SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Solutions White Paper



Delivering Secure IP-Based Services
Jasomi Uses Intel® Technology and AdvancedTCA for
Its High-End Carrier and IMS Session Border Controller


Table of Contents                                                                        Originally developed to provide security and access services in
                                                                                         Voice over IP (VoIP) networks, the role of the session border
Business Challenge .......................................................... 1
                                                                                         controller has grown as service providers accelerate their
Delivering Services.......................................................... 2
                                                                                         delivery of IP-based services. A leading developer of session
What Is a Session Border Controller? .......................... 2
                                                                                         border controllers based on Intel® technology, Jasomi Networks
The Jasomi Networks Solution....................................... 3
                                                                                         has continued to advance the state-of-the-art technology used
Key Capabilities .............................................................. 3
                                                                                         in its PeerPoint* products by using the AdvancedTCA* form
Technologies ..................................................................... 4
                                                                                         factor, programmable Intel® network processors, and Intel
   AdvancedTCA .............................................................. 4
                                                                                         NetStructure® boards.
   Programmable Intel® Network Processors................. 5
   Secure Packet Processing Blades................................ 5
                                                                                         Business Challenge
Architectures.................................................................... 5
                                                                                         For the past decade, network operators of all types and sizes
   Time to Market ............................................................ 5
                                                                                         have been facing the challenge of diversifying their service
   Modularity .................................................................... 5
                                                                                         offerings to increase revenue and attract new customers while
   Scalability ..................................................................... 5
                                                                                         reducing churn among their current ones. Recently these
   Redundancy.................................................................. 6
                                                                                         service providers have been embracing the Internet Protocol
Summary........................................................................... 6
                                                                                         (IP) as the means to deliver rich multimedia content on a wired
Acronyms.......................................................................... 6
                                                                                         or wireless network. IP easily enables voice, video, and data
                                                                                         “triple play” capabilities for IP endpoints on a broadband
                                                                                         Internet connection.
Residential Services                                                   Business Services
  On-demand video/movies                                                 Sales force automation applications
  Music                                                                  Enterprise applications
  Video streaming of live content                                        Rich content distribution
  Messaging                                                              Permission-based marketing
  Unified messaging                                                      Scheduling and reservation tools
  Multimedia messaging                                                   Presence management
  Video messaging                                                        Unified messaging
  Picture messaging                                                      Distributed call center
  Multimedia gaming                                                      Flexible device options
  Multimedia gambling                                                    Instant messaging
                                                                         Audio and video conferencing
                                                                         Desktop application sharing
                                                                         Video content delivery

                                                  Table 1. Residential and Business Services




DELIVERING SERVICES
Residential and business customers are interested in very                • Legal compliance
different kinds of services as can easily be seen in the examples            — Call intercept
given in Table 1. Only a few, such as unified messaging,                     — Call logging
intersect both groups.                                                   The session border controller is the key network component
                                                                         that service providers have embraced to resolve these security,
Delivering all these services, and adding new ones quickly,
                                                                         service assurance, peering, and legal compliance issues.
presents critical security, service assurance, peering, and legal
compliance issues similar to those encountered when
                                                                         WHAT IS A SESSION BORDER CONTROLLER?
deploying basic VoIP services. These include:
                                                                         Session border controllers were created to intercept and process
                                                                         calls on a VoIP network, allowing a single element to monitor
• Security
                                                                         not only the signaling traffic but also the media traffic. This
   — End-to-end encryption
                                                                         does not mean that the session border controller always proxies
   — Topology hiding
                                                                         media; as one approach to total QoS, the session border
   — Prevention of distributed denial of service attacks
                                                                         controller has the ability to intelligently route media — for
   — Prevention of SIP-based spam and viruses
                                                                         example, directly between endpoints.
• Service assurance
                                                                         Session border controllers can be used along with firewalls to
   — Firewall and Network Address Translation (NAT)
                                                                         monitor media delivery on a private, protected network. On a
      traversal
                                                                         public network session border controllers enable the use of
   — Quality of Service (QoS) enforcement
                                                                         appropriate protocols from private networks with Internet
   — Class of service policies
                                                                         connections using NAT. Session border controllers can also
   — Interoperability
                                                                         perform transcoding of the media stream when different coders
• Carrier-to-carrier peering
                                                                         are in use and can provide security features such as denial of
   — Transcoding
                                                                         service protection, call filtering, bandwidth management, etc.
   — Auditing




                                                                    2
Voice Origination
                                                                              Voice Termination
                                                                           Enhanced Local Services
                                                                                                                                   Voice Assisted Services
                                                                                                                                 Audio and Video Conferencing
                                                                                                                                             IP TV
                                                                                                                                         Video Server
                        IP           IP                                                                  SBC
                                                                            VoIP Wholesalers
               SIP/MGCP Phones


                                                                                                                                  Multimedia Application
                        SMB                                                                    Secure Peering
                                                                                                                                 Service Provider (M-ASP)
                                                                                                 Call Routing
                                                               Radius Policy
                                                           SBC                                   Accounting
                                                                  Server
                                                                                               MOS Evaluation
                                                                                               Lawful Intercept
                               ATA
                             SIP/MGCP
                   IP
                                                Hosted NAT Traversal
                                                                                                            Media Server
                                                                              SIP Register
                                                       Security
                                                                                                                                           SBC
                                                                               and Proxy
                                                  Lawful Intercept
              Residential/SOHO                                                                Application
                                                                               MGCP Call
                                                 Quality Optimization
                                                                                                Server                                            IP Multimedia
                                                                              Agent Server
                                               Media Path Optimization
                                                                                                                                                 Subsystem (IMS)
                                                                                                                           SBC
                                                                                                         IPv4-IPv6
                                                                              Carrier IP Network Internetworking
                                      Network Protection
                                                                                                       Protocol Repair            SBC      Mobile Operator B
                                                                 SBC

                         IPBX                                                               LCS
                                                                                        Access Proxy
                                                                                                                       IPSec
                                                            Hosted NAT                                            Media Firewalling
                                                             Traversal                                                Privacy
                                                                                      Collaboration
                                                           Inter-Domain
                                                                                                                  Topology Hiding P-CSCF
                                                            Call Routing              Server (T.120)
              IP              IP                              Protocol
                                          IP
                                                                                                                          IP Multimedia
                                                           Normalization
              SIP/MGCP Phones                                                                                            Subsystem (IMS)
                                                                             LCS Home                                                      S-CSCF
                                                                               Server

               Enterprises                                  Microsoft Collaboration Service Provider                                 Mobile Operator A
                                                                                                                                                                Source: Jasomi
                                                           Figure 1. Session Border Controller Deployment


Figure 1 illustrates how session border controllers can be                                   Both the PeerPoint C and PeerPoint A series are based on Intel®
deployed in a network. The session border controllers are                                    technology and driven by PeerPointOS with media and control
represented as six-blade chassis and marked with the                                         core engines integrated into a hardened Linux* kernel. On the
acronym “SBC.”                                                                               PeerPoint C chassis, PeerPointOS has been optimized to run on
                                                                                             Intel® Xeon™ processors. Jasomi has ported its media core and
The Jasomi Networks Solution                                                                 control core engines on the PeerPoint A500 series, which is
                                                                                             capable of supporting 80,000 concurrent calls, using blades
Jasomi Networks is a leading worldwide provider of session
                                                                                             with dual Intel Xeon processors and two Intel® IXP2850
border controller technology with many years of experience in
                                                                                             network processors.
IP packet processing in the VoIP market segment. The
company’s open standards-based, modular communications
                                                                                             KEY CAPABILITIES
platform is used by service providers and enterprises worldwide
                                                                                             A few of the key capabilities of Jasomi session border
and has been running in production environments since 2002.
                                                                                             controllers are discussed below.
Jasomi is a pioneer in the move to the Advanced Telecom
                                                                                             Far End NAT Traversal Service
Computing Architecture (AdvancedTCA or ATCA*) platform,
                                                                                             The most common problem that service providers encounter
and both the signaling and media engines of its PeerPoint C and
                                                                                             when deploying hosted services is the inability for subscribers’
PeerPoint A series session border controllers have been ported
                                                                                             voice equipment to work seamlessly behind NAT equipment
to AdvancedTCA and now offer extremely high call density and
                                                                                             and firewalls. PeerPoint ensures that subscribers can connect
resiliency.
                                                                                             anywhere, any time without having to reconfigure their
                                                                                             NAT/firewall equipment.



                                                                                        3
Security                                                                Continuous Service Assurance
The session border controller protects the service provider’s           PeerPointOS offers resiliency during planned maintenance,
back-end servers from potential security breaches. As it sits at        system outages, or network outages, or when a back-end server
the network edge between backend servers and Internet-based             becomes unavailable. The redundancy, scalability, and high-
users, the session border controller intelligently lets valid           availability features enabled by AdvancedTCA make it the
multimedia traffic through, and rejects and reports malicious           especially effective for carrier-grade solutions in this area.
traffic. The session border controller hides the internal network
                                                                        Technologies
topology information, which would be otherwise exposed by
signaling protocols such as the Session Initiation Protocol (SIP)
                                                                        Jasomi pursued a demanding selection process before deciding
or Media Gateway Control Protocol (MGCP). As rollouts of 3G
                                                                        to employ all of the technologies discussed below.
networks continue to accelerate and frameworks such as the IP
Multimedia Subsystem (IMS) gain momentum, PeerPoint can                 AdvancedTCA
act as a security gateway enabling secure Transport Layer               Modular infrastructures have been prevalent in packet-based
Security (TLS) or IPsec connections, which is a requirement of          data networks where standardization and flexibility have proven
the 3GPP* IMS specification                                             their value. However, communications networks have a
                                                                        different set of criteria, and the challenge in the last few years
PSTN and IMS Peering Services
                                                                        has been to create an infrastructure that can provide the high
PeerPoint session border controllers help service providers
                                                                        availability, “five-nines” reliability, and excellent performance
drive costs down and reach new market segments by enabling
                                                                        expected of telecom equipment.
access to cheaper PSTN gateways through peering agreements
                                                                        Because of the success of modular infrastructure in data
with VoIP wholesalers. Using an Intel based AdvancedTCA
                                                                        networks, more than 100 communications industry leaders have
platform, PeerPoint can generate and report real-time Mean
                                                                        been working with the standards organization PICMG to create
Opinion Scores (MOS) scores to ensure that a service level
                                                                        AdvancedTCA, a modular platform architecture designed
agreement (SLA) is satisfied.
                                                                        specifically to address the requirements of the communications
PeerPoint also supports transcoding between low bandwidth
                                                                        industry. A modular platform architecture provides the
coders such as G.723 and G.729 and a more popular coder such
                                                                        following benefits for equipment manufacturers such as Jasomi:
as G.711.
                                                                        • Lower development costs and fast time-to-market —
Peering allows access to multimedia applications such as hosted
                                                                           Equipment manufacturers can focus on platform
videoconferencing servers, video services, or access to an
                                                                           differentiation, cutting development time while delivering
IMS-based network. PeerPoint can provide the functional
                                                                           solutions with increased value.
“glue” between the SIP and 3GPP network for IPv4/IPv6
                                                                        • Solid platform strategy — Building with industry standard
conversion, protocol conversion, and encryption.
                                                                           components enables flexibility and proven scalability.
Audit, Management, and Problem Isolation Services                       • Higher density and integration — Using Intel processors
Since the session border controller is part of the media and               allows Jasomi to be at the leading edge of calls per U of
signaling path, it is ideally located to collect forensic data on          rack space. Having a standard AdvancedTCA backplane and
QoS metrics, remote devices, and voice quality to help isolate             architecture allows more system components to be managed
telephony issues or impose an SLA on peering partners.                     together in a cohesive and comprehensive manner.

                                                                        • Network evolution managed with confidence — Moving
                                                                           to a converged, all-IP network requires the flexibility that
                                                                           industry standard, modular network elements deliver.




                                                                    4
performance that an Intel architecture-based AdvancedTCA
PROGRAMMABLE INTEL® NETWORK PROCESSORS
                                                                        solution offered.
Jasomi session border controllers require high-performance,
encryption support, extensive software programmability, and
                                                                        TIME TO MARKET
broad availability of third-party hardware from a robust
                                                                        In order to speed time-to-market, Jasomi Networks joined
ecosystem such as the Intel® Communications Alliance. Based
                                                                        forces with IP Fabrics, an Intel® Communications Alliance
on its rigorous requirements, the Intel IXP2850 network
                                                                        member, to quickly migrate the data plane portion of its
processor became Jasomi’s first choice.
                                                                        application to an open standards-based NPU platform. By using
The ability to support high-speed transport using programmable          the skills and expertise of IP Fabrics, Jasomi was able to focus
network processors (NPUs) is fundamental to building flexible           on its application and save the time and resources that would
and adaptable network elements, such as session border                  otherwise have been needed to bring its engineers up to speed
controllers. A custom ASIC can take many months to develop.             on the internals of the IXP2850. IP Fabrics enabled a rapid
Intel network processors can be programmed (or reprogrammed)            application development approach with its Packet Processing
in a small fraction of that time, providing equipment                   Language (PPL) for the IXP2850, which handles the heavy
manufacturers such as Jasomi with a very efficient way to               throughput and encryption requirements of the Jasomi
support multiple and constantly evolving protocols. These               application.
processors bring the kind of flexibility and affordability to
                                                                        MODULARITY
network infrastructure design that Intel® Architecture processors
                                                                        The open standards-based modular architecture of the PeerPoint
have long provided for mainstream computer applications.
                                                                        session border controller enabled by Intel building blocks
SECURE PACKET PROCESSING BLADES                                         delivers flexibility and scalability to match the demanding
The Intel NetStructure IXB28504xGbEF is a high-performance              needs of today’s service provider networks. Intel’s packet
secure packet processing blade with the AdvancedTCA form                processing blade provides direct access to all traffic on the wire,
factor, which uses the Intel IXP2850 to provide optimized               allowing Jasomi’s engineers maximum speed and flexibility
packet and content processing functions for IMS applications.           when designing the bulk-traffic processing algorithms necessary
The IXB28504xGbEF acts as a security gateway and uses the               to drive the PeerPointOS. Traffic paths inside the data plane are
two integrated cryptographic units in the IXP2850 to accelerate         orthogonal, enabling the deployment of a multiple-port NPU
IPsec cryptographic algorithms such as the Advanced                     blade in a variety of network configurations with negligible
Encryption Standard (AES) and Triple Data Encryption                    performance impact.
Standard (3DES). The IXB28504xGbEF is designed to provide
                                                                        Jasomi uses Intel’s high-performance packet processing blades,
high-performance packet processing for up to 4 Gbps of
                                                                        featuring the IXP2850, together with blades using dual Intel
Ethernet traffic and features a 4x1Gbps I/O interface to the
                                                                        Xeon processors. These are deployed in a two-tier architecture
external WAN or LAN. The Intel design provides a highly
                                                                        with the packet processing blades at the front-end providing
available system with redundant and partitioned paths for
                                                                        bulk traffic filtering and routine application offloading for the
control and payload traffic.
                                                                        CPU backend.

Architecture                                                            SCALABILITY
                                                                        The fact that scaling is often non-linear between signaling and
A modular communications platform architecture, based on
                                                                        media loads presented a challenge. Jasomi addressed this
open standards such as AdvancedTCA and Intel building blocks
                                                                        challenge by cleanly separating the two engines, allowing for
was a natural choice for Jasomi Networks’ next-generation
                                                                        an NxM interconnect. The Intel packet and compute processing
communications equipment designs. Along with support for
                                                                        blades in this design can be scaled independently, allowing
standards such as SIP, MGCP, TLS, IPSec, and DiffServ,
                                                                        extra signaling horsepower to be added for those environments
Jasomi required the flexibility, scalability, and carrier-grade




                                                                    5
with a large amount for SIP overhead (for example, in rich
                                                                      Acronyms
presence systems) and extra media processing for those
                                                                      3GPP       Third Generation Partnership Project
environments with heavy media requirements (for example, for
video or file sharing). Control of the blades is accomplished         ASIC       Application-Specific Integrated Circuit
with a lightweight protocol running either on the backplane or
                                                                      ATCA       Advanced Telecom Computing Architecture
across the network, allowing, for example, a chassis of packet
                                                                                 (AdvancedTCA)
processing blades to run next to a chassis of signaling
                                                                      CRBT       Color Ring Back Tones
processors, delivering scalable performance and redundancy.

                                                                      DiffServ   Differential Services
REDUNDANCY
Stateful failover is available both within an AdvancedTCA             IMS        IP Multimedia Subsystem
chassis and between multiple AdvancedTCA chassis, and state
                                                                      IP         Internet Protocol
synchronization can run on the backplane for internal
applications. In this way, the modular approach of the                IPsec      IP Security
AdvancedTCA architecture is fully utilized to facilitate fast and
                                                                      MGCP       Media Gateway Control Protocol
efficient session border controller functionality.
                                                                      MOS        Mean Opinion Score
Summary                                                               NAT        Network Address Translation
The session border controller market segment is highly
                                                                      NPU        Network Processing Unit
competitive and dynamic. Using Intel building blocks allowed
                                                                      PPL        Packet Processing Language
Jasomi to come first to market with a session border controller
based on the AdvancedTCA specification and offering the
                                                                      PSTN       Public Switched Telephone Network
highest level of call density and resiliency in the industry.
                                                                      QoS        Quality of Service

                                                                      SIP        Session Initiation Protocol

                                                                      SLA        Service Level Agreement

                                                                      TLS        Transport Layer Security

                                                                      VM         Virtual Machine

                                                                      VoIP       Voice over IP




                                                                  6
About Jasomi Networks                                                 Learn More about this Innovative
                                                                      Solution
Jasomi Networks enables VoIP for carriers, enterprises, and
service providers worldwide. By providing the technology that         For general information, proof points, and case studies about
allows VoIP services to be rolled out economically and securely       the products described in this white paper, visit
in complex multi-bordered networks, Jasomi is an integral part        http://www.jasomi.com and http://www.intel.com/go/telecom.
of making VoIP work. Jasomi’s product line complements                Learn more about the Intel Communications Alliance at
today’s existing security and networking infrastructure,              http://www.intel.com/go/ica.
providing VoIP connectivity across network security boundaries
without requiring network re-architecting. For more informa-
tion, visit http://www.jasomi.com.




                                                                  7
For more information
                                                                                                         Please contact your local Intel representative or visit us
                                                                                                         at: www.intel.com/go/atca




INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY
INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL
ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING
LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER
INTELLECTUAL PROPERTY RIGHT.
This document and related materials and information are provided “as is” with no warranties, express or implied, including but not limited to any implied warranty of merchantability, fitness
for a particular purpose, non-infringement of intellectual property rights, or any warranty otherwise arising out of any proposal, specification, or sample. Intel assumes no responsibility for
any errors contained in this document and has no liabilities or obligations for any damages arising from or in connection with the use of this document.
This whitepaper is for informational purposes only, and may contain typographical errors and technical inaccuracies. The content is provided as is, without express or implied warranties
of any kind.
Intel, Intel NetStructure, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
All Jasomi Networks brand and product names are trademarks or registered trademarks of Jasomi Networks in the United States and other countries.
Information about Jasomi Networks and its products and any claims relating to them have been provided by Jasomi Networks and are its sole responsibility.
*Other names and brands may be claimed as the property of others.
Printed in the USA         Copyright © 2005 Intel Corporation              All rights reserved.                          Printed on recycled paper.                   06/05      00-9668-001

Mais conteúdo relacionado

Destaque

Janne Penttilä, A channel for private businesses
Janne Penttilä, A channel for private businessesJanne Penttilä, A channel for private businesses
Janne Penttilä, A channel for private businessesBusiness Finland
 
Efz Uek3 Checkliste Bis Uek4
Efz Uek3 Checkliste Bis Uek4Efz Uek3 Checkliste Bis Uek4
Efz Uek3 Checkliste Bis Uek4Joel
 
Vida En El Espacio-4°A Colegio San Jose
Vida En El Espacio-4°A Colegio San JoseVida En El Espacio-4°A Colegio San Jose
Vida En El Espacio-4°A Colegio San Josesonia_mery
 
Resumen PMI y PMI capítulo Panama
Resumen PMI y PMI capítulo PanamaResumen PMI y PMI capítulo Panama
Resumen PMI y PMI capítulo PanamaEberhard Balmaceda
 
Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...
Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...
Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...OPITZ CONSULTING Deutschland
 
Aparato cardiovascular clases enf uai copiamodif
Aparato cardiovascular clases enf uai   copiamodifAparato cardiovascular clases enf uai   copiamodif
Aparato cardiovascular clases enf uai copiamodifIsmael Huambachano Loayza
 
Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...
Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...
Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...Diego Sobrino López
 
Belatza / Abubaker Jon Sagar
Belatza / Abubaker Jon SagarBelatza / Abubaker Jon Sagar
Belatza / Abubaker Jon Sagarabertoroalbertoro
 
The Ebnglish s student needs and priorities
The Ebnglish s student needs and prioritiesThe Ebnglish s student needs and priorities
The Ebnglish s student needs and prioritiesEmilie L.Gagnon
 
Mr. Seshadri Ramkumar | Innovation in nonwoven technical textiles
Mr. Seshadri Ramkumar |  Innovation in nonwoven technical textilesMr. Seshadri Ramkumar |  Innovation in nonwoven technical textiles
Mr. Seshadri Ramkumar | Innovation in nonwoven technical textilesdhaval2929
 
letra s (la osas susi)
letra s (la osas susi)letra s (la osas susi)
letra s (la osas susi)noeliach
 

Destaque (15)

Janne Penttilä, A channel for private businesses
Janne Penttilä, A channel for private businessesJanne Penttilä, A channel for private businesses
Janne Penttilä, A channel for private businesses
 
Efz Uek3 Checkliste Bis Uek4
Efz Uek3 Checkliste Bis Uek4Efz Uek3 Checkliste Bis Uek4
Efz Uek3 Checkliste Bis Uek4
 
Comunicacion En Twitter
Comunicacion En TwitterComunicacion En Twitter
Comunicacion En Twitter
 
Guzzi hispania 65
Guzzi hispania 65Guzzi hispania 65
Guzzi hispania 65
 
Vida En El Espacio-4°A Colegio San Jose
Vida En El Espacio-4°A Colegio San JoseVida En El Espacio-4°A Colegio San Jose
Vida En El Espacio-4°A Colegio San Jose
 
Resumen PMI y PMI capítulo Panama
Resumen PMI y PMI capítulo PanamaResumen PMI y PMI capítulo Panama
Resumen PMI y PMI capítulo Panama
 
Ley organica1
Ley organica1Ley organica1
Ley organica1
 
Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...
Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...
Historisierung und Analyse von Daten aus Oracle Enterprise Manager Cloud Cont...
 
As 0201-gauge-valves-and-pressure-gauge-accessories-en
As 0201-gauge-valves-and-pressure-gauge-accessories-enAs 0201-gauge-valves-and-pressure-gauge-accessories-en
As 0201-gauge-valves-and-pressure-gauge-accessories-en
 
Aparato cardiovascular clases enf uai copiamodif
Aparato cardiovascular clases enf uai   copiamodifAparato cardiovascular clases enf uai   copiamodif
Aparato cardiovascular clases enf uai copiamodif
 
Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...
Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...
Los profes chatean sobre Cristóbal Colón. Entrevista en la sección Innovadore...
 
Belatza / Abubaker Jon Sagar
Belatza / Abubaker Jon SagarBelatza / Abubaker Jon Sagar
Belatza / Abubaker Jon Sagar
 
The Ebnglish s student needs and priorities
The Ebnglish s student needs and prioritiesThe Ebnglish s student needs and priorities
The Ebnglish s student needs and priorities
 
Mr. Seshadri Ramkumar | Innovation in nonwoven technical textiles
Mr. Seshadri Ramkumar |  Innovation in nonwoven technical textilesMr. Seshadri Ramkumar |  Innovation in nonwoven technical textiles
Mr. Seshadri Ramkumar | Innovation in nonwoven technical textiles
 
letra s (la osas susi)
letra s (la osas susi)letra s (la osas susi)
letra s (la osas susi)
 

Mais de Joe Buzzanga

U.S. Consumer Search Preferences Q1 2017
U.S. Consumer Search Preferences Q1 2017U.S. Consumer Search Preferences Q1 2017
U.S. Consumer Search Preferences Q1 2017Joe Buzzanga
 
Intelligent personal assistant testing 1
Intelligent personal assistant testing  1Intelligent personal assistant testing  1
Intelligent personal assistant testing 1Joe Buzzanga
 
Google decode q3 2015 toc
Google decode q3 2015 tocGoogle decode q3 2015 toc
Google decode q3 2015 tocJoe Buzzanga
 
Google decode q3 toc
Google decode q3 tocGoogle decode q3 toc
Google decode q3 tocJoe Buzzanga
 
Google Decode q2 2014 toc
Google Decode q2 2014 tocGoogle Decode q2 2014 toc
Google Decode q2 2014 tocJoe Buzzanga
 
Is Google Evil 3.0
Is Google Evil 3.0Is Google Evil 3.0
Is Google Evil 3.0Joe Buzzanga
 
Technology Intelligence for R&D
Technology Intelligence for R&DTechnology Intelligence for R&D
Technology Intelligence for R&DJoe Buzzanga
 
London Online 2008
London Online 2008London Online 2008
London Online 2008Joe Buzzanga
 

Mais de Joe Buzzanga (9)

U.S. Consumer Search Preferences Q1 2017
U.S. Consumer Search Preferences Q1 2017U.S. Consumer Search Preferences Q1 2017
U.S. Consumer Search Preferences Q1 2017
 
Intelligent personal assistant testing 1
Intelligent personal assistant testing  1Intelligent personal assistant testing  1
Intelligent personal assistant testing 1
 
Google decode q3 2015 toc
Google decode q3 2015 tocGoogle decode q3 2015 toc
Google decode q3 2015 toc
 
Google decode q3 toc
Google decode q3 tocGoogle decode q3 toc
Google decode q3 toc
 
Google Decode q2 2014 toc
Google Decode q2 2014 tocGoogle Decode q2 2014 toc
Google Decode q2 2014 toc
 
Is Google Evil 3.0
Is Google Evil 3.0Is Google Evil 3.0
Is Google Evil 3.0
 
Technology Intelligence for R&D
Technology Intelligence for R&DTechnology Intelligence for R&D
Technology Intelligence for R&D
 
London Online 2008
London Online 2008London Online 2008
London Online 2008
 
SLA Summer 2008
SLA Summer 2008SLA Summer 2008
SLA Summer 2008
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

White Paper on Intel Packet Processing Solution

  • 1. Solutions White Paper Delivering Secure IP-Based Services Jasomi Uses Intel® Technology and AdvancedTCA for Its High-End Carrier and IMS Session Border Controller Table of Contents Originally developed to provide security and access services in Voice over IP (VoIP) networks, the role of the session border Business Challenge .......................................................... 1 controller has grown as service providers accelerate their Delivering Services.......................................................... 2 delivery of IP-based services. A leading developer of session What Is a Session Border Controller? .......................... 2 border controllers based on Intel® technology, Jasomi Networks The Jasomi Networks Solution....................................... 3 has continued to advance the state-of-the-art technology used Key Capabilities .............................................................. 3 in its PeerPoint* products by using the AdvancedTCA* form Technologies ..................................................................... 4 factor, programmable Intel® network processors, and Intel AdvancedTCA .............................................................. 4 NetStructure® boards. Programmable Intel® Network Processors................. 5 Secure Packet Processing Blades................................ 5 Business Challenge Architectures.................................................................... 5 For the past decade, network operators of all types and sizes Time to Market ............................................................ 5 have been facing the challenge of diversifying their service Modularity .................................................................... 5 offerings to increase revenue and attract new customers while Scalability ..................................................................... 5 reducing churn among their current ones. Recently these Redundancy.................................................................. 6 service providers have been embracing the Internet Protocol Summary........................................................................... 6 (IP) as the means to deliver rich multimedia content on a wired Acronyms.......................................................................... 6 or wireless network. IP easily enables voice, video, and data “triple play” capabilities for IP endpoints on a broadband Internet connection.
  • 2. Residential Services Business Services On-demand video/movies Sales force automation applications Music Enterprise applications Video streaming of live content Rich content distribution Messaging Permission-based marketing Unified messaging Scheduling and reservation tools Multimedia messaging Presence management Video messaging Unified messaging Picture messaging Distributed call center Multimedia gaming Flexible device options Multimedia gambling Instant messaging Audio and video conferencing Desktop application sharing Video content delivery Table 1. Residential and Business Services DELIVERING SERVICES Residential and business customers are interested in very • Legal compliance different kinds of services as can easily be seen in the examples — Call intercept given in Table 1. Only a few, such as unified messaging, — Call logging intersect both groups. The session border controller is the key network component that service providers have embraced to resolve these security, Delivering all these services, and adding new ones quickly, service assurance, peering, and legal compliance issues. presents critical security, service assurance, peering, and legal compliance issues similar to those encountered when WHAT IS A SESSION BORDER CONTROLLER? deploying basic VoIP services. These include: Session border controllers were created to intercept and process calls on a VoIP network, allowing a single element to monitor • Security not only the signaling traffic but also the media traffic. This — End-to-end encryption does not mean that the session border controller always proxies — Topology hiding media; as one approach to total QoS, the session border — Prevention of distributed denial of service attacks controller has the ability to intelligently route media — for — Prevention of SIP-based spam and viruses example, directly between endpoints. • Service assurance Session border controllers can be used along with firewalls to — Firewall and Network Address Translation (NAT) monitor media delivery on a private, protected network. On a traversal public network session border controllers enable the use of — Quality of Service (QoS) enforcement appropriate protocols from private networks with Internet — Class of service policies connections using NAT. Session border controllers can also — Interoperability perform transcoding of the media stream when different coders • Carrier-to-carrier peering are in use and can provide security features such as denial of — Transcoding service protection, call filtering, bandwidth management, etc. — Auditing 2
  • 3. Voice Origination Voice Termination Enhanced Local Services Voice Assisted Services Audio and Video Conferencing IP TV Video Server IP IP SBC VoIP Wholesalers SIP/MGCP Phones Multimedia Application SMB Secure Peering Service Provider (M-ASP) Call Routing Radius Policy SBC Accounting Server MOS Evaluation Lawful Intercept ATA SIP/MGCP IP Hosted NAT Traversal Media Server SIP Register Security SBC and Proxy Lawful Intercept Residential/SOHO Application MGCP Call Quality Optimization Server IP Multimedia Agent Server Media Path Optimization Subsystem (IMS) SBC IPv4-IPv6 Carrier IP Network Internetworking Network Protection Protocol Repair SBC Mobile Operator B SBC IPBX LCS Access Proxy IPSec Hosted NAT Media Firewalling Traversal Privacy Collaboration Inter-Domain Topology Hiding P-CSCF Call Routing Server (T.120) IP IP Protocol IP IP Multimedia Normalization SIP/MGCP Phones Subsystem (IMS) LCS Home S-CSCF Server Enterprises Microsoft Collaboration Service Provider Mobile Operator A Source: Jasomi Figure 1. Session Border Controller Deployment Figure 1 illustrates how session border controllers can be Both the PeerPoint C and PeerPoint A series are based on Intel® deployed in a network. The session border controllers are technology and driven by PeerPointOS with media and control represented as six-blade chassis and marked with the core engines integrated into a hardened Linux* kernel. On the acronym “SBC.” PeerPoint C chassis, PeerPointOS has been optimized to run on Intel® Xeon™ processors. Jasomi has ported its media core and The Jasomi Networks Solution control core engines on the PeerPoint A500 series, which is capable of supporting 80,000 concurrent calls, using blades Jasomi Networks is a leading worldwide provider of session with dual Intel Xeon processors and two Intel® IXP2850 border controller technology with many years of experience in network processors. IP packet processing in the VoIP market segment. The company’s open standards-based, modular communications KEY CAPABILITIES platform is used by service providers and enterprises worldwide A few of the key capabilities of Jasomi session border and has been running in production environments since 2002. controllers are discussed below. Jasomi is a pioneer in the move to the Advanced Telecom Far End NAT Traversal Service Computing Architecture (AdvancedTCA or ATCA*) platform, The most common problem that service providers encounter and both the signaling and media engines of its PeerPoint C and when deploying hosted services is the inability for subscribers’ PeerPoint A series session border controllers have been ported voice equipment to work seamlessly behind NAT equipment to AdvancedTCA and now offer extremely high call density and and firewalls. PeerPoint ensures that subscribers can connect resiliency. anywhere, any time without having to reconfigure their NAT/firewall equipment. 3
  • 4. Security Continuous Service Assurance The session border controller protects the service provider’s PeerPointOS offers resiliency during planned maintenance, back-end servers from potential security breaches. As it sits at system outages, or network outages, or when a back-end server the network edge between backend servers and Internet-based becomes unavailable. The redundancy, scalability, and high- users, the session border controller intelligently lets valid availability features enabled by AdvancedTCA make it the multimedia traffic through, and rejects and reports malicious especially effective for carrier-grade solutions in this area. traffic. The session border controller hides the internal network Technologies topology information, which would be otherwise exposed by signaling protocols such as the Session Initiation Protocol (SIP) Jasomi pursued a demanding selection process before deciding or Media Gateway Control Protocol (MGCP). As rollouts of 3G to employ all of the technologies discussed below. networks continue to accelerate and frameworks such as the IP Multimedia Subsystem (IMS) gain momentum, PeerPoint can AdvancedTCA act as a security gateway enabling secure Transport Layer Modular infrastructures have been prevalent in packet-based Security (TLS) or IPsec connections, which is a requirement of data networks where standardization and flexibility have proven the 3GPP* IMS specification their value. However, communications networks have a different set of criteria, and the challenge in the last few years PSTN and IMS Peering Services has been to create an infrastructure that can provide the high PeerPoint session border controllers help service providers availability, “five-nines” reliability, and excellent performance drive costs down and reach new market segments by enabling expected of telecom equipment. access to cheaper PSTN gateways through peering agreements Because of the success of modular infrastructure in data with VoIP wholesalers. Using an Intel based AdvancedTCA networks, more than 100 communications industry leaders have platform, PeerPoint can generate and report real-time Mean been working with the standards organization PICMG to create Opinion Scores (MOS) scores to ensure that a service level AdvancedTCA, a modular platform architecture designed agreement (SLA) is satisfied. specifically to address the requirements of the communications PeerPoint also supports transcoding between low bandwidth industry. A modular platform architecture provides the coders such as G.723 and G.729 and a more popular coder such following benefits for equipment manufacturers such as Jasomi: as G.711. • Lower development costs and fast time-to-market — Peering allows access to multimedia applications such as hosted Equipment manufacturers can focus on platform videoconferencing servers, video services, or access to an differentiation, cutting development time while delivering IMS-based network. PeerPoint can provide the functional solutions with increased value. “glue” between the SIP and 3GPP network for IPv4/IPv6 • Solid platform strategy — Building with industry standard conversion, protocol conversion, and encryption. components enables flexibility and proven scalability. Audit, Management, and Problem Isolation Services • Higher density and integration — Using Intel processors Since the session border controller is part of the media and allows Jasomi to be at the leading edge of calls per U of signaling path, it is ideally located to collect forensic data on rack space. Having a standard AdvancedTCA backplane and QoS metrics, remote devices, and voice quality to help isolate architecture allows more system components to be managed telephony issues or impose an SLA on peering partners. together in a cohesive and comprehensive manner. • Network evolution managed with confidence — Moving to a converged, all-IP network requires the flexibility that industry standard, modular network elements deliver. 4
  • 5. performance that an Intel architecture-based AdvancedTCA PROGRAMMABLE INTEL® NETWORK PROCESSORS solution offered. Jasomi session border controllers require high-performance, encryption support, extensive software programmability, and TIME TO MARKET broad availability of third-party hardware from a robust In order to speed time-to-market, Jasomi Networks joined ecosystem such as the Intel® Communications Alliance. Based forces with IP Fabrics, an Intel® Communications Alliance on its rigorous requirements, the Intel IXP2850 network member, to quickly migrate the data plane portion of its processor became Jasomi’s first choice. application to an open standards-based NPU platform. By using The ability to support high-speed transport using programmable the skills and expertise of IP Fabrics, Jasomi was able to focus network processors (NPUs) is fundamental to building flexible on its application and save the time and resources that would and adaptable network elements, such as session border otherwise have been needed to bring its engineers up to speed controllers. A custom ASIC can take many months to develop. on the internals of the IXP2850. IP Fabrics enabled a rapid Intel network processors can be programmed (or reprogrammed) application development approach with its Packet Processing in a small fraction of that time, providing equipment Language (PPL) for the IXP2850, which handles the heavy manufacturers such as Jasomi with a very efficient way to throughput and encryption requirements of the Jasomi support multiple and constantly evolving protocols. These application. processors bring the kind of flexibility and affordability to MODULARITY network infrastructure design that Intel® Architecture processors The open standards-based modular architecture of the PeerPoint have long provided for mainstream computer applications. session border controller enabled by Intel building blocks SECURE PACKET PROCESSING BLADES delivers flexibility and scalability to match the demanding The Intel NetStructure IXB28504xGbEF is a high-performance needs of today’s service provider networks. Intel’s packet secure packet processing blade with the AdvancedTCA form processing blade provides direct access to all traffic on the wire, factor, which uses the Intel IXP2850 to provide optimized allowing Jasomi’s engineers maximum speed and flexibility packet and content processing functions for IMS applications. when designing the bulk-traffic processing algorithms necessary The IXB28504xGbEF acts as a security gateway and uses the to drive the PeerPointOS. Traffic paths inside the data plane are two integrated cryptographic units in the IXP2850 to accelerate orthogonal, enabling the deployment of a multiple-port NPU IPsec cryptographic algorithms such as the Advanced blade in a variety of network configurations with negligible Encryption Standard (AES) and Triple Data Encryption performance impact. Standard (3DES). The IXB28504xGbEF is designed to provide Jasomi uses Intel’s high-performance packet processing blades, high-performance packet processing for up to 4 Gbps of featuring the IXP2850, together with blades using dual Intel Ethernet traffic and features a 4x1Gbps I/O interface to the Xeon processors. These are deployed in a two-tier architecture external WAN or LAN. The Intel design provides a highly with the packet processing blades at the front-end providing available system with redundant and partitioned paths for bulk traffic filtering and routine application offloading for the control and payload traffic. CPU backend. Architecture SCALABILITY The fact that scaling is often non-linear between signaling and A modular communications platform architecture, based on media loads presented a challenge. Jasomi addressed this open standards such as AdvancedTCA and Intel building blocks challenge by cleanly separating the two engines, allowing for was a natural choice for Jasomi Networks’ next-generation an NxM interconnect. The Intel packet and compute processing communications equipment designs. Along with support for blades in this design can be scaled independently, allowing standards such as SIP, MGCP, TLS, IPSec, and DiffServ, extra signaling horsepower to be added for those environments Jasomi required the flexibility, scalability, and carrier-grade 5
  • 6. with a large amount for SIP overhead (for example, in rich Acronyms presence systems) and extra media processing for those 3GPP Third Generation Partnership Project environments with heavy media requirements (for example, for video or file sharing). Control of the blades is accomplished ASIC Application-Specific Integrated Circuit with a lightweight protocol running either on the backplane or ATCA Advanced Telecom Computing Architecture across the network, allowing, for example, a chassis of packet (AdvancedTCA) processing blades to run next to a chassis of signaling CRBT Color Ring Back Tones processors, delivering scalable performance and redundancy. DiffServ Differential Services REDUNDANCY Stateful failover is available both within an AdvancedTCA IMS IP Multimedia Subsystem chassis and between multiple AdvancedTCA chassis, and state IP Internet Protocol synchronization can run on the backplane for internal applications. In this way, the modular approach of the IPsec IP Security AdvancedTCA architecture is fully utilized to facilitate fast and MGCP Media Gateway Control Protocol efficient session border controller functionality. MOS Mean Opinion Score Summary NAT Network Address Translation The session border controller market segment is highly NPU Network Processing Unit competitive and dynamic. Using Intel building blocks allowed PPL Packet Processing Language Jasomi to come first to market with a session border controller based on the AdvancedTCA specification and offering the PSTN Public Switched Telephone Network highest level of call density and resiliency in the industry. QoS Quality of Service SIP Session Initiation Protocol SLA Service Level Agreement TLS Transport Layer Security VM Virtual Machine VoIP Voice over IP 6
  • 7. About Jasomi Networks Learn More about this Innovative Solution Jasomi Networks enables VoIP for carriers, enterprises, and service providers worldwide. By providing the technology that For general information, proof points, and case studies about allows VoIP services to be rolled out economically and securely the products described in this white paper, visit in complex multi-bordered networks, Jasomi is an integral part http://www.jasomi.com and http://www.intel.com/go/telecom. of making VoIP work. Jasomi’s product line complements Learn more about the Intel Communications Alliance at today’s existing security and networking infrastructure, http://www.intel.com/go/ica. providing VoIP connectivity across network security boundaries without requiring network re-architecting. For more informa- tion, visit http://www.jasomi.com. 7
  • 8. For more information Please contact your local Intel representative or visit us at: www.intel.com/go/atca INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. This document and related materials and information are provided “as is” with no warranties, express or implied, including but not limited to any implied warranty of merchantability, fitness for a particular purpose, non-infringement of intellectual property rights, or any warranty otherwise arising out of any proposal, specification, or sample. Intel assumes no responsibility for any errors contained in this document and has no liabilities or obligations for any damages arising from or in connection with the use of this document. This whitepaper is for informational purposes only, and may contain typographical errors and technical inaccuracies. The content is provided as is, without express or implied warranties of any kind. Intel, Intel NetStructure, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All Jasomi Networks brand and product names are trademarks or registered trademarks of Jasomi Networks in the United States and other countries. Information about Jasomi Networks and its products and any claims relating to them have been provided by Jasomi Networks and are its sole responsibility. *Other names and brands may be claimed as the property of others. Printed in the USA Copyright © 2005 Intel Corporation All rights reserved. Printed on recycled paper. 06/05 00-9668-001