IP-NNI Joint Task Force Status Update

Slides:



Advertisements
Similar presentations
Re-INVITE Handling draft-camarillo-sipping-reinvite-00.txt
Advertisements

SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-02 David Hancock, Daryl Malas.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
COM555: Mobile Technologies Location-Identifier Separation.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-03 David Hancock, Daryl Malas.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
For discussion purposes. No implementation assurances 1 Consult 21 Interconnect Working Group NGN Interconnect - PSTN Emulation Technical Consultation.
RIPE64 Enum Working Group DE-CIX NGN Services.
Draft-campbell-dime-load- considerations-01 IETF 92 DIME Working Group Meeting Dallas, Texas.
Protocols and the TCP/IP Suite
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
© 2004 AT&T, All Rights Reserved. The world’s networking company SM VoIP, Portability, and the Evolution of Addressing LNPA & Future of Numbering Working.
Draft-khan-ip-serv-peer-arch-03.txt SPEERMINT Peering Architecture IETF-66, Montreal, Canada Sohel Khan, Ph.D. Technology Strategist.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Karlstad University IP security Ge Zhang
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
7/6/20061 Speermint Use Case for Cable IETF 66 Yiu L. Lee JULY 2006.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
Jackie Voss Manager, Global Standards Development ATIS All-IP Transition Initiatives September 30, 2015.
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-01 David Hancock, Daryl Malas.
SIP working group IETF#70 Essential corrections Keith Drage.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
July 2014Rüdiger Geib draft-geib-tsvwg-diffserv-intercon IETF 90, Toronto Presented by: David Black Private discussions David Black, Fred Baker and Ruediger.
Page 1 IETF Speermint Working Group Speermint Requirements/Guidelines for SIP session peering draft-ietf-speermint-requirements-02 IETF 69 - Monday July.
SIP-H.323 Interworking Group RRR-1 IETF-48 SIP-H.323 Interworking Requirements draft-agrawal-sip-h323-interworking-reqs-00.txt Hemant.
RFC3261 (Almost) Robert Sparks. SIPiT 10 2 Status of the New SIP RFC Passed IETF Last Call In the RFC Editor queue Author’s 48 hours review imminent IMPORTANT:
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Congestion Notification Process for Real-Time Traffic draft-babiarz-tsvwg-rtecn-04.txt Jozef Babiarz Kwok Ho Chan
Bearer Control for VoIP and VoMPLS Control Plane Francois Le Faucheur Bruce Thompson Cisco Systems, Inc. Angela Chiu AT&T March 30, 2000.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Jim McEachern Senior Technology Consultant ATIS July 8, 2015.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
Requirements for LER Forwarding of IPv4 Option Packets
Internet Protocol Version 6 Specifications
IP Telephony (VoIP).
Encryption and Network Security
IP-NNI Joint Task Force Status Update
Chapter 18 IP Security  IP Security (IPSec)
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
ATIS/SIP Forum NNI Task Force – Routing Team
Default cover design. Current Routing Solutions supporting the Interconnection of Carrier IP –based Multimedia Services in North America IPNNI
Global Standards Collaboration (GSC) GSC-15
Session Initiation Protocol (SIP)
Verstat Related Best Practices
Reference Architecture and Call Flow Example for SIP RPH Signing
IP-NNI Task Force – Phase 2
SIP RPH and TN Signing Cross Relationship
IP Interconnection Profile
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Architecture and Protocols
OSI Reference Model Unit II
Routing Considerations
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Congestion Control Comments Resolution
SHAKEN for Presented to: Ericsson Contact:
Discussion Issues on IMS-based NGN
Presentation transcript:

IP-NNI Joint Task Force Status Update June 17, 2014

Objective Provide an update on the status of the ATIS/SIP Forum IP-NNI joint task force Summary from face-to-face meeting June 16/17 Provide detailed readout on specific activities: IP Interconnection profile Routing architecture Test specification

Summary: IP Interconnection Profile Baseline draft of interconnection profile Draft profile includes specification of: Early media History-Info NS/EP (GETS/WPS) requirements P-Asserted Identity From/To/PAI URI exact format SIP Overload Control IPv4/IPv6 Codecs Security In process of creating the initial draft of test specification from the interconnection profile requirements

Summary: Routing Architecture Recognition that routing solutions will co-exist Existing mechanisms based on NANP structures Registry approaches independent of NANP structures Interworking between different approaches specified Draft Routing Architecture document targeted for August

IP Interconnection Profile

Protocol Technical Items Carriers MUST support the History-Info Header and SHOULD support of the SIP Diversion header for a period of time in order to facilitate interoperability. When both headers are sent, the sender MUST ensure that they are semantically identical. Carriers MAY support redirection across the NNI, based on bilateral agreement. The redirection MAY be performed with a 3XX or REFER message. Carriers MUST support P-Early-Media as defined in RFC 5009. Resource Priority Header (RPH) MUST be supported by NS/EP compliant networks, and MUST be transparently passed by non- NS/EP compliant networks. VOICE-ADMIT Forwarding Per-Hop Behaviour per RFC 5865

Protocol Technical Items Specified the exact presentations of Fully Qualified Domain Names in “From:”, “To:” and “PAI” fields. The originating Carrier network MUST provide the calling number of the originating user in the P-Asserted-Identity header field of dialog-initiating requests. If the originating user wants to remain anonymous, the originating Carrier network MUST include a Privacy header field containing the value "id" as specified in [RFC 3323] and [RFC 3325].

Protocol Technical Items Carriers MUST support SIP Overload Control with mandatory support of the default algorithm, for SIP congestion control. Carriers MAY optionally support the Rate Based algorithm based on bilateral agreement between two carriers. Government Priority Services are exempt from overload controls A Carrier network MAY impose limits on the number of simultaneous calls, and the incoming rate at which it will accept calls, from a peer. On receiving a dialog-initiating request that exceeds such limits, the receiving Carrier network MUST respond with a 503 (Service Unavailable) response. A Carrier network MAY periodically send an OPTIONS request containing a Max-Forwards header field set to a value of '0' to detect the availability of a peer’s ingress point.

Protocol Technical Items Distinguishing traffic classes In order to distinguish between traffic classes, the use of the DSCP marking scheme in Behavior Aggregation mode Same DSCP for Voice and Media VOICE-ADMIT Forwarding Per-Hop Behavior per RFC 5865 for NS/EP traffic It is the responsibility of the IPv6 Carrier network to perform the IPv4/IPv6 interworking function when interworking with an IPv4 Carrier network. Peer Carrier networks SHOULD support the RTP Loopback Test procedures Carrier networks that support the RTP Loopback procedures will provide a SIP URI that identifies a media endpoint within the Carrier network that performs the loopback functions. Ideally, this "loopback" media endpoint would be located near the ingress point of the peer Carrier network.

Codecs Mandatory and optional narrowband and wideband codecs, including codec/packetization period use and transcoding guidelines

Security The VoIP traffic, from the border element in one carrier’s domain to the border element in another carrier’s domain, shall be secured, either physically or logically, from Internet Transit traffic. This security can be achieved: physically: by implementing separated and dedicated networks for the traffic. logically: by implementing mechanism such as Virtual Private Networks (either layer 2, e.g., VLANs, or layer 3, e.g., MPLS-VPN) and Tunneling (e.g., IP Sec).

Routing Architecture

Routing Status IP interconnection already underway using routing based on bi-lateral exchange of mappings between NANP data structures (AOCN, CLLI, LRN, etc.) and Session Border Controller IP addresses Team reviewed a variety of proposals to support enhanced approaches including registry solutions not tied to NANP structures All methods require some bi-lateral negotiation and data exchange

Documentation Plan Developing document detailing Current NANP-based methods Simple SIP URI registry approach Interworking between providers using different methods Other proposals reviewed