1 BCMCS Framework TSG-X BCMCS Adhoc August 20, 2003.

Slides:



Advertisements
Similar presentations
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
Advertisements

1 CAMEL in GPRS prepaid service
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Page 1 3GPP2 Broadcast and Multicast Service Contact: Jun Wang, Qualcomm Inc.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 Liaison Report to TR-50 August 2011.
User Services Presenter: Dr. Marvin Bienn 3GPP2 TSG-X Chair
The OSI Model.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks ANCP WG IETF 71 – Philadelphia draft-ietf-ancp-framework-05.txt.
T Multimedia Seminar Carlos Herrero55828H Osmo Tolvanen46958L.
0 draft-lkchoi-mmusic-iptvdbs-req-00.txt 63rd IETF, 1 August 2005 Requirement of service provider for the Data Broadcasting Service over the IPTV Lark.
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
1 Motorola PMIPv4 Call Flows: Bearer Setup with Dual Anchoring Parviz YeganiVojislav VuceticAlmon Tang (408) (732) (847)
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop - draft - Jack Nasielski
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
1 MMD Evolution June 28, Outline MMD Basics End-to-End Example –Packet Switched Video Telephony Transition to MMD Legacy MS Domain Evolution MMD.
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc 1.
16 June Lucent Technologies grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable.
QoS framework (PR0002) Rev.0.5 (Work in progress).
1/19 BCMCS Support In IS-820-C (Stage 2) Lijun Zhao QUALCOMM July 20th, 2004.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
4.1.4 multi-homing.
3GPP2 Circuit-Switched Video Conferencing & Packet-Switched Video Telephony Services Overview Scott Droste Chair, TSG-C WG1 Applications & Services Motorola.
3GPP2 Charging Betsy Kidwell Chair, 3GPP2 TSG-X Lucent Technologies OMA-MCC Bangkok, Thailand June 2004.
Dec GPP2 TSG-X PDS 1 BCMCS Higher-Layer Encryption Raymond Hsu, Jun Wang Qualcomm Inc. Dec Notice QUALCOMM Incorporated grants a free, irrevocable.
Cdma2000 Femto Standardization Activities in 3GPP2 … Femtocell World Summit June 21 st -23 rd, 2011 London, UK.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
ABSTRACT: This contribution introduces the inter-RAT fast handover solution. TITLE: Inter-Radio Access Technology Fast Handover TSG-A WG4 RECOMMENDATION:
eHRPD (evolved High Rate Packet Data)
Cdma2000 Femto Standardization Activities in 3GPP2 Presenter: Peerapol Tinnakornsrisuphap Qualcomm Femtocell Americas November 16 th -17 th, 2009 San Diego,
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
1 3GPP2 IMS Charging Infrastructure Presented for 3GPP2 TSG-X by Nick Mazzarella of Lucent Technologies September 25, 2004.
ABSTRACT: This contribution proposes the HRPD-WiMAX handoff solution. TITLE: HRPD-WiMAX Handoff TSG-A WG4 RECOMMENDATION: Review and Adopt Samsung Electronics.
Jun Wang Anand Palanigounder Peerapol Tinnakornsrisuphap
3GPP2 Workplan & PMT TSG-S OMA Ad-Hoc 13 December 2003 Grand Wailea Resort, Maui.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
3GPP GBA Overview Adrian Escott.
Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 Liaison Report to TR-50 August 2012.
OSI ARCHITECTURE IN OSI, ACTUAL INFORMATION IS OVERHEADED BY PROTOCOL LAYERS IF ALL SEVEN LAYERS ARE OVERHEADED, THEN AS LITTLE AS 15% OF THE TRANSMITTED.
Multimedia Streaming I. Fatimah Alzahrani. Introduction We can divide audio and video services into three broad categories: streaming stored audio/video,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
NETLMM Applicability Draft (Summary) 28 Sep
Air-Interface Application Layer Security (A 2 LS) Wireless secure communications group, Whippany.
1 SAMSUNG BCMCS Security Architecture and Key Management JUNHYUK SONG SAMSUNG Incorporated grants a free, irrevocable license to 3GPP2 and its Organization.
1 BCMCS Framework Jun Wang, Philip Hawkes, Raymond Hsu, Paul Bender Sept. 12, 2002 Notice QUALCOMM Incorporated grants a free, irrevocable license to 3GPP2.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Lucent Technologies – Proprietary Use pursuant to company instruction Air-Interface Application Layer Security (A 2 LS) Wireless secure communications.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Networking Applications
NETLMM Applicability Draft (Summary)
Wireless Communication CDMA EVDO Systems
Name:Shivalila A H,Shima
Introduction to Packet Sniffing using Ethereal
Chapter 3: Open Systems Interconnection (OSI) Model
Application Layer Mobility Management Scheme for Wireless Internet
Presentation transcript:

1 BCMCS Framework TSG-X BCMCS Adhoc August 20, 2003

2 Current Status Stage 1 Document (S.P 0030-A, v ): –Ad hoc and TSG-S WG1 jointly reviewed the document –Under other TSGs review now Security Framework Document (S.P 0083, v.0.6): –Adhoc and TSG-S WG4 jointly reviewed the document –Under other TSGs review BCMCS Framework Document (X.P 0019, v.0.1.3): –Draft baseline text are under other TSGs review –One open issue: Framing TSG-X: –Stage 2 and 3 work started, will be in a separate document from X.P0011 (TIA-835) TSG-A: –Stage 2 and 3 will be in a separate document from IOS 5.0? TSG-C: –1X EVDV: Plans to be in C.S0001-C.S0005 (TIA-2000-D)? –1X EVDO: Baseline in July and V&V is compete (C.S0054)

3 BCMCS Concepts

4 Overview Optimize use of the cdma2000 radio interface over the air BCMCS provides delivery of the IP flows that comprise BCMCS Programs (content) to one or more terminals in one or more regions of the 3GPP2 network. The 3GPP2 operator has control of: –Transmission Areas of BCMCS IP flows –Billing of the user and/or content provider –Encryption of the IP flows Examples: weather, stock, news, pay per view movies, sport events etc.

5 Architecture

6 BCMCS Controller: –Communicates with the mobile to provide detailed information necessary to choose and receive a BCMCS program. May also provide lists of available programs. –Communicates with the BCMCS Content Provider to control the ability of a Content Provider to send BCMCS programs to a BCMCS Content Server. –May generate BCMCS Access Keys (BAKs) to encrypt BCMCS program content. –Distributes BAK to the MS –Communicates via the S-AAA with the PDSN to provide IP multicast addressing and flow treatment information to the PDSN. BCMCS Content Provider: –Is the source of BCMCS programs sent to users. –Communicates with the BCMCS Controller to arrange the delivery of a program to a BCMCS Content Server.

7 Architecture BCMCS Content Server: –Is the last application that manipulates the BCMCS IP flows before they are sent to the PDSNs. –May combine several input programs from BCMCS Content Providers, e.g., traffic + weather + advertising combining. –Provides upper layer encryption of BCMCS programs when so chosen by the operator. BCMCS Client on the mobile: –Communicates with the BCMCS Controller via normal IP methods in a client-server relationship to obtain detailed information necessary to receive desired BCMCS programs. –Decrypts and displays BCMCS program.

8 Basic Procedures Service Discovery/Announcement –Used to find out available BCMCS service –Distribute information about the service, parameters required for information acquisition and program schedule –Via out of band mechanisms Content Subscriptions –Subscribes to BCMCS –RK (Registration Key) is provisioned –Via out of band mechanisms Information Acquisitions –Obtain BCMCS Session related info from Controller (BCMCS_FLOW_ID, header compression etc) –Obtain Security Parameters (BAK etc) Content Availability Determination –Determines whether a Multicast IP flow is available in a particular sector and the BCMCS radio configuration information –Via the overhead messages from a BS BCMCS Registration –Request for delivering the IP flows in a particular sector –The first user may trigger the Bearer Path establishment –Notify where to page the MS Reception of the Content BCMCS Deregistration

9 Key Hierarchy for CS-MS Security SK (Session Key) –Used to decrypt content. –Changes frequently to discourage session theft –Generated by the UIM card and sent to the ME BAK (BCMCS Access Key) –Used to generate SK –Provides access to program/multicast IP flow –Decrypted and stored in the UIM TK (Temporary Key) –Used to encrypt/decrypt the BCMCS Access Key (BAK) for transmission to the MS –Generated from RK RK (Registration Key) –Used to generate TK –RK is obtained when user subscribes to broadcast services –Stored in the UIM

10 Security Architecture

11 Protocol Stack

12 BCMCS Parameters (Non-security related) Content Name –Content Name represents the name given to the BCMCS Content Stream by the service provider. –Content Names are likely to be human-friendly. –Content Name is discovered by the user via SMS, WAP, HTML, etc. Multicast IP Address and Transport Layer Port Number –A {Multicast IP Address and Transport Layer Port Number} tuple identifies the destination multicast IP address and the destination transport layer (e.g., UDP) port number for an IP flow within a BCMCS Content Stream. BCMCS_FLOW_ID –BCMCS_FLOW_ID is an alias for the {Multicast IP Address and Transport Layer Port Number}. Used to efficiently transport over the air. Radio Parameters –Examples of these parameters are physical channel identification and characteristics, logical channel identification, logical channel to physical channel mapping, soft handoff group and registration parameters.

13 Operational Scenarios- Service Discovery, Information Acquisition, and Content Availability Determination

14 Operational Scenarios - Bearer Path Setup (PPP Required)

15 Operational Scenarios - Bearer Path Setup (w/o PPP Required)

16 Accounting Collected accounting data should be able to help service provider: –Billing on BCMCS Originators/Content Provider –Billing on BCMCS viewers/subscribers Accounting type: –Flat fee (e.g., monthly payment) –Pay per view –Usage Based Accounting data may be collected by: –RAN –PDSN –BCMCS Controller Accounting data should send to HAAA.

17 Example for Accounting by BCMCS Controller 1.The BCMCS client application on the MS communicates with the BCMCS Controller to acquire BCMCS information. 2.The BCMCS Controller responds with the BCMCS information. This information may include BAK values that will allow the user to receive and properly decode BCMCS content streams. 3.The BCMCS Controller sends accounting information to the AAA. 4.The AAA responds to acknowledge the accounting information. The BCMCS Controller may include the following accounting information for each subscribed user: - User Identity (NAI)- BCMCS Controller Identity - BCMCS_FLOW_ID - Content name - BAK_ID- BAK lifetime - Multicast IP address(es)/port number(s) of the content stream