Shopping Cart

No products in the cart.

IEEE 802.1CF 2019

$81.25

IEEE Recommended Practice for Network Reference Model and Functional Description of IEEE 802(R) Access Network

Published By Publication Date Number of Pages
IEEE 2019 185
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Active. An access network (which connects terminals to their access routers) utilizing technologies based on the family of IEEE 802® standards is specified in this recommended practice. An access network reference model (NRM) that includes entities and reference points along with behavioral and functional descriptions of communications among those entities is provided in this recommended practice.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 802.1CF™-2019 front cover
2 Title page
4 Important Notices and Disclaimers Concerning IEEE Standards Documents
7 Participants
9 Introduction
10 Contents
18 1. Overview
1.1 Scope
1.2 Purpose
19 2. Normative references
20 3. Definitions
21 4. Acronyms, abbreviations, and conventions
4.1 Acronyms and abbreviations
22 4.2 Conventions
4.2.1 Occurrence of information elements
4.2.2 Information model notation
23 5. Access network reference model (NRM)
5.1 Introduction
24 5.2 Basic architectural concepts and terms
5.3 Overview of IEEE 802 NRM
5.3.1 General
5.3.2 Schematic overview
25 5.3.3 Reference point types
26 5.4 Basic NRM
5.4.1 General
5.4.2 Functional entities
5.4.2.1 Terminal (TE)
27 5.4.2.2 Access network (AN)
5.4.2.3 Access router (AR)
5.4.2.4 Subscription service (SS)
5.4.2.5 Network management system (NMS)
5.4.3 Reference points
28 5.5 NRM with coordination and information service (CIS)
5.5.1 General
6.4.1 Introduction
29 5.5.2 Additional functional entities
5.5.2.1 Coordination and information service (CIS)
5.5.3 Additional reference points
5.6 Comprehensive NRM
5.6.1 General
5.6.2 Additional functional entities
5.6.2.1 Node of attachment (NA)
30 5.6.2.2 Backhaul (BH)
5.6.3 Additional reference points
5.6.4 Representation with abbreviations
5.7 Operational roles
31 5.8 Identifiers
33 5.9 Network virtualization
5.9.1 General
5.9.2 Basic assumptions
35 5.9.3 Instantiation and life cycle of virtualized access network
36 5.9.4 Multi-instance design and issues
37 5.10 Deployment scenarios
5.10.1 Introduction
5.10.2 Wireless local area network (WLAN) router
39 5.10.3 Home network
40 5.10.4 Enterprise network
43 5.10.5 Enterprise network with multiple bridging domains
44 5.10.6 Industrial network
46 5.10.7 Public hotspot
48 5.10.8 Virtualized WLAN access network for in-building IoT services
51 5.10.9 Fog deployment scenario
54 6. Functional decomposition and design
6.1 Introduction
55 6.2 Access network setup
6.2.1 Introduction and overview
56 6.2.2 Roles
6.2.2.1 Terminal (TE)
6.2.2.2 Access network (AN)
6.2.2.3 Node of attachment (NA)
6.2.2.4 Backhaul (BH)
6.2.2.5 Access network control (ANC)
6.2.2.6 Network management system (NMS)
6.2.2.7 Coordination and information service (CIS)
6.2.3 Use cases
6.2.3.1 Access network initialization
57 6.2.3.2 Access network reconfiguration (reinitialization)
6.2.3.3 Radio channel adjustments
6.2.4 Functional requirements
6.2.4.1 Access network configuration
6.2.4.2 Access network interconnection
6.2.4.3 Channel selection
6.2.4.4 Channel reselection
6.2.4.5 Operation on various channels
58 6.2.4.6 Multi-mode support
6.2.5 Access network setup-specific attributes
6.2.5.1 General
6.2.5.2 Network management system (NMS)
6.2.5.3 Access network control (ANC)
6.2.5.4 Backhaul (BH)
6.2.5.5 Node of Attachment (NA)
6.2.5.6 Access network configuration
6.2.6 Access network setup-specific basic functions
6.2.6.1 Boot-up process of network elements
59 6.2.7 Detailed procedures
6.2.7.1 Access network setup procedure
60 6.2.7.2 Access network release procedure
61 6.2.8 Mapping to IEEE 802 technologies
6.3 Access network discovery and selection (NDS)
6.3.1 Introduction
62 6.3.2 Roles
6.3.2.1 Terminal (TE)
6.3.2.2 Node of attachment (NA)
6.3.2.3 Access network (AN)
63 6.3.3 Use cases
6.3.3.1 Introduction
6.3.3.2 Finding the most appropriate access network
6.3.3.3 Reconnecting to an access network
6.3.3.4 Handover within an access network
6.3.3.5 Handover to another access network
64 6.3.4 Functional requirements
6.3.4.1 Support for multiple access technologies
6.3.4.2 Support for multiple different access networks supporting same or different SSs
6.3.4.3 Support for multiple subscriptions on the same access technologies
6.3.4.4 Extensibility to support specific service requirements
6.3.4.5 Discovery of access network capabilities
6.3.5 NDS-specific attributes
6.3.5.1 Service selection
65 6.3.5.2 Subscription
6.3.5.3 Terminal (TE)
6.3.5.4 Node of attachment (NA)
66 6.3.6 NDS basic functions
6.3.6.1 NA Discovery
6.3.6.2 AN Detection
67 6.3.6.3 SS Detection
6.3.6.4 AR Detection
6.3.6.5 SS and AR Selection
6.3.7 Detailed procedures
6.3.7.1 First-time use of terminal without subscription
68 6.3.7.2 Initial AN access
6.3.7.3 NA transition
6.3.7.4 Access network reentry
69 6.3.7.5 Access network transition
6.3.8 Mapping to IEEE 802 technologies
6.3.8.1 Introduction
6.3.8.2 IEEE 802.3
6.3.8.3 IEEE 802.11
70 6.3.8.4 IEEE 802.16
6.3.8.5 IEEE 802.22
6.4 Association and disassociation
71 6.4.2 Roles
6.4.2.1 Terminal (TE)
6.4.2.2 Node of attachment (NA)
6.4.2.3 Access network control (ANC)
6.4.3 Use cases
6.4.3.1 General
6.4.3.2 Connection setup as part of network entry
72 6.4.3.3 Connection relocation within the same access network
6.4.3.4 Connection teardown
6.4.4 Functional requirements
73 6.4.5 Association-specific attributes
6.4.5.1 Access link
6.4.5.2 Terminal (TE)
6.4.5.3 Node of attachment (NA)
6.4.6 Association-specific basic functions
6.4.6.1 Association
74 6.4.6.2 Reassociation
6.4.6.3 Disassociation
6.4.7 Detailed procedures
6.4.7.1 Successful connection setup with negotiation of connection parameters
75 6.4.7.2 Orderly session teardown initiated by terminal
6.4.7.3 Session termination enforced by NA
6.4.7.4 Session relocation with support of fast transition schemes
76 6.4.8 Mapping to IEEE 802 technologies
6.5 Authentication and trust establishment
6.5.1 Introduction
78 6.5.2 Roles
6.5.2.1 General
79 6.5.2.2 User
6.5.2.3 Service provider
6.5.2.4 Subscription
6.5.2.5 Terminal (TE)
6.5.2.6 Access network (AN)
6.5.2.7 Subscription service (SS)
6.5.3 Use cases
6.5.3.1 Introduction
6.5.3.2 Access network with direct relation to SS
6.5.3.3 Access network with relation to SS relayed over another SS
80 6.5.3.4 Access network with relation to the SS of a roaming consortia
6.5.4 Functional requirements
6.5.5 Authentication-specific attributes
6.5.5.1 Security association
81 6.5.5.2 Subscription
6.5.5.3 Terminal (TE)
6.5.5.4 Access network control (ANC)
6.5.5.5 Subscription Service (SS)
82 6.5.6 Authentication-specific basic functions
6.5.6.1 Identification request
6.5.6.2 Identification notify
6.5.6.3 Authentication process
6.5.6.4 Trust establishment
6.5.6.5 Trust revocation
6.5.7 Detailed procedures
6.5.7.1 Direct service access
83 6.5.7.2 Service access with relay of authentication over another SS
84 6.5.8 Mapping to IEEE 802 technologies
6.6 Datapath establishment, relocation, and teardown
6.6.1 Introduction
6.6.1.1 Data forwarding in access network
85 6.6.1.2 Connectivity characteristics
86 6.6.1.3 Traffic types
87 6.6.1.4 Time-sensitive networking
88 6.6.2 Roles
6.6.2.1 Datapath
89 6.6.2.2 Terminal interface (TEI)
6.6.2.3 Node of attachment (NA)
6.6.2.4 Backhaul (BH)
6.6.2.5 Access router interface (ARI)
6.6.2.6 Subscription service (SS)
90 6.6.2.7 Access network control (ANC)
6.6.2.8 Network management system (NMS)
6.6.3 Use cases
6.6.3.1 Single, plain access network
6.6.3.2 Industrial network for time-sensitive applications
91 6.6.3.3 Shared wireless access network
92 6.6.3.4 Multi-operator backhaul infrastructure
93 6.6.4 Functional requirements
6.6.5 Datapath-specific attributes
6.6.5.1 Datapath
6.6.5.2 Node of attachment (NA)
6.6.5.3 Backhaul (BH)
94 6.6.5.4 Access router (AR)
6.6.5.5 Subscription service (SS)
6.6.6 Datapath-specific basic functions
6.6.6.1 Retrieval of session-specific datapath configuration values for access network
6.6.6.2 Activation of datapath in the NA
6.6.6.3 Teardown of datapath in the NA
6.6.6.4 Activation of datapath in the backhaul
95 6.6.6.5 Teardown of datapath in the backhaul
6.6.6.6 Access router interface establishment
6.6.6.7 Access router interface teardown
6.6.7 Detailed procedures
6.6.7.1 Overview
96 6.6.7.2 Datapath establishment
97 6.6.7.3 Datapath relocation
98 6.6.7.4 Datapath teardown
99 6.6.8 Mapping to IEEE 802 technologies
6.7 Authorization, QoS, and policy control
6.7.1 Introduction
6.7.1.1 Aspects
6.7.1.2 QoS models supported by IEEE 802
100 6.7.1.3 Repository of QoS settings and policy parameters
6.7.1.4 QoS policy control architecture and mapping to the NRM
101 6.7.1.5 TSN control architecture and mapping to the NRM
103 6.7.2 Roles
6.7.2.1 Service flow
104 6.7.2.2 Subscription
6.7.2.3 Subscription service (SS)
6.7.2.4 Access network control (ANC)
6.7.2.5 Node of attachment and backhaul (NA and BH)
6.7.2.6 Terminal control and access router control (TEC and ARC)
6.7.3 Use cases
6.7.3.1 QoS policy provisioning to ANC
105 6.7.3.2 Default service flow creation, modification, and deletion
6.7.3.3 Change of authorization by SS
6.7.3.4 Access router–initiated service flow creation, modification, and deletion
6.7.3.5 Terminal-initiated service flow creation, modification, and deletion
6.7.4 Functional requirements
6.7.5 QoS policy-specific attributes
6.7.5.1 Service flow
106 6.7.5.2 Node of attachment (NA)
6.7.5.3 Backhaul (BH)
6.7.5.4 Subscription service (SS)
6.7.6 QoS policy control-specific basic functions
6.7.6.1 Provisioning of authorization information to policy decision point at session beginning
107 6.7.6.2 Change of authorization during session
6.7.6.3 Provisioning of QoS parameters to policy enforcement points
6.7.6.4 Request of service flow by terminal
6.7.6.5 Request of service flow by access router
6.7.7 Detailed procedures
6.7.7.1 Pre-provisioned service flow establishment
108 6.7.7.2 Service flow initialization by terminal
109 6.7.7.3 Service flow initialization by access router
110 6.7.7.4 Service flow modification by terminal
111 6.7.7.5 Service flow termination by terminal
6.7.7.6 Change of authorization by SS
112 6.7.8 Mapping to IEEE 802 technologies
6.8 Accounting and monitoring
6.8.1 Introduction
113 6.8.2 Roles
6.8.2.1 Terminal (TE)
6.8.2.2 Network management system (NMS)
6.8.2.3 Access network control (ANC)
114 6.8.2.4 Node of attachment and backhaul (NA and BH)
6.8.2.5 Subscription service (SS)
6.8.3 Use cases
6.8.3.1 General
6.8.3.2 Performance analysis
6.8.3.3 Security analysis
6.8.3.4 Billing
115 6.8.4 Functional requirements
6.8.5 Accounting and monitoring-specific attributes
6.8.5.1 Session statistics
6.8.5.2 Node of attachment (NA)
6.8.5.3 Backhaul (BH)
116 6.8.5.4 Access network control (ANC)
6.8.5.5 Subscription service (SS)
6.8.6 Accounting and monitoring-specific basic functions
6.8.6.1 Monitoring
117 6.8.6.2 Collection
6.8.6.3 Mediation
118 6.8.7 Detailed procedures
6.8.7.1 Accounting configuration
119 6.8.7.2 Accounting
121 6.8.7.3 Monitoring
6.8.8 Mapping to IEEE 802 technologies
126 6.9 Fault diagnostics and maintenance (FDM)
6.9.1 Introduction
6.9.2 Roles
6.9.2.1 General
6.9.2.2 Network management system (NMS)
127 6.9.2.3 Access network control (ANC)
6.9.3 Use cases
6.9.3.1 General
6.9.3.2 Alarm notification to NMS
6.9.3.3 NMS maintenance requests to ANC
128 6.9.3.4 Automatic fault recovery by ANC
6.9.4 Functional requirements
129 6.9.5 FDM-specific attributes
6.9.5.1 Alarm list
6.9.5.2 Link-monitoring statistics
6.9.5.3 Test statistics
6.9.5.4 SelfCheck statistics
130 6.9.5.5 FDM capabilities
6.9.5.6 FDM configuration
6.9.5.7 Access network control (ANC)
6.9.5.8 Network management system (NMS)
131 6.9.6 FDM-specific basic functions
6.9.6.1 Capability discovery
6.9.6.2 FDM registration
6.9.6.3 Fault isolation
6.9.6.4 Fault recovery
132 6.9.7 Detailed procedures
6.9.7.1 FDM configuration
133 6.9.7.2 Remote failure indication
6.9.7.3 Link monitoring
136 6.9.7.4 Testing
137 6.9.7.5 Management information aggregation
138 6.9.8 Mapping to IEEE 802 technologies
140 7. Network softwarization functions
7.1 Introduction
7.2 Information model of IEEE 802 access network
7.2.1 Composition of information model
141 7.2.2 Session information model
7.2.2.1 General
142 7.2.2.2 Service selection information model
7.2.2.3 Access link information model
143 7.2.2.4 Security association information model
144 7.2.2.5 Datapath information model
145 7.2.2.6 Service flow information model
146 7.2.2.7 Session statistics information model
7.2.2.8 Complete session information model
148 7.2.3 Access network configuration information model
149 7.2.4 Network management information model
7.3 Virtualized network instantiation
7.3.1 General
151 7.3.2 Roles
7.3.2.1 General
7.3.2.2 Orchestrator
7.3.2.3 Access network (AN)
7.3.2.4 Access network control (ANC)
7.3.2.5 Node of attachment (NA)
7.3.2.6 Backhaul (BH)
152 7.3.3 Use cases
7.3.3.1 Instantiation of a new virtualized access network
7.3.3.2 Dynamically adding instances to the virtualized access network
7.3.3.3 Dynamically removing instances from the virtualized access network
7.3.3.4 Removal of the entire virtualized access network
153 7.3.4 Functional requirements
7.3.4.1 Creation of multiple virtualized networking entities
7.3.4.2 Virtualized access network configuration
7.3.4.3 Multiple service provider support
7.3.5 Network instantiation procedures
7.3.5.1 Virtualized access network instantiation procedure
154 7.3.5.2 Virtualized access network release procedure
155 7.3.5.3 Adding a new NA instance to the access network procedure
156 7.3.5.4 Removal of an NA instance from the access network procedure
7.3.5.5 Update virtualized access network configuration procedure
157 Annex A (normative) Functional enhancements to IEEE 802 access network
164 Annex B (informative) Information model notation
166 Annex C (informative) Software-defined networking (SDN) functional decomposition
179 Annex D (informative) Network function virtualization (NFV)
183 Annex E (informative) Bibliography
185 Back cover
IEEE 802.1CF 2019
$81.25