SlideShare a Scribd company logo
Design and Optimization of Authentication, Authorization, and Accounting (AAA) Systems in Mobile Telecommunications Networks Said Zaghloul Technical University Carolo Wilhelmina of Braunschweig, Germany PhD Defense 27.04.2010 Braunschweig, Germany
Presentation Outline
Background: Evolution Trends Evolution of Service  Requirements Evolution of  Cellular Systems
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2009-2014
Background: How an all-IP Network Looks Like ? RNC CAS DPI Rating Server Billing  Server AAA Internet Acronyms RNC:  Radio Network Controller AGW:  Access Gateway CAS:  Content Adapt. Server DPI:  Deep Packet Inspection IMS:  IP Multimedia Subsystem PCRF:  Policy & Charging Rules Function CSCF:  Call Session Control Function AS:  Application Server HSS:  Home Subscriber Subsystem Users  Database AS AS Radio Access  Network PCRF HSS AS CSCF AGW IP Transport Network 3 rd  Parties IMS Network Authentication & Billing WiFi  Access Car-2-X Services Service/Content Aggregation Network Transport  Billing Provider Location Info. Broker Content Provider Wireless Access Subscribers Operator Centric Revenue Streams  Adapted from Eliot Weinman, Harnessing the Mobile Internet, Yankee Group
Background: The AAA Systems Role (1) RNC CAS P-GW Rating Server Billing  Server AAA Internet Users  Database AS AS Radio Access  Network PCRF HSS AS CSCF AGW IP Transport Network 3 rd  Parties IMS Network Authentication & Billing WiFi  Access Car-2-X Services AAA systems are central elements that enable service offerings in emerging cellular networks.
Background: The AAA Systems Role (2) AGW AAA Diameter or RADIUS IP Backbone 1 2 Radio Access  Network IP Domain Authenticate Authentication and Accounting Network Access Server (NAS) Call Detail  Record (CDR) SQL or LDAP Users DB Billing Systems ,[object Object],[object Object],[object Object]
Presentation Outline
Thesis Contribution and Scope
Presentation Outline
Planning: Problem Statement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Planning: Models and Analytical Tools Probability and  stochastic analysis Probability and  stochastic analysis Probability and  stochastic analysis Renewal theoretic  concepts Renewal theoretic  concepts Transient Markov  chains theory Analytical  Tools Fixed  Model Basic Model Distributed  Model Control Plane Planning  Analytical Toolbox
Planning: Assumptions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Planning: Fixed Model (1): Mean Interims Interim  Interval Signaling  Rate     Authentication/ Authorization   Accounting  Interim    Reauth Authorization Lifetime   Interim  Interval Session Time ( S ) Accounting  Start Accounting Stop A message can be transmitted  f  times Accepted session with probability (  ) Retransmissions Factor Proportion of  Received Accepts Let  k  be the number of transmissions,  p  be the packet loss probability, and  N  be the maximum number of retransmissions.
Planning: Fixed Model (2): Mean Interims f J (2) is the service session duration (R.V.) is the accounting interim interval (const.) E[S] /   T Error (E[S]/  T  , Model) > 3 < 5% 2-3 30% - 5% 1-2 72% - 30% 0.5 219% 0   T   2  T   3  T  4  T   5  T f S (s) f J (j) 0  1  2  3  4  5
Planning – Fixed Model (3) Under exponential assumptions for the session duration, the signaling rate is  Parameters: p a  = 100%,  p=1%, 95% confidence ,[object Object],[object Object]
Planning – The Basic Model (1) ,[object Object],Mobile Node AGW 1 AAA Create  Session AGW 2 Authentication & Authorization Handoff To AGW2 1 Auth & Author Accounting  (Start, Interim, Stop) Accounting Session Terminate 2 Accounting session is closed upon handoff for AGW 1 Accounting session is started at AGW 2 Session Duration Holding time (h 1 ) Holding time (h 2 )
Planning – Basic Model (2) ,[object Object],[object Object],4 5 H Tr H T H O Given session initiation and termination points,  Special case In fixed networks: S = H F Area 1  Area 2 H T 3 H O 2 Holding Time Type Full = H F Originating = H O Terminating = H T Transiting = H Tr 1 H F
Planning – Basic Model (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],Session ( S ) H T H Tr H Tr H O
Planning – Basic Model (4) t Session Start  T ACR  (Stop) Case 3 Handoff Event Handoff Event ACR  (Stop) Case 2 Handoff Event ACR  (Stop) Case 1  T  T  T  T Case 1 no  handoffs S H F  T  T  T Case 2 one handoff S H O H T  T  T  T Case 3 multiple handoffs S H Tr H T H Tr H O Accounting Starts and Authentications Accounting Stop Accounting Interims Session Duration
Planning – Basic Model (5) Recall that Break by  E [ K ] Combine using  E [ K ],  p 0 Get  E [ I ]
Planning – Basic Model (6) * * Basic Model Fixed Model * 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 0 200 400 600 800 1000 1200 Mean residence time to mean session time ratio (E[R]/E[S]) Signaling Rate (Messages/sec) Session Arrival Rate Parameters:   =100 req/s,   M  =   T  = 0.5 E[S] Accounting (Mobile) Accounting (Fixed) Auth  (Mobile) Auth (Fixed) Context Transfer ,[object Object],[object Object],[object Object],Signaling as we become more mobile
Planning – Distributed Model (1)
Planning – Distributed Model (2) 15 27 21 9 8 26 20 14 1 2 6 0 7 13 19 25 . . . 12 18 24 32 5 Areas 6 Areas We overlay the a transient Markov chain model to describe the mobility pattern between areas or AGW regions.
Planning – Distributed Model (3) ,[object Object],[object Object],[object Object],[object Object]
Presentation Outline
The Optimization Mechanisms: Delay (2) Policy  System  Application Server Gateway 1 Gateway 2 Home Agent I am NOT paying for this anymore  Delay > 1000 ms Target is 70 ms !! ,[object Object],[object Object],[object Object]
The Optimization Mechanisms: Delay (3) RNC:  Radio Network Controller PCRF:  Policy and Charging Rules Function AAA:  Authentication, Authorization, and Accounting Signal to Noise Ratio TIME Current Cell Candidate Cell Hysteresis  Margin  Handoff D 1 D 2 Trg2 Trg1 Handoff Prediction Proactive QoS Authorization Service Delay Estimates RNC PCRF AAA AAA PCRF
Optimization Mechanisms: Reliability (1) ,[object Object],Start Interim Interim Current Time Unreported Usage  [Potential Loss] Latest  Interim report Next scheduled  Interim report ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Optimization Mechanisms: Reliability (2) Load almost independent of the interim interval AAA Server Capacity Limit Potential Loss Min Loss Max  Load Max  Loss Min  Load AAA  Load Loss Upper  Bound Optimization Region 0 0.5 1 1.5 Interim Interval/Mean Session Duration (  T /E s ) AAA Signaling Load (message/sec)
Optimization Mechanisms: Reliability (3) ,[object Object],System Config Parameters Auth  Req. Acct Start  Req. Acct Stop  Req. ,[object Object],[object Object],[object Object],[object Object],Interim Interval  Estimation Block Mean Service  Arrival Rates Mean Service  Session Durations (  i ) ( E [ S i ] ,  Var [ S i ]) , ,[object Object],Statistics  Collection Block ,[object Object],[object Object],[object Object],[object Object],Interim Intervals for all services  T  Session Type Acct Start Message [Begin-of-Session AVP] Acct Stop Message [Session-Continue AVP] H F true false H O true true H T False or N/A true H Tr False or N/A false
Optimization Mechanisms: Reliability (4): Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Presentation Outline
Proposed New Applications for AAA Systems Gateway  Router 1 AAA RNC RNC Goal: Allow mesh operators to bill cellular operators for backhaul services  Wireless Mesh Operator 2 AAA PCE SW Source Domain  AAA PCE SW SW Transit Domain AAA SW SW Goal: AAA for multi operator layer 2 optical networking Dest Domain B PCE
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Open Research Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design and Performance Optimization of Authentication, Authorization, and Accounting (AAA) Systems in  Mobile  Telecommunications Networks

More Related Content

What's hot

Tacacs
TacacsTacacs
Tacacs
1 2d
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
Dhananjay Aloorkar
 
The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)
Sarah Conway
 
Radiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introductionRadiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introduction
smoscato
 
AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
Mohamed Daif
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos Protocol
Netwax Lab
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
Ahmad El Tawil
 
10215 A 14
10215 A 1410215 A 14
10215 A 14
Juanchi_43
 
SQL under the hood
SQL under the hoodSQL under the hood
SQL under the hood
Eduardo Castro
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
IEEEFINALYEARPROJECTS
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
Rahid Abdul Kalam
 
Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0
Danny Wong
 
Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services: Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services:
Dr. Fahad Aijaz
 
QoS Challenges and Solutions
QoS Challenges and SolutionsQoS Challenges and Solutions
QoS Challenges and Solutions
GoS Networks Ltd
 
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET Journal
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
chennuruvishnu
 
Data power Performance Tuning
Data power Performance TuningData power Performance Tuning
Data power Performance Tuning
KINGSHUK MAJUMDER
 
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud ComputingIRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET Journal
 
Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest Minds
Happiest Minds Technologies
 
Null talk
Null talkNull talk
Null talk
Agam Jain
 

What's hot (20)

Tacacs
TacacsTacacs
Tacacs
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
 
The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)
 
Radiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introductionRadiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introduction
 
AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos Protocol
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
10215 A 14
10215 A 1410215 A 14
10215 A 14
 
SQL under the hood
SQL under the hoodSQL under the hood
SQL under the hood
 
Emap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networks
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0Best Practices for Securing Active Directory v2.0
Best Practices for Securing Active Directory v2.0
 
Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services: Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services:
 
QoS Challenges and Solutions
QoS Challenges and SolutionsQoS Challenges and Solutions
QoS Challenges and Solutions
 
IRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using KerberosIRJET- Internal Security in Metropolitan Area Network using Kerberos
IRJET- Internal Security in Metropolitan Area Network using Kerberos
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Data power Performance Tuning
Data power Performance TuningData power Performance Tuning
Data power Performance Tuning
 
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud ComputingIRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
 
Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest Minds
 
Null talk
Null talkNull talk
Null talk
 

Viewers also liked

Authentication Concepts
Authentication ConceptsAuthentication Concepts
Authentication Concepts
Charles Southerland
 
Security
SecuritySecurity
Security
Akram Salih
 
Authentication, authorization, and accounting Nawaf-Sultan
Authentication, authorization, and accounting Nawaf-SultanAuthentication, authorization, and accounting Nawaf-Sultan
Authentication, authorization, and accounting Nawaf-Sultan
Nawaf_alghamdi
 
A A A
A A AA A A
Keamanan Jaringan - Pertemuan 4
Keamanan Jaringan - Pertemuan 4Keamanan Jaringan - Pertemuan 4
Keamanan Jaringan - Pertemuan 4
Abrianto Nugraha
 
Telecommunication networks for railways
Telecommunication networks for railwaysTelecommunication networks for railways
Telecommunication networks for railways
SIS Group International
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
rahul kundu
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 

Viewers also liked (8)

Authentication Concepts
Authentication ConceptsAuthentication Concepts
Authentication Concepts
 
Security
SecuritySecurity
Security
 
Authentication, authorization, and accounting Nawaf-Sultan
Authentication, authorization, and accounting Nawaf-SultanAuthentication, authorization, and accounting Nawaf-Sultan
Authentication, authorization, and accounting Nawaf-Sultan
 
A A A
A A AA A A
A A A
 
Keamanan Jaringan - Pertemuan 4
Keamanan Jaringan - Pertemuan 4Keamanan Jaringan - Pertemuan 4
Keamanan Jaringan - Pertemuan 4
 
Telecommunication networks for railways
Telecommunication networks for railwaysTelecommunication networks for railways
Telecommunication networks for railways
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 

Similar to Design and Performance Optimization of Authentication, Authorization, and Accounting (AAA) Systems in Mobile Telecommunications Networks

IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET Journal
 
Network and Multimedia QoE Management
Network and Multimedia QoE ManagementNetwork and Multimedia QoE Management
Network and Multimedia QoE Management
Sheng-Wei (Kuan-Ta) Chen
 
Web services and mobile architecture
Web services and mobile architectureWeb services and mobile architecture
Web services and mobile architecture
Dimple Chandra
 
地产知识.ppt
地产知识.ppt地产知识.ppt
地产知识.ppt
wei mingyang
 
Linux capacity planning
Linux capacity planningLinux capacity planning
Linux capacity planning
Francisco Gonçalves
 
Impact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdfImpact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdf
demisse Hailemariam
 
Project
ProjectProject
Project
Faraz Shahid
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET Journal
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
muzzamilaziz
 
DSP_2018_FOEHU - Lec 05 - Digital Filters
DSP_2018_FOEHU - Lec 05 - Digital FiltersDSP_2018_FOEHU - Lec 05 - Digital Filters
DSP_2018_FOEHU - Lec 05 - Digital Filters
Amr E. Mohamed
 
9. Evaluation methodology.pptx
9. Evaluation methodology.pptx9. Evaluation methodology.pptx
9. Evaluation methodology.pptx
Sri Manakula Vinayagar Engineering College
 
Queuing Theory
Queuing TheoryQueuing Theory
Queuing Theory
RenjithVRavi1
 
On Demand Time Sychronizaton for Wireless Sensor Networks-november2009
On Demand Time Sychronizaton for Wireless Sensor Networks-november2009On Demand Time Sychronizaton for Wireless Sensor Networks-november2009
On Demand Time Sychronizaton for Wireless Sensor Networks-november2009
abhiumn
 
SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...
SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...
SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...
IAEME Publication
 
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
IAEME Publication
 
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
IAEME Publication
 
VoIP Billing System
VoIP Billing SystemVoIP Billing System
VoIP Billing System
Zulfikhar Luthfillah
 
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Ericsson
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
sanjoysanyal
 

Similar to Design and Performance Optimization of Authentication, Authorization, and Accounting (AAA) Systems in Mobile Telecommunications Networks (20)

IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
 
Network and Multimedia QoE Management
Network and Multimedia QoE ManagementNetwork and Multimedia QoE Management
Network and Multimedia QoE Management
 
Web services and mobile architecture
Web services and mobile architectureWeb services and mobile architecture
Web services and mobile architecture
 
地产知识.ppt
地产知识.ppt地产知识.ppt
地产知识.ppt
 
Linux capacity planning
Linux capacity planningLinux capacity planning
Linux capacity planning
 
Impact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdfImpact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdf
 
Project
ProjectProject
Project
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
DSP_2018_FOEHU - Lec 05 - Digital Filters
DSP_2018_FOEHU - Lec 05 - Digital FiltersDSP_2018_FOEHU - Lec 05 - Digital Filters
DSP_2018_FOEHU - Lec 05 - Digital Filters
 
9. Evaluation methodology.pptx
9. Evaluation methodology.pptx9. Evaluation methodology.pptx
9. Evaluation methodology.pptx
 
Queuing Theory
Queuing TheoryQueuing Theory
Queuing Theory
 
On Demand Time Sychronizaton for Wireless Sensor Networks-november2009
On Demand Time Sychronizaton for Wireless Sensor Networks-november2009On Demand Time Sychronizaton for Wireless Sensor Networks-november2009
On Demand Time Sychronizaton for Wireless Sensor Networks-november2009
 
SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...
SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...
SIMULATIVE ANALYSIS OF CHANNEL AND QoS AWARE SCHEDULER TO ENHANCE THE CAPACIT...
 
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
 
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
Simulative analysis of channel and qo s aware scheduler to enhance the capaci...
 
VoIP Billing System
VoIP Billing SystemVoIP Billing System
VoIP Billing System
 
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Design and Performance Optimization of Authentication, Authorization, and Accounting (AAA) Systems in Mobile Telecommunications Networks

  • 1. Design and Optimization of Authentication, Authorization, and Accounting (AAA) Systems in Mobile Telecommunications Networks Said Zaghloul Technical University Carolo Wilhelmina of Braunschweig, Germany PhD Defense 27.04.2010 Braunschweig, Germany
  • 3. Background: Evolution Trends Evolution of Service Requirements Evolution of Cellular Systems
  • 4. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2009-2014
  • 5. Background: How an all-IP Network Looks Like ? RNC CAS DPI Rating Server Billing Server AAA Internet Acronyms RNC: Radio Network Controller AGW: Access Gateway CAS: Content Adapt. Server DPI: Deep Packet Inspection IMS: IP Multimedia Subsystem PCRF: Policy & Charging Rules Function CSCF: Call Session Control Function AS: Application Server HSS: Home Subscriber Subsystem Users Database AS AS Radio Access Network PCRF HSS AS CSCF AGW IP Transport Network 3 rd Parties IMS Network Authentication & Billing WiFi Access Car-2-X Services Service/Content Aggregation Network Transport Billing Provider Location Info. Broker Content Provider Wireless Access Subscribers Operator Centric Revenue Streams Adapted from Eliot Weinman, Harnessing the Mobile Internet, Yankee Group
  • 6. Background: The AAA Systems Role (1) RNC CAS P-GW Rating Server Billing Server AAA Internet Users Database AS AS Radio Access Network PCRF HSS AS CSCF AGW IP Transport Network 3 rd Parties IMS Network Authentication & Billing WiFi Access Car-2-X Services AAA systems are central elements that enable service offerings in emerging cellular networks.
  • 7.
  • 11.
  • 12. Planning: Models and Analytical Tools Probability and stochastic analysis Probability and stochastic analysis Probability and stochastic analysis Renewal theoretic concepts Renewal theoretic concepts Transient Markov chains theory Analytical Tools Fixed Model Basic Model Distributed Model Control Plane Planning Analytical Toolbox
  • 13.
  • 14. Planning: Fixed Model (1): Mean Interims Interim Interval Signaling Rate     Authentication/ Authorization   Accounting Interim    Reauth Authorization Lifetime   Interim Interval Session Time ( S ) Accounting Start Accounting Stop A message can be transmitted f times Accepted session with probability ( ) Retransmissions Factor Proportion of Received Accepts Let k be the number of transmissions, p be the packet loss probability, and N be the maximum number of retransmissions.
  • 15. Planning: Fixed Model (2): Mean Interims f J (2) is the service session duration (R.V.) is the accounting interim interval (const.) E[S] /  T Error (E[S]/  T , Model) > 3 < 5% 2-3 30% - 5% 1-2 72% - 30% 0.5 219% 0  T 2  T 3  T 4  T 5  T f S (s) f J (j) 0 1 2 3 4 5
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Planning – Basic Model (4) t Session Start  T ACR (Stop) Case 3 Handoff Event Handoff Event ACR (Stop) Case 2 Handoff Event ACR (Stop) Case 1  T  T  T  T Case 1 no handoffs S H F  T  T  T Case 2 one handoff S H O H T  T  T  T Case 3 multiple handoffs S H Tr H T H Tr H O Accounting Starts and Authentications Accounting Stop Accounting Interims Session Duration
  • 21. Planning – Basic Model (5) Recall that Break by E [ K ] Combine using E [ K ], p 0 Get E [ I ]
  • 22.
  • 24. Planning – Distributed Model (2) 15 27 21 9 8 26 20 14 1 2 6 0 7 13 19 25 . . . 12 18 24 32 5 Areas 6 Areas We overlay the a transient Markov chain model to describe the mobility pattern between areas or AGW regions.
  • 25.
  • 27.
  • 28. The Optimization Mechanisms: Delay (3) RNC: Radio Network Controller PCRF: Policy and Charging Rules Function AAA: Authentication, Authorization, and Accounting Signal to Noise Ratio TIME Current Cell Candidate Cell Hysteresis Margin Handoff D 1 D 2 Trg2 Trg1 Handoff Prediction Proactive QoS Authorization Service Delay Estimates RNC PCRF AAA AAA PCRF
  • 29.
  • 30. Optimization Mechanisms: Reliability (2) Load almost independent of the interim interval AAA Server Capacity Limit Potential Loss Min Loss Max Load Max Loss Min Load AAA Load Loss Upper Bound Optimization Region 0 0.5 1 1.5 Interim Interval/Mean Session Duration (  T /E s ) AAA Signaling Load (message/sec)
  • 31.
  • 32.
  • 33.
  • 35. Proposed New Applications for AAA Systems Gateway Router 1 AAA RNC RNC Goal: Allow mesh operators to bill cellular operators for backhaul services Wireless Mesh Operator 2 AAA PCE SW Source Domain AAA PCE SW SW Transit Domain AAA SW SW Goal: AAA for multi operator layer 2 optical networking Dest Domain B PCE
  • 36.
  • 37.

Editor's Notes

  1. R. Koodli, Fast Handovers for Mobile IPv6 [RFC 4068], Jul 2005 K. Taniuchi, IEEE 802.21: Media Independent Handover , Comm Mag, Jan 09 A. Dutta et al, A Framework of Media-Independent Pre-Authentication (MPA), 2008 I. Ali et al, Network based mobility management in the EPC Network, Comm Mag., Feb 09