SBCs
SBCs
Deployment Types
Access network peering
Network-Network Peering
Typically composed (not disaggregated)
Today, almost exclusively used for PSTN
replacement
Tomorrow, to protect delivery of IP
services
Do you really need an SBC?
Probably…
If you have revenue in your network
If you have a large network
Your network is mission critical
Fundamental Architecture
Hardware vs. Software
Access vs. Trunking
Financial Stability
Media Handling
Security
Intelligence
Fundamental Architecture
Carrier Class
Is it redundant? How is this achieved?
Form factor
Power
Management Interfaces
Scalability
How does it scale up?
How does it scale down?
Management
Database driven?
Command line?
Hardware vs. Software
Hardware
Higher performance
Resilient against DDOS attacks
Not as susceptible to hacking, viruses
Unlikely to be as intelligent
Software
Scales better
More likely to be intelligent
Susceptible to DDOS attacks, hacking, viruses
Access vs. Trunking
Access
Boundary between endpoints and network
Firewall traversal
Hosted NAT traversal
Media conversion
Authentication, encryption
Topology Hiding
Trunking
Boundary between networks
Policy and Routing
Probably higher densities
Topology Hiding
Financial Stability
Media Proxy
RTP packets are relayed, hiding topology
Transcoding
Clean core networks
G.711-G.729-iSAC-iLBC
Protocol Fixup
RFC 2833 - Signaling DTMF
MPLS
Media flow control
Security
Authentication
Are you who you say you are?
Fraud control
Encryption
You can’t see what I’m doing
Possibly a focus of regulation or litigation
Policy Enforcement
Enforces contracts
Ensures correct billing
Topology Hiding
Hides details of network internals
Weak security measure
Security through Obscurity
Intelligence
Policy Enforcement
Bandwidth Issues
Calling (rates, simultaneous)
SCUD effect
Attack detection
Intelligence At the Edge
Media centric applications at the edge
Mixing, recording, playing, detecting
Disaggregated part of a NGN network
Thanks!