Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
Project Number: IST-2000-25187 Project Title: TORRENT Deliverable Security*: PU CEC Deliverable Number: D1.2 Contractual Date of Delivery to the CEC: 31.7.2001 Actual Date of Delivery to the CEC: 18.9.2001 Title of Deliverable: Requirements for Service Providers, Network Operators, Manufacturers Work package contributing to the Deliverable: WP1 Type of Deliverable**: R Editor: Martin Potts Contributors: R. Phillips (Genuity), R. Tolstra (Tesion), E. Scharf, J. Griffiths, P. Hamer (QMUL), I. Borges, P. Rolo (PTIN), V. Apostolopoulou (OTEC), B. Martinez (Versaware), J. Rossebo, T. Olsen, H. Skaug, T. Konstali, T. Opperud, B. Haram (Telenor)
* Security: PU – Public, PP - Restricted to other programme participants (including the Commission Services) RE - Restricted to a group specified by the consortium (including the Commission Services) CO - Confidential, only for members of the consortium (including the Commission Services) ** Type: R - Report, P - Prototype, D - Demonstrator, O - Other
Abstract: The requirement for service providers, network operators and manufacturers is essentially to satisfy the user requirements as well as possible, in a fast and flexible manner, and for the least cost. The user requirements were identified in D1.1: “User Requirements”, as being that: all of the required services should be accessible, with the limitation that the quality may be affected according to the capabilities of the access network and the terminal. Such presentation adaptation should be automated for the user (ie. the user need not be aware of the underlying network). When a choice of access and/or core network technologies are available, the most suitable one will be (dynamically) chosen according to the user's instantaneous requirement for best quality, fastest response time, or lowest price (based on the current network conditions). Where no specific requirements are given, the Residential Gateway and Local Access Point will decide based on the service selected, the terminal, the status of the available networks, previous experience and personalisation profiles.
Keywords: Service providers, network operators, manufacturers, system architecture, access network technologies, terminals, residential gateway, home networks
______1 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
0. CONTENTS LIST
EXECUTIVE SUMMARY ...... 5
1. INTRODUCTION...... 6
2. ARCHITECTURAL FRAMEWORK...... 7
2.1 ARCHITECTURAL OPTIONS ...... 7 2.2 ARCHITECTURAL ISSUES FOR TORRENT ...... 11 3. SERVICE PROVIDERS, OPERATORS AND MANUFACTURERS REQUIREMENTS ...... 12
3.1 SERVICES, SERVICE COMPONENTS, AND THEIR CHARACTERISTICS...... 13 3.1.1 Telephony Services...... 14 3.1.2 Internet Services...... 15 3.1.3 Entertainment Services (interactive, real-time, non-interactive, non real-time)...... 16 3.1.4 Environmental systems (alarms, lights, heating, …)...... 19 3.2 ADDRESSING THE SERVICE REQUIREMENTS (THE OPERATOR AND MANUFACTURER VIEWPOINT) ...... 21 3.2.1 QoS ...... 21 4. TERMINALS...... 30
4.1 TELEPHONY TERMINALS...... 30 4.2 INTERNET TERMINALS...... 30 4.3 ENTERTAINMENT TERMINALS ...... 30 4.4 ENVIRONMENTAL TERMINALS ...... 31 5. HOME NETWORK PROTOCOLS, INTERFACES AND FUNCTIONALITIES...... 32
5.1 WIRED IN-HOME NETWORKS ...... 32 5.1.1 Ethernet...... 32 5.1.2 Copper pair...... 33 5.2 WIRELESS IN-HOME NETWORKS ...... 33 5.2.1 Bluetooth...... 34 5.2.2 IEEE 802.11b...... 34 5.2.3 HomeRF...... 34 5.2.4 DECT ...... 34 5.3 HOME NETWORK SECURITY ISSUES...... 34 5.3.1 Open and closed services...... 34 5.3.2 Resource sharing ...... 35 5.3.3 Policies and requirements...... 35 5.3.4 Anti-virus software...... 36 5.3.5 Suggested home network policy elements ...... 36 6. THE RESIDENTIAL GATEWAY...... 38
6.1 HIGH-LEVEL SYSTEM REQUIREMENTS ...... 38 6.1.1 Impact on Internet access ...... 38 6.1.2 Impact on home networking...... 39 6.1.3 Functional requirements...... 39 6.1.4 Basic interface configuration...... 41 6.1.5 Performance issues ...... 41 6.1.6 System requirements ...... 41 6.2 EXAMPLES OF POSSIBLE RG TYPES ...... 41 7. ACCESS NETWORK PROTOCOLS, INTERFACES AND FUNCTIONALITIES ...... 48 ______2 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
7.1 FIXED ACCESS NETWORKS...... 48 7.1.1 ISDN: Integrated Services Digital Network...... 48 7.1.2 XDSL Technologies (HDSL, SDSL, IDSL, VDSL, ADSL)...... 53 7.1.3 Powerline Communications (PLC) ...... 59 7.2 OPTICAL FIBRE (GLASS OR PLASTIC) ...... 63 7.2.1 ATM PON ...... 67 7.2.2 Ethernet PON...... 67 7.3 WIRELESS ACCESS NETWORKS ...... 69 7.3.1 Wireless Radio Access Networks ...... 69 7.3.2 Wireless Optical Networks...... 73 7.3.3 LMDS...... 77 7.4 WAVELENGTH DIVISION MULTIPLEXING (WDM)...... 80 7.4.1 WDM in a PON...... 81 7.4.2 WDM in access networks ...... 81 7.4.3 Application areas of WDM ...... 81 8. THE LOCAL ACCESS POINT...... 85
8.1 THE LAP HARDWARE ARCHITECTURE IN THE TORRENT PROJECT...... 85 8.2 THE LAP SOFTWARE ARCHITECTURE IN THE TORRENT PROJECT ...... 89 8.2.1 The TORRENT software structure in the first trials...... 90 8.2.2 The TORRENT software structure in the second trials...... 90 9. CORE NETWORK PROTOCOLS, INTERFACES AND FUNCTIONALITIES...... 92
9.1 CARRIER NETWORKS...... 92 9.2 CATV NETWORKS...... 93 9.2.1 Broadcasted TV...... 94 9.2.2 Voice over Cable (VoCable) ...... 94 10. MAPPING OF SERVICE REQUIREMENTS TO NETWORK RESOURCES...... 95
11. VALUE-ADDED FEATURES ...... 101
11.1 SUPPORT FOR ACCOUNTING...... 101 11.1.1 Introducing New Charging Schemes...... 102 11.1.2 Technical Implications of Using a Charging Scheme...... 103 11.1.3 Financial Implications of Using a Charging Scheme ...... 104 11.1.4 Systems integration ...... 105 11.2 SUPPORT FOR ADDING NEW SERVICE PROVIDER OFFERINGS...... 111 11.2.1 Firewall Services ...... 112 11.2.2 Adaptation of presentation / Content reformatting...... 113 11.2.3 Server based Games / Applications ...... 113 11.2.4 Web hosting...... 114 11.2.5 Caching...... 114 11.2.6 Load balancing / Content switching ...... 114 11.2.7 Datawarehousing...... 114 11.2.8 User store area ...... 115 11.2.9 Redundancy...... 115 11.2.10 Intrusion detection ...... 115 12. VALIDATION SCENARIOS AND CRITERIA ...... 116
12.1 EXAMPLES OF SERVICES THAT COULD BE VALIDATED...... 116 12.2 FEATURES TO BE VALIDATED...... 117 13. CONCLUSIONS...... 118 ______3 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
14. REFERENCES...... 119
15. ABBREVIATIONS ...... 120
______4 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
Executive Summary
The high-level user requirements deduced by TORRENT can be expressed simply: all of the required services should be accessible, with the limitation that the quality may be affected according to the capabilities of the access network and the terminal. Such presentation adaptation should be automated for the user (ie. the user need not be aware of the underlying network). When a choice of access and/or core network technologies are available, the most suitable one will be (dynamically) chosen according to the user's instantaneous requirement for best quality, fastest response time, or lowest price (based on the current network conditions). Where no specific requirements are given, the Residential Gateway and Local Access Point will decide based on the service selected, the terminal, the status of the available networks, previous experience and personalisation profiles.
Whilst Deliverable D1.1: “User Requirements” listed and analysed these requirements in some detail, this document concentrates on how operators and manufacturers can satisfy these user needs through a variety of networking technologies. Those being considered by TORRENT include the most widespread existing ones, such as ISDN and CATV, and emerging deployments, such as xDSL, powerline communication, wireless optical and LMDS. The mapping of technologies to underlying physical infrastructure is also presented.
Furthermore, this Deliverable introduces the control and management software features that TORRENT will develop to exploit the fact that users may be able to choose from a number of different home-, access- and core- network technologies. This control and management software will enable services to be routed to the most appropriate network, according to the instantaneous QoS requirements of the user.
The overall requirements for service providers, network operators and manufacturers is to have an agreed system architecture that enables the user requirements to be met in an efficient manner. This architecture is described in section 2. In order to develop the architecture into a fully functioning system, the services (service components) must be specified (section 3) and the equipment and functionalities for the home, access and core networks characterised, interfaces defined, protocols identified, and mapping policies (service components to network resources) must be derived. Each of these items is documented in an explicit section (4-9).
Value-added features include accounting, the support of a firewall at the local exchange, and the easy integration of specific service provider offerings, adapted for the user environment (current access network, home network and terminal capabilities).
To validate the technique, the appropriate hardware and software will be prototyped for feasibility trials. Some first ideas are given at the end of this document.
______5 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
1. Introduction
This document has been produced by WP1: Architectural Framework. WP1 defines the overall framework for the project, in terms of identifying the QoS requirements of typical services, and then mapping these requirements to the network capabilities of a variety of home networks (Home RF, DECT, IEEE 802.11b, Bluetooth) and access networks (CATV, fibre, xDSL, powerline communications, ISDN, wireless optical, LMDS). This architectural framework is fundamental to the rest of the project. This framework defines the context within which the QoS negotiation and service provision will operate, and it determines how services must be defined so as to enable them to be prioritised on the access network, and later routed onto the most appropriate core network. The framework defined in this Deliverable will be re-examined throughout the software development process, and especially following the first experiments.
This document begins with an overview of the TORRENT architecture framework, which is based on the typical network environments that currently exist, but extended with hardware and software functionality to provide more flexibility in the usage of the underlying networks for meeting the instantaneous requirements of existing and emerging services. These underlying networks, the associated protocols, and their capabilities for conveying specific services are then analysed in detail. Anticipated terminals, and the newly identified devices (the Residential Gateway and the Local Access Point - introduced in the architecture section), are also described, both in terms of the hardware and software.
With reference to the architecture, the document is then structured following a logical progression from the end user terminal, through the home networks, the Residential Gateway, the access networks, the Local Access Point, and finally the core networks (sections 4-9).
At the end of the document, some conclusions are drawn regarding the scope of the development work in the project and the trials that will be made.
______6 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
2. Architectural Framework The architectural framework must be designed in such a way as to be able to satisfy the first sub-objective of the project: to produce a test-bed to assess different options for residential access networks. A key feature of such an architectural framework is its ability to map service characteristics to network performance parameters.
The proposed architectural framework comprises: • All aspects of home network technologies and their connection to the access network via the Residential Gateway (RG). • The Local Access Point (LAP), which groups telecommunications, media and computing technologies. • The communication between the user, the RG and the LAP. • A software architecture covering the basic communication requirements between these entities as well as with the core network.
2.1 Architectural Options The network architectures that are present today have mainly evolved from services that had to be delivered over dedicated architectures. This situation has produced a multi-network architecture as shown in Figure 2.1. Each of these networks is completely independent of the other and employs a different type of transport. There is also no overall policy manager for the different networks and services. TORRENT therefore assumes that the RG needs the capability to select from a number of available co- existing access networks, the one that is most appropriate at the time for carrying the service (according to, for example, the selected QoS). The design will be modular and (having several physical interfaces) represents a practical and evolutionary approach. This approach also allows the demonstration of the fullest flexibility and greatest degree of network negotiation and selection according to customer’s quality and cost requirements on the access domain. The goal for TORRENT is to be able to treat the – possibly many and varied - access and customer premise networks as a single resource, capable of servicing all the communication requirements of the customer. A single physical type of access is an extreme subset of this architecture, which – whilst technical feasible, possibly more cost effective for the user, and perfectly applicable in some situations – may not be realistic in others. For example, regulations may demand the powering of the end-user terminal from the local exchange, when the mains power fails. Other reasons for a user having several types of access networks are: reliability, pricing policy changes and technical interoperability issues. Indeed, many users today already have the opportunity to be connected to a multiple of network operators (eg. tele-communications operators and CATV) and have the choice of different services from the same operator (eg. analogue, ISDN, ADSL). The functions in the RG are simplified if only one physical access network is available (as shown in Figure 2.2), but some of the complexity is then shifted to the LAP. For design purposes, TORRENT accepts that several different types of access network will co-exist. In this environment, customers can freely subscribe and un-subscribe to the access networks of their choice, without having to make any changes to the RG. The management of the information requests will be under a policy management scheme that works with the RG of the customer and the LAP, who might be one of the service providers.
______7 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
The essential innovative feature of TORRENT is that it develops - and demonstrates through a test-bed – intelligence to enable each type of network to be exploited for the customers’ instantaneous QoS expectations.
Entertainment service provider or network operator local access point gateway (LAP) STB
coaxial cable access network cable Internet modem service provider or LAN gateway network operator no overall policy manager Telephony xDSL modem service provider or gateway network operator
NA copper pair access network switch & local P access point customer network access network (SW / LAP)
Figure 2.1: TORRENT Architecture (user has connectivity to parallel access networks)
Whilst a desirable network architecture goal for TORRENT might be a single access and customer premise network to service all the communication requirements of the customer as shown in Figure 2.2, it is not reasonable to consider that such an architecture will be widespread in the market within the next ten years. The goal of TORRENT is to develop a single architecture that will permit the customer to use his terminals independently of the access networks that are available to him. This entails the enabling of multiple networks to operate as one and the evolution, if that is required, into a single access and customer premises network.
______8 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
service provider or Usage policy: Core network / ISP selection: network operator - service access network mapping - resource knowledge - user preferences -service requirements
gateway
LAN
service provider or single NAP network operator access network local (from a user access point perspective) (LAP)
customer network access network service provider or network operator Figure 2.2: TORRENT Architecture (user has connectivity to a single access network only)
This converged network architecture presupposes that the Telephony service will be incorporated into the bundle of other services. Whilst this is possible there may be customer, regulatory and evolutionary issues that will keep it as a physically separate service. Also, it is not reasonable to assume that all customers will be able to receive the broadband access transport services due to their location and the cost of installation. It will be many years before optical fibre reaches the majority of the customer base. Figure 2.3 shows an architecture that provides the basic Telephony service in parallel to the broadband service, which could be over optical fibre or coaxial cable. The Telephony service is also shown providing a low data rate (48 kbits/s) and xDSL service. By keeping these options, an evolutionary approach can be taken.
______9 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
Core network / ISP selection: - resource knowledge service provider or -service requirements network operator Usage policy: - service access network mapping - user preferences
LAP NA P
other access networks service provider or LA network operator N gateway
n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc gateway
NA copper pair local n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc Telephony P access network interface access point (LAP) Telephony service provider or customer network access network network operator
Figure 2.3: Hybrid Telephony Architecture (user has access to both copper pair and other networks)
There are a number of reasons why a user may decide to use more than one access network, including: • Reliability (access to more than one LAP, via multiple physical access networks increases the availability of access to services) • The pricing policies of the service providers may change. Having a multiple choice allows a fast reaction to such changes • Regulatory conditions currently require a telephone to be powered from the local exchange in cases of emergency (loss of mains power). Whilst a user may access broadband multimedia services over fibre or CATV, a copper pair connection may also be necessary, in order to satisfy the regulatory conditions • It may not be possible to access some services via one access network or service provider’s LAP, due to the physical capabilities of the access network, or missing inter-LAP agreements. • The majority of ADSL modems delivered to consumers are “best effort” modems (QoS mechanisms are not supported), optimised for Internet surfing. Hence, voice applications can be disturbed by other applications that are accessed simultaneously. This will cause unacceptable delays for the voice application. Hence, if a “best effort” modem is installed at the user, then it is desirable for the user to split the Telephony service onto an analogue subscriber line or an ISDN line. • Security aspects of the access and core networks: An ISDN line to a physically protected local exchange is less prone to attacks than cable or ADSL. In traditional PSTN/ISDN networks the network elements are physically secured and remote access is restricted via dial-up modems. In the Internet arena, it is almost impossible to rely on physical security as geographical distances can no longer be considered obstacles for attackers with respect to cost. The use of an IP address for subscriber identification instead of a physical line termination also increases the opportunities for attackers as it will be easier for the attacker
______10 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
to avoid discovery eg. via IP spoofing. Cable and powerline networks are more vulnerable to eavesdropping than traditional PSTN/ISDN networks.
2.2 Architectural Issues for TORRENT Each of the access systems in use has its own set of protocols. Since the goal of the TORRENT project is not to develop an architecture that employs all new processes, the project will have to consider which of these protocols offers the best solution for customer access. Whilst it is not possible for the TORRENT project to address all the architectural options involved with customer access, the following tables show the protocols that will be considered in the TORRENT project.
Access Network Technologies Analogue Low rate Cable Optical ISDN xDSL LMDS Powerline voice band digital modem modem Physical Layer Coaxial Optical Copper pair Wireless Mains cable fibre cable
New protocol Adaptation to existing developed within protocols TORRENT
Table 2.1: Access Network Technologies considered by TORRENT
______11 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
3. Service providers, Operators and Manufacturers Requirements The following figure is expanded from D1.1 and explains the manner in which the data from an application is encoded and encapsulated for transportation over various networks.
Fixed MUX Raw audio Xfer mode Bearer W/FDM Optical TDM fibre Raw video (SDM) Coax
Stat MUX Copper pair (ATM) (XDSC) Data I/P (MPLS)
Encoding (and possibly compression)
Figure 3.1: Services and their Transportation
The following table summarises those characteristics / requirements from Deliverable D1.1 that are important for operators and service providers.
User Requirements Operator/Manufacturer Challenges (from D1.1) Personalisation To customise services to users’ needs Self Provisioning To give users control Flexible Billing To enable the move away from traditional billing paradigms Mobility To provide access to the same services wherever the user is located Speed To enable applications on demand, and always-on connections Quality Providing consistent performance
Table 3.1: Mapping User Requirements to Operator/Manufacturer Challenges
In order to develop solutions for the user requirements in Table 3.1 into a fully functioning system, based on the architectures in section 2, the services (service components) must be specified, the equipment and functionalities for the home, access and core networks characterised, interfaces defined, protocols identified, or developed, and mapping policies (service components to network resources) must be derived.
______12 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
Consideration must also be taken of the transportation means in Table 3.1. These aspects are described in the following sub-sections.
3.1 Services, Service Components, and their Characteristics The required services and respective access and core networks are described in the TORRENT Deliverable D1.1: "User Requirements". In that document, the services are divided into four categories as follows: • Telephony • Internet • Entertainment • Environmental Network operators and service providers presently provide one or more of these services over dedicated access networks. This diversity leads to an overly complex network structure due to the different protocols employed in multiple layers of the protocol stack. There are a number of efforts to arrive at an integrated set of protocols, but these do not involve any test bed evaluation or focus on only on one or two of the services. One of the difficult parts of the TORRENT project is how to address the multifaceted Telephony service. This service has a legacy in customer culture, regulations and invested equipment. It also is viewed by some as an outdated service that will be replaced by Internet services. Others see that IP telephony can be bundled with other services as a “best effort” service co-existing with a more secure and reliable connection oriented Telephony service. The other three service areas are much more straightforward without the built-in problems of the Telephony service.
Figure 3.2: Services and their Delivery Mechanisms
The major architectural difference between the Telephony service and the Internet service, as discussed in the TORRENT D1.1 Report, "User Requirements," is where the intelligence that processes the information is ______13 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers located. For Telephony services it is located in a central office facility, but for the Internet it is in the customer terminal as shown in Figures 3.1 and 3.2.
3.1.1 Telephony Services The Telephony service presents a challenge for the TORRENT project, because it is viewed differently by each administration and operator or service provider. The legacy in customer culture, regulations and invested equipment means that certain features need to be retained in the basic architecture and their evolution has to be considered. The basic voice service has become a part of the global culture, and many of its attributes have become part of everyday life. These attributes are: • High system reliability • Guaranteed QoS (through the use of dedicated circuits and a signalling scheme, prior to connecting the call to check whether or not sufficient end-to-end capacity is available) • The ability of the system to identify the calling location (eg. for emergency services) • Remote power • Worldwide interoperability. • No customer involvement in basic service compatibility
3.1.1.1. Voice Service The present Telephony service has been focused mostly on voice, with support for dial-up modems. ISDN has found a role in the support of higher data rate access for Internet service, and the availability of 2 channels enables simultaneous voice and data communication. However, telephony needs to move forward if it is to support multimedia services in the same manner as it supports voice. This means that any new architecture needs to address customer devices such as screenphones and soft switches interconnected over copper pairs.
The Telephony services identified in the TORRENT D1.1 Report, "User Requirements" are voice, data and multimedia. The voice service should evolve into a digital one that is compatible with both multimedia and Internet voice services like H.323 over copper pairs. The remote power issue should be considered and an approach recommended. A low to medium (48 to 128 Kbits/s) speed data service should continued to be part of the telephony offerings, but it should not use the assets of the voice service as it presently does. This additional data capacity could be shared with the multimedia service.
System Intelligence
Subscribers Analogue voice Digital Switch and Control Analogue POTS Line Matrix Trunk Analogue POTS cards cards Back Bone Analogue POTS
Figure 3.3: Present Day Switched Analogue Voice Service (Intelligence is in the central office, the telephone is a "networked computer")
______14 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
The evolution of the analogue voice terminals, through digital voice terminals, is predicted to lead to simple “Multimedia Phones”, using the capabilities offered by xDSL (or even ISDN).
3.1.1.2. Multimedia Service
Customers System Intelligence
n,xnv,xnv,xnv ,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc Digital xDSL and Control n,xnv,xnv,xnv ,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc MM Phone n,xnv,xnv,xnv,xnvnxccnxv,xnx ,cn,cxvnx,zcvnxc n, xnv,xnv,xnv,xnvnxccnxv ,xnx,cn,cxvnx,zcvnxc n,xnv,xnv,xnv ,xnvnxccnxv,xnx n,xnv ,cn,cxvnx,zcvnxc ,xnv,xnv,xnvnxccnxv n,xnv ,xnx,cn,cxvnx ,xnv,xnv,xnvnxccnxv ,zcvnxc ,xnx,cn n,xnv ,cxvnx,zcvnxc ,xnv,xnv,xnvnxccnxv ,xnx,cn ,cxvnx,zcvnxc n,xnv ,xnv,xnv,xnvnxccnxv ,xnx,cn,cxvnx ,zcvnxc Data MM Phone CO CPU Back Bone
Digital POTS
Figure 3.4: Simple Multimedia Service (Intelligence is in the central office, the terminal is a "networked computer")
The customer terminal for multimedia services (see Figure 3-4) should be: • low cost (about 200 Euros) • thin client • touch screen and voice entry • easily extendable (daisy-chaining) • capable of having a keyboard attached (no mouse is envisaged) • combined fixed and wireless
The Multimedia exchange that handles the traffic from such devices should: • use simple information formats (voice, display screen) and • not compete with the Internet and its Web services
3.1.2 Internet Services The "Internet service" began as Internet browsing, file transfer and e-mailing, but value-added e-commerce services are being incorporated, to exploit the basic functionality of data-oriented interactivity; eg.: home shopping/banking, travel booking, and - with the availability of higher bandwidths (thereby reducing delays) – voice.
The following services were described in D1.1: • Voice (Internet) services • Internet browsing (home shopping, travel, banking) • E-mailing
______15 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
• File transfer (working from home)
3.1.3 Entertainment Services (interactive, real-time, non-interactive, non real-time)
Macro Cell PCS Micro
Back Bone Switched Video ATM/IP ATM Services ATM ISP and IP Services IP Subscribers MUX Switch
n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc Digital Switch
n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc n,xnv,xnv,xnv,xnvnxccnxv,x nx,cn,cxvnx,zcvnxc DSU n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc Router n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc Data n,xnv,x nv,xnv,xnvnxccnxv , xnx,cn,cxv n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxcnx,zcvnxc Fiber TV n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc SW VDSL Loop CO Switch Trunk MUX CPU Matrix Trunk DSU Router Voice Cards Cards PC ADSL
n,xnv,xnv,xnv,xnvnxccnxv,xnx,cn,cxvnx,zcvnxc PC Modem Line Back Bone
kxvsdfsldfjsldfj fggh kxvsdfsldfjsldfjfggh kxvsdfsldfjsldfjfggh Cards kxvsdfsldfjsldfjfggh Voice kxvsdfsldfjsldfjfggh kxvsdfsldfjsldfjfggh Trunks Digital Analog POTS POTS Multi media Phone
Figure 3.5: Entertainment Services (PC, TV, Stereo, Switched Video, Internet (including games))
3.1.3.1 Interactive TV and games Interactive TV invites the users to interact with the programmes and advertising, making it possible to access more information related to the programmes they are currently watching, to participate in discussion forums, to select among different camera views or to buy products that are being advertised. The users increase their options to decide, and change from being passive spectators to interacting actors. Interactivity is seen as a potential opportunity for new revenue streams for content providers. Advanced set- top boxes enable interactivity, promising to transform dumb TV sets into instant film libraries, communication tools, shopping outlets, games and general entertainment centres. The return channel required for interactivity can use the same physical medium for television distribution (in the case of bi-directional CATV networks), or use a different network (such as PSTN) should the TV be broadcast over the air (including satellite). Interactive TV services are mainly asymmetric, as the bandwidth requirement for the upstream direction is usually much lower than for the downstream direction. This is because the information that flows from the customer premises to the head-end is essentially only to signal user actions, such as the selection of the interactive link, browsing, game movements, and additional requests for information.
______16 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
Currently, interactive TV services and games are also being offered by non-traditional networks, like xDSL. However, the bandwidth required to transmit good quality video demands that the copper portion of the network to the user is short.
The various degrees of interactivity and real-time nature of entertainment services can be summarised in the following figure:
REAL TIME TV / Video Games HDTV Streaming Interactive TV VoD
NVoD
INTERACTIVITY
Figure 3.6: The Interactive and Real-time Nature of Entertainment Services
This category of services began with television, but is becoming an integrated set of services that require broadband - and, increasingly, interactive - access (Infotainment). While there are many services being proposed for this category, the main services for the user include some video component. The bandwidth requirements for entertainment services vary widely, depending upon what is being offered. These requirements range from a few kbit/s for the upstream control, to Mbit/s for the video streaming (generally downstream only) of high quality movie pictures. Variable Bit Rate (VBR) encoding helps to lower the video throughput, by at least a factor of 2, when a small packet loss is acceptable. The liberated bandwidth can be used (for example) to increase the video size or reduce the start intervals in NVoD systems. MPEG-1 is a compressed digital video format that was designed to provide VHS picture quality in the broadcasting field. The need for better picture quality (but using higher bit rates) led to the development of MPEG-2. MPEG-2 is the format of choice for High Definition Television (HDTV), Digital Television, in- flight entertainment, and Digital Versatile Disc (DVD). MPEG is versatile, flexible and provides superior quality for all kinds of applications. MPEG's dynamic bandwidth is very scalable. It allows a high compression rate to be applied to parts of frames where there is little video or audio information and a low compression rate where there is a lot of information. Efficient compression means each file can be as small as possible, enabling more content on (for example) a DVD without sacrificing playback quality. The examples here can be differentiated by their level of interactivity and real time demand; i.e. interactive real-time services (like games and interactive TV), and interactive, but non-real-time services (e.g. Near VoD). Broadcasted TV (including HDTV) is an example of a non-interactive, but real-time service.
______17 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
For VoD, there is only a small traffic volume in the upstream direction for the selection/control of the video service and a significantly larger one in the downstream direction for the video data itself. The available bandwidth in the downstream direction determines the achievable video quality. The available bandwidth in the downstream direction determines the achievable video quality. Usually, the video data is stored in a format that allows the sending of the same pictures with different resolutions depending upon the capabilities of the access network. DVD-like quality in resolution, frame rate and artefacts, requires a bandwidth of approximately 4 Mbits/s. This is a reduction by a factor of about 10 from the raw video data. The nature of VoD (VCR-like functionality) requires a stringent real-time response time. The throughput must also remain very constant to maintain the quality of the video data. Interactive games have in common a more or less stringent real-time characteristic, which depends upon the speed of the game. It may be difficult to support the most stringent bandwidth requirements of some types of game applications over all access networks, but the required bandwidth does depend upon the specific game, it’s design, and the generated traffic pattern. The amount of data exchanged between a client and the server is also heavily depending upon the type of the game, as there are (for example) text based and graphical adventures, strategy games, jump and run games and first person shooters to name only a few. Also some games are more asymmetric than others, with the main processing performed at the server, and only the details of the actions being sent from the players. There is much research presently on this topic. It is quite usual to also have in parallel some audio communication between the players of a game. This adds a small amount of bandwidth, but no other requirements.
NVoD alleviates the core network requirements in terms of bandwidth. Requests for the same movie within a period of time are grouped together and served as a single multicast stream, which usually requires delaying requests or satisfying them only at predefined time schedule As with VoD, also for NVoD there is only a small traffic volume in the upstream direction for the selection of the TV channel or video film, and a significantly larger one in the downstream direction for the video data itself. There are fewer real-time requirements than for VoD, since the user can merely accept to view at one of a number of pre-determined programme start times. A constant propagation delay is not a problem, but there is a need for a very constant throughput for the video data to keep the playback running and the quality constant as well. The real-time requirement in the core network can be relaxed if the system is designed to buffer the video data at the edge of the network for a few minutes (though this assumes that the user is sufficiently patient to select the desired video some time ahead of actually starting the playback. The extreme case is to download complete video films to the user premises e.g. during the day while he/she is at work, so that they are available for viewing in the evening. This requires large storage capacity at the user premises, and due to the long time shift, it is debatable whether the term NVoD is still appropriate for this scenario.
3.1.3.2 Application Service provider Application Service Provisioning (ASP) refers to a changing paradigm in current software distribution and management strategies. Traditional business models refer to customers (either residential or business) purchasing and administering their own applications, basically paying a one-time fee independent of the usage of this application, and yearly payments by the user to obtain updates and the support by the software manufacturer. ASP introduces a different business model by which a software manufacturer leases its software over a communication network (ie. the Internet) to a user or group of users. The users pay back a periodic fee that is dependent upon the actual usage of the application. Automatic updates as well as built-in maintenance are other added value features under this new trend. ______18 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
ASP relies basically on a client-server architecture running on a stable (in terms of QoS) communication network. The server houses the application and associated databases, sending to the customer replicas of the computer screens that would be viewed on a traditional desktop. Therefore, guaranteeing the QoS of the communication link between server and subscriber is a vital part of the success of this new business model. The general trend in the ASP model is that the communications link will be based on the Internet, mainly relying on IPv4 (and later IPv6) protocols. The main terms that will affect an adequate deployment of the ASP technologies are server loads and the capabilities of the communications links. Under the EoNEP concept, the TORRENT architecture supports both of these items, particularly by offering service providers the opportunity to house the applications in the Local Access Point, instead of in the core network. The server at the edge of the network acts as a secondary server to the user. Under this architecture, the QoS of the whole service is isolated from the communications link and particularly from the state of activity of the internal Internet, which is unpredictable and may offer no guarantee for a reliable service. Furthermore, response times from the network will reduce, and traffic over the Internet backbones will also be reduced; thus lowering the cost of the communications link.
3.1.4 Environmental systems (alarms, lights, heating, …) The networking of equipment in the home will be a major growth area in the new few years. Driven by the need to inter-work between telephones, televisions, VCRs and PCs, the complete range of consumer goods (including heating, lighting and alarms) will in the future have the capability to be connected to the communications network. This will permit the remote reading of meters for gas, oil, electricity, water, etc., to become commonplace. Environmental systems, including alarms, meter reading, control of lights, heating, etc. are vital systems in every home. Today most of these devices are either stand alone, or connected to a proprietary network. This will change in the future, more and more of these devices will be networked and the networks will be more standardised. Even though these systems generates low bit rates, and the requirements on the transmission system are rather low, these services are very complex to handle because of the many participants involved and the security requirements. On the whole 5 different types of participants are involved: • End User • Service Integrator • Service Provider • Network Operator • Manufacturers
End User In a building the different ECDs (Environment Control Devices) are networked in one or more different networks. There are mainly two types of ECDs: • sensors that collects data from the environment. Examples are meter readers, motion detectors, temperature sensors, cameras, remote controls, etc. • actuators that controls an actual equipment
______19 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
The different sensors generate data contiguously that has to be analysed locally by some kind of server functions. Based on this analyse several things may happen • the data is logged • one or more specific local actuators are invoked • a message is sent to the customers mobile, or other customer equipment • a service provider is alerted • a service integrator is alerted. The control and configuration of functions may be performed either locally or remote by the customer, by a service integrator, or by the service provider.
Service Integrator Service integrators do not need to be present in this concept, but such functions seem to be advantageous for both the end users and the service providers. The function of a service integrator is to be a common access point for an end user to different services, and perform functions that are necessary and common for all service providers. The service integrator may also perform operation and maintenance of user equipment necessary for providing these types of services.
Service Provider The service provider in this context is the provider of the actual end service to the end user. For example, an alarm company that offers alarm services to customers, and when receiving an alarm message, performs a predefined set of actions. There may be several service providers for each service, and a service provider may handle several different services.
Network Operator The role of the network operator is to convey this type of information at any time to any location in a secure, cost effective and reliable manner.
Manufacturers Manufacturers should develop equipment that is: • Connectable to a non proprietary network • Reliable and secure • Low cost • Easy to install, use, control and maintain.
3.1.4.1 Security The Service Provider and/or Service Integrator is responsible for providing the service with adequate security mechanisms in place. For example, if access to the service is provided over the Internet, then some form of strong authentication should be provided to prevent fraudulent use of the service or sabotage. Non- repudiation should also be required so that the abuser/offender can be held accountable for actions. However, this is one of the most difficult problems facing the security industry. This may be achieved using certificates. ______20 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
Limiting access to the service to calls from only one mobile telephone number may be an acceptable option, although this solution has drawbacks.
3.2 Addressing the Service Requirements (The operator and manufacturer viewpoint) The ability truly to deliver quality of service will separate the winners from the losers in the packet-switched future. 1n broad terms, the quality of service of a wide-area network is a measure of how well it does its job-how quickly and reliably it transfers various kinds of data, including digitised voice and video traffic, from source to destination. Back when networks dealt pretty much exclusively with voice telephony, the subject hardly ever came up. The circuit-switched telephone system was designed specifically to satisfy the human ear. It did, and it does. Nowadays, with the advent of packet switching and the proliferation of many kinds of communications traffic (time-sensitive financial transactions, still images, large data files, voice, video, etc.), there are more than one set of criteria to satisfy. The data rate needed for satisfactory voice communication may take an intolerable time to transfer high-resolution images. Conversely, the degree of network latency acceptable in transferring some files may not be adequate for real-time voice. So QoS has become a hot topic, and the contracts that specify it, called Service Level Agreements (SLAs), are becoming more and more common, at least between service providers and their largest customers. In fact, as incumbent providers of telecommunications service are increasingly being challenged by competitive carriers, QoS has become a convenient marketing tool for both. The long-distance carrier AT&T Corp., for example, offers standard and gold versions of its SLAs. Rebates are credited to customer accounts when guaranteed service levels are not met.
3.2.1 QoS Technically, QoS refers to an aggregation of system performance metrics. The five most important of these are:
• Availability: Ideally, a network is available 100% of the time. Criteria are quite strict. Even so high- sounding a figure as 99.8% translates into about an hour; and a half of down time per month, which may be unacceptable to a large enterprise. Serious carriers strive for 99.9999% availability, which they refer to as "Six nines," and which translates into a downtime of 2.6 seconds a month.
• Throughput: This is the effective data transfer rate measured in bits per second. It is emphatically not the same as the maximum capacity, or wire speed, of the network, often erroneously called the network's bandwidth. Sharing a network lowers the throughput realisable by any user, as does the overhead imposed by the extra bits included in every packet for identification and other purposes. A minimum rate of throughput is usually guaranteed by a service provider.
• Packet loss: Network devices, like switches and routers, sometimes have to hold data packets in buffered queues when a link gets congested. If the link remains congested for too long, the buffered queues will overflow and data will be lost. The lost packets must be retransmitted, adding, of course, to the total transmission time. In a well-managed network, packet loss will typically be less than 1% averaged over, say, a month.
______21 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
• Delay: The time taken by data to travel from the source to the destination is known as delay. Unless satellites are involved, the latency of a 5000 kms voice call carried by a circuit-switched telephone network is about 25 ms. For the public Internet, a voice call may easily exceed 150 ms of delay because of: signal processing (digitising and compressing the analogue voice input) and congestion (queuing).
• Jitter (delay variation): This has many causes, including: variations in queue length; variations in the processing time needed to reorder packets that arrived out of order because they traveled over different paths; and variations in the processing time needed to reassemble packets that were segmented by the source before being transmitted.
Applications vary in their QoS requirements (see Table 3.2). A long file transfer needs a high throughput and low packet loss, but is not very sensitive to delay and jitter. Live videoconferencing, on the other hand, also needs high throughput, plus it is sensitive to both delay and jitter. It is these differences that must be considered in writing the SLAs between service providers and their clients. The usual agreement specifies the end-to-end performance to which the client is entitled over a specified time interval - a month or a quarter, for example.
Table 3.2: Applications and their QoS Requirements
QoS is largely about priorities. At network aggregation points, like routers, multiplexers, and switches, data streams with different QoS needs are combined for transport over a common infrastructure. Satisfactory QoS has two main requirements: a means for labelling flows with respect to their priorities, and network mechanisms for recognising the labels and acting on them. Some networks - notably, those that use the Asynchronous Transfer Mode (ATM) protocol - have extensive provisions of this kind.
______22 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
3.2.1.1 ATM ATM specifications define service classes according to the basic characteristics of the main communication applications and define many QoS parameters to specify the required service with a high granularity. ATM introduced among others new concepts like fast switching using a constant length of packets (cells), the virtual circuit (VC)/virtual path (VP) concept and the dynamic hierarchical organisation and routing using the Private Network Node Interface (PNNI) protocol. Partly because of it's complexity in terms of signalling, traffic management and resource allocation, and especially the existing predominance of the Internet Protocol for PC-based multimedia and data applications, ATM never succeeded to become the single protocol that would enable the convergence of networks and applications. Unfortunately, the lnternet does not, and neither do the similar IP networks based on the Transmission Control Protocol/ Internet protocol (TCP/IP) suite. IP is a best-effort protocol in that it does not guarantee delivery of data packets. Confirmation of the arrival of data packets at the destination is the responsibility of the TCP, which sits just above the IP in the well-known seven-layer open systems interconnection (OSI) reference model promulgated by the International Organisation for Standardisation (ISO), a worldwide federation of national standards bodies. If any packet is not delivered (as determined by checking the sequence numbers of packets at the destination), TCP requests a retransmission of the missing packet, thereby ensuring that all packets eventually get to the destination. This is effective, but slow. Therefore, TCP is generally used by applications that are not time- sensitive. Real-time applications cannot take advantage of TCP. Obviously, the time needed for keeping track of missing packets and re-transmitting them is not acceptable in such cases. So these applications rely on what is essentially a stripped-down version of TCP known as the User Datagram Protocol (UDP), which runs faster than TCP by omitting some of its functionality. Applications that run over UDP must either have those missing capabilities built into them or else do without. In the case of voice communications where re-transmitting packets takes too long to be of any value anyway, missing packets are simply lost. Internet telephony, therefore, will work only over networks that are quite reliable to begin with, like fibre-based networks with modern switches and routers.
The IETF - the protocol engineering and development arm of the Internet Society, has proposed several methods for improving QoS, including IntServ, DiffServ, and MPLS (see Figure 3.7). Some typical applications are indicated in the top layer of the diagram, while the second layer shows the different procedures proposed by the task force for handing them.
______23 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
Figure 3.7: Classes of service and the mechanisms for supporting their QoS requirements
3.2.1.2 IntServ Integrated service (IntServ) is the earliest of these procedures. It assigns a specific flow of data to a traffic class, as it is called, which defines a certain level of service. It may, for example, require best-effort delivery. It might even impose some limits on delay. Once a class has been assigned to the data flow, a so-called path message is forwarded to the destination to determine whether the network has available the resources (transmission capacity, buffer space, etc.) needed to support that specific class of service. If all devices along the path are found capable of providing the required resources, the receiver generates "resv” message and returns it to the source indicating that the latter may start transmission of its data. The procedure, known as the resource reservation protocol (RSVP), is repeated continually to verify that the necessary resources remain available. If the required resources are not available, however, the receiver sends an RSVP error message to the transmitter. Although IntServ has some attractive aspects it does have its problems. One obviously, is that it has no means of ensuring that the necessary resources will be available when wanted. Another is that it reserves network ______24 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers resources on a per flow basis. If multiple flows from an aggregation point--say a communications sever in a local-area network--all require the same resources, the flows will nevertheless all be treated individually. The resv message must be sent separately for each flow. In other words, IntServ does not scale well, and so wastes network resources.
3.2.1.3 DiffServ The procedures of IntServ are improved upon in another method from the IETF, one known as differentiated service (DiffServ). With DiffServ, a short tag is appended to each packet depending on its service class. Data flows having the same resource requirements may then be aggregated on the basis of their tags when they arrive at the edge routers. The routes at the core can then forward the data flows toward their destinations on the basis of their tags without examining the individual packet headers in detail. Since most of the decision- making is in this way transferred from the core routes to the edge routes, the core network runs much faster In the past, QoS planners supported both IntServ and DiffServ. At present, however, the trend is to use DiffServ supplemented by some of the resource reservation capabilities of RSVP at the edges.
3.2.1.4 MPLS A newer approach to speeding the transmission of data through a network is Multiprotocol Label Switching (MPLS), also a procedure promulgated by the IETF. Normally under IP, packet headers are examined at every transit point (multiplexer router or switch) in a network. This takes time and contributes to the overall data delay. A more efficient approach would be to label the packets in such a way as to make it unnecessary for each IP packet header to be analysed at points intermediate between the source and destination. MPLS does this by appropriately labelling IP packets at the input of label edge routers located at the entry points of an MPLS-enabled network (see Figure 3.8).
Figure 3.8: MPLS
______25 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
The procedure works as follows: the label edge router examines the incoming packets and decides - based on the packet’s source address, destination address, and priority level - where to send it for its next hop through the network It also attaches a 32-bit tag, known as an MPLS label, to the packet. The MPLS label contains such information as whether the packet should be treated as MPLS traffic or routed as an ordinary IP packet; whether it conforms to IPv4 or IPv6; the packets “time to live”; and, of course, what its next hop should be The edge router then forwards the packet to the router at the end of the next hop. That router, in turn, examines the MPLS label and decides on the next hop for the packet. That second router then creates a second MPLS label. The two labels are swapped before the packet is forwarded to the second hop. The process is repeated until the packet reaches its destination. This procedure has two advantages over normal IP routing: • the routers along the path need not read and analyse a packet’s complete header information, just the shorter MPLS label. This alone saves some time. • the swapping of labels leaves a trail in the registry of the routers that other packets in the same session can follow. Once the packet establishes a path, decision-making at intermediate points is eliminated to a great extent. This markedly speeds up the transfer of data. Many network service providers have installed label edge routers and are about to roll out MPLS services. Cable & Wireless has started offering MPLS for its transatlantic links, which join New York City and Washington, D.C., to London, Amsterdam, and Frankfurt, Germany. Cable & Wireless plans to introduce MPLS in all of its OC-192 (9.953 Gb/s) fibre networks between now and the end of 2001.
3.2.1.5 Common Open Policy Service Technologies that involve both software and hardware now exist to detect the requirements of each data flow on the fly - inferring them from, say its source or destination IP address instead of reading them from a special label. Once a specific application in a session is detected, it can be given the priority to which it is entitled. But until recently, a client’s network administrator had to inform the service provider about each and every change in the priorities of data generated by certain applications. As this process costs time and money, many clients have been discouraged from requisitioning the enhanced services in the first place. However, a client can add advanced services much more easily, thanks to a new tool for assuring the QoS of a network. Known as the Common Open Policy Service (COPS) protocol, the tool is more adaptable to a customer’s own requirements, allowing those requirements to vary with time of day, application, or even user session. The requirements and the rules for allocation of system resources known as policies are decided in advance. The objective is to specify a service in unequivocal terms and to allocate the resources required to deliver that service. Policy information is stored in a policy server from where it is shared with other network devices using COPS. The rules follow an IF, WHAT, WHEN, and THEN logic. A typical sequence of events could be: IF: The user belongs to the computer-aided design group # 003 and WHAT: the application of the design of a rocket engine and WHEN: the time is between 0800 and 1400 hours on Monday through Friday THEN: the user is entitled to: a service level S, that gives a throughput of X kb/s with an end-to-end latency of no more than Y ms.
______26 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
The service level could also specify other parameters, such as constant-bit-rate service. Once a user has put such a policy in place, it becomes easier for the client’s network administrator to configure and adapt the system to the company’s changing circumstances. The three principal elements of such a policy-based traffic management system are (see Figure 3.9): • policy creation and storage • interpretation, • enforcement
Figure 3.9: The Common Open Policy Service
When a data packet arrives at the input port of the enforcement device, the device first determines the classification of the data by some predefined criteria. Then, using the COPS protocol and the well-established simple network management protocol (SNMP), it checks with the policy interpreter as to the QoS to which the packet is entitled. The policy interpreter, in its turn, verifies the status of the data by pulling the policy
______27 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers rules using the lightweight directory access protocol (LDAP), a protocol commonly used for exchanging information among directory databases. With the help of the information thus retrieved, the interpreter determines what are called the rights of that particular data packet. On receipt of information on these rights, the enforcement device sends the packet, properly tagged onward to a router. If the same type of data, such as a request to a specific Web site, is found to be repeating often, the rules could be temporarily cached in the enforcement device itself. Vendors, such as Cisco Systems, Juniper Networks, Extreme Networks, and Nortel, are already shipping servers and routers that can run COPS. And start-up service providers like Yipes are creating dynamic QoS- on-demand environments, to provide capacity adjustable in increments that are as small as 1 Mbit/s for time- sensitive applications. But interoperability problems do exist when attempts are made to have products from different vendors work together. These problems will have to be solved before policy-based networking becomes ubiquitous. Nevertheless there is a growing worldwide adherence to COPS.
3.2.1.6 Measuring and Monitoring QoS Notwithstanding the methods used for assuring QoS in a virtual private network (VPN), measuring and displaying the parameters are vital. If customers cannot feel assured of getting the service they are paying for, how likely are they to continue paying? Fortunately, the TCP/IP protocols are also well suited to measurement of metrics like throughput, forwarding rate, and packet loss. Several vendors, such as Micromuse, Visual Networks, Netscout, Infovista, Sitara Networks, Netcom Systems, Lightspeed Systems, and CrossKeys Systems specialise in QoS monitoring, filtering, and reporting equipment.
3.2.1.7 Service Level Agreements (SLAs) For approaches, which do not apply an explicit signalling of traffic parameters, Service Level Agreements (SLAs) are specified between customer and operators. These SLAs again describe the allowed volume and characteristics the network input traffic has to keep to and probably also additional parameters like (for example) availability, but not on a per-flow basis. In both cases the network operator will ensure that the traffic corresponds to the contract or the SLA in order to be able to provide QoS at all and not to reduce the quality of other traffic flows by admitting ill behaving ones. The main difficulty in this context is always, that the QoS requirements and the traffic parameters have to be specified somehow. Currently, most applications are not able to do this and it is also very unlikely, that the customers will do this in a complicated way. Moreover, the customers are mainly interested in and want to have influence on their perceived quality that depends upon many factors. A mapping into the necessary parameters of a SLA or another traffic contract can therefore be demanding. This stimulates new approaches in the customer-operator interaction. The current trend caused by the availability of QoS in networks is the merging of classical telephony networks and data networks into converged networks which are able to support all types of services on one common networking technology. The need for an improvement of traffic control and network management in combination with better interoperation and ease of use is not only still there but moreover even reinforced because a degradation of already accustomed quality will not be accepted. This goal is precisely in-line with the aims of TORRENT. The SLA is where the provider’s technical competence, dedication to service, and business integrity is revealed. SLAs are “… one part technical, one part contracting, and three parts negotiating ….”. Carriers have a vested interest in minimising their exposure to penalties; end-users have an equally vested interest in
______28 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers maximising it. In order for both sides to maximise their gains, a clear understanding of one’s own business objectives is critical while drawing up a SLA.” A well-written SLA should include the metrics of QoS and factors such as availability, maintenance scheduling, and mean time to repair. The client has the right to know about the time needed for network recovery after a power outage or equipment failure. The client also should be aware of the provider’s ability to proactively detect and correct problems that may be looming. Automatic generation of QoS reports, alarms and trouble tickets, and issuance of credits for the vendor’s noncompliance should be an integral part of an SLA. Other key questions are: what type of QoS reports should be generated? and how often should QoS metrics be taken and reported? If a service provider’s report bases average availability on measurements taken over 24 hours, it may hide the problems that occur during the hours of peak usage. Generating billing and credit records as per SLAs have not yet reached a high degree of automation. Another challenge to delivering good QoS arises when a virtual private network crosses the administrative and technical domains of many providers, perhaps incumbent telcos and competitive providers, who may not all adhere to the same transmission and QoS technologies. Furthermore, while designing a wide area network for a high QoS, special attention has to be paid to the interfaces at aggregation points where there is a capacity mismatch between access links and network core links. Capacity mismatch occurs when a 100Mbit/s local-area network, for example, interfaces with a 1.5 / 2Mbit/s wide-area network line. The more diverse and important a client’s communications traffic becomes, the more crucial it is that the carrier maintain a high QoS. Throughput, availability, packet loss, latency, and jitter must all be spelled out in SLAs, along with how each is to be measured and reported. (It is not uncommon for carriers to track QoS but not report the results to the client unless an extra fee is paid. Also, don’t expect a carrier to generate credits automatically unless obliged to under the SLA.).
______29 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
4. Terminals Users have the following requirements that must be satisfied by in-house network providers and terminal equipment manufacturers: • All appropriate services should be accessible and controllable • Terminals should be inter-connectable • Easy to install (eg. wireless or PLC) • Easy to use, control, maintain • Ability to switch between different service types/qualities during a session • Global in use (same plug and protocol) = use of embedded systems = low cost • Reliable (self-monitoring) • Security of customer information and network resources
4.1 Telephony terminals There are two different schools of thought when it comes to telephony terminals. One is that the Personal Computer will assume this role, whilst there are others that want to keep the some type of telephone equipment like that is presently in use. There are a number of factors that will determine the direction the terminals will take; the two primary ones are customer demand and regulations. There are many people, at least for the next ten years, that do not want to have to use a computer for their primary voice communication needs. They are happy with just a telephone or some type of simple screen-phone. To eliminate the basic Telephony voice service as the basic option may not be acceptable. This could cause a regulatory impact. Another regulatory impact could be caused by the service rules that vary from area to area. The two main ones are "life line" service where the telephone has to work even if there is no customer power supply, and the emergency response service (“112” in Europe and “911” in the US) where the telephone number is used to locate the caller. Other items that might affect the overall architecture are related to tariffs. To mix the regulatory world of telephony with the market-based structure of the Internet will make a major change in the structure of IP networks. The alternative may be to have two separate services, Telephony and Internet, with their own customer cultures and regulations. However, these two services can coexist within the same access and customer premises networks. Figure 5.2 shows a possible terminal for Telephony services for both telephony voice and data.
4.2 Internet Terminals The basic Internet terminal today is the PC, and some form of this device, such as a palm pilot, will remain the main terminal for Internet services. The interfaces for these devices are well defined and TORRENT does not see that any changes are necessary.
4.3 Entertainment Terminals The entertainment terminals centre on two basic types. One is the traditional TV, accessed via a Set Top Box (STB) and the other is the Internet-based home entertainment complex and web TV that are appearing on the
______30 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers market. The main issues for the TORRENT project is the interface these will have to the CPN and the related protocol stack to permit them to be accessed by - or for them to access - another element in a remote network. This interface should not be complex and add very little to the cost of the entertainment terminal. However, the interface may involve two distinct formats - one for the data interface and the other for the video interface. The video interface will present the most challenges.
4.4 Environmental Terminals The environmental terminals will come in many forms that will differ greatly in functions and configurations. The main issues for the TORRENT project is the interface these will have to the CPN and the related protocol stack to permit them to be accessed or for them to access another element in a remote network. This interface should not be complex and add very little to the cost of the environmental terminal.
______31 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
5. Home Network Protocols, Interfaces and Functionalities
5.1 Wired in-home networks
5.1.1 Ethernet
SPLITTER
ETHERNET 10BASE-T ADSL ATMF 25 MODEMS USB
FILTER
Figure 5.1: The Home Network (ADSL-access)
The ADSL modem has an ADSL interface to the access network and 10Base-T Ethernet, ATMF-25 or USB to the client’s PC. The ADSL interface operates over one copper pair of wires. The only protocol over the ADSL, that is physical, is the ATM. The 10BASE-T interface operates over two pairs of wires, one pair used for receive data signals and the other pair used for transmit data signals. The two wires in each pair must be twisted together for the entire length of the segment, a standard technique used to improve the signal carrying characteristics of a wire pair. This interface terminates the ATM connections and extracts frames from arriving cells and encapsulates frames in departing cells. The ATMF-25 interface does not terminate ATM connections, it just switches ATM cells between the ADSL and ATMF-25 port. It is the ATMF-25 PC-NIC that actually initiates or terminates ATM channels. The ATMF-25 interface offers maximum TCP/IP transparency because it switches ATM cells and does not touch TCP/IP information. The Universal Serial Bus (USB) interface is a medium speed, plug-and-play technology found on most new computers. It outperforms interfaces like serial or parallel ports in terms of data transport capabilities. Devices are detected and configured automatically. Moreover, USB supports “hot swaps” or “hot plug & play”. This means that several USB devices can be connected and disconnected to the USB port without powering down the PC every time the user changes the device.
______32 Deliverable D1.2 IST-2000-25187 TORRENT Requirements for Service Providers, Network Operators, Manufacturers
5.1.2 Copper pair
analogue telephones n ,x nv ,x n v, xn v ,x nv nxc c nxv ,x nx ,c n ,c xvnx, zcv nxc master terminal copper pair
n ,x nv ,x n v, xnv ,x n vnxccnxv ,x nx ,c n ,c xvnx, zc vnxc