ITU-T J 362-2006 IPCablecom2 control point discovery (Study Group 9)《IPCablecom2控制点发现研究组9》.pdf
《ITU-T J 362-2006 IPCablecom2 control point discovery (Study Group 9)《IPCablecom2控制点发现研究组9》.pdf》由会员分享,可在线阅读,更多相关《ITU-T J 362-2006 IPCablecom2 control point discovery (Study Group 9)《IPCablecom2控制点发现研究组9》.pdf(54页珍藏版)》请在麦多课文档分享上搜索。
1、 International Telecommunication Union ITU-T J.362TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2006) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS IPCablecom IPCablecom2 control point discovery ITU-T Recommendation J.362 ITU-T Rec. J.362
2、 (11/2006) i ITU-T Recommendation J.362 IPCablecom2 control point discovery Summary This Recommendation defines an IP-based protocol that can be used to discover a control point for a given IP address. The control point is the place where QoS operations, lawful intercept (LI) content tapping operati
3、ons, or other operations may be performed. Source ITU-T Recommendation J.362 was approved on 29 November 2006 by ITU-T Study Group 9 (2005-2008) under the ITU-T Recommendation A.8 procedure. ii ITU-T Rec. J.362 (11/2006) FOREWORD The International Telecommunication Union (ITU) is the United Nations
4、specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications
5、 on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid
6、 down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunicat
7、ion administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandato
8、ry provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws att
9、ention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or othe
10、rs outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent
11、 the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2007 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. ITU-T Rec. J.362 (11/2006) i
12、ii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions 1 4 Abbreviations and acronyms 1 5 Conventions 2 6 Technical overview. 2 6.1 Assumptions . 3 7 Interface description . 3 7.1 Network-based control point discovery application. 4 7.2 NLS-TL header parameters 5 7.3 CPD request 5 7.4 CPD response
13、 . 6 7.5 Error responses . 7 8 Procedures 7 8.1 Requestor 7 8.2 Control point. 8 9 Security considerations. 9 Annex A Network Layer Signaling: Transport Layer 10 Annex B QoS requirements 44 Appendix I Open issues 45 Bibliography. 46 ITU-T Rec. J.362 (11/2006) 1 ITU-T Recommendation J.362 IPCablecom2
14、 control point discovery 1 Scope This Recommendation defines an IP-based protocol that can be used to discover a control point for a given IP address. The control point is the place where QoS operations, lawful intercept (LI) content tapping operations, or other operations may be performed. 2 Refere
15、nces None. 3 Definitions This Recommendation defines the following terms: 3.1 control point: Within the context of this Recommendation, control point refers to a point in the network that can be used to apply a function for a media flow that flows through that point. Functions described here are: Qo
16、S (IPCablecom multimedia b-ITU-T J.179 or IPCablecom DQoS b-ITU-T J.163). Replication, encapsulation and transmission for the purposes of LI content tapping. 3.2 control point discovery: The act of discovering information (IP address, protocol) concerning a control point in order to allow a requesto
17、r to apply a specific controlling function. 3.3 requestor: The requestor in this context is the controller that wishes to control the control point and hence needs to discover the necessary information to do so. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and ac
18、ronyms: CMS Call Management Server CMTS Cable Modem Termination System COPS Common Open Policy Service CPD Control Point Discovery CR Control Relationship DF Delivery Function DNS Domain Name Service DQoS Dynamic Quality of Service ICE Interactive Connectivity Establishment IP Internet Protocol LI L
19、awful Intercept MIB Management Information Base NAT Network Address Translation NE Network Element 2 ITU-T Rec. J.362 (11/2006) NLS Network Layer Signalling NLS-TL Network Layer Signalling Transport Layer PS Policy Server QoS Quality of Service SDP Session Description Protocol STUN Simple Traversal
20、of UDP through NAT TURN Traversal Using Relay NAT UDP User Datagram Protocol 5 Conventions Throughout this Recommendation, the words that are used to define the significance of particular requirements are capitalized. These words are: “MUST“ This word means that the item is an absolute requirement o
21、f this Recommendation. “MUST NOT“ This phrase means that the item is an absolute prohibition of this Recommendation. “SHOULD“ This word means that there may exist valid reasons in particular circumstances to ignore this item, but the full implications should be understood and the case carefully weig
22、hed before choosing a different course. “SHOULD NOT“ This phrase means that there may exist valid reasons in particular circumstances when the listed behaviour is acceptable or even useful, but the full implications should be understood and the case carefully weighed before implementing any behaviou
23、r described with this label. “MAY“ This word means that this item is truly optional. One vendor may choose to include the item because a particular marketplace requires it or because it enhances the product, for example; another vendor may omit the same item. 6 Technical overview The general approac
24、h for control point discovery is illustrated by the reference model in Figure 6-1. A requestor that knows the IP address of the media endpoint sends a control point discovery (CPD) message toward that endpoint (reference point pkt-qos-2). A control point in the path between the requestor and the end
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTJ3622006IPCABLECOM2CONTROLPOINTDISCOVERYSTUDYGROUP9IPCABLECOM2 控制 发现 研究 PDF

链接地址:http://www.mydoc123.com/p-798964.html