Internet DRAFT - draft-sohel-sipping-s-bc-concept-arch
draft-sohel-sipping-s-bc-concept-arch
SIPPING Working Group K. Sohel, Sprint
Internet-Draft H. Beech, Sprint
Expires: January 7, 2006 M. Evans, Sprint
R. Gagliano, Sprint
July 8, 2005
Conceptual Deployment Scenarios of Session/Border Control(S/BC) Functions
draft-sohel-sipping-s-bc-concept-arch-00.txt
Status of this Memo
This document is an Internet-Draft and is subject to all provisions
of section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of
which he or she become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 7, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Intellectual property rights (IPR) statement
By submitting this Internet-Draft, each author represents that any applicable
patent or other IPR claims of which he or she is aware have been or will be
disclosed, and any of which he or she becomes aware will be disclosed, in
accordance with Section 6 of BCP 79.
Abstract
This document illustrates various conceptual deployment scenarios of
Session/Border Controller (S/BC). The objective is to depict a provider's
architectural requirements of S/BC function deployment. The document will help
the IETF community to understand that S/BC functions can be deployed in the
network in scalable approach.
Sohel, et al. Expires January 7, 2006 [Page 1]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. General Information . . . . . . . . . . . . . . . . . . . . . 3
4. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 4
4.1 3GPP . . . . . . . . . . . . . . . . . . . . . . . . . 4
4.2 Reference Peering Interface. . . . . . . . . . . . . . . . 4
5. S/BC Deployment Scenarios . . . . . . . . . . . . . . . . . 6
5.1 Composed or Standalone S/BC . . . . . . . . . . . . . . . 6
5.2 Semi-Composed S/BC . . . . . . . . . . . . . . . . . . . 7
5.3 Centralized S/BC with MGCF . . . . . . . . . . . . . . . . 9
5.4 Centralized S/BC with CSCF . . . . . . . . . . . . . . . . 10
5.5 Distributed S/BC . . . . . . . . . . . . . . . . . . . . . 11
6. Security Considerations . . . . . . . . . . . . . . . . . . . 12
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
8. Acknowledges . . . . . . . . . . . . . . . . . . . . . . . . . 12
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 13
Intellectual Property and Copyright Statements . . . . . . . . 14
Sohel, et al. Expires January 7, 2006 [Page 2]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
1. Introduction
The IETF drafts [3] and [4] outline S/BC functions. The IETF draft [3]
illustrates two deployment scenarios: Network-Network peering and Access-Network
Peering. Both of these scenarios use composed S/BC that integrates signaling
control, media, routing, and management functions into a single (stand alone)
device.
Although current trend is to deploy standalone or composed S/BC functions in the
VoIP and IMS networks, there are advantages of deploying S/BC functions in
decomposed, centralized, or distributed configurations.
To reduce duplication of various network functions, and to improve scalability
and efficiency of networks decomposed, centralized, and distributed S/BC
configurations need to be considered in addition to the current composed
configuration.
This document depicts five S/BC configurations, and their corresponding
deployment scenarios. The document also briefly discusses merits of these
architectures. The objective is to depict a provider's architectural
requirements of S/BC function deployment. The document will help the IETF
community to understand that S/BC functions need to be studied in holistic
border protection architecture approach and can be deployed in the network in
scalable fashion.
2. Terminology
In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as
described in [7] and indicate requirement levels for compliant
implementations.
3. General Information
The Packet Technologies and Systems Committee (PTSC, formerly T1S1) of
Alliance for Telecommunications Industry Solutions (ATIS) is working on
Developing IP Network-Network Interface (NNI) Interconnect [5] and
Session/Border Control (S/BC) Function specifications[6].A contribution [8]
portraying examples of conceptual realization was submitted to ATIS-PTSC meeting
in Montreal, Canada, on June 13, 2005. This document is a revised version of the
contribution.
Sohel, et al. Expires January 7, 2006 [Page 3]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
4. Definitions
4.1 3GPP
The following 3GPP terms are used in this document.
CSCF: Call Session Control Function
P-CSCF: Proxy-CSCF
I-CSCF: Interrogating-CSCF
BGCF: Breakout Gateway Control Function
MGCF: Media Gateway Control Function
4.2 Reference Peering Interface
A network peering interface can be divided into four planes: signaling,
media, routing, and operation-managment. This document defines modules
performing these interfaces as Signaling Function (SF), Media Function (MF),
Routing Function (RF), and Operation & Management Function (OF).
A SF performs the signaling and control functions. A possible example of a SF is
a SIP Edge-Proxy or a SIP B2BUA. A MF performs media peering. A possible example
an MF is a Media Relay (MR) or an edge-router. An RF interconnects the routing
planes of two networks. An example of an RF is an interworking function that
mediates two similar or dissimilar routing protocols of two networks. Typically,
an RF is implemented in an MR or edge-router.
+-------+ +-------+
| IP | ------- ------- | IP |
| phone | <------> / \ / \ <------>| phone |
+-------+ | SF...........SF | +-------+
+--------+ | | | | +--------+
|Wireless| |Provider MF .........MF Provider| |Wireless|
|Network | <----->| | | |<-----> |Network |
+--------+ | A RF ....... RF B | +--------+
+------+ | | | | +------+
| | <------->MG OF ........ OF MG<-------> | |
| PSTN | | | | | | PSTN |
| | <-------> \ / \ / <-------> | |
+------+ SS7 ------- ------- SS7 +------+
Figure 1: Reference Peering Interface
Sohel, et al. Expires January 7, 2006 [Page 4]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
Some examples of above functions are presented in the following table:
Functions Examples
Signaling Function (SF) SIP Proxy, B2BUA, Session Admission Control (SAC),
SIP Interoperability, SIP Denial of Service (DoS)
protection, SIP Topology Hiding (THIG), and SIP
security, privacy and encryption.
Media Function (MF) VPN mediation, traffic engineering, policy
enforcement, rate shaping, bandwith broker,
bandwidth theft protection, data integrity,
transcoding, RTP translator, Network Address
Translation (NAT), and media security, privacy and
encryption.
Routing Function (RF) Routing protocol harmonization
O&M Function (OF) CALEA implementation; accounting, billing and
operational data mediation.
Sohel, et al. Expires January 7, 2006 [Page 5]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
5. S/BC Deployment Scenarios
5.1 Composed or Standalone S/BC
The composed or standalone S/BC combines SF, MF, RF, and OF functions
into a single device. The following figure shows the composed or standalone S/BC
configuration and its associated network architecture. Some functions such as
ENUM interoperability (ENUM) module may be located outside of the composed S/BC.
Provider B
--------- . . --------------------
/ \ . . / \ +-------+
| | . . | +----+ <--------->| IP |
| | . . | |CSCF| <.........>| phone |
| | . . +----+ +----+ | +-------+
| <---|--------------------|S/BC|---> | +--------+
| <........................| |...> <--------->|Wireless|
| | . . +----+ +------+ <.........>|Network |
|Provider A | . _ /\__ . | |ENUM | | +--------+
| | . / \ / \ . +----+ +------+ |
| <---------\ 3rd \----|S/BC|---> +-----+ +--+ +------+
| <..........|Party IP |...| |...> |Proxy|<-|MG|---->| |
| | . \ Network/ . +----+ +----+ +-----+ +--+ | PSTN |
| | . -------- . | |MGCF| <..|......>| |
\ / . . \ +----+ / SS7 +------+
--------- . . -------------------
--- Bearer (RTP/IP)
... Signal (SIP)
Figure 2: Composed or standalone deployment of S/BCs
............
. +------+ .
. | SF | .
. +------+ .
. .
. +------+ .
. | MF | .
. +------+ .
. .
. +------+ .
. | RF | .
. +------+ .
. .
. +------+ .
. | OF | .
. +------+ .
............
Figure 3: Composed S/BCs
Sohel, et al. Expires January 7, 2006 [Page 6]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
The advantage of composed S/BC deployment in the network is that one-
device solves all peering issues. Disadvantage examples of this architecture are
single point failure, bottle neck, architecture and traffic scalability, and
potential hot-potato routing scenarios. Some claim that this architecture has a
potential of N squared connectivity issue.
5.2 Semi-Composed S/BC
The semi-composed S/BC splits signaling and control functions (SF) from
the media and routing functions (MF and RF). An SF can be an S/BC which has only
the signal and control functions. MF and RF functions are integrated with an
edge-router or a Media Relay (MR). Operation and management functions (OF) may
be required in both components. ENUM function may be a separate entity. The
following figure shows the semi-composed configuration and its associated
network architecture:
. Provider B
--------- . ------------------
/ \ . / \ +-------+
| | . | +----+ <---------->| IP |
| | . | |CSCF| <..........>| phone |
| | . +-----+ +----+ | +-------+
| <------------| SF |---> | +--------+
| | . +-----+ <---------->|Wireless|
| | . +- MF + RF-+ <..........>|Network |
| <............| MR/Edge |..> | +--------+
| | . | Router | |
|Provider A | . +----------+ |
| | . | +------+ |
| | . | |ENUM | |
| | . | +------+ |
| | . | +-----+ +--+ +------+
| | . | |Proxy| <-|MG|----->| |
| | . | +----+ +-----+ +--+ | PSTN |
| | . | |MGCF| <....|.......>| |
\ / . \ +----+ / SS7 +------+
--------- . ------------------
--- Bearer (RTP/IP)
... Signal (SIP)
(Control interface between SF and MR/edge-route is not shown)
Figure 4: Decomposed S/BC Depolyment Architecture
Sohel, et al. Expires January 7, 2006 [Page 7]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
............
. +------+ .
. | SF | .
. +------+ .
............
|
|
| (Control protocol e.g. H.248)
|
............
. +------+ .
. | MF | .
. +------+ .
. . Edge-router or Media Relay
. +------+ .
. | RF | .
. +------+ .
............
Figure 5: Decomposed S/BC configuration
This one-to-one solution (SF and edge-router (MF + RF)) provides engineering
flexibility for individual border points (variable relationship between SF
computing capacity and MF bearer capacity) and deployment flexibility through
the opportunity to place functions at different network locations (MF in an edge
router, SF in a data center). However, it requires two devices per interface
(border point) and introduces the requirement of additional external control
links. On the other hand, in a composed S/BC the MF:SF is internal, protected,
low latency interface. The Decomposed S/BC solution retains the stand-alone S/BC
disadvantages of single point of failure, architectural scalability, and
potential hot-potato routing behavior.
Sohel, et al. Expires January 7, 2006 [Page 8]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
5.3 Centralized S/BC with MGCF
This configuration integrates SF functions with the Media
Gateway Controller Function (MGCF) in a Soft-switch architecture.
Edge-routers integrate MF and RF functions. Operation and management functions
(OF) may be required in both components. ENUM function may be a separate entity.
The following figure shows the centralized S/BC with MGCF configuration and its
associated network architecture.
. . Provider B
--------- . . -------------------------
/ \ . . / VoIP \ +-------+
| | . . | <------->| IP |
| | . . | <.......>| phone |
| | . . +------+ | +-------+
| <-----.-----------------|MF+RF |--> | +--------+
| | . . |Edge | +------+----+ <------>|Wireless|
| <.......................|Router|...>| | | <......>|Network |
| | . . +------+ | | | | +--------+
|Provider A | . _ /\__ . | | CF |MGCF| |
| | . / \ / \ . +------+ | | | |
| <.........\ 3rd \...|MF+RF |...>| | | +--+ +------+
| | . |Party IP |. |Edge | +------+----+ <-|MG|--->| |
| <----------\ Network/---|Router|--> +------+ +--+ | PSTN |
| | . -------- . +------+ | ENUM | <........>| |
\ / . . \ +------+ / SS7 +------+
--------- . . -------------------------
(Control connection between CF and media-relay/edge-router is not shown)
Figure 6: Centralized S/BC functions deployment with MGCF
This one-to-many (SF and MF+ RF) implementation of S/BC functions in a soft-
switch architecture provides architectural and traffic scalability advantages
because one SF is associated with multiple media-relays or edge-routers(MF+ RF),
resulting in fewer signaling elements with broader control of media (MF)
resources. The association of SF and MGCF functionalities seems to provide a
rational functional alignment as they both control media functions. This
architecture may introduce additional complexity that must be addressed by the
SF to distinguish between access networks and to perform the appropriate NAT
functions on signaling and bearer data for each access network. Analysis for
signaling attacks needs to be performed properly in the SF. Intelligent
network-layer queuing, rate-limiting, and policy functions that support
wire-speed IP forwarding engine need to be implemented in the MF. Robust
coupling between SF and MF needs to be performed to implement appropriate
security. For that appropriate control protocols or SIP extension needs to be
developed.
Sohel, et al. Expires January 7, 2006 [Page 9]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
5.4 Centralized S/BC with CSCF
This configuration integrates SF functions with the Call/Session Control
Functions (CSCFs) or Breakout Gateway Control Function (BGCF) in a IMS
architecture. Edge-routers integrate BF and RF functions. Operation and
management functions (OF) may be required in both components. ENUM function may
be a separate entity. The following figure shows the centralized S/BC with the
CSCF configuration and its associated network architecture.
Provider B
. . -----------------------------
-------- . . / VoIP/IMS \ +-------+
/ \ . . | <------->| IP |
| | . . | <.......>| phone |
| | . . +------+ | +-------+
| <---------------------|MF+RF |--> | +--------+
| | . . |Edge | +------+----+----+ <----->|Wireless|
| <.....................|Router|...>| | | | <.....>|Network |
| | . . +------+ | | | I | | +--------+
|Provider A| . _ /\__ . | | SF |BGCF|CSCF| |
| | . / \ / \ . +------+ | | | | |
| <.......\ 3rd \...|MF+RF |...>| | | | +--+ +------+
| | . |Party IP |. |Edge | +------+----+----+ <-|MG|--->| |
| <--------\ Network/---|Router|--> +------+ +--+ | PSTN |
| | . -------- . +------+ |ENUM | <........>| |
\ | . . \ +------+ / SS7 +------+
--------- . . ------------------------------
(Control connection between SF and MR/edge-router is not shown)
Figure 7: Centralized S/BC with I-CSCF/BGCF at Network Interface
\/
|| +--------+ +---------+
Cell tower || | MF+RF | | |
|| <------>| Edge |<------->| |
| Router | | SF |
+--------+ | |
\/ |---------|<--> Other IMS
|| +--------+ | | Entities
Cell tower || | MF+RF | | P-CSCF |
|| <------>| Edge |<------->| |
| Router | | |
+--------+ +---------+
Figure 8: Centralized S/BC with P-CSCF at Access Interface
Sohel, et al. Expires January 7, 2006 [Page 10]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
This one-to-many (SF and BF+ RF) implementation in IMS architecture
provides architectural and traffic scalability advantages because one SF is
associated with multiple (BF+RF)s, resulting in fewer call control elements with
broader control of media (BF) resources. The association of SF and CSCF
functionalities (specifically between the SF and I/P-CSCF functionalities)
appears to be a rational alignment of border signaling functions. Integration of
SF and I/P-CSCF or BGCF functionalities might also reduce network complexity
through a reduction in call control elements. This architecture may introduce
additional complexity that must be addressed by the SF to distinguish between
access networks and to perform the appropriate NAT functions on signaling and
bearer data for each access network. Analysis for signaling attacks needs to be
performed properly in the SF. Intelligent network-layer queuing, rate-limiting,
and policy functions that support wire-speed IP forwarding engine need to be
implemented in the MF. Robust coupling between SF and MF needs to be performed
to implement appropriate security. For that appropriate control protocols or SIP
extension needs to be developed.
5.5 Distributed S/BC
In this configuration, SF, MF, and RF functions are distributed across
the network devices. For example, an (MGCF+CSCF) device integrates some SF
functions, an edge-router integrates some MF functions, and a fire-wall (FW)
device integrates some SF and MF functions. The following figure illustrates the
distributed S/BC configuration and its associated network architecture.
Provider B
-----------------------------
. / VoIP/IMS \ +-------+
P . | <-------->| IP |
r . | <........>| phone |
o . +---+ +------+ | +-------+
v .------------| |----|MR/ |--> | +--------+
i . |FW | |Edge | +------+----+----+ <------>|Wireless|
d .............| |....|Router|...>| | | | <......>|Network |
e . +---+ +------+ | | | | | +--------+
r . _ /\__ | | SF |CSCF|MGCF| |
. / \ / \ +---+ +------+ | | | | |
A ...\ 3rd \..| |.|MR/ |...>| | | | +--+ +------+
. |Party IP | |FW | |Edge | +------+----+----+ <-|MG|---->| |
.---\ Network/--| |-|Router|--> +------+ +--+ | PSTN |
. -------- +---+ +------+ | ENUM | <.........>| |
. \ +------+ / SS7 +------+
. -----------------------------
(Control connection between SF, MF, and FW are not shown)
Figure 9: Distributed deployment of S/BC functions
Sohel, et al. Expires January 7, 2006 [Page 11]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
This architecture may introduce additional complexity that must be addressed
by the SF to distinguish between access networks and to perform the appropriate
NAT functions on signaling and bearer data for each access network.
This architecture has scalability and operational advantages similar to the
preceding case, with the possible addition of better alignment between border
control and existing IMS functional decomposition. For that appropriate control
protocols or SIP extension needs to be developed as protocols between firewall
and other devices.
6. Security Considerations
Many of the functions this document describes have important security
and privacy implications. If the IETF decides to develop standard
mechanisms to address those functions, security and privacy-related
aspects will need to be taken into consideration.
7. IANA Considerations
This document has no IANA considerations.
8. Acknowledges
The ATIS-PTSC-SAC meeting held on June 13, 2005 at Montreal, Canada provided
valuable input to this document.
9. References
[1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M. and E. Schooler, "SIP:
Session Initiation Protocol", RFC 3261, June 2002.
[2] Schulzrinne, H., Casner, S., Frederick, R. and V. Jacobson,
"RTP: A Transport Protocol for Real-Time Applications", STD 64,
RFC 3550, July 2003.
[3] G. Camarillo et al., "Functionality of Existing Session Border
Controller (SBC)", Internet-Draft, February 2005.
[4] M. Bhatia et al., "SIP Session Border Control Requirements",
Internet-Draft, January, 2005.
[5] ATIS PTSC, IP NNI Inteconnect standard (work in progress),
Issue Number S0009
[6] ATIS PTSC, Session/Border Controller Functions and Requirements (work in
progress), Issue Number S0024
[7] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels",
RFC 2119, March 1997.
[8] Khan, Sohel, "Example Conceptual Realization of S/BCs",
PTSC-SAC-2005-213, ATIS-PTSC, June, 2005.
[9] 3GPP IMS standard - 3GPP TS 23.002 V5.12.0 (2003-09) – Network
Architecture
[10] 3GPP2 IMS standard - X.S0013-000 Multimedia Domain Overview
Sohel, et al. Expires January 7, 2006 [Page 12]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
Authors' Addresses
Sohel Khan
Sprint
6220 Sprint Parkway
Overland Park, KS 66251
U.S.A
EMail: Sohel.Q.Khan@mail.sprint.com
Hal Beech
Sprint
6220 Sprint Parkway
Overland Park, KS 66251
U.S.A
EMail: Hal.s.Beech@mail.sprint.com
Mark Evans
Sprint
1 Adrian Court
Burlingame, CA 94010
U.S.A
EMail: Mark.x.Evans@mail.sprint.com
Roque Gagliano Molla
Sprint
6100 Sprint Parkway
Overland Park, KS 66251
U.S.A
EMail: Roque.Gagliano@mail.sprint.com
Sohel, et al. Expires January 7, 2006 [Page 13]
Internet-Draft Deployment Scenarios of S/BC July 8, 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Sohel, et al. Expires January 7, 2006 [Page 14]