U.S. Army Unified Capabilities (UC) Reference Architecture (RA) Version October 2013
|
|
|
- Madlyn Bruce
- 10 years ago
- Views:
Transcription
1 U.S. Army Unified Capabilities (UC) Reference Architecture (RA) Version October 2013
2 Version Summary: Version Staffing Date Revision Summary Version October 2013 Army UC Architecture V1.0 will expand the UC Reference Architecture to more thoroughly address open-standards based distributed call control and application servers will be addressed. tification: This document will be updated annually. Point of Contact for this effort is: COL Robert J. Quinker, HQDA CIO/G6-AAIC-AOE, (703) / LTC Eric J.Van Den Bosch, HQDA CIO/G6-AAIC-AOB, [email protected] (703)
3 EXECUTIVE SUMMARY The rule-based U.S. Army Unified Capabilities Reference Architecture (RA) provides the integration of voice, video, and/or data services delivered ubiquitously across a secure and highly available network infrastructure, independent of technology, to provide increased mission effectiveness to the warfighter and business communities. Army UC RA integrates standards-based communication and collaboration services including, but not limited to, messaging; voice, video, and web conferencing; information assurance; content and record management; business process management; unified communication and collaboration applications or clients. These standards-based UC services are integrated with available enterprise applications, including business, intelligence, and warfighting. Capabilities are provided to fixed and deployed users to include ground and airborne mobile/transportable platforms. Capabilities in mobile ad-hoc networks and related mobile environments are yet to be addressed. The Army UC RA has been developed in accordance to Defense Information Systems Agency UC RA and Department of Defense Unified Capabilities Requirements. The Army UC RA has been enhanced with respect to the DISA UC RA based on fundamental net-centric (NC) principles for providing scalability, reliability, interoperability and economies-of-scale in the following respects: Open standard-based protocols/interfaces must be used between the functional entities for communications. Call control functional entities that are used for establishment of sessions with single and/or multiple media with two or multiple parties must use open standard-based protocols/interfaces for communications with the application servers of the real-time communications services. Each application server should be geographically distributed, but act logically centralized from communications point of view. Finally, the Army UC RA articulates and explains the Army s strategy for implementing converged, NC, Everything over Internet Protocol (EoIP) -based enterprise UC, and serves as a guideline to the Army LandWarNet (LWN) in the preparation of implementation and acquisition plans for phasing in voice, video, and data over IP services and other UC that shall operate in converged voice, video, and/or data networks. The Army UC RA supports the DoD mandated DISA UC Approved Products List (APL). All Army networks that support UC shall use certified products on the Army UC RA APL. It should be noted that the mobile adhoc networks (MANET) architecture of the Army UC RA will be developed later. Mr. Gary W. Blohm, Director Army Architecture Integration Center, Chief Information Officer/G-6 Date: 16 Oct 2013 U.S. Army Unified Capabilities Reference Architecture Page ii of 97
4 Table of Contents EXECUTIVE SUMMARY... III 1 INTRODUCTION Overview Scope Key Authoritative Sources References Relationships to other Army Ras, JCAs and DoD IEA Other Army Ras JCAs and DoD IEA UC APPLICATIONS, QOS SERVICE CLASSES, AND PRIORITY LEVELS INTENDED AUDIENCE AND USE UNIFIED CAPABILITIES GUIDING PRINCIPLES AND BUSINESS RULES UC Principles and Rules Principles Rules in Compliance of Principles Description of UC RA Principles and Rules Assumptions, Constraints, Risks, and Mitigation Strategy of UC RA Principles/Rules Principle 1 (P1): Open Standards (P1/R1-R4) Assumptions (P1/R1-R4) Constraints (P1/R1-R4) Risks (P1/R1-R4) Mitigation Strategy (P1/R1-R4) Technical Positions and Patterns Principle 2 (P2): Performance (P2/R5-R8) Assumptions (P2/R5-R8) Constraints (P2/R5-R8) Risks U.S. Army Unified Capabilities Reference Architecture Page iii of 97
5 (P2/R5-R8) Mitigation Strategy (P2/R5-R8) Technical Positions and Patterns Principle 3 (P3): Mobility (P3/R9-R12) Assumptions (P3/R9-R12) Constraints (P3/R9-R12) Risks (P3/R9-R12) Mitigation Strategy (P3/R9-R12) Technical Positions and Patterns Principle 4 (P4): Information Assurance(IA) (P4/R13-R16) Assumptions (P4/R13-R16) Constraints (P4/R13-R16) Risks (P4/R13-R16) Mitigation Strategy (P4/R13-R16) Technical Positions and Patterns APPENDIX A - ARMY UC RA AND CALL FLOWS INTRODUCTION UC APPLICATION ARCHITECTURE UC NETWORK ARCHITECTURE UC SERVICES RTC Call Control Entities WAN SS MFSS LSCs SCF RTC Services Application Servers Voice & Video Application Server(s) Web Conferencing Application Server(s) Conferencing, Collaboration & Whiteboard Application Server(s) Media Bridging Application Server(s) Presence, Instant Messaging (IM) & Chat Application Server(s) Unified Messaging Application Server(s) Calendaring & Scheduling Application Server(s) E.164 Number Mapping (ENUM) Application Server(s) E.911 (Emergency Call) Application Server(s) Transaction Capabilities Application Part (TCAP) Application Server(s) Desktop Sharing Application Server(s) Short Message Service (SMS) Application Server(s) Multimedia Message Service (MMS) Application Server(s) Wireless Application Protocol (WAP) Application Server(s) U.S. Army Unified Capabilities Reference Architecture Page iv of 97
6 Location Services (Fixed/Mobile) Application Server(s) Seamless Mobility Services UC Mobility Environments Terminal Mobility User Mobility Service/Session Mobility Network Mobility Ad Hoc Mobility UC Mobility Management Functionality Mobile IP Content Management Records Management Team Collaboration Business Process Management Web Apps (Applications) Portals Profiles Search & Discovery Information Assurance (IA) CALL FLOWS FOR REAL-TIME COMMUNICATIONS SERVICES Assured Point-to-Point Audio/Video/Data Conferencing Assured Point-to-Multipoint Centralized Audio/Video/Data Conferencing IM/Chat/Presence Communications (Integrated with Audio and/or Video) CALL FLOWS FOR NON-REAL-TIME COMMUNICATIONS SERVICES IM/Chat /Presence Communications (Stand-Alone) CALL FLOWS FOR OTHER UC SERVICES U.S. Army Unified Capabilities Reference Architecture Page v of 97
7 APPENDIX B - ACRONYM LIST APPENDIX C - OV-1 HIGH LEVEL OPERATIONAL CONCEPT GRAPHIC, OV-5A OPERATIONAL ACTIVITY DECOMPOSITION TREE, OV-6C EVENT-TRACE DESCRIPTION, DIAGRAMS APPENDIX D - ARMY UC RA STDV-1 AND STDV-2 TECHNICAL STANDARDS PROFILES APPENDIX E - ARMY UC RA APL APPENDIX F - MAPPING BETWEEN ARMY AND DOD UC PRINCIPLES AND RULES, CAPABILITY GAPS, MITIGATIONS AND TARGET END STATE APPENDIX G - UC PERFORMANCE REQUIREMENTS APPENDIX H - ARMY UC QOS RA APPENDIX I - AV-2 INTEGRATED DICTIONARY/GLOSSARY/VOCABULARY List of Figures Figure 1: UC Service Areas Figure 2: Conceptual View of Army UC RA Figure 3: Overview of Different Segments of UC Communications Infrastructure Architecture Figure 4: Functional Operational View of Army UC Architecture (OV-1) Figure 5: Operational Concept of Open Protocol Standards used by Service Control Function (SCF) Entity for Communications with Application Servers and Session Controller (e.g. WAN SS, MFSS, or LSC) (OV-1) Figure 6: Assured Point-to-Point Audio/Video/Data Conference Call (OV-6c) Figure 7: Assured Point-to-Multipoint Centralized Audio/Video/Data Conferencing (OV-6c) Figure 8: Assured Point-to-Point IM/Chat Communications (OV-6c) List of Tables Table 1: UC RT, Near-RT, and n-rt Applications and QoS Service Classes Mapping U.S. Army Unified Capabilities Reference Architecture Page vi of 97
8 Table 2: Granular Service Performance Objectives Table 3: MLPP Levels Table 4: Army UC RA Roles and Responsibilities Table 5: Organization of UC RA Global Operational Principles and Rules Table 6: Mapping between UC RA Functional Sub-Component Areas and UC Global Operational Principles and Rules Table 7: Description of UC Global Operational Principles and Rules Table 8: Principle 1 (P1) - Open Standards Table 9: Principle 2 (P2) - Performance Table 10: Principle 3 (P3) - Mobility Table 11: Principle 4 (P4) Information Assurance (IA) U.S. Army Unified Capabilities Reference Architecture Page vii of 97
9 1 Introduction The Army Unified Capabilities (UC) (RA) supports both real-time audio and video, non-real-time data applications, and provides UC implementation guidance and solution architecture. This UC framework enables strategic, tactical, classified, and multinational missions with a broad range of interoperable and secure capabilities for converged non-assured and assured voice, video, and data services from the end device, through Local Area Networks (LANs), and across the backbone networks based on the Defense Information Systems Agency (DISA) described in Department of Defense (DoD) Unified Capabilities Requirements (UCR). Based on the UCR, the Army UC RA abstracts and normalizes the institutional understanding of capabilities at the enterprise level, and provides a common set of principles/rules, process patterns, and technical positions for use within Army to guide development of Enterprise, Segment, or Solution architectures. The structure of the Army UC RA document is: The main document contains primarily the Principles and Rules of Army UC RA with following appendixes: Appendix A: Army UC RA and Call Flows Appendix B: Acronyms Appendix C: OV-1, OV-5a, OV-6c Diagrams Appendix D: Army UC RA StdV-1 and StdV-2 Technical Standards Profiles Appendix E: Approved Product List Appendix F: Mapping between Army and DoD UC Principles and Rules, Capability Gaps, Mitigations and Target End State Appendix G: UC Performance Requirements Appendix H: Army UC QoS RA Appendix I: AV-2 Integrated Dictionary/Glossary/Vocabulary 1.1 Overview Army Unified Capabilities (UC) Reference Architecture (RA) is a secure suite of collaboration, real time communications, and supporting services available to the Soldier and Army business user on any device, anywhere in the world. This suite brings together , chat, voice, video, profile, search, collaboration sites, content management, search, discovery, apps (applications), and records management tools under one identity in secured environments. Unified Capabilities supports all phases of operations, convergence of the Generating and Operating Forces, increases interoperability, demonstrates train-as-you-fight, and improves the security of the LandWarNet (LWN). UC connects users to enable real time communication, collaboration and shared situational awareness. The integration of services will facilitate more timely delivery of emerging UC technologies and provides increased mission effectiveness. The current state of UC is a mix of local solutions and enterprise services provided by DISA described in DOD UCR document [1]. The DOD UCR also defines interoperability, Information Assurance, and interface requirements among products that provide UC. The IA requirements of the UCR are derived from DoD Instruction (DoDI) The CIO/G-6/Network Enterprise Technology Command (NETCOM) team is responsible for evaluating the U.S. Army Unified Capabilities Reference Architecture Page 8 of 97
10 current state and developing an Army UC Implementation Plan, consistent with the DoD UC Master Plan. UC capabilities supports mitigation of the capability gaps that have been identified as described in Appendix F. Unified Capabilities provides the ability to seamlessly integrate voice, video, and data applications services so they are delivered ubiquitously across a secure and highly available single protocol network infrastructure [2] (EoIP) environment. Services provide includes: Real-Time Communications (RTC) Services: o Voice & Video, Web Conferencing, o Conferencing, Collaboration & Whiteboard, o Media Bridging, Presence, o Instant Messaging (IM) & Chat, o Unified Messaging, o Calendaring & Scheduling, o E.164 Number Mapping (ENUM), o E.911 (Emergency Call), o Transaction Capabilities Application Part (TCAP), o Desktop Sharing, Short Message Service (SMS), o Multimedia Message Service (MMS), o , o Wireless Application Protocol (WAP), and o Location Services (Fixed/Mobile) Content Management (CM) Records Management (RM) Team Collaboration Business Process Management (BPM) Web 2.0, Apps (Applications) Portals Profiles Search & Discovery Information Assurance A more detailed breakdown for each of the above services that are unified over EoIP environments is shown in Figure 1. U.S. Army Unified Capabilities Reference Architecture Page 9 of 97
11 Figure 1: UC Service Areas The UC RA specifies the functional requirements, performance objectives, and technical specifications for Army networks and provides the infrastructure to execute these functions. This can be done by providing a strong operational concept and RA framework. UC RA describes the business process logic and shared Information Technology (IT) infrastructure reflecting the integration and standardization requirements [1-16]. The conceptual view of the UC architecture is shown in Figure 2 with all functional components. U.S. Army Unified Capabilities Reference Architecture Page 10 of 97
12 VOIP Pho ne_lrip CIO/G-6 Reference Architecture Series Unified Capabilities Application Services Quality-of-Service, NETOPS/Network/System/Applications Management Real-Time Communications Services : Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM, and Chat, Unified Messaging, Calendaring & Scheduling, ENUM, E.911, TCAP, Desktop Sharing, SMS, MMS, , WAP, Location Services (Fixed/Mobile) Content Management, Records Management, Team Collaboration, BPM, Web 2.0, Apps (Applications), Portals, Profiles, Search & Discovery, and Information Assurance AS-SIP, LDAP/Active Directory, RADIUS/DIAMETER/AAA, HTTP/XML, DNS, SOAP, and other Open Protocols) Session Control (AS-SIP) Converged Backbone Network (IP Network: Leveraging MPLS, GMPLS, DWDM, Wireless, Wireline, Satellite, Optical Technologies) Access Networks (IP, LAN, PSTN/ISDN/TDM, WiFi, DSL, Cable, Fiber, 3G Wireless, WiMAX, LTE/4G Wireless) (Base/Post/Camp/Station) Information Assurance/Security/Identity Management User Devices: Wireline Phones, Smart Phones, PDAs, Cell Phones, Laptops, PCs (AS-SIP, H.323, TDM [Analog, Digital], XMPP, SOAP, other Open Standards) (Base/Post/Camp/Station) Figure 2: Conceptual View of Army UC RA Logically, the entire UC architecture can be viewed with some distinct layers: Unified Capabilities Application Services, Session Control, Converged Backbone Network, and Access Networks while IA/Security/Identity Management), Quality-of-Service (QoS) and Network Operations (NETOPS) services encompass of all layers. 1.2 Scope The scope of the UC RA document is to provide the understanding of capabilities at the enterprise level, and a common set of principles/rules, process patterns, and technical positions for use within the Army to U.S. Army Unified Capabilities Reference Architecture Page 11 of 97
13 guide development of Enterprise, Segment, or Solution architectures. The Army UC RA document will serve as a guideline for the Army in the preparation of implementation and acquisition plans for phasing in voice and video over IP` services, and other UC services that shall operate in converged voice, video, and/or data networks. The DoD Chief Information Officer (CIO) with support from the Army CIO/G-6 will provide policy and a governance structure for change management and to resolve conflicts. The use of UC technical positions and patterns, business rules/processes and policies will be enforced by the Army and DoD CIO. 1.3 Key Authoritative Sources The content of the Army UC RA has been extracted or derived primarily from the key authoritative sources as provided in the reference section References 1. Department of Defense Unified Capabilities Requirements 2008, Change 3, September 2011, located at 2. DoD Information Enterprise Architecture (IEA), Vol. I & II, Version 2.0, July DoD Instruction , DoD Unified Capabilities (UC), December 9, Department of Defense Unified Capabilities Master Plan, October The DoD Identity, Credential, and Access Management (ICAM) Transition Strategy Transition Plan, Consolidated Version (Draft) 1.3, May 8, Office of the Assistant Secretary of Defense, Networks and Information Integration (OASD/NII); DoD Reference Architecture Description, June Department of Defense (DoD) Enterprise wide Access to Network and Collaboration Services (EANCS), version 1.0, December Defense Information System Network (DISN) Unified Capabilities (UC) Spirals Development Sustainment Plan, dated 6 January Joint Staff/COCOM Mapping of GIG 2.0 gaps and ITESR as of 27 Oct High level notes from COCOM Integrated Priority Lists Gap Analysis meeting, 5-6 December Capabilities-Based Plan Extracted from COCOM and DoD CIO Requirements Analyses and Supporting DISA and Military Services Unified Capabilities Implementation Plans (Annexes A-E), DISA, 17 January 2012 (DRAFT). 12. Army Cost Benefit Analysis: Unified Capabilities, Version 1.3, Army CIO/G-6, 29 December Defense Information System Network (DISN) Acquisition of Services Tailored Support Plan (TISP), Version December War-fighter Information Network-Tactical (WIN-T), Information Support Plan (ISP), VERSION 0.6, Defense Acquisition Executive (DAE) rebase line program review, August DISA Unified Capabilities Reference Architecture, Version 1.1, February U.S. Army Unified Capabilities Reference Architecture Page 12 of 97
14 16. URL: Joint Capability Areas (UCAs) Global Information Grid (GIG) Technical Profile (GTP) Quality of Service (QoS), 18 February Relationships to other Army Ras, JCAs and DoD IEA Other Army Ras The Army CIO/G-6 has developed a series of reference architectures as described below: Thin Client RA Network Operations (NetOps) RA Identity and Access Management (IdAM) RA Security/Top Layer Architecture (TLA) RA Mission Assurance RA The Army UC RA has leveraged all these above Ras based on the fact the scope of the Army UC RA is so broad that it encompasses all applications (real-time [RT], near-rt, non-rt) that will use a single Internet Protocol (IP) network. For example, the Thin Client RA will be used within the UC RA for consolidating all the UC application servers and clients which are located in the data centers and premises, respectively for consolidation of efficient usage of server/client resources. In addition, all the UC applications will be migrating to more efficient cloud computing architecture. It should be noted that the Thin Client RA is a precursor of the cloud computing architecture that DoD has mandated. The NetOps RA will also be used by the Army UC RA because the UC RA does not address the network operations separately. If any operations of any applications and/or network entities are not included, the UC RA will add those by enhancing the NetOps RA. However, the operations of the RT applications and functional entities like session controllers and audio/video media servers along with multiprotocol label switching (MPLS), generalized MPLS, Dense Wavelength Division Multiplexing (DWDM), and fiber transport network are critical in support of the multimedia traffic. If needed, the NetOps RA may be enhanced to meet the operational and management requirements of the UC network. The UC Iawill be using all aspects of IdAM and TLA RA because they are essential components of the UC security capabilities. However, the UC RA deals with all security features of all layers from the physical layer to the application layer (layer 1 to 7 in Open Standard International [OSI] terminology). For example, AS-SIP of UC call control application has user-to-user authentication with hypertext transport protocol (HTTP) digest/authentication, secured multipurpose internet mail extension (MIME) certificate and key exchanges in the application layer on the top of transport layer security (TLS). So, the UC IA is the superset of IdAM and TLA RA. The Mission Assurance RA is not developed yet, but it is expected it will include the warfighter mission U.S. Army Unified Capabilities Reference Architecture Page 13 of 97
15 applications that will be built as value-added application on the top of the UC applications (RT, near-rt, and non-rt) including security. In this case, the Mission Assurance RA will be superset of the IA of Army UC RA JCAs and DoD IEA To meet NC needs, the DoD IEA requires the context of DoD architecture s to address the Joint Capability Area (JCA) structure, providing the architect with the NC capabilities that the architecture must describe. The JCAs are collections of like DoD capabilities functionally grouped to support capability analysis, strategy development, investment decision making, capability portfolio management, and capabilitiesbased force development and operational planning. The architect uses the common capability language of selected NC JCAs to describe capabilities in the architecture so they enable NC operations. In addition, the DoD IEA requires that DoD architectures conform to the DoD NC Vision. This conformance is achieved by addressing how the architecture will meet the challenges to this Vision described by DoD IEA priority areas. The following paragraphs describe Army UC RA alignment with key NC JCAs and appropriate Rules associated with the DoD IEA priority areas of Unified Capabilities. RTC Services and Enterprise Collaborative Services described in Army UC RA are key elements of the User Access JCA within the NC/Enterprise Services (ES)/Core Enterprise Services/Collaboration as well as Net Management JCA hierarchy [16]. We are highlighting some of the relevant terms for this RA defined by JCA as follows: Net-Centric: The ability to provide a framework for full human and technical connectivity and interoperability that allows all DoD users and mission partners to share the information they need, when they need it, in a form they can understand and act on with confidence, and protects information from those who should not have it. o Enterprise Services: The ability to provide to all authorized user s awareness of and access to all DoD information and DoD-wide information services. o Information Sharing: The ability to provide physical and virtual access to hosted information and data centers across the enterprise based on established data standards. Shared Computing: The ability to provide computing processing and storage resources that can be used by more than one component, community of Interest, program, or DoD user. o Core Enterprise Services: The ability to provide awareness of; access to and delivery of information on the GIG via a small set of Chief Information Officer (CIO) mandated services. User Access (Portal): The ability to access user defined DoD Enterprise Services through a secure single entry point. U.S. Army Unified Capabilities Reference Architecture Page 14 of 97
16 Collaboration: The ability to conduct synchronous and asynchronous communications and interaction across the enterprise, including voice, data, video, and manipulated visual representation. Content Delivery: The ability to accelerate delivery and improve reliability of enterprise content and services, by optimizing the location and routing of information. Common Identity Assurance Services: The ability to establish and deploy common identity assurance services across the enterprise. Enterprise Messaging: The ability to perform electronic messaging between users and organizational entities across the enterprise, including providing customer support. Directory Services: The ability to provide, operate, and maintain a global directory of users, to include directory synchronization with other lower-level systems and information integrity. Enterprise Application Software: The ability to provide productivity enhancement software made available to all users. o Information Transport: The ability to transport information and services via assured end-toend connectivity across the NC environment. Wired Transmission: The ability to transfer data or information with an electrical/optical conductor. Wireless Transmission: The ability to transfer data or information without an electrical/optical conductor. Switching and Routing: The ability to move data and information end to end across multiple transmission media. o Net Management: The ability to configure and re-configure networks, services and the underlying physical assets that provide end-user services, as well as connectivity to enterprise application services. In a NC DoD IE, there is an urgent need for all UC services of this RA that are being supplied to all warfighters. Moreover, these services must be securely accessed through wired and wireless transport networks via GIG that uses switching/routing for (EoIP). The UC RA described here provides the optimized architecture integrating both real-time (audio/video) and non-real-time (data applications) services using the single IP network as mandated by DoD. This UC RA uses open standards-based distributed scalable application servers, call control entities, and switching/routing functional entities across the globe in sharing the integrated audio, video, and data services. Solutions delivering these UC capabilities described in this RA will be made available as services in the NC environment. Such UC services will be widely available, easily discoverable, usable, and trusted across the DoD IE. Data produced by UC services and access control will also be made visible and accessible in U.S. Army Unified Capabilities Reference Architecture Page 15 of 97
17 accordance with the DoD IEA priority areas of Data and Service Deployment (DSD) specifications. Data visibility and accessibility is critical to enabling monitoring and auditing of authentication and authorization for UC services to prevent and respond to incidents threatening DoD IE operations. The UC services will confirm to the global principles and rules described earlier as well as to the operation rules described in the subsequent sections confirming the DoD IEA principles and rules 2 UC Applications, QoS Service Classes, and Priority Levels The UC applications described earlier can be categorized broadly known as general service classes such as Real-Time (RT), Near-Real-Time (near-rt), and n-real-time (non-rt) from performance requirements point of view. The Internet Engineering Task Force (IETF), Department of Defense (DoD) UCR 2008, and GIG Technical Profile (GTP) for QoS [17] have also classified the applications primarily known as aggregate service class such as Inelastic/Real-Time, Preferred Elastic, Elastic, and Network Control. Appendix C of this document summarizes the performance requirements for different categories of UC applications that consist of audio, video, and data along with key performance parameters (KPPs) in relationship to the mission for conducting decisive operations throughput the battle-space. Table 1 provides the mapping between different categories of UC Applications and QoS Service Classes. In addition, a granular service class [17] has also been defined along with the detailed definitions in supporting different applications for easy understanding in applying the different QoS classes. The term conference includes both point-to-point and multipoint conferencing. Therefore, it should be noted that there will also be point-topoint audio calls, point-to-point audio & video calls, point-to-point audio, video & data calls, multipoint audio (teleconferencing) calls, multipoint audio & video (videoconferencing) calls, and multipoint audio, video & data (multimedia collaboration) calls, all of those have been assumed as a part of the conferencing call family. Table 1: UC RT, Near-RT, and n-rt Applications and QoS Service Classes Mapping UC Applications General QoS Class Aggregate Service Class Granular Service Class Description of Application Traffic (Media/Granular Service Class) Support UC Service Category UC Application Category Media (Traffic) Real-Time Communicatio Voice & Video, Web User Near- Real- Inelastic User User generated signaling messages, for example SIP requests (see Page 16 of 97 U.S. Army Unified Capabilities Reference Architecture
18 ns (RTC) Services Conferencing Signaling Time Signaling RFC 4594). Audio Real- Time Inelastic Voice Packetized voice services that require high quality connectivity with low packet delay, jitter and loss. Video Real- Time Inelastic Video Like audio, packetized video services that require high quality connectivity with low packet delay, jitter and loss. Data: Short Messages Near- Real- Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Data: Low Latency Application Near- Real- Time Preferred Elastic Low Latency Data Relatively short TCP-based transactions that require low packet loss and delay. Data: Large Files Near- Real- Time Preferred Elastic High Throughput Data Longer TCP-based file transfers that are more tolerant to packet loss and delay Data: Low Priority Application Near- Real- Time Elastic Low Priority Data (Scavenger) User applications that have neither performance guarantees nor an allocated capacity, can tolerate long duration interruption of service. Data: Best Effort/ Default Application Near- Real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity User Signaling Near- Real- Time Inelastic User Signaling User generated signaling messages, for example SIP requests (see RFC 4594). Conferencing, Collaboration & Whiteboard Audio Video Real- Time Real- Time Inelastic Audio Packetized voice services that require high quality connectivity with low packet delay, jitter and loss. Inelastic Video Like audio, packetized video services that require high quality connectivity with low packet delay, jitter and loss. Data (Same as Video & Video, Web Conferencing) Page 17 of 97 U.S. Army Unified Capabilities Reference Architecture
19 User Signaling Near- Real-Time Inelastic User Signaling User generated signaling messages, for example SIP requests (see RFC 4594). Media Bridging Audio Real-Time Inelastic Audio Packetized voice services that require high quality connectivity with low packet delay, jitter and loss. Video Real-Time Inelastic Video Like audio, packetized video services that require high quality connectivity with low packet delay, jitter and loss. Data (Same as Video & Video, Web Conferencing) Presence Data n-real- Time Inelastic Short Message Urgent short messages that need minimum packet delay, jitter and loss. Instant Messaging (IM) & Chat Data n-real- Time Inelastic Short Messages Urgent short messages that need minimum packet delay, jitter and loss. Unified Messaging Audio/ Video and Data Near- Real-Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Data Only n-real- Time Elastic Short Message Urgent short messages that need minimum packet delay, jitter and loss. Calendaring & Scheduling Data Near- Real-Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. E.164 Number Mapping (ENUM) User /Network Signaling n-real- Time Elastic User/ network Signaling User/Network generated signaling messages, (see RFC 4594). E.911 (Emergency Call with audio, video, and/or data) User Signaling Audio Video Data Same as Voice & Video, Web Conferencing Page 18 of 97 U.S. Army Unified Capabilities Reference Architecture
20 Transaction Capabilities Application Part (TCAP) Data User Signaling n-real- Time Elastic Network Signaling Network generated signaling messages, (see RFC 4594). Desktop Sharing Audio Video Data Same as Voice & Video, Web Conferencing Short Message Service (SMS) Data n-real- Time Elastic Short Message Urgent short messages that need minimum packet delay, jitter and loss. Multimedia Messaging Service (MMS) Audio/ Video and Data Data Only Near- Real-Time n-real- Time Preferre d Elastic Elastic Multimedia Streaming Short Messages Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Urgent short messages that need minimum packet delay, jitter and loss. Data n-real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity. Wireless Application Protocol (WAP) Audio/ Video and Data Data Same as Multimedia Messaging Service (MMS) Content Management Location Services (Fixed/Mobile) Content Management Data Data n-real- Time n-real- Time Inelastic Elastic Default/ Best Effort Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity. User applications that do not require performance guarantees, but do have an allocated capacity Records Management Records Management Data n-real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity Page 19 of 97 U.S. Army Unified Capabilities Reference Architecture
21 Team Collaboration Team Collaboration Data Only n-real- Time Preferred Elastic Low-Latency Data Relatively short TCP-based transactions that require low packet loss and delay Business Process Management (BPM) Business Process Management (BPM) Data n-real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity Web 2.0 Web 2.0 Audio/ Video and Data Near- Real-Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Data Only n-real- Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Apps (Applications) Apps (Applications) Data n-real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Portals Portals Data Near- Real-Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Profiles Profiles Data n-real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Search & Discovery Search & Discovery Data Near- Real-Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Information Assurance Information Assurance Data n-real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Broadcast Video* Broadcast Video Audio/ Video Near- Real-Time Inelastic Broadcast Video For inelastic traffic flows intended for high quality, broadcast video and audio transmission. Network Control Application* Network Control Application* Data n-real- Time Network Control Network Control Network generated signaling messages, for example routing table updates. Operation, Administration Operation, Administration Data n-real- Preferred OA&M Applications used for monitoring and controlling status of network U.S. Army Unified Capabilities Reference Architecture Page 20 of 97
22 & Maintenance (OA&M) Application* & Maintenance (OA&M)* Time Elastic Devices. * UC applications (Yet To be Described) Table 2 describes the one-way end-to-end performance objectives [1] for the Granular Service Class applications in terms of end-to-end delay, end-to-end packet loss, and end-to-end delay jitter. It should be noted that best effort, signaling, network control, and low priority traffic aggregate service classes do not have performance objectives. Table 2: Granular Service Performance Objectives Granular Service Class End-to-End Latency (milliseconds) End-to-End Packet Loss (%) End-to-End Delay Jitter (milliseconds) Short Messaging Voice** (Assured/n- Assured) Multimedia Conferencing (Voice/Video** only) Broadcast Video (Voice/Video only) Multimedia Streaming (Voice/Video** only) Low Latency Data: IM/Chat, Presence 220/250 1/1 20/ High Throughput Data ** Video delay requirements seem to be very stringent based on available commercial video codecs that are used per ITU-T H.xxx-series video standards. The Army UC services are required to be delivered in accordance with different priority levels with assured connectivity. The AS-SIP signaling messages have the standardized mechanisms for indicating different priority levels at the time of call setups. Accordingly, audio, video, and data for multimedia conferencing are delivered using the Multi-Level Precedence and Preemption (MLPP) [1] over the LANs, access networks, U.S. Army Unified Capabilities Reference Architecture Page 21 of 97
23 and IP/MPLS backbone network on end-to-end. This MLPP-based services are known as the Precedencebased Assured Services (PBAS) [1] with 5 priority levels as indicated in Table 3. Table 3: MLPP Levels Precedence Level Abbreviation Priority Order Priority Order Level Indicator FLASH OVERRIDE FO Highest Priority 0 FLASH F 2 nd Level 1 IMMEDIATE I 3 rd Level 2 PRIORITY P 4 th Level 3 ROUTINE R Lowest Level 4 The UC applications/services that consist of different media will have different priority/precedence levels. More details about different the precedent levels of different UC applications/services consisting of different media that are mapped to different general QoS classes, aggregate service classes, and granular service classes are described in Appendix H of this document. 3 Intended Audience and Use The Army UC RA is applicable for both Continental and Outside the United States (CONUS/OCONUS) environments. The same UC services can be used both for the fixed and the tactical 2 nd /3 rd /4 th generation (2G/3G/4G) cellular mobile network along with interworking between IP and TDM networks, but the UC architecture has not been developed for the mobile ad hoc network (MANET). At present, the intended audience for this UC RA guidance is Network Enterprise Technology Command (NETCOM) 9 th Signal Command (9 th SC), 7 th Army Signal Command Theater (7 SC (T)), the Program Executive Office (PEO) and designated Program Manager (PM), Defense Information Systems Agency (DISA) and the CIO/G6 Resource Manager (RM) whom together ensure the delivery of UC services for Army Unified Capabilities solutions. Table 4 below lists the primary stakeholders and their roles and responsibilities. Table 4: Army UC RA Roles and Responsibilities Role Responsibilities Page 22 of 97 U.S. Army Unified Capabilities Reference Architecture
24 DISA/DoD CIO/G6 CIO/G6 RM Army/G3/5/7 Network Enterprise Technology Command (NETCOM)) PEO, PM Maintenance and sustainment associated the Defense Information Systems Network (DISN) back bone and edge service provider to support UC services. Development for Army UC RA plan for all real-time, near-real-time, and non-real-time UC services offered by Army LandWarNet (LWN), DISN, and others including Joint services. Allocate funding needed to implement UC services. Establish mission requirements and criticality/prioritization of installations. Develop and provide technical guidance for UC services. Provide guidance for UC requirements on existing equipment. Implement UC services during the implementation and fielding of new UC equipment. A rules based architecture is founded on enterprise guiding principles that describe a desired strategic outcome. To achieve that outcome, a series of rules are identified to meet the intent of the guiding principles. The rules are directive by nature and must be conformed with and enforced. However, based on the fidelity and depth of information available, certain assumptions may be required as well as consideration for known constraints that may impact full compliance with a given rule. From these assumptions and constraints a rules based architecture documents any inherent risk (if it exists) in meeting the intent of the rule and thus impacts an organizations ability to conform to a rule. If a risk is identified, a corresponding risk mitigation strategy is required. To achieve the desired UC services objectives, guiding principles and associated rules have been established to inform, guide and constraint the UC enterprise solutions and services in the next section of this document. Associated with each rule are identified risks, risk mitigation strategies and how risk mitigation (or rule compliance) will be measured. The assumptions and constraints associated with each rule are listed along with a full description of each rule. U.S. Army Unified Capabilities Reference Architecture Page 23 of 97
25 4 Unified Capabilities Guiding Principles and Business Rules 4.1 UC Principles and Rules Army UC Rules based Architecture is comprised of a set of global operational principles and rules that provides guidance for building scalable large-scale worldwide warfighter networks offering economies-ofscale sharing resources creating NC environments and interworks using open-standards-based protocols/interfaces among multi-vendor products. It is important to observe that the Army UC RA offers RT, near-rt, and non-rt UC services to the warfighters in the bases/camps/posts/stations connected over networks providing merely the basic shared infrastructure architecture on the top of a variety of RT, near- RT, and/or non-rt intelligent multimedia command and control (C2) applications including situational awareness and common operating picture (COP) will be created in the future for decades to come. Based on these criteria the principles and rules defined for the Army UC RA can be termed as the global operational principles and rules of the shared infrastructure architecture of the Army Warfighter Network. We have mapped these Army UC RA operational rules and principles with those of DoD IEA v2.0 shared infrastructure in Appendix F of this document. Earlier, we have described that all UC applications can be categorized into one of the three categories from performances point of view: Real-Time (RT), Near-Real-Time (near-rt), and n-real-time (non-rt). In the case of non-rt services, the call using the application-specific protocol flows between the UC non-rt application client (located in the premises network of base/camp/post/station) and the UC non-rt application server (located in the data center) directly via the network (premises/access/backbone) while the call is being controlled by the respective non-rt application server (Figure 3). In non-rt applications, both call signaling traffic and media flow through the same path between the source and the destination. U.S. Army Unified Capabilities Reference Architecture Page 24 of 97
26 Data Center UC Application Servers Content Management Portals BPM Team Collabo ration App (Applications) Search & Discovery Real-Time Communications (RTC) Services Profiles Information Assurance/ Security/Identity Services Web 2.0 Records Management UC Call Control Entities Open Standards-based Protocols and Interfaces between All Applications Servers, Clients, Peers, Call Control Entities, and Others (e.g. AS-SIP, LDAP/Active Directory, RADIUS/DIAMETER/AAA, HTTP/XML, DNS, SOAP, and other Open Protocols/Interfaces) SCF AS-SIP and other Protocols Assured Service Session Initiation Protocol (AS-SIP) Data Center Premises/Campus Network Access Network (Edge Network) LSC End User Premises/ Campus Network Access Network (Edge Network) IP/MPLS/DWDM/GMPLS/ Fiber Backbone Network (Core Network) Access Network (Edge Network) LSC End User Premises/ Campus Network UC Application Clients (Base/Post/Camp/Station) UC Application Clients (Base/Post/Camp/Station) Figure 3: Overview of Different Segments of UC Communications Infrastructure Architecture However, for both RT and Near-RT services, the AS-SIP is used as the call signaling protocol, and the AS- SIP call flows between the UC RT/near-RT application client (located in the premises network of base/camp/post/station) and the UC RT/near-RT application server (located in the data center) along with SCF entity and call control entities (for example, local service controller [LSC], wide area network SoftSwitch [WAN SS], multifunction SoftSwitch [MFSS]) via the network (premises/access/backbone) while the call is being controlled by the respective RT/near-RT application server (Figure 3). The key is that the AS-SIP call signaling messages go between the RT/near-RT application server, SCF, call control entities U.S. Army Unified Capabilities Reference Architecture Page 25 of 97
27 (e.g. LSC/WAN SS/MFSS) and RT/near-RT application client over the network while the media (audio, video, and data) go between the source and the destination directly over the network. For example, the media (audio, video, and/or data) will go directly between the two communicating RT media clients for the point-to-point call without going through the RT application server, SCF, and call control entities. In addition, the performance requirements for both RT/near-RT services are significantly different than those of the non-rt services (Tables 2 & 3). That is why, the network architecture and the principles/rules are so different for RT/near RT and non-rt services. The other fundamental important architectural criteria for scalability and reliability in the NC global network are as follows: Each of these RT, near RT, and non-rt application servers is geographically distributed by acts logically as a single centralized application server. SCF that facilitates communications between the RT, near RT, and non-rt application servers, session controllers (i.e. call control entities) using open standards-based protocols/interfaces facilitating creation of intelligent VoIP/Multimedia and value-added services is also geographically distributed across the global network, but logically centralized. The details of the Army UC RA are described in Appendix A: Army UC RA and Call Flows of this document. The UC architecture uses the IP for the wide area backbone network and with apply traffic engineering and QoS to multiprotocol label switching protocol (MPLS) network. All access networks using different access technologies terminate to the IP/MPLS backbone network. It should be noted that the backbone network of the Defense Information Systems Network (DISN) will be converged to the IP/MPLS over the Dense Wavelength Division Multiplexing (DWDM)/Generalized Multiprotocol Label Switching (GMPLS)/Fiber transport networking technologies. In addition, there will be traditional networking technologies such as Synchronous Optical Network (SONET)/Time Division Multiplexing (TDM) that are not shown in Figure 3 will coexist for some time until migration. The worldwide DISN backbone transport network will consist of both wireline (e.g. fiber) and wireless (e.g. satellite) network. The satellite nodes will be interfacing with fiber/dwdm-based wireline nodes. In addition, ground radios such as Joint Tactical Radio System (JTRS) may also be used to form the backbone network that may form the part of the mobile backbone network. However, IP will run over both wireline and wireless transport network. Access networks may contain many access technologies such as IP, LAN, Public Switched Telecommunications Network (PSTN)/Integrated Services Digital Network (ISDN)/TDM, Wi-Fi, Digital Subscriber Line (DSL), Cable, and Fiber, 3 rd Generation (3G) Wireless, Worldwide Interoperability for Microwave Access (WiMAX), and Long-Term Evaluation/4 th Generation (LTE/4G) Wireless. The IP/LAN access technologies will work with the IP/MPLS network seamlessly. However, PSTN/ISDN/TDM needs appropriate gateways to interworking with the IP/MPLS network. It is expected that the IP protocol will run over the Wi-Fi, DSL, Cable, Fiber, 3G Wireless, WiMAX, and LTE/4G Wireless access networks, and they will work seamlessly with the IP/MPLS network. If there is any TDM networking for these access technologies, gateways will be needed for interworking with IP/MPLS network. U.S. Army Unified Capabilities Reference Architecture Page 26 of 97
28 With respect to defining principles and rules for the Army UC RA, functional entities are divided into two categories: RT/near-RT UC Services and n-rt UC Services, and their architectural components can be divided in the following areas: RT/near-RT UC Services o RT/near-RT Application Server/Client o SCF o Call Control Entity (e.g. LSC/WAN SS/MFSS) o Network (Premises/Access and IP/MPLS/DWDM/GMPLS/Fiber Backbone) n-rt UC Services o n-rt Application Server/Client o SCF (only when non-rt services need to integrated with the RT and/or near-rt services) o Network (Premises/Access and IP/MPLS/DWDM/GMPLS/Fiber Backbone) An important observation is that call control (or session controller) functional entities that are used for the session control under the direction of the RT/near-RT application servers via the SCF entity make the realtime communications (RTC) services fundamentally different. The session controller that host RTC services also need to communicate with all RTC RT/near-RT application servers via the SCF. There can be many kinds of session controllers such as Wide Area Network SoftSwitch (WAN SS), Multifunction SoftSwitch (MFSS), and Local Session Controller (LSC) depending on the type of roles they play in setting up the sessions. The SCF entity comes into play for making the RTC services architecture more scalable optimizing the interfaces of the session controller for communications with different application servers that use a host different application protocols among themselves for creation and invoking of UC services. The operations of non-rt services are straight forward as they only interacting between the applications servers and clients directly over the network without any additional application layer functional entities between them Principles The Army UC RA global operational principles articulate the normative goals for rules that are set for analysis, design, implementations, operations, and evolutions of the architecture for realizing these capabilities and services as a global warfighter enterprise aligning with DoD IEA global operational principles. Adhering to these operational principles, the Army UC RA is expected to be the most efficient effective warfighter communications architecture operating in NC environments. These operational principles are independent of technology and focused on the enduring goals of the Army UC RA in using these capabilities. The characteristics of these principles improve the reusability of these UC capabilities in developing common RT, near-rt, and non-rt services for improved interoperability across the enterprise. The Army UC Reference Architecture will be based on the following unique global principles that are synchronized with the global DoD IEA [2] operational principles as described earlier sections and Appendix F: P1. Open Standards: The Army UC Architecture must use standardized open protocols/interfaces for all functional entities such as, not limited to, application servers, call control entities, network U.S. Army Unified Capabilities Reference Architecture Page 27 of 97
29 switches/routers, and end user devices to provide economies-of-scale ensuring interoperability for all RT, near-rt, and non-rt services in multi-vendor product environments converging all access technologies including wire-line and wireless over a single unified global IP/MPLS/DWDM/GMPLS/Fiber backbone network. P2. Performance: The UC Architecture will provide performances that will meet the requirements of quality-of-service (QoS), reliability and availability for all RT, near-rt, and non-rt services that are used by warfighters in bases/ camps/posts/stations connected by the network (IP/PMLS/GMPLS/DWDM/Fiber Backbone, Access, And Premises) across the globe. P3. Mobility: The Army UC architecture will support global mobility services including user mobility, device/terminal mobility, network mobility, services mobility, and ad hoc mobility. P4. Information Assurance(IA): The Army UC architecture will provide end-to-end security for all layers including the application layer, in Open Standard International [OSI] terminology from layer 1 to layer 7, for all UC applications, resources, and warfighter users along with the use a single digital identity to uniquely identify an individual Rules in Compliance of Principles Each UC global operational principle described in Section will also have some global operational rules that will provide some guidance and constraints to the major UC architectural sub-components of the Army UC RA described earlier summarized as follows: RT, near-rt, and non-rt Application Server/Client SCF Call Control Entity (e.g. LSC/WAN SS/MFSS) Network (Premises/Access and IP/MPLS/DWDM/GMPLS/Fiber Backbone) The operational rules applied in defining each UC sub-component will ensure that the global operational principles are being materialized in UC architectural products with desired capabilities. We have seen that Army UC RA has been only four global operational principles short termed as Open Standards, Performance, Mobility, and Security. Each of these global operational principles creates different kinds of global operational rules to each of these four UC RA architectural sub-component areas namely Application Server/Client, SCF, Call Control Entity, and Network generating 16 distinct global operational rules. Moreover, each of these distinct global operational rules may generate further global operational sub-rules depending on whether or not each of these sub-architectural component areas is involved in to RT, near- RT, and/or non-rt services. Table 5 provides a summary how we have organized all global operational principles and rules considering all the factors that have been described. Table 5: Organization of UC RA Global Operational Principles and Rules U.S. Army Unified Capabilities Reference Architecture Page 28 of 97
30 Army UC RA Functional Sub-Component Areas Organizational Relationship to Principles and Rules Principle UC Application Server/Client SCF Call Control Entity (LSC/WAN SS/MFSS) Network (Premises/Access and IP/MPLS/DWDM/GMPLS/Fiber Backbone) P1 R1 R2 R3 R4 RT Near-RT n-rt RT Near-RT n-rt RT Near-RT RT Near-RT n-rt P2 R5 R6 R7 R8 RT Near-RT n-rt RT Near-RT n-rt RT Near-RT RT Near-RT n-rt P3 R9 R10 R11 R12 RT Near-RT n-rt RT Near-RT n-rt RT Near-RT RT Near-RT n-rt P4 R13 R14 R15 R16 RT Near-RT n-rt RT Near-RT n-rt RT Near-RT RT Near-RT n-rt Table 6 depicts the Army UC RA Functional Sub-Component Areas that are mapped to global operational guiding principles and rules described in this document. It should be noted that these are the subsets of the global DoD operational principles and rules described in DoD IEAv2.0 in relation to the UC services. Appendixes A, F, G and H of this Army UC RA document describe the detailed RA, mapping of UC capabilities, performance requirements, and QoS, respectively. The key is that the UC services need to be managed on end-to-end basis across all functional architecture segments in meeting the needs of all UC applications. Table 6: Mapping between UC RA Functional Sub-Component Areas and UC Global Operational Principles and Rules Army UC RA Functional Sub-Component Areas to UC Global Operational Principles and Rules Mapping Principles Army UC Global Operational Army UC RA Functional Sub-Component Areas and Global U.S. Army Unified Capabilities Reference Architecture Page 29 of 97
31 Principles Operational Rules UC Application Servers/Clients Service Control Function Call Control Functional Entities (or Session Controllers) Network: Rules for Respective UC RA Functional Sub-Component Areas Corresponding to Each Principle Global Operational Principles (P1) Open Standards: The Army UC Architecture must use standardized open protocols/interfaces for all functional entities such as, not limited to, application servers, call control entities, network switches/routers, and end user devices to provide economies-ofscale ensuring interoperability for all RT, near-rt, and non-rt services in multi-vendor product environments converging all access technologies including wireline and wireless over a single unified global IP/MPLS/DWDM/GMPLS/Fiber backbone network. (R1) Open Standards: RT/near-RT and n-rt (R2) Open Standards: SCF (R3) Open Standards: LSC, WAN SS, and MFSS (R4) Open Standards: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone (P2) (R5) (R6) (R7) (R8) Performance: The UC Architecture will provide performances that will meet the requirements of qualityof-service (QoS), reliability and availability for all RT, near-rt, and non-rt services that are used by warfighters in bases/ Performance: RT/near-RT and n-rt Performance : SCF Performance : LSC, WAN SS, and MFSS Performance: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone Page 30 of 97 U.S. Army Unified Capabilities Reference Architecture
32 camps/posts/stations connected by the network (IP/PMLS/GMPLS/DWDM/Fi ber Backbone, Access, And Premises) across the globe. (P3) (R9) (R10) (R11) (R12) Mobility: The Army UC architecture will support global mobility services including user mobility, device/terminal mobility, network mobility, services mobility, and ad hoc mobility. Mobility: RT/near-RT and n-rt Mobility: SCF Mobility: LSC, WAN SS, and MFSS Mobility: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone (P4) (R13) (R14) (R15) (R16) Information Assurance: The Army UC architecture will provide end-to-end security for all layers including the application layer, in Open Standard International [OSI] terminology from layer 1 to layer 7, for all UC applications, resources, and warfighter users along with the use a single digital identity to uniquely identify an individual. Information Assurance: RT/near-RT and n-rt Information Assurance: SCF Information Assurance: LSC, WAN SS, and MFSS Information Assurance: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone 4.2 Description of UC RA Principles and Rules The overall general UC RA principles are described here to meet the overarching architectural needs of the global warfighter network that encompasses of all functions from the physical layer to the application layer along with each kind of media of the UC applications which will traverse over different infrastructure segments such as data center (application servers, SCF, and Call Control Entities), network, and bases/posts/camps/stations (application clients, Local Session Controllers). Based on these global principles (Open Standards, Performance, Mobility, and IA, we have also formulated the individual global operational rules for each of these global operational principles of each UC RA sub-component architecture area (Application Servers/Clients, SCF, and Call Control Entities, and Network). However, further clarifications for each of these global operational principles and rules need to be provided, and Table 7 provides detailed explanations for each principle and its corresponding rules. Application servers and the SCF will run a variety application protocols including AS-SIP as explained in Appendix A while the session controllers will run only AS-SIP. MFSS may use H.248 for interworking with ISUP ISDN User Part of TDM U.S. Army Unified Capabilities Reference Architecture Page 31 of 97
33 network. In addition, Inter-working function (IWF) between H.323 and AS-SIP may also be used where needed. The IP protocol will run over the lower physical transport networks like MPLS, GMPLS, DWDM, fiber optic including the classical TDM/ISDN, SONET and others. Table 7: Description of UC Global Operational Principles and Rules Principle Rule Principle Description Description Description Description Description (P1) Open Standards: The Army UC Architecture must use standardized open protocols/interfaces for all functional entities such as, not limited to, application servers, call control entities, network switches/routers, and end user devices to provide economies-of-scale ensuring interoperability for all RT, near-rt, and non- RT services in multi-vendor product environments converging all access technologies including wireline and wireless over a single unified global IP/MPLS/DWDM/GMPLS/Fi ber backbone network. The four subarchitectural components of the end-to-end Army UC RA must use open-standardsbased protocols/ /interfaces for communications. In addition, each of these subarchitectural components may have many other functional entities, and those functional entities must also use open standardsbased protocols/ interfaces as described in Appendix A: Army UC RA and Call Flows and Appendix D: Army UC RA StdV- 1/StdV-2 Technical Standards Profile of this document. (R1) Open Standards: RT/near-RT and n-rt Application Servers/Clients Each RT/near-RT app server must use AS-SIP call control protocol for communicating with the session controllers (e.g. LSCs, MFSSs, WAN SSs) via the SCF, and each non-rt app server must use open standards-based protocols/ interfaces per Appendixes A and D. (R2) Open Standards: SCF SCF must use open standardsbased protocols/ interfaces for communicatio ns with each of the app servers (RT/near-RT). If value-added multimedia services need to be used integrated with non-rt applications, SCF may also communicate among the non-rt application servers. (R3) Open Standards: LSC, WAN SS, and MFSS All session controllers must use AS- SIP call control protocol as it is the only protocol of choice over the IP network as mandated by DoD [1]. Other open standardsbased interworking protocols with AS-SIP for enabling the smooth migration of the existing legacy protocols as specified in Appendixes A and D. (R4) Open Standards: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone The open standards protocols/ interfaces must be used for the IP, MPLS, GMPLS, DWDM, LAN, and fiber with wire-line and wireless network as specified in Appendixes A, D, and H. Page 32 of 97 U.S. Army Unified Capabilities Reference Architecture
34 (P2) Performance: The UC Architecture will provide performances that will meet the requirements of qualityof-service (QoS), reliability and availability for all RT, near-rt, and non-rt services that are used by warfighters in bases/ camps/posts/stations connected by the network (IP/PMLS/GMPLS/DWDM/F iber Backbone, Access, And Premises) across the globe. The four subarchitectural components of the Army UC RA must work seamlessly in support of meeting the end-to-end performance requirements (QoS, reliability, availability) of each UC application (RT, near-rt, and non-rt) for 24x7 hours-operation including the peakperiod as described in Appendix A: Army UC RA and Call Flows and Appendix H: Army UC QoS RA of this document. (R5) Performance: RT/near-RT and n-rt Application Servers/Clients The UC applications server farm of each data center must maintain the desired performance (QoS, reliability and availability) requirements with adequate processing capability, storage and bandwidth for each kind of application UC (RT, near-rt, and non- RT) for the 24x7 hours-operation including the peakperiod as specified in Appendixes A and H of this document. In addition, priority levels of resource utilization needs to be maintained as specified in Appendixes A and H. (R6) Performance: SCF The SCF entity must maintain the desired performances (QoS, reliability and availability) levels with adequate processing capability, storage and bandwidth in communicatio ns with all kinds of app servers (RT, near-rt, and non-rt) and session controllers (LSCs, MFSSs, WAN SSs) for the 24x7 hoursoperation including the peak-period as specified in Appendixes A and H of this document. In addition, priority levels of resource utilization needs to be maintained as specified in Appendixes A and H. (R7) Performance: LSC, WAN SS, and MFSS Each session controller (LSC, MFSS, WAN SS) must maintain the desired performances (QoS, reliability and availability) levels in handling the calls with adequate processing capability, storage and bandwidth in communicatio ns with all RT/near-RT app servers (for the 24x7 hoursoperation including the peak-period as specified in Appendixes A and H of this document. In addition, priority levels of resource utilization needs to be maintained as specified in Appendixes A and H. (R8) Performance: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone The end-to-end UC network consisting with Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone must support the performance (QoS, reliability and availability) requirements with adequate bandwidth capacity for all kinds of UC applications (RT, near-rt, and non-rt) for the 24x7 hoursoperation including the peak-period supporting all warfighters as specified in Appendixes A and H of this document. Moreover, priority levels of resource utilization needs to be maintained as specified in Appendixes A and H. Page 33 of 97 U.S. Army Unified Capabilities Reference Architecture
35 In addition, the open standardsbased protocols/ interfaces must be used for mapping of the performance requirements (QoS, reliability, availability) UC applications (RT, near-rt, and non-rt) to the network layer as specified in Appendixes A and H. (P3) Mobility: The Army UC architecture will support global mobility services including user mobility, device/terminal mobility, network mobility, services mobility, and ad hoc mobility. The four subarchitectural components of the end-to-end Army UC RA must support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) seamlessly providing services to warfighters for each kind of application (RT, near-rt, and non- RT) as specified in Appendix A: Army UC RA and Call Flows and Appendix H: Army UC QoS RA of this document). (R9) Mobility: RT/near- RT and n-rt Application Servers/Clients The UC application architectures for all applications (RT, near-rt, and non- RT) located in the data centers distributed across the globe must be robust enough to support the mobility (user mobility, device/terminal mobility, network mobility, services mobility, and ad hoc mobility) maintaining the appropriate performance levels seamlessly in both wire-line and wireless networking (R10) Mobility: SCF The SCF architecture must be robust enough to support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) maintaining the appropriate performance levels (for each kind of UC app [RT, near-rt, and non-rt]) (R11) Mobility: LSC, WAN SS, and MFSS The session controller (LSC, WAN SS, or MFSS) architecture must be robust enough to support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) maintaining the appropriate (R12) Mobility: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone The end-to-end network (Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone) architecture must be robust enough to support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) Page 34 of 97 U.S. Army Unified Capabilities Reference Architecture
36 environment as described in Appendixes A and H of this document.. seamlessly in both wire-line and wireless networking environment as described in Appendixes A and H of this document. performance levels (for both RT and near-rt app) seamlessly in both wire-line and wireless networking environment as described in Appendixes A and H of this document. maintaining the appropriate performance levels (for each kind of UC app [RT, near-rt, and non-rt]) seamlessly in both wire-line and wireless networking environment as described in Appendixes A and H of this document. (P4) Information Assurance: The Army UC architecture will provide end-to-end security (authentication, authorization, encryption/integrity, and/or non-repudiation) for all layers including the application layer, in Open Standard International [OSI] terminology from layer 1 to layer 7, for all UC applications, resources, and warfighter users (persons/non-persons) along with the use a single digital identity to uniquely identify an individual person and non-person entity. The four subarchitectural components of the end-to-end Army UC RA must ensure end-to-end security (authentication, authorization, encryption/integrity, and/or nonrepudiation) seamlessly from the physical layer to the application layer (Layer 1 to 7 in OSI terminology) providing services to warfighters for each kind of application (RT, near-rt, and non- RT) ensuring a single digital identity to uniquely identify an individual as specified in Appendix A: Army UC RA and Call Flows of this (R13) Information Assurance: RT/near-RT and n-rt Application Servers/Clients The application layer security in using each UC application (RT, near-rt, and non- RT) of the app server in the data center by any warfighter must ensure the end-toend security in coordination with the security of the lower layer in view of a single digital identity to uniquely identity an individual as specified in Appendix A of this document. (R14) Information Assurance: SCF The application layer security in using each UC application (RT, near-rt, and non-rt) of the app server in the data center accessing through the SCF by any warfighter must ensure the end-to-end security in coordination with the security of the lower layer in view of a single digital identity to uniquely identity an (R15) Information Assurance: LSC, WAN SS, and MFSS The application layer security in using both RT and near- RT UC application of the app servers in the data center accessing through the session controllers (LSCs, MFSSs, and WAN SSs) by any warfighter must ensure the end-to-end security in coordination with the security of the (R16) Information Assurance: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone The network (Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone) layer security including virtual private network (VPN)/Virtual (VLAN) must work seamlessly with the higher layer security in view of a single digital identity to uniquely identity an individual. As specified in Appendix A of Page 35 of 97 U.S. Army Unified Capabilities Reference Architecture
37 document. individual as specified in Appendix A of this document. lower layer in view of a single digital identity to uniquely identity an individual as specified in Appendix A of this document. this document. 4.3 Assumptions, Constraints, Risks, and Mitigation Strategy of UC RA Principles/Rules Principle 1 (P1): Open Standards Table 8 depicts the business rules (R1-R4) of Principle 1 (P1): Open Standards for different UC subarchitectural segments along with references of the authoritative documents. Table 8: Principle 1 (P1) Open Standards Principle Rule Principle Description Description Description Description Description (P1) Open Standards: The Army UC Architecture must use standardized open protocols/interfaces for all functional entities such as, not limited to, application servers, call control entities, network switches/routers, and end user devices to provide economiesof-scale ensuring interoperability for all RT, near- RT, and non-rt services in multi-vendor product environments converging all access technologies including wire-line and wireless over a single unified global IP/MPLS/DWDM/GMPLS/Fiber The four subarchitectural components of the end-to-end Army UC RA must use openstandards-based protocols/ /interfaces for communications. In addition, each of these subarchitectural components may have many other functional entities, and those functional entities must also use open (R1) Open Standards: RT/near-RT and n-rt Application Servers/Clients Each RT/near-RT app server must use AS-SIP call control protocol for communicating with the session controllers (e.g. LSCs, MFSSs, WAN SSs) via the SCF, and each non-rt app server must use (R2) Open Standards: SCF SCF must use open standardsbased protocols/ interfaces for communications with each of the app servers (RT/near-RT). If value-added multimedia services need to be used integrated with non-rt applications, (R3) Open Standards: LSC, WAN SS, and MFSS All session controllers must use AS-SIP call control protocol as it is the only protocol of choice over the IP network as mandated by (R4) Open Standards: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone The open standards protocols/ interfaces must be used for the IP, MPLS, GMPLS, DWDM, LAN, and fiber with Page 36 of 97 U.S. Army Unified Capabilities Reference Architecture
38 backbone network. standards-based protocols/ interfaces as described in Appendix A: Army UC RA and Call Flows and Appendix D: Army UC RA StdV-1/StdV-2 Technical Standards Profile of this document. open standardsbased protocols/ interfaces per Appendixes A and D. SCF may also communicate among the non- RT application servers. DoD [1]. Other open standardsbased interworking protocols with AS-SIP for enabling the smooth migration of the existing legacy protocols as specified in Appendixes A and D. wire-line and wireless network as specified in Appendixes A, D, and H. Reference Documents 1) DoD UCR 2008 Change 3 [1] 2) Appendix A: Army UC RA and Call Flows of this Army UC RA document 3) Appendix D: Army UC RA StdV-1 and StdV-2 of this Army UC RA document (P1/R1-R4) Assumptions The open standards-based protocols/interfaces defined, not limited to, in StdV-1/Stdv-2 of Appendix D of this document for all UC functional entities including application protocols are for the UC functional architecture only and does not represent how a given product or a set of products will be realized physically in the commercial products. In addition to open standards protocols defined in this Army UC RA, many other open standardbased protocols/interfaces may be used by each UC application server (RT, near-rt, or non-rt) for creation and invoking services. All session controllers (LSCs, WAN SSs, MFSSs) will use AS-SIP as the open standard call control protocol as the protocol of choice by DoD. Chat/IM/Presence only solution will use XMPP protocol. Chat/IM/Presence integrated with audio and/or video will use only AS-SIP protocol. The communications between the SCF and the session controllers (LSCs, WAN SSs, and MFSSs) will only be done using AS-SIP protocol. The SCF functional entity is expected to follow the open standards-based protocol architecture defined in the Multi-Switch Forum (MSF) standards organization. U.S. Army Unified Capabilities Reference Architecture Page 37 of 97
39 (P1/R1-R4) Constraints The UC solution/implementation architecture of the Army UC RA needs to abide by all principles and rules related to open standards articulated in this rule-based Army UC RA document. The UC products chosen for the UC solution/implementation architecture needs to use the open standards-based protocols/interfaces specified in this Army UC RA document. The communications of all UC architectural sub-components such as application servers/clients (RT, near-rt, and non-rt), SCF, call control entities (LSCs, MFSSs, WAN SSs) and network (Premises/Access/IP/MPLS/GMPLS/DWDM/Fiber Backbone) occur using open standards-based technical standards as specified, not limited to, in StdV-1/StdV-2 of Appendix D of this document. UC architecture allows offering the same services over both IP and TDM/ISDN network end users, but existing legacy devices using legacy interfaces of the existing TDM/ISDN network must migrate to EoIP environments gracefully using open standards specified in this document as soon as possible to have the same level of functionalities along with enhanced capabilities (P1/R1-R4) Risks Army I3MP, I3C2, and other implementation/solution architecture need to use the open standardsbased protocols/interfaces specified in StdV-1/StdV-2 of Appendix D of this Army UC RA document otherwise risks will be non-scalable UC architecture jeopardizing the very NC networking environments for sharing resources that DoD has already mandated otherwise risks will be there to fall short in meeting the requirements (P1/R1-R4) Mitigation Strategy All Army UC implementation/solution architectures including Installation Information Infrastructure Modernization Program (I3MP) and Installation Information Infrastructure Communications and Capabilities (I3C2) will be aligned with the recommendations provided in this Army UC RA. The migration of the legacy call control protocols such as ISUP, H.323, and others to the AS-SIP call control protocol needs to done as specified in this Army UC RA document and DoD UCR 2008 Change 3 [1]. The migration of legacy networks such as ATM, PSTN/ISDN/TDM, and SONET to the IP/MPLS/GMPLS/DWDM/Fiber needs to be done in accordance to specifications provided in this Army UC RA document and DoD UCR 2008 Change 3 [1] (P1/R1-R4) Technical Positions and Patterns Open technical standards related to Army UC RA provided in StdV-1 and StdV-2 of Appendix D of this document need to be used. The UC architectural configuration patterns that are provided in this Army UC RA document and the DoD UCR 2008 Change 3 [1] for using open technical standards must be followed Principle 2 (P2): Performance U.S. Army Unified Capabilities Reference Architecture Page 38 of 97
40 Table 9 depicts the business rules (R5-R8) of Principle 2 (P2): Performance for different UC subarchitectural segments along with references of the authoritative documents. Table 9: Principle 2 (P2) Performance Principle Rule Principle Description Description Description Description Description (P2) Performance: The UC Architecture will provide performances that will meet the requirements of quality-ofservice (QoS), reliability and availability for all RT, near-rt, and non-rt services that are used by warfighters in bases/ camps/posts/stations connected by the network (IP/PMLS/GMPLS/DWDM/Fiber Backbone, Access, And Premises) across the globe. The four subarchitectural components of the Army UC RA must work seamlessly in support of meeting the end-to-end performance requirements (QoS, reliability, availability) of each UC application (RT, near-rt, and non-rt) for 24x7 hoursoperation including the peak-period as described in Appendix A: Army UC RA and Call Flows and Appendix H: Army UC QoS RA of this document. (R5) Performance: RT/near-RT and n-rt Application Servers/Clients The UC applications server farm of each data center must maintain the desired performance (QoS, reliability and availability) requirements with adequate processing capability, storage and bandwidth for each kind of application UC (RT, near-rt, and non-rt) for the 24x7 hoursoperation including the peak-period as specified in Appendixes A and H of this document. In addition, priority levels of resource (R6) Performance: SCF The SCF entity must maintain the desired performances (QoS, reliability and availability) levels with adequate processing capability, storage and bandwidth in communications with all kinds of app servers (RT, near-rt, and non-rt) and session controllers (LSCs, MFSSs, WAN SSs) for the 24x7 hoursoperation including the peak-period as specified in Appendixes A and H of this document. In addition, priority levels of resource utilization needs (R7) Performance: LSC, WAN SS, and MFSS Each session controller (LSC, MFSS, WAN SS) must maintain the desired performances (QoS, reliability and availability) levels in handling the calls with adequate processing capability, storage and bandwidth in communications with all RT/near- RT app servers (for the 24x7 hours-operation including the peak-period as specified in Appendixes A and H of this document. In addition, priority levels of resource utilization needs (R8) Performance: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone The end-to-end UC network consisting with Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone must support the performance (QoS, reliability and availability) requirements with adequate bandwidth capacity, satisfactory latency, redundant network path, and ideally diversified service providers for all kinds of UC applications (RT, near-rt, and non-rt) for Page 39 of 97 U.S. Army Unified Capabilities Reference Architecture
41 utilization needs to be maintained as specified in Appendixes A and H. to be maintained as specified in Appendixes A and H. to be maintained as specified in Appendixes A and H. the 24x7 hoursoperation including the peak-period supporting all warfighters as specified in Appendixes A and H of this document. Moreover, priority levels of resource utilization needs to be maintained as specified in Appendixes A and H. In addition, the open standardsbased protocols/ interfaces must be used for mapping of the performance requirements (QoS, reliability, availability) UC applications (RT, near-rt, and non-rt) to the network layer as specified in Appendixes A and H. Reference Documents 1. DoD UCR 2008 Change 3 [1] 1. Appendix A: Army UC RA and Call Flows of this Army UC RA document 2. Appendix D: Army UC RA StdV-1 and StdV-2 of this Army UC RA document 3. Appendix G: Performance Requirements of Army this UC RA document Page 40 of 97 U.S. Army Unified Capabilities Reference Architecture
42 4. Appendix H: Army UC QoS RA of this Army UC RA document (P2/R5-R8) Assumptions The UC policy server will be populated with required performance (e.g. QoS, reliability, and availability) parameters (see Appendix G of this document) either through UC applications dynamically or through manual provisioning. UC system management center has the capabilities for monitoring of the policy implementations related to QoS, reliability, and availability for all functional entities as recommended in Appendix H of this Army UC RA document. Appendix A: Army UC RA and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. LSCs/MFSSs/WAN SSs), routers, and others for invoking of policies related to performances (e.g. QoS, reliability, and availability) for different applications over the IP network to meet the performance requirements of each media of each UC application at the time of the call setup is an integral part of this performance policy principle and its corresponding rules. The policy server related to UC performance (see Appendix A of this document) keeps the information how each of these UC sub-architectural segments is required to take care of performances for each media in its own segment in view of the end-to-end performance requirements provided in Appendixes G and H of this Army UC RA (P2/R5-R8) Constraints The functional entities like UC application servers, session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have capabilities for commendations with the policy server related to the UC performance using the technical standards known as Common Open Policy Service (COPS) protocol listed in StdV-1 and StdV-2 of Appendix D of this Army UC RA document and DoD UCR 2008 Change 3 [1]. The functional entities like UC application servers (RT, near-rt, and non-rt), session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have capabilities for implementation of the traffic Prioritization using priority queueing such as First in, first out (FIFO), Weighted fair queueing (WFQ), Custom queueing (CQ), Priority queueing (PQ), and Class-based Weighted Fair Queueing (CB-WFQ) by all functional entities will be coupled with the MLPP-based precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the policy related to performance for each media of each UC application at the time of UC call setup time (see Appendixes A and H of this document). The functional entities like UC application servers (RT, near-rt, and non-rt), session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have appropriate redundancy with sufficient backup for both hardware and functional resources to meet or exceed the availability/reliability requirements specified in Appendix G and H of this Army UC RA document in their respective segments. The end-to-end performances specified in Appendixes G and H of this Army UC RA document U.S. Army Unified Capabilities Reference Architecture Page 41 of 97
43 must be met in the UC network architecture that may contain the combination of the at-the-halt (ATH) and/or on-the-move (OTM) communications environments (P2/R5-R8) Risks Army I3MP, I3C2, and other implementation/solution architecture need to use UC policy server related to performance per recommendations provided in this document, otherwise risks will be their not meeting proper performances for the UC applications. Army I3MP, I3C2, and other implementation/solution architecture need to have for managing the QoS/availability/reliability proactively if the monitoring capabilities of both hardware and software resources are not provided per recommendations provided in this document (P2/R5-R8) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 will be aligned with the recommendations provided in this Army QoS RA for implementing the UC policy server related to performances (P2/R5-R8) Technical Positions and Patterns Technical standards related to UC policy related to performances provided in StdV-1 and StdV-2 of DoD UCR 2008 Change 3 and Army UC RA need to be used. The UC architectural configuration patterns related to UC performances that are provided in this Army UC RA and DoD UCR 2008 Change 3 [1] must be followed Principle 3 (P3): Mobility Table 10 depicts the business rules (R9-R12) of Principle 3 (P3): Open Standards for different UC subarchitectural segments along with references of the authoritative documents. Table 10: Principle 3 (P3) Mobility Principle Rule Principle Description Description Description Description Description (P3) Mobility: The Army UC architecture will support global mobility The four subarchitectural components of the end-to-end Army UC RA must support the mobility (user mobility, device/terminal (R9) Mobility: RT/near-RT and n-rt Application Servers/Clients (R10) Mobility: SCF The SCF architecture must be robust (R11) Mobility: LSC, WAN SS, and MFSS The session (R12) Mobility: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Page 42 of 97 U.S. Army Unified Capabilities Reference Architecture
44 services including user mobility, device/terminal mobility, network mobility, services mobility, and ad hoc mobility. mobility, network mobility, services mobility, and ad hoc mobility) seamlessly providing services to warfighters for each kind of application (RT, near-rt, and non-rt) as specified in Appendix A: Army UC RA and Call Flows and Appendix H: Army UC QoS RA of this document). The UC application architectures for all applications (RT, near- RT, and non-rt) located in the data centers distributed across the globe must be robust enough to support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) maintaining the appropriate performance levels seamlessly in both wireline and wireless networking environment as described in Appendixes A and H of this document.. enough to support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) maintaining the appropriate performance levels (for each kind of UC app [RT, near-rt, and non-rt]) seamlessly in both wire-line and wireless networking environment as described in Appendixes A and H of this document. controller (LSC, WAN SS, or MFSS) architecture must be robust enough to support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) maintaining the appropriate performance levels (for both RT and near-rt app) seamlessly in both wire-line and wireless networking environment as described in Appendixes A and H of this document. Fiber Backbone The end-to-end network (Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone) architecture must be robust enough to support the mobility (user mobility, device/ terminal mobility, network mobility, services mobility, and ad hoc mobility) maintaining the appropriate performance levels (for each kind of UC app [RT, near-rt, and non-rt]) seamlessly in both wire-line and wireless networking environment as described in Appendixes A and H of this document. Reference Documents 1. DoD UCR 2008 Change 3 [1] 2. Appendix A: Army UC RA and Call Flows of this Army UC RA document 2. Appendix D: Army UC RA StdV-1 and StdV-2 of this Army UC RA document Page 43 of 97 U.S. Army Unified Capabilities Reference Architecture
45 (P3/R9-R12) Assumptions The UC mobility architecture along with bases/posts/camps/stations covers all kinds of mobility criteria such user/warfighter mobility, terminal mobility, cellular-like mobility (i.e. that is moving around a fixed infrastructure), network mobility (i.e. a mobile network within a vehicle is moving relative to another fixed and/or mobile network), and ad hoc mobility (i.e. mobile nodes are moving independent of other mobile nodes with no fixed infrastructure as in the case of mobile ad hoc network [MANET]). The detail of the UC mobility architecture will be described in the UC mobility solution/ implementation architecture within the framework specified in Appendix A of this Army UC RA document. The AS-SIP and all other UC applications operate in client-server (C/S) architecture mode and are not suitable in ad hoc mobile network (MANET) environments where each mobile node acts an independent peer and no fixed infrastructure exists. The Peer-to-Peer (P2P) applications like P2P SIP developed in the International Engineering Task Force (IETF) should be used instead of C/S-mode AS-SIP call control protocol in the UC architecture. Similar is the case for all other UC applications, that is, all of these C/S-mode UC applications need be re-architected in P2P architecture. The present Army UC RA document (or even DoD UCR 2008 Change 3 [1]) is yet to address any P2P UC Architecture or P2P applications that can be used for Army MANETs as it is required by Army Warfighter Information Network Tactical (WIN-T) MANETs. However, a prototype for P2P MANET Management Protocol has been developed under small business innovative research (SBIR) program (P3/R9-R12) Constraints The continuity of the user/warfighter session must be provided under all mobile environments (e.g. user mobility, terminal mobility, cellular-like network mobility, and ad hoc mobility using robust mobile networking as specified in Appendix A of this Army UC RA document. In the case of UC mobile ad hoc network (MANET), the peer-to-peer (P2P) application architecture is needed to satisfy the needs of the ad hoc mobility criteria for sustainment of the mission objectives where no fixed infrastructure exists. This Army UC RA (or even DoD UCR 2008 Change 3 [1]) is yet to address any UC P2P Architecture, and Army I3MP, I3C2, and other implementation/solution architecture need to wait to get the another new version of the Army UC RA that will address the UC MANET Architecture to address the ad hoc mobility (P3/R9-R12) Risks Army I3MP, I3C2, and other implementation/solution architecture need to have the mobility architecture for all kinds of mobile criteria as specified in Appendix A of this Army UC RA for managing mobility, otherwise risks will be their not meeting performances of the UC RT, near-rt, and non-rt services. For MANETs, the new version of the Army UC RA with P2P application architecture will be U.S. Army Unified Capabilities Reference Architecture Page 44 of 97
46 released in the near future, and the Army MANET implementation/solution architecture needs to be developed within the framework of that Army UC P2P MANET RA document (P3/R9-R12) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 will be aligned with the recommendations provided in this Army QoS RA for implementing the mobility architecture. Appendix A of this document needs to be followed for mitigation of any implementation issues. For MANETs, the Army UC P2P MANET RA document that will be published in the near future needs to be used (P3/R9-R12) Technical Positions and Patterns Technical standards related to mobility provided in StdV-1 and StdV-2 of Appendix D of this Army UC RA need to be used. The UC architectural configuration patterns that are provided related to mobility in this Army UC RA and Appendix A of this document and in DoD UCR 2008 Change 3 [1] must be followed Principle 4 (P4): Information Assurance(IA) Table 11 depicts the business rules (R13-R16) of Principle 4 (P4): IA for different UC sub-architectural segments along with references of the authoritative documents. Table 11: Principle 4 (P4) IA Principle Rule Principle Description Description Description Description Description (P4) Information Assurance: The Army UC architecture will provide end-to-end security (authentication, authorization, encryption/integrity, and/or nonrepudiation) for all layers including the application layer, in The four subarchitectural components of the end-to-end Army UC RA must ensure end-to-end security (authentication, authorization, encryption/integrity, and/or nonrepudiation) seamlessly from the physical layer (R13) Information Assurance: RT/near- RT and n-rt Application Servers/Clients The application layer security in using each UC application (RT, near-rt, and non-rt) of the app server in the data center by (R14) Information Assurance: SCF The application layer security in using each UC application (RT, near-rt, and non-rt) of the app server in the data center accessing (R15) Information Assurance: LSC, WAN SS, and MFSS The application layer security in using both RT and near-rt UC application of the app servers in the data center (R16) Information Assurance: Premises/ Access and IP/MPLS/ DWDM/GMPLS/ Fiber Backbone The network (Premises/ Access and IP/MPLS/ Page 45 of 97 U.S. Army Unified Capabilities Reference Architecture
47 Open Standard International [OSI] terminology from layer 1 to layer 7, for all UC applications, resources, and warfighter users (persons/nonpersons) along with the use a single digital identity to uniquely identify an individual person and non-person entity. to the application layer (Layer 1 to 7 in OSI terminology) providing services to warfighters for each kind of application (RT, near-rt, and non- RT) ensuring a single digital identity to uniquely identify an individual as specified in Appendix A: Army UC RA and Call Flows of this document. any warfighter must ensure the end-to-end security in coordination with the security of the lower layer in view of a single digital identity to uniquely identity an individual as specified in Appendix A of this document. through the SCF by any warfighter must ensure the end-to-end security in coordination with the security of the lower layer in view of a single digital identity to uniquely identity an individual as specified in Appendix A of this document. accessing through the session controllers (LSCs, MFSSs, and WAN SSs) by any warfighter must ensure the end-to-end security in coordination with the security of the lower layer in view of a single digital identity to uniquely identity an individual as specified in Appendix A of this document. DWDM/GMPLS/ Fiber Backbone) layer security including virtual private network (VPN)/Virtual (VLAN) must work seamlessly with the higher layer security in view of a single digital identity to uniquely identity an individual. As specified in Appendix A of this document. Reference Documents 3. DoD UCR 2008 Change 3 [1] 4. Appendix A: Army UC RA and Call Flows of this Army UC RA document 5. Appendix D: Army UC RA StdV-1 and StdV-2 of this Army UC RA document (P4/R13-R16) Assumptions The UC IA deals with all layers of security from physical layer 1 to application layer 7 in OSI terminology. The UC IdAM will complement the DoD ICAM [5] for providing RT, near-rt, and non-rt UC services. The policy server (authentication, authorization, and accounting [AAA]) related to UC information assurance (see Appendix A of this document) keeps the UC security policy information related to authentication, authorization, encryption/integrity, and non-repudiation including IdAM (P4/R13-R16) Constraints The UC IA that consists of Public Key Infrastructure (PKI), Common Access Card Service, Claimed-Based Architecture, Attribute-Based Access Control, Policy Decision Service, Directory Service, Edge Border Controller (EBC)/Data-Firewall/Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), and Authentication, Authorization & Accounting (AAA) Services must be U.S. Army Unified Capabilities Reference Architecture Page 46 of 97
48 used by the UC solution/implementation architecture as specified in Appendix A of this Army UC RA document. The UC IA will be using all aspects of IdAM and TLA RA because are the essential ingredients of the UC security capabilities. However, UC RA is dealing with all security features of all layers from physical layer to the application layer (layer 1 to 7 in Open Standard International [OSI] terminology). For example, AS-SIP of UC call control application has user-to-user authentication with HTTP digest/authentication, secured multipurpose internet mail extension (MIME) certificate and key exchanges in the application layer on the top of transport layer security (TLS). So, the UC IA is the superset of IdAM and TLA RA. The Mission Assurance RA is not developed yet, but it is expected it will include the warfighter mission applications that will be built as value-added application on the top of the UC applications (RT, near-rt, and non-rt) including security. In this case, the Mission Assurance RA will be superset of the IA of Army UC RA (P4/R13-R16) Risks Army I3MP, I3C2, and other implementation/solution architecture need to implement UC IA as specified in this document including Appendix A, otherwise risks will be their not meeting proper security (authentication, authorization, encryption/integrity, and/or non-repudiation) including IdAM of the UC RT, near-rt, and non-rt services that encompass from layer 1 to layer (P4/R13-R16) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 will be aligned with the recommendations provided in this Army UC RA including Appendix A for implementing the UC security (authentication, authorization, encryption/integrity, and/or non-repudiation) including IdAM (P4/R13-R16) Technical Positions and Patterns Technical standards related to information assurance provided in StdV-1 and StdV-2 of Army of Appendix D of this Army UC RA and UC RA DoD UCR 2008 Change 3 [1] need to be used. The UC architectural configuration patterns that are provided in Appendix A of this Army UC RA and DoD UCR 2008 Change 3 [1] must be followed. U.S. Army Unified Capabilities Reference Architecture Page 47 of 97
49 Appendix A - Army UC RA and Call Flows 1 Introduction The Army Unified Capabilities (UC) Reference Architecture (RA) supports both real-time audio and video and non-real-time data applications and provides UC implementation guidance and solution architecture. This UC framework enables strategic, tactical, classified, and multinational missions with a broad range of interoperable and secure capabilities for converged non-assured and assured voice, video, and data services from the end device, through LANs, and across the backbone networks based on the Defense Information Systems Agency (DISA) described in Department of Defense (DoD) Unified Capabilities Requirements (UCR). In fact, this Army UC Reference Architecture abstracts and normalizes the institutional understanding of capabilities at the enterprise level, and provides a common set of principles/rules, process patterns, and technical positions for use within Army to guide development of Enterprise, Segment, or Solution architectures. 2 UC Application Architecture Army Unified Capabilities (UC) Reference Architecture is a secure suite of collaboration, real time communications, and supporting services available to the Soldier and Army business user on any device, anywhere in the world. This suite brings together all real-time, near-real-time, and non-real-time applications such as , chat, voice, video, profile, search, collaboration sites, CM, search, discovery, apps (applications), and RM tools under one identity in secured environments. Unified Capabilities supports all phases of operations, convergence of the Generating and Operating Forces, increases interoperability, demonstrates train-as-you-fight, and improves the security of the LandWarNet (LWN). UC connects users to enable real time communication, collaboration and shared situational awareness. The integration of services will facilitate more timely delivery of emerging UC technologies and provides increased mission effectiveness. The current state of UC is a mix of local solutions and enterprise services provided by DISA described in DoD UCR document [1]. The DoD UCR also defines interoperability, IA, and interface requirements among products that provide UC. The information assurance requirements of the UCR are derived from DoD Instruction (DoDI) The CIO/G-6/NETCOM team is evaluating the current state and developing an Army UC Implementation Plan, consistent with the DoD UC Master Plan. In fact, these UC capabilities are mitigating the capability gaps that have been identified as described in Appendix F. Unified Capabilities provides the ability to seamlessly integrate voice, video, and data applications services so they are delivered ubiquitously across a secure and highly available single protocol network infrastructure [2] (EoIP) environment: Real-Time Communications (RTC) Services: o Voice & Video, Web Conferencing, Page 48 of 97 U.S. Army Unified Capabilities Reference Architecture
50 o Conferencing, Collaboration & Whiteboard, o Media Bridging, Presence, o Instant Messaging (IM) & Chat, o Unified Messaging, o Calendaring & Scheduling, o E.164 Number Mapping (ENUM), o E.911 (Emergency Call), o Transaction Capabilities Application Part (TCAP), o Desktop Sharing, Short Message Service (SMS), o Multimedia Message Service (MMS), o , o Wireless Application Protocol (WAP), and o Location Services (Fixed/Mobile) Content Management (CM) Records Management (RM) Team Collaboration Business Process Management (BPM) Web 2.0, Apps (Applications) Portals Profiles Search & Discovery Information Assurance(IA) A more detailed breakdown for each of the above services that are unified over EoIP environments is shown in Figure 1 of this document. The UC RA specifies the functional requirements, performance objectives, and technical specifications for Army networks and provides the infrastructure to execute these functions. This can be done by providing a strong operational concept and RA framework. UC RA describes the business process logic and shared IT infrastructure reflecting the integration and standardization requirements [1-16]. The conceptual view of the UC architecture is shown in Figure 2 of this main document. Logically, the entire UC architecture can be viewed with some distinct layers: UC Application Services, Session Control, Converged Backbone Network, and Access Networks while Information Assurance (IA)/Security/Identity Management), Quality-of- Service (QoS) and Network Operations (NETOPS) services encompass of all layers. The session control layer shown in Figure 3 is primarily applicable for the real-time communications (RTC) services that use AS-SIP for session/call control signaling for audio/video conferencing and other services. By the way, the AS-SIP uses SIP-over-Transport Layer Security (TLS), and SIP is the protocol of choice for U.S. Army Unified Capabilities Reference Architecture Page 49 of 97
51 multimedia call control. SIP is chosen for the multimedia call control for its versatility for using beyond telephony services, extensibility, handling of audio, video, and/or data services, mobility services across IP network, and information technology-friendly across all IP network related protocols and services. Moreover, an application server may also use a variety of resources for creation of service logic, management of services, and for other purposes. The functional view of the UC Architecture is provided in Figure 4. It is intended to represent the physical implementation. The architecture does not specify how functions will be distributed to devices. Instead, it allows the flexibility to package functions into various servers using cost-effective methods, as long as open interfaces to those functions are available for use by other functions. As mentioned earlier Real-Time Communications (RTC) Services, CM, RM, Team Collaboration, Business Process Management (BPM), Web 2.0, Apps (Applications), Portals, Profiles, Search & Discovery, IA/Security/Identity Management, QoS and NETOPS are the main components of UC services. In the future, other services may also be added in the Army UC RA portfolio. Figure 4: Functional Operational View of Army UC Architecture (OV-1) U.S. Army Unified Capabilities Reference Architecture Page 50 of 97
52 3 UC Network Architecture The UC architecture uses the IP for the wide area backbone network and uses multiprotocol label switching protocol (MPLS) to enable traffic engineering and QoS for the IP network. All access networks using different access technologies terminate to the IP/MPLS backbone network. It should be noted that the backbone network of the Defense Information Systems Network (DISN) will be converged to the IP/MPLS over the Dense Wavelength Division Multiplexing (DWDM)/Generalized Multiprotocol Label Switching (GMPLS)/Fiber transport networking technologies. In addition, there will be traditional networking technologies such as SONET/TDM will coexist for some time until migration. The worldwide DISN backbone transport network will consist of both wireline (e.g. fiber) and wireless (e.g. satellite) network. The satellite nodes will be interfacing with fiber/dwdm-based wireline nodes. In addition, ground radios such as Joint Tactical Radio System (JTRS) may also be used to form the backbone network that may form the part of the mobile backbone network. However, IP will run over both wireline and wireless transport network. Access networks may contain many access technologies such as IP, LAN, PSTN/ISDN/TDM, Wi-Fi, DSL, Cable, and Fiber, 3G Wireless, WiMAX, and LTE/4G Wireless. The IP/LAN access technologies will work with the IP/MPLS network seamlessly. However, PSTN/ISDN/TDM needs appropriate gateways to interworking with the IP/MPLS network. It is expected that the IP protocol will run over the Wi-Fi, DSL, Cable, Fiber, 3G Wireless, WiMAX, and LTE/4G Wireless access networks, and they will work seamlessly with the IP/MPLS network. If there is any TDM networking for these access technologies, gateways will be needed for interworking with IP/MPLS network. 4 UC Services 4.1 RTC Call Control Entities The Real-Time Communications (RTC) Services are the key component of services that affect the design of UC architecture fundamentally because of their sever performances constraints with respect to those of the data applications services as described in Appendix G. For example, real-time audio/video services have the requirements of one-way delay of milliseconds while the one-way end-to-end requirements of non-real-time data application services can be of the order of few seconds to minutes. It is explained earlier that session controller functional entities that are used for the session control using AS- SIP make the RTC services fundamentally different. The session controller that host RTC services also need to communicate with all RTC services application servers. There can be many kinds of session controllers such as Wide Area Network SoftSwitch (WAN SS), Multifunction SoftSwitch (MFSS), and Local Session Controller (LSC) depending on the type of roles they play in setting up the sessions. It brings another new functional entity termed as SCF entity into play for making the RTC services architecture more scalable optimizing the interfaces of the session controller for communications with different application servers that use a host different application protocols. U.S. Army Unified Capabilities Reference Architecture Page 51 of 97
53 4.1.1 WAN SS The session control functional entity consists of wide area network soft-switch (WAN SS) known as regional session controller that uses AS-SIP for session/call control and its network interfaces consist of only IP. There can be different kinds of call control entities such as Local Session Controller (LSCs) and Multifunction Soft-Switches (MFSSs) that may have both IP and TDM interfaces because of their local and regional roles, respectively based on distributive hierarchical communications architecture. The LSCs and MFSSs still use the same AS-SIP call control protocol over the IP network while ISDN User Part (ISUP) call control protocol over the TDM network. Appendix C provides the operational view of the WAN SS and its detail open standards-based interfaces MFSS The Army LandWarNet (LWN) has not yet fully migrated to the IP network and the legacy TDM network is also co-existing side-by-side. As described previously, there can be another kind of session/call control functional entity termed as multi-function soft-switches (MFSS) that interfaces the circuit-switched based external TDM network and the IP backbone network will also control the calls that are originating from the external Public Switched Telecommunications Network (PSTN)/Integrated Services Digital Network (ISDN). The MFSS will be interfacing between the TDM and IP backbone network and will have much more complex circuit-switched based interfaces along with simple packet-switched based IP interfaces. The ISDN network uses ISDN User Part (ISUP) signaling protocol for the session/call control. So, MFSS will also needs to provide ISUP-SIP interworking function (IWF). It is expected that TDM switching portion of the MFSS will be retired as soon as all users/systems migrate to IP. The MFSS provides all required PSTN/ISDN interface functions, including ISUP, CCS7/SS7, and CAS signaling and media conversion. A signaling gateway (SG) deals with all signaling protocols such as ISUP, CCS7/SS7, and CAS. The MFSS also operates as a media gateway (MG) between TDM circuit-switching and IP packet-switching under the control of the media gateway controller (MGC) while communications control protocol like H.248 is used between MG and MGC. Appendix C provides the operational view of the MFSS and its detail open standards-based interfaces LSCs The Army UC RA will have different kinds of functional capabilities of LSCs based on different kinds of access network technologies (e.g. TDM, IP) and call control protocols (e.g. AS-SIP, H.323, and ISUP). Appendix C shows the operational architectural view of different kinds of LSCs that may interface IP and/or TDM network using AS-SIP, ISUP, and/or H.323 call control protocol. In fact, LSCs mediate different legacy network interfaces and call control protocols in such a way that all users/warfighters connected in both legacy networks using legacy call control protocols can still communicate with the users/warfighters connected to the UC RA-based Army LWN that uses AS-SIP as the call control protocol in EoIP environments until the time the legacy users gracefully migrate to the Army UC RA communications environments. The current access network architecture will consist of a blend of distributed LSCs, which only service a single access network and enterprise LSCs, which service multiple access networks. The communications U.S. Army Unified Capabilities Reference Architecture Page 52 of 97
54 between the WAN-SS (or MFSS) and the LSCs will be done using the AS-SIP protocol. If users of an IP access network use AS-SIP call control protocol, the LSC that interfaces with these users will only use the AS-SIP call control protocol and only IP interfaces. However, if users of an IP access network use H.323 call control protocol, the LSC that interfaces with these users will need to use H.323-SIP interworking function (IWF) for protocol conversion and only the IP interfaces. Similarly, the users of a TDM access network that uses ISUP call control protocol, the LSC that interfaces with these users will need to use ISUP-SIP IWF for protocol conversion as well as both the TDM and the IP interfaces. Appendix C provides the operational view of the MFSS and its detail open standards-based interfaces. Appendix C provides operational views of all those environments SCF Both service creation and execution (SCE) environment will be a part of the Army UC RA Application framework. The main objective of the SCE is to reduce the time-to-introduction of the new services that are to be used by warfighter users of Base/Post/Camp/Station (B/P/C/S) in the Army LWN network. The service creation framework deals with service design, development, provisioning, portal creation, testing, and other non-run-time activities. It provides an innovative environment for creation of new services or service components for Army. It may even facilitate the creation of services by the 3 rd party for Army. The overall idea of the service creation framework is to enable rapid service creation, deployment and testing of applications developed both by Army and 3 rd parties. The service execution framework is concerned with the actual execution of services in run-time environments. It makes sure that the new services introduced can leverage with assurance that these services have access to all necessary network connectivity capabilities and support of necessary resources. In addition the service execution blends the new services seamlessly with other communications services as needed providing the necessary reliability and performance. The SCF entity provides a framework for creating service interactions in Army LWN converged network. The SCF function is associated with the MFSSs, LSCs, and WAN SSs [1]. We are elaborating how important this SCF function is with respect to scalability and interoperability of the global Army/DoD UC Architecture. The SCF will provide a seamless transition for creating a new set of composite services blending UC-based AS-SIP services, 3 rd and 4 th generation (3G/4G) as well as traditional wireline and mobile wireless services, Web services, and other services applications into feature-rich advanced new services. It facilitates to reuse the common service components without duplicating the same functions keeping the service architecture as simple as possible. It seamlessly blends the time-critical AS-SIP services with those of non-time-critical services offered by service oriented architecture (SOA). For example, SCF can facilitate the integration of the real-time AS-SIP-based voice & video conferencing services with the non-real-time SOA/Web services-based data sharing services. In fact, SCF provides enhanced performance, reliability, and control functions making the Army UC RA scalable. The SCF functional entity uses only a single AS-SIP protocol for communicating with the WAN SS, MFSS, or LSC. However, a SCF can use a host of many other protocols such as AS-SIP, LDAP/Active Directory, RADIUS/DIAMETER/AAA, HTTP/XML, DNS, SOAP, and other Open standards for communicating with the application servers (Voice & Video, Web Conferencing, Collaboration & Whiteboard, Media Bridging, U.S. Army Unified Capabilities Reference Architecture Page 53 of 97
55 Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, ENUM, E.911,TCAP, Desktop Sharing, SMS, MMS, , WAP, Directory, Location Service, User Profiles, and others) that are needed for invoking services using the call control functional entities (e.g. WAN SS, MFSS, and LSC). It should be noted that the SCF functional entity has freed all call control entities (e.g. WAN SSs, MFSSs, and LSCs) from using the multiple heterogeneous protocols other than using a single AS-SIP protocol. Consequently, the performance capabilities including simultaneous call handling throughput of the call control functional entities increases dramatically especially for the ones that use only AS-SIP call control and IP network interface as shown in Figure 5. U.S. Army Unified Capabilities Reference Architecture Page 54 of 97
56 Figure 5: Operational Concept of Open Protocol Standards used by Service Control Function (SCF) Entity for Communications with Application Servers and Session Controller (e.g. WAN SS, MFSS, or LSC) (OV-1) te: This operational concept graphic of Service Control Function (SCF) is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and Service Control Function (SCF). AS-SIP = Assured Service Session Initiation Protocol, SOAP = Simple Object Access Protocol, HTTP = HyperText Transport Protocol, LDAP = Lightweight Directory Access Protocol, SQL = Structured Query Language, RADIUS = Remote Authentication Dial In User Service, DIAMETER = (Acronym not spelled out in standard, but it is an enhanced version of RADIUS), WAP = Wireless Access Protocol, ITIP = icalendar Transport Independent Interoperability Protocol, SMTP = Simple Mail Transfer Protocol, AAA = Authentication, Authorization, and Accounting, TCAP = Transaction Capabilities Application Part, ENUM = U.S. Army Unified Capabilities Reference Architecture Page 55 of 97
57 E.164 Number, IM = Instant Messaging, MMS = Multimedia Messaging Service, SMS = Short Message Service, WAN SS = Wide Area Network SoftSwitch, MFSS = Multifunction SoftSwitch, LSC = Local Session Controller Figure 5 shows that the SCF functional entity provides all services from all application servers (Ass) using only single AS-SIP protocol to the session controller like WAN SS, MFSS, or LSC while the individual AS may use AS-SIP and/or other protocols. The SCF acts as the service interworking through switching and routing different Ass where each one of them provides different services that may use the same or different protocols. The SCF mediates the interaction of application platforms with different technologies and protocols, and orchestrates multiple applications to support mixed service delivery, and creates a dynamic model for blending hybrid resources and services. It acts as if a virtual service controller, taking a single service request from a session controller (e.g. WAN SS, MFSS, or LSC) and directs multiple service requests to the application servers. It then aggregates the responses and sends a single response to the session controller (e.g. WAN SS, MFSS, or LSC). It can be seen that the SCF coordinates multiple applications in a single session, combines and brokers technologies, and manages individual features and personal preferences. It mediates between application servers and the session controller (e.g. WAN SS, MFSS, or LSC), intercepting a single service request and directing it to multiple application servers. Acting as a virtual SIP server, it collates the responses from the application servers and sends the session-treatment information back to the session controller (e.g. WAN SS, MFSS, or LSC). This ability to manage the interaction of multiple applications as a single session enables the warfighters to have the delivery of rich multimedia services. Thereby, the SCF optimizes the service delivery through bundling the different services. 4.2 RTC Services Application Servers As explained above, the RTC services that use of the call control entities like WAN SSs, MFSSs, and LSCs make them fundamentally different from those of other services because the multimedia calls are functionrich highly intelligent consisting of multiple media like audio, video, and/or data where each media-session can be manipulated individually or simultaneously in accordance to the desire of the each call participant communicating with two or multiple users while operating under a single call/session. The key RTC services of this Army UC RA are as follows: Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, Instant Messaging (IM) & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), Page 56 of 97 U.S. Army Unified Capabilities Reference Architecture
58 E.911 (Emergency Call), Transaction Capabilities Application Part (TCAP), Desktop Sharing, Short Message Service (SMS), Multimedia Message Service (MMS), , and Wireless Application Protocol (WAP) Location Services (Fixed/Mobile) It should be noted that the above RTC services need to be offered invoking other services such as Information Directory, User Profiles, Assurance (IA)/Security/Identity Management, QoS and NETOPS. The key strength of the Army UC RA is that any service that needs the help of other services can be invoked seamlessly in an integrated manner although each service can be developed and offered independently. This modularity and integration of services based on open standard-based interfaces/protocols make the Army UC RA truly NC where a service once offered can be used by all other services when needed interoperating with one another making more feature-rich complex services agnostic of access network technologies (e.g. IP, TDM, ATM, wired, and wireless). In fact, this Army UC RA is a standard-based framework that facilitates and optimizes all aspects of service delivery consisting of audio, video, and/or data: Service Architecture, Service Design, Service Development, Service Deployment, Service Provisioning, and Service Management. Each type of application servers (Ass) may consist of one or more geographically distributed Ass, but all of them will work as a single logically centralized server. All RTC services Ass communicate via the SCF to the session controllers (e.g. WAN SSs, MFSSs, or LSCs) using their respective open standards-based protocols/interfaces. However, SCF that mediates between RTC services Ass and the session controller communicates with the session controller (e.g. WAN SS, MFSS, or LSC) using only a single AS-SIP protocol. In addition, a given application server can use services of any other application servers for offering an array of new complex feature-rich multimedia services. However, the communications between the application servers will be done through the SCF. A brief description of each of the RCS services type is provided below: Voice & Video Application Server(s) The Voice and Video services are interactive communications. The Voice and Video Conferencing (VVC) is the two-way voice and video communications among two or multiple locations simultaneously. The VVC is also known as videoconferencing (VC) or video teleconferencing (VTC). If only voice is used for two-way communications among two or multiple locations simultaneously, it is known as teleconferencing (TC). In general, data sharing is also used as an integral part of the VVC, VC, or VTC although the name itself does not indicate so. This AS(s) use the AS-SIP protocol. In the future, the detail architecture of this application will be described in detail Web Conferencing Application Server(s) U.S. Army Unified Capabilities Reference Architecture Page 57 of 97
59 Web conferencing is primarily refers to the audio, video, and/or data sharing (e.g. calendaring and scheduling, shared graphics, white board, slide presentation, shared documents, shared note, real-time content, live chat, and others) conferencing between geographically dispersed multiple locations hosted by a Web server. In this conference, an URL that provides the address of the centralized conferencing server to conference percipients or the participants can subscribe to the services a priori subscribing to a particular time and date. The call control protocol like AS-SIP can be used. A host of audio (e.g. G-series) and video (e.g. H-series) standards can be used for Web conferencing. Many data sharing standards like Binary Floor Control Protocol (BFCP), T-series, and XMPP for live chat and others can also be used. In the future, the detail architecture of this application will be described in detail Conferencing, Collaboration & Whiteboard Application Server(s) This AS(s) supports online Whiteboards (areas where conference participants can be interacting using text messages, shared graphics, and shared documents) as a part of the web conferencing. It should be noted that all data collaboration applications are hosted by without using AS-SIP call control protocol. In addition, SOAP/HTTP and other protocols can also be used. In the future, the detail architecture of this application will be described in detail Media Bridging Application Server(s) The media bridging services that are offered by media application server with the use of multipoint control unit (MCU) functions in the context of VC services. The primary functions of the media server are to provide media bridging for audio, video, and data applications for multipoint conferencing. Even the media server is supposed to provide media transcoding services if needed. The bridging functions for each media are distinct and are fundamentally different. The implementation of the media bridging functions for each kind of media may be done in three different physical servers. However, there has to be logically centralized control for all those media assuming that all of those audio, video, and/or data bridging functions for multipoint VC are needed for the single call that has been established by AS-SIP. It should be noted that media bridging is a complex and the throughput capacity for the audio, video, and/or data can be very significant. The design of the media server needs to be addressed very carefully considering the scope of worldwide global Army LWN warfighter network. As a result, like Ass, the media server architecture should also be logically centralized, but physically distributed. Moreover, the media server needs to work in sync under the control of the VC AS. It requires a protocol to be used between the media server and the VC AS. In the future, the detail architecture of this application will be described in detail Presence, Instant Messaging (IM) & Chat Application Server(s) Presence, Instant Messaging (IM), and Chat are interrelated real-time text-based communications applications. The presence application indicates the status information that conveys ability and willingness of a potential user or participant known as communication partner or buddy including whether the user is currently logged-on (offline messages) or connected to the network with type of devices in real-time. Unlike , IM is the real-time text-based communications between the two or more users in real-time using presence information of participants. On the other hand, when IM is used for communications among two or more participants as a group or a group within a logically created conference room in real-time is termed as chat. U.S. Army Unified Capabilities Reference Architecture Page 58 of 97
60 If the Presence, IM & Chat services are offered as stand-alone data application services without integrating with audio and/or video, Army UC RA uses IETF standard-based Extensible Messaging and Presence Protocol (XMPP) for the real-time text-based Presence, Instant Messaging (IM), and Chat applications. When Presence, IM & Chat services are offered integrated with audio and/or video session, AS-SIP protocol is used by Army UC RA. In the future, the detail architecture of this application will be described in detail Unified Messaging Application Server(s) Unified Messaging (UM) is the integration of different messaging applications and systems into a single interface accessible from a variety of devices. and voic have the primary driver for integration for UM. Recently, the short messaging system (SMS), video messaging, fax, and other messaging systems have also been included as a part of UM due to popularity of this service saving time and money of users. For example, unified messaging may send faxes and digitized voic to a mail server that turns them into attachments. Audio-based [UM] systems convert messages to speech (text-to-speech) in order to deliver messages to a desk phone or cell phone. A variety of protocols like SMTP, AS-SIP, XMPP, and others can be used. In the future, the detail architecture of this application will be described in detail Calendaring & Scheduling Application Server(s) The Calendaring and Scheduling is the text-based application that allows the scheduling of appointments with one or many desired attendees at appropriate date, time, and place. Many IETF technical standards such as IETF RFCs 24455, 2739, and are being developed for this application. This can be accomplished using the calendaring features within commercial software applications like Microsoft Outlook and Lotus tes. Calendar features can be shared by enterprise end users who all have the same application, e.g., employees of an enterprise who have the MS Outlook client and use MS Exchange servers. Some calendar features (like making appointments and scheduling meetings) can also be shared by enterprise end users who have different applications, e.g. some who have Outlook and others who have Lotus tes. These features can be shared by exchanging calendar entries in messages, and using file formats like vcalendar (.vcs) and icalendar (.ics) to attach the entries to the messages. Scheduling is broader than calendaring in that it also includes the ability to schedule conferences (voice, video, and/or web) with multiple conference participants. For example, a conference controller may use an /calendaring application to arrange a date and time when all participants are available, and then use a conference reservation process to schedule a conference (voice, video, and/or web) on an enterprise conference bridge. (Some enterprise VoIP users simplify this step by setting up a permanent 24x7 conference reservation on their local conference bridge that uses a dedicated dial-in number and conference pass code.) The /calendaring application can then be used to notify the participants of the dial-in number and/or Web URL for the conference. In the future, the detail architecture of this application will be described in detail. U.S. Army Unified Capabilities Reference Architecture Page 59 of 97
61 4.2.8 E.164 Number Mapping (ENUM) Application Server(s) DoD UC network architecture needs to facilitate the interworking between the TDM and IP network for voice/video/data communications. However, TDM network uses ITU-T s E.164 numbers (ENUM) known as telephone numbers while IP network uses IETF s IP addresses that can be expressed in URIs. Telephones over the IP networks also use E.164 numbers in addition to IP addresses. ENUM is a protocol that provides mapping between E.164 numbers into uniform resource identifiers (URIs) as described in RFCs 6116 and 6117 using DNS in the Internet and then to the IP addresses. The way it works is as follows: It first transforms E.164 numbers into ENUM domain names and then uses the DNSbased architecture to access records from which the URIs are derived. The important capability is that ENUM allows keeping the exiting telephone numbering plan or its administration without modifying it bridging between TDM and IP networks. ENUM uses the DNS Naming Authority Pointer (NAPTR) resource record type to store its dynamic delegation discovery system (DDDS) rules into DNS domains. ENUM relies on DNS services and, thereby, some design trade-offs need to be made what load ENUM provisioning and queries will place on the DNS. In the future we will describe the complete ENUM architecture for the Army UC RA E.911 (Emergency Call) Application Server(s) The Army UC Emergency (E-911) call architecture is a hybrid architecture that leverages the capabilities of both IP and TDM network because the E-911 call architecture using AS-SIP call control protocol is still emerging. Public Safety Access Points (PSAPs)-based E-911 call architecture over the TDM network is quite stable and is serving the needs for a long time. The seamless integration of the E-911 architecture over both IP and TDM network has been termed as the Next Generation 911 (NG-911) architecture. While a great deal of progress has been made, Next Generation 911 (NG-911) standards are still a work-inprogress. The NG-911 infrastructure (e.g., Emergency Call Routing application servers and associated databases) is expected to take several years to implement. Standards to ensure the security of 911 related information both at-rest and in-transit are also a work-in-progress. It should be noted that AS-SIP protocol is used over the IP portion of the Army LWN. In the future, the detail architecture of this application will be described in detail Transaction Capabilities Application Part (TCAP) Application Server(s) The TCAP enables the deployment of advanced intelligent network services by supporting non-circuit related information exchange between signaling points using the Signaling Connection Control Part (SCCP) connectionless service in common signaling system 7 (SS7) networks of the TDM network. However, recent development of stream control transmission protocol (SCTP) that also offer connectionless services has made the use of the TCAP applications versatile for being used equally over both IP and TDM network replacing the SCCP. A service switching point (SSP) uses TCAP to query a signaling point control point (SCP) to determine the routing number(s) associated with a dialed 800, 888, or 900 numbers. The SCP uses TCAP to return a response containing the routing number(s) (or an error or reject component) back to the SSP. Calling card calls are also validated using TCAP query and response messages. TCAP can use multiple transactions per application/subsystem number, assemble application components (operation invokes and replies) and parameters into TCAP messages, associate results with invoke, and handle U.S. Army Unified Capabilities Reference Architecture Page 60 of 97
62 abnormal conditions: protocol errors, timeouts, and borated transactions. In fact, The TCAP IP Gateway (TIGW) is used in the AS-SIP-based Army UC network for intelligent TDM/Wireless routing as well as being the legacy signaling gateway for application servers for seamless services over both IP and TDM network. The detail of the TCAP services architecture will be addressed in the future. In the future, the detail architecture of this application will be described in detail Desktop Sharing Application Server(s) Desktop sharing is primarily the real-time collaboration as an important component of rich multimedia communications that can encompass a host of applications such as audio, video, web, whiteboard, presence, instant messaging, chat, unified messaging, calendaring and scheduling, , multimedia messaging, and/or other applications sharing as described earlier. Thus, desktop sharing used in conjunction with other components of multimedia communications creates the notion of virtual space where people can meet, socialize and work together. However, AS-SIP protocol is used for communications with the SCF. In the future, the detail architecture of this application will be described in detail Short Message Service (SMS) Application Server(s) SMS, as described earlier, is basically a popular standardized text message service in low bandwidth and error-prone cellular mobile wireless communications networking environments. SMS allows the exchanges of short messages between fixed landline, satellite link, or mobile phone devices. It has become an integral part of the service component cellular mobile phones like voice and web services. It has been standardized by Global System for Mobile Communications (GSM). Most SMS messages are mobile-to-mobile text messages though the standard supports other types of broadcast messaging as well. This service is also offered to the Army UC mobile users connected to the Army LWN via external cellular carriers networks. SMS can also be used for emergency services, invoking voice calls, or many other services. However, AS- SIP protocol is used for communications with the SCF. In the future, the detail architecture the SMS application will be described in detail Multimedia Message Service (MMS) Application Server(s) MMS is an extension to the SMS protocol standardized by Third Generation Partnership Project (3GPP). MMS defines a way to send and receive, almost instantaneously, wireless messages that include images, audio, and video clips in addition to text. Even it will support the transmission of streaming video. An intermediate technology, Enhanced Messaging Service (EMS) has more capabilities than SMS, but fewer than MMS. Unlike MMS, EMS doesn t require upgrades to network infrastructures. Unlike SMS and EMS, the size of an MMS message is unlimited, although service providers are likely to impose their own size restrictions. The interoperability between MMS and has also been standardized in the IETF. AS- SIP/SOAP/HTTP protocols are used by the MMS AS. More detail architecture for the Army UC MMS services will be addressed in the future Wireless Application Protocol (WAP) Application Server(s) Wireless Application Protocol (WAP) is an application layer open protocol that allows supporting the interactive non-real-time data applications like web browsers in low bandwidth error-prone mobile cellular wireless networking environments. WAP is a layered protocol suite consists of Wireless Application U.S. Army Unified Capabilities Reference Architecture Page 61 of 97
63 Environment (WAE), Wireless Session Protocol (WSP), Wireless Transaction Protocol (WTP), Wireless Transport Layer Security (WTLS), and Wireless Datagram Protocol (WDP). Underneath WDP protocol suite, any wireless data networks (e.g. TDM, packet) can be supported. WTLS, an optional layer, provides a public-key cryptography-based security mechanism similar to TLS. WTP provides transaction support (reliable request/response) adapted to the wireless world. WTP supports more effectively than TCP the problem of packet loss, which occurs commonly in cellular wireless networks in most radio conditions, but is misinterpreted by TCP as network congestion. More detail architecture for the Army UC WAP services will be addressed in the future Location Services (Fixed/Mobile) Application Server(s) The Location Service is an application that manages the location information of the user that uses UC services over the Army worldwide global LWN warfighter networks. In static warfighter networking environments, a terminal s network address serves two purposes: End-point identifier and Location identifier. That is, a single network address servers these two purposes simultaneously. In the AS-SIP network, the location management AS keeps the SIP contacts and other information in the database. The SIP registrar stores contacts and other information of users in the location management server. An MFSS or LSC communicates with the location management server for address resolutions in order to route SIP messages to users or other servers such as MFSSs or LSCs. Like, any other Ass, this location management AS should also have distributed architecture. However, it is expected that the communication protocol between the location management AS and the MFSS or LSC will be AS-SIP. The key aspect of the Army UC warfighter network is mobility where warfighters will be moving from one place to another and the wireless communications will be predominant especially for the dismounted soldiers. Location management involves maintaining location information as mobiles power-on, move or power-off. The important point is that mobility prevents using a single address for both end-point identifier and location identifier purposes. Both end-point identifier and location identifier are needed, and the location management application needs to keep mapping between an end-point identifier and its location identifier turning into basically a directory lookup problem. Two primitive operations are done by the location management server: Lookup operation and Update operation. The lookup operation is the search, find, paging, and/or locating procedure by which the warfighter network finds the location of the mobile. It is required when an AS-SIP call (message) is placed (to be delivered) to a user. The update operation is the tracking, move, and/or registration procedure by which the network elements update information about the location of the mobile. It is required when a user changes its location. The information gathered during updating/tracking is used during the locating operation. The AS-SIP has the inherent capability to manage the user mobility, terminal mobility, and service/session mobility, as described earlier, at the applications layer. The impact of mobility in the lower network (e.g. mobile IP) and link/physical layer (e.g. MAC protocols/modulation schemes in wireless mobile environments) will be addressed accordingly. In the future, the detail architecture the SMS application will be described in detail. U.S. Army Unified Capabilities Reference Architecture Page 62 of 97
64 4.3 Seamless Mobility Services The UC architecture enables the seamless mobility where a warfighter user will have the ability to move a multimedia call from between cellular wireless network, Wi-Fi network, satellite network, and wired network. In UC Architecture, warfighter users can be identified as people who can use different access technologies and devices for seamless services anytime, anywhere. We have not specified any particular UC application server(s) for these mobile services other than the location management services that are applicable for both fixed and mobile users in the earlier section. With respect to mobile users, the ad hoc mobile network (MANET) aspects of the location services have not been included earlier as MANET architecture of the Army UC RA will be addressed later. Except MANET, all other mobility aspects described in this section is applicable for all UC services UC Mobility Environments Mobility provides the ability to offer wireless and wired access, and applies to voice, , and many other communication applications. It includes terminals/devices such as personal digital assistants (PDAs) and smartphones. In addition, it provides for users who move to gain access to enterprise services at multiple locations (e.g., person s telephone number and desktop follow the person). Smartphones are multifunctional devices that are considered wireless, handheld computing devices and, provide services beyond minimal telephony. Smartphones can have different form factors and names including mobile phone, wireless tablets, personal digital assistants, or other devices providing smartphone-like capabilities. Mobility may constitute of Terminal Mobility and User Mobility. In addition, mobile systems can provide service mobility/portability and session mobility/portability Terminal Mobility Terminal mobility is defined as the ability of a terminal, while perhaps in motion, to access services from different points of attachment to the access networks, to maintain ongoing service sessions, and the capability of the system to identify and locate that terminal User Mobility User mobility is similarly defined as the ability of an end-user to access services, to maintain ongoing service sessions at any terminal on the basis of a personal identifier, and the capability of the whole system to provide those services in accordance with the user s profile. madic mobility is also termed as the user mobility where a user is in a remote place to be only connected via a network line satellite. User mobility involves the system capability to locate the terminal associated with the end-user for the purposes of addressing, routing, and charging of the end-user Service/Session Mobility The mobility systems shall support both user mobility and terminal mobility and shall realize both service mobility/portability and session mobility/portability where a session is considered as the instantiation of a U.S. Army Unified Capabilities Reference Architecture Page 63 of 97
65 service. Service portability is defined as the end user s ability to obtain subscribed services in a transparent manner regardless of the end user s point of attachment to the network. The key UC objective is to provide service continuity by ensuring mobile warfighters telephone numbers, addresses, and communication and collaboration tools remain constant as their mission and location change. To achieve this objective, the UC architecture will address the issues of service discovery, logically centralized authentication and authorization, and centralized directory integration and access. Service discovery is focused on allowing a roaming end user s client to discover the location of the service (that is, LSC, server, unified messaging server, XMPP server). Logically centralized authentication and authorization permits roaming users to access the network and receive their assigned privileges. Logically centralized directory integration and access is associated with ensuring a roaming user has access to enduser lookups (that is, white pages) and to enable automatic user provisioning Network Mobility UC will also address the network mobility where an entire network changes as a unit its point of attachment to the with respect to core IP network and thus its reachability in the topology. The mobile network may include one of more mobile routers which connect it to the main core IP network. The mobile network may be used as the leaf network, that it, it will not carry any transit network Ad Hoc Mobility UC, however, will not address the mobility aspect of the infrastructure-less mobile ad hoc network (MANET) where all IP nodes will move from one place to another in ad hoc fashion in pursuit of random enemies in meeting warfighter mission objectives at this point of time. In MANET, all mobile nodes are assumed to be independent and move randomly in pursuing the random mobile objects for meeting mission objectives. As a result, all mobile nodes act as independent mobile peers and communications need to be performed in peer-to-peer (P2P) environments. The P2P communications require the communications architectures as well as the applications must have the P2P architecture. Recently, IETF P2PSIP Working Group (WG) is developing the P2PSIP technical standards that are primarily the modifications and enhancements of the existing client-server SIP technical standards. UC will also use the Assured Services Peer-to-Peer Session Initiation Protocol (AS-P2PSIP) for session control. It is seen from the UC networking architecture point of view that MANET will remain mostly in the access networks. The access MANET networks will communicate primarily with the IP/MPLS backbone network that has the fixed network infrastructure. It is worthwhile to note that IETF has already developed the routing protocols for the MANET network. UC may also use one (e.g. OSPFv3 with MANET Extensions) of those routing protocols or Optimized Link State Routing (OLSR) protocol for the IP access networks. Moreover, Army has developed a prototype P2P MANET management protocol through small business innovative research (SBIR) program. Similarly, all other UC applications need to have the P2P application protocol architecture. The details of the MANET network architecture of Army UC RA will be addressed later. U.S. Army Unified Capabilities Reference Architecture Page 64 of 97
66 4.3.2 UC Mobility Management Functionality UC Mobility Management environments are defined as a functional component that firstly keeps track of the IP-addresses of mobile end-users, and secondly modifies the IP routes of the ongoing sessions of mobile end-users. Additionally, Mobility Management includes the function of detecting mobility and selecting a new access network. Location Management keeps track of (or discovers) the current attachment points of mobile end-users, thus enabling other end-users to initiate new sessions towards the mobile end-user. Generally, IP mobility solutions dynamically keep the IP address(or addresses) of the mobile end-user in a registrar, generally referred to as Location Registrar, which binds between the identification of the mobile end-user and one s current IP address(or addresses). Every other session initiator is aware of the location of or knows how to reach the Location Registrar, based on the mobile end-user s identification (that, in turn, depends on the mechanism used). The session initiator contacts the Location Registrar that either returns the current IP address of the mobile end-user to the initiator or forwards the session initiation request towards the mobile end-user s current IP address. Location Management encompasses the following sub-functions: Address Update (to dynamically maintain mobile end-users IP addresses) Session Invitation Handling (to associate a suitable IP address of the mobile end-user, that is, the called party, with the invitation) Paging (to find the exact location of a mobile end-user) Handover Management maintains a mobile end-user s ongoing session(s) as one s corresponding IPaddress (or addresses) changes (change). The sessions of a mobile end-user can be handed over collectively or separately. Handover Management encompasses two sub-functions: Session Route Regeneration (to find and reserve the resources for the new session path) and Data Flow Control (to maintain the delivery of the data from the old session path to the new session path, in accordance with the session requirements). Network Access deals with mobility detection, access network selection and new IP address acquisition, thus enabling a mobile end-user s terminal to send and receive IP traffic (that is, to have IP connectivity) within an Intranet and/or the Internet. Network Access sub-functions are: Access Network Detection Access Network Selection Terminal Interface Configuration It should be noted that Network Access sub-functions are prerequisite functions to the Location Management and Handover Management. U.S. Army Unified Capabilities Reference Architecture Page 65 of 97
67 4.3.3 Mobile IP Like telephone number portability, mobile IP services also allows to keep the same IP address no matter where a user moves over the IP network. The mobile IP is equally applicable over both wireline and wireless IP network. The external carrier s cellular wireless networks (e.g. AT&T, Verizon, Sprint, and T- mobile) that DoD will be using for connecting the warfighters using MCEP/MVNO services can also offer mobile IP services. The Mobile IP protocol allows location-independent routing of IP datagram on the Internet. Each mobile node is identified by its home address disregarding its current location in the Internet. While away from its home network, a mobile node is associated with a care-of address which identifies its current location and its home address is associated with the local endpoint of a tunnel to its home agent. Mobile IP specifies how a mobile node registers with its home agent and how the home agent routes datagram to the mobile node through the tunnel. If the DoD warfighter users can keep the same IP addresses like telephone number portability as users move from one place to another over the IP network (wireless and wireline), it will minimize the IP address allocation, network configurations and service provisioning drastically for both wireline and wireless IP network. The detail of the DoD UC mobile IP architecture will be addressed in the future. 4.4 Content Management Content management (CM) is the set of applications that support the collection, managing, and publishing of information typically referred to as content or, to be precise, digital content. Digital content may take the form of text (such as documents), multimedia files (such as audio or video files), or any other file type that follows a content lifecycle requiring management. In an enterprise, the CM applications are used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. These applications allow the management of an organization s unstructured information, wherever that information exists. Web content management technology addresses the content creation, review, approval, and publishing processes of Web-based content. Key features include creation and authoring tools or integrations, input and presentation template design and management, content re-use management, and dynamic publishing capabilities. The CM application tools also perform collection that groups the data items that have some shared significance to the problem being solved and need to be operated upon together in some controlled fashion. Generally, the data items will be of the same type or, in languages supporting inheritance, derived from some common ancestor type. Lists, sets, bags (or multi-sets), trees and graphs can be some different kinds of collections. The CM tools are also used for categorization through recognition and differentiation of different objects. Categorization tools automate the placement of content (document images, , text documents, i.e., all electronic content) for future retrieval based on the taxonomy. CM Interoperability Services (CMIS) is open standard that defines an abstraction layer for controlling diverse document management systems and repositories using web protocols. CMIS defines a domain model plus Web Services and Restful AtomPub (RFC5023) bindings that can be used by applications. U.S. Army Unified Capabilities Reference Architecture Page 66 of 97
68 OASIS, a web standards consortium, approved CMIS as an OASIS. In the future, the detail architecture the SMS application will be described in detail. 4.5 Records Management The Records Management (RM) applications group consists of Scheduling, Disposition, ediscovery, Legal Hold, and Secure Destruction application service. RM deals with planning, controlling, directing, organizing, training, promoting, and other managerial activities involving the life cycle of information, including creation, maintenance (use, storage, retrieval), and disposal, regardless of media. DoD and ISO have defined many technical standards for RM. In the future, the detail architecture the SMS application will be described in detail. 4.6 Team Collaboration The team collaboration application software is used to create, manage, organize, store, publish, control versions, search through, collaborate and share any kind of information by users, organizations, and communities as a group that may be globally dispersed. This kind of team collaborative applications facilitates sharing knowledge and workloads, learning to overcome issues together, providing mutual help and support, building consensus and streamlining team collaboration model continually. Organization of effective team collaboration includes setting rules and structure of relations, agreeing team backgrounds with all team members, composing appropriate instructions and regulations. The example core elements of a collaboration applications can be messaging ( , calendaring and scheduling, contacts), team collaboration (file synchronization, ideas and notes in a wiki, task management, full-text search), and realtime communication (e.g., presence, instant messaging, Web conferencing, application / desktop sharing, voice, audio and video conferencing). A good number team collaborative application including Lotus tes, SharePoint, and many others commercial-off-the-shelf (COTS) products are available in the market. The Software-as-a-Service (SaaS) of the cloud computing is a good platform in offering the team collaboration services. In the future, the detail architecture the SMS application will be described in detail. 4.7 Business Process Management The Business Process Management (BPM) applications use a set of software tools that are used to implement business processes through the orchestration of activities between people and systems. Orchestration describes the automated arrangement, coordination, and management of complex computer systems, middleware, and services. These applications are used in a well-defined BPM architecture whose patterns can be viewed in the following layers: User Interface Layer, BPM Tools Layer, Storage Layer, and Interfaces Layer. The User Interface layer can be implemented either through the webbased tools provided with the BPM software, or via custom user interface development which interfaces with the BPM software. The BPM Tools layer provides the core BPM functionality (e.g. Workflow). The U.S. Army Unified Capabilities Reference Architecture Page 67 of 97
69 Storage layer provides repositories for both business process models and corporate data. The Interfaces layer provides means to exchange data with the BPM Tool. BPM application software tools provide business (e.g. warfighter applications) users with the ability to model their business processes, implement and execute those models, and refine the models based on asexecuted data. As a result, BPM application tools can provide transparency into business processes, as well as the centralization of corporate business process models and execution metrics. In addition, BPM suite software provides programming interfaces (web services, application program interfaces (APIs)) which allow enterprise applications to be built to leverage the BPM engine. Tools related to Modeling and simulation functionality allow for pre-execution what-if modeling and simulation. Post-execution optimization is available based on the analysis of actual as-performed metrics. The technical standards like Business Process Modeling Language (BPML) and the Business Process Query Language (BPQL) are defined to enable the standards-based management of e-business processes with forthcoming Business Process Management Systems (BPMS), in much the same way SQL enabled the standards-based management of business data with off-the-shelf Database Management Systems (DBMS). On the back-end of the BPM architecture, technology integration standards such as XML Schema, SOAP, and J2EE enable the convergence of legacy infrastructures toward process-oriented enterprise computing. On the front-end, emerging standards such as ebxml, RosettaNet, and BizTalk support the process-level collaboration among business partners. In the future, the detail architecture the SMS application will be described in detail. 4.8 Web 2.0 Web 2.0 services group consists of many applications such as WiKi, Blog (Team/Personal), Social Network, Groups, Forums, and Micro Blog. Web 2.0 facilitates to use web as a platform not just retrieving of information, and the Web Oriented Architecture (WOA) that extends service-oriented architecture (SOA) to web based applications is an important piece of Web 2.0. It is a loosely defined intersection of web application features that facilitate participatory information sharing, interoperability, user-centered design, and collaboration on the World Wide Web (WWW). Data in Web 2.0 using WOA is represented by resources on the network. These resources are identified by their URI and are accessed and manipulated over the HTTP protocol. Creating a Web page in HTML or XHTML automatically creates a read only WOA Web Service. The data format is in extensible Markup Language (XML), Representational State Transfer (REST), Atom Syndication Format (ATOM) or Media Type for JavaScript Object tation (JSON). Information in a WOA is represented in the form of resources on the network and are accessed and manipulated via the protocol specified in the URI, typically HTTP. Every resource on the network can located via a globally unique address known as a Universal Resource Identifier or URI. Manipulation of network resources is performed solely by components on the network (essentially browsers and other Web servers). WOA resources contain embedded URIs that build a larger network of granular representative state (i.e. order resources contain URLs to inventory resources). A Web 2.0 site allows users to interact and collaborate with each other in a social media dialogue as creators of user-generated content in a virtual U.S. Army Unified Capabilities Reference Architecture Page 68 of 97
70 community, in contrast to websites where users (consumers) are limited to the passive viewing of content that was created for them. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, web applications, mashups and folksonomies. In the future, the detail architecture the SMS application will be described in detail. 4.9 Apps (Applications) Apps (Applications) services group consists of Market, Code Repository, Rating, Certification, Accreditation, Code Scan, Distribution, and Patching & Upgrading. Application software, also known as an application or an app, is computer software designed to help the user to perform specific tasks. Examples include enterprise software, accounting software, office suites, graphics software and media players. Many application programs deal principally with documents. Apps may be bundled with the computer and its system software, or may be published separately. Application software is contrasted with system software and middleware, which manage and integrate a computer s capabilities, but typically do not directly apply in the performance of tasks that benefit the user. The system software serves the application, which in turn serves the user. In the future, the detail architecture the SMS application will be described in detail Portals Portals can have A portal is a web based application that commonly provides personalization, pluggable interfaces like portlets, audience targeting, authentication, and content aggregation from different sources and hosts the presentation layer of information systems. Aggregation is the action of integrating content from different sources within a web page. A portal may have sophisticated personalization features to provide customized content to users. Portal pages may have different set of portlets creating content for different users. The pluggable user interface software components that are known as portlets are managed and displayed in a web portal. Portlets produce fragments of markup code that are aggregated into a portal. Typically, following the desktop metaphor, a portal page is displayed as a collection of non-overlapping portlet windows, where each portlet window displays a portlet. Hence a portlet (or collection of portlets) resembles a web-based application that is hosted in a portal. Some examples of portlet applications are , weather reports, discussion forums, and news. A portal that can be used to provide special treatment in the form of information and applications matched to a visitor s interests, roles, and needs is known as personalization of portal. A number of personalization techniques, can be used to target advertising, promote products, personalize news feeds, recommend documents, make appropriate advice, and target e- mail. AJAX, icalendar & Micro format, Java Specification Request (JSR)-168, JSR-127, JSR-170, JSR-286 (Portlet 2.0), JSF-314 (JSF 2.0), OpenSearch, CM Interoperability Service (CMIS) and other technologies are used for Portals. In the future, the detail architecture the SMS application will be described in detail. U.S. Army Unified Capabilities Reference Architecture Page 69 of 97
71 4.11 Profiles The profiles applications group consists of Organizational Profiles, Team Profiles, and Individual User Profiles application. The Individual User Profile is an application that provides a collection of personal data to a specific user in the context of using the UC services over the DoD worldwide global warfighter networks. The profile may include, but not limited to, the explicit digital representation of a person s identity; point of contacts or addresses of devices of the user for receiving and accessing each UC services during different specific time periods depending on time of a day and the day of a week; personal preferences for using each kind of UC services; security, priority, quality-of-service (QoS), and policy criteria that needs to applicable for accessing or using a given UC service; kinds of devices that are used for accessing or using UC services; roaming profiles and kinds of services to be provided to the user; specific settings of each UC application for the specific user; and many other information that are specific to the user. This information stored in the registry of a database is opaque to user profiles settings. It is expected that an MFSS or a LSC can access to the record of the user profile to offer UC services to the user in accordance to the criteria stored in the profile. The user profile application server may have a huge database because of millions of warfighter users will have their profiles stored in the database. As a result, the user profile AS architecture also needs to be distributed. It is also expected that the user profile AS will be using the AS- SIP protocol as the open interface. The same is also applicable for Organizational Profiles or Team Profiles. In the future, the detail architecture the SMS application will be described in detail Search & Discovery The Search & Discovery services group consists of many individual applications such as Indexing, Metadata Tagging (Organization, Individual, and Personal), Contextual Results, and Security Trimming. Search and Discovery services are quite different. In search services, known key words that are descriptive so as to qualify exactly what is being looked for are used in formulating a query in such a way as to improve the chances for an exact or partial match to some portion of the target object. Discovery, on the other hand, is exploratory in nature driven by a general goal. A search engine becomes a discovery engine when the query is used as a starting point from which to learn more about a particular topic. Just as hyperlinks within web documents facilitate the quick navigation through related topics of information, a discovery engine provides various facets of the result set in the form of navigational links. In search and discovery services, the Simple Service Discovery Protocol (SSDP) is used. SSDP is a network protocol based on the IP Suite for advertisement and discovery of network services and presence information, and is the basis of the discovery protocol of Universal Plug and Play and is intended for use in residential or small office environments. In addition, indexing, metadata tagging (organization, individual, and personal), results based on contexts, and security trimming are also used in SSDP. In the future, the detail architecture the SMS application will be described in detail. U.S. Army Unified Capabilities Reference Architecture Page 70 of 97
72 4.13 Information Assurance (IA) The IA consists of Public Key Infrastructure (PKI), Common Access Card Service, Claimed-Based Architecture, Attribute-Based Access Control, Policy Decision Service, Directory Service, Edge Border Controller (EBC)/Data-Firewall/Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), and Authentication, Authorization & Accounting (AAA) Services. The Army UC information assurance (IA)/security architecture ensures security across all protocol stacks from the upper application layer to the lower physical layer for all UC capabilities and services. The primary objective of the IA architecture is to provide authentication, authorization, integrity, confidentiality, and nonrepudiation. Of course, many other factors including availability of the systems and applications should also be the byproduct of the security architecture preventing all kinds of security attacks. As explained in the beginning, the UC Iawill be using all aspects of IdAM and TLA RA because are the essential ingredients of the UC security capabilities. However, UC RA is dealing with all security features of all layers from physical layer to the application layer (layer 1 to 7 in Open Standard International [OSI] terminology). For example, AS-SIP of UC call control application has user-to-user authentication with hypertext transport protocol (HTTP) digest/authentication, secured multipurpose internet mail extension (MIME) certificate and key exchanges in the application layer on the top of TLS. Similar is the case for other UC applications. So, the UC IA is the superset of IdAM and TLA RA. The Mission Assurance RA is not developed yet, but it is expected it will include the warfighter mission applications that will be built as value-added application on the top of the UC applications (RT, near-rt, and non-rt) including security. In this case, the Mission Assurance RA will be superset of the IA of Army UC RA. The important functional component of the UC security architecture is the use of the authentication, authorization, and accounting (AAA) server that uses IETF s RADIUS/DIAMETER security protocol. The architecture of the AAA server is distributed across the whole network and is used for security both fixed and mobile users for accessing in the network or using any services within the Army UC network. When any users need to access in the network using end-users devices, the network-based functional entities like LANs, routers, LSCs, MFSSs, servers, or applications, those functional entities will use the AAA server for authentication, authorization, accounting, security policies, and other security services before allowing the users to get access into the network or using any UC services within the network. In addition, firewalls (FWs), edge boundary controllers (EBCs), intrusion detection systems (IDSs), intrusion prevention systems (IPSs), and other functional entities are also used. However, Army UC RA is considering that these functionalities of EBC, FW, IDS, and IPS will be integrated in such a way that they work logically as a single functional entity. Because AS-SIP session may contain audio, video, and data application sharing under the same single session. A combination of these security functional entities uses multiple security mechanisms such as unauthorized access prevention (e.g. access control and perimeter security), management security (e.g. operations security), logging and auditing security, and continuous use innovative security schemes against new evolving cyber-warfare. U.S. Army Unified Capabilities Reference Architecture Page 71 of 97
73 The AS-SIP being in the application layer protocol has some inherent security capabilities at the application layer level. To start with AS-SIP uses the Transport Layer Security (TLS) protocol at the transport layer for transferring the SIP signaling messages. The TLS provides an approach for authenticating both the UC services and the users and securing the traffic exchange between the UC services and the users. Authentication in TLS consists of the server presenting the client with a valid certificate signed by the UC services certificate authority (CA) that is known to the client. That is, the UC client itself is configured with the root certificate of the UC services CA. For mobile users, the UC security model establishes the trust relationship between the users and the external carriers networks (e.g. AT&T, Verizon, T-Mobile) using authentication mechanisms including SIP s usage of HTTP digest-based authentication. To prevent fraud and accounting of calls, UC users are authenticated before forwarding the calls to its final destinations. However, this would increase the call setup time. In order to avoid having to authenticate each call, the AS-SIP services require to the users should register using AS-SIP registration mechanisms before initiating any AS-SIP sessions over the DoD UC network. During the registration step a security association is established and is subsequently used to authenticate the user s future requests. In addition, SIP has also security mechanisms known as SIP user identity where a user may have many identities including public and private identities for ensuring privacy. The strong identity authentication using secured multipurpose internet mail extension (S/MIME) that allows to prevent indentify and subscription theft. While using HTTP digest ensures that no entity other than the legitimate one can provide valid credentials, the scheme is still vulnerable to vital SIP headers, for instance Contact, To, and From, being modified in transit. As a result, S/MIME or TLS can be used to provide integration protection and confidentiality to the SIP messages. AS-SIP IA/security architecture that secures not only SIP signaling messages but also provides security for the exchanged media traffic. The IP security (IPSec) protocol provides a solid basis for securing the IP traffic. However, secure real-time protocol (SRTP) provides the application-specific security including media encryption for the media such as audio, video; text and specific application data (e.g. fax, whiteboard) that are exchanged during session established using SIP. It should also be noted that the dual stack Ipv4-Ipv6- based network may use NATs and firewalls that need to perform various processing on the media and therefore need to be able to access it in unencrypted form. Therefore, an end-to-middle security model that involves one or more trusted intermediate entities is also established in different UC service scenarios. The AAA servers, routers, servers, LSCs, or MFSSs are also used to implement the security policy across the global UC warfighter enterprise network as appropriate. The security policy architecture is based on IETF s policy technical standards as follows: Core enterprise Policy Decision Point (PDP) Service based upon authenticated user authorizations, subjects attributes, applicable policy and metadata that includes quality-ofprotection (QoP) information with access control lists: Program-owned services that leverage Core Enterprise Service (CES) PDP and Program-owned services that implement their own PDP must be compliant with subject attribute and metadata standards Page 72 of 97 U.S. Army Unified Capabilities Reference Architecture
74 Collocation of the Policy Enforcement Points (PEP) with the resource being accessed Mediation of cross-domain solution (CDS) for information flow utilizing the core enterprise service PDP with remote policy management Core credential validation service developed and deployed compliant with the Federated Identity Management & Authentication Standard to support authentication of claimed user/device identities for U.S. Army DoD (e.g., Army/DoD PKI), U.S. IC (e.g., IC PKI), U.S. DHS and 5-eyes nation public key based credentials. B. Reference implementations of credential validation service developed to enable individual organizations to deploy their own compliant authentication solutions. C. Public key enabled (e.g., Army/DoD PKI) authentication for workstation logon, network access, and applications beyond . The Border Gateway Protocol (BGP) IP/MPLS VPN has mechanisms to protect the IP infrastructure over the backbone network while VLAN protects the access LAN infrastructure as follows: Logical transport segment partitioning (e.g., MPLS, VLAN) to isolate high risk users; IA mechanisms for policing and enforcing QoS and priority, based on authenticated identities and subject and resource attributes (authorizations), within and across autonomous systems (including plaintext/cipher text boundaries); Rollout of standard Army LWN/GIG public key based digital identities for all Army LWN devices to support assured management and control and monitoring; Use of host and network-based firewalls, intrusion detection, virus detection, spyware/adware detection to prevent distributed denial of service attacks and ensure availability. Directory services that use lightweight directory access protocol (LDAP) provides a shared information infrastructure for locating, managing, administering, and organizing common items and network resources, which can include volumes, folders, files, printers, users, groups, devices, telephone numbers and other objects across the Army LWN which are needed for UC services. More importantly, the directory services are integrated with the Army IA systems. Finally, the Army/DoD Public Key Infrastructure (PKI) is being implemented for core credential validation services including the public key enabled authentication for UC services and applications, workstation logon, and network access. The security related to the Wi-Fi LANs that are used for AS-SIP services over the Army LWN networks also need to be addressed more specifically especially for mobile users. In the future, the Army UC RA IA/security architecture will be addressed in more detail. In the future, the detail architecture the SMS application will be described in detail. 5 Call Flows for Real-Time Communications Services The call setup process shows how different functional entities of the Army To-Be architecture interact among themselves for transferring audio, video, and/or data for both Real-Time Communications services and Enterprise Collaborative services. In teleconferencing (TC), video teleconferencing (VTC), and data collaboration along with TC and VTC, the call setup takes two phases: End-to-End Signaling and Media U.S. Army Unified Capabilities Reference Architecture Page 73 of 97
75 Transfer. That is, the call is set up first using signaling protocol (e.g. AS-SIP) on end-to-end via signaling entities (e.g. LSCs, WAN SSs, MFSSs) and then the media sent directly between the calling and called party without going through the signaling entities. In the call flows, we will be showing how the signaling traffic is sent on end-to-end using different signaling entities. On the other hand, the call signaling traffic and media are sent together directly on end-to-end path at the same time. 5.1 Assured Point-to-Point Audio/Video/Data Conferencing Figure 6 shows the point-to-point real-time conversational audio/video conference call flows between the end users that are located in different network end points. The key of the call flows is that it describes the UC To-Be architectural rules and principles that are in accordance to the Army global and/or low-level subsets of the global rules and principles described earlier. Local/Regional TDM/ISDN Network User A4 TDM Net MG/IWF/ SG Source TDM/ ISDN Switch SS7 Call Signaling User A4 Places a Call Destination TDM/ISDN Signals TDM/ISDN End User Switch Media Gateway, Signaling Interworking Functions, Signaling Gateway, and Media Gateway Controller TDM Media and SS7 Media and Signaling Interworking Packet Media and VoIP Signaling Part of Gateway Part of Gateway Signaling Part of Gateway These functions/capabilities of MGC, MG, SG, and IWF are realized in MFSS or Hybrid LSC User A1 User A1 Places a Call Yes Local/Regional Network Source LSC, SCF & EBC/FW/ IDS/IPS Local AAA, Policy & QOS Server Is Destination User in TDM Is Destination Network? Source LSC User Local? Yes Yes Are User Services Hosted in Send Call to the Appropriate LSC? Application Server Type(s) Yes SCF Local AAA, Policy & QOS Server Can Session Session is be Dropped Admitted? Yes EBC/ FW EBC/ FW EBC/ FW Session Allowed per Local Policies? Session is Dropped Yes Yes User A2 User A2 Accepts call Send Call to the Appropriate Application Server Type(s) Local App Servers UC Application Servers (Services Hosted by LSC Locally/Regionally) Service Type 1 Service Type 2... Service Type N Session Allowed per Local Policies? IP Global/Regional Wide Area Network WAN SS, SCF, Global AAA/ Policy/QOS Server & EBC/FW/IDS/IPS Global App Servers SCF Send Call to the Appropriate Application Server Type(s) UC Application Servers (Services Hosted by WAN SS/MFSS Globally) Service Type 1 Service Type 2... Service Type N Session is Dropped Can Session be Admitted? Yes Global AAA, Policy & QOS Server WAN SS EBC/ FW Yes Session Allowed Session is Dropped per Local Local/Regional Network LSC, Local AAA/QOS, EBC/FW User A3 User A3 Accepts call Session is Dropped Can Session be Accepted? Local AAA, Policy & QOS Server Destination LSC EBC/ FW Policies? Yes Session is Dropped Figure 6: Assured Point-to-Point Audio/Video/Data Conference Call (OV-6c) Page 74 of 97 U.S. Army Unified Capabilities Reference Architecture
76 Figure 6 depicts detailed rules and principles; however, the following are the summary of the high-level principles and rules: The RTC application server(s) must be in control of all calls implementing all capabilities/features in meeting Army UC RTC services. The LSC, MFSS, and WAN SS must use the AS-SIP signaling protocol for communications among themselves over the network. A LSC, MFSS, or WAN SS that hosts services must communicate with the SCF functional entity using AS-SIP protocol. A SCF must be capable to communicate with all application servers that control real-time communications services using open standard-based protocols (e.g. AS-SIP, RADIUS/DIAMETER, SOAP, HTTP/HTTPS, and others) as appropriate. The real-time communications application server(s) implementing the Army UC RTC services (e.g. Voice and Video Conferencing, Media Bridging/Transcoding, Security, and others) must use the open standard-based protocols (e.g. AS-SIP, RADIUS/DIAMETER, and others) for communicating through the SCF interfaces of WAN SSs, MFSSs, and LSCs while the communications protocol between the SCF and the WAN SS, MFSS, or LSC must only be the AS-SIP. WAN SS has only IP interfaces and uses only the AS-SIP call control protocol. An MFSS that has both TDM and IP interfaces will use AS-SIP call control protocol over the IP interfaces while ISUP call control protocol over the TDM interfaces and ISUP-SIP interworking function (IWF) along with media gateway controller (MGC) and one more media gateways (MGs). It may be noted that an MGC can control one or many MGs, and MGs may or may not co-located physically with the MGC providing scalable architecture. A LSC that has only IP interfaces will use only the AS-SIP call control protocol. A LSC that has both TDM and IP interfaces will use AS-SIP call control protocol over the IP interfaces while ISUP call control protocol over the TDM interfaces and ISUP-SIP interworking function (IWF) along with its media gateway and media gateway controller. A LSC that supports both AS-SIP and H.323 call control protocol over its IP interfaces, it must have AS-SIP and H.323 IWF. If a LSC interfaces to the PSTN, or to legacy (B/P/C/S) TDM systems, it must also support a Primary Rate Interface (PRI), using its Media Gateway and Media Gateway Controller. All LSCs must provide Precedence-Based Assured Services via AS-SIP/Assured Services Admission Control for IP and for TDM interfaces (where equipped) via its Media Gateway using the T1.619a protocol. Voice signaling must conform to the following rules: o There is a two-level signaling hierarchy: LSC and either a Multifunction Soft Switch (MFSS) or a Wide Area Network Soft Switch (WAN SS) LSC A to MFSS A (or WAN SS A) to MFSS B (or WAN SS B) to LSC B when the LCSs have different primary MFSS Page 75 of 97 U.S. Army Unified Capabilities Reference Architecture
77 LSC A to MFSS A (or WAN SS A) to LSC B when they have the same primary MFSS o The LSCs are assigned a primary and backup MFSS (or WAN SS) for signaling robustness Signaling from an IP End Interface to a LSC will be AS-SIP. If proprietary call control protocols are used for some existing systems, it has to be dealt with separately case-by-case basis. The LSC to LSC signaling is not permitted external to the security enclave except for use in cases involving deployable products operating in a single area of operational responsibility network that is not the Army LWN. o The LSC can set up: On-base sessions when a connection to an MFSS (or WAN SS) is lost. Sessions to PSTN trunks independent of an MFSS (or WAN SS). o Signaling A TDM End Office will signal via Common Channel Signaling System. 7 or PRI to MFSS. The MFSS will signal via PRI to the PSTN and to coalition gateways. Edge Border Controllers (EBC), Firewall (FW), Intrusion Detection Service (IDS), and Intrusion Prevention Service (IDS) are used to provide IA for voice/data call signaling and bearer traffic, and can be implemented as a single of multiple functional entities as appropriate. However, a standardalone EBC provides IA for data call signaling and bearer traffic. The authentication, authorization, accounting (AAA) server, policy server, and QoS server are separate entities although they have been shown in one logical box in the call flow diagrams. The steps for the point-to-point audio/video conferencing shown in Figure 6 are described as below: 1. User A1, known as the calling user in the IP network, located in the local network places a call to another user, known as the called (or callee) user via its pre-configured source LSC through which the calling user already registered in the network. a. The registration process is not shown in Figure xxx for simplicity. Users may be preprovisioned with definite service features in the Army LWN. A combination of dynamic registration and service provisioning features can be used where the user profiles will be stored in the user profiles application server (not shown in Figure xxx) via the LSC and WAN SS (or MFSS). b. It should be noted that AS-SIP protocol may be used between the user profiles application server and the SCF of the LSC and WAN SS (or MFSS). 2. The call goes to the local source LSC and the LSC contacts the local AAA, Policy & QoS server whether the call can be admitted based on the security, policy, and QoS features. If the session cannot be admitted, the call is dropped, otherwise, the LSC decides how to route the call based on the destination address of the called user. The destination address can be one of the followings: IP U.S. Army Unified Capabilities Reference Architecture Page 76 of 97
78 Local Network (from which the call has been originated) and Local LSC may or may not host services, IP Remote Network where WAN SS hosts services, or TDM Network where WAN SS hosts services (assuming that TDM application services have been unified through migration to the IP network-based application services and MFSS does not host services). a. If destination user A2 is located with the same local network from which the call has been originated, and if the local LSC hosts the services, the call proceeds as follows: i. The local LSC then sends the call to the SCF for sending the call to the appropriate local UC application server (s) for servicing the call based on the service features indicated in the call for which the users have been provisioned. ii. The UC application server(s) directs the local LSC via the SCF for setting up the call leg with the called user A2. iii. The local LSC sets up the call leg with the called user A2. iv. The called user A2 accepts the call. te: Before acceptance of the call, there can be call negotiations between user A1 and user A2 for audio and video codecs and their parameters along with early media, ring tone and other features. For simplicity, we have not shown. v. Once the session is set up, the media is sent directly between users A1 and A2 directly. b. If destination user is located with the same local network from which the call has been originated, and if the local LSC does not host the services, the call proceeds as follows: i. The local LSC routes the call to the WAN SS located in the Army LWN wider area network (WAN). However, EBC/FW/IDS/IPS systems are around in both local LSC and WAN SS for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the LSC to the WAN SS, otherwise, the call is dropped. ii. The WAN SS then checks with the global AAA, Policy, and QoS server whether the session/call can be admitted. iii. If the session is allowed to admit in the network, the WAN SS to set up the call leg with the local LSC, otherwise, the session is dropped. iv. The WAN SS then sends the call to its SCF for route the call to the appropriate global UC application server(s). v. The SCF then routes the call to the appropriate global UC application server(s) for servicing the call. vi. The UC application server(s) directs the WAN SS via the SCF for setting up the call leg with the local (source) LSC. vii. The WAN SS then sets up the call leg with the local (source) LSC. viii. The local (source) LSC then sets up the call leg with the called user A2. ix. The called user A2 accepts the call. te: Before acceptance of the call, there can be call negotiations between user A1 and user A2 for audio and video codecs and their parameters along with early media, ring tone and other features. For simplicity, we have not shown. U.S. Army Unified Capabilities Reference Architecture Page 77 of 97
79 x. Once the session is set up, the media is sent directly between users A1 and A2 directly. c. If the destination called user A3 resides in the remote IP network, the call proceeds as follows: i. The local LSC routes the call to the WAN SS located in the Army LWN wider area network (WAN). However, EBC/FW/IDS/IPS systems are around in both local LSC and WAN SS for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the local LSC to the WAN SS, otherwise, the call is dropped. ii. The WAN SS then checks with the global AAA, Policy, and QoS server whether the session/call can be admitted. iii. If the session is allowed to admit in the network, the WAN SS to set up the call leg with the source LSC, otherwise, the session is dropped. iv. The WAN SS then sends the call to its SCF for route the call to the appropriate global UC application server(s). v. The SCF then routes the call to the appropriate global UC application server(s) for servicing the call. vi. The UC application server(s) directs the WAN SS via the SCF for setting up the call leg with the destination LSC. vii. The WAN sends the call to the destination LSC. viii. The EBC/FW/IDS/IPS system of the destination LSC checks for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the WAN SS to the destination LSC setting up the call leg, otherwise, the call is dropped. ix. The destination LSC then sets up the call leg with the called user A3. x. The called user A3 accepts the call. te: Before acceptance of the call, there can be call negotiations between user A1 and user A3 for audio and video codecs and their parameters along with early media, ring tone and other features. For simplicity, we have not shown. xi. Once the session is set up, the media is sent directly between users A1 and A3 directly. d. If the destination called user A4 resides in the TDM network, the call proceeds as follows: i. The local LSC routes the call to the MFSS (or hybrid LSC with TDM and IP interfaces) interfacing both TDM and IP network of the Army LWN wider area network (WAN). However, EBC/FW/IDS/IPS systems are around the local LSC for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the LSC to the MFSS (or Hybrid LSC); otherwise, the call is dropped. te: We are assuming MFSS or Hybrid LSC does not host services due to full migration of services over the IP-based UC application servers. ii. The MFSS then routes the call to the WAN SS for serving the call by the appropriate global UC application server(s). U.S. Army Unified Capabilities Reference Architecture Page 78 of 97
80 iii. The EBC/FW/IDS/IPS system around the WAN SS checks for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the MFSS to the WAN SS setting up the call leg, otherwise, the call is dropped. iv. The WAN SS then checks with the global AAA, Policy, and QoS server whether the session/call can be admitted. v. If the session is allowed to admit in the network, the WAN SS to set up the call leg with the MFSS, otherwise, the session is dropped. vi. The WAN SS then sends the call to its SCF for route the call to the appropriate global UC application server(s). vii. The SCF then routes the call to the appropriate global UC application server(s) for servicing the call. viii. The UC application server(s) directs the WAN SS via the SCF for setting up the call leg with the MFSS. ix. The WAN sets up the call leg with the MFSS. x. The MFSS then routes the call to the destination called user A4 via the TDM switches over the TDM/ISDN network. xi. The called user A4 accepts the call. 5.2 Assured Point-to-Multipoint Centralized Audio/Video/Data Conferencing The assured centralized multipoint conference deals with a scenario where all Army users dial to the prioriknown UC conference bridge application server for audio, video, and/or data conferencing and the conference bridge application server controls the conferencing with a star-like topology establishing pointto-point connection between the conference server and each user. Figure 7 depicts the call signaling flows from an end user to the conferencing server. U.S. Army Unified Capabilities Reference Architecture Page 79 of 97
81 Local Net User Ax User Ax Places a Call to Conference Bridge. Local Net User A2 User A2 Places a Call to Conference Bridge. User A1 User A1 Places a Call to Conference Bridge Local/Regional Network Local LSC, SCF & EBC/FW/IDS/ IPS Source LSC EBC/ FW Session Allowed per Local Policies? Yes Session is Dropped Local AAA, Policy & QOS Server Local AAA, Policy & QOS Server Can Session be Admitted? Yes Session is Dropped Session Allowed per Local Policies? IP Global/Regional Wide Area Network WAN SS, SCF, Global AAA/ Policy/QOS Server & EBC/FW/IDS/IPS Global Conf App Servers Conf Bridge LSC, SCF, Local AAA/ Policy/QOS Server & EBC/FW/IDS/IPS SCF UC Conference Bridge Application Servers (Services Hosted by WAN SS/MFSS Globally Regionally) SCF Session is Dropped Send Call to the Appropriate Application Server Type(s) Service Type 1 Service Type 2... Service Type N Send Call to the Appropriate Conference Media Bridge Session is Dropped Can Session be Admitted? Can Session be Admitted? Yes Yes Global AAA, Policy & QOS Server WAN SS Local AAA, Policy & QOS Server Conference Media Bridge LSC EBC/ FW EBC/ FW Yes Session Allowed per Local Policies? Yes Session is Dropped Session is Dropped Global Conf Media Bridge Servers UC Media Bridging Servers (Services Hosted by WAN SS/MFSS Globally) Media Bridge 1 Media Bridge 2... Media Bridge K Figure 7: Assured Point-to-Multipoint Centralized Audio/Video/Data Conferencing (OV-6c) It should be noted that the conference bridge application server controls not only the call but also needs to provide media (audio/video/data) bridging and even transcoding. For the sake of scalability, the media bridging function of the conference bridge application server is done by a separate media (audio/video/data) bridge server and the media bridging service is being hosted a dedicated conference bridge LSC, but the control of the media bridging function still remains with the conference bridge application server. The multipoint conference call flows can be described as follows: 1. User A1 places a call to the UC conference bridge application server (assuming that the address of the server is priori known by each conference participant). 2. The local LSC (it is also the source LSC for this call) receives the call per priori configurations setup and checks with its local AAA, Policy & QoS server whether the call can be admitted. If the Page 80 of 97 U.S. Army Unified Capabilities Reference Architecture
82 session is allowed per security, policy, and QoS criteria, the call is sent by the LSC to the WAN SS via the EBC/FW/IDS/IPS. Otherwise, the call is dropped. 3. The EBC/FW/IDS/IPS systems of both source LSC and WAN SS check whether the call is acceptable per local policies. If the call is acceptable, the call is sent to the WAN SS, otherwise the call is dropped. 4. The WAN SS checks with the global AAA, Policy & QoS server whether the session can be admitted based on global security, policy, and QoS criteria. If the call is acceptable, the WAN SS sends the call to the appropriate UC conference bridge application server via the SCF. Otherwise, the call is dropped. 5. The SCF sends the call to the appropriate UC conference bridge application server. te: There can be many application servers including conference bridge application server communicating using open standards-based protocols such as AS-SIP, SOAP/HTTP/HTTPS, and others that are hosted by the WAN SS and there can be multiple physical servers for each kind of application for load balancing as well, and a SCF chooses one of the particular server based on some rules. 6. The UC conference bridge application server examines the call and finds that the call needs media (audio/video/data) bridging and instructs the WAN SS via SCF to set up the call-leg with the conference media bridge LSC. 7. The WAN SS receives the call from the UC conference bridging application server and set up the call leg with the conference media bridge LSC. 8. The EBC/FW/IDS/IPS systems of both conference media bridge LSC and WAN SS check whether the call is acceptable per local policies. If the call is acceptable, the call is sent to the conference media bridge LSC, otherwise the call is dropped. 9. The conference media bridge LSC checks with its local AAA, Policy & QoS server whether the session can be admitted based on global security, policy, and QoS criteria. If the call is acceptable, the LSC sends the call to the appropriate UC conference media bridge server via the SCF. Otherwise, the call is dropped. 10. The SCF sends the call to the appropriate UC conference media bridge application server. te: There can be many physical conference media (audio/video/data) bridge servers communicating using open standards-based protocols such as AS-SIP for load balancing, and SCF chooses one of them using some rules. 11. The UC conference media (audio/video/data) bridge server receives the call and prepares itself for bridging of the media of each user with the media (audio/video/data) of other users as per service features of the call. 12. Similarly each user (e.g. user A2, Ax) sets up the call with the UC conference bridging application server using steps 1 through Once the conference call is set up with the conference participants, the server bridges each kind of media and distributes the media directly between the users in accordance to the conference policies. U.S. Army Unified Capabilities Reference Architecture Page 81 of 97
83 5.3 IM/Chat/Presence Communications (Integrated with Audio and/or Video) The Instant Message (IM)/Chat/Presence service, when used integrated with audio and/or video is being provided by Session Initiation Protocol (SIP) developed by IETF SIMPLE Working Group (WG). A couple of Request for Comments (RFCs) related to IM/Chat/Presence are being developed by SIMPLE WG and are also included in DISR. The details of the Point-to-Point and Point-to-Multipoint IM/Chat/Presence call flows will be the same to those the call flows shown in Figures 8 and 9, respectively. 6 Call Flows for n-real-time Communications Services The non-real-time UC applications that do not contain audio and/or video are can be termed as data applications, and operate in client-server (C-S) mode. Like all applications servers, each of these UC application server also needs to be distributed as explained in the case of XMPP-based IM/Chat application server described below. The call flows of each collaborative enterprise application service will be like those of the IM/Chat application explained in the next section except that they will use different application protocols other than XMPP. For example, in the case of the web services, the application protocol sets can be SOAP/WDSL/HTTP/HTTPS. 6.1 IM/Chat /Presence Communications (Stand-Alone) The Instant Message (IM)/Chat/Presence service, when used as a stand-alone service, is being provided by the Extensible Messaging and Presence Protocol (XMPP) application server. For scalability of the services, a given application server is geographically distributed, but all the servers will behave as a single logically centralized application server. In this context, we have created a logical hierarchy of the XMPP application server. The entire Army LWN network has been divided into certain logical domains that may be called local or regional network. There is a local/home/source XMPP server in each domain. The global XMPP application server controls all other local/home/source XMPP application servers. Each local/home/source XMPP server provides the services to the users that are located within its service domain and registered with this server. If the source-destination users for IM/Chat communications remain in the same domain, the local/home/source XMPP server of that domain serves the call. If the sourcedestination users remain in two separate domains, the local/home/source XMPP server sends the call to the global XMPP server and the global XMPP server then sends the call to the remote local/home/source XMPP server where the destination user is located. Finally, the remote local/home/source XMPP server sends the call to the destination user. In fact, all other application servers that provide different services will use the same or similar distributed server architectural principles for each kind application server including point-to-point and multipoint conferencing services. The IM/Chat scenario, an Army user sends an IM to another user. The high-level rules which govern this operation are [1]: U.S. Army Unified Capabilities Reference Architecture Page 82 of 97
84 Instant Messaging and Chat servers must use the XMPP as described in the latest version of the Unified Capabilities Requirements for client to server (C2S) and server to server (S2S) communication DoD Components must use IM and Chat products from the UC APL if they want to establish S2S communication across the Wide Area Network All XMPP streams, including both C2S and S2S connections, must be secured with the use of TLS Proprietary C2S protocols are permitted within the context of a Military Department enclave, but must be able to federate with native XMPP servers by means of an XMPP S2S stream enabled through the use of an XMPP gateway implementation An XMPP client must connect to its local/home server in order to be granted access to the network and subsequently to be permitted to exchange instant messaging and presence information with other users/services As with the voice and video scenarios, the detailed rules and requirements for IM/chat C2C and S2S operation are described in the most recent version of the DoD UCR [1]. Unlike voice/video/multimedia application as described earlier, both call signaling and media of IM/Chat pass through the same path. Figure 8 illustrates the call flows of the IM/Chat application that uses XMPP protocol: User A2 User A2 receives IM Message User A1 User A1 sends an IM to existing Contact Local/Regional Network Local XMPP Server & FW/IDS/ IPS Local/Home XMPP Application Server Is Destination User within Domain of Local XMPP Server? FW/ IDS/IPS Yes Yes Session Allowed per Local Policies? Session is Dropped Local AAA, Policy & QOS Server Local AAA, Policy & QOS Server Can Session be Admitted? Yes Session is Dropped IP Global/Regional Wide Area Network Global XMPP App Server, Global AAA/ Policy/QOS Server & FW/IDS/IPS User A3/ User A4 Messaging Gateway User A3 receives IM Message Is Destination User within Domain of Is Destination User Global XMPP using XMPP? Server? Yes Yes User A4 receives IM Message Session is Dropped Can Session Yes be Admitted? Global AAA, Policy & QOS Server Global XMPP Server FW/ IDS/IPS Yes Session Allowed per Local Policies? Session is Dropped Local/Regional Wide Area Network Local XMPP App Server/Local AAA/ Policy/QOS Server & FW/IDS/IPS User A5 Session is Dropped Can Session Yes be Admitted? Local AAA, Policy & QOS Server Remote Loca/Homel XMPP App Server FW/ IDS/IPS Yes User A5 receives IM Message Session Allowed per Local Policies? Session is Dropped Figure 8: Assured Point-to-Point IM/Chat Communications (OV-6c) U.S. Army Unified Capabilities Reference Architecture Page 83 of 97
85 1. User A1 sends an IM/Chat to the existing contact. 2. The call comes to the FW/IDS/IPS of user A1 s local/home XMPP server and the call is checked whether it is acceptable per local policies. If the call is acceptable, the call is sent to the local/home XMPP server. Otherwise, the call is dropped. 3. Before sending the call to the XMPP server over the IP network, per QoS policy set in the policy server, the originating IP access router invokes QOS for the non-real-time XMPP application over the network between the call originating access network and the destination network where the XMPP application server is located. If the QoS is available, the call is admitted. Otherwise the call is dropped. 4. The call then comes to the local/home XMPP application server and the XMPP server checks with its local AAA, Policy & QoS server. If the security, policy, and QoS are acceptable for the call, the call is examined for routing to one of its destinations. Otherwise, the call is dropped. 5. If the call is accepted, the local/home XMPP server processes the call for sending to its destination, which consists of two possible paths: Destination user is attached to the same IM/Chat server domain or Destination user is attached to another IM/Chat server domain. 6. When an IM/Chat is sent to a user associated with the same IM/Chat server, the message flow goes from client to server to client. That is, local/home/source XMPP server sends the call to user A2 and user A2 receives the IM/Chat message. 7. If the recipient is associated with a different server, the local/home XMPP server sends the call to the global XMPP application server. 8. The FW/IDS/IPS systems of the global XMPP application server checks whether the call is acceptable based on the local policies. If the call is acceptable, the IM/Chat call is sent to the global XMPP application server. Otherwise, the call is dropped. 9. The global XMPP application server then checks with the global AAA, Policy & QoS server whether the call is acceptable. If the security, policy, and QoS criteria are met, the call is sent to one of the two possible destinations: Destination user is attached to the same global IM/Chat server domain or Destination user is attached to another remote local/home IM/Chat server domain. 10. If the destination user is attached to the same global IM/Chat server domain, the global XMPP application server routes the call to user A4 as can be seen in Figure 10 and user A4 receives the IM/Chat message. However, we have taken an example variation what if the destination user does not use the XMPP protocol for IM/Chat. In this case, a messaging gateway is used for conversion of the IM/Chat between XMPP and proprietary protocol, and the global XMPP server routes the call to the message gateway and then the message gateway sends the call to user A3. User A3 receives the IM/Chat message. 11. If the destination user is attached to another remote local/home IM/Chat server domain, the global XMPP server sends the call to the remote local/home XMPP server in which domain the destination user (e.g. user A5) is located. 12. The FW/IDS/IPS systems of the remote local/home XMPP application server checks whether the call is acceptable based on the local policies. If the call is acceptable, the IM/Chat call is sent to the remote local/home XMPP application server. Otherwise, the call is dropped. U.S. Army Unified Capabilities Reference Architecture Page 84 of 97
86 13. The call is then routed to the remote local/home XMPP application server and the server checks with its local AAA, Policy & QoS server. If the call meets the security, policy, and QoS criteria, the call is sent to the user. Otherwise the call is dropped. User receives the IM/Chat message. 7 Call Flows for Other UC Services Like IM/Chat, all other UC applications that do not contain audio and/or video are can be termed as data applications, and operate in client-server (C-S) mode. Like all applications servers, each of these UC application server also needs to be distributed as explained in the case of XMPP-based IM/Chat application server. The call flows of each collaborative enterprise application service will be like those of the IM/Chat application except that they will use different application protocols other than XMPP. For example, in the case of the web services, the application protocol sets can be SOAP/WDSL/HTTP/HTTPS. U.S. Army Unified Capabilities Reference Architecture Page 85 of 97
87 Appendix B - Acronym List Abbreviation AAA ADN AF APL AR ASAC ASLAN AS-SIP ATH BE B/P/C/S BPM CAC CBA CBWFQ CE-R CIO COCOM CONUS COP COPS CQ C/S DA DAU DiffServ DISA Description Authentication, Authorization, and Accounting Area Distribution de Assured Forwarding Approved Product List Aggregation Router Assured Services Admission Control Assured Services Local Area Network Assured Service Session Initiation Protocol At-The-Halt Best Effort Base/Post/Camp/Station Business Process Management Commond Access Card Cost Based Analysis Class-Based Weighted Fair Queueing Customer Edge Router Chief Information Officer Combatant Commands Continental United States Common Operating Pictures Common Operating Policy Service Custom Queueing Client-Server Department of the Army Defense Acquisition Executive Differentiated Services Defense Information Systems Agency Page 86 of 97 U.S. Army Unified Capabilities Reference Architecture
88 DISN DISR DoD DoDI DSCP DSD DSL DWDM E2E EANCS EBC EoIP EF ERB ES FIFO GIG GMPLS GPON GTP HTTP I3A I3MP IA IAW ICAM IdAM IDS IEA Defense Information Systems Network Department of Defense Information Technology Standards Registry Department of Defense Department of Defense Instruction Differentiated Services Code Point Data and Service Deployment Digital Subscriber Line Dense Wavelength Division Multiplexing End to End Enterprise wide Access to Network and Collaboration Services Edge Border Control Everything over Internet Protocol Expedited Forwarding Engineering Review Board Enterprise Services First In First Out Global Information Grid Generalized Multiprotocol Label Switching Gigabit Passive Optical Network GIG Technical Profile Hypertext Transport Protocol Installation Information Infrastructure Architecture Installation Information Infrastructure Modernization Program Information Assurance In Accordance With Identity, Credential, and Acsess Management Identity and Access Management Intrusion Detection Systems Information Enterprise Architecture Page 87 of 97 U.S. Army Unified Capabilities Reference Architecture
89 IETF IP IPS ISDN ISP IT IWF I3C2 I3MP JCA JTIC JTRS KPP LAN LLQ LSC LWN MANET MCN MFSS MG MGC MIME MMS MPLS MSF NC NETCOM NetOps NM Internet Engineering Task Force Internet Protocol Intrusion Prevention System Integrated Services Digital Network Internet Service Provider Information Technology Interworking Function Installation Information Infrastructure Communications and Capabilities Installation Information Infrastructure Modernization Program Joint Capability Area Joint Testing Integration Center Joint Tactical Radio System Key Performance Parameters Local Area Network Low Latency Queue Local Session Controller LandWarNet Mobile Ad Hoc Network Main Computer de Multifunction Soft-Switch Media Gateway Media Gateway Control Multipurpose Internet Mail Extension Multimedia Messaging Service Multiprotocol Labeling Switching Multi-Switch Forum Net-Centric Network Enterprise Technology Command Network Operations Network Management Page 88 of 97 U.S. Army Unified Capabilities Reference Architecture
90 OA&M OASD/NII OLSR OLT OSI OTM OV-1 OV-5a OV-6c PC P/C/S PEO PQ PSAP PSTN P2P QoS RA RFC RM RT RTC SAC SBC SBIR SC SCE SCF SG SIP S/MIME SMS SOA SOAP SONET Operation Maintenance Administration Office of the Assistant Secretary of Defense Networks and Information Integration Optimized Link State Routing Optical Line Terminal Open Standard International On-The-Move High Level Operational Concept Graphic Operational Activity Decomposition Tree Event-Trace Description Personal Computer Post/Camp/Station Program Executive Office Priority Queue Public Safety Answering Point Public Switched Telecommunications Network Peer-to-Peer Quality of Service Reference Architecture Request for Change Resource Manager Real-Time Real-Time Communications Session Admission Control Session Border Controller Small Business Innovative Research Signal Command Service Creation and Execution Session Control Function Signaling Gateway Session Initiation Protocol Secured/Multipurpose Internet Mail Extension Short Message Service Service Oriented Architecture Simple Object Access Protocol Synchronous Optical Network Page 89 of 97 U.S. Army Unified Capabilities Reference Architecture
91 SRTP Secure Real-Time Protocol SS7 Signaling System 7 TBD To Be Determined TCAP Transaction Capabilities Application Part TCP Transmission Control Protocol TDM Time Division Multiplexing TLA Top Layer Architecture TLS Transport Layer Security UC Unified Capabilities UCA Unified Cryptologic Architecture UC MP Unified Capabilities Master Plan UCR Unified Capabilities Requirements UDP User Datagram Protocol VoIP Voice over Internet Protocol VoSIP Voice over Secret Internet Protocol VLAN Virtual Local Area Network VPN Virtual Private Network WAN Wide Area Network WAN SS Wide Area Network Soft Switc WAP Wireless Application Protocol WFQ Weighted Fair Queueing WiFi Wireless Fidelity WIN-T War-fighter Information Network-Tactical Page 90 of 97 U.S. Army Unified Capabilities Reference Architecture
92 Appendix C - OV-1 High Level Operational Concept Graphic, OV-5a Operational Activity Decomposition Tree, OV-6c Event-Trace Description, Diagrams Appendix D - Army UC RA StdV-1 and StdV-2 Technical Standards Profiles Appendix E - Army UC RA APL Appendix F - Mapping between Army and DoD UC Principles and Rules, Capability Gaps, Mitigations and Target End State Appendix G - UC Performance Requirements Appendix H - Army UC QoS RA Page 91 of 97 U.S. Army Unified Capabilities Reference Architecture
93 Appendix I - AV-2 Integrated Dictionary/Glossary/Vocabulary Assumptions: Assumptions identify the UC steady state environment and how it will look over time, and the rules of how the sustainment and ongoing capabilities are determined. They expand on and provide additional information based on the principles provided. Business Rules: Business rules represent relationships among the UC inputs, controls, outputs and mechanisms and resources used. For example, a business rule can specify who can do what under specified conditions, the combination of inputs and controls needed, and the resulting outputs. UC business rules are based on best practices and provide design tenets and constrain the implementation of principles and relevant policies Call: Call is a term that is used in broader context. A call can mean session, call signaling message(s), call signaling message(s) that may contain about media like audio, video, and/or data. Conformance Testing: Conformance testing is conducted to determine whether a product or system meets some specified standard that has been developed for efficiency or interoperability. The rules based architecture approach allows for technical positions and patterns to be developed into standards for testing purposes. The test run identifies the conformance to standards and examines the deltas (if any) based on the information/interaction exchange criteria. Conformance testing provides traceability back to the design constraints stated in the business rules and the principles outlining the fundamental values of UC. Metrics and success criteria are collected to measure conformance to standards under specific conditions in a network environment. Constraints: The constraints provide the Army with the applicable rules, laws and policies set forth by the Army and DoD on UC related requirements and processes. These constraints identify the limits and boundaries implemented guide the development of business rules and technical patterns and positions. Converged: All types of services, defined by the GIG Enterprise Service Profile Document (GESP), exist simultaneously on the same IP network. (Source document: UC Framework 2013). Converged Network: An IP network used to transmit a combination of voice, video, and/or data services. (Source document: UC Framework 2013). Differentiated Services (DS). A quality of service delivery model, in which the flows are classified, policed, marked, and shaped at the edges of a DS domain. The nodes in the core of the network handle packets according to the per-hop behavior that is selected based on the contents of the DS field (Differentiated Services Code Point) in the packet header. (Source document: UC Framework 2013). Differentiated Services Architecture: Contains two main components. One is the fairly well understood behavior in the forwarding path and the other is the more complex and still emerging background policy and allocation component that configures parameters used in the forwarding path. The differentiated services architecture is based on a simple model where traffic entering a network is classified and possibly conditioned at the boundaries of the network, and assigned to different behavior aggregates. Each behavior aggregate is identified by a single Differentiated Services Code Point (DSCP). Within the core of the U.S. Army Unified Capabilities Reference Architecture Page 92 of 97
94 network, packets are forwarded according to the per-hop behavior associated with the DSCP specified in RFC Differentiated Services (DS) Field (DS Field): The six most significant bits of the Internet Protocol, version 4, Type of Service octet or the Internet Protocol, version 6, traffic class octet. (Source document: UC Framework 2013). Differentiated Services Code Point (DSCP): A value that is encoded in the Differentiated Services (DS) field and that each DS node must use to select the per-hop behavior that is to be experienced by each packet it forwards. (Source document: UC Framework 2013). Elastic (or n-real-time): While real-time applications do not wait for late data to arrive, elastic applications such as data applications like file transfer, , chat/instant messaging (IM), web data traffic, and others will always wait for data to arrive. The elastic or non-real-time applications do not have any performance guarantees, but may or may not have an allocated capacity. If any data applications like delay sensitive file transfer and short-interactive data that have definite performance requirements will fall into Preferred Elastic application category, but will not be called near-real-time application category. (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). Global Information Grid (GIG): The globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. n-gig IT includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network. Inelastic (or Real-Time): See Real-Time. Near-Real-Time (or Preferred Elastic): Like real-time, an event occurs in real-time but the event is distributed in one way from the source to one or multiple destination endpoints while no destination endpoint participates in communications like audio/video streaming. The performance requirements for the near-real-time one-way audio/video communications are less stringent than those of two-way real-time audio/video communications. It should be noted that the delay sensitive file transfer and other data applications are not considered as a part of near-real-time applications (see Preferred Elastic). (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). n-real-time: See Elastic. Packet Marking: Marking in packets following their classification for a given service delivery, which includes Differentiated Services Code Point, Flow Label, or Security Parameter Index bit fields. (Source document: UC Framework 2013, RFC 4594). Preferred Elastic: A specially created service class category to meet unique DoD application requirements; it has varying degrees of service class categories. Examples include multi-media streaming U.S. Army Unified Capabilities Reference Architecture Page 93 of 97
95 (e.g. audio/video one-way distribution), short interactive transactions and delay-sensitive file transfers. However, multi-media streaming (e.g. audio/video one-way distribution) applications can be further differentiated from the delay sensitive data applications defining as near-real-time applications. These unique differentiations are needed because of stringent performance requirements. Audio/video streaming has one-way delay requirements are of the order of 100s of milliseconds along with stringent delay and phase jitters. While delay sensitive file transfer and other data applications have one-way delay requirements of the order of few seconds with no particular delay and phase jitter requirements. (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). Principles: Reference architecture principles are enduring guidelines that describe how UC will fulfill its mission. Principles express the intent of the capability and fundamental values to be achieved with UC. UC principles tie back to business/warfighting requirements and drive technical positions and patterns. They inform and support how the Army achieves the UC mission and are intended to be enduring and seldom amended. Quality of Service: The capability to provide resource assurance and service differentiation in a network. Used with the local area network to provide different priority to traffic flows or sessions, or guarantee a certain level of performance to a traffic flow or session in accordance with requests from the application program. Quality of service is used in conjunction with traffic tagging to guarantee that prioritized traffic flows or sessions are given preferential treatment. Also, the collective effects of service performances that determine the degree of satisfaction of a user of the service. (Source document: UCR 2008). Real Time: At the same time, simultaneously like audio conversational communications from both or multiple ends, and real-time applications do not wait for late data to arrive. An event where two or more people communicate simultaneously, similar to the way people speak on a telephone at the same time. Any event that occurs in real time indicates that the event is happening, as we would see it, in actual time like video teleconferencing (VTC). (Source document: UC Framework 2013, RFCs 1633, 4594).The performance requirements for the two-way real-time audio/video communications are the most stringent. Reference Architecture: Reference architectures guides and constrain the instantiations of solution architectures. It also provides a common language for various stakeholders, guidance and consistency of implementations of technology to solve problems, supports the validation of solutions, and encourages adherence to common standards, specification and patterns. Reference Architecture normalizes the institutional understanding of capabilities at the enterprise level, and provides a common set of principles/rules, process patterns, and technical positions for use within the DoD to guide development of Enterprise, Segment, or Solution architectures. Router: A router is an appliance that is a packet switch that operates at the network layer of the Open Systems Interconnection Protocol model. Routers within the IP Unified Capabilities architecture interconnect networks over local and wide areas, and provide traffic control and filtering functions when more than one pathway exists between two endpoints on the network. The primary function of routers is to direct IP packets along the most efficient or desired path in a meshed network that consists of redundant paths to a destination. Many routers in the DOD IP Unified Capabilities architecture include local area U.S. Army Unified Capabilities Reference Architecture Page 94 of 97
96 network switch functions and the distinction between the two types of appliances continues to blur. (Source document: UC Framework 2013). Technical Positions and Patterns: Technical positions describe the technical guidance and standards established for UC. This technical guidance documentation allows for system owners, PEOs/PMs justification to resource their systems and identifies potential choices and tradeoffs to perform. Patterns provide how UC artifacts may be organized and related for repeated use and support process reuse. They are typically descriptions of structural, behavioral, or graphical model instantiations that focus on interaction of the artifacts. Patterns will undergo change as new pattern concepts are discovered and emerge from solution architectures. Traffic Classification: A mechanism that allows the networks to distinguish among different categories of traffic, connection requests, and provisioning requests. The classification may be performed at the Edge and Core nodes during packet transport, as well as through indications in the control and management planes for setting up connections and provisioning. Classification can be based on fields in the packets and/or indications in control and management messages. (Source document: UC Framework 2013). Traffic Engineering: An operator or automaton with the express purpose of minimizing congestion in a network. It encompasses the application of technology and scientific principles to the measurement, modeling, characterization, and control of Internet traffic, and the application of such knowledge and techniques to achieve specific performance objectives specified in RFC Unified Capabilities (UC): The seamless integration of voice, video, and data services delivered ubiquitously across a secure and highly available network independent of technology infrastructure to provide increased mission effectiveness to the warfighter and business communities. Unified capabilities integrate standards-based communication and collaboration services including, but not limited to, the following: o Messaging. o Voice, video, and web conferencing. o Unified communication and collaboration applications or clients. These standards-based UC services are integrated with available enterprise applications, both business and warfighting. (Source document: UC Framework 2013). Video: That portion of a signal that is related to moving images. (Source document: UC Framework 2013). Video Teleconferencing (VTC): Two-way electronic form of communications that permits two or more people in different locations to engage in face-to-face audio and visual communication. Meetings, seminars, and conferences are conducted as if all the participants are in the same room. Video teleconferencing provides the capability to exchange and distribute combinations of voice, video, imagery, messages, files, and streams. (Source document: UC Framework 2013). Voice over IP (VoIP) System: A set of components required to provide Defense Switched Network (DSN) IP voice services from end instrument to DSN trunk, or IP phone to IP phone. The VoIP system includes, U.S. Army Unified Capabilities Reference Architecture Page 95 of 97
97 but is not limited to, the IP telephony instrument, the local area network, the local session controller, and the IP gateway. (Source document: UC Framework 2013). U.S. Army Unified Capabilities Reference Architecture Page 96 of 97
98 Appendix C: OV-1(Operational View), OV-5a, OV-6c Diagrams U.S. Army Unified Capabilities (UC) Reference Architecture (RA) v1.0
99 tification: Point of Contact for this effort is: COL Robert J. Quinker, HQDA CIO/G6-AAIC-AOE, (703) / LTC Van Den Bosch, HQDA CIO/G6- AAIC-AOB, [email protected] (703) Page 1 of 21 Appendix C OV-1 OV6c Army UC RA
100 Table of Contents APPENDIX C: OV-1, OV-5A, OV-6C DIAGRAMS U.S. ARMY UNIFIED CAPABILITIES (UC) REFERENCE ARCHITECTURE (RA)... 3 C.1 Introduction... 4 C.2 Operational Concept Graphic (OV-1)... 4 C.2.1 Army UC RA... 4 C.2.2 Session Controller... 7 C.2.3 RTC Services C.2.4 Service Control Function C.3 Operational Activity Decomposition (OV-5a) C.3.1 RTC Services: Conferencing First Level Decomposition C.3.2 RTC Services: Conferencing Second Level Decomposition C.4 Event-Trace Description (OV-6c) C.4.1 Point-to-Point Audio/Video/Data Conference Call C.4.2 Point-to-MultiPoint Centralized Audio/Video/Data Conferencing C.4.3 Point-to-Point IM/Chat Page 2 of 21 Appendix C OV-1 OV6c Army UC RA
101 List of Figures Figure C-1: Logical Operational Concept Graphic of Army UC Reference Architecture... 5 Figure C-2: High Level Functional Operational Concept Graphic of Army UC Reference Architecture... 6 Figure C-3: Functional Operational Concept Graphic of MFSS... 7 Figure C-4: Functional Operational Concept Graphic of LSC that interfaces TDM and IP Network... 8 Figure C-5: Functional Operational Concept Graphic of WAN SS... 9 Figure C-6: Functional Operational Concept Graphic of LSC that interfaces IP Network using only AS-SIP Call Control Protocol Figure C-7: Functional Operational Concept Graphic of LSC that interfaces IP Network using H.323 and AS-SIP Call Control Protocol Figure C-8: Functional Operational Concept Graphic of Army UC Reference Architecture for Services hosted by WAN SS-LSC and LSCs Figure C-9: Functional Operational Concept Graphic of Army UC Reference Architecture for Services hosted by LSCs and Regional WAN SSs Figure C-10: Operational Concept Graphic of Open Protocol Standards used by SCF Entity for Communications with Application Servers and Session Controller (e.g. WAN SS, MFSS, or LSC) Figure C-11: First-Level A0 Activity Decomposition Example for Audio and Video Conferencing with Data Collaboration (a) Higher A0 Level Acitity Decomposed into Lower A1 Level Activities, (b) Second Level A1 Activity Decomposed into Lower A11 Level Acitivities and (b) Second Level A2 Acitivity Decomposed into Lower A21 Level Activities Figure C-12: Second-Level A3 - A8 Activity Decomposition Example for Audio and Video Conferencing with Data Collaboration Operational Activity Decomposition (a) A3 Provide Network Edge/Boundary Services Activity Decomposition, (b) A4 Enforce Policy Activity Decomposition, (c) A5 Provide QOS Activity Decomposition, (d) A6 Provide Call Control Services Activity, (e) A7 Provide Connectivity Activity Decomposition, and (f) A8 Provide Net Management Activity Decomposition Figure C-13: Assured Point-to-Point Audio/Video/Data Conference Call Figure C-14: Assured Point-to-MultiPoint Centralized Audio/Video/Data Conferencing Figure C-15: Assured Point-to-Point IM/Chat Comunications Appendix C: OV-1, OV-5a, OV-6c Diagrams U.S. Army Unified Capabilities (UC) Reference Architecture (RA) Page 3 of 21 Appendix C OV-1 OV6c Army UC RA
102 C.1 Introduction Army UC RA is based on the architectural principles derived from DoD UCR, DISA UC RA, and DoD IEA [1-16]. However, there some enhancements in this Army UC RA based on the fundamental net-centric principles and requirements for DoD or providing scalability, reliability, interoperability and economies-ofscale as follows: Open standard-based protocols/interfaces must be used between the functional entities for communications. Call control functional entities that are used for establishment of sessions with single and/or multiple media with two or multiple parties must use open standard-based protocols/interfaces for communications with the RFC services. Each application server should be geographically distributed, but act logically centralized from communications point of view. This Army UC RA has accommodated the above net-centric principles and requirements that are not the part of the present DISA UC RA. As a result, the Army UC RA has a modified APL that is different from the DISA UC RA APL ( ) for the following products: WAN SS MFSS LSC SCF RFC Application Servers Edge Boundary Controller (EBC) is enhanced to include data FW, and IDS, and IPS in addition to audio and video firewall functionalities when needed. Chat, IM & Presence Applications Servers (when these applications are integrated with audio and/or Video) The OVs provided here also reflect the main modifications based on the above although the basic tenet all Army UC RA functional entities are being used from the DoD UCR Architecture [1] and DISA UC RA [15] document. All of the explanations of these OVs have been described in the main Army UC RA document. C.2 Operational Concept Graphic (OV-1) C.2.1 Army UC RA Page 4 of 21 Appendix C OV-1 OV6c Army UC RA
103 Figure C-1: Logical Operational Concept Graphic of Army UC RA Page 5 of 21 Appendix C OV-1 OV6c Army UC RA
104 Figure C-2: High Level Functional Operational Concept Graphic of Army UC RAte: The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Content Management Records Management Team Collaboration BPM Web 2.0, Apps Portals Profiles Search & Discovery IA Page 6 of 21 Appendix C OV-1 OV6c Army UC RA
105 C.2.2 Session Controller Figure C-3: Functional Operational Concept Graphic of MFSS te: This operational concept graphic of MFSS is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and SCF. The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop Sharing, SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Page 7 of 21 Appendix C OV-1 OV6c Army UC RA
106 Figure C-4: Functional Operational Concept Graphic of LSC that interfaces TDM and IP Network te: This operational concept graphic of MFSS is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC SCF. The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TACP, Desktop Sharing, SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Page 8 of 21 Appendix C OV-1 OV6c Army UC RA
107 Figure C-5: Functional Operational Concept Graphic of WAN SS te: This operational concept graphic of MFSS is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and SCF. The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop Sharing, SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Page 9 of 21 Appendix C OV-1 OV6c Army UC RA
108 Figure C-6: Functional Operational Concept Graphic of LSC that interfaces IP Network using only AS-SIP Call Control Protocol te: This operational concept graphic of MFSS is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and SCF. The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop Sharing, SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Page 10 of 21 Appendix C OV-1 OV6c Army UC RA
109 Figure C-7: Functional Operational Concept Graphic of LSC that interfaces IP Network using H.323 and AS-SIP Call Control Protocol te: This operational concept graphic of MFSS is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and SCF. The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop Sharing, SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Page 11 of 21 Appendix C OV-1 OV6c Army UC RA
110 C.2.3 RTC Services Figure C-8: Functional Operational Concept Graphic of Army UC Reference Architecture for Services hosted by WAN SS-LSC and LSCs te: This operational concept graphic of MFSS is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and SCF. The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop Sharing, SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Page 12 of 21 Appendix C OV-1 OV6c Army UC RA
111 Figure C-9: Functional Operational Concept Graphic of Army UC Reference Architecture for Services hosted by LSCs and Regional WAN SSs te: This operational concept graphic of MFSS is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and SCF. The following functional entities are completely separated from those of the WAN SS, MFSS, or LSC: SCF RTC Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop Sharing, SMS, MMS, , WAP, and Location Services (Fixed/Mobile) Page 13 of 21 Appendix C OV-1 OV6c Army UC RA
112 C.2.4 Service Control Function Figure C-10: Operational Concept Graphic of Open Protocol Standards used by SCF Entity for Communications with Application Servers and Session Controller (e.g. WAN SS, MFSS, or LSC) te: This operational concept graphic of SCF is the same as that defined in DoD UCR 2008, Change 2, DoD UCR 2008, Change 3 [1], September 2011, and DISA UC RA, Version 1.1, February 2012 [15] except that Open Interfaces are shown between UC RTC Services and SCF AS-SIP = Assured Service Session Initiation Protocol, SOAP = Simple Object Access Protocol, HTTP = HyperText Transport Protocol, LDAP = Lightweight Directory Access Protocol, SQL = Structured Query Language, RADIUS = Remote Authentication Dial In User Service, DIAMETER = (Acronym not spelled out in standard, but it is an enhanced version of RADIUS), WAP = Wireless Access Protocol, ITIP = icalendar Transport Independent Interoperability Protocol, SMTP = Simple Mail Transfer Protocol, AAA = Authentication, Authorization, and Accounting, TCAP = Transaction Capabilities Application Part, ENUM = E.164 Number, IM = Instant Messaging, MMS = Multimedia Messaging Service, SMS = Short Message Page 14 of 21 Appendix C OV-1 OV6c Army UC RA
113 Service, WAN SS = Wide Area Network SoftSwitch, MFSS = MultiFunction SoftSwitch, LSC = Local Session Controller Figure C-10 depicts that the SCF entity provides all services from all application servers (ASs) using only single AS-SIP protocol to the session controller like WAN SS, MFSS, or LSC while the individual AS may use AS-SIP and/or other protocols. The SCF acts as the service interworking through switching and routing different ASs where each one of them provides different services that may use the same or different protocols. The SCF mediates the interaction of application platforms with different technologies and protocols, and orchestrates multiple applications to support mixed service delivery, and creates a dynamic model for blending hybrid resources and services. It acts as if a virtual service controller, taking a single service request from a session controller (e.g. WAN SS, MFSS, or LSC) and directs multiple service requests to the application servers. It then aggregates the responses and sends a single response to the session controller (e.g. WAN SS, MFSS, or LSC). It can be seen that the SCF coordinates multiple applications in a single session, combines and brokers technologies, and manages individual features and personal preferences. It mediates between application servers and the session controller (e.g. WAN SS, MFSS, or LSC), intercepting a single service request and directing it to multiple application servers. Acting as a virtual SIP server, it collates the responses from the application servers and sends the session-treatment information back to the session controller (e.g. WAN SS, MFSS, or LSC). This ability to manage the interaction of multiple applications as a single session enables warfighters to deliver rich multimedia service bundles optimizing the service delivery. Page 15 of 21 Appendix C OV-1 OV6c Army UC RA
114 C.3 Operational Activity Decomposition (OV-5a) C.3.1 RTC Services: Conferencing First Level Decomposition A0 Enable Enterprise-wide Real-Time Audio- Video Conferencing with Data Collaboration A1 Provide Authentication A2 Provide Authorization and Access Control A3 Provide Network Edge/Boundary Services A4 Enforce Policy A5 Provide QOS A6 Provide Call Control Services A7 Provide Connectivity A8 Provide Net Management (a) A1 Provide Authentication A2 Provide Authorization and Access Control A11 Authenticate Entity (User) A12 Maintain Authentication Status A13 Calculate Assurance Level A14 Formulate Authentication Decision A21 Identify Pertinent Decision Parameters A22 Authenticate Requestor A23 Obtain Needed Access Decision Parameters A24 Complete Access Decision (b) (c) Figure C-11: First-Level A0 Activity Decomposition Example for Audio and Video Conferencing with Data Collaboration (a) Higher A0 Level Acidity Decomposed into Lower A1 Level Activities, (b) Second Level A1 Activity Decomposed into Lower A11 Level Activities and (b) Second Level A2 Activity Decomposed into Lower A21 Level Activities Page 16 of 21 Appendix C OV-1 OV6c Army UC RA
115 C.3.2 RTC Services: Conferencing Second Level Decomposition A3 Provide Network A4 Edge/Boundary Enforce Policy Services A31 Provide Firewall Services A32 Provide Edge Boundary Controller Services A33 Provide Network Address Translator Services A34 Provide Intrusion Detection Services A35 Provide Intrusion Prevention Services A41 Enforce Call Control Policies A42 Enforce Media (Audio, Video, Data) Policies A43 Enforce QOS Policies A44 Enforce Accounting Policies A45 Enforce Security Policies (a) (b) A5 A6 Provide QOS Provide Call Control Services A51 Provide Local Area Network QOS A52 Provide Access Network QOS A53 Provide Wide Area Network QOS A61 Invoke Directory Services A62 Retrieve User Profiles A63 Invoke Call Control Applications Features A64 Provide Media Bridging Services A65 Provide Mobility Related Services (c) (d) A7 Provide Connectivity A8 Provide Net Management A71 A72 Provide Wired Provide Wireless Network Connectivity Network Connectivity A81 Manage Performances A82 Manage Faults A83 Manage Configurations A84 Manage Security A85 Manage Accounting (e) (f) Figure C-12: Second-Level A3 - A8 Activity Decomposition Example for Audio and Video Conferencing with Data Collaboration Operational Activity Decomposition (a) A3 Provide Network Edge/Boundary Services Activity Decomposition, (b) A4 Enforce Policy Activity Decomposition, (c) A5 Provide QOS Activity Decomposition, (d) A6 Provide Call Control Services Activity, (e) A7 Provide Connectivity Activity Decomposition, and (f) A8 Provide Net Management Activity Decomposition Page 17 of 21 Appendix C OV-1 OV6c Army UC RA
116 C.4 Event-Trace Description (OV-6c) C.4.1 Point-to-Point Audio/Video/Data Conference Call Local/Regional TDM/ISDN Network User A4 TDM Net MG/IWF/ SG Source TDM/ ISDN Switch SS7 Call Signaling User A4 Places a Call Destination TDM/ISDN Signals TDM/ISDN End User Switch Media Gateway, Signaling Interworking Functions, Signaling Gateway, and Media Gateway Controller TDM Media and SS7 Media and Signaling Interworking Packet Media and VoIP Signaling Part of Gateway Part of Gateway Signaling Part of Gateway These functions/capabilities of MGC, MG, SG, and IWF are realized in MFSS or Hybrid LSC User A1 User A1 Places a Call Yes Local/Regional Network Source LSC, SCF & EBC/FW/ IDS/IPS Local AAA, Policy & QOS Server Is Destination User in TDM Is Destination Network? Source LSC User Local? Yes Yes Are User Services Hosted in Send Call to the Appropriate LSC? Application Server Type(s) Yes SCF Local AAA, Policy & QOS Server Can Session Session is be Dropped Admitted? Yes EBC/ FW EBC/ FW EBC/ FW Session Allowed per Local Policies? Session is Dropped Yes Yes User A2 User A2 Accepts call Send Call to the Appropriate Application Server Type(s) Local App Servers UC Application Servers (Services Hosted by LSC Locally/Regionally) Service Type 1 Service Type 2... Service Type N Session Allowed per Local Policies? IP Global/Regional Wide Area Network WAN SS, SCF, Global AAA/ Policy/QOS Server & EBC/FW/IDS/IPS Global App Servers SCF Send Call to the Appropriate Application Server Type(s) UC Application Servers (Services Hosted by WAN SS/MFSS Globally) Service Type 1 Service Type 2... Service Type N Session is Dropped Can Session be Admitted? Yes Global AAA, Policy & QOS Server WAN SS EBC/ FW Yes Session Allowed Session is Dropped per Local Local/Regional Network LSC, Local AAA/QOS, EBC/FW User A3 User A3 Accepts call Session is Dropped Can Session be Accepted? Local AAA, Policy & QOS Server Destination LSC EBC/ FW Policies? Yes Session is Dropped Figure C-13: Assured Point-to-Point Audio/Video/Data Conference Call Page 18 of 21 Appendix C OV-1 OV6c Army UC RA
117 C.4.2 Point-to-MultiPoint Centralized Audio/Video/Data Conferencing Local Net User Ax User Ax Places a Call to Conference Bridge. Local Net User A2 User A2 Places a Call to Conference Bridge. User A1 User A1 Places a Call to Conference Bridge Local/Regional Network Local LSC, SCF & EBC/FW/IDS/ IPS Source LSC EBC/ FW Session Allowed per Local Policies? Yes Session is Dropped Local AAA, Policy & QOS Server Local AAA, Policy & QOS Server Can Session be Admitted? Yes Session is Dropped Session Allowed per Local Policies? IP Global/Regional Wide Area Network WAN SS, SCF, Global AAA/ Policy/QOS Server & EBC/FW/IDS/IPS Global Conf App Servers Conf Bridge LSC, SCF, Local AAA/ Policy/QOS Server & EBC/FW/IDS/IPS SCF UC Conference Bridge Application Servers (Services Hosted by WAN SS/MFSS Globally Regionally) SCF Session is Dropped Send Call to the Appropriate Application Server Type(s) Service Type 1 Service Type 2... Service Type N Send Call to the Appropriate Conference Media Bridge Session is Dropped Can Session be Admitted? Can Session be Admitted? Yes Yes Global AAA, Policy & QOS Server WAN SS Local AAA, Policy & QOS Server Conference Media Bridge LSC EBC/ FW EBC/ FW Yes Session Allowed per Local Policies? Yes Session is Dropped Session is Dropped Global Conf Media Bridge Servers UC Media Bridging Servers (Services Hosted by WAN SS/MFSS Globally) Media Bridge 1 Media Bridge 2... Media Bridge K Figure C-14: Assured Point-to-MultiPoint Centralized Audio/Video/Data Conferencing Page 19 of 21 Appendix C OV-1 OV6c Army UC RA
118 C.4.3 Point-to-Point IM/Chat User A2 User A2 receives IM Message User A1 User A1 sends an IM to existing Contact Local/Regional Network Local XMPP Server & FW/IDS/ IPS Local/Home XMPP Application Server Is Destination User within Domain of Local XMPP Server? FW/ IDS/IPS Yes Yes Session Allowed per Local Policies? Session is Dropped Local AAA, Policy & QOS Server Local AAA, Policy & QOS Server Can Session be Admitted? Yes Session is Dropped IP Global/Regional Wide Area Network Global XMPP App Server, Global AAA/ Policy/QOS Server & FW/IDS/IPS User A3/ User A4 Messaging Gateway User A3 receives IM Message Is Destination User within Domain of Is Destination User Global XMPP using XMPP? Server? Yes Yes User A4 receives IM Message Session is Dropped Can Session Yes be Admitted? Global AAA, Policy & QOS Server Global XMPP Server FW/ IDS/IPS Yes Session Allowed per Local Policies? Session is Dropped Local/Regional Wide Area Network Local XMPP App Server/Local AAA/ Policy/QOS Server & FW/IDS/IPS User A5 Session is Dropped Can Session Yes be Admitted? Local AAA, Policy & QOS Server Remote Loca/Homel XMPP App Server FW/ IDS/IPS Yes User A5 receives IM Message Session Allowed per Local Policies? Session is Dropped Figure C-15: Assured Point-to-Point IM/Chat Communications Page 20 of 21 Appendix C OV-1 OV6c Army UC RA
119 Appendix D: Army UC RA StdV-1, StdV-2 Technical Standards Profiles v1.0
120 tification: This document will be updated annually. Point of Contact for this effort is: COL Robert J. Quinker, HQDA CIO/G6-AAIC-AOE, (703) / LTC Van Den Bosch, HQDA CIO/G6- AAIC-AOB, [email protected] (703) i
121 Appendix D: Army UC RA StdV-1, StdV-2 Technical Standards Profiles Standard ID Standard Title Is the Standard in DISR online? AMERICAN NATIONAL STANDARDS INSTITUTE DOCUMENTATION Synchronization Interface Standards for Digital T Networks, Digital Hierarchy Electrical Interfaces, T December T Digital Hierarchy Electrical Interfaces, SONET Basic Description including Multiplex T Structure, Rates, and Formats, May T SONET Automatic Protection, Revised 2005 T SONET Jitter Network Interfaces, Revised T SONET Jitter Network Interfaces, Revised T SONET Physical Layer Specifications, Revised T Digital Hierarchy Formats Specifications, Revised T1.111 SS7 MTP, T1.112 SS7 SCCP, Stat us DISR Standard ID T1.113 SS7) ISDN User Part, T SS7 ISDN User Part (Revision of T ; includes two Supplements: T1.113a-2000 and T1.113b-2001). T SS7 Signaling Link. T SS7 TCAP, T Digital Hierarchy - Layer 1 In-Service Digital Transmission Performance Monitoring, T DSL Layer 1 In-Service Digital Transmission Performance Monitoring, Revised T Network to Customer Installation Interfaces DS1 Electrical Interface, Revised FT Page 1 of 57 Appendix D Army UC RA Tech Stds
122 T Network and Customer Installation Interfaces DS3 Metallic Interface Specification (Revision and Consolidation of T and T1.404a- 1996), Revised T Telecom Glossary T ISDN Basic Access Interface for Use on Metallic Loops for Application at the Network Side of NT, Layer 1 Specification. T1.602 Data Link Layer Signalling Specification for Application at the User-Network Interface, February T (1999) ISDN Basic Access Interface for S and T Reference Points and Layer 1 Specification. T ISDN Layer 3 Signaling Specifications for Circuit Switched Bearer Service for DSS1. T ISDN Call Waiting Supplementary Service. T (R1999) DSS1-Layer 3 Overview. T ISDN Call Hold Supplementary Service. T (R2005) ISDN MLPP Service Capability, February 1992, Reaffirmed 2005 T1.619a-1994 (R1999) T ISDN MLPP Service Capability (MLPP Service Domain and Cause Changes), July 1994, Reaffirmed ISDN User-to-User Signaling Supplementary Service. ISDN rmal Call Transfer Supplementary Service. T T ISDN Call Deflection Supplementary Service. ISDN Explicit Call Transfer Supplementary T Service. Broadband ISDN Physical Layer Specification for User-Network Interfaces including DS1/ATM, T Supersedes ANSI T ), T ISDN Conference Calling Supplementary Service. T Interworking between SIP and Bearer Independent Call Control or ISDN User Part, June FT Page 2 of 57 Appendix D Army UC RA Tech Stds
123 T Digital Transport of Video Teleconferencing/Video Telephony Signals Video Test Scenes for Subjective and Objective Performance Assessment, vember T Digital Transport of Video Teleconferencing/ Video Telephony Signals Performance Terms, Definitions and Examples, May T Digital Transport of One-Way Signals - Parameters for Objective Performance Assessment, February T Multimedia Communications Delay, Synchronization, and Frame Rate Measurement, ANSI/TIA-1057 Link Layer Discovery Protocol for Media Endpoint Devices, April T1X1.3/94-001R5 Jitter Measurement Methodology. T11 FC-BB-5 FC-BB-5, Revision 2.00, 4 June X3.230 See ANSI INCITS X3.296 Information Technology SBCON Architecture, Replaces ANSI X X3.297 FC-PH-2, X3.303 FC-PH-3, INCITS Information Technology - FC-PH - Amendment 2 (supplement to ANSI X ) (formerly ANSI X /AM ). INCITS Information Technology FC-SB-3, ANSI/TIA-810-B Telecommunications Telephone Terminal Equipment Transmission Requirements for Narrowband Voice over IP and Voice over PCM Digital Wireline Telephones, SP RV2 (to become ANSI/TIA-810-B). AMERICAN SOCIETY OF MECHANICAL ENGINEERS ASME Y14.24 Types and Applications of Engineering Drawings, 01 January 1999, Reaffirmed ASME Y14.34M Associated Lists, ASME Y14.35M Revision of Engineering Drawings and Associated Documents. 1997, Reaffirmed FT Page 3 of 57 Appendix D Army UC RA Tech Stds
124 ASME Y BS EN :2006 CJCSI G Engineering Drawing Practices, 2004, Reaffirmed BRITISH STANDARDS INSTITUTE DOCUMENTATION Information technology equipment. Safety. General requirements, August 6, CHAIRMAN OF THE JOINT CHIEFS OF STAFF DOCUMENTATION CJCS Standing Execute Order for Computer Network Attack and Computer Network Defense, 20 January Joint Capabilities Integration and Development System, 1 March 2009, mit/3170_01.pdf. CJCSI C CJCSI E CJCSI C CJCSI A DISN: Policy and Responsibilities, 9 July 2008, mit/6211_02.pdf. Interoperability and Supportability of Information Technology and National Security Systems, 15 December 2008, mit/6212_01.pdf. Policy for DoD Voice Networks with RTS, 9 vember 2007, mit/6215_01.pdf. Policy, Responsibilities, Processes, and Administration for the Department of Defense Global Information Grid Networks, 31 July CJCSI E IA and CND, 15 June CJCSI E CJCSM A CJCSM C IA and CND, 15 August 2007, mit/6510_01.pdf. Joint Reporting Structure Status Communications, 19 April , a.pdf. UJTL, Version 4.0, 1 July 2002, c.pdf. FT Page 4 of 57 Appendix D Army UC RA Tech Stds
125 CJCSM C CJCSM CJCSM DoDD C DoDD DoDD DoDD DoDD DoDD DoDD DoDD DoDD DoDD DoDD E Manual for Employing Joint Communications Systems: Joint Tactical Systems Management, 20 June Manual for Employing Joint Tactical Communications Systems, Joint Voice Communications Systems, 01 August Defense in Depth: IA and CND, 25 March 2003, Change 1, 10 August 2004, and Change 2, 26 January DOD DIRECTIVES (SECRET) EMC Management Program for SIGINT Sites (U), 22 April Interoperability and Supportability of IT NSS, 5 May 2005, Certified Current as of 23 April 2007, p.pdf. The Defense Acquisition System, 12 May 2003, Certified current as of 20 vember Assistant Secretary of Defense for Networks and Information Integration/DoD Chief Information Officer (ASD(NII)/DoD CIO), May 2, 2005 Security Requirements for AISs, 21 March Management of the Department of Defense Information Enterprise, 10 February 2009, p.pdf. GIG Overarching Policy, 19 September 2002, Certified Current as of 21 vember Information Technology Portfolio Management, 10 October Data Collection, Development, and Management, 6 December Data Sharing in a Net-Centric Department of Defense, 2 December 2004, Certified Current as of 23 April 2007, p.pdf. IA, October 24, 2002, Certified Current as of April 23, 2007, p.pdf. FT Page 5 of 57 Appendix D Army UC RA Tech Stds
126 DoDD Information Assurance Implementation, 6 February DoDD Protection of SCI, December 20, 2001 DoDD O (FOUO) CND, 8 January DoDD O (FOUO) CND, 1 April DoDD Information Assurance Training, Certification, and Workforce Management, 15 August 2004, Certified Current as of 23 April 2007, p.pdf. DOD INSTRUCTIONS DoDI Procedures for Interoperability and Supportability of IT and NSS, 30 June DoDI Operation of the Defense Acquisition System, 8 December DoDI DITSCAP, 30 December Issuance cancelled by: DoDI DoDI DoD Unified Capabilities, December DoDI Support for Strategic Analysis, 11 January DoDI NetOps for the GIG, 19 December DoDI IA Implementation, 6 February DoDI DIACAP, 28 vember DoDI PPSM, 13 August 2004, p.pdf. DoDI Use of Mobile Code Technologies in DoD Information Systems, 23 October 2006 ELECTRONICS INDUSTRIES ALLIANCE EIA/TIA-232-E Interface Between Data Terminal Equipment and Data Circuit-Terminating Equipment Employing Serial Binary Data Interchange, (superseded by TIA-232-F), January FT Page 6 of 57 Appendix D Army UC RA Tech Stds
127 EIA/TIA-530-A EIA-170-A EIA-310-C EIA-366-A EIA-422-B EIA EIA-530 EN EN 50082, ETS- FN ETS High Speed 25-Position Interface for Data Terminal Equipment and Data Circuit- Terminating Equipment, Including Alternative 26-Position Connector, ANSI/TIA/EIA-530-A-92) (R98) (R2003), June Yes M TIA/EIA 530-A Electrical Performance Standards Monochrome Television Studio Facility, with Revision IET NTS 1 Color Television Studio Picture Line Amplifier Output Drawing, vember inch rack mounting equipment specification. Interface Between Data Terminal Equipment and Automatic Calling Equipment for Data Communication, March Electrical Characteristics of Balanced Voltage Digital Interface Circuits, 1994 General Purpose 37-Position and 9-Position Interface for Data Terminal Equipment and Data Circuit-Terminating Equipment Employing Serial Binary Data Interchange, January Interconnection of DTE and DCE Employing Serial Binary Data Interchange with Control Information Exchanged on Separate Control Circuits. ETSI DOCUMENTATION Specification for low voltage switchgear and controlgear for industrial gear, 1977 Electromagnetic compatibility. Generic immunity standard. Residential, commercial and light industry, January Equipment Engineering (EE); Environmental conditions and environmental tests for telecommunications equipment, EN TS ERM; Telecommunication network equipment; EMC requirements, Version 1.5.1, May Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN) Methods and protocols; Part 1: Method and Proforma for Threat, Risk, Vulnerability Analysis, Version 4.2.1, December FT Page 7 of 57 Appendix D Army UC RA Tech Stds
128 TS TS FIPS PUB FIPS PUB FIPS PUB p 802.1AB AX D Q Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols;; Part 2: Protocol Framework Definition; Security Counter Measures, Version 4.2.1, February 2007 Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); PSTN/ISDN simulation services: Explicit Communication Transfer (ECT); Protocol specification, Version 2.6.0, June 2008 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATIONS U.S. Department of Commerce/National Institute of Standards and Technology, Security Requirements for Cryptographic Modules, 25 May U.S. Department of Commerce/National Institute of Standards and Technology, Digital Signature Standard (DSS), 27 January Federal Information Processing Standards Publication 197, Advanced Encryption Standard (AES), 26 vember INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC. DOCUMENTATION IEEE Standard for Standard Test Procedure for Measuring Longitudinal Balance of Telephone Equipment Operating in the Voice Band, 1 January 2001 IEEE Standard for Traffic Class Expediting and Dynamic Multicast Filtering (published in 802.1D-1998). IEEE Standard for Station and Media Access Control Connectivity Discovery, 11 September IEEE Standard for IEEE Standard for Local and Metropolitan Area Networks Link Aggregation, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges, June Yes M IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks, 1 January IEEE Std D:2004 FT Page 8 of 57 Appendix D Army UC RA Tech Stds
129 802.1Q Qau 802.1Qaz 802.1Qbb 802.1s 802.1w 802.1X X IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks, IEEE Standard for Local and Metropolitan Area Networks Virtual Bridged Local Area Networks Amendment: 10: Congestion tification, 15 September IEEE Standard for Local and Metropolitan Area Networks Virtual Bridged Local Area Networks Amendment: Enhanced Transmission Selection, 27 March IEEE Standard for Local and Metropolitan Area Networks Virtual Bridged Local Area Networks Amendment: Priority-based Flow Control, 27 March 2008 IEEE Standard for Local and Metropolitan Area Networks: Multiple Spanning Trees, (Merged into 802.1Q-2003). IEEE Standard for Local and Metropolitan Area Networks: Rapid Reconfiguration of Spanning Tree, (Merged into 802.1D-2004). IEEE Standard for Local and Metropolitan Area Networks: Port Based Network Access Control, Yes M IEEE 802.1X IEEE Standard for Local and Metropolitan Area Networks: Port Based Network Access Control, Yes M IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, 26 December Yes M IEEE 802.1X:2004 IEEE FT Page 9 of 57 Appendix D Army UC RA Tech Stds
130 802.3i 802.3u x z ab-1999 IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: 10BASE-T 10 Mbit/s (1.25 MB/s) over twisted pair, IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: 100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5 MB/s) w/autonegotiation, IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Full Duplex and flow control, IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: 1000BASE-X Gbit/s Ethernet over Fiber-Optic at 1 Gbit/s (125 MB/s), IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: 1000BASE-T Gbit/s Ethernet over twisted pair at 1 Gbit/s (125 MB/s), FT Page 10 of 57 Appendix D Army UC RA Tech Stds
131 802.3ad ae ah b IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Link aggregation for parallel links, IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: 10 Gbit/s (1,250 MB/s) Ether over fiber; 10GBASE- SR, 10GBASE-LR, 10GBASE-ER, 10GBASE-SW, 10GBASE-LW, 10GBASE-EW, IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications: Media Access Control Parameters, Physical layers, and Management Parameters for Subscriber Access Networks, IEEE Standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, June Yes M Supplement to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band, June IEEE FT Page 11 of 57 Appendix D Army UC RA Tech Stds
132 802.11e Standard ID e h i g Supplement to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Wireless LAN for Quality of Service, June Is the Standard in DISRonli Standard Title ne? Supplement to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8, Medium Access Control (MAC) Quality of Service Enhancements, 9 February Supplement to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 5, 29 December Supplement to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 6, Medium Access Control (MAC), 14 February Supplement to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band, June Stat us DISR Standard ID FT Page 12 of 57 Appendix D Army UC RA Tech Stds
133 d e E.164 G.107 G.165 G.168 G.651 G IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, 1 October Yes M Standard for Amendment to IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Detailed System Profiles for 2-11 GHz, 11 December IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1, 28 February IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific Requirements Part 17: Resilient Packet Ring (RPR) Access Method and Physical Layer Specifications, 24 September INTERNATIONAL TELECOMMUNICATION UNION DOCUMENTATION ITU-T Recommendation E.164, The International Public Telecommunication Numbering Plan, Geneva, Switzerland, ITU-T Recommendation G.107, The E-model: a computational model for use in transmission planning, Geneva, Switzerland, April ITU-T Recommendation G.165, Echo cancellers, Geneva, Switzerland, vember 1988 ITU-T Recommendation G.168, Digital network echo cancellers, Geneva, Switzerland, January ITU-T Recommendation G.651, Characteristics of a 50/125 μm multimode graded index optical fibre cable, February ITU-T Recommendation G.651.1, Characteristics of a 50/125 μm multimode graded index optical fibre cable for the optical access network, Geneva, Switzerland, July 2007 IEEE FT Page 13 of 57 Appendix D Army UC RA Tech Stds
134 G.652 G.655 G.691 G.693 G G.703 G.704 G.707/Y.1322 G.709/Y.1331 G.711 G.722 ITU-T Recommendation G.652, Characteristics of a single-mode optical fibre and cable, Geneva, Switzerland, June ITU-T Recommendation G.655, Characteristics of a non-zero dispersion-shifted single-mode optical fibre and cable, Geneva, Switzerland, March ITU-T Recommendation G.691, Optical interfaces for single channel STM-64 and other SDH systems with optical amplifiers, Geneva, Switzerland, March ITU-T Recommendation G.693, Optical interfaces for intra-office systems, Geneva, Switzerland, May ITU-T Recommendation G.694.1, Spectral grids for WDM applications: DWDM frequency grid, Geneva, Switzerland, Yes M ITU-T G ITU-T Recommendation G.703, Physical/Electrical Characteristics of Hierarchical Digital Interfaces at 1544, 2048, 8448, and kbit/s Hierarchical Levels, Yes M ITU-T G.703 ITU-T Recommendation G.704, Series G: Transmission Systems and Media, Digital Systems and Networks Digital transmission systems Terminal equipments General Synchronous frame structures used at 1544, 6312, 2048, 8448 and kbit/s hierarchical levels, October Yes M ITU-T G.704 ITU-T Recommendation G.707/Y.1322, Network node interface for the synchronous digital hierarchy (SDH), Geneva, Switzerland, January ITU-T Recommendation G.709/Y.1331, Network node interface for the optical transport network (OTN), Geneva, Switzerland, March Yes M ITU-T G.707/Y.1322: 2007 ITU-T Recommendation G.711, General Aspects of Digital Transmission Systems, Terminal Equipments, Pulse code modulation (PCM) of voice frequencies, Geneva, Switzerland, vember Yes M ITU-T G.711 ITU-T Recommendation G.722, 7 khz audiocoding within 64 kbit/s, Geneva, Switzerland, vember FT Page 14 of 57 Appendix D Army UC RA Tech Stds
135 G G.726 G.728 G.729 G G G.732 G.783 ITU-T Recommendation G.723.1, Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s, Geneva, Switzerland, May ITU-T Recommendation G.726, 32 kbps Adaptive Differential Pulse Code Modulation (ADPCM), Geneva, Switzerland, December ITU-T Recommendation G.728, Coding of speech at 16 kbit/s using low-delay code excited linear prediction, Geneva, Switzerland, September Yes M ITU-T G.728 ITU-T Recommendation G.729, Coding of speech at 8 kbit/s conjugate-structure algebraiccode-excited linear prediction (CS-ACELP), Geneva, Switzerland, March 1996, plus Erratum 1, April 2006, and Annexes A through J, and Appendices I, II, and III. ITU Recommendation G (2006) Amendment 1, New Annex A on G usage in H.245, plus corrections to the main body and updated test vectors, Geneva, Switzerland, January This corrigendum was never published, its content having been included in the published ITU-T Recommendation G (2006) ITU Recommendation G (2006), G.729 based Embedded Variable bit-rate codor: An 8-32 kbit/s scalable wideband coder bit stream interoperable with G.729, Geneva, Switzerland, May This edition includes the modifications introduced by G (2006) Amd. 1 approved on 13 January 2007, and G (2006) Amd. 2 approved on 13 February ITU-T Recommendation G.732, Characteristics of primary PCM multiplex equipment operating at 2048 kbit/s, Geneva, Switzerland, vember ITU-T Recommendation G.783, Characteristics of synchronous digital hierarchy (SDH) equipment functional blocks, Geneva, Switzerland, March FT Page 15 of 57 Appendix D Army UC RA Tech Stds
136 G.811 G.825 G.826 G.829 G.842 G.872 G.957 G.958 G G G G G ITU-T Recommendation G.811, Timing characteristics of primary reference clocks, 1997 ITU-T Recommendation G.825, The control of jitter and wander within digital networks which are based on the synchronous digital hierarchy (SDH), Geneva, Switzerland, March ITU-T Recommendation G.826, End-to-end error performance parameters and objectives for international, constant bit-rate digital paths and connections, Geneva, Switzerland, December ITU-T Recommendation G.829, Error performance events for SDH multiplex and regenerator sections, Geneva, Switzerland, December ITU-T Recommendation G.842, Interworking of SDH network protection architectures, Geneva, Switzerland, April ITU-T Recommendation G.872, Architecture of optical transport networks, Geneva, Switzerland, vember ITU-T Recommendation G.957, Optical interfaces for equipments and systems relating to the synchronous digital hierarchy, Geneva, Switzerland, March ITU-T Recommendation G.958, Digital line systems based on the synchronous digital hierarchy for use on optical fibre cables. [Withdrawn] ITU-T Recommendation G.991.1, High bit rate digital subscriber line (HDSL) transceivers, ITU-T Recommendation G.991.2, Single-pair high-speed digital subscriber line (SHDSL) transceivers, ITU-T Recommendation G.992.1, Asymmetric digital subscriber line (ADSL) transceivers, ITU-T Recommendation G.992.2, Splitterless asymmetric digital subscriber line (ADSL) transceivers, ITU-T Recommendation G.992.2, Asymmetric digital subscriber line transceivers 2 (ADSL2), FT Page 16 of 57 Appendix D Army UC RA Tech Stds
137 G G G G G G G G.1070 G.7041/Y.1303 G.7042/Y.1305 G.7043/Y.1343 G.8251 H.224 H.200 ITU-T Recommendation G.992.4, Splitterless asymmetric digital subscriber line transceivers 2 (splitterless ADSL2), ITU-T Recommendation G.992.5, Asymmetric digital subscriber line (ADSL) transceivers Extended bandwidth ADSL2 (ADSL2plus), 2009 ITU-T Recommendation G.993.1, Very high speed digital subscriber line transceivers (VDSL), ITU-T Recommendation G.993.2, Very high speed digital subscriber line transceivers 2 (VDSL2), ITU-T Recommendation G.993.2, ATM-based multi-pair bonding, ITU-T Recommendation G.993.2, Ethernetbased multi-pair bonding, ITU-T Recommendation G.993.2, Multi-pair bonding using time-division inverse multiplexing, ITU-T Recommendation G.1070, Opinion model for video-telephony applications, Geneva, Switzerland, April ITU-T Recommendation G.7041/Y.1303, Generic framing procedure (GFP), Geneva, Switzerland, Geneva, Switzerland, October Yes M ITU-T Recommendation G.7042/Y.1305, Link capacity adjustment scheme (LCAS) for virtual concatenated signals, Geneva, Switzerland, March Yes E ITU-T Recommendation G.7043/Y.1343, Virtual concatenation of plesiochronous digital hierarchy (PDH) signals, Geneva, Switzerland, July ITU-T Recommendation G.8251(G.otnjit), The control of jitter and wander within the optical transport network (OTN), Geneva, Switzerland, vember ITU-T Recommendation H.224, A real time control protocol for simplex applications using the H.221 LSD/HSD/MLP channels, Geneva, Switzerland, January ITU-T Recommendation H.200, Framework for recommendations for audiovisual services, March ITU-T G.7041/Y.1303 :2008 ITU-T G.7042/Y.1305 (March 2006) FT Page 17 of 57 Appendix D Army UC RA Tech Stds
138 H.221 ITU-T Recommendation H.221, Frame structure for a 64 to 1,920 kbit/s channel in audiovisual teleservices, March H.222 ITU-T Recommendation H.222, Coding of moving pictures and associated audio: systems, July H.224 ITU-T Recommendation H.224, Real time control protocol for simplex applications using the H.221LSD/HSD/MLP channels, February H ITU-T Recommendation H.225.0, Call signalling protocols and media stream packetization for packet-based multimedia communication systems, July H.230 ITU-T Recommendation H.230, Framesynchronous control and indication signals for audiovisual systems, March H.231 ITU-T Recommendation H.231, Multipoint control units for audiovisual systems using digital channels up to 2 Mbit/s, July H.234 ITU-T Recommendation H.234, Encryption key management and authentication system for audiovisual services, vember H.235 ITU-T Recommendation H.235, Security and encryption for H-series (H.323 and other H.245- based) multimedia terminals, August H.239 ITU-T Recommendation H.239, Role management and additional media channels for H.300-series terminals, July H.241 ITU-T Recommendation H.241, Extended video procedures and control signals for H.300-series terminals, July H.242 ITU-T Recommendation H.242, System for establishing communication between audiovisual terminals using digital channels up to 2 Mbit/S, March H.243 ITU-T Recommendation H.243, Procedures for establishing communications between three or more audiovisual terminals using digital channels up to 2 Mbit/s, February H.244 ITU Recommendation H.244, Synchronized aggregation of multiple 64 or 56 kbit/s channels, Geneva, Switzerland, July H.245 ITU-T Recommendation H.245, control protocol for multimedia communication, July FT Page 18 of 57 Appendix D Army UC RA Tech Stds
139 H.246 H H H H H.261 H.263 H.264 H.281 H.282 H.283 H.320 H.323 ITU-T Recommendation H.246, Interworking of H-series multimedia terminals with H-series multimedia terminals and voice/voiceband terminals on GSTN and ISDN, February ITU-T Recommendation H.248.1, Gateway control protocol: Version 3, Geneva Switzerland, September Yes M ITU H ITU-T Recommendation H , Gateway control protocol: Multi-frequency tone generation and detection packages, Geneva, Switzerland, July ITU-T Recommendation H , Gateway control protocol: Basic CAS packages, Geneva, Switzerland, January ITU-T Recommendation H , Gateway control protocol: International CAS packages, Geneva, Switzerland, January ITU-T Recommendation H.261, Video codec for audiovisual services at p x 64 kbit/s, Recommendation H.261, Geneva, Switzerland, March Yes M ITU-T H.261 ITU-T Recommendation H.263, Video coding for low bit rate communication, Geneva, Switzerland, January (H.263a, H.323+, ITU-T H.263, H.263 (1999)). Yes M January 2005 ITU-T Recommendation H.264, Advanced video coding for generic audiovisual services, Geneva, Switzerland, March (Also, known as H.264/AVC) Yes M ITU-T Recommendation H.281, A far end camera control protocol for videoconferences using H.224, Geneva, Switzerland, vember ITU-T Recommendation H.282, Remote device control protocol for multimedia applications, May ITU-T Recommendation H.283, Remote device control logical channel transport, May ITU-T Recommendation H.320, Narrow-band visual telephone systems and terminal equipment, Geneva, Switzerland, March ITU-T Recommendation H.323, Packet-based multimedia communications systems, Geneva, Switzerland, June ITU-T H.264 (03/2009) FT Page 19 of 57 Appendix D Army UC RA Tech Stds
140 H.341 H.350 H H H I.361 H H M.2101 M.3100 P.563 P.800 P ITU-T Recommendation H.341, Multimedia management information base, May 1999 ITU-T Recommendation H.350, Directory services architecture for multimedia conferencing, August ITU-T Recommendation H.350.1, Directory services architecture for H.323, August ITU-T Recommendation H.350.3, Directory services architecture for H.320, August ITU-T Recommendation H.350.4, Directory services architecture for SIP, August 2003 ITU-T Recommendation I.361, B-ISDN ATM layer specification, ITU-T Recommendation H.350.4, Directory services architecture for SIP, August 2003 ITU-T Recommendation H.363.5, B-ISDN ATM Adaptation Layer specification : Type 5 AAL, ITU-T Recommendation M.2101, Performance limits for bringing-into-service and maintenance of international multi-operator SDH paths and multiplex sections, Geneva, Switzerland, June ITU-T Recommendation M.3100, Generic network information model, Geneva, Switzerland, April Yes N ITU-T M.3100 ITU-T Recommendation P.563, Single Ended Method for Objective Speech Quality Assessment in Narrow-Band Telephony Applications, Geneva, Switzerland, April 2004 ITU-T Recommendation P.800, Methods for subjective determination of transmission quality, Geneva, Switzerland, (Formerly ITU-T Recommendation P. 80) Yes M ITU-T P.800 ITU-T Recommendation P.800.1, Methods for Subjective Determination of Transmission Quality - Series P: Telephone Transmission Quality; Methods for Objective and Subjective Assessment of Quality, Geneva, Switzerland, August 1996 FT Page 20 of 57 Appendix D Army UC RA Tech Stds
141 P.862 ITU-T Recommendation P.862, Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs, Geneva, Switzerland, February Yes M ITU-T P.862 Q ITU-T Recommendation Q.735.3, Stage 3 description for community of interest supplementary services using Signalling System. 7: Multi-level precedence and preemption, Geneva, Switzerland, March Q.850 ITU-T Recommendation Q.850, Usage of cause and location in the Digital Subscriber Signalling System. 1 and the Signalling System. 7 ISDN User Part, Geneva, Switzerland, May Q.921 ITU-T Recommendation Q.921, ISDN usernetwork interface Data link layer specification, Geneva, Switzerland, September Q.922 NOTE: This Recommendation is published with the double number Q.921 and I.441. Q.922 ITU- T Recommendation Q.922, ISDN data link layer specification for frame mode bearer services, February Q.931 ITU-T Recommendation Q.931, ISDN usernetwork interface layer 3 specification for basic call control, Geneva, Switzerland, May NOTE: This Recommendation is also included but not published in I series under alias number I.451. Q ITU-T Recommendation Q.955.3, Stage 3 description for community of interest supplementary services using DSS 1 Multilevel precedence and preemption (MLPP), Geneva, Switzerland, March Q ITU-T Recommendation Q , Interworking between Session Initiation Protocol (SIP) and Bearer Independent Call Control Protocol or ISDN User Part, Geneva, Switzerland, March T.4 ITU-T Recommendation T.4, Standardization of Group 3 facsimile terminals for document transmission, Geneva, Switzerland, July FT Page 21 of 57 Appendix D Army UC RA Tech Stds
142 ITU-T Recommendation T.38, Procedures for real-time Group 3 facsimile communication over T.38 IP networks, Geneva, Switzerland, April ITU-T Recommendation T.140, Protocol for multimedia application text conversion, T.140 February ITU-T Recommendation V.14, Transmission of start-stop characters over synchronous bearer V.14 channels, Geneva, Switzerland, March ITU-T Recommendation V.24, List of definitions for interchange circuits between data terminal equipment (DTE) and data circuit-terminating equipment (DCE), Geneva, Switzerland, V.24 February ITU-T Recommendation V.32, A family of 2- wire, duplex modems operating at data signalling rates of up to 9600 bit/s for use on the general switched telephone network and on leased telephone-type circuits, Geneva, V.32 Switzerland, March ITU-T Recommendation V.34, A modem operating at data signalling rates of up to bit/s for use on the general switched telephone network and on leased pointto-point 2-wire telephone-type circuits, Geneva, Switzerland, V.34 February 1998 ITU-T Recommendation V.35, Data transmission at 48 kilobits per second using khz group band circuits, Geneva, V.35 Switzerland, October ITU-T Recommendation V.42bis, Data compression procedures for DCEs using error V.42bis correction procedures, January V.54 ITU-T Recommendation V.54, Loop test devices for modems, Geneva, Switzerland, vember ITU-T Recommendation V.90, A digital modem and analogue modem pair for use on the Public Switched Telephone Network (PSTN) at data signalling rates of up to bit/s downstream and up to bit/s upstream, V.90 Geneva, Switzerland, September ITU-T Recommendation V.92, Enhancements to V.92 Recommendation V.90, vember ITU-T Recommendation V.120, Support by an V.120 ISDN of data terminal equipment with V-series FT Page 22 of 57 Appendix D Army UC RA Tech Stds
143 V X.21 X.731 X.805 Y.1540 Y.1541 RFC 125 RFC 233 RFC 768 RFC 791 RFC 793 RFC 1046 RFC 1142 type interfaces with provision for statistical multiplexing, October 1996 ITU-T Recommendation V.150.1, Modem-over- IP networks: Procedures for the end-to-end connection of V-series DCEs, Geneva, Switzerland, January ITU-T Recommendation V.150.1, Amendment 1, Geneva, Switzerland, January 2005 ITU-T Recommendation X.21, Interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for synchronous operation on public data networks, September ITU-T Recommendation X.731, Information technology Open Systems Interconnection Systems management: State management function, Geneva, Switzerland, January ITU-T Recommendation X.805, Security architecture for systems providing end-toend communications, Geneva, Switzerland, October ITU-T Recommendation Y.1540, Internet protocol data communication service - IP packet transfer and availability performance parameters, vember ITU-T Recommendation Y.1541, Network performance objectives for IP-based services, Geneva, Switzerland, February INTERNET ENGINEERING TASK FORCE REQUESTS FOR COMMENT J. McConnell, Proposal for Network Standard Format for a Graphic Data Stream, April A. Bhushan and B. Metcalfe, Standardization of Host Call Letters, September 1971 Postel, J., User Datagram Protocol, August Yes M Information Services Institute, Internet Protocol, September Yes M IETF Std. 5 Information Services Institute, Transmission Control Protocol, September Yes M Prue, W. and J. Postel, A Queuing Algorithm to Provide Type-of-Service for IP Links, February Oran, D., Ed., OSI IS-IS Intra-domain Routing Protocol, February IETF Std. 6/RFC 768 IETF Std. 7/RFC 793 FT Page 23 of 57 Appendix D Army UC RA Tech Stds
144 RFC 1157 RFC 1195 RFC 1213 RFC 1215 RFC 1256 RFC 1305 RFC 1332 RFC 1471 RFC 1472 RFC 1473 RFC 1519 RFC 1570 RFC 1629 RFC 1657 RFC 1662 RFC 1772 Case, J., M. Fedor, M. Schoffstall, and J. Davin, A Simple Network Management Protocol (SNMP), May R. Callon, A Use of OSI IS-IS for Routing in TCP/IP and Dual Environments, December Yes M IETF RFC 1195 McCloghrie, K. and M. Rose, Eds., Management Information Base for Network Management of TCP/IP-based internets: MIB-II, March Rose, M., Ed., A Convention for Defining Traps for use with SNMP, March Yes M IETF RFC 1215 Deering, S., Ed., ICMP Router Discovery Messages, September Yes M IETF RFC 1256 Mills, D., Network Time Protocol (Version 3) Specification, Implementation and Analysis, March McGregor, G., The PPP Internet Protocol Control Protocol, May Yes M IETF RFC 1332 Kastenholz, F., The Definitions of Managed Objects for the Link Control Protocol of the Point-to-Point Protocol, June Yes M IETF RFC 1471 Kastenholz, F., The Definitions of Managed Objects for the Security Protocols of the Pointto-Point Protocol, June Yes M IETF RFC 1472 Kastenholz, F., The Definitions of Managed Objects for IP Network Control Protocol of the Point-to-Point Protocol, June Yes M IETF RFC 1473 Fuller, V., Li, T., Yu, J., and K. Varadhan, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy, September Simpson, W., Ed., PPP LCP Extensions, January Yes M IETF RFC 1570 Colella, R., R. Callon, E. Gardner, and Y. Rekhter, Guidelines for OSI NSAP Allocation in the Internet, May Willis, S., Burruss, J., and J. Chu, Definitions of Managed Objects for the Fourth Version of the Border Gateway Protocol (BGP-4) using SMIv2, July Yes M IETF RFC 1657 Simpson, W., Ed., PPP in HDLC-like Framing, July Yes M IETF Std. 51/RFC 1661/RFC 1662 Rekhter, Y., P. Gross, Application of the Border Gateway Protocol in the Internet, March Yes M IETF RFC 1772 FT Page 24 of 57 Appendix D Army UC RA Tech Stds
145 RFC 1812 RFC 1883 RFC 1918 RFC 1981 RFC 1989 RFC 1990 RFC 1994 RFC 1997 RFC 2006 RFC 2032 RFC 2119 RFC 2126 RFC 2131 RFC 2132 RFC 2190 RFC 2198 RFC 2205 RFC 2206 RFC 2207 Baker, F., Ed., Requirements for IP Version 4 Routers, June Yes M IETF RFC 1812 Deering, S., R. Hinden, Internet Protocol, Version 6 (IPv6) Specification, December Rekhter, Y., B. Moskowitz, D. Karrenberg, G. J. De Groot, and E. Lear, Address Allocation for Private Internets, February McCann, J., S. Deering, and J. Mogul, Path MTU Discovery for IP Version 6, August Yes M IETF RFC 1981 Simpson, W., PPP Link Quality Monitoring, August Yes M IETF RFC 1989 K. Sklower, B. Loyd, et al, The PPP Multilink Protocol (MP), August Yes M IETF RFC 1990 Simpson, W., PPP Challenge Handshake Authentication Protocol (CHAP), August Chandra, R., P. Traina, and T. Li, BGP Communities Attribute, August Yes M IETF RFC 1997 Dong, D., Hamlen, M., and C. Perkins, The Definitions of Managed Objects for IP Mobility Support using SMIv2, October Yes M IETF RFC 2006 Turletti, T. and C. Huitema, RTP Payload Format for H.261 Video Streams, October Bradner, S., Key words for use in RFCs to Indicate Requirement Levels, March 1997 Pouffary, Y. and A. Young, ISO Transport Service on top of TCP (ITOT), March Droms, R., Dynamic Host Configuration Protocol, March Alexander, S. and R. Droms, DHCP Options and BOOTP Vendor Extensions, March Yes M IETF RFC 2132 Zhu, C., Payload Format for H.263 Video Streams, September Perkins, C, I. Kouvelas, O. Hodson, V. Hardman, M. Handley, J.C. Bolot, A. Vega-Garcia, and S. Fosse-Parisis, RTP Payload for Redundant Audio Data, September Braden, R., Ed., L. Zhang, S. Berson, S. Herzog, and S. Jamin, ReSerVation Protocol (RSVP) Version 1 Functional Specification, September Yes M IETF RFC 2205 Baker, F., J. Krawczyk, and A. Sastry, RSVP Management Information Base using SMIv2, September Berger, L. and T. O Malley, RSVP Extensions for IPSEC Data Flows, September Yes E IETF RFC 2207 FT Page 25 of 57 Appendix D Army UC RA Tech Stds
146 RFC 2210 Wroclawski, J., The Use of RSVP with IETF Integrated Services, September 1997 Yes E IETF RFC 2210 RFC 2211 Wroclawski, J., Specification of the Controlled- Load Network Element Service, September 1997 RFC 2212 Shenker, S., C. Partridge, and R. Guerin, Specification of Guaranteed Quality of Service, September RFC 2215 Shenker, S. and J. Wroclawski, General Characterization Parameters for Integrated Service Network Elements, September Yes E IETF RFC 2215 RFC 2251 Lightweight Directory Access Protocol (V3) RFC 2252 Lightweight Directory Access Protocol (V3): Attribute Syntax Definitions RFC 2253 Lightweight Directory Access Protocol (V3): UTF- 8 String Representation of Distinguished Names RFC 2254 The String Representation of LDAP Search Filters RFC 2255 The LDAP URL Format RFC 2256 A Summary of the X.500(96) User Schema for use with LDAPv3 RFC 2327 Handley, M. and V. Jacobson, SDP: Session Description Protocol, April RFC 2328 Moy, J., OSPF Version 2, April Yes M IETF Std. 54/RFC 2328 RFC 2332 Luciani, J., Katz, D., Piscitello, D., Cole, B., and N. Doraswamy, NBMA Next Hop Resolution Protocol (NHRP), April RFC 2362 Estrin, D., D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, and L. Wei, Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification, June RFC 2365 Meyer, D., Administratively Scoped IP Multicast, July RFC 2385 Heffernan, A., Protection of BGP Sessions via the TCP MD5 Signature Option, August Yes M IETF RFC 2385 RFC 2407 Piper, D., The Internet IP Security Domain of Interpretation for ISAKMP, vember RFC 2408 RFC 2409 Maughan, D., M. Schertler, M. Schneider and J. Turner, Internet Security Association and Key Management Protocol (ISAKMP), vember Harkins, J. and D. Carrel, The Internet Key Exchange (IKE), vember FT Page 26 of 57 Appendix D Army UC RA Tech Stds
147 RFC 2427 RFC 2429 RFC 2439 RFC 2460 RFC 2461 RFC 2462 RFC 2464 RFC 2472 RFC 2473 RFC 2474 RFC 2475 RFC 2507 RFC 2508 RFC 2543 RFC 2544 Brown, C. and A. Malis, Multiprotocol Interconnect over Frame Relay, September Bormann, C., L. Cline, G. Deisher, T. Gardos, C. Maciocco, D. Newell, J. Ott, G. Sullivan, S. Wenger and C. Zhu, RTP Payload Format for the 1998 Version of ITU-T Rec. H.263 Video (H.263+), October Villamizar, C., R. Chandra, and R. Govindan, BGP Route Flap Damping, vember Deering S. and R. Hinden, Internet Protocol Version 6 (IPv6) Specification, December Yes M IETF RFC 2460 Narten, T., E. rdmark, and W. Simpson, Neighbor Discovery for IP Version 6 (IPv6), December Thomson, S. and T. Narten, IPv6 Stateless Address Autoconfiguration, December Crawford, M., Transmission of IPv6 Packets over Ethernet Networks, December Yes M IETF RFC 2464 Haskin, D. and E. Allen, IP Version 6 over PPP, December Conta, A. and S. Deering, Generic Packet Tunneling in IPv6 Specification, December Nichols, K., S. Blake, F. Baker, and D. Black, Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers, December Yes M IETF RFC 2474 Blake, S., D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, An Architecture for Differentiated Services, December Yes N IETF RFC 2475 Degermark, M., rdgren, B., and S. Pink, IP Header Compression, February 1999 Yes M IETF RFC 2507 Casner, S. and V. Jacobson, Compressing IP/UDP/RTP Headers for Low-Speed Serial Links, February Handley, M., H. Schulzrinne, E. Schooler, J. Rosenberg, SIP: Session Initiation Protocol, March Bradner, S. and J. McQuaid, Benchmarking Methodology for Network Interconnect Devices, March FT Page 27 of 57 Appendix D Army UC RA Tech Stds
148 RFC 2545 RFC 2547 RFC 2560 Standard ID RFC 2578 RFC 2579 RFC 2580 RFC 2581 RFC 2597 RFC 2598 RFC 2605 RFC 2615 RFC 2660 RFC 2684 RFC 2685 RFC 2702 Marques, P. and F. Dupont, Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing, March Rosen, E. and Y. Rekhter, BGP/MPLS VPNs, March Myers, M., Ankney, R., Malpani, A., Galperin, S. and C. Adams, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, June Standard Title Is the Standard in DISRonli ne? Stat us DISR Standard ID McCloghrie, K., D. Perkins, and J. Schoenwaelder, Structure of Management Information Version 2 (SMIv2), April McCloghrie, K., D. Perkins, and J. Schoenwaelder, Textual Conventions for SMIv2, April McCloghrie, K., D. Perkins, and J. Schoenwaelder, Conformance Statements for SMIv2, April Allman, M., Paxson, V. and W. Stevens, TCP Congestion Control, April Heinanen, J., F. Baker, W. Weiss, and J. Wroclawski, Assured Forwarding PHB Group, June Yes M IETF RFC 2597 Jacobson, V., Nichols, K. and K. Poduri, An Expedited Forwarding PHB, June 1999 Mansfield, G. and S. Kille, Directory Server Monitoring MIB, June Yes M IETF RFC 2605 Malis, A. and W. Simpson, PPP over SONET/SDH, June Rescorla, E., and A. Schiffman, The Secure HyperText Transfer Protocol, August Grossman, D, and J. Heinanem, Multiprotocol Encapsulation over ATM Adaptation Layer 5, September Fox, B., B. Gleeson, Virtual Private Networks Identifier, September Awduche, D., J. Malcolm, J. Agogbua, M. O Dell, and J. McManus, Requirements for Traffic Engineering Over MPLS, September FT Page 28 of 57 Appendix D Army UC RA Tech Stds
149 RFC 2710 Deering S., W. Feener, and B. Haberman, Multicast Listener Discovery (MLD) for IPv6, October Yes M IETF RFC 2710 RFC 2711 Partridge, C. and A. Jackson, IPv6 Router Alert Option, October RFC 2719 L. Ong, I. Rytina, M. Garcia, H. Schwarzbauer, L. Coene, H. Lin, I. Juhasz, M. Holdredge, C. Sharp, Architectural Framework for Signaling Transport, October RFC 2737 McCloghrie, K. and A. Bierman, Entity MIB (Version 2), December RFC 2740 Coltun, R., D. Ferguson, and J. Moy, OSPF for IPv6, December RFC 2747 Baker, F., Lindell, B., Talwar, M., RSVP Cryptographic Authentication, January RFC 2766 Tsirtsis, G. and P. Srisuresh., Network Address Translation Protocol Translation (NAT-PT), February RFC 2778 Day, M., Rosenberg, J., A Model for Presence and Instant Messaging, February 2000 RFC 2782 Gulbrandsen, A., Vixie, P., and L. Esibov, A DNS RR for Specifying the Location of Services (DNS SRV), February RFC 2784 Farinacci, D., T. Li, S. Hanks, D. Meyer, and P. Traina, Generic Routing Encapsulation (GRE), March Yes M IETF RFC 2784 RFC 2787 Jewell, B., Definitions of Managed Objects for the Virtual Router Redundancy Protocol, March RFC 2788 Freed, N., and S. Kille, Network Services Monitoring MIB, March Yes E IETF RFC 2788 RFC 2796 Bates, T., Chandra, R., and E. Chen, BGP Route Reflection An Alternative to Full Mesh IBGP April RFC 2805 Greene, N., M. Ramalho, and B. Rosen, Media Gateway Control Protocol Architecture and Requirements, RFC 2805, April RFC 2818 Rescorla, E., HTTP over TLS, May RFC 2819 Waldbusser, S., Remote Network Monitoring Management Information Base, May RFC 2829 Authentication Methods for LDAP RFC 2830 Lightweight Directory Access Protocol (V3) Extension for Transport Layer Security (TLS) FT Page 29 of 57 Appendix D Army UC RA Tech Stds
150 RFC 2833 Schulzrinne, H. and S. Petrack, RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals, May RFC 2858 Bates, T., Y. Rekhter, R. Chandra, and D. Katz, Multiprotocol Extensions for BGP-4, June RFC 2863 McCloghrie, K. and F. Kastenholz, The Interface Group MIB, June Yes M IETF RFC 2863 RFC 2865 Rigney, C., Willens, S., Rubens, A., and W. Simpson, Remote Authentication Dial In User Service (RADIUS), June Yes M IETF RFC 2865 RFC 2866 Rigney, C., RADIUS Accounting, June RFC 2917 Muthukrishnan, K. and A. Malis, A Core MPLS IP VPN Architecture, September RFC 2918 Chen, E., Route Refresh Capability for BGP-4, September RFC 2961 Berge, L., Gan, D., Swallow, G., Pan, P., Tommasi, F., Molendini, S., RSVP Refresh Overhead Reduction Extensions, April RFC 2973 Balay, R., Katz, D., Parker, J., IS-IS Mesh Groups, October RFC 3031 Rosen, E., A. Viswanathan, and R. Callon, Multiprotocol Label Switching Architecture, January Yes M IETF RFC 3031 RFC 3032 Rosen, E., D. Tappan, G. Fedorkow, Y. Rekter, D. Farinacci, T. Li, and A. Conta, MPLS Label Stack Encoding, January RFC 3036 Andersson, L., P. Doolan, N. Feldman, A. Fredette, and B. Thomas, LDP Specification, January RFC 3037 Thomas, B. and E. Gray, LDP Applicability, January RFC 3041 Narten, T. and R. Draves, Privacy Extensions for Stateless Address Autoconfiguration in IPv6, January RFC 3053 Durand, A., P. Fasano, I. Guardini, and D. Lento, IPv6 Tunnel Broker, January 2001 RFC 3060 Moore, B., Ellesson, E., Strassner, J., and A. Westerinen, Policy Core Information Model Version 1 Specification, February Yes M IETF RFC 3060 RFC 3086 Nichols, K. and B. Carpenter, Definition of Differentiated Services Per Domain Behaviors and Rules for their Specification, April RFC 3097 Braden, R. and L. Zhang, RSVP Cryptographic Authentication Updated Message Type Value, April FT Page 30 of 57 Appendix D Army UC RA Tech Stds
151 RFC 3107 RFC 3140 RFC 3162 RFC 3164 RFC 3168 RFC 3173 RFC 3181 RFC 3195 RFC 3204 RFC 3209 RFC 3210 RFC 3246 RFC 3260 RFC 3261 RFC 3262 RFC 3263 RFC 3264 Rekhter, Y. and E. Rosen, Carrying Label Information in BGP-4, May Yes M IETF RFC 3107 Black, D., S. Brim, B. Carpenter, and F. Le Faucheur, Per Hop Behavior Identification Codes, June Aboba, B., G. Zorn, and D. Mitton, RADIUS and IPv6, August Yes M IETF RFC 3162 Lonvick, C., The BSD syslog Protocol August Ramakrishnan, K., Floyd, S., and D. Black, RADIUS and IPv6, September 2001 Shacham, A., Monsour, B., Pereira, R., and M. Thomas, IP Payload Compression Protocol (IPComp), September 2001 Yes E IETF RFC 3173 Herzog, S., Signaled Preemption Priority Policy Element, October Yes E IETF RFC 3181 New, D. and M. Rose, Reliable Delivery for syslog, vember Zimmerer, E., J. Peterson, A. Vemuri, L. Ong, F. Audet, M., Watson, and M. Zonoun, MIME media types for ISUP and QSIG Objects, December Awduche, D., L. Berger, D. Gan, T. Li, V. Srinivasan, and G. Swallow, RSVPTE: Extensions to RSVP for LSP Tunnels, December Yes M IETF RFC 3209 Awduche, D., A. Hannan, and X. Xiao, Applicability Statement for Extensions to RSVP for LSP-Tunnels, December Davie, B., A. Charny, J.C.R. Bennett, K. Benson, J.Y. Le Boudec, W. Courtney, S. Davari, V. Firoiu, and D. Stiliadis, An Expedited Forwarding PHB (Per-Hop Behavior), March Grossman, D., New Terminology and Clarification for Diffserv, April Rosenberg, J., H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and R. Schooler, SIP: Session Initiation Protocol, June Yes M IETF RFC 3261 Rosenberg, J. and H. Schulzrinne, Reliability of Provisional Responses in Session Initiation Protocol (SIP), June Yes M IETF RFC 3262 Session Initiation Protocol (SIP): Locating SIP Servers-Jun 02 Yes M IETF RFC 3263 Rosenberg, J. and H. Schulzrinne, An Offer/Answer Model with the Session Description Protocol (SDP), June Yes M IETF RFC 3264 FT Page 31 of 57 Appendix D Army UC RA Tech Stds
152 RFC 3265 RFC 3266 RFC 3267 RFC 3270 RFC 3273 RFC 3310 RFC 3311 RFC 3312 RFC 3315 RFC 3323 RFC 3325 RFC 3326 RFC 3329 Roach, A. B., Session Initiation Protocol (SIP)- Specific Event tification, June Yes M IETF RFC 3265 Olson, S., G. Camarillo, and A. B. Roach, Support for IPv6 in Session Description Protocol, June Sjoberg, J., M. Westerlund, A. Lakaniemi, and Q. Xie, Real-Time Transport Protocol (RTP) Payload Format and File Storage Format for the Adaptive Multi-Rate (AMR) and Adaptive Multi- Rate Wideband (AMR-WB) Audio Codecs, June Le Faucheur, F., L. Wu, B. Davie, S. Davari, P. Vaananen, R. Krishnan, P. Cheval, and J. Heinanen, Multi-Protocol Label Switching (MPLS) Support of Differentiated Services, May Yes M IETF RFC 3270 Waldbusser, S., Remote Network Monitoring Management Information Base for High Capacity Networks, July Yes M IETF RFC 3273 Niemi, A., J. Arkko, and V. Torvinen, Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA), September Rosenberg, J., The Session Initiation Protocol (SIP) UPDATE Method, September Camarillo, G., W. Marshall, and J. Rosenberg, Integration of Resource Management and Session Initiation Protocol (SIP), October Droms, E., J. Bound, B. Volz, T. Lemon, C. Perkins, and M. Carney, Dynamic Host Configuration Protocol for IPv6 (DHCPv6), July Yes M IETF RFC 3315 Peterson, J., A Privacy Mechanism for the Session Initiation Protocol (SIP), vember Jennings, C., J. Peterson, and M. Watson, Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks, vember Schulzrinne, H., D. Oran, and G. Camarillo, The Reason Header Field for the Session Initiation Protocol (SIP), December Arkko, J., V. Torvinen, G. Camarillo, A. Niemi, and T. Haukka, Security Mechanism Agreement for the Session Initiation Protocol (SIP), January FT Page 32 of 57 Appendix D Army UC RA Tech Stds
153 RFC 3331 RFC 3344 RFC 3345 RFC 3359 RFC 3366 RFC 3376 RFC 3392 RFC 3393 RFC 3398 RFC 3410 RFC 3411 RFC 3412 RFC 3413 RFC 3414 Morneault, K., R. Dantu, G. Sidebottom, B. Bidulock, and J. Heitz, Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) User Adaptation Layer, September Perkins, C., IP Mobility Support for IPv4, August Yes M IETF RFC 3344 McPherson, D., Gill, V, Walton, D., and A. Retana, Border Gateway Protocol (MGP) Persistent Route Oscillation Condition, August Przygienda, T., Reserved Type, Length and Value (TLV) codepoints in Intermediate System to Intermediate System August Fairhurst, G., and L. Wood, Advice to link designers on link Automatic Repeat request (ARQ), August Cain, B., Deering, S., Kouvelas, I., Fenner, B., and A. Thyagarajan, Internet Group Management Protocol, Version 3, October Yes M IETF RFC 3376 Chandra, R. and J. Scudder, Capabilities Advertisement with BGP-4, vember 2002 Yes M IETF RFC 3392 Demichelis, C. and P. Chimento, IP Packet Delay Variation Metric for IP Performance Metrics (IPPM), vember Camarillo, G., A. B. Roach, J. Peterson, and L. Ong, Integrated Services Digital Network (ISDN) User Part (ISUP) to Session Initiation Protocol (SIP) Mapping, December Case, J., R. Mundy, D. Partain, and B. Stewart, Introduction and Applicability Statements for Internet Standard Management Framework, December Harrington, D., R. Presuhn, and B. Wijnen, An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks, December Yes M IETF RFC 3411 Case, J., D. Harrington, R. Presuhn, and B. Wijnen, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP), December 2002 Yes M IETF RFC 3412 Levi, D., P. Meyer, and B. Stewart, Simple Network Management Protocol (SNMP) Applications, December Yes M IETF RFC 3413 Blumenthal, U., and B. Wijnen, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol Yes M IETF RFC 3414 FT Page 33 of 57 Appendix D Army UC RA Tech Stds
154 RFC 3415 RFC 3416 RFC 3417 RFC 3418 RFC 3428 RFC 3443 RFC 3446 RFC 3455 RFC 3471 RFC 3473 RFC 3478 RFC 3479 (SNMPv3), December Wijnen, B., R. Presuhn, and K. McCloghrie, View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP), December 2002 Yes M IETF RFC 3415 Presuhn, R., Ed., J. Case, K. McCloghrie, M. Rose, and S. Waldbusser, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP), December Yes M Presuhn, R., Ed., J. Case, K. McCloghrie, M. Rose, and S. Waldbusser, Transport Mappings for the Simple Network Management Protocol (SNMP), December Yes M Presuhn, R., Ed., J. Case, K. McCloghrie, M. Rose, and S. Waldbusser, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP), December Yes M SIP Extension for Instant Messaging -Dec 02 Agarwal, P. and B. Akyol, Time To Live (TTL) Processing in Multi-Protocol Label Switching (MPLS) Networks, January Kim, D., Meyer, D., Kilmer, H., and D. Farinacci, Anycast Rendevous Point (RP) Mechanism using Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP), January Garcia-Martin, M., E. Henrikson, and D. Mills, Private Header (P-Header) Extensions to the SIP for the 3rd-Generation Partnership Project (3GPP), January IETF Std. 62/IETF RFC 3416 IETF Std. 62/IETF RFC 3417 IETF Std. 62/IETF RFC 3418 Yes M IETF RFC 3428 Berger, L., Ed., Generalized Multi-Protocol Label Switching (GMPLS) Signaling Functional Description, January Yes N IETF RFC 3471 Berger, L., Ed., Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP- TE) Extensions, January Leelanivas, M., Y. Rekhter, and R. Aggarwal, Graceful Restart Mechanism for Label Distribution Protocol, February Farrel, A., Ed., Fault Tolerance for the Label Distribution Protocol (LDP), February FT Page 34 of 57 Appendix D Army UC RA Tech Stds
155 RFC 3484 RFC 3486 Draves, R., Default Address Selection for Internet Protocol Version 6 (IPv6), February Yes M IETF RFC 3484 Camarillo, G., Compressing the Session Initiation Protocol (SIP), February 2003 RFC 3515 Sparks, R., The SIP Refer Method, April RFC 3524 Mapping of Media Streams to Resource Reservation Flows, April 2003 Yes E IETF RFC 3524 RFC 3539 Aboda, B. and J. Wood, Authentication, Authorization and Accounting (AAA) Transport Profile, June RFC 3544 Koren, T., Casner, S., and C. Bormann, IP Header Compression over PPP, July 2003 Yes M IETF RFC 3544 RFC 3550 Schulzrinne, H., S. Casner, R. Frederick, and V. Jacobson, RTP: A Transport Protocol for Real- Time Applications, July RFC 3564 Le Faucheur, F. and W. Lai, Requirements for Support of Differentiated Services-aware MPLS Traffic Engineering, July RFC 3569 Bhattacharyya, S., An Overview of Source- Specific Multicast (SSM), July 2003 RFC 3579 Aboda, B. and P. Calhoun, RADIUS (Remote Authentication Dial In User Service) Support for Extensible Authentication Protocol (EAP), September RFC 3581 Rosenberg, J. and H. Schulzrinne, An Extension to the Session Initiation Protocol (SIP) for Symmetric Response Routing, August RFC 3584 Frye, R., D. Levi, S. Routhier, and B. Wijnen, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework, August RFC 3585 Jason, J., Rafalow, L., and E. Vyncke, IPsec Configuration Policy Information Model, August Yes M IETF RFC 3585 RFC 3586 Blaze, M., Keromytis, A., Richardson, M., and L. Sanchez, IP Security Policy (IPSP) Requirements, August RFC 3588 Calhoun, P., Loughney, J. Guttman, E., Zorn, G. and J. Arkko, Diameter Base Protocol, September RFC 3595 Wijnen, B., Textual Conventions for IPv6 Flow Label, September RFC 3596 Thomson, S., C. Huitema, V. Ksinant, and M. Souissi, DNS Extensions to Support IPv6, Yes M IETF RFC 3596 FT Page 35 of 57 Appendix D Army UC RA Tech Stds
156 RFC 3603 October Marshall, W. and F. Andreasen, Private SIP Proxyto-Proxy Extensions for Supporting the PacketCable Distributed Call Signaling Architecture, October RFC 3608 RFC 3611 RFC 3618 RFC 3623 RFC 3644 RFC 3647 RFC 3662 RFC 3670 RFC 3711 RFC 3725 RFC 3748 RFC 3764 RFC 3810 Willis, D., and B. Hoeneisen, SIP Extension Header Field for Service Route Discovery During Registration, October Friedman, T., Caceres, R., and A. Clark, RTP Control Protocol Extended Reports (RTCP XR), vember Fenner, B. and D. Meyer, Multicast Source Discovery Protocol (MSDP), October Yes E IETF RFC 3618 Moy, J., Pillay-Esnault, F., and A. Lindem, Graceful OSPF Restart, vember 2003 Snir, Y., Ramberg, Y. Strassner, J. Cohen, R., and B. Moore, Policy QoS Information Model, vember Yes M IETF RFC 3644 Chokhani, S., W. Ford, R. Sabett, C. Merrill, and S. Wu, Internet X.509 Public Key Infrastructure Certification Policy and Certification Practices Framework, vember Bless, R., K. Nichols, and K. Wehrle, A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services, December Moore, B., D. Durham, J. Strassner, A. Westerinen, and W. Weiss, Information Model for Describing Network Device QoS Datapath Mechanism, January Yes M IETF RFC 3670 Baugher, M., D. McGrew, M. Naslund, E. Carrara, and K. rrman, The Secure Real-time Transport Protocol (SRTP), March Rosenberg, J., Peterson, J., Schulzrinne, H., and G. Camarillo, Best Current Practices for Third Party Call Control (3pcc) in the Session initiation Protocol (SIP), March Aboba, B., Blunk, L, Vollbrecht, J. Carlson, J. and H. Levkowetz, Ed., Extensible Authentication Protocol IEAP), June Person, J., enumservice registration for SIP Addresses-of-Record), April Vida, R., Ed. and L. Costa, Ed., Multicast Listener Discovery Version 2 (MLDv2) for IPv6, Yes M IETF RFC 3810 FT Page 36 of 57 Appendix D Army UC RA Tech Stds
157 RFC 3826 RFC 3840 RFC 3842 RFC 3853 June Blumenthal, U., F. Maino, and K. McCloghrie, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model, June Rosenberg, J., H. Schulzrinne, and P. Kyzivat, Indicating User Agent Capabilities in the SIP, August Mahy, R., A Message Summary and Message Waiting Indication Event Package for the SIP, August Peterson, J., S/MIME Advanced Encryption Standard (AES) Requirements for the SIP, July RFC 3856 A Presence Event Package for the SIP-Aug 04 Yes M IETF RFC 3856 RFC 3857 RFC 3858 RFC 3868 RFC 3879 RFC 3890 A Watcher Information Event Template-Package for the SIP-Optional-Aug 04 An Extensible Markup Language (XML) Based Format for Watcher Information Optional - Aug 04 Loughney, J., Ed., G. Sidebottom, L. Coene, G. Verwimp, J. Keller, and B. Bidulock, Signalling Connection Control Part User Adaptation Layer (SUA), October Huitema, C. and B. Carpenter, Deprecating Site Local Addresses, September 2004 Westerlund, M., A Transport Independent Bandwidth Modifier for the Session Description Protocol (SDP), September RFC 3891 RFC 3892 RFC 3893 Mahy, R., B. Biggs, and R. Dean, The SIP Replaces Header, September Sparks, R., The SIP Referred-By Mechanism, September Peterson, J., SIP Authenticated Identity Body (AIB) Format, September RFC 3903 SIP Extension for Event State Publication-Oct 04 Yes M IETF RFC 3903 RFC 3913 Thaler, D., Border Gateway Multicast Protocol (BGMP), September RFC 3920 Saint-Andre, P., Extensible Messaging and Presence Protocol (XMPP): Core, draft-ietfxmpp-3920bis-17, October 6, FT Page 37 of 57 Appendix D Army UC RA Tech Stds
158 RFC 3921 RFC 3936 RFC 3948 RFC 3966 RFC 3968 RFC 3984 RFC 3986 RFC 3994 RFC 4003 RFC 4007 RFC 4022 Saint-Andre, P., Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence, draft-ietf-xmpp-3921bis-15, October 06, Kompella, K. and J. Lang, Procedures for Modifying the Resource reservation Protocol (RSVP), October Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M. Stenberg, UDP Encapsulation of IPsec ESP Packets, January Schulzrinne, H., The tel URI for Telephone Numbers, December Camarillo, G., The Internet Assigned Number Authority (IANA) Header Field Parameter Registry for the Session Initiation Protocol (SIP), December Wenger, S., M. M. Hannuksela, T., Stockhammer, M. Westerlund, and D. Singer, RTP Payload Format for H.264 Video, February Berners-Lee, T., R. Fielding, and L. Masinter, Uniform Resource Identifier (URI): Generic Syntax, January Yes M Indication of Message Composition for Instant Messaging Optional-Jan 05 Berger, L., GMPLS Signaling Procedure for IETF Std. 66/RFC 3986 Egress Control, February Yes N IETF RFC 4003 Deering, S., B. Haberman, T. Jinmei, E. rdmark, and B. Zill, IPv6 Scoped Address Architecture, March Raghunarayan, R., Management Information Base for the Transmission Control Protocol (TCP), March Yes M IETF RFC 4022 Donovan, B., and J. Rosenberg, Session Timers in the Session Initiation Protocol (SIP), April RFC 4028 Kreuter, R., RTP Payload Format for a 64 kbit/s RFC 4040 Transparent Call, April McGloghrie, K., Fibre Channel Management RFC 4044 MIB, May RFC 4087 Thaler, D., IP Tunnel MIB, June Yes M IETF RFC 4087 Pan, P., Ed., G. Swallow, Ed., and A. Atlas, Ed., Fast Reroute Extensions to RSVP-TE for LSP RFC 4090 Tunnels, May Yes N IETF RFC 4090 FT Page 38 of 57 Appendix D Army UC RA Tech Stds
159 RFC 4091 RFC 4092 RFC 4108 RFC 4109 RFC 4113 RFC 4120 RFC 4122 Camarillo, G. and J. Rosenburg, The Alternative Network Address Types (ANAT) Semantics for the Session Description Protocol (SDP) Grouping Framework, June Camarillo, G. and J. Rosenburg, Usage of the Session Description Protocol (SDP) Alternative Network Address Types (ANAT) Semantics in the Session Initiation Protocol (SIP), June Housley, R., Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages, August Hoffman, P., Algorithms for Internet Key Exchange Version 1 (IKEv1), May 2005 Fenner, B. and J. Flick, Management Information Base for the User Datagram Protocol (UDP), June Yes M IETF RFC 4113 Neuman, C., T. Yu, S. Hartman, and K. Raeburn, The Kerberos Network Authentication Service (V5), July Yes M IETF RFC 4120 Leach, P., Mealling, M. and R. Salz, A Universally Unique Identifier (UUID) URN Namespace, July RFC 4123 RFC 4124 RFC 4165 RFC 4171 RFC 4176 RFC 4182 RFC 4191 Schulzrinne, H., SIP-H.323 Internetworking Requriements, July Faucheur, F., Protocol Extensions for Support of Diffserv-aware MPLS Traffic Engineering, June George, T., B. Bidulock, R. Dantu, H. Schwarzbauer, and K. Morneault, SS7 Message Transfer Part 2 (MTP2) User Peer-to-Peer Adaptation Layer (M2PA), September Tseng, J., K. Gibbons, F. Travostino, C. Du Laney, and J. Souza, Internet Storage Name Service (isns), September El Mghazli, Y., Ed., T. Nadeau, M. Boucadair, K. Chan, AND A. Gonguet, Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management, October Rosen, E., Removing a Restriction on the use of MPLS Explicit NULL, September Draves, R. and D. Thaler, Default Router Preferences and More-Specific Routes, vember FT Page 39 of 57 Appendix D Army UC RA Tech Stds
160 RFC 4193 RFC 4201 RFC 4204 RFC 4206 RFC 4213 RFC 4233 RFC 4244 RFC 4251 RFC 4252 RFC 4253 RFC 4254 RFC 4271 RFC 4282 RFC 4291 RFC 4292 RFC 4293 RFC 4294 RFC 4301 RFC 4302 Hinden, R. and B. Haberman, Unique Local IPv6 Unicast Addresses, October 2005 Yes M IETF RFC 4193 Kompella, K., Y. Rekhter, and L. Berger, Link Bundling in MPLS Traffic Engineering (TE), October Lang, J., Link Management Protocol (LMP), October Yes N IETF RFC 4204 Kompella, K. and Y. Rekhter, Label Switched Paths (LSP) Hierarchy with Generalized Multi- Protocol Label Switching (GMPLS) Traffic Engineering (TE), October Yes N IETF RFC 4206 rdmark, E. and R. Gilligan, Basic Transition Mechanisms for IPv6 Hosts and Routers, October Yes M IETF RFC 4213 Morneault, K., S. Rengasami, M. Kalla, and G. Sidebottom, Integrated Services Digital Network (ISDN) Q.921-User Adaptation Layer, January Barnes, M., Ed., An Extension to the Session Initiation Protocol (SIP) for Request History Information, vember Ylonen, T., and C. Lonvick, Ed., The Secure Shell (SSH) Protocol Architecture, January Yes M IETF RFC 4251 Ylonen, T., and C. Lonvick, Ed., The Secure Shell (SSH) Authentication Protocol, January Yes M IETF RFC 4252 Ylonen, T., and C. Lonvick, Ed., The Secure Shell (SSH) Transport Layer Protocol, January Ylonen, T., and C. Lonvick, Ed., The Secure Shell (SSH) Connection Protocol, January Yes M IETF RFC 4254 Rekhter, Y., T. Li, and S. Hares, A Border Gateway Protocol 4 (BGP-4), January Yes M IETF RFC 4271 Aboba, B., M. Beadles, J. Arkk and P. Eronen, The Network Access Identifier, December Yes E IETF RFC 4282 Hinden, R. and S. Deering, IP Version 6 Addressing Architecture, February 2006 Yes M IETF RFC 4291 Haberman, B., IP Forwarding Table MIB, April Yes M IETF RFC 4292 Routhier, S., Management Information Base for the Internet Protocol (IP), April 2006 Loughney, E., IPv6 de Requirements, April Kent, S. and K. Seo, Security Architecture for the Internet Protocol, December 2005 Yes M IETF RFC 4301 Kent, S., IP Authentication Header, December Yes M IETF RFC 4302 FT Page 40 of 57 Appendix D Army UC RA Tech Stds
161 RFC 4303 RFC 4305 RFC 4306 RFC 4307 RFC 4308 RFC 4309 RFC 4320 RFC 4328 RFC 4338 RFC 4344 RFC 4360 RFC 4362 RFC 4364 RFC 4379 RFC 4382 Kent, S., IP Encapsulating Security Payload (ESP), December Yes M IETF RFC 4303 Eastlake, D., Cryptographic Algorithm Implementation Requirements for the Encapsulating Security Payload (ESP) and Authentication Header (AH), December Kaufman, E., Internet Key Exchange (IKEv2) Protocol, December Schiller, J., "Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2), December Yes M IETF RFC 4307 Hoffman, P., Cryptographic Suites for IPSec, December Yes M IETF RFC 4308 Housley, R., Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP), December Sparks, R., Action Addressing Identified Issues with the Session Initiation Papadimitriou, D., Ed., Generalized Multi- Protocol Label Switching (GMPLS) Signaling Extensions for G.709 Optical Transport Networks Control, January 2006 Yes M IETF RFC 4328 DeSanti, C., Carlson, C., and R. Nixon., Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP) Packets over Fibre Channel, January Bellare, M., Kohno, T., and C. Namprempre., The Secure Shell (SSH) Transport Layer Encryption Modes, January Sangli, S., Tappan, D., and Y. Rekhter, BGP/Extended Communities Attribute, February Jonsson, L-E, Pelletier, G., and K. Sandlund, RObust Header Compression (ROHC): A Link- Layer Assisted Profile for IP/UDP/RTP, February (Replaces RFC 2547) Yes E IETF RFC 4362 Rosen, E. and Y. Rekhter, BGP/MPLS IP VPNs, February (Replaces RFC 2547) Yes M IETF RFC 4364 Kompella, K. and G. Swallow, Detecting Multi- Protocol Label Switched (MPLS) Data Plane Failures, February Nadeau, T., Ed., and H. van der Linde, Ed., MPLS/BGP Layer 3 VPN Management Information Base, February FT Page 41 of 57 Appendix D Army UC RA Tech Stds
162 RFC 4411 Polk, J., Extending the SIP Reason Header for Preemption Events, February RFC 4412 Schulzrinne, H. and J. Polk, Communications Resource Priority for the SIP, February RFC 4420 Farrel, A., Ed., D. Papadimitriou, J.P. Vasseur, and A. Ayyangar, Encoding of Attributes for Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) Establishment Using Resource ReserVation Protocol-Traffic Engineering (RSVPTE), February Yes N IETF RFC 4420 RFC 4422 Melnikov, E., Zeilenga, E., Simple Authentication and Security layer (SASL), June RFC 4443 Conta, A., S. Deering, and M. Gupta, Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification, March Yes M IETF RFC 4443 RFC 4447 Martini, L., Ed., E. Rosen, N. El-Aawar, T. Smith, and G. Heron, Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP), April 2006 RFC 4448 Martini, L., Ed., E. Rosen, N. El-Aawar, and G. Heron, Encapsulation Methods for Transport of Ethernet over MPLS Networks, April Yes N IETF RFC 4448 RFC 4456 Bates, T., Chen, E., BGP Route Reflection: An Alternative to Full Mesh Internal BGP (IBGP), April Yes M IETF RFC 4456 RFC 4479 A Data Model for Presence-July 06 RFC 4480 RPID: Rich Presence Extensions to the Presence Information Data Format (PIDF)- July 06 RFC 4481 Timed Presence Extensions to the Presence Information Data Format (PIDF) to Indicate Status Information for Past and Future Time Intervals July 06 RFC 4482 CIPID: Contact Information in Presence Information Data Format Aug 06 RFC 4502 Waldbusser, S., Remote Network Monitoring Management Information Base Version 2, May Yes M IETF RFC 4502 RFC 4510 Zeilenga, E., Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map, June Yes M IETF RFC 4510 RFC 4511 Sermersheim, J., Lightweight Directory Access Protocol (LDAP): The Protocol, June FT Page 42 of 57 Appendix D Army UC RA Tech Stds
163 RFC 4552 RFC 4566 RFC 4568 RFC 4573 RFC 4574 RFC 4575 Gupta, M. and N. Melam, Authentication/Confidentiality for OSPFV3, June 2006 Handley, M., V. Jacobson, and C. Perkins, SDP: Session Description Protocol, July Andreasen, F., M. Baugher, and D. Wing, Session Description Protocol (SDP) Security Descriptions for Media Streams, July Even, R., and A. Lochbaum, MIME Type Registration for RTP Payload Format for H.224, July Levin, O., and G. Camarillo, Session Description Protocol (SDP) Label Attribute, August Rosenberg, J., Schulzrinne, H., and O. Levin, A SIP) Event Package for Conference State, August RFC 4577 RFC 4579 RFC 4582 RFC 4583 RFC 4585 RFC 4601 RFC 4604 RFC 4607 RFC 4616 Rosen, E., Psenak, P., and P. Pillay-Esnault, OSPF as the Provided/Customer Edge Protocol for BGP/MPLS IP VPNs, June Johnston, A. and O. Levin, SIP Call Control Conferencing for User Agents, August Camarillo, G., J. Ott, and K. Drage, The Binary Floor Control Protocol (BFCP), vember Camarillo, G., Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams, vember Ott, J., S. Wenger, N. Sato, C. Burmeister, and J. Rey, Extended RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/AVPF), July Fenner, B., Handley, M., Holbrook, H., and I. Kouvelas, Protocol Independent Multicast Sparse Mode (PIM-SM): Protocol Specification (Revised), August 2006 Yes M IETF RFC 4601 Holbrook, H., Haberman, B. and B. Cain, Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery protocol Version 2 (MLDv2) for Source-Specific Multicast, August Holbrook, H. and B. Cain, Source-Specific Multicast for IP, August Zeilenga, K., The PLAIN Simple Authentication and Security Layer (SASL) Mechanism, August FT Page 43 of 57 Appendix D Army UC RA Tech Stds
164 RFC 4659 RFC 4660 RFC 4661 RFC 4662 RFC 4666 RFC 4684 RFC 4724 De Clercq, J., D. Ooms, M. Carugi, and F. Le Faucheur, BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN, September Functional Description of Event tification Filtering - Sep 06; An Extensible Markup Language (XML) Based Format for Event tification Filtering Sep 06 A SIP Event tification Extension for Resource Lists- Sept 06 Morneault, K., Ed., and J. Pastor-Balbas, Ed., SS7 Message Transfer Part 3 (MTP3) User Adaptation Layer (M3UA), September Marques, P., R. Bonica, L. Fang, L. Martini, R. Raszuk, K. Patel, and J. Guichard, Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) VPNs, vember Sangli, S., Chen, E., Fernando, R., Scudder, J., Rekhter, Y., Graceful Restart Mechanism for BGP, January RFC 4730 RFC 4733 RFC 4750 RFC 4760 RFC 4761 RFC 4762 RFC 4783 Burger, E. and M. Dolly, A SIP Event Package for Key Press Stimulus (KPML), vember Schulzrinne, H. and T. Taylor, RTP Payload for DTMF Digits, Telephony Tones, and Telephony Signals, December Joyal, D., Galecki, P., and S. Giacalone, OSPF Version 2 Management Information Base, December Yes M IETF RFC 4750 Bates, T., R. Chandra, D. Katz and Y. Rekhter, Multiprotocol Extensions for BGP-4, January Yes M IETF RFC 4760 Kompella, K., Ed. and Y. Rekhter, Ed., Virtual Private LAN Service (VPLS) Using BGP for Auto- Discovery and Signaling, January (Updated by RFC 5462). Lasserre, M., Ed. and V. Kompella, Ed., Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling, January Berger, L., Ed., GMPLS Communication of Alarm Information, December 2006 FT Page 44 of 57 Appendix D Army UC RA Tech Stds
165 RFC 4796 RFC 4807 RFC 4825 RFC 4826 RFC 4827 RFC 4835 RFC 4861 RFC 4862 RFC 4864 RFC 4867 RFC 4869 RFC 4872 RFC 4873 Hautakorpi, J. and G. Camarillo, The Session Description Protocol (SDP) Content Attribute, February Baer, M., R. Charlet, W. Hardaker and R. Story, IPSec Security Policy Dtabase Configuration MIB, March 2007.RFC 4835Manral, V., Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH), April The Extensible Markup Language (XML) Configuration Access Protocol (XCAP) May 07 Extensible Markup Language (XML) Formats for Representing Resource Lists May 07 An Extensible Markup Language (XML) Configuration Access Protocol (XCAP) Usage for Manipulating Presence Document Contents- May 07 Manral, V., Cryptographic Algorithm Implementation Requirements for Encapsulating Secruity Payload (ESP) and Authentication Header (AH), April 2007 Yes M IETF RFC 4835 Narten, T., E. rdmark, W. Simpson, and H. Soliman, Neighbor Discovery for IP Version 6 (IPv6), September Yes M IETF RFC 4861 Thomson, S., T. Narten, and T. Jinmei, IPv6 Stateless Address Autoconfiguration, September Van de Velde, G., Hain, T., Droms, R., Carpenter, B., and E. Klein, Local Network Protection for IPv6, May Sjoberg, J., Westerlund, M., Lakaniemi, A., and Q. Xie, RTP Payload Format and File Storage Format for the Adaptive Multi-Rate (AMR) and Adaptive Multi-Rate Wideband (AMR-WB) Audio Codecs, April Law, L. and J. Solinas, Suite B Cryptographic Suites for IPsec, May Yes M IETF RFC 4869 Lang, J.P., Ed., Y. Rekhter, Ed., and D. Papadimitriou, Ed., RSVP-TE Extensions in Support of End-to-End Generalized Multi- Protocol Label Switching (GMPLS) Recovery, May Yes N IETF RFC 4872 Berger, L., I. Bryskin, D. Papadimitriou, and A. Farrel, GMPLS Segment Recovery, May FT Page 45 of 57 Appendix D Army UC RA Tech Stds
166 RFC 4874 Lee, C.Y., A. Farrel, and S. De Cnodder, Exclude Routes Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE), April Yes N IETF RFC 4874 RFC 4904 Gurbani, V. and C. Jennings, Representing Trunk Groups in tel/sip Uniform Resource Identifiers (URIs), June RFC 4918 Dusseault, L., Ed., HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV), June RFC 4940 Kompella, K. and B. Fenner, IANA Considerations for OSPF, June RFC 4941 Narten, T., R. Draves, and S. Krishnan, Privacy Extensions for Stateless Address Autoconfiguration in IPv6, September RFC 4960 Stewart, E., Stream Control Transmission Protocol, September RFC 4966 Aoun, C. and E. Devies, Reasons to Move the Network Address Translator Protocol Translator (NAT-PT) to Historic Status, July RFC 4974 Papadimitriou, D. and A. Farrel, Generalized MPLS (GMPLS) RSVP-TE Signaling Extensions in Support of Calls, August Yes N IETF RFC 4974 RFC 4975 The Message Session Relay Protocol (MSRP)-Sep 07 RFC 4976 Relay Extensions for the Message Sessions Relay Protocol (MSRP)-Sep 07 RFC 5025 Presence Authorization Rules-Dec 07 RFC 5036 Andersson, L, Minei, I., and R. Thomas, LDP Specification, October RFC 5059 Bhaskar, N., Gall, A., Lingard, J., and S. Venaas, Bootstrap Router (BSR) Mechanism for Protocol Independent Multicast (PIM), January RFC 5063 Satyanarayana, A., Ed. and R. Rahman, Ed., Extensions to GMPLS Resource Reservation Protocol (RSVP) Graceful Restart, October Yes N IETF RFC 5063 RFC 5065 Traina, P., McPherson, D. and J. Scudder, Antonomous System Confederations for BGP, August RFC 5072 Varada, S., IP Version 6 over PPP, September Yes M IETF RFC 5072 FT Page 46 of 57 Appendix D Army UC RA Tech Stds
167 RFC 5095 RFC 5104 RFC 5129 RFC 5151 RFC 5184 RFC 5246 RFC 5301 RFC 5303 RFC 5304 RFC 5305 RFC 5306 RFC 5307 RFC 5308 RFC 5309 RFC 5310 RFC 5331 Abley, J., P. Savola, and G. Neville-Neil, Deprecation of Type 0 Routing Headers in IPv6, December Wenger, S., U. Chandra, M. Westerlund, and B. Burman, Codec Control Messages in the RTP Audio-Visual Profile with Feedback (AVPF), February 2008 Davie, B., B. Briscoe, and J. Tay, Explicit Congestion Marking in MPLS, January Yes N IETF RFC 5129 Farrel, A., Ed., A. Ayyangar, and J.P. Vasseur, Inter-Domain MPLS and GMPLS Traffic Engineering Resource Reservation Protocol- Traffic Engineering (RSVP-TE) Extensions, February Yes N IETF RFC 5151 Teraoka, F., Gogo, K., Mitsuya, K., Shibui, R., and K. Mitani, Unified Layer 2 (L2) Abstractions for layer 3 (L3)-Driven Fast Handover, May Dierks, T. and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, August McPherson, D. and N. Shen, Dynamic Hostname Exchange Mechanism for ISIS, October Katz, D., Saluja, R. and D. Eastlake, Three-Way Handshake for IS-IS Point-to-Point Adjacencies, October Li, T. and R. Atkinson, IS-IS Cryptographic Authentication, October Li, T., Redback Networks, Inc., H. Smit, IS-IS Extensions for Traffic Engineering, October Yes N IETF RFC 5305 Shand, M., and L. Ginsberg, Restart Signaling for IS-IS, October Kompella, K. and Y. Rekhter, IS-IS Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS), October Hopps, C., Routing IPv6 with IS-IS, October Yes E IETF RFC 5308 Shen, N. and A. Zinin, Point-to-Point Operation over LAN in Link State Routing Protocols, October Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R. and M. Fanto., IS-IS Generic Cryptographic Authentication, February Aggarwal, R., Y. Rekhter, and E. Rosen, MPLS Upstream Label Assignment and Context- FT Page 47 of 57 Appendix D Army UC RA Tech Stds
168 RFC 5332 RFC 5340 RFC 5359 RFC 5415 RFC 5416 RFC 5420 RFC 5462 RFC 5492 RFC 5501 RFC 5626 RFC 5746 RFC 5798 RFC 5806 Specific Label Space, August Eckert, T., E. Rosen, Ed., R. Aggarwal, and Y. Rekhter, MPLS Multicast Encapsulations, August Coltun, R., Ferguson, D., Moy, J. and E. Lindem, OSPF for IPv6, July Yes M IETF RFC 5340 Johnston, A., Sparks, R., Cunningham, C., Donovan, S. and K. Summers, Session Initiation Protocol Service Examples, October Calhoun, P., Montemurro, M., and D. Stanley, Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Specification March 2009 Calhoun, P., Montemurro, M., and D. Stanley, Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Finding for IEEE March 2009 Farrel, A., Ed., D. Papadimitriou, J.P. Vasseur, and A. Ayyangarps, Encoding of Attributes for MPLS LSP Establishment Using Resource Reservation Protocol Traffic Engineering (RSVP- TE), February Andersson L. and R. Asati, Multiprotocol Label Switching (MPLS) Label Stack Entry: "EXP" Field Renamed to "Traffic Class" Field, February Scudder, J. and R. Chandra, Capabilities Advertisement with BGP-4, February 2009 Kamite, y., Ed., Y. Wada, Y. Serbest, T. Morin, and L. Fang, Requirements for Multicast Support in Virtual Private LAN Services, March Jennings, C., Mahy, R., and F. Audet, Managing client-initiated Connections in the Session initiation Protocol (SIP), October Rescorla, E., Ray, M., Dispensa, S., and N. Oskov, Transport Layer Security (TLS) Renegotiation Indication Extension, February Nadas, S., Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6, March Levy, S. and M. Mohali, Diversion Indication in SIP, March FT Page 48 of 57 Appendix D Army UC RA Tech Stds
169 RFC 5853 Hautakorpi, E., Camarillo, G., Penfield, R., Hawrylyshen, A., and M. Bhatia, Requirements from SIP Session Border Control (SBC) Deployments, April RFC 5922 RFC 5925 RFC 5954 RFC 6120 RFC 6121 RFC 6122 RFC draft Gurbani, V., Lawrence, S., and A. Jeffrey, Domain Certificates in the SIP, June Touch, J., Mankin, A., and R. Bonica, The TCP Authentication Option, June 2010 Gurbani, V., Carpenter, B., and B. Tate, Essential Correction for IPv6 ABNF and URI Comparison for RFC 3261, August Saint-Andre, P., Extensible Messaging and Presence Protocol (XMPP): Core, March 2011 Saint-Andre, P., Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence, March 2011 Saint-Andre, P., Extensible Messaging and Presence Protocol (XMPP): Address Format, March 2011 Harrison, J., J. Berger, M. Bartlett, Data Connection Ltd (DCL), draft-ietf-isisipv6-te, IPv6 Traffic Engineering in IS-IS, September 2009, expires March draft-saarenmaa-ssh-x509-00, JOINT REQUIREMENTS OVERSIGHT COUNCIL DOCUMENTATION JROCM Memorandum for the Under Secretary of Defense for Acquisition and Technology, Subject: Validation of DISN Capstone Requirements Document (CRD), 15 April 1996 JROCM GIG Capabilities Requirement Document (CRD), 30 August JROCM GIG, Mission Area Initial Capabilities Document (MA ICD), 22 vember U. S. SECURE COMMUNICATION INTEROPERABILITY PROTOCOL FT Page 49 of 57 Appendix D Army UC RA Tech Stds
170 SCIP-215 SCIP-216 FR-E911-1 FR-796 GR-63-CORE GR-217-CORE U.S. Secure Communication Interoperability Protocol (SCIP) over IP Implementation Standard and Minimum Essential Requirements (MER) Publication, Revision 2.1, 10 December Minimum Essential Requirements (MER) for V Gateways Publication, Revision 2.1, 10 December TELCORDIA TECHNOLOGIES DOCUMENTATION Feature Service Description (FSD) , Release to Pivot Network Capability. Requirements to Support E9-1-1 Service, Issue 5, January Reliability and Quality Generic Requirements (RQGR), Issue 1, October 1995; Issue 2; Issue 3, March 2006; Issue 5, April NEBS Requirements: Physical Protection, Issue 1, October 1995, Issue 2, April 2002, Issue 3, March LSSGR: CLASSSM Feature: Selective Call Forwarding (FSD ), Issue 1, June 2000; Issue 2, April GR-246-CORE Specification of SS7, 2005/12/30. GR-253-CORE GR-282-CORE GR-303-CORE GR-317-CORE GR-383-CORE GR-436-CORE GR-472-CORE SONET Transport Systems: Common Generic Criteria, December Software Reliability and Quality Acceptance Criteria (SRQAC), Issue 3, December Integrated Digital Loop Carrier System Generic Requirements, Objectives, and Interface, Issue 4, December Switching System Generic Requirements for Call Control Using the Integrated Services Digital Network User Part (ISDNUP), vember COMMON LANGUAGE Equipment Codes (CLEI Codes) Generic Requirements for Product Labels, Issue 3, February Digital Network Synchronization Plan, Issue 1 with Revision 1, June Network Element Configuration Management, Revision 2, February FT Page 50 of 57 Appendix D Army UC RA Tech Stds
171 GR-474-CORE OTGR Section 4: Network Maintenance: Alarm and Control for Network Elements, December GR-477CORE Network Traffic Management, February GR-478-CORE Measurements and Data Generation, Issue 4, February GR-496-CORE SONET Add-Drop Multiplexer (SONET ADM) Generic Criteria, Issue 2, August GR-499-CORE Transport Systems Generic Requirements (TSGR): Common Requirements, Issue 3, September GR-505-CORE Call Processing, December GR-506-CORE LSSGR: Signaling for Analog Interfaces, December GR-507-CORE LSSGR: Transition Section 7, January GR-512-CORE LSSGR: Reliability, Section 12, January GR-513-CORE Module of the LSSGR, FR-64, Issue 1, September GR-518-CORE LSSGR: Synchronization Section 18, Issue 1, May GR-529-CORE LSSGR: Public Safety, Issue 1, FSDs , , and , June GR-533-CORE LSSGR: Database Services Service Switching Points, Toll-Free Service, (FSD ), June GR-571-CORE LSSGR: Call Waiting, FSD , June GR-572-CORE LSSGR: Cancel Call Waiting, FSD , June GR-580-CORE LSSGR: Call Forwarding Variable, FSD , June GR-586-CORE LSSGR: Call Forwarding Subfeatures, FSD , April GR-606-CORE LSSGR: Common Channel Signaling, Section 6.5, Component of FR-64, December GR-740-CORE Stored Program Control System/Operations System (SPCS/OS) - Network Data Collection Operations System (NDC OS) Interface, March 2000). GR-782-CORE SONET Digital Switch Trunk Interface Criteria, A Module of TSGR, FR-440, Issue 1, June 2000 (Formerly TR-TSY , Issue 2, September 1989). FT Page 51 of 57 Appendix D Army UC RA Tech Stds
172 GR-815-CORE GR-820-CORE GR-874-CORE GR-957-CORE GR-1089-CORE GR-1100-CORE GR-1230-CORE GR-1244-CORE GR-1400-CORE GR-2911-CORE Generic Requirements for Network Element/Network System (NE/NS) Security: A Module of LSSGR, Component of FR-64, Issue 2, March OTGR Section 5.1: Generic Digital Transmission Surveillance, Issue 2, December An Introduction to the Reliability and Quality Generic Requirements (RQGR), Issue 3, April Optical Interfaces for Equipment and Systems Relating to the Synchronous Digital Hierarchy), Electromagnetic Compatibility and Electrical Safety - Generic Criteria for Network Telecommunications Equipment, Issue 05, August Billing Automatic Message Accounting Format (BAF) Generic Requirements, December SONET Bi-Directional Line-Switched Ring Equipment Generic Criteria, Issue 4, December Clocks for the Synchronized Network: Common Generic Criteria, Issue 1, May SONET Unidirectional Path Switched Ring (UPSR) Equipment Generic Criteria, Issue 3, July Software Inventory for Network Element Software Management, Issue 1, June GR-2932-CORE Database Functionalities, May GR-2996-CORE Generic Criteria for SONET Digital Cross-Connect Systems, Issue 1, January GR-3051-CORE Voice Over Packet: NGN Call Connection Agent Generic Requirements, Issue 2, January GR-3054-CORE Voice Over Packet: NGN Trunk Gateway Generic Requirements, Issue 1, March GR-3055-CORE Voice Over Packet: NGN Access Gateway Generic Requirements, Issue 1, March GR-3058-CORE Voice over Packet (VoP): Next Generation Networks (NGN) Accounting Management Generic Requirements, December SR-2275 Telcordia tes on the Networks, Issue 4, October SR-3476 National ISDN 1995 and 1996, Issue 1, June SR-3580 NEBS Criteria Levels, Issue 3, June FT Page 52 of 57 Appendix D Army UC RA Tech Stds
173 SR-4994 SR-NWT SR-NWT SR-NWT TR-917 TR-NWT TR-NWT TR-NWT TR-NWT TR-NWT TR-NWT TR-NWT EIA/TIA-530-A TIA/EIA-232-F 2000 Version of National ISDN Primary Rate Interface (PRI) Customer Premises Equipment Generic Guidelines, Issue 1, December National ISDN-2, Issue 1, May 1992 with revision 1, June ISDN Primary Rate Interface Generic Guidelines for Customer Premises Equipment, Issue 1, June Software Architecture Review Checklists, Issue 01, December SONET Regenerator (SONET RGTR) Equipment Generic Criteria, December Functional Criteria for Digital Loop Carrier Systems, Issue 2, January 1993 Software Quality Program Generic Requirements, June Reliability and Quality Switching Systems Generic Requirements (RQSSGR), Issue 2, October Isolated Ground Planes: Definition and Application to Telephone Central Offices, Issue 2, July Generic Reliability Assurance for Fiber Optic Transport Systems, Issue 2, December Clocks for the Synchronized Network: Common Generic Criteria, Issue 1, June ISDN Primary Rate Interface Call Control Switching and Signaling Generic Requirements for Class II Equipment, Issue 1, December TELECOMMUNICATIONS INDUSTRY ASSOCIATION High Speed 25-Position Interface for Data Terminal Equipment and Data Circuit- Terminating Equipment, Including Alternative 26-Position Connector, ANSI/TIA/EIA-530-A-92) (R98) (R2003), June Interface Between Data Terminal Equipment and Data Circuit-Terminating Equipment Employing Serial Binary Data Interchange, October Electrical Characteristics of Balanced Voltage Digital Interface Circuits, (ANSI/TIA/EIA-422-B- 1994) (R2000) (R2005), April 13, TIA-422-B TIA-810-B vember 3, FT Page 53 of 57 Appendix D Army UC RA Tech Stds
174 TIA/EIA-470-B Telecommunications - Telephone Terminal Equipment - Performance and Compatibility Requirements for Telephone Sets with Loop Signaling, TIA TSB-116 Telecommunications IP Telephony Equipment Voice Quality Recommendations for IP Telephony, March TIA TSB-116-A Telecommunications System Bulletin Telecommunications IP Telephony Equipment Voice Quality Recommendations for IP Telephony, March UNITED STATES CODE Title 10 Section 2224, Defense Information Assurance Program, Title 40 Section Title 44 Federal Information Security Management Act (FISMA) of OTHER DOCUMENTATION 3G TS V3.0.0 ( ) 3rd Generation Partnership Project; Technical Specification Group Core Network; enhanced MLPP (emlpp) Stage 3. ANSI/EIA-310- D-92 American National Standards Institute (ANSI)/Electronic Industries Association (EIA) Standard, Cabinets, Racks, Panels and Associated Equipment, September AT&T TR62411 ATIS-PP Bellcore TR- TSY Bellcore TR- TSY FED-STD-1037 Federal Telecommunic ations Recommendati on 1080B-2002 International Electrotechnica SS7 SS7 Network and NNI Interconnection Security Requirements and Guidelines, vember Telecommunications: Glossary of Telecommunication Terms, 7 August 1996, c.htm. Video Teleconferencing Services, August 15, Information technology equipment Safety Part 1: General requirements, Second Edition, FT Page 54 of 57 Appendix D Army UC RA Tech Stds
175 l Commission (IEC), , ISO Standard NATO Agreement (STANAG 4214) OASIS Standard Common Alerting International Standardization Organization Digital Channel Aggregation, June rth American Treaty Organization (NATO), International Rating and Directory for Tactical Communications Systems, Edition 3, Version T, 07 January Protocol (CAP) v1.1, October, OPNAVINST A, Operational Availability Handbook, March RS-232 Recommended Standard 232 for Serial Binary Data Signals Connecting Between a DTE and a DCE. TM series, Operator s and Organizational Maintenance Manual for Central Office, Telephone, Automatic AN/TTC-39(V)2. FT Page 55 of 57 Appendix D Army UC RA Tech Stds
176 Appendix E: Approved Product List (APL) v1.0
177 tification: Point of Contact for this effort is: COL Robert J. Quinker, HQDA CIO/G6-AAIC-AOE, (703) / LTC Van Den Bosch, HQDA CIO/G6- AAIC-AOB, [email protected] (703) i
178 Table of Contents APPENDIX E: APPROVED PRODUCT LIST (APL)... 1 E.1 Overview... 1 E.2 Army UC RA Approved Product List... 1 List of Table Table E- 1: Army UC RA APL... 2 ii
179 Appendix E: Approved Product List (APL) E.1 Overview The DISA UC RA [15] has recommended that the APL ( ) should be used. Army has provided comments that the DoD UC RA needs to be modified based on the fundamental NC principles and requirements for DoD or providing scalability, reliability, interoperability and economies-ofscale as follows: Open standard-based protocols/interfaces must be used between the functional entities for communications. Call control functional entities that are used for establishment of sessions with single and/or multiple media with two or multiple parties must use open standard-based protocols/interfaces for communications with the application servers of the RTC services. Each application server should be geographically distributed, but act logically centralized from communications point of view. This Army UC RA has accommodated the above NC principles and requirements that are not the part of the present DISA UC RA. As a result, the Army UC RA has a modified APL that is different from the DISA UC RA APL ( ) for the following products: WAN SS MFSS LSC SCF RTC AS(s) Chat, IM & Presence AS(s) (when these applications are integrated with audio and/or Video) The basic tenet of the above Army UC RA APL still remains the same as they have been articulated in the DISA RA APL, but there are fundamental enhancements based on the principles and requirements as described above. Appendix C shows OVs of the above functional entities making clear how those products differ from those of the DISA UC RA APL. Other than this, all other products described in DoD UC APL ( ) are also applicable for the Army UC RA. Of course, there can be some other minor enhancements for each individual product of the DISA APL based on the above modifications in WAN SS, MFSS, LSC, and application servers of the Army UC RA APL. E.2 Army UC RA APL Army UC RA has developed the enhanced APL modifying the DoD UC APL ( ) to meet the Army UC requirements as explained in the main document and in this Appendix E. Table E-1 show the Army UC RA APL. The part of the APL that differs from the DoD UC APL is described in the APL. Other than these modifications mentioned in this APL and in the main document remains the same like those of the DoD UC APL ( ). Page 1 of 17 Appendix E - Army UC RA APL 07-June-12
180 Table E- 1: Army UC RA APL IPv6 Requirements for UCR 2008 Change 2 Products UCR 2008 CHANGE 2 PRODUCT MFSS UCR 2008 CHANGE 2 IPv6 REQUIREMENTS 1,2,3,4 SBU IP Based UC Product The MFSS must follow the technical specifications described in this Army UC RA document. The SCF and all the RTC services application servers are completely physically separate functional entities, and may or may not locate in the same physical locations like that of the MFSS. MFSS will only communicate to the SCF using AS-SIP protocol for communicating with any RTC services applications servers as described in the Army UC RA as well as in Figures C-3 and C-10 of Appendix C of this document. These enhancements in MFSS technical specifications may or may not affect any other DISA/DoD UC RA functional specifications. In case, there are impacts, the Army UC RA technical specifications will prevail superseding all other technical specifications or requirements. All others specifications of MFSS will be followed from DISA UC RA [15] and DoD UCR 2008 Change 3 [1] and DoD UCR 2008 Change 2. The MFSS/CCA application in conjunction with the VVoIP EI and MG 5 must be IPv6-capable. (te: IPv6-capable is defined in Section ) Other applications within this APL product have a conditional requirement to be IPv6-capable if the IP packets remain internal to the product. Use guidance in UCR 2008 Change 2 Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) WAN SS The WAN SS must follow the technical specifications described in this Army UC RA document. The SCF and all the RTC services application servers are completely physically separate functional entities, and may or may not locate in the same physical locations like that of the WAN SS. WAN SS will only communicate to the SCF using AS-SIP protocol for communicating with any RTC services applications servers as described in the Army UC RA as well as in Figures C-5 and C-10 of Appendix C of this document. These enhancements in WAN SS technical specifications may or may not affect any other DISA/DoD UC RA functional specifications. In case, there are impacts, the Army UC RA technical specifications will prevail superseding all other technical specifications or requirements. All others specifications of WAN SS will be followed from DISA UC RA [15] and DoD UCR 2008 Change 3 [1] and DoD UCR 2008 Change 2.Must be IPv6-capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf) Page 2 of 17 Appendix E - Army UC RA APL 07-June-12
181 LSC The LSC must follow the technical specifications described in this Army UC RA document. If a LSC host services, the SCF and all the RTC services application servers are completely physically separate functional entities, and may or may not locate in the same physical locations like that of the LSC. LSC will only communicate to the SCF using AS-SIP protocol for communicating with any RTC services applications servers as described in the Army UC RA as well as in Figures C-4, C-6, C-7, and C-10 of Appendix C of this document. Army UC RA have specifically identified that there can be three variations of LSC architectures as shown in Figures C-4, C-6, and C-7 of Appendix C. Any one kind of those LSCs can be selected based on the present and future requirements of the warfighters. These enhancements in LSC technical specifications may or may not affect any other DISA/DoD UC RA functional specifications. In case, there are impacts, the Army UC RA technical specifications will prevail superseding all other technical specifications or requirements. All others specifications of LSC will be followed from DISA UC RA [15] and DoD UCR 2008 Change 3 [1] and DoD UCR 2008 Change 2. The LSC/CCA application in conjunction with the VVoIP EI and MG 5 must be IPv6-capable. Other applications in the APL product have a conditional requirement to be IPv6-capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf) SCF Voice & Video AS(s) Army UC RA considers that the SCF is stand-alone physically separate functional entity that uses only the AS-SIP protocol for communications with the session controller (e.g. WAN SS, MFSS, or LSC). However, it can use any open standard-based communications protocols with the applications servers (ASs) as necessary as shown in Figure C-10 of Appendix C of this document. In addition, the details of the SCF are described in the main Army UC RA document. This is a fundamental difference with the DoD UCR [1] and DISA UC RA [15] because the DISA/DoD UC architecture shown as an embedded functional entity within MFSS (or LSC) using proprietary protocols for communications with RCS application servers (ASs). Army UC RA considers voice and video AS(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The application server(s) are used for handling the AS-SIP signaling protocol for setting up the audio and video conferencing along with data collaboration. The AS(s) do not handle media (audio, video, and/or data) that are sent directly between the end-users/warfighters once the sessions/calls are established. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Page 3 of 17 Appendix E - Army UC RA APL 07-June-12
182 Web Conferencing AS(s) Conferencing, Collaboration & Whiteboard AS(s) Media Bridging AS(s) Presence, IM & Chat AS(s) [Stand-alone Data Applications] Army UC RA considers Web Conferencing application server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The AS(s) are used for handling the AS- SIP/SOAP/HTTP signaling protocol for setting up the data collaboration. The AS(s) may handle media of the data applications that are sent between the end-users/warfighters. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers Conferencing, Collaboration & Whiteboard application server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The application server(s) are used for handling the AS-SIP signaling protocol for setting up the data collaboration like whiteboard application. The application server(s) may handle media of the data applications (whiteboard) for communications with the end-users/warfighters once the sessions/calls are established. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers that there can be three types of media bridging servers: Audio Bridging, Video Bridging, and Data Bridging. Each kind of media bridging server may consist of one or more physical servers that are geographically distributed, but act logically centralized. Each kind of media bridging server will use AS-SIP signaling protocol for communications with any functional entity for setting up the session. However, each type of media bridging server also handles media (audio/video/data) for media bridging as well as for sending media (audio/video/data) to the conference participants. Army UC RA considers Presence, Instant Messaging (IM) & Chat application server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The application server(s) uses the XMPP signaling protocol when Presence, IM & Chat communications are not integrated with audio and/or video session. The application server(s) handle media of the data applications (IM/Chat) that are sent between the endusers/warfighters. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. DoD UC APL ( Process/UCAPL_Process.pdf ) Presence, IM & Chat AS(s) [Integrated with Audio and/or Video] Unified Messaging AS(s) Army UC RA considers when Presence, Instant Messaging (IM) & Chat session is integrated with audio and/or video session, only AS-SIP protocol is used for Presence, Instant Messaging (IM) & Chat. Presence, Instant Messaging (IM) & Chat application server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The Presence, Instant Messaging (IM) & Chat application server(s) may handle media of the data applications (IM/Chat) that are sent between the end-users/warfighters. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers that the Unified Messaging Application Server(s) will handle all messaging services unifying , IM/Chat & Voice Mail, and will use AS-SIP/SMTP/XMPP open standards-based protocols as appropriate. This AS may consist of one or more physical servers that are geographically distributed, but act logically centralized. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based Page 4 of 17 Appendix E - Army UC RA APL 07-June-12
183 Calendaring & Scheduling AS(s) E.164 Number Mapping (ENUM) (AS(s) E.911 (Emergency Call) AS(s) TCAP AS(s) Desktop Sharing AS(s) SMS AS(s) MMS AS(s) protocols. Army UC RA considers that the Calendaring & Scheduling Application Server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. This AS(s) will use the open standards-based ITIP protocol for communications. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. Army UC RA considers that the E.164 Number Mapping Application Server(s) that provides mapping between telephone number (E.164) and IP address may consist of one or more physical servers that are geographically distributed, but act logically centralized. This AS(s) will use the open standards-based AS-SIP protocol for communications. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. Army UC RA considers that the E.911 (Emergency Call) Application Server(s) that provides mapping between telephone number (E.164) and IP address may consist of one or more physical servers that are geographically distributed, but act logically centralized. This AS(s) will use the open standards-based AS-SIP protocol for communications. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. Army UC RA considers that the TCAP Application Server(s) that provides interworking between legacy TDM network-based voice applications and IP network-based VoIP applications when end-users/warfighters communicate with one another residing in two different types of networks. TCAP AS(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. This AS(s) will use the open standards-based AS-SIP protocol for communications. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. Army UC RA considers Desktop Sharing application server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The application server(s) are used for handling the AS- SIP signaling protocol for setting up sessions. The application server(s) may handle media of the data applications, but not for audio and/or video, for communications with the end-users/warfighters once the sessions/calls are established. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers Short Message Service server(s) that is targeted for mobile users may consist of one or more physical servers that are geographically distributed, but act logically centralized. The application server(s) are used for handling the AS-SIP signaling protocol for setting up sessions. The application server(s) may handle media of the SMS data applications, but not for audio and/or video, for communications with the endusers/warfighters once the sessions/calls are established. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers Multimedia Message Service server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The AS(s) are used for handling the AS- SIP/SOAP/HTTP signaling protocol. The application server(s) may handle Page 5 of 17 Appendix E - Army UC RA APL 07-June-12
184 media of the MMS applications for communications with the endusers/warfighters once the sessions/calls are established. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. AS(s) WAP AS(s) Location Services (Fixed/Mobile) AS(s) CM AS(s) RM AS(s) Team Collaboration AS(s) BPM AS(s) Web 2.0 AS(s) Army UC RA considers server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The application server(s) are used for handling the SMTP protocol The application server(s) will handle media of the data applications for communications with the end-users/warfighters once the sessions/calls are established. Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers WAP application server(s) that is targeted for lowbandwidth mobile users for using Web services may consist of one or more physical servers that are geographically distributed, but act logically centralized. The AS(s) are used for handling the WAP protocol. The AS(s) may handle media of the Web services application for communications with the end-users/warfighters once the sessions/calls are established. Figure C- 10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers Location Services Application server(s) that is targeted for location management of fixed and mobile users may consist of one or more physical servers that are geographically distributed, but act logically centralized. The application server(s) are used for handling the AS- SIP protocol Figure C-10 shows how this AS(s) communicate with different functional entities using open standards-based protocols. More descriptions are provided in the main Army UC RA. Army UC RA considers Content Management application server(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Records Management application server(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Team Collaboration AS(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Business Process Management AS(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Web 2.0 application server(s) that may contain a Page 6 of 17 Appendix E - Army UC RA APL 07-June-12
185 Apps AS(s)) Portals AS(s) Profiles AS(s) Search & Discovery AS(s) IA AS(s) AAA AS(s)) Directory AS(s) Database Server(s) group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Apps (Applications) server(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Portals Application server(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Profiles Application server(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. However, the profiles application that deals with RCS services users/warfighter, it is expected that this particular profile AS(s) will use AS-SIP protocol. Many different open standards-based protocols may be used by this AS(s) for other UC services. Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Search & Discovery Application server(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers Information Assurance Application server(s) that may contain a group of applications may consist of one or more physical servers that are geographically distributed, but act logically centralized. Many different open standards-based protocols may be used by this AS(s). Since they deal with data applications, these ASs deal with both signaling protocol and media. More descriptions are provided in the main Army UC RA. Army UC RA considers AAA Application server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The AAA server will use RADIUS/DIAMETER protocol. More descriptions are provided in the main Army UC RA. Army UC RA considers Directory AS(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The Directory server will use LDAP protocol. More descriptions are provided in the main Army UC RA. Army UC RA considers Database server(s) may consist of one or more physical servers that are geographically distributed, but act logically centralized. The Directory server will use SQL/LDAP protocol. More descriptions are provided in the main Army UC RA. CER Must be IPv6-capable. Use guidance in UCR 2008 Change 2, Table for Routers. DoD UC APL ( Process/UCAPL_Process.pdf ) Page 7 of 17 Appendix E - Army UC RA APL 07-June-12
186 AS-SIP End Instrument (AEI) Secure End Instrument (SEI) The EI in conjunction with the CCA application must be IPv6-capable. This requirement is applicable for EIs manufactured after January Softphones and soft videophones have a conditional requirement for IPv6. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Same as AEI, above. DoD UC APL ( Process/UCAPL_Process.pdf ) XMPP Server/Client Conditional requirement for IPv6. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) AS-SIP TDM gateway (AS-SIP TDM GW) AS-SIP IP Gateway (AS-SIP IP GW) If the AS-SIP TDM GW has an IP interface, the AS-SIP TDM GW must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Must be IPv6-capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoDUC APL ( Process/UCAPL_Process.pdf ) LAN Product LAN Access Switch Must be IPv6-capable. Use guidance in UCR 2008 Change 2, Table Part 1 for LAN Access Switch. DoD UC APL ( Process/UCAPL_Process.pdf ) LAN Distribution Switch Must be IPv6-capable. Use guidance in UCR 2008 Change 2, Table Part 2 for L3 Switches. DoD UC APL ( Process/UCAPL_Process.pdf ) LAN Core Switch Must be IPv6-capable. Use guidance in UCR 2008 Change 2, Table Part 3 for L3 Switches (Edge Routers). DoD UC APL ( Process/UCAPL_Process.pdf ) Wireless LAN Product Wireless LAN Access Switch (WLAS) Must be IPv6-capable Use guidance in UCR 2008 Change 2, Table Part 1 for LAN Access Switch. DoD UC APL ( Process/UCAPL_Process.pdf ) Wireless LAN Access Bridge (WAB) Must be IPv6-capable Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Page 8 of 17 Appendix E - Army UC RA APL 07-June-12
187 Wireless End Instrument (WEI) UCR 2008 CHANGE 2 PRODUCT Customer Premise Equipment (CPE) Video Teleconferencing Unit (VTU) hardware only Must be IPv6-capable. Same as AEI, above. DoD UC APL ( Process/UCAPL_Process.pdf ) UCR 2008 CHANGE 2 IPv6 REQUIREMENTS 1,2,3,4 Peripheral Product With exception of EIs, the CPE have a conditional requirement for IPv6 capability. Use guidance in UCR 2008 Change 2, Table for NA/SS. If the VTU has an IP interface, the VTU must be IPv6-capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Integrated Access Switch (IAS) Conditional requirement for IPv6. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) H.323 Gateway (GW) Army UC RA considers H.323 GW can be a part of a LSC. If it is so and the H.323 GW hosts any RTC services, it must only communicate with only SCF using AS-SIP protocol only for communications with any RTC services application servers as described in the case of LSC above. Conditional requirement for H.323 IPv6. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) H.323 Gatekeeper (GK) Army UC RA considers H.323 GK can be a part of a LSC. If it is so and the H.323 GK hosts any RTC services, it must only communicate with only SCF using AS-SIP protocol only for communications with any RTC services application servers as described in the case of LSC above. Conditional requirement for H.323 IPv6. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Multi Signaling Multipoint Control Unit (MSMCU) DoD Secure Communications Device (DSCD) MSMCU must be IPv6-capable. MSMCU is considered a DISN core asset. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Same as SEI, above except for those DSCD supported by a VoIP switch per te 4 below. DoD UC APL ( Process/UCAPL_Process.pdf ) Page 9 of 17 Appendix E - Army UC RA APL 07-June-12
188 Conference Bridge (CB) external UC External Adjunct Devices Network Monitoring for IPv6 data/voice networks IM, Chat, and Presence/Awareness Features RTS (LDAP) Routing Database Server Multiservice Provisioning Platform (MSPP) Optical Cross Connect (ODXC) Provider Router/Provider Edge Router (P/PE Router) DISN Optical Transport Switch (OTS) Conditional requirement for IPv6. CB is considered a MILDEP level asset where the traffic stayed internal to the MILDEP. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) UC External Adjunct Devices that are not covered under CPE (such as a Lightweight Directory Access Protocol (LDAP) server, local directory services server) are to be covered under DoD IPv6 Profile for Net App or Simple Server. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Conditional requirement for IPv6. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Must be IPv6-capable. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Network Infrastructure Products If the MSPP has an IP interface, the MSPP must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) If the ODXC has an IP interface, the ODXC must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) If the P/PE Router has an IP interface, the P/PE Router must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for Router. If the OTS has an IP interface, the OTS must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Page 10 of 17 Appendix E - Army UC RA APL 07-June-12
189 UCR 2008 CHANGE 2 PRODUCT UCR 2008 CHANGE 2 IPv6 REQUIREMENTS 1,2,3,4 Tactical UC Product Deployable Network Element (D-NE) Must be IPv6-capable. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Deployable LAN Products (DLAN) Deployed Tactical Radio (DTR) Deployable Cellular Voice Exchange (DCVX) Must be IPv6-capable. Use guidance from LAN Products, above. DoD UC APL ( Process/UCAPL_Process.pdf ) Must be IPv6-capable. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Must be IPv6-capable. Use guidance in UCR 2008 Change 2,Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Multifunction Mobile Devices Smartphone Conditional requirement for IPv6. Use guidance in UCR 2008 Change 2, Table for EI. DoD UC APL ( Process/UCAPL_Process.pdf ) Security Devices (SDs) High Assurance IP Encryptor (HAIPE) Must be IPv6 capable. Use guidance in DOD IPv6 Profile version 5.0 Appendix C for IA Devices. DoD UC APL ( Process/UCAPL_Process.pdf ) Link Encryptor Family (LEF) Must be IPv6 capable. Use guidance in DOD IPv6 Profile version 5.0 Appendix C for IA Devices. DoD UC APL ( Process/UCAPL_Process.pdf ) EBC Army UC RA considers that EBC can be enhanced to integrate with data firewall (FW), intrusion detection system (IDS) and intrusion prevention system (IPS) in addition to audio and video firewall capabilities because a multimedia session invoked by AS-SIP can contain audio, video, and data application together in the same session. In choosing the approved product(s), these capabilities must be considered. Must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for EBC. DoD UC APL ( Process/UCAPL_Process.pdf ) Page 11 of 17 Appendix E - Army UC RA APL 07-June-12
190 FW Like EBC, Army UC RA considers that the firewall (FW) capabilities can be enhanced to integrate with audio and video firewall, intrusion detection system (IDS) and intrusion prevention system (IPS) in addition to data firewall capabilities because a multimedia session invoked by AS-SIP can contain audio, video, and data application together in the same session. In choosing the approved product(s), these capabilities must be considered. Must be IPv6 capable. Use guidance in DOD IPv6 Profile version 5.0 Appendix C for IA Devices. DoD UC APL ( Process/UCAPL_Process.pdf ) IPS and IDS Must be IPv6 capable and must be capable of inspecting IPv4 and IPv6 packets simultaneously and those packets contained within tunnels that are not encrypted (GRE, IPSec AH, IP in IP, etc.) or shall support the capability to alarm if tunneled packets are detected that could not be inspected further. Use guidance in DOD IPv6 Profile version 5.0 Appendix C for IA Devices. DoD UC APL ( Process/UCAPL_Process.pdf ) Must be IPv6 capable. Use guidance in DOD IPv6 Profile version 5.0 Appendix C for IA Devices. DoD UC APL ( Process/UCAPL_Process.pdf ) VPN Concentrator Network Access Control (NAC) Must be IPv6 capable. Use guidance in DOD IPv6 Profile version 5.0 Appendix C for IA Devices. DoD UC APL ( Process/UCAPL_Process.pdf ) Integrated Security Solution (ISS) Must be IPv6 capable. Use guidance in DOD IPv6 Profile version 5.0 Appendix C for IA Devices. DoD UC APL ( Process/UCAPL_Process.pdf ) Storage Devices Storage Devices Conditional requirement for IPv6. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Assured Services Network Element (AS-NE) UCR 2008 CHANGE 2 PRODUCT Network Elements Must be IPv6 capable. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) UCR 2008 CHANGE 2 IPv6 REQUIREMENTS 1,2,3,4 DSN Fixed Network Element (F-NE) Conditional requirement for IPv6. Use guidance in UCR 2008 Change 2, Table for NA/SS. DoD UC APL ( Process/UCAPL_Process.pdf ) Page 12 of 17 Appendix E - Army UC RA APL 07-June-12
191 Classified LSC Classified Core Router Classified Distribution Switch Classified Access Switch Classified EBC Classified CER Multifunction Switch (MFS)/Tandem Switch, Enf Office (EO) Switch, Small End Office (SMEO), Deployable Voice Exchange (DVX), Private Branch Exchange 1 (PBX1) and Private Branch Exchange 2 (PBX2). Classified Products Same as LSC, above. DoD UC APL ( Process/UCAPL_Process.pdf ) Same as LAN Core Router above. DoD UC APL ( Process/UCAPL_Process.pdf ) Same as LAN Distribution Switch above. DoD UC APL ( Process/UCAPL_Process.pdf ) Same as LAN Access Switch above DoD UC APL ( Process/UCAPL_Process.pdf ) Same as EBC, above. DoD UC APL ( Process/UCAPL_Process.pdf ) Same as CER, above. DoD UC APL ( Process/UCAPL_Process.pdf ) Legacy Systems IPv6 ROE for legacy systems are spelled out in the Interim IPv6 ROE for UCR 2008 Change 2, Change 1 at the UCCO web site DoD UC APL ( Process/UCAPL_Process.pdf ) 1. The terms Conditional requirement for IPv6 and Other applications within the APL product have a conditional requirement to be IPv6-capable effectively mean that the IPv6-capable features for the indicated UCR IPv6 application is optional and not required for listing on the UC APL. 2. For each product, guidance is provided for (1) mandatory or conditional IPv6-capable and (2) if the IPv6 requirements from UCR 2008 Change 2, or from DOD IPv6 Profile Version 5.0 are to be used. 3. While there is a requirement to manage IPv6 networks, the NM may be done using IPv4. Thus, NM is not included in this list. 4. For the cases where components are within the UC products and the IP packets remain internal to the System Under Test (SUT) without using the DISN WAN, (i.e. the external interface for the SUT for signaling traffic and bearer traffic are TDM/serial and IP is only used for external network management) the internal interfaces for the SUT are not required to be IPv6 and the product would not have to support IPv6 at this time. These components provide services as described in Section Requirements for Supporting AS-SIP-Based Ethernet Interfaces for Voic , Unified Messaging Systems, and Automated Receiving Devices. The resulting UC product can only be fielded within a B/P/C/S boundary. This guidance would apply for both generic AS-SIP End Instruments (EIs) and proprietary protocol EIs. The EIs are required to be IPv6-capable regardless of placement within the SUT as indicated in this table, except for IP based DoD Secure Communication Devices (DSCD) supported by a VoIP capable switch that connects to the DISN TDM backbone for voice/data services. The UC APL listing shall reflect conditions under which the product was certified. 5. The MG is only required to be IPv6-capable if it has an external IP interface to the SUT. In these cases, the resulting product can only be fielded within a B/P/C/S boundary. The UC APL certification shall reflect conditions under which Page 13 of 17 Appendix E - Army UC RA APL 07-June-12
192 the product was certified. Page 14 of 17 Appendix E - Army UC RA APL 07-June-12
193 Appendix F - Mapping between Army and DoD UC Principles and Rules, Capability Gaps, Mitigations and Target EndState V1.0
194 tification: This document will be updated annually. Point of Contact for this effort is: COL Robert J. Quinker, HQDA CIO/G6-AAIC-AOE, (703) / LTC Van Den Bosch, HQDA CIO/G6- AAIC-AOB, [email protected] (703) i
195 Table of Contents APPENDIX F - MAPPING BETWEEN ARMY AND DOD UC PRINCIPLES AND RULES, CAPABILITY GAPS, MITIGATIONS AND TARGET ENDSTATE... 1 F.1 Overview... 1 F.2 Army and DoD UC Capabilities... 1 F.2.1 Mapping between Army UC and DoD IEA Capabilities... 2 F.3 Capability Gaps and Resolutions... 4 F.4 UC Architecture Target End State... 7 ii
196 List of Figures RTC the DoD IEA Capabilities... 3 Figure F-2: Mapping between the Army UC Collaboration and the DoD IEA Capabilities... 4 List of Tables Table F-1 : DoD UC Services Capabilities and Descriptions... 1 Table F-2: Army and DoD UC Services Capability Mapping... 2 Table F-3: Capability Gaps and Mitigation by Army UC Services Capabilities [10-11 & 13]... 4 iii
197 Appendix F Mapping between Army and DoD UC Principles and Rules, Capability Gaps, Mitigations and Target EndState F.1 Overview The Army UC RA is the target end state architecture identified in DoD UC Master Plan [5]. The exiting Army As-Is Architecture [12] as it exists now has many capability gaps that are described below. The Army UC RA will mitigate all capability gaps in DoD documents [10-11 & 13] offering new capabilities described in the main Army UC RA and meeting all goals abiding by all architectural principles and business rules aligning with DoD IEA [2]. F.2 Army and DoD UC Capabilities The Army UC capabilities are actually derived from the DoD UC capabilities. The Army UC services portfolio is very comprehensive. Table F-1 provides the DoD UC services capabilities and their description and Table F-2 shows a high-level mapping between the Army and DoD UC services capabilities. Table F-1 : DoD UC Services Capabilities and Descriptions Name Collaboration Enterprise Directory Integration n-assured/assured Voice and Video Conferencing n-assured/assured Voice, Video, and Data Session Management UC Applications Integration UC Portability and Identity Synchronization Unified Messaging User Mobility (Wired and Wireless) DoD UC Capabilities Description Provides IP-based solutions that allow subscribers to collaborate (e.g., IM, chat, presence, and Web conferencing). Integrates UC with repository of subscriber contact information accessible to all authorized and authenticated subscribers. Provides the ability to conference multiple voice or video subscribers with a variety of room controls for displays of the participants. It also includes an optional component that allows subscribers to schedule conferences. Provides enterprise point-to-point UC, independent of the technology (circuit switched or IP). Capabilities include, but are not limited to, end device registration, session establishment and termination, and UC session features (e.g., Assured Services Admission Control (ASAC), Call Hold, and Call Transfer). Supports mission and business applications integration with the enterprise UC (e.g., integration of UC provided presence with DoD Component-owned business applications). Provides an enterprise UC systematic approach to portability functions (e.g., repository of user profiles and privileges, and subscriber identification and authentication). Uses DISA s existing Identification (ID) Synchronization service as the primary service for DoD ID Synchronization. Provides the integration of voic and . The integration of these two capabilities allows subscribers to access voic via or access via voic . Provides the ability to offer wireless and wired access, for UC supported by multifunction mobile devices. In addition, it provides access to enterprise UC globally using UC portability. Page 1 of 11 Appendix F - Army and DoD Cap Map 07-June-12
198 Voice Internet Service Provider (ISP) Access Provides unclassified and classified enterprise UC for access to commercial voice services over IP. This service provides both local and long distance dialing capability using commercial ISPs via secure interconnections. Table F-2: Army and DoD UC Services Capability Mapping Army UC Services DoD UC Capabilities n AS and AS Voice/Video/ Data Session Management n AS and AS Voice and Video Conferencing Collaboration User Mobility (Wired and Wireless) Voice ISP access Unified Messaging UC Portability and ID Synchronizat ion Enterprise Directory Integration UC Apps Integration Voice & video X X X X Web Conferencing X X X Conf, X X X Collaboration, & Whiteboard Media Bridging X X X Presence, IM, and X X X X Chat Unified Messaging X X X X Calendaring & X X X Scheduling E.164 X X X Number/ENUM E.911 X X X CALEA X X X TCAP X X X Desktop Sharing X X X X X SMS X X MMS X X X X X X WAP) X X X Portal X X Team X X X Collaboration Web 2.0 X X X CM X X RM X X Profiles X X BPM X X Apps X X Search & X X Discovery IA X X X X F.2.1 Mapping between Army UC and DoD IEA Capabilities Page 2 of 11 Appendix F - Army and DoD Cap Map 07-June-12
199 Figures F-1 and F-2 show the mapping between the Army UC RTC and other services capabilities, respectively, and the DoD IEA Capabilities, Activities, Principles, Rules and Services. The key of this mapping is that principles and rules of the individual departments must be aligned with those of DoD IEA global rules and principles. Accordingly, the Army UC Architecture principles and rules must also be in sync with the DoD IEA rules and principles. That is, no Army UC Architecture principles and rules can violate any of the DoD IEA principles and rules. However, Army UC Architecture can devise any sub-principles and sub-rules within the framework of the global DoD IEA principles and rules. In the main Army UC RA document, we have formulated the Army UC Services Architecture principles and rules abiding by this guidance. Figure F-1: Mapping between the Army UC RTC and the DoD IEA Capabilities Page 3 of 11 Appendix F - Army and DoD Cap Map 07-June-12
200 Figure F-2: Mapping between the Army UC Collaboration and the DoD IEA Capabilities F.3 Capability Gaps and Resolutions The Army UC RA will fill the capability gaps of Army LWN/GIG and warfighter requirements that have been identified in different DoD documents [10-11 & 13]. Table F-3 describes how the capability gaps are mitigated by the target end state capabilities of Army UC RA. Table F-3: Capability Gaps and Mitigation by Army UC Services Capabilities [10-11 & 13] Capability Gap Mitigation by Army UC Services Capability Gap Unity of Command Gap 3 Unity of Command Gap 4 Common Policies and Standards Gap 3 Common Policies and Standards Gap 9 n AS and AS Voice/Video/ Data Session Management X n AS and AS Voice and Video Conferencing Collabor ation User Mobility (Wired and Wireless) Voice ISP access Unified Messaging UC Portability and ID Synchronization Enterprise Directory Integration X X X X X X X X X UC Apps Integration X X X X Page 4 of 11 Appendix F - Army and DoD Cap Map 07-June-12
201 Global Authentication Gap 3 Information Services from Edge Gap 1 Information Services from Edge Gap 3 Information Services from Edge Gap 6 Information Services from Edge Gap 12 Information Services from Edge Gap 26 Joint infrastructure Gap 1 Joint infrastructure Gap 3 Joint infrastructure Gap 6 X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X The definitions and resolutions for the gaps identified in Table F-3 are explained below [10-11 & 13]: i. Unity of Command Gap 3: a. Definition: Inability to provide shared situational awareness to the warfighter and throughout the chain of command b. Resolution: Network situational awareness data and information is universally shared, visible, and understandable, to enable effective Army LWN as a part of DoD GIG operation and defense. ii. Unity of Command Gap 4: a. Definition: Inability to support the operational execution of the commander s intent to include the management of information dissemination and prioritization b. Resolution: Net-centric enterprises and applicable commercial solutions are incorporated in support of information management capabilities to the warfighting community. iii. Common Policies and Standards Gap 3: a. Definition: Lack of policies regarding integrated network operations; restricts leaders from access to timely, reliable, and assured information across all networks, domains, and classification levels. b. Resolution: Integrated NetOps is developed to provide any authorized DoD GIG user access across all networks and security domains. iv. Common Policies and Standards Gap 9: a. Definition: Inability to establish multiple mission partner networks in a single infrastructure. Page 5 of 11 Appendix F - Army and DoD Cap Map 07-June-12
202 b. Resolution: An assured computing environment is established to provide authorized users, including mission partners, enterprise-wide access to services and Communities v. Global Authentication Gap 3: a. Definition: Inability to achieve timely access to the global network and information services from any location in the world. b. Resolution: Enterprise-level directory services are established to allow users access to required information and services from any location. vi. Information Services from the Edge Gap 1: a. Definition: Inability to sharing, collaborating, and synchronizing information with mission partners. b. Resolution: Information management standards, business rules, and interfaces are established to enable mission partners to share, collaborate and synchronize information. vii. Information Services from the Edge Gap 3: a. Definition: Inability to provide RT reporting of mission impact due to failure of GIG elements (network, applications, and services). b. Resolution: A secure, trusted, global computer-networking infrastructure is available and provides real-time automated reporting and analysis of mission impacts in support of Army LWN as a part of GIG elements (people, processes, network, applications, and services). viii. Information Services from the Edge Gap 6: a. Definition: Inability to provide all services, worldwide, to all authorized Army users, including Combatant Commands (COCOMs) and all mission partners. b. Resolution: A secure, trusted, global computer-networking infrastructure is available for Army users through UC services-enable Army LWN and provides services in collaboration with DoD Information Technology/National Security Systems (IT/NSS) services 24/7, and supports the implementation of continuity of operations and continuity of Government plans at the strategic, operational and tactical levels. ix. Information Services from the Edge Gap 12: a. Definition: Inability to prioritize services (bandwidth, network operations, enterprise applications, and other services) based on mission needs. b. Resolution: A secure, trusted, global networking infrastructure is available and prioritizes services (bandwidth, network operations, enterprise applications, etc) based on mission needs. x. Information Services from the Edge Gap 26: a. Definition: Inability to share information quickly, when and where needed, and making information available easily to the user in a desired format. b. Resolution: Enterprise Information Architectures are available and set the stage for allowing information to be moved rapidly up and down the command chains, and through the component and mission partner forces. xi. Joint Infrastructure Gap 1: a. Definition: Inability to provide enterprise-wide services and applications to any authorized user, at all times and anywhere Page 6 of 11 Appendix F - Army and DoD Cap Map 07-June-12
203 b. Resolution: UC services enabled Army LWN as a part of the joint infrastructure that ensures data is accessible and distributed across all Army components in collaboration with DoD Components and mission partners xii. Joint Infrastructure Gap 3: a. Definition: Inability of current infrastructure to support enterprise-wide services, and applications that are available to authorized users, at all times and anywhere b. Resolution: An enterprise-wide services architecture that supports universally accessible applications xiii. Joint Infrastructure Gap 6: a. Definition: Inability to support warfighter requirements for timely delivery of trusted information b. Resolution: Protected and timely data flows for access to efficient, accurate, useful, visible, available, and optimal information F.4 UC Architecture Target End State The target end state for total convergence of voice, video and data of the Army UC RA identified in DoD UC Master Plan [5] mitigating the capability gaps for both unclassified and classified RTC, enterprise collaborative and other services are described as follows: 1. n-assured/assured Voice, Video, and Data Session Management: provides enterprise point-topoint UC, independent of the technology (circuit switched or IP). The capabilities include, but are not limited to, end device registration, session establishment and termination, and UC session features (e.g., Assured Services Admission Control, Call Hold, Call Transfer, and others) [9]. 2. n-assured/assured Voice and Video Conferencing: provides the ability to conference multiple voice or video subscribers with a variety of room controls for displays of the participants. It also includes an optional component that allows subscribers to schedule conferences. 3. Collaboration: provides IP-based solutions that allow subscribers to collaborate (e.g., IM, chat, presence, and web conferencing). 4. User Mobility (wired and wireless): provides the ability to offer wireless and wired access, for UC supported by multifunction mobile devices. In addition, it provides access to enterprise UC globally using UC portability. 5. Voice ISP Access: provides unclassified and classified enterprise UC for access to commercial voice services over IP. This service provides both local and long distance dialing capability using commercial ISPs via secure interconnections. 6. Unified Messaging: provides the integration of voic and . The integration of these two capabilities allows subscribers to access voic via or access via voic . 7. UC Portability and Identity Synchronization: provides an enterprise UC systematic approach to portability functions (e.g., repository of user profiles and privileges, and subscriber identification and authentication). Army UC Identity service will be in conformance with the DoD ID Synchronization services. 8. Enterprise Directory Integration: integrates UC with repository of subscriber contact information accessible to all authorized and authenticated subscribers. 9. UC Applications Integration: supports mission and business applications integration with the enterprise UC (e.g., integration of Army UC provided presence with Army and DoD Componentowned business applications). Page 7 of 11 Appendix F - Army and DoD Cap Map 07-June-12
204 Appendix G: UC RA Performance Requirements V1.0
205 tification: This document will be updated annually. Point of Contact for this effort is: COL Robert J. Quinker, HQDA CIO/G6-AAIC-AOE, (703) / LTC Van Den Bosch, HQDA CIO/G6- AAIC-AOB, [email protected] (703) i
206 Table of Contents APPENDIX G: UC RA PERFORMANCE REQUIREMENTS... 4 G.1 Performances and UC Applications... 4 G.2 Performance Parameters... 4 G.2.1 Key Performance Parameters... 4 G.2.2 Data Services Performances... 5 G.2.3 Voice Performances... 6 G.2.4 Video Performances... 6 Appendix G- Army UC RA Perf Reqmts 07-June-12 Page ii of 7
207 List of Tables Table G-1: KPP for Different Categories of Messages [14]... 5 Table G-2: Data Services Latency, Jitter, and Packet Loss over ASLAN and n-aslan) [1]... 5 Table G-3: Voice Latency, Jitter, and Packet Loss over ASLAN and n-aslan [1]... 6 Table G-4: Video Latency, Jitter, and Packet Loss over ASLAN and n-aslan [1]... 7 Appendix G- Army UC RA Perf Reqmts 07-June-12 Page iii of 7
208 Appendix G: UC RA Performance Requirements G.1 Performances and UC Applications The UC application services are shared over one converged IP-MPLS backbone network while the access networks may consist of many networking technologies. All UC application services areas are grouped as follows: RTC Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, IM & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), TCAP, Desktop SMS, MMS, , WAP, and Location Services (Fixed/Mobile) CM RM Team Collaboration BPM Web 2.0, Apps Portals Profiles Search & Discovery IA Most of the RTC services that consist of audio and/or video can be considered RT applications while all applications that do not contain audio and/or video are considered n-rt data applications. For example, the one-way end-to-end delay for the audio/video of RT services should not be more than 150 to 300 milliseconds while one-way end-to-end delay for the non-rt data can be tolerated from a few seconds to minutes. This vast difference in performances differences between the RT and non-rt applications will make the serious differences in designing of the Army UC network. G.2 Performance Parameters G.2.1 Key Performance Parameters The Army has some definite key performance Parameters (KPPs) to meet for conducting decisive operations throughout the battle-space. For this, Army has defined four categories of messages for criticality assessment of the information being exchanged in relationship to the mission being performed as follows [14]: Category I is survival information (CAT 1) Category II is time sensitive work information (CAT II) Category III is aggregate routine information (CAT III) Category IV is non-time-sensitive information (CAT IV) Table G-1 shows the performance parameters for the Net-Ready, Mobile Throughput, and Information Dissemination. Appendix G- Army UC RA Perf Reqmts 07-June-12 Page 4 of 7
209 G.2.2 KPP for Information Dissemination Net-Ready: All activity interfaces, services, policyenforcement controls, and datasharing of the NC Operations and Warfare Reference Model and GIG Key Interface Profiles shall be satisfied to the requirements of the specific Joint integrated architecture products (including data correctness, data availability, and data processing), and information exchange accreditation, specified in the Threshold and Objective values. Mobile Throughput: Warfighter networks shall enable selected warfighters to conduct decisive operations throughout the battlespace while moving cross-country in a tactical formation Army warfighters network will provide a transport capability that enables battle command and situation awareness information to be sent/delivered to ATH manned platforms Table G-1: KPP for Different Categories of Messages [14] Development Threshold Satisfy 100 percent of interfaces; services; policy-enforcement controls; and data correctness, availability and processing requirements designated as enterprise-level or critical in the Joint integrated architecture. Ground vehicles: from 0 to 25 miles per hour with 256 Kbps per link available for user data. Ground vehicles: from 0 to 50 kilometers per hour with 256 Kbps per link available for user data. Critical survival information (CAT I) delivery in 5 seconds and time sensitive information (CAT II) in < 8 seconds. Development Objective Satisfy 100 percent of interfaces; services; policy-enforcement controls; and data correctness, availability and processing requirements in the Joint integrated architecture. Ground vehicles: from 0 to 45 miles per hour with 4 Mbps per link available for user data. Ground vehicles: from 0 to 90 kilometers per hour with 4 Mbps per link available for user data. Critical survival information (CAT I) delivery in <.5 seconds and time sensitive information (CAT II) in < 1 seconds. Other stated Army Warfighter Networks threshold E2E latency requirements for data (QoS/Speed of Service) are: Cat I: 5 sec, 95% of messages, assuming 12 Kb messages Cat II: < 8 sec, 95% of messages, assuming 16 Kb messages Cat III: < 30 sec, 95% of messages, assuming 16 Kb messages Cat IV: < 15 Minutes, 95% of messages, assuming 16 Kb messages From the Business Requirements Document (BRD), the 12 Kb standard message size for Cat I and 16 Kb for Cat II, & III traffic is specified. Data Services Performances Data services performances over the ASLAN and n-aslan are shown in Table G-2. Table G-2: Data Services Latency, Jitter, and Packet Loss over ASLAN and n-aslan [1] Performance Parameter Latency ASLAN and n-aslan The LAN shall have the capability to transport prioritized data IP packets with no more than 45 ms latency E2E across the ASLAN. Latency is increased over voice IP packets because of the increased size of the packets (230 bytes for voice packets and up to 1518 bytes for data). The latency shall be achievable over any 5-minute measured period under congested conditions. Congested condition is defined as 100 percent of link capacities as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best Page 5 of 7 Appendix G- Army UC RA Perf Reqmts 07-June-12
210 Jitter Packet Loss effort traffic) There are no jitter requirements for preferred data IP packets. The LAN shall have the capability to transport prioritized data IP packets E2E with packet loss not to exceed configured traffic engineered (queuing) parameters. Actual measured packet loss across the LAN shall not exceed 0.15 percent within the defined queuing parameters. The packet loss shall be achievable over any 5-minute period measured under congested conditions. Congested condition is defined as 100 percent of link capacities (as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best effort traffic). G.2.3 Voice Performances In addition, the performance requirements for conversational/rt audio traffic that usually requires one-way E2E delay less than milliseconds needs to satisfy the subjective performance requirements of mean-opinion-score (MOS) per technical standards ITU-T P.862 so that speech quality is good enough to be clearly intelligible to the warfighters. ITU-T P.862 is the mandated technical standard in DISR. However, voice services performances in terms of latency, jitter, and packet loss over the ASLAN and n-aslan are shown in Table G-3. Table G-3: Voice Latency, Jitter, and Packet Loss over ASLAN and n-aslan [1] Performance Parameter Latency Jitter Packet Loss ASLAN and n-aslan The LAN shall have the capability to transport voice IP packets, media and signaling, with no more than 6 ms latency E2E across the ASLAN as measured under congested conditions. Congested condition is defined as 100 percent of link capacities as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best effort traffic). The latency shall be achievable over any 5-minute measured period under congested conditions. The LAN shall have the capability to transport voice IP packets E2E with no more than 3 ms of jitter. The jitter shall be achievable over any 5-minute measured period under congested conditions. Congested condition is defined as 100 percent of link capacities (as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best effort traffic). The LAN shall have the capability to transport voice IP packets E2E with packet loss not to exceed configured traffic engineered (queuing) parameters. Actual measured packet loss across the LAN shall not exceed percent within the defined queuing parameters. The packet loss shall be achievable over any 5-minute measured period under congested conditions. Congested condition is defined as 100 percent of link capacities (as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best effort traffic). G.2.4 Video Performances The requirements for conversational/rt video traffic that also usually requires one-way E2E delay less than milliseconds for lip-synchronization needs to satisfy the subjective performance requirements of MOS, to be specified later, in a way that will be make live pictures clearly recognizable by the warfighters. However, voice services performances in terms of latency, jitter, and packet loss over the Assured Services Local Area Network (ASLAN) and n-aslan) are shown in Table G-4. Appendix G- Army UC RA Perf Reqmts 07-June-12 Page 6 of 7
211 Table G-4: Video Latency, Jitter, and Packet Loss over ASLAN and n-aslan [1] Performance Parameter ASLAN and n-aslan Latency The LAN shall have the capability to transport video IP packets with no more than 30 ms latency E2E across the LAN. Latency is increased over voice IP packets because of the increased size of the packets (230 bytes for voice packets and up to 1518 bytes for video). The latency shall be achievable over any 5-minute measured period under congested conditions. Congested condition is defined as 100 percent of link capacities as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best effort traffic). Jitter The LAN shall have the capability to transport video IP packets E2E with no more than 30 ms of jitter. The jitter shall be achievable over any 5-minute measured period under congested conditions. Congested condition is defined as 100 percent of link capacities (as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best effort traffic). Packet Loss The LAN shall have the capability to transport video IP packets E2E with packet loss not to exceed configured traffic engineered (queuing) parameters. Actual measured packet loss across the LAN shall not exceed 0.15 percent within the defined queuing parameters. The packet loss shall be achievable over any 5-minute measured period under congested conditions. Congested condition is defined as 100 percent of link capacities (as defined by baseline traffic engineering (25 percent voice/signaling, 25 percent video, 25 percent preferred data, and 25 percent best effort traffic). Appendix G- Army UC RA Perf Reqmts 07-June-12 Page 7 of 7
212 U.S. Army QoS Reference Architecture Appendix H U.S. Army Quality of Service (QoS) Reference Architecture V0.03
213 U.S. Army QoS Reference Architecture Version Summary: Version Staffing Date Revision Summary 5 September 2012 Initial Draft Version.01 Quality of Service for Army Unified Capabilities (UC) Architecture. Version.02 Version October October 2012 Added new UC QoS Rules and Principles Added updated UC QoS Principles and Rules relating UC application QoS requirements to IP network QoS implementations; Added updated Assumptions, Constraints, Mitigation Strategy; Technical Positions and Patterns; Added Multi-Level- Precedence and Preemption (MLPP) for each media of each UC application; Added mapped between General Service Class (Real-Time, Near-Real-Time, and n-real- Time) and Aggregate Service Class (n- Elastic, Preferred Elastic, and Elastic services) and Granular Service Class; Added a new Appendix on Army UC Arch, QoS, and Call Flows tification: This document will be incorporated in the Army Unified Capabilities Reference Architecture. Points of Contact for this effort are: COL Watkins, HQDA CIO/G6-AAIC, [email protected] (571) and LTC Van Den Bosch, HQDA CIO/G6- AAIC, [email protected] (703) Quality of Service Rules Based Architecture for Unified Capabilities Appendix H
214 EXECUTIVE SUMMARY In alignment with Department of Defense Instructions (DoDI ) , Department of Defense Unified Capabilities (UC), the Army will field network infrastructure and Unified Capabilities at posts, camps, and stations (P/C/S) in CONUS, Europe, and Pacific. Army UC is a secure suite of collaboration, real time, near-real-time, and non-real-time communications, and supporting services available to the Soldier and Army business user on any device, anywhere in the world. This suite brings together , chat, voice, video, collaboration, content management, discovery, applications, and records management tools under one identity in a secured environment. This Quality of Service (QoS) Rules-based Reference Architecture (RA) provides guidance for the design, development, deployment, transition to, and operational support for the Unified Capabilities infrastructure to meet the QoS requirements of all UC applications. The use of this guidance, when developing Unified Capabilities infrastructure solutions, will ensure QoS standards for UC implementation are communicated to the UC implementers and UC providers. The Quality of Service Rules-based Reference Architecture (RA) outlines the left and right boundaries for QoS. It outlines the Principles and Business Rules that serve as a framework for operational and functional components of the architecture; establishing sets of rules, standards and other criteria that must be followed to guide all related solution architectures and implementations. This document is interim guidance that will be incorporated in the Army Unified Capabilities Reference Architecture v1.0, 25 September ii Quality of Service Rules Based Architecture Appendix H
215 Table of Contents EXECUTIVE SUMMARY... II 1.0 INTRODUCTION PURPOSE UC APPLICATIONS, QOS SERVICE CLASSES, AND PRIORITY LEVELS INTENDED AUDIENCE AND USE UNIFIED CAPABILITIES QOS PRINCIPLES AND BUSINESS RULES QoS Principles and Rules Description of QoS Principles and Rules Assumptions, Constraints, Risks, and Mitigation Strategy of QoS Principles/Rules (P1) Principle 1: QoS and Performance (P1/R1-R4) Assumptions (P1/R1-R4) Constraints (P1/R1-R4) Risks (P1/R1-R4) Mitigation Strategy (P1/R1-R4) Technical Positions and Patterns (P2) Principle 2: QoS Policy (P2/R5-R8) Assumptions (P2/R5-R8) Constraints (P2/R5-R8) Risks (P2/R5-R8) Mitigation Strategy (P2/R5-R8) Technical Positions and Patterns (P3) Principle 3: Availability/Reliability (P3/R9-R12) Assumptions (P3/R9-R12) Constraints (P3/R9-R12) Risks (P3/R9-R12) Mitigation Strategy (P3/R9-R12) Technical Positions and Patterns (P4) Traffic Prioritization (P4/R13-R16) Assumptions (P4/R13-R16) Constraints (P4/R13-R16) Risks (P4/R13-R16) Mitigation Strategy (P4/R13-R16) Technical Positions and Patterns (P5) QoS PDP and PEP (P5/R17-R20) Assumptions iii Quality of Service Rules Based Architecture Appendix H
216 (P5/R17-R20) Constraints (P5/R17-R20) Risks (P5/R17-R20) Mitigation Strategy (P5/R17-R20) Technical Positions and Patterns (P6) Dynamic Bandwidth Allocation (P6/R21-R24) Assumptions (P6/R21-R24) Constraints (P6/R21-R24) Risks (P6/R21-R24) Mitigation Strategy (P6/R21-R24) Technical Positions and Patterns (P7) Services Differentiation (P7/R25-R28) Assumptions (P7/R25-R28) Constraints (P7/R25-R28) Risks (P7/R25-R28) Mitigation Strategy (P7/R25-R28) Technical Positions and Patterns (P8) Traffic Aggregation (P8/R29-R32) Assumptions (P8/R29-R32) Constraints (P8/R29-R32) Risks (P8/R29-R32) Mitigation Strategy (P8/R29-R32) Technical Positions and Patterns UNIFIED CAPABILITIES HIGH LEVEL IMPLEMENTATION CONFIGURATIONS/PATTERNS APPENDIX A - ARMY UC RA, QOS, AND CALL FLOWS ARMY UC REFERENCE ARCHITECTURE AND QOS Real-Time Communications Services ensuring QOS Assured Point-to-Point Audio/Video/Data Conferencing n-real-time UC Services ensuring QOS IM/Chat /Presence Communications (Stand-Alone) APPENDIX B - QUEUING HIERARCHY FOR DISN IP SERVICE CLASSES APPENDIX C - ACRONYM LIST APPENDIX D - VOCABULARY (INTEGRATED DICTIONARY AV2) APPENDIX E - REFERENCE iv Quality of Service Rules Based Architecture Appendix H
217 List of Figures Figure 1: Overview of Different Segments of UC Communications Infrastructure Figure 2: Enterprise UC/VoIP (OV-1) Figure 3: Parent/Child High-Level Architecture Figure 4: Conceptual Operational View of Army UC Architecture (OV-1) [1] Figure 5: Functional Operational View of Army UC Architecture (OV-1) [1] Figure 6: Assured Point-to-Point Audio/Video/Data Conference Call (OV-6c) [1] Figure 7: Assured Point-to-Point IM/Chat Communications (OV-6c) [1] Figure 8: Queuing Design Overview Figure 9: Four-Queue Design Scheme List of Tables Table 1: UC Applications and QoS Service Classes Mapping... 9 Table 2: Granular Service Performance Objectives Table 3: MLPP Levels Table 4: UC Applications/Services Priority/Precedence Levels Table 5: QoS Roles and Responsibilities Table 6: Mapping between UC QoS Service Area and QoS Guiding Principles and Rules Table 7: Description of Business Principles and Rules Table 8: (P1) Principle 1: QoS and Performance & Corresponding (R1-R4) Rules and References Table 9: (P2) Principle 2: QoS Policy Table 10: (P3) Principle 3: Availability/Reliability Table 11: (P4) Traffic Prioritization Table 12: (P5) QoS PDP and PEP Table 13: (P6) Dynamic Bandwidth Allocation v Quality of Service Rules Based Architecture Appendix H
218 Table 14: (P7) Services Differentiation Table 15: (P8) Traffic Aggregation Table 16: QoS Four Queue Model* Table 17: QoS 6 Queue Model* vi Quality of Service Rules Based Architecture Appendix H
219 1.0 Introduction The Quality of Service (QoS) Reference Architecture (RA) that is a part of the Army Unified Capabilities (UC) RA [1] provides resource assurances and service differentiations of real-time (RT), near-real-time (near-rt), and non-real-time (non-rt) UC applications over the network. Unified Capabilities support all phases of operations and convergence of the Generating and Operating Forces. UC connects users to enable real time communication, collaboration and shared situational awareness along with near-rt and non-rt applications. The integration of UC services will facilitate more timely delivery of emerging UC technologies and provide increased mission effectiveness. It should be noted that the infrastructure that is suitable for RT applications will be good for both near-rt and non-real-time applications because the performance requirements of the RT applications are much more stringent that those of the near-rt or non-rt applications. The current state of UC is a mix of local solutions and enterprise services provided by DISA as described in DoD UC Requirements (UCR) [2]. The DoD UCR also defines interoperability, Information Assurance, and interface requirements among products that provide UC. The information assurance requirements of the UCR are derived from DoD Instruction (DoDI) [3]. In alignment with Department of Defense Instructions (DoDI ) [4] and Department of Defense (DoD) Unified Capabilities (UC), the Army will field network infrastructure and Unified Capabilities at posts, camps, and stations (P/C/S) in Continental United States (CONUS), Europe, and Pacific. Army UC is a secure suite of collaboration, real time communications, and supporting services available to the Soldier and Army business user on any device, anywhere in the world. This suite brings together , chat, voice, video, collaboration, content management, discovery, applications, and records management tools under one identity in a secured environment. 2.0 Purpose The requirements to provide QoS for UC on P/C/S are defined in both UCR 2008, Change 3 [2], DoD UCR 2013 [5], DoD UCR Framework [6], and DoD UC Master Plan [7]. The purpose of this QoS Reference Architecture (RA) is to convey the prerequisites and requirements to enable QoS in the implementation of the Army s UC. Quality-of-Service is defined as: The ability to provide resource assurance and service differentiation in a network. Used with the local area network to provide different priority to traffic flows or sessions, or guarantee a certain level of performance to a traffic flow or session in accordance with requests from the application program. Quality of service is used in conjunction with traffic tagging to guarantee that prioritized traffic flows or sessions are given preferential treatment. The key is that QoS RA ensures resources and provides service differentiation over the network meeting performance requirements of the UC applications in transferring the traffic between the sources and the destinations. This QoS RA is interim guidance and part of the overarching Army Unified Capabilities RA. It serves as the primary guidance for Army organizations responsible for providing the infrastructure that will enable UC on Army P/C/S s. This document directs compliance with rules that specifically address the delivery of required QoS capabilities to enable UC as well as identifies existing assumptions, constraints, known risks, 7 Quality of Service Rules Based Architecture Appendix H
220 mitigation strategy and technical positions & patterns. Where a risk mitigation strategy exists, that strategy will be identified with associated measures and metrics. 3.0 UC Applications, QoS Service Classes, and Priority Levels The UC application services are shared over one converged Internet Protocol Multiprotocol Label Switching (IP-MPLS) backbone network while the access networks may consist of many networking technologies. All UC application services areas are grouped as follows as described in Army UC RA [1]: Real-Time Communications (RTC) Services: o Voice & Video, Web Conferencing, o Conferencing, Collaboration & Whiteboard, o Media Bridging, Presence, o Instant Messaging (IM) & Chat, o Unified Messaging, o Calendaring & Scheduling, o E.164 Number Mapping (ENUM), o E.911 (Emergency Call), o Transaction Capabilities Application Part (TCAP), o Desktop Sharing, Short Message Service (SMS), o Multimedia Message Service (MMS), o , o Wireless Application Protocol (WAP), and o Location Services (Fixed/Mobile) Content Management Records Management Team Collaboration Business Process Management (BPM) Web 2.0 Apps (Applications) Portals Profiles Search & Discovery Information Assurance Army UC RA provides the detail description of all UC applications that can be categorized broadly known as general service class such as Real-Time (RT), Near-Real-Time (near-rt), and n-real-time (non-rt) from performance requirements point of view. The Internet Engineering Task Force (IETF), Department of Defense (DoD) UC 2008, and Global Information Grid (GIG) Technical Profile (GTP) for QoS [8] have also classified the applications primarily known as aggregate service class such as Inelastic/Real-Time, Preferred Elastic, Elastic, and Network Control. All of these QoS service classes and their relationships are defined and explained in Appendix D of this document. Appendix C of Army UC RA [1] summarizes the performance requirements for different categories of UC applications that consist of audio, video, and data along with key performance parameters (KPPs) in relationship to the mission for conducting decisive operations throughput the battle-space. Table 1 provides the mapping 8 Quality of Service Rules Based Architecture Appendix H
221 between different categories of UC Applications and QoS Service Classes. In addition, a granular service class [8] has also been defined along with the detailed definitions in supporting different applications for easy understanding in applying the different QoS classes. The term conference includes both point-to-point and multipoint conferencing. So, it should be noted that there will also be point-to-point audio calls, point-to-point audio & video calls, point-to-point audio, video & data calls, multipoint audio (teleconferencing) calls, multipoint audio & video (videoconferencing) calls, and multipoint audio, video & data (multimedia collaboration) calls, all of those have been assumed as a part of the conferencing call family. Table 1: UC Applications and QoS Service Classes Mapping UC Applications General QoS Class Aggregate Service Class Granular Service Class Description of Application Traffic (Media/Granular Service Class) Support UC Service Category UC Application Category Media (Traffic) Real-Time Communicati ons (RTC) Services User Signaling Audio n- Real- Time Real- Time Inelastic User Signaling User generated signaling messages, for example SIP requests (see RFC 4594). Inelastic Voice Packetized voice services that require high quality connectivity with low packet delay, jitter and loss. Voice & Video, Web Conferencing Video Data: Short Messages Real- Time n- Real- Time Inelastic Video Like audio, packetized video services that require high quality connectivity with low packet delay, jitter and loss. Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Data: Low Latency Application n- Real- Time Preferred Elastic Low Latency Data Relatively short TCP-based transactions that require low packet loss and delay. Data: Large Files n- Real- Time Preferred Elastic High Throughput Data Longer TCP-based file transfers that are more tolerant to packet loss and delay Data: Low Priority Application n- Real- Time Elastic Low Priority Data (Scavenger) User applications that have neither performance guarantees nor an allocated capacity, can tolerate long duration interruption of service. Data: Best Effort/ Default Application n- Real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity 9 Quality of Service Rules Based Architecture Appendix H
222 User Signaling n- Real- Time Inelastic User Signaling User generated signaling messages, for example SIP requests (see RFC 4594). Conferencing, Collaboration & Whiteboard Audio Video Real- Time Real- Time Inelastic Audio Packetized voice services that require high quality connectivity with low packet delay, jitter and loss. Inelastic Video Like audio, packetized video services that require high quality connectivity with low packet delay, jitter and loss. Data (Same as Video & Video, Web Conferencing) User Signaling n- Real- Time Inelastic User Signaling User generated signaling messages, for example SIP requests (see RFC 4594). Media Bridging Audio Video Real- Time Real- Time Inelastic Audio Packetized voice services that require high quality connectivity with low packet delay, jitter and loss. Inelastic Video Like audio, packetized video services that require high quality connectivity with low packet delay, jitter and loss. Data (Same as Video & Video, Web Conferencing) Presence Instant Messaging (IM) & Chat Data Data n- Real- Time n- Real- Time Inelastic Inelastic Short Message Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Very urgent short messages that need minimum packet delay, jitter and loss. Unified Messaging Audio/ Video and Data Near- Real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Data Only n- Real- Time Inelastic Short Message Very urgent short messages that need minimum packet delay, jitter and loss. Calendaring & Scheduling E.164 Number Mapping (ENUM) E.911 (Emergency Call) Data Data User Signaling Audio Video n- Real- Time n- Real- Time Inelastic Inelastic Short Messages User/ network Signaling Very urgent short messages that need minimum packet delay, jitter and loss. User/Network generated signaling messages, (see RFC 4594). Same as Voice & Video, Web Conferencing 10 Quality of Service Rules Based Architecture Appendix H
223 Data Transaction Capabilities Application Part (TCAP) Data User Signaling n- Real- Time Inelastic Network Signaling Network generated signaling messages, (see RFC 4594). Desktop Sharing Audio Video Data Same as Voice & Video, Web Conferencing Short Message Service (SMS) Data n- Real- Time Inelastic Short Message Very urgent short messages that need minimum packet delay, jitter and loss. Multimedia Messaging Service (MMS) Audio/ Video and Data Data Only Near- Real- Time n- Real- Time Preferred Elastic Inelastic Multimedia Streaming Short Messages Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Very urgent short messages that need minimum packet delay, jitter and loss. Data n- Real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity. Wireless Application Protocol (WAP) Audio/ Video and Data Data Same as Multimedia Messaging Service (MMS) Content Management Location Services (Fixed/Mobile) Content Management Data Data n- Real- Time n- Real- Time Inelastic Elastic Default/ Best Effort Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity. User applications that do not require performance guarantees, but do have an allocated capacity Records Management Records Management Data n- Real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity Team Collaboration Team Collaboration Data Only n- Real- Time Preferred Elastic Low-Latency Data Relatively short TCP-based transactions that require low packet loss and delay Business Process Management (BPM) Business Process Management (BPM) Data n- Real- Time Elastic Default/ Best Effort User applications that do not require performance guarantees, but do have an allocated capacity Web 2.0 Web 2.0 Audio/ Video and Data Near- Real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast 11 Quality of Service Rules Based Architecture Appendix H
224 Video service class. Data Only n- Real- Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Apps (Applications) Apps (Applications) Data n- Real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Portals Portals Data n- Real- Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Profiles Profiles Data n- Real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Search & Discovery Search & Discovery Data n- Real- Time Inelastic Short Messages Very urgent short messages that need minimum packet delay, jitter and loss. Information Assurance Information Assurance Data n- Real- Time Preferred Elastic Multimedia Streaming Packetized video services that can tolerate higher packet delay, jitter and loss than provided by the Broadcast Video service class. Broadcast Video* Broadcast Video Audio/ Video Near- Real- Time Inelastic Broadcast Video For inelastic traffic flows intended for high quality, broadcast video and audio transmission. Network Control Application* Network Control Application* Data n- Real- Time Network Control Network Control Network generated signaling messages, for example routing table updates. Operation, Administratio n & Maintenance (OA&M) Application* Operation, Administration & Maintenance (OA&M)* Data n- Real- Time Preferred Elastic OA&M Applications used for monitoring and controlling status of network Devices. * UC applications (To be Described) Table 2 describes the one-way end-to-end performance objectives [2] for the Granular Service Class applications in terms of end-to-end delay, end-to-end packet loss, and end-to-end delay jitter. It should be noted that best effort, signaling, network control, and low priority traffic aggregate service classes do not have performance objectives. Granular Service Class Table 2: Granular Service Performance Objectives End-to-End Latency End-to-End Packet Loss (milliseconds) (%) End-to-End Delay Jitter (milliseconds) Short Messaging Voice** (Assured/n- 220/250 1/1 20/20 12 Quality of Service Rules Based Architecture Appendix H
225 Assured) Multimedia Conferencing (Voice/Video** only) Broadcast Video (Voice/Video only) Multimedia Streaming (Voice/Video** only) Low Latency Data: IM/Chat, Presence High Throughput Data ** Video delay requirements seem to be very stringent based on available commercial video codecs that are used per ITU-T H.xxx-series video standards. Army UC services are required to be delivered in accordance with different priority levels with assured connectivity. The assured service session initiation protocol (AS-SIP) signaling messages have the standardized mechanisms for indicating different priority levels at the time of call setups. Accordingly, audio, video, and data for multimedia conferencing are delivered using the Multi-Level Precedence and Preemption (MLPP) [2] over the LANs, access networks, and IP/MPLS backbone network on end-to-end. This MLPP-based services are known as the Precedence-based Assured Services (PBAS) [2] with 5 priority levels as indicated in Table 3. Precedence Level FLASH OVERRIDE Table 3: MLPP Levels Abbreviation Priority Order Priority Order Level Indicator FO Highest Priority 0 FLASH F 2 nd Level 1 IMMEDIATE I 3 rd Level 2 PRIORITY P 4 th Level 3 ROUTINE R Lowest Level 4 Interestingly, UC applications/services that consist of different media will have different priority/precedence levels. Table 4 depicts the precedent levels of different UC applications/services consisting of different media that are mapped to different general QoS classes, aggregate service classes, and granular service classes. 13 Quality of Service Rules Based Architecture Appendix H
226 Table 4: UC Applications/Services Priority/Precedence Levels UC Applications General QoS Class Aggregate Service Class Granular Service Class Priority/ Precedence UC Service Category UC Application Category Voice & Video, Web Conferencing Media (Traffic) User Signaling n-real-time Inelastic User Signaling t Applicable Audio Real-Time Inelastic Voice FO, F, I, P, R Video Real-Time Inelastic Video FO, F, I, P, R Data: Short Messages n-real-time Inelastic Short Messages FO Data: Low Latency Application n-real-time Preferred Elastic Low Latency Data FO, F, I, P, R Data: Large Files n-real-time Preferred Elastic High Throughput Data FO, F, I, P, R Real-Time Communications (RTC) Services Data: Low Priority Application n-real-time Elastic Low Priority Data (Scavenger) t Applicable Data: Best Effort/ Default Application n-real-time Elastic Default/ Best Effort t Applicable Conferencing, Collaboration & Whiteboard User Signaling n-real-time Inelastic User Signaling t Applicable Audio Real-Time Inelastic Audio FO, F, I, P, R Video Real-Time Inelastic Video FO, F, I, P, R Data Same as Voice & Video, Web Conferencing User Signaling n-real-time Inelastic User Signaling t Applicable Audio Real-Time Inelastic Audio FO, F, I, P, R Media Bridging Presence Video Real-Time Inelastic Video FO, F, I, P, R Data n-real-time Inelastic Short Messages FO Instant Messaging (IM) & Chat Data n-real-time Inelastic Short Messages FO Unified Messaging Audio/ Video and Data Near-Real- Time Preferred Elastic Multimedia Streaming FO, F, I, P, R 14 Quality of Service Rules Based Architecture Appendix H
227 Data Only n-real-time Inelastic Short Messages FO Calendaring & Scheduling E.164 Number Mapping (ENUM) E.911 (Emergency Call) Data n-real-time Inelastic Short Messages Data n-real-time Inelastic User/ network Signaling User Signaling Audio Video Same as Voice & Video, Web Conferencing FO t Applicable Transaction Capabilities Application Part (TCAP) Data Data n-real-time Inelastic Network Signaling User Signaling Audio t Applicable Desktop Sharing Video Data Same as Voice & Video, Web Conferencing Short Message Service (SMS) Data n-real-time Inelastic Short Message FO Multimedia Messaging Service (MMS) Audio/ Video and Data Near-Real- Time Preferred Elastic Multimedia Streaming Data Only n-real-time Inelastic Short Messages FO, F, I, P, R FO Data n-real-time Elastic Default/ Best Effort t Applicable Wireless Application Protocol (WAP) Audio/ Video and Data Data Same as Multimedia Messaging Service (MMS) Content Management Location Services (Fixed/Mobile) Content Management Data n-real-time Inelastic Default/ Best Effort Data n-real-time Elastic Default/ Best Effort t Applicable t Applicable Records Management Records Management Data n-real-time Elastic Default/ Best Effort t Applicable Team Collaboration Team Collaboration Data Only n-real-time Preferred Elastic Low-Latency Data FO 15 Quality of Service Rules Based Architecture Appendix H
228 Business Process Management (BPM) Business Process Management (BPM) Data n-real-time Elastic Default/ Best Effort FO Web 2.0 Web 2.0 Audio/ Video and Data Near-Real- Time Preferred Elastic Multimedia Streaming FO, F, I, P, R Data Only n-real-time Inelastic Short Messages FO Apps (Applications) Apps (Applications) Data n-real-time Preferred Elastic Multimedia Streaming FO, F, I, P, R Portals Portals Data n-real-time Inelastic Short Messages FO Profiles Profiles Data n-real-time Preferred Elastic Multimedia Streaming FO, F, I, P, R Search & Discovery Search & Discovery Data n-real-time Inelastic Short Messages FO Information Assurance Information Assurance Data n-real-time Preferred Elastic Multimedia Streaming FO, F, I, P, R Broadcast Video* Broadcast Video Audio/ Video Near-Real- Time Inelastic Broadcast Video t Applicable Network Control Application* Network Control Application* Data n-real-time Network Control Network Control t Applicable Operation, Administration & Maintenance (OA&M) Application* Operation, Administration & Maintenance (OA&M)* Data n-real-time Preferred Elastic OA&M t Applicable 4.0 Intended Audience and Use Like Army UC RA, the QoS RA is also applicable for both Continental and Outside United States (CNOUS/OCUNS). The same UC services can be used both for the fixed and the tactical 2 nd /3 rd /4 th generation (2G/3G/4G) cellular mobile network along with interworking between IP and Time Division Multiplexing (TDM) networks, but UC architecture is yet to be developed for the mobile ad hoc network (MANET). At present, the intended audience for this QoS RA guidance is Network Enterprise Technology Command (NETCOM) 9 th Signal Command (9 th SC), 7th Army Signal Command Theater (7 SC (T)), the Program Executive Office (PEO) and designated Program Manager (PM), Defense Information Systems Agency (DISA) and the CIO/G6 Resource Manager (RM) whom together ensure the delivery of QoS for Army Unified Capabilities solutions. Table 5 below lists the primary stakeholders and their roles and responsibilities. 16 Quality of Service Rules Based Architecture Appendix H
229 DISA CIO/G6 CIO/G6 RM Army/G3/5/7 Role Table 5: QoS Roles and Responsibilities Responsibilities Maintenance and sustainment associated the Defense Information Systems Network (DISN) back bone and edge service provider to support UC for three specific configurations, Parent/Stand Alone, Aggregation/Parent and Aggregated/Child site. Development QoS for Army UC plan for all realtime, near-real-time, and non-real-time UC services offered by Army LandWarNet (LWN), DISN, and others including Joint services. Allocate funding needed to implement UC. Establish mission requirements and criticality/prioritization of installations. Network Enterprise Technology Command (NETCOM), 7 th Army Signal Command (SC) PEO, PM Develop and provide technical guidance for UC. Provide guidance for QoS requirements on existing equipment. Implement QoS during the implementation and of fielding new UC equipment. A rules-based architecture is founded on enterprise guiding principles that describe a desired strategic outcome. To achieve that outcome, a series of rules are identified to meet the intent of the guiding principles. The rules are directive by nature and must be conformed with and enforced. However, based on the fidelity and depth of information available, certain assumptions may be required as well as consideration for known constraints that may impact full compliance with a given rule. From these assumptions and constraints a rules-based architecture documents any inherent risk (if it exists) in meeting the intent of the rule and thus impact an organizations ability to conform with a rule. If a risk is identified, a corresponding risk mitigation strategy is required. To achieve the desired QoS in support of UC, guiding principles and associated rules have been established to achieve QoS are listed in Section 5 of this document. Associated with each rule are identified risks, risk mitigation strategies and how risk mitigation (or rule compliance) will be measured. The assumptions and constraints associated with each rule are listed in Section 5 along with a full description of each rule. For further understanding of UC implementation objectives, Section 6 describes high-level UC implementation patterns. 17 Quality of Service Rules Based Architecture Appendix H
230 5.0 Unified Capabilities QoS Principles and Business Rules 5.1 QoS Principles and Rules The quality-of-service (QoS) needs to be managed across all communications infrastructures in order to meet the end-to-end QoS requirements of all UC applications (real-time, non-real-time, and near-real-time). The calls being controlled by the UC applications (servers) go over different segments of the network between the sources and destinations. In the case of assured service session initiation (AS-SIP) multimedia collaboration calls, call control signaling traffic goes via the application servers that are controlling the calls while media (audio, video, and data) go between the sources and the destinations directly over the network. Both AS-SIP call signaling traffic and media traffic have different QoS requirements. Even each medium of like audio, video, or data application of a given AS-SIP call has also different QoS requirements. However, both call signaling and media traffic go through the same path for the non-real-time data applications and QoS requirements for the non-real-time data applications are much less stringent from those of the audio or video. As explained earlier, each UC application has certain end-to-end QoS requirements. When each call/medium traverses over the network, it passes over the several segments of the communications infrastructure in the end-to-end path that may consist of data center, ingress/egress local area network (LAN), ingress/egress access network, and backbone network as depicted in Figure 1. Figure 1: Overview of Different Segments of UC Communications Infrastructure 18 Quality of Service Rules Based Architecture Appendix H
231 Accordingly, there are only two primary QoS service areas: UC Application QoS Management and UC Infrastructure QoS Management while the infrastructure QoS area can further be subdivided as follows: Data Center QoS Management Ingress/Egress LAN QoS Management Ingress/Egress Access Network QoS Management IP/MPLS Backbone Network QoS Management An important observation is that the UC applications that are residing inside the application servers of the data center are controlling QoS policies and store the QoS policy in the QoS policy server. In turn, the QoS policy server distribute the QoS policies to all infrastructure segments for making QoS policy decisions and enforcements. Sometimes, QoS policies of the policy server are also provisioned on behalf of the applications. The QoS policies and invocation of QoS services over different infrastructure segments by different functional entities at the time of call setups for different UC applications are shown in Appendix A of this document. Table 6 depicts the UC QoS Service Areas that are mapped to operational guiding principles and rules described in the QoS RA. It should be noted that these are the subsets of the global DoD rules and principles described in DoD IEAv2.0 in relation to the UC services. Appendixes F and G of Army UC RA [1] describe the detailed mapping of UC capabilities and performance requirements, respectively. The key that QoS needs to be managed on end-to-end basis across all segments in meeting the needs of all UC applications. Table 6: Mapping between UC QoS Service Area and QoS Guiding Principles and Rules QoS Service Area to Guiding Principle Mapping UC Application QoS Management Principles Data Center QoS Management Service Area UC Infrastructure QoS Management Areas and Rules Ingress/ Egress LAN QoS Management Service Area Ingress/ Egress Access Network QoS Management Service Area IP/MPLS Backbone Network QoS Management Service Area Rules for Respective Service Areas Corresponding to Each Principle QoS Guiding Principles (P1) All Army communications infrastructures together must ensure to meet end-to-end QoS (R1) Data Center QoS and Performance (R2) Ingress/ Egress LAN QoS and Performance 19 (R3) Ingress/ Egress Access Network QoS and Performance (R4) IP/MPLS Backbone Network QoS and Performance Quality of Service Rules Based Architecture Appendix H
232 and performance requirements of all UC applications (real-time, nearreal-time, and non-real-time) applications (P2) (R5) (R6) (R7) (R8) QoS Policy Data Center QoS Policy Ingress/Egress LAN QoS Policy Ingress/ Egress Access Network QoS Policy IP/MPLS Backbone Network QoS Policy (P3) (R9) (R10) (R11) (R12) Availability/ Reliability Data Center Availability/ Reliability Ingress/Egress LAN Availability/ Reliability Ingress/ Egress Access Network Availability/ Reliability IP/MPLS Backbone Network Availability/ Reliability (P4) (R13) (R14) (R15) (R16) Traffic Prioritization Data Center Traffic Prioritization Ingress/Egress LAN Traffic Prioritization Ingress/ Egress Access Network Traffic Prioritization IP/MPLS Backbone Network Traffic Prioritization (P5) (R17) (R18) (R19) (R20) QoS Policy Decision Point (PDP) and QoS Policy Enforcement Point (PEP) Data Center QoS PDP and PEP Ingress/Egress LAN QoS PDP and PEP Ingress/ Egress Access Network QoS PDP and PEP IP/MPLS Backbone Network QoS PDP and PEP (P6) (R21) (R22) (R23) (R24) Dynamic Bandwidth Allocation Data Center Dynamic Bandwidth Allocation Ingress/Egress LAN Dynamic Bandwidth Allocation Ingress/ Egress Access Network Dynamic Bandwidth Allocation IP/MPLS Backbone Network Dynamic Bandwidth Allocation 20 Quality of Service Rules Based Architecture Appendix H
233 (P7) (R25) (R26) (R27) (R28) Services Differentiation based on traffic categories Data Center Services Differentiation Ingress/Egress LAN Services Differentiation Ingress/ Egress Access Network Services Differentiation IP/MPLS Backbone Network Services Differentiation (P8) (R29) (R30) (R31) (R32) Traffic Aggregation Data Center Traffic Aggregation Ingress/Egress LAN Traffic Aggregation Ingress/ Egress Access Network Traffic Aggregation IP/MPLS Backbone Network Traffic Aggregation 5.2 Description of QoS Principles and Rules We have stated the overall general QoS principles to meet the QoS and performance needs for each media of the UC applications which will traverse over different infrastructure segments such as data center, ingress/egress LANs, ingress/egress access networks, and IP/MPLS backbone network between the source-destination paths. Based on these global principles, we have also formulated the individual business rules for each of these QoS principles of each QoS management service area. However, further clarifications for each of these principles and rules need to be provided, and Table 7 provides detailed explanations for each principle and its corresponding rules. IP may run over the lower physical transport networks like TDM/ISDN, Synchronous Optical Network (SONET), fiber optic, Dense Wavelength Division Multiplexing (DWDM) and others, and the term network infrastructure or IP network may also indicate of these networks together. Table 7: Description of Business Principles and Rules Principle Rule Principle Description Description Description Description Description (P1) All Army communications Infrastructures together must ensure to meet Each individual infrastructure segment that consists of the Army end-to-end communications (R1) Data Center QoS and Performance: All UC application (R2) Ingress/Egress LAN QoS and Performance: (R3) Ingress/ Egress access network QoS and Performance: (R4) IP/MPLS QoS and Performance: 21 Quality of Service Rules Based Architecture Appendix H
234 end-to-end QoS and performance requirements of all UC applications (real-time, nearreal-time, and non-real-time) applications infrastructure must meet or exceed its own part of QoS and performance requirements (e.g. delay, packet loss, delay jitter [if any]) for each media of each UC application. The end-to-end QoS performances consisting of all individual infrastructure segments together must meet or exceed the requirements as shown in Table 2 of this document and Appendix G of Army UC RA. servers (Apps) that only control the call signaling (e.g. AS-SIP Apps) must determine the end-to-end QoS and performance requirements and allocate the same per each infrastructure segment on the end-toend path for each media of the call and store this information in the QoS policy server. All UC Apps that handle both call signaling and media (e.g. AS-SIP Media App) must maintain the QoS and performances allocated for its infrastructure segment for each media of the call per QoS policy obtained from the QoS server. The real-time UC applications (e.g. Voice, Video, and Web Conferencing, Conferencing, Collaboration & Whiteboard), the session controllers (e.g. LSCs/MFSSs/WAN SSs) must invoke the appropriate QoS and performances per QoS policy obtained from the QoS policy server in their respective segments controlled by them at the time of the call setup and pass this information to the IP routers for QoS decisions and enforcements. Similar is the case for the nearreal-time UC applications (e.g. multimedia messaging, multimedia streaming, and broadcast video). The respective Ingress/Egress LAN segments in the source destination path of each media of each UC application must maintain that the total traffic load of each LAN must not exceed or remain below the threshold as dictated by QoS policy for maintaining the end-to-end QoS and performance requirements. The respective Ingress/Egress access network segments in the source destination path of each media of each UC application must maintain that the total traffic load of each access network segment must not exceed or remain below the threshold as dictated by QoS policy for maintain the end-to-end QoS and performance requirements even if the bandwidth is allocated dynamically, quasidynamically, or prioriprovisioned. The backbone IP/MPLS backbone network segments in the source destination path of each media of each UC application must maintain that the total traffic load of the end-toend segment of the backbone network must not exceed or remain below the threshold as dictated by QoS policy for maintain the end-to-end QoS and performance requirements when DSCPs are used. The non-real-time UC applications that have certain performance requirements must maintain the QoS and performances allocated for its infrastructure segment for each media of the call per QoS policy obtained from the QoS server. thing needs to be done for the non-realtime UC applications that do not have any QoS and performance 22 Quality of Service Rules Based Architecture Appendix H
235 requirements. (P2) QoS Policy The QoS policy must be devised for providing MLPPbased five precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), and ROUTINE (R) shown in Table 3 of this document for each media of each UC application at the time of call setups. In addition, the QoS and performance requirements (e.g. delay, packet loss, and delay jitter [if any]) for each media of each UC application in each infrastructure segment must be decided based on QoS policy. All QoS policies must be distributed in all infrastructure components by the QoS policy server where QoS policies are stored through provisioning of UC services or by UC applications dynamically. (R5) Data Center QoS Policy: All UC application servers (e.g. AS-SIP Apps) must invoke the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 for each media as dictated by the QoS policy. (R6) Ingress/ Egress LAN QoS Policy: The respective Ingress/Egress LAN segments in the source destination path of each media of each UC application must employ the appropriate priority services (e.g. priority queuing) that corresponds to the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 in serving the media over the LAN as dictated by the QoS policy of the serving application. (R7) Ingress/ Egress Access Network QoS Policy: The respective Ingress/Egress access network segments in the source destination path of each media of each UC application must employ the appropriate priority services (e.g. priority queuing) that corresponds to the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 in serving the media over the access network as dictated by the QoS policy of the serving application. (R8) IP/MPLS Backbone Network QoS Policy: The backbone IP/MPLS backbone network segments in the source destination path of each media of each UC application must invoke the DSCP that corresponds to the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 in serving the media over the sourcedestination backbone network segment as dictated by the QoS policy of the serving application. (P3) Availability/ Reliability Each individual infrastructure segment that consists of the Army end-to-end communications infrastructure must meet or exceed its own part of availability/reliability requirements. The end-to-end availability/reliability of 99.99% or better consisting of all individual infrastructure (R9) Data Center Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for each UC application server, each session controller (e.g. LSC, MFSS, WAN SS), and each policy server including QoS that meets or exceeds % so that the overall reliability for the end-to-end path 23 (R10) Ingress/ Egress LAN Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for each ingress/egress LAN segment that meets or exceeds % so that (R11) Ingress/Egress Access Network Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for each ingress/egress access network (R12) IP/MPLS Backbone Network Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for the IP/MPLS backbone network segment Quality of Service Rules Based Architecture Appendix H
236 segments together must meet or exceed the requirements as shown in Appendix G of Army UC RA. meeting or exceeding 99.99%. te: n-assured Services (n-as) LAN (n-aslan) may have a little less stringent availability/reliability. the overall reliability for the end-to-end path meeting or exceeding 99.99%. segment configured with routers and links that meets or exceeds % so that the overall reliability for the end-to-end path meeting or exceeding 99.99%. consisting with sourcedestination path and configured with routers and links that meets or exceeds % so that the overall reliability for the end-to-end path meeting or exceeding 99.99%. (P4) Traffic Prioritization Traffic prioritization needs to be used in all infrastructure segments as applicable differentiating between different priority levels because it will expedite in meeting performance requirements especially for realtime/inelastic traffic of UC applications. For example, five levels of priority queuing such as First-In-First-Out (FIFO), Weighted Fair Queuing (WFQ), Custom Queuing (CQ), Priority Queuing (PQ), and Class- Based WFQ (CB- WFQ) must be used whenever possible. The hardware-based queue mechanisms defined by DoD Class-of-Service (CoS)/QoS Working Group (WG) should also be implemented if possible. (R13) Data Center Traffic Prioritization: Each UC server (e.g. App, LSC/MFSS/WAN SS, Policy App) whether deals with only signaling or both signaling and media must be capable to implement the desired priority queuing mechanisms (e.g. FIFO, WFQ, CQ, PQ, and CB- WFQ) and DoD CoS for traffic prioritization for invoking MLPP-based precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. (R14) Ingress/ Egress LAN Traffic Prioritization: Each Ingress/Egress LAN segment, that consists of routers and links, in the source destination path of each media of each UC application must be capable to implement the desired priority queuing mechanisms (e.g. IEEE 802.1X) for traffic prioritization for invoking MLPPbased precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. (R15) Ingress/ Egress Access Network Traffic Prioritization: Each Ingress/Egress access network segment, that consists of routers and links, in the source destination path of each media of each UC application must be capable to implement the desired priority queuing mechanisms (e.g. FIFO, WFQ, CQ, PQ, and CB-WFQ) and DoD CoS for traffic prioritization for invoking MLPPbased precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. (R16) IP/ MPLS Backbone Network Traffic Prioritization: The backbone IP/MPLS backbone network segments in the source destination path of each media of each UC application must be provisioned to implement the traffic prioritization for invoking MLPPbased precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. (P5) QoS Policy Decision Point (PDP) and QoS Policy Enforcement Point (PEP) The individual infrastructure functional entities such as UC application servers, session controllers (e.g. Local Session Controllers [LSCs]/Multi- (R17) Data Center QoS PDP and PEP: All UC application servers (Apps), session controllers, and routers of the data center must 24 (R18) Ingress/ Egress LAN QoS PDP and PEP: PDP and PEP mechanisms are not applicable over (R19) Ingress/ Egress Access Network QoS PDP and PEP: All routers of the ingress/egress (R20) IP/ MPLS Backbone Network QoS PDP and PEP: Quality of Service Rules Based Architecture Appendix H
237 Function Soft- Switches [MFSSs]/Wide Area Network Soft- Switches [WAN SSs]) and routers must retrieve the QoS policies from the QoS policy server and store them in the policy decision point (PDP). If QoS policies are distributed by the QoS policy server, those QoS policies need to be stored in the PDP. Once the QoS and performance parameters are available, the individual infrastructure functional entity must enforce the QoS in the policy enforcement point (PEP). have PDP and PEP capability per IETF standards related to QoS policy. LAN segment. access network must have PDP and PEP capability per IETF standards related to QoS policy. All routers of the IP/MPLS backbone network must have PDP and PEP capability per IETF standards related to QoS policy. (P6) Dynamic Bandwidth Allocation The ingress/egress access network must be capable to reserve bandwidth on demand (e.g. resource reservation protocol [RSVP]) to meet the bandwidth requirements in its own infrastructure segment based on QoS policy for scalability. (R21) Data Center Dynamic Bandwidth Allocation: The routers that connect the data center to the backbone network must have the capability to reserve the bandwidth dynamically (e.g. RSVP) in addition to other capabilities (e.g. DSCPs, Pre-provisioned QoS) as per QoS policy for scalable use of the access network bandwidth. (R22) Ingress/ Egress LAN Dynamic Bandwidth Allocation: The ingress/egress LANs do not need to have this capability as no mechanisms exist in LANs for implementing of dynamic QoS. (R23) Ingress/ Egress Access Network Dynamic Bandwidth Allocation: The routers of the ingress/egress access networks must have the capability to reserve the bandwidth dynamically (e.g. RSVP) in addition to other capabilities (e.g. DSCPs, Preprovisioned QoS) as per QoS policy for scalable use of the access network bandwidth. (R24) IP/ MPLS Backbone Network Dynamic Bandwidth Allocation: The DiffServbased IP/MPLS backbone network must provide interworking between RSVP and DSCP in transferring media between the ingress and egress access network if RSVP is used in the access networks (although the backbone network will not implement any bandwidth dynamically [e.g. 25 Quality of Service Rules Based Architecture Appendix H
238 RSVP]). (P7) Services Differentiation based on traffic categories The IP/MPLS backbone network must be provisioned using the DSCPs for each media of each UC application based on the precedence levels as shown in Table 4 of this document. If RSVP is used in the access networks, the mapping between the RSVP and DSCPs must be provided in the ingress/egress backbone network nodes. (R25) Data Center Services Differentiation: The routers that connect the data center to the backbone network may implement DSCPs as per QoS policy although it may not efficient use of the access network bandwidth. (R26) Ingress/ Egress LAN Services Differentiation: The ingress/egress LANs do not need to have this capability as no mechanisms exist in LANs for implementing of DSCPs. (R27) Ingress/ Egress Access Network Services Differentiation: The routers of the ingress/egress access networks may implement DSCPs as per QoS policy although it may not efficient use of the access network bandwidth. (R28) IP/ MPLS Backbone Network Services Differentiation: The IP/MPLS backbone network must implement DSCPs per QoS policy. (P8) Traffic Aggregation The each media (audio, video, or data) of each UC application must be aggregated in all infrastructure segments whenever applicable/possible. In the IP/MPLS network, traffic engineering must be used for efficient traffic aggregation. (R29) Data Center Traffic Aggression: The routers that connect the data center to the backbone network must aggregate traffic using the RSVP schemes and may implement MPLS traffic engineering as per QoS policy based on IETF traffic engineering standards if DSCPs are used. (R30) Ingress/ Egress LAN Traffic Aggression: The ingress/egress LANs do not need to have this capability as no mechanisms exist in LANs for traffic aggregation. (R31) Ingress/ Egress Access Network Traffic Aggression: The ingress/egress access networks must aggregate traffic using the RSVP schemes and may implement MPLS traffic engineering as per QoS policy based on IETF traffic engineering standards if DSCPs are used. (R32) IP/ MPLS Backbone Network Traffic Aggression: The IP/MPLS backbone network must aggregate traffic implement MPLS traffic engineering as per QoS policy based on IETF traffic engineering standards. 5.3 Assumptions, Constraints, Risks, and Mitigation Strategy of QoS Principles/Rules (P1) Principle 1: QoS and Performance Table 8 depicts the business rules (R1-R4) for different QoS management segments for (P1) Principle 1: QoS and Performance along with references of the authoritative documents. 26 Quality of Service Rules Based Architecture Appendix H
239 Table 8: (P1) Principle 1: QoS and Performance & Corresponding (R1-R4) Rules and References Principle Rule Principle Description Description Description Description Description (P1) All Army communications Infrastructures together must ensure to meet end-to-end QoS and performance requirements of all UC applications (real-time, nearreal-time, and non-real-time) applications Each individual infrastructure segment that consists of the Army end-to-end communications infrastructure must meet or exceed its own part of QoS and performance requirements (e.g. delay, packet loss, delay jitter [if any]) for each media of each UC application. The end-to-end QoS performances consisting of all individual infrastructure segments together must meet or exceed the requirements as shown in Table 2 of this document and Appendix G of Army UC RA. (R1) Data Center QoS and Performance: All UC application servers (Apps) that only control the call signaling (e.g. AS-SIP Apps) must determine the end-to-end QoS and performance requirements and allocate the same per each infrastructure segment on the end-toend path for each media of the call and store this information in the QoS policy server. All UC Apps that handle both call signaling and media (e.g. AS-SIP Media App) must maintain the QoS and performances allocated for its infrastructure segment for each media of the call per QoS policy obtained from the QoS server. The real-time UC applications (e.g. Voice, Video, and Web Conferencing, Conferencing, Collaboration & Whiteboard), the session controllers (e.g. LSCs/MFSSs/WAN SSs) must invoke the appropriate QoS and performances per QoS policy obtained from the QoS policy server in their respective segments controlled by them at the time of the call setup and pass this information to the IP routers for QoS decisions and enforcements. Similar is the case for the nearreal-time UC applications (e.g. multimedia messaging, multimedia streaming, and broadcast video). (R2) Ingress/Egress LAN QoS and Performance: The respective Ingress/Egress LAN segments in the source destination path of each media of each UC application must maintain that the total traffic load of each LAN must not exceed or remain below the threshold as dictated by QoS policy for maintaining the end-to-end QoS and performance requirements. (R3) Ingress/ Egress access network QoS and Performance: The respective Ingress/Egress access network segments in the source destination path of each media of each UC application must maintain that the total traffic load of each access network segment must not exceed or remain below the threshold as dictated by QoS policy for maintain the end-to-end QoS and performance requirements even if the bandwidth is allocated dynamically, quasidynamically, or prioriprovisioned. (R4) IP/MPLS QoS and Performance: The backbone IP/MPLS backbone network segments in the source destination path of each media of each UC application must maintain that the total traffic load of the end-toend segment of the backbone network must not exceed or remain below the threshold as dictated by QoS policy for maintain the end-to-end QoS and performance requirements when DSCPs are used. 27 Quality of Service Rules Based Architecture Appendix H
240 The non-real-time UC applications that have certain performance requirements must maintain the QoS and performances allocated for its infrastructure segment for each media of the call per QoS policy obtained from the QoS server. thing needs to be done for the non-realtime UC applications that do not have any QoS and performance requirements. Reference Documents 1. DoD UCR 2008 Change 3 [2] 2. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 3. Appendix G: Performance Requirements of Army UC RA [1] (P1/R1-R4) Assumptions The QoS and performance parameters for each QoS management segmented will be available in the QoS policy server based on the end-to-end QoS and performance requirements for each media of each UC application. UC system management center has the capabilities for monitoring of the QoS and performance parameters as recommended in this document. UC system also needs to consider both IP and Time Division Multiplexing (TDM) network for Emergency Calls for QoS and performance. This is due to the fact that some functional entities in the legacy TDM/Integrated Services Digital Network (ISDN) will still be used for providing emergency call services (e.g. Emergency 911) over the TDMbased network users until the time all capabilities are available in SIP over the IP network in the Everything-over-IP (EoIP) environment. Appendix A: Army UC RA, QoS, and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. Local Session Controllers [LSCs]/Multi-Function Soft-Switches [MFSSs]/Wide Area Network Soft-Switches [WAN SSs]), routers, and others for invoking of QoS over the IP network to meet the QoS requirements of each media of each UC application at the time of the call setup is an integral part of this QoS and Performance principle and its corresponding rules. The end-to-end QoS and performance requirements are divided into different QoS management segments: Data Center QoS Management, Ingress/Egress LAN QoS Management, Ingress/Egress Access Network QoS Management, and IP/MPLS Backbone Network QoS Management. These segments together satisfy the end-to-end QoS requirements of each media of each UC application. 28 Quality of Service Rules Based Architecture Appendix H
241 The QoS policy server (see Appendix A of this document) keeps the information on how each of these QoS management segments is required to take care of QoS and performances for each media in its own segment in view of the end-to-end QoS and performance requirements (P1/R1-R4) Constraints The functional entities like UC application servers (Apps), session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have capabilities for implementing QoS and performances in their respective segments. Infrastructure delivered by Installation Information Infrasturctue Modernization Program (I3MP) (switches, routers, cables, bandwidth) may not support the current level of Information Technology (IT) service delivery to have the desired levels of QoS and performances. I3MP has been directed to move toward Gigabit Passive Optical Network (GPON) and wireless, and these will provide different capabilities than what we currently have. VoIP and Unified Capabilities is divided into 6 increments for the purpose of organizing how capabilities are fielded, engineering designs must always consider the overall design. t all Army networks currently support Everything-over-IP (EoIP) and will restrict to achieve the desired goal of QoS and performance. UC architecture allows to offer the same services over both IP and TDM/ISDN network end users, but existing legacy devices using legacy interfaces of the existing TDM/ISDN network must migrate to EoIP environments gracefully as soon as possible to have the desired levels of QoS and performances along with enhanced capabilities (P1/R1-R4) Risks Army I3MP, Installation Information Infrastructure Communication and Capabilities (I3C2), and other implementation/solution architecture need to use QoS and performance parameters per recommendations provided in this document otherwise risks will be there to fall short in meeting the requirements (P1/R1-R4) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA. For QoS and performance parameters (P1/R1-R4) Technical Positions and Patterns Technical standards related to QoS and performances provided in Standards Profile (StdV-1) and Standards Forecast (StdV-2) of DoD UCR Change 3 and Army UC RA need to be used. 29 Quality of Service Rules Based Architecture Appendix H
242 The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed (P2) Principle 2: QoS Policy Table 9 depicts the business rules (R5-R8) for different QoS management segments for (P2) Principle 2: QoS Policy along with references of the authoritative documents. Principle Table 9: (P2) Principle 2: QoS Policy Rule Principle Description Description Description Description Description (P2) QoS Policy The QoS policy must be devised for providing MLPP-based five precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), and ROUTINE (R) shown in Table 3 of this document for each media of each UC application at the time of call setups. In addition, the QoS and performance requirements (e.g. delay, packet loss, and delay jitter [if any]) for each media of each UC application in each infrastructure segment must be decided based on QoS policy. All QoS policies must be distributed in all infrastructure components by the QoS policy server where QoS policies are stored through provisioning of UC services or by UC applications dynamically. (R5) Data Center QoS Policy: All UC application servers (e.g. AS-SIP Apps) must invoke the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 for each media as dictated by the QoS policy. (R6) Ingress/ Egress LAN QoS Policy: The respective Ingress/Egress LAN segments in the source destination path of each media of each UC application must employ the appropriate priority services (e.g. priority queuing) that corresponds to the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 in serving the media over the LAN as dictated by the QoS policy of the serving application. (R7) Ingress/ Egress Access Network QoS Policy: The respective Ingress/Egress access network segments in the source destination path of each media of each UC application must employ the appropriate priority services (e.g. priority queuing) that corresponds to the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 in serving the media over the access network as dictated by the QoS policy of the serving application. (R8) IP/MPLS Backbone Network QoS Policy: The backbone IP/MPLS backbone network segments in the source destination path of each media of each UC application must invoke the DSCP that corresponds to the appropriate MLPP-based precedence levels such as FLASH OVERRIDE (FO), FLASH (F), IMMEDIATE (I), PRIORITY (P), or ROUTINE (R) shown in Table 3 in serving the media over the sourcedestination backbone network segment as dictated by the QoS policy of the serving application. Reference Documents 30 Quality of Service Rules Based Architecture Appendix H
243 1. DoD UCR 2008 Change 3 [2] 2. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 3. Appendix G: Performance Requirements of Army UC RA [1] (P2/R5-R8) Assumptions The QoS policy server will be populated with the required QoS and performance parameters either through UC applications dynamically or provisioned manually. UC system management center has the capabilities for monitoring of the QoS policy implementations for all functional entities as recommended in this document. Appendix A: Army UC RA, QoS, and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. LSCs/MFSSs/WAN SSs), routers, and others for invoking of QoS policy over the IP network to meet the QoS requirements of each media of each UC application at the time of the call setup is an integral part of this QoS policy principle and its corresponding rules. The QoS policy server (see Appendix A of this document) keeps the information on how each of these QoS management segments is required to take care of QoS policy for each media in its own segment in view of the end-to-end QoS and performance requirements (P2/R5-R8) Constraints The functional entities like UC application servers (Apps), session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have capabilities for commendations with the QoS policy server using the technical standards known as Common Open Policy Service (COPS) protocol listed in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA (P2/R5-R8) Risks Army I3MP, I3C2, and other implementation/solution architecture need to use QoS policy server per recommendations provided in this document, otherwise risks will be there not meeting proper QoS policies (P2/R5-R8) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA for implementing the QoS policy server. 31 Quality of Service Rules Based Architecture Appendix H
244 (P2/R5-R8) Technical Positions and Patterns Technical standards related to QoS policy provided in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA need to be used. The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed (P3) Principle 3: Availability/Reliability Table 10 depicts the business rules (R9-R12) for different QoS management segments for (P3) Principle 3: Availability/Reliability along with references of the authoritative documents. Principle Table 10: (P3) Principle 3: Availability/Reliability Rule Principle Description Description Description Description Description (P3) Availability/ Reliability Each individual infrastructure segment that consists of the Army end-to-end communications infrastructure must meet or exceed its own part of availability/reliability requirements. The end-to-end availability/reliability of 99.99% or better consisting of all individual infrastructure segments together must meet or exceed the requirements as shown in Appendix G of Army UC RA. (R9) Data Center Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for each UC application server, each session controller (e.g. LSC, MFSS, WAN SS), and each policy server including QoS that meets or exceeds % so that the overall reliability for the end-to-end path meeting or exceeding 99.99%. te: n-assured Services (n-as) LAN (n-aslan) may have a little less stringent availability/reliability. (R10) Ingress/ Egress LAN Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for each ingress/egress LAN segment that meets or exceeds % so that the overall reliability for the end-to-end path meeting or exceeding 99.99%. (R11) Ingress/Egress Access Network Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for each ingress/egress access network segment configured with routers and links that meets or exceeds % so that the overall reliability for the end-to-end path meeting or exceeding 99.99%. (R12) IP/MPLS Backbone Network Availability/ Reliability: The appropriate level of redundancy and backup needs to be provisioned for the IP/MPLS backbone network segment consisting with sourcedestination path and configured with routers and links that meets or exceeds % so that the overall reliability for the end-to-end path meeting or exceeding 99.99%. Reference Documents 1. DoD UCR 2008 Change 3 [2] 2. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 32 Quality of Service Rules Based Architecture Appendix H
245 3. Appendix G: Performance Requirements of Army UC RA [1] (P3/R9-R12) Assumptions The QoS policy server will populated with required availability/reliability parameters either through UC applications dynamically or provisioned manually. UC system management center has the capabilities for monitoring of the availability/reliability of both hardware and software resources as recommended in this document (P3/R9-R12) Constraints The functional entities like UC application servers (Apps), session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have appropriate redundancy with sufficient backup for both hardware and functional resources to meet or exceed the availability/reliability requirements in their respective segments (P3/R9-R12) Risks Army I3MP, I3C2, and other implementation/solution architecture need to have for managing the availability/reliability proactively if the monitoring capabilities of both hardware and software resources are not provided per recommendations provided in this document (P3/R9-R12) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA for implementing the availability/reliability. Backup power for main computer nodes (MCNs), area distributed nodes (ADNs), Server Farm Switches, Network Management switch, and Optical Line terminals (OLTs) shall comply with the I3MP Guide for Facilities Requirements of Core Communication des. Avoid single points of failure. This includes the power distribution switch. During periods of commercial power failure, the electronics in the core infrastructure must not shut down due to excessive temperature or other environmental issues. Each situation must be analyzed, and the auxiliary power system might need to keep the core infrastructure heating, ventilation and air conditioning (HVAC) system in operation to protect the electronics. Local Session Controllers (LSCs) are part of Increment 5, not Increment 1. However, Increment 1 includes providing connectivity, backup power, HVAC, and space for future implementation of a LSC. When installed, the LSC shall be connected to a high availability assured services LAN (ASLAN) with backup power system and appropriate 33 Quality of Service Rules Based Architecture Appendix H
246 HVAC for the for high availability ASLAN (99.999%), and this requirement may be waived for some technologies.(e.g. diesel generator, fuel cell) deployed in the field. If fielded at a particular installation, Dual Points of Presence (PoP) for an installation are part of Increment 4. However, Increment 1 includes providing connectivity (Outside Plant Infrastructure) to support a secondary PoP. If a second Top Level Architecture (TLA) stack is collocated with the Core, Increment 1 provides connectivity, backup power, and HVAC (P3/R9-R12) Technical Positions and Patterns Technical standards related to monitoring of availability/reliability of both hardware and software resources provided in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA need to be used. The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed in meeting availability/reliability of both hardware and software resources (P4) Traffic Prioritization Table 11 depicts the business rules (R13-R16) for different QoS management segments for (P4) Traffic Prioritization along with references of the authoritative documents. Principle Table 11: (P4) Traffic Prioritization Rule Principle Description Description Description Description Description (P4) Traffic Prioritization Traffic prioritization needs to be used in all infrastructure segments as applicable differentiating between different priority levels because it will expedite in meeting performance requirements especially for realtime/inelastic traffic of UC applications. For example, five levels of priority queuing such as First-In-First-Out (FIFO), Weighted (R13) Data Center Traffic Prioritization: Each UC server (e.g. App, LSC/MFSS/WAN SS, Policy App) whether deals with only signaling or both signaling and media must be capable to implement the desired priority queuing mechanisms (e.g. FIFO, WFQ, CQ, PQ, and CB- WFQ) and DoD CoS for traffic prioritization for invoking MLPP-based precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. (R14) Ingress/ Egress LAN Traffic Prioritization: Each Ingress/Egress LAN segment, that consists of routers and links, in the source destination path of each media of each UC application must be capable to implement the desired priority queuing mechanisms (e.g. IEEE 802.1X) for traffic prioritization (R15) Ingress/ Egress Access Network Traffic Prioritization: Each Ingress/Egress access network segment, that consists of routers and links, in the source destination path of each media of each UC application must be capable to implement the desired priority queuing (R16) IP/ MPLS Backbone Network Traffic Prioritization: The backbone IP/MPLS backbone network segments in the source destination path of each media of each UC application must be provisioned to implement the traffic prioritization for invoking MLPPbased precedent 34 Quality of Service Rules Based Architecture Appendix H
247 Fair Queuing (WFQ), Custom Queuing (CQ), Priority Queuing (PQ), and Class- Based WFQ (CB- WFQ) must be used whenever possible. The hardware-based queue mechanisms defined by DoD Class-of-Service (CoS)/QoS Working Group (WG) should also be implemented if possible. for invoking MLPPbased precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. mechanisms (e.g. FIFO, WFQ, CQ, PQ, and CB-WFQ) and DoD CoS for traffic prioritization for invoking MLPPbased precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy. Reference Documents 1. DoD UCR 2008 Change 3 [2] 2. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 3. Appendix G: Performance Requirements of Army UC RA [1] (P4/R13-R16) Assumptions The traffic prioritization implementation using priority queuing such as FIFO, WFQ, CQ, PQ, and CB-WFQ by all functional entities will be coupled with the MLPP-based precedent levels (FO, F, I, P, R) shown in Table 3 as dictated by the QoS policy for each media of each UC application. Appendix A: Army UC RA, QoS, and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. LSCs/MFSSs/WAN SSs), routers, and others for invoking of traffic prioritization over the IP network to meet the QoS requirements of each media of each UC application at the time of the call setup is an integral part of this of traffic prioritization principle and its corresponding rules. The QoS policy server (see Appendix A of this document) keeps the information on how each of these QoS management segments is required to take care of traffic prioritization for each media in its own segment in view of the end-to-end QoS and performance requirements (P4/R13-R16) Constraints The functional entities like UC application servers (Apps), session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have capabilities for implementation of the traffic Prioritization using priority queuing such as FIFO, WFQ, CQ, PQ, and CB-WFQ by all functional entities will be coupled with the MLPP-based precedent levels (FO, F, I, P, 35 Quality of Service Rules Based Architecture Appendix H
248 R) shown in Table 3 as dictated by the QoS policy for each media of each UC application at the time of UC call setup time (P4/R13-R16) Risks Army I3MP, I3C2, and other implementation/solution architecture need to implement priority queuing such as FIFO, WFQ, CQ, PQ, and CB-WFQ per recommendations provided in this document (P4/R13-R16) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA for implementing the traffic prioritization (P4/R13-R16) Technical Positions and Patterns Technical standards related to traffic prioritization provided in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA need to be used. The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed (P5) QoS Policy Decision Point (PDP) and Policy Enforcement Point (PEP) Table 12 depicts the business rules (R17-R20) for different QoS management segments for (P5) QoS PDP and PEP along with references of the authoritative documents. Principle Table 12: (P5) QoS PDP and PEP Rule Principle Description Description Description Description Description (P5) QoS Policy Decision Point (PDP) and QoS Policy Enforcement Point (PEP) The individual infrastructure functional entities such as UC application servers, session controllers (e.g. Local Session Controllers [LSCs]/Multi- Function Soft- Switches [MFSSs]/Wide Area Network (R17) Data Center QoS PDP and PEP: All UC application servers (Apps), session controllers, and routers of the data center must have PDP and PEP capability per IETF standards related to QoS policy. (R18) Ingress/ Egress LAN QoS PDP and PEP: PDP and PEP mechanisms are not applicable over LAN segment. (R19) Ingress/ Egress Access Network QoS PDP and PEP: All routers of the ingress/egress access network must have PDP and PEP capability per IETF standards (R20) IP/ MPLS Backbone Network QoS PDP and PEP: All routers of the IP/MPLS backbone network must have PDP and 36 Quality of Service Rules Based Architecture Appendix H
249 Soft-Switches [WAN SSs]) and routers must retrieve the QoS policies from the QoS policy server and store them in the policy decision point (PDP). If QoS policies are distributed by the QoS policy server, those QoS policies need to be stored in the PDP. Once the QoS and performance parameters are available, the individual infrastructure functional entity must enforce the QoS in the policy enforcement point (PEP). related to QoS policy. PEP capability per IETF standards related to QoS policy. Reference Documents 1. DoD UCR 2008 Change 3 [2] 2. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 3. Appendix G: Performance Requirements of Army UC RA [1] (P5/R17-R20) Assumptions All UC functional entities will be able to implement QoS PDP and PEP using COPS technical standards. Appendix A: Army UC RA, QoS, and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. LSCs/MFSSs/WAN SSs), routers, and others for invoking of QoS PDP and PEP over the IP network to meet the QoS requirements of each media of each UC application at the time of the call setup is an integral part of this of QoS PDP and PEP principle and its corresponding rules (P5/R17-R20) Constraints The functional entities like UC application servers (Apps), session controllers (e.g. LSCs, MFSSs, WAN SSs), and routers need to have capabilities for implementation of QoS PDP and PEP using Common Open Policy Service (COPS) technical standards. 37 Quality of Service Rules Based Architecture Appendix H
250 (P5/R17-R20) Risks Army I3MP, I3C2, and other implementation/solution architecture need to implement QoS PDP and PEP using COPS technical standards per recommendations provided in this document, otherwise risks will be there for not proper implementation of QoS (P5/R17-R20) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA for implementing the QoS PDP and PEP (P5/R17-R20) Technical Positions and Patterns Technical standards related to COPS-based QoS PDP and PEP provided in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA need to be used. The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed (P6) Dynamic Bandwidth Allocation Table 13 depicts the business rules (R21-R24) for different QoS management segments for (P6) Dynamic Bandwidth Allocation along with references of the authoritative documents. Principle Table 13: (P6) Dynamic Bandwidth Allocation Rule Principle Description Description Description Description Description (P6) Dynamic Bandwidth Allocation The ingress/egress access network must be capable to reserve bandwidth on demand (e.g. resource reservation protocol [RSVP]) to meet the bandwidth requirements in its own infrastructure segment based on QoS policy for scalability. (R21) Data Center Dynamic Bandwidth Allocation: The routers that connect the data center to the backbone network must have the capability to reserve the bandwidth dynamically (e.g. RSVP) in addition to other capabilities (e.g. DSCPs, Pre-provisioned QoS) as per QoS policy for scalable use of the access network (R22) Ingress/ Egress LAN Dynamic Bandwidth Allocation: The ingress/egress LANs do not need to have this capability as no mechanisms exist in LANs for implementing of dynamic QoS. (R23) Ingress/ Egress Access Network Dynamic Bandwidth Allocation: The routers of the ingress/egress access networks must have the capability to reserve the bandwidth (R24) IP/ MPLS Backbone Network Dynamic Bandwidth Allocation: The DiffServbased IP/MPLS backbone network must provide interworking between RSVP 38 Quality of Service Rules Based Architecture Appendix H
251 bandwidth. dynamically (e.g. RSVP) in addition to other capabilities (e.g. DSCPs, Preprovisioned QoS) as per QoS policy for scalable use of the access network bandwidth. and DSCP in transferring media between the ingress and egress access network if RSVP is used in the access networks (although the backbone network will not implement any bandwidth dynamically [e.g. RSVP]). Reference Documents 1. DoD UCR 2008 Change 3 [2] 2. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 3. Appendix G: Performance Requirements of Army UC RA [1] (P6/R21-R24) Assumptions The routers in the access networks will have the capabilities for providing dynamic bandwidth allocation using RSVP QoS protocol. Appendix A: Army UC RA, QoS, and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. LSCs/MFSSs/WAN SSs), routers, and others for invoking of dynamic bandwidth reservation over the IP network to meet the QoS requirements of each media of each UC application at the time of the call setup is an integral part of this of dynamic bandwidth reservation principle and its corresponding rules. The QoS policy server (see Appendix A of this document) keeps the information how each of these QoS management segments is required to take care of dynamic bandwidth reservation for each media in its own segment in view of the end-to-end QoS requirements (P6/R21-R24) Constraints The routers in the ingress/egress access networks will have the capabilities for providing dynamic bandwidth allocation using RSVP QoS protocol in addition to other QoS capabilities described in this document. IP/MPLS backbone network needs to have the capabilities for interworking between RSVP-DSCP. 39 Quality of Service Rules Based Architecture Appendix H
252 (P6/R21-R24) Risks Army I3MP, I3C2, and other implementation/solution architecture need to implement RSVP capabilities in addition to other QoS capabilities by routers of the ingress/egress access networks as described in this document, otherwise risks will be there for over- or under-provisioning of QoS in the access networks (P6/R21-R24) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA for implementing the dynamic bandwidth allocation (P6/R21-R24) Technical Positions and Patterns Technical standards related to RSVP and RSVP-DSCP Interowrking provided in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA need to be used. The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed (P7) Services Differentiation Table 14 depicts the business rules (R25-R28) for different QoS management segments for (P7) Services Differentiation along with references of the authoritative documents. Principle Table 14: (P7) Services Differentiation Rule Principle Description Description Description Description Description (P7) Services Differentiation based on traffic categories The IP/MPLS backbone network must be provisioned using the Differentiated Services Code Point (DSCPs) for each media of each UC application based on the precedence levels as shown in Table 4 of this document. If RSVP is used in the access networks, the mapping between the RSVP and DSCPs must be provided in the (R25) Data Center Services Differentiation: The routers that connect the data center to the backbone network may implement DSCPs as per QoS policy although it may not efficient use of the access network bandwidth. 40 (R26) Ingress/ Egress LAN Services Differentiation: The ingress/egress LANs do not need to have this capability as no mechanisms exist in LANs for implementing of DSCPs. (R27) Ingress/ Egress Access Network Services Differentiation: The routers of the ingress/egress access networks may implement DSCPs as per QoS policy although it may not efficient use of the access network (R28) IP/ MPLS Backbone Network Services Differentiation: The IP/MPLS backbone network must implement DSCPs per QoS policy. Quality of Service Rules Based Architecture Appendix H
253 ingress/egress backbone network nodes. bandwidth. Reference Documents 4. DoD UCR 2008 Change 3 [2] 5. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 6. Appendix G: Performance Requirements of Army UC RA [1] (P7/R25-R28) Assumptions The routers in the IP/MPLS backbone network will have the capabilities for implementing the Differentiated Services Code Point (DSCPs). Appendix A: Army UC RA, QoS, and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. LSCs/MFSSs/WAN SSs), routers, and others for invoking of services differentiation over the IP network to meet the QoS requirements of each media of each UC application at the time of the call setup is an integral part of this of services differentiation principle and its corresponding rules. The QoS policy server (see Appendix A of this document) keeps the information how each of these QoS management segments is required to take care of services differentiation for each media in its own segment in view of the end-to-end QoS requirements (P7/R25-R28) Constraints The routers in the IP/MPLS backbone network will have the capabilities for implementing the DSCPs per Differentiated Services (DiffServ) technical standards for services differentiation in addition to other QoS capabilities described in this document (P7/R25-R28) Risks Army I3MP, I3C2, and other implementation/solution architecture need to implement DSCP capabilities in addition to other QoS capabilities by routers of the IP/MPLS backbone network as described in this document, otherwise risks will be there for not meeting the QoS services differentiation requirements (P7/R25-R28) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA for implementing the services differentiation for QoS. 41 Quality of Service Rules Based Architecture Appendix H
254 (P7/R25-R28) Technical Positions and Patterns Technical standards related to DSCPs provided in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA need to be used. The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed (P8) Traffic Aggregation Table 15 depicts the business rules (R29-R32) for different QoS management segments for (P8) Traffic Aggregation along with references of the authoritative documents. Principle Table 15: (P8) Traffic Aggregation Rule Principle Description Description Description Description Description (P8) Traffic Aggregation The each media (audio, video, or data) of each UC application must be aggregated in all infrastructure segments whenever applicable/possible. In the IP/MPLS network, traffic engineering must be used for efficient traffic aggregation. (R29) Data Center Traffic Aggression: The routers that connect the data center to the backbone network must aggregate traffic using the RSVP schemes and may implement MPLS traffic engineering as per QoS policy based on IETF traffic engineering standards if DSCPs are used. (R30) Ingress/ Egress LAN Traffic Aggression: The ingress/egress LANs do not need to have this capability as no mechanisms exist in LANs for traffic aggregation. (R31) Ingress/ Egress Access Network Traffic Aggression: The ingress/egress access networks must aggregate traffic using the RSVP schemes and may implement MPLS traffic engineering as per QoS policy based on IETF traffic engineering standards if DSCPs are used. (R32) IP/ MPLS Backbone Network Traffic Aggression: The IP/MPLS backbone network must aggregate traffic implement MPLS traffic engineering as per QoS policy based on IETF traffic engineering standards. Reference Documents 1. DoD UCR 2008 Change 3 [2] 2. Appendix D: Army UC RA StdV-1 and StdV-2 of Army UC RA [1] 3. Appendix G: Performance Requirements of Army UC RA [1] 42 Quality of Service Rules Based Architecture Appendix H
255 (P8/R29-R32) Assumptions The routers in the IP/MPLS backbone network will have the capabilities for implementing the traffic aggregation per MPLS traffic engineering technical standards. Appendix A: Army UC RA, QoS, and Call Flows of this document that describes the interactions among all functional entities such as UC application servers, session controllers (e.g. LSCs/MFSSs/WAN SSs), routers, and others for performing traffic aggregation over the IP network to meet the QoS requirements of each media of each UC application at the time of the call setup is an integral part of this traffic aggregation principle and its corresponding rules. The QoS policy server (see Appendix A of this document) keeps the information on how each of these QoS management segments is required to provide traffic aggregation for each media in its own segment in view of the end-to-end QoS requirements (P8/R29-R32) Constraints The routers in the IP/MPLS backbone network will have the capabilities for implementing the traffic aggregation per MPLS traffic engineering technical standards for traffic aggregation in addition to other QoS capabilities described in this document (P8/R29-R32) Risks Army I3MP, I3C2, and other implementation/solution architecture need to implement traffic aggregation capabilities in addition to other QoS capabilities by routers of the IP/MPLS backbone network as described in this document, otherwise risks will be there for not using the bandwidth of the backbone network efficiently (P8/R29-R32) Mitigation Strategy All Army UC implementation/solution architectures including I3MP and I3C2 need to be aligned with the recommendations provided in this Army QoS RA for implementing the traffic aggregation for QoS (P8/R29-R32) Technical Positions and Patterns Technical standards related to MPLS traffic aggregation provided in StdV-1 and StdV-2 of DoD UCR Change 3 and Army UC RA need to be used. The UC architectural configuration patterns that are provided in DoD UCR 2008 Change 3 [xx] and Army UC RA [xx] must be followed 43 Quality of Service Rules Based Architecture Appendix H
256 6.0 Unified Capabilities High Level Implementation Configurations/Patterns The Army Engineering Review Board (ERB) approved a specific UC architecture for CONUS, Europe, and Pacific. Figure 2 illustrates the various types of installations. UCR 2008 Change 3 provides three configurations for Army P/C/S (with variations for children. Each installation is assigned to one of three categories: 1. Standalone: The installation has all of the equipment needed to provide VoIP for itself. For the purpose of VoIP, it is connected directly to the DISN backbone. 2. Aggregation Site: The installation contains equipment that can provide VoIP service to itself plus additional, outlying locations. These are often referred to as Parent Sites. 3. Aggregated Site: The installation obtains its VoIP service from an Aggregation Site. A survivability mechanism is provided so that Phone service is maintained even if the Aggregated Site loses contact with the Aggregation Site. Aggregated Sites are often referred to as Child Sites or Children. For unclassified voice and UC at fixed P/C/S, the Army will use the concepts described in the DoD UC Master Plan [7] and UCR 2008 Change 3 [2]. In particular, camps, post, and stations will be divided into three categories: those with standalone call processors, those with Enterprise call processors that can support multiple locations, and those whose end-points (i.e., dedicated IP phones, soft-clients running on PCs, and desktops with UC clients) will be serviced by the Enterprise call processors. Installations with Standalone VoIP call processors. These are mission-critical sites where the Army must provide voice services that are as available and reliable as possible. Utilizing the Department of the Army (DA) G-3/5/7 guidance on the criticality of installations, NETCOM established selection criteria for identifying and selecting the mission critical locations that need standalone call processors. Installations with Enterprise VoIP call processors. Enterprise call processors are capable of supporting VoIP phones at their own location plus phones that are at other locations. By centralizing the facilities and maintenance, footprint can be minimized, and costs can be reduced. These sites are called Aggregation (Parent) sites. Subtended locations. VoIP phones at these locations obtain their service from Enterprise call processors. However, subtended locations will have a locally-installed survivable call processing capability or survivability so that if connectivity to the Enterprise call processor is lost, intra-location calls can still be made, and users can still make calls to the local Public Switched Telephone Network (PSTN) and Public Safety Answering Point (PSAP) for 911 Emergency Services. These sites are called Aggregated (Child) sites. 44 Quality of Service Rules Based Architecture Appendix H
257 UCR 2008 Ch3 provides three configurations for Army P/C/S (with variations for children) 1. Standalone: Standalone Local Session Controller (LSC) 2. Parent: Enterprise LSC (capable of supporting phones at other locations) 3. Child: a. Gold Service / Environment 1 (Retains full UC if contact with Enterprise LSC is lost) b. Silver Service / Environment 2 (Retains voice capabilities if contact with Enterprise LSC is lost) c. Bronze Service / Environment 3 ( UC/VoIP service if contact with Enterprise LSC is lost) Figure from UCR 2008 Change 3 Standalone or Parent Children KEY: 3G;4G: 3 rd, 4 th Generation AR: Aggregation Router CE-R: Customer Edge Router EBC: Edge Boundary Controller IA: Information Assurance IP: Internet Protocol ISP: Internet Service Provider LSC: Local Session Controller MGC: Media Gateway Controller SBC: Session Border Controller WAN: Wide Area Network UC: Unified Capabilities UCR: UC Requirements GOLD SILVER BRONZE Figure 2: Enterprise UC/VoIP (OV-1) Figure 3 shows a typical parent with both an Avaya system and Cisco system. For illustration, tow child sites are also shown for each vendor (one Environment 1 and one Environment 2). child sites are being fielded in FY 12. However, the parent sites are being configured to support the arrangement in Figure 3 since these are the types that are likely to be fielded by the Army in future years. An Environment 2 child maintains its voice capabilities if it loses contact with the parent; the number of voice users may be limited. 45 Quality of Service Rules Based Architecture Appendix H
258 Key: AM: Accounting manager AMS: Application Media Server ASLAN: Assured Service LAN CE-R: Customer Edge Router DB: Database EM: Element manager FW: Firewall MoH: Music on hold PM: Provisioning Manager PSTN: Public Switched Telephone Network RSU: Remote Survivable Unit SBC: Session border controller SESM: Service element session manager SRST: Survivable Remote Site Telephony SS: Soft switch TFTP: Trivial file transfer protocol Figure 3: Parent/Child High-Level Architecture 46 Quality of Service Rules Based Architecture Appendix H
259 Appendix A - Army UC RA, QoS, and Call Flows 7.0 Army UC Reference Architecture and QoS The primary objective of the Army UC QOS RA is stratify the QOS requirements of all QOS applications. Army warfighters use UC applications that reside in the application servers. However, the application servers are connected to the warfighters via the network (LAN/Access/backbone). The calls are controlled by the UC application servers and the QOS is directed by the application servers and in turn, the network ensures QOS demanded by the application servers. That is one-to-one correspondence between the application server and the network for implementation of QOS. In real-time services like AS-SIP, each AS-SIP call will have the resource priority headers by which it is indicated what level of priority a call belongs to. Even a call is termed as Emergency Call, it is also expressed in the AS-SIP signaling messages and the QOS treatment also needs to be handled accordingly. In addition, each AS-SIP call has mechanisms to express the kinds of QOS that a given call requires for each kind of media: Audio, Video, and/or Data. The QOS parameters for each type of media of a given call may also be influenced based on the QOS policy that is handled by the QOS policy server. All of these QOS information of a given call which that are originated from the UC application servers are termed as the application layer QOS. AS-SIP technical standards provide clear mechanisms, at what stages of the AS-SIP call, the QOS is invoked for reservation of the resources across the network. Once the resource reservation over the network is completed, the AS-SIP call is completed and then the ringtone is provided. The allocation of QOS over the IP network can be done statically (pre-provisioned like DiffServ Code points over the IP network, Priority Queuing in LANs) and/or dynamic QOS using RSVP over the IP access network. Even in the statically pre-provisioned case, a particular QOS scheme needs to be allocated and de-allocated for a particular flow over the network at the time of the AS-SIP call setup and teardown, respectively. Based on this application layer QOS information, the IP network implements the QOS over the transport network as desired by the applications. It may so happen, an end-to-path of the media (audio/video/data) transfer may constitute of LAN, access, and backbone. The QOS component in each network segment may be different considering the end-to-end QOS requirement desired by the UC application. There may be different schemes for implementation of QOS in each network segment. This implementation of QOS over the IP network is termed as IP QOS. The other aspects of the application layer QOS is that the end-to-end QOS requirements of the application can be allocated in different segments of the IP network based on QOS policies. For example, the location session controllers (LSCs) may be assigned to maintain the QOS in the access networks while the wide area network soft-switch (WAN SS)/multi-function soft-switch (MFSS) may be assigned to maintain the QOS over the backbone network. The QOS allocations in the access networks and the backbone network for each type of media (audio, video, or data) of each type of call (emergency, high-priority, medium priority, or low priority) may stored in the policy server by the network administrator. The policy server then distribute the QOS policies to different LSCs/WAN SSs/MFSSs. In turn, the LSCs/WAN SSs/MFSSs invoke QOS to the IP routers at the time of the call setup based on the type of media of each call type. 47 Quality of Service Rules Based Architecture Appendix H
260 We will describe end-to-end call flows using all functional entities for different scenarios adopting the Army UC RA (Reference f). The conceptual view of the UC architecture is shown in Figure 4 with all functional components (Reference f). Logically, the entire UC architecture can be viewed with some distinct layers: Unified Capabilities Application Services, Session Control, Converged Backbone Network, and Access Networks while Information Assurance (IA)/Security/Identity Management, Quality-of-Service (QOS) and Network Operations (NETOPS) services encompass of all layers. Figure 4: Conceptual Operational View of Army UC Architecture (OV-1) [1] The UC application services are shared over one converged IP-MPLS backbone network while the access networks may consist of many networking technologies. All UC application services areas are grouped as follows: 48 Quality of Service Rules Based Architecture Appendix H
261 Real-Time Communications Services: o Voice & Video, Web Conferencing, Conferencing, Collaboration & Whiteboard, Media Bridging, Presence, Instant Messaging (IM) & Chat, Unified Messaging, Calendaring & Scheduling, E.164 Number Mapping (ENUM), E.911 (Emergency Call), Transaction Capabilities Application Part (TCAP), Desktop Sharing, Short Message Service (SMS), Multimedia Message Service (MMS), , Wireless Application Protocol (WAP), and Location Services (Fixed/Mobile) Content Management Records Management Team Collaboration Business Process Management (BPM) Web 2.0, Apps (Applications) Portals Profiles Search & Discovery Information Assurance Each group of services may consist of one or many individual application services. However, in Figure 4, it shown each one of these individual applications services that are offered by one or more application servers being geographically distributed across the global Army LWN is providing one or more services using open standard-based protocols such as AS-SIP, Extensible Messaging and Presence Protocol (XMPP), Lightweight Directory Access Protocol (LDAP)/Active Directory (AD), Remote Authentication Dial-In User Service (RADIUS)/DIAMETER/Authentication, Authorization & Accounting (AAA), Policy Protocol (COPS) for QOS, Security, Billing, and other policies. Hyper-Text Transfer Protocol (HTTP)/Extensible Markup Language (XML), Domain Name System (DNS), Simple Object Access Protocol (SOAP), and Other open standards. The session control layer shown in Figure 4 is primarily applicable for the real-time communications (RTC) services that use Assured Services-Session Initiation Protocol (AS-SIP) for session/call control signaling for audio/video conferencing and other services. By the way, the AS-SIP uses SIP-over-Transport Layer Security (TLS), and SIP is the protocol of choice for multimedia call control. SIP is chosen for the multimedia call control for its versatility for using beyond telephony services, extensibility, handling of audio, video, and/or data services, mobility services across IP network, and information technology-friendly across all IP network related protocols and services. Moreover, an application server may also use a variety of resources for creation of service logic, management of services, and for other purposes. The functional view of the UC Architecture is provided in Figure 5. It is intended to represent the physical implementation. The architecture does not specify how functions will be distributed to devices. Instead, it allows the flexibility to package functions into various servers using costeffective methods, as long as open interfaces to those functions are available for use by other 49 Quality of Service Rules Based Architecture Appendix H
262 functions. As mentioned earlier Real-Time Communications (RTC) Services, Content Management, Records Management, Team Collaboration, Business Process Management (BPM), Web 2.0, Apps (Applications), Portals, Profiles, Search & Discovery, Information Assurance (IA)/Security/Identity Management, QOS and NETOPS are the main components of UC services. In the future, other services may also be added in the Army UC RA portfolio. Figure 5: Functional Operational View of Army UC Architecture (OV-1) [1] The UC architecture uses the Internet Protocol (IP) for the wide area backbone network and uses multiprotocol label switching protocol (MPLS) to enable traffic engineering and QOS for the IP network. All access networks using different access technologies terminate to the IP/MPLS backbone network. It should be noted that the backbone network of the Defense Information Systems Network (DISN) will be converged to the IP/MPLS over the Dense Wavelength Division Multiplexing (DWDM)/Generalized Multiprotocol Label Switching (GMPLS)/Fiber transport networking technologies. In addition, there will be traditional networking technologies such as Synchronous Optical Network (SONET)/Time Division Multiplexing (TDM) will coexist for some time until migration. The worldwide DISN backbone transport network will consist of both wireline (e.g. fiber) and wireless (e.g. satellite) network. The satellite nodes will be interfacing with fiber/dwdm-based wireline nodes. In addition, ground radios such as Joint Tactical Radio System (JTRS) may also be used to form the backbone network that may form the part of the 50 Quality of Service Rules Based Architecture Appendix H
263 mobile backbone network. However, IP will run over both wireline and wireless transport network. Access networks may contain many access technologies such as IP, LAN, PSTN/ISDN/TDM, Wi-Fi, DSL, Cable, and Fiber, 3G Wireless, WiMAX, and LTE/4G Wireless. The IP/LAN access technologies will work with the IP/MPLS network seamlessly. However, PSTN/ISDN/TDM needs appropriate gateways to interworking with the IP/MPLS network. It is expected that the IP protocol will run over the Wi-Fi, DSL, Cable, Fiber, 3G Wireless, WiMAX, and LTE/4G Wireless access networks, and they will work seamlessly with the IP/MPLS network. If there is any TDM networking for these access technologies, gateways will be needed for interworking with IP/MPLS network. 7.1 Real-Time Communications Services ensuring QOS The call setup process shows how different functional entities of the Army reference architecture interact among themselves for transferring audio, video, and/or data for both Real-Time Communications services and Enterprise Collaborative services including end-to-end QOS. In teleconferencing (TC), video teleconferencing (VTC), and data collaboration along with TC and VTC, the call setup takes two phases: End-to-End Signaling and Media Transfer. That is, the call is set up first using signaling protocol (e.g. AS-SIP) on end-to-end via signaling entities (e.g. LSCs, WAN SSs, MFSSs) and then the media sent directly between the calling and called party without going through the signaling entities. In fact, it is during the AS-SIP call setup phase, the resources reservation across the network is one based on the QOS information provided in the signaling messages. In the call flows, we will be showing how the signaling traffic is sent on end-to-end using different signaling entities ensuring QOS. On the other hand, the call signaling traffic and media are sent together directly on end-to-end path at the same time Assured Point-to-Point Audio/Video/Data Conferencing Figure 6 shows the point-to-point real-time conversational audio/video conference call flows between the end users that are located in different network end points (Reference f). The key of the call flows is that it describes the UC RA architectural rules and principles including QOS which are in accordance to the Army global and/or low-level subsets of the global rules and principles described earlier. 51 Quality of Service Rules Based Architecture Appendix H
264 Local/Regional TDM/ISDN Network User A4 TDM Net MG/IWF/ SG Source TDM/ ISDN Switch SS7 Call Signaling User A4 Places a Call Destination TDM/ISDN Signals TDM/ISDN End User Switch Media Gateway, Signaling Interworking Functions, Signaling Gateway, and Media Gateway Controller TDM Media and SS7 Media and Signaling Interworking Packet Media and VoIP Signaling Part of Gateway Part of Gateway Signaling Part of Gateway These functions/capabilities of MGC, MG, SG, and IWF are realized in MFSS or Hybrid LSC User A1 User A1 Places a Call Yes Local/Regional Network Source LSC, SCF & EBC/FW/ IDS/IPS Local AAA, Policy & QOS Server Is Destination User in TDM Is Destination Network? Source LSC User Local? Yes Yes Are User Services Hosted in Send Call to the Appropriate LSC? Application Server Type(s) Yes SCF Local AAA, Policy & QOS Server Can Session Session is be Dropped Admitted? Yes EBC/ FW EBC/ FW EBC/ FW Session Allowed per Local Policies? Session is Dropped Yes Yes User A2 User A2 Accepts call Send Call to the Appropriate Application Server Type(s) IP Global/Regional Wide Area Network Local/Regional Network Local App Servers WAN SS, SCF, Global AAA/ Policy/QOS Server & EBC/FW/IDS/IPS Global App Servers LSC, Local AAA/QOS, EBC/FW User A3 SCF UC Application Servers (Services Hosted by LSC Locally/Regionally) Service Type 1 Service Type 2... Service Type N Send Call to the Appropriate Application Server Type(s) UC Application Servers (Services Hosted by WAN SS/MFSS Globally) Service Type 1 Service Type 2... Service Type N User A3 Accepts call Session is Dropped Can Session be Accepted? Session is Dropped Can Session be Admitted? Local AAA, Policy & QOS Server Yes Global AAA, Policy & QOS Server WAN SS Destination LSC EBC/ FW EBC/ FW Session Allowed per Local Policies? Yes Session Allowed per Local Policies? Yes Session is Dropped Session is Dropped Figure 6: Assured Point-to-Point Audio/Video/Data Conference Call (OV-6c) [1] Figure 6 depicts detailed rules and principles; however, the following are the summary of the high-level principles and rules: The real-time communications application server(s) must be in control of all calls implementing all capabilities/features including end-to-end QOS in meeting Army UC real-time communications services. o In a given AS-SIP call, there can be different types of media (audio, video, and/or data) for a given type of call (Emergency, High Priority, Medium Priority, or Low Priority). The QOS for each media (audio, video, or data) type of call needs to be provided as indicated in the AS-SIP QOS signaling parameters confirming QOS policy as assigned in the policy server (QOS, Security, Billing, and Others). The LSC, MFSS, and WAN SS must use the AS-SIP signaling protocol for communications among themselves over the network. A LSC, MFSS, or WAN SS that hosts services must communicate with the SCF functional entity using AS-SIP protocol. 52 Quality of Service Rules Based Architecture Appendix H
265 A SCF must be capable to communicate with all application servers that control real-time communications services using open standard-based protocols (e.g. AS-SIP, Policy Server [QOS, Security, Billing, and Others], RADIUS/DIAMETER, SOAP, HTTP/HTTPS, and others) as appropriate. The real-time communications application server(s) implementing the Army UC real-time communications services (e.g. Voice and Video Conferencing, Media Bridging/Transcoding, Security, and others) must use the open standard-based protocols (e.g. AS-SIP, QOS policy server, RADIUS/DIAMETER, and others) for communicating through the SCF interfaces of WAN SSs, MFSSs, and LSCs while the communications protocol between the SCF and the WAN SS, MFSS, or LSC must only be the AS-SIP. WAN SS has only IP interfaces and uses only the AS-SIP call control protocol. An MFSS that has both TDM and IP interfaces will use AS-SIP call control protocol over the IP interfaces while ISUP call control protocol over the TDM interfaces and ISUP-SIP interworking function (IWF) along with media gateway controller (MGC) and one more media gateways (MGs). It may be noted that an MGC can control one or many MGs, and MGs may or may not co-located physically with the MGC providing scalable architecture. A LSC that has only IP interfaces will use only the AS-SIP call control protocol. A LSC that has both TDM and IP interfaces will use AS-SIP call control protocol over the IP interfaces while ISUP call control protocol over the TDM interfaces and ISUP-SIP interworking function (IWF) along with its media gateway and media gateway controller. A LSC that supports both AS-SIP and H.323 call control protocol over its IP interfaces, it must have AS-SIP and H.323 IWF. If a LSC interfaces to the PSTN, or to legacy Base/Post/ Camp/Station Time Division Multiplexing (TDM) systems, it must also support a Primary Rate Interface (PRI), using its Media Gateway and Media Gateway Controller. All LSCs must provide Precedence-Based Assured Services via AS-SIP/Assured Services Admission Control for IP and for TDM interfaces (where equipped) via its Media Gateway using the T1.619a protocol. Voice signaling must conform to the following rules: o There is a two-level signaling hierarchy: LSC and either a Multifunction Soft Switch (MFSS) or a Wide Area Network Soft Switch (WAN SS) LSC A to MFSS A (or WAN SS A) to MFSS B (or WAN SS B) to LSC B when the LCSs have different primary MFSS LSC A to MFSS A (or WAN SS A) to LSC B when they have the same primary MFSS o The LSCs are assigned a primary and backup MFSS (or WAN SS) for signaling robustness Signaling from an IP End Interface to a LSC will be AS-SIP. If proprietary call control protocols are used for some existing systems, it has to be dealt with separately case-by-case basis. The LSC to LSC signaling is not permitted external to the security enclave except for use in cases involving deployable products operating in a single area of operational responsibility network that is not the Army LWN. o The LSC can set up: On-base sessions when a connection to an MFSS (or WAN SS) is lost. 53 Quality of Service Rules Based Architecture Appendix H
266 Sessions to PSTN trunks independent of an MFSS (or WAN SS). o Signaling A TDM End Office will signal via Common Channel Signaling System. 7 or PRI to MFSS. The MFSS will signal via PRI to the PSTN and to coalition gateways. Edge Border Controllers (EBC), Firewall (FW), Intrusion Detection Service (IDS), and Intrusion Prevention Service (IDS) are used to provide IA for voice/data call signaling and bearer traffic, and can be implemented as a single of multiple functional entities as appropriate. However, a standard-alone EBC provides IA for data call signaling and bearer traffic. The authentication, authorization, accounting (AAA) server, policy server, and QOS server are separate entities although they have been shown in one logical box in the call flow diagrams. The steps for the point-to-point audio/video conferencing ensuring QOS shown in Figure 6 are described as below: 1. User A1, known as the calling user in the IP network, located in the local network places a call to another user, known as the called (or callee) user via its pre-configured source LSC through which the calling user already registered in the network. a. The registration process is not shown in Figure 6 for simplicity. Users may be pre-provisioned with definite service features in the Army LWN. A combination of dynamic registration and service provisioning features can be used where the user profiles will be stored in the user profiles application server (not shown in Figures 4-6) via the LSC and WAN SS (or MFSS). b. It should be noted that AS-SIP protocol may be used between the user profiles application server and the SCF of the LSC and WAN SS (or MFSS). 2. The call goes to the local source LSC and the LSC contacts the local AAA, Policy (QOS, Security, Billing, and others) server whether the call can be admitted based on the security, policy, and QOS features. It should be noted that, per QOS policy, if the LSC is allowed to control the QOS dynamically over the IP access network extending between the end-user and the LSC, LSC will initiate the resources reservation to meet QOS requirements in the access network (via access routers in the IP network using RSVP or via TDM switch in the TDM network) based on the media (audio, video, and/or data) of the call type (emergency, priority level) indicated in the AS-SIP signaling messages. If QOS is statically allocated like using DiffServ code points, the LSC indicates the IP routers for invoking the appropriate code points. 3. If the session cannot be admitted, the call is dropped, otherwise, the LSC decides how to route the call based on the destination address of the called user. The destination address can be one of the followings: IP Local Network (from which the call has been originated) and Local LSC may or may not host services, IP Remote Network where WAN SS hosts services, or TDM Network where WAN SS hosts services (assuming that TDM application services have been unified through migration to the IP network-based application services and MFSS does not host services). a. If destination user A2 is located with the same local network from which the call has been originated, the QOS and if the local LSC hosts the services, the call proceeds as follows: 54 Quality of Service Rules Based Architecture Appendix H
267 i. The local LSC then sends the call to the SCF for sending the call to the appropriate local UC application server (s) for servicing the call based on the service features indicated in the call for which the users have been provisioned. ii. The UC application server(s) directs the local LSC via the SCF for setting up the call leg with the called user A2. iii. The local LSC sets up the call leg with the called user A2. iv. The called user A2 accepts the call. te: Before acceptance of the call, there can be call negotiations between user A1 and user A2 for audio and video codecs and their parameters along with early media, ring tone and other features. For simplicity, we have not shown. v. Once the session is set up, the media is sent directly between users A1 and A2 directly. b. If destination user is located with the same local network from which the call has been originated, the LSC still invokes QOS over the access network as discussed earlier, and if the local LSC does not host the services, the call proceeds as follows: i. The local LSC routes the call to the WAN SS located in the Army LWN wider area network (WAN). However, EBC/FW/IDS/IPS systems are around in both local LSC and WAN SS for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the LSC to the WAN SS, otherwise, the call is dropped. ii. The WAN SS then checks with the global AAA, Policy (QOS, security, billing, and others) server whether the session/call can be admitted. te that WAN SS does not need to reserve QOS because the media will pass directly between the users over the access network and the backbone network will not be involved. The reason that the WAN SS contacts the policy server for QOS is to ensure that the LSC is violating any global QOS (and other) policies while services are being provided by the application server controlled by the WAN SS. iii. If the session is allowed to admit in the network, the WAN SS to set up the call leg with the local LSC, otherwise, the session is dropped. iv. The WAN SS then sends the call to its SCF for route the call to the appropriate global UC application server(s). v. The SCF then routes the call to the appropriate global UC application server(s) for servicing the call. vi. The UC application server(s) directs the WAN SS via the SCF for setting up the call leg with the local (source) LSC. vii. The WAN SS then sets up the call leg with the local (source) LSC. viii. The local (source) LSC then sets up the call leg with the called user A2. ix. The called user A2 accepts the call. te: Before acceptance of the call, there can be call negotiations between user A1 and user A2 for audio and video codecs and their parameters along with early media, ring tone and other features. For simplicity, we have not shown. x. Once the session is set up, the media is sent directly between users A1 and A2 directly. c. If the destination called user A3 resides in the remote IP network, the call proceeds as follows: 55 Quality of Service Rules Based Architecture Appendix H
268 i. The local LSC routes the call to the WAN SS located in the Army LWN wider area network (WAN) after ensuring QOS in the call originating access network as described earlier including. However, EBC/FW/IDS/IPS systems are around in both local LSC and WAN SS for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the local LSC to the WAN SS, otherwise, the call is dropped. ii. The WAN SS then checks with the global AAA, Policy (QOS, security, billing, and others) server whether the session/call can be admitted. The WAN SS invokes the QOS over the IP backbone network similar to the LSC as discussed earlier (it is the QOS policy that DiffServe code points will be used for QOS over the IP backbone network). iii. If the session is allowed to admit in the network, the WAN SS to set up the call leg with the source LSC, otherwise, the session is dropped. iv. The WAN SS then sends the call to its SCF for route the call to the appropriate global UC application server(s). v. The SCF then routes the call to the appropriate global UC application server(s) for servicing the call. vi. The UC application server(s) directs the WAN SS via the SCF for setting up the call leg with the destination LSC. vii. The WAN sends the call to the destination LSC. The destination LSC contacts the Policy server (QOS, security, billing and others). Per QOS policy, the destination LSC invokes the QOS for each media over the destination IP access network per QOS information provided in the AS- SIP call. If the QOS is available in the destination access network, it admits the call. Otherwise it drops the call. viii. The EBC/FW/IDS/IPS system of the destination LSC checks for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the WAN SS to the destination LSC setting up the call leg, otherwise, the call is dropped. ix. The destination LSC then sets up the call leg with the called user A3. x. The called user A3 accepts the call. te: Before acceptance of the call, there can be call negotiations between user A1 and user A3 for audio and video codecs and their parameters along with early media, ring tone and other features. For simplicity, we have not shown. xi. Once the session is set up, the media is sent directly between users A1 and A3 directly. d. If the destination called user A4 resides in the TDM network, the call proceeds as follows: i. The local LSC routes the call to the MFSS (or hybrid LSC with TDM and IP interfaces) interfacing both TDM and IP network of the Army LWN wider area network (WAN). However, EBC/FW/IDS/IPS systems are around the local LSC for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the LSC to the MFSS (or Hybrid LSC); otherwise, the call is dropped. te: We are assuming MFSS or Hybrid LSC does not host services due to full migration of services over the IP-based UC application servers. ii. The MFSS then routes the call to the WAN SS for serving the call by the appropriate global UC application server(s). 56 Quality of Service Rules Based Architecture Appendix H
269 iii. The EBC/FW/IDS/IPS system around the WAN SS checks for information assurance (IA). If the session is allowed per local IA policies, the call is allowed to route from the MFSS to the WAN SS setting up the call leg, otherwise, the call is dropped. iv. The WAN SS then checks with the global AAA, Policy, and QOS server whether the session/call can be admitted. v. If the session is allowed to admit in the network, the WAN SS to set up the call leg with the MFSS, otherwise, the session is dropped. vi. The WAN SS then sends the call to its SCF for route the call to the appropriate global UC application server(s). vii. The SCF then routes the call to the appropriate global UC application server(s) for servicing the call. viii. The UC application server(s) directs the WAN SS via the SCF for setting up the call leg with the MFSS. ix. The WAN sets up the call leg with the MFSS. x. The MFSS then routes the call to the destination called user A4 via the TDM switches over the TDM/ISDN network. xi. The called user A4 accepts the call. 7.2 n-real-time UC Services ensuring QOS The non-real-time UC applications that do not contain audio and/or video are can be termed as data applications, and operate in client-server (C-S) mode. Like all applications servers, each of these UC application server also needs to be distributed as explained in the case of XMPPbased IM/Chat application server described below. The call flows of each collaborative enterprise application service will be like those of the IM/Chat application explained in the next section except that they will use different application protocols other than XMPP. For example, in the case of the web services, the application protocol sets can be SOAP/WDSL/HTTP/HTTPS IM/Chat /Presence Communications (Stand-Alone) The Instant Message (IM)/Chat/Presence service, when used as a stand-alone service, is being provided by the Extensible Messaging and Presence Protocol (XMPP) application server. For scalability of the services, a given application server is geographically distributed, but all the servers will behave as a single logically centralized application server. In this context, we have created a logical hierarchy of the XMPP application server. The entire Army LWN network has been divided into certain logical domains that may be called local or regional network. There is a local/home/source XMPP server in each domain. The global XMPP application server controls all other local/home/source XMPP application servers. Each local/home/source XMPP server provides the services to the users that are located within its service domain and registered with this server. If the source-destination users for IM/Chat communications remain in the same domain, the local/home/source XMPP server of that domain serves the call. If the sourcedestination users remain in two separate domains, the local/home/source XMPP server sends the call to the global XMPP server and the global XMPP server then sends the call to the remote local/home/source XMPP server where the destination user is located. Finally, the remote local/home/source XMPP server sends the call to the destination user. In fact, all other application servers that provide different services will use the same or similar distributed server 57 Quality of Service Rules Based Architecture Appendix H
270 architectural principles for each kind application server including point-to-point and multipoint conferencing services. The IM/Chat scenario, an Army user sends an IM to another user. The high-level rules which govern this operation are [Reference c]: Instant Messaging and Chat servers must use the XMPP as described in the latest version of the Unified Capabilities Requirements for client to server (C2S) and server to server (S2S) communication DoD Components must use IM and Chat products from the UC APL if they want to establish S2S communication across the Wide Area Network All XMPP streams, including both C2S and S2S connections, must be secured with the use of Transport Layer Security (TLS) Proprietary C2S protocols are permitted within the context of a Military Department enclave, but must be able to federate with native XMPP servers by means of an XMPP S2S stream enabled through the use of an XMPP gateway implementation An XMPP client must connect to its local/home server in order to be granted access to the network and subsequently to be permitted to exchange instant messaging and presence information with other users/services As with the voice and video scenarios, the detailed rules and requirements for IM/chat C2C and S2S operation are described in the most recent version of the DoD UCR [Reference c]. Unlike voice/video/multimedia application as described earlier, both call signaling and media of IM/Chat pass through the same path. Figure 7 illustrates the call flows of the IM/Chat application that uses XMPP protocol: 58 Quality of Service Rules Based Architecture Appendix H
271 User A2 User A2 receives IM Message User A1 User A1 sends an IM to existing Contact Local/Regional Network Local XMPP Server & FW/IDS/ IPS Local/Home XMPP Application Server Is Destination User within Domain of Local XMPP Server? FW/ IDS/IPS Yes Yes Session Allowed per Local Policies? Session is Dropped Local AAA, Policy & QOS Server Local AAA, Policy & QOS Server Can Session be Admitted? Yes Session is Dropped IP Global/Regional Wide Area Network Global XMPP App Server, Global AAA/ Policy/QOS Server & FW/IDS/IPS User A3/ User A4 Messaging Gateway User A3 receives IM Message Is Destination User within Domain of Is Destination User Global XMPP using XMPP? Server? Yes Yes User A4 receives IM Message Session is Dropped Can Session Yes be Admitted? Global AAA, Policy & QOS Server Global XMPP Server FW/ IDS/IPS Yes Session Allowed per Local Policies? Session is Dropped Local/Regional Wide Area Network Local XMPP App Server/Local AAA/ Policy/QOS Server & FW/IDS/IPS User A5 Session is Dropped Can Session Yes be Admitted? Local AAA, Policy & QOS Server Remote Loca/Homel XMPP App Server FW/ IDS/IPS Yes User A5 receives IM Message Session Allowed per Local Policies? Session is Dropped Figure 7: Assured Point-to-Point IM/Chat Communications (OV-6c) [1] 1. User A1 sends an IM/Chat to the existing contact. 2. The call comes to the FW/IDS/IPS of user A1 s local/home XMPP server and the call is checked whether it is acceptable per local policies. If the call is acceptable, the call is sent to the local/home XMPP server. Otherwise, the call is dropped. 3. Before sending the call to the XMPP server over the IP network, per QOS policy set in the policy server, the originating IP access router invokes QOS for the non-real-time XMPP application over the network between the call originating access network and the destination network where the XMPP application server is located. If the QOS is available, the call is admitted. Otherwise the call is dropped. 4. The call then comes to the local/home XMPP application server and the XMPP server checks with its local AAA, Policy server. If the security and other policies are acceptable for the call, the call is examined for routing to one of its destinations. Otherwise, the call is dropped. 5. If the call is accepted, the local/home XMPP server processes the call for sending to its destination, which consists of two possible paths: Destination user is attached to the same IM/Chat server domain or Destination user is attached to another IM/Chat server domain. Again, QOS is invoked over the IP network as described earlier. For simplicity, we are describing the same QOS invocation process in all steps. 59 Quality of Service Rules Based Architecture Appendix H
272 6. When an IM/Chat is sent to a user associated with the same IM/Chat server, the message flow goes from client to server to client. That is, local/home/source XMPP server sends the call to user A2 and user A2 receives the IM/Chat message. 7. If the recipient is associated with a different server, the local/home XMPP server sends the call to the global XMPP application server. 8. The FW/IDS/IPS systems of the global XMPP application server checks whether the call is acceptable based on the local policies. If the call is acceptable, the IM/Chat call is sent to the global XMPP application server. Otherwise, the call is dropped. 9. The global XMPP application server then checks with the global AAA, Policy (QOS, Security, Billing, and others) server whether the call is acceptable. If the security, policy, and QOS criteria are met, the call is sent to one of the two possible destinations: Destination user is attached to the same global IM/Chat server domain or Destination user is attached to another remote local/home IM/Chat server domain. 10. If the destination user is attached to the same global IM/Chat server domain, the global XMPP application server routes the call to user A4 as can be seen in Figure 7 and user A4 receives the IM/Chat message. However, we have taken an example variation what if the destination user does not use the XMPP protocol for IM/Chat. In this case, a messaging gateway is used for conversion of the IM/Chat between XMPP and proprietary protocol, and the global XMPP server routes the call to the message gateway and then the message gateway sends the call to user A3. User A3 receives the IM/Chat message. 11. If the destination user is attached to another remote local/home IM/Chat server domain, the global XMPP server sends the call to the remote local/home XMPP server in which domain the destination user (e.g. user A5) is located. 12. The FW/IDS/IPS systems of the remote local/home XMPP application server checks whether the call is acceptable based on the local policies. If the call is acceptable, the IM/Chat call is sent to the remote local/home XMPP application server. Otherwise, the call is dropped. 13. The call is then routed to the remote local/home XMPP application server and the server checks with its local AAA, Policy & QOS server. If the call meets the security and policy (QOS, security, Billing, and others) criteria, the call is sent to the user. Otherwise the call is dropped. User receives the IM/Chat message. 60 Quality of Service Rules Based Architecture Appendix H
273 Appendix B - Queuing Hierarchy for DISN IP Service Classes Fielding VoIP is more complicated than fielding or upgrading circuit-switched TDM voice. TDM voice, is working with a dedicated, isolated system. TDM voice has its own network and its own inside and outside plant wiring. Quality of service (QoS) is controlled and guaranteed by the nature of the equipment. In contrast, VoIP uses the data network. It shares the transport path with all the data applications: , web browsing, streaming video, etc. This is an issue because VoIP is a real-time service. To provide acceptable QoS, the VoIP traffic must encounter minimal delay (latency), jitter, and packet loss. This is accomplished in three stages: First, the campus local area network must conform to the requirements in the UCR. Second, the entire transport path from the end user instrument to egress from the installation must be configured to use the Diffserv code points, class of service, and router queues specified by the UCR. This will ensure that when the network gets congested, VoIP traffic will receive priority, and QoS will be maintained. Third, for assured service, the VoIP system uses access control. The Defense Information Systems Network ( DISN) core is bandwidth-rich, and it is assumed that there is plenty of bandwidth to support VoIP. Similarly, the UCR requires each installation LAN to be provisioned so that there is plenty of bandwidth. For a specific data rate, the UCR specifies the number of users that can be supported by a link pair. That means that the only potential bottleneck is the link from the installation to the DISN aggregation router. To maintain QoS, the LSC has a call budget for that link. Only a certain number of calls are allowed, depending on the bandwidth available for VoIP. Any attempt to make an additional call is blocked. (Actually, the LSC examines the precedence of the new call. If it is higher than the precedence of an existing call, the existing call is terminated, and the call is completed. If there are no existing calls with lower precedence, the new call is blocked.) te: while Multiprotocol Label Switching (MPLS) is used in the DISN core, it is generally not used in the installation LAN or the link between the installation and the DISN aggregation router. The installation LAN is provisioned to be bandwidth rich and there are only a few hops between the VoIP phone and the TLA stack. There is no need to use MPLS to control the routing path. Regarding the link between the installation and the DISN aggregation router, DISA does not offer MPLS. To link parents and children, Virtual Private Network (VPN) tunnels will probably be employed. Since this traffic travels over DISA facilities in most theaters, the tunnels will be whatever technology DISA provides. In proposed plans for the Joint Information Environment, this connection will be a Layer 2 VPN. To configure the QoS settings in the network, coordination must take place with the Network Enterprise Center (NEC). While the PM can configure the equipment it installs, the NEC will have to configure all the preexisting equipment. 61 Quality of Service Rules Based Architecture Appendix H
274 The following excerpts from UCR Change 2008 and UCR 2013 identified the requirements needed to ensure Quality of Service in the Army s Unified Capabilities: DoD UCR Change3, Section 5.3.3, Network Infrastructure End-To-End Performance Requirements, defines a four-queue model for maintaining the required QoS for each UC Aggregate Service Class. Assured Voice, User Signaling, and Network Control Traffic are placed in the Expedited Forwarding (EF) queue. Assured Multimedia Conferencing (i.e., Video) traffic is placed in the Class 4 Assured Forwarding (AF4) queue. Preferred data, non-assured video and voice over internet protocol (VVoIP); IM, Chat, and Presence; and Operations, Administration and Maintenance (OA&M) traffic is placed in the Class 3 Assured Forwarding (AF3) queue. All other traffic (data and any other service) are placed in the Best Effort (Default) queue. NOTE: User Signaling associated with non-assured VVoIP is placed in the EF queue. Figure 3 shows the queue structure, Differentiated Services Code Points (DSCPs), and associated rules for each granular service class. Figure 8: Queuing Design Overview To ensure acceptable QoS in IP networks for assured VVoIP, it is necessary to assign the assured VVoIP traffic to different queues than non-assured VVoIP and data sessions on congested connections. Mixing assured VVoIP with non-assured VVoIP in the same aggregate service class (and queue) will result in the uncontrolled non-assured VVoIP degrading the assured VVoIP sessions on congested networks. To delineate the assured VVoIP from the nonassured VVoIP (and other types of packets), IP packets are marked with unique DSCPs. 62 Quality of Service Rules Based Architecture Appendix H
275 The following discussion explains the differences between assured and non-assured VVoIP, and why they are assigned to two different queues: 1. Assured VVoIP traffic is subject to Session Admission Control (SAC). SAC policies control the number of sessions that are offered to the network. Session admission control can be provided by LSCs or Gatekeepers (i.e., H.323 Gatekeepers) and is associated with establishing a budget for the number of simultaneous sessions and with ensuring that the number of active sessions is within that budget. Assured Services Admission Control (ASAC) extends SAC to allow sessions to be preempted when the SAC budget is at capacity and additional higher precedence sessions are offered. The ability to apply SAC to assured VVoIP ensures that assured VVoIP traffic is deterministic or predictable in nature. Since the offered load is predictable, it can be trafficengineered, and the network (queue size) can be designed for the traffic-engineered load. 2. n-assured VVoIP has many of the same characteristics as assured VVoIP with two critical differences. The first difference is that SAC is not applied to non-assured VVoIP. This is so because non-assured VVoIP typically is composed of peer-to-peer sessions that do not transit a centralized SAC appliance, (e.g., LSC); therefore, SAC cannot be applied. The second difference is that non-assured VVoIP sessions cannot be trafficengineered to ensure QoS. This is so because, without SAC, the offered load is not predictable. In addition to queuing, it is essential to apply traffic conditioning to the non-assured VVoIP packets since the packets are sent using the User Datagram Protocol (UDP) and are connectionless, meaning that the host will continue transmitting at the same rate independent of the network s ability to support that rate. Also, the UDP packets can quickly cause the preferred data sessions that are queued (in four-queue model) to terminate because of their use of Transmission Control Protocol (TCP), which responds to congestion by decreasing packet transmission rate. Enabling traffic conditioning on non-assured VVoIP packets will still cause unacceptable degradation on non-assured VVoIP sessions during periods of high usage, but will ensure that preferred data sessions continue to receive better than best effort performance IAW the UCR performance objectives. The bandwidth for each queue must be provided based on a sound traffic-engineering analysis, which includes the site budget settings, the site busy hour traffic load plus a 25 percent surge for voice and video traffic, plus a 10 percent aggregate overhead for signaling, NM, and routing traffic. The tables below represent the Four Queue and Six Queue Quality of Service Provisioning Models 63 Quality of Service Rules Based Architecture Appendix H
276 Table 16: QoS Four Queue Model* AF BE B/W CBWFQ FIFO Legend Assured Forwarding Best Effort Band width Class-Based Weighted Fair Queuing First In First Out *te: DISA is currently using Four Queue Provisioning Model transitioning to Six Queue Provisioning Model. 64 Quality of Service Rules Based Architecture Appendix H
277 Table 17: QoS 6 Queue Model* Queue Granular Service Class Customer DSCP (Base 10) DISN Service Class Queueing Strategy Bandwidth Provisioning AF BE B/W CBWFQ FIFO 5 Network Ctrl 48(CS6) Network Control PQ (EF) 5% Min B/W User Signaling 40 4 Short Message 32 Assured Voice 41,43,45,47,49 Assured Realtime LLQ (EF) 20 % Min B/W Assured Multimedia Conf 33,35,37,39,51 n-assured Multimedia Conf 28,30,34,36,38 3 n-assured Voice 46 n-assured Realtime LLQ (EF) 15 % Min B/W Broadcast Video 24 Multimedia Streaming Low Latency Data CBWFQ Preferred Elastic High Throughput Data 9-15 (AF) 30 % Min B/W OAM 16 1 Default (Best Effort) All remaining Elastic FIFO (BE) 20% Min B/W 0 Low Priority(Scavenger) 8 Scavenger FIFO (BE) 10% Min B/W Legend Assured Forwarding Best Effort Band width Class-Based Weighted Fair Queuing First In First Out *te: DISA is currently using Four Queue Provisioning Model transitioning to Six Queue Provisioning Model. [Required: Core, Distribution, and Access Products] The Core, Distribution, and Access products shall be capable of the following QoS features: 1. Providing a minimum of four queues (See Figure 9, Four-Queue Design). 2. Assigning any incoming access/user-side tagged session to any of the queues for prioritization onto the egress (trunk-side/network-side) interface. 65 Quality of Service Rules Based Architecture Appendix H
278 Figure 9: Four-Queue Design Scheme 3. Supporting Differentiated Services (DiffServ) per hop behaviors (PHBs) and traffic conditioning IAW RFCs 2474, 2597, 3140, and a. Expedited Forwarding (EF) b. Assured Forwarding (AF) c. Best Effort (BE) d. Class Selector (CS) e. PHB Identification Codes 4. All queues shall be capable of having a bandwidth (BW) assigned (i.e., queue 1: 200 kbps, queue 2: 500 kbps) or percentage of traffic (queue 1: 25 percent, queue 2: 25 percent). The BW or traffic percentage shall be fully configurable per queue from 0 to full BW or 0 to 100 percent. The sum of configured queues shall not exceed full BW or 100 percent of traffic. 5. Core, Distribution, and Access products shall meet the traffic conditioning (policing) requirements of Section as follows: a. The product shall calculate the bandwidth associated with traffic conditioning in accordance with RFC 3246, which requires that the queue size should account for the Layer 3 header (i.e., IP header), but not the Layer 2 headers (i.e., Point-to-Point Protocol (PPP), MAC, and so on) 66 Quality of Service Rules Based Architecture Appendix H
279 within a margin of error of 10 percent. When the other queues are not saturated, the Best Effort traffic may surge beyond its traffic-engineered limit. b. Core and Distribution products have been engineered for a blocking factor not to exceed 2:1. The aggregation of the Assured Forwarding and Expedition Forwarding queues should be configured to guarantee prioritization correctly, given the blocking factor. Priority queues (EF, AF4, and AF3) shall be configured as not to exceed 50 percent of the egress link capacity. c. Access devices have been engineered for a blocking factor of 8:1 or less. Prioritization of traffic is accomplished primarily to minimize latency. VoIP traffic is estimated at 2 (for dual appearances) bidirectional calls at 100 Kbps each or 400 Kbps - 0 percent of 100Mbps), video traffic is estimated at (500 Kbps bidirectional or 1 Mbps total percent). With estimated blocking factor (8:1), 12.5 percent of the traffic is non-blocking. Based on traffic engineering outlined, the 3 priority queues should be set up not to exceed 12.5 percent of the egress link capacity. NOTE: Bandwidth calculation assumes highest bandwidth use codec of G Differentiated Services Code Point [Required] The product shall support the Differentiated Services Code Point (DSCP) plan, as shown in Table ,UCR Change 3, DSCP Assignments. DiffServ assignments shall be software configurable for the full range of six bit values (0-63 Base10) for backwards compatibility with IP precedence environments that may be configured to use the TOS field in the IP header but do not support DSCP VVoIP Assured Forwarding Per-Hop Behavior Requirements Assured forwarding allows for some level of delivery guarantee as long as the traffic does not exceed a predetermined subscription rate. Traffic that exceeds the subscription rate faces a higher probability of being dropped if congestion occurs. Assured Forwarding Per-Hop Behavior (PHB) is defined in RFCs 2597 and RFC [Required] The system routers supporting VVoIP shall support and configure the four-queue PHBs, as defined in Table , Four-Queue PHB Approach. 2. [Required] The system routers supporting VVoIP shall support and configure the six-queue PHBs as defined in Table , Six-Queue PHB Approach. 3. [Required] CE Router PHB bandwidth allocation and negotiation needs to occur between the AR and the CE Router to prevent asymmetrical performance. 4. [Required] The CE Router bandwidth budget must be less than or equal to the AR bandwidth budget per queue. NOTE 1: For example, if an LSC session budget is 10 voice sessions, then the CE Router bandwidth budget for the EF queue must be greater than 1,100 kbps (10 * 110 kbps). If the CE Router bandwidth budget was say, 1400 kbps, to account for expected growth, surge, or other unplanned EF traffic; then the AR bandwidth must be greater than 1400 kbps or greater than the CE Router bandwidth budget. The LSC session budget must be less than the equivalent CE Router bandwidth budget, in the scenario above, less than 1400 kbps. 67 Quality of Service Rules Based Architecture Appendix H
280 NOTE 2: For Assured Forwarding (AF) and Expedited Forwarding (EF) PHBs, refer to UCR 2008, Change 3, Section , Per Hop Behavior Support. 5. [Required] Use of the Six-Queue model is required for routers that support it. 6. [Required] The same queuing model (six or four) shall be configured at both ends of the communication path to prevent asymmetrical performance. 7. [Required] If the router supports it, the six-queue model shall be configured on interfaces above T1. 8. [Required] The four-queue model shall be configured on interfaces T1 and below or on routers that do not support the six-queue model. UCR 2008, Change 3, Table Four Queue PHB Approach and Table Six Queue PHB Approach are replicated in Tables 12 and 13 of this document. UCR Change 3, Section Traffic Conditioning Requirements Traffic conditioning and engineering seeks to avoid congestion on IP-based networks. One way to avoid congestion is through the assignment of packets into their own Committed Information Rate (CIR) subgroups part of a larger CIR group. The partitioned subgroups are called packet queues, while the action queuing, is closely related to the scheduling of packets into each subgroup and it is called packet queuing. Each queue is given its own preferential treatment for traffic remarking, policing and scheduling. The overall strategy is called Quality of Service (QoS). The need for QoS stems from network traffic consisting of data sent by different kinds of applications. These various applications have different network bandwidth needs and use different transmission protocols to send their data. When these different types of data converge, and are sent on a shared link, one transmission can overwhelm another, resulting in a negative effect. However, since traditional queuing and scheduling algorithms manage the front end of a packet buffer line; as congestion increases, so does the need to manage the tail end of the buffer. If no congestion avoidance algorithm is configured, the link is said to tail drop. In other words, as queue buffers begin to fill, all packets are dropped on arrival. This has a negative effect on mission-driven real time traffic. In this section, traffic conditioning relates to the tail end aspects of buffer queuing. NOTE: The definition of traffic engineering is found in Appendix A, Section A2, Glossary and Terminology Description. 1. [Required] All CE Router and/or AR interfaces in the direction of the CE Router shall support traffic conditioning on an aggregate granular service class basis on the input interface. NOTE: The product shall calculate or be configurable to support the bandwidth associated with traffic conditioning in accordance with RFC 3246, which requires that the queue size should 68 Quality of Service Rules Based Architecture Appendix H
281 account for the Layer 3 header (i.e., IP header), but not the Layer 2 headers (i.e., Point-to-Point Protocol (PPP), MAC, and so on) within a margin of error of 10 percent. This means, when other queues are not saturated; lower precedence traffic may surge beyond its queued trafficengineered limit to use a higher precedence queue. 2. [Required] The system routers shall be able to traffic condition using IP addresses, protocol port numbers, and DSCPs as discriminators, as a minimum. 3. [Required] All CE Router and/or AR interfaces toward the CE Router shall support traffic conditioning on a granular service class basis on the output interface. NOTE: The product shall calculate or be configurable to support the bandwidth associated with traffic conditioning in accordance with RFC 3246, which requires that the queue size should account for the Layer 3 header (i.e., IP header), but not the Layer 2 headers (i.e., Point-to-Point Protocol (PPP), MAC, and so on) within a margin of error of 10 percent. This means, when other queues are not saturated; lower precedence traffic may surge beyond its queued traffic- engineered limit to use a higher precedence queue. UCR 2013, Section DiffServ for Routers The DISN Router shall support DiffServ as follows: NI [Required] The router shall support DiffServ in accordance with RFCs 2474 and 3140 as updated by 3168, NI [Required] The router shall support the DiffServ Expedited Forwarding (EF) Per-Hop Behavior (PHB) and code point assignment as defined by RFC NI [Required] The router shall support the DiffServ Assured Forwarding (AF) PHB classes and code point assignments as defined by RFC 2597 as updated by NI [Required] The router shall support DiffServ over MPLS by mapping the Differentiated Services Code Point (DSCP) of packets received into MPLS EXP-Inferred LSPs (E-LSP) as defined by RFC 3270 as updated by NI [Required] The router shall support DiffServ over MPLS by mapping DSCP code points of packets received into Label-Only-Inferred LSPs (L-LSPs) as defined by RFC 3270 as updated by NI [Optional] The router shall support the 16-bit encoding mechanism for the identification of DiffServ PHB in protocol messages, including both code points defined by standards action and code points not defined by standards action, as specified in RFC Quality of Service Rules Based Architecture Appendix H
282 Appendix C - Acronym List Abbreviation AAA ADN AF APL AR ASAC ASLAN BE B/P/C/S C2S CBA CBWFQ CE-R CIO CONUS DA DiffServ DISA DISN DISR DoD DoDI DSCP DSL DWDM E2E EBC EoIP Description Authentication, Authorization, Accounting Area Distribution de Assured Forwarding Approved Product List Aggregation Router Assured Services Admission Control Assured Services Local Area Network Best Effort Base/Post/Camp/Station Client to Server Cost Based Analysis Class-Based Weighted Fair Queuing Customer Edge Router Chief Information Officer Continental United States Department of the Army Differentiated Services Defense Information Systems Agency Defense Information Systems Network Department of Defense Information Technology Standards Registry Department of Defense Department of Defense Instruction Differentiated Services Code Point Digital Subscriber Line Dense Wavelength Division Multiplexing End to End Edge Boundary Router Everything over Internet Protocol 70 Quality of Service Rules Based Architecture Appendix H
283 EF ERB FIFO GMPLS GPON HTTP HTTPS I3A I3C2 I3MP IA IAW IETF IP ISDN IDS ISP IWF JTIC LLQ LSC LWN MANet MCN MFSS MG MGC MPLS NEC NETCOM NM OA&M OLT Expedited Forwarding Engineering Review Board First In First Out Generalized Multiprotocol Label Switching Gigabit Passive Optical Network Hypertext Transfer Protocol Hypertext Transfer Protocol Secure Installation Information Infrastructure Architecture Installation Information Infrastructure Communications and Capabilities Installation Information Infrastructure Modernization Program Information Assurance In Accordance With Internet Engineering Task Force Internet Protocol Integrated Services Digital Network Intrusion Detection Service Internet Service Provider Interworking Function Joint Testing Integration Center Low Latency Queue Local Session Controller LandWarNet Mobile Ad Hoc Network Main Computer de Multifunction Soft Switch Media Gateway Media Gateway Control Multiprotocol Labeling Switching Network Enterprise Center Network Enterprise Technology Command Network Management Operation Maintenance Administration Optical Line Terminal 71 Quality of Service Rules Based Architecture Appendix H
284 PC P/C/S PEO PQ PRI PSAP PSTN QoS RA RFC RM RSVP S2S SAC SBC SC SCF SIP SOAP SONET SS StdV1 StdV2 TBD TC TCP TDM TLA TLS UC UC MP UCR UDP VoIP VoSIP VPN VTC Personal Computer Post/Camp/Station Program Executive Office Priority Queue Primary Rate Interface Public Safety Answering Point Public Switched Telephone Network Quality of Service Reference Architecture Request for Change Resource Manager Resource Reservation Protocol Server to Server Session Admission Control Session Border Controller Signal Command Session Initiation Protocol Simple Object Access Protocol Synchronous Optical Network Soft Switch Standards Profile Standards Forecast To Be Determined Teleconferencing Transmission Control Protocol Time Division Multiplexing Top Level Architecture Top Layer Security Unified Capabilities Unified Capabilities Master Plan Unified Capabilities Requirements User Datagram Protocol Voice over Internet Protocol Voice over Secret Internet Protocol Virtual Private Network Video Teleconferencing 72 Quality of Service Rules Based Architecture Appendix H
285 VVoIP WAN WDSL WiFi XMPP Video and Voice over Internet Protocol Wide Area Network Web Services Description Language Wireless Fidelity Extensible Messaging and Presence Protocol 73 Quality of Service Rules Based Architecture Appendix H
286 Appendix D - Vocabulary (Integrated Dictionary AV2) Assumptions: Assumptions identify the UC steady state environment and how it will look over time, and the rules of how the sustainment and ongoing capabilities are determined. They expand on and provide additional information based on the principles provided. Business Rules: Business rules represent relationships among the UC inputs, controls, outputs and mechanisms and resources used. For example, a business rule can specify who can do what under specified conditions, the combination of inputs and controls needed, and the resulting outputs. UC business rules are based on best practices and provide design tenets and constrain the implementation of principles and relevant policies Conformance Testing: Conformance testing is conducted to determine whether a product or system meets some specified standard that has been developed for efficiency or interoperability. The rules based architecture approach allows for technical positions and patterns to be developed into standards for testing purposes. The test run identifies the conformance to standards and examines the deltas (if any) based on the information/interaction exchange criteria. Conformance testing provides traceability back to the design constraints stated in the business rules and the principles outlining the fundamental values of UC. Metrics and success criteria are collected to measure conformance to standards under specific conditions in a network environment. Constraints: The constraints provide the Army with the applicable rules, laws and policies set forth by the Army and DoD on UC related requirements and processes. These constraints identify the limits and boundaries implemented guide the development of business rules and technical patterns and positions. Converged. All types of services, defined by the GIG Enterprise Service Profile Document (GESP), exist simultaneously on the same Internet Protocol (IP) network. (Source document: UC Framework 2013). Converged Network. An Internet Protocol (IP) network used to transmit a combination of voice, video, and/or data services. (Source document: UC Framework 2013). Differentiated Services (DS). A quality of service delivery model, in which the flows are classified, policed, marked, and shaped at the edges of a DS domain. The nodes in the core of the network handle packets according to the per-hop behavior that is selected based on the contents of the DS field (Differentiated Services Code Point) in the packet header. (Source document: UC Framework 2013). Differentiated Services Architecture. Contains two main components. One is the fairly well understood behavior in the forwarding path and the other is the more complex and still emerging background policy and allocation component that configures parameters used in the forwarding path. The differentiated services architecture is based on a simple model where traffic entering a network is classified and possibly conditioned at the boundaries of the network, and assigned to different behavior aggregates. Each behavior aggregate is identified by a single Differentiated Services Code Point (DSCP). Within the core of the network, packets are forwarded according to the per-hop behavior associated with the DSCP. [RFC 2475]. Differentiated Services (DS) Field (DS Field). The six most significant bits of the Internet Protocol, version 4, Type of Service octet or the Internet Protocol, version 6, traffic class octet. (Source document: UC Framework 2013). 74 Quality of Service Rules Based Architecture Appendix H
287 Differentiated Services Code Point (DSCP). A value that is encoded in the Differentiated Services (DS) field and that each DS node must use to select the per-hop behavior that is to be experienced by each packet it forwards. (Source document: UC Framework 2013). Elastic (or n-real-time): While real-time applications do not wait for late data to arrive, elastic applications such as data applications like file transfer, , chat/instant messaging (IM), web data traffic, and others will always wait for data to arrive. The elastic or non-real-time applications do not have any performance guarantees, but may or may not have an allocated capacity. If any data applications like delay sensitive file transfer and short-interactive data that have definite performance requirements will fall into Preferred Elastic application category, but will not be called near-real-time application category. (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). Global Information Grid (GIG): The globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. n-gig IT includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network. Inelastic (or Real-Time): See Real-Time. Near-Real-Time (or Peferred Elastic): Like real-time, an event occurs in real-time but the event is distributed in one way from the source to one or multiple destination endpoints while no destination endpoint participates in communications like audio/video streaming. The performance requirements for the near-real-time one-way audio/video communications are less stringent than those of two-way real-time audio/video communications.it should be noted that the delay sensitive file transfer and other data applications are not considered as a part of nearrela-time applications (see Preferred Elastic). (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). n-real-time: See Elastic. Packet Marking. Marking in packets following their classification for a given service delivery, which includes Differentiated Services Code Point, Flow Label, or Security Parameter Index bit fields. (Source document: UC Framework 2013, RFC 4594). Preferred Elastic: A specially created service class category to meet unique DOD application requirements; it has varying degrees of service class categories. Examples include multi-media streaming (e.g. audio/video one-way distribution), shortinteractive transactions and delaysensitive file transfers. However, multi-media streaming (e.g. audio/video one-way distribution) applications can be further differentiated from the delay sensitive data applications defining as near-real-time applications. These unique differentiations are needed because of stringent performance requirements. Audio/video streaming has one-way delay requirements are of the order of 100s of milliseconds along with stringet delay and phase jitters. While delay sensitive file transfer and other data applications have one-way delay requirements of the order of few seconds with no particular delay and phase jitter requirements. (Source document: QoS GTP- 0009, UC Framework 2013, RFCs 1633, 4594). 75 Quality of Service Rules Based Architecture Appendix H
288 Principles: Reference architecture principles are enduring guidelines that describe how UC will fulfill its mission. Principles express the intent of the capability and fundamental values to be achieved with UC. UC principles tie back to business/warfighting requirements and drive technical positions and patterns. They inform and support how the Army achieves the UC mission and are intended to be enduring and seldom amended. Quality of Service: The capability to provide resource assurance and service differentiation in a network. Used with the local area network to provide different priority to traffic flows or sessions, or guarantee a certain level of performance to a traffic flow or session in accordance with requests from the application program. Quality of service is used in conjunction with traffic tagging to guarantee that prioritized traffic flows or sessions are given preferential treatment. Also, the collective effects of service performances that determine the degree of satisfaction of a user of the service. (Source document: UCR 2008). Real Time: At the same time, simultaneously like audio conversational communications from both or multiple ends, and real-time applications do not wait for late data to arrive. An event where two or more people communicate simultaneously, similar to the way people speak on a telephone at the same time. Any event that occurs in real time indicates that the event is happening, as we would see it, in actual time like video teleconferencing (VTC). (Source document: UC Framework 2013, RFCs 1633, 4594).The performance requirements for the twoway real-time audio/video communications are the most stringent. Reference Architecture: Reference architectures guides and constrain the instantiations of solution architectures. It also provides a common language for various stakeholders, guidance and consistency of implementations of technology to solve problems, supports the validation of solutions, and encourages adherence to common standards, specification and patterns. Reference Architecture normalizes the institutional understanding of capabilities at the enterprise level, and provides a common set of principles/rules, process patterns, and technical positions for use within the DoD to guide development of Enterprise, Segment, or Solution architectures. Router: A router is an appliance that is a packet switch that operates at the network layer of the Open Systems Interconnection Protocol model. Routers within the Internet Protocol (IP) Unified Capabilities architecture interconnect networks over local and wide areas, and provide traffic control and filtering functions when more than one pathway exists between two endpoints on the network. The primary function of routers is to direct IP packets along the most efficient or desired path in a meshed network that consists of redundant paths to a destination. Many routers in the DOD IP Unified Capabilities architecture include local area network switch functions and the distinction between the two types of appliances continues to blur. (Source document: UC Framework 2013). Technical Positions and Patterns: Technical positions describe the technical guidance and standards established for UC. This technical guidance documentation allows for system owners, PEOs/PMs justification to resource their systems and identifies potential choices and tradeoffs to perform. Patterns provide how UC artifacts may be organized and related for repeated use and support process reuse. They are typically descriptions of structural, behavioral, or graphical model instantiations that focus on interaction of the artifacts. Patterns will undergo change as new pattern concepts are discovered and emerge from solution architectures. Traffic Classification. A mechanism that allows the networks to distinguish among different categories of traffic, connection requests, and provisioning requests. The classification may be 76 Quality of Service Rules Based Architecture Appendix H
289 performed at the Edge and Core nodes during packet transport, as well as through indications in the control and management planes for setting up connections and provisioning. Classification can be based on fields in the packets and/or indications in control and management messages. (Source document: UC Framework 2013). Traffic Engineering. An operator or automaton with the express purpose of minimizing congestion in a network. It encompasses the application of technology and scientific principles to the measurement, modeling, characterization, and control of Internet traffic, and the application of such knowledge and techniques to achieve specific performance objectives. [RFC 2702]. Unified Capabilities (UC). The seamless integration of voice, video, and data services delivered ubiquitously across a secure and highly available network independent of technology infrastructure to provide increased mission effectiveness to the warfighter and business communities. Unified capabilities integrate standards-based communication and collaboration services including, but not limited to, the following: o o o Messaging. Voice, video, and web conferencing. Unified communication and collaboration applications or clients. These standards-based UC services are integrated with available enterprise applications, both business and warfighting. (Source document: UC Framework 2013). Video: That portion of a signal that is related to moving images. (Source document: UC Framework 2013). Video Teleconferencing (VTC): Two-way electronic form of communications that permits two or more people in different locations to engage in face-to-face audio and visual communication. Meetings, seminars, and conferences are conducted as if all the participants are in the same room. Video teleconferencing provides the capability to exchange and distribute combinations of voice, video, imagery, messages, files, and streams. (Source document: UC Framework 2013). Voice over IP (VoIP) System: A set of components required to provide Defense Switched Network (DSN) Internet Protocol (IP) voice services from end instrument to DSN trunk, or IP phone to IP phone. The VoIP system includes, but is not limited to, the IP telephony instrument, the local area network, the local session controller, and the IP gateway. (Source document: UC Framework 2013). 77 Quality of Service Rules Based Architecture Appendix H
290 Appendix E - Reference 1. Army Unified Capabilities (UC) Reference Architecture (RA), v1.0 October, Department of Defense Unified Capabilities Requirements 2008, Change 3, September 2011, located at 3. Department of Defense Instruction , Information Assurance (IA) Implementation, February 6, Department of Defense Instruction , DoD Unified Capabilities (UC), December 9, Department of Defense Unified Capabilities Requirements 2013 (DRAFT) located at 6. Department of Defense Unified Capabilities Requirements Framework (DRAFT). 7. Department of Defense Unified Capabilities Master Plan, October Global Information Grid (GIG) Technical Profile (GTP) Quality of Service (QoS), 18 February Quality of Service Rules Based Architecture Appendix H
291 Appendix I - AV-2 Integrated Dictionary/Glossary/Vocabulary Assumptions: Assumptions identify the UC steady state environment and how it will look over time, and the rules of how the sustainment and ongoing capabilities are determined. They expand on and provide additional information based on the principles provided. Business Rules: Business rules represent relationships among the UC inputs, controls, outputs and mechanisms and resources used. For example, a business rule can specify who can do what under specified conditions, the combination of inputs and controls needed, and the resulting outputs. UC business rules are based on best practices and provide design tenets and constrain the implementation of principles and relevant policies Call: Call is a term that is used in broader context. A call can mean session, call signaling message(s), call signaling message(s) that may contain about media like audio, video, and/or data. Conformance Testing: Conformance testing is conducted to determine whether a product or system meets some specified standard that has been developed for efficiency or interoperability. The rules based architecture approach allows for technical positions and patterns to be developed into standards for testing purposes. The test run identifies the conformance to standards and examines the deltas (if any) based on the information/interaction exchange criteria. Conformance testing provides traceability back to the design constraints stated in the business rules and the principles outlining the fundamental values of UC. Metrics and success criteria are collected to measure conformance to standards under specific conditions in a network environment. Constraints: The constraints provide the Army with the applicable rules, laws and policies set forth by the Army and DoD on UC related requirements and processes. These constraints identify the limits and boundaries implemented guide the development of business rules and technical patterns and positions. Converged: All types of services, defined by the GIG Enterprise Service Profile Document (GESP), exist simultaneously on the same IP network. (Source document: UC Framework 2013). Converged Network: An IP network used to transmit a combination of voice, video, and/or data services. (Source document: UC Framework 2013). Differentiated Services (DS). A quality of service delivery model, in which the flows are classified, policed, marked, and shaped at the edges of a DS domain. The nodes in the core of the network handle packets according to the per-hop behavior that is selected based on the contents of the DS field (Differentiated Services Code Point) in the packet header. (Source document: UC Framework 2013). Differentiated Services Architecture: Contains two main components. One is the fairly well understood behavior in the forwarding path and the other is the more complex and still emerging background policy and allocation component that configures parameters used in the forwarding path. The differentiated services architecture is based on a simple model where traffic entering a network is classified and possibly conditioned at the boundaries of the network, and assigned to different behavior aggregates. Each behavior aggregate is identified by a single Differentiated Services Code Point (DSCP). Within the core of the
292 network, packets are forwarded according to the per-hop behavior associated with the DSCP specified in RFC Differentiated Services (DS) Field (DS Field): The six most significant bits of the Internet Protocol, version 4, Type of Service octet or the Internet Protocol, version 6, traffic class octet. (Source document: UC Framework 2013). Differentiated Services Code Point (DSCP): A value that is encoded in the Differentiated Services (DS) field and that each DS node must use to select the per-hop behavior that is to be experienced by each packet it forwards. (Source document: UC Framework 2013). Elastic (or n-real-time): While real-time applications do not wait for late data to arrive, elastic applications such as data applications like file transfer, , chat/instant messaging (IM), web data traffic, and others will always wait for data to arrive. The elastic or non-real-time applications do not have any performance guarantees, but may or may not have an allocated capacity. If any data applications like delay sensitive file transfer and short-interactive data that have definite performance requirements will fall into Preferred Elastic application category, but will not be called near-real-time application category. (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). Global Information Grid (GIG): The globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. n-gig IT includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network. Inelastic (or Real-Time): See Real Time. Near-Real-Time (or Preferred Elastic): Like real-time, an event occurs in real-time but the event is distributed in one way from the source to one or multiple destination endpoints while no destination endpoint participates in communications like audio/video streaming. The performance requirements for the near-real-time one-way audio/video communications are less stringent than those of two-way real-time audio/video communications. It should be noted that the delay sensitive file transfer and other data applications are not considered as a part of near-real-time applications (see Preferred Elastic). (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). n-real-time: See Elastic. Packet Marking: Marking in packets following their classification for a given service delivery, which includes Differentiated Services Code Point, Flow Label, or Security Parameter Index bit fields. (Source document: UC Framework 2013, RFC 4594). Preferred Elastic: A specially created service class category to meet unique DoD application requirements; it has varying degrees of service class categories. Examples include multimedia streaming U.S. Army Unified Capabilities Reference Architecture Page 2 of 5
293 (e.g. audio/video one-way distribution), short interactive transactions and delay-sensitive file transfers. However, multi-media streaming (e.g. audio/video one-way distribution) applications can be further differentiated from the delay sensitive data applications defining as near-real-time applications. These unique differentiations are needed because of stringent performance requirements. Audio/video streaming has one-way delay requirements are of the order of 100s of milliseconds along with stringent delay and phase jitters. While delay sensitive file transfer and other data applications have one-way delay requirements of the order of few seconds with no particular delay and phase jitter requirements. (Source document: QoS GTP-0009, UC Framework 2013, RFCs 1633, 4594). Principles: Reference architecture principles are enduring guidelines that describe how UC will fulfill its mission. Principles express the intent of the capability and fundamental values to be achieved with UC. UC principles tie back to business/warfighting requirements and drive technical positions and patterns. They inform and support how the Army achieves the UC mission and are intended to be enduring and seldom amended. Quality of Service: The capability to provide resource assurance and service differentiation in a network. Used with the local area network to provide different priority to traffic flows or sessions, or guarantee a certain level of performance to a traffic flow or session in accordance with requests from the application program. Quality of service is used in conjunction with traffic tagging to guarantee that prioritized traffic flows or sessions are given preferential treatment. Also, the collective effects of service performances that determine the degree of satisfaction of a user of the service. (Source document: UCR 2008). Real Time: At the same time, simultaneously like audio conversational communications from both or multiple ends, and real-time applications do not wait for late data to arrive. An event where two or more people communicate simultaneously, similar to the way people speak on a telephone at the same time. Any event that occurs in real time indicates that the event is happening, as we would see it, in actual time like video teleconferencing (VTC). (Source document: UC Framework 2013, RFCs 1633, 4594).The performance requirements for the two-way real-time audio/video communications are the most stringent. Reference Architecture: Reference architectures guides and constrain the instantiations of solution architectures. It also provides a common language for various stakeholders, guidance and consistency of implementations of technology to solve problems, supports the validation of solutions, and encourages adherence to common standards, specification and patterns. Reference Architecture normalizes the institutional understanding of capabilities at the enterprise level, and provides a common set of principles/rules, process patterns, and technical positions for use within the DoD to guide development of Enterprise, Segment, or Solution architectures. Router: A router is an appliance that is a packet switch that operates at the network layer of the Open Systems Interconnection Protocol model. Routers within the IP Unified Capabilities architecture interconnect networks over local and wide areas, and provide traffic control and filtering functions when more than one pathway exists between two endpoints on the network. The primary function of routers is to direct IP packets along the most efficient or desired path in a meshed network U.S. Army Unified Capabilities Reference Architecture Page 3 of 5
294 that consists of redundant paths to a destination. Many routers in the DOD IP Unified Capabilities architecture include local area network switch functions and the distinction between the two types of appliances continues to blur. (Source document: UC Framework 2013). Technical Positions and Patterns: Technical positions describe the technical guidance and standards established for UC. This technical guidance documentation allows for system owners, PEOs/PMs justification to resource their systems and identifies potential choices and tradeoffs to perform. Patterns provide how UC artifacts may be organized and related for repeated use and support process reuse. They are typically descriptions of structural, behavioral, or graphical model instantiations that focus on interaction of the artifacts. Patterns will undergo change as new pattern concepts are discovered and emerge from solution architectures. Traffic Classification: A mechanism that allows the networks to distinguish among different categories of traffic, connection requests, and provisioning requests. The classification may be performed at the Edge and Core nodes during packet transport, as well as through indications in the control and management planes for setting up connections and provisioning. Classification can be based on fields in the packets and/or indications in control and management messages. (Source document: UC Framework 2013). Traffic Engineering: An operator or automaton with the express purpose of minimizing congestion in a network. It encompasses the application of technology and scientific principles to the measurement, modeling, characterization, and control of Internet traffic, and the application of such knowledge and techniques to achieve specific performance objectives specified in RFC Unified Capabilities (UC): The seamless integration of voice, video, and data services delivered ubiquitously across a secure and highly available network independent of technology infrastructure to provide increased mission effectiveness to the warfighter and business communities. Unified capabilities integrate standards-based communication and collaboration services including, but not limited to, the following: o Messaging. o Voice, video, and web conferencing. o Unified communication and collaboration applications or clients. These standards-based UC services are integrated with available enterprise applications, both business and warfighting. (Source document: UC Framework 2013). Video: That portion of a signal that is related to moving images. (Source document: UC Framework 2013). Video Teleconferencing (VTC): Two-way electronic form of communications that permits two or more people in different locations to engage in face-to-face audio and visual communication. Meetings, seminars, and conferences are conducted as if all the participants are in the same room. Video teleconferencing provides the capability to exchange and distribute combinations of voice, video, imagery, messages, files, and streams. (Source document: UC Framework 2013). U.S. Army Unified Capabilities Reference Architecture Page 4 of 5
295 Voice over IP (VoIP) System: A set of components required to provide Defense Switched Network (DSN) IP voice services from end instrument to DSN trunk, or IP phone to IP phone. The VoIP system includes, but is not limited to, the IP telephony instrument, the local area network, the local session controller, and the IP gateway. (Source document: UC Framework 2013). U.S. Army Unified Capabilities Reference Architecture Page 5 of 5
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHEF INFORMATION OFFICER FEB 0 8 2013 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Department of Defense Unified Capabilities Reference
Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future
White Paper Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future What You Will Learn The future of the Department of Defense s (DoD) networks focuses on the
Unified Capabilities (UC)
Unified Capabilities (UC) Lisa Belt UC Portfolio Manager DISA 14 May 2014 1 2 Unified Capabilities -- What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline IP Video Peer w/commercial
What is Unified Capabilities?
Unified Capabilities and Tactical Overview 7 May 2012 Version 3 What is Unified Capabilities? A Combat Support Agency Enterprise Network Convergence DoD Unified Capabilities Voice Video Data Tactical The
Department of Defense. Unified Capabilities Framework 2013 (UC Framework 2013)
Department of Defense Unified Capabilities Framework 2013 (UC Framework 2013) January 2013 The Office of the DoD Chief Information Officer DEPARTMENT OF DEFENSE UNIFIED CAPABILITIES FRAMEWORK 2013 (UC
Unified Capabilities (UC)
Unified Capabilities (UC) Andres J. Bryczek Unified Capabilities Development 6/11/2015 2:20 PM 18 Jun 2015 Unified Capabilities --What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
TABLE OF CONTENTS. Section 5 IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements...
, Table of Contents TABLE OF CONTENTS SECTION PAGE IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements... 5-4 i , List of Figures LIST OF FIGURES
The changing face of global data network traffic
The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This
Department of Defense (DoD) Unified Capabilities Master Plan (UC MP)
Department of Defense (DoD) Unified Capabilities Master Plan (UC MP) October 2011 DoD Chief Information Officer 2 Department of Defense (DoD) Unified Capabilities Master Plan (UC MP) The purpose of the
Cisco Satellite Services Platform Delivering Managed Services over Satellite
Solution Overview Cisco Satellite Services Platform Delivering Managed Services over Satellite With the increase in available bandwidth from the launch of high-throughput satellites, satellite service
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information
TDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
promise of lower-cost, network-based voice communications. The shift to VoIP which in truth represents a subset of the larger convergence
On the Way withvoip Voice over Internet Protocol is steadily working its way into all aspects of military operations. By Harrison Donnelly MIT Editor While the Pentagon ponders the possibility of moving
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
Unified Communications Overview
A CBTS White Paper Unified Communications Overview Craig Chavis Solution Architect, CBTS 10/5/2012 www.cbts.cinbell.com Table of Contents Unified Communications Overview...3 Unified Communications as a
Multi-protocol Label Switching
An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is
How To Make A Cell Phone Converged Into A Cell Network
MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint
NGN Network Architecture
ITU/BDT Regional Seminar on Costs and Tariffs for Member Countries of the Tariff Group for Africa (TAF) Midrand,, South Africa, June 2005 NGN Network Architecture Oscar González Soto ITU Consultant Expert
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Converged Business Networks: Simplifying Network Complexity Sponsored by: Level 3 Melanie Posey November 2010 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
Next Generation Networks Convergence, evolution and roadmaps
Next Generation Networks Convergence, evolution and roadmaps Dr. Sathya Rao,Telscom Consulting, Berne [email protected] NGN Applications Requirement IP Everywhere The Internet Protocol is becoming pervasive
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549. Thanks
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 Thanks IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 7 Aug 13 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension
Hosted PBX Platform-asa-Service. Offering
Hosted PBX Platform-asa-Service Offering Hosted PBX Platform Overview VoIP Logic s Hosted PBX Platform-as-a-Service (PaaS) delivers cloud-based PBX functionality encompassing traditional PBX features as
GENBAND Overview and UC Solution. -Common Platform Uncommon Performance
GENBAND Overview and UC Solution -Common Platform Uncommon Performance Corporate Profile Employees 2,200 Solutions Switching, Networking and Applications Operations 50 Sales and Support Centers Market
Jive Core: Platform, Infrastructure, and Installation
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
Shared Services Canada Converged Communications Session III Architecture Framework Advisory Committee
Shared Canada Converged Communications Session III Architecture Framework Advisory Committee Transformation, Service Strategy and Design June 3, 2013 Agenda TIME TOPICS PRESENTERS 09:30 09:45 Opening remarks
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania [email protected]
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania [email protected] Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network
Solution Overivew Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network EXECUTIVE SUMMARY Today s businesses are turning to wireless networking to give employees immediate
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS
Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main
S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
Efficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 12 Dec 13 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service
VoIP Architecture VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service Marcin Godlewski Lead Engineer Scientific Atlanta, a Cisco Company Charles Moreman
How To Create A Converged Network For Public Safety
IP/MPLS Whitepaper Benefits of Converged Networking in a Public Safety Environment Table of Contents Introduction... 2 Current Public Safety Network Landscape... 2 The Migration to All-IP... 3 MPLS Functionality
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and
Corporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
IP Telephony (Voice over IP)
(Voice over IP) Instructor Ai-Chun Pang, [email protected] Office Number: 417, New building of CSIE Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements
Convergence: The Foundation for Unified Communications
Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008
Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Mastering Network Design with MPLS
Mastering Network Design with MPLS Overview In this paper, enterprise CIOs, IT&T professionals and network architects will learn how to improve productivity and security by designing multi-location Virtual
Selecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014
Selecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014 There are many Session Initiation Protocol (SIP) phones on the market manufactured by IP PBX vendors and third parties. Selecting
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected]. Briefing name l Date (1)
Fight the Network Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches [email protected] Briefing name l Date (1) Problem Army Strategy for Net-Centric Fighting Force
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking NEC SV8300 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 May 18, 2012 CHANGE HISTORY Version Date Change Details Changed By 1.0 5/18/2012
Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
Colt VoIP Access. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt VoIP Access 2010 Colt Technology Services Group Limited. All rights reserved. Business requirements Are you looking for ways to simplify management of national or even international voice services
Virtual Team Collaboration Glossary
Virtual Team Collaboration Glossary Steve Prahst, Rhonda Arterberrie, and Dennis Kay Knowledge Management and Collaborative Technologies Branch NASA Glenn Research Center Introduction Most NASA projects
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) [email protected], [email protected] Abstract.
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
A NIMS Smart Practice
NIMS Smart Practice: 02-06 NIMS Integration Center, May 2006 www.fema.gov/emergency/nims 202-646-3850 A NIMS Smart Practice IN ALLEGANY COUNTY, MARYLAND: A MUNICIPAL WIRELESS NETWORK PROVIDING ENHANCED
PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
Sprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
TRANSFORMATION OPPORTUNITIES WITH THE ALCATEL-LUCENT OPENTOUCH SUITE OPTIMIZING CONVERSATION DELIVERY OVER CENTRALIZED COMMUNICATIONS NETWORKS
TRANSFORMATION OPPORTUNITIES WITH THE ALCATEL-LUCENT OPENTOUCH SUITE OPTIMIZING CONVERSATION DELIVERY OVER CENTRALIZED COMMUNICATIONS NETWORKS Application Note Table of contents Abstract / New Opportunities
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
Terms VON. VoIP LAN WAN CODEC
VON Voice Over the Net. Voice transmitted over the Internet. That is the technical definition. Prescient Worldwide s product, called VON, means Voice Over Network as in ANY network, whether a client s
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
BT Unified Trading communication. The Future Delivered
BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Product Presentation L2 MPLS Services. Aircel Business Solutions
Product Presentation L2 MPLS Services Aircel Business Solutions Aircel Business Solutions o GSM Service provider with license to operate in 23 telecom circles of India o 20Million+ subscribers in India
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
ICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : [email protected] Tel : (+32)
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)
Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence
Bridging the Digital Divide with Net-Centric Tactical Services
Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: [email protected] 1. Abstract The DoD
IP Inter-Carrier Routing
page 1 of 6 IP Inter-Carrier Routing Capabilities to Support IP Services Interconnection The Need for IP Interconnection Service providers have been transitioning their individual networks to IP for many
SIP Signaling Router (SSR) Use Cases
APPLICATION GUIDE SIP Signaling Router (R) Use Cases Using SIP to improve network performance and deliver advanced services This application guide discusses how operators can use a SIP Signaling Router
Global Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
IMS Interconnect: Peering, Roaming and Security Part One
T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish
WHITE PAPER: Broadband Bonding for VoIP & UC Applications. In Brief. mushroomnetworks.com. Applications. Challenge. Solution. Benefits.
In Brief Applications UC & VoIP Challenge Cut telecom cost by finding an alternative to costly MPLS Improve Internet connectivity speeds Fortify business continuity Solution Mushroom Networks Truffle Internet
1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
ICTNPL5071A Develop planning strategies for core network design
ICTNPL5071A Develop planning strategies for core network design Release: 1 ICTNPL5071A Develop planning strategies for core network design Modification History Not Applicable Approved Page 2 of 15 Unit
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Overview of the BBF access-network solution
Overview of the BBF access-network solution BBF/SIEPON Joint Workshop Christophe Alter Chair BBF Technical Committee Broadband Forum Scope PARTNER APPLICATION FUNCTION PARTNER CONTROL FUNCTION Network
VoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
Uncomplicated Communications
Unified Communications & Collaboration Strategy Delivering Uncomplicated Communications What If I Could? Citizens are delivered innovative collaboration tools daily that find and connect people and data
Department of Defense Net-Centric Services Strategy
Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion
