DCCA RFC 4006 PDF

Network Working Group H. Hakala Request for Comments: L. Mattila Category: Standards Track Ericsson J-P. Koskinen M. Stura J. Loughney Nokia. For more information, see the Diameter Credit-Control Application protocol specification detail: Opens a new window. RFC Diameter Credit-Control Application August 5. Click here to download RFC TXT format PDF format coming soon. DCCA and Gy.

Author: Daicage Brajinn
Country: Thailand
Language: English (Spanish)
Genre: Business
Published (Last): 8 June 2004
Pages: 277
PDF File Size: 8.35 Mb
ePub File Size: 9.63 Mb
ISBN: 410-2-58432-728-9
Downloads: 99284
Price: Free* [*Free Regsitration Required]
Uploader: Fem

Service specific authorization and authentication is out of the scope. The Hop-by-Hop Identifier is an unsigned bit integer field in network byte order that is used to match the requests with their answers as the same value in the request is used in the response. The ” T ” Potentially re-transmitted message bit — This flag is set after a link failover procedure, to aid the removal of duplicate requests. Therefore, it is assumed that a Diameter credit-control server will provide service only for Diameter credit-control clients that have agreed beforehand as to the content of credit-control messages.

From Wikipedia, the free encyclopedia. Please refer to the current edition of the “Internet Official Protocol Standards” STD 1 for the standardization state and status of this protocol. This page was last edited on 6 Octoberat Diameter is used for many different interfaces defined by the 3GPP standards, with each interface typically defining new commands and attributes.

  DZONGKHA GRAMMAR PDF

Network access is an example of a service offered in the visited domain where the NAS, through an AAA infrastructure, authenticates and authorizes the user with the user’s home network. In case of redirecting agents, the Hop-by-Hop Identifier is maintained in the header as the Diameter agent responds with an answer message. It is used between the Diameter credit-control client and the credit-control server to request credit authorization for a given service.

Adding a new optional AVP does not require a new application. By using this site, you agree to the Terms of Use and Privacy Policy.

RFC – part 1 of 5

The credit-control application defined in this specification supports two different credit authorization models: The server can use the termination message to clear any related reservations made in the back-end balance management system. In addition, there are services such as gaming and advertising that may credit as well dccq debit a user account. This section needs expansion. This method can be used to avoid unnecessary conversions from an existing data format to an AVP format.

Diameter credit- control server. System internal interfaces can exist to relay messages between servers and an account manager. Ddca Credit-control is a mechanism that directly interacts in real-time with an account and controls or monitors the charges related to the service usage. This field indicates the version of the Diameter Base Protocol. After that the transport connection can be disconnected. Interrogation The Diameter credit-control client uses interrogation to initiate a session based dccx process.

  DEATHBEDS WES EISOLD PDF

The intermediate interrogations may be needed to request new quota while the service is being rendered. For session based credit-control, both the credit control client and the credit-control server are required to maintain credit-control session state. Retrieved from ” https: This page was last edited on 19 Octoberat A session-based credit control process uses several interrogations which may include first, intermediate and last interrogation.

The first interrogation is used to reserve money from the user’s account and to initiate the process.

Additionally, application specific state machines can be introduced either later or at a higher abstraction layer. This process is accomplished with session based credit-control that includes the first interrogation, possible intermediate interrogations, and the final interrogation.

Diameter Credit-Control Application

Table of Contents 1. The End-to-End Identifier is an unsigned bit integer field in network byte order that is used to detect duplicate messages along with the combination of the Origin-Host AVP. The specification of another cooperative standardization body e. A Command Code is used to determine the action that is to be taken for a particular message.