these materials are © 2014 john wiley & sons, inc. any … · 2019-11-22 · 2 session border...

51

Upload: others

Post on 25-Dec-2019

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers
Page 2: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 3: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

by Kevin Riley and Mohan Palat

Session Border Controllers

3rd Sonus Special Edition

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 4: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies®, 3rd Sonus Special EditionPublished by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com

Copyright © 2013 by John Wiley & Sons, Inc.

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trade-marks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Sonus and the Sonus logo are registered trademarks of Sonus. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

For general information on our other products and services, or how to create a custom For Dummies book for your business or organization, please contact our Business Development Department in the U.S. at 877-409-4177, contact [email protected], or visit www.wiley.com/go/custompub. For information about licensing the For Dummies brand for products or services, contact BrandedRights&[email protected].

ISBN: 978-1-118-85638-3 (pbk); ISBN: 978-1-118-85951-3 (ebk)

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 5: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Table of ContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

About This Book ........................................................................ 2Icons Used in This Book ............................................................ 2

Chapter 1: Discovering SBCs and How They Protect Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Looking at the SBC’s Role ......................................................... 4Understanding the Need for SBCs ........................................... 6Stopping Attacks with an SBC .................................................. 7IPv6 is Here ................................................................................. 9Why Not Other Options? ........................................................... 9

Chapter 2: Identifying the Key Requirements of an SBC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Normalizing SIP ........................................................................ 11Transcoding Calls .................................................................... 12Dealing with NAT Traversal .................................................... 14Fax and Tone Detection .......................................................... 16Multimedia (Video) Support ................................................... 16Performance, Scalability, Resiliency ..................................... 17

Chapter 3: Virtualizing the SBC . . . . . . . . . . . . . . . . . . . . .19Understanding Why Virtualization is Such a Big Deal......... 19What’s a Virtual Software SBC? .............................................. 21Looking at the Benefits of a Virtual Software SBC ............... 21Knowing What to Look for In a Virtual Software SBC .......... 22

Chapter 4: Deploying SBCs in Different Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

SBC in UC .................................................................................. 23SBCs in the Contact Center ..................................................... 24SBC in the Enterprise............................................................... 26SBC in the Wireless World ...................................................... 27SBC in IMS Networks ............................................................... 28SBC in WebRTC ........................................................................ 29

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 6: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition iv

Chapter 5: Multimedia Matters . . . . . . . . . . . . . . . . . . . . .31Video Should “Just Work” ....................................................... 31Adding Value to Video with SBCs .......................................... 34

Chapter 6: Saving Money with an SBC . . . . . . . . . . . . . .35Benefitting from One-Stop Management ............................... 35Keeping the Revenue Flowing with Redundancy ................. 36Saving with One Box Instead of Many Devices .................... 36Saving Costs with a Virtual Software SBC ............................. 37Saving Money with Intelligent Policy..................................... 38Looking at Case Study Examples ........................................... 38

Chapter 7: Ten Reasons to Choose Sonus SBC . . . . . . .41Local Policy Configuration ...................................................... 41Networked Policy Management ............................................. 41Peak Performance .................................................................... 42Supports High-Level Transcoding ......................................... 42Security from Attacks .............................................................. 42Advanced Media Support........................................................ 43Optimized Customer Firmware .............................................. 43Plays Well with Others ............................................................ 43Scales without Impacting Performance ................................ 44The Software SBC ..................................................................... 44

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 7: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Introduction

T oday’s business communications no longer just consist of voice calls and email but now are a mix of video conferencing,

instant messaging, fax, data sharing, and presence manage-ment applications. Even voice calls are not only from legacy Privately-Switched Telephone Network/Time Delay Multiplex (PSTN/TDM) systems but also from Voice over Internet Protocol (VoIP) and mobile data networks. Fortunately, one protocol binds all these forms of communication into a single stream of communication data.

The Session Initiation Protocol (SIP) is a signaling protocol used to establish a communication session between parties. This combination of disparate communications media combined into a single stream of data is commonly referred to as Unified Communications (UC). SIP makes a UC happen by establishing and controlling a session between parties. This session may include voice, instant messaging, and data sharing application data combined. SIP ensures the data travel from sender to receiver efficiently even though each type of communication uses its own protocol for data transfer.

As powerful as SIP is, it isn’t without challenges that include differences in implementation between device vendors and the security issues involved when transporting data across the Internet. But, Session Border Controllers For Dummies, 3rd Sonus Special Edition, is here to help with timely information about session border controllers (SBCs) — devices designed to control the calls (or videoconferencing or other media) coming in and out of an enterprise’s or service provider’s SIP network, while also handling the signaling and media interme-diation and translation required to make the SIP service work smoothly all the time.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 8: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 2

About This BookSession Border Controllers For Dummies, 3rd Sonus Special Edition, is a nontechnical book for business decision makers looking to understand the role of an SBC in their VoIP net-works. If you want to figure out whether an SBC can provide features that your business and your network need, well, you’ve come to the right place.

Icons Used in This BookThis book calls out important bits of information with icons on the left margins of the page. You’ll find four such icons in this book:

The Tip icon points out a bit of information that aids in your understanding of a topic or provides a little bit of extra infor-mation that may save you time, money, and a headache.

Pay attention to the Remember icon because it points out parts of the text to lock away in your memory for future use.

Watch out! This information tells you to steer clear of things that may cost you big bucks, are time suckers, or are just bad SBC practices.

We try to keep the hardcore techie stuff to a bare minimum. You don’t need to know these factoids to get the most out of the book, but they may come in handy.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 9: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 1

Discovering SBCs and How They Protect Your Network

In This Chapter▶ Discovering the role of the SBC

▶ Understanding why enterprises and service providers need SBCs

▶ Using an SBC to stop security attacks

▶ Learning how SBCs work with IPv6

▶ Looking at alternative options

I t’s far from breaking news to say that telecommunications are vital to just about every type of business out there.

Whether a business is extremely technologically sophisticated or at the opposite end of the spectrum, activities such as phone calls, email, electronic financial transactions, video conferencing, file backups, or accessing customer service records on a remote server are going to be part of the day-to-day business goings-on. Business telecommunications no longer means just voice calls. Bundling communications services use Session Initiation Protocol (SIP) technology and networks, and are commonly referred to as Unified Communications (UC).

Ultimately, unless you own a very small blacksmith shop in an even smaller village, your business relies on telecommunications in one form or another. In this chapter, we introduce the session border controller (SBC) technology that’s designed to help enable and secure important parts of any business’s telecommunications infrastructure.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 10: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 4 Chapter 1: Discovering SBCs and How They Protect Your Network

Looking at the SBC’s RoleAn SBC controls a SIP network by admitting (or not admitting) and then directing communications between two end devices on the network, like a Voice over Internet Protocol ( VoIP) call between two phones, or the connection between the web browser on your iPad and the web server you’re accessing. These communications are called sessions. A video call between two devices is also handled in a similar way. The SBC does this session controlling at the point where traffic is handed off from one network to another (called the border). Because of where the SBC fits in the network, it can be use-fully implemented by both businesses themselves and also by the service providers who serve them.

SIP network owners face constant threats to the security of their networks and businesses. In addition, they must make their networks as secure as possible while providing the high level of efficiency that their customers demand. This is where SBC really earns its keep. In this section, you look at the main functions and roles of the SBC.

Securing the network An SBC protects and secures the network, and it’s built from

the ground up to eliminate spoofing attacks, denial-of-service attacks, and toll fraud. The SBC secures the network by

✓ Hiding the topology (or architecture) of the network, making it difficult or impossible for bad actors to gain access to vulnerable parts of the network

✓ Enabling encryption that prevents communications from being illegally intercepted or tampered with

✓ Detecting and preventing denial-of-service (DoS) attacks before they can impair network performance

Enabling SIP TrunkingSIP is a signaling protocol, developed in the 1990s by the Internet Engineering Task Force ( IETF ), designed to carry voice, data, and video transmissions over Internet Protocol (IP) networks rather than on Privately-Switched Telephone Networks (PSTNs), which were the primary communications networks at the time.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 11: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition Chapter 1: Discovering SBCs and How They Protect Your Network 5SIP Trunking is a service delivered via SIP that allows a private branch exchange (PBX) system, which is the multiline phone system used by businesses, to aggregate multiple calls, screen shares, or videoconferences over an IP connection. SIP Trunking saves money by allowing a shared data connection to handle voice and related traffic for an enterprise or service provider instead of relying on expensive, dedicated voice and data lines. In fact, typical savings from SIP Trunking, trunking consolidation, and the move to VoIP and UC can reduce tradi-tional enterprise telecom bills by 75 percent. Additionally, the SBC can provide secured access to that SIP Trunking service, so an enterprise can maintain security while saving money.

Interconnecting with topology hiding and protocol translationWhile security and cost savings (through SIP Trunking, covered in the preceding section) are a huge deal when it comes to deciding to deploy an SBC, another factor is equally important: providing a smooth experience in terms of interconnecting and interworking between different networks and the protocols running over them.

Specifically, the SBC performs tasks such as

✓ Dealing with SIP variants: SIP is one protocol with a million little variants as different vendors implement it. The SBC can translate these variants between devices (a process known as SIP normalization, covered in more detail in Chapter 2) so calls get through with all their features intact without a hiccup.

✓ Translating protocols: Different UC solutions may utilize different audio codecs and other protocols that aren’t completely supported on both sides of the session. The SBC knows all these protocols and can translate between them on the fly.

Acting as session traffic copThe SBC is the gatekeeper to the SIP network in an enterprise or in a service provider network. UC is an example of a SIP network. In its role, the SIP network performs a task known as session admissions control, which is the process of determining

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 12: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 6 Chapter 1: Discovering SBCs and How They Protect Your Network

who has access to the network. The SBC is the traffic cop of a SIP network, keeping your SIP highways safe and orderly and creating and accessing three lists — whitelists, blacklists, and greylists. More on these lists in the section “List monitoring.”

Centralized policy managementIn larger deployments, where multiple SBCs are installed at multiple network borders, the task of individually configuring policies on all SBCs can be tedious and expensive. An alternative to localized policy control is further centralization by using a master policy server that can propagate a single set of policy rules (and policy rule changes) to each SBC on the network without requiring an expensive IT professional to manually configure each one.

Understanding the Need for SBCs

SBCs were first deployed primarily within service provider networks. SBCs ensure that UC data are properly routed between network providers, that differing protocols are understood so the call can be delivered across different networks, and that calls are secured.

As UC has become more common, the SBC is useful in more places in the network, including at the border between an enterprise’s network and the carrier’s. The most talked about driver for the adoption of the SBC is security. VoIP (as well as other session-oriented applications) is an application that by its very nature is exposed to devices and networks that are out of the control of an enterprise or a network provider. VoIP isn’t like traditional telephony where a very highly circumscribed set of devices, protocols, and private networks are involved in the process of placing and carrying calls. In the old days when you placed a phone call (via landline or cellular), the call was placed on an approved device and carried across the private phone company network.

Like other IP applications, VoIP is carried over public networks — often across several public networks — and calls can be initiated or completed on devices, such as personal computers (PCs) or smartphones, by using VoIP apps that

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 13: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition Chapter 1: Discovering SBCs and How They Protect Your Network 7aren’t under the control and regulation of the phone company. This fact leaves the VoIP world considerably more vulnerable to the same kinds of malicious and fraudulent security threats that any Internet service faces.

Some common types of attacks are as follows:

✓ Service theft and fraud: When a hacker (or organized group of hackers) accesses an inadequately secured VoIP system to route traffic across the network without paying for it; hackers use up network resources without paying for them and often enterprises or service providers end up paying for the unauthorized toll charges.

✓ Spoofing: When people deliberately modify or disguise their identities (for example, caller ID phone numbers) on the network; may occur to intercept calls intended for another (legitimate) party or simply in order to confuse or annoy.

✓ Denial - of - service (DoS)/Distributed denial-of-service (DDoS) attacks: Seek to flood a server or SBC with requests in order to take it out of commission; DoS attacks typically originate from a single point/user, while DDoS attacks can involve sometimes hundreds or even thousands of zombified computers (known collectively as a botnet, for robot network).

✓ Registration storms: When thousands or millions of devices attempt to register with the SIP server all at once in a UC network; can also occur for non-malicious reasons.

Stopping Attacks with an SBCNetworks are increasingly subjected to both malicious and fraudulent attacks. The common attacks of service theft and fraud, DoS, DDoS, spoofing, and registration storms can be dealt with through SBCs. So what tools should an SBC bring to the table to defeat these attacks? This section tells you.

Media and signaling encryptionThis approach applies cryptographic scrambling, called encryption, to both the signaling SIP and media (voice, video, IM, and so on) portion of the call. Encryption provides more than just scrambled data; it also relies on an authentication

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 14: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 8 Chapter 1: Discovering SBCs and How They Protect Your Network

mechanism — a way of identifying that a client is who it says it is. This authentication happens when a client has the proper half of a secret key, known only by that client. A properly imple-mented encryption system means that malicious parties can’t eavesdrop on VoIP calls, videoconferences, and other SIP-based communications. UC communications are typically secured by TLS or IPSEC encryption algorithms.

Dynamic pinholingA pinhole is a port opened in a firewall designed to allow an application to access the network. Leaving a port opened for a long period of time enables security breaches by unauthorized applications. SBCs can create pinholes programmatically and leave them open for only a short period of time to minimize security exposure. SBCs can then re-open ports as needed for trusted applications to send and receive data.

Topology hiding with B2BUAA back-to-back user agent (B2BUA) system controls SIP calls by a logical or virtual proxy configured for the call. This agent sets up the pathways across the network for both signaling and data. B2BUA causes all signal and media traffic to run through the SBC and hides the topology, or architecture, of the network so clients aren’t shown things like private IP addresses of servers and devices in the network. The net result is a network that’s easily accessible to clients for making and receiving calls, but the “innards” of the network are effectively invisible, which makes them less vulnerable to attack.

List monitoringThe SBC’s policy management system monitors incoming requests and calls, uses rules to identify people who are and aren’t abusing network resources, and maintains certain lists:

✓ Whitelists: People and devices that always have access to the network

✓ Blacklists: People and devices that never have access to the network.

✓ Greylists: People and devices that sometimes have access to the network

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 15: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition Chapter 1: Discovering SBCs and How They Protect Your Network 9

IPv6 is HereThe IP variant that has powered the world through the Internet revolution for the past 20 years or so has an issue, and it’s a big one. IPv4, the first version, has a limited number of IP addresses. IPv6 increases the address space of IP from 32 to 128 bits, which means that there are potentially more than 3 billion, billion, billion, billion IP addresses available in IPv6 — hopefully enough for another 30 years, at least!

Not all networks themselves are going to support IPv6 at the same time. When two clients want to communicate and one is on an IPv4 network and the other on IPv6, something needs to get in the middle and help them communicate. These issues can be solved by an SBC in two ways:

✓ An SBC can be dual stacked, meaning it contains the network stack software (the basic network protocol soft-ware suite) for both IPv4 and IPv6. The SBC can commu-nicate by using both versions of IP and can connect to an IPv6-only smartphone by using IPv6 while connecting to an IPv4 server by using IPv4.

✓ The SBC can act as an interworking agent between an IPv4 network and an IPv6 network. In this case, the SBC (which, of course, sits at the network border) can trans-late all traffic flowing between an IPv4 and an IPv6 net-work on the fly, as it crosses the network border.

Why Not Other Options?Alternate options to the SBC do exist, so in this section, you explore two alternative scenarios to having an SBC.

VPN tunnelingPretty much all enterprise and carrier IT professionals are old hands at implementing virtual private networks (VPNs), which are private and secured network connections carved out of a shared or public telecommunications facility (like an Internet connection) by using encryption and authentication. Theoretically, all the traffic in a VPN connection flows over a

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 16: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 10cryptographic tunnel (the virtual private connection on the public/shared network) without being seen or accessed by those who aren’t authenticated users. This allows branch offices or telecommuters access to shared enterprise network resources or even within a service provider’s network to offer private networking services to customers over shared facilities.

A VPN can cause trouble when there’s a need to look inside the packets encapsulated in the VPN to route calls and provide services. VoIP packets must be decrypted and acted on — removing the end-to-end encryption element that keeps a VPN secure. With an SBC with Secure Real-Time Transport Protocol (SRTP) and Transport Layer Security (TLS), you get a high level of security between the border controller and the target device. Because the session is encrypted, it’s thought to have better security than possible on the Public Switched Telephone Network (PSTN).

Data firewallsEvery carrier or enterprise network has at least one type of data firewall device installed at the edges of the network, designed to allow only appropriate traffic to reach within the network. Firewalls are great at keeping unauthorized users off your file servers or even deflecting attacks on your web server.

Theoretically, a data firewall can be configured to allow the opening of communications channels that allow VoIP sessions to pass through the network and on to appropriate clients within the network. The problem is that VoIP (and UC) sessions are exceedingly dynamic. Calls are set up and taken down frequently and in large numbers. Additional services are added during the middle of a call (for example, when someone begins to IM another user during a conference call, or when someone shares a picture or video during a voice call). Typically a data firewall just isn’t set up to handle this kind of dynamic service provisioning, nor is it particularly VoIP- and SIP-savvy. The result is that a firewall tends to be opened up too much when it’s used to provide VoIP security, with ports being left open when they aren’t currently in use. Without the B2BUA that an SBC provides, intruders are more likely to use those open ports to gain access to parts of your network that you don’t want them near.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 17: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 2

Identifying the Key Requirements of an SBC

In This Chapter▶ Understanding SIP and call transcoding

▶ Learning NAT traversal

▶ Using multimedia support

T here’s more than just security to the role of a session border controller (SBC). In fact, many in the industry say

that it’s the security that causes customers to become inter-ested in the SBC, but it’s the other functionality that really makes the sale. This other functionality is all about SBCs making Voice over Internet Protocol (VoIP) calls and Unified Communications (UC) sessions work in situations where they may otherwise not work, and beyond that, SBCs make all VoIP and UC services simply work better.

What does it take for an SBC to do this? The functions dis-cussed in the following sections are the essentials.

Normalizing SIPSession Initiation Protocol (SIP) is the primary protocol that makes the connection between two endpoints and closes the connection when the call is finished. At the most basic level, SIP is the VoIP equivalent of the dialing tones that directed old-fashioned analog calls to the right switches and across the private phone network. The use of SIP is critical to the capability of disparate network topologies from different vendors to be able to communicate with each other.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 18: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 12SIP is a communications standard authored by a global com-munity of engineers known as the Internet Engineering Task Force (IETF ). The standard, however, is more of a series of recommendations and suggestions on how SIP should be implemented. The actual SIP implementations are left up to individual engineers and vendors, resulting in a multiplicity of SIP variations that are technically in compliance with pub-lished SIP standards but not necessarily compliant with one another.

There are enough variations in SIP that sometimes two sys-tems connecting to each other using SIP find that they aren’t really speaking the same language. The basics are all there but with differing syntax and dialects in what otherwise appears to be a common language (kind of like American English versus British English). There’s just enough difference to cause confusion. When two people are talking, that confusion can be overcome by context or by a simple “huh?” But when two machines are talking, that simply isn’t going to happen.

An SBC — at least a useful one — must be able to speak all the different dialects of SIP and do on-the-fly translations in both directions. So if a call is crossing a border between a system using Dialect X and another system using Dialect Y, the SBC is required to find the parts of Dialect X and Y that don’t quite match up and convert them back and forth as the call moves across the SBC. It’s not rocket science in concept, but it’s hard to do, and the best SBCs make the whole process transparent and seamless.

Transcoding CallsThe SBC’s job — or at least an SBC worth its salt — is to transcode, or change, codecs as sessions pass through the SBC. The SBC knows which codecs are supported on each side of the network border and is required, using a combination of software and special-purpose digital signal processors (DSPs), to decode and then re-encode the voice or video signal as it crosses the network border.

Many codecs — the encode/decode algorithms that compress voice and other signals (like video streaming across the network in a videoconferencing environment) — are in use in various VoIP

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 19: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 2: Identifying the Key Requirements of an SBC 13and UC systems. UC is the “beyond voice” variant of VoIP, where things like video conferencing, screen sharing, and instant mes-saging (IM) are delivered over the VoIP network platform.

Low- and high-bandwidth video and voice codecs are designed differently to work on various devices:

✓ Computers and tablet devices

✓ Dedicated VoIP phones

✓ Mobile devices (smartphones and iPhones)

In a VoIP call (or any session-based communication, for that matter), there are always differing capabilities to support codecs. So if an enterprise’s private branch exchange (PBX) supports one specific codec and the incoming call from an important customer is using a different codec, the SBC will understand both codecs and, in real time and in both direc-tions, modify the codec as the call passes through it.

Some codecs may simply not be implemented on a device for a mixture of reasons:

✓ Because the developers haven’t gotten around to it yet

✓ Because the software licensing fee is too high

✓ Because the device has a relatively “slow” CPU and can’t handle the codec computationally

Transcoding frequently comes into play in two specific instances covered in this section.

HD VoiceThe sound quality of voice calls in general has taken a step backwards over the years as convenience (mobile) and eco-nomics (VoIP) have caused a movement away from traditional landline phones. A new effort called High-Definition (HD) Voice has been brewing in the industry for a few years with a goal of reproducing a greater range of frequencies at higher clarity (known as a wideband codec) instead of traditional narrow-band codecs (so called because they cut off both the top and bottom frequencies normally found in a person’s voice).

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 20: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 14The result is a voice call that’s easier on the ears and that lets you actually tell who’s talking (handy during a conference call, huh?). It’s like moving from AM radio to CD (or, for the modern music buffs out there, to lossless music codecs).

But there’s a gotcha to HD Voice — there’s no one single implementation of the service and no one single codec in use by every HD Voice-capable system, but having an appropriate SBC in the middle of the call (one with robust transcoding capabilities) solves the problem. The SBC can transcode and keep the call HD all the way (but there’s a lot of software and hardware doing some heavy lifting behind the scenes).

Bandwidth restrictionsAs much as you may like to have limitless bandwidth avail-able to you, wherever you are (and personally, we’d prefer it to be very inexpensive too), that’s simply not always the case. Sometimes a call is made to someone who’s connected to a mobile network outside of not only 4G but also even 3G cover-age. Other times, a call is made to a person in a home office with a dial-up connection or someone using a spotty hotel Wi-Fi connection.

Bandwidth can’t always be taken for granted across the entire network portion of an SIP call, videoconference, or screen sharing session. There are codecs available that trade fidelity and audio/video quality for greater compression — thereby using less bandwidth.

You may not want to default to these low-fidelity codecs all the time, but sometimes they’re necessary over at least part of the call’s path. An SBC, sitting as it does at the border between network segments, can recognize this situation and transcode to and from lower bandwidth codecs when required. This situation is much better than relying on the VoIP clients themselves to do this kind of calculation upfront, especially because not all clients support all codecs.

Dealing with NAT TraversalDo you have a Wi-Fi router in your home? Chances are very good that you do and, if that’s the case, you probably have a

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 21: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 2: Identifying the Key Requirements of an SBC 15Network Address Translation (NAT) network configured for your laptop, iPad, Android phone, and other devices con-nected to your home’s broadband connection.

NAT is a technology service that translates (it’s right in the name) between a single public Internet Protocol (IP) address (the IP address of your broadband cable or DSL modem) and the private IP addresses that your router assigns to all the attached devices on your home network. NAT is a configura-tion that’s used because there aren’t enough IP addresses available in the world to assign each and every individual device its own unique address.

The newer version of IP that will eventually replace today’s current IPv4 is IPv6 (Internet Protocol version 6). IPv6 increases the number of available IP addresses and eliminates the need for NAT. The gradual adoption of IPv6 actually provides another reason to use an SBC, because the SBC has the intelligence to enable IPv4 and IPv6 network segments talk to each other.

NAT is a neat and inexpensive technology for network addressing because it lets a small pool of IP addresses get used over and over in different private networks while letting the devices attached to that network communicate with the broader Internet using a single, unique public IP address.

The problem with NAT is that creating an end-to-end session is difficult because the IP address of a device on a NAT isn’t a public IP address (that would be the IP address of the network itself). This creates issues with end-to-end sessions like VoIP and requires some translation to happen between public and private addresses — translation beyond what the private network’s router can do.

Many SBCs explicitly support what’s known as NAT Traversal, providing the ability to work with VoIP session packets and giving them the instructions they need to get through the NAT router and to the actual device that’s on the end of the session. NAT traversal requires a significant amount of computing capacity in the SBC because a large number of devices participating in VoIP and other sessions are behind a NAT. An SBC requires a lot of processing power to do all the translating and routing required to traverse NATs.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 22: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 16

Fax and Tone DetectionAs much as any carrier engineer or enterprise IT professional would like, it’s usually just not possible to have a clean break with the past (like Apple removing the floppy drive from the orig-inal iMac). Oftentimes, legacy technologies linger on well past their “sell by” date, and the network needs to support them.

A prominent example of this in the VoIP world is facsimile (fax) technology. We’ve spent enough time in the telecom world to have heard of IP faxing being “the next big thing” for at least 15 years. But that doesn’t change the fact that there are still people out there using fax machines every single day of the week. VoIP systems would, if they could form opinions, probably be opposed to this, but the reality remains.

An SBC, however, can come to the rescue here by incorporat-ing tone detection (the ability to recognize and act on standard analog telephone touch tones) to recognize and then properly route that awful screech of a fax preamble.

Multimedia (Video) SupportThe service provider and enterprise are converging on an end-to-end IP networking strategy including data and rich-media communications traffic (voice, video streaming, and so on). Businesses require the ability to conduct face-to-face virtual meetings to save on the time, expense, and stress of business travel. Waves of price decreases and performance improve-ments make video conferences more accessible to smaller business, but still some challenges remain.

Intercompany communicationEnterprise NAT routers and firewalls are vital for securing a private network, but they often wreak havoc on video com-munications because they block all incoming calls and session requests, hide the network address of internal devices, and degrade the performance by inspecting each packet that traverses the firewall. There are ways to get around NAT/firewall-related issues, such as disabling the firewall, deploying a video-friendly firewall, or a video bridge with dual network ports, but each of these options compro-mises security and performance and involves added security, cost, and network complexity.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 23: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 2: Identifying the Key Requirements of an SBC 17

Interoperability issuesA wide range of video conferencing standards exists, but despite these standards, interoperability issues still prevail due to different protocols (SIP, H.323) or video/audio com-pression (H.264, H.263, G.722, and so on). Some other issues also include basic connectivity and interoperability with devices that provide a less than optimal experience due to call speed and device type.

SBCs can serve many purposes within an IP network by offering features within the same device. An SBC can provide video proxy services, NAT /firewall services, protocol conversion and trans-coding, QoS monitoring, and more, driving down the cost and complexity of a video conferencing environment. SBCs can also perform protocol translation between SIP and H.323 as well as H.264, H.263, G.722, and many other video and audio protocols.

Performance, Scalability, Resiliency

If you’ve read the previous few sections talking about all the things that an SBC must do, you may begin to imagine that the SBC can’t be a low-powered (computationally speaking), dumb box. And in fact, you’d be right. SBCs need to be power-ful and robust devices with the right degree of extra capacity and redundancy to handle not only the average number of calls coming through the system simultaneously, but also to scale up and handle peak calls — like the flood of telephone orders when a hot new product is announced.

When evaluating an SBC’s performance, scalability, and resiliency, consider the following factors:

✓ CPU utilization: The SBC does a lot of computationally complex work, what with all of the audio/video trans- coding, SIP translation, and other functions that it has to do in essentially real-time (where delays can keep calls from being completed or cause latency and delays in calls); the CPU utilization in both a normal steady state and during peak periods should allow plenty of overhead.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 24: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 18 ✓ Concurrent calls (or sessions) supported: This objective

measurement is simple to understand. How many con-current calls is the device rated for; how does this match your network’s usage patterns; if your usage grows and begins to exceed the capacity of your SBC, how can you upgrade?

The need for scale: This becomes very real as multipoint videoconferencing becomes a reality and as the adoption of presence-based communications tools like IM becomes more prevalent.

✓ Redundancy: Put a different way, this means “a lack of single points of failure.” An SBC is performing a mission-critical role for an enterprise or carrier. Are there any elements within the SBC that don’t have a redundant element that can take over on a millisecond’s notice? If so, remember downtime means lost money (in revenue or employee productivity).

✓ Registration rate: How many clients can the SBC register in a fixed period of time; this relates to the registration storms (see Chapter 1). When a lot of users are connecting at once, make sure the device can handle it.

✓ Quality of Service policies: The Quality of Service (QoS) policy of a network and prioritization of data flow is implemented by the SBC. Often QoS policies perform such functions as traffic policing, resource allocation, rate limiting, call admission control, and ToS/DSCP bit setting. For example, the SBC could give higher priority to voice traffic so users have an uninterrupted audio trans-mission on calls. Chat and web traffic would be relegated to simple “best-effort” service to avoid clogging the voice traffic with lower-priority data.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 25: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 3

Virtualizing the SBCIn This Chapter▶ Discovering the hype around virtualization

▶ Defining virtual software SBCs

▶ Identifying the benefits of a virtual software SBC

▶ Understanding what to look for in a virtual software SBC

V irtualization is the latest hot topic in the field of computer technology. Virtualization is the ability to use a single

device while making it appear that you’re using multiple devices in order to save costs by reducing the need for multiple physical devices.

Understanding Why Virtualization is Such a Big Deal

In recent years, certain trends in the computer industry that brought virtualization to the forefront and to the front pages of industry publications.

Underutilized hardwareBefore the use of virtualization in the computer industry, many data centers used about 10 percent of their total capacity, meaning that nearly 90 percent of their capacity went unused. Virtualization is the solution to this problem by creating logical representations of physical devices so organizations can increase their hardware utilization rates.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 26: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 20

Being at full storage capacityThe massive amounts of e-mail, websites, video, and mobile application data must be stored in the business’s data centers, which are reaching full storage capacity. Virtualization can host many guest systems on a single physical computer, allowing organizations to better utilize data center server resources to avoid costs that can run into millions of dollars to build onto their data centers to add more capacity.

Rising energy costsIn today’s business environment, companies are looking in every corner of their business to find cost savings. The costs of running desktop computers, servers, network hardware, and storage are a growing concern as more and more power is required to keep data centers up and running even though hardware is running at only about 10 percent of capacity. Virtualization makes more efficient use of hardware resources so companies can significantly reduce their energy costs and improve their bottom lines.

NFVVirtualization isn’t just for the data center. Communications systems can also take advantage of the cost savings and efficiency of virtualization technology. Network Functions Virtualization (NFV) helps design, deploy, and manage net-work services by separating network functions from hardware devices so they can run in software. This process removes the need for you to purchase expensive, privately-owned hardware.

NFV allows for consolidating and delivering network functions to support a fully-virtual infrastructure, including the servers and storage devices, by using standard IT virtualization tech-nology that runs on high-volume servers, switches, and stor-age hardware in wired and wireless networks. Virtualization technology makes deploying and maintaining network services much more cost-efficient than in the past.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 27: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 3: Virtualizing the SBC 21

What’s a Virtual Software SBC?A virtual software SBC is a session border controller (SBC) device that’s implemented entirely in software that can be deployed on any commercial, off-the-shelf computer in a communications system. In many cases, the core of the SBC software is the same code that executes in the hardware-based SBC firmware but runs on off-the-shelf server hardware, which allows for the software SBC to behave in the same manner as the hardware-based SBC and eases maintenance of the software that runs on both devices.

Because the SBC is implemented in software, it can be deployed easily on the same type of virtual server farm that hosts your favorite media-streaming service. Because the SBC is now software, it can be deployed on virtual servers and deployed in cloud-based architectures.

Looking at the Benefits of  a Virtual Software SBC

Some of the benefits that organizations get when choosing to use a software SBC are covered in this section.

Low Total Cost of OwnershipSoftware SBCs provide a much lower Total Cost of Ownership (TCO) than hardware devices, and because they run on less expensive off-the-shelf hardware, they don’t need to be powered and cooled, and they can be turned on and off automatically without requiring IT staff to configure and deploy them. Software SBCs also support a “pay as you grow” model, meaning businesses don’t have the wasted costs of providing system capacity that isn’t yet needed.

Accelerated time to marketSoftware SBCs allow service providers to deploy new network services very quickly to support changing requirements and seize market opportunities as they arise. Because software SBCs are

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 28: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 22much less expensive to deploy than hardware SBCs, service pro-viders can increase their return on investment (ROI) for the ser-vices they provide. This flexibility and cost savings also reduce risks with rolling out new services, as they can easily try out and modify these services to meet the needs of their customers.

Delivering agilityAgility is an absolute must in today’s competitive marketplace for businesses to survive and thrive. Service providers must be able to quickly scale up or down their services to meet changing market demands. They also need to innovate quickly and get those innovations out to the market as quickly and easily as possible. Virtual software SBCs allow for services to be delivered via software to customers on industry-standard server hardware, making it quick and easy to get these out to customers.

Knowing What to Look for  In a Virtual Software SBC

When choosing a virtual software SBC, take into consideration some important points:

✓ Virtual software SBCs give businesses flexibility. Choose a vendor that has SBCs that meet the needs of small and medium-sized businesses as well as large ones so you can start off small with your deployments and scale them larger at your own pace.

✓ The SBC provider should use the same codebase in all its products. Make sure the software SBC has the same features as a hardware SBC and is compatible with other hardware devices provided by the same vendor. This simple check makes it much easier and more cost-efficient for businesses to migrate more of their network into the virtual domain over time.

✓ The virtual software SBC should be able to work with many types of media, such as faxes, Interactive Voice Response (IVR), collaboration, and other applications on the IP networks.

✓ Make sure that the virtual software SBC works well with the industry-leading virtualization platforms.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 29: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 4

Deploying SBCs in Different Environments

In This Chapter▶ Deploying SBC in the UC

▶ Implementing SBC in the contact center

▶ Looking at deployments of SBC in the enterprise

▶ Checking out how SBC is adopted in the wireless world

▶ Deploying SBC in IMS Networks and WebRTC

A session border controller (SBC) plays a role in many different types of environments and configurations

such as Unified Communication (UC), Contact Centers, SIP Trunking, wireless and IMS networks, and WebRTC. Each one of these configurations has its own unique requirements and challenges, so in this chapter, you take a look at how the SBC can be deployed in each of them.

SBC in UCGone are the days when enterprise communications meant a PBX-centric (you can find more info on PBX in Chapter 1) solu-tion that met nearly every employee’s requirements. Today’s employees want it all — voice, video, instant messaging, and web-based apps — and they want it wherever they are on what-ever device they choose. The world is a mobile one, and enter-prises need to harness the power of UC and the flexibility of Bring Your Own Device (BYOD) policies to increase employee productivity, reduce costs, and improve customer service.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 30: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 24CIOs are looking to UC and Cloud-based services to meet the rising demand for mobile multimedia communications, yet a fundamental barrier to UC adoption is a lack of interoperabil-ity between the vendor-specific voice, video, and messaging systems that exists in most enterprise networks.

While Session Initiation Protocol (SIP) was originally intended to break down many of those barriers, even SIP-based sys-tems face their own issues and often require significant inter-working and transcoding in order to provide acceptable levels of interoperability. As a result, most enterprises fall short of a truly unified model of communications and collaboration. That model allows users to consistently consume rich media services regardless of the underlying PBX, application server, or end-user device.

The road to UC has been paved with wasted time and money: time spent on long service engagements and endless interop-erability testing and money spent on PBX upgrades and new equipment. But an SBC can provide a session management framework (in addition to providing security) for UC and SIP communications that coordinates PBXs, video services, busi-ness collaboration tools, and a wide variety of multimedia devices (smartphones, tablets, and so on), so enterprises can more easily integrate and create true UC.

As you move more services and applications into the Cloud, the SBC-based session management framework unifies Cloud-based services with your premised-based enterprise commu-nications to ensure a rich, easy-to-manage UC experience.

SBCs in the Contact CenterThe contact center is vital to a business’s success because in the competitive marketplace, high-quality customer service is essential. The contact center has evolved from simply a center where customer service agents take voice calls to a multimedia contact center where agents handle voice, e-mail, chat, SMS, and video calls. Contact center efficiency is crucial to a company’s bottom line, so increasing requirements exist for agent productivity and quality control. The SBC can add value in these areas.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 31: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 4: Deploying SBCs in Different Environments 25

Call recordingCall recording is one of the most important features in the contact center. Contact center managers use call recording as both an agent evaluation and an agent training tool to ensure agents provide the utmost quality in customer service. In many cases, government regulations require calls to be recorded for legal reasons and consumer protection as well.

Traditionally, call recording in communications networks was done by consuming an extra data port on a switch to replicate the call data to the recording system. Consuming an extra data port to record calls doesn’t scale well in many contact centers that need to record each call that comes into the system. The SBC simply replicates the SIP session for the call to send the call data to the recording system, providing reliable data transfer and freeing up data ports to allow more incoming calls from customers.

Emergency and 911 callsContact centers in the United States, Canada, and Mexico must meet requirements for emergency 911 services. SBCs can be used to identify 911 calls, remove any restrictions, assign priority, and route them efficiently to a Public Safety Answer Point (PSAP). First responders need quick access to emergency situations in places such as office buildings or campuses that have multiple entry points, so knowing the exact location of the emergency call is essential.

Mobile agentsOne of the largest trends in contact centers is the use of mobile or “work at home” agents. Mobile agents allow for contact centers to be flexible and scale up or down as busi-ness requires without the added expense of office space and facility expansion. Consider, for example, a retailer that sees dramatically expanded sales at Christmas. This retailer can add temporary mobile agents to handle peak demands of cus-tomer service. Mobile technology allows for workers to work out of their homes with flexible hours, making this arrange-ment appealing to workers.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 32: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 26 Mobile agent configurations do, however, present some

challenges to the contact center. Contact centers require a scalable solution where Internet access devices don’t need to be configured and agents don’t need to use VPN (see Chapter 1 for more info on VPNs) IP phones to communicate. Security is also a very important factor with mobile agent configurations because sensitive customer data transfers through the network during these interactions. The SBC eliminates the need for VPN IP phones and provides the necessary security (see Chapter 1 for more information).

Internal transfersIn many cases, calls may need to be transferred to another con-tact center within the organization. This can often lead to higher costs and increased security risks because these transfers may have to traverse public networks. SBCs can identify internal transfers and use a feature called Take Back and Transfer, which keeps the call on the private network, avoiding any costs and security risks inherent with traversing public networks.

One case to consider is a video kiosk in a remote store where a customer can make a video call to ask for assistance from an agent in a contact center. In a non-SIP environment this setup is complicated because both voice and video data travel though many endpoints across networks, requiring each border traversal to be secured and load balancing to be performed across the network. The SBC provides the necessary security, call routing, and load balancing features to make this type of data transfer secure and cost efficient.

SBC in the EnterpriseThe market for SBC in the enterprise has gained much renewed interest as businesses replace their existing TDM-based systems for a SIP-based UC platform for telephony, e-mail, instant message, presence, and video conferencing applications. For the enterprise, the SBC is the first line of defense in the UC system providing cost-effective and secure connections to corporate networks and branch offices. In addition, enterprises in various industries come under regula-tory requirements such as HIPPA for healthcare companies and customer data security requirements for credit card and banking industries.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 33: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 4: Deploying SBCs in Different Environments 27Today, many companies also have the complexity of many branch offices and a mobile or virtual workforce as well that add to the necessity of reliable and secure communications. Enterprises must maintain the highest layer of security to pro-tect their customers’ information and to maintain regulatory compliance. In all of these areas, there’s a role for the SBC.

In the enterprise, SBCs perform connectivity, quality of service (QoS), emergency 911 call routing and prioritization for regula-tory compliance allowing access by first responders, and media transcoding for IP communications. SBCs also offer gateway, VoIP mediation, access to PSTN networks, and survivability features for the enterprise. The SBC is the secure boundary between the enterprise and service provider networks.

SBCs in the enterprise can be configured with various deploy-ment options. SBCs can be hardware appliances, an integrated component of media gateways and routers, or more recently, software-only virtual machines enabling the deployment to a virtualized data center or to the Cloud.

SBC in the Wireless WorldTelephone communications have changed rapidly from home and office phones to wireless mobile phones. An increasing number of homes no longer have landline or even IP tele-phones, and a growing number of businesses are replacing their landline phones with mobile devices.

Mobile devices introduce some new scalability and security challenges into the UC architecture. From a scalability standpoint, there are concerns related to the volatility and growth of video usage carried over the media network. Also there are challenges for the mobile operators with increased signaling impacts of these devices as well as messaging and presence applications that are common to these devices. A design challenge for the SBC is the impact of mobile devices on the signaling plane of the SBC. Mobile sessions are typically shorter in duration than other device sessions, but the signaling requirements of these devices translate into more concurrent sessions straining the SBC.

The latest trend in wireless data communications is the 4G LTE standard. (You’ve probably heard of LTE. It stands for Long Term Evolution.) These systems allow for the latest in

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 34: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 28high-speed data for mobile phones and other mobile devices for streaming voice calls, video, and data from all those impor-tant applications in social media and streaming services such as Pandora or Spotify.

The newer LTE standard only supports IP packet switching on SIP networks, meaning that network links are shared by packets from multiple communications sessions. Older mobile phone standards such as GSM, UMTS, and CDMA2000 work on circuit-switched networks, meaning that a dedicated network channel from sender to receiver is maintained throughout the duration of the call. So how do mobile carriers reengineer their voice networks to accommodate the newer LTE standard? The mobile phone industry standards have settled on the approach of using Voice over LTE (VoLTE) for delivering voice as a data stream within the LTE data transmission. This approach is based on the IP Multimedia Subsystem (IMS) which provides for both voice and data transmission.

SBC in IMS NetworksThe IP Multimedia Subsystem (IMS) is an integrated network for telecommunications providers to deliver voice, video, and data using the IP protocol. In recent years, the arrival of LTE networks has revived the interest in IMS because VoLTE has become the standard for providing voice services over LTE networks. IMS doesn’t contain an SBC in its architecture, but many IMS systems add SBCs as edge devices that provide additional features to perform functions such as SIP interoper-ability, media transcoding, security, and lawful intercept.

Even though IMS standards such as 3GPP (3rd Generation Partnership Project) don’t include an SBC component, SBCs do perform many of the following functions:

✓ Proxy-Call Session Control Function ( P-CSCF ): The entry point into the IMS subsystem from user endpoints. An SBC integrates the P-CSCF with the Access Border Gateway Function (A-BGF) to handle the media and signaling data appropriately. The SBC provides capabilities such as NAT/firewall traversal, user identity privacy, encryption, and policy management.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 35: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 4: Deploying SBCs in Different Environments 29 ✓ Access Transfer Control Function (ATCF ) and Access

Transfer Gateway (ATGW ): The ATCF and ATGW functions ensure that the handoff of the call doesn’t introduce an unacceptable interruption of media flow.

✓ Interconnect Border Control/Gateway Function (I-BCF/I-BGF ): Handles the signaling and media of calls. The Interconnect SBC performs functions such as network topology hiding, monitoring and lawful intercept, routing of signaling into the core of the IMS, and policy manage-ment on a per-trunk basis.

SBC in WebRTCWebRTC is a new technology that lets you use phone, video, or text right from the web page you go to. You can also share screens (see the same web pages or files) and all sorts of new things. The SBC plays an important role in WebRTC as you see in this section.

Enterprise securityBecause WebRTC applications run in a browser and transmit application data across the unsecured public Internet, there is a risk of attacks on the enterprise servers. Let’s consider a case where a customer initiates a customer support call from a WebRTC-enabled browser. The SBC can secure the SIP network in the contact center by being placed between the WebRTC application server and the SIP network at the contact center. The SBC can also provide session control and manage-ment between the WebRTC server and the SIP server at the contact center.

VoIP phone callsIn this scenario consider a VoIP call from a WebRTC-enabled browser to a VoIP phone. The SBC can provide security between the WebRTC application server and the SIP network as well as session control. In addition, the SBC can provide transcoding between Opus and G.711 telephony protocols, for example.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 36: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 30

PSTN phone callsIn this scenario consider a call from a WebRTC-enabled browser to a landline phone on a PSTN (privately-switched telephone network). In this case the SBC once again provides security between the WebRTC application server and the TDM gateway as well as transcoding and internetworking between the WebRTC application server and the TDM network.

Media supportConsider a WebRTC-enabled browser initiating a video chat with a non-WebRTC-enabled IP video phone. In this situation the SBC can provide transcoding between the VP8 and H.264 video conference codecs between the WebRTC application server and the IP video phone. The SBC can also provide protocol internetworking between IP6 and IP4 and SRTP and RTP for video media transfer. The SBC can also perform QoS and policy control, ensuring the real-time media data get network priority.

Lawful interceptThe SBC supports lawful intercept of both signaling and media data transferred between the WebRTC server and the destina-tion IP phone. As you can see, there is a vast role for SBCs in many different environments. The SBC is a vital part of any communications architecture.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 37: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 5

Multimedia MattersIn This Chapter▶ Meeting customers video network requirements

▶ Analyzing the challenges of video in IT systems

▶ Using SBCs to create a video network that works

▶ Deriving business value from SBCs in your video network

A s Session Initiation Protocol (SIP) sessions move beyond simple voice calls and become more sophisticated, your

SIP network needs to handle more than just audio and its related audio codecs (for more info on codecs, see Chapter 2). From the boardroom to the browser, tablet, and smartphone, video and audio conferencing have become essential parts of business communications. The workforce is increasingly mobile, and busi-nesses have many workers who work part- or full-time from their home offices.

Businesses need all sorts of different devices to collaborate effectively. This chapter focuses on video and audio where you discover what businesses need to make their systems “just work”, the IT challenges video and audio requirements bring, and how SBCs are a cost-effective solution to the challenges of these systems.

Video Should “Just Work”People in the high-tech business world expect to use video and audio to collaborate with their colleagues, customers, and partners. Today’s abundant smartphones and tablets have high-resolution video screens that can send and receive video on wireless fidelity (Wi-Fi) networks or 3G and the newer 4G LTE mobile data networks. People expect that video and

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 38: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 32audio conferences work perfectly with high resolution video and audio without jitter and distortion. “Working” can mean different things to different users. Here are some examples of what customers want video conferencing to do for them:

✓ Employees using a Cisco Jabber endpoint need to collabo-rate with other employees who are using Microsoft Lync.

✓ High-definition video conferencing with partners and customers helps build important relationships. These video connections must securely pass through the network firewall that separates a trusted network from an untrusted network.

✓ An auto insurance customer wants to use video on his smartphone to contact his agent to make an accident claim from the scene.

✓ Software developers located around the world need to meet daily for scheduled “stand-up” meetings to review project progress.

Making this all work smoothly brings on some challenges:

✓ Desktop communications applications like Microsoft Lync and Cisco Jabber use different signaling protocols, so they need some translator to get the two applications to talk to each other.

✓ Video meetings with people outside of the organization require video and audio data to pass through the orga-nization’s firewall securely with necessary encryption to ensure that data can’t be intercepted by hackers.

✓ The customer using the smartphone must have video and audio pass through the public Internet and firewall which must then be routed to the correct party in the organization.

✓ Software development teams can’t flood the network with video streams. Functions like call admission and bandwidth control must be used to ensure a high quality experience even with limited bandwidth capacity.

The SBC meets these IT challenges to give businesses high quality conferences that just work. Successful video and audio systems have up to five components that are often separate devices or servers, but that doesn’t always have to be the case. In a simple video system where all of the video endpoints use

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 39: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 5: Multimedia Matters 33the same protocols and compression/decompression algo-rithms (codecs), only two components are required: a multi-point contact unit (MCU) and a gatekeeper or SIP proxy.

Think of the MCU as a funnel that takes in all of the video from the participants’ cameras and combines them into one video stream that is sent back to them. The gatekeeper or SIP proxy is like a traffic cop that makes sure all ends of the session are con-nected and handles requests like those to let new participants join and others hang up and leave.

The simple video system works well when all endpoints use the same protocols, but what happens if the call has to pass through a network firewall or one of the endpoints uses a dif-ferent protocol? You can put in pinholes in the firewall to allow traffic to pass through, but this can compromise security which isn’t desirable in most cases. In any case, the simple video system breaks down when you have devices with different pro-tocols and the video traffic must pass through a Network Address Translation (NAT) (for more info on Network Address Translation, see Chapter 1) layer and corporate firewalls.

In real world video systems two additional video infrastructure components, firewalls and SBCs, are crucial. It is important that you understand how firewalls and SBCs work in a video system.

In a video system, firewalls and SBCs work in parallel. Firewalls handle normal IP traffic and SBCs, handle the real-time communications traffic. Firewalls are designed to isolate the computer resources in one network from those in another to keep them safe from malicious attacks. Firewalls block most incoming traffic except on certain ports coming only from trusted connections configured by the network admin-istrator. The firewall examines incoming or outgoing packets and determines whether to forward them on. Devices from outside the firewall on an untrusted network may send unso-licited invitations intended for someone inside of the firewall to join in a voice and/or video communication session. In cases where a device inside the firewall did not request the invitation, the firewall just discards these requests. The IP addresses of where to send the audio and video packets are embedded with the IP packets. The firewall rejects the pack-ets when it can’t determine how to route them.

SBCs understand media protocols and can work side-by-side with firewalls. You can think of an SBC as a real-time communications firewall that makes a video system work securely and efficiently.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 40: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 34

Adding Value to Video with SBCsSBCs sit at the edge of a network and work as a boundary point on the network between endpoints on the trusted network and those on the untrusted network. SBCs provide session control and security whether the sessions are inside of the trusted network or not. SBCs provide several benefits to companies making the system “just work.”

Session managementThe SBC is the ideal element in a complex network to enforce call admission control on a session-by-session basis. Multiple UC and video devices can access the SBC to perform call admis-sion control (CAC). SBCs can perform Quality of Service (QoS) (for more info on QoS, see Chapter 2) functionality, making audio and video pass through the network as with as much quality as possible given any bandwidth constraints. CAC helps to provide optimal end-user experience by regulating the number of endpoints allowed on the network and making sure there’s enough bandwidth for each video and audio stream.

Endpoint interoperabilityMany organizations have communication endpoints created by different manufacturers or software developed by differ-ent vendors, such as Cisco Jabber and Microsoft Lync. Some of these video systems use different video codecs so the SBC must be able negotiate with each device so the same video codec is used, ensuring interoperability with all devices.

Even if all endpoints in a video call use the same video codec, the SIP protocol implementations used by Cisco, Microsoft, Avaya, Polycom, and others are different enough to require a translation device to make sure the signaling works to connect to all devices. SBCs solve this problem by modifying the signaling information contained with the SIP packets so that these endpoints can com-municate with each other in what is called protocol normaliza-tion. Protocol normalization allows an organization to keep their hardware and software investments while making video solutions from different vendors work so they don’t have to get all of their network components from a single vendor.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 41: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 6

Saving Money with an SBCIn This Chapter▶ Reducing costs with one-stop management

▶ Using redundancy to keep the cash flowing

▶ Switching from many devices to one box

▶ Taking a look at money-saving examples

Y ou’re all hyped up. You’ve done all your session border con-troller (SBC) research. You know the benefits (Chapter 1)

and the services (Chapter 2) you get from an SBC. Now, you have to pitch the idea to your CIO or CTO. Everyone — and we mean everyone from enterprises to the biggest telecom carriers — is worried about budget and cost control. And while an SBC isn’t a massive expense, if your CIO or CTO sees a new budget item, he’s going to want some serious justification.

In this chapter, we present the cost savings justifications for SBCs and focus on how an SBC saves money relative to a build-it-yourself approach where you cobble together the functionality of an SBC by using other devices and custom integration efforts. As a bonus, we give you two case studies that show how SBCs are used in the real world.

Benefitting from One-Stop Management

Localized policy management (see Chapter 3) is a benefit of SBCs from the perspective of cost and performance. The ability to manage VoIP policies and media/signaling at one point in your network — right at the border of the network in the SBC — means that you spend less technician time and money managing mul-tiple devices like routers and adding additional transcoders.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 42: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 36 If you have a large network — or if your network grows over

time — further simplify SBC management by using a central-ized policy server. In this scenario, you perform your initial configuration and any future policy changes one time in one place (the master policy server) and have those changes automatically circulate through the network to all your SBCs.

Keeping the Revenue Flowing with Redundancy

Redundancy means that you have capacity and network elements (within a single device in this case instead of in side-by-side installations of similar equipment) which are sitting there in your network, unused. You may wonder how that’s saving you money. Redundancy is responsible, not wasteful, because it ensures that your network stays up when some-thing goes wrong and works well when the loads get high. Redundancy keeps your network working and working for you instead of leaving your business stranded and unproductive.

All networks can fail at some point; oftentimes, something besides the SBC causes the failure. A redundant network provides a graceful recovery by having extra capacity ready to go the instant something stops working. Perhaps some other element to the network goes out. A well-designed SBC has the ability to quickly recover from these disasters and has the capacity to restore its state and to handle the flood of reg-istrations it faces as the network is restored and all your VoIP clients are re-registered with the network.

Saving with One Box Instead of Many Devices

Say you wanted all the features and benefits of an SBC, but you decided to just build it yourself. You’d need to cobble together a set of firewalls, routers, servers, gateways, and/or softswitches that could individually handle all the security, Session Initiation Protocol (SIP) translation, media transcoding/transrating, and call admission control functions that an SBC provides. But if you consolidated all that functionality into a single hardware device — the SBC — you’d realize big cost savings:

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 43: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 6: Saving Money with an SBC 37

✓ Reduced capital expenses: Simply put, you have fewer things to buy. For those network elements that you need for other functionality, you don’t need to overbuild/over-specify them to allow capacity for the SBC functionality that is handled elsewhere.

✓ Operating the devices: You save money on the following examples:

•Real estate: Whether the SBC is in your telecom equipment room, data center, or collocation facility, you need less rack space for a single box solution.

•Power: You don’t need to pay for electricity for devices you don’t install.

✓ Reduced configuration and management: A non-unified solution means that you have to use more than one system to configure, maintain, and manage the system and to process all your configuration and policy changes. An SBC provides a single user interface and a single management console instead of the “swivel chair” approach — where your network manager turns knobs and flips switches on multiple consoles to effect one single change or configuration.

Saving Costs with a Virtual Software SBC

A virtual software SBC can be a significant cost saver for a business by allowing you to use the existing infrastructure to scale up or down your SBC capacity without adding hardware and requiring more rack space. In addition, software SBCs can

Deconstructed SBCsSome vendors offer deconstructed SBCs, which provide functional-ity in several distinct chassis/systems. For example, one is for signaling functions and another is for media functions. You can pres-ent valid arguments either way for

this approach as opposed to the more common integrated, single chassis SBC, but keep in mind that a deconstructed SBC won’t have all the “one box” cost advantages of an integrated SBC.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 44: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 38be provisioned and configured by a simple software download providing ease of configuration and deployment. Software SBCs can provide the same features and scalability as hardware-based SBCs deployed in a virtualized environment.

Saving Money with  Intelligent Policy

In Chapter 1, you discover that SBCs provide local and central-ized policy controls for a network. SBCs provide a robust policy engine that allows you to implement hundreds of policies, such as intelligent call routing, custom dialing plans, call blocking and screening, emergency call routing, local number portabil-ity lookups, and calling name delivery. The policy engine of an SBC can allow service providers and enterprises, for example, to develop intelligent routing policies that can save millions of dollars in toll charges by routing calls based on least cost as well as avoiding transferring calls to external, public networks whenever possible. Because SBCs can provide centralized policy control, routing and policy changes can be delivered globally across multi-vendor networks from a single point.

Looking at Case Study ExamplesSometimes you need more than a few words of theory to understand how a technology makes a difference in your business — you need to understand how other companies are actually implementing a technology to further their business goals and what their tipping points were to make the changes. Well, there’s nothing better than an actual case study so you can see things in action.

Flying the friendly skiesA major U.S.–based international airline is a marquee customer for SBCs. The primary voice application for this company sup-ports its global call center. As you may imagine, this undertak-ing is a massively important function for an airline that deals with reservations, rewards programs, and the countless flight changes, seating assignments, and related calls.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 45: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 6: Saving Money with an SBC 39In addition to the call center, the airline needs to support a large number of other voice lines for things such as maintenance and support teams, ground support (baggage, fueling, and so on), logistics, in-cockpit and paging systems, airport ticket counters, a highly mobile workforce, and even systems as seemingly pro-saic as airport courtesy phones. The airline’s massive telecom needs face functional and expense-related issues with its legacy systems. Specifically, the airline wants to

✓ Move to an all-IP voice infrastructure without discarding an installed base of legacy equipment

✓ Save money

✓ Reap the benefits of UC by improving employee productivity

✓ Maintain voice security

✓ Improve customer responsiveness and satisfaction in a customer-facing environment

The legacy voice systems — TDM PBXs and circuit-switched (ISDN-PRI) voice circuits — migrate to IP PBX and SIP Trunking to reduce voice costs while not immediately abandoning the installed equipment base. At the same time, the airline wanted to centralize control of its voice communications to best pro-vide load-balancing and least cost routing for inbound IVR (Interactive Voice Response) calls from customers.

The airline needed a solution. The answer was SBCs. The air-line installed the Sonus SBC as well as a Sonus Policy Server. The Sonus SBC solved the airline’s problems with

✓ Interoperability between legacy TDM and H.323 voice systems and SIP Trunking

✓ Centralized call control and routing

✓ Secure access for both on-campus and remote call center agents and mobile employees

The airline achieved the following results:

✓ Reduced call costs

•Leastcostroutingforallcalls

•Keepinginternalcallsontheairline’sMPLSnetworkinstead of carrying them over a carrier’s network

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 46: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 40 ✓ Reduced network operating expenses

✓ Lower capital expenditures

✓ Improved uptime and reliability for call center calls

✓ Secure connectivity for remote workers and home-based call center employees

Looking at a retailerA U.S.–based retail chain wanted to consolidate its voice man-agement into a centralized system while migrating from tradi-tional circuit-switched TDM to SIP Trunking for cost reduction purposes. Additionally, the retailer had some specific func-tionality and security requirements related to its business that required features not provided by all competing solutions.

The retailer’s needs included the following:

✓ Saving money with SIP Trunking

✓ A centralized policy and call routing control for all stores

✓ A rapid roll-out, with the ability to convert all stores to SIP Trunking within a few years

✓ Specialized routing for inbound IVR calls directed to its in-store pharmacies (specifically, the ability to provide dial tone to these calls)

✓ Data security restrictions related to its pharmacy business

✓ Maintaining security on all calls

With a Sonus SBC and a Sonus Policy Server, two data centers provided the centralized dial plan for all stores. The initial deployments leveraged Sonus to develop an installation plan, to perform configuration, and to develop and implement a test plan. The initial deployment was successfully defined, designed, tested, and implemented in just a few weeks.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 47: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 7

Ten Reasons to Choose Sonus SBC

In This Chapter▶ Performing under pressure

▶ Being protected from attack

▶ Attaining better scaling and deployment

W hether you have an enterprise Voice over Internet Protocol (VoIP) or Unified Communications (UC)

network or you’re a service provider offering VoIP or UC services to your customers, a session border controller (SBC) can be the right choice for you. The Sonus SBC is a fast-growing SBC solution on the market, and in this chapter, we provide ten reasons why a Sonus SBC may be the best fit for your network needs.

Local Policy ConfigurationSonus SBCs offer local policy control systems via an embedded policy engine. That means no extra management equipment to install and a system that has all the intelligence needed to screen, route, and modify calls right in the box.

Networked Policy ManagementWithout sending an expensive and already overworked technician out to each location to do the work, if your SBCs are connected to a centralized policy server, you only need

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 48: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 42to make your changes once in one place. The rest is all automatic. Oh yeah, and there’s less chance of a change not happening in one location when you do it this way.

Peak PerformanceThe simultaneous proliferation of applications and devices has led to a situation where the quantity of SIP traffic on any network is exploding — no matter how you measure it (more on that in Chapter 4). Sonus SBCs provide peak performance under different load scenarios. They’ve been tested under extreme conditions and even at levels that simulate a full-fledged network attack. Sonus SBCs are designed to have sufficient overhead to keep up.

Supports High-Level TranscodingBoth transcoding and transrating are computationally complex processes — imagine what it takes to completely disassemble and reassemble a voice or video stream in real-time without inducing noticeable latency or delay into the stream. Many first-generation SBCs don’t even include transcoding/rating functionality and not all that do can scale this feature for thousands of simultaneous sessions.

Sonus SBCs can support high levels of transcoding by using dedicated hardware without any effect on other computational functions, such as security and call admissions control — that the SBC must perform.

Security from AttacksSecuring the SIP network is an increasingly high priority for enterprises and service providers alike. Sonus SBCs are designed to

✓ Provide end-to-end encryption on both the media and the signaling components of network traffic.

✓ Hide the topology of the private portions of your network with B2BUA (see Chapter 2 for more on B2BUA).

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 49: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Chapter 7: Ten Reasons to Choose Sonus SBC 43 ✓ Protect the network from DoS and DDoS attacks, while

maintaining the capability to still connect legitimate sessions (DoS/DDoS attacks are covered in Chapter 1).

✓ Implement blacklists, greylists, and whitelists (these lists are covered in more detail in Chapter 2).

Advanced Media SupportToday’s SBCs need to be built with a robust media component that has both the computational horsepower and the appropriate software to perform on-the-fly the transcoding and transrating (see Chapter 3 for more detail) of all sorts of media. The trend in corporate networks is moving away from segregated voice, data, and video networks into a single network to handle all UC traffic. This convergence makes the SBC an important component to secure this network, provide Quality of Service (QoS) to ensure quality of the multimedia experience, and the necessary transcoding to interoperate on all of these data streams.

Sonus is future-ready today. Its SBCs have these capabilities currently available.

Optimized Customer FirmwareSonus takes advantage of commodity DSP chips and off-the-shelf components like the audio or video codec software itself and then does the harder work of developing the firmware that makes it all work. This work means big benefits for you because fixes (if needed) or upgrades can be implemented much faster. And if you have special circumstances in your VoIP network, you can look for custom firmware programming to make your network work for you.

Plays Well with OthersDifferent vendors and different VoIP networks may speak in slightly incompatible ways when they use Session Initiation Protocol (SIP), covered more in Chapter 1. The result can be calls that simply can’t be completed or are degraded in some way (perhaps missing some functionality). The SBC plays a huge role here in understanding the different variants of SIP on the market and can translate between them on the fly.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 50: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers

Session Border Controllers For Dummies, 3rd Sonus Special Edition 44Sonus SBCs adhere to industry standards for SIP Trunking and other applications and can support all known variants of SIP through SIP normalization — translating between different variants of SIP — both according to static rules set up in the SBC or on the fly as varieties of SIP are encountered by the SBC.

Scales without Impacting Performance

Sonus uses a three-dimensional approach by discretely sepa-rating the processing functionality of the SBC so individual tasks, such as transcoding or encryption, can scale up or down without impacting the performance of other SBC tasks.

Sonus divides the SBC processing into three categories:

✓ General computing for things like policy management and call control

✓ Network processing for networking stuff like the interwork-ings among different IP protocols and routing packets

✓ Media processing for things like transcoding and transrating (covered in Chapter 3)

With this approach, when certain functions in your VoIP network need more horsepower, you have it. But you don’t lose capacity in other areas that already have a comfortable degree of overhead.

The Software SBCIn 2013, Sonus introduced the industry’s first full-featured, software-based SBC that’s architected for unlimited scalability and offers the same advanced features as the Sonus SBC 5000 Series deployed on a virtualized platform. Sonus provides commercially-available software SBCs that have all the same features as a hardware-based SBC. The ability to scale from low-density deployments of less than 800 sessions to much denser deployments that are all provisioned via a software download is a key selling point for customers because of its easy of setup and configuration.

These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Page 51: These materials are © 2014 John Wiley & Sons, Inc. Any … · 2019-11-22 · 2 Session Border Controllers For Dummies, 3rd Sonus Special Edition About This Book Session Border Controllers