+ All Categories
Home > Documents > IMSImpactsonSIPMar07

IMSImpactsonSIPMar07

Date post: 18-Jan-2016
Category:
Upload: norman-street
View: 1 times
Download: 0 times
Share this document with a friend
Description:
Telecommunications IMS Impacts on SIP
Popular Tags:
20
IMS Impacts on SIP Jonathan Cumming Director, VoIP Product Management
Transcript
Page 1: IMSImpactsonSIPMar07

IMS Impacts on SIPJonathan Cumming

Director, VoIP Product Management

Page 2: IMSImpactsonSIPMar07

2

Use of SIP in IMS

• Replacement signalling for calls, messaging and presence• Chosen for its Flexibility

Abstraction between layersEase of function distribution

Internet PSTN GSM

3G

• SIP was initially designed for the Internet

• But telephone networks are different

Open homogeneous IP network

Page 3: IMSImpactsonSIPMar07

3

Different Business Model

Business compete by offering more value than they cost, not by being cheaper.

Convenience &Reliability

Services

Trust

Cost

Perceived Value

Conv. & Rel.

Services

Trust Cost

Perceived Value

Traditional Telephony Internet Telephony

Val

ue to

con

sum

er /

£

Page 4: IMSImpactsonSIPMar07

4

IMS Requirements

SIP

Guaranteed QoS

Charging mechanismsCommercialCapabilities

Security to prevent theft and DoS

PSTN and Legacyfeatures

Legacy servicesand business

models

Caller-Id

Lawful Intercept

Privacy

Emergency CallHandling

Interoperability with legacy

devices

Architectural Differences

Low bandwidth links

Monitoring of inter-operator links

NAT and Firewall traversalAccess network

traversal

Page 5: IMSImpactsonSIPMar07

4

IMS Requirements

SIP

Guaranteed QoS

Charging mechanismsCommercialCapabilities

Security to prevent theft and DoS

PSTN and Legacyfeatures

Legacy servicesand business

models

Caller-Id

Lawful Intercept

Privacy

Emergency CallHandling

Interoperability with legacy

devices

Architectural Differences

Low bandwidth links

Monitoring of inter-operator links

NAT and Firewall traversalAccess network

traversal

Page 6: IMSImpactsonSIPMar07

5

Typical SIP scenario

• Signalling may be routed via proxies to provide address resolution

• Media routed directly across the Internet

Application Server

ProxyProxy / Registrar

Page 7: IMSImpactsonSIPMar07

6

IMS introduces Trusted Core and Untrusted Access

• Operator-managed core network• Responsible for service end-to-end• QoS guaranteed, SLAs monitored

Proxy

Core NetworkAccess Network Access Network

Page 8: IMSImpactsonSIPMar07

7

IMS introduces Trusted Core and Untrusted Access

• Access control enforced by P-CSCF and Media Gateways• Media reservation, Identity management

P-CSCF

BGF

Media Gateway

P-CSCF

BGF

S-CSCF

Secure tunnels, guaranteed QoS

Identity verified centrally

Protection at border

Signalling Gateway

Page 9: IMSImpactsonSIPMar07

8

Multiple carriers involved

P-CSCF

BGF

P-CSCF

BGF

S-CSCF

Page 10: IMSImpactsonSIPMar07

9

Multiple carriers involved

• Limited trust at border• Inter-carrier traffic monitored and controlled• Protocol interworking, e.g. H.323 and non-IMS SIP

P-CSCF

BGF

P-CSCF

BGF

S-CSCF

IBCF

BGF

IBCF

BGF

S-CSCF

Page 11: IMSImpactsonSIPMar07

10

Central identity management

• Strong mutual authentication using SIMs and AKA• Security Agreement (RFC 3329)

• Centrally-validated identity (P-Asserted-Identity)• Traceability for emergency calls and call-back• Identity removed at border to maintain privacy

• Support for multiple identities• P-Associated-URI• P-Preferred-Identity• P-Called-Party-ID

HSS

REGISTER

Security validationoccurs on SIM card

401 Unauthorized WWW-Authenticate:

REGISTER Authorization:

User credentialscalcuted by serverChallengeExpected SIM resultExpected response

200 OK

Home Server

REGISTER

20

0 OK

P-A

ssoc

iated

-URI:

IN

VITE

P-P

referr

ed-Id

entity

:

INVITE P-Network-Asserted-Id

Called Server

Caller Callee

INVITE

P-Called-Party-Id

Page 12: IMSImpactsonSIPMar07

11

Access control enforced at border

• Centrally-controlled routing of signalling• Path (RFC 3327)• Service-Route (RFC 3608)

• Media bandwidth reserved during call establishment• Preconditions• P-Media-Authorization

VisitedP-CSCF

REGISTER

Path: sip:proxy@visited

REGISTERHomeHSS

HomeS-CSCF

200 OK Path: sip:proxy@visited

Service-Route: sip:hsp@home

INVITE sip:friend@another

Route: sip:proxy@visited

Route: sip:hsp@home

INVITE sip:friend@another Route: sip:hsp@home

200 OK

Path: sip:proxy@visited

Service-Route: sip:hsp@home

P-CSCF INVITE

Require: precondition

183 Session Progress

P-Media-Authorization

Require: precondition

TokenRequest

Media Gateway (GGSN)

Context establishment for mediausing supplied authorization token

Policy DecisionFunction (PDF)Token

Validation

Page 13: IMSImpactsonSIPMar07

12

Commercial capabilities

• Billing information returned by many devices• Billing Correlators passed in signalling

• P-Visited-Network-ID• P-Charging-Vector• P-Charging-Function-Addresses

• Optimisations for low bandwidth links• Signaling compression (RFC 3320)• P-Access-Network-Info allows application to adapt

P-CSCF

INVITE

P-Visited-Network-ID

P-Charging-Vector

TokenRequest

Policy Decision Function (PDF)

INVITE Home Network

Caller

Page 14: IMSImpactsonSIPMar07

13

What is the impact on SIP?

• SIP extensions standardized as RFCs • IMS specific extensions defined as private (P-Headers)

• Operator requirements similar to enterprise requirements• Controlled access to network resources• Session Border Controllers protect enterprise border• Reduced network transparency limits service evolution

• IMS maintains operator control of the customer relationship• Allows operator to offer additional services• Operator can decide how much control to exert

• Battle is commercial, not technical

Page 15: IMSImpactsonSIPMar07

14

Non-IMS SIP calls may still be allowed

• Other protocols may signal media reservation, e.g. streaming

• Competition and additional mobile bandwidth will lead to different business models – including more open IP access

P-CSCF

BGF

P-CSCF

BGF

S-CSCF

Media access control policy

separated from SIP signalling

SPDF SPDF

Page 16: IMSImpactsonSIPMar07

15

Resulting network architecture

IP Phone

WAP

3G/4G

LAN SBC

PBX

SIP

IMS

SIP

Multi-homed mobile phone using multiple

network

SIP-based enterprise service

over LAN and Internet

IMS-based carrier services

Internet

PSTN

Application Servers distributed in

carrier, enterprise and Internet

Page 17: IMSImpactsonSIPMar07

16

Developing products for IMS

• IMS-compliant SIP stack/toolkit, e.g. DC-SIP• SIGCOMP• AKA/MD5• IPv6• P-Headers• Non-standard behaviour – e.g. proxy can release calls

• Enhancements to application logic, e.g. DC-SBC• Application support for P-Headers and other extensions• IMS architecture – reference points to billing, policy, etc.• Protocol interworking between IMS and non-IMS variants

Page 18: IMSImpactsonSIPMar07

17

Summary

• IMS takes advantage of SIP’s• Flexible distribution of

function and scalability • Access-independent

application platform

• IMS extends SIP to provide• PSTN-like features • Inter-carrier routing• Flexible charging

mechanisms

• IMS introduces controls to• Protect against misuse, theft,

and DoS• Check SLAs and charges• Hide private information• Handle NATs and firewalls

• Centralised design• Provides safe environment• Limits feature evolution• Defines approved services

IMS will be one part of the networkNot ideal for all applications: commercial, not technical battle

Page 19: IMSImpactsonSIPMar07

18

Stable & Independent• Privately held and profitable

Expert in Voice, Data and IMS

Supplier to the Industry

Worldwide leader in Networking Protocols

Messaging and Conferencing Solutions

Class 5 softswitch

IMS Application ServersUnified Messaging Applications

SIP, H.248 (Megaco), MGCP, SBC, IP Routing, MPLS, ATM

Data Connection (DCL)

Tellme.®

REVENUEEARNINGS