1 Introduction
Many discussions regarding the NGN architecture have been carried out in recent years,
such as the contributions to ITU-T NGN FG, ITU-T SG-13/Q3, 3GPP/3GPP2, and Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN). As a result of contributions from many individuals and network experts, two very similar NGN architectures emerged without fundamental differences. One is recommended by ITU-T[1] and the other is introduced by TISPAN[2] under the leadership of the European Standards Organization.
The NGN architecture is designed to support all types of terminals, with the most unintelligent terminal being used as the base-line terminals to be supported. In this case, the network is performing all the required tasks to establish communication sessions without any terminal involvement.
While the legacy terminals are being phased out, the current NGN architectural framework cannot utilize the terminal intelligence to simplify the network architecture, to improve the network performance, and to achieve certain Capital Expenditures (CAPEX) and Operational Expenditures (OPEX) savings.
While all types of user terminals are to be supported inside a network, the way those terminals are to be supported will make a huge difference in the network architectural design. It can be dumb terminal centric design, as discussed in [1] and [2], or it can be intelligent terminal centric design, as discussed in the following sections.
In this paper, it is proposed that the network design uses the intelligent terminal (called NGN terminal) as the base-line terminal. Other types of terminals are supported via NGN terminal emulation at the edge of the network. The network and terminals or terminal emulators will cooperate to establish multimedia communication sessions between the communicating entities, which may or may not be human.
Using this design philosophy, the user may not perceive any difference in satisfying his or her communication needs. But the functions provided at the core of the network will be different between the dumb terminal centric approach and the NGN terminal centric approach. The differences range from the way normal value-added services are provided to the way a new type of service can be introduced. Because of differences in basic network functions, the network architecture could be different. This paper studies the impact of NGN network architecture by using the NGN terminal centric approach.
The high-level functions of NGN terminal can be summarized as following:
There are other characteristics of NGN terminal in the area of security, registration, and authentication which will not be further elaborated.
With the network and the NGN terminal to accomplish the work which was performed inside the network alone, the current standardized network architecture needs to be modified. Some functions which are exclusively inside the network (e.g. directory lookup for the called parties) will be exposed to the NGN terminals while others functions can be completely eliminated from the network (e.g. session establishment). As will be shown in the paper, such re-arrangement of the network functions will make the network more robust, scalable, and interoperable.
This paper will be structured as follows: Section 2 will explore, using examples, what could be done with the intelligent NGN terminals; Section 3 will further investigate the impact of the network architecture by the NGN terminals; Section 4 will outline a few common open issues; and concluding remarks will follow in Section 5.
2 Network with NGN Terminals
An NGN consists of the transport stratum and the service stratum. The NGN architecture outlined in [1] is shown in Figure 1 for easy reference.
The transport stratum consists of transport functions and transport control functions. The NGN terminal has no impact on the transport functions. The transport control functions can be further divided into the resources and admission control functions and the network attachment control function. In general, there is no major impact on those architectural components partitioning while their functions will be different.
The major architectural impact on the current NGN architecture by intelligent NGN terminals lies in the area of service stratum, which is the focus of this paper. Before the details are investigated, a few examples are used to highlight the potential differences when terminal intelligence are utilized.
2.1 Session Setup
One of the key functions of the network is to set up a session between two communicating terminals. In this section, the session setup process will be used to illustrate the potential differences when the terminal intelligence is actively used.
In the traditional network, the user terminals intelligence, if there is any, are not utilized. In this case, the network is tasked to perform many functions. A simple session setup task by the traditional network can be illustrated as in Figure 2.
In this setup, all the complexity of session setup will be the responsibility of the network equipment. While this type of configuration is needed for terminals whose intelligence can not be used, it leads to complicated network architecture, as evidenced in [1]. Besides, the network will also need to keep the session state while the session is active, which introduces robust and scalability issues.
Conceptually, if the calling party knows the called party’s current routable address in the packet network based transport stratum (e.g. IP address for an IP based transport stratum), a session can be set up between those two terminals using terminal intelligence alone.
However, getting the other party’s current routable address (e.g. IP address) will be almost impossible given the dynamic nature of the address assignment. Hence a translation mechanism is needed to associate the user identifier, which identifies the user and is human-friendly, with the current routable address of the user terminal. How the user is identified and how the user identifier is assigned has been flagged as an open issue in Section 4 and will not be further pursued in this paper. But each user is assumed to have a unique identifier in the NGN environment in order to be identified, and such identifier is not the routable address in the transport stratum.
In the intelligent NGN terminal case, the session setup could be illustrated as in Figure 3.
In the above diagram, the core functions of the service stratum are outlined, which include the following aspects:
The NGN terminal, which is assumed to be intelligent, will be responsible for session setup, maintenance, and tear-down. Traditional Value-Added Service (VAS) features, such as session blocking and session forwarding, can be implemented on the intelligent terminal solely.
Other traditional VASs, such as caller ID blocking, can be realized by service agent or relay equipment inside the network which behaves like a back-to-back user agent. The network may also provide default IP address for terminals which is off-line for session forwarding purposes.
It should be noted that, using terminal intelligence, the service stratum could eliminate the needs to maintain the session state information, which improves the network scalability, network robustness, and network performance.
It should also be noted that, the boundary of the service stratum is not restricted in the boundary of the transport stratum. In open pervasively connected transport stratums, the service stratum could reach the far end of the interconnected transport networks.
2.2 Applications
With intelligent terminals, the means to provide applications can also be different from the current NGN architecture. As evidenced in Figure 1, the application is provided via Access Network Interface (ANI) with service and application supporting functions in the service stratum.
One implication of such architecture is the applications provided by IP Multimedia Subsystem (IMS), which is outlined in Figure 4.
In this setup, the application server is invoked by the Serving Call Session Control Function (S-CSCF) based on information provided by the user in the session setup message and the Home Subscriber Server (HSS). In this case, for introducing any new services, at least the data in HSS needs to be modified to take account of the new service information and its subscription.
This type of setup is required if the intelligence of the terminals are not to be used. In this case, very basic features, such as conference session and session blocking, are to be implemented by the network. On the other hand, it is almost impossible to provide vast array of services the current Internet is providing.
By using terminal intelligence to handle basic session features, the environment to provide applications can be shown as in Figure 5, which is very close to the mechanisms of providing services over the Internet.
While the application and service supporting functions, shown in Figure 1, still exist in the service stratum, the functionality of them is very different. In this case, the network is essentially providing a directory lookup, associating services provided by a particular service entity with its current IP address.
When the user intends to invoke the service, the mechanism used will be the same as that of session setup discussed before. The only exception is instead of using a user ID to identify the user; the operator of the intelligent terminal will use a service ID to invoke a particular service. In this case, introducing a new service will be similar to introducing a new user in the network.
The user centric service model not only provides more flexibility of service selection and end-user experience, but also decreases the burden of service stratum and potentially increases the scalability of the network and robust of the network.
2.3 Carrier Equipment Implications
In the traditional network, the reliability requirements for all the equipment in transport stratum and service stratum are 99.999%. This stringent requirement ultimately increases the cost of the equipment and results in the added cost for the consumers.
The root cause of this requirement is due to the fact that, without using terminal intelligence, there is a single point of connectivity between the terminal and the service stratum, as shown in Figure 6.
By using terminal intelligence, multiple control connections can be established from the NGN terminal to different service stratum equipment. In this case, there is no need for service stratum equipment to be 99.999% reliable. In this case, the network is providing the required reliability while individual equipment does not have to be super-reliable. The relaxing of such requirement will reduce CAPEX for the carriers and increased reliability for the users.
3 Network Architecture using Terminal Intelligence
As shown in Section 2, some traditional networking functions will be migrated into the terminals if the terminal intelligence can be utilized.
There are many aspects of network where terminal intelligence can be used; the functions migrated from the network to the NGN terminals can be summarized as follows:
(1)Session Related Management
This area includes session initiation, session maintenance, and session termination.
(2)Session Related Features
This area is traditionally called
Value-Added Services (VASs), which includes call forwarding, call blocking, call waiting, three-way call, etc.
(3)Charging Information Collection
The terminals will also be responsible for charging information collection. Processing the information will be the responsibility of the services providers, which will depend on factors outside the scope of architecture discussion. A security mechanism needs to be implemented so that the accounting information can be reliably transferred to the network for further processing.
With those functions migrated into the terminals, the service stratum of the NGN network will focus on efficient directory lookup, subscriber authentication, account information processing, and others.
3.1 High Level Architecture
From the high level, the architecture of the NGN network using terminal intelligence will be very similar to that shown in Figure 1, which is depicted in Figure 7.
The differences of Figure 1 and Figure 7 are in the designation of the end-user functions. In Figure 1, the end-user functions do not imply the existence of applications while, when terminal intelligence is considered, most applications will be treated as a new user terminal, as discussed before.
Instead of generic applications in Figure 1, only the push type application will be using, proactively, the service stratum and transport stratum in order to push content to the subscribers from the service provider. One example of such push application would be advertisement, which allows flexible business model in terms of subscriber subscription plans.
3.2 Detailed Architecture using Terminal Intelligence
In the detailed NGN architecture based on Year 2012, the potential terminal intelligence is not utilized for possible architecture simplification on network side. As eluded in the previous sessions, the key function of the network, in establishing connectivity between the parties concerned, are directory lookup, authentication, and charging information processing. With this in mind, the NGN architecture utilizing the potential terminal intelligence can be illustrated as in Figure 8.
The key points of this architecture can be articulated as follows:
The resource control part will be a modified version of Resource and Admission Control Function (RACF)[5] or Resource and Admission Control Subsystem (RACS)[6] to cover both the mobile and fixed network environment. The RACF will also need to consider the network neutrality legislation in various countries, such as EU and USA.
With the proposed network architecture presented at the high level and at the somewhat detailed level, the benefits of such architecture needs to be articulated, which is given in the next section.
3.3 Benefit of the Proposed Architecture
By utilizing the terminal intelligence, the benefits to the network can be summarized as follows:
(1)Complexity in Architecture
Compare with the NGN architecture based on Y.2012 and Figure 8, the simplification in terms of network architecture is obvious. By reducing the complexity of the network architecture, the following aspects of the network can be improved:
(2)Reduction in CAPEX
With the proposed NGN architecture, the CAPEX can be reduced in the following areas.
(3)Reduction in OPEX
The operational cost of the network operation can be reduced due to:
4 Open Issues
For the NGN networks, there are a number of open issues to be resolved, which may not be exclusive to the proposed architecture:
(1)User Identity
A user needs to be identified by its permanent identity, not its current routable identities, such as IP address or the E.164 number without number portability. Furthermore, the user needs to be identified across language and country boundaries. The user identity assignment and management needs to be resolved before the NGN network could be widely utilized.
(2) Regulatory
Regulatory issue could also hinder the acceptance of the NGN network. In the proposed network architecture, the service stratum and the transport stratum may not belong to the same carrier. The current VoIP provider is also utilizing this fact on small scale.
(3)Directory Distribution
This is more or less related to the user identity issue. Technically, a mechanism needs to be established to distribute the association between the user identity and its current routable address (e.g. IP address). Distributed database algorithms may be used for such purposes, similar to the distributed database lookup in the various P2P networks. This is also the area in need of standardization.
(4)Standardization
On using the terminal intelligence, a standard based interface between the terminals and the network needs to be established. Since the network and the terminals are cooperating to establish communication sessions, a clear definition of such interface is essential.
5 Conclusions
This paper presents the possible impact of the network architecture where terminal intelligence was utilized. If the terminal intelligence is used, the network complexity can be reduced, which increases the robustness, interoperability, and scalability of the network.
By using the terminal intelligence, the CAPEX of the network can be reduced due to employing simpler network architecture, using network-based reliability, and sharing the network functions between the network and terminals. Besides, the OPEX of the network can also be reduced due to flexible service introduction, less maintenance work, and easy upgrade mechanisms.
References
[1] ITU-T Recommendation Y.2012. Functional Requirements and Architecture of NGN, Release 1 [S]. 2006.
[2] ETSI ES 282 001. Telecommunication and Internet Converged Services and Protocols for Advanced Networking (TISPAN): NGN Functional Architecture, Release 1 [S]. 2005.
[3] ITU-T SG/13 Draft Recommendation Y.NACF. Functional Requirements and Architecture for NACF in Next Generation Network [S]. 2007.
[4] ETSI ES 282 004. Telecommunication and Internet Converged Services and Protocols for Advanced Networking (TISPAN): NGN Functional Architecture: Network Attachment Subsystem [S]. 2005.
[5] ITU-T Recommendation Y.2111. Resource and Admission Control Functions in NGN [S]. 2006.
[6] ETSI ES 282 003 V1.1.1. Resource and Admission Control Sub-system (RACS): Functional Architecture [S]. 2006.
[Abstract] This paper discusses the impacts on the existing NGN network architecture by the intelligent terminals or NGN terminals. An economical and simple network with multitudes of services can be realized if terminal intelligence is utilized for functions traditionally performed by the network. The existing terminals without required intelligence can also be supported via terminal emulation at the edge of the network. Communication is established between the interested parties by the combined efforts of the NGN terminals and the network. A possible network architecture where the NGN terminals and NGN network co-operation is suggested. The benefits for such network, such as increased network robustness, interoperability and scalability, are explored in this paper.