[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

what are session border controllers

Posted on 2014-12-08
3
Medium Priority
?
166 Views
Last Modified: 2014-12-15
Hi,
I was reading about sip and rtp. But couldnt understand what a session border controller is. How they help in solving rtp firewall issue.
Also i read that they protect network from dos (denial of service attack) . whats a dos and how does sbc help prevent them

Thanks
0
Comment
Question by:Rohit Bajaj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 59

Accepted Solution

by:
Cliff Galiher earned 2000 total points
ID: 40486846
Different vendors define SBCs differently, and not all have the same features.

But in general, one thing all SBCs have in common is that they sit at a network's edge (hence "border"), can read inside SIP packets and understand the SIP protocol...not just the port but actual SIP messages (hence "session"), and can modify IP addresses within the message, open ports dynamically as necessary for audio or video (such as those needed for RTP streams), close ports after a session ends, and filter unwanted SIP messages from ever reaching the SIP endpoint (hence "controller.")  

Some offer denial-of-service protection, QoS, and other advanced features, but not all SBCs do so. Some are written specifically for SIP while others can operate as a more generic firewall and/or router, but have SIP specific functionality. As I said, each vendor is different in this regard.

-Cliff
0
 

Author Comment

by:Rohit Bajaj
ID: 40487564
Hi
What exactly is a dos and qos?
0
 
LVL 59

Expert Comment

by:Cliff Galiher
ID: 40487880
DoS is the acronym for "denial of service."  That is *exactly* what it sounds like.  ANYTHING that denies service is a DoS attack. If I have a very fast internet connection and you have a very small one, I can literally just throw enough data at you that...unless you call your ISP and get them to block me at their end...I saturate your connection. That is one type of DoS.  Another type is if I see you are running apache and I know of a bug that can make your server crash. I am not flooding your network connection at all. I am just exploiting a bug with almost no data at all. But your server crashes and your service is now denied.

A DoS attack can take many many forms. There is no single quick answer here. But if an attacker can prevent you from getting service, or if they can block you from providing service, then it is...by definition...a DoS attack. And nobody is 100% immune. Just look at the recent Sony PlayStation and Xbox Live outages that the Lizard hacker group has claimed responsibility for. Those were (presumably) DoS attacks.

QoS stands for Quality of Service. And that usually comes in if you have a smaller pipe and want to make sure phone call traffic takes higher precedence than web browsing. Or if you  want to make sure any call to or from the boss's phone number takes precedence over other numbers. QoS is implemented a variety of ways, but it all boils down to a set of rules to decide whether a packet gets passed along or dropped in the event of conjestion...hence ensuring "quality" of the higher priority services.

-Cliff
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question