TOC |
|
By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 8, 2009.
This document presents use cases that illustrate what constitutes session establishment data, the functional components that need them, and the protocol requirements for provisioning and managing session establishment data within the identified functional components.
1.
Introduction
2.
Terminology
3.
Use Cases
3.1.
Provisioning a Registry
3.2.
Provisioning an ENUM Server
3.3.
LRF and LUF
3.3.1.
LRF
3.3.2.
LUF
3.4.
SSP
3.4.1.
Generic SSP
3.4.2.
Small SSP
3.4.3.
Large SSP
3.5.
Miscellaneous Use Cases
3.5.1.
Separation of Responsibility
3.5.2.
Intra-Network vs Inter-Network
3.5.3.
Massive Sunrise Provisioning
3.5.4.
Real-Time Provisioning
3.5.5.
Establishing Destination Groups
3.5.6.
Direct and Selective Peering
3.5.7.
Indirect Peering to Selected Destinations
3.5.8.
Global TN Destinations
3.5.9.
TN Range Destinations
3.5.10.
RN Destinations
3.5.11.
Non-TN Destinations
3.5.12.
Peering Relationship Management
3.5.13.
Peering Grant/Acceptance
3.5.14.
Points of Egress
3.5.15.
Tier 2
3.5.16.
Non-blocking transactions
4.
Security Considerations
5.
IANA Considerations
6.
Acknowledgments
7.
References
7.1.
Normative References
7.2.
Informative References
§
Authors' Addresses
§
Intellectual Property and Copyright Statements
TOC |
This document captures the use cases that have been proposed so far within the DRINKS requirements design team. The goal is to seek working group feedback to identify a set of in-scope use cases. The end result of the use cases is to identify the data model and requirements for provisioning and managing session establishment data.
TOC |
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).
This document also reuses the SIP terminology defined in [RFC3261] (Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, “SIP: Session Initiation Protocol,” June 2002.). The Lookup Function (LUF), Location Routing Functions (LRF) and other session peering terms are defined [I‑D.ietf‑speermint‑terminology] (Malas, D. and D. Meyer, “SPEERMINT Terminology,” November 2008.). In addition, this document specifies the following additional terms.
- Destination Group:
- a set of global telephone numbers, telephone number ranges, dial codes, or other public identifiers that are grouped together to facilitate session setup and routing.
- Public Identity:
- a generic term that refers to a telephone number(TN), a range of TNs, an email address, or other identity as deemed appropriate, such as a globally routable URI of a user address (e.g., mailto:john.doe@example.net, sip:paul.speermint@example.com).
- Routing Group:
- a logical grouping of routes. A Destination Group may be associated with one or more routing groups based on its association with the data recipient group.
- Data Recipient Group:
- a list of SIP Service Providers (SSPs) that have access to the associated Destination Group data.
TOC |
This Section contains the use cases presented so far. The use cases are logically grouped into functional areas: provisioning a registry, provisioning an ENUM server, LRF & LUF, and SIP Service Provider (SSP). Use cases that are are not presently grouped are specified in Section 3.5 (Miscellaneous Use Cases).
TOC |
This Section targets use cases concerned with the provisioning of session establishment data in the registry. Provisioning can be accomplished in (near) real time through an automated interface (e.g., from a service provisioning system) or by specifying an effective date and time. When an effective date/time is used, the registry validates the format and enters it into the registry database with the effective date & time.
The following use cases are considered:
TOC |
This Section targets use cases concerned with the provisioning of session establishment data in the ENUM Server. The following use cases have been proposed:
TOC |
This Section contains use cases related to LRF and LUF. They are presented in the following sub-sections.
TOC |
TOC |
A service provider's LUF is connected to several different Registries some for national numbers, some for enterprise identifiers (e.g. @example.com translating to @example.nt for an enterprise user who has a mobile with a public user identity or GRUU (3GPP TS 23.228) which is part of an enterprise domain. {What if there is a collision and conflict between some particular number or domain between registries?}
TOC |
This Section contains SIP Service Provider specific use cases. They are presented in the following sub-sections.
TOC |
An SSP provisions a registry to offer different routes to different interconnecting parties. The SSP uses the same routes for an aggregation of public identities (e.g., TNs) and desires to be able to specify routing for the aggregate. Routes consist of a set of RRs of any legitimate type.
TOC |
The small SSP provides coverage to a small city only with 3 different peer interconnects: 1) To another small SSP covering an adjacent small city; 2) to a mid-sized SSP providing coverage to the remainder of the state; 3 to a large multi-national SSP providing SSP transit services for the remainder of the world.
TOC |
The small SSP with a small number of SSP peer arrangements prefers to statically define and provision the SED routing through network engineering tools by the network engineering staff. This is because the domain coverage of each peer SSP will not change very frequently and the small SSP does not want to incur the cost and complexity of a dynamically established routing data.
TOC |
A small SSP only needs a single network element to handle its entire LUF/LRF needs and as such combines the LUF and LRF. The routing associations in this network element are provisioned statically through network management tools by network operation or engineering staff.
TOC |
The large SSP provides coverage to a large country: the SSP is administratively divided into regions. The SSP provides SSP transit services to smaller SSPs operating in the same areas. The SSP has both direct SSP connections for national and international service and indirect SSP connections for international service to some countries based on traffic levels. This results in multiple possible routes to some destination SSPs through different intermediate SSPs. Each SSP region has a different sub-set of peer SSPs that it is directly connected to (e.g. Some regions may have to route internally to another SSP region to reach the destination SSP).
TOC |
The large SSP has a large number of direct and indirect peer arrangements along with multiple possible routes to the same destination SSP. The large SSP prefers to only provision the SSP peers and have the elements such as SBCs learn the routes based on peer SSP advertisements to eliminate routing errors (loops, dead ends, etc.) which are service affecting and almost impossible to troubleshoot in a network of this size.
TOC |
A large SSP needs to centralize its LUF but split off the LRF for deployment in decentralized regional network elements. The routing associations in the regional LRFs are provisioned dynamically through advertisements by the large SSP peering SSPs regarding which domains they are able to handle.
TOC |
A large SSP peers with a small SSP. The small SSP is unable to support the cost and complexity of dynamically advertising to its peer SSPs the domains it is able to reach directly or indirectly. The large SSP provisions routing association data statically representing the domains which the small SSP can reach either directly or indirectly, through network management tools by network operation or engineering staff.
TOC |
This Section contains all the use cases that were not categorized as belonging to the specific groups indicated above. Based on further discussions these may be re-classified.
TOC |
An SSP's business practices are such that; (i) network engineering and planning personnel are responsible for provisioning the points of interconnect (e.g. hosts and IP addressing information), and (ii) back office systems are responsible for number management provisioning of TNs. An example flow would be: a network engineer establishes physical interconnect with a peering SSP's network and provisions associated domain name, host, and IP addressing information, which is provisioned to the registry/ENUMserver. Separately, for each new service subscription, the SSP's back office system provisions the associated TNs or other public identities.
TOC |
SSP wishes to provision their intra-network Session Establishment Data (SED) such that it enables current and future network services to identify and route real-time sessions. For example, in the case of VoIP calls it allows one CMS (calling) to discover another (called). The SSP provisions IP addressing information of each CMS, which is provisioned to the registry/ENUMserver but only distributed to their own local ENUM server. This SED may differ from the SED that is distributed to other local ENUM servers.
TOC |
Based on configurable thresholds, sunrise may imply a batch asynchronous provisioning process. For instance, an SSP has commissioned a new ENUM server and wishes to download a very large number of telephone numbers. Rather than stream individual TNs in real-time, one at a time, towards the ENUM server the SSP's back-office system prefers to perform the operation as a set of one or more batches. The SSP has just commissioned a new ENUM server which they plan to employ as a centralized routing server. The network engineering group has provisioned, upon their ENUM server, the IP addressing information of all CMS which constitute the SSP's topology. During a regularly scheduled maintenance window the SSP would like to download from its back office system the TNs associated with each CMS.
TOC |
Post-sunrise, an SSP wishes to have their back-office systems add or remove TNs per normal business operations. Over the course of a day there is churn in the SSP's subscriber base and as such they would like the ability to stream, in real-time, additions, modifications and deletions.
TOC |
An SSP wishes to control the flow of traffic into their network (ingress) based on groupings of Public Identities, called Destination Groups. Associating each group of Public Identities with a specific set of ingress SBEs or points-of-interconnect. The SSP, for example, sub-divides the country into four regions: North-East, South-East, Mid-West, and West-Coast. For each region they establish points-of-interconnect with peers and provision the associated SED hostnames or IP addresses of the SBEs used for ingress traffic. Against each region they provision the served Public Identities in to the Destination Groups and associate those destination groups with the appropriate points of ingres. The destination groups and points of ingress are provisioned to the Registyr/Enumserver. Need to separate this use case into two.
TOC |
In this case the SSP is the actual carrier-of-record; the entity serving the end user. And the SSP wishes to communicate different SED data to some of its peers that wish to route to its destinations. So the SSP has implemented direct points-of-interconnect with each peer and therefore would like address-resolution to result in different answers depending on which peer is asking.
TOC |
The SSP transit provider wishes to provide transit peering points for a set of destinations. But that set of destinations does not align with the destination groups that already exist. The SSP wishes to establish its own destination groups for the destinations that it provides transit to.
TOC |
The SSP wishes to add or remove one or multiple fully qualified TN destinations in a single provisioning request.
TOC |
The SSP wishes to add or remove one or multiple TN Range destinations in a single provisioning request. TN Ranges support number ranges that need not be 'blocks'. In other words the TN range start can be any number and the TN range end can be any number that is greater than the TN range start.
TOC |
The SSP does not wish to provision individual TNs, but instead, for ease of management, wishes to provision Routing Numbers ((e.g., as in some number portability implementations). Each RN effectively represents a set of individual TNs, and that set of TNs is assumed to change 'automatically' as TNs are ported in and ported out. Note that this approach requires a query to resolve a TN to an RN prior to using the provisioned data to route.
TOC |
An SSP chooses to peer their messaging service with another SSPs picture/video mail service. Allowing a user to send and receive pictures and/or video messages to a mobile user's handset, for example. The important aspect of this use case is that it goes beyond simply mapping TNs to IP addresses/hostnames that describe points-of-interconnect between peering network SSP's. Rather, for each user the SSP provisions the subscriber's email address (i.e. jane.doe@example.com). This mapping allows the mobile multimedia messaging service center (MMSC) to use the subscriber email address as the lookup key and route messages accordingly.
TOC |
An SSP wishes to have the peering relationship management process factilitated through automation. An SSP can offer itself as a Peer to another SSP and that peer can accept or reject that peering relationship.
TOC |
An SSP wishes to facilitate the establishment of peering relationships and interconenct points with its peers. It submits a grant to a potential peering partner for a point of interconnect. The Grantee can accept or ignore the grant. The act of granting and accepting is facilitated by an automation process.
TOC |
An SSP has a peering relation ship with a peer. And when sending messages to that peer's point of interconnection, the originating SSP wishes to egress through one or more points of egress. These points of egress may vary for an given peer.
TOC |
An SSP maintains a Tier 2 name server that contains the NAPTR records that constitute the terminal step in the LUF. The SSP needs to provision an registry to direct queries for the SSPs numbers to the Tier 2. Usually queries to the registry should return NS records, but, in cases where the Tier 2 uses a different domain suffix from that used in the registry, CNAME records may be employed instead.
TOC |
An SSP is loading a large update in the registry (for example, a large amount of add and delete operations due to a Destination Group being split into 2). In the meantime, the SSP wants to change a route linked with another Destination Group because it has been misconfigured .
TOC |
Session establishment data allows for the routing of SIP sesions within, and between, SIP Service Providers. Access to this data can compromise the routing of sessions and expose a SIP Service Provider to attacks such as service hijacking and denial of service. The data can be compromised by vulnerable functional components and interfaces identified within the use cases.
TOC |
This document does not register any values in IANA registries.
TOC |
This document is a result of various discussions held by the DRINKS requirements design team, which is comprised of the following individuals, in alphabetical order: Deborah A Guyton (Telcordia), Gregory Schumacher (Sprint), Jean-Francois Mule (CableLabs), Kenneth Cartwright (Verisign), Manjul Maharishi (Verisign), Penn Pfautz (AT&T Corp), the co-chairs (Richard Shockey, Nuestar; and Alexander Mayrhofer, enum.at GmbH), and the editors of this document.
TOC |
TOC |
[RFC2119] | Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML). |
TOC |
[I-D.espp-protocol] | Cartwright, K., Dimig, S., Teodoro, M., and J-F. Mule, “ENUM-SIP Server Provisioning Protocol (ESPP),” draft-mule-peppermint-espp-protocol-02.txt (work in progress), July 2008 (HTML). |
[I-D.ietf-speermint-terminology] | Malas, D. and D. Meyer, “SPEERMINT Terminology,” draft-ietf-speermint-terminology-17 (work in progress), November 2008 (TXT). |
[RFC3261] | Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, “SIP: Session Initiation Protocol,” RFC 3261, June 2002 (TXT). |
[RFC3263] | Rosenberg, J. and H. Schulzrinne, “Session Initiation Protocol (SIP): Locating SIP Servers,” RFC 3263, June 2002 (TXT). |
[RFC3761] | Faltstrom, P. and M. Mealling, “The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM),” RFC 3761, April 2004 (TXT). |
TOC |
Sumanth Channabasappa | |
CableLabs | |
858 Coal Creek Circle | |
Louisville, CO 80027 | |
USA | |
Email: | sumanth@cablelabs.com |
Martin Dolly | |
AT&T Labs | |
USA | |
Email: | mdolly AT att.com |
TOC |
Copyright © The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an “AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.