Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

One NDS - 8

Download as pdf or txt
Download as pdf or txt
You are on page 1of 92

One-NDS

Version 8.0

Product Description

Confidential

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 1 (92)


Issue 5.0
One-NDS

The information in this document is subject to change without notice and describes only the product
defined in the introduction of this documentation. This documentation is intended for the use of Nokia
Siemens Networks customers only for the purposes of the agreement under which the document is
submitted, and no part of it may be used, reproduced, modified or transmitted in any form or means
without the prior written permission of Nokia Siemens Networks. The documentation has been prepared
to be used by professional and properly trained personnel, and the customer assumes full responsibility
when using it. Nokia Siemens Networks welcomes customer comments as part of the process of
continuous development and improvement of the documentation.
The information or statements given in this documentation concerning the suitability, capacity, or
performance of the mentioned hardware or software products are given “as is” and all liability arising in
connection with such hardware or software products shall be defined conclusively and finally in a
separate agreement between Nokia Siemens Networks and the customer. However, Nokia Siemens
Networks has made all reasonable efforts to ensure that the instructions contained in the document are
adequate and free of material errors and omissions. Nokia Siemens Networks will, if deemed necessary
by Nokia Siemens Networks, explain issues which may not be covered by the document.
Nokia Siemens Networks will correct errors in this documentation as soon as possible. IN NO EVENT
WILL NOKIA SIEMENS NETWORKS BE LIABLE FOR ERRORS IN THIS DOCUMENTATION OR FOR
ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR
CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO LOSS OF PROFIT,
REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR DATA,THAT MAY ARISE
FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN IT.
This documentation and the product it describes are considered protected by copyrights and other
intellectual property rights according to the applicable laws.
The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark of Nokia
Corporation. Siemens is a registered trademark of Siemens AG.
Other product names mentioned in this document may be trademarks of their respective owners, and
they are mentioned for identification purposes only.
Portions of this solution are provided under licence from Orange Personal Communication Services
Limited and from Apertio Limited.
Copyright © Nokia Siemens Networks 2010. All rights reserved.

2 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Contents

Contents

1 Overview ..........................................................................................................................7

2 Product Positioning and Vision .....................................................................................9


2.1 Solution Strengths.............................................................................................................9
2.1.1 Vision and Market Requirement ........................................................................................9
2.1.2 Positioning of a Common Subscriber Directory...............................................................11
2.2 Benefits of One-NDS.......................................................................................................11
2.2.1 Unified High Availability, Reliability and Resilience .........................................................11
2.2.2 Rapid Data Access..........................................................................................................12
2.2.3 High Scalability and Extensibility.....................................................................................12
2.2.4 Less Hardware Required ................................................................................................12
2.2.5 Flexible and Open System ..............................................................................................12
2.2.6 Reduced Provisioning and Maintenance Costs...............................................................13
2.2.7 Additional Revenue Potential ..........................................................................................13

3 One-NDS Architecture ..................................................................................................15


3.1 General Characteristics...................................................................................................15
3.2 One-NDS: an LDAP/X.500 Directory...............................................................................16
3.2.1 Directory Information Model: X.500 Concepts.................................................................16
3.2.2 Directory Information Model X.500 for One-NDS ............................................................17
3.3 Structural Components ...................................................................................................20
3.3.1 One-NDS 8.0 Architecture...............................................................................................21
3.3.2 One-NDS Directory (NDS) ..............................................................................................21
3.3.3 Provisioning Gateway (PGW)..........................................................................................25
3.3.4 Notification Manager .......................................................................................................25
3.3.5 One-NDS Administrator (ADM) .......................................................................................26
3.3.6 Install Server (INS)..........................................................................................................26
3.3.7 System Monitor (SM) ......................................................................................................26
3.4 One-NDS Interfaces........................................................................................................27
3.4.1 Notification Distribution Interface.....................................................................................28
3.4.2 SPML Provisioning Interface ...........................................................................................28
3.4.3 One-NDS Administrator Interfaces..................................................................................28
3.4.4 System Monitor Interfaces...............................................................................................28
3.5 Communication Infrastructure .........................................................................................30
3.5.1 Local-Site Network ..........................................................................................................30
3.5.2 Inter-Site Network ...........................................................................................................30

4 Directory-based Transactions......................................................................................31

5 Triggering and Notification ..........................................................................................33


5.1 Triggering ........................................................................................................................33
5.1.1 Data-driven Triggering ....................................................................................................33
5.2 Notification Manager (NTF) .............................................................................................35

6 Schema ..........................................................................................................................39
6.1 Directory Schema............................................................................................................39
6.2 Common Data Model (CDM)...........................................................................................40
6.2.1 Data Schema ..................................................................................................................41
6.3 Schema Adaptation.........................................................................................................42
6.4 User Adaptation ..............................................................................................................43

7 Security ..........................................................................................................................45
7.1 Access Control ................................................................................................................45
7.2 Transport Layer Security (TLS) .......................................................................................46

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 3 (92)


Issue 5.0 Confidential
One-NDS

8 Data Consistency.......................................................................................................... 47
8.1 Overview......................................................................................................................... 47
8.2 Synchronisation .............................................................................................................. 47
8.3 Replication ...................................................................................................................... 48
8.4 Reconciliation ................................................................................................................. 49
8.5 Chaining.......................................................................................................................... 49
8.6 Journals .......................................................................................................................... 50
8.7 Database Back-up and Restore...................................................................................... 51
8.7.1 Backup............................................................................................................................ 51
8.7.2 Restore ........................................................................................................................... 51

9 Overload Protection ..................................................................................................... 53


9.1 Rate Control.................................................................................................................... 53
9.2 Database Quality of Service (QoS)................................................................................. 54

10 Provisioning .................................................................................................................. 55
10.1 Provisioning Gateway ..................................................................................................... 55
10.1.1 PGW Administration ....................................................................................................... 56
10.1.2 PGW Modularisation ....................................................................................................... 56
10.1.3 Provisioning Gateway DSA (PGW-DSA) ........................................................................ 57
10.2 LDAP Interface ............................................................................................................... 58

11 Operation Administration and Maintenance (OAM) ................................................... 59


11.1 One-NDS Administrator (ADM)....................................................................................... 59
11.1.1 One-NDS Setup Management ........................................................................................ 60
11.1.2 Schema Management..................................................................................................... 61
11.1.3 Subscriber Data Management ........................................................................................ 61
11.1.4 LDAP Interface Management.......................................................................................... 62
11.1.5 LDAP User Management ................................................................................................ 62
11.1.6 Provisioning Gateway Management ............................................................................... 63
11.1.7 Notification Manager Management ................................................................................. 63
11.1.8 System Monitor Management ......................................................................................... 64
11.2 System Monitor............................................................................................................... 65
11.2.1 Architecture..................................................................................................................... 66
11.2.2 Aggregation and Filtering................................................................................................ 67
11.3 NSN O&M Systems ........................................................................................................ 67
11.3.1 NSN NetAct .................................................................................................................... 68
11.3.2 NSN @vantage Commander (@com) ............................................................................ 68

12 Hardware ....................................................................................................................... 71
12.1 Sun Netra X42xx............................................................................................................. 71
12.1.1 Sun Netra X4270 ............................................................................................................ 71
12.1.2 Sun Netra X4250 ............................................................................................................ 72
12.1.3 Sun Netra X4200 M2 ...................................................................................................... 73
12.2 Fujitsu Primergy RX200 Sx............................................................................................. 73
12.2.1 Fujitsu-Siemens Primergy RX200 S6 ............................................................................. 74
12.2.2 Fujitsu-Siemens Primergy RX200 S5 ............................................................................. 74
12.3 IBM Blade Center ........................................................................................................... 75
12.3.1 IBM BladeCenter H Chassis ........................................................................................... 75
12.3.2 IBM BladeCenter HT Chassis ......................................................................................... 76
12.3.3 IBM BladeCenter LS 42 .................................................................................................. 77
12.3.4 IBM BladeCenter HS22................................................................................................... 77
12.4 Racks.............................................................................................................................. 77

13 One-NDS Software........................................................................................................ 79
13.1 Extension Packages ....................................................................................................... 79

4 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Contents

14 New Features.................................................................................................................81
14.1 Upgrading from One-NDS 7.1 .........................................................................................81
14.2 Upgrading from C-NTDB 2.0 ...........................................................................................81

References ........................................................................................................................................83

Glossary ........................................................................................................................................85

Abbreviations ........................................................................................................................................89

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 5 (92)


Issue 5.0 Confidential
One-NDS

Summary of changes
Version Description Author Release Date
1.0 Released NSN 01 December 2008
2.0 Released NSN 10 December 2009
3.0 Released NSN 20 April 2010
4.0 Released NSN 27 May 2010
5.0 Released NSN 08 December 2010

Document Conventions

The following typefaces are used throughout this guide:


 The ‘Courier’ typeface is used for directory objects and attributes,
file names and command line code.
 ‘Italics’ are used for emphasis and for cross References.
 This bold typeface is used to represent information you should type in at the
keyboard.

Note: This Note is used to illustrate that you should pay particular attention to its
accompanying information.

Tip: This Tip is used to illustrate “good” or “suggested” practice by noting it as a


“tip”

6 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Overview

1 Overview
One-NDS, specifically designed and created for 2G and 3G telecommunications networks, provides
an open centralised database in compliance with the X.500 and LDAP standards for a data
directory system.
The fundamental aim behind the One-NDS architecture is support for the decoupling of application
logic and data. Subscription and service data located in the directory are made available to all other
applications for query and update on a controlled and secure basis. This separation of the data
from the application and the provision of an open external interface to that data, removes the
problem of platform and application-specific 'closed-data' scenarios prevalent in many network
deployments.
In addition to the directory itself, One-NDS 8.0 provides new opportunities for provisioning and
trigger notification as well as operation, administration and maintenance functions.
With release 8.0, Nokia Siemens Networks is able to bring together the strengths and operationally-
based expertise acquired through the integration of Apertio Ltd in February 2008. Building on the
highly successful (Apertio) One-NDS 7.1 and (NSN) C-NTDB 2.0 releases, One-NDS 8.0 marks a
significant stage in the maturation of this technology which is deployed by operators across the
world.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 7 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

8 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Product Positioning and Vision

2 Product Positioning and Vision

2.1 Solution Strengths

2.1.1 Vision and Market Requirement

User-centricity as a basis for efficient personalized services delivery

The basis for efficient and personalized services delivery is a user-centric approach, which can be
attained by consolidating subscriber data in a common directory.

Consolidation of subscriber data with a common directory

Subscriber data can be consolidated by transitioning from multiple subscriber data repositories to a
common subscriber directory. This contrast may be characterised as follows:
 Current networks:
 Multiple provisioning points
 Multiple subscriber data repositories
 Multiple subscriber data records
 Proprietary interfaces.
 Future network with a common subscriber directory:
 Single provisioning point
 One common repository for all subscriber data
 All application front ends (FEs) operate using the common directory.
Figure 1 shows the transition from multiple repositories to a common subscriber directory.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 9 (92)


Issue 5.0 Confidential
One-NDS

Figure 1: Transition to Common Subscriber Directory

Current Situation: silo networks and silo data

Data Consolidation: Nokia Siemens Networks subscriber management data layer

Evolving towards the Nokia Siemens Networks converged core

10 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Product Positioning and Vision

2.1.2 Positioning of a Common Subscriber Directory


One-NDS is positioned as:
 A future-proof, market-leading and field-proven solution
 One-NDS is a real-time and resilient distributed environment for subscriber data and
application hosting that was created and built for 2G and 3G telecommunications
networks.
 One-NDS provides a resilient, high-performance directory through its distributed and
replicated architecture. This architecture is designed to achieve very high service
availability without requiring expensive, proprietary, fault-tolerant hardware platforms.
 One-NDS is specifically designed to be used as a common subscriber data
repository by multiple data-less applications through the support of open data access
protocols and flexible data modelling.
 A key network component in horizontal user-centric networks
 Providing operators with outstanding benefits:
 Considerable operation expenditure (OPEX) savings potential
 High revenue potential through asset “subscriber data” (new services, service
hosting, identity management)
As One-NDS evolves, these benefits will be enhanced further.

2.2 Benefits of One-NDS


To meet network requirements such as non-stop availability, and to ensure the return on investment
for operators, One-NDS offers the following benefits.

2.2.1 Unified High Availability, Reliability and Resilience


One-NDS is highly resilient because of its distributed and replicated architecture, which is designed
to achieve 100% service availability without requiring expensive, proprietary, fault-tolerant hardware
platforms. Vital subscriber data is stored with the highest degree of resilience. Geographic
redundancy is a key feature of the directory architecture. Failover for server outages is fast,
automated, requires no operator intervention, and guarantees the highly efficient re-activation of
backend DSAs (BE-DSAs) by fully automatic re-synchronization from redundant peers. For a
failover, data integrity is guaranteed and redundancy measures ensure uninterrupted data
availability.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 11 (92)


Issue 5.0 Confidential
One-NDS

2.2.2 Rapid Data Access


Directories enable fast location of data when the values of the index fields are known (as is typically
the case for network services). One-NDS provides real-time data exchange with applications and
services, which speeds up activation phases and simplifies data synchronization.
One-NDS uses completely in-memory data storage. One-NDS is optimized for very high
transactional throughput and very low database latency.

2.2.3 High Scalability and Extensibility


The introduction of a centralized subscriber directory significantly improves scalability. Dynamic
capacity (call processing load) and static capacity (subscriber and service data stored in the
common database) can be independently scaled. This enables the central directory to grow
independently. The ability to store and access a massive amount of data without compromising
performance makes it possible to develop much more powerful solutions than is possible with
traditional technologies. One-NDS is scalable on a step-by-step basis.
Scalability is achieved by means of the loose-coupling of parallel One-NDS clusters. Platform
clustering, real-time data mirroring, and data distribution are supported for resiliency and scalability.
One-NDS is open and flexible with regard to data distribution. Data can be re-organized without any
restrictions.

2.2.4 Less Hardware Required


Due to the performance and scalability of the One-NDS system, several application servers can use
the common directory simultaneously. This leads to significant, cost-saving network element
reductions. Because One-NDS uses completely in-memory data storage, a smaller initial
investment and a smaller footprint are required. One-NDS is optimized for very high transactional
throughput and very low database latency. The new binary tree directory data view enables fast
and flexible modifications.

2.2.5 Flexible and Open System


Because the One-NDS Directory architecture is based on the ITU-T X.500 standard, it is highly
extensible by the inclusion of network and customer directories residing on other systems and
networks. In addition, because LDAP is a widely-adopted Internet technology, it also enables
straightforward integration of One-NDS with existing back-office platforms for subscriber
provisioning and other offline management activities.
The open and standardized interface between One-NDS and data-less applications makes it easy
to integrate applications and development activities. Support for LDAP enables straightforward
integration with other systems and therefore a fast introduction of services.
Due to the implementation of open standards and simple transfer mechanisms (usually HTTP), fast
and cost-efficient integration of One-NDS as the data source for other applications is supported.
A common provisioning interface provides a single point of access and a coherent view of
provisioning tasks for all subscriber and service-related data. Using standard-based technologies,

12 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Product Positioning and Vision

provisioning interfaces can be adapted quickly and at low cost to new service and data
requirements.

2.2.6 Reduced Provisioning and Maintenance Costs


One-NDS also provides customized management interfaces that offer a single-system view of the
distributed architecture. The common database approach simplifies the task of managing data,
eliminates the necessity for data duplication, and avoids data inconsistencies. One-NDS also
supports automated platform backup and recovery as well as re-synchronization routines, all of
which make the system largely self-sufficient.
The use of SPML-based standards reduces the effort required from a centralized system
management because data can be transferred over HTTP or FTP.

2.2.7 Additional Revenue Potential


One-NDS also provides additional revenue potential by storing one of an operator’s most valuable
assets, subscriber data. Through the management of asset subscriber data, operators can
generate revenue by supporting, for example, service hosting, identity management, and many
other new services.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 13 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

14 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

3 One-NDS Architecture

3.1 General Characteristics


One-NDS provides a well-managed, distributed subscriber data directory and single point of
provisioning with telecommunications-environment-grade performance for network applications.
One-NDS uses in-memory data storage and is optimized for very high transactional throughput and
very low database latency.
One-NDS stores subscriber, service, network, and application configuration data. Subscription and
service data located within the directory is made available for the queries and updates of all
applications on a controlled and secure basis. The separation of data from application, the
provisioning of an open external interface to this data, and the extensibility of the data model lead to
rapid development in service innovations, reduced effort in application integration, and significantly
improved resilience and scalability.
One-NDS resilience is achieved by means of its distributed and replicated architecture, which is
designed to achieve 100% service availability without requiring expensive, proprietary, fault-tolerant
hardware platforms. The One-NDS solution is supported on SuSe Linux and can be deployed on a
wide range of cost-effective commodity hardware platforms.
Transactional scalability is achieved through the loose-coupling of parallel directory server clusters.
Platform clustering, real-time data mirroring and data distribution are supported for resiliency and
scalability. One-NDS also supports automated platform backup and recovery as well as re-
synchronization routines, all of which make the system largely self-sufficient.
To implement the common data storage available with One-NDS, a directory representation is used
as the preferred structure to arrange the information in compliance with the ITU-T X.500 series of
recommendations. Directories provide an extremely versatile means of organizing information and
are highly suitable for modelling the typically hierarchical relationships between data objects in the
real world. X.500 also provides a well-defined set of standards to support the distribution and
management of information. Storage capacity is unlimited, and database performance is not
affected by increases in data volume.
The data structures of the directory can be dynamically expanded, changed, and managed while
the system is running to facilitate always-on service. Different users and applications are granted
specific access rights, and can each have different views of the data to meet their specific needs.
Multiple application clients (for example, data-less application front ends (FEs)) build up a
distributed subscriber data repository. This is implemented by distributed access through any
application FE server to all subscriptions (subscriber data) stored in One-NDS. Each application FE
server connects to the One-NDS database for data access and update notifications. Update
notifications are particularly relevant for the application FE when, for example, provisioning tasks

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 15 (92)


Issue 5.0 Confidential
One-NDS

modify subscriber profile data that needs to be forwarded to the connected session controller (for
example, SGSNs in a mobile core network environment).

3.2 One-NDS: an LDAP/X.500 Directory


Directories provide an extremely versatile way of organizing information and are highly appropriate
for modelling the typical hierarchical relationships between data objects in the real world. For One-
NDS, a standard X.500 directory has been selected, in accordance with the International
Telecommunication Union’s X.500 series of recommendations, as the preferred structure for
arranging the information within the database.

3.2.1 Directory Information Model: X.500 Concepts


X.500 is a well-defined set of standards used to support the distribution and management of
information. These standards enable implementations that effectively provide unlimited data
storage capacity and at the same time ensure that database performance does not decrease when
the data volume increases.
The X.500 model formally specifies a database schema that is independent of a specific installation
and is therefore fully extensible and independent of the users of the directory, such as the
application FEs.
This formal specification of the schema also covers mapping, which enables alternate views of the
data to be provided (schema adaptation).
The schema adaptation comprises:
 Hierarchy mapping, which enables alternative hierarchies to be represented
 Value mapping, which enable different representations of the same underlying data (see
below)
The X.500 directory standard has the following benefits:
 Rapid data access
The directories make it possible to quickly locate information when the values of the index
fields are known (as is typically the case for network services).
 Scalability
The ability to store and access a massive amount of data without compromising
performance makes it possible to develop much more powerful solutions than is possible
with traditional technologies.
 Open standards
X.500 defines an open standard protocol for data access, DAP. A simplified version of DAP,
LDAP, defined by the Internet Engineering Task Force, is a widely adopted standard. The
support of these standard protocols enables the straightforward integration with other
systems.
The data model can be extended without interrupting the service to existing users. The impact of
moving or removing directory objects, which are used by application FEs, can be mitigated. This is
implemented by defining aliases or schema adaptations that create the view of the data required by
the application FE.

16 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

3.2.2 Directory Information Model X.500 for One-NDS


The primary function of One-NDS is to store data objects referenced by the overall directory. The
hierarchical relationships between these objects are also maintained within the database so that
standard directory access services can be used to name, locate, and manage the objects.
The directory information model consists of a set of named collections of information, called entries.

Directory Schema

Figure 2 shows the Directory Schema.

Figure 2: Directory Schema

Entries are arranged in a tree structure, the directory information tree (DIT). This facilitates data:
 Distribution
 Management
 Naming
 Locating
The tree structure models the hierarchical relationships of the real-world objects. The tree structure
is maintained within the database in such a manner that standard directory access services can be
used to name, locate, and manage the objects.
Directory entry data values and object names (keys):
 Data values
Directory entries consist of a set of attributes. Each attribute consists of:
 A type (equivalent to a syntax in LDAP) that classifies the information represented by
the attribute
 One or more values
The definition of an attribute type includes a unique identifier and the ASN.1 (abstract syntax
notation one) to which all values of the attribute must conform.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 17 (92)


Issue 5.0 Confidential
One-NDS

 Object names (keys)


An object has a unique name, its distinguished name (DN) that identifies the object and its
content. The name can be considered as the primary key for the object.
The access to an object using its DN is indexed. The real-time performance of One-NDS is
achieved through this indexing procedure.
An alias object is a special type of object that points to another real object in the hierarchy.
Aliases can be used to support multiple keying for the same underlying data. This name
indirection does not affect performance. Accessing by the alias is as fast as accessing by
the real name, provided that the real object is local. Aliases make it possible for entries to be
referenced across multiple distributed systems.
The subscriber-related data, which is used to provide telecommunication services, is one
example of a data type that can be stored.
The directory schema is a set of rules for the structure of the DIT, how entries can be
named, the information that an entry can hold, the attributes used to represent this
information, and their organization into hierarchies to facilitate the search and retrieval of the
information. This is shown in Figure 3.

Figure 3: Directory Schema and Rules for the DIT Structure

The entire directory, which was originally conceived to extend to cover all organizations in the
world, is partitioned or distributed into logical regions. The directory service for each region is
provided by a logical directory system agent (DSA), each of which typically contains a collection of
related objects within a single organization. Each DSA of the directory maps to a set, or cluster, of
physical directory servers (DS).
The ability to distribute the directory is essential to ensure the scalability of the implementation. The
DSAs interoperate to implement the overall directory. A user or application FE of the directory
(directory user agent - DUA) is typically assigned to a particular DSA but it can transparently access
any entity in the entire directory over this point of access.

18 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

Data Model

The modelling of the DIT is based on a general structure that can encompass all the subscriber-
related profile data of a service/network provider and can therefore service multiple-application FEs.
The DIT also enables real-time access to data as required for the subscriber data repository.
Although Nokia Siemens Networks provides a default common data model for use with NSN
applications, the data model can be customer or project-specific, meaning that it depends on the
project. Nokia Siemens Networks recommends user-centric data models and, as the world market
leader, also follows this structure. In the following, two possible data models are described.
The first data model is structured as follows:
 Subscriber tree (subscriber-related)
The subscriber tree represents permanent subscriber data and subscriber-specific service
data. The general structure of a subscriber in a One-NDS subscriber tree is based on a
multiple subscriber identifiers in which all object classes are referred to at least once. Other
types of subscribers can also be derived from this DIT.
 Service tree (non-subscriber-related)
The service tree represents common service data with infrequent changes, which are
usually identical for groups of subscribers.
Because the service tree data is subscriber-independent, the data must be stored in the
directory separately from the subscriber tree (that is, on the Routing DSA, because it does
not contain a large amount of data) and referenced from the subscriber entry when needed.
This avoids unnecessary redundancies in the data model and simplifies administrative tasks
(for example, when changing the general characteristics of a service using the PGW).
The second data model is structured as follows:
 Subscriber data (with service data)
The subscriber data segment sub-tree can be subdivided into bearer services (which contain
the underlying IP service needed for services), subscriber services (which contain service-
specific configuration for a particular subscriber), primary device (which contains a reference
to the subscriber’s device in the device sub-tree), sub-account (which contains sub-accounts
administered and owned by this subscriber), and so on.
 Device data
A device data segment sub-tree can contain all devices registered in the network (for
example, devices for 3G and 4G interfaces).

Standard Support

One-NDS is based on the X.500 (2005) series of recommendations. More specific details are
available in [5].
One-NDS is based on LDAPv3 as defined by RFCs 4510-4519 (which replaced RFCs 2251-56,
2829-30 and 3377 in 2006). More specific details are available in [6].

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 19 (92)


Issue 5.0 Confidential
One-NDS

3.3 Structural Components


The primary task of One-NDS is to serve application FEs in accessing common customer
subscriber data.
One-NDS 8.0 software deliverables are separated logically and physically into:
 One-NDS core medium which contains only the base software, independent of any
supported application.
 Application extension packages which may contain application and/or customer specific
components relating to PGW modularisation. These are delivered by the responsible
application/customer owner.

Figure 4: Overview of One-NDS Components

NT HLR FE IMS HSS FE One-AAA FE DX HLRe FE One-EIR FE App#1 FE

NSN application FEs 3rd party application FEs

LDAP

LDAP Provisioning Gateway


@Com
LDAP

NetAct System
Monitor Routing DSAs SOAP

PGW-DSA SOAP
Notification
Manager

Install
Server
BE DSAs
One-NDS

Administrator

20 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

One-NDS components (business function) consist of:


 Directory services: the core of One-NDS. The overall design criteria are meant to provide
access performance that is comparable to local disk access for any application FE, carrier-
grade performance and availability, and flexible data access for the service delivery
applications.
 Provisioning: describes how data can be managed in the directory based on commands
presented by an external entity, such as a provisioning sub-system.
 Directory management: consists of functions specific to the operation of a common
subscriber data repository.
 Operation and administration management: One-NDS is designed to reduce operator effort
by providing management functions to support rapid, error-free handling of updates,
upgrades, and failures of individual components, while continually maintaining end-user
services.
The logical architecture and implementation of One-NDS is designed to provide access to data
within an interval ranging from a single millisecond to tens of milliseconds. One-NDS is designed to
provide this level of service even when operating with several component outages. The data
structures of the directory can be dynamically added, changed, and managed during runtime.
Different users and application FEs are granted specific access rights, so that each of them can
have different views of the data as required.
For data access, the IETF (Internet Engineering Task Force) LDAP (lightweight directory access
protocol) are used.

3.3.1 One-NDS 8.0 Architecture


The main components of One-NDS are:
 The core One-NDS directory system agents (DSA) of which there are two types, namely
 Routing DSAs (former also known as front-end DSAs (FE-DSAs))
 Back-End DSAs (BE-DSA)
 Notification Manager (NTF)
 Provisioning Gateway (PGW)
 One-NDS Administrator (ADM)
 Install Server (INS)
 System Monitor (SM)

3.3.2 One-NDS Directory (NDS)


The distributed database is built up of a number of DSAs each of which consists of several directory
servers (DS). In a DSA, one DS is the primary server and the others are secondary servers. All DSs
in a DSA store the same data. Modifications of this data (for example, adding a new subscriber
object or changing the location information of a subscriber) are performed on the primary server.
The data of the secondary servers is synchronized by a replication mechanism. Read operations to
the directory can be performed by the primary and the secondary servers. The DSs store the data
in One-NDS’s in-memory database. The data is written to the local disk only for back-up operations.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 21 (92)


Issue 5.0 Confidential
One-NDS

A typical DSA configuration has three directory servers (a DS triplet), but configurations with more
or less are also supported. Three directory servers are sufficient to meet high availability
requirements although more may be required to meet certain performance requirements. For
geographic redundancy, the directory servers of a DSA are installed at different sites.
The directory consists of the following logical components:
 Routing DSA
 Holds subscriber data location information
 Works as X.500 relay server
 N-server in cluster (read replica)
 Scales with number of servers (mostly read traffic)
 BE-DSA
 Holds subscriber information
 Segmentation and scaling via multiple clusters
 Multiple servers in a cluster for redundancy and read performance
 Triplet: primary server and secondary servers
 Synchronous update in the cluster (two phase commit)

Routing DSA Cluster

The Routing DSA cluster is essential for database access. It contains information about the
segmentation and the distribution of the database content. For application FEs activity carried out
over the PGW (such as provisioning tasks and SIM card management tasks), the Routing DSA
cluster acts as a central entry point into the database. The cluster resolves key information provided
by the application FE and automatically routes database requests towards the appropriate BE-DSA.
The Routing DSA stores access keys and references to database entries (subscriber profile data).
It only retains the information required to route LDAP requests to the BE-DSAs and subscriber-
independent common service data in the service tree (see section 3.2). The number of Routing DSs
in a Routing DSA cluster depends on the total amount of data stored in the BE-DSAs, the access
frequency (dynamic performance), and the redundancy requirements. To ensure persistence and
redundancy, at least three Routing DSs must be used. Each Routing DS contains identical data.
This means that One-NDS only contains one Routing DSA cluster with the appropriate number of
single DSs.
To read and update subscriber data, the application FE server uses LDAP. The application FE
server does not know where the data of a particular subscriber is located. A read/update request
can be sent towards any of the Routing DSs. The Routing DSA knows the location of the subscriber
data (from the key information in the read/update request) and act as an X.500 relay server. This
way, the application FE server remains free of subscriber data location information. Some common
service data is cached in the application FE servers to avoid unnecessary access to almost
constant service data definitions for every subscriber read operation. These caches are
automatically aligned with the actual database contents whenever needed.

Back-End DSA Clusters

BE-DSA clusters are the part of the directory that contains the actual data content representing all
subscriber profile data for all network services. Each BE-DSA represents a logical construction that
stores subscriber profile data, that is, a portion of the total number of the served subscribers.
Depending on the traffic model of a specific network, the data for a much higher number of
subscribers can be stored in a single BE-DSA.

22 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

Subscriber profile data is stored in BE-DSA clusters in the form of a directory information tree (DIT),
based on a specified data model. The DIT data model consists of a general structure that
encompasses all of the subscriber profile data of a service/network provider. It can therefore
efficiently service all combinations of multi-application FEs. The subscriber profile data model also
takes real-time data access into consideration. The subscriber profile data stored on a single BE-
DSA can thus be considered as a sub-tree of the DIT, the so-called subscriber tree (see section
3.2). The subscriber profile data stored on all of the BE-DSAs represents the entirety of the DIT
available at that particular time.
The appropriate subscriber profile data can be read and updated through the requests that the BE-
DSAs receives from the application FEs over the Routing DSA cluster. The data requested in read
requests is then forwarded over the Routing DSA cluster to the requesting application FEs.

System Architecture

To meet the demanding performance requirements implicit in providing telecommunications


services, the directory service maintains all data in memory storage for the fastest possible access.
This data comprises the attribute values, the tree structure, and indexes to support fast random
access.
For availability reasons (since memory is a volatile storage medium), each DSA is actually realised
by a number of synchronised physical directory servers. Each server within a DSA has an identical
copy of the data which represents the portion of the directory held by that DSA.
Thus the directory is held by multiple clusters of multiple servers, as represented in Figure 5. This
dual-layered approach provides the exceptional scalability and resilience of the NSN solution.

Figure 5: Directory Data Distribution and Replication

The directory service as defined by the X.500 standard allows that any DUA may request service
from any DSA and that the initial DSA will relay the request via its links to neighbours such that the
request will arrive at the DSA hosting the object on which the operation is requested. This can
mean a request traversing multiple hops in the DIT until the correct DSA is located.
NDS implements a more robust and scalable solution while remaining within the bounds of the
X.500 and LDAP standards. A Routing DSA is configured for an application and holds a minimal
object (with no data) for each subscriber in the directory. This Routing DSA contains enough
directory information to be able to optimally route requests to the correct data Back End (BE) DSA

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 23 (92)


Issue 5.0 Confidential
One-NDS

(through the X.500 subordinate references maintained by the DSA) and without any traversal of the
DIT. These references are also automatically maintained by the directory implementation, so
removing the need for mapping tables.

Figure 6: Mapping the Directory Structure to Physical Implementation

Logical /
Directory
Plane The Directory
(DIB)
Directory Region
(DSA)

Physical / Data
Plane
DS Node

DS Cluster

Each logical region (DSA) of the directory maps onto a set, or cluster, of physical servers executing
the directory service application (as shown in Figure 6). Each server in a cluster holds an identical
copy of the data contained within the DSA as any or all servers within the cluster may be used to
process read and update requests from external users (DUAs) of the directory.
The synchronization of the databases in each server of a cluster is handled by a proprietary
directory service mechanism. This employs a two-phase commit strategy to ensure that an update
operation is synchronously replicated to all servers before the requestor is notified of the completion
of the request. Since the protocol used to support this replication uses TCP/IP as a transport, the
constituent servers can be deployed on disparate geographical sites (as indicated by the colour
coding above). The ability to distribute components in this way ensures that the service provided by
the directory is not only fault-tolerant, but is also geographically resilient (so an entire site may be
lost without service outage).
The most appropriate number of servers to be used within a cluster is a deployment issue and
depends on a number of factors, including:
 Redundancy Requirements: NDS implements a load-sharing (N+k) redundancy policy,
where “N” is the number of servers necessary to handle the maximum load of the cluster
and “k” is the number of redundant servers desired by the operator. For example: an “N+1”
implementation would allow the continued operation of service in the event that one of the
constituent servers was unavailable for whatever reason (hardware failure, planned
maintenance, software upgrade, etc.).
 Traffic Model: The data access load for the data within the DSA affects the profile of this
traffic (for example: the ratio of read to update operations). Data which is subject to a large
number of read requests but few updates (such as a number portability database) may be
hosted in a DSA with a large number of servers if required. Highly volatile data (for example:
prepaid balances, current VLR location) is more appropriately implemented on DSAs with
fewer servers.
 Server Type: The type of hardware (amount of memory, speed of processor, etc.) is a factor
in designing the distributed system.

24 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

 Available Sites: The number of suitable sites owned by the operator and the quality of
facilities available (such as data communications infrastructure).
The use of multiple replicas, together with the partitioning options inherent in the distribution
facilities, allows massive scalability in many dimensions.
At any time, one of the servers in the cluster, referred to as the primary, is responsible for handling
the update, and then replicating it to all the other servers in the cluster (secondary servers). If the
primary fails, one of the remaining secondary servers will assume the primary role. Any of the
servers can act in the primary role when required.
As all redundant sites provide the same functionality, the system operates in a load sharing
configuration. In particular, updates to the data store in NDS can be made via any site.

3.3.3 Provisioning Gateway (PGW)


Provisioning describes the process by which subscribers, services, and other directory data can be
managed in the database based on commands provided by an external entity, such as a
provisioning subsystem. PGW provides a flexible, standards-based approach that enables the
integration of an operator’s existing provisioning engines as well as new application FEs that use
One-NDS as a common repository. Transactions from the Customer Relationship Management
(CRM)/Customer Care Center (CCC) systems are forwarded to PGW, processed there, and then
forwarded to NDS. Optionally, the transactions can also be transferred between the PGW server
and the CRM/CCC.
The CRM/CCC uses the SPML provisioning interfaces of PGW to provide subscriber profile data.
The CRM/CCC sends subscriber profile data by using the SPML provisioning interface over
SOAP/HTTP. However, the CRM/CCC sends bulk files containing the SPML document (e.g., for
SIM card management) over the other SPML interface using secure FTP (sFTP).
PGW modularization extends the existing plug-in that defines the provisioning interface with
extensions as new applications are ported to One-NDS allowing the operator to port applications to
One-NDS faster, requiring less regression testing with a clear separation of application modules.
The data model is no longer an integral part of the core release and allows for the use of a
common data model for NSN applications
Application extension packages are distinct from core One-NDS and contain a number of
discrete application and/or customer specific components such as application-specific data model
sub-trees, PGW modules, application trigger definitions etc.
PGW stores its configuration data within the Provisioning Gateway DSA (PGW DSA) which is
typically co-hosted on the same server as the Notification Manager.

3.3.4 Notification Manager


NTF is a central component for distributing notifications between One-NDS components and
between One-NDS and applications. It is the only point of contact for external network components
to request and receive notifications from One-NDS. Based on a SOAP server, NTF supports point-
to-point and point-multipoint communication. Network components/application FEs are registered or
configured on the NTF. NTF stores the registration information from different application FEs in
NDS.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 25 (92)


Issue 5.0 Confidential
One-NDS

3.3.5 One-NDS Administrator (ADM)


ADM is the dedicated management component of One-NDS. Several database management
functions are performed by ADM rather than any external OAM system.
Over ADM, authenticated clients and authorized users can perform tasks in the directory itself. The
tasks include relocating subscribers from one BE-DSA to another, monitoring subscriber profile
data storage, schema management, checking data consistency, and administrating new DSAs.

3.3.6 Install Server (INS)


INS handles the custom installation for an operator’s network. It supports parallel installation of
"local site" nodes. INS handles the software update of a component allowing:
 Verify new software before committing the update
 Fallback to previous software version in case of trouble with new software
 Verify the operational status of One-NDS to allow update only in status secondary
synchronized
 Verification of installation based on installed components
INS is controlled remotely. Only SSH access to INS is needed.

3.3.7 System Monitor (SM)


System Monitor provides an interface to Network Management Systems (NMS) for fault and
performance management. The main functions are:
 to collect monitoring data from all geographically distributed servers of One-NDS
 to apply specialised aggregation and filtering to create an aggregate system view of the
information it has collected
 to make the resulting alarms and performance data available to the NMS.
By default, System Monitor will integrate to NSN’s NetAct. It also offers standard interfaces that can
be integrated to a third party NMS. System Monitor is not used with @Com (see section 11.2).
System Monitor cannot act as a substitute for an Element or Network Management System. It has
no GUI to display the alarms and statistics that it provides to the NMS.

26 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

Figure 7: System Monitor Interface

NetAct
or NMS

System
Monitor

One-NDS Servers

One-NDS

3.4 One-NDS Interfaces


This section describes the main external interfaces of the component parts of One-NDS.
 LDAP interface: used for read-only and update requests to the subscriber data repository.
 Notification distribution interface: used for triggers and notifications, as well as read-only and
update requests.
 SPML provisioning interface: used for subscriber profile management.
 OAM interfaces for managing the One-NDS LDAP interface
The LDAP interface is the interface between NDS and application FE servers and is used for read-
only and update requests.
Over the LDAP interface, read-only and update requests are received by the Routing DSA directly
from the application FEs. The Routing DSA forwards these requests to specific BE-DSAs. For read-
only requests, responses containing the required information are sent by the BE-DSAs over the
Routing DSs to the relevant application FEs. After updates have been successfully performed in the
BE-DSAs at all sites, corresponding responses are sent over this interface to the application FEs.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 27 (92)


Issue 5.0 Confidential
One-NDS

3.4.1 Notification Distribution Interface


The notification distribution interface is a SOAP-based interface between NTF and application FE
servers, routing/BE-DSA or PGW. It is used for triggers, notifications, and read-only and update
requests.
Over the notification distribution interface, registration requests are received from the application
FEs and forwarded as application FE registration information to the Routing DSA. Furthermore, the
NTF can send trigger configuration messages to the Routing DSAs. In the opposite direction, NTF
receives trigger messages from the routing DSAs that are sent to the application FEs and to the
PGW.

3.4.2 SPML Provisioning Interface


The SPML provisioning interface is the interface between the PGW and CRM/CCC and is used for
subscriber profile management.
Subscriber profile data is administered using this SOAP-based SPML provisioning interface over
HTTP. Bulk files (for example, for SIM card management) or a selected set of subscriber profiles
are entered over this interface. For this purpose, this SPML provisioning interface is based on
sFTP.

3.4.3 One-NDS Administrator Interfaces


ADM interfaces with the following components:
 OAM/NEM using HTTPS, SSH, SNMP, UDP and sFTP
 NDS and database-related OAM with LDIF/SSH
 INS and a B&R server using FTP

3.4.4 System Monitor Interfaces

Fault Management Interface

The Fault Management (FM) interface provides the aggregate alarms for the whole monitored
system as shown in Figure 8. It supports the north-bound protocol:
 NE3S (SOAP) for integration to NetAct
 SNMP v2c for integration to another NMS.
The alarms represent active system conditions. They are raised and cleared according to defined
thresholds, as described above. It is possible to have multiple severities of the same alarm, each
triggered by its own threshold.

28 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Architecture

Figure 8: System Monitor Fault Management Interface

other
NetAct
NMS

System
Monitor

One-NDS Servers

One-NDS

Performance Management Interface

Similarly, the Performance Management (PM) interface provides the aggregate performance data
for the whole monitored system. Statistics are combined from the separate servers into overall
system counters. Counters are also maintained where appropriate for individual server statistics.
Statistic counters accumulate over a reporting period of thirty minutes. At the end of each period,
the counters are written to CSV files and then reset. The files are retained on the SM server.
 For NetAct, the O&M Agent also sends the files over the NE3S interface.
 The NMS is responsible for collecting the files from the SM server when they are available.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 29 (92)


Issue 5.0 Confidential
One-NDS

3.5 Communication Infrastructure


One-NDS requires the following communication infrastructure:
 Local-site network - implemented as an IP local area network (LAN).
 Inter-site network - implemented as an IP wide area network (WAN).

3.5.1 Local-Site Network


The local site network interconnects servers located at the same physical locations. Typically, the
LAN is deployed as a switched Ethernet network.
The LAN provides full path redundancy, that is, at least two independent paths must be available
between any two servers that have direct connections. This includes cabling as well as switches
used in the network.

3.5.2 Inter-Site Network


The inter-site network connects the different sites with each other for database inter-site traffic. This
is deployed as a wide area network (WAN) because the sites are typically deployed approximately
a hundred kilometres apart from one another. A dedicated network between the sites is highly
recommended for exclusive use by One-NDS and application FE servers.
The inter-site network is used for the following purposes:
 One-NDS WAN:
 Database update synchronization for servers belonging to the same Routing/BE-DSA
 Database read traffic if a local Routing/BE-DSA fails
 OAM WAN
 Database re-synchronization after Routing/BE-DSA server failure (makes copy of
backup and journal files)
 Application FE WAN:
 Application FE access to database if an application FE is not deployed locally
 Access to PGW from customer care and operations systems
 Database access to a remote database site if a local database is unavailable.
The WAN provides full path redundancy, that is, at least two independent paths must be available
between any two sites in the system. This includes cabling as well as used switches and routers in
the network.

30 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Directory-based Transactions

4 Directory-based Transactions
Transaction support provides the facility to perform a sequence of isolated LDAP operations across
multiple DSAs that can be applied to the database, or discarded, as a single unit. Transactions do
not affect other operations until they have been committed to the database at the end of the
transaction.
Incoming requests from client applications to the LDAP interface are Start Transaction, Transaction
Update/Read and End Transaction messages. These are responded to by similarly named
response messages. In addition, an Abort Transaction Notice message can be sent to the client
application on the LDAP interface.
The LDAP server handles the specific requirements to these messages relating to their specific
transmission protocol. All requirements that are the same for both transmission protocols are
handled in the transaction layer which handles all administration of transactions.
Updates performed within a transaction are of lower priority than non-transactional updates. If a
non-transactional update modifies an object which has already been modified as part of a
transaction, the transaction will fail in order to allow the non-transactional update to proceed.
Transactional updates which have already been performed are of higher priority than incoming
transactional updates. If a new transactional update attempts to modify an object which has already
been updated by a different transaction, the incoming transaction will be aborted. The transaction is
aborted in its entirety (rather than just that update) to avoid deadlock where two transactions try to
update each other’s objects at the same time.
Non-transactional updates do not last as long as transactional updates, so there is less chance of
them being outstanding on an object when a transactional update arrives. Where this occurs, for
consistency with the rules outlined above, the transaction of the incoming update is aborted.
Transactional updates obtain a lock for each object they update. If they are pre-empted and lose
the lock, the whole transaction will fail cleanly, the updates rolled back and the user notified. There
may be cases where the user does not need to update a particular object, but does rely on its data
not being changed for the duration of the transaction. In this case, the transaction may lock the
object by sending an update to set the requestLock operational attribute. This stops other
transactions from modifying the object and ensures that the transaction is notified if a non-
transactional user modifies the object.
Another use of the requestLock attribute is to implement co-operative sub-tree locking. If all
transactional users agree that before modifying a certain sub-tree, they will lock an agreed object,
probably the root of the sub-tree, they can be sure that for as long as they have this lock, no other
transaction is working within the sub-tree.
For operators upgrading from C-NTDB 2.0, transaction support is no longer provided by PGW-DSA.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 31 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

32 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Triggering and Notification

5 Triggering and Notification

5.1 Triggering
Triggering provides the ability to perform a set of actions when One-NDS detects that a
combination of one or more of the following conditions is true:
 Operation type matches that of the database update
 Object class matches that of the target object of the database update
 Object DN matches the DN of the target object of the database update
 Attribute type/value match values of the target object of the database update
The actions that may be performed are a combination of one or more of the following:
 The delivery of a SOAP message
 The raising of an alarm

5.1.1 Data-driven Triggering


In One-NDS 8.0 triggering provides a data-driven mechanism for providing, as a minimum, the
ability to generate a SOAP message based upon operation type and object class. This reduces the
need for custom plug-in functions to be developed as was the case in One-NDS 7.1. In addition,
this enhanced triggering provides additional data-driven features for triggering under more complex
conditions.
The data-driven triggering requires a higher level of processing than the typical lightweight post-
update trigger; therefore the new functionality is performed independently of the update, such that
update response times are not affected.
Triggering functionality is executed in a parallelised manner to take advantage of modern multi-core
processors. This involves at least one dedicated process which monitors the update stream and
trigger events according to the triggers that have been configured.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 33 (92)


Issue 5.0 Confidential
One-NDS

Figure 9: Trigger Processing

The triggering configuration is constructed from the following elements in order to reduce
duplication:
 A global triggering configuration object containing overload and sizing details.
 Trigger objects containing condition details: a trigger will reference one or more resulting
actions.
 Action objects containing reporting and onward adaptation details: an action may be
referenced by zero or more triggers and may reference zero or more trigger view
extensions.
 Trigger view extension objects specifying source entries and attribute mappings to augment
the reported entry: a trigger view extension may be referenced by zero or more actions.
Trigger, action, and view configuration objects can be provisioned into the system at runtime.
Triggers and actions can be enabled and disabled individually.
Any actions triggered by updates that are part of a transaction will be processed when the
transaction is successfully committed. Specifically, any SOAP output generated by the transaction
is combined into one message body per Notification Manager server.
For operators upgrading from C-NTDB 2.0, triggering is no longer provided by PGW-DSA.

34 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Triggering and Notification

5.2 Notification Manager (NTF)


The primary purpose of NTF is to distribute SOAP notifications, based on event-driven triggers
generated from NDS. In addition, NTF can be used to distribute bulk commands to multiple
application servers.

Trigger Notifications

NDS can generate triggers when entries are modified. NTF enables these triggers to be distributed
readily to multiple applications.
 As it is co-located with PGW-DSA, NTF can multiply triggers to be distributed to several
applications without increasing the load on the directory itself, whilst also guaranteeing
delivery of the notifications.
 Its distribution of notifications is flow-controlled to prevent application overload.
An application with data stored in NDS typically runs on multiple application FE servers. With NTF,
a trigger can either be broadcast to all such servers, or it can be sent just to one of them. In the
latter case, each trigger would be sent to the next server in turn, in a round-robin approach, to
distribute the load over the application’s servers.

Command Distribution

With its central point of provisioning, One-NDS can be expected to receive provisioning commands
that are to be executed by one of its applications. For example, if a subscriber needs to be barred
on a VLR by a local HLR application.
NTF distributes such commands from PGW to an application’s servers in SOAP messages. As
with triggers, a command can be sent to just one application server, with successive commands
being sent to each server in turn.
Although the anticipated use case is in distributing commands from PGW, NTF is also able to
accept such commands from any other application that implements the appropriate SOAP interface.

Figure 10: NFT Command Distribution

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 35 (92)


Issue 5.0 Confidential
One-NDS

Trigger and notification information is held in the registry and stored in NDS. When a trigger is
generated by NDS — or when an application such as PGW sends a command — NTF distributes
the message to each registered application.

Registration

A interested client that uses the NTF for notifications will configure the support for these via the
ADM. The ADM uses trigger definitions which are loaded to the ADM as “trigger definition
templates”. These templates contain the basic trigger definitions and additional placeholders for
the tenant, the receiving client, the application (or LDAP user) and the DSA.
The standard notification information is defined via the ADM. The ADM generates the final trigger
definitions for the One-NDS directory and the subscription data for the NTF by replacing the
variables with values required for the actual deployment. The deployment specific data can be
loaded at installation or entered via the ADM.
The registration information for triggers is stored in the directory, but it is held in memory in the
NTF’s registry for quick access. The registry is populated from the directory at the start-up of the
NTF.

Message Distribution

NTF essentially acts as a hub for SOAP messages. It receives SOAP messages from NDS
(triggers) or applications (commands, e.g. from PGW) and sends them to the intended recipients.
The messages it receives do not contain details of where the messages should be sent. Instead, it
must look up the type of message in its registry to determine the destination(s) according to
configuration and/or subscriptions.

Distribution Modes

Messages can be distributed in two modes: multi-cast and round-robin. In the former, each
message is sent to all servers that have subscribed to the notification. In the latter, a single
message is sent to only one of a group of subscribed servers; each subsequent message of the
same type is sent to the next server in the group in turn.

Guaranteed Delivery

Delivery of messages is guaranteed. Each message is stored in the local file system. It is only
removed when it has been sent to all intended recipients. If NTF fails to deliver the message to a
recipient, the delivery is rolled back and the message is queued again for a subsequent attempt.

Flow-Control

NTF monitors the rate at which it is sending messages to each recipient, for each type of message
and overall. Maximum rates can be set for each measure. When a maximum rate is reached, NTF
throttles the messages so the limit is not exceeded.
Individual NTF servers operate independently. The maximum rates apply to each server and not
for the total set of NTF servers.

36 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Triggering and Notification

Configuration

Configuration of NTF is performed from ADM which controls the configuration data and default
parameters held in NDS. The configuration includes the definitions of triggers and static
notifications that are associated with them. ADM also instructs NTF to reload its configuration from
NDS as needed.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 37 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

38 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Schema

6 Schema

6.1 Directory Schema


The directory schema is a set of rules concerning:
 Structure of the DIT
 Possible ways entries are named
 Information that can be held in an entry
 Attributes used to represent that information
 Attribute organisation into hierarchies to facilitate search and retrieval of information
This formal specification of the schema is a key differentiator between an X.500 directory and a
relational database. It facilitates the separation of data from logic by making it independent of
applications.
The LDAP/X.500 schema is a high level data model, mapping concepts and relationships
independent of any particular installation. For further information, see X.501 [8].
It is fully extensible with no dependencies on users of the directory, such as applications.
In addition, in One-NDS, the data model may be extended without interrupting service to existing
users. The data structures of the directory may be dynamically added, changed and managed while
a system is running to facilitate ‘always-on’ service
The directory schema may be modified, for example, by the addition of new object classes or the
addition of new attributes to existing object classes, with no interruption of service.
Modifications to a live schema might cause problems to existing entries in the directory, and
therefore online changes are limited to those that are ‘safe’:
 New syntaxes can be added
 New attributes can be added
 New object classes can be added
 Existing object classes can be modified to add or remove mandatory or optional attributes
 An existing single-valued attribute can be made multi-valued
 The default value of an existing attribute can be modified
 A new value can be added to an existing enumerated syntax

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 39 (92)


Issue 5.0 Confidential
One-NDS

A command line utility is provided to generate an LDIF file containing the current schema entries.

6.2 Common Data Model (CDM)


Today a multitude of data models exist for different applications and projects. The variety of data
models generates higher efforts regarding planning, co-ordination, development, system
verification, deployment and maintenance of earlier versions of One-NDS.
Some of the deficiencies of current data models concern the usage of LDAP standardized attributes
and object classes because they often do not match the respective application purpose
semantically and syntactically.
Although a number of operators will continue to support their own data model, the introduction of
Nokia Siemens Networks’ CDM satisfies the needs of a multitude of NSN applications and projects
and fulfils the following basic assumptions and requirements:
 “Common” in the sense of common to all applications, i.e. support of different application
clients by one data model
 The CDM is designed to provide information about users, (enabling) services, access
(networks), and devices to applications.
 Flexibility to avoid a multitude of project dependent data model versions
 The data model is easy extensible for new application clients
 Application clients may have their own view on subscriber data.
 Introduction and modification of the CDM does not affect existing network applications (HLR,
HSS), e.g. the structure of the HLR data sub-tree or object class names of the HLR data will
not be subject to change if they are used by an HLR FE for filtering.
 UID is using a generic value which is independent of the IMSI value and can therefore be
modelled independently.
 There is no impact on the usage of adaptation technologies.
The CDM complies with the data modelling principle that as far as possible the data and their
relations shall be modelled connatural to their representation in the real world i.e. considering
common design patterns and approved standards.
The various applications / groups have their own and independent view on the data model and are
served with a tailored set of data. These application driven sets of data are consolidated, i.e. shared
data are identified to avoid redundancy. Data objects are stored only once to avoid potential
inconsistencies.
Primary keys pointing to a specific subscriber are always supposed to be shared between different
applications and modelled accordingly. Replication of data in sub-trees is only allowed for
performance or structural reasons. Consistency of replicated data has to be verified by
Provisioning Gateway (PGW).
The access requirements (type, rate, response time) of the applications are considered (real-time
vs. non-real-time, read vs. write). The application group with the most restrictive access
requirements (network service applications as a rule) affects the subscriber data model most.
The CDM is LDAP-conformant and uses standardized (RFC 4519) LDAP attribute types and object
classes only if they match the respective application purpose semantically and syntactically.
Existing applications, especially HLR FEs, have limitations concerning data model changes of the
current HLR data structure, which have to be considered. Data shared between different
applications have one dedicated master (write permission for CREATE, DELETE, MODIFY

40 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Schema

operations). Clear rules apply if more than one application wants to write shared data (also
MODIFY operations via variants).
Creation and deletion of objects is principally performed by Provisioning Gateway (PGW) only.
Exceptions are explicitly negotiated and specified (e.g. SIMCARD change-over). Variant objects are
explicitly managed by the PGW.
A schema merge has to be done via migration (during live operation) that creates the new object
instances (and corresponding variants if applicable) and deletes the old object instances.

6.2.1 Data Schema


The data schema for the CDM is an evolution of the model used in previous One-NDS 7.1/C-NTDB
2.0 deployments. Most of the legacy structure, attributes, and object classes as already used for
existing and deployed applications remain with the new model. Figure 11 shows the major changes
and enhancements made for the CDM:

Figure 11: CDM Changes and Enhancements

ROOT

Primary Key-Area

DC=MSISDN DC=IMSI DC=IMPU DC=IMPI … O=<tenant> version=<value>

In clarification: change attribute DC to KEY and object class dcObject to cntdbKey

O=COUNTER O=SERVICE cn=ACCESS cn=DEVICE (*)

Performance Counters O=NSS O=BSS (*) New: subtrees for modelling


access network and device centric data
NSS – Network Supporting Services
Service-Area BSS – Business Supporting Services (New) (*) – not yet requested

Renamed: formerly
cn=SUBSCRIBER
sssd=SSSD for modelling
Subscriber-Area subscriber centric data
uid=<value>

New: structure level for subdata=profile subdata=services subdata=relation


subscriber specific data.

Primary Keys and Upper Structure Levels

As shown in Figure 11, the structure level elements for the primary keys (dc=…) have been
replaced. The currently used and standardized (RFC 4519) LDAP attribute and object class for
domain component are not appropriate as they are semantically and syntactically incorrect with
regard to the application purpose of these keys.
The previous structure element ‘sssd=SSSD’ is replaced by ‘cn=SUBSCRIBER’ to be in line with
the new structure elements for access (network) centric data and device centric data introduced at
the same level.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 41 (92)


Issue 5.0 Confidential
One-NDS

New elements are used to structure the subscriber specific data into profile data, service data and
data for mapping the relations between primary keys and its appropriate application specific sub-
tree. This new structure levels replaces the ‘nss=NSS’ element of the legacy model:

6.3 Schema Adaptation


The concept of separating data from applications provides many advantages, but also brings with it
some new issues that must be addressed.
With a silo-based model, each application can define its own data in the format best suited to itself.
The implications of a convergent, centralised data strategy are that each application needs to
conform to an externally defined, common data model. This has potential ramifications for legacy
applications and for migration and onward development of applications.
The highly extensible and flexible X.500 data model makes the directory ideal for providing a
generic data store shared by multiple applications
Schema adaptation allows mappings to provide alternate views of data and provides a means for
applications to access data assuming a different schema to that actually used in the real data
model, and therefore mitigate the type of problems identified above.

Figure 12: Schema Adaptation

One-NDS provides a number of facilities to overcome these types of problems, which include both
standard X.500 features and advanced features.
Relationships model real-life hierarchies and an application may require its own model, hierarchies
and views. Schema adaptations create the data views required by the application. Adaptation or
‘variants’ are a key enabler of multi-application support.
Schema adaptation comprises a number of related functions:
 Aliases and alias hiding
 Variant objects
 Adaptive naming
 Attribute adaptation
 Username adaptation

42 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Schema

6.4 User Adaptation


Username adaptation, a particular instance of One-NDS adaptation technology, is a mechanism to
automatically adjust the name of the ‘user’ performing an operation based on the target object of
the operation in order to provide an alternative level of access. It is not a replacement for access
control but complements the access control mechanism by providing a more efficient way of
assigning specific access rights to a sub-tree.
Username adaptation provides the facility to dynamically switch the effective user for an incoming
application request to a user that provides a different level of access. This dynamic switching is
activated based upon the target data contained within the incoming application request which it is
assumed is logically split into distinct sub-trees within the directory.
Username adaptation must be carefully configured by an administrator in order to ensure that
appropriate access controls are applied in all cases, whether or not username adaptation applies.
This feature may be used by network operators wishing to securely host MVNOs, partners or
company business units (‘tenants’) in a single instance of One-NDS by:
 Limiting or restricting access by the subscribers of one tenant to the logical partitions or sub-
domains of the database assigned to other tenants (hence “multi-tenancy”).
 Providing a mechanism for assigning different levels of access to different parts of the
database on a per user basis based upon the application performing the access.

Figure 13: Secure Multi-tenancy

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 43 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

44 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Security

7 Security

7.1 Access Control


Access control is the mechanism used by the directory server to ensure the client accessing the
directory has authenticated sufficiently and has sufficient permission to perform the requested
operation on the supplied object. It is used for all operations.
If no access control has been specified for an object then the directory will refuse permission for all
operations on that object. Every object must have access explicitly granted. This is usually done at
schema creation time by defining the access requirements to be used for all instances of a specific
object.
One-NDS defines a default user and a set of groups. sdfrun is the default supplied user and is a
member of the superUser group.

Figure 14: Access Control

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 45 (92)


Issue 5.0 Confidential
One-NDS

Users and groups are defined per DSA. Users can be added as required and made members of the
appropriate groups. Group settings are customisable.
Each user can be a member of more than one group.
An NDS server requires the following information in order to make the access control decision:
 Username and authentication level
 Operation being performed
 Access control information (ACI) associated with a target object and its attributes which
includes permissions for each operation.
Access control information which comprises user permissions and ACI building blocks is typically
set up at initial installation. These building blocks can then be referenced when application data is
configured into the database.

7.2 Transport Layer Security (TLS)


One-NDS provides a mechanism for the secure (encrypted) transfer of data between an LDAP
client and the One-NDS LDAP server process over a TCP/IP connection based on the LDAP
Transport Layer Security (TLS) Protocol defined in RFC 2246 which provides compliance with the
1
mandatory requirements of the latest LDAP security recommendations contained in RFC 4513 .
TLS is a cryptographic protocol that provides secure communications over a TCP/IP connection. It
allows client/server applications to communicate in a way that is designed to prevent
eavesdropping, tampering and message forgery.
When LDAP clients wish to communicate with One-NDS, the LDAP bind request is used for
authentication over the TCP/IP connection. For simple authentication, the client must send a
username and plaintext password for verification. Usernames and passwords are passed as plain
text in the LDAP bind request for authentication over a TCP/IP connection. In some networks, this
type of authentication is not secure enough and additional protection is required, often only during
the LDAP bind processing. The benefit of the TLS feature is that it provides a mechanism for
securing the lower level TCP/IP connection using the TLS protocol, such that all LDAP
communication is encrypted.
In summary, the TLS feature provides:
 The ability to establish a secure encryption layer between the TCP/IP and LDAP protocol
layers – the TLS protocol. The encryption layer can be maintained by the client whilst
further LDAP operations are performed, although the cost of encryption/decryption for each
operation must be kept in mind.
 A method for conveying the level of simple authentication obtained by an LDAP user
depending on when the last successful LDAP bind occurred on the TCP/IP connection – ACI
processing takes account of the simple authentication qualifier value for an LDAP user.

1
RFC 4513 references TLS 1.1 as defined in RFC 4346 and is the ‘officially’ recommended version. However, TLS 1.0, as defined
in RFC 2246, apparently remains the de facto standard and almost ubiquitous version currently being used. In addition, the two
main SSL libraries available from OpenSSL and Mozilla, only claim to support TLS 1.0.

46 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Data Consistency

8 Data Consistency

8.1 Overview
NDS has a variety of mechanisms, both standard and non-standard, for ensuring data consistency
between all the data servers in a One-NDS environment. These comprise:
 Synchronisation: gets the database in line with the primary’s database
 Replication: ensures the database on the node remains identical to the primary
 Reconciliation: checks secondary databases are the same as primary and distributed
references are consistent across DSAs
 Chaining: sends requests across multiple DSAs
 Journaling: as part of backup and restore mechanisms

8.2 Synchronisation
Synchronisation is the process by which a NDS server can join or rejoin a live cluster. The NDS
server is started from backup and journal files, and the primary automatically supplies all update
operations made since the last update held in the local journal. Once all historical updates have
been applied, the server is considered synchronised and is available for service.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 47 (92)


Issue 5.0 Confidential
One-NDS

Figure 15: Synchronisation

Synchronization is also used to recover from a temporary communications failure between the
primary and another of the NDS servers in the cluster. This operation is performed automatically, as
soon as the communication link is restored.
There are a number of failures that are automatically detected:
 communications failure to the primary
 update cannot be applied, even though it has been validated by the primary
 database inconsistencies detected by background reconciliation process
 software subsystem failure
Where a detected failure implies that an NDS server is no longer guaranteed to be identical to that
of the primary, the individual NDS server will withdraw its services and attempt to resynchronise.

8.3 Replication
Updates are sent to the primary node. The primary updates itself and sends a replicated update to
other nodes which respond with either success or fail.

Figure 16: Replication

If successful, the primary commits the update to itself, sends a commit to other nodes and sends a
successful response to the user agent.
If there is a failure by many secondary nodes, the commit is not applied, the primary will rollback
the update and a fail message is sent.

48 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Data Consistency

8.4 Reconciliation
Reconciliation is used to check consistency within a DSA, i.e. replicated data between primary and
synchronised secondary nodes.

Figure 17: Inter-NDS Reconciliation

It is also used when multiple DSAs are involved with distributed data to check the validity of all
References on a DSA, by verifying that the other end of the reference exists.

Figure 18: Inter-DSA Reconciliation

Reconciliation is a background task scheduled as low priority.

8.5 Chaining
The X.500 protocols are used as the basis of directory distribution, however the replication within
the DSA feature of NDS means that additional routing options are available when an operation is
chained.
In all cases, update operations are chained to the current primary in the target DSA.
Reads may be chained to a server on the same site or to the least utilised server on any site. The
former option should be configured where inter-site communication bandwidth is limited.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 49 (92)


Issue 5.0 Confidential
One-NDS

Figure 19: Chaining

Updates are sent to the primary which checks its database, finds data is not there and forwards the
update to a remote primary where the data is mastered.
The remote primary finds data and updates itself and sends replicated update to the other nodes in
the cluster which respond with ‘success’. The remote primary commits the update to itself and
sends a commit to the other nodes. Finally, the remote primary responds to the local primary which
sends ‘success’ to the user agent.

8.6 Journals
During any replicated update, NDS will not only apply the update to the in-memory database but it
will also store details of the transaction in the in-memory journal.
Additionally, completed transactions from the in-memory journal are written out to a disk-based
journal file as a more permanent record.
In-memory journal: This is a shared memory area storing details about all transactions (circular
buffer).
Disk journal: A journal file is created each time the node starts-up, at midnight, or when the file
reaches the maximum permitted size (currently up to 200 MB in size or a maximum of 500,000
entries whichever occurs first).
The files also contain information about when the transaction was performed and by whom.

50 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Data Consistency

8.7 Database Back-up and Restore


The principle means of providing the necessary persistence of NDS data is by having multiple
identical copies of the data on physically (and geographically) separate servers.
As a secondary level of protection, each server also makes copies of its memory Contents to local
disk files using an automated and non-intrusive process. Automatic backups can be scheduled on
a regular basis and ad-hoc backups can be requested by an administrator.
In addition to the backups of the complete DIB, NDS also maintains a disk-based journal of all
updates made to the data.
The backup and journal files are used to seed the process of synchronization described above
when a server joins or rejoins a DSA.

8.7.1 Backup
Backups are automatically created once a day at a configurable number of seconds past midnight
but can also be requested from the command line at other times.
Backups are typically run simultaneously on each DSA. The backup file is ASN.1 encoded.
The backup process involves walking the directory tree and writing each object to the backup file.
To limit the impact of the backup, the database remains available for normal activities throughout
the backup process.
As a result, updates could be occurring to areas of the tree already backed-up introducing
inconsistencies in the backup file. These inconsistencies are resolved via the journal at restore time
by replaying updates that occurred during the period of backup via journal files.
In addition to the on-server disk backups, a second type of daily backup to an external B&R server
can be performed allowing a copy of the backup files to be stored elsewhere. This is supported by
EMC Legato Networker agent which replicates the back ups to a separate B&R server. EMC
Legato Networker is supported by @com and NetAct.

8.7.2 Restore
The restore process needs the backup and journal files for the transactions made during the
backup in order to:
 restore the schema and load objects from the main backup
 resolve any inconsistencies with objects moved during the backup using the information in
the supplementary backup sections.
 replay from the associated journal any transactions that occurred during the backup.
At this point the database is restored to the moment that the backup completed and is consistent:
the node then only needs a small number of transactions to be retransmitted by the primary during
synchronisation.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 51 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

52 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Overload Protection

9 Overload Protection

9.1 Rate Control


In normal circumstances a correctly dimensioned installation will process all requests from users
and applications in a timely manner.
In exceptional circumstances, for example a burst of traffic outside of normal parameters,
transaction gapping is employed to minimize the effects of the unexpected occurrence.
The system uses rate control to limit the number of requests that each One-NDS node accepts per
second. This ensures that the response time remains within the required limits and that system
stability is ensured. The traffic rate is measured and compared to the configured rates, rejecting
requests if the configured maximum rate is exceeded. Three maximum rates can be configured with
respect to incoming requests. These are:
 maximum query rate
 maximum update rate
 maximum overall request rate
Each rate is specified in terms of operations per second. These configured maximum rates will be
adapted downwards based on local system load in order to protect the system against unexpected
extraneous load.
However, simple gapping solutions work by limiting the volume of operations allowed at the border
of the system, with no consideration for the importance of the operation or the impact on the
network of dropping the operation. Whilst this mechanism protects the database, it does not
comprehensively prioritise or protect the key services.
In extreme cases there are scenarios where simple gapping does not allow the network services to
recover from overload situations without drastic manual action in the network entities, in fact local
overload can cascade across the system. These cascades require a more intelligent solution as to
which traffic to reject when the system is in overload. One-NDS supports this through its support of
Database Quality of Service (QoS).

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 53 (92)


Issue 5.0 Confidential
One-NDS

9.2 Database Quality of Service (QoS)


One-NDS can be deployed in either a large or small distributed system as a central data repository
for subscriber data. This repository may be used by many network applications, reporting
applications and the provisioning system at least.
In the case of several applications accessing One-NDS, there is competition for the One-NDS
system resources between these applications. In addition the access behaviours of these
applications are not known a priori. Therefore One-NDS supports overload management functions
as follows to avoid a blocking of the system by a client application. The basic principle applied
during overload of the One-NDS database is that it is desirable to maintain the best possible
service for key network applications at the expense of other applications.
One-NDS implements a 'Database Quality of Service (QoS)' feature which addresses this issue.
The QoS feature is designed to comprehensively protect the database and the key applications
during overload of all, or any part, of the distributed database.
The QoS feature achieves this by prioritising operations during overload according to the configured
QoS level for that application, and optionally further prioritising using an operation QoS level
supplied by the application itself. Hence, when the database protects itself by gapping low QoS
level operations, the key applications are also protected due to the high QoS level associated with
both the key application itself and its key database operations.
This need to prioritise key network traffic during an overload situation is common to all distributed
architectures. One-NDS is unique in its ability to “intelligently” reject low priority traffic in favour of
the key application traffic that will enable the network to quickly restore normal operations when an
overload situation occurs.

54 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Provisioning

10 Provisioning
Subscriber data is stored in a single central repository which provides the opportunity to have a
single provisioning point. In One-NDS, the Provisioning Gateway (PGW) acts as this single point for
provisioning.
The PGW supports a recognised standard interface for provisioning commands from the customer
CRM system. SPML (Service Provisioning Markup Language) is a XML based standard released
by the OASIS group.
Using SPML allows One-NDS to decouple provisioning form the detailed directory model, i.e. SPML
is more abstract than the directory representation, which is optimized for fast access of the
applications. SPML presents a unified subscriber view to the provisioning system, which can now
operate on a subscriber with all its services (e.g. HSS, HLR, AAA, etc.)
On a project specific basis it is also possible to use a combination of other provisioning
mechanisms or approaches (such as over the LDAP interface for a single application or LDAP
methods) but this runs the risk of compromising data consistency and uniqueness.

10.1 Provisioning Gateway


The Provisioning Gateway (PGW) supports a number of functions to provide a unique management
point for provisioning in One-NDS, particularly across a multi-application environment. The PGW
supports a unique provisioning point for One-NDS. As the provisioning interface is based on SPML,
it is a service oriented provisioning interface. SPML presents a unified subscriber view to the
provisioning system, which can now operate on a subscriber with all its services (e.g. HSS, HLR,
AAA, etc.)
The PGW is highly scalability, as several PGW servers work can be deployed in load sharing mode.
 Support for the following functionalities:
 Mapping of abstract SPML model to directory model. An SPML request is mapped to
one or typically several LDAP requests.
 Data validation and default value insertion in the PGW guarantees data consistency
in the One-NDS.
 Transaction Handling (where 1 or several SPML request can be bundled as a
transaction).
 Multi Tenancy, tenant specific interfaces can be provided. Each tenant can only
perform provisioning of their own subscribers.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 55 (92)


Issue 5.0 Confidential
One-NDS

 Interface Versioning.
PGW supports different interface versions in parallel. This allows smooth introduction
of new features.
 Mass provisioning.
PGW is an optional component within the One-NDS system and provides a flexible, standards-
based approach to integration of operators’ existing provisioning engines and new applications that
use One-NDS for data storage.
Tasks from, for example, a customer relationship management system (CRM) or a SIM card
management system are forwarded to the PGW where they are processed and forwarded to One-
NDS via an internal LDAP interface. These systems would use the PGW SPML interface for
providing subscriber specific data and services as well as SIM card data. The CRM might use the
SPML interface via SOAP/HTTP and the SIM card management might use bulk files containing the
SPML document.
The PGW supports SPML over different interfaces: an online Interface, SPML over SOAP,
supporting single and batch requests and a bulk Interface over sFTP. The bulk interface accepts a
file containing the requests to be executed.
The PGW supports a number of different provisioning use cases which can either be used
wholesale or in a discrete fashion by the operator. Single SPML requests such as add, modify,
delete etc. are sent independently via the SOAP interface (online). Batch requests contains several
single SPML requests (a series of requests within an "envelope", which can be handled as a single
transaction). In addition, the batch request is sent via the SOAP interface (online). Only a single
response is provided to a batch request detailing the response for each of the requests included in
the request.
The bulk request supports operations on more than one object in the One-NDS and is used for
mass operations. A Bulk Request can be specified in two ways:
 By a filter condition – the provided filter identifies all the objects that have to be
modified/deleted.
 By a list of identifiers – on all the objects with the provided identifiers the modify/delete is
performed. Identifiers are stored in an external file.
An extended bulk request allows execution of special logic, which has to be implemented for
specific use cases that can’t be expressed via other standard request types.
Some applications are provided with their own dedicated Web-based GUI for subscriber
administration. Supervision and modification of batch file execution is also provided by the GUI.

10.1.1 PGW Administration


ADM is used to configure PGW .

10.1.2 PGW Modularisation


The PGW consists of a core component and a set of plug-ins, which are deployed and configured
according to the requirements of a specific project. The PGW core provides common functionality
used by all modules like a framework for the SPML-request processing, LDAP access to the NDS,
OAM interfaces etc.
PGW modularization supports either a new NDS LDAP schema and/or a new version of the SPML
interface. It introduces application modules (AMs) which provide the mapping and validation
functionality using plug-ins. With them, the mapping and the validation functions are achieved

56 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Provisioning

through a chain of AMs, which can be statically configured for each plug-in version. The AMs are
completely independent of one another from a build and installation perspective; that is, it is
possible to add, remove, update, and exchange any AM in the chain irrespective of other AMs.
Module controllers invoke the AMs in a sequence as defined during plug-in configuration.
Therefore, each of the above extensions can be part of a different plug-in or can be an extension of
the same plug-in. That is, a newly developed AM can be part of existing plug-in or it can be part of a
new plug-in. Furthermore, the plug-in configuration (PC) file controls the configuration of the plug-in,
that is, a configuration file lists all AMs applicable for a plug-in version and the chain to invoke the
AMs during request processing.
Basically the plug-in versioning concept is intended to cover the following basic operational use
cases due to extension of the existing application or due to introduction of new application:
 Changes in the NDS LDAP schema/DIT only and are not reflected at the SPML interface.
 Changes in the SPML schema only and do not reflect any changes in NDS. Changes at the
SPML interface can only affect the application schema; that is, data items, not the requests.
 Changes in the SPML schema and the NDS LDAP schema/DIT
The best example of this type of change is the introduction of a new service that is also supported
at the SPML interface. It can be assumed that this use case is the one used most.
The management associated with PGW modularisation supports the configuration of application-
specific modules. With the help of PGW plug-ins, it is possible to customise modifications of LDAP
directory server schema and/or version of the SPML interface. A PGW plug-in contains AM
packages, application support (AS) packages, and a PC package. A single AM can be re-used for
several plug-ins or versions of the SPML interface and an AM can have its independent versioning
rules. The PC package controls the configuration of the plug-in, that is, a configuration file lists all
AMs applicable for a plug-in version and the chain to invoke the AMs during request processing.
So, a PC package refers to several AS packages and, for example, each PC package can also
contain one and the same AM. PGW plug-ins are provided in a separate Red Head package
manager (RPM) packages. The PGW module framework allows the execution of the modules
according to the following module configurations which can be defined at two levels:
 A global configuration file defines the module list for a plug-in version and also the sequence
in which the modules is invoked during request processing.
 A module level configuration file called the deployment descriptor defines the module
specific settings.
Furthermore, it is also possible to have multiple modules per application, that is, it is possible to
design functional "delta modules", which contains only the delta functionality.
During SPML processing a plug-in controller executes the different modules in a defined sequence.
This sequence is configured per SPML Plug-in. One module version may be reused in different
Plug-ins. This means that the final SPML interface is defined at deployment time, where all SPML
contributions from all PGW modules are be “merged” into the SPML interface offered by the specific
plug-in. The SPML interface can then easily be enhanced by adding a new module and changing
the configuration. A new module may be added for support of additional attributes for existing
applications as well as for complete new applications.

10.1.3 Provisioning Gateway DSA (PGW-DSA)


PGW stores its configuration data in PGW-DSA. Selection criteria, defined in the configuration
block (CFG) of PGW-DSA, indicate which DSA should be used for the addition of new objects. If
the distinguished name (DN) within an LDAP add request message matches an object class within
a CFG, the selection criteria can either be a random DSA, in which case the CFG randomly selects
a DSA; or alias, in which case the CFG uses the alias object name to determine the masteredBy
attribute of the object being held.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 57 (92)


Issue 5.0 Confidential
One-NDS

It should be noted that two of the functions of PGW-DSA in C-NTDB 2.0 – notably transaction
support and triggering – are now provided by the One-NDS Directory itself (see Chapters 4 and 5).
In a fully configured One-NDS system, PGW-DSA is co-located with NTF.

10.2 LDAP Interface


In One-NDS, subscriber provisioning can be done directly over the LDAP interface with a third party
provisioning system. The distribution of triggers is handled by the Notification Manager if deployed.
The subscriber provisioning and administration functionalities, as well as the interface to One-NDS,
will need to be implemented on the third party provisioning system.

58 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Operation Administration and Maintenance (OAM)

11 Operation Administration and


Maintenance (OAM)
One-NDS may be managed from both of these components:
 One-NDS Administrator for One-NDS specific configuration task and
rd
 Network Element Management system i.e: @Com, NetAct, or 3 party NEMS for standard
O&M tasks.

11.1 One-NDS Administrator (ADM)


The central point for the One-NDS specific management and configuration issues is the ADM. ADM
supports configurations tasks which are beyond the scope of standard element management
systems. These functions include, for example, configuration of the Routing and BE-DSAs,
configuration of PGW and NTF, schema management and subscriber data directory re-
organization. The administration of directory servers is provided by the ADM GUI
Administrative tasks
 ADM Administration
 DSA Administration
 LDAP User Management / LDAP client administration
 Schema Management
 PGW/LI Management / Plug-in installation
 Notification Server Administration
 Tenant/Application Administration
 Data Management incl. trigger data
 Data Migration Support

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 59 (92)


Issue 5.0 Confidential
One-NDS

Operational tasks (to be executed on running directory)


 Notification Server Admin
 Data Distribution (Relocation)
 SDS (subscriber data storage) Monitoring
 Application Reset (HLR-Reset)
 IMSI & MSISDN Overview
 Data Model Deployment
 Log Management
 Emergency Actions
 Consistency Check
 Counter Audit
 Job Management
 LDAP Application

11.1.1 One-NDS Setup Management


One-NDS setup management includes the following functions:

DSA Management

 Using the new “One-NDS setup in one step” procedure in One-NDS 8.0, all NDS
components can be defined one-by-one on a single Web page and the configuration itself
can be executed all in one step.
 The introduction of a new DSA can be entered on a single Web page and executed in a
single step. This provides an efficient way of entering information, and it also offers an
advantage in that the complete set of data entered can be verified before it is applied to
NDS. Directory management reporting enables the operator to obtain an overview of the
directory’s operational parameters.

Consistency Check

ADM helps operators to detect and reconcile inter-DSA inconsistencies.

Data Management

Data management enables the operator to administer server-specific data for the individual DSAs.
Data sets are composed by adding/importing one or more LDIF data files, for example, subscriber
profile data definitions. Further, a data configuration with tenant or corresponding application
configuration is possible.

60 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Operation Administration and Maintenance (OAM)

Figure 20: Create DSA

11.1.2 Schema Management


The schema management function enables the operator to make the necessary changes to the
schema and views in a controlled manner. The schema can be extended under operational
conditions by importing schema definitions specified in an X.500 ASN.1 file format in the schema
manager. The schema manager then generates LDIF files that are loaded online to the directory
system.

11.1.3 Subscriber Data Management


Subscriber data management includes the following functions:

Subscriber Data Distribution

Subscriber data has to be distributed over the entire directory, that is, both Routing and BE DSAs.

Relocation of Subscriber Data

Subscriber data may need to be moved if a particular server is approaching its limit for traffic-
handling capacity, while other servers have available resources. One-NDS supports moving
individual data sets between subscriber data directory servers.
In connection with the relocation of subscribers over the DSAs, operator actions are automatically
accompanied by a mechanism that eliminates incorrect subscriber distribution, thus reducing the
operator workload considerably. It also ensures that the stability of the active network is not
endangered in any way.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 61 (92)


Issue 5.0 Confidential
One-NDS

Monitoring of Subscriber Data

Monitoring of subscriber data enables the operator to monitor the fill level of the subscriber data
directory in terms of the number of subscribers (of subscriber profile data) and of memory usage.

11.1.4 LDAP Interface Management


LDAP Interface management includes the following functions:

LDAP Client Management

The NDS directory servers must know the LDAP clients. Therefore, LDAP clients must authenticate
themselves before they are given access to NDS.

LDAP User Management

An LDAP user is any application that accesses NDS over LDAP. In other words, any application
that accesses NDS over LDAP needs an LDAP user account.

Figure 21: LDAP Users

11.1.5 LDAP User Management

Job Management

ADM provides job management, which is used to check the processing status of jobs after starting
administration tasks which create a job.

62 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Operation Administration and Maintenance (OAM)

Log Management

ADM provides a log file browser component, which is used to retrieve log files from ADM as well as
from any other host, for example, the directory servers.

Emergency Actions Management

The implemented emergency actions treat both disaster recovery system backup/restore and
software fallback.

11.1.6 Provisioning Gateway Management


Provisioning gateway management consists of the following functions:

PGW Control

ADM provides the ability to start, stop, and restart PGW application modules running on PGW
servers on demand. These single PGW servers must first be announced in the ADM database.

PGW Configuration Data

The ADM GUI (PGW administration part) serves as an administration front-end application for the
PGW. ADM GUI provides a user interface to modify the configuration data at runtime.

Project and Office Data

PGW project and office data, for example, feature flags, configurable parameters that denote
feature behaviour, and basis customer project settings can be managed.

PGW User Management

PGW users can be managed including administration of passwords.

11.1.7 Notification Manager Management


The ADM GUI (NTF administration part) serves as an administration FE application for NTF. The
ADM GUI provides a user interface to modify the configuration data in PGW-DSA at runtime -
similar to PGW.

NTF Control

The ADM provides the ability to start, stop, and restart NTF applications running on a PGW DSA
server on demand.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 63 (92)


Issue 5.0 Confidential
One-NDS

Registry Data

The NTF registry data is stored in PGW DSA.

Registration

Registration allows adding (and deleting) notification receivers to existing notification instances.

11.1.8 System Monitor Management

Command Interface

A few commands are available for controlling System Monitor, for example: start, stop, and
reconfigure. These are executed from the command line.

Configuration

Configuration information is held in files. There are two types:


 Simple parameters, for example IP addresses, caching periods, etc. These configuration
files may be modified by support staff and customers as appropriate on the live deployment.
 Product-specific rules, including the amalgamation logic, the counters and their thresholds.
The rules are created and tested for each product that is monitored; they should not be
modified on site. Changes would require a custom configuration to be created.

Logs

Several log files are maintained on both the clients and the SM server. These include:
 Operational activity, including errors, heartbeat messages, etc.
 All events on the clients, whether they are notified to the server or suppressed
 Optionally, the north-bound alarms that are sent to the NMS.
A mechanism is provided to archive old log files.

64 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Operation Administration and Maintenance (OAM)

11.2 System Monitor


System Monitor is a component of One-NDS providing the NMS with a coherent, aggregate view of
One-NDS as shown in Figure 22.

Figure 22: System Monitor and One-NDS

NetAct
or NMS

System
Monitor

One-NDS Servers

One-NDS

System Monitor is used with NetAct or a 3rd party NMS. System Monitor is not required with
deployments supported by @Com.
 It provides the NMS with a simple single interface instead of one for each of the One-NDS
many constituent servers.
 It aggregates data according to the logical and physical components of the system to which
they relate e.g. DSA.
 It gives information relevant to the overall system, not just a collection of data from individual
servers within the system.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 65 (92)


Issue 5.0 Confidential
One-NDS

11.2.1 Architecture
The architecture is shown in Figure 23.

Figure 23: System Monitor Elements

NetAct
or NMS

System 3
Monitor

One-NDS Servers

One-NDS

The four marked points refer to the following:


1. Monitored servers in One-NDS
Each server in One-NDS generates its own monitoring data. There are typically three types:
 Status alarms. These are hardware alarms or application alarms. These are real
alarms representing a condition which the server takes responsibility for clearing
them when appropriate.
 Event alarms. These are the most common alarms generated on a server in One-
NDS. They record a particular event, e.g. operation X failed on entity Y. They
describe the system’s history rather than a current condition that can be rectified so
they are never followed by a corresponding ‘clear’ event.
 Statistic events. Most servers track performance data over a short period of time. At
the end of that time they generate statistic events which state the updated values of
their performance statistics.
2. System Monitor client probes
System Monitor’s client probes run on each server in the directory. They collect the
monitoring information described above and send it to the System Monitor server. Status
alarms are sent immediately, but event alarms are cached.

66 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Operation Administration and Maintenance (OAM)

3. System Monitor server


The System Monitor server aggregates the data sent to it from each server in the directory.
Status alarms are raised immediately on the north-bound interface, while event information
is added to system counters. Counters typically relate both to a type of event and to a
particular entity of the system, whether logical or physical. Counters are used to aggregate
event alarms and statistics.
4. North-bound interfaces
They are described in the section 3.4.4.

11.2.2 Aggregation and Filtering


One-NDS is a highly distributed system. Logical elements (components) such as BE-DSA span
several servers, which are distributed over multiple sites. The components are able to continue
operating in the event of local failures in individual servers.
An individual server does not constitute a One-NDS component in its own right but each server
generates its own monitoring data. In order to understand the whole system, the information from
all servers must be combined.
Much of the monitoring information available from individual servers reports specific events that
have occurred, rather than persistent alarm conditions. This data cannot be passed directly to an
NMS. It must be first analysed and converted into alarms that are raised and cleared against
entities of the system.
System Monitor addresses both issues together by adding the information it collects from individual
servers into counters for the whole system. These take account of the different types of data
collected, and the logical and physical elements of the system to which they relate. Alarms are
raised and cleared according to counter thresholds, while system statistics are generated directly
from performance counters.
With System Monitor, an NMS receives far fewer alarms than it otherwise would. System Monitor
reduces both the load on the NMS, and the monitoring effort required from users. It is particularly
effective at reducing the severity of alarm storms in failure scenarios.
A large part of the reduction is achieved by converting reports of events that occurred into
threshold-based alarms. This approach also ensures that the alarms are of a much higher quality
than would otherwise be the case. Alarms indicate abnormalities in the current condition of the
system and are cleared when no longer applicable.

11.3 NSN O&M Systems


When a third party NMS is used for OAM activities in connection with One-NDS, the System
Monitor component and the NMS communicate over the southbound interfaces of the NMS for FM
and PM. System Monitor probes reside upon the remaining One-NDS servers and provide the FM
and PM information to System Monitor. The System Monitor provides and aggregated view of FM
and PM information towards the NMS. Configuration Management is provided over the ADM GUI.
The support provided by the NSN Network Management Systems is detailed in the following
sections.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 67 (92)


Issue 5.0 Confidential
One-NDS

11.3.1 NSN NetAct


When the NetAct NMS is used for OAM activities in connection with One-NDS, the System Monitor
component and NetAct communicate over the southbound interfaces of the NetAct for FM and PM.
System Monitor probes reside upon the remaining One-NDS servers and provide the FM and PM
information to System Monitor. The System Monitor provides and aggregated view of FM and PM
information towards NetAct. Configuration Management is provided over the ADM GUI.
For One-NDS, NetAct supports the following functions:

Fault Management

NetAct presents alarms from One-NDS, allowing effective real-time monitoring of the One-NDS.

Performance Management

Performance management involves monitoring the performance of directory read and update
operations and comparing these with response time limits. One-NDS can passively measure
transaction rates and actively stimulate test transactions as well as measure the response times
compared with defined limits. Service level agreements (SLAs) can be tracked and remedial action
taken to maintain performance levels.

Backup and Restore (B&R)

B&R facilities enable the directory data to be permanently and securely stored. In the very unlikely
case of a complete system failure, a backup enables the operator to resume operation from the
point in time at which the last backup was performed. One-NDS is designed so that it can be
integrated with the B&R system within NetAct. EMC Legato Networker agents on the Directory
servers interface to the B&R system.
For detailed information about OAM, see the One-NDS User Manual or the documentation and
Online Help for NetAct.

11.3.2 NSN @vantage Commander (@com)


When @vantage Commander (@Com) is used for OAM activities in connection with One-NDS, the
One-NDS components and @Com communicate over the southbound interfaces of @Com. @Com
agents are used for the system management interface, for example, FM agent, PM agent, and IM
agent. The @Com agents reside in each server in the system. Configuration Management (CM) is
done over the CM GUI or ADM GUI, which is accessed from the @Com GUI. The corresponding
HTTP servers are running on the corresponding network components (for example, DSAs and
PGW).
For One-NDS, @Com supports the following functions:

Fault Management

Fault management involves monitoring alarms and taking the appropriate action. One-NDS is fully
integrated into a common multi-layered network/component management architecture and features
network/component management. This network/component management can provide a network
view of the Directory servers, collect alarms, and pre-correlate alarms to reduce traffic towards an
enterprise management system.

68 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Operation Administration and Maintenance (OAM)

Performance Management

Performance management involves monitoring the performance of directory read and update
operations and comparing these with response time limits. One-NDS can passively measure
transaction rates and actively stimulate test transactions as well as measure the response times
compared with defined limits. Service level agreements (SLAs) can be tracked and remedial action
taken to maintain performance levels.

Backup and Restore (B&R)

B&R facilities enable the directory data to be permanently and securely stored. In the very unlikely
case of a complete system failure, a backup enables the operator to resume operation from the
point in time at which the last backup was performed. One-NDS is designed so that it can be
integrated with the B&R system within @vantage Commander (@Com). EMC Legato Networker
agents on the Directory servers interface to the B&R system.

Configuration Management

Configuration management provides a view of One-NDS components. The configuration


management is supported by the One-NDS Administrator. @com supports single sign on to the
One-NDS Administrator GUI.

Software Management

Software Management (SWM) is handled by the Install Server within One-NDS. @com supports
secure shell access to the Install Server to allow the operator to use the SUFDirector software
management scripts to prepare network component software update (including the download/import
software packages to INS), view logs and to display software status of network components.

Inventory Management

Inventory management is used to provide previously scanned inventory information about the
various static resources of managed One-NDS network components and the network environment.
Static resources consist of hardware equipment as well as the software installed at the network
components.

Security Management

@Com provides role-based user management coupled with a sophisticated authorization concept.
It also supports an interface for central external user management.
For detailed information about OAM, see the One-NDS User Manual or the documentation and
Online Help for @vantage Commander.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 69 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

70 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Hardware

12 Hardware
The current reference hardware platform for all One-NDS components is the Sun Netra
X4250/X4270. Alternate hardware supported includes Fujitsu-Siemens Primergy RX200
S3/S4/S5/S6, RX600 S4 and S5 and IBM Bladecenter.

12.1 Sun Netra X42xx


One-NDS can be deployed on the X4250 or X4270 servers. One-NDS also supports existing
deployments on X4200.

12.1.1 Sun Netra X4270


Item Type
Processor 2 x Intel Xeon Quad-Core CPU
Memory Max 144GB RAM (18 DIMM slots)
Disk capacity Max 4 x 300GB SAS HDD
Network 4 x Gigabit Ethernet ports
I/O 2 x PCI-X and 3 x PCI Express slots
Footprint 2 RU
Power Redundant AC or DC 650W PSU

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 71 (92)


Issue 5.0 Confidential
One-NDS

Figure xx: SUN Netra X4270

12.1.2 Sun Netra X4250

Item Type
Processor 2 x Intel Xeon Quad-Core CPU
Memory Max 64GB RAM (16 DIMM slots)
Disk capacity Max 4 x 146GB SAS HDD
Network 4 x Gigabit Ethernet ports
I/O 2 x PCI-X and 3 x PCI Express slots
Footprint 2 RU
Power Redundant AC or DC 650W PSU

72 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Hardware

Figure 24: Sun Netra X4250

12.1.3 Sun Netra X4200 M2


Item Type
Processor 2 x AMD Opteron Dual-Core CPU
Memory Max 32GB RAM (8 DIMM slots)
Disk capacity Max 4 x 146GB SAS HDD
Network 4 x Gigabit Ethernet ports
I/O 3 x PCI-X and 1 x PCI Express slots
Footprint 2 RU
Power Redundant AC or DC 550W PSU

Figure xx: SUN Netra X4200 M2

12.2 Fujitsu Primergy RX200 Sx


One-NDS can be deployed on the Fujitsu Primergy RX200 S6 servers. One-NDS also supports
existing deployments on Rx200S3/S4/S5 and on Rx600 S4/S5..

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 73 (92)


Issue 5.0 Confidential
One-NDS

12.2.1 Fujitsu-Siemens Primergy RX200 S6


Item Type
Processor 2 x Dual or Quad or Turbo Quad-Core Core Intel Xeon processors (55xx-
and 56xx-Series)
Memory Max 192 GB RAM DIMM (DDR3)
Disk capacity Max 8 x 2,5 hot-plug SAS/SATA hard drives
Size 43x431x765 mm (HxWxL); 1U;
Power supply Redundant AC 450W or 770W PSU
Features Redundant fans, redundant hot plug power supplies
Networking 2 x Gigabit Ethernet ports

Figure xx: Fujitsu-Siemens Primergy RX200 S6

12.2.2 Fujitsu-Siemens Primergy RX200 S5


Item Type
Processor 1 or 2 Intel Xeon Quad Core Processor E5540 (2.53 GHz, 1066 MHz
FSB)
Memory Up to 96 Gigabytes
Disk capacity 4x300 GB (SAS)
Size 43x431x765 mm (HxWxL); 1U;
Weight Up to 18 kg rack mounted
Power supply 459 W (100-240 V AC)
Features Redundant fans, redundant hot plug power supplies
Networking 2 x 10/100/1000 Mbit/s Ethernet LAN board; 2x Dual Gigabit Ethernet PCI
Interfaces

Figure 25: Fujitsu-Siemens Primergy RX200 S5

74 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Hardware

12.3 IBM Blade Center


IBM Blade Center is supported for systems used with NSN Dx HLRe.

12.3.1 IBM BladeCenter H Chassis


Item Type
No. Blades 14
Network 4 x Gigabit Ethernet ports
4 x 10 Gigabit Ethernet port
Footprint 9 RU
Power Redundant AC 2900W (x 4)
Blades LS42, HS22

Figure 26: H Chassis

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 75 (92)


Issue 5.0 Confidential
One-NDS

12.3.2 IBM BladeCenter HT Chassis


Item Type
No. Blades 12
Network 4 x Gigabit Ethernet ports
4 x 10 Gigabit Ethernet port
Footprint 12 RU
Power Redundant AC or DC 3160W (x 4)
Blades LS42, HS22

Figure 27: HT Chassis

76 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Hardware

12.3.3 IBM BladeCenter LS 42


Item Type
Processor 2 x AMD Opteron 8376 HE
Memory Up to 64GB RAM
Disk capacity Disk space allocated on external
storage system

12.3.4 IBM BladeCenter HS22


Item Type
Processor 2 x Intel Xeon Westmere E5620
CPU
Memory Up to 64GB RAM
Disk capacity Emulex 8Gb FC HBA with disk
space allocated on external storage
system.

12.4 Racks
The Sun rack II 19” cabinet (AC/DC) and the FSC 19” Primecenter rack are used for hardware
configurations based on the Sun Netra X4200, X4250, X4270 or the FSC RX200 S3/S4/S5/S6
respectively.

Figure 28: Racks

Cisco 3560 (AC) Cisco 4948 (DC)

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 77 (92)


Issue 5.0 Confidential
One-NDS

IBM 42U
The Cisco 3560 or Juniper EX3200-48T is utilized for internal communication in AC powered racks
and the Cisco 4948 or Juniper EX3200-48T in DC powered racks.

78 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
One-NDS Software

13 One-NDS Software
This is the technical data on the main functional elements of the One-NDS software which runs on
Suse Linux Enterprise Server 10.
The following software is installed on the servers of these product components:

SoftwareComponent Software
NDS NDS software providing the Routing DSA and BE-DSA functions.
NTF Notification Manager software as well as OEM software including J2SE
(Linux version), Jakarta Tomcat, Mule, Apache
PGW DSA PGW-DSA as well as OEM software including J2SE (Linux version),
Jakarta Tomcat, Mule, Apache
PGW PGW as well as OEM software including scientific use file (SUF) agents,
J2SE (for Linux), Apache XML security, XML data types library, XML
commons, Java architecture for XML binding (JAXB), Java system XML
streaming parser (SJSXP)
ADM ADM as well as OEM software including and scientific use file (SUF)
agents, JBoss application server, Sun JDK, Apache My Faces,
Ganymed SSH, Mozilla Directory SDK
INS Install Server, as well as OEM software
SM System Monitor and OEM software including MySQL, Ganymed SSH,
Java SDK, Java SCTP Library, Axis Java, and MySQL Java connector

13.1 Extension Packages


The extension package is understood as a set of application and/or customer specific extensions to
the One-NDS core medium and other extension packages. The application/customer extensions
only use the core medium API. Extension packages can also depend on other extension packages.
Each extension package is a collection of functions which supports specific (one of these, but not
limited to):
 Application
 Application version

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 79 (92)


Issue 5.0 Confidential
One-NDS

 Customer
 Customer application
 Customer application version
The content of extension packages is optional, or each component of the package is optional. At
least one component must be included within a package. The set of components which may be part
of extension package (and not part of core medium):
Data model (schema and data)
 ADM context definition
 PGW/NTF configuration (schema and data)
 SOAP trigger definition
 User definition (LDAP users, PGW OS users)
 Old style PGW plug-in (One-NDS 8.0 binary compatible)
 PGW application modules/application support/plug-in configuration (AM/AS/PC)
 System Monitor configuration for application specific counters
The extension packages are cumulative. This means that the latest correction version of a package will
always contain the complete set of functionality (for example, full data model, latest PGW modules, full
trigger definition files etc.) Each latest extension package (except the initial version) supports an update
procedure from each previously released correction version to the latest version (for example, over a series
of delta steps per each correction release). The core medium is able to support this update mechanism.
Extension package development follows different delivery software cycles to the core medium. Therefore it
has its own deliverable software - packaged as a Unix compatible tape archiver (TAR) file including all
components bundled together. This package contains a versioning schema to be able to distinguish
correction releases (maintenance version) and support versioning (major version, minor version at least).

80 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
New Features

14 New Features

14.1 Upgrading from One-NDS 7.1


The major features which are new to One-NDS 8.0 Directory are:
 Transaction support (see Chapter 4)
 Enhanced triggering (see section 5.1)
 Username adaptation (see section 6.4)
 LDAP security (TLS) (see section 7.2)
 Increased LDAP connections (see the One-NDS 8.0 Operations and Maintenance Guide)
 LDAP client auditing (see section 11.1.4)
 Operations and Management Guide
 Database Quality of Service (see section 9.2)

14.2 Upgrading from C-NTDB 2.0


In addition to the new NDS features, the following features are new from C-NTDB 2.0:
 One-NDS Administrator (see section 3.3.5)
 One step set up and LDAP enhancements (see section 11.1.1)
 Enhanced bulk interface for searching and requesting (see section Error! Reference
source not found.)
 PGW Web GUI toolkit (see section 10.1)
 Transfer of transaction and triggering support to NDS (see section 5.1.1)
 Notification Manager (see section 5.2)
 Database Quality of Service (see section 9.2)

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 81 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

82 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
References

References
[1] One-NDS Version 8.0 Developers Guide
[2] One-NDS Version 8.0 Directory Information Tree
[3] One-NDS Version 8.0 Operations and Maintenance Guide
[4] One NDS Version 8.0 Directory Interfaces and Protocols
[5] One-NDS Version 8.0 X.500 Support
[6] One-NDS Version 8.0 LDAP Support
[7] RFC 2246: The Transport Layer Security (TLS) Protocol Version 1.0, January 1999
[8] RFC 4511: Lightweight Directory Access Protocol (LDAP): The Protocol, June 2006
[9] RFC 4512: Lightweight Directory Access Protocol (LDAP): Directory Information Models,
June 2006
[10] RFC 4513: Lightweight Directory Access Protocol (LDAP): Authentication Methods and
Security Measures, June 2006
[11] One-NDS Directory Version 8.0 Alarm Guide

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 83 (92)


Issue 5.0 Confidential
One-NDS

This page is intentionally left blank

84 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Glossary

Glossary
This glossary does not contain all the terms associated with the abbreviations in the abbreviations
list.

3*N redundancy 3*N redundancy means site redundancy. 3 is the number of geographical sites
and N is the number of servers required for the network-specific load.
Abstract syntax notation one The standard and flexible notation ASN.1 describes the abstract syntax of
(ASN.1) information, that is, the data structures for representing, encoding, transmitting,
and decoding data. ASN.1 facilitates the exchange of structured data, especially
between network-wide application programs. ASN.1 is independent of machine
architecture and implementation language and is used by application layer
protocols (for example, by X.500).
American standard code for ASCII is a character encoding based on the English alphabet. ASCII defines
information interchange (ASCII) several control characters, for ex-ample for devices such as printers, and 95
printable characters including the space character, numbers, the English
alphabet, and some special characters. It does not include country-specific
characters, such as German umlauts.
Apache Apache is a freely available Web server that is distributed under an “open source”
license. Version 2.0 runs on most UNIX-based operating systems (such as Linux,
Solaris, Digital UNIX, and AIX), on other UNIX/POSIX-derived systems (such as
Mac OS X, BeOS, and BS2000/OSD), on AmigaOS, and on Windows 2000.
Application programming API is an interface with commands and perhaps routines and/or macros that is
interface (API) offered by an operating system or an operating system extension. Application
programs can use such interfaces to cause the operating system to perform the
provided functions. A well known API is the common application programming
interface, which is used in ISDN.
Cluster In a cluster, multiple computers (typically PCs or UNIX workstations), multiple
storage devices, and redundant interconnections are used to form a single, highly
available system for the user. A cluster can be used for load balancing as well as
for high availability. Advocates of clustering suggest that in some cases, the
approach can help an enterprise to achieve 99.999 availability. One of the main
ideas of clustering is that the cluster appears as a single system to the outside
world.
Comma-separated variables Files in the CSV format are ASCII files which are often used to extract database
(CSV) contents and transfer them into another database. The single fields are separated
by commas. The common format and MIME type for CSV files is defined in RFC
4180.
Core network The core network is the actual backbone network. It can be a mobile radio
network, telephone network, integrated services digital network or data network to
which the access networks are connected. The core network provides
connections with high transmission rates over the entire supported area.
Directory access protocol (DAP) DAP is a network standard protocol introduced by ITU-T and the International
Organization for Standardization in 1988. Since then, DAP’s basic operations are
implemented into LDAP.
Directory operational bindings DOP defines how the DSAs establish connections between each other. This
management protocol (DOP) protocol also defines which server stores what information and the functions that
each machine has.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 85 (92)


Issue 5.0 Confidential
One-NDS

Directory service mark-up DSML represents directory service information in XML syntax. DSML version 1 is
language (DSML) a document type definition for files, which contain XML representations of LDAP
directory entries. DSML version 2 is an XML schema for the representation of
directory access operations. These operations are based on those of LDAP and
can be carried in SOAP.
Ethernet Ethernet is the most widely-installed local area network (LAN) technology.
Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox
and then developed further by Xerox, DEC, and Intel. An Ethernet LAN typically
uses coaxial cables or special grades of twisted pair wires. Ethernet is also used
in wireless LANs. The most commonly installed Ethernet systems are called
10BaseT and provide transmission speeds of up to 10 Mbit/s. Devices are
connected to the cable and compete for access using a carrier sense multiple
access with collision detection (CSMA/CD) protocol.
Extensible mark-up language XML is a data format language consisting of structured text containing embedded
(XML) tags. XML is an extensible, hierarchical data format that is both human and
machine readable. It is a standard which is processed by parsers, such as Simple
API for XML (SAX).XML only describes the content and does not take the
presentation into consideration. XML is used in publishing, data exchange, E-
business, and integration servers.
File transfer protocol (FTP) The open standard FTP is based on TCP/IP. It is used to transfer files between
computers. Usually, an FTP server and an FTP client with client software are
involved (see RFC 0959.
Gateway Hardware and software used to connect different networks with one another after
performing protocol conversion or data security checks and thus enabling
communication between the connected systems. A gateway has the task of
conveying messages from one computer network to another, whereby the
translation of the communication protocols is necessary. A gateway can thus be
thought of as a protocol converter. For the purpose of performing these tasks, a
gateway contains a specially developed computer.
General Packet Radio Service Introduced as a standard by the European Telecommunications Standard
(GPRS) Institute, GPRS is now standardized by 3GPP. The technology is often referred to
as 2.5G, this means a mobile communications system between 2G and 3G. Now,
GPRS is integrated into GSM standards. GPRS is packet-switched, that is,
multiple users share the same transmission channel when sending data. The
bandwidth can be fully utilized because it is only used intermittently for the actual
data transmission.
Gigabit Ethernet A transmission technology based on the Ethernet frame format and protocol used
in local area networks (LANs) that provides a data rate of 1 Gbit/s. Gigabit
Ethernet is defined in the IEEE 802.3 standard and is currently being used as the
backbone in many enterprise networks.
Global System for Mobile GSM is an international standard for mobile communications and the so-called
communications (GSM) “second generation” (2G) of mo-bile communications. GSM is currently developed
by 3GPP. Open standards make inter-operability easy, which means that service
providers can use equipment from different vendors.
High availability High availability refers to a system or component that is continuously operational
for a desirably long length of time. Availability can be measured relative to “100%
operational” or “never failing”. A widely-held but difficult-to-achieve standard of
availability for a system or product is known as “five 9s” (99.999 percent)
availability.
Hyper text transfer protocol HTTPS is actually the same as HTTP with the exception that the transmission of
secure (HTTPS) data is encrypted. To enable HTTPS connections over a Web server, the
administrator must prepare certificates for the Web server. Addtionally,
certificates can be used to limit Web server access to authorized users. (About
the alternative S-HTTP, see RFC 2660.)

86 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Glossary

International Telecommunication ITU is an international union of public and private organizations. ITU’s aim is to
Union (ITU) develop and enhance telecommunication standards. ITU was founded as the
International Telegraph Union in Paris on 17 May 1865. ITU is one of the
specialized agencies of the United Nations and has its headquarters in Geneva,
Switzerland.
Internet protocol (IP) IP is the lowest protocol in the TCP/IP stack and therefore represents its basis. IP
is the main component of the open systems interconnection (OSI) layer 3 in this
stack, that means, it is the network layer component of the TCP/IP stack. It
implements the functions necessary for the transmission of data between Internet
terminals, which can be present in different combinations in different transmission
networks.
LDAP data interchange format LDIF is typically used to import and export directory information between LDAP-
(LDIF) based directory servers or to describe a set of changes that is to be applied to a
directory. This data is contained in LDIF files (plain text) each of which contains a
series of records. A record describes a directory entry or a set of changes to a
directory entry. See RFC 2849.
Lightweight directory access LDAP is a networking protocol to query and modify directory services that run
protocol (LDAP) over TCP/IP. The protocol accesses LDAP directories that conform to the X.500
model.
N + k redundancy The N + k redundancy is an availability concept, where N is the number of servers
necessary to perform business operations and k is the number of redundant
servers. As many as k servers can fail without impact on the business.
Secure shell (SSH) SSH is both a program and a network protocol to login at a remote computer and
to execute tasks on the re-mote computer. The SSH protocol provides secure
encrypted communications. For secure file transfer, SSH is usually used with
sFTP (see RFC 4251 for the SSH-2 architecture).
Secure file transfer protocol The acronym sFTP stands for SSH file transfer protocol and is also called secure
(sFTP) FTP. The network protocol sFTP is used for secure file transfer and for access to
remote computers over the SSH protocol.
Service provisioning mark-up SPML is an XML-based framework that has been developed by the OASIS
language (SPML) Provisioning Services Technical Committee (PSTC). SPML is used to query and
exchange user, account, and resource provisioning requests.
The SPML protocol is an open standard protocol for the integration and
interoperation of service provisioning requests.
Simple network management SNMP is a widely-used network monitoring and control protocol (on the
protocol (SNMP) application layer). Data is forwarded from SNMP agents that reside in the network
devices and report to the main console used to supervise the net-work. The
agents return information that is contained in the management information base
(MIB). SNMP is part of the TCP/IP protocol suite. It enables network
administrators to manage network performance, find and solve network problems,
and plan for network growth.
Simple object access protocol Originally, SOAP was an acronym for simple object access protocol. The full
(SOAP) name was dropped in the specification version 1.2 because the focus shifted from
object access to object inter-operability. According to the World Wide Web
Consortium recommendation (June 2003), SOAP version 1.2 is a lightweight
protocol intended for exchanging structured information in a decentralized,
distributed environment. Using XML technologies, the messaging framework
defines an extensible messaging framework containing a message construct that
can be exchanged over a variety of underlying protocols.

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 87 (92)


Issue 5.0 Confidential
One-NDS

Third Generation Partnership 3GPP is an association of organizations that plays a leading role in developing
Project (3GPP) standardized technical specifications and coordinating the implementation of
future UMTS mobile phone networks and Internet Protocol Multimedia Subsystem
(IMS) networks. Its partners co-operate to produce globally applicable technical
specifications, as well as technical reports for a third-generation mobile system
based on evolved GSM core networks and the radio access technologies that
they support (for example, universal terrestrial radio access (UTRA), as well as
frequency-division duplex (FDD) and time-division duplex (TDD) modes).
Transmission control protocol TCP defines a series of standards that regulate data transfer in the Internet.
(TCP) Internal computer networks, such as Intranet, are also based on this standard and
therefore Internet access is possible. The layers above IP are responsible for
reliable delivery service when it is required. TCP is the primary virtual-circuit
transport protocol for the Internet suite. TCP provides reliable, in-sequence
delivery of a full-duplex stream of octets. TCP is used by those applications
needing a reliable, connection-oriented transport service, such as mail (SMTP),
file transfer (FTP), and virtual terminal service (Telnet).
X.500 X.500 is a standard for directory services. X.500 components manage information
about objects and make it possible to search for information. This information is
contained in a directory information base (DIB). DIB entries are uniquely identified
by their distinguished name (DN) and are arranged in a tree structure, the
directory information tree (DIT). A directory schema defines the attributes of each
object class.

88 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Abbreviations

Abbreviations

2G 2nd generation
3G 3rd generation
3GPP 3rd Generation Partnership Project
ACID atomic, consistent, isolated, durable
ADM One-NDS Administrator
API application programming interface
ASCII American standard code for information interchange
ASN.1 abstract syntax notation one
B&R backup and restore
BE-DSA back-end DSA
BSS business support system
CAPEX capital expenditure
CCC customer care center
CFG configuration block
CMS core mobility server
CN core network
C-NTDB common network technology database
CORBA common object request broker architecture
CPU central processing unit
CRM customer relationship management
CSV comma-separated values
DAP directory access protocol
DIB directory information base
DIT directory information tree
DN distinguished name
DOP directory operational binding management protocol
DS directory server
DSA directory system agent
DSE DSA-specific entries
DSML directory services mark-up language
DUA directory user agent
ExP Extension Packages (for PGW)

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 89 (92)


Issue 5.0 Confidential
One-NDS

FE front-end
FM fault management
FTP file transfer protocol
GPRS general packet radio service
GSM global system for mobile communication
GUI graphical user interface
HLR home location register
HOB hierarchal operational binding
HSS home subscriber server
HTTP hypertext transfer protocol
HTTPS hypertext transfer protocol secure
ID identity
IP Internet protocol
IS information system
INS install server
IT information technology
ITU-T International Telecommunication Union, Sector Telecommunication Standardization
LAN local area network
LDAP lightweight directory access protocol
LDIF LDAP data interchange format
NMS Network Management System
NDS Network Directory Server
NEM network element management
NTF notification manager
OAM operation, administration and maintenance
OEM other equipment manufacturers
OS operating system
OSI open systems interconnection
OSS operation support system
PGW provisioning gateway
PGW-DSA provisioning gateway directory system agent
SDK software development kit
sFTP secure FTP
SM System Monitor
SNMP simple network management protocol
SOAP simple object access protocol

90 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0
Abbreviations

SPML service provisioning mark-up language


SQL structured query language
SSH secure shell
SUF software update framework
TLS transport layer security
TCP transmission control protocol
VPN virtual private network
WAN wide area network
X.500 series of distributed directory standards, developed by ITU-T
XML extensible mark-up language

A50016-E4103-D300-5-7618 © Nokia Siemens Networks 91 (92)


Issue 5.0 Confidential
One-NDS

92 (92) © Nokia Siemens Networks A50016-E4103-D300-5-7618


Confidential Issue 5.0

You might also like