Internet Protocol Cisco
Internet Protocol Cisco
You can download IPJ Please check your subscription expiration date and renew online if
back issues and find you wish to continue receiving this journal. Click the “Subscriber
subscription information at: Services” link at www.cisco.com/ipj to get to the login page. If you
www.cisco.com/ipj need any assitance just send e-mail to [email protected] and we will
make the necessary changes for you.
ISSN 1944-1134
—Ole J. Jacobsen, Editor and Publisher
[email protected]
Emergency Services for Internet Multimedia
by Hannes Tschofenig, Nokia Siemens Networks and Henning Schulzrinne, Columbia University
S
ummoning the police, the fire department, or an ambulance
in emergencies is one of the most important functions the
telephone enables. As telephone functions move from circuit-
switched to Internet telephony, telephone users rightfully expect that
this core feature will continue to be available and work as well as it
has in the past. Users also expect to be able to reach emergency assis-
tance using new communication devices and applications, such as
instant messaging or Short Message Service (SMS), and new media,
such as video. In all cases, the basic objective is the same: The person
seeking help needs to be connected with the most appropriate Public
Safety Answering Point (PSAP), where call takers dispatch assistance
to the caller’s location. PSAPs are responsible for a particular geo-
graphic region, which can be as small as a single university campus
or as large as a country.
Location Information
Emergency services need location information for three reasons:
routing the call to the right PSAP, dispatching first responders (for
example, policemen), and determining the right emergency service
dial strings. It is clear that the location must be automatic for the
first and third applications, but experience has shown that auto-
mated, highly accurate location information is vital to dispatching
as well, rather than relying on callers to report their locations to the
call taker.
Obligations
This section discusses the requirements the different entities need to
satisfy, based on Figure 2. A more detailed description can be found
in [15].
Note that this narration focuses on the final stage of deployment and
does not discuss the transition architecture, in which some imple-
mentation responsibilities can be rearranged, with an effect on the
overall functions offered by the emergency services architecture. A
few variations were introduced to handle the transition from the cur-
rent system to a fully developed ECRIT architecture.
ISP
LIS
Distributed
(a) Mapping Database
(b) (b)
Emergency
Services
IP Network
VSP
(c) (d)
ESRP
ESRP PSAP
End Hosts
An end host, through its VoIP application, has three main respon-
sibilities: it has to attempt to obtain its own location, determine
the URI of the appropriate PSAP for that location, and recognize
when the user places an emergency call by examining the dial string.
The end host operating system may assist in determining the device
location.
ISP
The ISP has to make location information available to the endpoint
through one or more of the location configuration protocols.
The ISP may also operate a (caching) LoST server to improve the
robustness and reliability of the architecture. This server lowers the
round-trip time for contacting a LoST server, and the caches are most
likely to hold the mappings of the area where the emergency caller is
currently located.
When ISPs allow Internet traffic to traverse their network, the signal-
ing and media protocols used for emergency calls function without
problems. Today, there are no legal requirements to offer prioriti-
zation of emergency calls over IP-based networks. Although the
standardization community has developed a range of Quality of
Service (QoS) signaling protocols, they have not experienced wide-
spread deployment.
VSP
SIP does not mandate that call setup requests traverse SIP proxies;
that is, SIP messages can be sent directly to the user agent. Thus, even
for emergency services it is possible to use SIP without the involve-
ment of a VSP. However, in terms of deployment, it is highly likely
that a VSP will be used. If a caller uses a VSP, this VSP often forces
all calls, emergency or not, to traverse an outbound proxy or Session
Border Controller (SBC) operated by the VSP. If some end devices
are unable to perform a LoST lookup, VSP can provide the necessary
functions as a backup solution.
If the VSP uses a signaling or media protocol that the PSAP does not
support, it needs to translate the signaling or media flows.
VSPs can assist the PSAP by providing identity assurance for emer-
gency calls; for example, using [30], thus helping to prosecute prank
callers. However, the link between the subscriber information and
the real-world person making the call is weak.
In many cases, VSPs have, at best, only the credit card data for their
customers, and some of these customers may use gift cards or other
anonymous means of payment.
PSAP
The emergency services Best Current Practice document [15] dis-
cusses only the standardization of the interfaces from the VSP and
ISP toward PSAPs and some parts of the PSAP-to-PSAP call transfer
mechanisms that are necessary for emergency calls to be processed by
the PSAP. Many aspects related to the internal communication within
a PSAP, between PSAPs as well as between a PSAP and first respond-
ers, are beyond the scope of the IETF specification.
Mapping Architecture
So far we have described LoST as a client-server protocol. Similar
to the Domain Name System (DNS), a single LoST server does not
store the mapping elements for all PSAPs worldwide, for both tech-
nical and administrative reasons. Thus, there is a need to let LoST
servers interact with other LoST servers, each covering a specific geo-
graphical region. Working together, LoST servers form a distributed
mapping database, with each server carrying mapping elements, as
shown in Figure 3. LoST servers may be operated by different enti-
ties, including the ISP, the VSP, or another independent entity, such as
a governmental agency. Typically, individual LoST servers offer the
necessary mapping elements for their geographic regions to others.
However, LoST servers may also cache mapping elements of other
LoST servers either through data synchronization mechanisms (for
example, FTP or exports from a Geographical Information System
[GIS] or through a specialized protocol[25]) or by regular usage of
LoST. This caching improves performance and increases the robust-
ness of the system.
Traditional Endpoints
Figure 4 shows an emergency services architecture with traditional
endpoints. When the emergency caller dials the Europeanwide emer-
gency number 112 (step 0), the device treats it as any other call
without recognizing it as an emergency call; that is, the dial string
provided by the endpoint that may conform to RFC 4967[26] or RFC
3966[27] is signaled to the VSP (step 1). Recognition of the dial string
is then left to the VSP for processing or sorting; the same is true for
location retrieval (step 2) and routing to the nearest (or appropriate)
PSAP (step 3). Dial-string recognition, location determination, and
call routing are simpler to carry out using a fixed device and the voice
and application service provided through the ISP than they are when
the VSP and the ISP are two separate entities.
ISP
Distributed
LIS Mapping Database
(2) ge
Lo
ca han
tio Exc
nR
col
et to
rie o
va T Pr
l
LoS
(3)
ESRP PSAP
Additional software upgrades at the end device may allow for rec-
ognition of emergency calls based on some preconfigured emergency
numbers (for example, 112 and 911) and allow for the implementa-
tion of other emergency service-related features, such as disabling
silence suppression during emergency calls.
Outlook
In most countries, national and sometimes regional telecommunica-
tions regulators, such as the Federal Communications Commission
(FCC) and individual states, or the European Union, strongly influ-
ence how emergency services are provided, who pays for them, and
the obligations that the various parties have. Regulation is, however,
still at an early stage: in most countries current requirements demand
only manual update of location information by the VoIP user. The
ability to obtain location information automatically is, however, cru-
cial for reliable emergency service operation, and it is required for
nomadic and mobile devices. (Nomadic devices remain in one place
during a communication session, but are moved frequently from
place to place. Laptops with Wi-Fi interfaces are currently the most
common nomadic devices.)
[4] Schulzrinne, H., McCann, S., Bajko, G., Tschofenig, H., and D.
Kroeselberg, “Extensions to the Emergency Services Architecture
for Dealing with Unauthenticated and Unauthorized Devices,”
Internet Draft, work in progress, draft-ietf-ecrit-unau-
thenticated-access-00.txt, September 2010.
[14] Polk, J., Rosen, B., and J. Peterson, “Location Conveyance for
the Session Initiation Protocol,” Internet Draft, work in prog-
ress, draft-ietf-sipcore-location-conveyance-03, July
2010.
[17] Polk, J., Schnizlein, J., Linsner, M., and B. Aboba, “Dynamic
Host Configuration Protocol Option for Coordinate-based
Location Configuration Information,” Internet Draft, work in
progress, draft-ietf-geopriv-rfc3825bis-11, July 2010.
[22] Schulzrinne, H., Liess, L., Tschofenig, H., Stark, B., and A. Kuett,
“Location Hiding: Problem Statement and Requirements,”
Internet Draft, work in progress, draft-ietf-ecrit-loca-
tion-hiding-req-04, Feb 2010.
T
his article explores the architectural and operational
challenges involved in integrating an existing standalone core
Border Gateway Protocol (BGP)/Multiprotocol Label Switch-
ing (MPLS) VPN network onto a target Next-Generation Network
(NGN). The rationale for consolidating and transforming multiple
networks is explained, mainly in terms of potential cost savings and
operational simplification achieved by the network operator. The
article specifically focuses on the MPLS Carrier-supporting-Carrier
(CsC) architectural framework, which allows the serving nodes of
one MPLS VPN network to be interconnected through the serving
nodes of another MPLS VPN network. The required architectural
building blocks to implement CsC, the manner in which routing
protocols must interact, as well as end-to-end packet flow and label
encapsulation are all explained. The main design and operational
challenges, including maintaining performance levels for customers,
network resiliency, fault-handling, and capacity management, are
also addressed in this article.
VPN_B VPN_A
10.2.0.0/16 Private Routes of 10.4.0.0/16
Site 1 CE to PE VPN Customer A Site 1
Peering
PE PE
CE CE
VPN_A VPN_A
10.6.0.0/16 10.5.0.0/16
Site 3 Site 2
P P
CE CE
VPN_B P P VPN_B
10.3.0.0/16 10.4.0.0/16
Site 2 Provider Network Site 3
PE PE
CE CE
Private Routes of
VPN A VPN Customer B
VPN B
The Customer Edge (CE) router is not considered part of the provider’s
core network. It acts as a peer of the PE router, but not a peer of other
CE routers. Each PE router supports multiple routing and forwarding
tables, called Virtual Route Forwarding (VRF) tables. VRF routes are
logically separate, and they may contain IP prefixes received from the
CE router that overlap with addresses in other VRFs. (For example,
in Figure 1, VPN_A, site 1 has the same private routes as VPN_B, site
3.) VPNs are formed by defining individual customer accesses to be
members of a specific VRF table, with several sites formed on one PE
by defining all sites to use the same VRF table or allocating each site a
VRF table and controlling connectivity through selective import and
export of the IP routes of each VRF table.
The main benefits that can be accrued for the network operator are
as follows:
• Substantial cost avoidance for maintaining and upgrading P (core)
routers and dedicated WAN links for the existing MPLS VPN
network can be achieved (Figure 2). As much as a 35-percent
reduction of fixed inner core capital costs is possible.
• If the technical solution for core integration can be made as reusable
as possible, then in addition to allowing integration of “same
provider” core networks, the network operator could provide
the capability on a wholesale basis for other service providers.
This capability could be a potentially significant source of new
revenue.
• From an operational perspective, integration of core networks
should lend itself to a singular and much more streamlined
approach to capacity planning, fault management, and network
monitoring.
Figure 2: MPLS VPN Network Showing Inner Core Components Targeted for Replacement
PEs PEs
Core Transmission
(e.g., POS, GigE, 10GigE)
P P
P Dedicated MPLS VPN Core P
Transmission Topology
The CsC architecture is designed such that the backbone carrier net-
work—the network provider’s NGN network—needs to know only
about internal routes within the customer carrier network. This setup
allows formation of full “any-to-any” logical connectivity between
the customer carrier routers, which in this scenario are the PE rout-
ers of the existing BGP/MPLS VPN network providing VPN services
to end customers.
CsC-CEs CsC-CEs
CsC-PE P P CsC-PE
NGN Backbone
Carrier Network
CsC-PE CsC-PE
P P
Figure 4: BGP Plus Labels as the Routing Protocol Between CsC-CEs and CsC-PEs
Csc-CEs
CsC-PE
CsC-PE
VRF Created on
NGN for MPLS
Switches Provide VPN PoP Connectivity
BGP Peering Intra-PoP Layer 2
Aggregation
Physical Interconnects
(e.g., GigE or 10GigE)
Figure 5: Label Encapsulation and End-to-End Packet Flow Across a CsC Core Network
Native IP A B
Packet 2-Label A C D
Encapsulated
Packet 3-Label A C
Encapsulated 2-Label A
Packet Encapsulated 1-Label
Packet Encapsulated Native IP
Packet Packet
The DSCP markings dictate the way in which such traffic is placed
into queues and conveyed across the core network. At the edge of the
MPLS core, the PE maps the incoming DSCP value into the MPLS
Class-of-Service (CoS) bits (formerly known as EXP bits).
Both the existing BGP/MPLS “customer carrier” and the target NGN
“backbone carrier” networks already have their own implementation
of QoS classes to allow management and prioritisation of multiple
traffic types carried across their respective core infrastructures. A sig-
nificant design challenge that arises with integrating the networks is
that a suitable mapping of the QoS schema present on the PE routers
of the customer carrier network (the CsC-CEs in earlier diagrams) to
the QoS schema supported on the PE routers of the NGN (the CsC-
PEs in earlier diagrams) is necessary.
Network Resiliency
As described earlier in the article and shown in Figure 2, an existing
standalone BGP/MPLS network platform has interconnected POP
locations using underlying core transmission infrastructures such as
SONET/SDH/Dense Wavelength-Division Multiplexing (DWDM).
The actual number of WAN circuits deployed, the use of transmission-
layer protection mechanisms, and the overall topological connectivity
between POPs determine overall levels of network resiliency. In turn,
this aspect of the network architecture significantly affects the overall
level of service availability to end customers of VPN services.
Fault Management
There are many facets of monitoring and managing a core BGP/
MPLS network in terms of assurance of service, alarm detection and
filtering, customer notification of faults, and so on. In a standalone
network environment, it is generally the responsibility of a particular
operational team to manage faults on the network and provide ser-
vice continuity during various types of failure scenarios. As shown
in Figure 6, this operational function usually covers all core network
elements, including PE and P (core) routers, as well as the WAN
topology interconnecting the service nodes or “POPs.”
Capacity Planning
As shown in Figure 6, in a standalone BGP/MPLS VPN network
environment, a particular operational function exists for ongoing
core capacity planning to ensure P router and WAN link capacity are
suitably dimensioned to cope with current and future traffic demands.
When an existing BGP/MPLS VPN network becomes a customer
carrier network that is integrated with a target NGN backbone using
CsC, there will be a corresponding shift in responsibility for certain
aspects of core capacity planning.
VPN service traffic that would have been confined to its own
dedicated core network will now be offered onto the NGN backbone
carrier core network. As such, the capacity-management function
for the NGN backbone carrier must use traffic planning information
pertaining to the VPN services in addition to all the other service
types supported on the NGN. This aggregated view of traffic demands
will accelerate the core capacity dimensioning on the NGN backbone
carrier network.
Figure 6: Fault-Management and
Capacity-Planning Functions BGP/MPLS Core
(a) Before Core Integration
(b) After Core Integration with CsC Fault-Handling
PE–>P->WAN–>P–>PE
NGN Backbone Core
Capacity Planning Fault-Handling
PE–>PE–>P–>WAN–>P–>PE–>PE
NGN Core
Capacity Planning
Fault-Handling
Capacity Planning
(a) (b)
Conclusions
The MPLS-based Carrier-supporting-Carrier (CsC) framework pro-
vides network operators with a potential solution for integrating an
existing BGP/MPLS VPN network, with a target all-IP based NGN.
This solution should enable both capital and operational cost reduc-
tion by collapsing multiple core networks into a single NGN core
domain. The article emphasised that as well as understanding the
critical network architectural building blocks required to implement
CsC, there are numerous critical design and operational challenges
that an integrated core network presents. These challenges include
how to maintain service levels and performance metrics for existing
VPN customers, resiliency, fault management, and capacity plan-
ning. It is important to note, however, that in addition to the broad
topic areas covered in this article, many specific additional challenges
will present themselves to network operators who have implemented
BGP/MPLS VPN networks, and/or NGN networks in their own spe-
cific way.
PAUL VEITCH holds an M.Eng. and a Ph.D. from the University of Strathclyde,
Glasgow. He joined BT at Martlesham Heath, Ipswich, UK, in September 1996,
and worked on various aspects of broadband transmission architectures, multi-
service platforms, and 3G network design. In 2000, he joined MCI-WorldCom in
Cambridge, UK, and led a number of projects on IP backbone network design. In
2003, he returned to BT to work on IP VPN infrastructure design. He is currently
the design authority for BT Retail’s Internet networks. He can be reached at:
[email protected]
PAUL HITCHEN holds a B.Eng. in Electrical and Electronic Engineering from the
University of Salford. He joined BT at Martlesham Heath in September 1990 and
has worked on numerous aspects of BT’s data services. From 1990 to 1997 he led
the development of BT’s multiprotocol router portfolio, developing routing and QoS
functions with BT’s equipment suppliers and provided consulting to BT’s customers
on IP and Ethernet networks. During the same period he worked on the introduc-
tion of Frame Relay, ATM, and SMDS WAN services for BT. In 1997 he developed
BT’s first IP VPN service offering, working on the development and standardisation
of MPLS and VPN technology. From 1997 to the end of 2006 he led the design of
BT’s Global MPLS Network and service, expanding the network to provide service
to more than 150 countries across the world. He is currently a principal consultant
working on BT’s 21CN IP/MPLS network, focusing on the integration of BT’s net-
works onto 21CN and introducing content delivery and IPTV into the network. He
can be reached at: [email protected]
MARTIN MITCHELL holds an M.Sci. from the University of Bristol and has
worked for BT since 2007. He is currently an IP network designer specializing in
service provider core design, Ethernet access, and network migrations. He can be
reached at: [email protected]
Hi Ole,
Regards,
—Roque Gagliano, Cisco Systems
[email protected]
Thanks for reading our article and providing these valuable com-
ments. We agree with your point. We just considered the basic
security mechanisms in our article, limiting the scope to the protocols
already standardized, which cover only the protection of the MAG-
LMA signaling. We agree that the efforts being carried out within the
CSI working group are worth mentioning with regard to the security
aspects of PMIPv6.
Thanks,
—Carlos J. Bernardos, Universidad Carlos III de Madrid
[email protected]
A History of the Internet A History of the Internet and the Digital Future, by Johnny Ryan,
Reaktion Books, ISBN 978 1 86189 777 0, September 2010.
Organization
The book is divided into three parts. Broadly, they cover origins,
growth, and social effects. Ryan’s use of “centrifugal” is contrasted
with “centripetal” and is meant to distinguish paradigmatic tensions
between approaches that centralize control versus approaches that
distribute it. (Oddly, neither of these pivotal terms is in the index.)
On page 8 he sets the stage:
For those with less compulsive (or effective) science teachers, the
analogy might prove more helpful, because the design choice really
is central to the history of networking. The tension between central-
ized versus distributed has marked—and continues to mark—much
of the development of networking. In fact, I wish Ryan had explored
its continuation as much as he explored its effect on origins.
Early History
In general, Ryan presents a narrative with fine-grained detail of the
different players who played a critical role in the creation and pursuit
of packet switching and then its evolution to link independent
networks and technologies[1]. Efforts to take credit for the former
have often become quite public and unseemly; Ryan dissects the
play of actors, the essence of their technical ideas, and the details
of their activities with documentation and diligence, and even
uncovers some discrepancies. He develops a narrative that I found
intriguing, enlightening, and credible. What I especially liked was
that he explored the organizational milieu in which the activities
took place. So we hear of the origins of groups such as the Advanced
Research Projects Agency (ARPA), Lincoln Labs, and The Rand
Corporation; the social and political forces that created them; and
the roles they played.
Narrative Arcs
The following is really the strength of this book: It develops narrative
arcs about social, political, and organizational environments and the
steps taken within them that moved along the path of the Internet.
It explores who, when, how, and what, both overall and in detail.
At its best, the book provides comparative perspective to help the
reader understand what was risky and truly innovative and thereby
understand what was really challenging to develop and get adopted.
As a minor example, Ryan deserves credit for his exploration and
debunking of the media distortions surrounding Al Gore’s role and
statements concerning the Internet. Strictly speaking, debunking
media excesses would not normally seem relevant to a review of the
history of a technology, but Ryan uses this example for some con-
sideration of the role of politics in the development of the Internet.
The U.S. government could have chosen to assume more control over
the Internet; it might have quickly turned it into a telecommunica-
tions monopoly, rather than letting it develop through independent
market forces.
But the most obvious, later-stage touchstone for a history like this one
must be the development of the World Wide Web. Ryan gets mixed
marks here. He misses the long history of open document publishing
that existed even in the earlier Advanced Research Projects Agency
Network (ARPANET), with “anonymous” FTP, and he misses that
the use of Gopher predated the web by several years. He also misses
just how complete and useful a “dynamically linked document”
system Doug Englebart’s NLS (computer) system provided 20
years before the invention of the web[2]. Hence, he misses the long,
historical arc for publishing on the Internet. On the other hand, he
does discuss Gopher and explores some of the reasons it lost the
competition to the web. He focuses on management and intellectual
property issues, whereas I tend to consider Gopher as having a much
poorer cost/benefit mix. Gopher was text-only and required going
down a potential long lookup tree—quite a few “clicks”—before
getting any content. The web is mixed-media and can provide utility
to the reader—that is, content—at each step down a lookup path.
So the web is more complex to develop than Gopher, but it provides
enough additional power and better human factors to be worth it.
Worth Reading
In sum, the book is certainly worth reading. You will likely learn
quite a bit, but make sure you read with glasses that have no hint of
rose coloring!
References
[1] Debating which milestone marks “the beginning of the Internet”
is a favorite pastime, including among those around during
the period in question. Various definitions are legitimate, as
long as one is clear about the choice. For me, the operational
demonstration of packet switching was when the world changed,
so I choose 1969 and the first four nodes of the ARPANET; or its
public demonstration in 1972. TCP/IP built on this, by refining
and minimizing the work to be done within the infrastructure
and by linking independent networks.
________________________
First awarded last year, the Itojun Service Award honours the mem-
ory of Dr. Jun-ichiro “Itojun” Hagino, who passed away in 2007,
aged just 37. The award, established by the friends of Itojun and
administered by the Internet Society (ISOC), recognises and com-
memorates the extraordinary dedication exercised by itojun over the
course of IPv6 development.
“For many years, Bjoern has been a committed champion of, and
contributor to, implementing IPv6 in open source operating systems
used in servers, desktops, and embedded computer platforms,
including those used by some of the busiest websites in the world,”
said Jun Murai of the Itojun Service Award Committee and Founder
of the WIDE Project. “On behalf of the Itojun Service Award
Photo: Matsuzaki Yoshinobu Committee, I am extremely pleased to present this award to Bjoern
for his outstanding work in support of IPv6 development and
deployment.”
“This is a great honour, and I would like to thank the people who
recommended me for the award and the committee for believing my
work was valuable. I never met Itojun but he was one of the people
helping me, and I have the highest respect for his massive foundational
work,” said Bjoern A. Zeeb. “As the Internet community works to
roll out IPv6 to more and more people all around the globe, we also
need to help others—developers, businesses, and users—understand
and use the new Internet protocols so that the vision Itojun was
working so hard for comes true.”
“This is a major milestone in the life of the Internet, and means that
allocation of the last blocks of IPv4 to the RIRs is imminent,” stated
Axel Pawlik, Chairman of the NRO, the official representative of the
five RIRs. “It is critical that all Internet stakeholders take definitive
action now to ensure the timely adoption of IPv6.”
The IANA assigns IPv4 addresses to the RIRs in blocks that equate to
1/256th of the entire IPv4 address space (each block is referred to as a
“/8” or “slash-8”). The most recent assignment means that there are
now only 12 of these blocks available, which is less than five percent
of the entire IPv4 address pool.
According to current depletion rates, the last five IPv4 address blocks
will be allocated to the RIRs in early 2011. The pressure to adopt
IPv6 is mounting. Many worry that without adequate preparation
and action, there will be a chaotic scramble for IPv6, which could
increase Internet costs and threaten the stability and security of the
global network.
Find us on Facebook
In addition to The Internet Protocol Forum, available at http://
www.ipjforum.org, IPJ now has its own Facebook page. Join the
discussion and get the latest news and updates:
http://www.facebook.com/#!/pages/Internet-Protocol-
Journal/163288673690055
This publication is distributed on an “as-is” basis, without warranty of any kind either
express or implied, including but not limited to the implied warranties of merchantability,
fitness for a particular purpose, or non-infringement. This publication could contain technical
inaccuracies or typographical errors. Later issues may modify or update information provided
in this issue. Neither the publisher nor any contributor shall have any liability to any person
for any loss or damage caused directly or indirectly by the information contained herein.