, , , , e.a.

Understanding Session Border Controllers

Comprehensive Guide to Deploying and Maintaining Cisco Unified Border Element Solutions

Paperback Engels 2019 9781587144769
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Enterprise and service provider networks are increasingly adopting SIP as the guiding protocol for session management, and require leveraging Session Border Controller (SBC) technology to enable this transition. Thousands of organisations have made the Cisco Unified Border Element (CUBE) their SBC technology of choice.

Understanding Session Border Controllers gives network professionals and consultants a comprehensive guide to SBC theory, design, deployment, operation, security, troubleshooting, and more. Using CUBE-based examples, the authors offer insights that will be valuable to technical professionals using any SBC solution.

The authors thoroughly cover native call control protocols, SBC behaviour, and SBC’s benefits for topology abstraction, demarcation and security, media, and protocol interworking. They also present practical techniques and configurations for achieving interoperability with a wide variety of collaboration products and solutions. Evaluate key benefits of SBC solutions for security, management, and interoperability Master core concepts of SIP, H.323, DTMF, signalling interoperability, call routing, fax/modem over IP, security, media handling, and media/signal forking in the SBC context Compare SBC deployment scenarios, and optimise deployment for your environment Size and scale an SBC platform for your environment, prevent oversubscription of finite resources, and control cost through careful licensing Use SBCs as a back-to-back user agent (B2BUA) to interoperate between asymmetric VoIP networks Establish SIP trunking for PSTN access via SBCs Interoperate with call servers, proxies, fax servers, ITSPs, redirect servers, call recording servers, contact centres, and other devices Secure real-time communications over IP Mitigate security threats associated with complex SIP deployments Efficiently monitor and manage an SBC environment

Specificaties

ISBN13:9781587144769
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Foreword xxx<br> Introduction xxxiii<br>Part I Introduction<br>Chapter 1 Laying the Groundwork 1<br> Overview of SIP 3<br> Overview of H.323 18<br> Introduction to SIP Trunking 20<br> Introduction to SDP 26<br> Overview of B2BUAs 42<br> Session Border Controllers 44<br> Cisco Unified Border Element 53<br> Summary 54<br> References 54<br>Chapter 2 SBC Deployment Models 55<br> Purposeful Deployments 56<br> CUBE Deployment Options 61<br> Multi-VRF Support on CUBE 68<br> SBC High Availability 72<br> Summary 108<br> References 109<br>Part II Architecture, Capabilities and Design<br>Chapter 3 Call Routing 111<br> Dialing and Routing a SIP Call 112<br> Call Routing Types 128<br> Next-Hop Determination 132<br> End-to-End Call Trace 141<br> CUBE Call Routing Mechanisms 149<br> Summary 221<br> References 222<br>Chapter 4 Signaling and Interworking 225<br> SIP—SIP Interworking 226<br> SIP Header Interworking 281<br> SIP Normalization 283<br> Transport and Protocol Interworking 299<br> Supplementary Services 312<br> SIP—H.323 Interworking 319<br> Summary 323<br> References 323<br>Chapter 5 Media Processing 327<br> Real-Time Transport Protocol 328<br> Real-Time Transport Control Protocol 334<br> SBC Handling of RTP and RTCP 341<br> Symmetric and Asymmetric RTP/RTCP 354<br> DSP-Based RTP Handling on SBCs 356<br> Media Anti-Tromboning 374<br> Alternative Network Address Types 378<br> Solving NAT Traversal Challenges 380<br> Troubleshooting RTP 404<br> Summary 413<br> References 413<br>Chapter 6 Secure Signaling and Media 415<br> Understanding Secure Technologies 415<br> Establishing Secure Sessions 449<br> SBC Signaling and Media Security 474<br> Alternative Security Methods 504<br> Summary 504<br> References 505<br>Chapter 7 DTMF Interworking 509<br> Introduction to DTMF Relay 510<br> Variants of DTMF Relay 512<br> DTMF Relay on SBCs 530<br> Configuring and Troubleshooting DTMF Relay 546<br> Summary 568<br> References 568<br>Chapter 8 Scalability Considerations 571<br> Platform Sizing 572<br> Licensing 598<br> Overload Prevention Techniques 610<br> Summary 625<br> References 626<br>Part III Integrations and Interoperability<br>Chapter 9 SIP Trunking for PSTN Access Through SBCs 627<br> Best Practices for ITSP Access with SBCs 628<br> SIP Trunk Registration 635<br> Authentication 642<br> Registration with SBCs 648<br> Troubleshooting 671<br> Summary 677<br> References 677<br>Chapter 10 Fax over IP (FoIP) on SBCs 679<br> Introduction to Fax 680<br> Analyzing a Basic Fax Call 683<br> Fax over IP (FoIP) 699<br> SBC Handling of FoIP 721<br> FoIP on CUBE 723<br> Summary 750<br> References 750<br>Chapter 11 Network-Based Call Recording 751<br> The Business Need for Call Recording 752<br> IETF SIP Recording Architecture (SIPREC) 753<br> SIPREC Configuration 763<br> SIPREC Troubleshooting 775<br> Cisco UC Gateway Services Architecture 789<br> The XCC and XMF Data Model 792<br> API-Based Recording 797<br> API-Based Recording Configuration 811<br> API-Based Recording Troubleshooting 823<br> Summary 836<br> References 836<br>Chapter 12 Contact Center Integration 839<br> Cisco UCCE Architecture 840<br> Inbound Calls to Agents 847<br> Call Transfers 885<br> Courtesy Callback 902<br> Call Progress Analysis (CPA) 914<br> Troubleshooting Scenarios 931<br> Summary 953<br> References 953<br>Part IV Security and Operations<br>Chapter 13 Security Threat Mitigation 955<br> An Overview of Security Threats to Collaboration Solutions 956<br> Types of Security Threats 959<br> Other SBC Security Features 998<br> Designing Collaboration Networks for Security 1009<br> Summary 1018<br> References 1018<br>Chapter 14 Monitoring and Management 1021<br> Monitoring 1021<br> Management 1050<br> Summary 1069<br> References 1070<br>Appendix A Q.850 Release Cause Values 1073<br>9781587144769, TOC, 11/7/2018</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Understanding Session Border Controllers