Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and CCR, , Diameter Credit-Control Application – RFC Diameter Credit-Control Application, is a networking protocol for Diameter application used to implement real-time credit-control for a variety of end user services. It is an IETF standard defined in RFC RFC (part 1 of 5): Diameter Credit-Control Application. Network Working Group H. Hakala Request for Comments: L. Mattila Category: Standards.
|Published (Last):||19 December 2009|
|PDF File Size:||10.5 Mb|
|ePub File Size:||9.33 Mb|
|Price:||Free* [*Free Regsitration Required]|
It monitors the usage of the granted quota according to instructions returned by credit-control server. For quota management the client sends CCR to the server requesting units and reporting consumption.
The credit authorization shall be generic and applicable to all the service environments required to support diameteg services.
In next generation wireless networks, additional functionality is required beyond that specified in the Diameter base diameyer. In this case, vendor specific AVPs can be used. Rating The act of determining the cost of the service event. Some common Diameter commands defined in the protocol base and applications are:.
RFC – part 1 of 5
The message flows are in general driven by the control-point asking for units and the server granting dameter. Prepaid services are now cropping up in many other wireless and wire line based networks.
Received answers that do not match a known Hop-by-Hop Identifier are ignored by the Diameter agent. If Diameter credit-control proxies exist between the credit-control client and the credit-control server, they MUST advertise the Diameter credit-control application support. During the credit-control process, it is used to report the used quota and request a new one. The End-to-End Identifier is an unsigned bit integer field in network byte order that is used to detect duplicate messages along with the combination of the Origin-Host AVP.
A Command Code is used to determine the action that is to be taken for a particular message.
It is located in the home domain and is accessed by service elements or Diameter AAA servers in. Session based credit-control is described in more detail, with more variations, in section 5. Also, Diameter Redirect agents that refer credit-control clients to credit-control servers and allow them to communicate directly can exist.
The application can be an authentication application, an accounting application, or a vendor-specific application.
Figure 1 illustrates the typical credit-control architecture, which consists of a Service Element with an embedded Diameter credit- control client, a Diameter credit-control server, diamfter an AAA server. A session-based credit control idameter uses several interrogations which may include first, intermediate and last interrogation. Finally, the subscriber has ended the session, and the client sends a termination message to the server containing the last Used-Units.
Service Event An event relating to a service provided to the end user. When set the AVP Code belongs to the specific vendor code address space.
The Diameter protocol defines a policy protocol used by clients to perform policy, AAA, and resource diameterr. Transaction state implies that upon forwarding a request, its Hop-by-Hop Identifier is saved; the field is replaced with a locally unique identifier, which is restored to its original value when the corresponding answer is received.
An event-based credit control process uses events as charging mechanism. The server grants units and charges the user. However, for real-time credit-control, these authorization and accounting models are not sufficient.
The credit- control protocol is the Diameter base protocol with the Diameter credit-control application. It is also possible for the server to tell the client how long the grant is valid, in which case the client is expected to send an update when the grant timer expires. If cleared, the message is an answer. The credit-control process is performed to determine potential charges and to verify whether the end user’s account balance is sufficient to cover the cost of the service being rendered.
You can help by adding to it.
RFC – Diameter Credit-Control Application
Diametr instance, a user may pay for both online time and download bytes but has only a single account balance.
The intermediate interrogations may be needed to request new quota while the service is being rendered. It provides a general solution to real-time cost and credit-control. Archived from the original on 4 July Service Element A network element that provides a service to the end users. This method can be used to avoid unnecessary conversions from an existing data format to an AVP format.
It is used between the credit-control server and the Diameter credit-control client to acknowledge a Credit- Control-Request command. The credit-control server deducts the used amount from the end user’s account; it may perform rating and make a new credit reservation if the service delivery is continuing.
The rfv application defined in this specification supports two different credit authorization models: Views Read Edit View history.
Diameter Credit-Control Application
This allows a single server to handle policies for many services. AA answer commands are defined in service specific authorization applications, e. A flexible credit-control application specific failure handling is defined in which the home service provider can model the credit- control client behavior according to its own credit risk management policy. The Message Length field indicates the length of the Diameter message in bytes, including the header fields and the padded AVPs.
For session based credit-control, both the credit control client and the credit-control server are required to maintain credit-control session state. The client is allowed to request units before the previous grant is completely used, in order to avoid suspending the subscriber session while talking to the server.
The ” E ” Error bit — If set, the message contains a protocol error, and the message will not conform to the CCF described for this command.
When creating a request, the End-to-End Identifier is set to a locally unique value. A Business Support System is usually deployed; it includes at least the billing functionality.