One document matched: draft-lee-speermint-use-case-cable-01.txt

Differences from draft-lee-speermint-use-case-cable-00.txt


Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
Network Working Group                                            Y. Lee 
Internet-Draft                                            Comcast Cable 
Expires: March 27, 2007                                  September 2006 
                                                                        
    
    
                    Session Peering Use Case for Cable 
                 draft-lee-speermint-use-case-cable-01.txt 
    
    
Status of this Memo 
    
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with Section 6 of BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 
   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html. 
    
   This Internet-Draft will expire on March 27, 2007.  
    
Copyright Notice 
    
   Copyright (C) The Internet Society (2006). 
    
    
Abstract 
    
   This document describes a typical use case of session peering in 
   cable industry. Caller Alice makes a VoIP call to Callee Bob. Alice 
   and Bob are served by two different cable operators, mso-o and mso-t. 
   mso-o and mso-t have bi-lateral peering agreement to peer at SIP 
   layer. This document focuses on the SIP layer interactions and 
   discuss some common practices for Layer 5 Peering in cable industry. 
    
    
 
 
Lee                     Expires March 20, 2006                [Page 1] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
 
 
Table of Contents 
    
   1. Introduction...................................................3 
   2. Terminology....................................................3 
   3. User Setup.....................................................6 
   4. Network Setup..................................................6 
   5. Call Setup.....................................................7 
   6. User Location Layer...........................................10 
   7. Session Routing Layer.........................................10 
      7.1 Number Probability........................................10 
      7.2 Topology Hiding Interworking Gateway Function.............11 
      7.3 Network Address Translation Function......................11 
      7.4 IPv4/IPv6 Interworking Function...........................13 
   8. Future Works..................................................14 
      8.1 Peering Policy............................................14 
      8.2 Peering Location Function.................................15 
      8.3 Peering Security..........................................15 
      8.4 Peering QoS...............................................15 
      8.5 Peering Accounting and Billing............................15 
   9. Security Considerations.......................................16 
   10. IANA Considerations..........................................16 
   11. Acknowledgements.............................................16 
   12. References...................................................16 
      12.1 Normative References.....................................16 
      12.2 Informative References...................................18 
   Authors’ Addresses...............................................18 
   Intellectual Property and Copyright Statements...................18 
    
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Lee                     Expires March 20, 2006                [Page 2] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
1. 
  Introduction 
    
   The purpose of this document is to outline the current best practice 
   use case for establishing interconnection of MSO/Cable service 
   Providers for delivery of SIP call termination over those 
   interconnections. These interconnections are to establish real-time 
   sessions between SIP servers at layer 5 network.  While voice calls 
   are the primary motivation for this today, other forms of real-time 
   communications are and will continue to evolve as natural additions 
   to such real-time sessions. This document depicts the network setup 
   and the steps involved in the call flow from a caller in originating 
   MSO network to a callee in another terminating MSO network, by using 
   Call Routing data (CRD) [ID.speermint-terminology] obtained though 
   ENUM services. The scenario is shown in the figure below; Alice calls 
   Bob where Alice and Bob are served by two different cable operators, 
   MSO-o and MSO-t, respectively. Both MSOs connect to an ENUM 
   [ID.speermint-terminology] server that provides ENUM service. Both 
   MSOs have full Layer 3 connectivity. We make no assumption whether 
   they directly peer to each other or through any Layer 3 transit 
   network. This document describes the Layer 5 Peering interactions 
   when Alice calls Bob. 
    
    
2. 
  Terminology 
    
    
   Figure 1 shows the logical entities involved in peering. 
    
    
    
        User Location Layer  
 
            +--------+                \               +--------+  
            | ENUM-o |------------|   /   |-----------| ENUM-t | 
            +--------+            |   \   |           +--------+ 
                                  |   /   |                  
                                  |   \   |  
            +--------+            |   /   |           +--------+  
            | DNS-o  |---------|  |   \   |  |--------| DNS-t  |  
            +--------+         |  |   /   |  |        +--------+  
                   \           |  |   \   |  |            /  
      --------------\----------|--|-------|--|-----------/------------  
        Session      \         |  |   /   |  |          /  
        Routing Layer \        |  |   \   |  |         /  
                       \       |  |   /   |  |        /  
                    +-------+  |  |   \   |  |  +-------+  
                    | SBE-o |-------------------| SBE-t |  
                    +-------+  |  |   \   |  |  +-------+  
                        |      |  |   /   |  |      |  
 
 
Lee                     Expires March 20, 2006                [Page 3] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
                        |      |  |   \   |  |      |  
                    +-------+  |  |   /   |  |  +-------+  
       +-------+    |       |--|  |   \   |  |--|       |    +-------+  
       | UE-o  |----| SM-o  |     |   /   |     | SM-t  |----| UE-t  |  
       +-------+    |       |-----|   \   |-----|       |    +-------+  
                    +-------+         /         +-------+      
                                      \  
                MSO-o                 /                 MSO-t  
    
    
                                   Figure 1 
    
    
   ENUM Server: An ENUM server stores the ENUM information and provides 
   an interface for ENUM query for peering cable operators. The input to 
   server is an E.164 number and the output is the NAPTR record. The 
   ENUM client resolves the NAPTR record to formulate a sip URI 
   associated to the input E.164 number. This ENUM server can be the 
   Public ENUM server that hosts namespace "e164.arpa" [ID.speermint-
   terminology] or Infrastructure ENUM server that hosts namespace 
   "(i)e164.arpa" [ID.enum-infrastructure]. 
    
   Using Public or Infrastructure ENUM is a business decision. Some 
   cable operators MAY deploy Infrastructure ENUM for peering in the 
   initial stage and migrate to Public ENUM when they see the need. In 
   this document, the only technical requirement for the ENUM server is 
   that it can return the associated NAPTR that can be resolved to a sip 
   URI of the users for peering. 
    
   Originating ENUM (ENUM-o): The ENUM server in the originating 
   network. 
    
   Terminating ENUM (ENUM-t): The ENUM server in the terminating 
   network. 
    
   In Figure 1, although we did not show any connection between ENUM-o 
   and ENUM-t, these two entities has a trusted relationship and MUST 
   provide a mechanism to synchronize the ENUM data. The synchronization 
   mechanism can be a simple manual flat file transfer via sftp. Or, it 
   can be more sophisticated and automated mechanism [ID.enum-
   validation-epp]. In this context, we assume that any 
   ADD/DELETE/MODIFY of the any ENUM record in one ENUM database that 
   affects the peering relationship MUST synchronize to the peer ENUM 
   server. 
    
   DNS [RFC1034]: DNS resolves the domain part of the sip URI to an IP 
   address so that SM or SBE can route the Request and Response to the 
   target. 
    
 
 
Lee                     Expires March 20, 2006                [Page 4] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   Originating DNS (DNS-o): The DNS server in the originating network. 
    
   Terminating DNS (DNS-t): The DNS server in the terminating network. 
    
   Similar to ENUM servers, we did not show the connection between DNS-o 
   and DNS-t. We assume that any ADD/DELETE/MODIFY of any DNS resource 
   record in one DNS server that affects the peer to locate the target 
   Signaling Path Border Element(SBE) MUST synchronize to the peer DNS 
   server. 
    
   Session Manager (SM): A SM is the entity responsible for sending and 
   receiving the SIP messages from or to Signaling Path Border Element 
   (SBE). It is also responsible for locating the user home proxy. SM is 
   logical, it MAY contain one functional entity or multiple functional 
   entities. For example, SM can be the P-CSCF, I-CSCF and S-CSCF 
   defined in IMS [23.228]. SM can also be the Call Manager Server (CMS) 
   defined in PacketCable (PC) 1.5 [PC1.5].  
    
   Originating SM (SM-o): The SM originates the call. In this content, 
   it is Alice's SM. 
    
   Terminating SM (SM-t): The SM terminates the call. In this content, 
   it is Bob's SM. 
    
   Signaling Path Border Element (SBE): A SBE [ID.speermint-terminology] 
   is the entity that peers to the external. In this context, it is the 
   border element that speaks SIP inside and outside the MSO network. It 
   also enforces peering policies.  
    
   To protect the communication channel between the two SBEs, SBE MUST 
   support TLS [RFC2246]. If the channel is secured by other security 
   mechanisms such as IPSec [RFC4301], or if the two SBEs peer directly 
   via dedicated private circuit, the MSOs MAY decide NOT to use TLS 
   because it is protected at the lower layer. 
    
   Optionally, SBE MAY provide additional functions such as Topology 
   Hiding Interworking Gateway function (THIG), Network Address 
   Translation (NAT) function, and SIP header normalization. 
    
   Originating SBE (SBE-o): The SBE connects the SM-o and the remote 
   SBE. 
    
   Terminating SBE (SBE-t): The SBE connects the SM-t and the remote 
   SBE. 
    
   User Endpoint (UE): User Endpoint is the client that makes or 
   receives calls. UE can be sip based or non-sip based. For non-sip 
   based UE, SM acts as a signaling gateway and translates the non-sip 
   signaling to sip signaling before sending to SBE. 
 
 
Lee                     Expires March 20, 2006                [Page 5] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
    
   Originating UE (UE-o): Alice's UE. 
    
   Terminating UE (UE-t): Bob's UE. 
    
    
3. 
  User Setup 
    
   Alice signs up a VoIP service with MSO-o. MSO-o assigns her a 
   globally unique E.164 number +1-215-111-2222. Also, MSO-o assigns her 
   an ENUM entry where +1-215-111-2222 maps to NAPTR record that 
   formulates sip URI <sip:alice@mso-o.com>. For Public ENUM, the E.164 
   number is in namespace e164.arpa. If MSO-o supports only 
   Infrastructure ENUM for peering, the E.164 number is in namespace 
   ie164.arpa. 
    
   Bob signs up with MSO-t and his globally unique E.164 number is +1-
   212-333-4444. MSO-t assigns him an ENUM entry where +1-212-333-4444 
   maps to a NAPTR record that formulates sip URI <sip:bob@mso-t.com>. 
   For Public ENUM, the E.164 number is in namespace e164.arpa. If MSO-t 
   supports only Infrastructure ENUM for peering, the E.164 number is in 
   namespace ie164.arpa. 
    
    
4. 
  Network Setup 
 
   In Figure 1, we divide the diagram into 2 layers: (1) User Location 
   Layer and (2) Session Routing Layer. User Location Layer is 
   responsible for locating the network serving the terminating UE. It 
   includes ENUM server and DNS server. Each of them provides different 
   services. 
    
   ENUM server accepts an E.164 number as input and returns a NAPTR 
   record to the ENUM client as output. ENUM client parses the regular 
   expression and formulates the sip URI associated to the input E.164 
   number. DNS server accepts a FQDN as input and returns either a SRV 
   record [RFC2782] or an A Resource Record as output. In the diagram, 
   SM has the interface to interact with both ENUM and DNS servers. SBE 
   has the interface to interact with DNS server only. 
    
   The actual SIP routing happens in the Session Routing Layer. It 
   includes UE-o, SM-o, SBE-o, UE-t, SM-t and SBE-t. UE-o and UE-t are 
   sip clients which can make VoIP call. 
    
   SM-o and SM-t are the home SIP proxies to UE-o and UE-t. SM-o and SM-
   t are enable to perform normal SIP routing operations defined in 
   [RFC3261]. In addition, it has an interface to access user profile 
   data associated to the registered user for authentication and 
   authorization. They also have ENUM and DNS clients built-in. They can 
 
 
Lee                     Expires March 20, 2006                [Page 6] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   issue ENUM query and formulate URI from the NAPTR records. SM makes 
   routing decision based on the user profile information and the 
   request URI. 
    
   SBE-o and SBE-t are the peering proxies where the actual peering 
   happens. SBE-o connects the SM-o to the remote SBE-t. SBE-o is the 
   last point in MSO-o's domain. SBE-o is responsible for establishing 
   the peering relation to SBE-t. MSO-o and MSO-t SHOULD have signed bi-
   lateral agreement. All the necessary peering policies and security 
   measurements such as THIG function and NAT function SHOULD be 
   performed in SBE. In the diagram, SIP messages flow between:  
    
           (UE-o)<->(SM-o)<->(SBE-o)<->(SBE-t)<->(SM-t)<->(UE-t) 
    
   We do not show the media in the diagram. Media can flow from UE-o to 
   UE-t directly or through some media proxy/gateway for NAT or media 
   transcoding. 
    
    
5. 
  Call Setup 
    
   Alice is a user served by MSO-o. She has a sip phone registered to 
   SM-o. She has an E.164 number +1-215-111-2222 and a public sip URI 
   <sip:alice@mso-o.com>. She picks up the phone and calls Bob. She 
   enters Bob's TN number +1-212-333-4444 into her key pad. Alice UE-o 
   initiates an INVITE with Bob's global unique tel URI [RFC3966] which 
   is <tel:+1-212-333-4444> in the request URI.  
    
   SM-o receiving the SIP INVITE SHOULD process it according to the 
   following logic: 
    
   1. Perform an ENUM query on the called party in the SIP request URI. 
    
   2. If the ENUM server fails to return the response, SM-o forwards the 
   call to PSTN. 
    
   3. ENUM server returns a NAPTR record. SM-o parses the regular 
   expression and formulates the sip URI of Bob which is <sip:bob@mso-
   t.com>. 
    
   4. SM-o finds out that it does not own "mso-t.com". SM-o has local 
   policies to send the request to SBE-o. 
    
   5. SM-o sends a DNS query to locate SBE-o’s IP address. 
    
   6. DNS returns SBE-o’s IP address to SM-o. SM-o sends the SIP INVITE 
   to SBE-o. SM-o MAY choose to record-route to stay on the signaling 
   path. 
 
 
 
Lee                     Expires March 20, 2006                [Page 7] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   7. SBE-o receives the SIP INVITE. It examines the request URI and 
   sends a query to DNS server to get the IP address of Bob’s domain 
   "mos-t.com". 
    
   8. SBE-o performs all the necessary operations such as sip header 
   normalization and THIG function and sends the INVITE to SBE-t. 
   Optionally, SBE-o MAY act as a SIP Back-to-Back User Agent (B2BUA). 
   This is necessary when SBE-o provides NAT function or IP version 
   translation function. Section 7.2 and 7.3 describes the steps. 
    
   9. SBE-t receives the INVITE. It examines the request URI to verify 
   the domain is one of its serving domains. If it is, SBE-t will 
   forward the INVITE to SM-t that has access to Bob's user data to 
   locate Bob’s home proxy. If not, SBE-t generates the proper SIP error 
   response and forwards it to SBE-o.  
    
   Based on the user profile information, SM-t MAY re-write the request 
   URI to something more location specific. For example, SM-t knows that 
   Bob's home proxy is the San Jose proxy, so it re-writes the request 
   URI to <sip:bob@sanjose-proxy.mso-t.com> to the INVITE and deliver 
   the message to the San Jose proxy directly. This location service is 
   internal to the domain. MSO-t MAY use internal DNS or some other 
   proprietary methods to retrieve the location information. MSO-t 
   chooses the method best fit to the internal architecture.  
    
   If SM-t fails to locate the user, SM-t will generate the proper sip 
   error response to SBE-t at which will propagate the error response to 
   SBE-o. Upon receiving the error response, based on the MSO-o’s 
   routing algorithm, SM-o MAY forward the call to PSTN to complete the 
   call. 
    
   10. SM-t receives the SIP INVITE. SM-t contains the registration 
   information of Bob’s UE-t. This is the home proxy which hosts the 
   contact information of Bob’s UE-t. SM-t forwards the SIP INVITE 
   request to UE-t. 
    
   11. Bob's UE-t receives the SIP INVITE request. Bob accepts the call. 
   UE-t sends the 200OK and Alice acknowledges it. 
    
   12. Alice and Bob starts 2-way conversation.  
    
    
   Figure 2 illustrates the message interactions: 
    
    
    
    
    
    
 
 
Lee                     Expires March 20, 2006                [Page 8] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
     UE-o   SM-o  SBE-o   DNS-o  ENUM   DNS-t  SBE-t  SM-t   UE-t 
      |      |      |      |      |      |      |      |      |  
      |INVITE|      |      |      |      |      |      |      |  
      |----->|      |      |      |      |      |      |      |  
      |      |     ENUM Query     |      |      |      |      |  
      |      |------------------->|      |      |      |      |  
      |      |     ENUM Response  |      |      |      |      |  
      |      |<-------------------|      |      |      |      |  
      |      |  DNS Query  |      |      |      |      |      |  
      |      |------------>|      |      |      |      |      |  
      |      | DNS Response       |      |      |      |      |  
      |      |<------------|      |      |      |      |      |  
      |      |INVITE|      |      |      |      |      |      |  
      |      |----->|      |      |      |      |      |      |  
      |      |      DNS Query     |      |      |      |      |  
      |      |      |----->|      |      |      |      |      |  
      |      |    DNS Response    |      |      |      |      |  
      |      |      |<-----|      |      |      |      |      |  
      |      |      |      |   INVITE    |      |      |      |  
      |      |      |-------------------------->|      |      |  
      |      |      |      |      |      |      |INVITE|      |  
      |      |      |      |      |      |      |----->|      |  
      |      |      |      |      |      |      |      |INVITE|  
      |      |      |      |      |      |      |      |----->|  
      |      |      |      |      |      |      |      |200OK |  
      |      |      |      |      |      |      |      |<-----|  
      |      |      |      |      |      |      | 200OK|      |  
      |      |      |      |      |      |      |<-----|      |  
      |      |      |      |    200OK    |      |      |      |  
      |      |      |<--------------------------|      |      |  
      |      | 200OK|      |      |      |      |      |      |  
      |      |<-----|      |      |      |      |      |      |  
      | 200OK|      |      |      |      |      |      |      |  
      |<-----|      |      |      |      |      |      |      |  
      | ACK  |      |      |      |      |      |      |      |  
      |----->|      |      |      |      |      |      |      |  
      |      |      |      |      |      |      |      |      |  
      |      | ACK  |      |      |      |      |      |      |  
      |      |----->|      |      |      |      |      |      |  
      |      |      |      |     ACK     |      |      |      |  
      |      |      |-------------------------->|      |      |  
      |      |      |      |      |      |      | ACK  |      |  
      |      |      |      |      |      |      |----->|      |  
      |      |      |      |      |      |      |      | ACK  |  
      |      |      |      |      |      |      |      |----->|  
      |      |      |      |      |      |      |      |      |  
      |      |      |      |2-Way Media  |      |      |      |  
      |<=====================================================>|  
      |      |      |      |      |      |      |      |      |  
 
 
Lee                     Expires March 20, 2006                [Page 9] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
      |      |      |      |      |      |      |      |      |  
      |      |      |      |      |      |      |      |      |  
    
                               Figure 2 
    
    
6. 
  User Location Layer 
      
   In the call flow shown in Figure 2, when SBE-o receives the SIP 
   INVITE request from SM-o, SBE-o queries DNS to resolve the IP address 
   of the domain "mso-t.com". SBE-o MAY choose not to query DNS server 
   to resolve "mso-t.com". By examining the domain part of Bob's sip 
   URI, SM-o knows that "mso-t.com" is one of its trusted peer. In many 
   cases, SBE-o's configuration will have static configuration pointing 
   to a static IP address associated to SBE-t. There is number of 
   reasons to have this setup. Most common reason is security such that 
   SBE-o only peers to the pre-configured IP address. In this setup, 
   SBE-o MAY skip querying DNS to resolve the domain name of the remote 
   target. That said, it does not stop SBE-o to use DNS to resolve the 
   domain name. 
    
   Only SM has an interface to ENUM server to resolve the E.164 number 
   to sip URI. When SM-o queries the ENUM server and realizes that Bob 
   resides in a different domain, SM-o will re-write the request URI 
   from Bob's sip URI before sending the request to SBE-o. 
    
   When SBE-o sends a query to the DNS for "mso-t.com", it MAY return an 
   A-record or a SRV record of SBE-t. Hence, SBE-o MUST prepare to 
   accept a SRV record and try to reach the available SBE-t in the 
   returned list. Once SBE-o selects a SBE-t, it SHOULD stick with the 
   same SBE-t for the duration of the call. This is important because 
   peering policies MAY vary from session to session. So, SBE-t will 
   contain the peering state of that particular session. 
    
    
7. 
  Session Routing Layer 
 
   Session Routing Function performs generic SIP routing function. With 
   regard to session peering in cable environment, there are few 
   specific functions that cable operators MAY consider to support. 
    
    
7.1 
   Number Probability 
    
   [RFC3482] describes the overview of E.164 telephone number 
   portability (NP) which allows telephony subscribes to carry their 
   numbers to any service provider. Since NP impacts the call routing 
   decision algorithm, additional NP-related information is required to 

 
 
Lee                     Expires March 20, 2006               [Page 10] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   carry in the request URI for making routing decision. [ID.iptel-tel-
   np] defines the necessary NP-related information in the tel URI. 
    
   For VoIP peering, when SM-o receives a call setup request from UE-o 
   and decides to route the call to PSTN due to routing policies, SM-o 
   requires the NP information in order to route the call if the target 
   number is ported. Consider the User Setup stated in Section 3 with 
   the following modification: 
    
      Bob’s geographical telephone number is "+1-212-333-4444" and is 
      ported to "+1-212-999-0000". 
    
   Assume that this information has been provisioned in the ENUM-o. When 
   SM-o queries ENUM-o for +1-212-333-444, ENUM-o will return both Bob’s 
   sip URI and tel URI with the NP information: 
    
      - sip:bob@mso-t.com 
      - tel:+1-212-333-4444;npdi;rn=+1-212-999-0000 
    
   Based on SM-o routing decision algorithm, if MSO-o decides to 
   complete the call via PSTN, SM-o will have the necessary NP 
   information in Bob’s tel URI. 
    
    
7.2 
   Topology Hiding Interworking Gateway Function 
    
   In the case SBE-o performs THIG. PP-o SHOULD remove the proxies 
   written in Via and Record-Route headers and replace itself to the Via 
   and Record-Route headers. When SBE-o sends a message to SBE-t, it 
   will look the same as SBE-o is the only proxy in MSO-o. Similarly, 
   when SBE-t sends a message to SBE-o, the message will look the same 
   as SBE-t is the only proxy in MSO-t. Alternately, SBE-o MAY act as 
   B2BUA such that it is the UAC to the peer. 
    
    
7.3 
   Network Address Translation Function 
 
   In Figure 2, we assume that the UE-o and UE-t use public routable IP 
   addresses so that they can establish direct peer-to-peer 2-way 
   conversation. However, some cable operators use [RFC1918] addresses 
   for their UEs. Since those addresses are not routable outside its 
   domain, UE-o and UE-t require some way to perform NAT function. NAT 
   is problematic in SIP. Detailed description can be found in 
   [RFC3489]. The NAT function can happen in two places, it can happen 
   in either the edge layer or the network layer. Either way, the 
   network MUST pass the NAT information to the session layer. This 
   requires some form of communications between the session layer and 
   network layer. There are several protocols [RFC3489, ID.behave-turn, 
   ID.mmusic-ice] being worked out in IETF. 
 
 
Lee                     Expires March 20, 2006               [Page 11] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
    
   If UE is aware of NAT, it will be responsible for putting the public 
   transport address in the SIP/SDP. UE MAY use ICE [ID.mmusic-ice] to 
   discover the best possible way such as STUN [RFC3489] or TURN 
   [ID.behave-turn] to overcome NAT. However, this requires both UEs to 
   support ICE. ICE runs a STUN server per transport address, this adds 
   significant load to UE. In today cable environment, the most common 
   UE is the Embedded Media Termination Adaptor (eMTA), they have 
   limited memory and processing power, so they MAY require hardware 
   upgrade to support ICE. 
    
   If UE is unaware of any NAT, it will simply put its [RFC1918] address 
   in the SIP/SDP and sends the SIP message to SM. It relies on the 
   network to perform the NAT function. Consider a UE-o wants to make a 
   call to UE-t, UE-o uses [RFC1918] address. In this setup, the 
   originating MSO-o is responsible for NAT function. The NAT function 
   MAY happen in the access network or at the network border. Regardless 
   where it happens, MSO-o MUST replace the [RFC1918] address in the 
   session layer before sending the SIP message to MSO-t. MSO-t also 
   needs to relay the media packets before sending the traffic to UE-t. 
   Since it is not well defined how to pass the NAT information between 
   network layer and session layer, most cable operators chooses SBE to 
   perform the NAT function. Figure 3 shows the network setup.  
    
    
                                       / 
                   +-------+ call-leg-2\       +-------+  
                   | SBE-o |-------------------| SBE-t |  
                   +-------+           \       +-------+  
         call-leg-1   |   \            /           |  
                      |    \undefined  \           |  
                   +-------+\          /       +-------+  
      +-------+    |       | \         \       |       |    +-------+  
      | UE-o  |----| SM-o  |  \        /       | SM-t  |----|  UE-t |  
      +-------+    |       |   |       \       |       |    +-------+  
          ||       +-------+   |       /       +-------+        || 
          ||                   |       \                        || 
          ||         Priv +-------+ Pub/                        || 
          ||==============| Media |=============================|| 
                  RTP     | Relay |    \          RTP 
                          |  GW   |    / 
                          +-------+    \ 
                                       / 
                         MSO-o         \           MSO-t 
                                       / 
    
                                   Figure 3 
    
    
 
 
Lee                     Expires March 20, 2006               [Page 12] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   In this setup, SBE-o acts as a B2BUA. When SBE-o receives the SIP 
   INVITE request, it terminates the INVITE (Call-Leg-1) and creates a 
   new INVITE (Call-Leg-2) to relay the header information to MSO-t. 
   SBE-o creates the Private-to-Public address binding between the 
   internal and external networks and perform any necessary address 
   translation in the SIP header. The address translation of signaling 
   happens in SBE-o, the address translation of media MAY happen in a 
   different physical entity. To allow this, SBE-o and the Media Relay 
   Gateway require to exchange Private-to-Public address binding 
   information. UE-o sees SBE-o the UAS and forwards all the SIP 
   messages to SBE-o. UE-t sees SBE-o the UAC and forwards all the SIP 
   messages to SBE-o. Media passes through the Media Relay Gateway in 
   MSO-o for NAT binding for the media stream. 
    
    
    
7.4 
   IPv4/IPv6 Interworking Function 
    
   Some cable operators are actively working on IPv6 [RFC1883]. This 
   allows an IPv6 device to register to SM. Many UEs in the market 
   support IPv4/IPv6 dual stacks. During provisioning, the cable 
   operator MAY offer IPv4, IPv6 or both addresses to it. For the 
   discussion here, we restrict that a UE can choose to register with 
   either an IPv4 or an IPv6 address [RFC3483]. In other words, a UE can 
   only register to SM with one IP address, either an IPv4 or an IPv6 
   address. During IPv4/IPv6 transition [RFC2893], the cable operator 
   which runs IPv4/IPv6 dual stacks (MSO6) will probably peer with many 
   IPv4 only peers. When setting up sessions with them, MSO6 MUST 
   perform all the necessary translations inside the MSO6’s network. 
   IPv4 peer cable operator (MSO4) does not understand IPv6 address. 
   From the MSO4 point of view, it sees MSO6 an IPv4 network. 
    
   Consider an example, an IPv6 device (UE6-o) wants to make a call to 
   an IPv4 device (UE4-t). UE6-o registers to a cable operator which 
   runs dual stacks (MSO6-o). UE4t registers to an IPv4 cable operator 
   (MSO4-t). Figure 4 shows the network setup.  
    
    
                                       / 
                   +-------+ call-leg-2\       +-------+  
                   | SBE-o |-------------------| SBE-t |  
                   +-------+ IPv4      \       +-------+  
           Call-leg-1 |   \            /           |  
              IPv6    |    \undefined  \           |  
                   +-------+\          /       +-------+  
      +-------+    |       | \         \       |       |    +-------+  
      | UE6-o |----| SM-o  |  \        /       | SM-t  |----| UE4-t |  
      +-------+    |       |   |       \       |       |    +-------+  
          ||       +-------+   |       /       +-------+        || 
 
 
Lee                     Expires March 20, 2006               [Page 13] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
          ||                   |       \                        || 
          ||         IPv6 +-------+ IPv4                        || 
          ||==============| Media |=============================|| 
                  RTP     | Relay |    \          RTP 
                          |  GW   |    / 
                          +-------+    \ 
                                       / 
                         MSO6-o        \          MSO4-t 
                      (mso-o.com)      /       (mso-t.com) 
    
                                   Figure 4 
    
    
   To form a session between UE6o and UE4t, MSO6-o MUST translate UE6-
   o’s IPv6 address to an IPv4 address. This translation is similar to 
   NAT function discussed in Section 7.2. SBE-o performs any necessary 
   IPv6-to-IPv4 address translation. When SBE-o receives the INVITE from 
   SM-o, it sends a DNS query for domain "mso-t.com". Since MSO4-t 
   supports only IPv4, the DNS will return an IPv4 address to SBE-o. 
   Upon receiving the response, SBE-o realizes that it needs to perform 
   IPv4/IPv6 interworking function. SBE-o allocates IPv4 addresses and 
   ports from its IPv4 address pool and creates the IPv6-to-IPv4 address 
   binding. It also instructs the Media Relay Gateway to do the same for 
   media relay. 
    
    
8. 
  Future Works 
    
   This document illustrates a simple use case for session peering in 
   cable industry. We describe the major entities that participate the 
   peering. We also outline the high-level interactions between these 
   entities. From the interactions, we see some areas for future work. 
    
   - Peering Policy 
    
   - User Location Service 
    
   - Peering Security 
    
   - Peering QoS 
    
   - Peering Accounting and Billing 
    
    
    
8.1 
   Peering Policy 
    
   Currently most of the peering policies are local to the domain and 
   statically configured. There MAY be needs for the two trusted peers 
 
 
Lee                     Expires March 20, 2006               [Page 14] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   to exchange peering policies. These need further investigation in the 
   working group. 
    
    
    
8.2 
   Peering Location Function 
    
   ENUM and DNS provide a way to locate the peering point of a peer 
   domain. Once the request enters the home domain, SM uses [RFC3263] to 
   locate the next-hop proxy of the target. There MAY be needs to 
   provide more sophisticated information than what ENUM and DNS provide 
   today. This is future item for the working group. 
    
    
8.3 
   Peering Security 
    
   There are existing security mechanisms today to ensure peer 
   authentication. Most current peering deployments use TLS or other 
   similar mechanism to ensure security channel. SBE MUST support TLS 
   for transport. When two MSOs peer via an untrusted connection, SBE 
   MUST use TLS. For the TLS, client certification MUST be supported. 
   SIP-level domain validation for certification SHOULD be used for 
   untrusted connection if the two SBEs peer directly together at Layer-
   5. 
    
   This MAY not scale well when an operator tries to peer with few 
   hundred peers. This happens for cable operators provide peering 
   service to large numbers of enterprise customers. Peering security is 
   a working item for the working group. 
    
    
8.4 
   Peering QoS 
    
   Even thought we do not discuss media QoS in the use case, media QoS 
   most impacts the user experience. For some critical services, 
   guaranteed media QoS is a MUST. SIP has defined a framework for pre-
   condition in SIP [RFC3312, RFC4012]. This framework is for the UA to 
   request end-to-end QoS for media. But, it is unclear how to propagate 
   the session information to the lower network layer when a QoS media 
   session is needed. This requires collaborate effort between working 
   groups to identify the requirements. 
    
    
8.5 
   Peering Accounting and Billing 
    
   In today PSTN peering model, two cable operators compare the outbound 
   minutes for accounting. For Internet peering, they compare the total 
   bandwidth of outbound traffic for accounting. For session peering, it 
   is unclear what is the right model for accounting and billing. 
 
 
Lee                     Expires March 20, 2006               [Page 15] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   Session peering is similar to Internet service, the PSTN peering 
   accounting model MAY not fit very well. Today, most cable operators 
   do not charge users for per minute usage for Internet. Instead, they 
   charge them for bandwidth usage. For the Internet peering accounting 
   model, since signaling and media can possibly travel in two different 
   paths, signaling itself does not necessary convey the accurate 
   bandwidth usage to the cable operators. 
    
    
9. 
  Security Considerations 
    
   Security is a major area for session peering. We MUST prevent 
   unauthenticated peer from making calls to the network and protect the 
   network from DoS attack at session layer. A lot of security work has 
   been done on other working groups to ensure channel security and user 
   authentication. We SHOULD evaluate them and develop some 
   recommendations to the working group. 
    
    
10. 
   IANA Considerations 
    
   This document has no IANA considerations. 
    
    
11. 
   Acknowledgements 
 
   Special thanks go to Gaurav Khandpur, Tom Creighton, Jason Livingood 
   and Jean-François for their valuable input to this documents 
    
    
12. 
   References 
    
12.1 
    Normative References 
    
   [ID.behave-turn] Rosenberg, J., Mahy, R. and Huitema, C., "Obtaining 
   Relay Addresses from Simple Traversal of UDP Through NAT (STUN)", I-D 
   draft-ietf-behave-turn-01, February 2006. 
    
   [ID.enum-validation-epp] Hoeneisen, B., "ENUM Validation Information 
   Mapping for the Extensible Provisioning Protocol", I-D draft-ietf-
   enum-validation-epp-03.txt, February 2006. 
    
   [ID.enum-infrastructure] Livingood, J., Pfautz, P. and Stastny, R., 
   "The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation 
   Discovery System (DDDS) Application for Infrastructure ENUM", I-D 
   draft-ietf-enum-infrastructure-00, February 2006. 
 
   [ID.iptel-tel-np] Yu, J. "Number Portability Parameters for the "tel 
   URI", I-D draft-ietf-iptel-np-11, August 2006. 
 
 
Lee                     Expires March 20, 2006               [Page 16] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
    
   [ID.mmusic-ice] Rosenberg, J., "Interactive Connectivity 
   Establishment (ICE): A Methodology for Network Address Translator 
   (NAT) Traversal for Offer/Answer Protocols", I-D draft-ietf-mmusic-
   ice-10, August 2006. 
    
   [ID.speermint-terminology] Meyer, D., "SPEERMINT Terminology ", I-D 
   draft-ietf-speermint-terminology-06.txt, September 2006. 
    
   [RFC1034] Mockapetris, P., "Domain Names – Concepts and Facilities", 
   RFC 1034, November 1987. 
    
   [RFC1883] Deering, S. and Hinden, R., "Internet Protocol, Version 6 
   (IPv6) Specification", RFC 1883, December 1995. 
    
   [RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J. 
   and Lear E., "Address Allocation for Private Internets", RFC 1918, 
   February 1996. 
    
   [RFC2782] Gulbrandsen, A., Vixie, P. and Esibov, L., "A DNS RR for 
   Specifying the location of services (DNS SRV)", RFC 2782, February 
   2000. 
    
   [RFC2893] Gilligan, R., "Transition Mechanisms for IPv6 Hosts and 
   Routers", RFC 2893, August 2000. 
 
   [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, 
   A., Peterson, J., COarks, R., Handley, M., and E. Schooler, "SIP: 
   Session Initiation Protocol", RFC 3261, June 2002. 
    
   [RFC3263] Rosenberg, J. and H. Schulzrinne, "Session Initiation 
   Protocol (SIP): Locating SIP Servers", RFC 3263, June 2002. 
    
   [RFC3312] Camarillo, G., Marshall, W. and Rosenberg., J., 
   "Integration of Resource Management and Session Initiation Protocol 
   (SIP)", RFC 3312, October 2002. 
    
   [RFC3403] Mealling, M., "Dynamic Delegation Discovery System (DDDS) 
   Part Three: The Domain Name System (DNS) Database", RFC 3403, October 
   2002.  
    
   [RFC3482] Foster, M., McGarry, T. and Yu, J., "Number Portability in 
   the Global Switched Telephone Network (GSTN): An Overview", RFC 3482, 
   February 2003. 
     
   [RFC3483] Draves, R., "Default Address Selection for Internet 
   Protocol version 6 (IPv6)”, RFC 3483, February 2003. 
    

 
 
Lee                     Expires March 20, 2006               [Page 17] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   [RFC3489] Rosenberg, J., Weinberger, J., Huitema, C. and Mahy, R., 
   "STUN - Simple Traversal of User Datagram Protocol (UDP) Through 
   Network Address Translators (NATs)", RFC 3489, March 2003. 
    
   [RFC3966] Schulzrinne, H., "The tel URI for Telephone Numbers", RFC 
   3966, December 2004. 
    
   [RFC4032] Camarillo, G. and Kyzivat, P., "Update to the Session 
   Initiation Protocol (SIP) Preconditions Framework", RFC 4032, March 
   2005. 
 
 
12.2 
    Informative References 
    
   [23.228] 3GPP TS 23.228 V7.6.0, "IP Multimedia Subsystem (IMS); Stage 
   2 (Release 7)", March, 2006. 
    
   [PC1.5] CableLabs, "PacketCable 1.5 Architecture Framework Technical 
   Report" PKT-TR-ARCH1.5-V01-050128, January, 2005. 
    
   [RFC2246] Dierks, T. and Allen, C., "The TLS Protocol Version 1.0", 
   RFC 2246, January 1999. 
    
   [RFC4301] Kent, S. and Seo, K. "Security Architecture for the 
   Internet Protocol", RFC 4301, December 2005. 
    
    
Authors’ Addresses 
    
   Yiu L. Lee 
   Comcast Cable Communications 
   1500 Market Street, 
   Philadelphia, PA 19102 
   US 
    
   Phone: +1-215-320-5894 
   Email: yiu_lee@cable.comcast.com 
 
    
Intellectual Property and Copyright Statements 
    
   Intellectual Property Statement 
    
   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
 
 
Lee                     Expires March 20, 2006               [Page 18] 
Internet-Draft       Speermint Use Case for Cable   September 27, 2006 
 
 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 
    
   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 
    
   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at  
   ietf-ipr@ietf.org. 
 
   Disclaimer of Validity 
    
   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
    
    
   Copyright Statement 
    
   Copyright (C) The Internet Society (2006).  This document is subject 
   to the rights, licenses and restrictions contained in BCP 78, and 
   except as set forth therein, the authors retain all their rights. 
    
    
   Acknowledgment 
    
   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 











 
 
Lee                     Expires March 20, 2006               [Page 19] 


PAFTECH AB 2003-20262026-04-23 11:57:12