PDF Download

DIAMETER RFC 4006 PDF

Diameter is an authentication, authorization, and accounting protocol for computer networks. The Diameter base protocol is defined by RFC ( Obsoletes: RFC ) and CCR, , Diameter Credit-Control Application – RFC Diameter Credit-Control Application, is a networking protocol for Diameter application used to implement real-time credit-control for a variety of end user services. It is an IETF standard defined in RFC RFC (part 1 of 5): Diameter Credit-Control Application. Network Working Group H. Hakala Request for Comments: L. Mattila Category: Standards.

Author: Vudotaxe Duzahn
Country: South Africa
Language: English (Spanish)
Genre: Relationship
Published (Last): 25 September 2012
Pages: 500
PDF File Size: 1.10 Mb
ePub File Size: 10.19 Mb
ISBN: 294-7-55395-732-5
Downloads: 37714
Price: Free* [*Free Regsitration Required]
Uploader: Zukree

Diameter is an authentication, authorization, and accounting protocol for computer networks. It belongs to the application layer protocols in the diamster protocol suite.

The name is a play on words, derived from the RADIUS protocol, which is the predecessor a diameter is twice the radius. Diameter is used for many different interfaces defined by the 3GPP standards, with each interface typically defining new commands and attributes.

Diameter (protocol)

Adding a new optional AVP does not require a new rff. The Diameter protocol was initially developed by Pat R. The Diameter protocol defines a policy protocol used by clients to perform policy, AAA, and resource control. This allows a single server to handle policies for many services.

Diameter Applications can extend the base protocol by adding new commands, attributes, or both. The packet consists of a Diameter header and a variable number of Attribute-Value Pairs, or AVPs, for encapsulating information relevant to the Diameter message.

This field indicates the version of the Diameter Base Protocol. As ofthe only value supported is 1.

The Message Length field indicates the length of the Diameter message in bytes, including the header fields and the padded AVPs. The ” R ” Request bit — Daimeter set, the message is a request. If cleared, the message is an answer. If cleared, the message MUST be locally processed. The ” E ” Error bit — If set, the message contains a protocol error, and the message will not conform to the CCF described for dizmeter command.

  CHRISTOPHER VOGLER EL VIAJE DEL HEROE PDF

Messages with the “E” bit set are commonly referred to as error messages. The ” T ” Potentially re-transmitted message bit — This flag is set after a link failover procedure, to aid the removal of duplicate requests.

It is set when resending requests not yet acknowledged as an indication of a possible duplicate due to a link failure. The values are for permanent, standard commands allocated by IANA.

A Command Code is used to determine the action that is to be taken for a particular message. Some common Diameter commands defined in the protocol base and applications are:.

Diameter (protocol) – Wikipedia

Application-ID is used to identify for which Diameter application the message is applicable. The application can be an authentication application, an accounting application, or a vendor-specific application. The Hop-by-Hop Identifier is an unsigned bit integer field in network byte order that is used to match the requests with their answers as the same value in the request is used in the response.

The Diameter protocol requires that relaying and proxying agents maintain transaction state, which is used for failover purposes. Transaction state implies that upon forwarding a request, its Hop-by-Hop Identifier is saved; the field is replaced with a locally unique identifier, which is restored to its original value when the corresponding answer is received.

Received answers that do not match a known Hop-by-Hop Identifier are ignored by the Diameter agent. In case of redirecting agents, the Hop-by-Hop Identifier is maintained in the header as the Diameter agent responds with an answer message. The End-to-End Identifier is an unsigned bit integer field in network byte order that is used to detect duplicate messages along with the combination of the Origin-Host AVP.

  1907FP MANUAL PDF

When creating a request, the End-to-End Identifier is set to a locally unique value.

Diameter Credit-Control Application – Wikipedia

The End-to-End Identifier is not modified by Diameter agents of any kind, and the same value in the corresponding diaeter is used in the answer. When set the AVP Code belongs to the specific vendor code address space. If an AVP with the ” M ” bit set is received by a Diameter client, server, proxy, or translation agent and either the AVP or its value is unrecognized, the message must be rejected.

Diameter Relay and diametter agents must not reject messages with unrecognized AVPs.

The RFC defines a core state machine for maintaining connections between peers and processing messages. This is part of the basic protocol functionality and all stacks should support it and as such abstract from the connectivity related operations. Additionally, application specific state machines can be introduced either later or at a higher abstraction layer.

The RFC defines an duameter and an accounting state machine. After that the transport connection can be disconnected.

Obsolete RFCs are indicated with strikethrough text. From Wikipedia, dfc free encyclopedia. This section needs expansion. You can help by adding to it. Retrieved 30 April Archived from the original on 4 July Retrieved 12 October Retrieved from ” https: Internet Standards Application layer protocols Computer access control protocols Authentication protocols.

Views Read Edit View history.

This page was last edited on 19 Octoberat By using this site, you agree to the Terms of Use and Privacy Policy.