Architectural Considerations for Providing Carrier Class Telephony Services Utilizing SIP...



Similar documents
Presenter: Michael Mannette 3COM

Packetized Telephony Networks

Mixer/Translator VOIP/SIP. Translator. Mixer

TECHNICAL CHALLENGES OF VoIP BYPASS

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

How To Implement A Cisco Vip From Scratch

Architecture of End-to-End QoS for VoIP Call Processing in the MPLS Network

Introduction to VoIP Technology

VOIP Security Essentials. Jeff Waldron

IP Telephony and Network Convergence

Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum

FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction

Impact of enum and IP telephony

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

Written Testimony of John L. Barnes Director of Product Development Verizon Business. Hearing on VoIP: Who Has Jurisdiction to Tax It?

NAT TCP SIP ALG Support

Implementing VoIP monitoring solutions. Deployment note

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Cisco Virtual Office Unified Contact Center Architecture

1. Public Switched Telephone Networks vs. Internet Protocol Networks

Security & Reliability in VoIP Solution

Gateways and Their Roles

TELECOMMUNICATION SYSTEMS

SIP Trunking and Voice over IP

Network Considerations for IP Video

SIP: Ringing Timer Support for INVITE Client Transaction

Feature Interaction in Internet Telephony

Avaya IP Office 8.1 Configuration Guide

Overview of Voice Over Internet Protocol

Media Gateway Controller RTP

DSAM VoIP Offerings App Note

Integrating Voice over IP services in IPv4 and IPv6 networks

VoIP / SIP Planning and Disclosure

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

Voice over IP Basics for IT Technicians

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

Need for Signaling and Call Control

SIP, Session Initiation Protocol used in VoIP

VoIP Overview Wayne Fonteix - AT&T Presented to: NARUC Committee on Telecommunications NARUC Committee on Finance and Technology February 25, 2003

Voice over IP is Transforming Business Communications

ABOUT AT&T GLOBAL CLEARINGHOUSE

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Analysis of Call scenario in NGN network

Course 4: IP Telephony and VoIP

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

(Refer Slide Time: 6:17)

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

An investigation into multimedia service creation using SIP

SIP Trunking Configuration with

Managing ^ VoIP Quality and Performance

An Introduction to VoIP Protocols

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

EE4607 Session Initiation Protocol

Frequently Asked Questions about Integrated Access

TSIN02 - Internetworking

SIP Service Providers and The Spam Problem

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

Session Initiation Protocol (SIP)

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Voice over IP (VoIP) Basics for IT Technicians

Voice-over-IP Standards and Interoperability Update IETF

SIP: Protocol Overview

Functional Specifications Document

VOICE OVER IP SECURITY

IP Telephony (Voice over IP)

Security and Risk Analysis of VoIP Networks

UK Interconnect White Paper

SIP : Session Initiation Protocol

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

SIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga

Configuration Notes 283

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud Supervisor: Prof.Dr. Shawkat K.Guirguis

Unit 23. RTP, VoIP. Shyam Parekh

SIP INTEROP TEST DESCRIPTION

PPreferredID = "P-Preferred-Identity" HCOLON PPreferredID-value. *(COMMA PPreferredID-value)

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

VoIP telephony over internet

End-2-End QoS Provisioning in UMTS networks

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide

Function Description Ascom IP-DECT System

White Paper. avaya.com 1. Table of Contents. Starting Points

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

LTS. Voice Over IP: Architectures, Applications and Challenges. Tom Chapuran Telcordia Technologies

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

Advanced SIP Series: SIP and 3GPP Operations

EarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

VOICE SERVICES AND AVIATION DATA NETWORKS

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Transcription:

Architectural Considerations for Providing Carrier Class Telephony Services Utilizing SIP... W. arshall, K. K. Ramakrishnan, E. iller, G. Russell, B. Beser,. annette, K. Steinbrenner, D. Oran, J. Pickens, P. Lalwaney, J. Fellows, D. Evans, K. Kelly, F. Andreasen AT&T, CableLabs, 3Com, Cisco, Com21, General Instrument, Lucent Cable, NetSpeak, Telcordia July 1999 IETF Presentation 1

Requirements from a Service Provider s Perspective Need for differentiated quality-of-service is fundamental must support resource reservation and admission control, where needed hope SIP enables lots of new services; also desire to meet needs of current users Allow for authentication and authorization on a call-by-call basis Can t trust CPE to transmit accurate information or keep it private Need to guarantee privacy and accuracy of feature information e.g., Caller ID, Caller ID-block, Calling Name, Called Party» privacy may also imply keeping IP addresses private Protect the network from fraud and theft of service critical, given the incentive to bypass network controls We must be able to operate in large scale, cost-effectively don t keep state for stable calls in proxies; end-points can keep state associated with their own calls 2

Distributed Call Signaling Framework Proxy+GC Announcement Server Proxy+GC TA Access Signaling Transport (IP) edia transport (IP) TA TA = edia Terminal Adapter = Access odem PSTN G/W = Edge Router Designed as a complete end-to-end signaling architecture for PacketCable Philosophy: encourage features and services in intelligent end-points, wherever technically and economically feasible Proxy designed to be scalable transaction server PSTN Local LD Resource management protocol provides necessary semantics for telephony Gates (packet classifiers) at network edge allow us to avoid theft of service 3

DCS Architecture Enhances SIP With Carrier Class Features Resource anagement Privacy Authorization and Theft of Service issues Tight Coupling Between Call Signaling And QoS Control Prevent Call Defects: don t ring the phone if resources are unavailable Prevent Theft Of Service: associate usage recording and resource allocation, ensuring non-repudiation» provide the ability to bill for usage, without trusting end-points» ensure quality requirements for service are met (e.g., don t clip Hello ) Care taken to ensure untrusted end-points behave as desired Privacy mechanisms built into architecture 4

DCS Architecture akes use of end-point intelligence useful from the point of view of new feature creation Distribution of state Clients keep Call State Edge Routers keep Connection State Proxy only keeps Transaction State Failure model minimizes service impacts due to component outages 5

DCS Architecture Proxy+GC Announcement Server Proxy+GC TA Access Signaling Transport (IP) edia transport (IP) TA TA = edia Terminal Adapter = odem PSTN G/W = Edge Router PSTN Local LD Call State Connection State Transaction State 6

Example Call Flow Authentication, Authorization, Admission control Proxy Announcement Server Proxy Number-to- Address Translation INVITE (no ring) TA Access INVITE (no ring) CTS TA INVITE (no ring) TA issues an INVITE to destination E.164 (or other) address don t know yet what resources are needed to where provider may choose to block a call if resources are unavailable» but P(blocking) may be P(call defect) call defect: when the call fails after the parties are notified Originating proxy performs authentication and authorization Terminating proxy translates dest. number to local IP address 7

Example Call Flow (contd( contd ) 200 OK Setup Gate Proxy Announcement Server Proxy 200 OK TA Access 200 OK Setup Gate TA 200 OK communicates call parameters and gate identity to TA Gate controllers setup gates at edge routers as part of call setup gate is described as an envelope of possible reservations issued by TA gate permits reservation for this call to be admitted Policy may be exercised either at Gate controller or associated policy server 8

Resource anagement: 1 st Phase Announcement Server Gatecontroller Gatecontroller TA Access Backbone Reservation TA PATH / Reserve TA initiates resource reservation access resources are reserved after an admission control check PATH / Reserve» this insures that resources are available when terminating TA rings backbone resources are reserved (e.g., explicit reservation or packet marking ) Originating TA starts end-to-end handshake with terminating TA originating TA sends INVITE(ring), terminating TA sends 180 RINGING, 200 OK 9

Resource anagement: 2 nd Phase Announcement Server Gatecontroller Gatecontroller TA Access INVITE(ring) 200 OK 180 Ringing TA Commit/Commit Ack Commit/Commit Ack TA knows voice path is established when it receives a 200 OK TAs initiate resource commitment resources committed over access channel» CTS starts sending unsolicited grants; usage recording is started commitment deferred until far end pick up, to prevent theft of service; allow efficient use of constrained resources in access network Commit opens the gate for this flow 10

Signaling Performance Requirements Short post-dial delay no perceptible difference in post-dial delay compared to circuit-switched network Short post-pickup delay delay from when the user picks up a ringing phone and the voice path being cut-through should be small» called party s hello must not be clipped» calling party s response to hearing the hello must also not be clipped Probability of Blocking: a metric to which provider may engineer net Probability of Call Defect (i.e., call that has both parties invited to and then fails) due to lack of resources needs to be much smaller target rates not necessarily under the control of the provider Flexibility in deployment of Proxy: start small. 11

DCS: Profile With Extensions 6 Internet Drafts have been submitted: Architectural Overview» draft-dcsgroup-mmusic-arch-00.txt Resource anagement And Call Authorization Privacy» draft-dcsgroup-mmusic-resource-00.txt» draft-dcsgroup-mmusic-call-auth-00.txt» draft-dcsgroup-mmusic-privacy-00.txt Proxy-to-Proxy Communications» draft-dcsgroup-mmusic-proxy-proxy-00.txt Distributed Call State» draft-dcsgroup-mmusic-state-00.txt 12