System and Method of Providing Services via a Peer-To-Peer-Based Next Generation Network

ABSTRACT

A peer-to-peer network comprises a plurality of intelligent terminal nodes, each intelligent terminal node being operable to establish, maintain, and tear-down communication sessions with another intelligent terminal node, a plurality of network service nodes coupled to the plurality of intelligent terminal nodes, the plurality of network service nodes comprise at least one of the plurality of intelligent terminal nodes, at least one user P2P function module operable to store, locate and distribute service resource information related to user policies, and at least one network P2P function module operable to store, locate and distribute service resource information related to operator provider policies, and operable to exert stricter security control than the at least one user P2P function module.

RELATED APPLICATION

This application claims the benefit of U.S. provisional patentapplication Ser. No. 60/910,101 filed on Apr. 4, 2007.

BACKGROUND

The fundamental principle behind Peer-to-Peer (P2P) networkarchitectures is that the application server functions offered by thenetwork are implemented by a large number of distributed and autonomousnetwork nodes and end nodes called peers, which collaborate with eachother to accomplish the designated tasks. This P2P arrangement is instark contrast with the traditional client-server architecture (e.g.,public switched telephone network (PSTN), IP multimedia subsystem (IMS))in which a large number of clients communicate only with a small numberof centralized, tightly managed servers responsible for performingdesignated tasks.

In the P2P-based network architecture, each peer provides server-likefunctionality and services as well as being a client within the system.In this way, the services or resources that would be provided by acentralized entity are instead available from the peers of the system.

BRIEF DESCRIPTION OF THE DRAWINGS

Aspects of the present disclosure are best understood from the followingdetailed description when read with the accompanying figures. It isemphasized that, in accordance with the standard practice in theindustry, various features are not drawn to scale. In fact, thedimensions of the various features may be arbitrarily increased orreduced for clarity of discussion.

FIG. 1 is a high-level block diagram of an embodiment of the P2P-basednext generation network described herein;

FIG. 2 is a high-level message flow diagram of an embodiment of asession setup process in the P2P-based next generation network;

FIG. 3 is a high-level message flow diagram of an embodiment of anapplication provisioning process in the P2P-based next generationnetwork;

FIG. 4 is another high-level block diagram of an embodiment of theP2P-based next generation network;

FIG. 5 is a more detailed block diagram of an embodiment of theP2P-based next generation network;

FIG. 6 is another more detailed block diagram of an embodiment of theP2P-based next generation network;

FIG. 7 is a high-level message flow diagram of an embodiment of adynamic class of service (CoS) process in the P2P-based next generationnetwork;

FIG. 8 is a high-level message flow diagram of an embodiment of aprocess to provide content security in the P2P-based next generationnetwork;

FIG. 9 is a diagram of an embodiment of a service offering environmentin the P2P-based next generation network; and

FIG. 10 is a block diagram of an embodiment of multi-registration ofsmart terminal nodes in the P2P-based next generation network.

DETAILED DESCRIPTION

The P2P-based next generation network (NGN) described herein supportsthe delivery of multimedia and communication services, and furthermaintains the robustness, easy-access to resources, and scalability of atraditional P2P network. The P2P-based next generation networkarchitecture is based on the assumption that all of its participants ornodes are ephemeral in nature because the edge nodes of the network canjoin, leave, and fail at any time. Therefore, the network is designed tooperate with minimal impact when failures occur. Further, efficientalgorithms are used in the P2P-based next generation network forresource lookup such as, for example, obtaining the IP address of asubscriber. As each participant or node is responsible for centralprocessing unit (CPU) resource and storage, the P2P-based nextgeneration network can scale from very small to very large without anyadded resources from each service provider. In other words, the usersare responsible for part of the capital and operational expenditures ofoperating the network.

With the advent of intelligent terminals that are capable of performingmany application services locally without resorting to centralizednetwork servers offered by the service provider, it is essential toidentify the core values of a “service provider” network. An intelligentterminal in this context is any device that has processing power, andtypically has memory, and some form of wired or wireless communicationcapabilities, such as desktop computers, laptop computers, palmtopcomputers, mobile telephones, smartphones, SIP phones, and set-topboxes.

A high-level diagram of the P2P-based next generation network 10 isshown in FIG. 1. P2P-based next generation network 10 includes aplurality of nodes 12-19 show as video application node 12, provider'snodes 13, 15, and 18, intelligent terminals 14, 16, and 19, and anapplication node 17. These network nodes 12-19 are physically connectedto other nodes via a variety of connection media such as copper, fiberoptics, and all forms of wireless media. Upon the physical connectivityof the network nodes, there are P2P agents 20-34 “overlaid” on eachnode. Each P2P agent serves a specific purpose, such as providingdirectory information, Centrix services, video services, and providingprovider-only information, for example. In the P2P-based network, theconcept of “resources” is important. Everything can be considered as a“resource.” For example, the current IP address of an active subscribercan be viewed as a resource, which maps the telephone number or auniform resource identifier (URI) into the IP address. The directory ofa Centrex can also be viewed as a resource, which maps the short numberto an IP address. Likewise, a multimedia file can be viewed as aresource. The application server that provides certain services, e.g.file storage or billing server, can also be viewed as a resource. Thestrength of the P2P network is its capability to locate, distribute, andstore those resources.

With intelligent terminals 14, 16, and 19, the terminals themselveslocate the service or resource and invoke the service directly byconnecting to them. Intelligent terminals can make the communicationconnection once the called party's IP address is located or identified.Another example of resources includes a fragment of an IPTV program. Atthe conceptual level, the intelligent terminal nodes are responsible formost of the session handling which alleviate the need to have sessionstate in the provider's network. All the resources (e.g. subscriber'scurrent IP address, TV fragments, file fragments, billing records,services, etc.) are distributed in the network, which encompasses allthe equipment involved. Different equipment may be only responsible fordifferent resources (e.g. subscriber's current IP address may have to belimited to be distributed inside the provider's network). Equipment inthe network may contain P2P networking component (shown as P2PF in thearchitecture discussed later). In this setup, we utilize the keyfunctions of the P2P network—distributing, locating, and storing files(or resources).

P2P-based next generation network 10 has, as much as possible, all ormost of the intelligence in the network edge nodes or the intelligentterminals. If it is not possible to put all the intelligence into theedge nodes, then build all the intelligence into the first-hop nodes(e.g., home gateway and access points) and the edge nodes. However, ifit is not possible to put all the intelligence into the edge andfirst-hop network nodes, then build the intelligence into the next-hopnodes (e.g. DSLAM/Edge routers) as well as the first-hop, and edgenodes. The very last choice is to put the intelligence into the serversin the core of the network (e.g. S-CSCF, Application Servers, mediaservers).

FIG. 2 is a high-level message flow diagram of an embodiment of asession setup process in the P2P-based next generation network. A firstintelligent terminal 40 establishes a communication session with asecond intelligent terminal 42 via a service stratum 44 and a transportstratum 46 of the network. The intelligent terminals has theintelligence to perform communication session set-up, maintenance, andtear-down. Traditional value-added service features, such as sessionblocking, session forwarding, can also be implemented on the intelligentterminals. Other traditional value-added services, such as caller IDblocking, can be realized by service agent or relay equipment inside thenetwork. The network may also provide default IP addresses for terminalsthat are not on-line for session forwarding purposes. As shown in FIG.2, core functions of service stratum 44 includes directory lookup,authentication, charging processing, and quality of service (QoS) orresource control. For any given user ID, an IP address is provided ifthe user can be located, other session setup-related information canalso be included in the lookup. Further, during terminal registration,the user terminal is authenticated for security considerations. TheP2P-based next generation network performs the task of authenticatingall the parties involved in the communication connection, such asauthenticating the identities of the caller and called parties. Ingeneral, this task is not performed by the intelligent terminals becausethey are deemed untrustworthy. Further, while charging information iscollected by the intelligent terminal, the processing of the charginginformation is done by service stratum 44 of the network. Additionally,the control of QoS or network transport resources is also performed byservice stratum 44 of the network. The control may be segment-by-segmentor end-to-end.

By pushing intelligence of the network to the edge nodes, or theterminals, service stratum 44 may eliminate the need to maintain thesession state information, which improves network scalability,robustness and performance. The boundaries of service stratum 44 may notnecessarily stop at the boundaries of transport stratum 46, but mayreach far into the transport networks.

FIG. 3 is a high-level message flow diagram of an embodiment of anapplication provisioning process in the P2P-based next generationnetwork. First intelligent terminal 40 first obtains or looks up the IPaddress or service ID for service XYZ. The user of intelligent terminal40 then uses the service ID to invoke or connect to the XYZ service.This user-centric model provides more flexibility of service selectionand end-user experience, but also decreases the burden of servicestratum 44 and potentially increases the scalability and robustness ofthe network.

FIG. 4 is another high-level block diagram of an embodiment of theP2P-based next generation network 10. Network 10 includes servicestratum 44 and transport stratum 46 as described above, and furtherend-user functions and applications 50 as well as push applications 52.End-user applications 50 reside in the intelligent terminals and enablesthe functionalities described above. Further, push applications 52 innetwork 10 uses service and transport strata 44 and 46 to “push” ordeliver content to subscribers from service providers. For example,advertisement may be pushed and inserted into media streams delivered tosubscribers' intelligent terminals depending on subscription options.

FIG. 5 is a more detailed functional block diagram of an embodiment ofP2P-based next generation network 10. Service stratum 44 of network 10includes an NGN terminal emulation function 60 to provide support tolegacy terminals 62 such as dumb terminals in the network. Howeverterminal emulation function 60 may be phased out gradually as moreintelligent terminals 40 are deployed in the network and the number oflegacy terminals 62 decreases. Because legacy terminal support isisolated in the network and not distributed across various networkcomponents, it is a straight forward process to phase out and eliminatethis function in the network. Directory service function 64 provides thedirectory lookup service described above. Directory service function 64services the terminals directly.

Directory service function 64 is operable to communicate with serviceprovider directory lookup services for called party information if theinformation is not available locally. Managed VPN services can also beachieved via proper manipulation and management of the directory lookupfunction. Network 10 also includes accounting information processingfunctions 66. Accounting information processing functions 66 receive thecharging information related to subscribers' communication activitiesfrom the intelligent terminals and generate an accounting statementbased on the provided information. These activities may includebest-effort communication sessions and sessions in which dynamic classof service (CoS) is provided. Accounting information processingfunctions 66 may also perform audits of data gathered and stored on theintelligent terminals to ensure the integrity of the accounting/charginginformation.

Authentication in network 10 may be performed by an authenticationfunction 68, which may straddle service and transport strata 44 and 46,as shown in FIG. 5. Authentication function 68 may be similar to networkattachment control functions (NACF) and/or resource and admissioncontrol functions (RACF) proposed in ITU-T Recommendation Y.2012 butmodified to support mobility and different means of access mechanisms ofthe intelligent terminals. Authentication function 68 provides accessand transport layer authentication while service authentication may ormay not be bundled with access and transport authentication. Resourceand policy control function 70 manages QoS for communication andpermission to access certain resources similar to the RACF described inthe Y.2012 Recommendations, but with modifications to cover both themobile and fixed network environment.

Because the air interface bandwidth may be limited, all the mobilehandsets can be viewed as non-P2P end-points and the network providesthe necessary emulation to fit the mobile sets in the P2P networkarchitecture. Roaming for other provider's subscriber can be supportedif authentication can be performed and there is roaming agreementbetween those subscribers. Handovers between packet-based networks canbe established by mobile IP. Handovers between circuit-based networksand P2P-based networks is can be done in a similar fashion as switchingover between an IMS-based network and a circuit-based network. Nomadicusers may access the “home” network services via the Internet. In thiscase, proper authentication mechanisms are provided to ensure security.

Transport stratum 46 of network 10 includes a number of gatewayfunctions 72-78 to provide internetworking with existing networks. Aninterconnect border control function 80 is further provided in servicestratum 44 as an interface to packet network internetworking functions82.

FIG. 6 is another more detailed block diagram of an embodiment ofP2P-based next generation network 10. P2P-based next generation network10 is characterized by the concept that no session state information ismaintained in the network, with possible exception of the sessionadmission control (SACF) component and POTS_AF (POTS Access Function).All the session-related information for intelligent terminals 40 arecontrolled by USIPF (User SIP Function) 84 and UPF (User PolicyFunction) 86. This simplifies network design and increases thescalability of the network. UP2 PF (User P2P Function) 90 is thecomponent or function that stores, locates, and distributes resourceinformation (e.g. IP addresses of a given subscriber, a fragment of IPTVprogram, etc) and is associated with user policy function (UPF) 85.Intelligent terminal 40 further includes a charging function 86 operableto collect all service charges, dynamic CoS charges, and session-basedcharges. Intelligent terminal 40 further includes a user interfacefunction (UIF) 87 that provides a display and user input devices such askeyboard, keypad, touch-sensitive display or pad, pointing devices, forexample. NP2 PF (Network P2P Function) 92 may exert stricter securitycontrol than that of UP2 PF and is associated with the operatorprovider's policy decision function (PDF) 94. Policy decision function94 provides centralized policy control, which bridges the applicationand the subscribers. Those policies represent service provider's policywhile the user personalized policy can be implemented in the intelligentterminals.

The architectural entity POTS Access Function (POTS-AF) 60 is similar orequivalent to NGN terminal emulation function 60 shown in FIG. 5.Function 60 emulates next generation network terminal function for thetraditional POTS terminals. This function can be easily fulfilled by asoft switch upgraded with the P2P-related software.

The PSTN gateway (GW) function 96 provides internetworking between theP2P-based next generation network and the PSTN for the voice componentof the communication sessions. Mobile circuit-switched (CS) gateway 98provides support for inter-connectivity between the P2P-based nextgeneration network and the current mobile circuit switched network. Itmay additionally provide home subscriber server (HSS) emulation for themobile circuit switched network.

The ETSI NASS (Network Access Subsystem) 68 provides user authenticationin the P2P-based next generation network. The Session Admission ControlFunction (SACF) 100 supports dynamic CoS and ensures QoS, described indetail below. The P2P-based next generation gateway 102 connects withother providers' P2P networks 104, which may have different P2P topologystructure and different P2P search mechanisms. An Internet gateway 106provides connectivity via the Internet where security needs to beenhanced. An IP multimedia subsystem (IMS) gateway 108 providesconnectivity to an IMS for delivering Internet protocol multimedia tothe users.

As described above, charging function (CF) module 66 receives charginginformation from the intelligent terminals, and does not maintain theintermediate state of a session. Charging information is a type ofresources which can be stored, located, and distributed by the P2PF.This resource will be generated by core border gateway (CBGF) 72 orother components and send to NP2PF for storage and distribution. Aplurality of charging servers can be used in the network to remove thoseresources once the charging information has been properly stored andprocessed. The items to be charged are based on operator's policy.On-line charging is possible via a proper credit system. Thesubscriber's credit is also a “resource” to be distributed by the NP2PF.The subscriber may replenish his/her credit for acquiring resources andservices in the network.

A media insertion function (MIF) 110 is a push application that isresponsible for storing, distribution, insertion or deletion of certainmedia content into the media stream. One example of MIF is the insertionof advertisement for the video media for certain classes of subscribers.

FIG. 7 is a high-level message flow diagram of an embodiment of adynamic class of service (CoS) process in P2P-based next generationnetwork 10. The P2P-based next generation network provides dynamic classof service (CoS) capability with monetary repercussions. For example,the caller or the called party can dynamically adjust the differentiatedservices code point (DSCP) in the DiffServ network, which has higher (orlower) fee associated with the connection. The user can initiate therequest, which is then enforced on the network side in order to preventCoS theft.

The subscriber has the ability to modify the CoS for both the trafficoriginating and terminating on the subscriber for any particularsession. If the user intends to have better services, he or she requestbetter service with the network. The network in turn will advice the newcharging policy for the better service. Alternatively, the intelligentterminal may have the cost data to respond to the user's request forhigher CoS directly. If the customer agrees upon the better CoS costs,the service quality (CoS) provided to the customer is improved. Theintelligent terminal collects data associated with the upgrade incommunication quality, such as session start time and stop time and theupgraded class, for example, for billing purposes. In order to supportdynamic CoS, the subscriber or the intelligent terminal issues re-INVITEwith new DSCP marking, and the response also contains the new DSCPmarking. The network may snoop those SIP messages (or proxy thosemessages) to modify the DSCP marking, in accordance with the operator'spolicy and charging model.

FIG. 8 is a high-level message flow diagram of an embodiment of aprocess to provide content security in the P2P-based next generationnetwork. Generally, the P2P-based next generation network describedherein further extends the P2P network concept to the carriers toaddress the issue of security of the contents. In existing P2P-basedcarrier networks, the access user information is shared between users.It is therefore potentially possible to have users to use the userinformation for unintended purposes.

The basic assumption of a secure P2P-based next generation network is anestablished public key infrastructure. For any originator, its publickey would be available to all the elements participating in the P2Poperation. If the user's intelligent terminal does relay or originatethe P2P content, the originator of the content needs to attach a digitalsignature using its private keys. The consumer of the P2P content needsto obtain the public key of the originator and verify the content. Inthis case, the originator needs to put its identification (e.g. URI) inthe P2P content for verification purposes. Other mechanisms may alsoavailable to deal with the security issue but the public keyinfrastructure may be mature enough to be implemented. It should benoted that the subscriber to public key mapping can also be shared bythe P2P network. But the originator has to be the provider's secureequipment and its public key can be obtained via any service provider'sequipment (e.g. CBGF, etc).

FIG. 9 is a diagram of an embodiment of a service offering environmentin the P2P-based next generation network. One of the key strength of P2Pnetwork is its capability to provide applications, with littlemodification in the core network, both from the logic point of view andfrom the data point of view. In contrast, for IMS-based networks, thedata in HSS needs to be modified for any new applications for S-CSCFtriggering purposes. In the P2P based next generation networkarchitecture, if any new services are to be provided, the newapplication can be connected to the existing network as shown in FIG. 9.The xP2PF indicates that the entity can be either NP2PF or UP2PF.

In this environment, the services can be added or removed with littleinvolvement in the networking equipment, both from logic (programming)point of view and from data (data fill) point of view. The serviceproviders can be the same as that of the access network provider, of thecore network provider, or of the 3rd party.

FIG. 10 is a block diagram of an embodiment of multi-registration ofsmart terminal nodes in the P2P-based next generation network. Forintelligent terminals, it is also possible to register with multipleservice providers. The capability of multiple registrations on theintelligent terminal will enable diverse business model which is notpossible in the current application environment. It is also enable theservice provider's to extend the usage base with minimum investment.

Emergency communication in P2P-based next generation network 10 can beachieved via direct connectivity between the intelligent terminal andthe public safety access point (PSAP), with its IP address can beprovided via DHCP or during initial network access (e.g., authenticationphase). If the PSAP is time-division multiplexed (TDM) only, the IPaddress of the gateway, which is responsible for the IP to TDMinternetworking, will be provided. In this case, the intelligentterminal contacts the IP address (the gateway controller) directly. Itis up to the operator's policy whether such address is to be provided,and if such communication is to be performed (if the gate controlled byCBGF is to open).

Although embodiments of the present disclosure have been described indetail, those skilled in the art should understand that they may makevarious changes, substitutions and alterations herein without departingfrom the spirit and scope of the present disclosure. Accordingly, allsuch changes, substitutions and alterations are intended to be includedwithin the scope of the present disclosure as defined in the followingclaims. In the claims, means-plus-function clauses are intended to coverthe structures described herein as performing the recited function andnot only structural equivalents, but also equivalent structures.

1. A peer-to-peer network comprising: a plurality of intelligentterminal nodes, each intelligent terminal node being operable toestablish, maintain, and tear-down communication sessions with anotherintelligent terminal node; a plurality of network service nodes coupledto the plurality of intelligent terminal nodes, the plurality of networkservice nodes comprise at least one of the plurality of intelligentterminal nodes; at least one user P2P function module operable to store,locate and distribute service resource information related to userpolicies; and at least one network P2P function module operable tostore, locate and distribute service resource information related tooperator provider policies, and operable to exert stricter securitycontrol than the at least one user P2P function module.
 2. The networkof claim 1, further comprising a charging module coupled to theplurality of intelligent terminal nodes and operable to receive charginginformation for received services collected by the plurality ofintelligent terminal nodes, and providing billing functionality for thereceived services.
 3. The network of claim 2, wherein the chargingmodule is operable to process costs associated with dynamic CoS servicein a communication session between two intelligent terminal nodes. 4.The network of claim 1, further comprising a directory service modulecoupled to the plurality of intelligent terminal nodes and operable tolook up and provide location of service resources to the plurality ofintelligent terminal nodes.
 5. The network of claim 1, furthercomprising an authentication module coupled to the plurality ofintelligent terminal nodes and operable to authenticate an intelligentterminal node providing a service resource to another intelligentterminal node.
 6. The network of claim 1, further comprising a mediainsertion module coupled to the plurality of intelligent terminal nodesand operable to insert media into a communication session between twointelligent terminal nodes.
 7. The network of claim 1, furthercomprising: at least one dumb terminal node; and a terminal emulationmodule coupled to the at least one dumb terminal and operable to enablethe at last one dumb terminal node to establish communication sessionswith the plurality of intelligent terminal nodes.
 8. The network ofclaim 1, further comprising a PSTN gateway coupled to the plurality ofintelligent terminal nodes and operable to provide interface to a PSTNnetwork.
 9. The network of claim 1, further comprising a mobilecircuit-switched gateway coupled to the plurality of intelligentterminal nodes and operable to provide interface to mobilecircuit-switched networks.
 10. The network of claim 1, furthercomprising an Internet gateway coupled to the plurality of intelligentterminal nodes and operable to provide interface to the Internet. 11.The network of claim 1, wherein each intelligent terminal node comprisesa user SIP module and user policy module operable to controlsession-related information.
 12. The network of claim 1, furthercomprising a session admission control module coupled to the pluralityof intelligent terminal nodes and operable to maintain session stateinformation.
 13. The network of claim 1 further comprising a centralizedpolicy control module coupled to the plurality of intelligent terminalnodes and operable to maintain and control provider policies.
 14. Acommunication network comprising: a plurality of intelligent terminalnodes, each intelligent terminal node being operable to establish,maintain, and tear-down communication sessions with another intelligentterminal node, and further collect charging information associated withthe communication sessions; a network service stratum coupled to theplurality of intelligent terminal nodes and operable to locate resourceservices, perform billing functions, and authenticate providers ofresource services in the network; and a network transport stratumoperable to couple the plurality of intelligent terminal nodes toresource services in the network.
 15. The network of claim 14, whereinthe network service stratum comprises a charging module operable toprocess costs associated with resource services and dynamic CoS servicein a communication session between two intelligent terminal nodes. 16.The network of claim 14, wherein the network service stratum comprises adirectory service module coupled to the plurality of intelligentterminal nodes and operable to look up and provide location of serviceresources to the plurality of intelligent terminal nodes.
 17. Thenetwork of claim 14, wherein the network service stratum comprises anauthentication module coupled to the plurality of intelligent terminalnodes and operable to authenticate an intelligent terminal nodeproviding a service resource to another intelligent terminal node. 18.The network of claim 14, wherein the network service stratum comprises amedia insertion module coupled to the plurality of intelligent terminalnodes and operable to insert media into a communication session betweentwo intelligent terminal nodes.
 19. The network of claim 14, wherein thenetwork service stratum comprises a terminal emulation module coupled toat least one dumb terminal in the network and operable to enable the atlast one dumb terminal node to establish communication sessions with theplurality of intelligent terminal nodes.
 20. A method of providingservices in a peer-to-peer network, comprising: authenticating a firstintelligent terminal node as a service provider adapted to provide aservice; receiving a request for an identifier of the service providerfrom a second intelligent terminal node of the network; looking up therequested identifier of the first intelligent terminal node andtransmitting the requested identifier to the second intelligent terminalnode; enabling the second intelligent terminal node to initiate acommunication session with the second intelligent node terminal;receiving a request from the second intelligent terminal node to improvethe quality of the communication session and enabling the requestedimprovement; and receiving charging information related to charges forthe communication session and the session improvement and generatingbilling information in response to the charging information.