進階搜尋


 
系統識別號 U0026-2407201418381400
論文名稱(中文) 3GPP策略與計費控制系統中TDF深度封包檢測之分析
論文名稱(英文) Modeling Traffic Detection Function with DPI in 3GPP Policy and Charging Control System
校院名稱 成功大學
系所名稱(中) 電腦與通信工程研究所
系所名稱(英) Institute of Computer & Communication
學年度 102
學期 2
出版年 103
研究生(中文) 謝泓仰
研究生(英文) Hung-Yang Hsieh
學號 q36014293
學位類別 碩士
語文別 英文
論文頁數 46頁
口試委員 指導教授-蘇淑茵
口試委員-李彥文
口試委員-蔡孟勳
口試委員-李忠憲
口試委員-張志文
中文關鍵字 策略與計費控制(PCC)  封包深度檢測(DPI)  第三方應用服務(OTT Application)  應用感知(Application awareness) 
英文關鍵字 Policy and Charging Control (PCC)  Deep Packet Inspection (DPI)  Over-The-Top (OTT) application  Application awareness 
學科別分類
中文摘要 隨著行動裝置的普及與無線網路技術的進步,各式各樣的應用服務被開發出來,使用者的選擇更為多元。然而這也帶來網路頻寬負荷過大的問題,加上不能有效的分辨封包是屬於哪種類型的應用服務進而實行適當措施,電信業者面對這種情況只能收取微薄的“過路費”,所以即使應用服務蓬勃發展,電信業者的獲利並沒有因此增加。
本篇論文設計兩階段的處理程序來實現應用感知的封包偵測並提出一個架構以處理應用服務的資訊在策略與計費控制系統 (PCC) 與應用服務數據的映射。此外,我們也提出數學模型來分析應用感知偵測的效能。最後設計了模擬來驗證所提出的數學模型的正確性,並且觀察模型中各種環境參數對應用偵測的影響。
英文摘要 With the popularity of mobile devices and advances in wireless network technology, a wide variety of Over-The-Top (OTT) applications have been used by mobile user. Facing data explosion brought by OTT applications, operators act as "bitpipe" and hard to effectively identify different OTT applications from network-level information. In this thesis, we propose a reference model for application based policy control along with a two-phase packet filtering technique for the 3GPP Policy and Charging Control (PCC) system to perform application awareness for advanced policy control. We also present a framework to support application information mapping with PCC functionality and application data flow. Moreover, an analytical model and extensive simulation are developed to investigate the application detection performed in the PCC system. Numerical results showed that packet arrival rate and number of required signature packets significantly affect performance for application detection procedure.
論文目次 Contents i
List of Figures iii
List of Tables iv
1 Introduction 1
2 Related Work 12
3 Architecture 16
3.1 Concept 16
3.2 Proposed Application Detection Method With DPI 17
4 Analytical Model 22
4.1 Assumption 22
4.2 Derivation for pa 24
4.3 Derivation for td 26
4.4 Derivation for E[tp] 27
5 Numerical Examples 32
5.1 Simulation Model 32
5.2 Effects of Application Holding Time 33
5.3 Effects of Variance of Application Holding Time 35
5.4 Effects of Packet Arrival Rate 37
5.5 Effects of Variance of Packet Arrival Rate 38
5.6 Effects of Number of Required Signature Packets 40
6 Conclusions 42
Bibliography 43
參考文獻 [1] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Requirements for Evolved UTRA (E-UTRA) and Evolved UTRAN (E-UTRAN),” 2009, technical Report 3GPP TS 25.913 Version 9.0.0 (2009-12).
[2] Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018,” 2014.
[3] D. York, “What is an Over-The-Top (OTT) Application or Service? - A Brief Explanation,” http://www.disruptivetelephony.com/2012/07/
what-is-an-over-the-top-ott-application-or-service-a-brief-explanation.html.
[4] C. Janssen, “Over-the-Top Application (OTT),” http://www.techopedia.com/
definition/29145/over-the-top-application-ott.
[5] Napatech, “Building Intelligent Mobile Data Services using Deep Packet Inspection,”2011.
[6] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Application Based Charging (ABC),” 2013, technical Report 3GPP TR 23.800 Version 12.0.0 (2013-03).
[7] K. Kimbler and M. Taylor, “Value added mobile broadband services Innovation driven transformation of the ‘smart pipe’,” IEEE International Conference on Intelligence in Next Generation Networks, pp. 30–34, 2012.
[8] M. Olsson and C. Mulligan, EPC and 4G Packet Networks, Second Edition: Driving the Mobile Broadband Revolution. Academic Press, 2012.
[9] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; Policy and charging control architecture,” 2012, technical Specification 3GPP TS 23.203 V12.1.0 (2013-06).
[10] A. Goldner, “3GPP Traffic Detection Functionality,” IEEE International Conference on Communications, pp. 6993–6998, 2012.
[11] L. Luna, “TDF in LTE: The Next-Generation Pricing Model Are Here,” 2013, current Analysis.
[12] Allot communication, “Advantages of Pure-play versus Embedded TDF for LTE Networks,” 2013.
[13] Allot communication, “Digging Deeper Into Deep Packet Inspection (DPI),” 2007.
[14] Y.-B. Lin and S.-I. Sou, Charging for Mobile All-IP Telecommunications, Wireless Communications and Mobile Computing. Wiley, 2008. [Online].
Available: http://books.google.com.tw/books?id=niploL8lJFIC
[15] G. Camarillo and M. A. Garcia-Martin, The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds. Wiley, 2008.
[16] T. Grgic and M. Matijasevic, ““Smarter” Online Charging for Over-The-Top Services by Introducing User Context,” IEEE 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), pp. 81–87, 2012.
[17] A. Nucci and K. Papagiannaki, Design, Measurement and Management of Large-Scale IP Networks: Bridging the Gap Between Theory and Practice. Cambridge University Press, 2008.
[18] C.-S. Yang, M.-Y. Liao, M.-Y. Luo, S.-M. Wang, and C.-E. Yeh, “A Network Management System Based on DPI,” IEEE International Conference on Network-Based Information Systems (NBiS), pp. 385–388, 2010.
[19] G. Finnie, “The New DPI: Challenges & Opportunities In The LTE Era,” 2011, heavy Reading.
[20] Napatech, “Scaling Policy Enforcement and Deep Packet Inspection,” 2011.
[21] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; End-to-end Quality of Service (QoS) concept and architecture,” 2005, technical Specification 3GPP TS 23.207 Version 5.10.0 (2005-09).
[22] P.-C. Lin, Y.-D. Lin, Y.-C. Lai, and T.-H. Lee, “Using String Matching for Deep Packet Inspection,” IEEE Computer Society, pp. 23–28, 2008.
[23] J. E. Hopcroft, J. D. Ullman, and R. Motwani, Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2006.
[24] G. Navarro and M. Raffinot, “New Techniques for Regular Expression Searching,” Springer-Verlag Algorithmica, vol. 41, no. 2, pp. 89–116, 2005.
[25] T. AbuHmed, A. Mohaisen, and D. Nyang, “A Survey on Deep Packet Inspection for Intrusion Detection Systems,” Magazine of Korea Telecommunication Society, vol. 24, no. 11, pp. 25–36, 2007.
[26] S. Dharmapurikar, P. Krishnamurthy, and J. Lockwood, “Deep packet inspection using parallel bloom filters,” IEEE Micro, vol. 24, no. 1, pp. 52–61, 2004.
[27] S.-I. Sou and C.-S. Lin, “SPR proxy mechanism for 3GPP policy and charging control system,” Computer Network, vol. 55, no. 17, pp. 3487–3862, 2011.
[28] S.-I. Sou, “Mobile Data Offloading With Policy and Charging Control in 3GPP Core Network,” IEEE Transactions on Vehicular Technology, vol. 62, no. 7, pp. 3481–3486, 2013.
[29] S.-I. Sou, J.-Y. Jeng, and P. Lin, “Improving session continuity through user mobility tracking for EPS inter-serving gateway handover,” Wireless Communications and Mobile Computing, vol. 12, no. 12, pp. 1077–1090, 2012.
[30] H.-F. Ho, S.-I. Sou, and J.-Y. Jeng, “Credit allocation schemes for quality-class-oriented
services in next generation networks,” IEEE International Computer Symposium (ICS), pp. 626–631, 2010.
[31] T. Taleb and A. Ksentini, “Impact of emerging social media applications on mobile networks,” IEEE International Conference on Communications (ICC), pp. 5934–5938, 2013.
[32] M. Lott, J. Karppinen, and J. Kross, “Service differentiation for enhanced consumer experiences,” IEEE International Conference on Intelligence in Next Generation Networks (ICIN), pp. 58–63, 2011.
[33] Inside 硬塞的網路趨勢觀察, “傳統語音資費的末路?中華電信宣佈mpro 用戶免費用line,” http://www.inside.com.tw/2013/11/26/mpro-50-all-you-can-line.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2019-08-05起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2019-08-05起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw