You are on page 1of 8

SIP TRUNKING THE ROUTE TO THE NEW VOIP SERVICES

Ivan Gaboli Virgilio Puglia

Italtel Italtel

ABSTRACT interoperability problems between different technologies


and vendors.
This work gives an overview of SIP-Trunking solution and This situation is similar to the ISUP solution in the
explains the existing difficulties in implementing VoIP beginning of 90’ [6]; but today there are a wide range of
services, when this architecture is deployed in multivendor players that develop VoIP products for business market like
environment. The causes of these problems are explained IP-PBXs and Corporate Switching Nodes (CSN). There are
with two existing approaches used by carrier to solve big vendors (like Alcatel-Lucent, Ericsson,…) as well as
interoperability: they are Full Jacket SIP-Trunk and small software houses that develops applications [7] on
Customized SIP-Trunk. A solution to cover the lackings of commercial hardware. This implementation simplicity
SIP standards is the introduction of a SIP adaptation device determines solutions based on different interpretation of
called “Inter-Domain Adaptation Device” which will SIP protocol, permitted by laxity of SIP standards, which
increase the potentiality of SIP-Trunking based solutions. leaves room for proprietary adjustments in features such as
It is also proposed a method for assessing the complexity of advanced calling features, security or QoS. Hence
different approaches to SIP-Trunking applications. compliance with SIP standards doesn’t guarantee seamless
communication between end-users that leverage on
Keywords — SIP-Trunking, T.38, MTP, SBC, PBX. different IP-PBX systems. The SIP-Forum [8] tries to solve
this problem with an architecture framework proposal
1. INTRODUCTION (SIPconnect) that define a minimal set of IETF and ITU-T
standards that must be supported and provides precise
There is an evident evolution of technology used by guidance in the areas where the standards leave multiple
Telecom Providers tending to migrate voice services from implementation options and specifies a minimal set of
traditional TDM networks to new VoIP networks, capabilities that should be supported by the SPs and
especially involving SIP-Trunking solutions. The number enterprise’s networks [9].
of this type of migrations is expected to grow dramatically Some vendors try to promote the sharing of knowledge and
at 106% Compound Annual Growth Rate (CAGR) in the experience through on-line community [10]. All this
next few years, to reach nearly 170000 in 2012 in West approaches demonstrate the existing difficulty in SIP-
Europe [1]. The main driver of this migration is reduction Trunking Architecture deployment, specifically in very
in capital expenditures (CAPEX) and decrease of the large and multi country scenarios; but new services and
operational expenditures (OPEX). But this migration voice traffic cost reduction push Large Enterprises to issue
determines also a slight quality of voice service reduction; Request For Quotation for SIP-Trunking solutions in order
depending on speech coder of VoIP the Mean Opinion to put in competition SPs and gain the best ROI (Return Of
Score (MOS) [2] may vary and usually is near to 4 [3] a bit Investment). So customers ask for quick deployment and
less than the traditional TDM fixed networks but similar to SPs must be able to respect customers requirements.
mobile users experience. This paper addresses some topics encountered during the
The technology change determines also migration problems implementation of complex systems integration projects
for already deployed services. If it’s problematic to implemented by Italtel for Large Enterprises and Service
implement consolidated services like analogical fax and Providers.
modem (see e.g. Sip-Forum that realizes a FoIP Task Group
[4],[5]), it’s also easy to understand how it’s difficult to 2. SIP STANDARDIZATION MODEL
deploy new services like IP Automated Trading Desk or
complex mandatory services like support for handicapped The SIP protocol is standardized by IETF Requests For
(bars brail, hearing, etc.). Comments (RFCs) developed in an open and communal
The introduction of new VoIP solutions at Enterprise level environment. To have the greatest possible consensus in
is a great opportunity to redesign and standardize services. committees and satisfy the largest number of participants,
SIP-Trunking makes possible to implement new services usually the RFC bloated in both size and flexibility. The
(like Presence, videoconference, telepresence, virtual-fax) specifications are full of weak terms like "May" and
accessible as “advanced communications as a service” and "Should" that allows the developers of SIP-based systems
that can change customer perception and improve to make plenty of “free decisions”. So two VoIP systems
productivity, collaboration and travels costs reduction. may be incompatible with each other while being both
Service Providers (SPs) can obtain savings in terms of compliant with specs; e.g. there are many standard ways to
CAPEX and OPEX, but this new solution introduces transport DTMF (Dual-tone multi-frequency) tones:

Paper accepted for presentation at the ITU-T " Beyond the Internet ? – Innovations for future networks and services"
Kaleidoscope 2010 Conference, Pune, India, http://itu-kaleidoscope.org/2010
defined combining a set of RFCs with appropriate policy
- RFC2833 [11]: specialized payload packets in the defined by the carrier.
RTP; Between the SSW-C5 and Private Domains there is a layer
- RFC4730 [12]: SIP-NOTIFY with XML docs; of Border-Elements (BE) that provide the following main
- SIP-INFO [13]: a SIP message with specific features:
payload.
 network topology hiding;
This approach is entirely different from ITU-T  application layer firewalling;
specifications that the Telecommunications Industry was  NAT-SIP aware.
regulated or standardized for the last four decades.
Hence the problem does not start with the technology, but These devices provides termination and reorigination of
with the approach in creating standards. both signaling and media between Public and Private
domain.
3. SIP BUSINESS TRUNKING ARCHITECTURAL
The CSN can be inserted in the architecture when the
MODEL
private VoIP network is very large and there are benefits
having a local session routing capabilities.
The SIP Business-Trunking reference architecture is a five
level hierarchical architecture divided into two domains:
The CSN provides the following main functionalities:
Public and Private.
The Public Domain has two levels represented by:  Corporate’s IP-PBX interconnection point;
 Centralized session routing;
- Class 5 softswitches (SSW-C5), that are the first  On-Net/Forced On-Net calls management;
level of the network model;  Corporate’s private numbering plan management;
- Network Border-Elements (second level) that is  signaling mediation between Corporate VoIP
the frontier of the public domain towards network and SP’s Business Trunking UNI;
customers.  private/public phone identity translation.

The Private Domain has three hierarchical levels: The CSN represents also the Network Element (NE) that
interconnects Application Server like: Fax-Server,
- Corporate Border-Element, the frontier towards Microsoft Office Communicator , Presence-Server, etc..
the public network; Lower the CSN there are multiple IP-PBX with attested IP-
- Corporate Switching Node (CSN); Phones.
- IP-PBXs. The described architecture can be declined in two different
ways depending on the treatment modality of the user-plane
NGN
SIP-I (RTP flow) that can be:

Class 5
ISUP  Fixed-Media modality;
Softswitch
PSTN/PLMN  Variable-Media modality.
Media

SIP
3.2 Fixed vs Variable media
Border Elements

Public Domain In the VoIP world the RTP stream (user-plane) typically is
Private Domain
BE BE peer-to-peer, this means that end-points negotiate end-to-
AS
end media informations and they are always involved in
CSN IP-PBX each media stream variation (e.g.: when an hold with music
IP-PBX IP-PBX
is invoked). The signaling passes end-to-end through al
network elements involved in the path. This type of user-
plane treatment is called Variable-Media. In the traditional
ISDN-PBX the media is anchored by the PBX itself that
Very Large Enterprise Medium/Large Enterprise
terminates BRA/PRA links and, when needed, perform
signaling and media loop splitting the call in two different
Figure 1: Network Architectural Model legs.
The SSW-C5 are generally connected northbound to the IP-PBX’s vendors have realized some dedicated elements
SP’s transit network (Class-4 Exchange) via ISUP or via that perform media anchoring and emulates traditional PBX
SIP-I/SIP-T whereas southbound SSW-C5 provides a SIP behavior called Fixed-Media; for example Cisco has MTP
User to Network Interface (UNI) that allows the end user (Media Termination Point) function [14] and Avaya has
access to the PSTN/PLMN; the Business-Trunking UNI is Prowler Cards [15].
The Fixed-Media architecture in IP-PBX dramatically Private Domain Public Domain

simplifies the interconnection with carriers via SIP- Custom ICT CSN SIP SIP SIP H.248 ISUP

IP Phone IPPBX CSN BE BE SSW-C5 MGW PSTN


Trunking because all the calling scenarios are reduced to a Skinny
ICT

“basic-call”; so the Fixed-Media Architecture is


1. INVITE (no SDP)

2. 100 Trying 3. INVITE (no SDP)


4. 100 Trying 5. INVITE (no SDP)
characterize by the presence of anchoring equipments. 6. 100 Trying
7. IAM
8. ACM
Unfortunately elements like MTP etc., increase costs 9. CRCX
(g711, g729, T.38)

without added value to the customer and in some cases 12. 180 ringing
11. 180 ringing
(g729, sendrcv)
10. OK (g729)

13. 180 ringing (g729, sendrcv)

creating limitations to the evolution of the services (for Skinny


ICT
(g729, sendrcv)

example they are not able to treat video); hence 14. PRACK
(g729) 15. PRACK
(g729) 16. PRACK

recommended choice is to adopt Variable-Media model. 18. 200 OK


(g729)
17. 200 OK

ICT 19. 200 OK

RTP RTP
RTP (Ring Back Tone)
15. ANM
3.4 SIP Business Trunking Benefits 21. 200 OK (g729)
20. 200 OK (g729)

22. 200 OK (g729)


ICT
Skinny
23. ACK (g729)
24. ACK (g729)

The SIP Business-Trunking allows to realize a centralized RTP RTP


25. ACK (g729)
RTP

dedicated telephony infrastructure at the enterprise’s


Figure 2: Call Setup in the reference architecture
premises that permits to conform services delivered to all
offices with the added value of customizing them to the
needs of the end users. The signalling model varies depending on whether you
choose the Fixed-Media or the Variable-Media modality;
A centralized platform management permits the control of
depending on the choice made for media we will speak
the delivered service’s quality (think of companies with so
respectively about:
many small/medium sites all around the world, where
telecommunication is a commodity).  ISDN-like SIP-trunk signalling model;
SIP also revolutionizes the way through which Enterprises  Pure SIP-trunk signalling model.
can realize interconnection with SPs; so it is possible to
concentrate the interconnection with the public network in a ISDN-like SIP-trunk model is not detailed in this paper
centralized point with a substantial saving of cost of because it does not give any added advantage as described
interconnection. in 3.2; so we will focus our attention on Pure SIP-trunk
Moreover the Large Enterprises can choose more than one model and we will introduce a newly proposed
SPs and can choose the trunk to be used depending on type Hierarchical SIP-model that maintains the flexibility of
of traffic (towards PLMN, PSTN, international…) and rate pure model and simplifies the interworking between
applied by the SP’s. different technologies.

4.1 Pure SIP trunk signaling model


4. SIP BUSINESS TRUNKING SIGNALING MODEL
In a pure SIP signaling model with variable media, it is
The setup of a voice call with SIP protocol is based on expected that messages originated in a corporate premise
signaling flow that allows the network to perform the will be propagated to other corporate premises involved in
session routing and the bearer capabilities are negotiated by the scenario. The following figure is an example of the
the endpoints through the offer/answer procedure as simplified signaling flow after a successful call setup, the
specified in the RFC3264 [16]. called user performs a blind call transfer towards a PSTN
number:
Referring to the SIP business trunking architectural model,
in the following figure an example of a VoIP signaling call
flow is depicted. The call is initiated by an IP-Phone IP Phone IP-PBX SBC SSW SBC IP PBX IP Phone Trunking
Gateway

directing towards PSTN, through a SIP-Trunk Setup


INVITE INVITE INVITE INVITE Setup
Answer
interconnection. The call is terminated by a SSW-C5 with 200 OK
ACK
200 OK
200 OK 200 OK

ACK

trunking gateway functionalities and redirected toward RTP


ACK ACK

PSTN. In the example is supposed that CSN use an Inter- INVITE (Hold) INVITE (Hold) INVITE (Hold)
INVITE (Hold)
Transfer

Cluster-Trunk protocol to dialog with corporate’s IP-PBXs


200 OK 200 OK
200 OK 200 OK
ACK ACK
ACK REFER
ACK
and the IP-PBXs use custom protocols versus controlled IP REFER
NFY (Trying)
REFER
NFY (Trying)
REFER

NFY (Trying) NFY (Trying)


Phones (e.g. Cisco Skinny Protocol). 200 OK
200 OK
200 OK 200 OK

INVITE
INVITE (*) IAM
ANM
200 OK
200 OK
ACK ACK
RTP

NFY (200 OK) NFY (200 OK) NFY (200 OK) NFY (200 OK)
200 OK 200 OK
200 OK
200 OK
BYE BYE BYE BYE
200 OK 200 OK
200 OK
200 OK

Figure 3: Call flow example (simplified without CSN)


The initial INVITE-200OK-ACK [23] exchange determines defined behavior on the UNI and guarantee SPs to maintain
the establishment of the call; after that the end-user the control on user’s operations.
performs a call transfer. The call transfer invoked by the
user of Enterprise-B, triggers a sequence of signaling that
cross all the network elements and impacts also the IP-PBX 5. GO TO MARKET APPROACH
of Enterprise-A (see REFER [17] in figure 3 that crosses all
the network).
Waiting for an efficient standardization of SIP, the SPs
The IP-PBX of Enterprise-A must be able to understand have two possibilities:
signaling and perform requested service; in this example it
must manage the REFER method and implement the call
transfer service. In the pure SIP signaling model the service  Full Jacket (FJ)
logic is distributed only between the two IP-PBX, whereas If the volume (number of enterprise customers) is
the SSW-C5 performs the routing functions. high, the SP can define some pre-packaged
This is a simplified approach but implies that all the IP- solutions. This approach is usually utilized by the
PBX are able to perform requested service logics and, when incumbent Carrier
a new behavior is introduced in the network by a new
element, all the interoperability tests must be performed to  Customer Tailored (CT)
be sure that no regression happened. In the figure’s The SP tries to satisfy all the customer’s requests
example there is also another point of attention (marked without imposing technical limitations or pre-
with *): in the signaling flow proposed by RFC5589 [18] a packaged service bundles
new INVITE is issued by transferee. The INVITE could not
be correctly associated to the call transfer service, so the 5.1 Full Jacket
transferee can be in the condition to be charged for the
entire leg of the call (from transferee to target). The The Full Jacket approach defines all the various equipments
transferor will not be charged for the second leg of the call and services that can be supported by the solution and
(and this can be not compliant with country charging combine them into bundles; each bundle is pre-certified and
requirements). By the way “plain” SIP networks are simpler can be sold as an out-of-the-shelf product. The SP sells to
than hierarchical one but the latter better fulfill SP’s the Enterprise all the necessary platform and terminals to
requirements like Call Detail Records generation (CDR), provide services. It’s more easy to propose a FJ bundle
(crucial for billing purposes) and SP’s UNI technical when the customer is a green field.
specifications. Each time it is required to introduce a new service and/or a
new device, it is necessary to update the bundle with
4.2 Hierarchical SIP signaling model dedicated study and test sessions.
The expected effort for this kind of activity can be
To establish successfully sessions between two users and to evaluated as a proportion of the possible combinations
manage the various scenarios that can happen during the between all the devices as show in the following formula:
call, it is important to consider and manage different
aspects such as: [1]
 Identity management & certification;
Where TF is the total number of functionalities that must be
 Voice-codec compatibility;
supported, NS is the number of Enterprises, is the
 DTMF interoperability; number of typology devices that are involved for the f
 Encryption; function on the enterprise i. The is the number of
 Fax support; typology devices that are involved for the f function on the
 CDR generation. enterprise j.
The effort to validate the solution is made at the first
implementation, with this approach we operate every time
The call-flow in figure 3 highlights how each new NE or
in a Homogeneous Domain (HoDo).
new service introduced in the network may have impacts
towards all other NEs present in the Public or Private
5.2 Customer Tailored
domains. The pure SIP signaling model has a big constraint
so in this period of standardization laxity it is better to
The Customer Tailored approach complies with all the
implement a hierarchical architecture where it is foreseen
requests of the customer case-by-case. This means that all
some harmonization functions that split various domains
the devices, terminals and services are selected by the
and simplify the interworking procedures.
Enterprise based on its commercial/technological
The harmonization function can be performed either in a requirements.
dedicated network element or embedded in the SSW-C5 or All the devices and terminals are customer ownership and
BE. The right choice depends on the specific characteristics usually are managed by the SP with a specific contract of
of the network; a hierarchical architecture allows adopting maintenance. The delivery effort depends on the typology
some specific rules on the SSW-C5 that force a well
and the number of devices involved, not only in current also possible to perform signaling normalization as
implementation, but also in the previous one. So from the described in 6.3. The anchoring point represents a unique
SP’s point of view the complexity increases with the interworking point for all other domains towards which the
increase of acquired customers. originating domain will be connected with.
The expected effort can be evaluated as indicate in the
formula [1]. No Media Anchoring
Media Anchoring

Each time a new Enterprise with different devices is added Class 5

to SP’s network, the effort put in solving the problems can Class 5 Softswitch
Softswitch
IDAD
be evaluate as show in the following formula:
BE BE

[2]
BE BE BE BE

Where is the number of typology devices involved in the IP-PBX IP-PBX IP-PBX IP-PBX

f function by the new enterprise. NS is the number of


already existing Enterprise. The and TF are the same of
formula [1]. With this approach we operate every time in a Enterprise A Enterprise B Enterprise A Enterprise B

Inhomogeneous Domain (InDo).


Usually an Enterprise which selects InDo has the trend to Figure 4: Media path with/without media anchoring
realize multi vendor domains in their premise, so the
interoperability problems start already at customer’s home. The singularities of the originating domain will be managed
by IDAD preserving other domains thus simplifying
interoperability. The Media Anchoring is also an
6. RECONCILATION BETWEEN THE opportunity to be able to complete successfully a session
APPROACHES between two domains with no common shared codec
(IDAD intercepts the RTP and performs the required media
Both approaches (FJ and CT) can have serious transformation).
compatibility problems with the volumes expected in the
next three years in the SIP business trunk market. 6.2 Dynamic Audio/Video transcoding
Each SP will have a complex InDo, composed by islands of
HoDo; there is a concrete risk to have an unmanageable During the SIP session setup it is performed the
network with exponential growth of OPEX. We propose to offer/answer procedure [16] that is used by user agents
adopt the SIP Business Trunking and signaling architectural (UA) to agree codecs that must be used for communication.
model (cfr. 3, 4.2) with a new network function (or If the two parties don’t have a common audio/video codec,
element) denominated Inter-Domain Adaptation Device the negotiation will fail unless IDAD intercept the codec
(IDAD) which understands simultaneously all the mismatch and engage transcoding resources. Depending on
“standard” SIP-messages and call flows and can harmonize the session setup scenario the IDAD can decide to book
them. transcoding resources based on one of the following events:
The IDAD perform the following main functionalities:
 The originating domain presents a set of codecs
insufficient for the destination domain (based on
 Media Anchoring;
provisioning information);
 Dynamic Audio/Video transcoding;
 Signaling decoupling & normalization;  Catching an error response received by destination
UA.
 Interdomain features harmonization;
 Session Admission Control;
 Fax adaptation; In the first case the IDAD enriches the codec bouquet with
 DTMF interworking; all codecs defined by provisioning information and, if the
 Encryption termination. answer will select a codec that the origin domain doesn’t
support, IDAD will perform requested transcoding.
Italtel has developed a feature called Media Termination In the second case when IDAD reveals an error message for
Function (MTF) on board of its own Softswitch (i-SSW codec mismatch, it will issue a new INVITE with an SDP
[19]) that performs some of IDAD’s functionalities. with all codecs supported by IDAD and performs requested
transcoding.
6.1 Media Anchoring An alternative to perform a provisioning of codecs
supported by various domains can be represented by the
In a standard SIP session the RTP flow goes peer-to-peer; auto-learning feature of IDAD that will learn dynamically
Media Anchoring feature allows IDAD to anchor the media (based on error messages revealed during session
stream splitting the RTP flow in two segments and to instauration) the set of supported codecs by various
monitor both session’s user and control plane and perform domains and it applies resource reservation and transcoding
transcoding if necessary. The usage of this feature makes following self-learned rules.
6.3 Signaling decoupling & normalization But a well designed access can also go in defect for some
rare events when the profile of traffic heavily violates the
The IDAD, in combination with SSW-C5, performs a traffic model considered in design phase.
decoupling of the signaling among domains terminating and The Session Admission Control performed by IDAD allows
re-originating SIP session in a Back-to-Back logic. This to monitor the saturation of available bandwidth; IDAD per
behavior allows IDAD to perform a normalization of each access considers the used codec and the bandwidth
headers used/expected from/by various domains. A typical occupation. When the amount of occupied bandwidth
example: SIP Diversion Header [20] and History Info surpasses a specific percentage threshold new sessions
Header [21], both permitted by standards to indicate in request will no more be authorized for the specific access.
which point a session has suffered a transfer. IDAD The IDAD can also differentiate the admission policy
performs requested adaptation to make different “SIP- depending on the codec used, so for example video can be
dialects” compatible by different IP-PBX vendors. allowed only when e specific percentage of bandwidth is
available or for a limited number of sessions.

6.4 Interdomain features harmonization


6.6 Fax Adaptation
Some features or methods not declared mandatory by
standards, can create interworking problems between IP- In the IP world there are two common ways to transmit fax:
PBX of different vendors; for example some domains are
using UPDATE method [22] while others do not support it  Fax Passthrough (G.711 clear channel);
or direct fax session setup with Fax Relay (T.38). The  Fax Relay (T.38).
IDAD performs the interdomain harmonization by
interpreting and filtering the particular features used by a This two methods are incompatible with each other; the
specific domain and spreading only basic and more best practice is to use T.38 which is more reliable, but
common procedures towards others domains. sometimes T.38 cannot be used. So in the real world a SP
For example a fax call that starts directly in T.38 (without a can have domains that use T.38 (with no fallback to G.711
previous establishment of a session that uses a voice codec) capability) and others that support only Fax Passthrough.
the IDAD can emulate towards called domain a more In this case IDAD is able to detect the incompatibility of
widespread behavior that consists in setting up as first step fax codecs during the session setup phase and perform the
a G.711 session and try later to negotiate a T.38 fax relay necessary transcoding operations and signaling adaptation
codec; in this way the percentage of a successful session to have a successful fax transmission.
setup is higher and the fallback to fax pass-through mode is
guaranteed.
6.7 DTMF in-band/out-of-band transformation
IDAD
IP Phone A
Setup
IP-PBX SBC
SSW
SBC IP PBX IP Phone B Trunking
Gateway Once the session is established it’s possible for user agents
INVITE INVITE
INVITE INVITE
200 OK
Setup
Answer
to exchange DTMF end-to-end. DTMF can be transmitted
200 OK
200 OK
ACK
200 OK

ACK
ACK
in two different modalities:
ACK
RTP IP Phone B RTP
Transfer
INVITE (Hold)
INVITE (Hold)


RTP Hold Tone
INVITE (Hold)
200 OK 200 OK 200 OK
ACK
In Band
ACK
ACK REFER
REFER
NFY (Trying) NFY (Trying)
The digit is transmitted in the media flow marking
200 OK 200 OK

(New CDR) IAM in a particular way an RTP packet following


ANM
INVITE (MG)
200 OK RFC2833[11] ;
ACK


RTP Trunking Gateway RTP
Out-of-band
NFY (200 OK) NFY (200 OK)
200 OK 200 OK
The digit is transmitted following the signaling
BYE

200 OK
BYE
200 OK path using:
o SIP-INFO Method
o KPML (RFC4730 [12])
SIP-INFO is more widely supported although less
Figure 5: Signalling harmonization well standardized.

6.5 Session Admission Control


In this heterogeneous DTMF transmission modes present
today, the IDAD presence in the network resolves DTMF
The access bandwidth (data link between enterprise and SP) exchanging problems performing transformation among
is a parameter subject to the contract’s Service Level various methods.
Agreement negotiated between SP and Enterprise; so the
amount of access bandwidth should be determined as the
trade-off between traffic expected and bandwidth’s cost.
Class 5
[4]
Softswitch

IDAD
Where is the number of typology devices that are
INFO (DTMF2) RTP Packet DTMF 2
RFC 2833
involved for the f function on the added enterprise.
The effort without IDAD is significantly major than with
BE/C-BE BE/C-BE

DTMF
IDAD as showed by the following formula:
DTMF In-Band
Out-of-Band INFO (DTMF2)

[5]

UII DTMF 2
7. DISCUSSIONS AND CONCLUSIONS

The objective of this paper was to provide an overview of


Figure 6: DTMF transformation SIP-Trunking solution, their state of art and show the
tendencies of their development. Some problems that
Based on the domains’ characteristics IDAD decides when impact on the services were analyzed. We strongly believe
it is necessary anchor the media flow and to perform DTMF the most likely evolution of VoIP will be SIP-Trunking,
transformation ensuring interoperability. that will permit the creation of new services for end users.
But both models used today by Carrier (FJ and CT) may
have serious compatibility problems with the market
6.8 Encryption termination
volumes expected in the next years.
The strengthening of the standards is the main way to go
There are some enterprises which request to have the voice forward for multi-vendor interoperable solutions, but we
encryption. Typically this kind of requirement can be must also consider the market presence of many small-
satisfied inside the customer premises but sometimes this medium players coming onto the world of
requirement exists also between different enterprises that telecommunications with the advent of VoIP.
belongs to the same group.
These players prefer the development of products/services
It is difficult for SP’s to provide encryption in this enlarged that are partially compliant with product of other vendors,
scenario with different methods of encryption used in but meet the needs and timing of the market. It is difficult
different domains, non sharing of key/certificate between that these players will waiting for standard’s maturity.
different organizations, obligation to be able to apply lawful
For these reasons in this study we have proposed a solution
interception.
(IDAD) to cover the lapses/lackings of SIP standard,
The IDAD allows SPs to offer encryption of voice flow without limiting the network flexibility. We hope this study
between different enterprises maintaining the capability to will serve as a stimulus for improve the SIP standardization
intercept the voice stream if requested by the authorities; and for further research in above-mentioned subject area.
indeed IDAD can anchor the user-plane and perform the
required decryption/encryption process.
REFERENCES
6.9 Simplification of the complexity
[1] Salmeron, “Western European SIP-Trunking Market,
The deployment of a new technology domain implies a 2007-2012”, Decembre 2008, IDC #WS06Q, volume:1;
[2] ITU-T Recommendation P.800 Methods for subjective
campaign of certification tests that covers all possible
determination of transmission quality;
combinations between different technologies for their [3] D.Collins, “Carrier Grade Voice Over IP”,McGraw-Hill;
interworking because of weak standardization of SIP- [4] SIP Forum – Fax_Over_IP_Task_Group – Problem
Trunk interface. Statement – V1.0;
With the introduction of IDAD platform, the expected [5] SIP Forum – Fax_Over_IP_Task_Group – Addressing
effort to insert a new HoDo, will be proportional to the the Identified Problems;
possible combinations between all the devices and the [6] Cazzaniga,Garavelli, ”Implementation of SS7: Italtel's
IDAD. See the following formula: experience”,ieee, jul.1990,vol.28;
[7] http://www.asterisk.org/;
[8] http://www.sipforum.org/;
[3] [9] SIPconnect Whitepaper, ”The SIPconnect Technical
Recommendation ”,rev1;
[10] http://www.siptrunk.org/;
Where NHoDo is the number of Enterprise in the new [11] H.Schulzrinne,S.Petrack, RFC2833, “RTP Payload for
HoDo. The TF and are the same of formula [1]. DTMF Digits, Telephony Tones and Telephony
For example when a new island HoDo, realized by a single Signals”;
[12] E.Burger,M.Dolly, RFC4730, “A Session Initiation
enterprise, is inserted, the effort can be evaluate as show in
Protocol (SIP) Event Package for Key Press Stimulus
the following formula: (KPML)”;
[13] S.Donovan, RFC2976, “The SIP INFO method”;
[14] http://www.cisco.com/en/US/docs/voice_ip_comm/cuc
m/admin/3_1_1/ccmsys/a05mtp.html#wp1030050;
[15] http://www.avaya.com/rt/master-usa/en-
us/resource/assets/applicationnotes/gateway.pdf;
[16] J.Rosenberg,H.Schulzrinne, RFC3264 “An
Offer/Answer Model with the Session Description
Protocol (SDP)”;
[17] R.Sparks, RFC3515, “The Session Initiation Protocol
(SIP) Refer Method”;
[18] R.Sparks,A.Johnston,D.Petrie, RFC5589 ” Session
Initiation Protocol (SIP) Call Control–Transfer”;
[19] http://www.italtel.com/allegati/2Solutions-
products/products/
[20] S.Levy, Internet Draft, “Diversion Indication in SIP
draft-levy-SIP-diversion-11”;
[21] M.Barnes, RFC4244, “An extension to SIP for request
history information”;
[22] J.Rosenberg, RFC3311, “The Session Initiation Protocol
(SIP) UPDATE Method”;
[23] J.Rosenberg,H.Schulzrinne,G.Camarillo, RFC3261
“SIP: Session Initiation Protocol”;

You might also like