SlideShare a Scribd company logo
TR-069
CPE WAN Management Protocol
(CWMP)
Adam Rozumek
InterOperability Lab
University of New Hampshire
2007
What is TR-069?
From the TR-069 Amendment 1 document:
A protocol for communication between Customer Premise Equipment (CPE) and
Auto-Configuration Server (ACS) that encompasses secure auto-configuration as well
as other CPE management functions within a common framework.
http://upload.wikimedia.org/wikipedia/en/f/fa/Remote_CPE_Controle_via_TR-069.jpg
TR-069 CPE/ACS Interaction Model:
CPE ACS
Open connection
SSL initiation
HTTP post
HTTP response
Inform request
Inform response
HTTP post
GetParameterValues response
HTTP response
SetParameterValues request
HTTP post
SetParameterValues response
Close connection
HTTP response
HTTP post
HTTP response
GetParameterValues request
Figure 3 of DSL Forum’s TR-069 Amendment 1
Why TR-069?
Service Providers can, through TR-069, use one common platform to manage,
through the Internet, all of their Customer Premise Devices, no matter the device
nor the manufacturer.
This common application has never been achieved before due to CPE vendors
creating proprietary mechanisms for management, and not wanting to expose those
mechanisms to their competitors.
Image source: DSL Forum’s PD-128
Benefits of TR-069:
•CWMP device configuration, troubleshooting, firmware upgrades, user management,
and reporting for TR-069 enabled devices to reduce truck rolls
• Enables service providers to offer dynamic services such as home networking, security,
Voice over IP, centrally managed by a TR-069 ACS
• Reduces support calls by automated/proactive monitoring and managing of TR-069
CWMP devices
Difficulties with TR-069:
-No matter how well the specification is written, there is room for interpretation and
error during implementation.
Example: There is a typo in the specification where a common word, used
to define a field, is misspelled. Does the vendor take the specification at its
literal meaning, or does the vendor correct the spelling error?
-SOAP implementation: TR-069 requires that all communications between the CPE (client) and ACS
(server) be done via a persistent, bi-directional connection. However SOAP was designed for
transitory, one-way communications where the roles of client and server are clearly defined. By
requiring a persistent connection, TR-069 is switching these roles during communications,
something SOAP wasn't designed to do and introducing complexity to a "simple" protocol.
-In the current specification it is necessary for the SOAP to be generated
manually, a process highly prone to errors and interpretation.
From fine point technologies website: http://www.finepoint.com/services/certification.htm
Difficulties with TR-069 (cont.)
Has to cross several layers of protocols and methods that must interoperate:
Layer Description
CPE/ACS Application The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively.
The application is locally defined and not specified as part of the CPE WAN Management
Protocol.
RPC Methods The specific RPC methods that are defined by the CPE WAN Management Protocol.
SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically
SOAP 1.1
HTTP HTTP 1.1
SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 (Secure
Socket Layer), or TLS 1.0 (Transport Layer Security)
TCP/IP Standard TCP/IP.
Table 1 of TR-069 Amendment 1
TR-069 vs. SNMP
SNMP is a technology that is tried and true, but each company has it's own MIB
(management information base), and SNMP has been known to have security flaws. TR-069
was created to be device agnostic, meaning that all CPE devices can be managed by one TR-
069 Auto Configuration Server (ACS) no matter the manufacturer etc.
SNMP (Simple Network Management Protocol) is used by network management systems to
monitor network-attached devices for conditions that warrant administrative attention. It
consists of a set of standards for network management, including an application layer protocol,
a database schema, and a set of data objects.
Privacy Concerns:
Although it may seem invasive and insecure to have devices able to be accessed
without active consent, there are many security protocols included in the TR-069
documents.
From the TR-069 Amendment 1 document:
1.1 Security Goals:
The CPE WAN Management Protocol is designed to provide a high degree of security. The
security model is also designed to be scalable. It is intended to allow basic security to
accommodate less robust CPE implementations, while allowing greater security for those that
can support more advanced security mechanisms. In general terms, the security goals of the
CPE WAN Management Protocol are as follows:
Prevent tampering with the management functions of a CPE or ACS, or the transactions
that take place between the CPE and ACS.
Provide confidentiality for the transactions that take place between a CPE and ACS.
Allow appropriate authentication for each type of transaction.
Prevent theft of service.
What can TR-069 be used for so far?
Any and all CPE, such as VoIP Analog Telephone Adapters, DSL Modems, and
Residential Gateways.
These capabilities are provisioned by TR-069 and its extensions (TR-098, TR-
104, TR-106, TR-110, TR-111)
TR-098 - data model for internet gateway devices (DSL modems with built in routers)
TR-104 - data model and any specific items for VoIP devices
TR-106 - a base object structure for TR-069 enabled devices
TR-110 - a reference model for VoIP configurations
TR-111 - covers applying TR-069 to remote management of home networking devices
TR-069 Extensions:
Reality of TR-069:
Since TR-069’s ratification, changing market dynamics continue to impact the way service
providers conduct business. A single high-speed data service is no longer a viable, long-term
path to retain market share or grow revenue. Prices of core data services—and the associated
margins—are declining steeply, and market saturation of basic broadband is on the horizon. To
remain competitive, carriers are expanding into new video and content services, going after
video franchises, bundling entertainment packages, and competing head-to-head with
traditional cable operators to attract and retain new customers.
From “TR-069 and beyond,” by Heather Kirksey (http://telephonyonline.com/access/commentary/dsl_tr069_standards_071406/index.html)
- TR-069 has to keep expanding to incorporate the many new technologies
being developed for in-home use

More Related Content

Similar to TR-069_Overview.ppt

Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comAnne Kwong
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019Robert Parker
 
11bec091_MajorProject_Presentation_2015
11bec091_MajorProject_Presentation_201511bec091_MajorProject_Presentation_2015
11bec091_MajorProject_Presentation_2015Harshit Trivedi
 
client server protocol
client server protocolclient server protocol
client server protocolbmuhire
 
Trisul Trai compliance
Trisul Trai complianceTrisul Trai compliance
Trisul Trai compliancetrisulnsm
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.pptmashiur
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019Robert Parker
 
A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...Becky Gilbert
 
Common industrial protocol
Common industrial protocolCommon industrial protocol
Common industrial protocolHuấn Trần
 
Mrv wp-application-aware-networking
Mrv wp-application-aware-networkingMrv wp-application-aware-networking
Mrv wp-application-aware-networkingMRV Communications
 
Tail f Systems Whitepaper - Top Ten Management Issues for ATCA
Tail f Systems Whitepaper - Top Ten Management Issues for ATCATail f Systems Whitepaper - Top Ten Management Issues for ATCA
Tail f Systems Whitepaper - Top Ten Management Issues for ATCATail-f Systems
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
Examining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldExamining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldArief Gunawan
 
1.why do we need protocols in computer networks.2.In internet IP.pdf
1.why do we need protocols in computer networks.2.In internet IP.pdf1.why do we need protocols in computer networks.2.In internet IP.pdf
1.why do we need protocols in computer networks.2.In internet IP.pdfssuserbf0420
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 

Similar to TR-069_Overview.ppt (20)

Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.comDenovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
Denovo SIP VoIP Termination SBC Session Boarder Controler @ denofolab.com
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019
 
wp244
wp244wp244
wp244
 
11bec091_MajorProject_Presentation_2015
11bec091_MajorProject_Presentation_201511bec091_MajorProject_Presentation_2015
11bec091_MajorProject_Presentation_2015
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Trisul Trai compliance
Trisul Trai complianceTrisul Trai compliance
Trisul Trai compliance
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.ppt
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019
 
A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...
 
Common industrial protocol
Common industrial protocolCommon industrial protocol
Common industrial protocol
 
Mrv wp-application-aware-networking
Mrv wp-application-aware-networkingMrv wp-application-aware-networking
Mrv wp-application-aware-networking
 
Tail f Systems Whitepaper - Top Ten Management Issues for ATCA
Tail f Systems Whitepaper - Top Ten Management Issues for ATCATail f Systems Whitepaper - Top Ten Management Issues for ATCA
Tail f Systems Whitepaper - Top Ten Management Issues for ATCA
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
Examining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldExamining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet world
 
1.why do we need protocols in computer networks.2.In internet IP.pdf
1.why do we need protocols in computer networks.2.In internet IP.pdf1.why do we need protocols in computer networks.2.In internet IP.pdf
1.why do we need protocols in computer networks.2.In internet IP.pdf
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
CentralizedSerialWP
CentralizedSerialWPCentralizedSerialWP
CentralizedSerialWP
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 

More from AvneeshKumar164042

Dental Radiography machine.ppt
Dental Radiography machine.pptDental Radiography machine.ppt
Dental Radiography machine.pptAvneeshKumar164042
 
13-Ling-21---Lecture-12b---Language-Thought-and-Culture.ppt
13-Ling-21---Lecture-12b---Language-Thought-and-Culture.ppt13-Ling-21---Lecture-12b---Language-Thought-and-Culture.ppt
13-Ling-21---Lecture-12b---Language-Thought-and-Culture.pptAvneeshKumar164042
 
xrayproductionandproperties-171229054704.pdf
xrayproductionandproperties-171229054704.pdfxrayproductionandproperties-171229054704.pdf
xrayproductionandproperties-171229054704.pdfAvneeshKumar164042
 
Dressen-RSA-2019-preconference-data-workshop-copy.pptx
Dressen-RSA-2019-preconference-data-workshop-copy.pptxDressen-RSA-2019-preconference-data-workshop-copy.pptx
Dressen-RSA-2019-preconference-data-workshop-copy.pptxAvneeshKumar164042
 
barbados-day1-presentation_blending.pptx
barbados-day1-presentation_blending.pptxbarbados-day1-presentation_blending.pptx
barbados-day1-presentation_blending.pptxAvneeshKumar164042
 
Capacity Development Program for Investment Promotion Agencies of the LDCs by...
Capacity Development Program for Investment Promotion Agencies of the LDCs by...Capacity Development Program for Investment Promotion Agencies of the LDCs by...
Capacity Development Program for Investment Promotion Agencies of the LDCs by...AvneeshKumar164042
 
BCH_6.4_international Business_week 4_vartika_FDI.pptx
BCH_6.4_international Business_week 4_vartika_FDI.pptxBCH_6.4_international Business_week 4_vartika_FDI.pptx
BCH_6.4_international Business_week 4_vartika_FDI.pptxAvneeshKumar164042
 
2) Infective endocarditis .pptx
2) Infective endocarditis .pptx2) Infective endocarditis .pptx
2) Infective endocarditis .pptxAvneeshKumar164042
 
Soft-Skills-Usman- Ghani-Akbani-for-participants.pptx
Soft-Skills-Usman- Ghani-Akbani-for-participants.pptxSoft-Skills-Usman- Ghani-Akbani-for-participants.pptx
Soft-Skills-Usman- Ghani-Akbani-for-participants.pptxAvneeshKumar164042
 

More from AvneeshKumar164042 (20)

Dental Radiography machine.ppt
Dental Radiography machine.pptDental Radiography machine.ppt
Dental Radiography machine.ppt
 
telagana.ppt
telagana.ppttelagana.ppt
telagana.ppt
 
BholuMNNIT.ppt
BholuMNNIT.pptBholuMNNIT.ppt
BholuMNNIT.ppt
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
13-Ling-21---Lecture-12b---Language-Thought-and-Culture.ppt
13-Ling-21---Lecture-12b---Language-Thought-and-Culture.ppt13-Ling-21---Lecture-12b---Language-Thought-and-Culture.ppt
13-Ling-21---Lecture-12b---Language-Thought-and-Culture.ppt
 
Hypertension.ppt
Hypertension.pptHypertension.ppt
Hypertension.ppt
 
GenerationofXRays.ppt
GenerationofXRays.pptGenerationofXRays.ppt
GenerationofXRays.ppt
 
2-180318193019.pdf
2-180318193019.pdf2-180318193019.pdf
2-180318193019.pdf
 
xrayproductionandproperties-171229054704.pdf
xrayproductionandproperties-171229054704.pdfxrayproductionandproperties-171229054704.pdf
xrayproductionandproperties-171229054704.pdf
 
Dressen-RSA-2019-preconference-data-workshop-copy.pptx
Dressen-RSA-2019-preconference-data-workshop-copy.pptxDressen-RSA-2019-preconference-data-workshop-copy.pptx
Dressen-RSA-2019-preconference-data-workshop-copy.pptx
 
barbados-day1-presentation_blending.pptx
barbados-day1-presentation_blending.pptxbarbados-day1-presentation_blending.pptx
barbados-day1-presentation_blending.pptx
 
Capacity Development Program for Investment Promotion Agencies of the LDCs by...
Capacity Development Program for Investment Promotion Agencies of the LDCs by...Capacity Development Program for Investment Promotion Agencies of the LDCs by...
Capacity Development Program for Investment Promotion Agencies of the LDCs by...
 
BCH_6.4_international Business_week 4_vartika_FDI.pptx
BCH_6.4_international Business_week 4_vartika_FDI.pptxBCH_6.4_international Business_week 4_vartika_FDI.pptx
BCH_6.4_international Business_week 4_vartika_FDI.pptx
 
2) Infective endocarditis .pptx
2) Infective endocarditis .pptx2) Infective endocarditis .pptx
2) Infective endocarditis .pptx
 
Sinusitis.ppt
Sinusitis.pptSinusitis.ppt
Sinusitis.ppt
 
Arterial Blood Gas.ppt1.ppt
Arterial Blood Gas.ppt1.pptArterial Blood Gas.ppt1.ppt
Arterial Blood Gas.ppt1.ppt
 
Chapter15.ppt
Chapter15.pptChapter15.ppt
Chapter15.ppt
 
Chapter_021.pptx
Chapter_021.pptxChapter_021.pptx
Chapter_021.pptx
 
24_lecture_pptEK.ppt
24_lecture_pptEK.ppt24_lecture_pptEK.ppt
24_lecture_pptEK.ppt
 
Soft-Skills-Usman- Ghani-Akbani-for-participants.pptx
Soft-Skills-Usman- Ghani-Akbani-for-participants.pptxSoft-Skills-Usman- Ghani-Akbani-for-participants.pptx
Soft-Skills-Usman- Ghani-Akbani-for-participants.pptx
 

Recently uploaded

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 

Recently uploaded (12)

The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Stay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design TrendsStay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design Trends
 

TR-069_Overview.ppt

  • 1. TR-069 CPE WAN Management Protocol (CWMP) Adam Rozumek InterOperability Lab University of New Hampshire 2007
  • 2. What is TR-069? From the TR-069 Amendment 1 document: A protocol for communication between Customer Premise Equipment (CPE) and Auto-Configuration Server (ACS) that encompasses secure auto-configuration as well as other CPE management functions within a common framework. http://upload.wikimedia.org/wikipedia/en/f/fa/Remote_CPE_Controle_via_TR-069.jpg
  • 3. TR-069 CPE/ACS Interaction Model: CPE ACS Open connection SSL initiation HTTP post HTTP response Inform request Inform response HTTP post GetParameterValues response HTTP response SetParameterValues request HTTP post SetParameterValues response Close connection HTTP response HTTP post HTTP response GetParameterValues request Figure 3 of DSL Forum’s TR-069 Amendment 1
  • 4. Why TR-069? Service Providers can, through TR-069, use one common platform to manage, through the Internet, all of their Customer Premise Devices, no matter the device nor the manufacturer. This common application has never been achieved before due to CPE vendors creating proprietary mechanisms for management, and not wanting to expose those mechanisms to their competitors. Image source: DSL Forum’s PD-128
  • 5. Benefits of TR-069: •CWMP device configuration, troubleshooting, firmware upgrades, user management, and reporting for TR-069 enabled devices to reduce truck rolls • Enables service providers to offer dynamic services such as home networking, security, Voice over IP, centrally managed by a TR-069 ACS • Reduces support calls by automated/proactive monitoring and managing of TR-069 CWMP devices
  • 6. Difficulties with TR-069: -No matter how well the specification is written, there is room for interpretation and error during implementation. Example: There is a typo in the specification where a common word, used to define a field, is misspelled. Does the vendor take the specification at its literal meaning, or does the vendor correct the spelling error? -SOAP implementation: TR-069 requires that all communications between the CPE (client) and ACS (server) be done via a persistent, bi-directional connection. However SOAP was designed for transitory, one-way communications where the roles of client and server are clearly defined. By requiring a persistent connection, TR-069 is switching these roles during communications, something SOAP wasn't designed to do and introducing complexity to a "simple" protocol. -In the current specification it is necessary for the SOAP to be generated manually, a process highly prone to errors and interpretation. From fine point technologies website: http://www.finepoint.com/services/certification.htm
  • 7. Difficulties with TR-069 (cont.) Has to cross several layers of protocols and methods that must interoperate: Layer Description CPE/ACS Application The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively. The application is locally defined and not specified as part of the CPE WAN Management Protocol. RPC Methods The specific RPC methods that are defined by the CPE WAN Management Protocol. SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically SOAP 1.1 HTTP HTTP 1.1 SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 (Secure Socket Layer), or TLS 1.0 (Transport Layer Security) TCP/IP Standard TCP/IP. Table 1 of TR-069 Amendment 1
  • 8. TR-069 vs. SNMP SNMP is a technology that is tried and true, but each company has it's own MIB (management information base), and SNMP has been known to have security flaws. TR-069 was created to be device agnostic, meaning that all CPE devices can be managed by one TR- 069 Auto Configuration Server (ACS) no matter the manufacturer etc. SNMP (Simple Network Management Protocol) is used by network management systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects.
  • 9. Privacy Concerns: Although it may seem invasive and insecure to have devices able to be accessed without active consent, there are many security protocols included in the TR-069 documents. From the TR-069 Amendment 1 document: 1.1 Security Goals: The CPE WAN Management Protocol is designed to provide a high degree of security. The security model is also designed to be scalable. It is intended to allow basic security to accommodate less robust CPE implementations, while allowing greater security for those that can support more advanced security mechanisms. In general terms, the security goals of the CPE WAN Management Protocol are as follows: Prevent tampering with the management functions of a CPE or ACS, or the transactions that take place between the CPE and ACS. Provide confidentiality for the transactions that take place between a CPE and ACS. Allow appropriate authentication for each type of transaction. Prevent theft of service.
  • 10. What can TR-069 be used for so far? Any and all CPE, such as VoIP Analog Telephone Adapters, DSL Modems, and Residential Gateways. These capabilities are provisioned by TR-069 and its extensions (TR-098, TR- 104, TR-106, TR-110, TR-111) TR-098 - data model for internet gateway devices (DSL modems with built in routers) TR-104 - data model and any specific items for VoIP devices TR-106 - a base object structure for TR-069 enabled devices TR-110 - a reference model for VoIP configurations TR-111 - covers applying TR-069 to remote management of home networking devices TR-069 Extensions:
  • 11. Reality of TR-069: Since TR-069’s ratification, changing market dynamics continue to impact the way service providers conduct business. A single high-speed data service is no longer a viable, long-term path to retain market share or grow revenue. Prices of core data services—and the associated margins—are declining steeply, and market saturation of basic broadband is on the horizon. To remain competitive, carriers are expanding into new video and content services, going after video franchises, bundling entertainment packages, and competing head-to-head with traditional cable operators to attract and retain new customers. From “TR-069 and beyond,” by Heather Kirksey (http://telephonyonline.com/access/commentary/dsl_tr069_standards_071406/index.html) - TR-069 has to keep expanding to incorporate the many new technologies being developed for in-home use