An Analysis of The Requirements For Session Border Control in IMS Networks
An Analysis of The Requirements For Session Border Control in IMS Networks
An Analysis of The Requirements For Session Border Control in IMS Networks
Executive Summary
There is a lot of controversy and press coverage over both the role of Session Border Controllers (SBCs) and the design of the IP-Multimedia Subsystem (IMS). In this environment it is difficult to determine what are the real issues for each technology, let alone how they need to work together. This white paper is aimed at equipment manufacturers looking at building SBC functionality into their product range to target the IMS market, and carriers and consultants looking to understand how an SBC fits into an IMS network. It explains why IMS networks need session border control and what alternatives are available. It also looks at how these requirements are likely to evolve as services and access methods change, and discusses the function that products targeting this market require. SBCs are described both as a cure-all for next generation telecommunications networks and as an unnecessary attempt by carriers to stop their business becoming a simple bit-carrying commodity. This paper seeks to explain how these different views arise and the varied roles that SBCs play in IMS. About the Author Jonathan Cumming is Director of VoIP Product Management at Metaswitch. During his 7 years at Metaswitch, he has held a range of development, marketing and product management roles. Jonathan has over 17 years' experience in the communications software industry. He holds an MBA from INSEAD and an Engineering degree from Cambridge University.
Table of contents
1. Introduction ............................................................................................................................1 1.1 1.2 2. Overview of Session Border Control................................................................................... 2 Overview of IMS................................................................................................................ 5
IMS Requirements for SBC .....................................................................................................12 2.1 2.2 2.3 2.4 2.5 2.6 Security........................................................................................................................... 13 Call Admission Control.....................................................................................................14 Monitoring....................................................................................................................... 15 Privacy ............................................................................................................................ 15 VoIP Protocol Problems ....................................................................................................16 Summary......................................................................................................................... 17
3.
IMS architecture for SBC ........................................................................................................18 3.1 3.2 3.3 UNI..................................................................................................................................19 NNI................................................................................................................................. 20 Reference Points..............................................................................................................21
4.
IMS SBC Products................................................................................................................. 24 4.1 4.2 4.3 Scope of function............................................................................................................ 24 Management and Control................................................................................................ 29 Product Evolution............................................................................................................ 29
5.
The Future ............................................................................................................................. 31 5.1 5.2 The Future of IMS ............................................................................................................. 31 SBC Function Evolution ................................................................................................... 32
6. 7.
Conclusion ............................................................................................................................35 Further Information............................................................................................................... 36 7.1 7.2 7.3 Sources .......................................................................................................................... 36 Reference material.......................................................................................................... 36 Glossary of Acronyms ......................................................................................................37
8.
About Metaswitch................................................................................................................. 39
1. Introduction
The IP-Multimedia Subsystem (IMS) defines the functional architecture for a managed IP-based network. It aims to provide a means for carriers to create an open, standards-based network that delivers integrated multimedia services to increase revenue, while also reducing network CapEx and OpEx. IMS was originally designed for third-generation mobile phones, but it has already been extended to handle access from WiFi networks, and is continuing to be extended into an access-independent platform for service delivery, including broadband fixed-line access. It promises to provide seamless roaming between mobile, public WiFi and private networks for a wide range of services and devices. This move, from a centrally managed network with control over the core and access networks to an open network with soft clients, represents a sea change in the applicability and deployment of IMS. Previously, it was aimed at centrally-managed networks with significant control over the core and access networks and the clients. Now it is moving to a much more open network model, where previous assumptions about the sorts of connecting networks and clients break down. This introduces the need for session border control at the network boundary to provide security, interoperability and monitoring. This white paper examines these evolving requirements for IMS and where session border control fits in the IMS functional architecture. It also assesses the market for equipment targeting this space; both the evolution of existing equipment to handle these new requirements and the likely future evolution as the market and technology mature. This chapter provides an overview of session border control and IMS. Chapters 2 and 3 cover the requirements for session border control in IMS and how this function fits into the IMS architecture Chapters 4, 5 and 6 discuss what products need to address these requirements, how this market is likely to change in the future, and what conclusions can be drawn from this. Chapter 7 provides a list of references to additional information and a glossary of the acronyms used throughout this document. Chapter 8 contains information on Metaswitch and its products.
UE
Enterprise Network
Core Network
UNI
NNI
The diagram depicts a single device at the edge of each network (a traditional SBC), but there is actually great flexibility in how this function is distributed. For example, a device in the access network might perform initial user authentication an edge device might enforce access policy to limit Denial of Service (DoS) attacks and prevent bandwidth theft core devices might limit the total usage for a particular group of users and detect distributed DoS attacks. The location of each function will depend on the overall system design, including the availability of processing resources and the level of trust between the different devices.
The following sections describe each of the SBC functions. For a more detailed description of Session Border Controllers, see our white paper: Session Border Controllers: Enabling the VoIP revolution.
1.1.2 Security
An insecure network cannot charge for its use or provide a guaranteed QoS service, because unauthorized users cannot be prevented from overusing limited network resources. SBCs can provide security and protection against unauthorized access into the trusted network invalid or malicious calls, including Denial of Service (DoS) attacks bandwidth theft by authorized users unusual network conditions, for example a major emergency.
Typical resources that require protection are bandwidth on access links and processing capacity on network servers. In general, core network links can be cheaply over-provisioned to help prevent them becoming bottlenecks.
To provide this security, the SBC identifies and authenticates each user and determines the priority of each call limits call rates and resource usage to prevent overloads authorizes each media flow and classifies and routes the data to ensure suitable QoS prevents unauthorized access for both signaling and media traffic.
QoS across the core of the network is normally handled by an aggregated classification mechanism, for example DiffServ, as this removes the overhead of reserving bandwidth for each individual flow. The SBC may also be used to enforce QoS in the access network by signaling to the access routers or instructing the endpoint to reserve necessary resources across the access network. Alternatively, an intelligent access network may independently determine appropriate QoS for the media streams by analyzing the call signaling messages.
1.1.3 Monitoring
Network usage may need to be monitored for regulatory reasons (such as wiretapping and QoS monitoring), as well as commercial reasons (such as billing and theft-detection). The monitoring devices need sufficient intelligence to understand the signaling and media protocols. They must also be located at a point through which all media and signaling flows. SBCs fulfill both these requirements as all traffic passes through an SBC to enter the network. They provide a scalable, distributed solution to this processing-intensive function.
An SBC can be used to remove confidential information from messages before they leave the core network, including details of internal network topology and routing of signaling through the core network. It can also hide the real address of the user by acting as a relay for both the media and the signaling.
Putting this function in the SBC, which is close to the access device, simplifies the core network devices by limiting the range of protocol variations that they must support.
At the same time, it draws on the traditional telecommunications experience of guaranteed QoS flexible charging mechanisms (time-based, call-collect, premium rates) lawful intercept legislation compliance.
Network operators also hope that IMS will cut their CapEx and OpEx through the use of a converged IP backbone and the open IMS architecture. The IMS architecture defines many common components (for example, call control and configuration storage) so less development work is required to create a new service as this existing infrastructure can be reused. The use of standardized interfaces should increase competition between suppliers; preventing operators from being locked into a single suppliers proprietary interfaces. As a result, IMS should enable new services to be rolled out more quickly and cheaply, compared with the traditional monolithic design of telephony services.
1.2.2 Drivers
Although originally developed for mobile operators, the main interest in IMS is from fixed line operators, as the existing fixed-line network is older and is due for replacement, whereas much of the mobile infrastructure has only recently been deployed. In particular, the current generation of fixed telephone networks is limited to narrowband voice services and is at great risk of being displaced by mobile and Internet telephony services. An IMSbased network would enable fixed line operators to offer a much wider range of services, to help protect their market. Despite the widespread industry support for IMS, many uncertainties remain over its value. The cost of a providing such a QoS-enabled managed network is high compared with the Internets stateless model. Also, as the success of Vonage and Skype and many other VoIP providers testifies, telephony services are easily provided over the public Internet and the quality is sufficient for many situations.
In order to justify the investment in IMS, the resulting service must be significantly better than that available over the Internet and people must be prepared to pay for it. Whether IMS is a commercial success will be determined over the coming years, but competition from Internet-based providers will make this a competitive market.
1.2.3 Architecture
IMS decomposes the networking infrastructure into separate functions with standardized interfaces between them. Each interface is specified as a reference point, which defines both the protocol over the interface and the functions between which it operates. The standards do not mandate which functions should be co-located, as this depends on the scale of the application, and a single device may contain several functions. The 3GPP architecture is split into three main planes or layers, each of which is described by a number of equivalent names: Service or Application Plane, Control or Signaling Plane, and User or Transport Plane.
S-CSCF
I-CSCF
S-CSCF
I-CSCF P-CSCF
Home Network
UE Access Network
NNI
NNI
UE
IMS Authentication and access control Call Signaling Media Control Media
IMS Core
To IMS Services
GGSN
PDG
BAS
SGSN
WAG
DSLAM
UE
xt te on C
UE
Although IPv6 is defined for this transport plane, many initial deployments are built upon existing IPv4 infrastructure and use private IPv4 addresses. This introduces Network Address Translators (NATs) at the boundary of each address domain and the associated difficulties routing VoIP calls across the boundary. Access into the core network is through Border Gateways (GGSN/PDG/BAS). These enforce policy provided by the IMS core: controlling traffic flows between the access and core networks, as follows. With GPRS/UMTS access, the GGSN authenticates the user equipment (UE) and controls the establishment of media channels using authenticated PDP contexts. This enforces QoS and access control through the access network to the UE. With Wireless LAN (WLAN) access, the Packet Data Gateway (PDG) controls the establishment of tunnels through the access network to the UE. These tunnels provide security of the
3GPP Release 7 adds support for IP connectivity over a range of access technologies including wireline access via DSL and Cable. 3GPP are working with ETSI TISPAN to define R7 standards, where the IMS core is connected to external networks through Border Gateways that are not part of the core IMS specifications.
It is this change from a very controlled network with limited access methods in Releases 5 and 6, to a much wider range of access devices in Release 7, which introduces the need for Session Border Controllers.
IMS Core
IMS Core
IMS Core
Access Control
Visited Network
Home Network
Called Network
Access Control
The core network needs to be protected against all of the threats described in section 1.1, but each interface imposes a different set of border control requirements due to differences in the attached devices and access networks. The following sections describe the common requirements and the specific issues that each interface introduces.
2.1 Security
Security in IMS Releases 5 and 6 is designed around an open IPv6 core with well protected access. Access to the network core is protected using transport layer security on the UNI in the form of authenticated PDP contexts and tunnels. The NNI is an internal trusted interface within this secure core, so requires very little security. However, 3GPP Release 7 and the reality of early IMS deployments have changed this model, and have expanded the range of security needed on each interface. Nevertheless over some interfaces, a subset of this functionality may be provided by the access network.
There is also scope for specialist SBC devices that act as gateways between specific types of access network and an IP core. These SBCs will be aimed at providers who require tighter integration with the access network (for example, providers who own the access network) and will incorporate both SPDF and A-RACF functionality.
2.3 Monitoring
Government regulations and commercial reasons both require monitoring of network use. 3GPP Release 5 did not include monitoring on the NNI. However, reconciliation of inter-carrier charges, monitoring of service level agreements (SLAs), and lawful intercept of calls traversing the network, have all increased the need for monitoring on this interface.
2.4 Privacy
Privacy of both network topology and user information is required on all interfaces. Again, network topology hiding was not considered in the design of 3GPP Release 5, but is considered a requirement for real deployments to protect this commercially-sensitive information from peers. The requirements of Telco networks impose two aspects to privacy of user information. A caller may request for his identity to be hidden from the callee. The callerss identity must be available for emergency calls and lawful intercept regulations.
These requirements mean that user policy may modify the visible identification of the user to the callee, but that the signaling within the trusted core must continue to contain the true identity of the caller at the border of the trusted network, the true identity of the caller must be removed.
The border of the trusted network may be the edge of one carriers core, or contain the core networks of several different carriers, depending on the regulations under which each operates.
The scope of VoIP protocol problems seen depends on the interface and access method, as each has very different characteristics.
Firewall and NAT traversal mechanisms are not required, as the peer carrier is expected to manage its own NAT/Firewall.
2.6 Summary
The following table summarizes the original SBC function defined in 3GPP Releases 5 and 6, and the new function introduced with Release 7 and early IMS deployments. Releases 5 and 6 Security Access network enforces access controls Peer networks are trusted CAC Single policy interface for requesting admission of services. Privacy Topology hiding not considered User privacy is handled by the P-CSCF Topology hiding required. Media relayed to hide end-user location User privacy may be required at gateways to non-IMS networks Monitoring VoIP Protocol problems Monitoring of UNI for billing and lawful intercept Monitoring of NNI to enforce intercarrier agreements NAT to support IPv4 core with private addresses. NAT / firewall traversal on UNI Interoperability with devices with limited function Multiple policy interfaces for requesting admission of services. Additional requirements in Release 7 and Early IMS Border gateway enforces policy at all network boundaries
The following sections describe the differences between the function required on the UNI and NNI and the set of IMS functions that may be combined into an IMS-targeted SBC.
3.1 UNI
The following diagram shows how the IMS functions could be combined at the UNI to build an SBC for 3GPP Release 6 and Release 7 network access.
SBC
P-CSCF Gq' RACS A-RACS SPDF Ia A-BGF P-CSCF
Internal Signaling
Internal Media
SBC
P-CSCF Gq
R7 Access Network
In both R6 and R7 access scenarios, the RACS / PDF components could either be a part of the SBC itself, or else could be separate devices with which the SBC communicates over the network. These options are discussed in more detail in section 4. In terms of the 3GPP architecture, the SBC function is split between the following logical functions. R6 - GPRS/UMTS/WiFi P-CSCF Controls security over the access network Tells the PDF what resources are required for the call PDF / SPDF Implements media resource allocation policy Authorizes media resource requests from BGF Programs the A-BGF to accept media flows Additional SBC features in R7 SIP Application Level Gateway (ALG) for IPv4 address translation and NAT firewall traversal
Additional SBC features in R7 Controls resources within the access network In 3GPP Release 7, the management of the access network is split out of the expanded PDF into the A-RACF. The combination of the A-RACF and SPDF is known as the Resource and Admission Control Subsystem (RACS).
A-BGF
Provides media relay for hiding endpoint address with managed pinholes to prevent bandwidth theft
3.2 NNI
The SBC-related functions within the NNI have a similar architecture to the UNI. This is shown in the following diagram. Again, the I-CSCF could also be part of the SBC in some situations.
Internal Signaling
The IBCF and I-BGF are new functions in IMS Release 7. SBC features provided IBCF Interconnect Border Control Function I-BGF Interconnect Border Gateway Function Transport-level security Tells the RACS what resources are required for the call NAPT function and control of NAPT in BGF Media relay for hiding endpoint address Pinholes to prevent bandwidth theft NAPT and NAT/Firewall traversal for media flows
There is ongoing discussion whether the IBCF and I-BGF function should be standardized within the IMS architecture. The ETSI TISPAN recommendation is that they remain outside the core specifications, providing a flexible gateway to other networks. There is also discussion over the inclusion of a standardized RACS function between the IBCF and IBGF, as on the UNI, to mediate requests for media resources and manage local policy.
P-CSCF
e2 Gq'
User
DSL Access Network
CLF
Re
A-RACF
SPDF
RTP
RCEF
BGF
The following diagram shows the reference points used at the NNI.
Legacy Network
Mw / Mk / Mm IMS Core
Iw
IBCF
Gq' RACS
Ic
Other Network
SPDF
BGF
I-BGF
The main reference points involved in session border control from these two diagrams are described in the following subsections.
P-CSCF
RACS / PDF External Signaling External Media BGF / PDG / GGSN / BAS Internal Signaling Internal Media
Access Network
SBC
Core Network
Althou
gh in some small-scale applications, it makes sense to include all these functions in a single device, this solution does not scale well to the requirements of service providers. For these applications, the media, signaling and CAC processing will often be split into separate devices, with the signaling processing clustered into regional server farms, the CAC processing centralized (and possibly supplied wholesale by a third party supplier) and the media processing distributed closer to the user. This provides economies of scale on the signaling processing and increases network manageability, whilst maintaining direct media routing to minimize network transit delays. The following sections discuss options for multi-device SBC solutions in IMS.
SBC
P-CSCF Gq' RACS A-RACF Re RCEF SPDF Ia A-BGF
I-CSCF / S-CSCF
Internal Signaling
Internal Media
SBC-SIG
P-CSCF Gq' RACS A-RACF SPDF
Re / Ia
SBC-MEDIA
RCEF A-BGF
SBC
P-CSCF Gq' RACS A-RACF Rq SPDF Ia A-BGF
I-CSCF/ S-CSCF
Internal Signaling
Internal Media
SBC-SIG
P-CSCF Gq' RACS A-RACF Rq SPDF
Ia
SBC-MEDIA
A-BGF
SBC-SIG
P-CSCF
I-CSCF / S-CSCF
Internal Signaling
Internal Media
Gq'
Ia
SBC-MEDIA
A-BGF
Unspecified
SBC
P-CSCF Gq' RACS A-RACF Rq SPDF Ia A-BGF
Internal Signaling
SBC
IBCF Gq' RACS SPDF Ia SIP Signaling Diameter H.248 Media Peer
SBC-SIG
Internal Signaling IBCF Gq' RACS SPDF
Ia
SBC-MEDIA
Internal Media I-BGF
Internal Signaling
SBC
IBCF Gq' Peer
RACS SPDF Ia SIP Signaling Internal Media I-BGF Diameter H.248 Media
SBC-SIG
Internal Signaling IBCF Gq' RACS SPDF Ia
SBC-MEDIA
Internal Media I-BGF
SBCs targeted at the broadband access market. These may not be designed to fit the IMS architecture and generally do not support the IMS reference points and 3GPP-specific protocol extensions.
IP and multi-service routers that have traditionally targeted the IP carrier interconnect and carrier edge markets. These products excel at high-performance routing, but need to add both the SBC function and IMS interfaces.
The short-term effect is that very different products are being promoted as fulfilling this same requirement, and the still-evolving standards are being pushed by each manufacturer to conform as closely as possible to its existing product range. At the same time, there is huge pressure on the manufacturers to enhance their products to address the rapidly growing IMS SBC market. Depending on their situation, most are taking one of the following routes. Developing the function themselves, often incorporating much of the technology from independent suppliers such as Metaswitch to reduce cost and improve time to market. Partnering with complimentary suppliers. Purchasing companies with the relevant expertise and then trying to merge the product lines, (for example, Juniper/Kagoor, Tekelec/IPtel, NetCentrex/NeoTIP). Whichever method they choose, a rapidly expanding range of IMS-targeted devices incorporating SBC functionality will evolve to create an extremely competitive market. However, given the amount of investment by operators in their next generation networks, this will be extremely lucrative for those vendors that get it right.
5. The Future
Looking forward, there are two areas that we need to consider to predict the evolution and interaction of IMS and SBC products. Firstly, the future of IMS and its requirements for session border control. Secondly, the evolution of session border control function itself as VoIP technology matures.
5.1.1 Legislation
Government action to apply lawful intercept (wire tapping) and mandatory quality levels to telephony services may force all telephony service providers (including pure VoIP services) to deploy managed networks with border controls. However, unless governments make it illegal to communicate over P2P VoIP services (as they have in China), the effect of this sort of legislation will be to increase the cost of providing a traditional telephony service and increase the use of less regulated P2P solutions.
Many factors influence consumers choices, but important areas include reliability trust, including solutions to SPAM Telephony (SPIT) and SPAM Messaging (SPIM) convenience and simplicity cost.
The IMS architecture as it is currently designed is focused on an operator knows best model. The success IMS and its evolution will depend on whether consumers agree with operators choices or require a different set of features and restrictions.
5.2.1 Security
SBCs cannot support end-to-end security, as they need to be able to understand and modify the signaling messages. If users require higher security then they will use an encrypted P2P service across an open IP network instead. The primary driver for such end-to-end security is likely to be illegal avoiding surveillance by the intelligence services but it may also be used to prevent unauthorized surveillance, for example by an intermediate carrier or competitor. The security model provided by IMS will not change it will remain point-to-point. Users who require end-to-end security will use an alternative service, or encrypt the media to provide sufficient security for their requirements.
Symmetric NATs set up separate mappings between the private IP address and port, and the public IP address and port, for each remote address. As a result, an endpoint cannot use STUN to determine a public address that a third-party can use to route media to it through a symmetric NAT. Instead, a media relay must be used.
5.2.4 QoS
QoS across core networks is already extremely good, and the Internet has been shown to be capable of handling serious disruptions to its infrastructure without significant effect on its performance. However, QoS in access networks remains a challenge. Bandwidth availability within access networks will continue to increase, but new services will evolve to use any extra capacity, so QoS mechanisms within access networks will continue to be required. The design of these mechanisms will depend on the specific access medium: in some cases an SBC will be required to enforce the rules at the network boundary, but in others it will be possible to negotiate access end-to-end. It is certain is that differential handling of different classes of traffic over the access network will increase, however it is not clear that this will require session border control at the core network end of the link to enforce policy. A more flexible solution would be to allow the endpoint to determine the class of service to be applied to each stream using an out-of-band mechanism.
6. Conclusion
Session border control is fundamental to the IMS proposition to both operators and consumers. The exact function required will evolve as the underlying infrastructure and customers demands change, but SBCs will always be part of any IMS solution. There is short-term pressure for manufacturers to enhance their existing SBC and IMS products to enable them to be used as part of a 3GPP Release 7 solution. This will be a competitive area with products being developed by many manufacturers, but is also an area that requires an unusually wide breadth of expertise, so will challenge the expertise of many contenders. Longer term, the evolution of session border control in IMS networks will depend on the ability of IMS-based networks to compete with lower-cost solutions available over the Internet, and of operators to charge enough for the QoS and security that they offer. With or without IMS, SBCs will continue to provide protection at the boundaries between managed networks. The evolution of the next generation of Telco networks will just determine where and how transparent those boundaries are.
7. Further Information
7.1 Sources
GSM Association IETF SIP Forum 3rd Generation Partnership Project SIP Working Group SIPPING Working Group ETSI TISPAN 3GPP2 http://www.gsmworld.com http://www.ietf.org http://www.sipforum.org http://www.3gpp.org http://www.softarmor.com/sipwg http://www.softarmor.com/sipping http://portal.etsi.org/tispan http://www.3gpp2.org
7.2.1.2 SBC
Metaswitch white paper Session Border Controllers: Enabling the VoIP Revolution
7.2.1.3 SIP
Metaswitch white paper IETF RFC Session Initiation Protocol (SIP) SIP Market Overview
3261 IETF RFC 3489 STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)
S-CSCF SBC SGSN SIP SLA SOHO SPDF STUN THIG TrGW UE UNI VLAN VPN WAG WLAN
Serving CSCF Session Border Controller Serving GPRS Support Node Session Initiation Protocol Service Level Agreement Small Office Home Office Service-based Policy Decision Function Simple Traversal of UDP through NATs Topology Hiding Inter-network Gateway Transition Gateway User Equipment User-Network Interface Virtual Local Area Network Virtual Private Network Wireless Access Gateway Wireless Local Area Network
8. About Metaswitch
Metaswitch is a privately owned technology company based in London, UK. We have US offices in Alameda, CA, Reston, VA, and Boxborough, MA. Our Network Protocols Division is the leading developer and supplier of (G)MPLS, OSPF(-TE), ISIS(-TE), BGP, VPN, RIP, PIM, IGMP, MLD, ATM, MGCP, Megaco, SCTP, SIP, VoIP Conferencing, Messaging, Directory and SNA portable products. Customers include Alcatel, Cisco, Fujitsu, HewlettPackard, Hitachi, IBM Corp., Microsoft, Nortel and Sun. Our company culture focuses on building software of consistently high quality, developed and supported by engineers who are with Metaswitch for the long term. Founded in 1981, we have over 450 employees, of whom 280 are engineers. The average length of service of engineers at Metaswitch is 8 years, and the annual attrition rate is 3%. Throughout this period, Metaswitch has been consistently profitable with profits exceeding 15% of revenue. 2007-2008 revenues were $118m with $22m profit. Over 90% of revenue is generated from exports and 80% is from customers in the US (so we are very used to working with American companies). The company is privately held by top-tier investment firms Francisco Partners and Sequoia Capital, as well as the Employee Benefit Trust (EBT). As part of this ownership structure, Metaswitch distributes a share of profit to all employees, equitably rewarding them for their contribution and encouraging long-term commitment. As a private company with an emphasis on long-term stability, we are not driven by the short-term requirements of quarterly profit statements. This means that we can concentrate on providing software as we would like that is, developing high quality implementations of complex technologies. Drawing from technology and experience from multiple divisions of Metaswitch the Network Protocols division has developed a fully portable Session Border Controller (DC-SBC) software solution designed specifically for system vendors. Metaswitchs extensive VoIP and IP routing heritage provides OEMs with a field-hardened SBC solution that is deployable immediately, delivering dramatic cost and time to market savings. Along with traditional session border controller functionality, DC-SBC also supports many of the vital functions required in IMS networks including P-CSCF, IBCF, SPDF, and BGF/I-BGF roles. Furthermore, Metaswitch offers a full range of VoIP and IMS protocols stacks (DC-SIP, DC-Megaco/H.248 and
DC-Diameter) that support the required interfaces and enhancements to fully operate in standardsbased IMS environments. All of the Metaswitch protocol implementations are built with scalability, distribution across multiple processors and fault tolerance architected in from the beginning. We have developed extremely consistent development processes that result in on-time delivery of highly robust and efficient software. This is backed up by an exceptionally responsive and expert support service, staffed by engineers with direct experience in developing the protocol solutions. Metaswitch and the Metaswitch logo are trademarks of Metaswitch Networks. All other trademarks and registered trademarks are the property of their respective owners. Copyright 2007 - 2009 by Metaswitch Networks. Metaswitch Networks 100 Church Street Enfield EN2 6BQ England +44 20 8366 1177 http://www.metaswitch.com