You are on page 1of 20

IMS Impacts on SIP

Jonathan Cumming
Director, VoIP Product Management

Use of SIP in IMS

Replacement signalling for calls, messaging and presence


Chosen for its

Flexibility
Abstraction between layers
Ease of function distribution

SIP was initially designed


for the Internet
Internet

Open homogeneous IP network

But telephone networks are


different
PSTN

GSM
3G

Value to consumer /

Different Business Model

Services

Perceived
Value

Trust

Convenience &
Reliability

Cost

Trust
Conv. & Rel.
Traditional Telephony

Perceived
Value

Services

Cost

Internet Telephony

Business compete by offering more value than they cost,


not by being cheaper.

IMS Requirements
Privacy

Low
bandwidth links

Caller-Id

PSTN and
Legacy
features

Legacy services
and business
models
Interoperability
with legacy
devices

Architectural
Differences

Monitoring of
inter-operator links
NAT and Firewall
traversal
SIP

Access network
traversal

Lawful Intercept
Emergency Call
Handling

Security to prevent
theft and DoS
Charging mechanisms
Guaranteed QoS

Commercial
Capabilities
4

IMS Requirements
Privacy

Low
bandwidth links

Caller-Id

PSTN and
Legacy
features

Legacy services
and business
models
Interoperability
with legacy
devices

Architectural
Differences

Monitoring of
inter-operator links
NAT and Firewall
traversal
SIP

Access network
traversal

Lawful Intercept
Emergency Call
Handling

Security to prevent
theft and DoS
Charging mechanisms
Guaranteed QoS

Commercial
Capabilities
4

Typical SIP scenario


Application Server

Proxy / Registrar

Proxy

Signalling may be routed via proxies to provide address resolution

Media routed directly across the Internet


5

IMS introduces Trusted Core and Untrusted Access

Proxy

Access Network

Core Network
Access Network

Operator-managed core network


Responsible for service end-to-end
QoS guaranteed, SLAs monitored
6

IMS introduces Trusted Core and Untrusted Access


Identity verified
centrally
S-CSCF

Protection at
border

Secure tunnels,
guaranteed QoS

P-CSCF

P-CSCF

Signalling
Gateway

BGF

BGF

Media
Gateway

Access control enforced by P-CSCF and Media Gateways


Media reservation, Identity management

Multiple carriers involved

S-CSCF

P-CSCF

BGF

P-CSCF

BGF

Multiple carriers involved

S-CSCF

P-CSCF

BGF

S-CSCF

IBCF

BGF

IBCF

BGF

P-CSCF

BGF

Limited trust at border


Inter-carrier traffic monitored and controlled
Protocol interworking, e.g. H.323 and non-IMS SIP
9

Central identity management

Strong mutual authentication using SIMs and AKA


Security Agreement (RFC 3329)

User credentials
calcuted by server
Challenge
Expected SIM result
Expected response

REGISTER
401 Unauthorized
WWW-Authenticate:

Security validation
occurs on SIM card

HSS

REGISTER
Authorization:
200 OK

Centrally-validated identity (P-Asserted-Identity)


Traceability for emergency calls and call-back
Identity removed at border to maintain privacy
R
:
TE
RI
U Home Server
IS
G
ed
RE
K at
O oci
0 s
20 -As
P

en
tit
y

P-Associated-URI
P-Preferred-Identity
P-Called-Party-ID

Support for multiple identities

Caller

IN
P- VI
P r TE
ef
er
re
dId

INVITE
P-Network-Asserted-Id
Called Server IN
P- VIT
Ca E
lle
dPa
rty

-Id

Callee

10

Access control enforced at border

Centrally-controlled routing of signalling


Path (RFC 3327)
Service-Route (RFC 3608)

REGISTER
y@visited
Path: sip:prox
ST E R
R E GI

d
K
e
visite
200 O ip:proxy@ hsp@hom
:
s
ip
:
s
te :
Path
e-Rou
ther
Servic
@ano
d
n
ie
r
f
visited
E sip:
INVIT sip:proxy@ e
:
om
Route sip:hsp@h
:
Route

Visited
P-CSCF

2 0 0 OK
d
roxy@visite home
Path: sip:p
@
p
s
:h
ip
s
ute:
Service-Ro

IN V IT
E
Route sip:friend@
: sip:h
a
sp@h nother
o me

Media bandwidth reserved during call establishment


Preconditions
P-Media-Authorization

n
INVITE : preconditio
e
Requir
gress
ion Pro ation
s
s
e
S
183
horiz
ia-Aut
n
P-Med preconditio
e:
ir
u
q
e
R

HomeHSS

P-CSCF

Contex
t
using s establishme
nt
upplied
author for media
ization
token

Home
S-CSCF

Tok
Req en
uest

ken
To ation
lid
Va

Policy Decision
Function (PDF)

Media Gateway
(GGSN)
11

Commercial capabilities

Billing information returned by many devices


Billing Correlators passed in signalling
P-Visited-Network-ID
P-Charging-Vector
P-Charging-Function-Addresses
INVIT

INVITE
-ID
-Network
P-Visited -Vector
ing
P-Charg

P-CSCF

Caller

Home Network

T o ke
Requ n
e st

Policy Decision Function (PDF)

Optimisations for low bandwidth links


Signaling compression (RFC 3320)
P-Access-Network-Info allows application to adapt

12

What is the impact on SIP?

SIP extensions standardized as RFCs


IMS specific extensions defined as private (P-Headers)

Operator requirements similar to enterprise requirements


Controlled access to network resources
Session Border Controllers protect enterprise border
Reduced network transparency limits service evolution

IMS maintains operator control of the customer relationship


Allows operator to offer additional services
Operator can decide how much control to exert

Battle is commercial, not technical

13

Non-IMS SIP calls may still be allowed


Media access
control policy
separated from
SIP signalling
S-CSCF

P-CSCF

P-CSCF
SPDF
BGF

SPDF
BGF

Other protocols may signal media reservation, e.g. streaming

Competition and additional mobile bandwidth will lead to different


business models including more open IP access
14

Resulting network architecture

IMS

IMS-based carrier
services

SIP

PSTN
3G/4G
PBX

Internet
SIP

IP Phone

LAN

SBC

SIP-based
enterprise service
over LAN and
Internet

WAP

Application Servers
distributed in
carrier, enterprise
and Internet

Multi-homed
mobile phone
using multiple
network

15

Developing products for IMS

IMS-compliant SIP stack/toolkit, e.g. DC-SIP


SIGCOMP
AKA/MD5
IPv6
P-Headers
Non-standard behaviour e.g. proxy can release calls

Enhancements to application logic, e.g. DC-SBC


Application support for P-Headers and other extensions
IMS architecture reference points to billing, policy, etc.
Protocol interworking between IMS and non-IMS variants

16

Summary

IMS takes advantage of


SIPs

Protect against misuse, theft,


and DoS

Flexible distribution of
function and scalability

Check SLAs and charges


Hide private information
Handle NATs and firewalls

Access-independent
application platform

IMS extends SIP to provide


PSTN-like features
Inter-carrier routing
Flexible charging
mechanisms

IMS introduces controls to

Centralised design
Provides safe environment
Limits feature evolution
Defines approved services

IMS will be one part of the network


Not ideal for all applications: commercial, not technical battle
17

Data Connection (DCL)


Stable & Independent
REVENUE

Privately held and profitable

EARNINGS

Expert in Voice, Data and IMS


Supplier to the Industry

Worldwide leader in Networking Protocols


SIP, H.248 (Megaco), MGCP, SBC, IP Routing, MPLS, ATM

Tellme.

Messaging and
Conferencing Solutions

IMS Application Servers


Unified Messaging Applications

Class 5 softswitch

18

Thank you for listening

jonathan.cumming@dataconnection.com

You might also like