Research Status of Network Attachment Subsystem in NGN

2007-05-16 12:17ShenMinShiXiaofengLiMindong
ZTE Communications 2007年1期

Shen Min Shi Xiaofeng Li Mindong

(Central Academy of ZTE Corporation, Nanjing 210012, China)

Abstract:The Network Attachment Subsystem(NASS)is introduced to the Next Generation Network(NGN)architecture to enable services independent from access networks and support nomadism for fixed terminals.The NASS is responsible for managing the users attached to the access network in terms of user authentication,allocation of the IP address,and location management.In NGN R1,Telecommunications and Internet Converged Services and Protocols for Advanced Networking(TISPAN)studied the internal architecture and external interface protocols of NASS and published the relevant technical specifications.In NGN R2,TISPAN focuses on the study of mobility and nomadism as well as the ability to support various access network architectures.There still remain several issues that need further study.

The Next Generation Network(NGN)standard is a hot research subject in the field of current communication standards.The research on the NGN architecture is conducted by two standardization organizations:the Telecommunications and Internet Converged Services and Protocols for Advanced Networking(TISPAN)and the International Telecommunication Union Telecommunication Standardization Sector(ITU-T).

1 Research Results of TISPAN R1

The TISPAN is a technical committee of the European Telecommunication Standards Institute(ETSI).It was formed in September 2003 by the merger of the Telecommunications and Internet Protocol Harmonization over Networks(TIPHON)and the Services and Protocols for Advanced Networks(SPAN).The former focused on the market for voice communication and related voiceband communication,while the latter was responsible for fixed network standardisation.The TISPANfocuses on standardization and research of the NGN.

The TISPAN divides its tasks into three stages:R1,R2,and R3.R1 was closed with the issue of the first batch of standard documents at the end of 2005.The R2 is scheduled to close in July 2007.

In R1,several TISPANworking groups did study on Network Attachment Subsystem(NASS).They studied the internal architecture and external interface protocols(such as e1,e2,e4,e5)of the NASSrespectively.The formal technicalspecifications are available.

1.1 Position of NASS in NGN Architecture

The TISPAN proposes the NGN architecture and logic functional structure based on the The Third Generation Partnership Project(3GPP)IPMultimedia Subsystem(IMS).It suggests taking advantage of 3GPPspecifications as much as possible while requiring the support of more access modes,including Digital Subscriber Line(xDSL),Local Area Network(LAN),and Wireless Local Area Network(WLAN).The purpose is to make the IMSbecome a common platform based on Session Initiation Protocol(SIP)and to support various access modes for fixed and mobile networks.Therefore,the TISPAN divides the NGN architecture into the service layer and the transport layer.Besides,the TISPAN introduces the NASSand the Resource and Admission Control Subsystem(RACS)to the transport layer to provide independent user access management for the service layer,as shown in Figure 1[1].

The NASSis responsible for customer attached access network management and provides the following functionalities.

·Dynamic provision of IPaddress and other user equipment configuration parameters for User Equipment(UE).

·Access authentication.

·Authorization of network access based on user profile.

·Access network configuration based on user profile.

·Location management.

As the NASSprovides registration at access level,the user may be asked to register again at the service layer.

The NASSprovides network level identification and authentication.It is also responsible for managing the IPaddress space within the access network and providing the user with the contact point information of NGN applications.

▲Figure 1. The NGN architecture of TISPAN R1.

The NASSprovides mobility management and allows the terminal to nomadise in different access points or networks(which might be owned by different operators).The user can use different terminals to access NGN services.However,NGNR1 does not support handover between access networks nor does it provide service continuity.

For the customer attached access network,NASSprovides implicit explicit authentication.Explicit authentication is an authentication procedure that is explicitly conducted between the UEand the NASS.It requires a signaling procedure to be performed between the UEand the NASS.Implicit authentication does not require such a procedure.Instead,the NASSperforms the implicit authentication based on identification of the L2 connection that the UEis connected to.For example,line authentication is a form of implicit authentication.

1.2 Functional Elements of NASS

Figure 2 depicts the NASSarchitecture,which includes Network Access Configuration Function(NACF),Access Management Function(AMF),and Connectivity Session Location and Repository Function(CLF).

(1)NACF

The NACFis responsible for the IP address allocation to the UE.It also distributes other network configuration parameters such as address of Domain Name Servers(DNS)and address of the high level service access point such as Proxy Call Session Control Function(P-CSCF)when accessing to the IMS.The NACFprovides the UEwith an access network identifier,which uniquely identifies the access network to which the UEis attached.With this information,high level applications should be able to locate the CLF.

(2)AMF

The AMFtranslates the network access requests sent by UE,forwards the requests for allocation of an IP address and network configuration parameters to the NACF,and forwards the user authentication requests to the User Access Authorization Function(UAAF).In the reverse direction,AMF forwards the response from the NACFor the UAAFto the UE.

(3)CLF

The CLFregisters the IPaddress allocated to UE,the related network location information and geographical location information provided by NACF,and associates all the information.The CLFstores the identity of user,the QoS profile of user network,and the user privacy setting of location information.The CLFprovides the location query function for high-level service.

(4)UAAF

The UAAFperforms user authentication and authorization checking.The UAAFretrieves user authentication and access authorization information from the user profiles contained in the Profile Database Function(PDBF).The UAAFalso collects accounting data for billing.

(5)PDBF

The PDBFstores user authentication data(for example,user identity,list of supported authentication methods,and authentication keys)and information related to network access configuration.The PDBFin Figure 2 and the user service profile in Figure 1 play different roles.The former acts as the database at the transport layer and stores access and authentication information.The latter acts as the database at the service layer,and stores user service information.They can be co-located due to a certain association.

▲Figure 2. The NASS architecture.

(6)Customer Network Gateway Configuration Function(CNGCF)

The CNGCFis used during initialization and update of the UEto provide the UEwith additional configuration information such as configuration of a firewall and QoS marking of IPpackets.The network configuration data provided by the CNGCFand by the NACFsupplement each other and allow the UEto access to the network successfully.

(7)Access Relay Function(ARF)The ARFis not a component of the NASS.It is a relay between the Customer Network Gateway(CNG)and the NASS and inserts local configuration information provided by the access network into the requests from the UE.

In a normal access procedure,the UE interacts with the UAAFvia the ARF/Access Management Function(AMF)to perform authentication and authorization,and interacts with the NACFvia ARF/AMFto retrieve the IP address and other configuration parameters.The UAAFand the NACF send the relevant information to the CLF respectively for association and storage.Therefore,the RACSand the high-level service can query the desired information.

1.3 Interface Description

The NASShas the internal interfaces between logic functionalunits within the NASSand the externalinterfaces.

1.3.1 Internal Interfaces Between Logic

Functional Units

(1)Interface a1

The Interface a1is used between the AMFand the NACF.It allows the AMFto request the NACFto allocate an IP address to the UEas well as other network configuration parameters.

(2)Interface a2Interface a2is used between the NACFand the CLF.It allows the NACFto register in the CLFthe association between the IPaddress allocated to the UEand the related location information or notify the CLFto cancel the association.It also allows the CLFto provide the NACF with CNGCFaddress,geographical location information,and P-CSCF identity.

(3)Interface a3

Interface a3is used between the AMF and the UAAF.It allows the AMFto request the UAAFto authenticate the user and check the network subscription information.

(4)Interface a4

Interface a4is used between the UAAFand the CLF.It allows the UAAFto request the CLFto register the association between the user identity and the user privacy setting of location information as wellas user network profile information(for example,QoS profile)in the mode of Push.Interface a4allows the CLFto query the user network profile from the UAAFin the mode of Pull.

(5)Interface e5

The Interface e5[2]is used between a UAAFagent(in the visting network)and a UAAFserver(in the home network).Interface e5allows the UAAFagent to request the UAAFserver for user authentication and authorization.It allows the UAAFagent to forward the accounting data generated by the visited network to the UAAFserver.The UAAF agent and the UAAFserver may be in different administrative domains and need trust relationship.Interface e5may use Remote Authentication Dialin User Service(RADIUS)protocol or Diameter protocol.

The NGN R1 does not define the interface between the NACFand the UAAF,nor that between the UAAFand the PDBF.The UAAFand the PDBFcan be co-located or interconnected via a nonstandard interface.

The TISPAN does not establish protocols or specifications for the four interfaces mentioned(a1,a2,a3and a4).

1.3.2 External Interfaces

In Figure 2,the external entities associated with the NASSinclude the RACS,the ARF,and the service control subsystems and applications.

(1)Interface e4

Interface e4is used between the CLF and the RACS.It allows the RACSto retrieve user network location information and user network profile information from the CLF.Reference[3]gives the specifications for Interface e4based on Diameter protocol.

(2)Interface e2

Interface e2is used between the CLF and the service controlsubsystems.It enables the service layer entity to retrieve network location information from the CLF.Reference[4]gives the specifications of Interface e2based on Diameter protocol.

(3)Interface e1

Interface e1is used between AMFand ARF,and between ARFand CNG.It enables the UEto initiate requests for IP address allocation and other network configuration parametess in order to access to the network.It enables the UE to provide user credentials to the NASS in order to perform network access authentication.The ARFcan insert network location information to the requests before the AMFvia the ARF.

When mutual authentication procedure is required,Interface e1enables the NASSto provide authentication parameters to the UE.Reference[5]gives the definition of Interface e1,including WLAN,xDSL.

(4)Interface e3

Interface e3is used between the CNGCFand the CNG.It allows the CNGCFto configure UEfor access to the service control subsystems and applications.The Hypertext Transfer Protocol(HTTP),File Transfer Protocol(FTP),and Trivial File Transfer Protocol(TFTP)can be applied to Interface e3.

This interface is not specified yet.

1.4 Nomadic Scenario

In NGN R1,the NASSonly supports nomadism of UE.The UEcan access to the same NGNsystem anywhere.However,It does not support session continuity,that is,the UEcannot roame or handover between access networks.

In the case of UEnomadism,the NGN can be divided into the home NGN network and the visited NGN network.Figure 3 depicts a typical scenario of UE nomadism,in which the service control subsystems provide users with services lie in the home NGN.The UAAFin the visited NGN network acts as the agent and retrieves user authentication from the UAAF(as the server)in the home NGN network via Interface e5.The CLFin the home NGN network retrieves user location information from the CLFin the visited NGN network via Interface e2and then provides it to the service control subsystems.

▲Figure 3. Functional architecture of NASS in the nomadism scenario.

In other scenarios,if the services are provided for users by the service control subsystems in the visited NGN network,the service control subsystems will retrieve user location information from the CLFin the visited NGN network without the need of the relay of the CLFin the home NGN.If UEauthentication is not required,the UAAFin the visited NGN network will retrieve user authentication by directly visiting the local PDBFinstead of the UAAFin the home NGN network via Interface e5.

2 Research Plan on R2

NASSR2 focuses on mobility and nomadism as well as support of various access networks.(1)Mobility and Nomadism The NGNhas the following requirements for mobility:

·The user should be able to move the terminal in different access points through any access technology.

·The user should be able to utilize one or more terminals to access to one or more networks.

·The user should be able to change the access point when moving.In the case session continuity and handover are not supported,session should be completely terminated and initiated.

·When the UEaccesses to another network,the home network should be able to support provision of services via the visited network.

·The change of services caused by moving should be noticeable to the user.

·When the UEaccesses to a new point,the service can be configured again,which means nomadic activities are met.

·Mobility should not interfere in the services'retrieval of the required information such as location information.

The architecture protocol of the NASS does not specify the scenario and implementation of mobility.There are still many problems of the NASSas a network element responsible for user access to be solved in NGN R2.

(2)Support of Various Access Networks

The NASSshould be able to provide an architecture that supports a variety of access technologies,for example,xDSL,WLAN,and World Interoperability for Microwave Access(WiMAX).Though the general architecture of the NASSis suitable for those access types,the distinction between access technologies does exist and needs to be considered.

From the perspective of the existing demands and NASSprotocol evolution,there are stillsome issues that need further study.

The NASSrequires the support of location information.However,how to converge the location service architecture of NASSand the existing 3GPPone is still a problem,for example,whether it is necessary to add an interface between the NASSCLFand the Gateway Mobile Location Center(GMLC)in 3G.

The NASSprovides the CNGCFto configure the UE,which is an important characteristic of NGN.The R1 does not define the specification of Interface e3,which will be studied in NGN R2.

In addition,there are still some specific issues that need future study.The support of the NASSwill add complexity to the authentication of the IMSnetwork.Due to a variety of authentication types,it is necessary to further study how to select a proper type without causing any conflict.

3 NACF Research of ITU-T

In the ITU-T,the NGNresearch is conducted by SG13.The ITU-Tsets up the Next Generation Network Global Standards Initiative(NGN-GSI)to coordinate the NGN standardization work between SG13,SG11,SG19,and other working groups.

The ITU-Tis devoted to the research on NGN core networks.At first,its NASS-like research,i.e.NACF,is mentioned in the ITU-TDraft Recommendation Y.2012[6]Functional Requirements and Architecture of the NGN.Then,there is an independent draft recommendation Y.nacf Functional Architecture and Requirements for NACF in Next Generation Network.

3.1 NACF Description in ITU-T Y.2012

Figure 4 depicts the ITU-TNGN architecture.The NACFis a functional entity at the transport layer,mapped onto the NASSin the TISPAN NGN architecture.

The NACFprovides registration at the access level and initialization of end-user functions for accessing NGN services.These functions provide transport layer level identification/authentication,manage the IPaddress space of the access network,and authenticate access sessions.They also announce the contact point of NGN functions in the service layer to the end user.

▲Figure 4. The ITU-T NGN architecture.

The NACFhas the function of the transport layer user profile function,which expresses the association between the user information and other control data in a form of function database and is an independent function at the transport level.This function database can be expressed and implemented via a cooperative database,which functions can reside in any part of the NGN.This function database is similar to the PDBFin the TISPAN NASS.

The NACFprovide the following functionalities:

·Dynamic provisioning of IP addresses and other user equipment configuration parameters.

·By endorsement of user,auto-discovery of UEcapabilities and other parameters.

·Authentication of end user and network at the IPlayer and possible other layers.

·Authorization of network access based on user profiles.

·Access network configuration based on user profiles.

·Location management at the IP layer.

The NACFincludes transport user profile which takes the form of a functional database representing the combination of a user's information and other control data into a single"user profile"function in the transport layer.This functionaldatabase may be specified and implemented as a set of cooperating databases with functions residing in any part of the NGN.

3.2 NACF Description in ITU-T Y.NACF

3.2.1 NACFArchitecture Description Figure 5 shows the functional architecture of ITU-TNACF.

3.2.2 Functional Entity Descriptions

(1)Network Access Configuration Functional Entity

The Network Access Configuration Functional Entity(NAC-FE)is responsible for IPaddress allocation to terminals.It may also distribute other network configuration parameters.

(2)Transport Authentication and Authorization Functional Entity

The Transport Authentication and Authorization Functional Entity(TAA-FE)provides authentication and authorization functions in the transport layer.

(3)Transport User Profile Functional Entity

The Transport User Profile Functional Entity(TUP-FE)is responsible for storing user profiles related to the transport layer.

(4)Transport Location Management Functional Entity

The Transport Location Management Functional Entity(TLM-FE)registers the association between the IPaddress allocated to the UEand related network location information provided by the NAC-FE(e.g.access line identifier).

(5)Access Management Functional Entity

The Access Management Functional Entity(AM-FE)translates network access requests issued by the UE.

(6)Home Gateway Configuration Functional Entity The Home Gateway Configuration Functional Entity(HGWC-FE)is used during initialization and update of the Home Gateway(HGW).

3.2.3 Internal Reference Points

(1)Reference Point between AM-FE and NAC-FE

This reference point Nd allows the AM-FEto request the NAC-FEfor the allocation of an IPaddress to end UEas well as other network configuration parameters.

(2)Reference Point between NAC-FE and TLM-FE

This reference point Ne allows the NAC-FEto register in the TLM-FEthe association between the allocated IP address and the user identity as well as related location information(IPedge ID,Line ID).

(3)Reference Point between AM-FE and TAA-FE

This reference point Na allows the AM-FEto request the TAA-FEfor user authentication and network subscriptionchecking.

▲Figure 5. Generic NACF architecture in NGN.

(4)Reference Point between TAA-FE and TLM-FE This reference point Nc allows the TLM-FEto register the association between the user identity and the user preferences regarding the privacy of location information provided by the TAA-FE.

(5)Reference Point between NAC-FE and TAA-FE

This reference Nkhas not been decided yet for the time being.

3.2.4 RACFInterface

The Interface between TLM-FEand RACF(TC-TC1)allows the RACFto retrieve network location information from the TLM-FE(e.g.the address of the physical node through which the user can be reached)in order to determine the amount of available network resources.

3.2.5 Interfaces between NACFand Application/Service Control Functions

This reference point enables applications and service control functions to retrieve from the TLM-FEnetwork location information.The primary parameter to retrieve the location information shall be the Assigned IPaddress allocated to the user/UE.

3.2.6 Interfaces between NACFand CPE

(1)Interface between CPEand HGWC-FE

This reference TC-Ux has not been decided yet for the time being.

(2)Interface between CPEand HGWC-FE This reference point TC-U1 allows the HGWC-FEto configure the CPE.The TC-U1 interface is used during initialization and update of to provide to the CPEadditional network configuration information when these information are not available over the Interface T-U1,in order to allow the CPEto access to the NGN Service/applications.

3.2.7 Interfaces between NACFand Transport Functions

This reference point TC-T1 enables the user/UEto initiate requests for IPaddress allocation and other network configuration parameters in order to access to the network.

4 Conclusions

Presently,the research organizations have different approach for the NASS research.The TISPAN has a comparatively deep understanding of the NASS,while the ITU-Tkeeps pace with the TISPAN due to its little consideration to the NASS.However,there are still many issues for further study in actual deployment of NASS.