1 SIP Extensions QoS, Authentication, Privacy, Billing,... Project Packetcable John R. Pickens, PhD VP Technology and CTO 408 953 9228.

Slides:



Advertisements
Similar presentations
CAUSES & CURE OF LATENCY IN THE INTERNET TELEPHONY DR. OLUMIDE SUNDAY ADEWALE Dept of Industrial Math & Computer Science Federal University of Technology.
Advertisements

© 1997 CableLabs® Proprietary and Confidential PacketCable Project Terry D. Shaw, Ph. D.
Early Media Authorization Under what conditions should negotiated media flow prior to 200 OK (INVITE)? Richard Ejzak.
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Telephony Troubleshooting in the Home
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
CCNA – Network Fundamentals
1 DOSA: An Architecture for IP Telephony Services Chuck Kalmanek AT&T Labs - Research Presentation at Opensig’99 Pittsburgh October 15, 1999 With grateful.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
UNCW UNCW SIGGRAPH 2002 Topic #3: Continuous Media in Wired and Wireless Environments Ronald J. Vetter Department of Computer Science University of North.
Session Initiation Protocol (SIP) By: Zhixin Chen.
12/05/2000CS590F, Purdue University1 Sip Implementation Protocol Presented By: Sanjay Agrawal Sambhrama Mundkur.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Multicast Communication
1 Extending SIP Speaker: Hsuan-Ming Chen Adviser: Ho-Ting Wu Date: 2005/04/26.
Scott Hoffpauir BroadSoft, Inc. Vice President, Engineering OPENSIG October 15, 1999 The Enhanced Services Layer in a Distributed Packet Network.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
Signaling interworks in PSTN and Voice-over-IP networks
1 IETF VoIP Peering BOF: Input on Inter-domain SIP Requirements for VoIP Peering Jean-François Mulé CableLabs
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Session-ID Requirements for IETF84 draft-ietf-insipid-session-id-reqts-00 1 August 2012 Paul Jones, Gonzalo Salgueiro, James Polk, Laura Liess, Hadriel.
IETF 63 - Paris VOIPPEER BoF A Broadband Service Provider’s Perspective on VoIP Peering August 5, 2005 Presented by Jason Livingood.
Session Initiation Protocol Team Members: Manjiri Ayyar Pallavi Murudkar Sriusha Kottalanka Vamsi Ambati Girish Satya LeeAnn Tam.
Fall VON - September 28, 1999 C O N N E C T I N G T H E W O R L D W I T H A P P L I C A T I O N S SIP - Ready to Deploy Jim Nelson,
1 NGN Issues - Numbering and Addressing Peter Darling ACIF NGN FOG No. 3.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 8 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
© 2006 Cisco Systems, Inc. All rights reserved. 3.3: Selecting an Appropriate QoS Policy Model.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 4 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Introduction to SIP Based ENUM IP Telephony Infrastructure 資策會 網路及通訊實驗室 Conference over IP Team 楊政遠 博士
Introduction to Cable Telephony Larry Greenstein Director of Product Management Nuera Communications
IPCablecom - Network and Service Architecture Dipl.-Ing. Volker Leisse Institute for Communications Technology Braunschweig Technical University
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
Presented By Team Netgeeks SIP Session Initiation Protocol.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
7/6/20061 Speermint Use Case for Cable IETF 66 Yiu L. Lee JULY 2006.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
ACHIEVING MULTIMEDIA QOS OVER HYBRID IP/PSTN INFRASTRUCTURES QOS Signalling and Media Gateway Control ITU-T SG13/SG16 Workshop on IP Networking and Mediacom.
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
SIP Extensions for Network-Asserted Caller Identity and Privacy within Trusted Networks Flemming Andreasen W. Marshall, K. K. Ramakrishnan,
Interactive Connectivity Establishment : ICE
17 February 2016 SIPPING - IEPREP Joint Meeting Fred Baker - IEPREP co-chair Rohan Mahy - SIPPING co-chair.
Voice Over IP in Cable Broadband Venture Seminar Doug Jones Chief Architect YAS Broadband Ventures, LLC September 7, 2001 Presented for.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
The Session Initiation Protocol - SIP
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
Bearer Control for VoIP and VoMPLS Control Plane Francois Le Faucheur Bruce Thompson Cisco Systems, Inc. Angela Chiu AT&T March 30, 2000.
1 Agenda for Meeting  Purpose of Meeting –Motivation is to minimize (hope for 0) the SIP extensions in DCS spec –Discussion of 2-stage Invite and alternatives.
Introduction to Cable Telephony Craig Lee VP of Marketing Nuera Communications
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
Session Initiation Protocol (SIP)
Jean-François Mulé CableLabs
Flemming Andreasen SIP Extensions for Caller Identity and Privacy Flemming Andreasen
Overview of ETS in IPCablecom Networks
Transmission Quality of Service (QoS) in IPCablecom
TDR authentication requirements
Presentation transcript:

1 SIP Extensions QoS, Authentication, Privacy, Billing,... Project Packetcable John R. Pickens, PhD VP Technology and CTO

2 Presentation based in part on July 1999 IETF contributions W. Marshall, K. K. Ramakrishnan, E. Miller, G. Russell, B. Beser, M. Mannette, K. Steinbrenner, D. Oran, J. Pickens, P. Lalwaney, J. Fellows, D. Evans, K. Kelly, F. Andreasen AT&T, CableLabs, 3Com, Cisco, Com21, General Instrument, Lucent Cable, NetSpeak, Telcordia Acknowledgements

3 Problem Statement Cool Applications Desirable Service Revenue  Personal Policy == Cool Applications Administrative Policy == Desirable Service Revenue  SIP enables “personal policy”  How can SIP enable “administrative policy”?

4 Project Packetcable Overview  IP based multimedia networking services project, emphasizing IP telephony in the initial phases  Protocols based upon standards, with extensions (submitted to standards organizations) where needed  North American cable industry market, managed by Cablelabs, strong vendor support.  Distributed signaling paradigm is SIP (Packetcable 1.1).  Protocols and architecture developed for DOCSIS-based cable, but applicable to other broadband access network technologies. Note: Other backoffice uses of SIP are envisioned, not in the current work.

5 Packetcable Components

6 SIP Interfaces (Packetcable 1.1)

7 Call Management Server Interfaces Call AgentDCS-Proxy Gate Controller DQos Call Signaling QoS Signaling Translation, Congestion Control, PSTN DB access, Event recording, Routing Call Management Server (CMS) COPS DCS/SIP NCS/MGCP

8 Requirements from a Service Provider’s Perspective  Need for differentiated quality-of-service is fundamental –must support resource reservation and admission control, where needed –hope SIP enables lots of new services; also desire to meet needs of current users  Allow for authentication and authorization on a call-by-call basis  Can’t trust CPE to transmit accurate information or keep it private  Need to guarantee privacy and accuracy of feature information –e.g., Caller ID, Caller ID-block, Calling Name, Called Party »privacy may also imply keeping IP addresses private  Protect the network from fraud and theft of service –critical, given the incentive to bypass network controls  We must be able to operate in large scale, cost-effectively –don’t keep state for stable calls in proxies; end-points can keep state associated with their own calls

9 Distributed Call Signaling Framework  Designed as a complete end-to-end signaling architecture for PacketCable –Philosophy: encourage features and services in intelligent end-points, wherever technically and economically feasible –“DCS-Proxy” designed to be scalable transaction server –Resource management protocol provides necessary semantics for telephony –“Gates” (packet classifiers) at network edge allow us to avoid theft of service PSTN MTAM PSTN G/W Local LD DCS- Proxy+GC DCS- Proxy+GC Signaling Transport (IP) Media transport (IP) Access MTA = Media Terminal Adapter M = Access Modem ER = Edge Router ER MMTA ER Announcement Server

10 DCS Architecture  Enhances SIP With Carrier Class Features –Resource Management –Privacy –Authorization and Theft of Service issues  Tight Coupling Between Call Signaling And QoS Control –Prevent Call Defects: don’t ring the phone if resources are unavailable –Prevent Theft Of Service: associate usage recording and resource allocation, ensuring non-repudiation »provide the ability to bill for usage, without trusting end-points »ensure quality requirements for service are met (e.g., don’t clip “Hello”)  Care taken to ensure untrusted end-points behave as desired  Privacy mechanisms built into architecture

11 DCS Architecture  Makes use of end-point intelligence –useful from the point of view of new feature creation  Distribution of state –Clients keep Call State –Edge Routers keep Connection State –DCS-Proxy only keeps Transaction State  Failure model minimizes service impacts due to component outages

12 Transaction State Connection State Call State DCS Architecture PSTN MTAM PSTN G/W Local LD DCS- Proxy+GC DCS- Proxy+GC Signaling Transport (IP) Media transport (IP) Access MTA = Media Terminal Adapter M = Modem ER = Edge Router ER MMTA ER Announcement Server

13 Example Call Flow  MTA issues an INVITE to destination E.164 (or other) address –don’t know yet “what” resources are needed to “where” –provider may choose to block a call if resources are unavailable »but P(blocking) may be  P(call defect) ê call defect: when the call fails after the parties are notified  Originating DCS-proxy performs authentication and authorization  Terminating DCS-proxy translates dest. number to local IP address Authentication, Authorization, Admission control INVITE (no ring) Number-to- Address Translation INVITE (no ring) CMTS ER MTAM DCS- Proxy DCS- Proxy Access MMTA ER Announcement Server INVITE (no ring)

14 Example Call Flow (contd…)  200 OK communicates call parameters and gate identity to MTA  Gate controllers setup “gates” at edge routers as part of call setup –gate is described as an “envelope” of possible reservations issued by MTA –gate permits reservation for this call to be admitted  Policy may be exercised either at Gate controller or associated policy server 200 OK Setup Gate Setup Gate 200 OK MTA M DCS- Proxy DCS- Proxy Access ER M Announcement Server

15 Resource Management: 1 st Phase  MTA initiates resource reservation –access resources are “reserved” after an admission control check »this insures that resources are available when terminating MTA rings –backbone resources are “reserved” (e.g., explicit reservation or “packet marking”)  Originating MTA starts end-to-end handshake with terminating MTA –originating MTA sends INVITE(ring), terminating MTA sends 180 RINGING, 200 OK MTAM Gate- controller Gate- controller Access Backbone Reservation ER MMTA PATH / Reserve Announcement Server

16 Resource Management: 2 nd Phase  MTA knows voice path is established when it receives a 200 OK  MTAs initiate resource “commitment” –resources “committed” over access channel »CMTS starts sending unsolicited grants; usage recording is started –commitment deferred until far end pick up, to prevent theft of service; allow efficient use of constrained resources in access network  Commit opens the “gate” for this flow Commit/Commit Ack MTAM Gate- controller Gate- controller Access ER MMTA INVITE(ring) Commit/Commit Ack Announcement Server 180 Ringing 200 OK

17 Critical Messages and their Relationships  200 OK (GID O, IP T, [CI T ](GC O )) INVITE (AI, E.164 T, CP O ) MTA O MTA T ER O ER T GC T GC O Call In Progress INVITE ($, CP O, E.164 T, CI O ) 200 OK ( IP T, CI T ) INVITE (RING) 180 RINGING Starts ringback 200 OK 200 OK ( IP T ) INVITE (GID T, E.164 T, CP O, [CI O ](GC T )) Resource Reservation

18 “Gates” and Edge Router Functionality  “Gates” in edge routers opened for individual calls –call admission control and policing implemented in edge routers »gate utilizes packet filters that already exist in edge routers: “allow a call from this source to this destination” etc. –gate allows communication between a source and a destination, for a particular range of traffic parameters, and a particular duration –however, policy is controlled by the proxy  Proxy sets up gate in edge router after Call Setup authorized –permit access to managed network resources: users receive dependable QoS  MTA makes resource reservation request by signaling to edge router –edge router admits the reservation if consistent with gate parameters –edge router generates usage recording events based on reservation state

19 Signaling Performance Requirements  Short post-dial delay –no perceptible difference in post-dial delay compared to circuit-switched network  Short post-pickup delay –delay from when the user picks up a ringing phone and the voice path being cut-through should be small »called party’s “hello” must not be clipped »calling party’s response to hearing the “hello” must also not be clipped  Probability of Blocking: a metric to which provider may engineer net  Probability of Call Defect (i.e., call that has both parties invited to and then fails) due to lack of resources needs to be much smaller –target rates not necessarily under the control of the provider  Flexibility in deployment of DCS-Proxy: start small.

20  Two-phase invite  OSPS (Operator Services Positioning System)  Billing info  Gate info  Call State  Ring indicator  Privacy SIP Extensions

21 SIP Support needed for Resource Management  Additional header in initial INVITE message –No-Ring= “NoRing” “:”

22 State Header  Motivation: –Call state stored at endpoints by their SIP-Proxies during the initial INVITE exchange. This allows Proxies to be stateless during the call. –Endpoint passes state information to Proxies when call characteristics require change. –State information includes, but is not limited to: participating endpoint information, billing information. –State information cannot be altered undetectably by endpoints.  Syntax of the State Header State = "State" ":" private private = alpha *alphanum  Usage: –“State” header encrypted and signed by Proxy and sent to called endpoint in an INVITE message. –‘State” header encrypted and signed by Proxy and sent to the calling endpoint in the response to the INVITE.

23 OSPS Header (Operator Services Positioning System)  Motivation: –PSTN based services like Busy Line Verify and Emergency Interrupt require special treatment. –PSTN operator is unaware that the call is to a destination on the IP network. –PSTN gateway initiates SIP INVITE to endpoint. This includes the OSPS header. – An active endpoint receiving an INVITE containing this header does not return “Busy”.  Header Format OSPS = “OSPS” “:” OSPS-Tag OSPS-Tag = “BLV” | “EI”

24 Call (QoS) Authorization  Client needs to know the location of GATE –Gate-ID= 1*alphanum  Header placed in messages from Proxy to Client

25 Proxy-Proxy: Billing header  Billing Information: –Billing-ID = “DCS-Billing-ID” ”:” 1*unreserved –Billing-Info= “DCS-Billing-Info” “:” hostport [“/”Key] “ ” –Gate-Location = “DCS-Gate-Location” “:” hostport “/” Gate-ID [ Gate-Key]  User-param: –telephone-subscriber = global-phone-number | local-phone-number | augmented-phone-number user-param = “user=” ( “ip” | “phone” | “lnp-phone”)  Notes: New headers should not be sent to User Agents. Only between Proxies. Also, sensitive information (billing info) should only be passed on secure links.

26 Privacy (Outline Issues/Approaches)  Calling Identity Delivery Blocking (CIDB) –Depends on trusted intermediary (DCS Proxy) –User agent control  Inference attacks –DNS name inference –IP address inference –Anonymizer proposals –Potential exposures: From header field, Contact header field, Via header fields, Call-ID, SDP parameters, RTCP

27 Summary  SIP is design basis of carrier class service in Packetcable  SIP extensions proposed (administrative policy, privacy, …)  RSVP Extensions also proposed (not covered in this presentation)  Dialogue underway between Packetcable members and IETF to refine extension proposals  Packetcable vendors in various stages of prototyping and implementation  Future work and open issues –IP Address privacy issues –Multiple administrative domain issues –Interoperability with other SIP client issues –LAESS Issues