IPv4IPv6 Interworking in IMSusing Session Border.doc

上传人:sccc 文档编号:5185208 上传时间:2023-06-11 格式:DOC 页数:8 大小:775.50KB
返回 下载 相关 举报
IPv4IPv6 Interworking in IMSusing Session Border.doc_第1页
第1页 / 共8页
IPv4IPv6 Interworking in IMSusing Session Border.doc_第2页
第2页 / 共8页
IPv4IPv6 Interworking in IMSusing Session Border.doc_第3页
第3页 / 共8页
IPv4IPv6 Interworking in IMSusing Session Border.doc_第4页
第4页 / 共8页
IPv4IPv6 Interworking in IMSusing Session Border.doc_第5页
第5页 / 共8页
点击查看更多>>
资源描述

《IPv4IPv6 Interworking in IMSusing Session Border.doc》由会员分享,可在线阅读,更多相关《IPv4IPv6 Interworking in IMSusing Session Border.doc(8页珍藏版)》请在三一办公上搜索。

1、IPv4/IPv6 Inter-working in IMS by using Session BorderControllerCao XinzhouNational Key Laboratory of Switching and Networking,Beijing University of Posts andTelecommunications, Beijing,PRC (100876)E-mail:xinzhoucaoAbstractIP Multimedia Subsystem (IMS) is a new network architecture for providing mul

2、timedia service inthe next generation networks. The 3rd Generation Partnership Project (3GPP) R5 standards specified the use of Internet Protocol version 6 (IPv6) for the IMS. However, early implementations of IMS Core and IMS clients support Internet Protocol version 4 (IPv4)-only. As the transitio

3、n and migration to IPv6 of both the IMS Core and IMS clients, the interoperability between IPv4 and IPv6 in the Core region and clients region must be addressed. These issues have the potential to impact the access-independent nature of IMS specified by 3GPP. In this paper, we introduce a middleware

4、 which is similar to traditional Session Border Controller(SBC) between Core and clients, which can handle the inter-working well. And we introduce an Interconnect-SBC (I-SBC)-like middleware which can deal with the cross-IMS Cores communications. In addition, it also can provide other novel feature

5、s such as ANAT, IPv6 promotion and make the implementation of User equipment mobility relatively easy.Keywords:IMS,SBC,IPv6,SIP1 IntroductionThe evolutionary trend of the next generation mobile communication system is obviously towards IP-based networks.3GPP has defined and standardized a network in

6、frastructure called the IP multimedia subsystem (IMS) 1 for supporting a multitude of IP multimedia services. IMS adopts Session Initiated Protocol (SIP) 2 as its signaling protocol and uses Session Description Protocol(SDP) 34 to negotiate the multimedia data transfer. SIP is defined by IETF to pro

7、vide signaling control for multimedia session such as Internet telephone calls. It is designed for multimedia session control.IPv6 has been specified by 3GPP R5 to be used in IMS. However, because IPv4 is used in the large scale of the existing Internets, the early implemented IMS Core and IMS clien

8、ts support IPv4-only. As both the clients and Cores transiting to IPv6, there will be a long period of the co-existence of IPv4 and IPv6, and this will lead to problem for introducing IPv6 clients into the existing IPv4 IMS Cores, and it is impossible for an IPv6 Core to communicate with the IPv4 Co

9、res. As IMS-based network architectures evolve and become widely accepted as a standards based service creation and delivery framework, theseinter-working problems are urged to be solved. Figure 1 shows the challenge of the IPv6 transition in IMS:Figure 1: The issues related to the inter-workingAn c

10、andidate solution is to introduce an element typically referred to as “Session Border Controller” (SBC) 5 between IMS Cores and clients. This element is now an important component of several VoIP solutions in real world. The SBC acts as intermediate node in all signaling and media sessions of a user

11、 that wants to access the public network through a private access network. From the media point of view the SBC acts as “B2BUA” (Back to Back User Agent) while from the signaling point of view it can also act as a Sip Proxy. In practice the SBC “represents” the user in the public network by providin

12、g him/her with a public routable IP address (IPv4 or IPv6) through which the user can be reached even behind a NAT.IMS is naturally access independent, so we also propose a solution to handle the wireless clients mobility89 for a smooth media handover.The rest of this paper is organized as follows.

13、In section II we discuss the related background acknowledge. In section III the SBC-like middleware is described in detail. Finally, we conclude this paper in section IV.2 Background2.1 IMSIMS is specified in the 3rd Generation Partnership Project/3rd Generation Partnership Project2(3GPP/3GPP2) stan

14、dards. IMS is based upon Internet protocols to provide access to multimedia services, converging delivery of voice and data. The IMS core network provides the functions at the session management layer of the three-tiered IMS structure (i.e., access network, session management, and application servic

15、es). In this paper, we just simply introduce the session management tier and the related functionality.Proxy CSCF (P-CSCF) - P-CSCF is the first point of contact for users with the IMS. The P-CSCF is responsible for security of the messages between the network and the user and allocating resources f

16、or the media flows.Interrogating CSCF (I-CSCF) - I-CSCF is the first point of contact from peered networks. The I-CSCF is responsible for querying the HSS to determine the S-CSCF for a user and may also hide the operators topology from peer networks (Topology Hiding Inter-network Gateway, or THIG).S

17、erving CSCF (S-CSCF) - S-CSCF is the central brain. The S-CSCF is responsible for processing registrations to record the location of each user, user authentication, and call processing (including routing of calls to applications). The operation of the S-CSCF is controlled by policy stored in the HSS

18、.DNS - The DNS server should support IPv6 features such as AAAA type records. The ability of receiving/responding queries through IPv6 is preferred, but not mandatory required.HSS - HSS should has the ability to store and return FQDNs, IPv4 addresses and IPv6 addresses according to specific configur

19、ations. The actual implementation and interfaces with other entities do not have influence to the solutions, hence are not necessary to conform to standards (DIAMETER, for example).2.2 IPv6Adoption of IPv6 is viewed as the key to deploying next-generation fixed and mobile services. IPv6 is the next-

20、generation Internet protocol that succeeds IPv4. The evolution from IPv4 to IPv6 is primarily intended to support the peer-to-peer model of Internet connectivity and network efficiency and to encourage innovation. IPv6 supports these by incorporating the following enhancements to IPv4:z Expanded IP

21、addressing capabilities,z Header format simplification,z Stateless address auto-configuration,z Improved support for extension headers,z Flow labeling capability,z Any-cast capability, and Inherent support for IPSec and Mobile IP (MobIP).The greatly increased number of IPv6 globally routable address

22、es eliminates the need for private addresses and middleboxes such as NATs and application-level gateways (ALGs).2.3 SBCThe term SBC is relatively non-specific, since it is not standardized or defined anywhere. It usually sits between two service provider networks in a peering environment, or between

23、 an access network and a backbone network to provide service to residential and/or enterprise customers. They provide a variety of functions to enable or enhance session-based multi-media services (e.g., Voice over IP).These functions include: a) perimeter defense (access control, topology hiding, D

24、oS prevention, and detection); b) functionality not available in the endpoints (NAT traversal, protocol inter-working or repair); and c) network management (traffic monitoring, shaping, and QoS). Some of these functions may also get integrated into other SIP elements (like pre-paid platforms, 3GPP P

25、-CSCF,3GPP I-CSCF etc).13. Implementation of SBCIn our implementation of SBC, it is the interface between UEs and IMS core. It forwards SIP signals between access segment and core segment, and forwards media traffic between UEs. Both the IMS core and the UEs may have different IP capabilities and ru

26、nning different IP versions.I-SBC is very similar with SBC in functions, and is the interface between different IMS domains, these domains may also be different IP realms and running different IP versions. It is commonly used to interconnect different IMS operators.SBC run as a as a Back-to-Back Use

27、r Agents(B2BUA) . It typically handle both signaling and media and can implement behavior which is equivalent to a privacy service (as described in2) performing both Header Privacy and Session Privacy. SBCs often modify certain SIP headers and message bodies that proxies are not allowed to modify. F

28、or example, our SBCs modify the session description carried in the message to control the media traffic, replace the value of the Contact header field with the SBCs address to do registration for clients and make them routable, generate new To and From tags, and remove Via header fields and Record R

29、oute header fields for acheve THIG (Topology Hiding).As a B2BUA, SBC receives Request from clients UAC, at this time, SBC make the role of UASand may send a response back, then it may forward the modified Request using its UAC. In reverse,SBC will play the role of UAC when receiving Response, and it

30、 may using its UAS to forward the Response after modification. Our SBC starts to handle media stream after the session is established, when it receiving media packet(eg, RTP stream), it will get to know where the packet comes from, and check the “Media Address Mapping” table, then it is aware of whe

31、re should to forward this packet.Figure2 shows our SBC works as B2BUA.Figure 2: The B2BUA model of SBCSince our SBC can modify the header fields of SIP Request and Response, it also can perform the following functions:z NAT Traversalz Access Scenarioz IPv4 and IPv6 Inter-Workingz Topology Hidingz AN

32、AT & IPv6 Promotionz Traffic handover3.1 NAT TraversalClients are usually located in the private networks, so they are not routable in the public networks. After the introduction of SBC, the clients can be represented by it and the signals and media can be routed to them through SBC. In this case, S

33、BC has two interfaces, one connects to the private networks, and the other connects the public networks.Clients that set SBC as their outbound proxy will send Register to SBCs private interface, SBC replaces the value of the Contact header field with the SBCs address and uses its public interface to

34、 forward the Register to IMS Core. At the mean same, SBC will forward the consequent 200 OK Response to clients to finish the registration.After the registration, IMS Core will map the clients address-of-record to the SBCs address, thus, the subsequent requests to the registered clients are routed t

35、o the SBC. From the aspect of IMS Core, SBCs public interface represents all the clients of the private networks.Our SBC maintains a registration table, every registration will update this table. It can help to route the incoming SIP message to the right client. In addition, SBC make clients to regi

36、ster with itself at a smaller interval by decreasing the value the Expire header field of the 200 OK. For example, SBC will make clients register every minute, but it only forwards the Register request to IMS Core every 10 minutes. This can help to enhance the performance of handling clients mobilit

37、y and improve the user access control and authentication/or authorization.3.2 IPv4 and IPv6 InterworkingAs the deployment rapid of IPv6 is not as our expectation, most of the existing access networks are supporting IPv4 only. Thus, many early implementations of IMS Core are also supporting IPv4 only

38、, which makes IPv6 clients cant access to these IMS Core directly. And after the some IMS Cores upgrade, there will be IPv4 IMS Core co-exists with IPv6/Dualstack IMS Core. These different Cores also cant communicate with each other directly.Since our SBC listens on both IPv4 and IPv6 interfaces, he

39、nce able to exchange signals and media traffic data with IPv4 Clients, IPv6 Clients and Dual Stack ones, and able to interface with IMS core using either IPv4 or IPv6, depends on IMS Cores IP capabilities. So, we can easily solve these two problem by just modify the SIP signals. Figure 3 shows how a

40、n IPv4 client communicates with an IPv6 client with the help of SBC, and Figure 4 shows how an IPv4 Core communicates with an IPv6Core with the help of I-SBC:Figure 3 Inter-working between IPv4 and IPv6 ClientsIn Figure 3, there are two users, joeyexample- (joey) and chandlerexample-(chandler), whic

41、h have registered with Core using IPv4 and IPv6 address, respectively. When joey wants to chat with chandler, it will send an INVITE request to SBC1s private interface, 172.16.0.67, then SBC1 will forward this INVITE to Core using IPv4 after inserting its public IPv4 address to the SDP. On receiving

42、 INVITE from Core side, SBC2 will query its registration table and get chandlers registered address, 2016:90, then it replaces the media address of the session description in the INVITE with its IPv6 address, 2016:68 and forwards to chandler using its private IPv6 address. The 183 Response will go b

43、ack to joey according to Via header fields. During these two steps, SBC1 and SBC2 will update their “Media Address Mapping” table for forwarding media packets.In Figure 4, there are two domains, one is example-, which represents the early implemented IMS Core, the other is example-, which can suppor

44、t IPv6. If a cross domain call session is wanted to established, the I-SBC is involved. When it receives INVITE from the S-CSCF of example- , it will lookup E-DNS to get the IPv6 address of the I-CSCF of example-, then it inserts its public IPv6 address into the SDP and forwards the INVITE to the I-

45、CSCF using its publicIPv6 interface. In reverse, it will forwards 183 Response back to the S-CSCF of example-. This can make the two tie operators to inter-work will each other.3.3 Topology HidingTopology hiding consists of limiting the amount of topology information given to external parties. Opera

46、tors have a requirement for this functionality because they do not want the IP addresses of their equipment (proxies, gateways, application servers, etc) to be exposed to outside parties. This may be because they do not want to expose their equipment to DoS (Denial of Service) attacks, they may use other carriers for certain traffic and do not want their customers to be aware of it or they ma

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 建筑/施工/环境 > 农业报告


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号