Telenor and TISPAN NGN - 2008. 5. 29.¢  Telenor Pakistan 100% Russia VimpelCom 33.6% Sweden Telenor

  • View

  • Download

Embed Size (px)

Text of Telenor and TISPAN NGN - 2008. 5. 29.¢  Telenor Pakistan 100% Russia VimpelCom 33.6%...

  • Telenor and TISPAN NGN Judith Rossebø, ETSI TISPAN Security WG Chairman Senior Research Scientist, Telenor {}

  • 2

    • One of the world’s largest mobile operators with 147 mill. mobile subscriptions* * 100% figures - all companies per Q1 2008.

    • Norway’s leading telecommunications company

    • Largest provider of TV services to the Nordic market

    • Total workforce: 35,150 man-years (25,350 outside Norway)

    • Market value as of 30 April 2008: NOK 169 billion

    Telenor factsTelenor facts

    Thailand DTAC 65.5% (*)

    Hungary Pannon 100% Bangladesh

    Grameenphone 62.0%

    Malaysia DiGi 50.8%

    Ukraine Kyivstar 56.5%

    Denmark Sonofon 100%

    Norway Telenor 100%

    Montenegro Promonte

    Pakistan Telenor Pakistan 100%

    Russia VimpelCom 33.6%

    Sweden Telenor 100%

    *Economic exposure


    Serbia Telenor 100%

  • 3

    Telenor Involvement in Standardization and ForaTelenor Involvement in Standardization and Fora

    Telenor is engaged in several Standardization organizations and Fora:


    – 3GPP

    – IEEE 802

    – ITU-T

    – IPsphere Forum

    – OMA, OMTP

    – GSMA

    – NGMN

    Standards to simplify service deployment, cost efficiency, access independence …. a commercially sustainable framework for providing IP services.

  • 4

    Next Generation Network - a reference architectureNext Generation Network - a reference architecture


    ”Any service, any terminal, anywhere, anytime, to anyone”


    Vertical (service specific)

    PS TN

    /IS D

    N PS

    TN /IS

    D N

    A TM

    /F R

    A TM

    /F R

    M ob

    ile M

    ob ile

    Sa te

    lli te

    Sa te

    lli te

    C ab

    le -T

    V C

    ab le

    -T V

    In te

    rn et

    In te

    rn et

    Long term vision

    Horizontal (service integration)

    Access FibreFibreWLANWLANCellularCellular DSLDSL

    Aggregation/core IPIP

    Service enabler/ Session engine

    Applications/ content




    Horizontal layering - modular, flexible architecture

  • 5

    New standards driven by new architecture and new business aspects

    Next Generation Network – Why TISPAN?Next Generation Network – Why TISPAN?

    TTelecommunication and IInternet converged SServices and PProtocols for AAdvanced NNetworking

  • 6

    • IPTV

    • QoS in a multi-service environment

    – RACS can help us to achieve this

    – End to end QoS

    • Security

    – IPTV security (enhancement of stage 2, definition of stage 3)

    – Security for CNG/CND (stage 1, stage 2, stage 3)

    – Analyse the inter-relation between security features and architecture of the NGN (IPTV, NAT-T, NASS, RACS etc.) in terms of how to employ consistent security architecture and mechanisms

    • IP Interconnection

    • Standardize elements and reduce complexity of the NGN

    TISPAN – beyond R2 – important topicsTISPAN – beyond R2 – important topics

  • 7

    • For the NGN, TISPAN WG7:

    – Defines security requirements;

    – Defines the security architecture;

    – Conducts threat and risk analyses for specific NGN use cases;

    – Proposes countermeasures.

    WG7 security standardisation is risk-based: Using the ETSI TISPAN methodology for systematic threat,

    vulnerability and risk analysis (TVRA)

    TISPAN Working Group (WG) 7 is responsible for the management and co-ordination of the development of security specifications for TISPAN.

    TISPAN approach to securityTISPAN approach to security

  • 8

    * References:

    ETSI TS 181 016. TISPAN; Service Layer Requirements to Integrate NGN Services and IPTV.

    ATIS. IPTV DRM Interoperability Requirements. ATIS-0800001.

    ATIS. IPTV Architecture Requirements. ATIS-0800002.

    IPTV-Security Requirement Approach. Development of IPTV-building blocks.

    • Analyze IPTV services. Based on this analysis, design an appropriate security model.

    – Based on Service requirements*, identify security objectives and threats and from that deduce security requirements

    – Define security architecture taking into account service and security requirements

    – Develop appropriate countermeasures as re-useable building blocks

    Service Requirements

    Threats Security


    Architecture Security

    Architecture (Functions)

    Protocols Security

    Counter-measures (Mechanisms)



    2 3

  • 9

    {source: GSM Association}

    IP-related interconnectionIP-related interconnection

    Inter-operator IP Packet Exchange (IPX) (Managed)

    Third Party Provider

    Third Party Subscriber

    Public Mobile


    Mobile Subscribers

    Public Mobile


    Mobile Subscribers

    Content Provider Content Provider

    Corporate Network

    Corporate Network

    Internet (Unmanaged)

    “On-Net” Services

    “Off-Net” Services

    Third Party Provider

    Content Provider Content Provider

    Corporate Network

    Corporate Network

    Public Mobile


    Mobile Subscribers

    Public Mobile


    Mobile Subscribers

    Calling Party Pays

    Calling Party Pays

    Calling Party Pays

    SIP Proxy/Hub

    Other Hub/Proxy

    Other Hub/Proxy

    Accounting Function

    Multi-lateral connection Mgmt

    Routing and Addressing


    Service Aware for event based

    and stream based traffic

    Service Layer (“new IPX part”)

    Streaming QoS

    Conversational (Voice) QoS

    Conversational (Video) QoS

    Network Layer (“existing GRX part”)

    Eg, SIP Voice

    Eg, SMTP MMS

    Eg, IM & Presence

    Originating Network

    Terminating Network


    Traffic detection for routing, charging

    and Multi-lateral destination policing

    ENUM DNS etc

    Best Effort QoS Interactive QoS

  • 10

    VoIP interconnectionVoIP interconnection

    Challenges with current situation: Service providers are creating isolated islands of users that must use the PSTN to complete their calls, even if the destination is a VoIP user.

    Limits the utility of future VoIP applications and the full potential of lower costs.


    Wireless networks

    Enterprise networks

    eCommunities Cable


    An eCommunity user can connect to any other eCommunity user for free (pure IP), but must pay for calls sent and received from non- eCommunity users. The same commonly holds for wireless and other TDM or VoIP provider customers.

    Prior registry approaches have failed because most registries only enable IP – IP connections: - limited economic benefits - and narrow range of total call volume

    The point of connection to the PSTN network in regards to location of call termination determines the cost.

    {source: IntelePeer ™, 2007}

  • 11


    • TISPAN adresses important NGN standardisation aspects

    – Security

    – performance (QoS)

    – IPTV

    – IP-Interconnect

    • Standards are important for Telenor

    – For interoperability

    – For deployment of services

    – Arena for expert networking

  • 12

    Be inspiring

    Telenor - here to help