Session Border Controllers in the Cloud

Size: px
Start display at page:

Download "Session Border Controllers in the Cloud"

Transcription

1 Session Border Controllers in the Cloud

2 Introduction Mobile Network Operators (MNOs), carriers and enterprises must virtualize Session Border Controllers (SBCs) and deploy them in the cloud to support a new generation of advanced IP communications services. By deploying cloud-based SBCs, these entities can reduce capital and operating expenses, accelerate time to market for new services and gain a new ability to scale services. Deployed at the network border, SBCs cover capabilities such as signaling and media security, service-level agreement (SLA) assurance and regulatory compliance. These capabilities ensure that voice, video and data communications sessions are controlled, managed and protected at a carrier-grade level. This white paper will explore the benefits, challenges and core functions of cloud-based Session Border Controllers. Session Border Controller, Defined A session border controller is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network. Phone calls are referred to as sessions. An SBC acts a router between the enterprise and carrier service, allowing only authorized sessions to pass through the connection point, or border. The SBC defines and monitors the Quality of Service (QoS) status for all sessions, ensuring that callers can communicate with each other and that emergency calls are delivered correctly and prioritized above all other calls. An SBC can also serve as a firewall for session traffic, applying its own QoS rules and identifying specific incoming threats to the communications environment. For security reasons, session border controllers are likely to be deployed on both the carrier and enterprise sides of the connection. Session Border Controllers: Traditional Limitations Traditional session border controllers are implemented on custom platforms or proprietary hardware. Most of these native SBCs use network processors and Digital Signal Processors (DSPs) to support firewall, media processing and transcoding functionality. Scaling is difficult and expensive with native SBCs. Service providers configure them statically to support a prospective maximum subscriber base size, even though there is no guarantee that the network will grow to this degree. In the Session Border Controller space, standards have been in place for several years that support the separation of the signaling plane from the media plane using H.248 as the control protocol between the signaling border element and the media border element. H.248, also known as Media Gateway Control Protocol (MGCP), or Megaco, is a standard protocol for handling the signaling and session management needed during a multimedia conference. The protocol defines a means of communication between a media gateway, which converts data from the format required for a circuit-switched network to that required for a packet-switched network and the media gateway controller. Most current SBCs are based on an integrated architecture that handles signaling and media in the same box.

3 Cloud-Based Session Border Controllers Cloud-based or virtualized SBCs support the same capabilities as native SBCs, but can be deployed on standard high-volume Commercial Off-The-Shelf (COTS) servers. Cloud management platforms enable prepaid wholesale voice terminators, voice carriers / International Long Distance (ILD), enterprise service providers and mobile / wireless operators to deploy COTS servers from different vendors and orchestrate resources to address the requirements of different applications. This flexibility allows service providers to scale and evolve their SBCs in accordance with subscriber growth, increased usage or fluctuating requirements. The signaling function in SBCs is highly compute-intensive and is well-suited for implementation on commercial server hardware or in the cloud. Session Border Control in the cloud clearly lies at the intersection of these two important and transformative trends cloud computing and software-defined networking and delivers a number of compelling advantages over traditional approaches to Session Border Control. Challenges with SBC in the Cloud Historically, network infrastructure elements such as IP routers and Session Border Controllers have been implemented on proprietary hardware platforms. While proprietary hardware may still be the most cost-effective technology for specific types of communications functions, such as the data plane in routers or the secure media encryption / decryption function in SBCs, there is a growing realization that the software-intensive aspects of these network elements, especially the control plane functions, can be handled far more economically by commercial off-the-shelf computing power. Which is not to say that cloud-based Session Border Control is not without its complexities and challenges. Below are common areas of concern that we will examine each in their turn. Session Border Control belongs at the edge, but the cloud is in the core of the network. Session Border Control does certainly belong at the edge of the network, almost by definition. However, the edge does not have to be defined in terms of physical locations. We can define a logical edge that extends into the cloud if we make use of properly secured connections, for example VPN tunnels, that connect to the cloud from the physical edge of the network.

4 Current SBCs leverage proprietary hardware to provide the performance and capacity needed for compute-intensive tasks like encryption and transcoding. How is that compatible with the commodity servers that make up the cloud? Most current SBCs do indeed leverage proprietary hardware to accelerate tasks like encryption and transcoding. However, the general purpose processors in commodity servers are constantly improving, and the cost-efficiency advantages of specialized hardware are much smaller today than they were five years ago. Today, commodity servers are expected to support functions like large-scale secure Web access, so their Computer Processing Units (CPUs) implement specialized instructions that speed up encryption. This hardware can be leveraged very successfully to support the security functions of SBCs. Transcoding is one area where specialized hardware may still maintain a cost advantage, so this function might need to be deployed outside the cloud. Having said this, the cost gap between general purpose CPUs and specialized DSPs for transcoding is getting smaller all the time. Furthermore, most network operators will want to maximize the percentage of calls that can be completed without transcoding for obvious cost reasons so in practice, the need for any supplementary function outside the cloud to perform transcoding may be limited or even nonexistent. Decoupled or distributed SBC architectures allow for the separation of transcoding from the rest of SBC function. Hence, there is no difficulty in implementing a hybrid approach whereby all SBC functionality, apart from transcoding, lives in the cloud. SBCs typically relay media streams, but is that a function that really belongs in the cloud? Media stream relay is certainly an important function of SBCs, and it can be implemented very cost-effectively on commodity server hardware. Therefore there is no technical problem with relaying media through the cloud. There is certainly a potential objection in terms of backhaul costs if the cloud is deployed in a centralized location, so there is value in looking at alternative approaches for media relay. It s likely that the requirement for SBCs to relay media streams will diminish over time, as network operators get less concerned about policing the bandwidth used by sessions set up over their networks. However, the requirement probably won t entirely go away, and it can be addressed outside the cloud where appropriate by deploying media border element devices at the edge of the network that are controlled by signaling border elements in the cloud. SBCs that have a decoupled or distributed architecture handle this separation of signaling and media functions today.

5 Benefits of Implementing Cloud-Based SBCs Below is an overview of the many benefits of implementing cloud-based Session Border Control. Provides Security Cloud-based SBCs ensure that only those users or devices that are permitted to use the protected core devices are able to do so. Provides Users with Toll-Quality Quality of Experience Cloud-based SBCs ensure that external factors, ranging from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, to failures of both software and hardware, do not have a significant impact on the users of the service being provided. Enhanced Interoperability Cloud-based SBCs increase the likelihood that any given subset of connected devices actively engaged in the same session will successfully communicate with each other using whatever signaling and media protocols they natively support. Normalization Cloud-based SBCs provide a fixed translation point in the network such that signaling and media traffic on the core side of the SBC conforms to a standard profile that other devices in the core can rely on. Supports New Services New potential revenue streams, including instant messaging, presence, Rich Communication Suite (RCS) / Rich Communication Suite-enhanced (RCS-e), and application session control all require support from the SBC. Conclusion Network operators have much to gain from leveraging private cloud technology to minimize the capital and operating costs of deploying software-centric networking and services functions. Session Border Control is one of those functions that can be deployed in the cloud to deliver compelling advantages over the traditional deployment model based on proprietary hardware appliances. However, not all implementations of Session Border Control are suitable for cloud deployment. Only those designed from the ground up to work efficiently on generic server hardware, leveraging large numbers of CPU cores in parallel, are going to deliver fully on the promise of cloud-based Session Border Control.

6 Panamax Infotech Ltd. Panamax House, Plot No. 8, Khushman Housing Society, Near Vivekanand Circle, Memnagar, Ahmedabad India Call: Website:

Management & Orchestration of Metaswitch s Perimeta Virtual SBC

Management & Orchestration of Metaswitch s Perimeta Virtual SBC Metaswitch.com OvertureNetworks.com Management & Orchestration of Metaswitch s Perimeta Virtual SBC Fortify your edge and protect your core with the Perimeta Session Border Controller: Virtual The 1st

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Dialogic BorderNet Session Border Controller Solutions

Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller

More information

SIP Trunking and the Role of the Enterprise SBC

SIP Trunking and the Role of the Enterprise SBC SIP Trunking and the Role of the Enterprise SBC a Tango Networks ebriefing SIP trunks offer companies of all sizes the opportunity to improve and simplify their communications network while reducing costs.

More information

Session Border Controllers: Addressing Tomorrow s Requirements

Session Border Controllers: Addressing Tomorrow s Requirements White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

How Service Providers Can Seize the SBC as a Service Opportunity

How Service Providers Can Seize the SBC as a Service Opportunity How Service Providers Can Seize the SBC as a Service Opportunity Table of Contents Introduction..................................... 3 More Business for Service Providers....................... 3 Bringing

More information

Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge

Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Dialogic BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Versatile Dialogic BorderNet Products Handle Network Transitions for Today s Critical Services and Solutions

More information

The BorderNet Session Border Controller and Network Function Virtualization

The BorderNet Session Border Controller and Network Function Virtualization The BorderNet Session Border Controller and Network Service providers today are making a fundamental shift away from their traditional ways of doing business and delivering services as they face alternative

More information

XpressPath Optimized Media Functionality For VoiceFlow Session Border Controllers

XpressPath Optimized Media Functionality For VoiceFlow Session Border Controllers XpressPath Optimized Functionality For VoiceFlow Session Border Controllers Kagoor Networks White Paper XpressPath Optimized Functionality 1 Table of Contents Introduction... 3 XpressPath description...

More information

Acme Packet Net-Net SIP Multimedia-Xpress

Acme Packet Net-Net SIP Multimedia-Xpress Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Sprint s Partner Interexchange Network (PIN) A New Approach to Scalable Voice Peering

Sprint s Partner Interexchange Network (PIN) A New Approach to Scalable Voice Peering Sprint s Partner Interexchange Network (PIN) A New Approach to Scalable Voice Peering Sprint Wholesale White Paper October, 2009 Executive Overview has caused Sprint to develop a a larger community of

More information

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

What is an E-SBC? WHITE PAPER

What is an E-SBC? WHITE PAPER Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services

More information

The Benefits of SD-WAN with Integrated Branch Security

The Benefits of SD-WAN with Integrated Branch Security The Benefits of with Integrated Branch Security Branch Networking Today More Bandwidth, More Complexity Branch or remote office network architectures have barely changed for 15+ years. But the requirements

More information

PETER CUTLER SCOTT PAGE. November 15, 2011

PETER CUTLER SCOTT PAGE. November 15, 2011 Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic

More information

The New IP Networks: Time to Move From PoC to Revenue

The New IP Networks: Time to Move From PoC to Revenue White Paper The New IP Networks: Time to Move From PoC to Revenue Prepared by Roz Roseboro Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.brocade.com February 2015 Introduction The

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

Leveraging SDN and NFV in the WAN

Leveraging SDN and NFV in the WAN Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined

More information

UK Interconnect White Paper

UK Interconnect White Paper UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

Brochure. Dialogic BorderNet Session Border Controller Solutions

Brochure. Dialogic BorderNet Session Border Controller Solutions Brochure Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session border controllers (SBCs) from Dialogic helps

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts

More information

Session Border Controller and IP Multimedia Standards. Mika Lehtinen [email protected]

Session Border Controller and IP Multimedia Standards. Mika Lehtinen mika.lehtinen@teliasonera.com Session Border Controller and IP Multimedia Standards Mika Lehtinen [email protected] December 1, 2005 Contents Introduction Motivation Research problem Research method Results Conclusion December

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Expert Reference Series of White Papers. Is Network Functions Virtualization (NFV) Moving Closer to Reality?

Expert Reference Series of White Papers. Is Network Functions Virtualization (NFV) Moving Closer to Reality? Expert Reference Series of White Papers Is Network Functions Virtualization (NFV) Moving Closer to Reality? 1-800-COURSES www.globalknowledge.com Is Network Functions Virtualization (NFV) Moving Closer

More information

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks

More information

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and

More information

Hosted PBX Platform-asa-Service. Offering

Hosted PBX Platform-asa-Service. Offering Hosted PBX Platform-asa-Service Offering Hosted PBX Platform Overview VoIP Logic s Hosted PBX Platform-as-a-Service (PaaS) delivers cloud-based PBX functionality encompassing traditional PBX features as

More information

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October

More information

Acme Packet session border controllers in the enterprise

Acme Packet session border controllers in the enterprise Acme Packet session border controllers in the enterprise Large enterprises have been expanding their deployments of IP telephony (IPT) for several years now. Planning has already begun to extend the benefits

More information

Understanding the Business Case of Network Function Virtualization

Understanding the Business Case of Network Function Virtualization White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building

More information

SDN PARTNER INTEGRATION: SANDVINE

SDN PARTNER INTEGRATION: SANDVINE SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service

More information

Paving the Way to Next Generation Media and Signaling VoIP Gateways

Paving the Way to Next Generation Media and Signaling VoIP Gateways Small Logo Paving the Way to Next Generation Media and Signaling VoIP Gateways Executive Summary This white paper examines how the rapid adoption of SIP and the distribution of network elements are moving

More information

A Fresh Look at Session Border Control

A Fresh Look at Session Border Control White Paper A Fresh Look at Session Control Martin Taylor, CTO Metaswitch Networks Executive Summary Over the next decade or so, service providers will be investing more than five billion dollars in purchasing

More information

NGN Interconnection Standards & Protocols

NGN Interconnection Standards & Protocols NGN Interconnection Standards & Protocols A G E N D A NGN ENVIRONMENT LICENSING CONDITIONS REGULATORY INITIATIVES INTERCONNECTION PROTOCOLS ISSUES R. R. Mittar DDG(NGN), TEC NGN CONCEPT Central Office

More information

The Virtual Ascent of Software Network Intelligence

The Virtual Ascent of Software Network Intelligence White Paper The Virtual Ascent of Software Network Intelligence Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.windriver.com July 2013 Introduction Although

More information

Security & Reliability in VoIP Solution

Security & Reliability in VoIP Solution Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad [email protected] About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

SIP SECURITY JULY 2014

SIP SECURITY JULY 2014 SIP SECURITY JULY 2014 Executive Overview As with any data or communication service, it s important that all enterprises understand potential security issues related to SIP Trunking. This paper provides

More information

Packetized Telephony Networks

Packetized Telephony Networks Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.

More information

Cloud, SDN and the Evolution of

Cloud, SDN and the Evolution of Cloud, SDN and the Evolution of Enterprise Networks Neil Rickard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form

More information

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe JUNIPER AND SDN IN THE NEWS 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net WHY DO WE NEED SOFTWARE

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

Overview of Voice Over Internet Protocol

Overview of Voice Over Internet Protocol Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of

More information

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview. Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management

More information

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma [email protected]

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma [email protected] Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs

More information

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public

More information

Session Border Controller

Session Border Controller Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element

More information

SBC WHITE PAPER. The Critical Component

SBC WHITE PAPER. The Critical Component SBC WHITE PAPER The Critical Component Table of Contents of your VoIP Infrastructure... 3 Enter the SBC... 4 Functions... 5 Security... 5 Denial of Service... 5 Toll Fraud... 6 Encryption... 6 Policy...

More information

Definition of a White Box. Benefits of White Boxes

Definition of a White Box. Benefits of White Boxes Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies [email protected] Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview

More information

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

ABC SBC: Charging and Accounting. FRAFOS GmbH

ABC SBC: Charging and Accounting. FRAFOS GmbH ABC SBC: Charging and Accounting FRAFOS GmbH Integrating Charging and Session Control SBCs play a central role in deciding which users and which traffic get access to a provider s services. The decision

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

IOCOM Whitepaper: Connecting to Third Party Organizations

IOCOM Whitepaper: Connecting to Third Party Organizations IOCOM Whitepaper: Connecting to Third Party Organizations September 2008 IOCOM www.iocom.com 312-786-9169 Table of Contents 1. Executive Summary 2. Goals 3. Scenarios for Enterprise Connectivity over IOCOM

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

Krishan Sabnani Bell Labs. Converged Networks of the Future

Krishan Sabnani Bell Labs. Converged Networks of the Future Krishan Sabnani Bell Labs Converged Networks of the Future Today s Networks 3G Cellular Networks Radio Controller Aggregation Access Enterprise Networks Metro Networks Access Packet-Based Network Aggregation

More information

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller?

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller? An Oracle White Paper August 2013 What Is an Enterprise Session Border Controller? Introduction... 1 Redefining Enterprise Communications... 2 E-SBCs Protect and Control IP Communications... 3 E-SBCs Do

More information

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath.

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath. CounterPath Bria with Oracle TSC Feature Pack A Solution for Operator and Enterprise (OTT) Service Delivery Solution Brief Internet OTT (over-the-top) changes the way people communicate. Internet OTT services

More information

Top Five Considerations for Building a Cloud-Ready Network for Distributed Enterprises

Top Five Considerations for Building a Cloud-Ready Network for Distributed Enterprises Top Five Considerations for Building a Cloud-Ready Network for Distributed Enterprises January 2015 Prepared by: Zeus Kerravala Top Five Considerations for Building a Cloud-Ready Network for Distributed

More information

High Level Overview of IPSec and MPLS IPVPNs

High Level Overview of IPSec and MPLS IPVPNs IPVPN High Level Overview of IPSec and MPLS IPVPNs Date: 16/0/05 Author: Warren Potts Version: 1.1 Abstract This document provides a high level overview of the differences between IPSec and MPLS based

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Cisco CME Features and Functionality

Cisco CME Features and Functionality Cisco CME Features and Functionality Supported Protocols and Integration Options This topic describes the supported protocols and integration options of Cisco CME. Supported Protocols and Integration FAX

More information

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP

More information

How To Understand The Concept Of Voice Over Ip (Voip)

How To Understand The Concept Of Voice Over Ip (Voip) International Journal of Scientific & Engineering Research, Volume 3, Issue 5, May-2012 1 Voice over Internet Protocol The Technology and Its Application Ravi Raj, Abhishek Gagneja, Ritika Singal ABSTRACT:-

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

Is Your Network Ready for VoIP? > White Paper

Is Your Network Ready for VoIP? > White Paper > White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its

More information

CoIP (Cloud over IP): The Future of Hybrid Networking

CoIP (Cloud over IP): The Future of Hybrid Networking CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical

More information

Best Practices for deploying unified communications together with SIP trunking connectivity

Best Practices for deploying unified communications together with SIP trunking connectivity An Allstream White Paper Best Practices for deploying unified communications together with SIP trunking connectivity An Allstream White Paper 1 Table of contents Correct identification and maximization

More information

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,

More information

We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery

We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery istockphoto.com Introduction Over the last few years, the television world has gone

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

SDN/Virtualization and Cloud Computing

SDN/Virtualization and Cloud Computing SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer

More information