Third Party Data Session Control in the Evolved Packet System



Similar documents
Open Access to Call and Session Control in Mobile Networks

Service Broker Function in IMS Architecture - Issues and Considerations

II. Service deployment

Online charging in IMS for multimedia services with negotiable QoS requirements based on service agreements. T. Grgic* and M.

Advanced SIP Series: SIP and 3GPP Operations

Diameter in the Evolved Packet Core

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things.

A business view for NGN service usage

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

End-2-End QoS Provisioning in UMTS networks

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module

Advanced SIP Series: SIP and 3GPP

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

Security considerations for IMS access independence

Implementing LTE International Data Roaming

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

Interaction between an Online Charging System and a Policy Server

An Architecture Model of Sensor Information System Based on Cloud Computing

Adaptive Load Control of Service Oriented Architecture Server

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

A Proposed Model For QoS guarantee In IMSbased Video Conference services

Solution Architecture

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

A Call Conference Room Interception Attack and its Detection

MDM and Telco Service Development OMA Device Management and Platforms

Mobility Management for All-IP Core Network

Delivery of Voice and Text Messages over LTE

Service Continuity Path to smooth user experiences

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

How To Manage A Virtualization Server

Architectural Overview of IP Multimedia Subsystem -IMS

Building Robust Signaling Networks

Design Document. Offline Charging Server (Offline CS ) Version i -

Logical Data Models for Cloud Computing Architectures

Service Delivery Platforms for Network Operators

AMC - Advanced Mobile Communications

Packetized Telephony Networks

Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

ETSI TS V2.1.1 ( ) Technical Specification

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED

An Active Packet can be classified as

Internet Communications Using SIP

Method of Unified Communications and Collaboration Service in Open Service Platform based on RESTful Web Services

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

Mobile Application Part protocol implementation in OPNET

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

Efficient evolution to all-ip

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

MS Series: VolP Deployment Guide

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE

Project management integrated into Outlook

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

4G Mobile Networks At Risk

Cisco Satellite Services Platform Delivering Managed Services over Satellite

Paving the Way to Next Generation Media and Signaling VoIP Gateways

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks

Session Border Controllers: Addressing Tomorrow s Requirements

ETSI TS V1.1.1 ( )

Security and Risk Analysis of VoIP Networks

Multimedia Service Platform

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Lecture 4b AAA protocols (Authentication Authorization Accounting)

OPNET Implementation of the Megaco/H.248 Protocol: Multi-Call and Multi-Connection. Scenarios

Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum

FROM TELEPHONY TO IP COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH IP COMMUNICATIONS APPLICATION NOTE

Deploying QoS sensitive services in OSGi enabled home networks based on UPnP

The Ubiquitous Web, UPnP and Smart Homes

Security and Authentication Concepts

LTE CDMA Interworking

Load Balancing Support for Self-Organizing IMS Networks

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Transcription:

Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA enp@tu-sofia.bg Abstract: - The paper studies implementation issues of third party application control on packet data sessions in the Evolved Packet System (EPS). The research is based on the standardized functional architecture for Policy and Charging Control. Open Service Access (OSA) application programming interfaces for Data Session Control are considered and their deployment in all Internet Protocol based networks is described. A formal approach to functional verification of OSA application server is presented. The approach may be used to generate automatic tests for verification of OSA gateway behavior. Key-Words: - Open Service Access, Policy and Charging Control, Finite State Machines, Formal functional verwitication 1. Introduction Evolved Packet System (EPS) is standardized by the Third Generation Partnership Project (3GPP) as evolution of all Internet Protocol based packet networks that allows evolution of any deployed wireless or wired access technology. EPS provides mechanisms for quality of service and policies to control and manage services and to differentiate charging [1], [2]. The standard supports delivery of combinations of multimedia telephony and internet services hosted by the network operator or third party service provider [3], [4]. Opening the network interfaces for third party stimulates service provisioning and promotes the convergence between IT applications and public telecommunication services [5], [6], [7]. Open Service Access (OSA) is a technology which illustrates the convergence of IT and telecommunications. OSA allows third party applications to invoke communication functions in a public network using application programming interfaces. Network functions accessed by applications are called Service Capability Features (SCF) [8]. Application programming interfaces (APIs) are defined for each OSA SCF exposed toward the applications. The OSA Data Session Control SCF allows setting up, releasing, and managing packet data sessions [9]. The 3GPP standards define OSA Data Session Control interfaces mapping in packet switched mobile intelligent networks [10]. Deployment of Data Session Control interfaces in EPS networks allows third party applications access to policy and charging functions and requires the respective interface to protocol mapping. Some publications concerning OSA SCF implementation, focus on aspects related to the APis, while other authors discuss evaluation of conformance of the session control mechanisms in the network out of the application context [11], [12], [13]. In this paper, some implementation issues of OSA Data Session Control APIs in EPS networks deploying dynamic policy and charging control are studied. In Section 2, functional architecture for third party control on packet data sessions is considered. Section 3 presents the suggested protocol view on the packet data session states and both state models as seen by the network and third party applications are formally described. In Section 4, an approach to formal verification of application server that supports Data Session Control interfaces and the policy and charging control protocol is presented. 2. Functional architecture for deployment of third party control on packet data sessions in EPS ISBN: 978-960-474-310-0 116

3GPP standards define Policy and Charging Control (PCC) architecture aimed to provide means for authorization and control the usage of bearer resources intended for packet data traffic [14]. The overall operator control on Quality of Service (QoS), source/destination of data traffic and the start and stop of the packet data traffic is based on policies and allows flow based charging. The functional architecture for third party control on packet data sessions in EPS networks is shown in Fig.1. The figure does not present all PCC functional entities but those that are related to the current research. PCRF Diameter Media gateway 3 rd party domain AS OSA interfaces Diameter AF OSA gateway Fig.1 Functional architecture for 3 rd party control on packet data sessions in PCC enabled networks The Policy and Charging Rule Function (PCRF) is responsible for making PCC decisions based on session and media related information obtained from the Application Function (AF). The PCRF generates charging rules and authorizes the bearer resources with the appropriate QoS for the packet flows. The AF extracts the session information from session related signaling during session establishment between two parties. The AF may provide initial session information not fully negotiated yet at an earlier stage in order to allow service authorization. The AF provides final session information based on negotiated session parameters between two parties. The AF may modify session information at any time (e.g. due to application requested increase of data rates). Depending on the application, in service information provision, the AF may instruct the PCRF when the packet flows are to be enabled or disabled to pass through the access network and thus providing gating control. When the packet data session is terminated (e.g. due to the application request), the AF report this to the PCRF. The AF may subscribe to receive notifications about QoS events related to the packet data session. In case of available subscription, on occurrence of QoS events the PCRF notifies the AF. The signaling protocol used for PCC at the reference point between AF and PCRF is Diameter [14]. The AF may be Application Server (AS) that hosts application logic. To enable party control on packet data sessions, the network operator needs to deploy a special type of AS that is OSA gateway. The OSA gateway exposes OSA interfaces towards exterior of the network and control protocols toward the interior of the network. The OSA gateway needs to perform functional mapping between OSA interface methods and Diameter messages. 3. Data session state models The OSA gateway which supports Data Session Control interfaces toward the external applications and Diameter protocol towards the network needs to maintain two mutually synchronized models representing the data session states. The model representing the application view on data session states is defined in [9]. According to that model, the data session object can be in one of the following states. In Idle state, the data session object is not created. The Setup state is entered when the reportnotification method indicates that a data session, which the application is interested in, is setup. In Setup state, the application can request session establishment to the remote party by invoking connectreq method. In Established state, the application is notified that the session is established. In NetworkReleased state, the session is terminated and the application can gather session information. In ApplicationReleased state, the data session is terminated by the application. From data session control point of view, the Idle, Network released and Application released states are equivalent, as far as the data session is neither in establishing nor in active phase. 3GPP standards define the procedures at the reference point between the PCRF and the AF but do not provide a model that represents the AF view on packet data session in the context of PCC [15]. As ISBN: 978-960-474-310-0 117

mediation functionality between third party applications and PCC related functional entities, the OSA gateway needs also a model that represents the Diameter view on the packet data session states. This model has to reflect the states of the QoS resources authorized for the packet data session in order to provide the AF with means for QoS control and usage monitoring. The suggested model representing the states of QoS resources authorized for a packet data session is shown in Fig.2. AAR SE Idle AAR ISE RAR SS Authorize ServiceInfo AAR FSE Authorize SessionInfo AAR MCR, RAR EN, AAR ISM, AAR FSM, AAR SE, AAR GC STR ST ASR ABR Fig. 2 Model representing the states of QoS resources authorized for a packet data session In Idle state, no QoS resources are authorized for the session. If the application receives notification about session setup signaled by Diameter command Re-Authorization Request (RAR SS ) the QoS resources state moves to. If the application receives notification about session establishment signaled by Diameter command the QoS resources state becomes. In Idle state, an application or service requiring dynamic PCC interacts with the AF which extracts session information from application signaling and provides this to the PCRF by sending a Diameter command for initial session establishment (AAR ISE ). This results in transition to state. It is possible for the AF to subscribe to QoS events by Diameter command Authentication-Authorization Request (AAR SE ). In state, the early authorization check of the service information is performed. When final session parameters are negotiated, the AF sends a Diameter command to the PCRF for final session information (AAR FSE ). This results in transition to state. In state, on behalf of application, the AF may request media component removal (AAR MCR ), provide gating control (AAR GC ), subscribe for QoS event notification (AAR SE ) and be notified about QoS events (RAR EN ). The AF may send initial session modification information (AAR ISM ) and final session modification information (AAR FSM ) to the PCRF in order to authorize the session modification. In state and state, if all bearers assigned to the session are lost, the PCRF requests the AF session abort by sending a Diameter command Abort Session Request (ASR ABR ). The AF also may initiate session termination by sending a Diameter Session Termination Request (STR ST ). These result in transition to Idle state. The formal specification of packet data session state models as Labeled Transition Systems allows usage of formal means to prove the synchronized behavior of both models in the OSA gateway. This may be used for automatic generation of test cases during the functional verification of OSA gateway. To prove behavioral equivalence between state machines formally, the notion of Labeled Transition Systems is used [16]. Definition 1: A Labeled Transition System (LTS) is a quadruple (S, Аct,, s 0 ), where S is a countable set of states, Act is a countable set of elementary actions, S Act S is a set of transitions, and s 0 S is a set of initial states. By T Diameter =(S Diameter, Act Diameter, Diameter, s 0 ) it is denoted an LTS which represents a simplified QoS resources state model reflecting the third party application view where: - S Diameter = {Idle,, }, - Act Diameter = {AAR ISE, AAR FSE, AAR ISM, AAR FSM, AAR MCR, AAR GC, AAR SE, RAR EN, RAR SS,, STR ST, ASR ABR }, - Diameter = {Idle AAR ISE, Idle, Idle RAR SS, AAR SE, AAR FSE,, STR ST Idle, ISBN: 978-960-474-310-0 118

ASR ABR Idle, AAR IMS, AAR FSM, AAR GC, AAR MCR, AAR SE, RAR EN, STR ST Idle, ASR ABR Idle}, - s 0 = {Idle}. By Т DSC = (S DSC, Аct DSC, DSC, s 0 ) it is denoted an LTS, representing the OSA application view on data session state where: - S DSC = {,, Established DSC }; - Act DSC = {datasessionsetup,, connectreq, release, datasessiondisconnected, datasessionsupervisionevent}, - DSC = { datasessionsetup, connectreq Established DSC, Established DSC, datasessiondisconnected, release, Established DSC datasessiondisconnected, Established DSC release Established DSC datasessionsupervisionevent Established DSC }; - s 0 = { }. Having the formal descriptions of data session state model and QoS resources state model by LTSs, we use the concept of weak bisimulation to prove that both LTSs expose equivalent behavior. 4. An approach to formal verification of functional behavior of OSA gateway The following notations are used: - s а s stands for the transition (s, a, s ); а - s means that s : s s ; µ - s s n, where µ = а 1, а 2,..., а n : s 1, s 2,, а 1 а n s n, such that s s 1... s n ; µ - s means that s, such as s s ; - µˆ µ means if μ τ or otherwise, where τ is one or more internal (invisible) actions. а µ The concept of bisimulation is used to prove that two LTSs expose equivalent behavior [16]. The strong bisimulation possesses strong conditions for equivalence which are not always required. For example, there may be internal activities that are not observable. The weak bisimulation ignores the internal transitions. Definition 2: Two Labeled Transition Systems T = (S, A,, s 0 ) and T = (S, A,, s 0 ) are weakly bisimilar if there is a binary relation U S S such that if s 1 U t 1 : s 1 S and t 1 S then a Act: a â - s 1 s 2 implies t 2 : t 1 t 2 and s 2 U t 2 ; a â - t 1 t 2 implies s 2 : s 1 s 2 and s 2 U t 2. In order to prove that both models as seen by a third party application and by the network running at the OSA gateway are synchronized, it has to be proved that both LTSs, that formally describe the models, expose equivalent behavior. The behavioral equivalence is proved using the concept of weak bisimilation. Proposition: The LTSs Т DSC and Т Diameter are weakly bisimilar. Proof: To prove the bisimulation relation between LTSs, it has to be proved that there is a bisimulation relation between their states. First, homomorphism between the Аct DSC and Act Diameter is identified in Table 1. Table 1 Homomorphism between Act DSC and Act Diameter Act DSC Act Diameter datasessionsetup AAR ISE, RAR SS connectreq AAR FSE, release STR ST datasessiondisconnected ASR ABR datasessionsupervisionevent AAR MCR, RAR EN, AAR ISM, AAR FSM, AAR SE, AAR GC supervisedatasessionreq AAR SE By U it is denoted a relation between the states of Т DSC and Т Diameter where U = {(, Idle), (, ), (AuthorizeSession- Info, Established)}. Table 2 presents the bisimulation ISBN: 978-960-474-310-0 119

relation between the states of Т DSC and Т Diameter which satisfies the Definition 2. Based on the bisimulation relation between the states of Т DSC S and Т Diameter it can be concluded that Т DSC and Т Diameter expose equivalent behavior. Table 2 Bisimulation relation between T DSC and Т Diameter s 1 a â s 2 s 1, s 2 S DSC t 1 datasessionsetup Established DSC Established DSC datasessionsupervision- Event Established DSC Established DSC release Established DSC datasessiondisconnected release datasessiondisconnected Established DSC, Established DSC, t 2 t 1, t 2 S Diameter Idle AAR ISE AAR FSE AAR MCR, AAR GC, RAR EN, AAR ISM, AAR FSM STR ST Idle ASR ABR Idle STR ST Idle ASR ABR Idle Idle The detailed formal description of both models representing the packet data session states as view by the application and by the network, including behavior in case of errors makes possible to automate the process of generation of test sequences to verify the functional behavior of the OSA gateway. 5. Conclusion The deployment of third party control on packet data sessions in the EPS requires provisioning of open access to network functions related to policy and charging control. External applications access.the policy and charging functions using OSA Data Session Control interfaces instead of network control protocols. A key role in this context plays the OSA gateway which needs to perform interoperability functions mediating between applications and network entities. The suggested formal approach to functional verification of OSA gateway may facilitate its implementation and shorten the time to market for differentiated services. Acknowledgement: The research is in the frame of Project DDBY02/13/17.02.2010 funded by National Science Fund, Bulgarian Ministry of Youth, Education and Science. References: [1] J. Balbas,, S. Rommer, J. Stenfelt, Policy and charging control in the evolved packet system, IEEE Communications Magazine, 2009, vol.47, issue 2, pp.68-74. [2] S. Quellette, L. Marchad, Pierre, Samuel, A potential evolution of the policy and charging control/qos architecture for the 3GPP IETFbased evolved packet core, IEEE Communications Magazine, 2011, vol.49, issue 5, pp.231-239. [3] L. Baleh, L. Suciu, J. Bonnin, Enriched connectivity-as-a-service for dynamic Mobile- Cloud, Proc. of IEEE Consumer Communications and Networking Conference CCNC 2012, pp.655-660. [4] R. Copeland, N. Crespi, Policies to Enable Serving Untrusted Services on Alternative (Non- 3GPP) and Untrusted Access Networks in EPS, Proc. of IEEE Computer Software and Applications Conference Workshops COMPSACW 2011, pp.48-53. ISBN: 978-960-474-310-0 120

[5] B. Odadzic, M. Jankovic, Open service access (OSA) business models and service level agreement aspects, Proc. of IEEE International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service TELSIKS 2003, vol.1, pp.22-25. [6] J. Yang, H. Park, A Design of Open Service Access Gateway for Converged Web Service, Proc. of International Conference on Advanced Communication Technology, ICACT 2008, pp.1807-1810. [7] M. Adeyeye, Future directions of converged services in the Web session mobility scenarios, Proc. of International Conference AFRICON 2011, pp.1-5. [8] H. Hanrahan, Network Convergence, Services, Applications, Transport and Operations Support, Wiley, 2007. [9] 3GPP TS 29.198-08 Open Service Access (OSA); Application Programming Interface (API) Part 8: Data Session Call Control Service Capability Feature; Release 9, 2009, v9.0.0. [10] 3GPP TR 29.998-04-1 Open Service Access (OSA); Mapping for Open Service Access; Part 4, Call Control Service Mapping; Subpart 2: API to CAP mapping, Release 9, 2009, v9.0.0.. [11] I. Chlamtac, H. Lee, Y Lin, M Tsai, An OSA service capability server for mobile services, International Journal of Pervasive Computing and Communications, 2008, vol. 4, issue 3, pp. 268-278. [12] T.Magedanz, D. Witaszek, K. Knüttel, Service Delivery Platform Options for Next Generation Networks, approved within the national German 3G Beyond Testbed, 2004, Retrieved from http://home.intekom.com/satnac/proceedings/20 04/Plenary/Magedanz.pdf [13] S. Walker, Providing IMS Services to Legacy Network Endpoints, 2009, Retrieved from http://www.iec.org/newsletter/august07_1/analy st_corner.pdf. [14] 3GPP TS 23.203 Policy and charging control architecture, Release 12, v12.0.0, 2013. [15] 3GPP TS 29.213 Policy and Charging Control signaling flows and Quality of S ervice (QoS) parameter mapping, Release 11, v11.6.0, 2013. [16] P. Panangaden, Notes on Labeled Transition Systems and Bisimulation, 2009, Retrieved from http://www.cs.mcgill.ca/~prakash/courses/comp 330/Notes/lts09.pdf. ISBN: 978-960-474-310-0 121