Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-penno- message-flows-02 Reinaldo Penno, Daryl Malas, Adam Uzelac,

Slides:



Advertisements
Similar presentations
1 SIP End-to-End Performance Metrics (draft-ietf-pmol-sip-perf-metrics-00.txt)draft-ietf-pmol-sip-perf-metrics-00.txt 71 st IETF Conference PMOL Daryl.
Advertisements

© 2006 NEC Corporation - Confidential age 1 November SPEERMINT Security Threats and Suggested Countermeasures draft-ietf-speermint-voipthreats-01.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: DT Update on MIH L3 transport Date Submitted: September, 2007 Presented.
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 ANCP protocol draft updates draft-ietf-ancp-protocol-00.txt ANCP.
Copyright© Microsoft Corporation Speaker:Engagement consultant Title of presentation:Assessment of the Environment Length of presentation: 45 minutes Audience:Customer.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-pbb-evpn-05.txt Ali Sajassi (Cisco), Nabil Bitar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-02.txt A. Sajassi.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
P2PSIP Charter Proposal Many people helped write this charter…
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
1 Proposal for BENCHMARKING SIP NETWORKING DEVICES draft-poretsky-sip-bench-term-01.txt draft-poretsky-sip-bench-meth-00.txt Co-authors are Scott Poretsky.
1 IPsec-based MIP6 Security Qualcomm Inc. Starent Inc. Notice: Contributors grant free, irrevocable license to 3GPP2 and its Organization Partners to incorporate.
Draft-khan-ip-serv-peer-arch-03.txt SPEERMINT Peering Architecture IETF-66, Montreal, Canada Sohel Khan, Ph.D. Technology Strategist.
SPEERMINT Terminology Draft th IETF - Chicago Editors: Daryl Malas David Meyer.
Copyright 2014 Open Networking User Group. All Rights Reserved Confidential Not For Distribution Six Steps To A Common Open Networking Ecosystem Common.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop - draft - Jack Nasielski
DNS SRV and NAPTR Use for SPEERMINT - Tom Creighton, Gaurav Khandpur Comcast SPEERMINT Intermin Meeting Philadelphia Sept
7/6/20061 Speermint Use Case for Cable IETF 66 Yiu L. Lee JULY 2006.
Monami6 WG Meeting IETF 65 March 21, Agenda Welcome, agenda bashing, WG documents status - 5 minutes, Vijay Devaparalli –draft-ietf-monami6-mipv6-analysis.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
November 21st, 2002 Media Transcoding Design Team (a.k.a. team for the deaf) SIPPING WG
IMS 架構與話務分析 網路管理維運資源中心 日期 : 2013/07/25 網路管理維運資源中心 日期 : 2013/07/25 限閱.
Company Confidential 1 ICMPv6 Echo Replies for Teredo Clients draft-denis-icmpv6-generation-for-teredo-00 behave, IETF#75 Stockholm Teemu Savolainen.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-etree-02.txt A. Sajassi (Cisco), S. Samer.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
Requirements for SIP-based VoIP Interconnection (BCP) draft-natale-sip-voip-requirements-00.txt Bob Natale For Consideration by the.
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: L3 Transport for MIH Services Date Submitted: July 19, 2007 Presented at IEEE
IPv6 Introduction Joe zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Subscription ID Scope Date Submitted: June, 14 th, 2007 Presented.
1 SIP Performance Benchmarking draft-poretsky-sip-bench-term-04.txt draft-poretsky-bmwg-sip-bench-meth-02.txt BMWG, IETF-70 Vancouver Dec 2007 Davids IIT.
RTCWEB Considerations for NATs, Firewalls and HTTP proxies draft-hutton-rtcweb-nat-firewall- considerations A. Hutton, T. Stach, J. Uberti.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update draft-raggarwa-sajassi-evpn-02.txt R. Aggarwal (Juniper),
Page 1 IETF Speermint Working Group Speermint Requirements/Guidelines for SIP session peering draft-ietf-speermint-requirements-02 IETF 69 - Monday July.
IEEE MEDIA INDEPENDENT HANDOVER Title: Use Cases, Security Study Group Date Submitted: Nov 13 th, 2007 Presented at: IEEE Security SG Authors.
Session Peering Use Cases for Federations David Schwartz – Kayote Networks Eli Katz - XConnect Jeremy Barkan - Digitalshtick draft-schwartz-speermint-use-cases-federations-00.txt.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
MEGACO SIP State Machine Inter-conversion and Message Translation
Defence R&D Canada R et D pour la défense Canada Dynamic VPN Controller Update Developed by NRNS Inc. November 12, 2003.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
I know SIP works, but why does it not work with _____________? Ensuring Interoperability Sean Rivers 2/1/2011.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-04.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
1 3gpp_trans/ / IPv6 Transition Solutions for 3GPP Networks draft-wiljakka-3gpp-ipv6-transition-00.txt Juha Wiljakka,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-ietf-l2vpn-evpn-05.txt A. Sajassi (Cisco), R. Aggarwal (Arktan),
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: ID Definition Date Submitted: July 14, 2006 Presented at IEEE session in San.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - BeiJing Signaling Extension for MPLS Ring Yong Huang.
Page 1TTT - May 12, GPP IMS Standardization Update Bell Labs Innovations Lucent Technologies Room 9C Lucent Ln. Naperville, IL E Mail.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-04.txt A. Sajassi.
Netconf Schema Query Mark Scott IETF 70 Vancouver December 2007
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 MPLS Upstream Label Assignment for RSVP- TE and LDP draft-raggarwa-mpls-rsvp-ldp-upstream-
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 190th IETF - Toronto Multi-chassis PON Protection in MPLS Yuanlong.
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
Draft-ietf-v6ops-ipsec-tunnels-03 Using IPsec to Secure IPv6-in-IPv4 Tunnels draft-ietf-v6ops-ipsec-tunnels-03 Richard Graveman Mohan Parthasarathy Pekka.
SPEERMINT Architecture - Reinaldo Penno Juniper Networks SPEERMINT, IETF 70 Vancouver, Canada 2 December 2007.
Application-Layer Policy Enforcement at SIP Firewalls ( draft-jfp-sipfw-policy-00.txt) SIP WG 48th IETF Jon Peterson Level(3) Communications.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update R. Aggarwal (Juniper), A. Sajassi (Cisco), W. Hendericx.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-bess-evpn-vpls-seamless- integ-00.txt A. Sajassi (Cisco),
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Omniran CF00 1 Key Concepts of Association and Disassociation Date: Authors: NameAffiliationPhone Max RiegelNokia
© 2006 ITT Educational Services Inc.
Signal Conditioning.
Presentation transcript:

Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-penno- message-flows-02 Reinaldo Penno, Daryl Malas, Adam Uzelac, Sohel Khan

2 Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Goal  Provide reference message flows for the most common peering scenarios  Differently from the SIP call flows RFC/drafts, this document provides more context and discussions around message flows. Peering models QoS Media handling Policy Enforcement etc

3 Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Common Peering Message Phases Discovery: DNS queries, Federation DNS, Manual configuration, etc Security Establishment: TLS, Access Lists, IPSec, Registrations, etc SIP Signaling Exchange: SIP over UDP/TCP/others SIP Policy, Domain or Federation Exchange: SIP Subscribe/Notify, etc SIP Media Flows: Media Relays, QoS

4 Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Taxonomy of Peering Scenarios and Associated Message Flows SIP Policy Exchange SIP Policy, Domain & Federation exchange Media Relays, Transcoding Media Flows SIP Over UDP/TCP  SIP over UDP/TCP Signaling Access Lists, IPSec, physical segregation, etc TLS, Registrations, etc Security Manual configurationDNS, others dynamic methods Discovery StaticOn-Demand Policy, Domain Exchange

5 Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Example Message Flow

6 Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Moving forward  Incorporate/refine existing message flows and introduce new message flows related to federations and others  Align terminology and requirements with new documents  Adopt it as a WG document