NGN
NGN
Abstract— Due to NGN has the important role in the - Independence of service-related functions from
field of telecommunication, we decided to disscuss about the underlying transport technologies’
security issues and provide an application security model for
next generation, the theorical approach in collaboration of We are facing different type of network, where each of
grid and cloud computing and also the challenges on access them according to its existing structure , has certain services
network. As the conceptual model, surely the lack of it for and programm and various appications in terms structur
NGN security with application approach caused not having a network of telecommunication engineeing. The most
certain framework as a reference. For this, at first we disscuss important consideration in development and improvement
the applicable network, next generation network and security would be the problem of incidience and new threats, risks and
in next generation network and then present a new plan as a the methods for preventing and dealing them. In this context,
conceptual model to provide security at the application level we introduce the security model for applications in Next
for next generation network. This Model could be used for Generation Networks.
Cloud Computing Networks. Next, the goal of NGN is to The development of the information society is dependent
provide a more flexible network infrastructure that supports on a universal broadband access network capable of reaching
not just data and voice traffic routing, but also higher level everybody. Broadband deployment is increasingly
services and interfaces for third party enhancements. Within considered a key driver of economic development, job
this paper, opportunities to integrate grid and cloud growth, productivity, and social advancement.
computing strategies and standards into NGN are considered. The needs of telecommunication networks with higher
Today, network operators are facing the challenge of how to capacity are becoming a reality all over the world. However,
expand the existing access network infrastructure into the limitation of local access networks is the major jamming
networks capable of satisfying the user’s requirements. Thus, to providing broadband access.
in this context, providers need to identify the technological
solution that enables them to profitably serve customers and
support future needs. However, a a difficult task is the II. CONCEPTUAL MODEL FOR SECURITY CONSIDERATION OF
NEXT GENERATION NETWORK
identification of the “best” solution.
Security assessment is based on security goals of the
Keywords NGNs; Access Networks; ; Application network. Based on ITU- T X.805 and the analysis of security
security; networks security; security of NGN; Conceptual threats and vulnerability in NGN, seven dimensions are
model; Broadband Access Networks; Architecture; Grid chosen to describe NGN security. The essence of security is
computing; Cloud Standards Testing. the continuous gambling between the attack side and the
defense side with the knowledge of security vulnerabilities
I. INTRODUCTION and also is the process of the both sides to reach their aims by
A Next Generation Network (NGN) is a packed-based detecting vulnerabilities.
network that can be used for both telephony and data and that NGN Architecture : Open architecture is the key point
supports mobility. of the NGN. It will support multi kind acces such as GSM,
The NGN is characterized by the following fundamental GPRS, 3G, POTS, WLAN, Wireland, broadband, etc. The
aspects : NGN design has aimed to support a dynamic architecture and
- Converged servicec between Fixed/mobile can, therefore, accommodate new services as they are
- Generalized mobility identified.
- Support for a wide range of seervices Network Elements: Network elements (NE) refer to all
- Packet Based – transfer the unattached physical equipment entities, including all the
- Decoupling of service provision from network and data communication equipment, NGN core elements, net
management equipment and all the user terminals and O&M
provision of open interfaces
terminals.
- Separation of conrol functions among bearer
Protocols: Protocols play an important role on the
capabilities, call/session, and application/service security of NGN. The protocols used by NGN include Sip,
- Unrestricted of conctrol functions among beare H.248, Diameter, And RTP etc.
capalities, call/session, and application/service Security Management : If that use different mechanism
- Unrestricted access by users to different service it will be make big problem in security so that have to satisfy
providers various security requipment because security management as
- Compliant with all Regulatory requirements one of big role in NGN.
In “Conceptual model for security in Next Generation Lined telephone according to availability
Network” disscuss security in NGN that threats model of (anywhere and anytime) and the reliability of
NGN such as, data corruption, destruction of information or PSTN network.
network resources corruption, destroy and deletion of data or The range of application program is too wide that each
removal of network resources, disclosure, interrupt and of based on network infrasturcture, service and software
access denied. It also discusses three layers and three establishment, location and type of use, has special usage and
securities, they are Infrastructure security plan, Services importance in its own. Some of these programs overlap with
security plan 592, Applications security plan. Each layer each other, or they can be subset of some other considerations
upon hierarchical layers brings the usual ability for running Naturally with converging of network, the problems would
each next layer and also each layer has its own vulnerability be stronger. One of the most important problems in the next
and threats. These security plans include: End-user security generation is related to network security.
plan, Control / Signaling security plan, Management security Each network due to its structure has weaknesses and
plan. security vulnerabilities. Because of the involvement of the
users, one of the most important section harmed of security
problems, is application. Vulnerability happens due to poor
A. The Main Structure of Network
software design, incorrect settings of users because of
The base structures of available communication and misunderstanding, abuse of the program and attack to the
telecommunication networks include : network and weaknesses of protocols.
• Internet and data network
• Cable network
• Lines telephone network, or PSTN III. NGN : COLLABORATION OF GRID AND CLOUD COMPUTING,
• Wireless and mobile networks A THEORETICAL APPROACH
• Broadband and fiber networks In the second paper that we reviewed, it disscuss about
• Private network NGN but it’s focused in cllaboration of Grid and cloud
• Ethernet network computing, in this paper has related with another 2 paper that
Each of these networks has Strengths and weaknesses. we also review. They has similiraty in NGN architecture and
With Development of technology and the huge user's wide range.
demands and needs beside the heavy cost of financing, makes The wide range of organizations involved with one or
it necessary that existing network infrastructure changes in more of grid, cloud, and NGN technology each have their
order to maximize the capabilities of this network, without own priorities. Where operational systems have been
changing, the basic infrastructure, which this idea, called the designed or deployed, this range of priorities has resulted in
next generation of networking. competing architectures and interfaces. Although NGN does
not yet exist as an integrated global telecommunications
platform, there is a coordinated effort to develop the suite of
standards to cover a high level NGN architecture. In contrast,
grid computing offers a few high level conceptual models,
typically using the hour-glass middleware imagery. This
envisages a wide range of high level applications connected
to a wide range of heterogeneous low level resources via a
limited number of intermediate standard interfaces. In
addition, there are a few concrete architectural models for
Picture 1
grid infrastructures.
Based on picture 1 has the beneficial capabilities of In the cloud domain, there is currently a prevalence of
different desgin of three characteristic : independent services with minimal interest in interoperability
1. Service Awareness or consideration of standards. s. While this is in the process
of changing, there is currently no sufficient activity in this
2. Service Richness area to report on. While the original motivation for grid
3. Service Flexibility computing originated with large scientific collaborations, it is
now established that the same new technology and
Application programs can be defined in these areas:
perspective on distributed computing is applicable in many
Field data with regards of capacity and extent domains.
of the internet;
Cable area according to the available video
services in cable networks; A. Differenting Cloud Computing and Grid Computing
Ethernet area considering the flexibility of Grid computing is a term referring to the combination of
Ethernet networks; computer resources from multiple administrative domains to
Private networks considering network security reach a common goal. The Grid can be thought of as a
(VPN); distributed system with non-interactive workloads that
Broadband area by considering the bandwidth involve a large number of files.
of the optical network; Cloud computing is also Internet-based computing,
whereby shared resources, software, and information are
provided to computers and other devices on demand, as with 4. Grid and cloud technology for implementing NGN
the electricity grid. functionality.
It is a adoption of virtualization, service-oriented
architecture and utility computing which originated in the
private sector where virtualization technology and large data IV. NGN : CHALLENGES ON ACCESS NETWORKS
centers have been turned into the foundation for products and (REGULATION AND CHALLENGES)
services to be resold. The move toward next-generation networks (NGNs) has
The grid concept has a complementary but independent significant implications for the technical architecture and
relationship to the concept of cloud computing. The design of access network infrastructure, as well as the value
similarities are that both aim to provide access to a large chains and business models of electronic communications
computing (CPU) or storage (disk) resource. Current cloud service provision. This migration has began to transform the
environments only provide direct support for single user or telecommunication sector from distinct single-service markets
single organization access, and current models typically have into converging markets. NGNs allow consumers to choose
a high cost to integrate computing, data, or network transfers between different access network technologies to access their
from outside of the cloud. service environment. Sometimes, referred to as the next-
generation access network (NGAN), the NGN architecture
Grid computing can benefit from the development of
will be limited to the developments of network architectures
cloud computing by harnessing new commercially available
in the access network (local loop).
computing and storage resources, and by deploying cloud
technology on grid-enabled resources to improve the NGANs are being deployed across the world with
management and reliability of those resources via the technologies such as fiber, coaxial cable, powerline
virtualization layer. communications (PLC), copper-utilizing xDSL technologies,
Cloud computing can benefit from grid concepts by wireless solutions, or hybrid deployment of these
integrating standard interfaces, federated access control, and technologies. Wireless networks typically use a range of
distributed resource sharing. different technologies, including high-speed packet access
(HSPA), HSPA+, worldwide interoperability for microwave
access (WiMAX), and long-term evolution (LTE). Further,
B. The Architecture of NGN wireline networks are increasingly employing some form of
NGN is being designed to provide interoperable, inter- fiber, such as fiber-to-the-home (FTTH) and fiber-to-the-
domain all IP-based network standards with enhanced curb/cabinet (FTTC). Initially NGN access in fixed networks
multimedia capabilities. NGN offers unrestricted access by was broadband access based on copper loops. However, many
countries are developing projects to provide higher speeds
users to different service providers. These include voice
using fiber-based technology, such as very high-speed digital
telephony, data services, multimedia services, virtual private
subscriber lines (VDSL) or fiber-to-the-building / home
networks, public network computing, and unified messaging. (FTTB / H). It is the only voice service that is based on Internet
protocol (IP) for wired networks. Meanwhile, migration to IP
voice is more complex for cellular networks.
It is important to compare various technologies before
investment decisions are made because broadband access
networks require large investments. Regarding investment
costs, it depends on the technology to be used, as well as on
service area demographics and customer demand forecasts
and throughput. The choice of a specific technology for
NGAN can be different among countries, geographic areas,
and operators. In recent years, there has been an increase in
the coverage, number, and market share of “alternative”
Picture 2 networks or operators, such as resellers, cable network
operators, unbundling operators, operators using frequencies
for WLL/WiMAX, or operators deploying optical fiber in the
NGN with cloud computing approaches which would local loop. This has resulted in differences in competitive
allow a network operator to virtualized various NGN conditions among geographic areas, which has led to
subsystems, thus providing dynamic scalability, load- increasing arguments (especially from incumbent operators)
balancing, and fault tolerance. With expertise in the domain that geographical aspects should be recognized in
of managing virtualized servers for NGN operations in large market/competition analyses and regulatory decisions. There
data centers, it is a small step for network operators to are several factors that might be responsible for this
consider partitioning their virtualized server platforms and discrepancy, they are :
making these available as cloud computing services in a 1. State and age of the existing network infrastructure;
manner similar to the cloud services offered.
Four possible scenarios: 2. Length of the local loop;
1. Grid-enabled NGN application ; 3. Population density and structure of the housing
2. NGN subsystems offering grid and cloud services; market;
3. Combining grid and networking resources in a new
architecture; 4. Distribution of the number of users and street
cabinets for local exchange;
5. Level of intermodal competition in the market; narrowband and broadband technologies with and without
wires. That service is carried out to deliver new services to
6. Willingness to pay for broadband services;
end customers. The selection of the best solution requires an
7. Existence of ad hoc national government plans for understanding of the technical possibilities and limitations of
broadband development. the different alternatives, as well as an understanding of the
costs resulting from building and operating the networks.
Therefore, the use of cost models for measuring the costs of
A. NGN Regulation providing telecommunications services has become
Broadband in OECD is still dominated by DSL, but there commonplace. The advent of NGNs creates new challenges
is a clear trend to increase last-mile access networks to for network operators, service providers and regulators.
support new service requirements. To overcome these When network operators want to make the investment
network requirements, many operators in emerging markets decisions, they need to consider some things such as the
must move from old platforms to next-generation solutions present utilization and emerging innovative uses of the
with a combination of wireless and cable technology, such as internet services ( P2P applications, next generations of video
WiMAX, IP-Ethernet, and new forms of DSL technology and conferencing, video downloads, collaborative gaming,
also fiber. In the past, wireline cable telephone access interactive video and television, and network-based backups)
networks experienced problems in the form of monopolistic which may impose additional costs on the network operators.
congestion. With the advent of the NGN, economists began The existent operators (e.g. incumbents) can use business
to oppose this view because convergence sparked hopes for modeling to study tariffs, analyze competition, analyze the
infrastructure competition in the local circle. It is recognized cost of services, analyze of alternative technology strategies,
that regulations can hamper investment on incumbents. In business case evaluation, definition of the rollout strategy,
addition, most European regulators argue that the withdrawal appraising alternative investment opportunities and
of simple regulations is not the most appropriate solution determining economically appropriate cost floors. They use
because it inhibits investment in competitive participants, it because business modeling is broadly used by operators and
which is often as important as quantitatively made by regulatory authorities. Operators, existent or new entrants,
incumbents. Changes in regulation can also limit consumer use models for strategic planning, project analysis and
choices and hamper competition. Regulators should ensure selection, etc. To new entrants, these models give important
that local loop unbundling (LLU) and sub-loop unbundling, information in the deployment of network infrastructures. For
bitstream, the transition to NGA, access to ducts and dark example, a cost model, with a series of calculations based on
fiber, inside (building) wiring, collocation, and backhaul are a certain costing methodology, provides the costs that a firm
defined in a transparent, efficient, and technologically neutral incurs to provide different services using different
manner (see picture 3). technologies.
One of the most important roles of any regulatory
authority (NRA) is to impose cost oriented pricing to
operators with significant market power-regulators require
good cost models for the purpose of establishing the prices of
regulated telecommunications services. However, without a
detailed understanding of the costs of delivering services,
regulators cannot enforce appropriate rates for either retail or
wholesale services. In addition, regulators need the
information produced in cost models to define strategies and
Picture 3 policies.
Cost models deliver several benefits to operators and
Even though the cost of bandwidth in the active layer has regulatory bodies. However, contended that a new, accurate,
decreased significantly and continuously in recent years, the and more flexible cost model for the new multi- service NGN
cost of civil works is a major barrier for operators to use NGA networks are needed. More than ever, not being able to
infrastructure. Studies and deployments show that civil understand the cost drivers and model the costs of an NGN
infrastructure is the largest proportion of the cost of network leads to significant risk for both regulators and
distributing fixed access (up to 80%). Duct is an important network operators. The current models are not satisfy when
part of the next generation access network and its distribution faced with the challenge of delivering a range of new and
will reduce or eliminate this capital cost and barriers to entry. complex services over a radically different network
However, channel access may need to be supplemented by infrastructure.
extra civil works to increase infrastructure capacity, use of
dark fiber (if available), or use of alternative infrastructure
provider channels. It also highlights that different and / or V. CONCLUSIONS
complementary regulatory tools might be needed in various There are 3 papers that we reviewed. The first paper
parts of the network. is “Conceptual Model for Security in Next Generation
Network”. We conclude that making each fields secure,
especially in communication network, would be surprising,
B. NGN challenges complicated, and dangerous which each phase will change and
A large variety of access network technologies and the competitors are so smart to take advantages of every
architectures are available for operators to include both wrong move. NGN over time requires security infrastructure
because all malwares are monitored from the first step of as enrich the services they offer to their customers. The NGN
entrance to NGN and prepare a specific and technical challenges on access networks really increasing demands on
environment for security research. This Model will be used for network capacity because competition in telecommunications
cloud computing. is more complex than in many other industries because of the
The second paper is “ NGN : Collaboration of Grid and nature of communications networks.
Cloud Computing, A Theoretical Approach”.
Telecommunication operators are expecting that grid enabled
services can improve their internal network operation as well VI. REFERENCES
as enrich the services they offer to their customers.
[1] M. R. Masoud Hayeri Khyavi, "Conceptual model for
The third paper is “NGN Challenges on Access security in next generation," 2016 30th International
Networks”. Telecommunication infrastructures are facing Conference on Advanced Information Networking and
unprecedented challenges with increasing demands on Applications Workshops, 2016.
network capacity. However, competition in [2] 2. P. Debabrata Singh, "Next Generation
telecommunications is more complex than in many other Network:Collaboration of Grid and Cloud Computing,
industries because of the nature of communications networks.
A Theoretical Approach," Debabrata Singh et al, Int.
A correct construction of a techno-economic model permits
Journal of Information Technology & Mechanical
the minimization of errors in the network development phase
and calculation of results, allowing for an evolutionary Engineering - IJITME, 2014.
development of the network solution. [3] J. P. R. Pereira, "Next Generation Network (NGN)
So, the overall conclusion is based on the name, NGN is Challenges on Access," in New Advances in
the future telecommunications network models. NGN offers Information System and Technologies, 2016.
unlimited access by users to different service providers and
allows the provision of broadband services. It also supports
the development of mobility that will allow service
consistency to users whenever and wherever they are.
Conceptual model for security in NGN is needed because
when it’s secure it will be more safe and NGN over time really
needs the security infrastructure because all the malwares
entrance to NGN first. The model will be really used for cloud
compouting. Then, for the theoretical approach,
telecommunication operators are expecting that grid enabled
services can improve their internal network operation as well .