Hello, everyone!
I'd like to share this with you.
Introduction to IMS
1.3.2 Network Interfaces
There are three distinct interfaces between the entities the IMS network interacts with. These are the interfaces to the UE, to other networks, and to services and applications.
The User-Network Interface (UNI) is the interface to the IP-CAN, which is the access network between the user equipment and the IMS. Since IMS is agnostic of the access network technology, the interface points correspond to the gateway nodes in these networks. These elements are:
Gateway GPRS Serving Node (GGSN) for UMTS networks
Packet Data Serving Node (PDSN) for CDMA networks
Packet Data Gateway (PDG) for Public Wireless LANs (802.11-based networks)
DSL Access Modems (DSLAM) for VoIP and wireline broadband networks
Cable Modem Termination System (CMTS) for the cable networks
This interface carries the SIP signaling toward the user equipment, diameter signaling to the wireless access entities for IP flow control, charging, and Real-Time Protocol (RTP) for the media streams.
The Network-Network Interface (NNI) corresponds to other networks, IP or non-IP, with which an IMS UE can communicate. This interface becomes complex because the user terminals in the other network may not have an equivalent of a session or may rely on a non-IP technology. There are three types of networks to consider.
A peer IMS network. This is a simple interface that relies on standard IMS signaling and media streams to a peer network. This is primarily to enable roaming between two IMS networks.
An IP network that is based on the current IPv4 standard. The IMS standards define the use of IPv6, the next-generation IP standard for the transport network. Early IMS networks or SIP-based VoIP networks may use IPv4. Thus conversion is required at the IP level to translate IPv4 to IPv4 signaling.
The interface to the circuit-switched telecom network. The Public Services Telephone Network (PSTN) involves complexity. This requires protocol translation and inter-working on both the signaling and media planes. This requires a signaling gateway to translate between SIP and traditional telecom signaling such as IDSN User Part (ISUP), and a media gateway to adapt Time Division Multiplexing (TDM) voice to RTP streams.
The Application-Network Interface (ANI) has acquired a more complex view due to a partial definition by the standards, which is interpreted by implementers to adapt to their needs accordingly. The IMS standards specify a clear interface to SIP-based application servers and legacy services through gateway or inter-working functions. The capability of IMS to provide a greater value for combinational services has also made the case for the Service Capability Interaction Manager (SCIM) to play a stronger role as the interface to orchestrate between multiple applications and services. To summarize this interface involves the following models:
Self-contained IMS applications that reside on SIP-based application servers.
Applications are hosted on SIP-based application servers, which interact with external servers, such as Internet servers for the exchange of information using Extensible Markup Language (XML), Simple Object Access Protocol (SOAP), or other standards.
Interface to legacy services such as charging servers with the OSA parlay gateways.
Interface to legacy services using the Customized Applications for Mobile networks Enhanced Logic (CAMEL) or Intelligent Network (IN) protocols with the IMS Service Switching Function (IM-SSF) switching capability.
Interface to the SCIM to provide an interaction between multiple services and applications.
View chapter purchase book
Foreword by Dr. Kalyani Bogineni
Dr.Kalyani Bogineni, in EPC and 4G Packet Networks (Second Edition), 2013
The 3GPP has specified a core network based on the Internet Protocol (IP) that provides numerous operational benefits in addition to meeting the above-mentioned expectations. The specification:
Allows evolution of any deployed wireless or wired access technology network towards a common architecture with benefits of seamless mobility between various generations of access networks and global roaming capabilities on different technologies.
Enables network designs based on high availability, reliability, scalability, and manageability paradigms, as well as efficient bandwidth usage on access, backhaul, and core networks.
Supports delivery of combinations of advanced telephony and Internet services that can be hosted by any access network or application provider.
Provides user security functions like privacy and confidentiality while protecting the network through functions like mutual authentication and firewalls.
Minimizes the number of services databases and the number of services controllers, which reduces the number of provisioning points in the network.
Provides an efficient charging architecture that reduces the number of network elements sending billing records and minimizes the number of billing records formats.
Read full chapter view PDFDownload book
Mobile broadband and the core network evolution
Magnus Olsson, ... Catherine Mulligan, in SAE and the Evolved Packet Core, 2010
1.2.2 3GPP2 radio access technologies
In North America, another set of radio access technology standards was developed. This was developed within the standards body called 3GPP2, under the umbrella of ANSI/TIA/EIA-41 which includes North American and Asian interests towards developing global standards for those RAN technologies supported by ANSI/TIA/EIA-41.
3GPP2 developed the radio access technologies cdma2000®, providing 1xRTT and HRPD (High Rate Packet Data) services. cdma2000 1xRTT is an evolution of the older IS-95 CDMA technology, increasing the capacity and supporting higher data speeds. HRPD defines a packet-only architecture with capabilities similar to the 3GPP WCDMA technology. The set of standards for the packet core network developed within 3GPP2 followed a different track to 3GPP, namely the reuse of protocols directly from the IETF, such as the Mobile IP family of protocols as well as a simpler version of IP connectivity known as Simple IP, over a PPP link. The main packet core entities in this system are known as PDSN (Packet Data Serving Node) and HA (Home Agent), where terminal-based mobility concepts from IETF are used, in conjunction with 3GPP2 developed own mechanisms. It also uses Radius-based AAA infrastructure for its user data management, authentication and authorization, and accounting.
View chapter purchase book
ETSI M2M
Vlasios Tsiatsis, ... Catherine Mulligan, in the Internet of Things (Second Edition), 2019
A.1.1 ETSI M2M high-level architecture
Figure A.1 shows the high-level ETSI M2M architecture. This high-level architecture is a combination of both a functional and a topological view showing some Functional Groups clearly associated with pieces of physical infrastructure (e.g., M2M Devices, Gateways) while other Functional Groups lack specific topological placement. There are two main domains, a network domain, and a device and gateway domain. The boundary between these conceptually separated domains is the topological border between the physical devices and gateways and the physical communication infrastructure (Access network).
https://ars.els-cdn.com/content/image/3-s2.0-B9780128144350000328-gr001.jpg?_
Sign in to download the full-size image
Figure A.1. ETSI M2M High-Level Architecture (redrawn from ETSI [32]). Copyright European Telecommunications Standards Institute 2013. Further use, modification, copy, and/or distribution is strictly prohibited.
The Device and Gateway Domain contains the following functional/topological entities:
M2M Device: This is the device of interest for an M2M scenario, for example, a device with a temperature sensor. An M2M Device contains M2M Applications and M2M Service Capabilities. An M2M device connects to the Network Domain either directly or through an M2M Gateway:
Direct connection: The M2M Device is capable of performing registration, authentication, authorization, management, and provisioning to the Network Domain. The direct connection also means that the M2M device contains the appropriate Physical Layer to be able to communicate with the Access Network.
Through one or more M2M Gateway: This is the case when the M2M device does not have the appropriate Physical Layer, compatible with the Access Network technology, and therefore it needs a network domain proxy. Moreover, a number of M2M devices may form their own local M2M Area Network that typically employs a different networking technology from the Access Network. The M2M Gateway acts as a proxy for the Network Domain and performs the procedures of authentication, authorization, management, and provisioning. An M2M Device could connect through multiple M2M Gateways.
M2M Area Network: This is typically a Local Area Network (LAN) or a Personal Area Network (PAN) and provides connectivity between M2M Devices and M2M Gateways. Typical networking technologies are IEEE 802.15.1 (Bluetooth), IEEE 802.15.4 (ZigBee, IETF 6LoWPAN/RoLL/CoRE), MBUS, KNX (wired or wireless), PLC, etc.
M2M Gateway: The device that provides connectivity for M2M Devices in an M2M Area Network towards the Network Domain. The M2M Gateway contains M2M Applications and M2M Service Capabilities. The M2M Gateway may also provide services to other legacy devices that are not visible to the Network Domain.
The Network Domain contains the following functional/topological entities:
Access Network: This is the network that allows the devices in the Device and Gateway Domain to communicate with the Core Network. Example Access Network Technologies are fixed (xDSL, HFC) and wireless (Satellite, GERAN, UTRAN, E-UTRAN WLAN, WiMAX).
Core Network: Examples of Core Networks are the 3GPP Core Network and ETSI TISPAN Core Network. It provides the following functions:
IP connectivity.
Service and Network control.
Interconnection with other networks.
Roaming.
M2M Service Capabilities: These are functions exposed to different M2M Applications through a set of open interfaces. These functions use underlying Core Network functions, and their objective is to abstract the network functions for the sake of simpler applications. More details about the specific service capabilities are provided later in the appendix.
M2M Applications: These are the specific M2M applications (e.g., smart metering) that utilize the M2M Service Capabilities through open interfaces.
Network Management Functions: These are all the necessary functions to manage the Access and Core Network (e.g., Provisioning, Fault Management, etc.).
M2M Management Functions: These are the necessary functions required to manage the M2M Service Capabilities on the Network Domain while the management of an M2M Device or Gateway is performed by specific M2M Service Capabilities. There are two M2M Management functions:
M2M Service Bootstrap Function (MSBF): The MSBF facilitates the bootstrapping of permanent M2M service layer security credentials in the M2M Device or Gateway and the M2M Service Capabilities in the Network Domain. In the Network Service Capabilities Layer, the Bootstrap procedures perform, among other procedures, provisioning of an M2M Root Key (secret key) to the M2M Device or Gateway and the M2M Authentication Server (MAS).
MAS: This is the safe Execution Environment where permanent security credentials such as the M2M Root Key are stored. Any security credentials established on the M2M Device or Gateway are stored in a secure environment such as a trusted platform module.
An important observation regarding the ETSI M2M functional architecture is that it focuses on the high-level specification of functionalities within the M2M Service Capabilities Functional Groups and the open interfaces between the most relevant entities while avoiding specifying in detail the internals of M2M Service Capabilities. However, the interfaces are specified in different levels of detail, from abstract to a specific mapping of an interface to a specific protocol (e.g., HTTP [212], IETF CoAP [213]). The most relevant entities in the ETSI M2M architecture are the M2M Nodes and M2M Applications. An M2M Node can be a Device M2M, Gateway M2M, or Network M2M Node (Figure A.2). An M2M Node is a logical representation of the functions on an M2M Device, Gateway, and Network that should at least include a Service Capability Layer (SCL) Functional Group.
https://ars.els-cdn.com/content/image/3-s2.0-B9780128144350000328-gr002.jpg?_
Sign in to download the full-size image
Figure A.2. M2M Service Capabilities, M2M Nodes, and Open Interfaces [32].
An M2M Application is the main application logic that uses the Service Capabilities to achieve the M2M system requirements. The application logic can be deployed on a Device (Device Application, DA), Gateway (Gateway Application, GA), or Network (Network Application, NA). The SCL is a collection of functions that are exposed through the open interfaces or reference points mIa, Dia, and mId [214]. Because the main topological entities that SCL can be deployed on are the Device, Gateway, and Network Domains, there are three types of SCL: DSCL (Device Service Capabilities Layer), GSCL (Gateway Service Capabilities Layer), and NSCL (Network Service Capabilities Layer). SCL functions utilize underlying networking capabilities through technology-specific interfaces. For example, an NSCL using a 3GPP type of access network uses 3GPP communication service interfaces. The ETSI M2M Service Capabilities are recommendations of Functional Groups for building SCLs, but their implementation is not mandatory, while the implementation of the interfaces mIa, Dia, and mId is mandatory for a compliant system. It is worth repeating that from the point of view of the ETSI M2M architecture, an M2M device can be either capable of supporting the mId interface (towards the NSCL) or the Dia interface (towards the GSCL). The specification actually distinguishes these two types of devices, i.e., device D and device D' (D prime), respectively.
View chapter purchase book
Microgrid communication system and its application in hierarchical control
Hanqing Yang, ... Weirong Chen, in Smart Power Distribution Systems, 2019
9.1.1.1 Wired-line communication technology
(1)Optical fiber communication: optical fiber communication takes light waves as an information carrier and optical fiber as a transmission medium. The main features of optical fiber communication are excellent anti-electromagnetic interference ability, high transmission rate, large transmission capacity, good confidentiality, and so on. However, with employing optical fiber communication technology, the construction and maintenance costs are higher, which causes a large amount of data transmission and high-reliability requirements application occasion. Ethernet-based passive optical network (EPON) is a new type of fiber access network technology. It adopts passive optical network (PON) technology in the physical layer and uses Ethernet protocol at the link layer, which utilizes the topology structure of PON to achieve Ethernet access. Therefore, it is considered the first choice for the construction of a digital distribution network communication system, which combines the advantages of PON technology and Ethernet (Shukla et al., 2014).
(2)Telephone network communication: telephone network communication mainly includes modem and ADSL (asymmetric digital subscriber line) way. The modem is used to convert the digital signals into an analog signal so that the digital signal can be spread through the telephone line. However, this telephone network communication has the drawback of low transmission rate, usually about 56 kbps, which has been replaced by ADSL gradually. ADSL can provide up to 3.5 Mbps upstream speed and up to 24 Mbps downlink speed. The usage of local telephone network communication can reduce the cost of wiring, not needing to build a dedicated communication network.
(3)Power-line communication (PLC): PLC takes modern power lines as the information transmission medium for voice or data transmission. There are some advantages of this communication technology, such as simple, low construction difficulty, low construction and operation costs, good security, and easy management. While the shortcomings are low transmission rate, vulnerability to interference, and so on. Using orthogonal frequency division multiple access (OFDMA), a communication system based on low voltage power lines can be developed to meet the requirements of a real-time monitoring system (Qinruo, 2003; Prasanna et al., 2009).
(4)Twisted pair/coaxial cable: these two kinds of media are mostly used for the construction of Ethernet. Ethernet defines the type of cable used in the local area network (LAN) and signals processing methods. The transmission rate of information packets between devices is usually at 10–100 Mbps. However, the Ethernet error control and real-time need to be improved (Yigit et al., 2014).
View chapter purchase book
Smart ambulance systems using the concept of big data and the internet of things
Ankur Dumka, Anushree Sah, in Healthcare Data Analytics and Management, 2019
3.2 Conclusions
Evolving IT has made tremendous changes in all aspects of life and has had major influences on health services. In view of this, our proposed design introduces a smart ambulance that is IT enabled and provides a number of facilities using services such as Hadoop, cloud computing, IoT, and WBAN technology.
The proposed system consists of an ambulance equipped with WBAN sensors used to detect real-time patient data. These sensors then send data to the center node or sink node through IoT technology by means of the Message Queuing Telemetry Transport (MQTT) protocol; IoT data aggregation is used to provide aggregate real-time data to doctors at remote hospitals. The raw data is collected and stored in the cloud, where various virtual machines are allocated for different software and infrastructures to store and process these data. The data gathered from different sink nodes are collected in the cloud, where they are processed as big data using Hadoop to arrive at the processed data in the forms required by doctors, administrations, and patients.
Hadoop provides a graphical view of the data, which can be used to see the number of patients grouped by area, disease type, and disease severity segmentation.
Graph 1 shows an example of area-based segmentation of diseases, which gives an idea in graphical form of the number of patients in a particular area, which can be states, districts, or localities, as the parameters passed by the smart ambulance sensors contain area code. Hadoop technology will enable medical staff to get an idea of the number of patients with specific diseases in a specified area, which will help them in making administrative decisions for effective treatment and prevention of those diseases.
https://ars.els-cdn.com/content/image/3-s2.0-B9780128153680000063-f06-03-9780128153680.jpg?_
Sign in to download the full-size image
Graph 1. Area-based segmentation of diseases.
Graph 2 shows the time-based segmentation of diseases, which could be by year, month, day, or even hour. This shows the number of patients with a particular disease in a particular locality/area in a time-wise manner, by means of Hadoop MapReduce technology. This data can be used for finding the most crucial times for a particular disease during the year, which may be useful for taking preventive action for that particular disease and can help the administration to create a future action plan for subsequent years for that disease from this time analysis.
https://ars.els-cdn.com/content/image/3-s2.0-B9780128153680000063-f06-04-9780128153680.jpg?_
Sign in to download the full-size image
Graph 2. Time-based segmentation of diseases.
Graph 3 shows the gender-based segmentation of diseases of a particular area over a given specified time duration. This data will be used to take preventive measures to overcome any gender-based solutions of specific diseases.
https://ars.els-cdn.com/content/image/3-s2.0-B9780128153680000063-f06-05-9780128153680.jpg?_
Sign in to download the full-size image
Graph 3. Gender-based segmentation of diseases.
Similarly, we can find suitable segmentation graphs for the data retrieved from sensors on the smart ambulance for analytics of specified data of a patient, which can be used for taking preventive and curative measures.
View chapter purchase book
AAL and ELE Platform Architecture
Rossitza I. Goleva, ... Vladimir Trajkovik, in Ambient Assisted Living and Enhanced Living Environments, 2017
8.3 AAL/ELE Services
AAL/ELE services are a matter of many different definitions last decade. Wherever the AAL services are more related to the health of the people aiming more preventive and ill people support including different stakeholders in hospitals and at home, the ELE services are more related to the living environment of the people taking into account not only ill or elder but also other generations and people who like to have an active and healthy way of living (Pires et al., 2016; Garcia et al., 2014). Identification of AAL and ELE services is too broad (Garcia and Rodrigues, 2015). Some sources consider services at the sensor level with specific use-case scenarios (Ferro et al., 2015; Goleva et al., 2015c; universal, 2014). Other sources consider cloud or web-based services (Active aging, 2016). There are sources considering services end-to-end (Tazari et al., 2012; KIT, 2016; Goleva et al., 2015a, 2015b, 2015c).
Generic definitions of AALaaS and ELEaaS could be seen in Stainov et al. (2016) and Mirtchev et al. (2016). The authors tried to define the services at the cloud or fog level. Service virtualization at fog or cloud level allows service mobility and makes the service independent from access network technologies.
We try to highlight here the most important AAL/ELE services taking into account the end-user place where raw data is obtained. We also consider network at access, edge, and core parts where data is collected and might be partially processed. The data centers for data collection and processing are either at the core part of the network where the data is stored and analyzed or at the dew and fog level. The services are virtualized at different levels in terms of time and place.
In this section, we try to explain necessary generic services that allowed the definition of an open platform. The AAL/ELE service classification is based on many different criteria like end-user perspective, service provider views, technological constraints.
Most of the raw data is obtained from Home Care System that is based on sensors, home server, home controller, and optional gateway to the Internet (Goleva et al., 2015a, 2015b, 2015c; Drobics and Hager, 2014). The data could be partially pre-processed, i.e. data acquisition could be performed locally at home server like is proposed in Pires et al. (2016). Other authors like Skourletopoulos et al. (2016), Bessis and Dobre (2014), and Batalla et al. (2016) consider data processing at the cloud level. We believe that in AAL/ELE platform there is a need for both approaches because the network of cared and caring people is heterogeneous and open by definition. There are many papers related to the personal and electronic health records storage, management, and security of the transferred data (Porumb et al., 2015; Porambage et al., 2015). Many authors like Lamine et al. (2014) work at ontology and middleware levels and stress data processing issues.
Part of the basic services is activity identification and recognition. It is applicable for elder and young generations, healthy or ill. Some people concern privacy. In many cases when there is a need to m*** 24/7 hours this service is valuable (Garcia and Rodrigues, 2015). Activity recognition is related to the digital signal processing (Gehrig et al., 2015; Kahveci et al., 2015; Díaz Rodríguez et al., 2013a, 2013b, 2014a, 2014b, 2014c; Díaz Rodríguez, 2015). Part of the work is defined using ontology. Some of the works consider real-time recognition via home experiments with multiple residents. The experiments could be done explicitly using people identification with RFID tags, bracelets, cameras. Experiments without explicit identification, using only ambient sensors in real-time are more interesting because of the applications like fall detection, activity-tracking, movement monitoring (Alemdar et al., 2015; Tunca et al., 2014; Durmaz Incel et al., 2013; Alemdar et al., 2014; Ustev et al., 2013; Ertan et al., 2012).
Identification could be cooperative when the system has access to the facilities like houses, offices, buildings, etc. It could be non-cooperative and used to recognize who is in the house (Garcia and Rodrigues, 2015). Services could be classified as context-related like ambient services (Monekosso et al., 2015a, 2015b, 2015c) and individual services (Pires et al., 2016).
Technology mapping to services could be done through interoperability via standard interfaces, protocols, standard formats for data exchange, and virtualization at different levels (Monekosso et al., 2015a, 2015b, 2015c; Goleva et al., 2015a, 2015b, 2015c, 2016).
Another interesting part of services is the connection to outdoor assistance. Most of the outdoor services are mobile for the vehicles, end-users, and environmental services in the parks, shops, clubs, schools, hospitals, etc. In many cases, there is a lack of continuous connectivity (Lambrinos, 2015; Jara et al., 2015; Chaudet and Haddad, 2013). The use of outdoor and indoor femtocells at the edge of the network could support the service. Sensor networks are capable to forward messages (Kreiner et al., 2013a; Goleva et al., 2015a, 2015b, 2015c). The access network is ubiquitous by nature. The use of gateways using standard interfaces allows abstraction and virtualization of the existing technologies and exhibits them to the application as a transparent single infrastructure layer. It could be done via Software Defined Network, middleware (Lamine et al., 2014), virtual machines, peer-to-peer connectivity (Papanikolaou and Mavromoustakis, 2013; Stainov et al., 2016, 2014).
While having services in Body Area Network (BAN) it should be also taken into account that part of them are personal. In order to make services healthy related, there are also special regulations in different countries to be considered. Well-known IEEE 802.15.4 standard combined with ZigBee is widely used for Personal Area Networks (PAN) and home/environment automation. It is well combined by all IEEE 802.11 standards. In this sense home/personal controllers use IEEE 802.15.4 to 802.11 gateways for network interconnection. BAN standard 802.15.6 is created a long time ago and is widely used (Kurunathan, 2015). There are technological limitations, delays, interoperability issues, security considerations, lack of sustainable technologies, lack of coordinated legislation and standards (Riazul Islam et al., 2015; Al-Fuqaha et al., 2015). Many topics in this technology are still open like monitoring, security of the well-being devices, end-user customization, dynamics of the BAN network based on the wearable sensors, sensor power supply, psychological aspects related to the wearable sensors, the trust in the technology.
There are also many different cloud-based solutions on the market for BAN services. The tradeoff between data storing algorithms and placement of data in the cloud or locally is discussed in many projects and papers. The virtualization process requires further analyses of where to store and process, what type of data to consider private or public, lack or presence of feedback channels or customized feedback data, data sharing, big data analyses. We introduce in the chapter a dew/fog/cloud computing approach using peer port and client/server computing defining further ELEaaS and AALaaS (Stainov et al., 2016; Mirtchev et al., 2016).
Source: https://www.sciencedirect.com/topics/engineering/access-network-technology#:~:text=Access Network: This is the,-UTRAN WLAN, WiMAX).
Thank you!