diameter conceps

Upload: ajay-kumar

Post on 04-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Diameter Conceps

    1/14

    Diameter and SBBC Concepts

    Camiant Inc

  • 7/29/2019 Diameter Conceps

    2/14

    Base Protocol and Applications

    DIAMETER Base Protocol

    NASREQ

    Applications

    EAP

    Applications

    Mobile IP V4

    Applications

    Credit

    Control

    Applications

    Other 3GPP

    Cx, Dx, Sh,

    Ro, Rf

    The Diameter Base Protocol provides

    reliable transport and delivery of

    messages

    The Base Protocol must be used along

    with an application

    DIAMETER Base Commands

  • 7/29/2019 Diameter Conceps

    3/14

    DIAMETER Base Protocol

    NASREQ

    Applications

    EAP

    Applications

    Mobile IP V4

    Applications

    Credit

    Control

    Applications

    Tx

    Application

    Other 3GPP

    Cx, Dx, Sh,

    Ro, Rf

    Ty

    Application

    3. Credit-Control Messages

    This section defines new Diameter message Command-Code values that

    MUST be supported by all Diameter implementations that conform to

    this specification. The Command Codes are as follows:

    Command-Name Abbrev. Code Reference

    ---------------------------------------------------------------------------------

    Credit-Control-Request CCR 272 3.1

    Credit-Control-Answer CCA 272 3.2

    3. NAS Messages

    This section defines the Diameter message Command-Code [BASE] values

    that MUST be supported by all Diameter implementations conforming to

    this specification. The Command Codes are as follows:

    Command-Name Abbrev. Code Reference

    ---------------------------------------------------------------------------------------------------------

    AA-Request AAR 265 3.1

    AA-Answer AAA 265 3.2

    Tx, and Ty Applications

    In addition to the AVPs defined within the clause 6.4, the Diameter AVPs from the Diameter base application(RFC 3588 [2]) are reused within the Diameter messages of the Tx application. The support of AVPs from the

    Diameter Network Access Server Application (NASREQ) [3] is not required from Diameter implementations that

    conform to the present document.

    Accounting functionality (Accounting Session State Machine, related command codes and AVPs) is not used in the

    Tx interface.

    The Tx application is defined as an IETF vendor specific Diameter application with application ID 16777222, wherethe vendor is 3GPP. The vendor identifier assigned by IANA to 3GPP (http://www.iana.org/assignments/enterprise-

    numbers) is 10415.

    Need to define an application ID For Ty

  • 7/29/2019 Diameter Conceps

    4/14

    Diameter Node Types

    Some PCRF functions can be associated with a home network for the purpose of representing subscription and homeased application function information. Some PCRF functions can be associated with the network of the Access

    Gateway for purpose of enforcement of local policy. In roaming situations where the Access Gateway is located in aisited network, there may be both home and serving network PCRFs. In this case the serving network PCRF may

    act as a proxy or redirect agent for communications to/from the Access Gateway and the home PCRF (also see

    section 5.3.5).

    5.1.2.3 Application Function

    Diameter Peers

    Diameter peers, the set of Diameter nodes with which a

    given Diameter node will directly communicate, may bestatically configured or may be dynamically discovered

    using SLPv2 or DNS SRV RRs.

    Capabilities Exchange

    The first Diameter messages exchanged between two

    Diameter peers, after establishing the transport

    connection, are Capabilities Exchange messages. A

    Capabilities Exchange message carries a peer's identity

    and its capabilities (protocol version number, supportedDiameter applications, etc.). A Diameter node only

    transmits commands to peers that have advertised

    support for the Diameter application associated with the

    given command.

  • 7/29/2019 Diameter Conceps

    5/14

    Typical Diameter Exchanges

    A Capabilities Exchange message carries a peer's

    identity and its capabilities (protocol version number,

    supported Diameter applications, etc.). A Diameter node

    only transmits commands to peers that have advertised

    support for the Diameter application associated with thegiven command.

    Discovery via DNS or Static Configuration

    Application-level heartbeat messages are used to

    proactively detect transport failures. These messages

    are sent periodically when a peer connection is idle and

    when a timely response has not been received for an

    outstanding request.

    There are two types of messages, Requests and

    Answers.. Every answer message carries a Result-Code

    AVP. The data value of the Result-Code AVP is an integer

    code indicating whether a particular request was

    completed successfully or whether an error occurred.

    Peer Discovery

    Peer Discovery

    Capabilities

    Exchange Request

    Capabilities

    Exchange AnswerCapabilities

    Exchange Answer

    Capabilities

    Exchange Request

    Device Watchdog

    Request

    Device Watchdog

    Answer

    Request

    Answer

    Answer

    Request

    Client ServerAgent

  • 7/29/2019 Diameter Conceps

    6/14

    Diameter Transport and Session-ID

    A Diameter message pertaining to a specific user session includes a Session-Id AVP, the value of

    which is constant throughout the life of a session. The value of the Session-Id AVP is a globally

    and eternally unique text string, intended to uniquely identify a user session without reference to

    any other information.

    The Diameter client initiating the session creates the Session-Id. The Session-Id begins with the

    originator's Diameter Identity string and is followed by any sequence guaranteeing both topological

    and temporal uniqueness.

    TCP or SCTP Transport

    Each Diameter process running on a host generates, or is configured with, a Diameter Identity.

    The Diameter Identity is a URI-syntax string with substrings representing the host's fully qualified

    domain name (FQDN), one of the ports used to listen for incoming connections, the transport usedto listen for incoming connections (i.e. TCP or SCTP), the AAA protocol (i.e. Diameter), and the

    transport security (i.e. none or TLS).

    The following is an example of a valid Diameter host identity:

    aaa://host.abc.com:1812;transport=tcp;protocol=diameter

    PCRF

    SessionsSessions

    TCP or SCTP TransportAF AGW

  • 7/29/2019 Diameter Conceps

    7/14

    SBBC Applications

  • 7/29/2019 Diameter Conceps

    8/14

    SBBC Authorization on Initial Attach

    Peer Discovery

    Peer Discovery

    Capabilities Exchange

    Request

    Capabilities

    Exchange AnswerCapabilities

    Exchange Answer

    Capabilities Exchange

    Request

    Device Watchdog

    Request

    Device Watchdog

    Answer

    CC Request

    CCAnswer

    CC Answer

    CC Request

    Client ServerAgent

    On MS Attach a Diameter Session is established between the AGW and the

    PCRF on behalf of the MS (With Diameter CCR and CCA messages using Ty

    Application ID with CCR Request Type set to INITIAL REQUEST)

    This Session lasts for as long as the Mobile is attached and is used for alltransaction between the AGW and PCRF including:

    Authorization of Bear establishment/modification

    Notification of Loss or release of bearer

    AND all transactions between the PCRF and the AGW including

    PCRF initiated Push for QoS

    PCRF initiated removal of resources

    PCRF initiated Opening or Closing of Gates

    AGW PCRFoptional

  • 7/29/2019 Diameter Conceps

    9/14

    5.2.1 Ty Diameter messages

    Ty Messages are carried within the Diameter Application(s) described in the sub-clauses below. These Applications

    are defined as vendor specific Diameter applications. The vendor identifier assigned by IANA to 3GPP is 10415.

    The association between the PDS session and the Diameter Credit Control sessions shall be done in a one-to-one

    asis (i.e. 1 PDS session = 1 DCC session), and each service instance shall map to a Diameter sub-session (i.e. 1

    service instance = 1 DCC sub-session). The release of the last service instance shall be indicated by the release ofthe whole DCC session, whereas release of a single service instance, with others remaining, shall be indicated by the

    release of the sub-session corresponding to that service instance.

    Easy Applications

    Simple Bearer Authorization at the PCRF

    e.g. no IMS or AF present. (Note Changes to the

    Diagram.) Each bearer uses a Diameter sub-session ID

    How does the PCRF know that no AF initiated Push is

    coming for this bearer?

    Simple AF initiated Push of IP QoS

    For example on a EV-DO Rel 0, PCRF pushes, IP

    level Policing, Shaping, and/or Queueing commands

    along with a classifier determined from the AF. Note

    Changes to the Diagram. Each Push uses a Diameter

    sub-session ID

    How does the PCRF know that no MS initiated Pull

    is coming for this session?

  • 7/29/2019 Diameter Conceps

    10/14

    Push/ Pull Applications

    Current

    Network

    SupportsPull e.g.

    Rev A no

    fallback

    Handset

    supports

    pull

    Application

    Client

    requestsPull

    PDSN

    allows Pull

    PCRF

    receives

    Pull tomatch

    Push

    MS 1 X X X X YES

    MS 2 X X X NO

    MS 3 X X X NO

    MS.n NO

    Networks contain a varied mixture of

    terminals and clients. It virtually

    impossible to determine whether it is

    reasonable to expect a for a given IPclassifier at a given time.

    How does the PCRF know that no AF

    initiated Push is coming for this

    bearer?

    How does the PCRF know that no MS

    initiated Pull is coming for this

    session?

    How can the PCRF correlate the IP

    Classifier from the AF with the TFT

    from an MS initiated Bearer

    initiation/modification

    Subsequent AF sessions may use the

    same bearer. i.e. AF and bearer session

    tear down are currently not coordinated

    AF MS MSPCRF PCRF PCRFAF AFMS

    Push arrives at

    PCRF before

    Pull

    Push arrives at

    PCRF after PullPush arrives at

    PCRF at the sametime as Pull

    Push and pull for a given transaction can arrive at

    different times. What timers would be needed?

    Networks contain a varied mixture of

    terminals and clients. It virtually

    impossible to determine whether it is

    reasonable to expect a for a given IPclassifier at a given time.

  • 7/29/2019 Diameter Conceps

    11/14

    Independent Push/Pull Policy and Charging Rules

    Diameter Session IDs created

    at MS attach

    TCP or SCTP Transport

    MS 1

    MS 2

    Diameter Sub-Session IDs

    created at bearer creation

    Diameter Sub-Session IDs

    created from AF Push

    Diameter session Created at MS Attach

    Independent Sub-sessions created for bearer creation and AF Push AF Push with Bearer Pull will use 2 Gates and the Policy Decision Rules are evaluated 2

    times- once for the IP Push, and once for the Bearer Pull

    IP QoS gates

    can be used for application-level, access-network independent, admission control andcharging rules

    can also push an IP-level enforcement envelope for bearers, e.g silver subscriber get 512 Kfor video streaming.

    IP QoS primitive can include per subscriber, per flow policing, shaping, and queuing

    Diameter Sub-Session IDs

    created at bearer creation

    Diameter Sub-Session IDs

    created from AF Push

  • 7/29/2019 Diameter Conceps

    12/14

    Independent Push/Pull Policy and Charging Rules

    AF packets

    Pi

    Interface

    Per subscriber R-P

    interface with IP QoS

    Subscriber

    RABs

    PCRF

    AGW

    DiameterSubsessions DiameterSubsessions

    1

    2

    3

    1

    2

    3

    1

    2

    3

    3 Subscriber running identical

    applications from different

    handsets, clients, and

    locations

    Application 2 has no AF.

    PCRF and AGW have

    separate policies and gates

    for bearers and IP QoS..

    IP QoS on R-P interface

    represents application rules

    e.g. Silver subscriber get512Kbs for Video

    e.g. Subscriber 1 and 2 have

    different IP QoS for

    application 3

    But IP QoS may be smaller or

    greater than authorized RABs

    PCRF and AGW may try to

    correlate bearer and IP QoS

    as part of the policy rules but

    correlation is not required.

    PCRF can use information on

    bearers for admission control

    of IP QoS and vice-versa

  • 7/29/2019 Diameter Conceps

    13/14

    If Correlation of AF and Bearer are important, the operator can

    impose application-level event sequencing i.e. client applicationlogic ensures that push arrives before pull or vice-versa

    AF MSPCRF PCRF AFMS Push must arrive at PCRF

    before Pull:

    Push Policy:

    If: IP_port is VIDEO and

    subscriber-tier is VIDEO-

    ENABLED

    Then: Create gate

    Else: Reject gate

    Pull policy:

    If Bearer_TFT is VIDEO

    subscriber has IP_Gate

    with port = VIDEO

    Then: Create Gate

    Else: Reject Gate

    Push must arrive at PCRF

    After Pull:

    Pull policy:

    If Bearer_TFT is for VIDEO

    and subscriber-tier is

    VIDEO-ENABLED

    Then: Create Gate

    Else: Reject Gate

    Push Policy:

    If: IP_port is for VIDEO and

    subscriber has a Bearer_

    Gate with port = VIDEO

    Then: Create gate

    Else: Reject gate

    Application-level Event Sequencing

    Subscriber must have

    use an AF for Video

    Subscriber must have a

    Video Bearer to use AF

  • 7/29/2019 Diameter Conceps

    14/14

    UE-1

    1. INVITE

    UE-2

    2. INVITE

    4. Auth Request3. 183 Progress

    13. RAN QoS Request

    14. Auth Request

    Bearer

    Establishment

    Bearer

    Establishment

    9. PRACK10. PRACK

    16. RAN QoS Resp

    12. 200 OK (prack)

    11. 200 OK (prack)

    AF(P-CSCF)

    PCRFAGW

    8. 183 Progress (A1)

    7. Auth Response

    5. Re-Auth(create gates)

    6. Re-Auth Resp

    TxTy

    15. Auth Resp

    17. RAN QoS Request

    20. RAN QoS Resp

    18. Auth Request

    19. Auth Resp

    IP-QoS Gates

    created (closed)

    21. UPDATE22. UPDATE

    24. 200 OK (update)23. 200 OK (update)

    RAN-QoS Gates created

    (opened)

    RAN-QoS Gates created

    (opened)

    Client rings

    (180 not shown)

    Client answers25. 200 OK (invite)26. Auth Request

    (Open Gates)

    28. Re-Auth Resp

    27. Re-Auth(open gates)

    29. Auth Response

    30. 200 OK (invite)31. ACK

    32. ACK

    IP-QoS Gates are opened