Transcript slides

DOSA: An
Architecture for IP
Telephony Services
Chuck Kalmanek
AT&T Labs - Research
With grateful acknowledgement of the
contributions of the PacketCable
DQoS and DCS focus teams,
Bill Marshall, Partho Mishra, Doug
Nortz,
and K.K. Ramakrishnan
Presentation at Opensig’99
Pittsburgh
October 15, 1999
1
DOSA Framework
DCSProxy+GC
DCSProxy+GC
Announcement
Server
MTA CM
Cable
CM
TS
ER
CM
TS
ER
CM MTA
Managed IP Backbone
MTA = Media Terminal Adapter
CM = Cable Modem
PSTN
G/W
ER = Edge Router
PSTN

Designed as an end-to-end signaling architecture for
PacketCable
– Philosophy: encourage features and services in intelligent
end-points
– DCS “proxy” designed to be scalable transaction server
– Resource management protocol provides necessary
semantics for telephony
– “Gates” (packet classifiers) at network edge allow us to 2
avoid theft of service
Distributed Call Signaling

Distributed Call Signaling (DCS): SIP w/ carrier
class features
– takes advantage of SIP feature support in endpoints and
proxies
– adds resource management, privacy, authorization &
billing, LNP

Motivation: service provider must meet user
expectations
– quality, privacy, existing services are critical needs

Coordination between call signaling and QoS
control
– authorize a call and allocate resources precisely when
needed
» prevent Call Defects: don’t ring the phone if resources are
unavailable
» ensure service quality requirements are met (e.g., don’t
clip “Hello”)
– provide the ability to bill for usage, without trusting endpoints
» prevent Theft Of Service: associate usage recording and
3
resource allocation
Perspective on Service Provider’s
Needs

Need for differentiated quality-of-service is
fundamental
– must support resource reservation and admission control,
where needed



Allow for authentication and authorization on a
call-by-call basis
Can’t trust CPE to transmit accurate information
or keep it private
Need to guarantee privacy and accuracy of feature
information
– e.g., Caller ID, Caller ID-block, Calling Name,
Forwarding Number
» privacy may also imply keeping IP addresses private

Protect the network from fraud and theft of service
– critical, given the incentive to bypass network controls

Must operate in large scale, cost-effectively
– SIP philosophy: don’t keep state for stable calls in
proxies; end-points keep state associated with their calls
4
DCS Architecture
DCSProxy+GC
DCSProxy+GC
Announcement
Server
MTA CM
Access
CM
TS
ER
Managed IP Network
CM
TS
ER
CM MTA
MTA = Media Terminal Adapter
CM = Cable Modem
ER = Edge Router
PSTN
G/W
PSTN Local
LD
Call State
Connection State
Transaction State
5
“Gates” and Edge Routers

“Gates” in edge routers opened for individual calls
– call admission control and policing implemented in edge
routers
» gate is a packet filter in edge router: “allow flow from
this source to this destination”

for a particular range of traffic parameters, and a
particular duration, etc.
– however, policy is controlled by the gate controller

Gate controller manipulates a gate after call setup is
authorized
– setting up gate in advance of reservation request allows a
proxy to be stateless

MTA makes a resource reservation request by
signaling to edge router
– edge router admits the reservation if consistent with gate
parameters
– edge router generates usage recording events based on
reservation state

Accounting info stored at the edge router to
generate usage events
» opaque info sent to record keeping servers for
6
Example Call Flow
Authentication,
Authorization, DCSAdmission control
Proxy+GC
MTA CM
Access
CMT
S
ER
Number
-toDCS- Addres
Proxy+GC s
Translat
Announcement
Server
ion
INVITE (no ring)
CMT
S
ER
INVITE (Stage
CM MTA
INVITE (Stage1)



MTA issues an INVITE to destination E.164 (or
other) address
Originating DCS-proxy performs authentication
and authorization
Terminating DCS-proxy translates dest number to
local IP address
– no resources allocated yet; provider may choose to block
a call if resources are unavailable
» P(blocking)  P(call defect)

Initial INVITE starts call state machine at
terminating MTA
7
Example Call Flow (continued…)
200 OK
DCSProxy +GC
Setup
Gate
DCSProxy +GC
Announcement
Server
200 OK
MTA CM


Access
200 OK
Setup
Gate
CM
TSE
R
CM MTA
CM
TSE
R
200 OK conveys call parameters and “gate id” to
originating MTA
Gate controllers setup “gates” at edge routers as
part of call setup
– gate is described as an “envelope” of possible reservations
issued by MTA
– gate permits reservation for this call to be admitted

Gate Controller acts as policy server in COPS
framework
– policy decisions provided to CMTS based on call
signaling
– CMTS acts as policy enforcement point
8
Resource Management: 1st Phase
DCS-proxy
+ GC
DCS-proxy
+ GC
Announcement
Server
MTA CM
Access
CM
TSE
R
Backbone Resource Management
PATH / Reserve

CM MTA
CM
TS
ER
PATH / Reserve
MTA initiates resource reservation
– access resources are “reserved” after an admission control
check
– backbone resources are “reserved” (e.g., explicit
reservation or “packet marking”)

Originating MTA starts end-to-end handshake with
terminating MTA
– originating MTA sends 2nd INVITE, terminating MTA
sends 180 RINGING, 200 OK
» this ensures that resources are available when terminating
MTA rings the phone
9
Resource Management: 2nd Phase
Gatecontroller
Gatecontroller
Announcement
Server
INVITE
MTA CM
Access
CM
TS
ER
CM
TS
ER
200 OK
Commit/Commit Ack


CM MTA
180 Ringing
Commit/Commit Ack
MTA knows voice path is established when it
receives a 200 OK
MTAs initiate resource “commitment”
– resources “committed” over access channel
» CMTS starts sending unsolicited grants; usage
recording is started
– commitment deferred until far end pick up, to prevent
theft of service; allow efficient use of constrained
resources in access network

Commit opens the “gate” for this flow
1
0
Privacy

Want to meet user expectations r.e. accuracy and
privacy of info
– Calling Identity Delivery allows called party to get info
about caller
– Calling Identity Delivery Blocking allows calling party
to restrict presentation of info (e.g., calling number,
calling name)

SIP supports some privacy mechanisms : From
header can be anything chosen by MTA, e.g.,
“anonymous”
– but, can’t be modified by proxies

DCS-Proxy acts a trusted intermediary
– ensures calling identity provided by user agent is valid
» user agents are CPE and can’t be trusted
– proxy adds calling identity info when not provided by
user agent to enable call trace

New header conveys caller identity
Dcs-Caller: John Smith; 555-1212
1
1
Proxy to Proxy SIP extensions: Billing

Motivation: need to monitor and derive revenue
from resource usage
– proxies have access to customer info (user
identity, services subscribed, payment method)
– billing models can be complex, requiring
billing info from multiple parties (split
charging for call forwarding, etc.)

Header requirements
– need a unique id to associate event records
from multiple sources with the call
– need a header to carry information about the
billable account, record keeping system, etc.
– need a header identifying the location where
resource usage info is captured
1
2
State Header

Motivation
– proxies sometimes need state information
about an active call
» “return call” for a call where the caller wanted privacy
» ability to bill correctly for call forwarding (e.g.,
international call)
» “call trace” where the user wishes to have law
enforcement trace a call
– but, we want proxies to remain stateless

State Header
– proxies stores call state at the endpoints during
the initial INVITE exchange
» state object is signed and encrypted by proxy; cannot
be altered by endpoints
– endpoint passes state information to proxies
when needed
1
3
OSPS Header (Operator Services Positioning
System)
 Motivation
– PSTN based services like Busy Line Verify and
Emergency Interrupt require special treatment
– PSTN operator is unaware that the call is to a
destination on the IP network
– PSTN gateway initiates SIP INVITE to
endpoint
» this includes the OSPS header
– an active endpoint receiving an INVITE
containing OSPS : EI header does not return
“Busy”
 Header
Format
OSPS = “OSPS” “:” OSPS-Tag
OSPS-Tag = “BLV” | “EI”
1
4
Unique Contributions and Status




DOSA introduced the concept of integrating QoS
with call signaling protocol
DCS call signaling allows use of end-point
intelligence to support new services and
integration with other applications
Dynamic QoS provides common underlying
framework of QoS for call signaling protocols
Two phase Reserve/Commit for managing
resources
– provides semantics that resources are available when
phone rings, without billing for ringing

Gates for each call: allows provider to manage
access to resources
– ensures that users who want toll quality go through
network proxies
– avoid theft of service with careful coordination between
signaling and QoS

DCS proxies not required to be involved
throughout call
1
– simple transaction processor; less stringent reliability 5