?
Solved

what are session border controllers

Posted on 2014-12-08
3
Medium Priority
?
161 Views
Last Modified: 2014-12-15
Hi,
I was reading about sip and rtp. But couldnt understand what a session border controller is. How they help in solving rtp firewall issue.
Also i read that they protect network from dos (denial of service attack) . whats a dos and how does sbc help prevent them

Thanks
0
Comment
Question by:Rohit Bajaj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 59

Accepted Solution

by:
Cliff Galiher earned 2000 total points
ID: 40486846
Different vendors define SBCs differently, and not all have the same features.

But in general, one thing all SBCs have in common is that they sit at a network's edge (hence "border"), can read inside SIP packets and understand the SIP protocol...not just the port but actual SIP messages (hence "session"), and can modify IP addresses within the message, open ports dynamically as necessary for audio or video (such as those needed for RTP streams), close ports after a session ends, and filter unwanted SIP messages from ever reaching the SIP endpoint (hence "controller.")  

Some offer denial-of-service protection, QoS, and other advanced features, but not all SBCs do so. Some are written specifically for SIP while others can operate as a more generic firewall and/or router, but have SIP specific functionality. As I said, each vendor is different in this regard.

-Cliff
0
 

Author Comment

by:Rohit Bajaj
ID: 40487564
Hi
What exactly is a dos and qos?
0
 
LVL 59

Expert Comment

by:Cliff Galiher
ID: 40487880
DoS is the acronym for "denial of service."  That is *exactly* what it sounds like.  ANYTHING that denies service is a DoS attack. If I have a very fast internet connection and you have a very small one, I can literally just throw enough data at you that...unless you call your ISP and get them to block me at their end...I saturate your connection. That is one type of DoS.  Another type is if I see you are running apache and I know of a bug that can make your server crash. I am not flooding your network connection at all. I am just exploiting a bug with almost no data at all. But your server crashes and your service is now denied.

A DoS attack can take many many forms. There is no single quick answer here. But if an attacker can prevent you from getting service, or if they can block you from providing service, then it is...by definition...a DoS attack. And nobody is 100% immune. Just look at the recent Sony PlayStation and Xbox Live outages that the Lizard hacker group has claimed responsibility for. Those were (presumably) DoS attacks.

QoS stands for Quality of Service. And that usually comes in if you have a smaller pipe and want to make sure phone call traffic takes higher precedence than web browsing. Or if you  want to make sure any call to or from the boss's phone number takes precedence over other numbers. QoS is implemented a variety of ways, but it all boils down to a set of rules to decide whether a packet gets passed along or dropped in the event of conjestion...hence ensuring "quality" of the higher priority services.

-Cliff
0

Featured Post

Turn your laptop into a mobile console!

The CV211 Laptop USB Console Adapter provides a direct Laptop-to-Computer connection for fast and easy remote desktop access with no software to install.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question