The Evolution of Session Border Control
|
|
|
- Griffin Strickland
- 10 years ago
- Views:
Transcription
1 The Evolution of Session Border Control
2 The Early Days of SBC Session Border Controllers (SBCs) originated as discrete devices in an IP network to provide two key functions: connectivity and security. Connectivity functions included Network Address Translation (NAT) and protocol repair, and security functions included topology hiding, encryption, and prevention of Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Session Border Controllers were deployed as discrete network elements at the edge of an IP network, where they offered control of the signaling and media streams. In their original form, the controller part of SBC was potentially an overstatement, with the devices normally providing only basic routing functions and limited (or non-existent) media processing capabilities, relying instead on media servers. Furthermore, they de-emphasized call control features in favor of passing through those responsibilities to other nodes in the core of the network. This early role of session control expanded with the recognition of the unique logical and physical position an SBC enjoys in a network which, by its definition, establishes the border of the operator s domain. SBC vendors and network operators alike continue to capitalize on the value that can be unlocked at this location. It simultaneously represents the first point in the network where the operator is free to exert influence on the incoming traffic, ensuring it adheres to their acceptable policies, and the last opportunity to achieve their bi-lateral agreements with the other party. Evolution of SBC Functionality Session Border Controllers have come a long way since they were first conceived in the early 2000s as a simple, security-focused element. As service providers and enterprises began deploying more advanced real-time applications over IP including Unified Communications, video, instant messaging, and conferencing the burden on SBCs grew in step. While their original purpose still rings true providing secure, controlled IP connections across IP borders much has changed in their scope and function, including the definitions of borders themselves. Today, SBCs are expected to provide a broad range of functions, including the following: Media processing IP Multimedia Subsystem (IMS) signaling and media High message throughput Signaling manipulation Call Admission Control (CAC) Security Encryption Call routing This white paper will explore the needs around each of these areas. Media Processing at the Border FIGURE 1. Early SBC s role FIGURE 2. Factors Expanding the Breadth of SBC Requirements Wherever two networks connect, there is always a challenge of ensuring they talk the same dialect. SIP in particular has experienced explosive growth in capability, specification and utilization in recent years. Ultimately, this leads to fragmentation and often creates significant interoperability challenges. A critical, early function of SBCs was to normalize and police signaling (particularly SIP) to ensure traffic that could be processed was admitted and all other traffic was rejected. With the pace of SIP adoption and RFC creation accelerating, SBCs need to decouple operators from vendor software roadmaps as much as possible, making it easy for users to tailor and configure SIP signaling control. This is particularly true as increasing levels of non-voip traffic hit an SBC, including video, IM, SMS/MMS, file transfer, and other media types, many of which exercise SIP protocol elements that are still relatively uncommon. Critical as it is to control the signaling aspects of a session, remember that the bulk of the traffic crossing a border is the media. It s equally critical for the operators to control the nature of the media traffic they admit into their network, and to control the nature of the media traffic they pass on to a peer. Media processing encompasses media handling functions such as transcoding, conversion of a media stream from one codec type to another, DTMF interworking functions where DTMF tones within the media flow are detected and converted into RFC2833/RFC4733 format, or fax interworking where G.711 fax is converted to T.38 fax. Being able to transcode a media stream directly at the border offers obvious simplifications to the operator. Operators only expose their core to the traffic profiles against which they have verified all of their network components. This consideration takes on added importance when operators consider mixed access environments, such as fixed/mobile convergence, where the range of media types offered may vary significantly from endpoint to endpoint. Historically, SBCs have not incorporated embedded media processing capabilities and, where they have done so, have supported very limited numbers of media services. The increasing connectivity between networks using IP and the disparate endpoints used within these networks create a strong need for a Session Border Controller that supports robust and scalable media processing capabilities. The reason why Session Border Controllers have traditionally not incorporated this functionality is that to perform these functions with any scale requires the use of Digital Signal Processors (DSPs). These devices were not present within many early generations of SBCs. has integrated the ability to perform media processing functions directly into its SBC family of products. This allows any required media processing to be performed at the edge of the network rather than having to be transported to a central resource for processing. Enhanced Service Participation Feature and service delivery are traditionally hosted on platforms at the core of the network, with the SBC as an adjunct device to aid them in that delivery. This paradigm makes sense when a service is used by a relatively small number of the subscribers on a network, as it allows pooling of resources that can be shared across anyone on the network who requires them. It makes less sense, however, for high-use services where the resource requirements are reaching parity with the number of subscribers registered to the network. In some of these cases, operators will be able to offload basic and frequently used call and communication services directly to the edge of the network, as SBCs become capable of taking on more of the functional demands normally associated with dedicated application platforms. Next-generation SBCs will provide native support of call services through user authentication, enrichment of the session control capabilities, routing intelligence, and flexibility of the signaling control. The intelligent routing and operator-defined policies will allow the SBC to selectively host features locally where appropriate, and to pass the session onto dedicated service platforms when necessary To achieve this, the SBC will need to support interfaces to centralized administration resources, such as for authentication credentials, policy control and, in some cases, routing databases. Through these interfaces and centrally administered resources, the operator contains operations costs while benefiting from the optimization of delivering services with fewer boxes, fewer hops, and less complexity. IMS Signaling and Media IMS provides a framework for deploying both basic calling services and enhanced services through industry-standard components and protocols. The four key values that IMS provides are: Session control Combining and integrating different applications/ services Enabling quality of service Flexible and consistent charging for services Although not an IMS-defined element, the SBC has evolved to support a number of IMS-defined functions in part or in whole. These include the P-CSCF, IBCF, BGF/I-BGF, ALG, TrGW, IWF, SEG and some RACS functions. FIGURE 3. SBCs and Enhanced Services FIGURE 4. SBCs Positioned in an IMS Environment 2 3
3 IMS Access SBC On the access side of IMS is the Proxy-Call Session Control Function (P-CSCF), which is the entry point into the IMS network for user endpoints. It acts as the interface between the client and the Interrogating-Call Session Control Function (I-CSCF) and Serving-Call Session Control Function (S-CSCF). These components only handle the signaling element of the calls. An Access SBC integrates the P-CSCF with an Access Border Gateway Function (A-BGF) element so it can handle the signaling and media traffic within a single system appropriately. Functions performed by an Access SBC should include: Topology hiding NAT/firewall traversal for signaling and media IMS Interconnect SBC On the interconnect side of IMS is the Interconnect Border Control Function (I-BCF), which provides the interface to external networks. These components only handle the signaling element of the calls. An Interconnect SBC integrates the I-BCF with an Interconnect Border Gateway Function (I-BGF) element to allow the appropriate handling of the signaling and media traffic within a single system. While the Access SBC interfaces to all the user endpoints, the Interconnect SBC interfaces to other networks over SIP trunks. Functions performed by an Interconnect SBC should include: Topology hiding Applies policy on a per-trunk basis Managing Exploding Session Counts A basic SIP call procedure requires an average of seven SIP messages. Many SBCs measure their call handling performance in Call Attempts Per Second (CAPS). The SBC is generally limited by the number of SIP messages per second that it can handle. The average number of SIP messages generated by typical applications continues to increase. The Performance Impact of NAT NAT traversal is a basic function of an SBC in an access deployment, where the SBC is used to solve the reachability issues caused by the endpoint sitting behind a NAT/firewall. NAT traversal in itself does not have a major impact on an SBC s message-handling requirements, but the pinhole through the firewall must be kept open. The normal method for keeping the pinhole open is to set the expiry time for the registration of an endpoint to a value less than the timeout period expected for the pinhole on the firewall. As a result, the endpoint will send a SIP REGISTER message much more frequently than if it were not behind a NAT/firewall. Figure 5 illustrates the impact that supporting several users behind NATs/firewalls can have on an SBC s message-handling capabilities. SBCs need to be able to handle these high levels of messages while still handling the calls generated by these users. The Performance Impact of Presence Another critical SBC scaling problem relates to the presence of IM services based on SIP/SIMPLE protocols. The message flow in a presence Applied policy on a per-endpoint basis User identity privacy Routing of signaling to the IMS core Signaling interworking User identity privacy Monitoring and lawful intercept Encryption Routing of signaling to the IMS core Monitoring and lawful intercept FIGURE 5. Implications of NAT on Performance FIGURE 6. Performance Impact of SIP Presence environment is impacted by three key factors: the number of subscribers, the number of contacts or buddies that each is connected with, and the timeframe between status changes. As each of these grows, the number of messages will expand multiplicatively. For example, in the first case below, only a small percentage of subscribers are using presence with relatively modest buddy lists, so the resulting number of SIP messages generated is fairly manageable. Compare that to the impact of implementing a full Unified Communications environment. In this case, subscriber usage is likely ubiquitous with each user possessing a much larger list of contacts, and statuses that will update more frequently due to the inclusion of in a meeting, on the phone, etc. As shown in Example 2 in Figure 6, the messages related to presence can quickly explode with this example showing a nearly 400-fold increase. A Session Border Controller in the midst of this communication path faces scalability requirements to support presence, which will rapidly eclipse that of voice. It must therefore have sufficient performance to ensure that it can manage this load effectively. SIP Message Manipulation A wide range of signaling manipulation can be required from a Session Border Controller, taking many forms. These can range from manipulation of individual SIP messages to protocol interworking. SIP to SIP Interworking The need to manipulate SIP messages has arisen from the range of interpretations of SIP made by different equipment vendors. This has led to situations where it is desirable, or even necessary, to change the headers or contents of SIP messages as they flow from endpoints into a carrier network or even when they pass between carrier networks. The typical operations that are required to perform this manipulation are Add, Modify, and Delete. These can perform functions as simple as blocking a SIP header from entering a network, but can also perform much more powerful operations such as copying a parameter from one header, removing that header, and copying that parameter into a different header. The Sonus SIP Message Manipulation (SMM) solution is easy to configure and provides a high degree of flexibility. It combines a set of decision-making criteria with a rule containing a set of actions to be performed when those criteria are met. The criteria to trigger a rule could be the presence/absence of a header/parameter/ token or a header/parameter/token having a specified value. The criterion for a rule may be based on a header/parameter/token, which is different than the header/parameter/token specified for action. For example, it is possible to delete Header-1 only if Header-2 is present. Some examples of the flexibility provided by the Sonus SMM are outlined below: H.323 to SIP Interworking For many years, the industry predicted that the number of H.323 devices within networks would decline to zero. This has not occurred, so SBCs must continue to provide interworking functions from these H.323 devices to the SIP-based core networks that have become the norm. SIP-I to SIP/SIP-I Interworking FIGURE 7. SIP Message Manipulation Requirements Add/delete/modify operations can be applied on specified header, header/ parameter, or header/parameter/token. Rules can be applied to a certain range of headers. For example, delete all Header-1 instances except the first one. Actions for a rule can be configured to take effect on all, first, last, or a range of instances of a header; e.g., a rule modifying only second-to-last instances of a header. Multiple actions can be taken in a single rule. For example, it is possible to delete Header-1 and add parameter-2 to Header-2 if Header-1 is present. Rules can be triggered depending on number of headers. For example, delete Header-1 only if there are more than three instances of Header-2. Rules can be defined both in ingress and egress legs. SIP-I is used to transport ISDN User Part (ISUP) messages around a network using SIP as the transport protocol. SBCs are required to provide interworking between the SIP-I and peer network devices that are using SIP and also to interoperate between SIP-I and SIP-I where different ISUP variants are being used in peer networks. 4 5
4 Call Admission Control One major function expected from Session Border Controllers is the ability to control the usage of resources within the network. Call (or Connection) Admission Control (CAC) allows the SBC to control the number of active calls on a per-trunk basis and can scale down to control an individual endpoint. The SBC can prevent trunks from completing more calls over them than they are capable of handling and control the number of calls that an endpoint can make based upon policy decisions. A very important function that must be combined with CAC is the ability to police the media traffic that is passing on calls that have been allowed to take place by CAC. This media is policed based on the type of media combined with the type of codec negotiated for the call. Security As SIP networks have evolved, the need to provide security within the SIP networks has increased. The range of security threats has grown, ranging from attacks on the IP/UDP/TCP layer to attacks at the SIP layer; SBCs must be able to withstand these attacks while still maintaining service to the users. Attacks on IP/UDP/TCP at gigabit wire speed can only be handled via purpose-built network processors, which allow the main system CPU to deal with higher-layer processing. Another important security feature is enforcing whitelists and blacklists. Whitelists are lists of trusted endpoints, while blacklists are lists of endpoints that should be blocked from making or receiving calls. Sonus SBCs can create dynamic blacklists of misbehaving endpoints. This allows the SBC to respond to misbehaving endpoints without any intervention from the carrier. The events that can dynamically trigger the blacklisting of an endpoint include: multiple registration failures, receiving large quantities of bad SIP packets from an endpoint, or a configured parameter exceeding a call rate limit. Encryption Originally SBCs didn t provide much in the way of encryption, with few endpoints supporting it. As the services have grown and the capabilities of the endpoints have increased, the demand for encryption has grown. Encryption within SBCs is required for both the signaling and media. The signaling traffic is encrypted via either IPsec or TLS while RTP traffic can be encrypted via Secure RTP (SRTP). To handle encryption with any scale without having a large impact on the overall performance of an SBC, it is necessary to provide encryption via specialized hardware within the SBC - something most first-generation SBCs do not have. This hardware relieves the core CPU from the high processing load imposed by encryption, thereby allowing it to handle the general functions of the SBC. Call Routing At their inception, SBCs performed very limited functions with regard to routing calls within a network, relying on other elements within the network to perform routing and policy decisions. Historically SBCs have looked at the To: address and made a forwarding decision based upon the address type. SIP has two general address types: SIP addresses, known as a SIP URI, and telephony addresses, known as a tel URI. SIP URIs take a form very similar to an address, consisting of a username and a hostname; e.g., sip:[email protected], where abcd.com is the domain name of Bill s service provider and bill is Bill s unique user address within that service provider. The hostname does not have to take the form of an FQDN but could be an IP address, such as sip:bill@ , where is generally the IP address of the call server within the service provider. Tel URIs take the form of telephone numbers either in global (E.164) format or in local notation (e.g., or 911), with numbers from private numbering plans, emergency codes, etc. also being supported with additional context information. The way in which SBCs used these addresses to forward the SIP messages varied from address type to address type. The expected behavior was configured for each address type and was typically as outlined below. With all these options, the SBC isn t performing any real routing decisions for the addresses but is simply finding out where to forward the SIP message so that any routing decisions can take place there. The routing decisions are actually being made at either a SIP Call Agent (CA) or a softswitch with the SBC protecting the edge of the network but deferring any other decisions to the CA/softswitch. The decision to use a CA or a softswitch would be based upon the size of the network, the diversity of the networking devices in the network and the overall budget. More recently, SBCs have started to adopt other routing techniques such as ENUM. ENUM is used to take an E.164 address, such as would FIGURE 10. Support for Local or Centralized Routing and Policies be used in the tel URI above, and convert it into a NAPTR/DNS address which can then be routed as a SIP URI. Some SBCs have started to add more call routing capabilities into their product suites. These are varied in their nature and include either the addition of a routing database into the SBC or the addition of an adjunct platform to perform the routing function in the form of a stateful or stateless proxy. Where a routing database has been added to the SBC, it is generally limited in the scale of the routing database and the performance due to the additional memory and processing requirements it places on the SBC. As the complexity of the routing grows, the need to manage and configure the routing databases centrally arises. Some SBC vendors have implemented such configuration tools, which then push the routing database out to the devices within the network. Sonus has a strong heritage in the call routing area with the Sonus PSX Centralized Policy and Routing Server. The Sonus PSX server is a proven, highly scalable routing and policy engine that can be configured centrally and can be scaled within the network by replicating the database between master and distributed devices. Within the Sonus solution, whether the device is a TDM gateway or a Border Controller, FIGURE 11. Sonus PSX Server Fully Redundant, Distributed Policy and Routing Engine the PSX server leverages the same PSTN-style traffic control (Telcordia s GR-477-CORE standard) for both TDM and IP trunk groups. The Sonus PSX server can act as a routing SIP proxy within the network or the Sonus device can launch a Diameter Policy Request to the PSX server asking for instructions on how to route the call. This allows the routing policies to remain on the PSX server and to be acted upon by the Sonus SBC. There is continued demand for call routing capabilities in SBCs, and SBC vendors are reacting by building modest routing capabilities into their SBCs. In contrast, Sonus has a strong heritage in call routing and policy and is leveraging the superior functionality and proven scale of the PSX server within the border control solutions that it offers to the market. For SIP URIs, if the hostname is in FQDN format then the choices are: Use DNS SRV lookups to determine next hop Use a local lookup table in the SBC first to see if any local behavior is provisioned for the FQDN (e.g., local DNS cache) Use a list of IP addresses provisioned on the SBC to forward to regardless of the FQDN For tel URIs the choices are: Using the list of IP addresses/fqdns provisioned on the SBC For SIP URIs, if the hostname is in IP Address format then the choices are: Use the IP address as the next hop Use a list of IP addresses provisioned on the SBC to forward to regardless of the IP Address Use a local lookup table in the SBC first to see if any local behavior is provisioned for the IP Address (e.g., FQDN to use instead) The Sonus SBC Family As a leader in secure VoIP networks, has offered carriers a high-performance border solution with the hybrid TDM/IP SBC 9000 since Our security portfolio expanded with the addition of a pure IP appliance that leverages many of the same features: the Sonus SBC 5200 Session Border Controller. Together, they provide robust session control, media transcoding, and security for both legacy networks in transition and the next generation of pure IP communications. Based on a unique Sonus architecture that combines multiple, embedded hardware elements to address media transcoding, security, and encryption functions, the Sonus SBC portfolio offers a proven and scalable, high-performance session border solution that meets the challenges of today s IP communications networks. The SBC 5200 is the first of a new class of Sonus VoIP solutions that provides, providing superior price-performance in a small form-factor. Both share the same engineering cornerstones: High performance under load Embedded media transcoding Robust call control Robust security 6 7
5 The SBC 9000 and SBC 5200 share many of the same industry-leading features on different strategic platforms. The SBC 9000 is based on Sonus unique GSX Open Services Platform and provides the only high-density media gateway that evolves gracefully from TDM to hybrid TDM/ IP to all-ip secure interconnect in a single chassis. SBC 9000 SBC 5200 Conclusion As IP networks evolve, demands on the SBC continue to increase, both in supported functionality and in performance requirements. We have identified a few key areas where the next generation of SBCs will differentiate themselves from their predecessors. As their capabilities increase, they will allow more complex tasks to be accomplished immediately at the edge of the Built on GSX9000 platform Centralized routing via PSX TDM migrating to IP-PI with media transcoding network, reducing the need to hairpin sessions through the core network for treatment. We believe this will significantly simplify operations and improve scalability of the network by eliminating unnecessary call legs and hot spots. To achieve these benefits, the SBC must be designed with carrier-grade performance, competitive call and message throughput deployed concurrently with other advanced features such as wire rate security protection, encryption, CDRs, lawful intercept, RTCP and of course over both IPv4 and IPv6. A wide range of transmission protocols and signaling interworking considerations must also be addressed. To meet these demands, SBCs will need to be flexible and scale independently across three dimensions: Built on pure IP platform Embedded or centralized PSX routing engine IP-IP with media transcoding Compelling migration path Industry Leading Performance Densily of gateway investment FIGURE 12. The Next Generation of Border Control Providing advanced call routing and policy enablement capabilities; Transcoding media from one format to another; Performing wire-speed packet inspection and signaling message manipulation. SBCs that rely on general-purpose computing to perform all three functions will find it difficult to meet these requirements. Sonus SBCs use purpose-built hardware and optimized software to support a rich set of features and achieve the high-performance requirements needed in these evolving IP networks. North American APAC EMEA CALA 4 Technology Park Drive Westford, MA U.S.A. Tel: GO-SONUS 1 Fullerton Road #02-01 One Fullerton Singapore Singapore Tel: Kingston Road Staines, Middlesex TW18 4NL United Kingdom Tel: Mexico City, Campos Eliseos Polanco Andrés Bello 10, Pisos 6 y 7, Torre Forum Col. Chapultepec Morales, Ciudad de México Mexico City, Mexico Tel: To learn more, call your Sonus sales representative or visit us online at The content in this document is for informational purposes only and is subject to change by without notice. While reasonable efforts have been made in the preparation of this publication to assure its accuracy, assumes no liability resulting from technical or editorial errors or omissions, or for any damages resulting from the use of this information. Unless specifically included in a written agreement with, has no obligation to develop or deliver any future release or upgrade or any feature, enhancement or function. Copyright 2012, Inc. All rights reserved. Sonus is a registered trademark of, Inc. All other trademarks, service marks, registered trademarks or registered service marks may be the property of their respective owners. DS /13 8
Sonus SBC 2000 Web Based Management
Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Today IT organizations need a cost effective way of managing branch office appliances. The Sonus SBC 2000 web based management tool
Session Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
Acme Packet Net-Net SIP Multimedia-Xpress
Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering
Session Border Controllers: Addressing Tomorrow s Requirements
White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction
VoIP Encryption in the Enterprise
VoIP Encryption in the Enterprise Table of Contents Introduction..................................... 1 VoIP and UC Increase Productivity and Risk................... 1 Why VoIP Attacks Are on the Rise.........................
VoIP Encryption in the Enterprise
VoIP Encryption in the Enterprise www.sonus.net Table of Contents Introduction...................................... 1 VoIP and UC Increase Productivity and Risk.................... 1 Why VoIP Attacks
How Service Providers Can Seize the SBC as a Service Opportunity
How Service Providers Can Seize the SBC as a Service Opportunity Table of Contents Introduction..................................... 3 More Business for Service Providers....................... 3 Bringing
S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications
Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................
Dialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller
Brochure. Dialogic BorderNet Session Border Controller Solutions
Brochure Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session border controllers (SBCs) from Dialogic helps
Session Border Controller and IP Multimedia Standards. Mika Lehtinen [email protected]
Session Border Controller and IP Multimedia Standards Mika Lehtinen [email protected] December 1, 2005 Contents Introduction Motivation Research problem Research method Results Conclusion December
Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks
Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Today, the mobile industry is in the midst of a fundamental transformation. Circuit-switched TDM technology, which has been the
Understanding Lync 911 for Enterprises
Understanding Lync 911 for Enterprises Introduction Microsoft Lync delivers a complete Enterprise Voice solution through an easy-to-use interface. Enhanced 911 (E911) support is a critical component of
Session Border Controllers in the Cloud
Session Border Controllers in the Cloud Introduction Mobile Network Operators (MNOs), carriers and enterprises must virtualize Session Border Controllers (SBCs) and deploy them in the cloud to support
Oracle Communications Session Border Controller: Driving Oracle s SIP Interconnect Solution. Extending Service Reach and Quality
Oracle Communications Session Border Controller: Driving Oracle s SIP Interconnect Solution Extending Service Reach and Quality Networks cannot stand alone and must connect to other service providers to
An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision
An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks
Session Border Controller
Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Cisco Multiservice IP-to-IP Gateway the Cisco IOS Session Border Controller
Cisco Multiservice IP-to-IP Gateway the Cisco IOS Session Border Controller Cisco Unified Communications is a comprehensive IP communications system of voice, video, data, and mobility products and applications.
AdvOSS Session Border Controller
AdvOSS Session Border Controller Product Data Sheet Find latest copy of this document from http://www.advoss.com/pdf/advoss-sbc-productdatasheet.pdf Copyright AdvOSS.com, 2007-2011 All Rights Reserved
SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240
SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking
What is an E-SBC? WHITE PAPER
Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
ABC SBC: Securing the PBX. FRAFOS GmbH
ABC SBC: Securing the PBX FRAFOS GmbH Introduction A widely reported fraud scenarios is the case of a malicious user detecting the address of a company s PBX and accessing that PBX directly. Once the attacker
Acme Packet session border controllers in the enterprise
Acme Packet session border controllers in the enterprise Large enterprises have been expanding their deployments of IP telephony (IPT) for several years now. Planning has already begun to extend the benefits
Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge
Dialogic BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Versatile Dialogic BorderNet Products Handle Network Transitions for Today s Critical Services and Solutions
SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity
Session border controller solution offering high performance, security and SIP compliance connectivity. 1 DIAGRAM : Registration SIP Client registration for all users (, Business, Hosted PBXware and Wholesale)
OpenScape UC Firewall and OpenScape Session Border Controller
UC Firewall and Session Border Controller Security within and beyond the boundaries Security within and beyond your network s boundaries Our connected world We are living and working in a new world that
Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development
Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development Why Lync MICROSOFT LYNC is an enterprise-ready UNIFIED COMMUNICATIONS PLATFORM LYNC CONNECTS PEOPLE everywhere, on Windows 8 and other
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
The BorderNet Session Border Controller and Network Function Virtualization
The BorderNet Session Border Controller and Network Service providers today are making a fundamental shift away from their traditional ways of doing business and delivering services as they face alternative
White Paper. Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform
Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform Executive Summary The architecture and approach that network operators have traditionally used for network interconnection have
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues
Diameter Interworking Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Table of Contents Introduction..................................... 3 Business
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs Product & Offer Large & Medium Enterprise Ref: 8AL020033225TCASA ed3 ESD/ Mid & Large Enterprise Product Line Management October 2013 OmniPCX Enterprise
ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification
TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture
VoIP-Enabling A Class 4/5 Switch Network Integrated Media Gateway 1010 Chris Lengyel
VoIP-Enabling A Switch Network Integrated Media Gateway 1010 Chris Lengyel Market Development Manager table of contents VoIP Enabling a Wholesale Network: Before VoIP 3 Limitations of the First Generation
White Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Copyright and Trademark Statement
Contents VoIP Starts with SmartNode...3 Why SmartNode?...3 SmartNode Product Comparison...5 VoIP Appliance with Embedded Windows...7 Carrier-Grade TDM + VoIP SmartMedia Gateways...8 Enterprise Solutions...9
SBC WHITE PAPER. The Critical Component
SBC WHITE PAPER The Critical Component Table of Contents of your VoIP Infrastructure... 3 Enter the SBC... 4 Functions... 5 Security... 5 Denial of Service... 5 Toll Fraud... 6 Encryption... 6 Policy...
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Dialogic BorderNet Virtualized Session Border Controller
Dialogic BorderNet Virtualized Session Border Controller services and subscribers with ease and scale The Dialogic BorderNet Virtualized Session Border Controller (SBC) brings carrier class SBC functionality
SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma [email protected]
SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma [email protected] Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs
Sonus Networks engaged Miercom to evaluate the call handling
Lab Testing Summary Report September 2010 Report 100914 Key findings and conclusions: NBS5200 successfully registered 256,000 user authenticated Total IADs in 16 minutes at a rate of 550 registrations
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks
SDN Orchestration Explained A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks Table of Contents Introduction. 3 Back Story: Defining Terms. 3 Cloud Exchange Network. 3 Orchestration
Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios
An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice
OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border
Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives
SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013)
Configuration Guide SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013) For use with AT&T s IP Flexible Reach Enhanced Features Service on MIS, MPLS PNT or AT&T VPN Disclaimers
SIP Trunking and the Role of the Enterprise SBC
SIP Trunking and the Role of the Enterprise SBC a Tango Networks ebriefing SIP trunks offer companies of all sizes the opportunity to improve and simplify their communications network while reducing costs.
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
Load Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment
Office 365 Cloud PBX Options of Migrating to a Skype for Business Cloud Deployment Table of Contents Introduction..................................... 3 Skype for Business within Your Enterprise...........................
SIP Signaling Router (SSR) Use Cases
APPLICATION GUIDE SIP Signaling Router (R) Use Cases Using SIP to improve network performance and deliver advanced services This application guide discusses how operators can use a SIP Signaling Router
How To Support An Ip Trunking Service
Small Logo SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively
SBC - the UC-glue Security, Interoperability, Reliability. Alexander Kunzi
SBC - the UC-glue Security, Interoperability, Reliability Alexander Kunzi Agenda SBC? Was s das? Wer ist ACME? Is das sicher? Und wie flexibel? Acme Packet Enterprise Solutions Marketing Page 2 Customer
Interactive communications over IP networks
How many times have you heard "IP networks don't make any money!" Probably way too many! Compared to the PSTN, IP networks are big zeroes in terms of financial appeal. Today, while data consumes more than
Hosted PBX Platform-asa-Service. Offering
Hosted PBX Platform-asa-Service Offering Hosted PBX Platform Overview VoIP Logic s Hosted PBX Platform-as-a-Service (PaaS) delivers cloud-based PBX functionality encompassing traditional PBX features as
Session Border Controller
CHAPTER 13 This chapter describes the level of support that Cisco ANA provides for (SBC), as follows: Technology Description, page 13-1 Information Model Objects (IMOs), page 13-2 Vendor-Specific Inventory
Management & Orchestration of Metaswitch s Perimeta Virtual SBC
Metaswitch.com OvertureNetworks.com Management & Orchestration of Metaswitch s Perimeta Virtual SBC Fortify your edge and protect your core with the Perimeta Session Border Controller: Virtual The 1st
Release the full potential of your Cisco Call Manager with Ingate Systems
Release the full potential of your Cisco Call Manager with Ingate Systems -Save cost with flexible connection to Service Providers. -Save mobile costs, give VoIP mobility to your workforce. -Setup an effective
Integrating SIP Trunks in Enterprise Networks for Next- Generation Unified Communications
Integrating SIP Trunks in Enterprise Networks for Next- Generation Unified Communications Abstract The adoption of Unified Communications within the enterprise is well underway. The major benefits of this
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
July 2013. Why IP Peering? IP Based Voice Peering versus Traditional Calling Models
July 2013 Why IP Peering? IP Based Voice Peering versus Traditional Calling Models The IP Evolution Mobile Mobile Fixed Enterprise Carriers Carrier, providing IP Interconnect Services Voice, Messaging,
Managing SIP-based Applications With WAN Optimization
Managing SIP-based Applications With WAN Optimization Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Managing SIP-based Applications With
ABC SBC: Securing and Flexible Trunking. FRAFOS GmbH
ABC SBC: Securing and Flexible Trunking FRAFOS GmbH 1. Introduction Enterprises are increasingly replacing their PBXs with VoIP PBX or are extending their PXB with a VoIP module to benefit from attractive
An Oracle White Paper July 2013. Enterprise IP Telephony and Unified Communications Interoperability
An Oracle White Paper July 2013 Enterprise IP Telephony and Unified Communications Interoperability Introduction Enterprises are deploying Internet Protocol (IP) telephony and unified communications (UC)
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There
SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There Q&A Session Date: Wednesday, April 13, 2011 Q: You have to partner with a provider in order to do SIP trunking, correct?
Terminology and Definitions Acronyms and Abbreviations Acknowledgement
Contents Foreword Terminology and Definitions Acronyms and Abbreviations Acknowledgement xiii xv xvii xxi 1 Introduction 1 1.1 General Introduction 1 1.2 On Voice over IP and Telephony over IP 2 1.3 Context
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway) Deployment Guide Cisco VCS X8.1 D14651.08 August 2014 Contents Introduction 4 Example network deployment 5 Network
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
SIP, Security and Session Border Controllers
SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers Executive Summary Rolling out a public SIP service brings with it several security issues. Both users and Service
Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis
White Paper Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis by Sue Bradshaw: Technology Writer, Integrated Research Ensuring new technology like Lync delivers
Deploying Media Probes in Evolving VoIP Networks
Deploying Media Probes in Evolving VoIP Networks Dave Gladwin [email protected] Presentation Template V4.00 Nov-05 Agenda! Convergence of Fixed and Mobile services are driving networks
Paving the Way to Next Generation Media and Signaling VoIP Gateways
Small Logo Paving the Way to Next Generation Media and Signaling VoIP Gateways Executive Summary This white paper examines how the rapid adoption of SIP and the distribution of network elements are moving
Session Border Controllers and Videoconferencing
Session Border Controllers and Videoconferencing Using a Field-Proven Solution to Simplify and Improve Multi-Vendor Conferencing Environments August 2011 Study sponsored by: Table of Contents Introduction...
SITEL Voice Architecture
SITEL Voice Architecture www.sitel.com SIP Voice Architecture: What is it? And how contact center operators can save money using it. By: Kevin Weier, Director, Global Voice Infrastructure and Architecture,
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
Lab Testing Summary Report
Lab Testing Summary Report May 2013 Report 130425 Product Category: Carrier Class SBC Vendor Tested: Products Tested: Session Border Controller Key findings and conclusions: software maintained a call
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
