what are session border controllers

Posted on 2014-12-08
Medium Priority
Last Modified: 2014-12-15
I was reading about sip and rtp. But couldnt understand what a session border controller is. How they help in solving rtp firewall issue.
Also i read that they protect network from dos (denial of service attack) . whats a dos and how does sbc help prevent them

Question by:Rohit Bajaj
  • 2
LVL 61

Accepted Solution

Cliff Galiher earned 2000 total points
ID: 40486846
Different vendors define SBCs differently, and not all have the same features.

But in general, one thing all SBCs have in common is that they sit at a network's edge (hence "border"), can read inside SIP packets and understand the SIP protocol...not just the port but actual SIP messages (hence "session"), and can modify IP addresses within the message, open ports dynamically as necessary for audio or video (such as those needed for RTP streams), close ports after a session ends, and filter unwanted SIP messages from ever reaching the SIP endpoint (hence "controller.")  

Some offer denial-of-service protection, QoS, and other advanced features, but not all SBCs do so. Some are written specifically for SIP while others can operate as a more generic firewall and/or router, but have SIP specific functionality. As I said, each vendor is different in this regard.


Author Comment

by:Rohit Bajaj
ID: 40487564
What exactly is a dos and qos?
LVL 61

Expert Comment

by:Cliff Galiher
ID: 40487880
DoS is the acronym for "denial of service."  That is *exactly* what it sounds like.  ANYTHING that denies service is a DoS attack. If I have a very fast internet connection and you have a very small one, I can literally just throw enough data at you that...unless you call your ISP and get them to block me at their end...I saturate your connection. That is one type of DoS.  Another type is if I see you are running apache and I know of a bug that can make your server crash. I am not flooding your network connection at all. I am just exploiting a bug with almost no data at all. But your server crashes and your service is now denied.

A DoS attack can take many many forms. There is no single quick answer here. But if an attacker can prevent you from getting service, or if they can block you from providing service, then it is...by definition...a DoS attack. And nobody is 100% immune. Just look at the recent Sony PlayStation and Xbox Live outages that the Lizard hacker group has claimed responsibility for. Those were (presumably) DoS attacks.

QoS stands for Quality of Service. And that usually comes in if you have a smaller pipe and want to make sure phone call traffic takes higher precedence than web browsing. Or if you  want to make sure any call to or from the boss's phone number takes precedence over other numbers. QoS is implemented a variety of ways, but it all boils down to a set of rules to decide whether a packet gets passed along or dropped in the event of conjestion...hence ensuring "quality" of the higher priority services.


Featured Post

The new generation of project management tools

With monday.com’s project management tool, you can see what everyone on your team is working in a single glance. Its intuitive dashboards are customizable, so you can create systems that work for you.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
LinkedIn blogging is great for networking, building up an audience, and expanding your influence as well. However, if you want to achieve these results, you need to work really hard to make your post worth liking and sharing. Here are 4 tips that ca…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

597 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question