IEEE 802.1CF 2019
$81.25
IEEE Recommended Practice for Network Reference Model and Functional Description of IEEE 802(R) Access Network
Published By | Publication Date | Number of Pages |
IEEE | 2019 | 185 |
New IEEE Standard – Active. An access network (which connects terminals to their access routers) utilizing technologies based on the family of IEEE 802® standards is specified in this recommended practice. An access network reference model (NRM) that includes entities and reference points along with behavioral and functional descriptions of communications among those entities is provided in this recommended practice.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 802.1CF™-2019 front cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
7 | Participants |
9 | Introduction |
10 | Contents |
18 | 1. Overview 1.1 Scope 1.2 Purpose |
19 | 2. Normative references |
20 | 3. Definitions |
21 | 4. Acronyms, abbreviations, and conventions 4.1 Acronyms and abbreviations |
22 | 4.2 Conventions 4.2.1 Occurrence of information elements 4.2.2 Information model notation |
23 | 5. Access network reference model (NRM) 5.1 Introduction |
24 | 5.2 Basic architectural concepts and terms 5.3 Overview of IEEE 802 NRM 5.3.1 General 5.3.2 Schematic overview |
25 | 5.3.3 Reference point types |
26 | 5.4 Basic NRM 5.4.1 General 5.4.2 Functional entities 5.4.2.1 Terminal (TE) |
27 | 5.4.2.2 Access network (AN) 5.4.2.3 Access router (AR) 5.4.2.4 Subscription service (SS) 5.4.2.5 Network management system (NMS) 5.4.3 Reference points |
28 | 5.5 NRM with coordination and information service (CIS) 5.5.1 General 6.4.1 Introduction |
29 | 5.5.2 Additional functional entities 5.5.2.1 Coordination and information service (CIS) 5.5.3 Additional reference points 5.6 Comprehensive NRM 5.6.1 General 5.6.2 Additional functional entities 5.6.2.1 Node of attachment (NA) |
30 | 5.6.2.2 Backhaul (BH) 5.6.3 Additional reference points 5.6.4 Representation with abbreviations 5.7 Operational roles |
31 | 5.8 Identifiers |
33 | 5.9 Network virtualization 5.9.1 General 5.9.2 Basic assumptions |
35 | 5.9.3 Instantiation and life cycle of virtualized access network |
36 | 5.9.4 Multi-instance design and issues |
37 | 5.10 Deployment scenarios 5.10.1 Introduction 5.10.2 Wireless local area network (WLAN) router |
39 | 5.10.3 Home network |
40 | 5.10.4 Enterprise network |
43 | 5.10.5 Enterprise network with multiple bridging domains |
44 | 5.10.6 Industrial network |
46 | 5.10.7 Public hotspot |
48 | 5.10.8 Virtualized WLAN access network for in-building IoT services |
51 | 5.10.9 Fog deployment scenario |
54 | 6. Functional decomposition and design 6.1 Introduction |
55 | 6.2 Access network setup 6.2.1 Introduction and overview |
56 | 6.2.2 Roles 6.2.2.1 Terminal (TE) 6.2.2.2 Access network (AN) 6.2.2.3 Node of attachment (NA) 6.2.2.4 Backhaul (BH) 6.2.2.5 Access network control (ANC) 6.2.2.6 Network management system (NMS) 6.2.2.7 Coordination and information service (CIS) 6.2.3 Use cases 6.2.3.1 Access network initialization |
57 | 6.2.3.2 Access network reconfiguration (reinitialization) 6.2.3.3 Radio channel adjustments 6.2.4 Functional requirements 6.2.4.1 Access network configuration 6.2.4.2 Access network interconnection 6.2.4.3 Channel selection 6.2.4.4 Channel reselection 6.2.4.5 Operation on various channels |
58 | 6.2.4.6 Multi-mode support 6.2.5 Access network setup-specific attributes 6.2.5.1 General 6.2.5.2 Network management system (NMS) 6.2.5.3 Access network control (ANC) 6.2.5.4 Backhaul (BH) 6.2.5.5 Node of Attachment (NA) 6.2.5.6 Access network configuration 6.2.6 Access network setup-specific basic functions 6.2.6.1 Boot-up process of network elements |
59 | 6.2.7 Detailed procedures 6.2.7.1 Access network setup procedure |
60 | 6.2.7.2 Access network release procedure |
61 | 6.2.8 Mapping to IEEE 802 technologies 6.3 Access network discovery and selection (NDS) 6.3.1 Introduction |
62 | 6.3.2 Roles 6.3.2.1 Terminal (TE) 6.3.2.2 Node of attachment (NA) 6.3.2.3 Access network (AN) |
63 | 6.3.3 Use cases 6.3.3.1 Introduction 6.3.3.2 Finding the most appropriate access network 6.3.3.3 Reconnecting to an access network 6.3.3.4 Handover within an access network 6.3.3.5 Handover to another access network |
64 | 6.3.4 Functional requirements 6.3.4.1 Support for multiple access technologies 6.3.4.2 Support for multiple different access networks supporting same or different SSs 6.3.4.3 Support for multiple subscriptions on the same access technologies 6.3.4.4 Extensibility to support specific service requirements 6.3.4.5 Discovery of access network capabilities 6.3.5 NDS-specific attributes 6.3.5.1 Service selection |
65 | 6.3.5.2 Subscription 6.3.5.3 Terminal (TE) 6.3.5.4 Node of attachment (NA) |
66 | 6.3.6 NDS basic functions 6.3.6.1 NA Discovery 6.3.6.2 AN Detection |
67 | 6.3.6.3 SS Detection 6.3.6.4 AR Detection 6.3.6.5 SS and AR Selection 6.3.7 Detailed procedures 6.3.7.1 First-time use of terminal without subscription |
68 | 6.3.7.2 Initial AN access 6.3.7.3 NA transition 6.3.7.4 Access network reentry |
69 | 6.3.7.5 Access network transition 6.3.8 Mapping to IEEE 802 technologies 6.3.8.1 Introduction 6.3.8.2 IEEE 802.3 6.3.8.3 IEEE 802.11 |
70 | 6.3.8.4 IEEE 802.16 6.3.8.5 IEEE 802.22 6.4 Association and disassociation |
71 | 6.4.2 Roles 6.4.2.1 Terminal (TE) 6.4.2.2 Node of attachment (NA) 6.4.2.3 Access network control (ANC) 6.4.3 Use cases 6.4.3.1 General 6.4.3.2 Connection setup as part of network entry |
72 | 6.4.3.3 Connection relocation within the same access network 6.4.3.4 Connection teardown 6.4.4 Functional requirements |
73 | 6.4.5 Association-specific attributes 6.4.5.1 Access link 6.4.5.2 Terminal (TE) 6.4.5.3 Node of attachment (NA) 6.4.6 Association-specific basic functions 6.4.6.1 Association |
74 | 6.4.6.2 Reassociation 6.4.6.3 Disassociation 6.4.7 Detailed procedures 6.4.7.1 Successful connection setup with negotiation of connection parameters |
75 | 6.4.7.2 Orderly session teardown initiated by terminal 6.4.7.3 Session termination enforced by NA 6.4.7.4 Session relocation with support of fast transition schemes |
76 | 6.4.8 Mapping to IEEE 802 technologies 6.5 Authentication and trust establishment 6.5.1 Introduction |
78 | 6.5.2 Roles 6.5.2.1 General |
79 | 6.5.2.2 User 6.5.2.3 Service provider 6.5.2.4 Subscription 6.5.2.5 Terminal (TE) 6.5.2.6 Access network (AN) 6.5.2.7 Subscription service (SS) 6.5.3 Use cases 6.5.3.1 Introduction 6.5.3.2 Access network with direct relation to SS 6.5.3.3 Access network with relation to SS relayed over another SS |
80 | 6.5.3.4 Access network with relation to the SS of a roaming consortia 6.5.4 Functional requirements 6.5.5 Authentication-specific attributes 6.5.5.1 Security association |
81 | 6.5.5.2 Subscription 6.5.5.3 Terminal (TE) 6.5.5.4 Access network control (ANC) 6.5.5.5 Subscription Service (SS) |
82 | 6.5.6 Authentication-specific basic functions 6.5.6.1 Identification request 6.5.6.2 Identification notify 6.5.6.3 Authentication process 6.5.6.4 Trust establishment 6.5.6.5 Trust revocation 6.5.7 Detailed procedures 6.5.7.1 Direct service access |
83 | 6.5.7.2 Service access with relay of authentication over another SS |
84 | 6.5.8 Mapping to IEEE 802 technologies 6.6 Datapath establishment, relocation, and teardown 6.6.1 Introduction 6.6.1.1 Data forwarding in access network |
85 | 6.6.1.2 Connectivity characteristics |
86 | 6.6.1.3 Traffic types |
87 | 6.6.1.4 Time-sensitive networking |
88 | 6.6.2 Roles 6.6.2.1 Datapath |
89 | 6.6.2.2 Terminal interface (TEI) 6.6.2.3 Node of attachment (NA) 6.6.2.4 Backhaul (BH) 6.6.2.5 Access router interface (ARI) 6.6.2.6 Subscription service (SS) |
90 | 6.6.2.7 Access network control (ANC) 6.6.2.8 Network management system (NMS) 6.6.3 Use cases 6.6.3.1 Single, plain access network 6.6.3.2 Industrial network for time-sensitive applications |
91 | 6.6.3.3 Shared wireless access network |
92 | 6.6.3.4 Multi-operator backhaul infrastructure |
93 | 6.6.4 Functional requirements 6.6.5 Datapath-specific attributes 6.6.5.1 Datapath 6.6.5.2 Node of attachment (NA) 6.6.5.3 Backhaul (BH) |
94 | 6.6.5.4 Access router (AR) 6.6.5.5 Subscription service (SS) 6.6.6 Datapath-specific basic functions 6.6.6.1 Retrieval of session-specific datapath configuration values for access network 6.6.6.2 Activation of datapath in the NA 6.6.6.3 Teardown of datapath in the NA 6.6.6.4 Activation of datapath in the backhaul |
95 | 6.6.6.5 Teardown of datapath in the backhaul 6.6.6.6 Access router interface establishment 6.6.6.7 Access router interface teardown 6.6.7 Detailed procedures 6.6.7.1 Overview |
96 | 6.6.7.2 Datapath establishment |
97 | 6.6.7.3 Datapath relocation |
98 | 6.6.7.4 Datapath teardown |
99 | 6.6.8 Mapping to IEEE 802 technologies 6.7 Authorization, QoS, and policy control 6.7.1 Introduction 6.7.1.1 Aspects 6.7.1.2 QoS models supported by IEEE 802 |
100 | 6.7.1.3 Repository of QoS settings and policy parameters 6.7.1.4 QoS policy control architecture and mapping to the NRM |
101 | 6.7.1.5 TSN control architecture and mapping to the NRM |
103 | 6.7.2 Roles 6.7.2.1 Service flow |
104 | 6.7.2.2 Subscription 6.7.2.3 Subscription service (SS) 6.7.2.4 Access network control (ANC) 6.7.2.5 Node of attachment and backhaul (NA and BH) 6.7.2.6 Terminal control and access router control (TEC and ARC) 6.7.3 Use cases 6.7.3.1 QoS policy provisioning to ANC |
105 | 6.7.3.2 Default service flow creation, modification, and deletion 6.7.3.3 Change of authorization by SS 6.7.3.4 Access router–initiated service flow creation, modification, and deletion 6.7.3.5 Terminal-initiated service flow creation, modification, and deletion 6.7.4 Functional requirements 6.7.5 QoS policy-specific attributes 6.7.5.1 Service flow |
106 | 6.7.5.2 Node of attachment (NA) 6.7.5.3 Backhaul (BH) 6.7.5.4 Subscription service (SS) 6.7.6 QoS policy control-specific basic functions 6.7.6.1 Provisioning of authorization information to policy decision point at session beginning |
107 | 6.7.6.2 Change of authorization during session 6.7.6.3 Provisioning of QoS parameters to policy enforcement points 6.7.6.4 Request of service flow by terminal 6.7.6.5 Request of service flow by access router 6.7.7 Detailed procedures 6.7.7.1 Pre-provisioned service flow establishment |
108 | 6.7.7.2 Service flow initialization by terminal |
109 | 6.7.7.3 Service flow initialization by access router |
110 | 6.7.7.4 Service flow modification by terminal |
111 | 6.7.7.5 Service flow termination by terminal 6.7.7.6 Change of authorization by SS |
112 | 6.7.8 Mapping to IEEE 802 technologies 6.8 Accounting and monitoring 6.8.1 Introduction |
113 | 6.8.2 Roles 6.8.2.1 Terminal (TE) 6.8.2.2 Network management system (NMS) 6.8.2.3 Access network control (ANC) |
114 | 6.8.2.4 Node of attachment and backhaul (NA and BH) 6.8.2.5 Subscription service (SS) 6.8.3 Use cases 6.8.3.1 General 6.8.3.2 Performance analysis 6.8.3.3 Security analysis 6.8.3.4 Billing |
115 | 6.8.4 Functional requirements 6.8.5 Accounting and monitoring-specific attributes 6.8.5.1 Session statistics 6.8.5.2 Node of attachment (NA) 6.8.5.3 Backhaul (BH) |
116 | 6.8.5.4 Access network control (ANC) 6.8.5.5 Subscription service (SS) 6.8.6 Accounting and monitoring-specific basic functions 6.8.6.1 Monitoring |
117 | 6.8.6.2 Collection 6.8.6.3 Mediation |
118 | 6.8.7 Detailed procedures 6.8.7.1 Accounting configuration |
119 | 6.8.7.2 Accounting |
121 | 6.8.7.3 Monitoring 6.8.8 Mapping to IEEE 802 technologies |
126 | 6.9 Fault diagnostics and maintenance (FDM) 6.9.1 Introduction 6.9.2 Roles 6.9.2.1 General 6.9.2.2 Network management system (NMS) |
127 | 6.9.2.3 Access network control (ANC) 6.9.3 Use cases 6.9.3.1 General 6.9.3.2 Alarm notification to NMS 6.9.3.3 NMS maintenance requests to ANC |
128 | 6.9.3.4 Automatic fault recovery by ANC 6.9.4 Functional requirements |
129 | 6.9.5 FDM-specific attributes 6.9.5.1 Alarm list 6.9.5.2 Link-monitoring statistics 6.9.5.3 Test statistics 6.9.5.4 SelfCheck statistics |
130 | 6.9.5.5 FDM capabilities 6.9.5.6 FDM configuration 6.9.5.7 Access network control (ANC) 6.9.5.8 Network management system (NMS) |
131 | 6.9.6 FDM-specific basic functions 6.9.6.1 Capability discovery 6.9.6.2 FDM registration 6.9.6.3 Fault isolation 6.9.6.4 Fault recovery |
132 | 6.9.7 Detailed procedures 6.9.7.1 FDM configuration |
133 | 6.9.7.2 Remote failure indication 6.9.7.3 Link monitoring |
136 | 6.9.7.4 Testing |
137 | 6.9.7.5 Management information aggregation |
138 | 6.9.8 Mapping to IEEE 802 technologies |
140 | 7. Network softwarization functions 7.1 Introduction 7.2 Information model of IEEE 802 access network 7.2.1 Composition of information model |
141 | 7.2.2 Session information model 7.2.2.1 General |
142 | 7.2.2.2 Service selection information model 7.2.2.3 Access link information model |
143 | 7.2.2.4 Security association information model |
144 | 7.2.2.5 Datapath information model |
145 | 7.2.2.6 Service flow information model |
146 | 7.2.2.7 Session statistics information model 7.2.2.8 Complete session information model |
148 | 7.2.3 Access network configuration information model |
149 | 7.2.4 Network management information model 7.3 Virtualized network instantiation 7.3.1 General |
151 | 7.3.2 Roles 7.3.2.1 General 7.3.2.2 Orchestrator 7.3.2.3 Access network (AN) 7.3.2.4 Access network control (ANC) 7.3.2.5 Node of attachment (NA) 7.3.2.6 Backhaul (BH) |
152 | 7.3.3 Use cases 7.3.3.1 Instantiation of a new virtualized access network 7.3.3.2 Dynamically adding instances to the virtualized access network 7.3.3.3 Dynamically removing instances from the virtualized access network 7.3.3.4 Removal of the entire virtualized access network |
153 | 7.3.4 Functional requirements 7.3.4.1 Creation of multiple virtualized networking entities 7.3.4.2 Virtualized access network configuration 7.3.4.3 Multiple service provider support 7.3.5 Network instantiation procedures 7.3.5.1 Virtualized access network instantiation procedure |
154 | 7.3.5.2 Virtualized access network release procedure |
155 | 7.3.5.3 Adding a new NA instance to the access network procedure |
156 | 7.3.5.4 Removal of an NA instance from the access network procedure 7.3.5.5 Update virtualized access network configuration procedure |
157 | Annex A (normative) Functional enhancements to IEEE 802 access network |
164 | Annex B (informative) Information model notation |
166 | Annex C (informative) Software-defined networking (SDN) functional decomposition |
179 | Annex D (informative) Network function virtualization (NFV) |
183 | Annex E (informative) Bibliography |
185 | Back cover |