P_protocolos_sobre%20IP.pdf

Embed Size (px)

Citation preview

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    1/82

    1

    Protocolos sobre IP

    Fausto Vasco

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    2/82

    2

    Objetivos

    • Queremos hacer una descripción rápida de los protocolosde comunicaciones que más influencian el mercado

    actual:

     – Frame Relay

     – X.25

     – MPLS

     – SIP

     – H323 – NGN

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    3/82

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    4/82

    4

    X.25

    • X.25 is an ITU-T standard data l ink layer pro toco l for packetswi tched WAN communication.

    • An X.25 WAN consists of packet-switching exchange (PSE ) nodes as

    the networking hardware, and leased l ines , POTS connections or

    ISDN connections as physical links .

    • X.25 is part of the OSI pro toco l sui te , a family of protocols that was

    used especially during the 1980s .

    • X.25 is today to a large extent replaced by less complex protocols

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    5/82

    5

     Addressing and virtual circuits

    • X.25 supports two types of vir tual circui ts : –  Switched Vir tual Circui ts (SVC ) which are established as and when required

    through a cal l establ ishm ent and clear ing pro cedure 

     –  Permanent Virtual Circu its (PVC ) which are preconf igured into the network.

    • VC may be established using X.121 addresses.• The X.121 address consists of:

     –  three-digi t Data Country Code (DCC ) plus a network dig i t , together forming the

    four-dig i t Data Network Identification Code (DNIC ),

     – followed by the National Terminal Number (NTN ) of at most ten digi ts .

    • Note the use of a single netwo rk dig i t , seemingly allowing for only

    10 netwo rk carr iers per coun try , but some countries are assigned

    more than one DCC to avoid this limitation.

    • One DTE-DCE inter face to an X.25 network has a maximum o f

    4095 log ical channels on which it is allowed to establish virtual

    cal ls and permanent vir tual circui ts .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    6/82

    6

     Architecture

    • The general concept o f X.25 was to create a universal andglobal packet-sw i tched netwo rk.

    • Much of the X.25 sys tem is a description of the r igorous error

    correct ion needed to achieve this, as well as more eff icientshar ing of capital-intensive phys ical resources .

    • The X.25 specification defines only the interface between a

    subscr iber (DTE) and an X.25 network (DCE).

    • Replaced by Frame Relay is now considered an obsolete

    pro toco l .

    • X.25 was the base to new pro toco ls like Frame Relay and

    ATM which  use extensively the Virtual Circu i ts .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    7/82

    7

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    8/82

    8

     An Efficient and Flexible WAN Technology

    • Frame Relay has become the most w idely used WAN techno logy . – primarily because of its pr ice and f lexibi l i ty .

    • Frame Relay reduces netwo rk costs by using less equipm ent , less

    complexi ty , and an easier implementat ion .

    • With increasing globalization and the grow th of one-to-many

    branch of f ice topo logies , Frame Relay offers simpler network

    architecture and lower cost of ownership.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    9/82

    9

    The Frame Relay WAN

    • Frame Relay has low er overhead than X.25 because it hasfewer capabilities.

     – Frame Relay does not provide error correct ion .

    • This is left to higher layers.

     – The Frame Relay node simp ly drops packets without notification when

    it detects errors .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    10/82

    10

    The Frame Relay WAN

    • Frame Relay handles vo lume and speed eff ic ient ly bycombining the necessary funct ions o f the L2 and L3 into one

    simple protocol.

    • As a data l ink proto co l , Frame Relay provides: –  Access to a network,

     –  Delimits and del ivers frames in proper order, and

     –  Recognizes transmission errors through a standard CRC .

    • As a network pro toco l , Frame Relay provides: –  Mult ip le logical connect ions over a single physical circuit and

     – Allows the network to rou te data over those connections.

    • Frame Relay operates between an end -user device , such asa LAN bridge or router , and a netwo rk .

     – Some networks use Frame Relay itself , but others use digi ta l ci rcui t

    swi tch ing or ATM cel l relay systems.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    11/82

    11

    Virtual Circuits

    • The connect ion through a Frame Relay network between twoDTEs is called a vi r tual ci rcui t (VC ).

     – There is no direct electr ical connect ion from end to end.

     – The connection is logical .

     – With VCs , Frame Relay shares the bandwidth among mult ip le users

    and any single si te can communica te with any other single si te

    w i thout using mult ip le dedicated physical l ines .

    • There are two ways to establish VCs: –  SVC 

     –  PVC 

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    12/82

    12

    Local Significance

    • VCs provide a bid i rect ional communication path from onedevice to another.

    • VCs are ident i f ied by DLCIs .

     – Typically are ass igned by the service provider . –  Local signi f icance , which means that the values themselves are not

    unique in the Frame Relay WAN .

     – Two devices connected by a VC may use a dif ferent DLCI value to

    refer to the same connect ion .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    13/82

    13

    Local Significance

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    14/82

    14

    Multiple VCs

    • Frame Relay is stat ist ical ly mult ip lexed , meaning that itt ransm its on ly one frame at a t ime , but that many logical

    connect ions can co-exist on a sing le phys ical line .

    • The rou ter connected to the Frame Relay network may havemult ip le VCs connecting it to various endpoints .

     –  Mult iple VCs on a single physical line are dist inguished because each

    VC has its own DLCI .

     – Very cost-effect ive  –  Each endpoint needs only a single access l ine and interface .

     –  Average bandw idth requirement of the VCs, rather than on the

    maximum bandwid th requirement.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    15/82

    15

    The Frame Relay Encapsulation Process

    • Frame Relay is a Layer 2 pro toco l . –  Frame Relay accepts a packet f rom a network layer protocol such as

    IP.

    • It then wraps it with an address f ield that contains the DLCI and a

    checksum .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    16/82

    16

    Frame Relay Topologies

    • When more than two si tes are to be connected, you mustconsider the topo logy of the connections between them.

    • Every network or network segment can be viewed as being one

    of three topo logy types : –  Star (hub and spoke) –  fu l l mesh , or

     –  part ial mesh .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    17/82

    17

    Frame Relay Address Mapping

    • Before a router is able to t ransmit data over Frame Relay, itneeds to know which local DLCI maps to the Layer 3

    address of the remo te dest inat ion .

    • This address-to-DLCI mapping can be accompl ished eitherby:

     –  stat ic mapping 

    • By entering a static map

     –  dynamic mapping .• Inv erse ARP.- The Frame Relay rou ter sends out Inverse ARP requests on

    its PVC to d iscover the L3 address of the remote device.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    18/82

    18

    Local Management Interface (LMI)

    • The Frame Relay or ig inal design provides packet -sw i tched datatransfer with min imum end-to-end delays .

    • The original design om i ts anyth ing that might contr ibu te to delay .

    • When vendors implemented Frame Relay as a separate

    technology rather than as one component of ISDN, they decided that

    there was a need for DTEs to dynam ical ly acquire informat ion

    about the status of the network.

     – The orig inal design did not inc lude this feature.

     – A consor t ium of Cisco, DEC, Northern Telecom, and StrataCom extended the

    Frame Relay pro toco l to provide addit ional capabi l i t ies for complex 

    internetworking environments.

     – These extensions are referred to collectively as the LMI .

    • Basically, the LMI is a keepal ive mechan ism that provides status informat ion about Frame Relay connec tions between the router 

    (DTE ) and the Frame Relay sw itch (DCE ).

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    19/82

    19

    Local Management Interface (LMI)

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    20/82

    20

    LMI Extensions

    • LMI extensions are extremely useful in an internetworking environment.VC status messages

    • Informs PVC integri ty by communicating and synchron izing between

    devices , periodically repo rt ing new PVCs and the delet ion of PVCs .

    • Prevent data from being sent into black holes (VCs that no longer exist).Multicasting

    • Multicasting supports the eff ic ient del ivery o f rout ing proto col messages

    and address resolut ion p rocedures that are typically sent to many

    dest inat ions simul taneously .Global addressing

    • Gives connection ident i f iers glo bal rather than local signi f icance 

    • This makes the Frame Relay network resemb le a LAN in terms of

    addressing , and ARPs perform exactly as they do over a LAN.

    Simple flow control

    • Provides for an XON/XOFF f low contro l mechanism that applies to the

    entire Frame Relay interface.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    21/82

    21

    LMI

    • The three possib le PVC states are as follows: –   Active state – Indicates that the connect ion is act ive and that routers

    can exchange data.

     –  Inactive state – Indicates that the local connect ion to the Frame Relayswitch is work ing , but the remote rou ter connection to the Frame Relayswitch is not wo rk ing .

     –  Deleted state – Indicates that no LMI is being received from the FrameRelay swi tch , or that there is no service between the CPE router and

    Frame Relay switch.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    22/82

    22

    Frame Relay Key Terminology

    • There are some key terms and concepts to learn : Access rate or port speed

    • The speed of the line is the access speed or po rt speed .

    Access rate is the rate at which your access ci rcu i ts  join theFrame Relay network .

     –  Port speeds are clocked on the Frame Relay sw itch .

     – It is not possib le to send data at higher than po rt speed .

    Committed Information Rate (CIR)

    • Customers nego tiate CIRs with service providers for each

    PVC .

    • The service pro vider guarantees that the customer can senddata at the CIR .

    • All frames received at or below the CIR are accepted.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    23/82

    23

    Frame Relay Key Terminology

    • A great advantage of Frame Relay is that any netwo rk capaci ty that isbeing unused is made available or shared with al l customers , usually at

    no extra charge .

    • This al lows custom ers to "burs t " over their CIR as a bonus.

    Oversubscription

    • Service prov iders sel l more capaci ty than they have on the assumption

    that not everyone wi l l demand their entitled capacity al l of the time .

    • Because of oversubscr ip t ion , there will be instances when the sum of CIRs 

    from mult iple PVCs to a given location is higher than the port or access 

    channel rate . – This can cause t raff ic issues , such as congest ion and dropp ed traf f ic .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    24/82

    24

    Paying for Frame Relay: Bursting

    • Frame Relay can allow custom ers to dynamically access this extrabandwidth and "burs t " over their CIR for free .

    • Various terms are used to descr ibe bu rst rates including the Committed

    Burst Information Rate (CBIR ) and Excess Burst Size (BE ).

    CBIR• Is a negot iated rate abo ve the CIR which the customer can use to transmit

    for shor t burs t . It allows traffic to burs t to higher speeds , as available

    network bandwidth permits.

     – However, it cannot exceed the po rt speed of the link. – The durat ion of a burs t transmission is the Comm it ted Time .

    • Frames submitted at this level are marked as Discard Eligible (DE ).

    BE

    • The BE is the term used to desc ribe the bandw idth avai lable above theCBIR up to the access rate of the link . –  BE , is no t negotiated .

     –  Frames may be transmit ted at this level but wi l l most l ike ly be dropped .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    25/82

    25

    Paying for Frame Relay: Bursting

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    26/82

    26

    Frame Relay Flow Control

    • Frame Relay reduces network overhead by implementingsimple

    congest ion-not i f icat ion mechanisms.

     –  Forward Explicit Congestion Notification (FECN )

     –  Backward Explicit Congestion Notification (BECN ).

     –  Discard El igib i l i ty (DE ) bit, which identifies less important traff ic that

    can be dropped during congest ion periods.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    27/82

    27

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    28/82

    28

    Objectives

    • Describe Multiprotocol Label Switching (MPLS) features andoperat ion .

    • Identi fy the f ields and format of an MPLS label .

    • Describe the purpose of the cont ro l and data p lanes in theMPLS architecture.

    • Describe the funct ion and archi tecture of Label Switch

    Routers (LSRs ) and Edge LSRs .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    29/82

    29

    WAN Topologies

    • With MPLS, a si te requ ires only one connect ion to theMPLS SP .

     –  High-performance method for forwarding packets through a network.

     –  Enables rou ters at the edge o f a network to apply simple labels in the

    form of numbers to these packets.

     –  Routers can then swi tch packets according to labels , incurring minimal 

    overhead for rout ing lookup .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    30/82

    30

    Basic Mult iprotocol Label Switching (MPLS) Features

    • MPLS reduces rou ting lookups .• MPLS fo rwards packets based on labels .

    • Labels usually correspond to IP dest inat ion network s (equal

    to traditional IP forwarding).• Labels can also correspond to other parameters :

     – Layer 3 VPN destination

     – Layer 2 circuit

     – Outgoing interface on the egress router 

     – QoS

     – Source address

    • MPLS suppor ts forwarding of all Layer 3 pro tocols , not justIP.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    31/82

    31

    MPLS Operation

    • Only edge routers must perform a rout ing lookup .• Core rou ters sw itch packets based on simple label lookups 

    and swap labels .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    32/82

    32

    Cisco IOS Platform Switching Mechanisms

    • Process switching, or routing table-driven switching: – Full lookup is performed at every packet

    • Fast switching, or cache-driven switching:

     – Most recent destinations are entered in the cache

     – First packet is always process-switched

    • Topology-driven switching:

     – CEF (prebuilt FIB table)

     – incorporates the best of theprevious switching mechanisms.

    CEFCEF

    CEFCEF

    Cisco Express Forwarding

    Forwarding Information Base (FIB)

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    33/82

    33

    Standard IP Switching Overview

    .

    .

    .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    34/82

    34

    CEF Switching Overview

    .

    .

    .

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    35/82

    35

    MPLS Switching Overview

    Edge LSR 

    MPLSIP

    R1

    Edge LSR 

    R3 LSR R2 LSR 

    R6

    Edge LSR 

    Station A Station B

    IP Domain

    L

    LabelInstructions

    Internal Table

    LSR 

    MPLSMPLS

    R4 LSR R5 LSR  

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    36/82

    36

    MPLS Characteristics

    • MPLS technology is intended to be used anywhere, – regardless of Layer 1 media and Layer 2 protocol.

    • MPLS uses a 32-bit label field that is inserted between Layer 2

    and Layer 3 headers (frame mode MPLS).

    • MPLS over ATM uses the ATM header as the label (cell mode

    MPLS).

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    37/82

    37

    Label Format

    Field Description

    20-bit label The actual label. Values 0 to 15 are reserved.

    3-bit experimental (EXP)

    field

    Undefined in the RFC. Used by Cisco to define a class of

    service (CoS) (IP precedence).

    1-bit bottom-of-stack

    indicator 

    MPLS allows multiple labels to be inserted. The bottom-

    of-stack bit determines if this label is the last label in thepacket. If this bit is set (1), the setting indicates that this

    label is the last label.

    8-bit Time to Live (TTL)

    field

    Has the same purpose as the TTL field in the IP header.

    Label Stack

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    38/82

    38

    Label Stack

    • PID in a Layer 2 header specifies that the payload starts with a

    label (or labels) and is followed by an IP header.

    • The bottom-of-stack bit indicates whether the next header is

    another label or a Layer 3 header.

    • Receiving router uses the top label only.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    39/82

    39

    Frame Mode MPLS Operation

    Note: The type or protocol ID field indicates as MPLS enabled layer-3 protocol.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    40/82

    40

    Major Components of MPLS Architecture

    • Control plane: – Exchanges routing information and labels

     – Contains complex mechanisms, such as OSPF, EIGRP, IS-IS, and BGP,

    to exchange routing information

     – Exchanges labels, such as LDP, BGP, and RSVP

    • Data plane:

     – Forwards packets based on labels

     – Has a simple forwarding engine

    Control Plane Components Example

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    41/82

    41

    Control Plane Components Example

    • Information from control plane is sent to the data plane.

    Label Switch Routers (LSRs)

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    42/82

    42

    Label Switch Routers (LSRs)

    • LSR primarily forwards labeled packets (swap label).

    • Edge LSR:

     – Labels IP packets (impose label) and forwards them into the MPLS domain. – Removes labels (pop label) and forwards IP packets out of the MPLS domain.

    Functions of LSRs

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    43/82

    43

    Functions of LSRs

    Component Function

    Control plane  – Exchanges routing information

     – Exchanges labels

    Data plane  – Forwards packets (LSRs and Edge LSRs)

    Component Architecture of LSR

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    44/82

    44

    Component Architecture of LSR

    • This graphic shows the component architecture of an LSR.• The primary function of an LSR is to forward labeled packets.

     – To accomplish this, every LSR needs a Layer 3 routing protocol and a

    protocol to exchange labels.

    • LDP populates the LFIB table in the data plane that is used to

    forward labeled packets.

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    45/82

    45

    SIP Overview

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    46/82

    46

    SIP Overview

    • New generation of IP based services is now being quenchedby SIP – the Session Initiation Protocol (RFP 3261)

    • SIP-based services:

     – local and long distance telephony,

     – presence & Instant Messaging,

     – IP Centrex/Hosted PBX,

     – voice messaging,

     – push-to-talk, – rich media conferencing, and more.

    • SIP utilizes its own unique user agents and servers, but it does

    not operate in a vacuum.

    • Comparable to the converging of the multimedia services it

    supports, SIP works with a myriad of preexisting protocols

    governing authentication, location, voice quality, etc.

    A New Generation of Services

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    47/82

    47

     A New Generation of Services

    • Flexible, extensible and open, SIP is galvanizing the power ofthe Internet and fixed and mobile IP networks to create a new

    generation of services.

    • Able to complete networked messages from multiple PCs and

    phones, SIP establishes sessions much like the Internet from

    which it was modeled.

    • SIP operates independent of the underlying network transport

    protocol and is indifferent to media.• Defines how one or more participant’s end devices can create,

    modify and terminate a connection whether the content is

    voice, video, data orWeb-based.

    • SIP is analogous to HTTP in the way it constructs messages.

     – Developers can more easily and quickly create applications using popular

    programming languages such as Java.

    A New Generation of Services

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    48/82

    48

     A New Generation of Services

    • While some pundits predict that SIP will be to IP what SMTPand HTTP are to the Internet, others say it could signal the end

    of the AIN.

    • To date, the 3G Community has selected SIP as the session

    control mechanism for the next generation cellular network.

    • Microsoft has chosen SIP for its real-time communications

    strategy and has deployed it in Microsoft XP, Pocket PC and

    MSN Messenger.• MCI is using SIP to deploy advanced telephony services to its

    IP communications customers.

     – Presence will also enable users to instantly set up chat sessions and

    audioconferences.

    The SIP Advantage: Open, Extensible Web-Like

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    49/82

    49

    Communications

    • Like the Internet, SIP is easy to understand, extend and implement.

    • SIP extends the open-standards spirit of the Internet to messaging, enabling

    disparate computers, phones, TVs and software to communicate.

    • SIP message is very similar to HTTP. – Much of the syntax in message headers and many HTTP codes are

    re-used.

     – For example, the error code for an address not found, “404,” is identical to the Web’s.

     – A SIP address, such as sip:[email protected], has the exact structure as an email

    address.• Using SIP, service providers can freely choose among standards-based

    components and quickly harness new technologies.

    • Users can locate and contact one another regardless of media content and

    numbers of participants.• SIP negotiates sessions so that all participants can agree on and modify

    session features.

    • It can even add, drop or transfer users.

    SIP is not a cure-all

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    50/82

    50

    SIP is not a cure all

    • It is neither a session description protocol, nor does it provideconference control.

    • To describe the payload of message content and

    characteristics, SIP uses the Internet’s Session Description

    Protocol (SDP) to describe the characteristics of the enddevices.

    • SIP also does not itself provide Quality of Service (QoS) and

    interoperates with the Resource Reservation Setup Protocol(RSVP) for voice quality.

    • It also works with a number of other protocols,

     – Lightweight Directory Access Protocol (LDAP) for location,

     – Remote Authentication Dial-In User Service (RADIUS) for authentication

     – RTP for real-time transmissions,

     – among many others.

    SIP: basic requirements in communications

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    51/82

    51

    1. User location services2. Session establishment

    3. Session participant management

    4. Limited feature establishment• An important feature of SIP is that it does not define the type

    of session that is being established, only how it should be

    managed.

    • This flexibility means that SIP can be used for an enormous

    number of applications and services, including:

     – interactive gaming,

     – music and video on demand – voice, video and Web conferencing.

    SIP features

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    52/82

    52

    SIP features

    Below is are some of other SIP features that distinguish i t among newsignaling protocols

    •Messages are text based and hence are easy to read and debug. – Programming new services is easier and more intuitive for designers.

    •Re-uses MIME type description in the same way that email clients do, soapplications associated with sessions can be launched automatically.

    •Re-uses several existing and mature internet services and protocols such as

    DNS, RTP, RSVP etc.

     – No new services have to be introduced to support the SIP infrastructure.•Extensions are easily defined, enabling service providers to add them for new

    applications without damaging their networks.

    •Older SIP-based equipment in the network will not impede newer SIP-based

    •services. – For example, an older SIP implementation that does not support

     – method/ header utilized by a newer SIP application would simply ignore it.

    SIP features

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    53/82

    53

    SIP features

    Below is are some of other SIP features that dist inguish itamong new signaling protocols

    •Is transport layer independent. Therefore:

     – The underlying transport could be IP over ATM. – SIP uses UDP as well as TCP protocol, flexibly connecting users

    independent of the underlying infrastructure.

    •Supports multi-device feature levelling and negotiation.

     – If a service or session initiates video and voice, voice can still be

    transmitted to non-video enabled devices, or other device features can be

    used such as one way video streaming.

    The Anatomy of a SIP Session

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    54/82

    54

    The Anatomy of a SIP Session

    • SIP sessions utilize up to four major components: – SIP User Agents

     – SIP Registrar Servers

     – SIP Proxy Servers

     – SIP Redirect Servers.

    • Together, these systems deliver messages embedded with the SDP protocol

    defining their content and characteristics to complete a SIP session.

    SIP User Agents (UAs )

    • Are the end-user devices, such as cell phones, multimedia handsets, PCs,PDAs, etc. used to create and manage a SIP session.

    • The UA Client initiates the message. The UA Server responds to it.

    SIP Regist rar Servers

    • Are databases that contain the location of all UAs within a domain.• In SIP messaging, these servers retrieve and send participants’ IP addresses

    and other pertinent information to the SIP Proxy Server.

    The Anatomy of a SIP Session

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    55/82

    55

    y

    SIP Proxy Servers

    • Accept session requests made by a SIP UA and query the SIP

    Registrar Server to obtain the recipient UA’s addressing

    information.• It then forwards the session invitation directly to the recipient

    UA if it is located in the same domain or to a Proxy Server if the

    UA resides in another domain.SIP Red irect Servers

    • Allow SIP Proxy Servers to direct SIP session invitations to

    external domains.

    • SIP Redirect Servers may reside in the same hardware as SIP

    Registrar Severs and SIP Proxy Servers.

    Establishing A SIP Session Within the Same Domain

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    56/82

    56

    Establishing A SIP Session In Dissimilar Domains

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    57/82

    57

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    58/82

    58

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    59/82

    59

    VB Digital Video BroadcastingH.225 Covers narrow-band visual telephone services

    H.225 Annex G

    H.225E

    H.235 Security and authentication

    H.323 SETH.245 Negotiates channel usage and capabilities

    H.450Series defines Supplementary Services for H.323, call transfer, hold,

    park, message waiting, etc.

    H.460

    Optional extensions that might be implemented by an endpoint or a

    Gatekeeper, including ITU-T Recommendations NAT/Firewall traversal.H.261 Video stream for transport using the real-time transport

    H.263 Bitstream in the Real-time Transport Protocol

    Q.931 manages call setup and termination

    RAS Manages registration

    RTCP RTP Control protocolRTP Real-Time Transport

    T.38 IP-based fax service maps

    T.125 Multipoint Communication Service Protocol (MCS).

    H.323 standard

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    60/82

    60

    • The H.323 standard provides a foundation for audio, video, and datacommunications across IP-based networks, including the Internet.

    • H.323 is an umbrella recommendation from the ITU that sets standards for

    multimedia communications over LANs that do not provide a guaranteed

    QoS.

    • Therefore, the H.323 standards are important building blocks for a broad

    new range of collaborative, LAN-based applications for multimedia

    communications. It includes parts of : – H.225.0 - RAS, Q.931, H.245 RTP/RTCP and audio/video codecs, such as the audio codecs

    (G.711, G.723.1, G.728, etc.) and video codecs (H.261, H.263) that compress anddecompress media streams.

     – Media streams are transported on RTP/RTCP.

    • RTP carries the actual media and

    • RTCP carries status and control information.

     – The signalling is transported reliably over TCP.

    • It is a part of the ITU-T H.32x series of protocols, which also address

    multimedia communications over ISDN, PSTN or SS7, and 3G Mobile.

    Codecs

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    61/82

    61

    • H.323 utilizes both ITU-defined codecs and codecs definedoutside the ITU.

    • Codecs that are widely implemented by H.323 equipment

    includes:

     – Audio codecs: G.711 (64kbps per call), G.729 (including G.729a, 8kbps

    per call), G.723.1, G.726

     – Text codecs: T.140

     – Video codecs: H.261, H.263, H.264

    • The main feature of codecs is the bandwidth that the can safe

    mantaining a good quality of video, audio, etc..

    H.323 Architecture

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    62/82

    62

    • The H.323 system defines several network elements that worktogether in order to deliver rich multimedia communication

    capabilities.

    • Those elements are

     – Terminals

     – Multipoint Control Units (MCUs) Endpoints

     – Gateways

     – Gatekeepers – Border Elements.

    • While not all elements are required, at least two terminals are

    required in order to enable communication between two

    people.

    • In most H.323 deployments, a gatekeeper is employed in order

    to, among other things, facilitate address resolution.

    Terminals

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    63/82

    63

    • The most fundamental elements in any H.323 system.• They might exist in the form of a simple IP phone, a powerful

    high-definition videoconferencing system, or simply a PC

    • Inside an H.323 terminal is something referred to as a Protocol

    stack, which implements the functionality defined by the H.323

    system.

    • The protocol stack would include an implementation of the

    basic protocol defined in ITU-T Recommendation H.225.0 andH.245, as well as RTP or other protocols described above.

    • The diagram, depicts a complete, sophisticated stack that

    provides support for voice, video, and various forms of datacommunication.

     – In reality, most H.323 systems do not implement such a wide array of

    capabilities, but the logical arrangement is useful in understanding the

    relationships.

    Terminals

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    64/82

    64

    Multipoint Control Units

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    65/82

    65

    • A MCU is responsible for managing multipoint conferences andis composed of two logical entities:

     –  Multipoint Controller (MC)

     –  Multipoint Processor (MP).

    • In more practical terms, an MCU is a conference bridge notunlike the conference bridges used in the PSTN today.

    • The most significant difference, however, is that H.323 MCUs

    might be capable of mixing or switching video, in addition to thenormal audio mixing done by a traditional conference bridge.

    • Some MCUs also provide multipoint data collaboration

    capabilities.

     – End user by placing a video call into an H.323 MCU might be able to see

    all of the other participants in the conference, not only hear their voices.

    Gateways

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    66/82

    66

    • Enable communication between H.323 networks and othernetworks, such as PSTN or ISDN networks.

     – If one party in a conversation is not an H.323 terminal, then the call must

    pass through a gateway in order to enable both parties to communicate.

    • Gateways are widely used to: – Enable the legacy PSTN phones to interconnect with the large,

    international H.323 networks that are presently deployed by services

    providers.

     – Used within the enterprise in order to enable enterprise IP phones tocommunicate through the service provider to users on the PSTN.

     – Enable videoconferencing devices based on H.320 and H.324 to

    communicate with H.323 systems.

    • Most of the third generation (3G) mobile networks deployed today utilize theH.324 protocol and are able to communicate with

    H.323-based terminals in corporate networks through such gateway devices.

    Gatekeepers

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    67/82

    67

    • Optional component in the H.323 network that providesservices to terminals, gateways, and MCU devices.

     – Endpoint registration

     – Address resolution

     – Admission control – User authentication, and so forth.

    • Address resolution is the most important task as it enables two

    endpoints to contact each other without either endpoint having

    to know the IP address of the other endpoint.

    • Gatekeepers may be designed to operate in one of two

    signaling modes:

     – Direct routed mode

     – Gatekeeper routed mode.

    Gatekeepers

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    68/82

    68

    • Direct routed mode.- – Most efficient and most widely deployed. – Endpoints utilize the RAS protocol in order to learn the IP address of the

    remote endpoint and a call is established directly with the remote device.

    • Gatekeeper routed mode.- – In this mode, call signaling always passes through the gatekeeper.

     – Requires more processing power 

     – Gives the gatekeeper complete control over the call and the ability to

    provide supplementary services on behalf of the endpoints.

     – H.323 endpoints use the RAS protocol to communicate with a

    gatekeeper.

     – Likewise, gatekeepers use RAS to communicate with other gatekeepers.

    • A collection of endpoints that are registered to a single

    Gatekeeper in H.323 is referred to as a “zone”.

    Border Elements and Peer Elements

    B d El t d P El t ti l titi i il t

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    69/82

    69

    • Border Elements and Peer Elements are optional entities similar to

    a Gatekeeper, but:

     – Do not manage endpoints directly

     – Provide some services that are not described in the RAS protocol.

     – The role of a border or peer element is understood via the definition of an

    "administrative domain".

    • An administrative domain is the collection of all zones that are

    under the control of a single organization, such as a service

    provider.

    • The border element is a signaling entity that generally sits at the

    edge of the administrative domain and communicates with another

    administrative domain.

    • Peer elements are entities with the administrative domain that,more or less, help to propagate information learned from the border

    elements throughout the administrative domain.

    • Such architecture is intended to enable large-scale deployments.

    Border Elements and Peer Elements

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    70/82

    70

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    71/82

    71

    NGN: Next Generation Networking

    NGN i b d t t d ib k hit t l l ti

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    72/82

    72

    • NGN is a broad term to describe some key architectural evolutions

    in telecommunication core and access networks that is being

    deployed and will revolution the networking over the next 5-10

    years.

    • The general idea behind NGN is that one network transports allinformation and services (voice, data, and all sorts of media such

    as video) by encapsulating these into packets, like it is on the

    Internet.

    • NGNs are commonly built around the Internet Protocol, andtherefore the term "all-IP" is also sometimes used to describe the

    transformation towards NGN.

    • Next Generation Networking ensures telecom services are

    always accessible — anywhere — via any type of terminal.

    NGN Characteristics

    • The following characteristics are fundamental to NGN:

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    73/82

    73

    • The following characteristics are fundamental to NGN:

     – Packet-based data transfer

     – Separate control functions for bearer capabilities, calls/sessions and

    applications/services

     – De-coupling of service provision from the network, and provision of openinterfaces

     – Support for a wide range of service applications and mechanisms based

    on service building blocks (including real-time/streaming/non-real-time

    services and multi-media)

     – Broadband capabilities with end-to-end QoS and transparency

     – Interworking with legacy networks via open interfaces

     – Generalized mobility

     – Unfettered access by users to different service providers

    NGN Characteristics

    • The following characteristics are fundamental to NGN:

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    74/82

    74

    • The following characteristics are fundamental to NGN:

     – A variety of identification schemes that can be resolved to IP addresses

    for the purposes of routing in IP networks

     – Unified service characteristics for the same service as perceived by the

    user

     – Converged services between Fixed and Mobile networks

     – Independence of service-related functions from underlying transport

    technologies

     – Support of multiple last mile technologies – Compliant with all Regulatory requirements (e.g. concerning emergency

    communications and security/privacy, etc.)

    Underlying Technology Components

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    75/82

    75

    • NGN are based on Internet technologies including IP and MPLS.• At the application level, SIP seems to be taking over from H.323.

    • Initially H.323 was the most popular protocol, though its popularity

    decreased in the "local loop" due to its original poor traversal of

    NAT and firewalls (now possible for H.323 devices to easily andconsistently traverse NAT and firewall).

    • For this reason as domestic VoIP services have been developed,

    SIP has been far more widely adopted.

    • However in voice networks where everything is under the control of

    the network operator or telco, many of the largest carriers use

    H.323 as the protocol of choice in their core backbones.

    • So really SIP is a useful tool for the "local loop" and H.323 is likethe "fiber backbone".

    Underlying Technology Components

    • For voice applications one of the most important devices in NGN is a

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    76/82

    76

    For voice applications one of the most important devices in NGN is a

    Softswitch - a programmable device that controls VoIP calls.

     – It enables correct integration of different protocols within NGN.

     – The most important function of the Softswitch is creating the interface to the

    existing telephone network, PSTN, through Signalling Gateways (SG) and Media

    Gateways (MG).

    • One may quite often find the term Gatekeeper in NGN literature.

     – This was originally a VoIP device, which converted (using gateways) voice and

    data from their analog or digital switched-circuit form (PSTN, SS7) to the packet-

    based one (IP). – It controlled one or more gateways.

     – As soon as this kind of device started using the Media Gateway Control Protocol

    (and similars), the name was changed to Media Gateway Controller (MGC).

    • A Call Agent is a general name for devices/systems controlling calls.• The IP Multimedia Subsystem (IMS) is a standardised NGN

    architecture for an Internet media-services capability.

    NGN Facts

    Impacts o f NGN

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    77/82

    77

    Impacts o f NGN 

    • NGN has numerous impacts on the telecom industry, not least of

    which is the requirement to conform to NGN standards and to

    support

    NGN-compatible technologies.Evolut ion o f Netwo rks to NGN 

    • The ITU-T states: “The evolution of networks to NGNs must allow

    for the continuation of, and interoperability with, existing networks

    while in parallel enabling the implementation of new capabilities.”• As NGN deployment is an evolutionary process, with numerous

    networks being launched from various technological positions, it is

    necessary to clearly identify stages of NGN compatibility or lack

    thereof. – In this regard, the NGN Enabled logo makes a great deal of sense.

    NGN FactsQoS (Quali ty of Service)

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    78/82

    78

    ( y )

    • There are no standard QoS criterion in the industry and it is best defined as

    a ‘subjective measure of user satisfaction’ (e.g. speed, accuracy, reliability,

    and security).

    • This involves identification of parameters that can be directly observed and

    measured where the service is accessed by users and network providers.

    • Flexibility within the global end-to-end NGN architecture is essential in order

    to allow for each recognized operating agency’s different regulatory

    environment, service offerings, geographic span and network infrastructure.

    • These factors need to be taken into account when setting parameters for,and levels of, QoS in NGN.

    Interoperabil i ty 

    • NGN includes a wide range of protocols (including various profiles) at both

    service and network levels.

    • Thus it is essential to ensure interoperability between different systems and

    networks. Interoperability is, in fact, a corner stone for the OSS industry

    regarding NGN.

    NGN Facts

    Secur i ty

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    79/82

    79

    y

    • Security is as crucial to the NGN as it is to current and legacy

    network environments.

    • Within the NGN, security issues interrelate to architecture, QoS,

    network management, mobility, charging and payment.General ized Mobil i ty

    • NGN enables users and devices to access services irrespective of 

    change of location or technical environment.

    • The degree of service availability may depend on several factors,

    including access network capabilities, service level agreements

    between the users’ home networks and visited networks, etc.

    • It includes the ability to communicate from various locations using avariety of terminal equipment, with or without service continuity while

    in transit or while changing access means.

    NGN Facts

    Service Capabi l i t ies and Arch i tectu re

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    80/82

    80

    p

    • NGN should provide and maintain a distinction between

    services and the networks they run on, and ensure the

    service architecture focuses on the interfaces to support

    different business models and seamless communication indifferent environments.

    • Lastly, NGN must support critical ‘legacy technologies’ (i.e.

    PSTN) as they evolve to fully compatible NGN technologies.

    NGN Facts

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    81/82

    81

    Mayor información

  • 8/17/2019 P_protocolos_sobre%20IP.pdf

    82/82

    82

    IMAGINAR

    Centro de Investigación para la Sociedad de

    la InformaciónP.O.Box: 17-04-10681

    Quito-Ecuador 

    Teléfono: 2400-937

    Email: [email protected]

    Site: www.imaginar.org