Vol2 - Eurescom

advertisement
Project P847-GI
What is TINA and is it Useful for the TelCos?
Deliverable 2
A TelCo Assessment of TINA
Volume 2 of 4: Annex 1 - Assessment of TINA and the Internet
Suggested readers:
Managers in Strategy, Networks and Marketing Divisions, TINA
For full publication
February 1999
EURESCOM PARTICIPANTS in Project P847-GI are:
 France Télécom
 TELECOM ITALIA S.p.a.
 Telenor AS
 Telecom Eireann
This document contains material which is the copyright of certain EURESCOM
PARTICIPANTS, and may not be reproduced or copied without permission
All PARTICIPANTS have agreed to full publication of this document
The commercial use of any information contained in this document may require a
license from the proprietor of that information.
Neither the PARTICIPANTS nor EURESCOM warrant that the information
contained in the report is capable of use, or that use of the information is free from
risk, and accept no liability for loss or damage suffered by any person using this
information.
This document has been approved by EURESCOM Board of Governors for
distribution to all EURESCOM Shareholders.
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
List of Authors
David Muldowney
Telecom Eireann/Broadcom
Carlo Liccardi
Telecom Italia / CSELT
 1999 EURESCOM Participants in Project P847-GI
page i (iv)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
Table of Contents
List of Authors ................................................................................................................ i
Table of Contents ........................................................................................................... ii
Abbreviations ................................................................................................................ iii
1
Introduction ............................................................................................................ 1
2
Internet Overview ................................................................................................... 3
3
Internet Strengths ................................................................................................... 5
3.1 Internet Growth ............................................................................................ 5
3.2 Primary Internet Protocols ........................................................................... 5
3.2.1 Internet Protocol (IP) 1981 .............................................................. 5
3.2.2 Transmission Control Protocol (TCP) 1981 ................................... 5
3.2.3 User Datagram Protocol (UDP) 1980 ............................................. 6
3.2.4 Simple Network Management Protocol (SNMP) 1990 ................... 6
3.3 Early Applications........................................................................................ 6
3.4 Access technologies ..................................................................................... 6
3.5 Powerful Internet-based Applications .......................................................... 7
3.5.1 Voice over IP ................................................................................... 7
3.5.2 Virtual Private Networks................................................................. 7
3.5.3 Traffic Shapers ................................................................................ 8
3.6 Summary of Internet Strengths .................................................................... 8
4
Internet Weaknesses ............................................................................................... 9
4.1 Performance ................................................................................................. 9
4.2 Security ...................................................................................................... 10
4.3 Service Management .................................................................................. 10
4.4 Summary of Internet Weaknesses .............................................................. 11
5
Emerging Protocols for IP Multimedia Services .................................................. 13
5.1 SIP: Session Initiation Protocol ................................................................. 13
5.2 PINT: Phone IP iNTerworking services..................................................... 15
5.3 H.323 .......................................................................................................... 17
5.4 SGCP: Simple Gateway Control Protocol ................................................. 18
5.5 IPDC: IP Device Control............................................................................ 20
5.6 MGCP: Media Gateway Control Protocol ................................................. 21
5.7 MGCP vs. IPDC and SGCP ....................................................................... 22
5.8 Real Time Transfer Protocol, RTP ............................................................ 22
5.9 Resource Reservation Protocol (RSVP) .................................................... 23
6
Opportunities for TINA ........................................................................................ 25
References .................................................................................................................... 27
page ii (iv)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
Abbreviations
ATM
Asynchronous Transfer Mode
IAB
Internet Architecture Board
CBQ
Class Based Queueing
COM
Component Object Model
DoD
US Department of Defense
FDDI
Fibre Distributed Data Interface
FTP
File Transfer Protocol
IETF
Internet Engineering Task Force
IESG
Internet Engineering Steering Group
IRTF
Internet Research Task Force
IP
Internet Protocol
IPDC
IP Device Control
IPSEC
IP Security
ISP
Internet Service Provider
ITSP
Internet Telephony Service Providers
LDAP
Lightweight Directory Access Protocol
MCU
Multipoint Control Unit
MGCP
Media Gateway Control Protocol
PINT
Phone IP iNTerworking
PSTN
Public Switched Telephony Network
POTS
Plain Old Telephony Service
PVC
Permanent Virtual Circuit
QoS
Quality of Service
RFC
Request For Comment
RSVP
Resource Reservation Protocol
RTP
Real Time Protocol
SAP
Session Announcement Protocol
SDP
Session Description Protocol
SIP
Session Initiation Protocol
SGCP
Simple Gateway Control protocol
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
TCP
Transmission Control Protocol
 1999 EURESCOM Participants in Project P847-GI
page iii (iv)
Volume 2: Annex 1 - Assessment of TINA and the Internet
UDP
User Datagram Protocol
VOIP
Voice Over IP
VPN
Virtual Private Network
WFQ
Weighted Fair Queueing
WWW
World Wide Web
XTP
Express Transfer Protocol
page iv (iv)
Deliverable 2
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
1
Volume 2: Annex 1 - Assessment of TINA and the Internet
Introduction
The objective of this document is to assess the Internet in order to determine its
strengths and weakness and identify where TINA may have a role in future Internet
evolution. Advances in Internet solutions could potentially make TINA redundant so
it is important to highlight areas where the Internet is particularly powerful for
consumers and providers. Much research has been invested in TINA and it shouldn’t
be a surprise that positive results from TINA can play a role in future Internet
developments. This document will give a brief overview of the working methodology
that the Internet adheres to. This will be followed by what we consider strengths and
weakness of the Internet. Once we identify Internet shortcomings we can propose
potential areas that TINA could provide a solution.
 1999 EURESCOM Participants in Project P847-GI
page 1 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
page 2 (27)
Deliverable 2
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
2
Volume 2: Annex 1 - Assessment of TINA and the Internet
Internet Overview
The Internet Engineering Task Force (IETF) is a self-organized group of people who
make technical and other contributions to the engineering and evolution of the
Internet and its technologies. It is the principal body engaged in the development of
new Internet standard specifications. Its mission includes:

Identifying, and proposing solutions to, pressing operational and technical
problems in the Internet;

Specifying the development or usage of protocols and the near-term architecture
to solve such technical problems for the Internet;

Making recommendations to the Internet Engineering Steering Group (IESG)
regarding the standardization of protocols and protocol usage in the Internet;

Facilitating technology transfer from the Internet Research Task Force (IRTF) to
the wider Internet community;

Providing a forum for the exchange of information within the Internet community
between vendors, users, researchers, agency contractors and network managers.
Work within the IETF is divided into different areas which are also subdivided into
more specific working groups:
 Applications Area
 General Area
 Internet Area
 Operations and Management Area
 Routing Area
 Security Area
 Transport Area
 User Services Area
The specification documents of the Internet protocol suite, as defined by the IETF and
its steering group (the IESG), are published as RFCs.
Internet-Drafts are the working documents of the IETF, its areas, and its working
groups. Internet-Drafts have a maximum life of six months. After that time, they must
be updated, or they will be deleted. Topics such as Audio/Video Transport,
Benchmarking Methodology, Distributed Management, Integrated Services, IP
Performance Metrics and more have many Internet Drafts.
In general, the working groups tend to focus on fine grained problem areas that
require near-term solutions whereas TINA tends to focus on the “big” picture.
Developments in Internet technologies can be used to develop more sophisticated
applications. The advent of the World Wide Web in the early 1990s was the “killer
app” that brought the Internet to the general public. The rapid development of new
product offerings on Internet competes with the same customer base which
traditionally was exclusive to the Telecom Operators. Internet Telephony and Virtual
Private Networks products are two products area where the Internet can offer services
that compete directly with the POTS and leased line services offered by the telcos.
 1999 EURESCOM Participants in Project P847-GI
page 3 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
page 4 (27)
Deliverable 2
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
3
Internet Strengths
3.1
Internet Growth
The Internet (or ARPANET as it was known then) was designed in the late 1960s as a
US Department of Defense (DoD) project and initially consisted of 4 nodes. One of
the design goals was to design a distributed communications network that could
withstand nuclear attack during the height of the cold war. By 1982 the DoD decided
that the Transmission Control Protocol / Internet Protocol (TCP/IP) suite was the
standard to be used within the DoD. This led to one of the first definitions of an
"internet" as a connected set of networks, specifically those using TCP/IP, and
"Internet" as connected TCP/IP internets. By 1984 the number of hosts connected to
the Internet breaks 1,000 growing over 10,000 in the next 3 years. The 100,000 barrier
was broken during 1989. The World Wide Web (WWW) first appeared in 1991 and
by 1992 there were 1,000,000 hosts with Internet connectivity. WWW surpasses ftpdata in March 1995 as the service with greatest traffic based on packet count, and in
April of the same year based on byte count. By July 1998 there were 36,739,000 hosts
and 2,215,195 Web sites connected to the Internet.
3.2
Primary Internet Protocols
This section describes some of the most commonly used transport protocols that are
in use in the Internet today. The Internet Protocol (IP), Transmission Control Protocol
(TCP), and User Datagram Protocol (UDP) are the main transport protocols in use in
the Internet. Simple Network Management Protocol (SNMP) was designed to manage
network elements that are in use within in the Internet. The early success of the
Internet can largely be attributed to these protocols.
3.2.1
Internet Protocol (IP) 1981
The Internet Protocol [RFC791] is designed for use in interconnected systems of
packet-switched computer communication networks. The internet protocol provides
for transmitting blocks of data called datagrams from sources to destinations, where
sources and destinations are hosts identified by fixed length addresses. The internet
protocol also provides for fragmentation and reassembly of long datagrams, if
necessary, for transmission through packet networks. The internet protocol is
specifically limited in scope to provide the functions necessary to deliver a package of
bits (an internet datagram) from a source to a destination over an interconnected
system of networks. There are no mechanisms to augment end-to-end data reliability,
flow control, sequencing, or other services commonly found in host-to-host protocols.
The internet protocol can capitalise on the services of its supporting networks to
provide various types and qualities of service.
3.2.2
Transmission Control Protocol (TCP) 1981
The Transmission Control Protocol (TCP) [RFC793] is intended for use as a highly
reliable host-to-host protocol between hosts in packet-switched computer
communication networks, and in interconnected systems of such networks. TCP is a
connection-oriented, end-to-end reliable protocol designed to fit into a layered
hierarchy of protocols which support multi-network applications. The TCP provides
 1999 EURESCOM Participants in Project P847-GI
page 5 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
for reliable inter-process communication between pairs of processes in host
computers attached to distinct but interconnected computer communication networks.
Very few assumptions are made as to the reliability of the communication protocols
below the TCP layer. TCP assumes it can obtain a simple, potentially unreliable
datagram service from the lower level protocols. In principle, the TCP should be able
to operate above a wide spectrum of communication systems ranging from hard-wired
connections to packet-switched or circuit-switched networks.
3.2.3
User Datagram Protocol (UDP) 1980
User Datagram Protocol (UDP) is defined to make available a datagram mode of
packet-switched computer communication in the environment of an interconnected set
of computer networks. This protocol assumes that the Internet Protocol (IP) is used as
the underlying protocol. This protocol provides a procedure for application programs
to send messages to other programs with a minimum of protocol mechanism. The
protocol is transaction oriented, and delivery and duplicate protection are not
guaranteed.
3.2.4
Simple Network Management Protocol (SNMP) 1990
The Simple Network Management Protocol (SNMP) [RFC1157] is used to
communicate management information between the network management stations and
the agents in the network elements. SNMP explicitly minimises the number and
complexity of management functions realised by the management agent itself. A
second goal of the protocol is that the functional paradigm for monitoring and control
be sufficiently extensible to accommodate additional, possibly unanticipated aspects
of network operation and management. A third goal is to make the architecture, as
much as possible, independent of the architecture and mechanisms of particular hosts
or particular gateways.
3.3
Early Applications
Early applications in use consisted of Email which is based on the Simple Mail
Transfer Protocol [RFC821], Telnet [RFC854] and the File transfer Protocol (FTP)
[RFC959]. These applications were basic, but easy to use.During the 1980s the
Internet was relatively small by today’s standards, the network transmission
technology was unreliable and offered very limited bandwidth. Congestion was often
caused in the network so the protocols themselves were not required to be very
efficient.
3.4
Access technologies
Digital technology and the appearance of the World Wide Web (WWW) was the
killer application that the brought the Internet to the general public’s attention.
Phrases such as “surfing the ‘Net” have crept into the English language. In fact, the
WWW has been so successful that many of the public consider the ‘Net and the
WWW as one and the same entity. The net affect of this growth has led to an
insatiable demand for bandwidth. The WWW has led to a demand for multimedia
applications which the Internet was not originally designed for. Nevertheless the IETF
have been active in ensuring that IP can embrace new network technologies so that IP
traffic can be transported effectively without modification over networks offering
page 6 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
high bandwidth such as ATM, FDDI, and Frame Relay. Faster transmission in the
network layer will ultimately lead to congestion at the transport layers i.e. IP and
TCP. Rather than redesigning these transport protocols which are adequate for most
applications in use today, the IETF has designed new protocols such as the Real Time
Protocol (RTP) and Resource Reservation Protocol (RSVP), which support
applications which have different requirements. RTP [RFC1889] provides end-to-end
network transport functions suitable for applications transmitting real-time data, such
as audio, video or simulation data, over multicast or unicast network services. RTP
does not address resource reservation and does not guarantee quality-of- service for
real-time services. RSVP [RFC2205] is a resource reservation setup protocol designed
for an integrated services Internet. RSVP provides receiver-initiated setup of resource
reservations for multicast or unicast data flows, with good scaling and robustness
properties.
3.5
Powerful Internet-based Applications
This section briefly describes 3 applications that are available on the Internet today
which enables it as a suitable medium for corporate use. They are many product
available on the market for Voice over IP, Virtual Private Networks and Traffic
Shapers.
3.5.1
Voice over IP
According to [DC3-98], companies large and small are running IP telephony trials,
and at least 15 ITSPs (Internet telephony service providers) are now offering VOIP
(voice-over-IP) services. Major long-distance carriers and ISPs (Internet service
providers) are taking a long, hard look at the technology as well. Who stands to gain
the most? Corporations doing a lot of business overseas and smaller companies that
don't have the clout to negotiate big domestic call discounts with carriers. Who stands
to suffer? Providers of circuit-switched voice: Consultancy Phillips Tarifica Ltd.
(London) estimates AT&T will lose $620 million to $950 million in international
calls by 2001 because of IP telephony1.
3.5.2
Virtual Private Networks
VPN devices with strong authentication and encryption, hardware with custom silicon
to boost performance offering privacy on the most public of networks, thus
eliminating the need for leased lines. According to [DC9-97] in September 1997 most
VPN products handled only encryption and authentication functions. In just one year
they've come a long way as five of the six devices tested by Data Communications
International lab tests [DC8-98] were also IP routers, three serve as firewalls, and
three offer certificate authorities. Internet VPN products offer the rock solid reliability
of private lines and the security that comes with them at a fraction of the cost.
Additionally, Internet connectivity has the added advantage of making it possible for
organisations to reach new business partners and customers.
1
This has many reasons, among which the facts that VoIP providers use less expensive
infrastructure, use a simple pre-paid fee structure (no collection for bad debts, no printing and
mailing of bills,) and have a favorable regulatory status of Enhanced Service Providers in the
US which exempts them from access fees, and international settlement payments.
 1999 EURESCOM Participants in Project P847-GI
page 7 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
3.5.3
Deliverable 2
Traffic Shapers
Traffic shapers or traffic tuners can be used to keep important data moving by
applying prioritisation policies and allocating guaranteed amounts of bandwidth.
Traffic shapers make use of queuing algorithms, rate control, or both to keep the
packets moving. With queuing, traffic is assorted by priority: High-priority packets
get the nod over low-priority packets, which are then sent out less frequently. With
TCP/IP rate control, the traffic shaper signals the source to send fewer packets if the
network is becoming congested. There are basically three types of queuing: priority,
weighted, and class-based. Products using priority queuing classify traffic and set
policies for high- and low-priority data. The high-priority queues have to be emptied
of packets before lower-priority traffic is transmitted. Weighted Fair Queuing (WFQ)
traffic is not only assigned to specific priority queues; it also is apportioned a share of
bandwidth. Class-Based Queuing (CBQ) is where the queue itself is guaranteed a
certain transmission rate. If the queue doesn't use all of its bandwidth, traffic from
other classes can borrow as needed
3.6
Summary of Internet Strengths
The main strengths of the Internet can be summarised as follows:

IP is well understood and importantly well supported.

The addressing scheme is simple and easy to administer.

Basic set of transport protocols that are well understood and importantly well
supported.

Simple management of network elements.

The Internet is transparently composed of heterogeneous network technologies.

Distributed communications infrastructure which enables addition and deletion
of nodes without disruption to the rest of the Internet.

Massive user base, applications information store.

Well defined APIs which allows anybody to build distributed Internet
applications.

Flexible evolving mechanism able to solve fine grained problems.

Suitable platform for electronic commerce, even if several problems need to be
solved.
page 8 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
4
Internet Weaknesses
4.1
Performance
The Internet could be described in some ways as a victim of its own success. Massive
growth in traffic has led to congestion in the network. Since most data is sent in either
TCP or UDP packets by IP. These protocols were not originally designed to cope with
the volume of traffic today. For example, TCP was designed on the assumption that
the underlying network was unreliable and packet were frequently lost. In most cases,
packet loss in the network occurs when the network is congested. TCP uses the GoBack-N algorithm for re-transmitting lost packets, which means that when the
transmitter fails to receive an acknowledgment from the receiver for packet N within a
certain time limit, packet N and every packet after N is re-transmitted to the receiver.
This obviously leads to even greater congestion on network. Other protocols such as
eXpress Transfer Protocol (XTP) were designed to overcome the shortcomings of
TCP, however, they never gained much support in the industry.
Quality of Service (QoS) within the Internet is difficult to attain. The following
example illustrates the difficulties in offering QoS on the Internet. Take the network
level. ATM networks can support certain levels of QoS. An ATM Provider could sell
a 2 Mb/s constant bit rate Permanent Virtual Circuit (PVC) between two Internet
Service Providers (ISPs). ATM cells are transmitted at a rate of 2 Mb/s or 39,568
packets a second:
2 x 1024 x 1024
= 39,568 cells per second
48 + 5
When an IP packet2 with a 20 byte header and 10000 byte payload arrive at the
transmitter, it is segmented into ATM cells which works out as 209 ATM cells are
required to carried this IP traffic from edge to edge of the providers network. For
1000 such IP packets it takes (1000*209/39,568=) 5.28 seconds to transmit, not taking
into account time into account for the segmentation and re-assembly by ATM. From
the IP level this is perceived as a transmission rate of (1000*10020/5.28=) 1,897,727
bytes per second or 1.81 Mb/s. Therefore IP traffic which carries TCP, UDP and
ICMP packets, acknowledgments, re-transmissions and so on is transmitted at this
rate. Furthermore IP has no mechanism to guarantee this throughput over any one
link. Taking a look at the big picture, a network provider can only guarantee network
traffic in its domain as applications compete for bandwidth at the IP level.
Protocols such as RTP and RSVP can help, routers and traffic shapers can also help,
but guaranteed end-to-end IP QoS is very difficult to achieve. The IETF has
recognised this as a problem. RFC 2386 “A Framework for QoS-based Routing in the
Internet”. QoS-based routing has been recognized as a missing piece in the evolution
of QoS-based service offerings in the Internet. This RFC describes some of the QoSbased routing issues and requirements, and proposes a framework for QoS-based
routing in the Internet. RFC2382 “A Framework for Integrated Services and RSVP
over ATM” outlines the issues and framework related to providing IP Integrated
Services with RSVP over ATM.
2
Note: IP packet are normally of variable length. A fixed length is chosen for this example.
 1999 EURESCOM Participants in Project P847-GI
page 9 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
4.2
Deliverable 2
Security
Security has long been criticised as a problem that needs to be solved. Much work has
been done in recent years to address this issue of security. Security in the Internet can
be handled at different levels. Depending on security features available on the
network technology employed is not a satisfactory solution as the Internet is
composed of many different types of network technologies such as ATM, FDDI,
Frame Relay etc. Next up on the stack is the IP layer. Firewalls on the edge of a
corporate network can be used to prevent unauthorised access from unknown IP hosts.
RFC 1825 “Security Architecture for the Internet Protocol” describes how security
can implemented in the Internet. IPSec is a collection of security protocols from the
IETF that adds authentication and encryption to all IP communications over any
network technologies. Security can also be built in the application layer. This would
be required on a service by service basis and would obviously be an extra overhead in
the development process.
Despite the fact that the tools are available security can be compromised in other
ways:
Incompetence: This occurs due to ignorance of the need for security or bad
management of security tools such as poorly configuring a firewall. This would also
include users using a poor choice of password, or leaving their user name and
passwords visible near their terminals, the equivalent of writing your PIN number on
a credit card.
Social Engineering: This a much devious form of attack where unscrupulous
individuals gain in underhand ways. This could involve posing as somebody from the
IT department and obtaining a valid user ID and password from a user over the phone.
It seems ridiculous but it does happen.
Political: International laws for exporting encrypted data vary from country to
country which should be taken into consideration.
In summary, security on the Internet is a weakness if it is not applied properly.
4.3
Service Management
Falling profit margins for connectivity services and a growing number of providers in
the open market has led to providers to search for alternative means to win new
business. This can be achieved by offering value-added services, i.e. services other
than pure connectivity. On the Internet today, anybody can be a service provider from
large multinationals to Joe Bloggs in his home office. Traditionally, management
functionality was built into the service in an ad hoc manner. Every time a new service
was developed, service management functionality was developed with it. There was a
need to use re-useable components. Object oriented computing was one step in this
direction. However, there still lacks a common platform where services can be
developed and managed in a common way. Telecommunications carriers require a
framework for operations support systems that moves away from rigid, monolithic,
fixed-function, vendor-specific implementations. Microsoft’s Active Operation
Support Systems Framework [MSFT] encourages architectural adherence to the
design principles outlined in the Microsoft Distributed interNet Applications (DNA)
architecture as they are applied to operations support systems models such as the
NMF’s Telecom Operations Map, the ITU’s multilayer TMN model, and other
telecom OSS-specific process models and methodologies. Microsoft’s DNA
page 10 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
architecture is a proprietary solution not necessarily endorsed by the IETF,
nevertheless, Microsoft identified that there is a need for such a framework. The IETF
tends to focus on much finer grained problems, however, service management of
commercial services in a competitive market is a very important area that needs to
addressed.
4.4
Summary of Internet Weaknesses
Internet weakness can be categorised into 3 main areas:

Guaranteed QoS: Not possible at the moment.

Security: Can be a major problem if not applied properly.

Service Management: Little in this area right now.
 1999 EURESCOM Participants in Project P847-GI
page 11 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
page 12 (27)
Deliverable 2
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
5
Volume 2: Annex 1 - Assessment of TINA and the Internet
Emerging Protocols for IP Multimedia Services
A lot of protocols are being specified both in ITU-T and in IETF to enable access,
control and streaming of multimedia services over IP. The following table categorises
them in different areas:
Network access, registration
H.323, RAS
Call signalling
H.225/Q.931/2
Special resources control - Media Gw
controllers
MGCP, SGCP, IPDC, RSGCP, GLP, RTSP
Multimedia-multiparty session control invitation
H.323, SAP, SIP, SDP, PINT
Negotiation of capabilities, logical channels
mgmt., etc.
H.245
Quality of service
RSVP, RTP
Directory services and address translation
LDAP, finger, rwhois
audio/video/data transport
IP multicast and RTP
Table 1 – Emerging protocols for multimedia services over IP
The following sections describe some of these protocols which are of particular
interest for TINA-C. In particular we will address:
 PINT, SIP and H323 protocols that handles session control and invitation
mechanisms in multiparty services
 SGCP, IPDC and MGCP protocols that deal with control of media gateways and
in particular of Voice gateways.
 RTP and RSVP protocols which deal with lower level transport issues.
5.1
SIP: Session Initiation Protocol
The Session Initiation Protocol (SIP) is an application- layer control (signaling)
protocol for creating, modifying and terminating sessions with one or more
participants. These sessions include Internet multimedia conferences, Internet
telephone calls and multimedia distribution. Members in a session can communicate
via multicast or via a mesh of unicast relations, or a combination of these.
SIP invitations used to create sessions carry session descriptions which allow
participants to agree on a set of compatible media types. It supports user mobility by
proxying and redirecting requests to the user’s current location. Users can register
their current location. SIP is not tied to any particular conference control protocol.
SIP is designed to be independent of the lower-layer transport protocol and can be
extended with additional capabilities.
Overview of SIP Functionality
SIP is an application-layer control protocol that can establish, modify and terminate
multimedia sessions or calls. These multimedia sessions include multimedia
conferences, distance learning, Internet telephony and similar applications. SIP can
invite both persons and “robots”, such as a media storage service. SIP can invite
parties to both unicast and multicast sessions; the initiator does not necessarily have
 1999 EURESCOM Participants in Project P847-GI
page 13 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
to be a member of the session to which it is inviting. Media and participants can be
added to an existing session.
SIP can be used to initiate sessions as well as invite members to sessions that have
been advertised and established by other means. Sessions can be advertised using
multicast protocols such as Session Announcement Protocol (SAP), electronic mail,
news groups, web pages or directories (LDAP), among others.
SIP transparently supports name mapping and redirection services, allowing the
implementation of ISDN and Intelligent Network telephony subscriber services. These
facilities also enable personal mobility services, which is defined as: “Personal
mobility is the ability of end users to originate and receive calls and access subscribed
telecommunication services on any terminal in any location, and the ability of the
network to identify end users as they move. Personal mobility is based on the use of a
unique personal identity (i.e., personal mobility complements terminal mobility, i.e.,
the ability to maintain communications when moving a single end system from one
subnet to another.
SIP supports five facets of establishing and terminating multimedia communications:
 User location: determination of the end system to be used for communication;
 User capabilities: determination of the media and media parameters to be used;
 User availability: determination of the willingness of the called party to engage
in communications;
 Call setup: “ringing”, establishment of call parameters at both called and calling
party;
 Call handling: including transfer and termination of calls.
SIP can also initiate multi-party calls using a multipoint control unit (MCU) or fullymeshed interconnection instead of multicast. Internet telephony gateways that connect
PSTN parties can also use SIP to set up calls between them.
SIP is designed as part of the overall IETF multimedia data and control architecture
currently incorporating protocols such as RSVP [RFC2205] for reserving network
resources, the real-time transport protocol (RTP) [RFC1889] for transporting realtime data and providing QoS feedback, the real-time streaming protocol (RTSP) (RFC
2326) for controlling delivery of streaming media, the session announcement protocol
(SAP) for advertising multimedia sessions via multicast and the session description
protocol (SDP) (RFC 2327) for describing multimedia sessions. However, the
functionality and operation of SIP does not depend on any of these protocols.
SIP can also be used in conjunction with other call setup and signaling protocols. In
that mode, an end system uses SIP exchanges to determine the appropriate end system
address and protocol from a given address that is protocol-independent. For example,
SIP could be used to determine that the party can be reached via H.323, obtain the
H.245 gateway and user address and then use H.225 to establish the call.
In another example, SIP might be used to determine that the callee is reachable via the
public switched telephone network (PSTN) and indicate the phone number to be
called, possibly suggesting an Internet-to-PSTN gateway to be used.
SIP does not offer conference control services such as floor control or voting and does
not prescribe how a conference is to be managed, but SIP can be used to introduce
conference control protocols. SIP does not allocate multicast addresses.
page 14 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
SIP can invite users to sessions with and without resource reservation. SIP does not
reserve resources, but can convey to the invited system the information necessary to
do this.
5.2
PINT: Phone IP iNTerworking services
PINT defines a protocol for invoking certain telephone services from an IP network.
These services include placing basic calls, sending and receiving faxes, and receiving
content over the telephone. The protocol is specified as a set of enhancements and
additions to the SIP 2.0 and SDP 2.0 protocols.
The desire to invoke certain telephone call services from the Internet has been
identified by many different groups (users, public and private network operators, call
centre service providers, equipment vendors, etc.). The generic scenario is as follows
(when the invocation is successful):
1.
an IP host sends a request to a server on an IP network;
2.
the server relays the request into a telephone network;
3.
the telephone network performs the requested call service.
One example is a user sending a request to have a call placed to his/her telephone. It
may be that a customer wishes to get a call from the support department of some
business, or a user wishes to hear some remote automatic weather service via recorded
or synthesised speech. Within a local environment such a request might result in the
placement of a call between employees over the internal PBX.
The term “PINT Service” is used to denote such a complete transaction, starting with
the sending a request from an IP client and including the telephone call service.
(“PINT” is short for “Phone-IP Interworking Services”). A PINT service always
involves the placement of a call within some Telephone Network. The original
meaning of the acronym “PINT” was “PSTN-Internet Interworking”, but the term has
since been broadened to allow services which involve any type of circuit-switched
telephone system, not just the “Public” Switched Telephone System. Private PBXs,
cellular phone networks, and the ISDN can all be used to deliver PINT services. Also,
the request for services might come from within a private IP network that is
disconnected from the whole Internet, i.e. an Intranet.
There is some overlap between PINT service requests and third-party call control. The
requirements for the PINT protocol were deliberately restricted to providing the
ability to invoke a small number of fixed telephone call services. Great care has been
taken, however, to develop a protocol that fits into the emerging Internet Conference
Architecture, so that future extensions to PINT could develop along with Internet
Conferencing.
Within the Internet Conference Architecture, establishing media calls is done via a
combination of protocols. SIP is used to establish the association between the
participants within the call (this association between participants within the call is
called a “session”), and SDP is used to describe the media to be exchanged within the
session. The PINT protocol uses these two protocols, providing some extensions and
enhancements to enable SIP clients and servers to become PINT clients and servers.
The underlying model of Internet Conference sessions is unchanged. The PINT user
who wishes to invoke a service within the phone system uses SIP to invite a remote
PINT server into a session. (“The user places a SIP call”). The invitation contains an
 1999 EURESCOM Participants in Project P847-GI
page 15 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
SDP description of the media session that the user would like to take place, for
example, this might be a “sending a fax session” or a “telephone call session”, etc.
Acceptance of the invitation by the PINT server establishes a session between the
client and server, during which the requested media can be sent. In a PINT session the
media is transported over the phone system, while in a SIP session the media is
normally transported over an internet.
The particular requirements of PINT users lead to some new messages. For example,
the fact that a server accepts an invitation and a session is established is no guarantee
that the media will be successfully transported, neither in SIP nor in PINT. For
example, a PINT server may accept to send a fax to telephone B, but it may be that the
fax transmission fails after part of the fax is sent. Therefore, the PINT client needs to
be able to receive information about the status of the actual telephone call session that
was invoked as a result of the established PINT session. This requirement leads to a
new STATUS request and to some new Warning messages.
The relationship between PINT and SIP can be summarised as follows: The invitation
sequence (INVITE-OK-ACK) establishes an Internet Session between the PINT
server and client. The request contains a description of the “telephone network media
transport session” requested. The PINT server sends an OK to signal its agreement to
establish a PINT session with the client. The actual transportation of media over the
phone (a.k.a “the phone call”) might happen hours or days after the establishment of
the PINT call. Similarly, the phone call might complete long before any BYE is sent.
As long as no BYE is sent, then the PINT session exists, and the client may request
the STATUS of the session, or may even request to change a session parameter. Of
course, it may be impossible to change the session parameters (for example, the fax
may already have been totally or partially sent). The client sends a BYE to signal its
desire to end the PINT call. Once the BYE is acknowledged, there is no longer any
PINT association between the PINT client and server. A Warning: line is used within
the response to the BYE to indicate the status of the telephone-side media transport
session. Finally, at any point during the PINT session (and possibly even afterwards),
a client may send a STATUS message to the PINT server to retrieve information
about the telephone network session associated to the PINT request.
The enhancements and additions specified here are not intended to alter the behaviour
of baseline SIP or SDP in any way. The Milestone PINT services fit seamlessly into
the rest of the Internet Conference Architecture, and the PINT profile can be used to
extend the usual SIP/SDP services to the telephone world. This is a great added
benefit of using SIP/SDP as the protocol to invoke the PINT services. Apart from
integrating well into existing protocols and architectures, and the advantages of reuse,
this means that the protocol specified here can handle a rather wider class of call
services than just the Milestone services.
Some of the enhancements specified here (such as the use of multiparty MIME) make
sense in the context of a pure Internet Conference. The PINT profile has been
designed so that each enhancement is independent of any other. SIP transactions that
have nothing to do with telephone call services and telephone sessions should be able
to use these enhancements. It is possible that these will become part of future versions
of SIP and SDP.
page 16 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
5.3
Volume 2: Annex 1 - Assessment of TINA and the Internet
H.323
The H.323 standard provides a foundation for audio, video, and data communications
across IP-based networks, including the Internet. By complying with H.323,
multimedia products and applications from multiple vendors can interoperate,
allowing users to communicate without concern for compatibility. H.323 can be the
keystone for LAN-based products for consumer, business, entertainment, and
professional applications.
H.323 is an umbrella recommendation from the International Telecommunications
Union (ITU) that sets standards for multimedia communications over Local Area
Networks (LANs) that do not provide a guaranteed Quality of Service (QoS). These
networks dominate today’s corporate desktops and include packet-switched TCP/IP
and IPX over Ethernet, Fast Ethernet and Token Ring network technologies.
Therefore, the H.323 standards are important building blocks for a broad new range of
collaborative, LAN-based applications for multimedia communications. The H.323
specification was approved in 1996 by the ITU’s Study Group 15. The standard is
broad in scope and includes both stand-alone devices and embedded personal
computer technology as well as point-to-point and multipoint conferences. The
standard addresses call control, multimedia management, and bandwidth management
for point-to-point and multipoint conferences. H.323 also addresses interfaces
between LANs and other networks. H.323 is part of a larger series of communications
standards that enable videoconferencing across a range of networks. Known as
H.32X, this series includes H.320 and H.324, which address ISDN and PSTN
communications, respectively.
Why H.323 is important
The H.323 Recommendation is comprehensive, yet flexible, and includes
configurations for voice-only headsets, voice and video games, and full multimedia
videoconferencing stations, among others. H.323 applications are set to grow into the
mainstream market for several reasons.
 Codec Standards: H.323 establishes standards for compression and
decompression of audio and video data streams, ensuring that equipment from
different vendors will have some area of common support.
 Interoperability: Users want to conference without worrying about
compatibility at the receiving point. Besides ensuring that the receiver can
decompress the information, H.323 establishes methods for receiving clients to
communicate capabilities to the sender. The standard also establishes common
call setup and control protocols.
 Network Independence: H.323 is designed to run on top of common network
architectures. As network technology evolves, and as bandwidth-management
techniques improve, H.323-based solutions will be able to take advantage of
those enhanced capabilities.
 Platform and Application Independence: H.323 is not tied to any hardware or
operating system. H.323-compliant plat-forms will be available in many sizes and
shapes, including video-enabled personal computers, dedicated platforms, and
turnkey boxes.
 1999 EURESCOM Participants in Project P847-GI
page 17 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
 Multipoint Support: H.323 can support conferences of three or more endpoints
without requiring a specialized multipoint control unit. Multipoint capabilities
can be included in other components of an H.323 system.
 Bandwidth Management: Video and audio traffic is bandwidth-intensive and
could clog the corporate network. H.323 addresses this issue by providing
bandwidth management. Network managers can limit the number of
simultaneous H.323 connections within their network or the amount of bandwidth available to H.323 applications. These limits ensure that critical traffic will
not be disrupted.
 Multicast Support: H.323 supports multicast transport in multipoint
conferences. Multicast sends a single packet to a subset of destinations on the
network without replication. In contrast, unicast sends multiple point-to-point
transmissions, while broadcast sends to all destinations. In unicast or broadcast,
the network is used inefficiently as packets are replicated throughout the
network. Multicast transmission uses bandwidth more efficiently since all
stations in the multicast group read a single data stream.
 Flexibility: A H.323 conference can include end-points with different
capabilities. For example, a terminal with audio-only capabilities can participate
in a conference with terminals that have video and/or data capabilities.
Furthermore, an H.323 multimedia terminal can share the data portion of a
videoconference with a T.120 data-only terminal, while sharing voice, video, and
data with other H.323 terminals.
5.4
SGCP: Simple Gateway Control Protocol
This section describes an application programming interface (SGCI) and a
corresponding protocol (SGCP) for controlling Voice over IP (VoIP) Gateways from
external call control elements. The SGC assumes a call control architecture where the
call control “intelligence” is outside the gateways and handled by external call control
elements. The SGC assumes that these call controls, or call agents, will synchronize
themselves to send coherent commands to the gateways. The SGC does not provide
any mechanism for synchronizing these agents.
The SGCP assumes a connection model where the basic constructs are endpoints and
connections. Endpoints are sources or sinks of data and could be physical or virtual.
A physical endpoint is, for example, a trunk circuit. An example of a virtual endpoint
is an audio source in an audio-content server. Creation of physical endpoints requires
hardware installation, while creation of virtual endpoints can be done by software.
Connections may be either point to point or multipoint. A point to point connection is
an association between two endpoints with the purpose of transmitting data between
these endpoints. Once this association is established for both endpoints, data transfer
between these endpoints can take place. A multipoint connection is established by
connecting the end point to a multipoint session.
Relation with the H.323 standards
The SGCP is designed as an internal protocol within a distributed system that appears
to the outside as a single VoIP gateway. This system is composed of a call agent, that
may or may not be distributed over several computer platforms, and of a set of
gateways. In a typical configuration, this distributed gateway system will interface on
page 18 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
one side with one or several telephony switches, and on the other side with H.323
conformant systems, as indicated in the following table:
Functional
Plane
Phone switch
Terminating
Entity
H.323 conformant systems
Signaling
Plane
Signaling
exchanges
through
SS7/ISUP
Call agent
Signaling exchanges with the call agent
through H.225/RAS and H.225/Q.931.
Possible negotiation of logical channels and
transmission parameters through H.245 with
the call agent.
Internal
synchronization
through SGCP
Bearer
Data
Transport
Plane
Connection
through high
speed
trunk
groups
Telephony
gateways
Optional negotiation of logical channels and
transmission parameters through H.245
directly with the telephony gateway.
Transmission of VoIP data using RTP,
directly between the H.323 station and the
gateway.
In the SGCP model, the gateways focus on the audio signal translation function, while
the call agent handles the signaling functions. As a consequence, the call agent
implements the “signaling” layers of the H.323 standard, and presents itself as a
“Gatekeeper” to the H.323 systems. Calls are established using the “Gatekeeper
Routed” call model.
Relationships of SGCP with the IETF standards
While H.323 is the recognized standard for VoIP terminals, the IETF has also
produced standards for other types of multi-media applications. These other standards
include:

the Session Description Protocol (SDP), RFC 2327,

the Session Announcement Protocol (SAP),

the Session Initiation Protocol (SIP),

the Real Time Streaming Protocol (RTSP), RFC 2326.
The latter three standards are in fact alternative signaling standards that allow for the
transmission of a session description to an interested party. SAP is used by multicast
session managers to distribute a multicast session description to a large group of
recipients, SIP is used to invite an individual user to take part in a point-to-point or
unicast session, RTSP is used to interface a server that will provide real time data. In
all three cases, the session description is described according to SDP; when audio is
transmitted, it is transmitted through the Real-time Transport Protocol, RTP.
The distributed gateway systems and SGCP will enable telephony users to access
these sessions. The call agent will provide for signaling conversion, according to the
following table:
 1999 EURESCOM Participants in Project P847-GI
page 19 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
Functional
Plane
Phone switch
Terminating
Entity
IETF conforming systems
Signaling
Plane
Signaling
exchanges
through
SS7/ISUP
Call agent
Signaling exchanges with the call agent
through SAP, SIP or RTSP.
Negotiation of session description
parameters through SDP (telephony
gateway terminated but passed via the call
agent to and from the IETF conforming
system)
Internal
synchronization
through SGCP
Bearer Data
Transport
Plane
Connection
through high
speed trunk
groups
Telephony
gateways
Transmission of VoIP data using RTP,
directly between the remote system and the
gateway.
The SDP standard has a pivotal status in this architecture. SDP is also used to carry
session descriptions in SGCP.
5.5
IPDC: IP Device Control
The IPDC protocols are proposed as a protocol suite, components of which can be
used individually or together to perform connection control, media control, and
signaling transport for environments where the service control logic is separated from
the network access server.
The IPDC protocol suite operates between the Media Gateway Controller and the
Media Gateway. In terms of previous contributions to the experts of Questions 1314/16, the corresponding entities are the Call Control and Media Control portions of
the H.323 Gateway. The operation of IPDC in the service of H.323 is clarified in a
companion contribution entitled “IPDC Architectural Framework”.
A need has been identified for one or more protocols to control gateway devices
which sit at the boundary between the circuit-switched telephone network and the
internet and terminate circuit- switched trunks. Examples of such devices include
network access servers and voice-over-IP gateways. The need for a control protocol
separate from call signalling arises when the service control logic needed to process
calls lies partly or wholly outside the gateway devices.
Note that IPDC views the Media Gateway as an application which may control one or
more physical devices. In addition to its primary mandate, IPDC may be used to
control devices which do not meet the strict definition of Media Gateway such as
digital cross-connects and announcement servers.
IPDC builds on the base already provided by DIAMETER. DIAMETER has a number
of advantages as a starting point:
 built-in provision for control security
 facilities for starting up the control relation
page 20 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
 ready extensibility both in modular increments and at the atomic (individual
command and attribute) level.
Because DIAMETER is specifically written for the AAA (authentication,
authorization, accounting) application, IPDC uses DIAMETER ‘s syntactical
framework rather than DIAMETER itself. The IETF document looks very much like
the current DIAMETER Base document, but various changes to suit the IPDC
application environment have created a protocol which is interoperable with but not
identical with DIAMETER.
5.6
MGCP: Media Gateway Control Protocol
MGCP protocol is the result of the attempt to make SGCP and IPDC protocols to
converge in a unique protocol suite (draft 0.1 was issued on November 9 th). Therefore
it should supersede both. Draft 0.1 states: “ MGCP version 0.1 results from the fusion
of the SGCP and IPDC proposals”.
MGCP assumes a call control architecture where the call control “intelligence” is
outside the gateways and handled by external call control elements. A telephony
gateway is a network element that provides conversion between the audio signals
carried on telephone circuits and data packets carried over the Internet or over other
packet networks. Example of gateways are:
 Trunking gateways, that interface between the telephone network and a Voice
over IP network. Such gateways typically manage a large number of digital
circuits.
 Voice over ATM gateways, which operate much the same way as voice over IP
trunking gateways, except that they interface to an ATM network.
 Residential gateways, that provide a traditional analog (RJ11) interface to a
Voice over IP network. Examples of residential gate- ways include cable
modem/cable set-top boxes, xDSL devices, broadband wireless devices
 Access gateways, which provide a traditional analog (RJ11) or digital PBX
interface to a Voice over IP network. Examples of access gateways include
small-scale voice over IP gateways.
 Business gateways, that provide a traditional digital PBX interface or an
integrated “soft PBX” interface to a Voice over IP network.
 Network Access Servers, which can attach a “modem” to a telephone circuit and
provide data access to the Internet. In the future, the same gateways will combine
Voice over IP services and Network Access services.
 Circuit switches, or packet switches, which can offer a control interface to an
external call control element.
MGCP assumes a call control architecture where the call control “intelligence” is
outside the gateways and handled by external call control elements. The MGCP
assumes that these call control elements, or Call Agents, will synchronise with each
other to send coherent commands to the gateways under their control. MGCP does not
define a mechanism for synchronising Call Agents.
MGCP assumes a connection model where the basic constructs are endpoints and
connections. Endpoints are sources or sinks of data and could be physical or virtual.
Examples of physical endpoints are:
 1999 EURESCOM Participants in Project P847-GI
page 21 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
 An interface on a gateway that terminates a trunk connected to a PSTN switch
(e.g., Class 5, Class 4, etc.). A gateway that terminates trunks is called a trunk
gateway.
 An interface on a gateway that terminates an analog POTS connection to a
phone, key system, PBX, etc. A gateway that terminates residential POTS lines
(to phones) is called a residential gateway.
Connections may be either point to point or multipoint. A point to point connection is
an association between two endpoints with the purpose of transmitting data between
these endpoints. Once this association is established for both endpoints, data transfer
between these endpoints can take place. A multipoint connection is established by
connecting the endpoint to a multipoint session.
Connections can be established over several types of bearer networks:
 Transmission of audio packets using RTP and UDP over an IP network.
 Transmission of audio packets using AAL2, or another adaptation layer, over an
ATM network.
 Transmission of packets over an internal connection, for example the TDM
backplane or the interconnection bus of a gateway. This is used, in particular, for
“hairpin” connections, connections that terminate in a gateway but are
immediately rerouted over the tele- phone network.
For point-to-point connections the endpoints of a connection could be in separate
gateways or in the same gateway.
5.7
MGCP vs. IPDC and SGCP
Main characteristics of MGCP with respect to its predecessors are:
 It retains SGCP simplicity (text based protocol and transport over UDP)
 It relies on already established standards: IPSEC for security and SDP for
connection description
 It supports more functionalities:
 More types of networks are supported (SDP profile is set for ATM, NAS,
LAN and TCP/IP)
 It is extensible (this feature is mainly taken from IPDC)
 It supports management facilities such as Audit end points, Audit Connection
and Restart in progress (the latter comes from IPDC)
5.8
Real Time Transfer Protocol, RTP
The Real-time Transport Protocol (RTP) [RFC1889] provides end-to-end delivery
services for data with real-time characteristics, such as interactive audio and video.
Those services include payload type identification, sequence numbering,
timestamping and delivery monitoring. Applications typically run RTP on top of UDP
to make use of its multiplexing and checksum services; both protocols contribute parts
of the transport protocol functionality. However, RTP may be used with other suitable
page 22 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
underlying network or transport protocols. RTP supports data transfer to multiple
destinations using multicast distribution if provided by the underlying network.
Note that RTP itself does not provide any mechanism to ensure timely delivery or
provide other quality-of-service guarantees, but relies on lower-layer services to do
so. It does not guarantee delivery or prevent out-of-order delivery, nor does it assume
that the underlying network is reliable and delivers packets in sequence. The sequence
numbers included in RTP allow the receiver to reconstruct the sender's packet
sequence, but sequence numbers might also be used to determine the proper location
of a packet, for example in video decoding, without necessarily decoding packets in
sequence.
While RTP is primarily designed to satisfy the needs of multi- participant multimedia
conferences, it is not limited to that particular application. Storage of continuous data,
interactive distributed simulation, active badge, and control and measurement
applications may also find RTP applicable.
5.9
Resource Reservation Protocol (RSVP)
RSVP is a resource reservation setup protocol designed for an integrated services
Internet. The RSVP [RFC2205] protocol is used by a host to request specific QoS
from the network for particular application data streams or flows. RSVP is also used
by routers to deliver QoS requests to all nodes along the path(s) of the flows and to
establish and maintain state to provide the requested service. RSVP requests will
generally result in resources being reserved in each node along the data path.
RSVP requests resources for simplex flows, i.e., it requests resources in only one
direction. Therefore, RSVP treats a sender as logically distinct from a receiver,
although the same application process may act as both a sender and a receiver at the
same time. RSVP operates on top of IPv4 or IPv6, occupying the place of a transport
protocol in the protocol stack. However, RSVP does not transport application data but
is rather an Internet control protocol, like ICMP, IGMP, or routing protocols. Like the
implementations of routing and management protocols, an implementation of RSVP
will typically execute in the background.
RSVP is not itself a routing protocol; RSVP is designed to operate with current and
future unicast and multicast routing protocols. An RSVP process consults the local
routing database(s) to obtain routes. In the multicast case, for example, a host sends
IGMP messages to join a multicast group and then sends RSVP messages to reserve
resources along the delivery path(s) of that group. Routing protocols determine where
packets get forwarded; RSVP is only concerned with the QoS of those packets that are
forwarded in accordance with routing.
In order to efficiently accommodate large groups, dynamic group membership, and
heterogeneous receiver requirements, RSVP makes receivers responsible for
requesting a specific QoS. A QoS request from a receiver host application is passed to
the local RSVP process. The RSVP protocol then carries the request to all the nodes
(routers and hosts) along the reverse data path(s) to the data source(s), but only as far
as the router where the receiver's data path joins the multicast distribution tree. As a
result, RSVP's reservation overhead is in general logarithmic rather than linear in the
number of receivers.
Quality of service is implemented for a particular data flow by mechanisms
collectively called "traffic control". These mechanisms include (1) a packet classifier,
 1999 EURESCOM Participants in Project P847-GI
page 23 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
(2) admission control, and (3) a "packet scheduler" or some other link-layerdependent mechanism to determine when particular packets are forwarded. The
"packet classifier" determines the QoS class (and perhaps the route) for each packet.
For each outgoing interface, the "packet scheduler" or other link-layer-dependent
mechanism achieves the promised QoS. Traffic control implements QoS service
models defined by the Integrated Services Working Group.
During reservation setup, an RSVP QoS request is passed to two local decision
modules, "admission control" and "policy control". Admission control determines
whether the node has sufficient available resources to supply the requested QoS.
Policy control determines whether the user has administrative permission to make the
reservation. If both checks succeed, parameters are set in the packet classifier and in
the link layer interface (e.g. in the packet scheduler) to obtain the desired QoS. If
either check fails, the RSVP program returns an error notification to the application
process that originated the request.
RSVP protocol mechanisms provide a general facility for creating and maintaining
distributed reservation state across a mesh of multicast or unicast delivery paths.
RSVP itself transfers and manipulates QoS and policy control parameters as opaque
data, passing them to the appropriate traffic control and policy control modules for
interpretation.
Since the membership of a large multicast group and the resulting multicast tree
topology are likely to change with time, the RSVP design assumes that state for RSVP
and traffic control state is to be built and destroyed incrementally in routers and hosts.
For this purpose, RSVP establishes "soft" state; that is, RSVP sends periodic refresh
messages to maintain the state along the reserved path(s). In the absence of refresh
messages, the state automatically times out and is deleted.
In summary, RSVP has the following attributes:

RSVP makes resource reservations for both unicast and many-to-many multicast
applications, adapting dynamically to changing group membership as well as to
changing routes.

RSVP is simplex, i.e., it makes reservations for unidirectional data flows.

RSVP is receiver-oriented, i.e., the receiver of a data flow initiates and maintains
the resource reservation used for that flow.

RSVP maintains "soft" state in routers and hosts, providing graceful support for
dynamic membership changes and automatic adaptation to routing changes.

RSVP is not a routing protocol but depends upon present and future routing
protocols.

RSVP transports and maintains traffic control and policy control parameters that
are opaque to RSVP.

RSVP provides several reservation models or "styles" to fit a variety of
applications.

RSVP provides transparent operation through routers that do not support it.

RSVP supports both IPv4 and IPv6.
page 24 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
6
Volume 2: Annex 1 - Assessment of TINA and the Internet
Opportunities for TINA
In order to identify areas where TINA can provide solutions for Internet short
comings, it is necessary to assess whether TINA should be used as an alternative to
the Internet or complimentary to the Internet. In an ideal world the former could be
the case as TINA provides a global solution for telecommunications. However, we
live in the real world, and it is unlikely that any one technology or standard would
gain global acceptance and domination. The Internet is rapidly expanding faster than
any other communications infrastructure and is unlikely to be replaced anytime soon.
This is the world we live in and TINA has a lot to offer and therefore should be used
to compliment and improve the existing infrastructure. This section will identify
where TINA could be applied today independently or in conjunction with the IETF
standards process.
The TINA Network Resource Information Model (NRIM) can be successfully used
to model a network providers network. It is generally accepted that many IP carriers
will use ATM technology in their ATM backbone. The TINA NRIM is well suited for
modelling ATM networks and could be applied to this scenario. A management
system based on the NRIM is a flexible way of managing an ATM backbone by easily
being able to add and delete new network nodes to meet the continuously changing
network demands. This particularly useful for VPN service provisioning or offering
“leased line” services to customers. It is not intended for dynamic connection set-up
from a end users terminal, but for static configuration of a providers backbone. This
scenario has been effectively adopted by Sprint in the Integrated On Demand (ION)
solution.
With increased deregulation and convergence between the Internet and
Telecommunications for advanced networks there is a need for an environment which
supports online service creation which seamlessly interoperate across global
networks, can scale from hundreds to millions of subscribers, and enable network
providers, content providers and Internet developers to build new telecommunications
providers. The TINA Service Architecture is intended to achieve these ambitious
goals. The Service Architecture is an open platform for providers and developers.
TINA session concepts promote a service independent mechanism for uniform service
access and service management. The Internet uses protocols such as RADIUS to
perform authentication, however, service subscription is normally performed in an ad
hoc manner on a service by service basis. TINA ties these methods together to provide
a uniform access session which could be well suited for a Next Generation Internet.
Initiatives such as the AT&T GeoPlex and the Bridgewater WideSpan Intelligent
Network are addressing a similar problem domain and compliment TINA’s vision of
the future open services market.
One problem with the Internet is that many protocols have been developed for similar
problem domains. TINA could provide a layer of abstraction for users and providers
alike. This is depicted in Figure 1. For example, a voice over IP (VoIP) service could
be offered using TINA components which encapsulated the functionality offered by
protocols such as H.323 and SIP. This offers a generic “layer” which hides
heterogeneous underlying networks and protocols. This appears to be advantageous
from the operator’s point of view as only one breed of VoIP service needs to be
managed. From the network point of view, TINA could offer a uniform “network
API” which could be an extension of the normal BSD socket API. This offers a
possibility of providing enhanced QoS management supported by TINA. This concept
 1999 EURESCOM Participants in Project P847-GI
page 25 (27)
Volume 2: Annex 1 - Assessment of TINA and the Internet
Deliverable 2
has already been adopted by the Parlay Group which provides a common open
interface into any kind of telecommunications interface.
Figure 1: TINA abstract underlying complexity
Within the IETF, the PINT and NAVDEC groups are currently moving towards
defining interfaces and protocols using IDL. There is an opportunity for TINA to
“lend” a hand in this activity.
One area where the Internet is particularly strong is that there are many applications
on the market. However, there are few, if any, applications that benefit from TINA. It
has been shown that existing IP applications can be integrated into a TINA service
architecture framework. This could be a first step for a Retailer to extend its product
portfolio enabling management of service access, subscription and accounting.
In summary, the Internet is fast evolving, however, TINA still has a role to play in
providing a framework for the expected open service market.
page 26 (27)
 1999 EURESCOM Participants in Project P847-GI
Deliverable 2
Volume 2: Annex 1 - Assessment of TINA and the Internet
References
[D2Vol3]
“Assessment of TINA in the Real World”, P847-GI Vol3 of D2
[DC9-97]
“VPNs: Security With an Uncommon Touch,” Data Communications
International, Sept. 1997; http://www.data.com/lab_tests/vpn.html).
[DC3-98]
“Voice Over IP Services: The Sound Decision”, Data Communications
International,
March
1997;
http://www.data.com/roundups/decision.html
[DC8-98]
“VPNs: Safety First, But What About Speed?”, Data Communications
International, July 1998; http://www.data.com/lab_tests/first.html
[H.225]
ITU-T, Recommendation H.225 “Call Signaling Protocols and Media
Stream Packetisation for Packet Based Multimedia Communications
Systems.”
[H.245]
ITU-T, Recommendation H.245 “Line Transmission of Non-Telephone
Signals.”
[H.323]
ITU-T, Recommendation H.323 “Visual Telephone Systems and
Equipment for Local Area Networks which provide a non-guaranteed
Quality of Service.”
[HANDLEY1]
"SAP: Session Announcement Protocol", Handley, M., Work in
Progress.
[HANDLEY2]
"Session Initiation Protocol (SIP)", Handley, M., Schooler, E., and H.
Schulzrinne, Work in Progress.
[MSFT]
“Active Operations Support Systems And Opportunities”, Microsoft,
http://www.microsoft.com/isn/network/telecom/oss.asp
[RFC769]
RFC 768 “User Datagram Protocol, 1980
[RFC791]
RFC 791 “Internet Protocol”, 1981
[RFC793]
RFC 793 “Transmission Control Protocol”, 1981
[RFC821
[RFC821] “Simple Mail Transfer Protocol”, 1982
[RFC854]
RFC 854 “Telnet Protocol Specification”, 1983
[RFC959]
RFC 959 “File Transfer Protocol”, 1985
[RFC1157]
RFC 1157 “Simple Network Management Protocol”, 1990
[RFC1889]
RFC 1889 “Real Time Protocol”, 1996
[RFC1890]
RFC 1890 “RTP Profile for Audio and Video Conferences with
Minimal Control” 1996
[RFC2205]
RFC 2205 “Resource ReSerVation Protocol (RSVP) -- Version 1
Functional Specification”, 1997
[RFC2326]
RFC 2326 “"Real Time Streaming Protocol (RTSP)” 1998
[RFC2235]
RFC 2235 “Hobbes’ Internet Timeline”, 1997
[RFC2327]
RFC 2327 “SDP: Session Description Protocol”, 1998
 1999 EURESCOM Participants in Project P847-GI
page 27 (27)
Download