Jump to content

Session border controller: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Citation bot (talk | contribs)
m Alter: isbn. | You can use this bot yourself. Report bugs here. | User-activated.
m Citation added for introductory paragraph
 
(36 intermediate revisions by 25 users not shown)
Line 1: Line 1:
{{short description|Network device deployed in VoIP networks}}
{{refimprove|date=January 2018}}
{{refimprove|date=January 2018}}
A '''Session Border Controller''' ('''SBC''') is a network element deployed to protect [[Session Initiation Protocol|SIP]] based [[Voice over Internet Protocol]] (VoIP) networks.
A '''session border controller''' ('''SBC''') is a network element deployed to protect [[Session Initiation Protocol|SIP]] based [[voice over Internet Protocol]] (VoIP) networks.<ref>{{Cite web |title=What is a Session Border Controller (SBC)? {{!}} Ribbon Communications |url=https://ribboncommunications.com/company/get-help/glossary/session-border-controller-sbc |access-date=2024-10-19 |website=ribboncommunications.com |language=en}}</ref>


Early deployments of SBCs were focused on the borders between two service provider networks in a peering environment. This role has now expanded to include significant deployments between a service provider's access network and a backbone network to provide service to residential and/or enterprise customers.<ref name=Hautakorpi/>
Early deployments of SBCs were focused on the borders between two service provider networks in a peering environment. This role has now expanded to include significant deployments between a service provider's access network and a backbone network to provide service to residential and/or enterprise customers.<ref name=Hautakorpi/>


The term "session" refers to a communication between two parties – in the context of telephony, this would be a call. Each call consists of one or more call signaling message exchanges that control the call, and one or more call media streams which carry the call's audio, video, or other data along with information of call statistics and quality. Together, these streams make up a session. It is the job of a session border controller to exert influence over the data flows of sessions.
The term "session" refers to a communication between two or more parties – in the context of telephony, this would be a call. Each call consists of one or more call signaling message exchanges that control the call, and one or more call media streams which carry the call's audio, video, or other data along with information of call statistics and quality. Together, these streams make up a session. It is the job of a session border controller to exert influence over the data flows of sessions.


The term "border" refers to a point of demarcation between one part of a network and another. As a simple example, at the edge of a corporate network, a firewall demarcates the local network (inside the corporation) from the rest of the Internet (outside the corporation). A more complex example is that of a large corporation where different departments have security needs for each location and perhaps for each kind of data. In this case, filtering routers or other network elements are used to control the flow of data streams. It is the job of a session border controller to assist policy administrators in managing the flow of session data across these borders.
The term "border" refers to a point of demarcation between one part of a network and another. As a simple example, at the edge of a corporate network, a firewall demarcates the local network (inside the corporation) from the rest of the Internet (outside the corporation). A more complex example is that of a large corporation where different departments have security needs for each location and perhaps for each kind of data. In this case, filtering routers or other network elements are used to control the flow of data streams. It is the job of a session border controller to assist policy administrators in managing the flow of session data across these borders.
Line 11: Line 12:


== Functions ==
== Functions ==
SBCs commonly maintain full session state and offer the following functions:
SBCs commonly maintain full session [[State (computer science)|state]] and offer the following functions:
* [[Network security|Security]] – protect the network and other devices from:
* [[Network security|Security]] – protect the network and other devices from:
** Malicious attacks such as a [[denial-of-service attack]] (DoS) or distributed DoS
** Malicious attacks such as a [[denial-of-service attack]] (DoS) or distributed DoS
Line 33: Line 34:
** [[lawful interception]]
** [[lawful interception]]
* Media services – many of the new generation of SBCs also provide built-in digital signal processors (DSPs) to enable them to offer border-based media control and services such as:
* Media services – many of the new generation of SBCs also provide built-in digital signal processors (DSPs) to enable them to offer border-based media control and services such as:
** DTMF relay and interworking
** [[Dual-tone multi-frequency signaling|DTMF]] relay and interworking
** Media transcoding
** Media transcoding
** Tones and announcements
** Tones and announcements
Line 40: Line 41:
* Statistics and billing information – since all sessions that pass through the edge of the network pass through the SBC, it is a natural point to gather statistics and usage-based information on these sessions.
* Statistics and billing information – since all sessions that pass through the edge of the network pass through the SBC, it is a natural point to gather statistics and usage-based information on these sessions.


With the advent of [[WebRTC]] some SBCs have also assumed the role of SIP to [[WebRTC Gateway]] and translate SIP. While no one signalling protocol is mandated by the WebRTC specifications,<ref>[http://blogs.trilogy-lte.com/post/77427158750/how-webrtc-is-revolutionizing-telephony How WebRTC Is Revolutionizing Telephony]. Blogs.trilogy-lte.com (2014-02-21). Retrieved on 2014-04-11.</ref> [[Session Initiation Protocol|SIP]] over [[Websockets]] (RFC 7118) is often used partially due to the applicability of SIP to most of the envisaged communication scenarios as well as the availability of open source software such as [[JsSIP]]. In such a case the SBC acts as a gateway between the WebRTC applications and SIP end points.
With the advent of [[WebRTC]] some SBCs have also assumed the role of SIP to [[WebRTC Gateway]] and translate SIP. While no one signalling protocol is mandated by the WebRTC specifications,<ref>[http://blogs.trilogy-lte.com/post/77427158750/how-webrtc-is-revolutionizing-telephony How WebRTC Is Revolutionizing Telephony]. Blogs.trilogy-lte.com (2014-02-21). Retrieved on 2014-04-11.</ref> [[Session Initiation Protocol|SIP]] over [[WebSocket]]s (RFC 7118) is often used partially due to the applicability of SIP to most of the envisaged communication scenarios as well as the availability of open source software such as [[JsSIP]]. In such a case the SBC acts as a gateway between the WebRTC applications and SIP end points.


==Applications==
==Applications==
Line 49: Line 50:
In other cases, the SBC simply modifies the stream of call control (signaling) data involved in each call, perhaps limiting the kinds of calls that can be conducted, changing the [[codec]] choices, and so on. Ultimately, SBCs allow the network operators to manage the calls that are made on their networks, fix or change protocols and protocol syntax to achieve interoperability, and also overcome some of the problems that firewalls and [[network address translator]]s (NATs) present for VoIP calls.
In other cases, the SBC simply modifies the stream of call control (signaling) data involved in each call, perhaps limiting the kinds of calls that can be conducted, changing the [[codec]] choices, and so on. Ultimately, SBCs allow the network operators to manage the calls that are made on their networks, fix or change protocols and protocol syntax to achieve interoperability, and also overcome some of the problems that firewalls and [[network address translator]]s (NATs) present for VoIP calls.


To show the operation of an SBC, one can compare a simple call establishment sequence with a call establishment sequence with an SBC.<ref>{{cite web|title=Understanding Session Border Controllers|url=http://www.frafos.com/wp-content/uploads/2012/10/FRAFOS_Underdstanding_SBC.pdf|work=FRAFOS GmbH}}</ref> In the simplest session establishment sequence with only one proxy between the user agents the proxy’s task is to identify the callee’s location and forward the request to it. The proxy also adds a Via header with its own address to indicate the path that the response should traverse. The proxy does not change any dialog identification information present in the message such as the tag in the From header, the Call-Id or the Cseq. Proxies also do not alter any information in the SIP message bodies. Note that during the session initiation phase the user agents exchange SIP messages with the SDP bodies that include addresses at which the agents expect the media traffic. After successfully finishing the session initiation phase the user agents can exchange the media traffic directly between each other without the involvement of the proxy.
To show the operation of an SBC, one can compare a simple call establishment sequence with a call establishment sequence with an SBC.<ref>{{cite web|title=Understanding Session Border Controllers|url=https://www.frafos.com/_files/ugd/62f5a3_55d0ca5e63ac416e8eee2205c994b57d.pdf|work=FRAFOS GmbH}}</ref> In the simplest session establishment sequence with only one proxy between the user agents the proxy’s task is to identify the callee’s location and forward the request to it. The proxy also adds a Via header with its own address to indicate the path that the response should traverse. The proxy does not change any dialog identification information present in the message such as the tag in the From header, the Call-Id or the Cseq. Proxies also do not alter any information in the SIP message bodies. Note that during the session initiation phase the user agents exchange SIP messages with the SDP bodies that include addresses at which the agents expect the media traffic. After successfully finishing the session initiation phase the user agents can exchange the media traffic directly between each other without the involvement of the proxy.


SBCs are designed for many applications and are used by operators and enterprises to achieve a variety of goals. Even the same SBC implementation might act differently depending on its configuration and the use case. Hence, it is not easily possible to describe an exact SBC behavior that would apply to all SBC implementations. In general it is possible to identify certain features that are common to SBCs. For example, most SBCs are implemented as back-to-back user agent.
SBCs are designed for many applications and are used by operators and enterprises to achieve a variety of goals. Even the same SBC implementation might act differently depending on its configuration and the use case. Hence, it is not easily possible to describe an exact SBC behavior that would apply to all SBC implementations. In general it is possible to identify certain features that are common to SBCs. For example, most SBCs are implemented as back-to-back user agent.
Line 55: Line 56:


When an SBC is included in the call path, the SBC acts as a B2BUA that behaves as a user agent server towards the caller and as user agent client towards the callee. In this sense, the SBC actually terminates that call that was generated by the caller and starts a new call towards the callee. The INVITE message sent by the SBC contains no longer a clear reference to the caller. The INVITE sent by the SBC to the proxy includes Via and Contact headers that point to the SBC itself and not the caller. SBCs often also manipulate the dialog identification information listed in the Call-Id and From tag. Further, in case the SBC is configured to also control the media traffic then the SBC also changes the media addressing information included in the c and m lines of the SDP body. Thereby, not only will all SIP messages traverse the SBC but also all audio and video packets. As the INVITE sent by the SBC establishes a new dialog, the SBC also manipulates the message sequence number (CSeq) as well the Max-Forwards value.
When an SBC is included in the call path, the SBC acts as a B2BUA that behaves as a user agent server towards the caller and as user agent client towards the callee. In this sense, the SBC actually terminates that call that was generated by the caller and starts a new call towards the callee. The INVITE message sent by the SBC contains no longer a clear reference to the caller. The INVITE sent by the SBC to the proxy includes Via and Contact headers that point to the SBC itself and not the caller. SBCs often also manipulate the dialog identification information listed in the Call-Id and From tag. Further, in case the SBC is configured to also control the media traffic then the SBC also changes the media addressing information included in the c and m lines of the SDP body. Thereby, not only will all SIP messages traverse the SBC but also all audio and video packets. As the INVITE sent by the SBC establishes a new dialog, the SBC also manipulates the message sequence number (CSeq) as well the Max-Forwards value.
Note that the list of header manipulations listed here is only a subset of the possible changes that an SBC might introduce to a SIP message. Furthermore, some SBCs might not do all of the listed manipulations. If the SBC is not expected to control the media traffic then there might be no need to change anything in the SDP header. Some SBCs do not change the dialog identification information and others might even not change the addressing information.
Note that the list of header manipulations listed here is only a subset of the possible changes that an SBC might introduce to a SIP message. Furthermore, some SBCs might not do all of the listed manipulations. If the SBC is not expected to control the media traffic then there might be no need to change anything in the SDP body. Some SBCs do not change the dialog identification information and others might even not change the addressing information.


SBCs are often used by corporations along with [[Firewall (networking)|firewalls]] and [[intrusion prevention system]]s (IPS) to enable VoIP calls to and from a protected enterprise network. VoIP service providers use SBCs to allow the use of VoIP protocols from private networks with [[Internet]] connections using NAT, and also to implement strong security measures that are necessary to maintain a high quality of service. SBCs also replace the function of [[application-level gateway]]s.<ref name=Sinnreich/> In larger enterprises, SBCs can also be used in conjunction with SIP trunks to provide call control and make routing/policy decisions on how calls are routed through the LAN/WAN. There are often tremendous cost savings associated with routing traffic through the internal IP networks of an enterprise, rather than routing calls through a traditional circuit-switched phone network.
SBCs are often used by corporations along with [[Firewall (networking)|firewalls]] and [[intrusion prevention system]]s (IPS) to enable VoIP calls to and from a protected enterprise network. VoIP service providers use SBCs to allow the use of VoIP protocols from private networks with [[Internet]] connections using NAT, and also to implement strong security measures that are necessary to maintain a high quality of service. SBCs also replace the function of [[application-level gateway]]s.<ref name=Sinnreich/> In larger enterprises, SBCs can also be used in conjunction with SIP trunks to provide call control and make routing/policy decisions on how calls are routed through the LAN/WAN. There are often tremendous cost savings associated with routing traffic through the internal IP networks of an enterprise, rather than routing calls through a traditional circuit-switched phone network.
Line 63: Line 64:
From an [[IP Multimedia Subsystem]] (IMS) or 3GPP ([[3rd Generation Partnership Project]]) architecture perspective, the SBC is the integration of the [[P-CSCF]] and IMS-[[Application-level gateway|ALG]] at the signaling plane and the IMS Access Gateway at the media plane on the access side. On the interconnect side, the SBC maps to the IBCF, [[Inter-working Function|IWF]] at the signaling plane and [[TrGW]] (Transition Gateway) at the media plane.
From an [[IP Multimedia Subsystem]] (IMS) or 3GPP ([[3rd Generation Partnership Project]]) architecture perspective, the SBC is the integration of the [[P-CSCF]] and IMS-[[Application-level gateway|ALG]] at the signaling plane and the IMS Access Gateway at the media plane on the access side. On the interconnect side, the SBC maps to the IBCF, [[Inter-working Function|IWF]] at the signaling plane and [[TrGW]] (Transition Gateway) at the media plane.


From an IMS/[[TISPAN]] architecture perspective, the SBC is the integration of the P-[[IP Multimedia Subsystem#CSCF .E2.80.93 Call Session Control Function|CSCF]] and [[C-BGF]] functions on the access side, and the IBCF, IWF, [[Topology Hiding Inter-network Gateway|THIG]], and [[I-BGF]] functions on the peering side. Some SBCs can be "decomposed", meaning the signaling functions can be located on a separate hardware platform than the media relay functions – in other words the P-CSCF can be separated from the C-BGF, or the IBCF/IWF can be separated from the I-BGF functions physically. Standards-based protocol, such as the H.248 Ia profile, can be used by the signaling platform to control the media one while a few SBCs use proprietary protocols.
From an IMS/[[TISPAN]] architecture perspective, the SBC is the integration of the P-[[IP Multimedia Subsystem#Call Session Control Function (CSCF)|CSCF]] and [[C-BGF]] functions on the access side, and the IBCF, IWF, [[Topology Hiding Inter-network Gateway|THIG]], and [[I-BGF]] functions on the peering side. Some SBCs can be "decomposed", meaning the signaling functions can be located on a separate hardware platform than the media relay functions – in other words the P-CSCF can be separated from the C-BGF, or the IBCF/IWF can be separated from the I-BGF functions physically. Standards-based protocol, such as the H.248 Ia profile, can be used by the signaling platform to control the media one while a few SBCs use proprietary protocols.


==Controversy==
==Controversy==
{{unref|section|date=November 2018}}
{{unref|section|date=November 2018}}
During its infancy, the concept of SBC was controversial to proponents of end-to-end systems and [[peer-to-peer]] networking because:
During its infancy, the concept of SBC was controversial to proponents of [[End-to-end principle|end-to-end]] systems and [[peer-to-peer]] networking because:
* SBCs can extend the length of the media path (the way of media packets through the network) significantly. A long media path is undesirable, as it increases the delay of voice packets and the probability of packet loss. Both effects deteriorate the voice/video quality. However, many times there are obstacles to communication such as firewalls between the call parties, and in these cases SBCs offer an efficient method to guide media streams towards an acceptable path between caller and callee; without the SBC the call media would be blocked. Some SBCs can detect if the ends of the call are in the same [[subnetwork]] and release control of the media enabling it to flow directly between the clients, this is [[anti-tromboning]] or media release. Also, some SBCs can create a media path where none would otherwise be allowed to exist (by virtue of various firewalls and other security apparatus between the two endpoints). Lastly, for specific VoIP network models where the service provider owns the network, SBCs can actually decrease the media path by shortcut routing approaches. For example, a service provider that provides trunking services to several enterprises would usually allocate each enterprise a VPN. It is often desirable to have the option to interconnect the VPN through SBCs. A VPN-aware SBC may perform this function at the edge of the VPN network, rather than sending all the traffic to the core.
* SBCs can extend the length of the media path (the way of media packets through the network) significantly. A long media path is undesirable, as it increases the delay of voice packets and the probability of packet loss. Both effects deteriorate the voice/video quality. However, many times there are obstacles to communication such as firewalls between the call parties, and in these cases SBCs offer an efficient method to guide media streams towards an acceptable path between caller and callee; without the SBC the call media would be blocked. Some SBCs can detect if the ends of the call are in the same [[subnetwork]] and release control of the media enabling it to flow directly between the clients, this is [[anti-tromboning]] or media release. Also, some SBCs can create a media path where none would otherwise be allowed to exist (by virtue of various firewalls and other security apparatus between the two endpoints). Lastly, for specific VoIP network models where the service provider owns the network, SBCs can actually decrease the media path by shortcut routing approaches. For example, a service provider that provides trunking services to several enterprises would usually allocate each enterprise a VPN. It is often desirable to have the option to interconnect the VPN through SBCs. A VPN-aware SBC may perform this function at the edge of the VPN network, rather than sending all the traffic to the core.
* SBCs has the potential to restrict the flow of information between call endpoints, restricting end-to-end transparency. VoIP phones may not be able to use new protocol features unless they are understood by the SBC. However, the SBCs are usually able to cope with the majority of new, and unanticipated protocol features.
* SBCs can restrict the flow of information between call endpoints, potentially reducing end-to-end transparency. VoIP phones may not be able to use new protocol features unless they are understood by the SBC. However, the SBCs are usually able to cope with the majority of new, and unanticipated protocol features.
* Sometimes End-to-End [[encryption]] can't be used if the SBC does not have the key, although some portions of the information stream in an encrypted call are not encrypted, and those portions can be used and influenced by the SBC. However, the new generations of SBCs, armed with sufficient computing capacity, are able to offload this encryption function from other elements in the network by terminating SIP-[[Transport Layer Security|TLS]], [[IPsec]], and/or [[Secure Real-time Transport Protocol|SRTP]]. Furthermore, SBCs can actually make calls and other SIP scenarios work when they couldn't have before, by performing specific protocol "normalization" or "fix-up".
* Sometimes [[end-to-end encryption]] can't be used if the SBC does not have the key, although some portions of the information stream in an encrypted call are not encrypted, and those portions can be used and influenced by the SBC. However, the new generations of SBCs, armed with sufficient computing capacity, are able to offload this encryption function from other elements in the network by terminating SIP-[[Transport Layer Security|TLS]], [[IPsec]], and/or [[Secure Real-time Transport Protocol|SRTP]]. Furthermore, SBCs can actually make calls and other SIP scenarios work when they couldn't have before, by performing specific protocol "normalization" or "fix-up".
* In most cases, far-end or hosted [[NAT traversal]] can be done without SBCs if the VoIP phones support protocols like [[STUN]], [[Traversal Using Relay NAT|TURN]], [[Interactive Connectivity Establishment|ICE]], or [[Universal Plug and Play]] (UPnP).
* In most cases, far-end or hosted [[NAT traversal]] can be done without SBCs if the VoIP phones support protocols like [[STUN]], [[Traversal Using Relay NAT|TURN]], [[Interactive Connectivity Establishment|ICE]], or [[Universal Plug and Play]] (UPnP).


Most of the controversy surrounding SBCs pertains to whether call control should remain solely with the two endpoints in a call (in service to their owners), or should rather be shared with other network elements owned by the organizations managing various networks involved in connecting the two call endpoints. For example, should call control remain with [[Alice and Bob]] (two callers), or should call control be shared with the operators of all the IP networks involved in connecting Alice and Bob's VoIP phones together. The debate of this point was vigorous, almost religious, in nature. Those who wanted unfettered control in the endpoints only, were also greatly frustrated by the various realities of modern networks, such as firewalls and filtering/throttling. On the other side, network operators are typically concerned about overall network performance, interoperability and quality, and want to ensure it is secure.
Most of the controversy surrounding SBCs pertains to whether call control should remain solely with the two endpoints in a call (in service to their owners), or should rather be shared with other network elements owned by the organizations managing various networks involved in connecting the two call endpoints. For example, should call control remain with [[Alice and Bob]] (two callers), or should call control be shared with the operators of all the IP networks involved in connecting Alice and Bob's VoIP phones together. The debate of this point was vigorous, almost religious, in nature. Those who wanted unfettered control in the endpoints only, were also greatly frustrated by the various realities of modern networks, such as firewalls and filtering/throttling. On the other side, network operators are typically concerned about overall network performance, interoperability and quality, and want to ensure it is secure.


==Lawful intercept and CALEA==
==Lawful intercept and CALEA==
An SBC may provide session media (usually [[Real-time Transport Protocol|RTP]]) and signaling (often SIP) [[wiretap]] services, which can be used by providers to enforce requests for the [[lawful interception]] of network sessions. Standards for the interception of such services are provided by [[Alliance for Telecommunications Industry Solutions|ATIS]], [[Telecommunications Industry Association|TIA]], [[CableLabs]] and [[European Telecommunications Standards Institute|ETSI]], among others.


{{Globalize section|date=October 2023}}
==History and market==
The history of SBCs shows that several corporations were involved in creating and popularizing the SBC market segment for carriers and enterprises. The original carrier-oriented SBC companies are (or were, since several have been acquired or are defunct): [[Acme Packet]] (acquired in 2013 by [[Oracle Corporation]]), [[Cisco Systems]], Kagoor Networks (acquired in 2005 by [[Juniper Networks]] now offering a router-integrated solution), [[Jasomi Networks]] (acquired in 2005 by Ditech Communications, now known as Ditech Networks), Netrake (acquired in 2006 by Audiocodes<ref name=AUDIOCODES/>), [[Newport Networks]] (now out of business), [[NexTone]] (first merged with Reef Point to form Nextpoint, and later purchased by [[Genband]]), Aravox (acquired in 2003 by [[Alcatel-Lucent|Alcatel]] and terminated) and Emergent Network Solutions (acquired in 2006 by [[Stratus Technologies]] and in 2009 spun off as Stratus Telecommunications), Sonus Networks, [[Patton Electronics]], [[Veraz Networks]] merging in 2010 with Dialogic to [[Dialogic Corporation]], [[Cirpack]], [[Data Connection]] renamed to [[Metaswitch]] in 2009, and Nable Communications.


Lawful intercept is governed in America by the [[Communications Assistance for Law Enforcement Act]] (CALEA).
According to Jonathan Rosenberg, the author of RFC 3261 (SIP) and numerous other related RFCs, Dynamicsoft actually developed the first working SBC in conjunction with Aravox, but the product never truly gained marketshare.{{Citation needed|date=August 2011}} .

Newport Networks was the first to have an IPO on the London Stock Exchange's AIM in May 2004 (NNG), while Cisco has been publicly traded since 1990. Acme Packet followed in October 2006 by floating on the NASDAQ. With the field narrowed by acquisition, NexTone merged with Reefpoint becoming Nextpoint, which was subsequently acquired in 2008 by [[Genband]]. At this same time, there emerged the “integrated” SBC where the border control function was integrated into another edge device. The SBC market continued to consolidate with the October 30th, 2017 merger of GENBAND and Sonus<ref>{{Cite web|url=https://ribboncommunications.com/sonus-networks-inc-announces-completion-of-sonus-and-genband-merger.html|title=Sonus Networks, Inc. Announces Completion of Sonus and GENBAND Merger {{!}} Ribbon Communications|website=ribboncommunications.com|access-date=2018-01-14}}</ref> to create [https://ribboncommunications.com Ribbon Communications].
An SBC may provide session media (usually [[Real-time Transport Protocol|RTP]]) and signaling (often [[Session Initiation Protocol|SIP]]) [[wiretap]] services, which can be used by providers to enforce requests for the [[lawful interception]] of network sessions. Standards for the interception of such services are provided by [[Alliance for Telecommunications Industry Solutions|ATIS]], [[Telecommunications Industry Association|TIA]], [[CableLabs]] and [[European Telecommunications Standards Institute|ETSI]], among others.

==History and market==
According to Jonathan Rosenberg, the author of RFC 3261 (SIP) and numerous other related RFCs, Dynamicsoft developed the first working SBC in conjunction with Aravox, but the product never truly gained marketshare.{{Citation needed|date=August 2011}} Newport Networks was the first to have an IPO on the London Stock Exchange's AIM in May 2004 (NNG), while Cisco has been publicly traded since 1990. Acme Packet followed in October 2006 by floating on the NASDAQ. With the field narrowed by acquisition, NexTone merged with Reefpoint becoming Nextpoint, which was subsequently acquired in 2008 by [[Genband]]. At this same time, there emerged the "integrated" SBC where the border control function was integrated into another edge device. In 2009, Ingate Systems' Firewall became the first SBC to earn certification from ICSA Labs, a milestone in certifying the VoIP security capabilities of an SBC.


The continuing growth of VoIP networks pushes SBCs further to the edge, mandating adaptation in capacity and complexity. As the VoIP network grows and traffic volume increases, more and more sessions are passing through SBC. Vendors are addressing these new scale requirements in a variety of ways. Some have developed separate, load balancing systems to sit in front of SBC clusters. Others, have developed new architectures using the latest generation chipsets offering higher performance SBCs and scalability using service cards.
The continuing growth of VoIP networks pushes SBCs further to the edge, mandating adaptation in capacity and complexity. As the VoIP network grows and traffic volume increases, more and more sessions are passing through SBC. Vendors are addressing these new scale requirements in a variety of ways. Some have developed separate, load balancing systems to sit in front of SBC clusters. Others, have developed new architectures using the latest generation chipsets offering higher performance SBCs and scalability using service cards.


==See also==
==See also==
<!---♦♦♦ Please keep the list in alphabetical order ♦♦♦--->
*[[3GPP Long Term Evolution]] (LTE)
*[[Firewall (computing)]]
*[[Firewall (computing)]]
*[[H.323 Gatekeeper]]
*[[IP Multimedia Subsystem]] (IMS)
*[[IP Multimedia Subsystem]] (IMS)
*[[3GPP Long Term Evolution]] (LTE)
*[[Session Initiation Protocol]] (SIP)
*[[Session Initiation Protocol]] (SIP)
*[[SIP trunking]]
*[[Universal Mobile Telecommunications System]] (UMTS)
*[[Universal Mobile Telecommunications System]] (UMTS)
*[[SIP Trunking]]


==References==
==References==
Line 110: Line 115:
| first5=M.
| first5=M.
| publisher=[[Internet Engineering Task Force|IETF]]
| publisher=[[Internet Engineering Task Force|IETF]]
| year=2010
|date=April 2010}}</ref>
| month=April}}</ref>
<ref name=Sinnreich>{{citation
<ref name=Sinnreich>{{citation
| first1=Henry
| first1=Henry
Line 122: Line 126:
| year=2001
| year=2001
| page=180 }}</ref>
| page=180 }}</ref>
<ref name=AUDIOCODES>{{cite web|url= http://www.athlsolutions.com/web/download/AudioCodes/AudioCodes_SBC-R7.0.Introduction.pdf|title=AudioCodes SBC R7.0 Introduction 2015}}</ref>
<!--<ref name=CUBE>{{cite web|url= http://www.ucstrategies.com/news-analysis/cisco-captures-lead-in-enterprise-sbc-market-according-to-new-infonetics-2012-market-share-report.aspx|title=Cisco Captures Lead in Enterprise SBC Market According to New Infonetics 2012 Market Share Report}}</ref>-->
<!--<ref name=CUBE>{{cite web|url= http://www.ucstrategies.com/news-analysis/cisco-captures-lead-in-enterprise-sbc-market-according-to-new-infonetics-2012-market-share-report.aspx|title=Cisco Captures Lead in Enterprise SBC Market According to New Infonetics 2012 Market Share Report}}</ref>-->



Latest revision as of 11:27, 19 October 2024

A session border controller (SBC) is a network element deployed to protect SIP based voice over Internet Protocol (VoIP) networks.[1]

Early deployments of SBCs were focused on the borders between two service provider networks in a peering environment. This role has now expanded to include significant deployments between a service provider's access network and a backbone network to provide service to residential and/or enterprise customers.[2]

The term "session" refers to a communication between two or more parties – in the context of telephony, this would be a call. Each call consists of one or more call signaling message exchanges that control the call, and one or more call media streams which carry the call's audio, video, or other data along with information of call statistics and quality. Together, these streams make up a session. It is the job of a session border controller to exert influence over the data flows of sessions.

The term "border" refers to a point of demarcation between one part of a network and another. As a simple example, at the edge of a corporate network, a firewall demarcates the local network (inside the corporation) from the rest of the Internet (outside the corporation). A more complex example is that of a large corporation where different departments have security needs for each location and perhaps for each kind of data. In this case, filtering routers or other network elements are used to control the flow of data streams. It is the job of a session border controller to assist policy administrators in managing the flow of session data across these borders.

The term "controller" refers to the influence that session border controllers have on the data streams that comprise sessions, as they traverse borders between one part of a network and another. Additionally, session border controllers often provide measurement, access control, and data conversion facilities for the calls they control.

Functions

[edit]

SBCs commonly maintain full session state and offer the following functions:

  • Security – protect the network and other devices from:
  • Connectivity – allow different parts of the network to communicate through the use of a variety of techniques such as:
    • NAT traversal
    • SIP normalization via SIP message and header manipulation
    • IPv4 to IPv6 interworking
    • VPN connectivity
    • Protocol translations between SIP, SIP-I, H.323
  • Quality of service – the QoS policy of a network and prioritization of flows is usually implemented by the SBC. It can include such functions as:
  • Regulatory – many times the SBC is expected to provide support for regulatory requirements such as:
  • Media services – many of the new generation of SBCs also provide built-in digital signal processors (DSPs) to enable them to offer border-based media control and services such as:
    • DTMF relay and interworking
    • Media transcoding
    • Tones and announcements
    • Data and fax interworking
    • Support for voice and video calls
  • Statistics and billing information – since all sessions that pass through the edge of the network pass through the SBC, it is a natural point to gather statistics and usage-based information on these sessions.

With the advent of WebRTC some SBCs have also assumed the role of SIP to WebRTC Gateway and translate SIP. While no one signalling protocol is mandated by the WebRTC specifications,[3] SIP over WebSockets (RFC 7118) is often used partially due to the applicability of SIP to most of the envisaged communication scenarios as well as the availability of open source software such as JsSIP. In such a case the SBC acts as a gateway between the WebRTC applications and SIP end points.

Applications

[edit]

SBCs are inserted into the signaling and/or media paths between calling and called parties in a VoIP call, predominantly those using the Session Initiation Protocol (SIP), H.323, and MGCP call-signaling protocols.

In many cases the SBC hides the network topology and protects the service provider or enterprise packet networks. The SBC terminates an inbound call and initiates the second call leg to the destination party. In technical terms, when used with the SIP protocol, this defines a back-to-back user agent (B2BUA). The effect of this behavior is that not only the signaling traffic, but also the media traffic (voice, video) is controlled by the SBC. In cases where the SBC does not have the capability to provide media services, SBCs are also able to redirect media traffic to a different element elsewhere in the network, for recording, generation of music-on-hold, or other media-related purposes. Conversely, without an SBC, the media traffic travels directly between the endpoints, without the in-network call signaling elements having control over their path.

In other cases, the SBC simply modifies the stream of call control (signaling) data involved in each call, perhaps limiting the kinds of calls that can be conducted, changing the codec choices, and so on. Ultimately, SBCs allow the network operators to manage the calls that are made on their networks, fix or change protocols and protocol syntax to achieve interoperability, and also overcome some of the problems that firewalls and network address translators (NATs) present for VoIP calls.

To show the operation of an SBC, one can compare a simple call establishment sequence with a call establishment sequence with an SBC.[4] In the simplest session establishment sequence with only one proxy between the user agents the proxy’s task is to identify the callee’s location and forward the request to it. The proxy also adds a Via header with its own address to indicate the path that the response should traverse. The proxy does not change any dialog identification information present in the message such as the tag in the From header, the Call-Id or the Cseq. Proxies also do not alter any information in the SIP message bodies. Note that during the session initiation phase the user agents exchange SIP messages with the SDP bodies that include addresses at which the agents expect the media traffic. After successfully finishing the session initiation phase the user agents can exchange the media traffic directly between each other without the involvement of the proxy.

SBCs are designed for many applications and are used by operators and enterprises to achieve a variety of goals. Even the same SBC implementation might act differently depending on its configuration and the use case. Hence, it is not easily possible to describe an exact SBC behavior that would apply to all SBC implementations. In general it is possible to identify certain features that are common to SBCs. For example, most SBCs are implemented as back-to-back user agent. A B2BUA is a proxy-like server that splits a SIP transaction in two call legs: on the side facing the user agent client (UAC), it acts as server, on the side facing user agent server (UAS) it acts as a client. While a proxy usually keeps only state information related to active transactions, B2BUAs keep state information about active dialogs, e.g., calls. That is, once a proxy receives a SIP request it will save some state information. Once the transaction is over, e.g., after receiving a response, the state information will soon after be deleted. A B2BUA will maintain state information for active calls and only delete this information once the call is terminated.

When an SBC is included in the call path, the SBC acts as a B2BUA that behaves as a user agent server towards the caller and as user agent client towards the callee. In this sense, the SBC actually terminates that call that was generated by the caller and starts a new call towards the callee. The INVITE message sent by the SBC contains no longer a clear reference to the caller. The INVITE sent by the SBC to the proxy includes Via and Contact headers that point to the SBC itself and not the caller. SBCs often also manipulate the dialog identification information listed in the Call-Id and From tag. Further, in case the SBC is configured to also control the media traffic then the SBC also changes the media addressing information included in the c and m lines of the SDP body. Thereby, not only will all SIP messages traverse the SBC but also all audio and video packets. As the INVITE sent by the SBC establishes a new dialog, the SBC also manipulates the message sequence number (CSeq) as well the Max-Forwards value. Note that the list of header manipulations listed here is only a subset of the possible changes that an SBC might introduce to a SIP message. Furthermore, some SBCs might not do all of the listed manipulations. If the SBC is not expected to control the media traffic then there might be no need to change anything in the SDP body. Some SBCs do not change the dialog identification information and others might even not change the addressing information.

SBCs are often used by corporations along with firewalls and intrusion prevention systems (IPS) to enable VoIP calls to and from a protected enterprise network. VoIP service providers use SBCs to allow the use of VoIP protocols from private networks with Internet connections using NAT, and also to implement strong security measures that are necessary to maintain a high quality of service. SBCs also replace the function of application-level gateways.[5] In larger enterprises, SBCs can also be used in conjunction with SIP trunks to provide call control and make routing/policy decisions on how calls are routed through the LAN/WAN. There are often tremendous cost savings associated with routing traffic through the internal IP networks of an enterprise, rather than routing calls through a traditional circuit-switched phone network.

Additionally, some SBCs can allow VoIP calls to be set up between two phones using different VoIP signaling protocols (e.g., SIP, H.323, Megaco/MGCP) as well as performing transcoding of the media stream when different codecs are in use. Most SBCs also provide firewall features for VoIP traffic (denial of service protection, call filtering, bandwidth management). Protocol normalization and header manipulation is also commonly provided by SBCs, enabling communication between different vendors and networks.

From an IP Multimedia Subsystem (IMS) or 3GPP (3rd Generation Partnership Project) architecture perspective, the SBC is the integration of the P-CSCF and IMS-ALG at the signaling plane and the IMS Access Gateway at the media plane on the access side. On the interconnect side, the SBC maps to the IBCF, IWF at the signaling plane and TrGW (Transition Gateway) at the media plane.

From an IMS/TISPAN architecture perspective, the SBC is the integration of the P-CSCF and C-BGF functions on the access side, and the IBCF, IWF, THIG, and I-BGF functions on the peering side. Some SBCs can be "decomposed", meaning the signaling functions can be located on a separate hardware platform than the media relay functions – in other words the P-CSCF can be separated from the C-BGF, or the IBCF/IWF can be separated from the I-BGF functions physically. Standards-based protocol, such as the H.248 Ia profile, can be used by the signaling platform to control the media one while a few SBCs use proprietary protocols.

Controversy

[edit]

During its infancy, the concept of SBC was controversial to proponents of end-to-end systems and peer-to-peer networking because:

  • SBCs can extend the length of the media path (the way of media packets through the network) significantly. A long media path is undesirable, as it increases the delay of voice packets and the probability of packet loss. Both effects deteriorate the voice/video quality. However, many times there are obstacles to communication such as firewalls between the call parties, and in these cases SBCs offer an efficient method to guide media streams towards an acceptable path between caller and callee; without the SBC the call media would be blocked. Some SBCs can detect if the ends of the call are in the same subnetwork and release control of the media enabling it to flow directly between the clients, this is anti-tromboning or media release. Also, some SBCs can create a media path where none would otherwise be allowed to exist (by virtue of various firewalls and other security apparatus between the two endpoints). Lastly, for specific VoIP network models where the service provider owns the network, SBCs can actually decrease the media path by shortcut routing approaches. For example, a service provider that provides trunking services to several enterprises would usually allocate each enterprise a VPN. It is often desirable to have the option to interconnect the VPN through SBCs. A VPN-aware SBC may perform this function at the edge of the VPN network, rather than sending all the traffic to the core.
  • SBCs can restrict the flow of information between call endpoints, potentially reducing end-to-end transparency. VoIP phones may not be able to use new protocol features unless they are understood by the SBC. However, the SBCs are usually able to cope with the majority of new, and unanticipated protocol features.
  • Sometimes end-to-end encryption can't be used if the SBC does not have the key, although some portions of the information stream in an encrypted call are not encrypted, and those portions can be used and influenced by the SBC. However, the new generations of SBCs, armed with sufficient computing capacity, are able to offload this encryption function from other elements in the network by terminating SIP-TLS, IPsec, and/or SRTP. Furthermore, SBCs can actually make calls and other SIP scenarios work when they couldn't have before, by performing specific protocol "normalization" or "fix-up".
  • In most cases, far-end or hosted NAT traversal can be done without SBCs if the VoIP phones support protocols like STUN, TURN, ICE, or Universal Plug and Play (UPnP).

Most of the controversy surrounding SBCs pertains to whether call control should remain solely with the two endpoints in a call (in service to their owners), or should rather be shared with other network elements owned by the organizations managing various networks involved in connecting the two call endpoints. For example, should call control remain with Alice and Bob (two callers), or should call control be shared with the operators of all the IP networks involved in connecting Alice and Bob's VoIP phones together. The debate of this point was vigorous, almost religious, in nature. Those who wanted unfettered control in the endpoints only, were also greatly frustrated by the various realities of modern networks, such as firewalls and filtering/throttling. On the other side, network operators are typically concerned about overall network performance, interoperability and quality, and want to ensure it is secure.

Lawful intercept and CALEA

[edit]

Lawful intercept is governed in America by the Communications Assistance for Law Enforcement Act (CALEA).

An SBC may provide session media (usually RTP) and signaling (often SIP) wiretap services, which can be used by providers to enforce requests for the lawful interception of network sessions. Standards for the interception of such services are provided by ATIS, TIA, CableLabs and ETSI, among others.

History and market

[edit]

According to Jonathan Rosenberg, the author of RFC 3261 (SIP) and numerous other related RFCs, Dynamicsoft developed the first working SBC in conjunction with Aravox, but the product never truly gained marketshare.[citation needed] Newport Networks was the first to have an IPO on the London Stock Exchange's AIM in May 2004 (NNG), while Cisco has been publicly traded since 1990. Acme Packet followed in October 2006 by floating on the NASDAQ. With the field narrowed by acquisition, NexTone merged with Reefpoint becoming Nextpoint, which was subsequently acquired in 2008 by Genband. At this same time, there emerged the "integrated" SBC where the border control function was integrated into another edge device. In 2009, Ingate Systems' Firewall became the first SBC to earn certification from ICSA Labs, a milestone in certifying the VoIP security capabilities of an SBC.

The continuing growth of VoIP networks pushes SBCs further to the edge, mandating adaptation in capacity and complexity. As the VoIP network grows and traffic volume increases, more and more sessions are passing through SBC. Vendors are addressing these new scale requirements in a variety of ways. Some have developed separate, load balancing systems to sit in front of SBC clusters. Others, have developed new architectures using the latest generation chipsets offering higher performance SBCs and scalability using service cards.

See also

[edit]

References

[edit]
  1. ^ "What is a Session Border Controller (SBC)? | Ribbon Communications". ribboncommunications.com. Retrieved 2024-10-19.
  2. ^ Hautakorpi, J.; Camarillo, G.; Penfield, R.; Hawrylyshen, A.; Bhatia, M. (April 2010). Requirements from SIP (Session Initiation Protocol) Session Border Control Deployments. IETF. doi:10.17487/RFC5853. RFC 5853.
  3. ^ How WebRTC Is Revolutionizing Telephony. Blogs.trilogy-lte.com (2014-02-21). Retrieved on 2014-04-11.
  4. ^ "Understanding Session Border Controllers" (PDF). FRAFOS GmbH.
  5. ^ Sinnreich, Henry; Johnston, Alan B. (2001), Internet Communication Using SIP, Wiley, p. 180, ISBN 978-0-471-77657-4