Professional Documents
Culture Documents
Session Border
Controllers
3rd Sonus Special Edition
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
www.wiley.com
Copyright 2013 by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the
prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest of
Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States
and other countries, and may not be used without written permission. Sonus and the Sonus logo are
registered trademarks of Sonus. All other trademarks are the property of their respective owners.
John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE
NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR
COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL
WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR
PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT
BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING
THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER
PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF
A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER
NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT
AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR
A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR
OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY
PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE
THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED
BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
For general information on our other products and services, or how to create a custom For
Dummies book for your business or organization, please contact our Business Development
Department in the U.S. at 877-409-4177, contact info@dummies.biz, or visit www.wiley.com/go/
custompub. For information about licensing the For Dummies brand for products or services,
contact BrandedRights&Licenses@Wiley.com.
ISBN: 978-1-118-85638-3 (pbk); ISBN: 978-1-118-85951-3 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
About This Book......................................................................... 2
Icons Used inThis Book............................................................. 2
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
iv
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Tip icon points out a bit of information that aids in your
understanding of a topic or provides a little bit of extra information that may save you time, money, and a headache.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Securing thenetwork
An SBC protects and secures the network, and its built from
the ground up to eliminate spoofing attacks, denial-of-service
attacks, and toll fraud. The SBC secures the network by
Interconnecting withtopology
hiding and protocol translation
While security and cost savings (through SIP Trunking,
covered in the preceding section) are a huge deal when
it comes to deciding to deploy an SBC, another factor is
equally important: providing a smooth experience in terms of
interconnecting and interworking between different networks
and the protocols running over them.
Specifically, the SBC performs tasks such as
Understanding theNeed
forSBCs
SBCs were first deployed primarily within service provider
networks. SBCs ensure that UC data are properly routed
between network providers, that differing protocols are
understood so the call can be delivered across different
networks, and that calls are secured.
As UC has become more common, the SBC is useful in more
places in the network, including at the border between an
enterprises network and the carriers. The most talked about
driver for the adoption of the SBC is security. VoIP (as well
as other session-oriented applications) is an application that
by its very nature is exposed to devices and networks that
are out of the control of an enterprise or a network provider.
VoIP isnt like traditional telephony where a very highly
circumscribed set of devices, protocols, and private networks
are involved in the process of placing and carrying calls.
In the old days when you placed a phone call (via landline
or cellular), the call was placed on an approved device and
carried across the private phone company network.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Dynamic pinholing
A pinhole is a port opened in a firewall designed to allow an
application to access the network. Leaving a port opened for a
long period of time enables security breaches by unauthorized
applications. SBCs can create pinholes programmatically and
leave them open for only a short period of time to minimize
security exposure. SBCs can then re-open ports as needed for
trusted applications to send and receive data.
List monitoring
The SBCs policy management system monitors incoming
requests and calls, uses rules to identify people who are and
arent abusing network resources, and maintains certain lists:
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IPv6 is Here
The IP variant that has powered the world through the Internet
revolution for the past 20 years or so has an issue, and its a big
one. IPv4, the first version, has a limited number of IP addresses.
IPv6 increases the address space of IP from 32 to 128 bits, which
means that there are potentially more than 3 billion, billion,
billion, billion IP addresses available in IPv6hopefully enough
for another 30 years, at least!
Not all networks themselves are going to support IPv6 at the
same time. When two clients want to communicate and one is
on an IPv4 network and the other on IPv6, something needs to
get in the middle and help them communicate. These issues
can be solved by an SBC in two ways:
VPN tunneling
Pretty much all enterprise and carrier IT professionals are
old hands at implementing virtual private networks (VPNs),
which are private and secured network connections carved
out of a shared or public telecommunications facility (like an
Internet connection) by using encryption and authentication.
Theoretically, all the traffic in a VPN connection flows over a
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10
Data firewalls
Every carrier or enterprise network has at least one type of
data firewall device installed at the edges of the network,
designed to allow only appropriate traffic to reach within the
network. Firewalls are great at keeping unauthorized users off
your file servers or even deflecting attacks on your web server.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2
Normalizing SIP
Session Initiation Protocol (SIP) is the primary protocol that
makes the connection between two endpoints and closes the
connection when the call is finished. At the most basic level,
SIP is the VoIP equivalent of the dialing tones that directed
old-fashioned analog calls to the right switches and across
the private phone network. The use of SIP is critical to the
capability of disparate network topologies from different
vendors to be able to communicate with each other.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12
Transcoding Calls
The SBCs jobor at least an SBC worth its saltis to
transcode, or change, codecs as sessions pass through
the SBC. The SBC knows which codecs are supported on
each side of the network border and is required, using a
combination of software and special-purpose digital signal
processors (DSPs), to decode and then re-encode the voice
or video signal as it crosses the network border.
Many codecsthe encode/decode algorithms that compress
voice and other signals (like video streaming across the network
in a videoconferencing environment)are in use in various VoIP
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
13
HD Voice
The sound quality of voice calls in general has taken a step
backwards over the years as convenience (mobile) and economics (VoIP) have caused a movement away from traditional
landline phones. A new effort called High-Definition (HD) Voice
has been brewing in the industry for a few years with a goal
of reproducing a greater range of frequencies at higher clarity
(known as a wideband codec) instead of traditional narrowband codecs (so called because they cut off both the top and
bottom frequencies normally found in a persons voice).
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14
Bandwidth restrictions
As much as you may like to have limitless bandwidth available to you, wherever you are (and personally, wed prefer it
to be very inexpensive too), thats simply not always the case.
Sometimes a call is made to someone whos connected to a
mobile network outside of not only 4G but also even 3G coverage. Other times, a call is made to a person in a home office
with a dial-up connection or someone using a spotty hotel
Wi-Fi connection.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
15
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
16
Intercompany communication
Enterprise NAT routers and firewalls are vital for securing a
private network, but they often wreak havoc on video communications because they block all incoming calls and
session requests, hide the network address of internal
devices, and degrade the performance by inspecting each
packet that traverses the firewall. There are ways to get
around NAT/firewall-related issues, such as disabling the
firewall, deploying a video-friendly firewall, or a video bridge
with dual network ports, but each of these options compromises security and performance and involves added security,
cost, and network complexity.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
17
Interoperability issues
A wide range of video conferencing standards exists, but
despite these standards, interoperability issues still prevail
due to different protocols (SIP, H.323) or video/audio compression (H.264, H.263, G.722, and so on). Some other issues
also include basic connectivity and interoperability with
devices that provide a less than optimal experience due to
call speed and device type.
SBCs can serve many purposes within an IP network by offering
features within the same device. An SBC can provide video proxy
services, NAT /firewall services, protocol conversion and transcoding, QoS monitoring, and more, driving down the cost and
complexity of a video conferencing environment. SBCs can also
perform protocol translation between SIP and H.323 as well as
H.264, H.263, G.722, and many other video and audio protocols.
Performance, Scalability,
Resiliency
If youve read the previous few sections talking about all the
things that an SBC must do, you may begin to imagine that
the SBC cant be a low-powered (computationally speaking),
dumb box. And in fact, youd be right. SBCs need to be powerful and robust devices with the right degree of extra capacity
and redundancy to handle not only the average number of
calls coming through the system simultaneously, but also to
scale up and handle peak callslike the flood of telephone
orders when a hot new product is announced.
When evaluating an SBCs performance, scalability, and resiliency,
consider the following factors:
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3
Underutilized hardware
Before the use of virtualization in the computer industry,
many data centers used about 10 percent of their total
capacity, meaning that nearly 90 percent of their capacity
went unused. Virtualization is the solution to this problem
by creating logical representations of physical devices so
organizations can increase their hardware utilization rates.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20
NFV
Virtualization isnt just for the data center. Communications
systems can also take advantage of the cost savings and
efficiency of virtualization technology. Network Functions
Virtualization (NFV) helps design, deploy, and manage network services by separating network functions from hardware
devices so they can run in software. This process removes the
need for you to purchase expensive, privately-owned hardware.
NFV allows for consolidating and delivering network functions
to support a fully-virtual infrastructure, including the servers
and storage devices, by using standard IT virtualization technology that runs on high-volume servers, switches, and storage hardware in wired and wireless networks. Virtualization
technology makes deploying and maintaining network
services much more cost-efficient than in the past.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
21
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22
Delivering agility
Agility is an absolute must in todays competitive marketplace
for businesses to survive and thrive. Service providers must be
able to quickly scale up or down their services to meet changing
market demands. They also need to innovate quickly and get
those innovations out to the market as quickly and easily as
possible. Virtual software SBCs allow for services to be delivered
via software to customers on industry-standard server hardware,
making it quick and easy to get these out to customers.
Make sure that the virtual software SBC works well with
the industry-leading virtualization platforms.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4
SBC inUC
Gone are the days when enterprise communications meant a
PBX-centric (you can find more info on PBX in Chapter1) solution that met nearly every employees requirements. Todays
employees want it allvoice, video, instant messaging, and
web-based appsand they want it wherever they are on whatever device they choose. The world is a mobile one, and enterprises need to harness the power of UC and the flexibility of
Bring Your Own Device (BYOD) policies to increase employee
productivity, reduce costs, and improve customer service.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
25
Call recording
Call recording is one of the most important features in the
contact center. Contact center managers use call recording as
both an agent evaluation and an agent training tool to ensure
agents provide the utmost quality in customer service.
In many cases, government regulations require calls to be
recorded for legal reasons and consumer protection as well.
Traditionally, call recording in communications networks
was done by consuming an extra data port on a switch to
replicate the call data to the recording system. Consuming
an extra data port to record calls doesnt scale well in many
contact centers that need to record each call that comes into
the system. The SBC simply replicates the SIP session for the
call to send the call data to the recording system, providing
reliable data transfer and freeing up data ports to allow more
incoming calls from customers.
Mobile agents
One of the largest trends in contact centers is the use of
mobile or work at home agents. Mobile agents allow for
contact centers to be flexible and scale up or down as business requires without the added expense of office space and
facility expansion. Consider, for example, a retailer that sees
dramatically expanded sales at Christmas. This retailer can
add temporary mobile agents to handle peak demands of customer service. Mobile technology allows for workers to work
out of their homes with flexible hours, making this arrangement appealing to workers.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26
Internal transfers
In many cases, calls may need to be transferred to another contact center within the organization. This can often lead to higher
costs and increased security risks because these transfers may
have to traverse public networks. SBCs can identify internal
transfers and use a feature called Take Back and Transfer, which
keeps the call on the private network, avoiding any costs and
security risks inherent with traversing public networks.
One case to consider is a video kiosk in a remote store where
a customer can make a video call to ask for assistance from an
agent in a contact center. In a non-SIP environment this setup is
complicated because both voice and video data travel though
many endpoints across networks, requiring each border
traversal to be secured and load balancing to be performed
across the network. The SBC provides the necessary security,
call routing, and load balancing features to make this type of
data transfer secure and cost efficient.
27
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
28
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
29
SBC inWebRTC
WebRTC is a new technology that lets you use phone, video,
or text right from the web page you go to. You can also share
screens (see the same web pages or files) and all sorts of new
things. The SBC plays an important role in WebRTC as you see
in this section.
Enterprise security
Because WebRTC applications run in a browser and transmit
application data across the unsecured public Internet, there
is a risk of attacks on the enterprise servers. Lets consider
a case where a customer initiates a customer support call
from a WebRTC-enabled browser. The SBC can secure the SIP
network in the contact center by being placed between the
WebRTC application server and the SIP network at the contact
center. The SBC can also provide session control and management between the WebRTC server and the SIP server at the
contact center.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
30
Media support
Consider a WebRTC-enabled browser initiating a video chat
with a non-WebRTC-enabled IP video phone. In this situation
the SBC can provide transcoding between the VP8 and H.264
video conference codecs between the WebRTC application
server and the IP video phone. The SBC can also provide
protocol internetworking between IP6 and IP4 and SRTP and
RTP for video media transfer. The SBC can also perform QoS
and policy control, ensuring the real-time media data get
network priority.
Lawful intercept
The SBC supports lawful intercept of both signaling and media
data transferred between the WebRTC server and the destination IP phone. As you can see, there is a vast role for SBCs in
many different environments. The SBC is a vital part of any
communications architecture.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5
Multimedia Matters
In This Chapter
Meeting customers video network requirements
Analyzing the challenges of video in IT systems
Using SBCs to create a video network that works
Deriving business value from SBCs in your video network
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32
Employees using a Cisco Jabber endpoint need to collaborate with other employees who are using Microsoft Lync.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
33
the same protocols and compression/decompression algorithms (codecs), only two components are required: a multipoint contact unit (MCU) and a gatekeeper or SIP proxy.
Think of the MCU as a funnel that takes in all of the video from
the participants cameras and combines them into one video
stream that is sent back to them. The gatekeeper or SIP proxy is
like a traffic cop that makes sure all ends of the session are connected and handles requests like those to let new participants
join and others hang up and leave.
The simple video system works well when all endpoints use
the same protocols, but what happens if the call has to pass
through a network firewall or one of the endpoints uses a different protocol? You can put in pinholes in the firewall to allow
traffic to pass through, but this can compromise security which
isnt desirable in most cases. In any case, the simple video
system breaks down when you have devices with different protocols and the video traffic must pass through a Network Address
Translation (NAT) (for more info on Network Address Translation,
see Chapter1) layer and corporate firewalls.
In real world video systems two additional video infrastructure
components, firewalls and SBCs, are crucial. It is important that
you understand how firewalls and SBCs work in a video system.
In a video system, firewalls and SBCs work in parallel.
Firewalls handle normal IP traffic and SBCs, handle the realtime communications traffic. Firewalls are designed to isolate
the computer resources in one network from those in another
to keep them safe from malicious attacks. Firewalls block
most incoming traffic except on certain ports coming only
from trusted connections configured by the network administrator. The firewall examines incoming or outgoing packets
and determines whether to forward them on. Devices from
outside the firewall on an untrusted network may send unsolicited invitations intended for someone inside of the firewall
to join in a voice and/or video communication session. In
cases where a device inside the firewall did not request the
invitation, the firewall just discards these requests. The IP
addresses of where to send the audio and video packets are
embedded with the IP packets. The firewall rejects the packets when it cant determine how to route them.
SBCs understand media protocols and can work side-by-side with
firewalls. You can think of an SBC as a real-time communications
firewall that makes a video system work securely and efficiently.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
34
Session management
The SBC is the ideal element in a complex network to enforce
call admission control on a session-by-session basis. Multiple
UC and video devices can access the SBC to perform call admission control (CAC). SBCs can perform Quality of Service (QoS)
(for more info on QoS, see Chapter2) functionality, making
audio and video pass through the network as with as much
quality as possible given any bandwidth constraints. CAC
helps to provide optimal end-user experience by regulating the
number of endpoints allowed on the network and making sure
theres enough bandwidth for each video and audio stream.
Endpoint interoperability
Many organizations have communication endpoints created
by different manufacturers or software developed by different vendors, such as Cisco Jabber and Microsoft Lync. Some
of these video systems use different video codecs so the SBC
must be able negotiate with each device so the same video
codec is used, ensuring interoperability with all devices.
Even if all endpoints in a video call use the same video codec, the
SIP protocol implementations used by Cisco, Microsoft, Avaya,
Polycom, and others are different enough to require a translation
device to make sure the signaling works to connect to all devices.
SBCs solve this problem by modifying the signaling information
contained with the SIP packets so that these endpoints can communicate with each other in what is called protocol normalization. Protocol normalization allows an organization to keep their
hardware and software investments while making video solutions
from different vendors work so they dont have to get all of their
network components from a single vendor.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6
oure all hyped up. Youve done all your session border controller (SBC) research. You know the benefits (Chapter1)
and the services (Chapter2) you get from an SBC. Now, you have
to pitch the idea to your CIO or CTO. Everyoneand we mean
everyone from enterprises to the biggest telecom carriersis
worried about budget and cost control. And while an SBC isnt a
massive expense, if your CIO or CTO sees a new budget item, hes
going to want some s erious justification.
In this chapter, we present the cost savings justifications
for SBCs and focus on how an SBC saves money relative to
a build-it-yourself approach where you cobble together the
functionality of an SBC by using other devices and custom
integration efforts. As a bonus, we give you two case studies
that show how SBCs are used in the real world.
Benefitting fromOne-Stop
Management
Localized policy management (see Chapter3) is a benefit of SBCs
from the perspective of cost and performance. The a
bility to
manage VoIP policies and media/signaling at one point in your
networkright at the border of the network in the SBCmeans
that you spend less technician time and money managing multiple devices like routers and adding additional transcoders.
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36
37
Deconstructed SBCs
Some vendors offer deconstructed
SBCs, which provide functionality in several distinct chassis/
systems. For example, one is for
signaling functions and another is
for media functions. You can present valid arguments either way for
38
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
39
Save money
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 7
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42
Peak Performance
The simultaneous proliferation of applications and devices has
led to a situation where the quantity of SIP traffic on any n
etwork
is explodingno matter how you measure it (more on that
in Chapter4). Sonus SBCs provide peak performance under
different load scenarios. Theyve been tested under extreme
conditions and even at levels that simulate a full-fledged network
attack. Sonus SBCs are designed to have sufficient overhead to
keep up.
Security fromAttacks
Securing the SIP network is an increasingly high priority for
enterprises and service providers alike. Sonus SBCs are
designed to
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
43
44
Scales withoutImpacting
Performance
Sonus uses a three-dimensional approach by discretely separating the processing functionality of the SBC so individual
tasks, such as transcoding or encryption, can scale up or
down without impacting the performance of other SBC tasks.
Network processing for networking stuff like the interworkings among different IP protocols and routing packets
These materials are 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.