The session border controller takes

 SIP

SIP or session initiation protocol underlies voice communication along with real time transport protocol. SIP ha webapex.net s three components comprised of proxies, user agents and registrar servers. It would be lengthy to explain how these three components interact to enable voice calls over the internet but what happens is that the SIP message has a first line, a header and message body. It is open and vulnerable with the header containing information about identification of user agent client and SIP path.

SIP also faces NAT issues since those who are behind NAT will not enjoy the functionality.

SIP has different flavors and compatibility issues may arise. 

Hackers can easily decipher details due to the shortcomings of SIP. 

The session border controller enters the picture to address and overcome the above SIP rela westernmagazine.org ted issues. 

The SBC

Take the case of Enterprise A. It has an internal LAN network with a firewall and it uses Controller in through a VoIP service prov ysin.org ider. The assumption is that since the VoIP service provider has a session border controller at their end Enterprise A need not implement SBC solution. This is fallacious and leads to a host of issues: 

·         Vulnerability of Enterprise A network since hackers can tunnel in through open ports and steal data, launch DoS/DDoS attacks, inject malware or eavesdrop or make use of the VoIP network. 

·         Inability to connect calls in case of protocol and codec issues and 

·         Network address traversal or translation (NAT) issues. 

 

The session border controller takes care of all such issues, sitting at the “border” or edge of the network, which is why you have “border” term in session border controller. 

Controller means the software controls data packets in each session. It can hide SIP headers and it can hide ports. It can control access and it can convert media codecs and protocols to facilitate smooth communication. 

A session is when a conversation is initiated, continues and is terminated. The session may go beyond voice to include media like video and data. 

Comments

Popular posts from this blog

Learn about the business methods part of the degree

The more you get used to this process