Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
 
   Internet Draft                             Hiroaki Satou, NTT 
   Intended Status:                            Hiroshi Ohta, NTT 
   Informational  
   Expires: January          Christian Jacquenet, France Telecom  
   3, 2009 
                                          Tsunemasa Hayashi, NTT  
                                    Haixiang He, Nortel Networks  
                                                                 
                                                    July 1, 2008 
    
   AAA and Admission Control Framework for Multicasting  
       <draft-ietf-mboned-multiaaa-framework-07.txt> 
    
                                 
Status of this Memo 
    
   By submitting this Internet-Draft, each author represents 
   that any applicable patent or other IPR claims of which he 
   or she is aware have been or will be disclosed, and any of 
   which he or she becomes aware will be disclosed, in 
   accordance with Section 6 of BCP 79. 
    
    
   Internet-Drafts are working documents of the Internet 
   Engineering Task Force (IETF), its areas, and its working 
   groups.  Note that other groups may also distribute working 
   documents as Internet-Drafts. 
    
    
   Internet-Drafts are draft documents valid for a maximum of 
   six months and may be updated, replaced, or obsoleted by 
   other documents at any time.  It is inappropriate to use 
   Internet-Drafts as reference material or to cite them other 
   than as "work in progress." 
    
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt. 
    
    
   The list of Internet-Draft Shadow Directories can be 
   accessed at http://www.ietf.org/shadow.html. 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 1] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   This Internet-Draft will expire on January 3, 2009. 
    
Copyright Notice 
    
  Copyright (C) The IETF Trust (2008).  This document is 
   subject to the rights, licenses and restrictions contained 
   in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 
    
Abstract 
 
   IP multicast-based services, such as TV broadcasting or 
   videoconferencing raise the issue of making sure that 
   potential customers are fully entitled to access the 
   corresponding contents. There is indeed a need for service 
   and content providers to identify users (if not 
   authenticate, especially within the context of enforcing 
   electronic payment schemes) and to retrieve statistical 
   information for accounting purposes, as far as content and 
   network usage are concerned. This memo describes the 
   framework for specifying the Authorization, Authentication 
   and Accounting (AAA) capabilities that could be activated 
   within the context of the deployment and the operation of 
   IP multicast-based services.  This framework addresses the 
   requirements presented in "Requirements for Accounting, 
   Authentication and Authorization in Well Managed IP 
   Multicasting Services" [I-D.mboned-maccnt-req]. The memo 
   provides a basic AAA enabled model as well as an extended 
   fully enabled model with resource and admission control 
   coordination. 
                                 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 2] 
    
                Table of Contents 
1. INTRODUCTION                                                  4 
1.1 PURPOSE AND BACKGROUND                                       4 
2. DEFINITIONS AND ABBREVIATIONS                                 5 
2.1 DEFINITIONS                                                  5 
2.2 ABBREVIATIONS                                                6 
3. COMMON USE MODELS AND NETWORK ARCHITECTURE IMPLICATIONS       7 
4. FRAMEWORK AND ROLES OF ENTITIES                               9 
4.1 "AAA FRAMEWORK IN MULTICAST-ENABLED ENVIRONMENTS             9 
4.1.1 MULTIPLE CPS ARE CONNECTED TO MULTIPLE NSPS                9 
4.1.2 MULTIPLE CPS ARE CONNECTED TO A SINGLE NSP                11 
4.1.3 A SINGLE CP IS CONNECTED TO MULTIPLE NSPS                 11 
4.1.4 A SINGLE CP IS CONNECTED TO SINGLE NSP                    11 
4.2 USER ID                                                     12 
4.2.1 CP-ASSIGNED USER ID                                       12 
4.2.2 NSP-ASSIGNED USER ID                                      12 
4.3 ACCOUNTING                                                  13 
4.4 ACCESS CONTROL AND CP SELECTION BY NSP                      14 
4.5 ADMISSION CONTROL INFORMATION BY NSP                        14 
4.6 ACCESS CONTROL AND DISTINGUISHING OF USERS BY CP            15 
    
    
    
   Hayashi, He, Satou, Ohta                                   [Page 3] 
 
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
4.7 AAA PROXY IN NSP                                            15 
5.1 BASIC CONNECTION MODEL                                      16 
5.2 CONSTITUENT LOGICAL FUNCTIONAL COMPONENTS OF THE FULLY 
ENABLED AAA FRAMEWORK                                           17 
5.3 MODULARITY OF THE FRAMEWORK                                 21 
6. IANA CONSIDERATIONS                                          21 
7. SECURITY CONSIDERATIONS                                      21 
8. CONCLUSION                                                   21 
 
1. Introduction 
         
1.1 Purpose and Background 
    
   IP multicasting is designed to serve cases of group 
   communication schemes of any kind, such as one-to-many 
   (case of TV broadcasting services for example) or many-to-
   many (case of videoconferencing services, for example).   
    
   In these environments, IP multicast provides a better 
   resource optimization than using a unicast transmission 
   scheme, where data need to be replicated as many times as 
   there are receivers. Activation of IP multicast 
   capabilities in networks yields the establishment and the 
   maintenance of multicast distribution trees that are 
   receiver-initiated by nature: multicast-formatted data are 
   forwarded to receivers who explicitly request them.  
   IP multicast-based services, such as TV broadcasting or 
   videoconferencing raise the issue of making sure that 
   potential customers are fully entitled to access the 
   corresponding contents. There is indeed a need for service 
   and content providers to identify (if not authenticate, 
   especially within the context of enforcing electronic 
   payment schemes) and to invoice such customers in a 
   reliable and efficient manner.  Solutions should consider a 
   wide range of possible content delivery applications: 
   content delivered over the multicast network may include 
   video, audio, images, games, software and information such 
   as financial data, etc. 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 4] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   This memo describes a framework for specifying the 
   Authorization, Authentication and Accounting (AAA) 
   capabilities that could be activated within the context of 
   the deployment and the operation of IP multicast-based 
   services. This memo also describes a framework to realize 
   high-quality multicast transport using a Multicast 
   Admission Control Function (MACF) with multicast 
   Authorization. 
    
   Specifically, this framework addresses the requirements 
   presented in "Requirements for Multicast AAA coordinated 
   between Content Provider(s) and Network Service 
   Provider(s)" which describes the requirements in CDN 
   services using IP multicast. The requirements are derived 
   from: 
        - need for user tracking and billing capabilities 
        - need for network access control to satisfy the 
   requirements of the Network Service Provider (NSP) and/or 
   content access control to satisfy the requirements of the 
   Content Provider (CP) 
        - methods for sharing information between the network 
   service provider and content provider to make it possible 
   to fulfill the above two requirements. [I-D.mboned-maccnt-
   req] 
    
   Detailed requirements are presented in "Requirements for 
   Accounting, Authentication and Authorization in Well 
   Managed IP Multicasting Services" [I-D.mboned-maccnt-req].   
   These requirements include mechanisms for recording end-
   user requests and provider responses for content-delivery, 
   sharing user information (possibly anonymously depending on 
   the trust model) between content provider and network 
   service provider, and protecting resources through the 
   prevention of network and content access by unauthorized 
   users, as well as other AAA related requirements. 
     
   The purpose of this memo is to provide a generalized 
   framework for specifying multicast-inferred AAA 
   capabilities that can meet these requirements. This 
   framework is to provide a basis for future work of 
   investigating the applicability of existing AAA protocols 
   to provide these AAA capabilities in IP multicast specific 
   context and/or if deemed necessary, the refining or 
   defining of protocols to provide these capabilities.   
    
 
2. Definitions and Abbreviations 
    
2.1 Definitions 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 5] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   For the purpose of this memo the following definitions 
   apply: 
    
   Accounting: The set of capabilities that allow the 
   retrieval of a set of statistical data that can be defined 
   on a per customer and/or a per service basis, within the 
   context of the deployment of multicast-based services. Such 
   data are retrieved for billing purposes, and can be 
   retrieved on a regular basis or upon unsolicited requests. 
   Such data include (but are not necessarily limited to) the 
   volume of multicast-formatted data that have been forwarded 
   to the receiver over a given period of time, the volume of 
   multicast-formatted data that have been exchanged between a 
   receiver (or set of) and a given source over a given period 
   of time (e.g. the duration of a multicast session), etc.  
    
   Authentication: action for identifying a user as a genuine 
   one. 
 
   Authorization: The set of capabilities that need to be 
   activated to make sure an authenticated user is fully 
   entitled to access a set of services. 
    
   Join: Signaling mechanism used by receivers to indicate 
   they want to access a multicast group and receive the 
   corresponding traffic.  
    
   Leave: Signaling mechanism used by receivers to indicate 
   they want to leave a multicast group and not receive the 
   corresponding traffic anymore.  
    
   Receiver: an end-host or end-client which receives content.  
   A receiver may be identified by a network ID such as MAC 
   address or IP address.   
    
   User: a human with a user account.  A user may possibly use 
   multiple reception devices.  Multiple users may use the 
   same reception device. (Note: The definition of a receiver 
   (device) and a user (human) should not be confused.) 
 
    
2.2 Abbreviations 
 
   For the purpose of this draft the following abbreviations 
   apply: 
    
   AAA: Authentication.Authorization.and Accounting  
    
   ACL: Access Control List 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 6] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   AN: Access Node 
    
   CDN: Content Delivery Network 
    
   CDS: Content Delivery Services 
    
   CP: Content Provider 
    
   CP-AAA: Authentication, Authorization, and Accounting 
   functions used by a Content Provider 
    
   CPE: Customer Premise Equipment 
    
   ID: Identifier 
    
   IF: network interface 
    
   mAAA: Authentication, Authorization, and Accounting 
   functions activated in multicast-enabled environments 
    
   MACF: Multicast Admission Control Function  
    
   NAS: Network Access Server (RFC2881) 
    
   NSP: Network Service Provider 
    
   NSP-mAAA: Authentication, Authorization, and Accounting 
   functions used by a Network Service provider 
    
   QoS: Quality of Service 
    
    
3. Common use models and network architecture implications 
    
   In some cases a single entity may design and be responsible 
   for a system that covers the various common high-level 
   requirements of a multicasting system such as 1) content 
   serving, 2) the infrastructure to multicast it, 3) network 
   and content access control mechanisms.  
    
   In many cases however the content provision and network 
   provision roles are divided between separate entities. 
   Commonly, Content Providers (CP) do not build and maintain 
   their own multicast network infrastructure as this is not 
   their primary business area. CP often purchase transport 
   and management services from network service providers 
   instead. Similarly Network Service Providers (NSP) may not 
   make their business in providing content. [I-D.mboned-
   maccnt-req] provides more detail of the multiple versus 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 7] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   single-entity Content Delivery Service (CDS) network 
   models. 
    
   In the usage model where a single NSP provides multicast 
   services to multiple CPs, the following general 
   requirements from [I-D.mboned-maccnt-req] apply: 
    
        -Need for user tracking and billing capabilities 
        -Need for QoS control such as resource management and 
   admission control 
        -Need for conditional multicast access control 
   satisfactory to the requirements of the CP 
        -Methods for sharing information between the NSP and 
   CP to make the above two possible 
         
     
   When the NSP and CP are the same single entity then the 
   general requirements are as follows. 
    
        -Need for user tracking and user-billing capabilities 
        -Need for access control and/or content protection at 
   level the entity deems appropriate 
         
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 8] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
4. Framework and Roles of Entities 
 
4.1 AAA Framework in Multicast-Enabled Environments 
 
   A general high-level framework is depicted in Figure 1. 
    
            +------------------------------+ 
            |    user                      | 
            |                              | 
            +------------------------------+ 
                          |  
                          |  
                          | 
            +------------------------------+ 
            |    NSP                       | 
            |                              | 
            +------------------------------+ 
                          |  
                          |  
                          | 
            +------------------------------+ 
            |    CP                        | 
            |                              | 
            +------------------------------+ 
 
   Figure 1: High-level AAA framework in Multicast-Enabled 
   Environments  
 
   For the sake of simplicity, the above diagram portrays a 
   case where there is a single NSP entity and a single CP 
   entity (one-to-one model), but multiple CPs can be 
   connected to a single NSP (e.g. NSP may provide connections 
   to multiple CPs to provide a wide selection of content 
   categories: one-to-many model) It is also possible for a 
   single CP to be connected to multiple NSP networks (e.g. 
   network selection). Furthermore it is possible that the NSP 
   and CP could be the same entity. A NSP and CP authenticate 
   and authorize each other when they establish connectivity. 
   Below the general case of multiple NSPs with multiple CPs 
   is explained.  Then, the various combinations of single and 
   multiple CPs and NSPs are described in relation to the 
   general case. 
    
4.1.1 Multiple CPs are connected to multiple NSPs 
    
   The user subscribes to multiple NSPs and multiple CPs in 
   this usage case.  The user selects a CP and a NSP when the 
   user requests content. The NSP may be automatically 
   selected by a user terminal: e.g. a fixed line NSP by a set 
   top box or a mobile NSP by a mobile phone.  In some usage 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                        [Page 9] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   cases it is possible that the NSP used by a certain user 
   will not always be the same.  For example a user may have 
   contracted with more than one NSP: one for fixed line 
   access and another for mobile roaming access.  
    
   The content may be associated with (or managed by) a 
   specific CP. In this case, when the user selects content, 
   the CP is automatically selected.  
    
   Requests for multicast sent by the user to a selected NSP 
   should include enough information not only for 
   authentication by the CP but also for CP selection and 
   admission control by the NSP. 
    
   When an NSP receives a request for multicast from a user, 
   the NSP requests the appropriate CP to make sure that the 
   user is entitled to access the corresponding content As 
   the NSP is responsible for managing its network resources, 
   the NSP may perform admission control.The NSP will allow 
   access to the multicast service, depending on both the 
   response sent by the CP and the availability of resources 
   operated by the NSP.  That is, the NSP will forward 
   multicast traffic towards the user only when the NSP has 1) 
   made sure the user is entitled to access the network 
   resources operated by the NSP, 2) received a confirmation 
   from the CP that the user is entitled to access the content 
   and (possibly) 3) determined that the network resources 
   (e.g. bandwidth) are sufficient to deliver the multicast 
   traffic to the user with the relevant level of quality. 
   When neither of the first two conditions are met, the NSP 
   will not forward multicast traffic to the user. Condition 
   #3 may also be a showstopper. When the NSP already knows 
   that network resources are insufficient or there is a 
   network failure, the NSP may choose to not request the CP 
   about the user's ability to retrieve content. The NSP is 
   also responsible for notifiying the user whether he/she is 
   eligible to receive content depending on the response sent 
   by the CP. In cases where the NSP does not start 
   multicasting because of its own network issues (e.g. lack 
   of network resources or network failure), the NSP notifies 
   the user with a reason for rejecting the request. 
    
   A CP receives an inquiry from the NSP. The CP authenticates 
   the NSP's identity and makes an authorization decision 
   regarding the user's eligibility to access the requested 
   contents.  The CP is responsible for the authentication 
   and authorization of users so that they can access the 
   content managed by the CP. The CP notifies the NSP 
   accordingly. When the CP cannot (e.g. error or resource 
   issues) or decides not (e.g. policy issues) to deliver 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 10] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   content, the CP is responsible for notifying the NSP about 
   the reason.  It is up to the NSP to relay or translate the 
   reasons for rejection to the user. 
    
   A CP may delegate AAA responsibility to a NSP. 'AAA proxy 
   in NSP' is described in 4.7 for this case. 
    
   As defined in [I-D.mboned-maccnt-req], the CP may require 
   the retrieval of accounting information related to the 
   access of its content. 
 
4.1.2 Multiple CPs are connected to a single NSP 
    
   The user subscribes to a single NSP which provides 
   multicasting from multiple CPs in this usage case. In this 
   case the user does not select an NSP.  The user selects a 
   CP when the user requests content. The content may be 
   associated with (or managed by) the specific CP, so that 
   when the user selects content, the CP is automatically 
   selected.  
    
   The user should send a request for multicast to the 
   specific NSP with enough information not only for 
   authentication by the CP but also for CP selection and 
   admission control by the NSP. 
    
   The role of the NSP is the same as that described in 4.1.1. 
    
   The role of a CP is the same as that described in 4.1.1. 
    
4.1.3 A single CP is connected to multiple NSPs 
    
   In this usage case, a user subscribes to multiple NSPs but 
   only a single CP.  A user selects the NSP when the user 
   requests multicast but the CP is fixed.  The user should 
   send a request for multicast to the selected NSP with 
   enough information not only for authentication by the CP 
   but also for admission control by the NSP. 
    
   The role of the NSP is similar to the description in 4.1.1, 
   with the exception that when a NSP receives a request from 
   a user, NSP makes an inquiry to the CP without CP selection. 
    
   The role of the CP is the same as that described in 4.1.1.  
       
 4.1.4 A single CP is connected to single NSP 
    
   In this case, a user subscribes to only one NSP and one CP. 
   The user does not select a NSP and CP in this scenario. 
   Requests for multicast sent by the user to a selected NSP 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 11] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   should include enough information not only for 
   authentication by the CP but also for admission control by 
   the NSP. 
    
   The role for the NSP is the same as 4.1.3 
   The role of the CP is the same as the description in 4.1.1.  
    
   The NSP and CP could be the same entity. In this case, the 
   roles of the NSP and CP may be combined. 
    
 
4.2 User ID 
    
   Users may hold multiple user IDs: IDs which have been 
   separately assigned for each subscription to various NSPs 
   and CPs.  The NSPs and CPs manage the user IDs for their 
   respective domains. A CP identifies a user by a user ID 
   assigned by the CP itself. A NSP identifies a user by a 
   user ID assigned by the NSP itself. The user IDs are only 
   meaningful within the context of each domain. Users may 
   hold multiple user IDs which have been separately assigned 
   for each subscription they may have for various NSPs and 
   CPs. 
    
4.2.1 CP-assigned user ID 
    
   CPs assign user IDs to their users. The user may have more 
   than one CP-assigned user ID per specific CP.  A user 
   requests multicast to a NSP, the CP-assigned user ID should 
   be indicated so that the CP can identify the user 
   requesting content access.  A NSP should notify the CP-
   assigned user ID to the CP. A NSP should not share a CP-
   assigned user ID with any CP except the one which assigned 
   it and should not relay it at all if there is no 
   appropriate CP that assigned the user ID. 
 
4.2.2 NSP-assigned user ID 
    
   NSPs assign user IDs to their users. A user may have more 
   than one NSP-assigned user ID per a specific NSP.  A user  
   requests for multicast to a NSP, the NSP-assigned user ID 
   may be indicated in the request so that the NSP can 
   identify the user. The NSP should not inform the NSP-
   assigned user ID to the CP for security reasons. The NSP 
   may identify the multicast-access user by other methods 
   than the NSP-assigned userID, e.g. by the access port. 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 12] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   The actual mapping rules for NSP-assigned user IDs with CP-
   user assigned IDs in account logs is a matter for the 
   providers and out of the scope of this framework.  
    
4.3 Accounting 
    
   There are some accounting issues specific to multicasting.  
   An (S,G) should be recorded as a channel identifier. The 
   last hop device, such as an IGMP or MLD router or an IGMP 
   or MLD proxy, notifies the NSP's mAAA function of the (S,G) 
   channel identifier.  The NSP should notify the CP of the 
   (S,G) information in the accounting report messages. 
    
   A NSP records an accounting start corresponding to only the 
   first Join for a specific user-access session. A NSP should 
   not treat a "Join" response to a Query as the accounting 
   start. 
    
   A NSP records an accounting stop triggered by any of the 
   following: 1) a user requested Leave, 2) a timeout of a 
   multicast state or 3) a re-authentication failure. A NSP 
   may also record an accounting stop due to network 
   availability reasons such as failure. The NSP logs the 
   reason for each accounting stop.  
    
   Intermittent logs between the join and leave would allow 
   for finer diagnostics and therefore could serve useful in 
   billing discrepancies, and provide for a better estimation 
   of the time-span that content was multicast, in the event 
   that users disconnect without sending leave messages.  
    
   There are two levels of accounting report messaging. 
   Messages in Accounting level 1 include a channel identifier, 
   a user identifier, and the accounting start and stop time 
   information. Accounting level 2 includes all information of 
   Level 1, plus traffic volume information.  
    
   QoS class is an optional item for each accounting level.  
   Whether to send, and at what interval to send intermittent 
   log information is optional for both levels. CP and NSPs 
   may also agree to include additional option information in 
   accounting messages of either level.  
    
   The level of account report messaging between the NSP and 
   CP may be either configured statically or can be 
   dynamically requested by the CP in its response to the 
   Access-Request relayed by the NSP to the CP.  The 
   determination of the actual level of report messaging is 
   configured by the NSP at the NAS. 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 13] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   In case of very fast channel changes, the amount of items 
   logged by the NSP could become high.  In order to reduce 
   the number of report messages sent to the CP, the NSP can 
   consolidate multiple sets of accounting information inside 
   a single accounting report message. [I-D.ancp-framework] 
    
 
4.4 Access Control and CP selection by NSP 
    
   When a NSP receives an access request from a user, the NSP 
   determines to which CP the request is to be directed.  The 
   NSP may select a CP based on CP-assigned userID with CP 
   domain name or channel identifier (S,G). The user should 
   include in the request sufficient information for CP 
   selection. 
 
 
4.5 Admission Control Information by NSP 
 
   After authorizing a user request, the NSP may have further 
   conditions for determining its admission control decision.  
    
   The NSP receives parameters (such as QoS class, required 
   bandwidth, burst-size, etc.) of multicast traffic.  Such 
   parameters serve as information to be considered in the 
   admission control decision. The traffic parameters can be 
   communicated as follows: 
        - A CP may notify a mapping between the channel 
   identifier (S,G) and traffic parameters in the Response 
   message when the CP authorizes an access request.  Such 
   parameters may include required bandwidth, burst-size, QoS 
   class downgrade policy, etc. 
        - A user may indicate in the Request willingness to 
   accept QoS class downgrade to best-effort streaming. 
        - The NSP may maintain a mapping between channel 
   identifier (S,G) and traffic parameters in advance, for 
   example pre-configured by agreement between the CP and NSP 
   on a per channel (S,G) basis.  
    
   The ultimate admission decision is made by the NSP based on 
   required traffic parameters of the requested, and available 
   resources. In a case that it cannot guarantee the required 
   network resources for the requested multicast traffic, 
   streaming the requested multicast traffic as best-effort is 
   optional.    The user may indicate in his/her Access 
   Request whether he/she will accept best-effort grade 
   streaming if guaranteed class is not available. The CP's 
   preference for accepting downgrading to best-effort 
   streaming may be either configured statically or can be 
   dynamically requested by the CP in its response to the 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 14] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   Access-Request relayed by the NSP to the CP.  In the case 
   that it cannot be offered a guaranteed QoS stream, the NSP 
   may decide either to decline admission or to stream the 
   requested multicast traffic as best-effort. The NSP should 
   not stream best-effort traffic if either the user or CP has 
   indicated against best-effort provision.     
    
   A NSP's admission control may manage integrated network 
   resources for unicast usage, such as VoIP or unicast 
   streaming, and multicast usage. Alternatively, it may 
   manage network resources separately for unicast and 
   multicast usage. In either ease, AAA and admission control 
   framework for multicast usage is independent of unicast 
   admission control. 
    
   Such QoS measurement and policy mechanisms themselves 
   depend on NSP policies and are out of the scope of this 
   memo.  
 
4.6 Access Control and Distinguishing of Users by CP 
    
   The user ID and authentication information are forwarded 
   transparently by the NSP so that the CP can distinguish the 
   user, as well as authenticate and authorize the request. 
    
4.7 AAA proxy in NSP 
    
   A NSP may act as AAA proxy of a CP based upon an agreement 
   between the NSP and the CP.  The AAA proxy would store 
   information about permissions of a specific user to receive 
   multicast data from specified channel(s) up to specified 
   expiration date(s) and time(s).   
    
   If such proxying is implemented, the NSP may receive 
   authorization conditions from a CP in advance and 
   statically hold them, or a CP may send them dynamically in 
   the Response message.  In either case, the user has 
   permission to receive multicast traffic and therefore the 
   NSP starts the multicasting without querying the CP.   
    
   The CP may send unsolicited requests to the NSP to refresh 
   or change the permissions for a user for specific group(s) 
   or channel(s).   
    
   When a user is receiving multicast traffic while the 
   permission is about to expire, the NSP may send a 
   notification to the user client that his session is about 
   to expire, and that he will need to re-authenticate. In 
   such a case, the user will have to send the Access-Request.  
   In the case that the user still has permission to the 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 15] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   content, they should be able to continue to receive the 
   multicast traffic without interruption.  
    
   When re-authentication fails, the NSP should stop the 
   multicast traffic and record accounting stop. 
    
   5. Network Connection Model and Functional Components 
    
   Section 3.1 introduced the high-level AAA framework for 
   multicasting.  This section provides more detail on the 
   network connection model and constituent functional 
   components.  
 
5.1 Basic Connection Model 
    
 
            +------------------------------+ 
            |    receiver                  | 
            |                              | 
            +------------------------------+ 
                |        ^ Response 
                | Request      |  
                V              | 
            +------------------------------+ 
            |    NSP's network                       | 
            |                              | 
            +------------------------------+ 
                |          ^ Response 
                | Request        | (Success) 
                v                | 
            +------------------------------+ 
            |    CP's network                        | 
            |                              | 
            +------------------------------+ 
 
          Figure 2: Basic Connection Model 
    
   In the simple case represented in Figure 1 the NSP is the 
   sole entity providing network resources including network 
   access to the multicast receiver.  First a receiver sends a 
   request for multicast (e.g. an IGMP Report message) to an 
   NSP which may then forward a mAAA request towards the 
   appropriate CP for authentication and authorization 
   purposes. The receiver gets information about a given 
   multicast group (*,G) or channel (S,G) corresponding to the 
   content beforehand for generating the request. The CP 
   responds with either "success" or "failure".  If "success", 
   the NSP grants access to the receiver and forwards 
   multicast traffic accordingly. 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 16] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   In this model the receiver selects the NSP to which the 
   Join request will be sent.  Based on this request the NSP 
   selects an appropriate CP to which it forwards the 
   corresponding mAAA request. The CP responds to the NSP's m 
   AAA request:  it may not respond to another NSP in regards 
   to the request. 
    
   In this model, as described in section 4.1, the 
   relationship between NSP and CP can be one-to-one, one-to-
   many or many-to-many.  Receivers may connect to multiple 
   networks.   
    
5.2 Constituent Logical Functional Components of the fully 
enabled AAA Framework 
    
   Requirements for "fully AAA and QoS enabled" IP 
   multicasting networks were defined in MACCNT-REQ-draft. To 
   allow for levels of enablement, this memo defines two 
   models within the framework: "AAA enabled" multicasting and  
   "Fully enabled AAA" multicasting which means "AAA enabled" 
   with added admission control functions. 
    
   Section 3.1 introduces the high-level AAA framework for 
   multicasting.  Below is a diagram of a AAA enabled 
   multicasting network with AAA, including the logical 
   components within the various entities.   
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 17] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
    
            +-------------------------------+ 
            | user                          | 
            |+- - - - - - - - - - - - - - -+| 
            || CPE                         || 
            ||                             || 
            |+- - - - - | - - - - - - - - -+| 
            +-----------|-------------------+ 
                        | 
                 -------|------ IFa 
                        |  
            +-----------|-------------------+ 
            | NSP       |                   | 
            |+- - - - - |- -_+              | 
            ||TS        |    |              | 
            |    +------|-+                 | 
            ||   | AN     |  |              | 
            |    |        |---------+       | 
            ||   +------|-+  |      |       | 
            |           |     IFb   |       | 
            ||   +------|-+  | | +---------+| 
            |    |        |----|-|mAAA     || 
            ||   | NAS    |  | | |(MACF *) || * optional 
            |    +--------+      +---------+| 
            ||+- - - - - - - +      |       | 
            +-----------------------|--------+  
                                    | 
                             -------|------ IFc 
                                    |  
            +-----------------------|-------+ 
            | CP               +---------+  | 
            |                  |  CP-AAA |  | 
            |                  +---------+  | 
            +-------------------------------+ 
      Figure 3: AAA enabled framework (basic model) 
    
                     
    
   The user entity includes the CPE (Customer Premise 
   Equipment) which connects the receiver (s).  
    
   The NSP (Network Service Provider) in the basic model 
   includes the transport system and a logical element for 
   multicast AAA functionality.  The TS (transport system) is 
   comprised of the access node and NAS (Network Access 
   Server) An AN (Access Node) may be connected directly to 
   mAAA or a NAS relays AAA information between an AN and a 
   mAAA. Descriptions of AN and its interfaces are out of the 
   scope for this memo.  The multicast AAA function may be 
   provided by a mAAA which may include the function that 
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 18] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
   downloads Join access control lists to the NAS (this 
   function is referred to conditional access policy control 
   function.)  
    
    
   Interface between mAAA and NAS 
    
   The interface between mAAA and the NAS is labeled IFb in 
   Figure 2. Over IFb the NAS sends an access request to the 
   NSP-mAAA and the mAAA replies. The mAAA may push 
   conditional access policy to the NAS. 
    
   CP-AAA 
   The content provider may have its own AAA server which has 
   the authority over access policy for its contents. 
    
   Interface between user and NSP 
   The interface between the user and the NSP is labeled IFa 
   in Figure 3.  Over IFa the user makes a multicasting 
   request to the NSP.  The NSP may in return forward 
   multicast traffic depending on the NSP and CP's policy 
   decisions. 
    
   Interface between NSP and CP 
   The interface between the NSP and CP is labeled IFc. Over 
   IFc the NSP requests to the CP-AAA for access to contents 
   and the CP replies.  CP may also send conditional access 
   policy over this interface for AAA-proxying. 
    
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 19] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
            +-------------------------------+ 
            | user                          | 
            |+- - - - - - - - - - - - - - -+| 
            || CPE                         || 
            ||                             || 
            |+- - - - - | - - - - - - - - -+| 
            +-----------|-------------------+ 
                        | 
                 -------|------ IFa 
                        |  
            +-----------|-----------------------+ 
            |+- - - - - |- - _+   + - - - - - + | 
            ||        |   | |   |           | | 
            |    +------|-+ |       +--------+  | 
            ||   | AN     | | |   | | MACF  || | 
            |    |        | |       |        |  | 
            ||   +------|-+ | |   | +---|----+| | 
            |           |   |           |    |  | 
            |           |   | |     IFd----- |  | 
            |           |   |  IFb      |    |  | 
            ||   +------|---+ | | | +---|----+| | 
            |    |          |---|---| mAAA   |  | 
            ||   | NAS      | | | | |(MACF *)|| | * optional 
            |    +----------+ |     +--------+  | 
            ||+- - - - - - - -+ - - |- - - - -+ | 
            +-----------------------|-----------+  
                                    | 
                             -------|------ IFc 
                                    |  
            +-----------------------|-------+ 
            | CP               +---------+  | 
            |                  |  CP-AAA |  | 
            |                  +---------+  | 
            +-------------------------------+ 
             
             Figure 4: Fully enabled framework  
    
   In the fully enabled model the NSP also includes a 
   component that provides network resource management (e.g. 
   QoS management), as described in section 3.4, "Network 
   Resource Management by NSP".  In the fully enabled model 
   (Figure 3) resource management and admission control is 
   provided by MACF (Multicast Admission Control Function). 
   This means that, before replying to the user's multicast 
   request, the mAAA queries the MACF for a network resource 
   access decision over the interface IFd. The MACF is 
   responsible for allocating network resources for forwarding 
   multicast traffic.  MACF also receives Leave information 
   from NAS so that MACF releases corresponding reserved 
   resources.   
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 20] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
 
5.3 Modularity of the framework 
    
   In the interest of flexibility, this framework is modular 
   so that it is possible that partially enabled versions of 
   the models are supported.  A AAA-enabled version provides 
   AAA functionality without Network Resource management.  A 
   Network-Resource-Management-enabled (QoS-enabled) version 
   provides Network Resource management without AAA 
   functionality.  Similarly, the possibility of one or more 
   layers of transit provision between an NSP and CP is in the 
   interest of modularity and extendibility. 
    
    
6. IANA considerations 
    
   This memo does not raise any IANA consideration issues. 
    
    
7. Security considerations 
    
   The user information related to authentication with the CP 
   and the information related to user accounting shared 
   between the NSP and the CP must be protected in some way.  
   Otherwise, this memo does not raise any new security issues 
   which are not already addressed by the original protocols.  
   Enhancement of multicast access control capabilities should 
   enhance security performance. 
    
    
8. Conclusion 
    
   This memo provides a generalized framework for solution 
   standards to meet the requirements.  Further work should be 
   done to specify the interfaces between the user and NSP, 
   NAS and mAAA, mAAA and MACF and NSP-mAAA and CP-AAA 
   (presented in 5.2.) 
    
    
Normative References 
    
   [I-D.mboned-maccnt-req]  
      Hayashi, et. al., "Requirements for Multicast AAA 
      coordinated between Content Provider(s) and Network 
      Service Provider(s)", draft-ietf-mboned-maccnt-req-
      06.txt, June 2008, Work in Progress. 
    
   [I-D.ancp-framework] 
      Ooghe, et. al, "Framework and Requirements for an 
      Access Node Control Mechanism in Broadband Multi-
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 21] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
      Service Networks", draft-ietf-ancp-framework-04.txt, 
      November 2007, Work in Progress.  
    
    
Authors' Addresses 
    
           Hiroaki Satou 
           NTT Network Service Systems Laboratories 
           3-9-11 Midoricho, Musashino-shi, Tokyo, 180-8585 
   Japan 
           Phone : +81 422 59 4683 
           Email : satou.hiroaki@lab.ntt.co.jp 
    
           Hiroshi Ohta 
           NTT Network Service Systems Laboratories 
           3-9-11 Midoricho, Musashino-shi, Tokyo, 180-8585 
   Japan 
                   Phone : +81 422 59 3617 
           Email: ohta.hiroshi@lab.ntt.co.jp 
    
           Christian Jacquenet 
           France Telecom 
           3, avenue Francois Chateau 
           CS 36901, 35069 Rennes Cedex, France 
           Phone: +33 2 99 87 61 92 
           Email: christian.jacquenet@orange-ftgroup.com  
    
           Tsunemasa Hayashi 
           NTT Network Innovation Laboratories 
           1-1 Hikari-no-oka, Yokosuka-shi, Kanagawa, 239-0847 
   Japan 
           Phone: +81 46 859 8790 
           Email: tsunemasa@gmail.com 
    
           Haixiang He 
           Nortel 
           600 Technology Park Drive 
           Billerica, MA 01801, USA 
           Phone: +1 978 288 7482 
           Email: haixiang@nortel.com 
    
    
Comments 
   Comments are solicited and should be addressed to the 
   mboned working group's mailing list at 
   mboned@lists.uoregon.edu_and/or the authors.
    
    
    
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 22] 
    
Internet Draft  AAA and Admission Control Framework for 
Multicasting  July, 2008 
 
Full Copyright Statement 
    
   Copyright (C) The IETF Trust (2008). 
    
   This document is subject to the rights, licenses and 
   restrictions contained in BCP 78, and except as set forth 
   therein, the authors retain all their rights. 
    
   This document and the information contained herein are 
   provided on an "AS IS" basis and THE CONTRIBUTOR, THE 
   ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), 
   THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR 
   IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE 
   USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS 
   OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR 
   A PARTICULAR PURPOSE. 
    
Intellectual Property 
    
   The IETF takes no position regarding the validity or scope 
   of any Intellectual Property Rights or other rights that 
   might be claimed to pertain to the implementation or use 
   of the technology described in this document or the extent 
   to which any license under such rights might or might not 
   be available; nor does it represent that it has made any 
   independent effort to identify any such rights.  
   Information on the procedures with respect to rights in RFC 
   documents can be found in BCP 78 and BCP 79. 
    
   Copies of IPR disclosures made to the IETF Secretariat and 
   any assurances of licenses to be made available, or the 
   result of an attempt made to obtain a general license or 
   permission for the use of such proprietary rights by 
   implementers or users of this specification can be 
   obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 
    
   The IETF invites any interested party to bring to its 
   attention any copyrights, patents or patent applications, 
   or other proprietary rights that may cover technology that 
   may be required to implement this standard.  Please 
   address the information to the IETF at ietf-ipr@ietf.org. 
    
Expiration 
    
   This Internet-Draft will expire on January 3, 2009. 
    
Acknowledgement 
   
   Funding for the RFC Editor function is currently provided 
   by the Internet Society.  
     
   Satou, Ohta, Jacquenet, Hayashi, He                       [Page 23]