⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2805.txt

📁 RFC 的详细文档!
💻 TXT
📖 第 1 页 / 共 5 页
字号:

   b.   Provide an ability for the MGC to indicate to an MG the resource
        to use for a call (e.g. DS0) exactly, or indicate a set of
        resources (e.g. pick a DS0 on a T1 line or a list of codec
        types) via a "wild card" mechanism from which the MG can select
        a specific resource for a call (e.g. the 16th timeslot, or
        G.723).

   c.   Allow the use of DNS names and IP addresses to identify MGs and
        MGCs. This shall not preclude using other identifiers for MGs or
        MGCs when other non IP transport technologies for the protocol
        are used.

7.  Operational/Management Requirements

7.1.  Assurance of Control/Connectivity

   To provide assurance of control and connectivity, the protocol must
   provide the means to minimize duration of loss of control due to loss
   of contact, or state mismatches.



Greene, et al.               Informational                     [Page 13]

RFC 2805            MG Control Protocol Requirements          April 2000


   The protocol must:

   a.   Support detection and recovery from loss of contact due to
        failure/congestion of communication links or due to MG or MGC
        failure.

        Note that failover arrangements are one of the mechanisms which
        could be used to meet this requirement.

   b.   Support detection and recovery from loss of synchronized view of
        resource and connection states between MGCs and MGs. (e.g.
        through the use of audits).

   c.   Provide a means for MGC and MG to provide each other with
        booting and reboot indications, and what the MG's configuration
        is.

   d.   Permit more than one backup MGC and provide an orderly way for
        the MG to contact one of its backups.

   e.   Provide for an orderly switchback to the primary MGC after it
        recovers. How MGCs coordinate resources between themselves is
        outside the scope of the protocol.

   f.   Provide a mechanism so that when an MGC fails, connections
        already established can be maintained. The protocol does not
        have to provide a capability to maintain connections in the
        process of being connected, but not actually connected when the
        failure occurs.

   g.   The Protocol must allow the recovery or redistribution of
        traffic without call loss.

7.2.  Error Control

   The protocol must:

   a.   Allow for the MG to report reasons for abnormal failure of lower
        layer connections e.g. TDM circuit failure, ATM VCC failure.

   b.   Allow for the MG to report Usage Parameter Control (UPC) events.

   c.   Provide means to ameliorate potential synchronization or focused
        overload of supervisory/signaling events that can be detrimental
        to either MG or MGC operation. Power restoration or signaling
        transport re-establishment are typical sources of potentially
        detrimental signaling showers from MG to MGC or vice-versa.




Greene, et al.               Informational                     [Page 14]

RFC 2805            MG Control Protocol Requirements          April 2000


   d.   Allow the MG to notify the MGC that a termination was terminated
        and communicate a reason when a terminations is taken out-of-
        service unilaterally by the MG due to abnormal events.

   e.   Allow the MGC to acknowledge that a termination has been taken
        out-of-service.

   f.   Allow the MG to request the MGC to release a termination and
        communicate a reason.

   g.   Allow the MGC to specify, as a result of such a request its
        decision to take termination down, leave it as is or modify it.

7.3.  MIB Requirements

   The Protocol must define a common MG MIB, which must be extensible,
   but must:

   a.   Provide information on:

   *    mapping between resources and supporting physical entities.

   *    statistics on quality of service on the control and signalling
        backhaul interfaces.

   *    statistics required for traffic engineering within the MG.

   b.   The protocol must allow the MG to provide to the MGC all
        information the MGC needs to provide in its MIB.

   c.   MG MIB must support implementation of H.341 by either the MG,
        MGC, or both acting together.

8.  General Protocol Requirements

   The protocol must:

   a.   Support multiple operations to be invoked in one message and
        treated as a single transaction.

   b.   Be both modular and extensible. Not all implementations may wish
        to support all of the possible extensions for the protocol. This
        will permit lightweight implementations for specialized tasks
        where processing resources are constrained. This could be
        accomplished by defining particular profiles for particular uses
        of the protocol.





Greene, et al.               Informational                     [Page 15]

RFC 2805            MG Control Protocol Requirements          April 2000


   c.   Be flexible in allocation of intelligence between MG and MGC.
        For example, an MGC may want to allow the MG to assign
        particular MG resources in some implementations, while in
        others, the MGC may want to be the one to assign MG resources
        for use.

   d.   Support scalability from very small to very large MGs: The
        protocol must support MGs with capacities ranging from one to
        millions of terminations.

   e.   Support scalability from very small to very large MGC span of
        control: The protocol should support MGCs that control from one
        MG to a few tens of thousands of MGs.

   f.   Support the needs of a residential gateway that supports one to
        a few lines, and the needs of a large PSTN gateway supporting
        tens of thousands of lines. Protocol mechanisms favoring one
        extreme or the other should be minimized in favor of more
        general purpose mechanism applicable to a wide range of MGs.
        Where special purpose mechanisms are proposed to optimize a
        subset of implementations, such mechanisms should be defined as
        optional, and should have minimal impact on the rest of the
        protocol.

   g.   Facilitate MG and MGC version upgrades independently of one
        another. The protocol must include a version identifier in the
        initial message exchange.

   h.   Facilitate the discovery of the protocol capabilities of the one
        entity to the other.

   i.   Specify commands as optional (they can be ignored) or mandatory
        (the command must be rejected), and within a command, to specify
        parameters as optional (they can be ignored) or mandatory (the
        command must be rejected).

8.1.  MG-MGC Association Requirements

   The Protocol must:

   a.   Support the establishment of a control relationship between an
        MGC and an MG.

   b.   Allow multiple MGCs to send control messages to an MG. Thus, the
        protocol must allow control messages from multiple signalling
        addresses to a single MG.





Greene, et al.               Informational                     [Page 16]

RFC 2805            MG Control Protocol Requirements          April 2000


   c.   Provide a method for the MG to tell an MGC that the MG received
        a command for a resource that is under the control of a
        different MGC.

   d.   Support a method for the MG to control the rate of requests it
        receives from the MGC (e.g. windowing techniques, exponential
        back-off).

   e.   Support a method for the MG to tell an MGC that it cannot handle
        any more requests.

8.2.  Performance Requirements

   The protocol must:

   a.   Minimize message exchanges between MG and MGC, for example
        during boot/reboot, and during continuity tests.

   b.   Support Continuity test constraints which are a maximum of 200ms
        cross-MGC IAM (IAM is the name given to an SS7 connection setup
        msg) propagation delay, and a maximum of 200ms from end of
        dialing to IAM emission.

   c.   Make efficient use of the underlying transport mechanism. For
        example, protocol PDU sizes vs. transport MTU sizes needs to be
        considered in designing the protocol.

   d.   Not contain inherent architectural or signaling constraints that
        would prohibit peak calling rates on the order of 140
        calls/second on a moderately loaded network.

   e.   Allow for default/provisioned settings so that commands need
        only contain non-default parameters.

9.  Transport

9.1.  Assumptions made for underlying network

        The protocol must assume that the underlying network:

   a.   May be over large shared networks: proximity assumptions are not
        allowed.

   b.   Does not assure reliable delivery of messages.

   c.   Does not guarantee ordering of messages: Sequenced delivery of
        messages associated with the same source of events is not
        assumed.



Greene, et al.               Informational                     [Page 17]

RFC 2805            MG Control Protocol Requirements          April 2000


   d.   Does not prevent duplicate transmissions.

9.2.  Transport Requirements

   The protocol must:

   a.   Provide the ability to abort delivery of obsolete messages at
        the sending end if their transmission has not been successfully
        completed. For example, aborting a command that has been
        overtaken by events.

   b.   Support priority messages: The protocol shall allow a command
        precedence to allow priority messages to supercede non-priority
        messages.

   c.   Support of large fan-out at the MGC.

   d.   Provide a way for one entity to correlate commands and responses
        with the other entity.

   e.   Provide a reason for any command failure.

   f.   Provide that loss of a packet not stall messages not related to
        the message(s) contained in the packet lost.

   Note that there may be enough protocol reliability requirements here
   to warrant a separate reliable transport layer be written apart from
   the Media Gateway Control Protocol. Also need to compare Megaco
   reliable transport requirements with similar Sigtran requirements.

10.  Security Requirements

   Security mechanisms may be specified as provided in underlying
   transport mechanisms, such as IPSEC.  The protocol, or such
   mechanisms, must:

   a.   Allow for mutual authentication at the start of an MGC-MG
        association

   b.   Allow for preservation of the of control messages once the
        association has been established.

   c.   Allow for optional confidentiality protection of control
        messages.  The mechanism should allow a choice in the algorithm
        to be used.

   d.   Operate across untrusted domains in a secure fashion.




Greene, et al.               Informational                     [Page 18]

RFC 2805            MG Control Protocol Requirements          April 2000


   e.   Support non-repudiation for a customer-located MG talking to a
        network operator's MGC.

   f.   Define mechanisms to mitigate denial of service attacks

   Note: the protocol document will need to include an extended
   discussion of security requirements, offering more precision on each
   threat and giving a complete picture of the defense including non-
   protocol measures such as configuration.

   g.   It would be desirable for the protocol to be able to pass
        through commonly-used firewalls.

11.  Requirements specific to particular bearer types

   The bearer types listed in Table 1 can be packaged into different
   types of MGs. Examples are listed in the following sections.  How
   they are packaged is outside the scope of the general Media Gateway
   control protocol. The protocol must support all types of bearer types
   listed in Table 1.

























⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -