One document matched: draft-ietf-speermint-voip-consolidated-usecases-05.txt
Differences from draft-ietf-speermint-voip-consolidated-usecases-04.txt
Internet Draft A.Uzelac, Ed.
SPEERMINT Global Crossing
Intended status: Informational Y.Lee, Ed.
Expires: Aug 2008 Comcast
February 4, 2008
VoIP SIP Peering Use Cases
draft-ietf-speermint-voip-consolidated-usecases-05.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on Aug 4, 2008.
Abstract
This document will capture VoIP use case for SIP Peering. This
document depicts many common VoIP peering use cases. These use cases
are categorized into two types: static and on-demand, and then
further subcategorized into direct and indirect. These use cases are
not an exhaustive set, but rather the most common use cases deployed
today. This document captures them to provide a reference.
Uzelac, Lee (et al) Expires Aug 4, 2008 [Page 1]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
Table of Contents
1. Introduction...................................................2
2. Terminology....................................................3
3. Reference Architecture.........................................3
4. Contexts of Use Cases..........................................4
5. Use Cases......................................................5
5.1. Static Peering Use Cases..................................5
5.1.1. Static Direct Peering Use Case..........................6
5.1.1.1. Administrative characteristics........................7
5.1.1.2. Options and Nuances...................................7
5.1.2. Static Direct via Assisting Entity (Hub/Spoke)..........7
5.1.2.1. Administrative Characteristics........................8
5.1.2.2. Options and Nuances...................................8
5.1.3. Static Indirect Use Cases...............................9
5.1.4. Static Indirect Peering ? SIP and Media via I-SSP.......9
5.1.4.1. Administrative characteristics.......................10
5.1.4.2. Options and Nuances..................................10
5.1.5. Static Indirect ? Signaling via I-SSP..................11
5.2. On-demand Peering Use Cases..............................12
5.2.1. On-demand Direct Peering Use Case......................12
5.2.1.1. Administrative characteristics.......................12
5.2.1.2. Options and Nuances..................................12
5.3. Federations..............................................13
5.3.1. Federation Considerations..............................13
5.3.2. Federation Examples....................................13
5.3.2.1. Trivial Federations..................................13
5.3.2.2. Access List based....................................14
5.3.2.3. TLS based Federations................................14
5.3.2.4. Central SIP Proxy....................................14
6. Architecture, scalability and business scalability............15
7. Security Considerations.......................................15
8. IANA Considerations...........................................15
References.......................................................16
Normative References..........................................16
Informative References........................................17
Author's Addresses............................................17
Full Copyright Statement......................................18
Intellectual Property.........................................18
Acknowledgment................................................18
1. Introduction
This document attempts to capture VoIP use cases for Session
Initiation Protocol (SIP)[1] based peering. These use cases will
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 2]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
assist in identifying requirements and future works for VoIP Peering
using SIP.
Only use cases related to VoIP are considered in this document.
Other real-time SIP communications use cases, like Instant Messaging
(IM) and presence are out of scope for this document. In describing
use cases, the intent is descriptive, not prescriptive.
There are existing documents [2][3][4][5][6] that have captured use
case scenarios. This draft draws from those documents. The document
categories use cases into the following groupings; static or on-
demand, then they are further subdivided into direct and indirect.
Using this categorization, the use cases contained in this document
attempts to be as comprehensive as possible, but should not be
considered the exclusive set of use cases.
2. Terminology
In this document, we use ?O? to indicate ?Originating?, ?T? to
indicate ?Terminating?, and ?I? to indicate ?Indirect?. For example,
O-SSP is the acronym of Originating SIP Service Provider.
3. Reference Architecture
The diagram below provides the reader with a context for the VoIP use
cases in this draft.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 3]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
+-------------------+-------------------------+-------------------+
| | Indirect SSP Domain | |
| | | |
| | +------+ +------+ | |
| | +I-LUF + + I-LRF| | |
| | +------+ +------+ | |
| | | |
| | +-------+ | |
| | |I-Proxy| | |
| | +-------+ | |
| | | |
| | +------+ +------+ | |
| | | I-SBE| | I-DBE| | |
| \ +------+ +------+ / |
| +------+ \ / +------+ |
| +-----+O-LUF + \ / +T-LUF +-----+ |
| | +O-LRF + \ / +T-LRF + | |
| | +------+ \ / +------+ | |
| | \ / | |
| | +------+ \ / +------+ | |
| | | O-SBE+ \ / + T-SBE| | |
| | +---+--+ \ / +---+--+ | |
| | | \ / | | |
| | | \ / | | |
| | +---+---+ \ / +---+---+ | |
| +-----+O-Proxy| \ / |T-Proxy+--- + |
| +-----+-+ + ++------+ |
| +----+ | | | +----+ |
| |UAC +---------+ | +---------+ UAS| |
| +----+ +------+ | +------+ +----+ |
| | O-DBE| | | T-DBE| |
| +------+ | +------+ |
| | |
| Originating SSP Domain | Terminating SSP Domain |
+-----------------------------------------------------------------+
Figure 1 Generalized Overview
PLEASE NOTE: In figure one ? the elements defined are optional in
many use cases.
4. Contexts of Use Cases
Use cases are sorted into two general groupings: Static and On-demand
Peering [15]. Each grouping can further sub-divided to Direct Peering
and Indirect Peering [15]. Though there may be some overlap among the
use cases in these categories, there are different requirements
between the scenarios. Each use-case has to specify how a few core
operations which are to be performed by its members.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 4]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
These can include:
1) Peer Discovery via a Look-up function to determine the
administrative domain to direct the call to.
2) A location determination process that serves to create the Session
Establishment Data (SED). Examples: Public User-ENUM, public
Infrastructure ENUM, private ENUM tree, SIP Redirect, DUNDi.
3) Next Hop determination based on the SED. If a location function
query did not return an URI of the form sip:user@IP-address, then the
originating SSP has to translate the domain part of the URI to an IP-
address (plus perhaps fall-backs) in order to contact the next hop.
Examples: RFC3263 in the public DNS. RFC3263 in a federation private
DNS. RFC3263 in the public DNS with split-DNS, P2P SIP, modified
RFC3263 in the public DNS (e.g. a federation-specific prefix to the
domain name).
4) Call setup ? SSPs that are interconnecting to one another may also
define specifics on what SIP features need to be used when contacting
the next hop in order to a) reach the next hop at all and b) to prove
that the sender is a legitimate peering partner.
Examples: hard-code transport (TCP/UDP/TLS), non-standard port
number, specific source IP address (e.g. in a private L3 network),
which TLS client certificate to use, other authentication scheme.
5) Call reception ? This step serves to ensure that the type of
relationship (static or on-demand, indirect or direct) is understood.
For instance, the receiving side border elements need to determine
whether the INVITE it just received really came from a member of the
federation. This is the flip side of step four. Example: verify TLS
cert, check incoming interface/VLAN,check source IP address against a
configured list of valid ones.
5. Use Cases
Please note there are intra-domain message flows within the use cases
to serve as supporting background information. Only inter-domain
communications are germane to Speermint.
5.1. Static Peering Use Cases
Static Peering [15] describes two SSP form the peering relationship
with pre-association. Pre-association is a prerequisite to static
peering.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 5]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
5.1.1. Static Direct Peering Use Case
This is the simplest form of a peering use case. Two SSP negotiate
and agree to establish a SIP peering relation. The peer connection is
statically configured and directly connected two SSP. The peers may
exchange peer information such as DSCP policies, subscriber SIP-URI
and proxy location prior to establishing the connection. They only
accept traffic originating directly from the trusted peer.
+------------------+-------------------+
| Orig SSP | Term SSP |
| +--------+ | +--------+ |
| | O-LUF | | | T-LUF | |
| | O-LRF | | | T-LRF | |
| +--------+ | +--------+ |
| (2) / | |
| /(3) | |
| +-------+ | +-------+ |
| |O-Proxy|------(4)------|T-Proxy| |
| +-------+ | +-------+ |
| | | | |
| (1) | (5) |
| | | | |
| +----+ | +----+ |
| | UAC+===(6)=(RTP)=======+ UAS+ |
| +----+ | +----+ |
+------------------+-------------------+
Figure 2 Direct Peering
The following is a high-level depiction of the use case.
1. UAC initiates a call via SIP INVITE
2. O-Proxy queries for SED information from a routing database.
3. Routing database entity replies with SED to called party
4. Call sent to terminating domain proxy.
5. T-Proxy determines called party status and directs call to
called party.
6. RTP is established between UAC and UAS.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 6]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
5.1.1.1. Administrative characteristics
The static direct peering use case is typically implemented in a
scenario where exists a strong degree of trust between the two
administrative domains. Both administrative domains normally sign a
peer agreement which state clearly the peering policies and terms.
5.1.1.2. Options and Nuances
In Figure 2, O-Proxy and T-Proxy connect directly. An operator may
decide to deploy a SBE between its proxy and the peer network.
Normally, the operator will deploy the SBE in the edge of its
administrative domain. The signaling traffic will pass between two
networks through the SBE. The operator has many reasons to deploy a
SBE. For example, the proxy may use RFC1918 addresses that are not
routable in the peer operator network. The SBE can perform a NAT
function. Also, the SBE eases the operation cost for deploying or
removing L5 network elements. Consider the deployment architecture
where multiple proxies connect to a single SBE. An operator can add
or remove a proxy without coordinating with the peer operator. The
peer operator ?sees? only the SBE. As long as the SBE maintain
intact, the peer operator does not need to be notified.
When an operator deploys a SBE, the operator is required to advertise
the SBE to the peer LRF so that the peer operator can locate the SBE
and route the traffic to the SBE accordingly.
SBE deployment is a decision within an administrative domain. Either
administrative domain or both administrative domains can decide to
deploy SBE. To the peer network, most important is to identify the
next-hop address. Whether next-hop is a proxy or SBE, the peer
network will not see any difference.
5.1.2. Static Direct via Assisting Entity (Hub/Spoke)
The difference between Direct and Indirect Use Cases is the O-SSP
invokes an I-SSP to forward requests to T-SSP blindly, regardless of
LUF or LRF. This use case is also referring to a ?transit? model of
SIP peering. Similar to the On-demand Direct Use Case model, the I-
SSP must publicly announce that it accepts request and is capable to
route the request to the T-SSP.
Another On-demand Indirect Use Case is the Hub-and-Spoke use case. An
Assisting entity where only the LRF resides, serves as the hub for
multiple SSPs. Each SSP is the spoke to the Assisting Entity which
does not need to have direct L5 connections among other SSPs. To
originate a call to a T-SSP, the O-SSP will query the Assisting
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 7]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
Entity?s LRF. The response will facilitate indirect or direct
communications to the O-SSP. The Assisting entity can route the
Session to one of its served SSP. The routing logic in the Assisted
Entity is hidden to the SSP. Figure 4 shows the high-level network
setup.
+---------+
|Assisting|
| Entity |
| (LRF) |
+--+-+-+--+
| | |
| | |
| | |
+----------------+ | +------------------+
| | |
| | |
| | |
+---+----+ +---+----+ +---+----+
| | | | | |
| SSP1 | | SSP2 | ....... | SSPx |
| | | | | |
+--------+ +--------+ +--------+
Figure 3 Hub and spoke
5.1.2.1. Administrative Characteristics
The Hub-and-Spoke Use Case is commonly used in a Registry or
Directory call model, where both O-SSP and T-SSP do not have direct
Layer-5 connectivity. O-SSP and T-SSP choose an I-SSP and forms a
trusted relationship to I-SSP. As such, the I-SSP is the hub served
multiple spoke SSPs. Spoke SSP only have trusted relationship with I-
SSP. Spoke SSPs do not have trusted relationship among themselves.
They use I-SSP to assist them to route the signaling traffic. That
said, if Spoke SSPs have direct Layer-3 connectivity, Spoke SSP can
choose not to use I-SSP assistance for media traffic.
5.1.2.2. Options and Nuances
T-SSP shares the same problems of which On-demand Indirect Use Case
suffers. T-SSP should apply filter rules for VoIP spam. O-SSP, T-SSP
and I-SSP can deploy SBE and DBE for NAT traversal, admission control
and codec Transcoding.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 8]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
5.1.3. Static Indirect Use Cases
Similar to the Static Direct Peering Use Case, O-SSP and T-SSP has
pre-arranged assignment for the peer relationship. The difference
between Static Direct Use Case and Static Indirect Use Case lies with
the Layer-5 relationship O-SSP and T-SSP maintain. In the Indirect
use case, the O-SSP and T-SSP do not have direct Layer-5
connectivity. They require one or multiple Indirect Domains to assist
routing the SIP messages and possibly the associated media.
5.1.4. Static Indirect Peering ? SIP and Media via I-SSP
In the following use case, all signaling and media between the O-SSP
and T-SSP flows through another SSP (Indirect SSP).
+--------------------+
| Indirect SSP |
| |
| +-------+ |
| +--+I-Proxy| |
| / +-+ I-LUF | |
| / / + I-LRF | |
+--------------------+ / / +-------+ +---------------------+
| Orig SSP |/ / | Term SSP |
| +-------------/ / | |
| / |/ | |
| / +----(3)-----+ | |
| (2) / | | |
| / / | | |
|+-------+ +-----+ +-----+ +-----+ +-------+ |
||O-Proxy|-(4)-|O-SBE|------+I-SBE+--(5)--+T-SBE+-(6)-|T-Proxy| |
|+-------+ +-----+ +-----+ +-----+ +-------+ |
| | | | | |
| (1) | | (7) |
| | | | | |
| +-----+ +-----+ +-----+ +-----+ +-----+ |
| | UAC +======|0-DBE|=(8)==+I-DBE+=======+T-DBE+======+ UAS | |
| +-----+ +-----+ +-----+ +-----+ +-----+ |
+---------------------------------------------------------------+
Figure 4 Indirect Peering via Indirect Domain (SIP and media)
1. UAC initiates a call.
2. The O-Proxy queries SED for the called party. O-SSP can query
its own LUF and LF for the SED if the information is available
within its domain. Alternatively, the I-SSP may provide the LUF
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 9]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
and LF for the O-SSP. In this setup, the query traverses the
administrative boundary between the originating and the Indirect
domains (as illustrated in Fig. 3).
3. The result of the query will be the I-SSP?s SBE (I-SBE) that is
interconnected to the T-SSP and the O-SBE.
4. O-Proxy signals the I-SBE via the O-SBE.
5. I-SBE routes call to T-SBE within T-SSP.
6. T-SBE signals T-Proxy.
7. T-Proxy signals the called party. (UAS)
8. RTP may be established between UAC and UAS via DBE path
typically coordinated by the I-SSP.
5.1.4.1. Administrative characteristics
The Static Indirect Use Case is normally implemented in cases where
no direct interconnection exists between originating and terminating
domains due to either business or physical constraints.
O-SSP .--. I-SSP = Relationship O-I
In the O-I relationship, typical policies, features or functions that
deem this relationship necessary are NP, Ubiquity of termination
options, and masquerading of originating VoIP network gear.
T-SSP .--. I-SSP = Relationship T-I
In the T-I relationship, typical policies, features or functions
observed consist of codec ?scrubbing?, anonimizing, and transcoding.
I-SSP must record-route and stay in the signalling path. T-SSP will
not accept message directly sent from O-SSP.
5.1.4.2. Options and Nuances
Similar to the Static Direct Peering Use Case, O-SSP and T-SSP may
deploy SBE and DBE for NAT traverse, security Transcoding, etc. I-SSP
can also deploy SBE and DBE for similar reasons. (as depicted in Fig.
3)
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 10]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
5.1.5. Static Indirect ? Signaling via I-SSP
The static indirect use case with signaling only shares many
properties with the static indirect use case for signaling and media.
There must exist a pre-associate between the O-SSP and T-SSP, but the
situation only pertains to administrative relations. The O and T
SSPs do not have direct Layer-5 connectivity; therefore require one
or multiple Indirect Domains to assist routing the SIP messages.
+--------------------+
| Indirect SSP |
| |
| +-------+ |
| +--+I-Proxy| |
| / +-+ I-LUF | |
| / / + I-LRF | |
+--------------------+ / / +-------+ +---------------------+
| Orig SSP |/ / | Term SSP |
| +-------------/ / | |
| / |/ | |
| / +----(3)-----+ | |
| (2) / +--------------------+ |
| / / | | |
|+-------+ +-----+ +-----+ +-------+ |
||O-Proxy|-----|O-SBE+--------(4)---------+T-SBE+-(5)-|T-Proxy| |
|+-------+ +-----+ +-----+ +-------+ |
| | | | | |
| (1) | | (6) |
| | | | | |
| +-----+ +-----+ +-----+ +-----+ |
| | UAC +======|0-DBE|========(7)=========+T-DBE+======+ UAS | |
| +-----+ +-----+ +-----+ +-----+ |
+--------------------+ +---------------------+
Figure 5 Indirect via I-SSP (SIP only)
1. UAC initiates a call.
2. The O-Proxy queries SED for the called party. O-SSP can query
its own LUF and LF for the SED if the information is available
within its domain. Alternatively, the I-SSP may provide the LUF
and LF for the O-SSP. In this setup, the query traverses the
administrative boundary between the originating and the Indirect
domains (as illustrated in Fig. 4).
3. The result of the query will be the T-SSP?s SBE (T-SBE) that is
interconnected to the O-SSP via the O-SBE.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 11]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
4. O-SBE signals the T-SBE.
5. T-SBE signals T-Proxy.
6. T-Proxy signals the called party, UAS.
7. RTP may be established between UAC and UAS via DBE path
typically coordinated by the I-SSP.
5.2. On-demand Peering Use Cases
On-demand Peering [15] describes two SSPs form the peering
relationship without a pre-arranged agreement.
5.2.1. On-demand Direct Peering Use Case
The basis of this use case is built on the fact that there is NOT a
pre-established relationship between the O-SSP and the T-SSP. The O-
SSP and T-SSP did not share any information prior to the dialog
initiation request. When the O-Proxy invokes the LUF and LRF on the
R-URI, the terminating user information must be publicly available.
Besides, when the O-Proxy routes the request to the T-Proxy, the T-
Proxy must accept the request without any pre-association with O-SSP.
The call flow is identical to the Static Direct Peering Use Case
shown in Fig 2.
5.2.1.1. Administrative characteristics
The On-demand Direct Peering Use Case is typically implemented in a
scenario where the T-SSP allows any O-SSP to reach its serving
subscribers. T-SSP administrative domain does not require any pre-
arranged agreement to accept the call. T-SSP makes its subscribers
information available in public. This model mimics the Internet email
model. Sender does not need an pre-arranged agreement to send email
to the receiver.
5.2.1.2. Options and Nuances
Similar to Static Direct Peering Use Case, O-SSP and T-SSP can decide
to deploy SBE. T-SSP is open to the public, T-SSP should prepare to
suffer from the spam problem existing in email system. VoIP spamming
is considered more annoying than email spamming to the subscribers.
T-SSP should apply rules to filter spammed calls.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 12]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
5.3. Federations
This section discusses the federation concept, explains which
technical parameters make up the foundation of a federation and
provides examples.
The concrete implementation details (e.g. "direct with one SBE"
versus "direct with two SBEs") can involve all the use cases thus far
described in the document.
5.3.1. Federation Considerations
5.3.2. Federation Examples
This section lists some examples of how federations can operate.
5.3.2.1. Trivial Federations
A private peering arrangement between two SSPs is a special case of
a federation. These two SSP have agreed to exchange calls amongst
themselves and they have set up whatever LUF/LS/SBE plus Layer 3
infrastructure they need to route and complete the calls. This can
be in a direct or indirect manner, but usually follows the direct
call model.
It is thus not needed to treat bi-lateral peerings as conceptually
different to federation-based peering.
On the other extreme, the set of all SSPs implementing an open SIP
service according to RFCs 3261/3263/3761 also fulfills the
definition of a federation. In that case, the technical rules are
contained in these three RFCs, the LS is the public DNS. Whether
some of these SSPs use SBCs as border elements is not relevant.
The administrative model of this federation is the "email model":
There is no "member list", any SIP server operating on the Internet
which implements call routing according to these RFCs is implicitly
a member of that federation. No business relationship is needed
between "members", thus no money is likely to change hands for
terminating calls. There is no contractual protection against
nuisance calls, SPIT, or denial of service attacks.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 13]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
5.3.2.2. Access List based
If running an open SIP proxy is not desired, then a group of SSPs
which want to allow calls from each other can collect the list of
IP addresses of all their border elements.
This list is redistributed to all members which use it to configure
firewalls in front of their ingress elements. Thus calls from
other members of this federation are accepted while calls from
other hosts on the Internet are blocked.
Whether SSPs deploy SBEs as border elements is not relevant. Call
routing can still be done via standard RFC rules.
Whenever a new member joins this club every other SSP needs to
adapt its filter rules.
5.3.2.3. TLS based Federations
Another option to restrict incoming calls to federation members is
to use Transport Layer Security (TLS) certificates as access
control. This works best if the federation runs a certificate
authority (CA) which signs the TLS keys of each member SSP. Thus
the ingress element of a SSP needs to check only whether the client
certificate presented by the calling SIP proxy contains a proper
signature from that CA.
Adding support for Certificate Revocation Lists solves the issue of
blocking calls from former members of that federation. The main
benefit of this model is that no changes need to be made at the
ingress element of all old members whenever a SSP joins that
federation.
5.3.2.4. Central SIP Proxy
One way to simplify the management of these firewall rules is to
route all SIP messages via a central proxy.
In that case, all federation members just need to open up their
ingress elements to requests from that central server. A new SSP
just triggers a change in the configuration of this box and not at
all other SSPs.
While centralized solutions may entail typical hub-and-spoke
architecture considerations, the added overall federation
scalability with respect to the number of interconnects required,
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 14]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
their associated policies and management make this approach quite
popular today.
This is an example of Indirect Peering.
6. Architecture, scalability and business scalability
The network architecture which in the case centralized model would
reflect a hub and spoke model - should be weighed against a
distributed model. While such a centralized model presents well-
known network and server scalability challenges, a distributed
model requires higher interconnection complexity, reflected in
provisioning and the need for the maintenance of such
relationships.
7. Security Considerations
This document introduces no new security considerations. However,
it is important to note that session interconnect, as described in
this document, has a wide variety of security issues that should be
considered in documents addressing both protocol and use case
analyzes.
8. IANA Considerations
This document creates no new requirements on IANA namespaces
[RFC2434].
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 15]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
References
Normative References
[1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
Session Initiation Protocol", RFC 3261, June 2002.
[2] Schwartz, David, draft-schwartz-speermint-use-cases-federations
[3] Mahy, Rohan, draft-mahy-speermint-direct-peering
[4] Lendl, Otmar, draft-lendl-speermint-federations
[5] Lee, Yiu, draft-lee-speermint-use-case-cable
[6] Uzelac, Adam, draft-uzelac-speermint-use-cases
[7] Rosenberg, J. and H. Schulzrinne, "Session Initiation Protocol
(SIP): Locating SIP Servers", RFC 3263, June 2002.
[8] Blake-Wilson, S., Nystrom, M., Hopwood, D., Mikkelsen, J., and
T. Wright, "Transport Layer Security (TLS) Extensions", RFC
3546, June 2003.
[9] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson,
"RTP: A Transport Protocol for Real-Time Applications", STD 64,
RFC 3550, July 2003.
[10] Peterson, J., Liu, H., Yu, J., and B. Campbell, "Using E.164
numbers with the Session Initiation Protocol (SIP)", RFC 3824,
June 2004.
[11] Peterson, J., ?Address Resolution for Instant Messaging and
Presence?,RFC 3861, August 2004.
[12] Peterson, J., "Telephone Number Mapping (ENUM) Service
Registration for Presence Services", RFC 3953, January 2005.
[13] ETSI TS 102 333: " Telecommunications and Internet converged
Services and Protocols for Advanced Networking (TISPAN); Gate
control protocol".
[14] Peterson, J., "enumservice registration for Session Initiation
Protocol (SIP) Addresses-of-Record", RFC 3764, April 2004.
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 16]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
Informative References
[15] Meyer, D., "SPEERMINT Terminology", draft-ietf-speermint-
terminology-06 (work in progress), 2006.
[16] Mule, J-F., ?SPEERMINT Requirements for SIP-based VoIP
Interconnection?, draft-ietf-speermint-requirements-00.txt,
June 2006.
[17] Camarillo, G. ?Requirements from SIP (Session Initiation
Protocol) Session Border Control Deployments?, draft-camarillo-
sipping-sbc-funcs-04.txt, June, 2006.
[18] Habler, M., et al., ?A Federation based VOIP Peering
Architecture?, draft-lendl-speermint-federations-03.txt,
September 2006.
Author's Addresses
Adam Uzelac
Global Crossing
Email: adam.uzelac@globalcrossing.com
Rohan Mahy
Plantronics
Email: rohan@ekabal.com
Yiu L. Lee
Comcast Cable Communications
Email: yiu_lee@cable.comcast.com
David Schwartz
Xconnect Global Networks
Email: dschwartz@xconnect.net
Eli Katz
Xconnect Global Networks
Email: ekatz@xconnect.net
Otmar Lendl
enum.at GmbH
Email: otmar.lendl@enum.at
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 17]
Internet-Draft draft-ietf-speermint-voip-consolidated-usecases Aug 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Uzelac, Lee (et al.) Expires Aug 4, 2008 [Page 18]
| PAFTECH AB 2003-2026 | 2026-04-23 11:47:40 |