Fact-checked by Grok 2 weeks ago

Diameter Credit-Control Application

The Diameter Credit-Control Application (DCCA) is a standardized extension to the Diameter protocol that enables real-time credit-control for a variety of end-user services in telecommunications networks, including network access, SIP sessions, messaging, and multimedia services, primarily supporting prepaid charging scenarios through interactions between credit-control clients and servers. Defined in RFC 8506 (March 2019), which obsoletes the earlier RFC 4006, the DCCA facilitates online charging by allowing service providers to authorize, reserve, and deduct credit units dynamically during service delivery, ensuring accurate billing and resource allocation without relying on post-service accounting. It operates via two primary commands: the Credit-Control-Request (CCR, command code 272), sent by the client to request credit authorization or report usage, and the Credit-Control-Answer (CCA), returned by the server to grant units or confirm actions. Key features include session-based credit-control for ongoing services (using INITIAL_REQUEST, UPDATE_REQUEST, and TERMINATION_REQUEST) and one-time event credit-control for discrete events (via EVENT_REQUEST), along with mechanisms for credit reservation, direct debiting, refunds, balance inquiries, and service price queries. In practice, the DCCA is integral to 3GPP-defined interfaces for online charging systems, such as the reference point between application front-ends and the Online Charging System (OCS), and the interface between the Policy and Charging Enforcement (PCEF) and OCS, where it supports debit/reserve operations and integrates with additional AVPs for enhanced functionality like tariff changes and final-unit actions. Failure handling for communication issues is addressed through the Credit-Control-Failure-Handling AVP, which specifies actions such as TERMINATE, CONTINUE, or RETRY_AND_TERMINATE to manage service continuity when communication fails. For credit depletion, the Final-Unit-Action AVP specifies TERMINATE, REDIRECT, or RESTRICT_ACCESS. The application emphasizes multiple-service support within a single session via the Multiple-Services-Credit-Control AVP, enabling efficient management of diverse services like voice, data, and content downloads using rating groups and credit pools. While focused on authorization, it excludes service-specific or non--related authorization, making it a foundational component for real-time charging in modern mobile and networks.

Introduction

Overview

The Diameter Credit-Control Application (DCCA) is a standardized extension of the Diameter protocol designed to enable real-time credit-control for a wide range of end-user services, including network access, IP connectivity, and multimedia sessions. It operates as a specific Diameter application identified by Application-ID 4, which nodes advertise during capability exchange to support online charging mechanisms. By integrating with the Diameter base protocol defined in RFC 6733, DCCA facilitates secure, reliable transport and message routing for credit-related interactions without altering the underlying protocol's core functions. This application ensures that service providers can monitor and manage subscriber credit in real time, preventing unauthorized usage and enabling prepaid service models. The primary objectives of DCCA are to authorize service units—such as time, data volume, or discrete events—before granting access, reserve appropriate amounts to cover anticipated consumption, and report actual usage for accurate deduction or refunding. These functions collectively mitigate the of overspending by verifying availability at the start of a service and adjusting reservations dynamically based on ongoing usage patterns. For instance, in a voice call or data session, the application checks and reserves upfront, then updates the balance as the service progresses to maintain financial control. Architecturally, DCCA defines two key roles: the Credit-Control Client, typically hosted in network elements like gateways or proxies (e.g., a for IP connectivity or a SIP proxy for multimedia sessions), which initiates requests for credit authorization and reports usage; and the Credit-Control , located in backend charging systems (e.g., a prepaid in the home domain), which evaluates credit, performs rating, and responds with grants or denials. Examples of supported services include voice calls, data sessions for , and content downloads, where real-time interactions ensure seamless yet controlled delivery.

Historical Development

The Diameter Credit-Control Application was initially specified in RFC 4006, published in August 2005 by the (IETF) Authentication, Authorization, and Accounting (AAA) Working Group. This document introduced a application designed to enable credit-control mechanisms for end-user services, such as network access and session-based charging, addressing the need for dynamic quota management in emerging multimedia and data services. The specification built upon earlier applications, including the Network Access Server Requirements (NASREQ) defined in RFC 4005, which provided foundational and frameworks that the credit-control application extended for prepaid and billing scenarios. RFC 4006 was obsoleted by RFC 8506 in March 2019, which updated the protocol to reflect advancements in the base protocol (RFC 6733). Key revisions in RFC 8506 included modernizing terminology (e.g., replacing "event" with "one-time" for non-session-based requests), clarifying the usage of Attribute-Value Pairs (AVPs) in various scenarios, resolving ambiguities in failure handling procedures, and ensuring compatibility with enhanced Diameter routing and transport features. These changes aimed to improve interoperability and robustness in deployments, mandating support for the updated application in all new implementations while maintaining for legacy systems. Prior to obsoletion, RFC 4006 accumulated errata to address minor issues in its original text, such as an editorial clarification in Section 5.6.2 requiring the explicit addition of "AVP" after "Granted-Service-Unit" to prevent vendor-specific misinterpretations of AVP formatting (Errata ID 3329). Although superseded, these errata remain relevant for legacy implementations still referencing the 2005 specification. As of May 2024, no major IETF updates to the core Diameter Credit-Control Application specifications have occurred since RFC 8506. The protocol continues to be actively utilized and referenced in standards from organizations like (e.g., TS 32.299 for online charging management) and .

Core Concepts

Credit-Control Models

The Diameter Credit-Control Application defines several models for managing and , enabling the to user consumption in . These models support flexible debit mechanisms tailored to different service types, ensuring accurate charging while minimizing risks associated with credit allocation. In the direct debit model, the server authorizes and debits the exact service units requested by the client upon each service event, without reserving additional credit. This approach is particularly suited for low-risk, event-based scenarios, such as sending an or storing an , where the service outcome is guaranteed and immediate debiting suffices. The reservation and refund model involves the client reserving a quota of units from the prior to delivery, followed by reporting actual usage and refunding any unused portions. If the granted quota is depleted, the client initiates re-authorization to obtain additional , allowing continued while maintaining accurate . This model is applied in scenarios requiring upfront credit assurance, such as voice calls or data sessions. The general event-based model performs a one-time credit check and debit for discrete, low-risk events that do not require ongoing session state, such as an transmission or a Advice of Charge request. The client sends a single request to the , which validates and deducts the necessary without establishing a persistent session. Failure handling in these models ensures robust service management during credit exhaustion or server errors, as specified in Section 5.7 of RFC 8506. Communication failures (e.g., no response to a Credit-Control-Request) are managed via the Credit-Control-Failure-Handling AVP, with values TERMINATE (0), CONTINUE (1), or RETRY_AND_TERMINATE (2); a rejected credit-control request (e.g., due to insufficient funds) requires the client to terminate the session to prevent unauthorized service. For credit exhaustion, the server indicates the final unit via the Final-Unit-Indication AVP with Final-Unit-Action set to TERMINATE (0), REDIRECT_AND_STOP (1), REDIRECT_AND_CONTINUE (2), or CONTINUE (3), directing the client to end, redirect (e.g., to top-up), or maintain the session. For direct debiting in event-based models, the Direct-Debiting-Failure-Handling AVP specifies TERMINATE_OR_BUFFER (0) or CONTINUE (1). Credit pooling extends these models by allowing multiple services or rating groups to share a single pool of credit resources, facilitated through grouped AVPs that reference a common pool identifier. This mechanism enables independent re-authorization for each service while drawing from the shared pool, optimizing credit utilization across diverse applications.

Charging Mechanisms

The Diameter Credit-Control Application supports two primary charging paradigms: session-based charging for continuous services and event-based charging for discrete transactions. Session-based charging provides ongoing for services measured by time, volume, or other units, such as data roaming sessions. It begins with an initial of units before the service starts, followed by optional interim updates to report usage and request additional quota as units are consumed or validity periods expire, and concludes with final accounting upon service termination to settle any remaining balance, including refunds for unused units. In contrast, event-based charging handles one-off authorizations for non-session-oriented s, such as purchasing premium content, through a single request-response exchange without maintaining ongoing state. This mechanism directly debits the account or performs checks like balance verification and enquiries upon event occurrence, ensuring immediate processing without subsequent monitoring. The key differences lie in their state management: session-based charging is stateful, requiring the credit-control server to track ongoing sessions and issue re-authorizations, while event-based charging is stateless, relying on isolated transactions. Triggers for session-based charging include service initiation, unit depletion, validity-time expiry, or session closure, whereas event-based charging activates solely on the occurrence of a discrete service . The application also enables multi-service support within a single session, allowing independent handling of multiple charging units—such as time and volume—through distinct service identifiers to apply granular credit control without session fragmentation.

Protocol Elements

Command Codes

The Diameter Credit-Control Application defines specific command codes within the Diameter protocol framework to facilitate online and offline credit-control operations between clients and servers. These commands are routed using Application-ID 4 in the Diameter message header, ensuring peer authentication and proper handling via the base protocol mechanisms. The primary commands are the and Credit-Control-Answer (CCA), both utilizing Command-Code 272. The , with the 'R' (Request) flag set in the message header, is sent by the credit-control client to the to request service authorization, report usage, or manage session states, including initial setup, interim updates, termination, or one-time events. The , with the 'R' flag cleared, serves as the server's response, providing granted service units, cost estimates, or indications for final unit depletion, and may include the 'T' (Potentially re-transmitted) flag for messages susceptible to retransmission in scenarios. These commands support credit-control models through AVPs such as CC-Request-Type to specify request variants (e.g., INITIAL_REQUEST or TERMINATION_REQUEST). For integration with offline charging, the application leverages the base Diameter Accounting-Request (ACR) and Accounting-Answer (ACA), both with Command-Code 271. The ACR, with 'R' flag set, enables the client to report service usage events or session records to an when online credit-control is unavailable or as a backup mechanism, incorporating credit-control specific AVPs for failure handling. The ACA, with 'R' flag cleared, acknowledges the ACR, confirming receipt without granting credits. These commands are not exclusive to credit-control but extend base to support hybrid charging scenarios. Error handling in credit-control commands relies on the base protocol's Result-Code AVP, with application-specific values such as DIAMETER_CREDIT_LIMIT_REACHED (4012), which signals the exhaustion of subscriber credit and prompts session teardown or redirection via a TERMINATION_REQUEST . Other errors, like DIAMETER_RATING_FAILED (5031), are reported in responses, often accompanied by Failed-AVP for diagnostics. RFC 8506 provides clarifications and obsoletes certain ambiguous usages from RFC 4006, such as refined failover procedures for / during server unavailability, while retaining the core command codes and emphasizing support for multiple concurrent services without deprecating the 272 or 271 codes.
CommandCode'R' FlagPrimary Purpose
272SetRequest authorization or usage
272ClearedRespond with granted units or
Accounting-Request (ACR)271SetReport usage for offline
Accounting-Answer (ACA)271ClearedAcknowledge reports

Message Flows

The Diameter Credit-Control Application employs request-response patterns primarily using and messages to manage credit for end-user services. These flows support both session-based and event-based charging mechanisms, enabling the credit-control client (typically in the ) to interact with the credit-control server (in the ) for quota allocation, usage reporting, and policy enforcement. In the initial session flow, the credit-control client sends a message with the CC-Request-Type set to INITIAL_REQUEST prior to service delivery, requesting quota for the session setup. The server responds with a message containing granted service units and instructions, using the Result-Code AVP to indicate success (2001, DIAMETER_SUCCESS) or denial of service (e.g., END_USER_SERVICE_DENIED). This establishes the session state and reserves for the . For re-authorization during an active session, the client initiates an interim flow by sending a with CC-Request-Type UPDATE_REQUEST when the granted quota is nearing exhaustion, conditions change, or periodic reporting is required. The server replies with a that may renew quota via additional Granted-Service-Unit AVPs, adjust validity times, or issue final unit indications, again using Result-Code for success or other codes for limited success requiring further action. This ensures continuous service without interruption. The termination flow occurs at session end, where the client sends a CCR with CC-Request-Type TERMINATION_REQUEST to report final used units and request any refunds or cost information. The server responds with a confirming closure, potentially including Cost-Information AVPs, and Result-Code 2001 to acknowledge successful termination. If a Final-Unit-Action was previously set to TERMINATE, the service is gracefully shut down. Event-based flows handle one-time charging events, such as balance checks or direct debiting, without maintaining session state. The client sends a single with CC-Request-Type EVENT_REQUEST, and the server responds with a providing the requested outcome, such as refunded units or status confirmation, using Result-Code 2001 for success or CREDIT_CONTROL_NOT_APPLICABLE for inapplicable requests. Failure scenarios in these flows are managed through policies defined in the Credit-Control-Failure-Handling AVP, which dictates client actions like terminating service (TERMINATE) or continuing with granted units (CONTINUE) or retrying and then terminating (RETRY_AND_TERMINATE) if a CCA is not received before the transmission timer expires. Redirect handling uses Final-Unit-Indication set to REDIRECT for graceful teardown to an alternative service, while multi-round retries and to backup servers are supported if the CC-Session-Failover AVP indicates FAILOVER_SUPPORTED, with Result-Code 4012 (DIAMETER_CREDIT_LIMIT_REACHED) or similar for credit-related denials. Diameter routing agents, such as relays and proxies, play a crucial role by transparently forwarding and messages between the client and server, provided they advertise support for the credit-control application identifier (4). These agents facilitate by redirecting messages to alternative servers and may issue Result-Code 3006 (DIAMETER_REDIRECT_INDICATION) to guide traffic rerouting during failures.

Attribute-Value Pairs

Credit-Control Specific AVPs

The Diameter Credit-Control Application introduces several Attribute-Value Pairs (AVPs) specifically designed to support credit-control operations, enabling the precise management of service units, request types, and session correlations within () and () messages. These AVPs are defined in RFC 8506 and are mandatory or optional based on their role in the , with the Vendor-Specific (V) bit cleared for all, indicating they are not vendor-specific. Their usage ensures accurate quota allocation, consumption reporting, and multi-service handling in real-time charging scenarios. The CC-Request-Type AVP (AVP Code 416) is of type Enumerated and is used to specify the type of credit-control request in messages, informing the receiver whether it is an INITIAL_REQUEST (1) for session initiation, UPDATE_REQUEST (2) for interim updates, TERMINATION_REQUEST (3) for session closure, or EVENT_REQUEST (4) for one-time events without session state maintenance. It is mandatory in all messages (M-bit set) and may be included in messages for context, but must not have the V-bit set. This AVP helps the credit-control server determine the appropriate response based on the request's purpose. The CC-Request-Number AVP (AVP Code 415) is of type Unsigned32 and provides a sequential identifier for correlating credit-control messages within a single session, starting at 0 for INITIAL_REQUEST or EVENT_REQUEST and incrementing by 1 for each subsequent UPDATE_REQUEST or TERMINATION_REQUEST. It is mandatory in both and messages (M-bit set) to ensure session continuity and is used alongside the Session-Id AVP for unique identification, with the V-bit cleared. This numbering prevents message loss or reordering issues during transport. The Granted-Service-Unit AVP (AVP Code 431) is a Grouped type AVP included in messages to specify the service units (such as time via CC-Time, monetary via CC-Money, or volume via CC-Total-Octets) that the client is authorized to provide to the end user until the next or service termination. It is optional (M-bit cleared) and V-bit must not be set, allowing the server to grant quotas based on and available ; multiple instances may appear if different unit types are authorized. This AVP is central to the session-based charging model, enabling controlled . The Used-Service-Unit AVP (AVP Code 446) is also a Grouped type and is used in messages for the client to report the amount of service units consumed by the user since the start of the session or the last reported event, including sub-AVPs like CC-Time, CC-Money, or CC-Total-Octets for measured usage. It is optional (M-bit cleared), must not appear in messages, and has the V-bit cleared, providing the server with accurate consumption data independent of previously granted units. This reporting supports quota re-evaluation during update requests. For scenarios involving multiple services or rating groups, the Multiple-Services-Credit-Control AVP (AVP Code 456) is a Grouped type that encapsulates related AVPs, such as Granted-Service-Unit, Used-Service-Unit, and Service-Context-Id, to enable independent credit-control for each service within a single message. It is optional (M-bit cleared) in both and messages, with the V-bit not set, and allows multiple instances to handle diverse charging needs simultaneously. This structure is particularly useful in complex environments with varied service types. The Validity-Time AVP (AVP Code 448) is of type Unsigned32 and indicates the duration in seconds for which the granted service units remain valid, typically included in CCA messages to enforce quota expiration and facilitate graceful service termination if credit is low. It is optional (M-bit cleared), applies only to CCA messages, and must have the V-bit cleared, overriding any default validity periods set by policy. This AVP ensures timely re-authorization requests from the client.
AVP NameCodeTypeMandatory in CCR/CCAV-Bit Rule
CC-Request-Type416EnumeratedYes/OptionalMust not be set
CC-Request-Number415Unsigned32Yes/YesMust not be set
Granted-Service-Unit431GroupedNo/OptionalMust not be set
Used-Service-Unit446GroupedOptional/NoMust not be set
Multiple-Services-Credit-Control456GroupedOptional/OptionalMust not be set
Validity-Time448Unsigned32No/OptionalMust not be set

Base Protocol AVP Extensions

The Diameter Credit-Control Application, as defined in RFC 8506, extends and reuses several Attribute-Value Pairs (AVPs) from the Diameter base protocol specified in RFC 6733 to support credit-control operations. These extensions include new enumerated values, specific usage rules, and nesting within grouped AVPs to enable session management, error reporting, and event timing in credit-control scenarios. The Session-Id AVP (Code 263), a UTF8String type from the base protocol, is mandatory in all Credit-Control-Request (CCR) and Credit-Control-Answer (CCA) messages and serves as a globally for credit-control sessions. It remains unchanged throughout the session lifetime and is combined with the CC-Request-Number AVP for message correlation; for credit-control, its format may incorporate service-specific identifiers to distinguish between multiple services in a session. The Origin-Host AVP (Code 264) and Origin-Realm AVP (Code 296), both of DiameterIdentity type, follow their standard base protocol usage as mandatory AVPs in all and messages to identify the sending and its , facilitating and in credit-control interactions between clients and servers. The Result-Code AVP (Code 268), an Unsigned32 type, is extended with credit-control-specific values to indicate success or failure outcomes, including transient and permanent failures. Notable examples include DIAMETER_CREDIT_CONTROL_NOT_APPLICABLE (4011), signaling that no further credit-control is needed (e.g., for free services); DIAMETER_END_USER_SERVICE_DENIED (4010), indicating service denial due to restrictions; DIAMETER_CREDIT_LIMIT_REACHED (4012), used when the credit limit for a service is reached. These values guide client behavior, such as service termination or retry attempts. The Redirect-Host-Usage AVP (Code 292), an , specifies redirection behavior in CCA messages during server failures or graceful termination, with values such as ALL_USER (0) to redirect all user traffic to an alternate host listed in the Redirect-Server AVP (Code 434). This supports rerouting in credit-control flows without abrupt session disruption. The Event-Timestamp AVP (Code 55), a Time type, is optionally included in CCR and CCA messages to record the of credit-control events, particularly in event-based charging scenarios like direct debiting via EVENT_REQUEST, enabling accurate billing correlation. Base protocol AVPs nest within credit-control-specific grouped AVPs according to rules in RFC 8506, which align with RFC 6733's grouping conventions; for instance, AVPs like Session-Id and Result-Code appear at the message top level, while units from Granted-Service-Unit (Code 431) and identifiers from Multiple-Services-Credit-Control (Code 456) encapsulate service-specific details for concurrent credit management. RFC 8506 obsoletes RFC 4006, resolving deprecated usages such as ambiguous Result-Code interpretations and outdated grouping structures by aligning them with 6733 updates, ensuring backward compatibility while clarifying credit-control AVP handling.

Standards and Applications

Primary Specifications

The Credit-Control Application is defined in RFC 8506, published in 2019 by the (IETF), which specifies a framework for implementing real-time credit-control in networks to manage subscriber services such as network access, sessions, messaging, and prepaid accounts. This obsoletes the earlier RFC 4006 and mandates its support in all new implementations, providing mechanisms for credit authorization, usage monitoring, resource allocation, and balance management across event-based and session-based scenarios. Key updates in RFC 8506 from RFC 4006 include revisions to the abstract syntax for better compatibility, enhanced clarification on multi-service handling through the Multiple-Services-Credit-Control AVP to support concurrent services in a single session, addition of illustrative failure code examples for improved error diagnostics, and alignment with the base Diameter protocol in RFC 6733 to ensure interoperability. These changes address ambiguities in prior specifications, such as refined handling of multiple services and updated error reporting, while maintaining backward compatibility where feasible. Security considerations in RFC 8506 emphasize protection against replay attacks using Diameter's sequence numbers combined with the Session-Id AVP to validate message freshness and prevent unauthorized credit manipulations. Confidentiality for sensitive data like monetary values is required, achieved through transport-layer security protocols including for encapsulation, TLS over , or DTLS over SCTP to safeguard credit-control exchanges from or tampering. IANA considerations in the RFC establish dedicated namespaces for the application, as summarized below:
CategoryAllocationReference
Application-ID4 ("Diameter Credit Control")Section 12.1
AVP Codes414–456Section 12.3
Result-Codes5001–5021Section 12.4
These registrations ensure unique identification and avoid conflicts in Diameter deployments. Conformance requirements mandate that all compliant implementations support the core Credit-Control-Request (CCR) and Credit-Control-Answer (CCA) message flows for initial, interim, and final credit-control interactions, forming the basis for both event- and session-based operations.

Implementations and Extensions

The Diameter Credit-Control Application is widely deployed in telecommunications networks through standardized interfaces defined by 3GPP, enabling real-time charging and policy enforcement. The Gy interface facilitates online charging between the Charging Trigger Function (CTF), such as a Packet Data Network Gateway (PGW) or Session Management Function (SMF), and the Online Charging System (OCS), allowing for session-based credit authorization and quota allocation during data sessions. Similarly, the Ro interface supports online charging between IP Multimedia Subsystem (IMS) elements, like the Application Function (AF) or Serving-Call Session Control Function (S-CSCF), and the OCS, handling multimedia service monetization with event- or session-level credit control. The Gx interface, while primarily for policy and charging control (PCC) between the Policy and Charging Enforcement Function (PCEF) and the Policy and Charging Rules Function (PCRF), integrates with credit-control mechanisms to correlate policy decisions with quota management, ensuring dynamic service adaptation based on available credits. In specifications, the TS 32.299 standard profiles the Credit-Control Application for IMS and environments, incorporating enhancements for advanced charging scenarios such as quota management in Standalone () architectures. Version 19.0.0 (October 2025) details offline and online charging applications, ensuring interoperability across networks by extending base commands with telecom-specific parameters for real-time credit reservation and interim reporting. and Next Generation (NG) standards adapt these for environments including (NFV), supporting scalable deployment of virtualized charging functions. Commercial implementations from vendors enhance reliability and performance. Oracle Communications Billing and Revenue Management (BRM) Elastic Charging Engine (ECE) Diameter Gateway implements the Credit-Control Application for Ro and Gy interfaces, mapping Diameter messages to rating logic while supporting fault tolerance through redundant server configurations and load balancing via connection pooling to handle high-throughput sessions. Nokia Service Router Operating System (SR OS), as documented in 2025 releases (e.g., version 25.7), integrates Diameter Credit-Control for Gy-based online charging in broadband network gateways, incorporating features like peer failover and traffic distribution across multiple OCS nodes to maintain service continuity. These implementations ensure compliance with 3GPP profiles while addressing operational needs in carrier-grade environments. Extensions to the protocol accommodate emerging requirements, particularly for network slicing. Custom AVPs, such as those defined in 3GPP TS 32.299, enable slice-specific charging by embedding slice identifiers in Credit-Control-Request () messages over interfaces like Gx, allowing differentiated quotas per slice for services like enhanced (eMBB) or Ultra-Reliable Low-Latency Communications (URLLC). In , DCCA operates alongside service-based interfaces () for charging, such as Nchf defined in TS 32.290. Backward compatibility with RFC 4006 is maintained in legacy networks through mechanisms in RFC 8506, such as optional AVP usage and fallback behaviors, ensuring seamless integration without disrupting existing deployments during migrations. Deployment challenges in high-volume 5G environments center on scalability, where signaling storms from millions of concurrent sessions can overload nodes, necessitating robust overload control as outlined in RFC 8506 implementation guidelines. Testing protocols recommended in RFC 8506 emphasize of failure scenarios and quota exhaustion to validate system resilience, highlighting the need for distributed architectures to manage peak loads in sliced networks.

References

  1. [1]
    RFC 8506: Diameter Credit-Control Application
    Below is a merged summary of RFC 8506: Diameter Credit-Control Application, consolidating all the information from the provided segments into a single, comprehensive response. To maximize detail and clarity, I’ve organized key information into tables where appropriate (e.g., for features, AVPs, and sections), while retaining narrative summaries for context. The response includes all main points, updates, key sections, and useful URLs mentioned across the segments.
  2. [2]
    [PDF] ETSI TS 132 299 V14.6.0 (2018-01)
    The corresponding Diameter Credit-Control application messages for the Debit / Reserve Unit Request operation is. Credit-Control-Request (CCR) and for the ...
  3. [3]
    RFC 8506: Diameter Credit-Control Application
    Below is a merged summary of RFC 8506: Diameter Credit-Control Application, consolidating all information from the provided segments into a single, comprehensive response. To maximize detail and clarity, I’ve organized key information into a table where appropriate, followed by additional details and direct quotes. This ensures all aspects—high-level definition, Application-ID, objectives, roles, protocol reliance, example services, and URLs—are retained and presented efficiently.
  4. [4]
  5. [5]
    RFC 6733: Diameter Base Protocol
    The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or ...
  6. [6]
  7. [7]
  8. [8]
    Information on RFC 4006 - » RFC Editor
    This document specifies a Diameter application that can be used to implement real-time credit-control for a variety of end user services.
  9. [9]
    Information on RFC 4005 - » RFC Editor
    This document describes the Diameter protocol application used for Authentication, Authorization, and Accounting (AAA) services in the Network Access Server ( ...
  10. [10]
    Information on RFC 8506 - » RFC Editor
    This document specifies a Diameter application that can be used to implement real-time credit-control for a variety of end-user services.
  11. [11]
    RFC Errata Report » RFC Editor
    RFC 4006, "Diameter Credit-Control Application", August 2005. Note: This RFC has been obsoleted by RFC 8506 · Source of RFC: aaa (ops). Errata ID: 3329. Status ...
  12. [12]
    Diameter Credit-Control Application RFC 8506 - IETF Datatracker
    Diameter Credit-Control Application (RFC 8506, March 2019)
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
  18. [18]
  19. [19]
  20. [20]
  21. [21]
  22. [22]
  23. [23]
  24. [24]
    RFC 4006 Diameter Credit-Control Application - IETF
    The credit-control server is required to maintain session state for session-based credit- control. 1.3. Advertising Application Support Diameter nodes ...
  25. [25]
  26. [26]
  27. [27]
  28. [28]
  29. [29]
  30. [30]
  31. [31]
  32. [32]
  33. [33]
    RFC 8506: Diameter Credit-Control Application
    Below is a merged response that consolidates all the information from the provided summaries into a single, dense, and organized format. To maximize detail and clarity, I’ve used tables in CSV format where appropriate, ensuring all Result-Code values, numeric codes, descriptions, sources, and URLs are retained. The response is structured to cover all segments comprehensively while avoiding redundancy.
  34. [34]
  35. [35]
  36. [36]
  37. [37]
  38. [38]
  39. [39]
  40. [40]
  41. [41]
  42. [42]
  43. [43]
  44. [44]
  45. [45]
  46. [46]
  47. [47]
  48. [48]
  49. [49]
  50. [50]
  51. [51]
  52. [52]
    [PDF] ETSI TS 132 299 V18.0.0 (2024-05)
    The present document specifies in detail the Diameter based offline and online charging applications for 3GPP networks. It includes all charging parameters, ...
  53. [53]
    Credit Control (Gy//Ro) Application - Mobileum
    The Gy interface is used for online charging between the OCS and the PDN Gateway (PGW), while the Ro interface is between the OCS and the IMS Call Session ...Missing: telecom | Show results with:telecom
  54. [54]
    [PDF] ETSI TS 132 254 V18.4.0 (2025-01) - iTeh Standards
    - The 3GPP Diameter application that is used for Northbound Application Program Interfaces (API) offline and online charging is specified in TS 32.299 [50]. - ...
  55. [55]
    [PDF] ETSI GS NFV-SWA 001 V1.1.1 (2014-12)
    The Gyn reference point allows online credit control for charging. The functionalities required across the Gyn reference point are defined in the ETSI TS ...
  56. [56]
    2 Diameter Credit-Control Application Protocol - Oracle Help Center
    Table 2-1 lists the compliance information for Diameter Credit-Control Application protocol sections. Table 2-1 Diameter Credit-Control Application Protocol ...Missing: 8506 | Show results with:8506
  57. [57]
    Diameter Gy – Credit-Control-Answer (CCA) command
    Jul 17, 2025 · This section describes the Diameter Gy CCA message format as defined in RFC 4006. Strikethrough formatted AVPs should not appear or are ...