SlideShare a Scribd company logo
1 of 37
Open Source Communications with
Session Border Controllers -
Why B2BUA is Important
July 2019
2
Introduction:
Alan D Percy, CMO
TelcoBridges
alan.percy@telcobridges.com
@AlanDPercy
blog.telcobridges.com
www.telecomreseller.com
linkedin.com/in/alandpercy/
telecomdisruptors.com
Apple iTunes
Google Play
TelcoBridges Inc.
• Manufacturer of VoIP gateways and
telecom solution platforms for carriers
• Privately held
• Founded in 2002
• Employees: ~35
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Poland, Turkey, Hong Kong
• 24/7 technical support
3
TelcoBridges HQ
4
What are the Risks?
Intrusion Theft of ServicesExtortion
5
The Risk is Real
Hackers targeted the phone system at Bob
Foreman’s architecture firm in Georgia,
making $166,000 in calls in a weekend.
Credit: Tami Chappell for The New York Times
6
Agenda
SBCs & B2BUA
• What are they?
• What do they do?
• What are the use cases?
• What are the trends?
• Where can I get one?
• Where to learn more?
7
Choosing the Right Tool …
8
Just a little SIP
SIP is the foundation of the
new voice network…but:
• Specification is “loose” with
interoperability issues
• Separates call control
signaling from media
• “Chatty Cathy”
• Asynchronous
• “Stateful” By Korolev Alexandr
RFC 3261
9
OSI Model
Application SIP User Agent
Presentation G.711, G.729…
Session SIP
Transport TCP, UDP, RTP
Network IP, ICMP
Data Link Ethernet, 802.11
Physical CAT5, 2.4GHz
Network Switches
Firewall
/ Router
Session Border
Controllers SIP
Servers
Header ManipulationRouting Engine
Media
SIP
Session
s
Public
WAN
34.0.0.
1
SIP Server
SIP
Application
s
34.0.0.X
SIP Server Architecture
11
SIP Server Functions
SIP Proxy/Router
SIP Header Manipulation
SIP Routing / Load Balancing
Script-based configuration
 No B2BUA
Exposes network topology
 No Media Handling
What is a Session Border Controller?
Local Area
Network
Network
Border
Wide Area
Network SBC
• Anywhere two SIP networks intersect
• Software-based “Network Function”
• Most often between a WAN and a LAN
SIP SIP
Routing Engine
Media
Media
Engine
SIP
Session
s
B2BUA
UAS UAC
Private LAN
192.168.0.X
Public WAN
34.0.0.1
Session Border Controller
SIP
Applicatio
ns
Session Border Controller Architecture
14
Comparison Summary
Function Firewall SIP Server SBC
Layer 2-4 Packet Filtering   
Router / NAT / DHCP   
Prevent DOS / DDOS Attacks   
SIP Header Manipulation / Interoperability  
SIP Routing  
Toll Fraud Protection  
Media Topology Hiding 
STIR/SHAKEN Support 
QOS Measurement / Reporting 
Media Transcoding / Transcryption 
Prevent Media DDOS Attacks 
USE CASES…
15
16
Use Cases - Peering
Benefits:
Large Session Capacity
Call routing, mediation and CDR
functions required
Deployed in the core of the service
provider’s network
Service Provider
SoftSwitch
Wholesale VoIP Provider
SBC
SBC
17
Use Cases - Access
Benefits:
Large Session Capacity
High performance
NAT Traversal
Registration pass-through
Analytics and OSS/BSS connectors
SMB/Enterprise
IAD/Router
Service Provider
SoftSwitch
SBC
18
Use Cases – Hosted IP-PBX
SMB/Enterprise
IAD/Router
Service Provider
Asterisk
Billing
SBC
19
Use Cases – Redundancy
Tasks:
 Failure Detection
 Traffic Redirection and Routing
 Performance Measurement
Service Provider
Softswitch
Softswitch
Wholesale
Provider(s)
SBC
SBC
20
Use Cases – SaaS Access
Features:
DOS/DDOS Protection
Encryption Support
Traffic Management
Routing & SIP mediation functions
Service Provider
Application
Remote or Work-at-home
users
Internet
SIP/TLS
SRTP
SIP/UDP
SBC
21
Use Cases – SaaS SIP Trunking
Features:
Encryption Support
Large Session Capacity w/ Traffic Management
Routing, mediation and CDR functions
Media by-pass
Service Provider
Application
SIP/TLS
Users
SIP Trunks InternetSBC
22
Use Cases – Intelligent Edge
• Delivering services to
customers at the edge of the
network
• SBC as a Virtual Network
Function
• Interoperability testing with
SD-WAN VNF providers
• Validation with leading uCPE
equipment vendors
23
Use Cases – CPaaS Providers
Features:
Intelligent Traffic Management
Cloud Hosted
SIP Trunking Interoperability
FQDN Mapping
Media By-pass
Cloud-based Communications Provider as a Service (CPaaS)
Service Provider
CPaaS Platform
SIP/UDPSIP Trunks
Mobile
Users
SBC
TRENDS IN THE
SBC MARKET
24
25
Shifting to S/W and VNFs
VNF
26
Shifting from CAPEX to OPEX
$ $$$$$$
“Pay as you Grow”
$$$$$
License + Maintenance
27
Shifting from the Core to the Edge
VNF
VNF
VNF
VNF
Service Provider
Core
28
Emergence of the ESBC
Enterprise
Service Provider
ESBC
SBC
INTRODUCING…
29
30
Positioning
 Tier 2/3 Service Providers & SMB
 Access and Peering
 Open Source communities
 Educational Programs
 Easy to Download and Use
 Community Support
 Free with Annual Renewal
 Tier 1/2/3 Service Providers
and Enterprise
 Access, Peering, SaaS…
 Commercial applications
 Encryption & HA Support
 Live Support w/ 24/7 opt.
 $1/Session/Year
31
Feature Comparison Summary
Features FreeSBC 3.1 ProSBC 3.1
B2BUA/Topology Hiding for SIP and Media  
DOS/DDOS Protection w/ White and Blacklisting  
Routing & Load Balancing Engine  
SIP Header Manipulation and Mediation  
Media Pak (Bypass, Transcoding*, Media Play/Rec) 
Analytics Pak (Trace/Test Call/Recording) 
API/Connector Pak (API, CDR, RADIUS, STIR/SHAKEN) 
Encryption Pak (SIP/TLS & SRTP) 
High Availability & Stand-alone Survivability 
Scaling Limitations (NAPs/Registrations) 5/25 1k/350k
Support Community Live
Cost Free $1/Session
* With TSBC-HW-TRANS
Platform Options
Bare metal server
VNF on uCPE
33
Carrier Performance
Interoperability
35
Coming Attraction
36
Congratulations!
You now know
enough to be
dangerous!
How do you continue
your knowledge?
37
Q&A
Download your FreeSBC software:
www.freesbc.com
Frequently Asked Questions at:
forums.freesbc.com
Other educational webinars at:
freesbc.com/video-library
Q/A?

More Related Content

What's hot

VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP Fatih Ozavci
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
 
Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?NetSapiens
 
net2phone Business VoIP Solutions
net2phone Business VoIP Solutionsnet2phone Business VoIP Solutions
net2phone Business VoIP SolutionsDenise Wiley
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Fatih Ozavci
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)Fatih Ozavci
 
Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014Atif Ahmad
 
Six ways to get more from SIP trunks
Six ways to get more from SIP trunksSix ways to get more from SIP trunks
Six ways to get more from SIP trunksFredrik Henning
 
Advantages of Cloud PBX Over Onsite PBX
Advantages of Cloud PBX Over Onsite PBX Advantages of Cloud PBX Over Onsite PBX
Advantages of Cloud PBX Over Onsite PBX Abhishek Upadhyay
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenFatih Ozavci
 

What's hot (20)

VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
Voip security
Voip securityVoip security
Voip security
 
Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?
 
net2phone Business VoIP Solutions
net2phone Business VoIP Solutionsnet2phone Business VoIP Solutions
net2phone Business VoIP Solutions
 
VoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacksVoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacks
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014
 
Six ways to get more from SIP trunks
Six ways to get more from SIP trunksSix ways to get more from SIP trunks
Six ways to get more from SIP trunks
 
Advantages of Cloud PBX Over Onsite PBX
Advantages of Cloud PBX Over Onsite PBX Advantages of Cloud PBX Over Onsite PBX
Advantages of Cloud PBX Over Onsite PBX
 
Sip trunking providers
Sip trunking providersSip trunking providers
Sip trunking providers
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
 
IP PBX
IP PBXIP PBX
IP PBX
 

Similar to Scaling Open Source Applications with SBCs

ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep DiveAlan Percy
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introductionAlan Percy
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsTelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsAlan Percy
 
What is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerWhat is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerTelcoBridges Inc.
 
Session bordercontrollers
Session bordercontrollersSession bordercontrollers
Session bordercontrollersAstri AndTi
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCTelcoBridges Inc.
 
AudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateAudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateJohn D'Annunzio
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...Biznes to Rozmowy
 
Transforming the Central Office: Implementing CORD
Transforming the Central Office:  Implementing CORDTransforming the Central Office:  Implementing CORD
Transforming the Central Office: Implementing CORDRadisys Corporation
 
End Point Evolution TADSummit Americas 2019
End Point Evolution TADSummit Americas 2019End Point Evolution TADSummit Americas 2019
End Point Evolution TADSummit Americas 2019Alan Quayle
 
VoIP based project presentation - IICT University of Sindh Jamshoro Pakistan
VoIP based project presentation - IICT University of Sindh Jamshoro PakistanVoIP based project presentation - IICT University of Sindh Jamshoro Pakistan
VoIP based project presentation - IICT University of Sindh Jamshoro PakistanMehtabRohela
 
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseThe Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseAlok Vasudeva
 
SDN, NFV and customer centric networks
SDN, NFV and customer centric networksSDN, NFV and customer centric networks
SDN, NFV and customer centric networksPatrick Lopez
 
Innovation in the network – Adding value to voice OpenCloud Bouygues
Innovation in the network – Adding value to voice OpenCloud BouyguesInnovation in the network – Adding value to voice OpenCloud Bouygues
Innovation in the network – Adding value to voice OpenCloud BouyguesAlan Quayle
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media GatewaysAlan Percy
 
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018QUANT
 

Similar to Scaling Open Source Applications with SBCs (20)

ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
What is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border ControllerWhat is an SBC? A look at the role of the Session Border Controller
What is an SBC? A look at the role of the Session Border Controller
 
Session bordercontrollers
Session bordercontrollersSession bordercontrollers
Session bordercontrollers
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
 
AudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateAudioCodes Session Border Controller Update
AudioCodes Session Border Controller Update
 
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
ACME- Session Border Controllers – podstawa udanych i efektywnych implementac...
 
Transforming the Central Office: Implementing CORD
Transforming the Central Office:  Implementing CORDTransforming the Central Office:  Implementing CORD
Transforming the Central Office: Implementing CORD
 
End Point Evolution TADSummit Americas 2019
End Point Evolution TADSummit Americas 2019End Point Evolution TADSummit Americas 2019
End Point Evolution TADSummit Americas 2019
 
Customer Keynote - Microsoft Lync
Customer Keynote - Microsoft LyncCustomer Keynote - Microsoft Lync
Customer Keynote - Microsoft Lync
 
VoIP based project presentation - IICT University of Sindh Jamshoro Pakistan
VoIP based project presentation - IICT University of Sindh Jamshoro PakistanVoIP based project presentation - IICT University of Sindh Jamshoro Pakistan
VoIP based project presentation - IICT University of Sindh Jamshoro Pakistan
 
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the EnterpriseThe Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the Enterprise
 
SDN, NFV and customer centric networks
SDN, NFV and customer centric networksSDN, NFV and customer centric networks
SDN, NFV and customer centric networks
 
Innovation in the network – Adding value to voice OpenCloud Bouygues
Innovation in the network – Adding value to voice OpenCloud BouyguesInnovation in the network – Adding value to voice OpenCloud Bouygues
Innovation in the network – Adding value to voice OpenCloud Bouygues
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018
SIP TRUNKING EVENT - ORACLE PRESENTATION - 31/05/2018
 

More from Alan Percy

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxAlan Percy
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionAlan Percy
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionAlan Percy
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsAlan Percy
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Alan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCAlan Percy
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityAlan Percy
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7Alan Percy
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCsAlan Percy
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsAlan Percy
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCAlan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksAlan Percy
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialAlan Percy
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs ExplainedAlan Percy
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANAlan Percy
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQAlan Percy
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
 
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018Alan Percy
 

More from Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Scaling Open Source Applications with SBCs

  • 1. Open Source Communications with Session Border Controllers - Why B2BUA is Important July 2019
  • 2. 2 Introduction: Alan D Percy, CMO TelcoBridges alan.percy@telcobridges.com @AlanDPercy blog.telcobridges.com www.telecomreseller.com linkedin.com/in/alandpercy/ telecomdisruptors.com Apple iTunes Google Play
  • 3. TelcoBridges Inc. • Manufacturer of VoIP gateways and telecom solution platforms for carriers • Privately held • Founded in 2002 • Employees: ~35 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Poland, Turkey, Hong Kong • 24/7 technical support 3 TelcoBridges HQ
  • 4. 4 What are the Risks? Intrusion Theft of ServicesExtortion
  • 5. 5 The Risk is Real Hackers targeted the phone system at Bob Foreman’s architecture firm in Georgia, making $166,000 in calls in a weekend. Credit: Tami Chappell for The New York Times
  • 6. 6 Agenda SBCs & B2BUA • What are they? • What do they do? • What are the use cases? • What are the trends? • Where can I get one? • Where to learn more?
  • 8. 8 Just a little SIP SIP is the foundation of the new voice network…but: • Specification is “loose” with interoperability issues • Separates call control signaling from media • “Chatty Cathy” • Asynchronous • “Stateful” By Korolev Alexandr RFC 3261
  • 9. 9 OSI Model Application SIP User Agent Presentation G.711, G.729… Session SIP Transport TCP, UDP, RTP Network IP, ICMP Data Link Ethernet, 802.11 Physical CAT5, 2.4GHz Network Switches Firewall / Router Session Border Controllers SIP Servers
  • 10. Header ManipulationRouting Engine Media SIP Session s Public WAN 34.0.0. 1 SIP Server SIP Application s 34.0.0.X SIP Server Architecture
  • 11. 11 SIP Server Functions SIP Proxy/Router SIP Header Manipulation SIP Routing / Load Balancing Script-based configuration  No B2BUA Exposes network topology  No Media Handling
  • 12. What is a Session Border Controller? Local Area Network Network Border Wide Area Network SBC • Anywhere two SIP networks intersect • Software-based “Network Function” • Most often between a WAN and a LAN SIP SIP
  • 13. Routing Engine Media Media Engine SIP Session s B2BUA UAS UAC Private LAN 192.168.0.X Public WAN 34.0.0.1 Session Border Controller SIP Applicatio ns Session Border Controller Architecture
  • 14. 14 Comparison Summary Function Firewall SIP Server SBC Layer 2-4 Packet Filtering    Router / NAT / DHCP    Prevent DOS / DDOS Attacks    SIP Header Manipulation / Interoperability   SIP Routing   Toll Fraud Protection   Media Topology Hiding  STIR/SHAKEN Support  QOS Measurement / Reporting  Media Transcoding / Transcryption  Prevent Media DDOS Attacks 
  • 16. 16 Use Cases - Peering Benefits: Large Session Capacity Call routing, mediation and CDR functions required Deployed in the core of the service provider’s network Service Provider SoftSwitch Wholesale VoIP Provider SBC SBC
  • 17. 17 Use Cases - Access Benefits: Large Session Capacity High performance NAT Traversal Registration pass-through Analytics and OSS/BSS connectors SMB/Enterprise IAD/Router Service Provider SoftSwitch SBC
  • 18. 18 Use Cases – Hosted IP-PBX SMB/Enterprise IAD/Router Service Provider Asterisk Billing SBC
  • 19. 19 Use Cases – Redundancy Tasks:  Failure Detection  Traffic Redirection and Routing  Performance Measurement Service Provider Softswitch Softswitch Wholesale Provider(s) SBC SBC
  • 20. 20 Use Cases – SaaS Access Features: DOS/DDOS Protection Encryption Support Traffic Management Routing & SIP mediation functions Service Provider Application Remote or Work-at-home users Internet SIP/TLS SRTP SIP/UDP SBC
  • 21. 21 Use Cases – SaaS SIP Trunking Features: Encryption Support Large Session Capacity w/ Traffic Management Routing, mediation and CDR functions Media by-pass Service Provider Application SIP/TLS Users SIP Trunks InternetSBC
  • 22. 22 Use Cases – Intelligent Edge • Delivering services to customers at the edge of the network • SBC as a Virtual Network Function • Interoperability testing with SD-WAN VNF providers • Validation with leading uCPE equipment vendors
  • 23. 23 Use Cases – CPaaS Providers Features: Intelligent Traffic Management Cloud Hosted SIP Trunking Interoperability FQDN Mapping Media By-pass Cloud-based Communications Provider as a Service (CPaaS) Service Provider CPaaS Platform SIP/UDPSIP Trunks Mobile Users SBC
  • 24. TRENDS IN THE SBC MARKET 24
  • 25. 25 Shifting to S/W and VNFs VNF
  • 26. 26 Shifting from CAPEX to OPEX $ $$$$$$ “Pay as you Grow” $$$$$ License + Maintenance
  • 27. 27 Shifting from the Core to the Edge VNF VNF VNF VNF Service Provider Core
  • 28. 28 Emergence of the ESBC Enterprise Service Provider ESBC SBC
  • 30. 30 Positioning  Tier 2/3 Service Providers & SMB  Access and Peering  Open Source communities  Educational Programs  Easy to Download and Use  Community Support  Free with Annual Renewal  Tier 1/2/3 Service Providers and Enterprise  Access, Peering, SaaS…  Commercial applications  Encryption & HA Support  Live Support w/ 24/7 opt.  $1/Session/Year
  • 31. 31 Feature Comparison Summary Features FreeSBC 3.1 ProSBC 3.1 B2BUA/Topology Hiding for SIP and Media   DOS/DDOS Protection w/ White and Blacklisting   Routing & Load Balancing Engine   SIP Header Manipulation and Mediation   Media Pak (Bypass, Transcoding*, Media Play/Rec)  Analytics Pak (Trace/Test Call/Recording)  API/Connector Pak (API, CDR, RADIUS, STIR/SHAKEN)  Encryption Pak (SIP/TLS & SRTP)  High Availability & Stand-alone Survivability  Scaling Limitations (NAPs/Registrations) 5/25 1k/350k Support Community Live Cost Free $1/Session * With TSBC-HW-TRANS
  • 32. Platform Options Bare metal server VNF on uCPE
  • 36. 36 Congratulations! You now know enough to be dangerous! How do you continue your knowledge?
  • 37. 37 Q&A Download your FreeSBC software: www.freesbc.com Frequently Asked Questions at: forums.freesbc.com Other educational webinars at: freesbc.com/video-library Q/A?

Editor's Notes

  1. Some introductions to get started: I’m Alan Percy, Senior Director of Product Marketing for TelcoBridges and today’s event moderator. Joining us again is Luc Morissette, Director of Customer Support and one of the founders of TelcoBridges. Luc, thanks for being a part of today’s event. Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session. We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen. Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable. And we’re glad to have you, our attendees, with us today and encourage you to use the opportunity to interact with our speakers by posing your questions and comments.
  2. Full article at: https://www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html
  3. First a little background: As network architects in service providers and large enterprises plan their migration to cloud infrastructure, one network security element plays a critical role and needs special treatment - the Session Border Controller. At the crossroads of real-time voice and video traffic, SBCs are tasked with providing protection against DDOS attacks, facilitating NAT traversal, providing topology hiding, resolving interoperability issues and much more.
  4. First a little background: As network architects in service providers and large enterprises plan their migration to cloud infrastructure, one network security element plays a critical role and needs special treatment - the Session Border Controller. At the crossroads of real-time voice and video traffic, SBCs are tasked with providing protection against DDOS attacks, facilitating NAT traversal, providing topology hiding, resolving interoperability issues and much more.
  5. First a little background: As network architects in service providers and large enterprises plan their migration to cloud infrastructure, one network security element plays a critical role and needs special treatment - the Session Border Controller. At the crossroads of real-time voice and video traffic, SBCs are tasked with providing protection against DDOS attacks, facilitating NAT traversal, providing topology hiding, resolving interoperability issues and much more.
  6. First a little background: As network architects in service providers and large enterprises plan their migration to cloud infrastructure, one network security element plays a critical role and needs special treatment - the Session Border Controller. At the crossroads of real-time voice and video traffic, SBCs are tasked with providing protection against DDOS attacks, facilitating NAT traversal, providing topology hiding, resolving interoperability issues and much more.
  7. Can be deployed in various platforms. TelcoBridges functions is deployed in software that can run on these 3 platforms. FreeSBC is Platform Agnostic and provides flexibility to deploy solution best fit your needs. Extra slides for more details. Hardware platform specifications. -> freedom of choices that fits business needs. Bare metal be Intel CPU with Intel NIC. Performance would depends on hardware. For deployment in virtualized computing platform, Vmware and KVM OpenStack are supported. Roadmap with more hypervisors. AWS Support is coming soon