0% found this document useful (0 votes)
28 views36 pages

NGN Presentation. 1

Next Generation Networks (NGN) integrate traditional circuit-switched networks with modern packet-based networks to provide a unified infrastructure for various multimedia services. Key features include support for voice, video, and data services, enhanced Quality of Service (QoS), security measures, and mobility support. The document also covers NGN protocols, MPLS applications, and the impacts of NGN on economic, social, and technological aspects.

Uploaded by

tiltsync
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views36 pages

NGN Presentation. 1

Next Generation Networks (NGN) integrate traditional circuit-switched networks with modern packet-based networks to provide a unified infrastructure for various multimedia services. Key features include support for voice, video, and data services, enhanced Quality of Service (QoS), security measures, and mobility support. The document also covers NGN protocols, MPLS applications, and the impacts of NGN on economic, social, and technological aspects.

Uploaded by

tiltsync
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Overview of Next Generation Networks

- NGN
Presentation by :
Eulogy T. Mufiri
Tafadzwa Nyaku
Tinotenda P. Bungu
Tatenda W. Maunde
Panashe Mabvute
Ebenezer Msipa
Courtney Muchenje
Content
1. Overview of NGN (Defining terms)
2. Services and Requirements
3. Functional Architecture
4. QoS, Security and Mobility
5. Impacts of NGN
6. Next-Generation Networks (NGNs) protocols
7. MPLS (Multiprotocol Label Switching): Basic MPLS Concepts, MPLS
Labels, Identifying MPLS Applications, Label Assignment and
Distribution
8. Virtual Private Networks, MPLS VPN Architecture
9. Convergence in Frame-Mode MPLS
Overview of NGN (Defining terms)

• NGN represent an evolution of telecommunication networks that


integrate traditional circuit-switched networks (like PSTN) with
modern packet-based networks (like IP networks).
What it means ?
• Legacy telecom networks (PSTN or 2G/3G) were vertically integrated meaning
that each service (voice, SMS, data) had its own dedicated infrastructure
• NGN are horizontally integrated meaning that all services share the same layered
architecture thus facilitating interoperability
• NGN aim to provide a unified, scalable, and flexible infrastructure capable of
delivering a wide range of multimedia services
Service & Requirements
Services
• Voice Services (VoIP): High-quality voice communication over IP.
• Multimedia Services: Video conferencing and streaming.
• Data Services: High-speed internet access (FTTH, 5G).
• Unified Communications: Integration of voice, video, and messaging.
• Cloud Services: SaaS, PaaS, and IaaS over NGN infrastructure.
• IoT : Smart cities, Remote monitoring systems
Service & Requirements cont’d
Requirements
• Convergence: Support for multiple services (voice, data, video) over a single IP-based
network.
• Scalability: Ability to handle increasing traffic and users.
• Quality of Service (QoS): Guaranteed performance for real-time applications.
• Security: Protection against cyber threats, fraud, and unauthorized access.
• Interoperability: Compatibility with legacy networks (PSTN, ISDN) and emerging
technologies.
• Mobility Support: Seamless handover between different access technologies (Wi-Fi, 4G,
5G).
• Regulatory Compliance: Adherence to legal and policy frameworks (e.g., lawful
interception, net neutrality).
Functional architecture
• NGN functional architecture is composed of functional groups
separated by well defined interfaces. Each functional group contains a
set of functional entities.
The main functional groups are:
• the transport stratum,
• the service stratum,
• the end-user functions,
• the third-party applications,
• the management functions and
NGN Functional architecture
• .
Transport Stratum Functions

The transport stratum functions include:

• Transport functions,
• Transport control functions and
• Transport user profiles.
Transport functions
• Provide the connectivity for all components and physically separated functions within the NGN. These
functions provide support for the transfer of media information, as well as the transfer of control and
management information. Transport functions include:
• Core transport network – serves as the backbone, responsible for ensuring information transport
throughout the core network. These functions provide high speed packet forwarding via IP and MPLS
(Multiprotocol Label switching) connectivity at the transport stratum and across the entire core network,
• Access transport functions- facilitate end users’ connection to the network via wired(DSL, FTTH) and
wireless(Wi-fi, xDSL, FTTx, Wi-Fi, LTE/5G) technologies
• Edge functions - used to process and analyze data at the edge of the network, closer to the source. This
approach facilitates QoS and traffic control.
• Gateway functions – play a crucial role in NGN, serving as the entry and exit points for data traffic between
different networks or domains. They facilitate interoperability between different network, protocols and
technologies
Transport control functions
• Include resource and admission control functions (RACF) and network
access attachment control functions (NACF). The RACF provides QoS
control (including resource reservation, admission control and gate
control).
• The Admission control (in RACF) involves checking authorization
based on user profiles, SLAs, operator-specific policy rules, service
priority and resource availability within access and core transport.
• The NACF provides further the functionality of:
1. authentication at the IP layer (and possibly other layers);
2. authorization of network access, based on user profiles;
Transport user profile functions
• These functions take the form of a functional database representing
the combination of a user’s information and other control data into a
single ‘user profile’ function in the transport stratum.
Service stratum functions

The service stratum functions include:

• service control functions,


• application/service support functions, and
• service user profile functions.
Service stratum (Control &
Application Functions)
• The service control functions Include both session and non-session
control, registration and authentication and authorization functions at
the service level.
• The application/service support functions work in conjunction with
the service control functions to provide end-users and third-party
application providers with the value-added services they request.
• The service user profile functions represent the combination of user
information and other control data into a single user profile function
in the service stratum, in the form of a functional database.
End-user functions
• Refers to NGN support for different end-user equipment
• Different categories of end-user equipment are supported in the NGN,
from mobile applications to single-line legacy telephones and complex
corporate networks.
• End-user equipment may be either mobile or fixed(smart phones,
IPBX, IoT devices, PCs, routers, laptops, WhatsApp, Zoom etc.)
Management Functions

• Support for management is fundamental to the operation of the NGN.


• These functions provide the ability to manage the NGN in order to
provide NGN services with the expected quality, security and reliability.
• They cover the following areas:
1. Fault management;
2. Configuration management;
3. Accounting management (includes charging and billing functions);
4. Performance management;
5. Security management.
QoS, Security and Mobility

Quality of Service (QoS)


QoS ensures that real-time services (VoIP, video streaming, gaming) get
priority over best-effort traffic (email, web browsing). NGN achieves
this through:
• Traffic Prioritization: MPLS for classifying and managing traffic.
• Bandwidth Management: Dynamic resource allocation based on demand.
• Low Latency & Jitter Control: Critical for VoIP and real-time video.
• SLA Compliance: Ensuring service guarantees for enterprise users.
• Resource Reservation & Traffic Engineering- RSVP (Resource Reservation
Protocol) dynamically reserves bandwidth for high-priority flows
Security in NGN

• NGN faces threats like DDoS, SIP flooding, eavesdropping, and fraud.
Security is enforced at multiple layers:
• Authentication & Authorization: IMS uses SIP authentication generating session
keys for encryption
• Encryption: TLS, IPsec for secure data transmission.
• Firewalls & IDS/IPS: Protects against DDoS, malware, and intrusions.
• Lawful Interception: Compliance with government surveillance requirements
• Fraud Prevention: Detects and prevents VoIP fraud, SIM swapping. Flags unusual
call patterns (e.g., sudden spike in international calls).
Mobility in NGN
• Seamless Handover: Between Wi-Fi, 4G, and 5G without service
disruption.
• Fixed-Mobile Convergence (FMC): Unified services across wired and
wireless networks. Guides devices to the best available network (e.g.,
prefer Wi-Fi when at home).
• Location Management: Tracking user mobility for service continuity.
• VoLTE & VoWiFi: Voice services over LTE and Wi-Fi networks
Impacts of NGN

• A. Economic Impacts
• Cost Efficiency: Lower operational costs due to IP convergence.
• Job Creation: Demand for skilled professionals in VoIP, cybersecurity, and cloud computing.
• B. Social Impacts
• Enhanced Connectivity: Bridging the digital divide with high-speed broadband.
• Smart Services: E-health, e-learning, and smart home automation.
• Global Communication: Affordable international calls and video conferencing.
• C. Technological Impacts
• 5G & Fiber Integration: NGN enables ultra-low latency and gigabit speeds.
• AI & Automation: Network optimization using machine learning.
• D. Regulatory & Security Challenges
• Privacy Concerns: Data protection laws (GDPR) must be enforced.
• Cyber Threats: Increased attack surface due to IP-based vulnerabilities.
NGN Standards and Protocols

Key Organisations
Key Organisations
• The Internet Society (ISOC)
• The Internet Architecture Board (IAB)
• The Internet Engineering Task Force (IETF)
• Institute of Electrical and Electronics Engineers (IEEE)
• The International Organization for Standards (ISO)
NGN Standards and Protocols
Key NGN Protocols
• IP (Internet Protocol) – Foundation of NGN, enables packet routing.

• SIP (Session Initiation Protocol) – Establishes/modifies/terminates multimedia sessions (VoIP, video


calls).

• RTP (Real-time Transport Protocol) – Delivers audio/video streams with timing control.

• Diameter – AAA (Authentication, Authorization, Accounting) for policy control.

• SS7 (Signaling System 7) – Legacy telephony signaling, integrated with IP via SIGTRAN.

• BGP (Border Gateway Protocol) – Manages routing between autonomous systems (ISPs).
Convergence in Frame-Mode MPLS
• Convergence refers to the ability of MPLS to integrate multiple network services (IP,
Ethernet, VPNs, QoS) into a unified packet-switched infrastructure
• Frame-Mode MPLS is a method of implementing Multiprotocol Label Switching (MPLS) in
IP networks where data is transmitted in variable-length frames (Ethernet, PPP) rather
than fixed-length cells (as in ATM). It is the most common deployment model for MPLS in
modern IP networks.

• Key Characteristics:
• Operates over Layer 3 (IP) networks.
• Uses Label Edge Routers (LERs) and Label Switch Routers (LSRs).
• Does not require cell fragmentation/reassembly (unlike ATM).
• Supports convergence of multiple services (voice, video, data) over a single infrastructure.
How Frame-Mode MPLS Enables Convergence
Label Switching Instead of IP Routing
• Traditional IP networks rely on longest prefix match (slow lookups).
• MPLS uses label swapping (faster forwarding).
Support for Multiple Protocols
• MPLS is protocol-agnostic (works with IPv4, IPv6, Ethernet, etc.).
• Enables Layer 2 and Layer 3 VPNs over the same infrastructure.
Traffic Engineering (TE)
• MPLS allows explicit path control (avoiding congested routes).
• RSVP-TE (Resource Reservation Protocol-Traffic Engineering) sets up Label Switched
Paths (LSPs) with reserved bandwidth.
Quality of Service (QoS) Integration
• Prioritizes real-time traffic (VoIP, video).
Key Mechanisms Enabling
Convergence
Label Distribution Protocol (LDP)
• Dynamically assigns and distributes MPLS labels.
• Uses downstream unsolicited or downstream on-demand label distribution.
Label Switched Paths (LSPs)
• Predefined paths for traffic (improves predictability).
• Can be shortest-path (IGP-based) or traffic-engineered (RSVP-TE).
MPLS Label Stack
• Multiple labels can be stacked for hierarchical routing (e.g., MPLS VPNs).
• Used in tunneling applications (e.g., MPLS TE tunnels).
What is MPLS?
• MPLS (Multiprotocol Label Switching) is a high-performance packet-
forwarding technology that uses short, fixed-length labels (instead of
traditional IP routing) to direct data across a network. It operates at
Layer 2.5 (between Data Link and Network layers), making it protocol-
agnostic
How Does MPLS Work?
• Step 1: Label Assignment
• When a packet enters an MPLS network, the ingress Label Edge Router (LER) assigns an MPLS label (32-bit
header).

The label contains:


• Label Value (20 bits) – Identifies the Forwarding Equivalence Class (FEC).

• Traffic Class (3 bits) – Used for QoS

• Bottom-of-Stack (1 bit) – Indicates if more labels are stacked.


How Does MPLS Work? cont’d
Step 2: Label Distribution
• Label Distribution Protocol (LDP) or RSVP-TE distributes labels across the network.
• Each Label Switch Router (LSR) maintains a Label Forwarding Information Base (LFIB).
Step 3: Label Switching (Forwarding)
• Instead of IP lookups, routers swap labels (e.g., swap label 17 with 23).
• The path taken by labeled packets is called a Label Switched Path (LSP).
Step 4: Penultimate Hop Popping (PHP)
• The second-to-last router (penultimate hop) removes the MPLS label.
• The egress LER forwards the packet based on the original IP header.
Step 5: Packet Exit
• The packet leaves the MPLS network, and the label is removed.
MPLS Applications
1. Traffic Engineering (TE)
• Avoids congestion by manually or dynamically routing traffic.
• Uses RSVP-TE to reserve bandwidth.
2. MPLS VPNs
• Layer 3 VPN (L3VPN) – Uses BGP to route customer VPNs.
• Layer 2 VPN (L2VPN) – Extends Ethernet/Frame Relay over MPLS.
3. Quality of Service (QoS)
• Class of Service (CoS) markings
• Prioritizes VoIP, video, and critical data.
4. Seamless Service Integration
• Carries voice, video, and data over a single network
Introduction to Virtual Private
Networks (VPNs)
• A Virtual Private Network (VPN) is a secure, private communication
network built over a public infrastructure (like the Internet or an
MPLS backbone). VPNs allow remote users, branch offices, and
partners to securely access a private network as if they were directly
connected.
Type Description Use Case
Securely connects individual
Home workers accessing
Remote Access VPN users (e.g., employees working
corporate networks
remotely)
Connects entire networks (e.g.,
Site-to-Site VPN Enterprise WAN connectivity
branch offices)

Uses MPLS to create scalable,


MPLS VPN ISPs and large enterprises
QoS-enabled VPNs
What is an MPLS VPN?
• An MPLS VPN is a type of VPN that uses Multiprotocol Label Switching
(MPLS) to create secure, scalable, and high-performance private
networks over a shared service provider infrastructure.
• Benefits of MPLS VPNs
1. Any-to-any connectivity (no full mesh required).
2. Traffic isolation (VRF tables ensure privacy).
3. Service Level Agreements (SLAs) (guaranteed bandwidth, low
latency).
4. Simplified WAN management (provider handles MPLS backbone).
MPLS VPN Architecture
MPLS VPNs come in two main types:
Layer 3 VPN (L3VPN) – Uses IP routing (BGP/MPLS).
Layer 2 VPN (L2VPN) – Extends Ethernet/Frame Relay over MPLS

Layer 3 VPN (L3VPN)

Key Components:
• Customer Edge (CE) Router - Connects customer site to provider network
• Provider Edge (PE) Router - Connects to CE, assigns VPN labels
• Provider (P) Router - Core MPLS router (no VPN awareness)
L3VPN Architecture
How MPLS Layer 3 VPN Works:
Route Advertisement
• Each PE router maintains a Virtual Routing and Forwarding (VRF) table per VPN.
• Uses MP-BGP (Multiprotocol BGP) to exchange VPN routes.
Label Assignment
• PE routers assign two labels:
• Inner Label (VPN Label) – Identifies the customer VPN.
• Outer Label (Transport Label) – Used for MPLS forwarding.
Packet Forwarding
• PE routers impose labels and forward traffic over Label Switched Paths (LSPs).
• P routers only swap the outer label (no VPN awareness).
Layer 2 MPLS VPN (L2VPN)
• Extends Layer 2 services (Ethernet, Frame Relay) over MPLS.

• Used for transparent LAN services (TLS) and data center interconnects
.

THANK YOU

THE END

You might also like