Enhancing the Serviceability and the Availability of IMS-Based Multimedia Services: Avoiding Core Service Failures Mohamed BOUCADAIR France Telecom R&D.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
Evolution of NGN and NGA scenario in Nepal Nepal Telecommunications Authority.
Muse confidential Service Rich Access Networks: The Service Plane Solution Edith Gilon – de Lumley Bell Labs R&I, Alcatel-Lucent BroadBand Europe Antwerp,
22-23 June 2004TISPAN-3GPP Workshop - Sophia-Antipolis 1 TISPAN NGN Architecture Overview Richard Brennan pulver.com, WG2 Chair
All rights reserved © 2006, Alcatel Benefits of Distributed Access Border Gateway in the Access  Benoît De Vos Alcatel, May 29 th 2006.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Reliability on Web Services Presented by Pat Chan 17/10/2005.
SBC in NGN Architectures Jonathan Cumming. Copyright © 2006 Data Connection Limited All Rights Reserved.2 SBC in NGN Architectures NGN Standardisation.
IMS Workshop- Summary James Rafferty August
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen A Cooperative SIP Infrastructure for Highly.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Session-ID Requirements for IETF84 draft-ietf-insipid-session-id-reqts-00 1 August 2012 Paul Jones, Gonzalo Salgueiro, James Polk, Laura Liess, Hadriel.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Lucent Technologies – Proprietary Use pursuant to company instruction 1 3GPP2 Workshop MMD IMS Architecture June 28, 2005 Anne Y. Lee IMS Systems Engineering.
Failure Spread in Redundant UMTS Core Network n Author: Tuomas Erke, Helsinki University of Technology n Supervisor: Timo Korhonen, Professor of Telecommunication.
P2PSIP Charter Proposal Many people helped write this charter…
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
RIPE64 Enum Working Group DE-CIX NGN Services.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 8 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Ben-Gurion University of the Negev Analyzing the Integration of Innovative Telecommunication Technologies Project Number P Yossi Twizer Supervisor:
June 2006 Roles of Session Border Controllers in IMS Networks CANTO - June 2006.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
SIP Extensions for Enhanced Location Based Services in 3G Networks International SIP 2004, Paris Pavitra Krishnaswamy Application-Ready.
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
1 Multimedia Services Service provider Service client Service registry Publish Find/discovery Bind Multimedia Services Framework and architecture.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Université du Québec École de technologie supérieure Department of software and IT engineering Real-time multi-user transcoding for push to talk over cellular.
Lecture 4: Sun: 23/4/1435 Distributed Operating Systems Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Telecom in Transition Global Telecommunications is in a time of dramatic transition –Traditional telephone service was just about voice –We now live in.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
IMS 架構與話務分析 網路管理維運資源中心 日期 : 2013/07/25 網路管理維運資源中心 日期 : 2013/07/25 限閱.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
Basic component of Network Management Woraphon Lilakiatsakun.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Interactive Connectivity Establishment : ICE
Interconnecting P2PSIP and IMS Jani Hautakorpi¹, Arturo Salinas¹, Erkki Harjula², Mika Ylianttila² ¹Ericsson Research Nomadiclab ²MediaTeam Oulu Group,
To Rent or Buy the IP PBX? Maybe it’s Both…. Building a VoIP Solution That Enables Both.
Open your mind to a beating heart of IP Herman Abel Product Manager Aculab (stand 515) Phone:
IMS developments in 3GPP
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
© 2007 Level 3 Communications, LLC. All Rights Reserved. 1 Beyond SIP Trunking What’s Next ? September 11, 2007 Michael Remacle.
1 Middleware and future telecom ’platform’ By Lill Kristiansen, ntnu.
OPTIMIZATION OF SIGNALING TRAFFIC IN CENTRALIZED CONFERENCES USING SIP Submitted by D.NEHRU S.JAYABALAN B.Tech IT II Year.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
J. Halpern (Ericsson), C. Pignataro (Cisco)
Extension of the MLD proxy functionality to support multiple upstream interfaces 1 Luis M. Contreras Telefónica I+D Carlos J. Bernardos Universidad Carlos.
PART1 Data collection methodology and NM paradigms 1.
1 Implementation of IMS-based S-CSCF with Presence Service Jenq-Muh Hsu and Yi-Han Lin National Chung Cheng University Department of Computer Science &
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
12/11/2010V6OPS Mobile Transition IETF 791 Mobile Use Case and Transition Guide Looking Ahead To New Draft Versions draft-zhou-v6ops-mobile-use-case draft-tsou-v6ops-mobile-transition-guide.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
IP Telephony (VoIP).
BGP-Based SPF RTGWG - Jan 2017
Peer-to-peer networking
CHAPTER 3 Architectures for Distributed Systems
Host Multicast: A Framework for Delivering Multicast to End Users
More on Discovery and Advertisement
Presentation transcript:

Enhancing the Serviceability and the Availability of IMS-Based Multimedia Services: Avoiding Core Service Failures Mohamed BOUCADAIR France Telecom R&D Cardiff, 17/09/2008

Agenda Context Challenges Potentials of P2P and autonomic techniques Focus on Robustness and Availability Proposals to avoid core segment failures

Context PSTN renewal is a fact IMS and TISPAN have been adopted as the main architectures for the deployment of conversational services These architectures are centralized and suffer from several hurdles related to robustness and availability Current deployments assume a vertical model: both service and transport layers are managed by the same administrative entity… In the meantime, autonomic solutions and P2P-based alternatives have been promoted These techniques present numerous potentials…that can be exploited by telcos

Potentials of P2P and Autonomic techniques: Examples Allow dynamic and autonomous behaviours instead of "static/frozen" one Implement scalable service offerings through “intelligent” load distribution Avoid DoS (Denial of Service) and SPAM attacks since the service logic is distributed among several nodes. The impact of a DoS attack may not be critical as for a centralised service platform Enable fast re-route, dynamic failure detection and failure repair Enhance service reliability Reduce CAPEX and OPEX Etc.

Challenges Enhance current IMS-based service offerings Exploit autonomic techniques in operational networks and propose viable scenarios of usage of these promising techniques Focus on Robustness and availability This paper presents only a part of a toolkit elaborated within the EURESCOM study: "P1755, P2PSIP Potentials in telecommunications" –The toolkit covers several areas such as access failures, core failures, avalanche restart, flash crowds, etc.

Enhancing Robustness of IMS- based architectures The main objective is to propose a set of viable solutions aiming to enhance the robustness and the availability of current IMS-based architectures owing to the activation of autonomic techniques A Service Provider's standpoint is adopted for the deployment of autonomic techniques The adopted rationale argues in favor of introducing autonomic means into current operational service platforms in order to build survival and deterministic networks –autonomic means are not used as alternative solutions but as an enhancement to the already deployed ones –For backward compatibility and for migration issues, it is recommended to enforce the proposed solutions as backup ones in the earlier stages of deployment –Once field proven, the proposed mechanisms could be enforced as primary procedures to deliver more sophisticated services

Macroscopic view of IMS-based architectures IMS-based architectures may be devided into three segments: –Access segment This segment encloses functions which are required for connecting customers’ equipment to the service This segment may include for instance BGF or P-CSCF Several of access functions are embedded in SBC (Session Border Controllers) –Core segment This segment is the place where the service logic and required functions such as routing, billing, etc. are hosted Within IMS architecture, this segment is responsible for interconnecting to internal or external AS (Application Servers) Examples of core IMS functional elements : I-CSCF, S-CSCF, HSS, etc. –Border segment or Interconnection segment This segment groups required functions to interconnect with external realms These external realms may be VoIP ones, PSTN, PLMN or any other voice service domain Usually this segment is implemented by an SBC

Macroscopic View of an IMS- enabled Service Domain Core PF Service Provider SBC1 SBC1_b SBC2 SBC2_b SBC3 SBC3_b SBC4 SBC4_b Service POP1 Service POP2 Service POP3 Service POP4 Access POP: physical redundancy is usually implemented

Macroscopic View of an IMS- enabled Service Domain Core PF Service Provider SBC1 SBC1_b SBC2 SBC2_b SBC3 SBC3_b SBC4 SBC4_b Service POP1 Service POP2 Service POP3 Service POP4 SBC is the first service contact point of each User Equipment UE1

Macroscopic View of an IMS- enabled Service Domain Core PF Service Provider SBC1 SBC1_b SBC2 SBC2_b SBC3 SBC3_b SBC4 SBC4_b Service POP1 Service POP2 Service POP3 Service POP4 The service topology is hidden. Only SBCs are visible to external parties UE1

SBC nodes SBC stands for Session Border Controller SBC have been introduced to solve several problems encountered in SIP deployments Examples of functions supported by these nodes are –Topology hiding –NAT Traversal –Solve protocol mismatch –Etc. SBC are considered as a single point of failure

Focus on core service failures Failure of core segment –When access to core service nodes is broken –Problems reltaed to: Availbility of the core service nodes Routing problems; Etc.

Focus on core service failures: Scenario 1 Core PF Service Provider SBC1 SBC1_b SBC2 SBC2_b SBC3 SBC3_b SBC4 SBC4_b Service POP1 Service POP2 Service POP3 Service POP4 Failure One or many core service nodes are out of service: the service can not be delivered to end users

Focus on core service failures: Scenario 1 Core PF Service Provider SBC1 SBC1_b SBC2 SBC2_b SBC3 SBC3_b SBC4 SBC4_b Service POP1 Service POP2 Service POP3 Service POP4 Failure UE1 UA1 is unable to register to the service or to invoke its subscribed services

Focus on core service failures: Scenario 2 Core PF Service Provider SBC1 SBC1_b SBC2 SBC2_b SBC3 SBC3_b SBC4 SBC4_b Service POP1 Service POP2 Service POP3 Service POP4 Failure One or many access SBCs are unable to reach core service nodes: the service can not be delivered to end users

Focus on core service failures: Scenario 2 Core PF Service Provider SBC1 SBC1_b SBC2 SBC2_b SBC3 SBC3_b SBC4 SBC4_b Service POP1 Service POP2 Service POP3 Service POP4 Failure UE1 UA1 is unable to register to the service or to invoke its subscribed services

Proposal to Enhance IMS architectures Unlike current IMS-based deployments, this solution aims to involve actively SBC nodes in the failure detection and reactivation processes Additional functions and interfaces are introduced for this purpose The characteristics of the proposed solution are as follows: –Assess the availability of core service through the invocation of dedicated messages –Detect an un-reachability problem between a given SBC and core service platform –Adopt a collaborative mode in which SBCs will intervene in the routing resolution process

Proposal to Enhance IMS architectures Two scenarios may be envisaged: –(1) Partial Failure This means that at least one SBC can reach core service nodes In this scenario, a new procedure is introduced and implemented by SBCs This procedure consists to select an SBC_PROXY which will relay messages to core service platform. A multicast channel is used for this purpose –(2) Full Failure All SBCs fail to reach core service nodes Once this occurs, all SBCs activate their autonomous mode and are acting as a network of co-equal peers, intervening during the routing process Messages are not routed to core service nodes anymore, but are processed by SBCs themselves

Partial Failure If Multicast is enabled, a multicast group is configured and all SBCs and Interconnection nodes are member of this group. If not, P2PSIP like mechanisms are used to create an SBC overlay network Means to subscribe to this multicast group are activated in all SBCs (e.g. IGMP) Keep alive messages are issued regularly to assess to availability to reach core service nodes –How to implement this function is not detailed in this paper Once an unavailability is detected, a given SBC sends a dedicated request to select an SBC_PROXY which is able to reach core service nodes –The request is sent to the aforementioned multicast group –Responses are sent using unicast –If several offers are received, the local SBC makes its decision based on some criteria such as CPU, IGP path, etc. –All subsequent communications will cross this SBC_PROXY

Example of a Call Flow during a partial failure UE1SBC1SBC4SBC2UE4 (1) Keep-alive Core PF Is out of service (2) SBC_PROXY_REQUEST() (3a) SBC_PROXY_OFFER() (3b) SBC_PROXY_OFFER() SBC2 is selected as SBC_PROXY (4a) INVITE(UE4) (4b) INVITE(UE4) (4c) INVITE(UE4) (4d) INVITE(UE4) (5a) OK (5b) OK (5c) OK (5d) OK (6a) ACK) (6b) ACK (6c) ACK (6d) ACK) RTP

Example of a Call Flow during a full failure UE1SBC1SBC4UE4 (1) Keep-alive Core PF Is out of service (2) SBC_PROXY_REQUEST() Mode Auto (3a) INVITE(UE4) (3d) INVITE(UE4) (3e) INVITE(UE4) (4a) OK (4b) OK (4c) OK (5a) ACK) (5b) ACK (5c) ACK) RTP (3b) lookup_req(UE4) (3c) lookup_res()

Conclusions Owing to autonomic behaviors, the service is delivered to end users even in case of partial or full failures Customers are not aware about occurred failures Further effort should be undertaken to assess the validity of the proposed solution for the delivery of sophisticated services

Questions?