Analysis of the radius and diameter protocols in terms of pricing telecommunication services

  • Vesna M. Radonjić Univerzitet u Beogradu - Saobraćajni fakultet
  • Andrijana N. Todosijević
  • Milica R. Petrović
  • Mirjana D. Stojanović Univerzitet u Beogradu - Saobraćajni fakultet
  • Aleksandra M. Kostić-Ljubisavljević Univerzitet u Beogradu - Saobraćajni fakultet
Keywords: functionality, telecommunication networks, real-time monitoring, charging, Protocol architecture, Authentication, Authorization, accounting system,

Abstract


Accounting of telecommunication services is closely related to the functions of authentication and authorization. These functions are usually considered together and implemented within the same server using a common protocol. The most renowned protocols for authentication, authorization and accounting are the RADIUS and Diameter protocols.

 

AAA functions and related protocols

 

In this chapter, the accounting management architecture developed by IETF is presented. It includes the interaction between network elements, accounting servers and billing and charging servers. Accounting data can be used for management, planning and charging users as well as other (specific) purposes. Authentication is the process of confirming a user's digital identity, usually through some type of identifiers and related data. Authorization determines whether a particular entity is authorized to perform an activity.

 

Basic Functions of the RADIUS Protocol

 

The RADIUS architecture is based on a client-server model. It uses UDP on the transport layer. Transactions between the client and the server are authenticated, which is achieved by using a common secret key that is never sent through the network. Given the limited resources available to network devices, RADIUS facilitates and centralizes charging end users, provides some protection against active attacks by unauthorized users and it has great support from different network equipment vendors. Although RADIUS is a widely accepted protocol for the mechanisms of authentication, authorization and accounting, it has certain shortcomings that may be caused by the protocol itself or by its poor implementation.

 

Architecture and Operation of the Diameter Protocol

 

Diameter is a scalable protocol designed by the IETF working group in order to eliminate shortcomings and functional limitations of the RADIUS protocol and eventually to replace it in the near future. Most of the basic Diameter mechanisms and its functionality are based on the fundamental functionality of the RADIUS protocol and the rest is a result of new solutions and improvements to the existing ideas. The Diameter protocol focuses on the expansion of flexible, advanced routing algorithms, dynamic troubleshooting and safety characteristics of the transport layer. This paper defines the basic packet formats, data transfer mechanisms and error management, methods of communication between individual elements of the architecture and basic security functions. The Diameter protocol architecture is based on the peer-to-peer model. Besides clients and servers, network agents can be the elements of this architecture. The Diameter agent is an element that does not allow authentication / authorization locally, but the server performs this operation, while one node can be both the client and the server simultaneously. The role of agents can be forwarding (Relay Agent), redirection (Redirect Agent), mediation (Proxy Agent) and translation (Translation Agent). Since the peer-to-peer model is applied, each Diameter element can establish more connections at the same time. Diameter enables the delivery of attribute value pairs, the possibility of negotiation, error notification, extensibility by adding new commands and attribute value pairs, the basic services necessary for applications such as managing user sessions or accounting.

 

Comparison of the RADIUS and Diameter protocols

 

Although at the protocol market for authentication, authorization and accounting, the RADIUS protocol remains the most popular, its popularity and dominance has a decreasing tendency. The main reasons for this are more prominent limitations which are particularly perceived due to new and increasingly popular technology. Therefore, the main issue is about a protocol that will replace RADIUS. The peer-to-peer architecture used by Diameter is much more flexible than the client-server model because in the peer-to-peer architecture every element can be both the client and the server, depending on the current needs of the network. At the transport layer, Diameter uses the TCP or SCTP protocols. When compared to UDP, these protocols provide reliable transmission which is very important for applications exchanging data related to accounting. In addition, the Diameter protocol allows the transmission of accounting information in real time and it incorporates several methods for troubleshooting in order to minimize the loss of accounting data when a failure occurs, which is not the case with RADIUS. Given the present benefits, introduced improvements, flexibility, expandability, IETF and 3GPP's support and the support of big companies, there is a great chance that Diameter will replace RADIUS.

 

Conclusion

 

This paper presents a general overview of the RADIUS and Diameter protocols, including some of their basic operations with a special emphasis on accounting applications. The similarities of these protocols are reflected in the support of the same functions in a similar format of the packages. The differences are related to the protocol architectures and the methods of determining authentication, authorization and accounting mechanisms. Regarding accounting aspects, the most important advantages of the Diameter protocol are its possibility to transmit accounting information in real time and implemented mechanisms for troubleshooting in order to minimize the loss of accounting data in case of failure. Owing to to these characteristics, the Diameter protocol achieves a significant advantage over RADIUS in next generation networks.

References

Aboba, B., Arkko, J., Harrington, D., Introduction to Accounting Management, RFC 2975 (Informational), IETF, 2000.

Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J., Diameter Base Protocol, RFC 3588 (Standards Track), IETF, 2003.

Hashmathur R., Govardhan, A., Venkat Narayana Rao, T., Design and Implementation of RADIUS – An Network Security Protocol, Global Journal of Computer Science and Technology, Vol. 10, No. 7 Ver. 1.0, pp. 48-54, 2010.

Kumar, V, Harihar, M., Diameter-based Protocol in the IP Multimedia Subsystem, International Journal of Soft Computing and Engineering, Vol. 1, No. 6, pp. 266-269, 2012.

Metz, C., AAA PROTOCOLS: Authentication, Authorization, and Accounting for the Internet, IEEE Internet Computing online, 2001.

Ooms, W., Providing AAA with the Diameter protocol for multi-domain interacting services, Master Thesis, Faculty of Electrical Engineering, Mathematics and Computer Science, Design and Analysis of Communication Systems, University of Twente, 2007.

Pras, A., Van Beijnum, B-J., Sprenkels, R., Parhonoyi, R., Internet Accounting, IEEE Communications Magazine, vol. 39, no. 5, pp. 108-113, 2001.

Rigney, C., RADIUS Accounting, RFC 2139 (Informational), IETF, 1997.

Tuomimäki, J., Overview, Details and Analysis of Radius Protocol, Seminar on Internetworking, pp. 1-16, Helsinki University of Technology, 2003.

Zseby, T., Zander, S., Carle, G., Policy Based Accounting, RFC 3334 (Experimental), IETF, 2002.

Published
2013/06/11
Section
Professional Papers