP Network to Network
interconnection
• Several new areas including: Migration scenarios from CS to PS networks, Ultra
broadcast access
Development of NGN in ATIS
Focus to develop services includes:
◦ Advances High-Quality Video communication at the Cloud level
◦ Voice over IP(VoIP)
◦ Mobile Wireless Services (MWS)
◦ Network Security
◦ Data Interchange & Billing (DI)
◦ Wide Area Ethernet (WAE)
Development of NGN in 3GPP
Focus to develop services includes:
◦ LTE Advanced
◦ Multimedia Broadcast Multicast Service (Radio higher layer and NW interface
specs)
◦ HeNB Mobility between HeNB and macro
◦ Location Services
◦ Heterogeneous network and eICIC(enhanced Inter-Cell Interference Coordination)
◦ Coordinated Multi-Point transmission and reception (CoMP)
NGN in other groups
NGN Management Focus Group (NGNMFG)
◦ Develop set of interoperable specifications as solution for the management of NGN
services and networks.
◦ Develop NGN Management Specification Roadmap for Release 1

Open Communications Architecture Forum (OCAF)


◦ Set of components for a new carrier grade open platforms that will accelerate
deployment of NGN infrastructure and services
Index
NGN developments in other standardization bodies

NGN deployment

NGN and Economic Issues

NGN Costing Model Issues

ITU-T D.271 Key aspects

Content Delivery Network (CDN) and Charging Issues

ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
NGN Deployment – Case studies
• Communication in Enterprise
• IPTV deployment in NGN
• IMS-based multi-network convergence solution
• Fixed mobile convergence – FMC
• Communication between Corporate Telecommunication Network (CN) via NGN
Communication in Enterprise
• Apply in enterprise
communication to
improve collaboration
between regional
areas employers
• Using voice, video and
web conferencing
riding on a high-
performance
converged network

Source: http://huawei.com
IPTV deployment in NGN
• The IPTV system has
to integrate with
Softswitch systems
and intelligent
network (IN) platforms
to realize the video
communications as
well as other
communication
services via TV.
The NGN architecture for IPTV service

Source: http://wwwen.zte.com.cn
IMS-Based Multi-network Convergence
Solution
• IMS is basically a
signaling network
based on SIP and
Diameter.
• Designed to provide
robust multimedia
services across
roaming boundaries
and over diverse
access technologies
IMS deployment in China

Source: http://wwwen.zte.com.cn
Fixed mobile convergence - FMC
• FMC service enables
service providers to offer
subscribers seamless
access to enterprise
communications
services via any
subscriber-selected
phone device, whether a
mobile handset, IP
phone, softphone or
traditional PSTN handset
Fixed Mobile Convergence

PLMN: Public land mobile network Source: http://redlinx.co.za


NGN - Fast and ultrafast Internet access (1)
Fast and ultrafast Internet access (2)
NGN - Speed compare – Telecom Operators
NGN in Europe
• 3.9 M of fiber access subscribers
(8.1 M if Russia is included)
• Baltic countries (Lithuania, Sweden,
Norway, Slovenia, Slovakia) are
leading the fiber deployment
• Portugal is moving fast in fiber roll
out leaving the Netherlands, Finland
or France behind
• Some countries with long
incumbent tradition does not
appear or are in the lower part
(Germany, France, Spain, Italy,
Portugal, UK)
NGN - LTE Global rollout
Fixed-line vs Mobile – Average revenue per user

Source: Global Information Technology report - 2012


Global broadband subscriptions
Telecom related status in Korea (1)
Fixed and mobile phone subscriber in Korea

New subscriber
2014.3 2011.12 Portion
Variation Ratio
Fixed 17,427,181 -1,205,320 -6.5% 18,632,501 24.0%
Feature phone 16,841,730 -13,086,655 -43.7% 29,928,385 23.2%
Mobile
Smartphone 38,320,657 15,742,249 41.1% 22,578,408 52.8%
Total 72,589,568 71,139,294 100%
Telecom related status in Korea (2)
Fixed phone in Telecom Operators
New subscriber
2014.3 2011.12 Portion
Variation Ratio
KT 14,156,694 -1,543,008 -9.3% 15,699,702 81.2%
SK Broadband 2,758,849 280,121 10.2% 2,478,728 15.8%
LGU+ 511,638 57,567 11.3% 454,071 3.0%
Total 17,427,181 -1,205,320 -9.3% 18,632,501 100%
Smartphone in Telecom Operators
New subscriber
2014.3 2011.12 Portion
Variation Ratio
SKT 26,075,598 1,787,500 6.9% 24,288,098 50.9%
KT 15,176,023 -1,113,723 -7.3% 16,289,746 29.6%
LGU+ 10,014,249 1,294,557 12.9% 8,719,692 19.5%
Total 51,265,870 1,968,334 3.8% 49,297,536 100.0%
Rate
2014.3 2011.12
Inc/Dec %
xDSL 1,396,672 -597,123 -42.8% 1,993,795
LAN 2,824,829 105,459 3.7% 2,719,370
KT HFC 0 0.0% 0
FTTH 3,815,025 705,865 18.5% 3,109,160
Satellite 373 -146 -39.1% 519
xDSL 197,541 -74,952 -37.9% 272,493

Telecom
LAN 1,016,831 -141,396 -13.9% 1,158,227
SK Broadband HFC 884,988 -333,735 -37.7% 1,218,723
FTTH 713,984 69,903 9.8% 644,081

related Satellite
xDSL 149,547
0
69,717
0.0%
46.6%
0
79,830

status in
LAN 785,086 419,592 53.4% 365,494
SKT (Resale) HFC 410,901 143,192 34.8% 267,709

Korea (3)
FTTH 473,315 287,980 60.8% 185,335
Satellite 0 0.0% 0
xDSL 0 0.0% 0
LAN 1,757,918 103,354 5.9% 1,654,564
LG U+ HFC 939,203 -110,512 -11.8% 1,049,715
FTTH 265,845 160,434 60.3% 105,411
Satellite 0 0.0% 0
xDSL 28,515 -49,003 -171.8% 77,518
LAN 614,974 263,932 42.9% 351,042
Cable HFC 2,450,790 21,936 0.9% 2,428,854
FTTH 0 0.0% 0
Satellite 0 0.0% 0
xDSL 1,734 -2,947 -170.0% 4,681
LAN 54,131 -51,704 -95.5% 105,835
Others HFC 38,711 -26,998 -69.7% 65,709
FTTH 4,754 3,297 69.4% 1,457
Satellite 0 0.0% 0
Index
NGN developments in other standardization bodies

NGN deployment

NGN and Economic Issues

NGN Costing Model Issues

ITU-T D.271 Key aspects

Content Delivery Network (CDN) and Charging Issues

ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
NGN based services and economic benefits
NGN technology is deployed by
network operators because it is
cheaper to buy and can be
cheaper to operate.
The development of NGN services
has wider impacts on the overall
national economy because
broadband Internet access is an
enabler for so many other
business.
Economic parties of NGN migration issues
Policy makers:
◦ Set framework for developing NGN in their National Broadband Plan.
◦ Must consider how NGNs are used and impact to other sector: education, e-government, environment, healthcare, etc.
Regulator authorities:
◦ Set the practical framework for developing NGNs to meet the policy agenda.
◦ Ensure positive outcomes to encourage efficient competition, ensure interworking of systems and prices are set fairly.
Investors:
◦ NGNs require investment.
◦ A government views for making a return on this investment is different with a private investor on the time required for re-payment and
the acceptable risks and rewards.
The operators and service providers:
◦ Implement and manage the networks and services
◦ Make a profit in order to pay the investors and to continue business and expand
Consumer:
◦ Want the best quality at the lowest possible price.
Economic aspects of NGN migration issues
Funding the investment
◦ Building fibre to the premises is expensive.
◦ Wireless requires for the cost rises with the speed of access service and the number of customers
◦ Core network and service platforms
Technical
◦ Change from legacy technology to NGN needs for skills and training
Cost performance factors
Competition and regulation
◦ Encourage investment, innovation and so provide the best outcomes for citizens through competitive supply.
Demographics
◦ Speed performance of fibre is far better than copper, but is this enough to overcome its high investment costs
or to counter the benefits of wireless mobility?
Index
NGN developments in other standardization bodies

NGN deployment

NGN and Economic Issues

NGN Costing Model Issues

ITU-T D.271 Key aspects

Content Delivery Network (CDN) and Charging Issues

ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
Traditional cost modelling
Separation of access and core networks
◦ Volume-based traffic costs and fixed access charges

Scorched node models


◦ A fixed network architecture with modern equivalent assets

Core network cost allocation via service routing tables


◦ Routing tables define network element usage by service
◦ Cost volume relationships determined for each network element

Separation of fixed common and joint costs


NGN cost modelling - Challenges
Demand
◦ Level and patterns uncertain for both new and innovation services and services in decline.
Busy hour
◦ Unknown and changing for data, video, and interactive services
◦ Delivery of QoS
◦ Issues associated with net neutrality
Change policies for key functions – interconnect might more like the internet
interconnection between peers.
Routing tables are determined but likely simple
Network topology – Capacity of equipment and equipment relationships
Asset costs and economic lives – Emerging and changing
NGN Cost Modelling – Mobile services

LRIC: Long run incremental cost


NGN Cost Modelling – Fixed services

LRIC: Long run incremental cost


Index
NGN developments in other standardization bodies

NGN deployment

NGN and Economic Issues

NGN Costing Model Issues

ITU-T D.271 Key aspects

Content Delivery Network (CDN) and Charging Issues

ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
ITU-T D.271 - Charging and Accounting Principles for
NGN

The general principles and conditions applicable by


administrations for the capability to transport IP packets
over IP-based networks between standards-based
interfaces and the services that they support.
Concepts for Charging Network utilization
Charge elements:

Session set-up
Session set-up Reservation-based
attempt charge
charge element charge element
element

Usage-based charge SLA-based charge


element element
Charging periods
• An administration may choose to apply different charges to different periods

• The reservation-based charge element relates to the duration of a session. The value of the reservation
charge parameter CP_R(.) may differ between charging periods.

• The reservation-based charge element to differ for different charging periods, the duration of the session
within each charging period must be known.
• This information can be derived by comparing the start date and time and the end date and time of the session to the charging periods.

• The usage-based element relates to the packets admitted into the network and packets delivered by the
network. The value of the usage charge parameter(s) CP_U(.) may differ between charging periods.

• In order to allow the usage-based charge element to differ for different charging periods, ITU-T Rec.
D.271 (04/2008) 5 the number of packets within each charging period must be known.
Recording interval
CDRs shall be generated immediately on
the following occasions:
• at session establishment (indication 0);
• at session release (indication 6);
• during the session's active phase;
• when any of the traffic contract parameters are
modified (if relevant signalling is supported);
• at the end of each recording interval (see
indications 2, 3, 4, 5).
Charging end-customers
The charges for services delivered to end-customers normally consist of the following
components:

Network access Network utilization


component component charges cover
is intended to cover the cost the costs related to the
for providing the access to utilization of the network
the service for the customer. resources.
Accounting between administrations
Network access component
• In the case of interconnection, accounting charges are an
administration-specific matter.
• Factors that determine the interconnect access charges may be
similar to the factors in customer access charges.
• They are subject to agreement between the administrations involved.
Network utilization component
Assumptions: Two assumptions underlie the description of accounting in this clause.
Figures 2 and 3 are used in the description of the assumptions.
Aggregation within charge elements for accounting
• To reduce the number of parameters stored and used for accounting between
administrations, parameters of several sessions may be aggregated and summarized into a
smaller set of parameters to which a charge is applied.
• Aggregation takes place over an agreed aggregation period, for example, one month.
• The aggregation of session parameters is described in the following sub clauses for the three
charge elements that build the charging options for NGN services:

Aggregation for Aggregation for Aggregation for


session set-up charge reservation-based usage-based charging
element charging element element
Accounting parameters resulting from
aggregation for network utilization
The aggregated parameters collected for accounting at an interface pertain to:

For the session set-up


charging element, the
aggregated parameter is
Reservation- Usage-
Session set- the number of session set-
based based ups at that interface, in a
up charge given direction.
charge charge Different charging periods
element
element element (time of day) can be
applied to the session set-
up charging element.
Accounting parameters resulting from QoS interworking
Charging parameters
• Charging parameters for DiffServ
• Charging parameters for IntServ
• Charging parameters for SIP-initiated Services
• Charging parameters for FSA Signaling
• Charging parameters for NSIS
• H.323 protocol
• Content Delivery Network (CDN)
• RMD DiffServ
• Software Defined Networking (SDN)
Index
NGN developments in other standardization bodies

NGN deployment

NGN and Economic Issues

NGN Costing Model Issues

ITU-T D.271 Key aspects

Content Delivery Network (CDN) and Charging Issues

ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
What is CDN?
CDN is a system of computers (computing devices) networked together
(across the Internet) that cooperate to deliver content to end users.
Goals
◦ Load balancing
◦ Fast response
◦ High availability
◦ Handling flash crowd
Benefits to ISPs
◦ Efficient usage of internal network resources
◦ Traffic reduction
End-user
◦ Better enduser experience
◦ Content Provider
◦ Can serve the customer a high quality
Architecture of CDN
Global CDN Market (1)
Global CDN Market (2)
• Leading CDN Providers are as follows
• Akamai (US based)
• Limelight Networks (US based)
• Edgecast, Highwinds
• ChinaCache, CDNetworks in Asia

• The CDN market represented around


$2 billion worldwide in 2009
• It should reach $4 billion by 2012
Source: BT Wholesale, 2010
Who use CDN solution?
CDN – Cost of saving
Multiple thousands of request can be served by
sending your content to the CDN platform ONLY ONCE

We can SAVE
◦ Cost of internet access
◦ Server capacity (hardware)
◦ Network resource
CDN Service Prices
• Classify in to
• Peak Traffic method
• Traffic Volume method
• Peak Traffic
• Based on average of the billing
• Traffic Volume
• Based on amount of usage traffic
• Traffic Volume based Pricing or Content Value based Pricing

•Differentiated Pricing or Single Pricing?


CDN Charging Parameters (1)

The difference price between 2 models

How many network equipment CONTENT must be through to reach client?


-> Pricing?
CDN Charging Parameters (2)
• Charging parameter based on network access and network utilization
• Charging based on 3 methods:
• Transit charge (based on packet’s size)
• Content charge (based on content type: news, video, music…)
• Combination of transit and content charges

• Adding CDN Charging Parameter paragraph to D.271


• Using CDN services, users get content from nearby cache CDN server, network
components is changed.
• Charging for end-customers will be changed.
• But content provider increase expense because of using CDN service.
• Consider and update CDN in the relevant NGN architecture for SG13.
Index
NGN developments in other standardization bodies

NGN deployment

NGN and Economic Issues

NGN Costing Model Issues

ITU-T D.271 Key aspects

Content Delivery Network (CDN) and Charging Issues

ITU-D SG1, Question 12-3/1 on Tariff Policies, models and methods for determining costs of services
Statement of the situation
Traditional
NGN networks
networks

NGN networks do not present the same cost Costs have virtually nothing to do with distance, and IP
structure as traditional networks. tariffs will of necessity have to take account of these
characteristics.

The majority of the costs are fixed costs that are


Tariffs focuses on the wholesale prices of each service,
independent from usage.
with fixed voice, mobile voice and data being handled
separately.
service offers are based around the
cohabitation on one and the same
infrastructure of fixed, mobile and high-speed
flows.

80
Statement of the situation
Advantages of adopting NGNs in developing countries:

Considerable economic and social


advantages The low level of data communication
• universal service access for the poorest in the developing countries can
segments of the population likewise be remedied by
leveraging the potential of NGNs

81
Question for study

Effects or benefits of NGN The cost structure of NGN services New charging methods for services
migration for all stakeholders, compared to that of services provided over NGN networks and
including consumers. provided over traditional networks. practical case studies.

Ongoing studies on the economic Ongoing study on the financial and


investment plan models used by tariff impacts of site sharing for
Regulating the tariffs for countries experienced in mobile terrestrial
telecommunication/ICT services
provided over NGN networks. the transition to NGN, in the services, broadening the study to
interests of providing guidance to embrace all telecommunication
developing countries. infrastructures.

82
Expected output

Guidelines for making the transition from


existing service offerings in developing
countries to service offerings that
A set of guidelines for promoting growth
combine voice and data, and economic
in data communications in developing
investment plan models used by countries
countries.
experienced in the transition to NGN, for
the purpose of providing guidance to
developing countries;

83
charles@inje.ac.kr

You might also like