ATIS 0300075-2008 Usage Data Management for Packet-Based Services Service-Neutral Architecture and Protocol Requirements.pdf
《ATIS 0300075-2008 Usage Data Management for Packet-Based Services Service-Neutral Architecture and Protocol Requirements.pdf》由会员分享,可在线阅读,更多相关《ATIS 0300075-2008 Usage Data Management for Packet-Based Services Service-Neutral Architecture and Protocol Requirements.pdf(25页珍藏版)》请在麦多课文档分享上搜索。
1、 TECHNICAL REPORT ATIS-0300075 USAGE DATA MANAGEMENT FOR PACKET-BASED SERVICES SERVICE-NEUTRAL ARCHITECTURE AND PROTOCOL REQUIREMENTS ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the informatio
2、n, entertainment and communications industry. More than 200 companies actively formulate standards in ATIS 17 Committees, covering issues including: IPTV, Cloud Services, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, Billing and Operational Support, Emergency Services, A
3、rchitectural Platforms and Emerging Networks. In addition, numerous Incubators, Focus and Exploratory Groups address evolving industry priorities including Smart Grid, Machine-to-Machine, Networked Car, IP Downloadable Security, Policy Management and Network Optimization. ATIS is the North American
4、Organizational Partner for the 3rd Generation Partnership Project (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). ATIS is accredited by the Am
5、erican National Standards Institute (ANSI). For more information, please visit . Notice of Disclaimer however, they do not meet the real-time and high-performance requirements of todays rapidly evolving data networks. Based on more detailed analysis along the lines mentioned above, the need for a re
6、liable, fast, efficient and flexible accounting protocol exists. This document specifies these requirements. 1.2 Purpose and Scope This document specifies requirements and architecture for a family of protocols to collect usage data to be applied to a specified range of business applications across
7、various packet-based services. These protocols and architecture, a.k.a accounting management mechanism, should enable efficient and reliable delivery of any data, mainly Usage Entries from Network Elements and/or Service Elements to any systems, such as mediation systems and BSS/OSS. They should add
8、ress the critical needs for exporting high volume of Data Records from the Service Element with efficient use of network, storage, and processing resources. Standardization of this accounting management mechanism should provide technical information that is sufficient for practical implementations o
9、f interchange of usage data among Network Elements and/or Service Elements participating in the delivery of IP-based services, either within a single enterprise or across multiple enterprises. The objective is to facilitate the integration of IP-based Network Elements and Service Elements into billi
10、ng, reporting and Service Assurance systems. In particular, one key goal is to define a service-independent usage information model and exchange protocol to facilitate the flow of usage information from IP Network Elements and/or Service Elements to support systems. This document specifies a high le
11、vel architecture of this accounting management mechanism. This document is intended to be a general delta document with the ITU-T recommendation “Y.2233” 1 as a basis. This document is not intended to provide detailed specific, point by point, section by section, differences from 1 Future revisions
12、of this specification are expected to make every attempt to preserve investments made by service providers and solution vendors by considering backward and forward compatibility whenever it is practical. ATIS-0300075 2 1.3 Target Applications The following are a service-independent set of applicatio
13、ns that should be considered in determining the requirements for the protocol to be applied at this interface1. The target applications are: Retail Billing The rendering of an invoice for charges due to a Service Provider by a Subscriber to their services, as per an agreed rate plan and service agre
14、ement. Wholesale Billing The rendering of an invoice for charges due to a Network Operator from a Service Provider for access or transport services via which the Service Providers services were delivered. Intercarrier Settlement The process by which Service Providers determine the periodic net charg
15、es due from one party to another for services rendered by each of the parties on behalf of the others Subscribers. In addition the protocol can be used by the following applications: Internal Cost Accounting (e.g. Chargeback) Use of accounting information by a commercial Subscriber for separating th
16、e aggregate usage into sub-accounts associated with the enterprises financial components. Customer Care All those activities associated with the sustenance of satisfactory Subscriber service levels, including inquiries, account changes, restoral, and termination. Marketing Information Demographic, f
17、inancial, statistical, geographical, and temporal data used to aid in decision making and direction setting for product and services positioning and introduction by a Service Provider. Law Enforcement Information Support capture of targeted service usage entries, requested by a legal order for use b
18、y various agencies of law enforcement. Capacity Planning Predictive extension of existing usage patterns to allow for adequate resources to be staged in such a timeframe as to ensure continuity of agreed service levels. Traffic Profiling Statistical portrayal of usage information for characterizing
19、the patterns of usage levels and concentrations at nodal points and across transport boundaries. Traffic Engineering Use of traffic profile information to manage the configuration of infrastructure resources so as to ensure service level continuity. Performance Management Use of statistical data der
20、ived from network and service element telemetry to adapt the configuration of those elements to ensure service level continuity. Revenue assurance - Any activity an organization performs to ensure that processes, practices, and procedures result in revenue that is billed and collected completely, ac
21、curately and in a timely manner. This involves all areas of the organization, from customer care and network systems to invoicing and collections and finance, crossing all boundaries. Revenue leakage is revenue the company has earned, but has neither billed for nor collected. This revenue is lost. R
22、evenue assurance includes Fraud Abatement e.g., Attack/Intrusion Detection Use of statistical and pattern recognition results to detect, prevent, and interdict in usage by Service Consumers not authorized for such usage by a Subscription agreement. QoS Monitoring / SLA Management Use of all varietie
23、s of network and BSS data in the tracking and adaptation of network behavior to ensure service level continuity. 1It should be noted that the protocol specified in satisfaction of these requirements may not apply directly to the implementation of many of these applications, but the applications indi
24、rectly induce requirements on the protocol at the point of interface where the protocol is implemented. ATIS-0300075 3 The generic requirements for all application types along with the suggested level of requirements, per application, for every single requirement, are specified in Clause 7. Specific
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS03000752008USAGEDATAMANAGEMENTFORPACKETBASEDSERVICESSERVICENEUTRALARCHITECTUREANDPROTOCOLREQUIREMENTSPDF

链接地址:http://www.mydoc123.com/p-540996.html