Institutionen för datavetenskap

Size: px
Start display at page:

Download "Institutionen för datavetenskap"

Transcription

1 Institutionen för datavetenskap Department of Computer and Information Science Final thesis Threat Analysis of Video on Demand Services in Next Generation Networks by Rickard von Essen LIU-IDA/LITH-EX-A 09/052 SE 9 december 2010 Linköpings universitet SE Linköping, Sweden Linköpings universitet Linköping

2

3 Linköping University Department of Computer and Information Science Final thesis Threat Analysis of Video on Demand Services in Next Generation Networks by Rickard von Essen LIU-IDA/LITH-EX-A 09/052 9 december 2010 Supervisor: Examiner: Anders Weiland Attentec AB Nahid Shahmehri Dept. of Computer and Information Science at Linköping University

4

5 LINKÖPING UNIVERSITY ELECTRONIC PRESS På svenska Detta dokument hålls tillgängligt på Internet - eller dess framtida ersättare - under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida In English The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances. The online availability of the document implies a permanent permission for anyone to read, to download, to print out single copies for your own use and to use it unchanged for any non-commercial research and educational purpose. Subsequent transfers of copyright cannot revoke this permission. All other uses of the document are conditional on the consent of the copyright owner. The publisher has taken technical and administrative measures to assure authenticity, security and accessibility. According to intellectual property law the author has the right to be mentioned when his/her work is accessed as described above and to be protected against infringement. For additional information about the Linköping University Electronic Press and its procedures for publication and for assurance of document integrity, please refer to its WWW home page: c Rickard von Essen

6

7 Abstract IP Multimedia Subsystem (IMS) is the next generation of telecommunication systems. The system is based on an IP network and uses technologies from the Internet. The IMS system is designed to evolve from a telephone system into a general information and communication system. It is meant to include television, Video on Demand (VoD), interactive services etc, etc. It is designed to simplify the implementation of new services in telecom networks. This report investigates security aspects of VoD services when merging an IP Television (IPTV) system with IMS. The investigation covers security functions in IMS, transition solutions for authentication of the Set-Top-Box (STB) in IMS, and identifies problems in the integration of IPTV and IMS. The report concludes that IMS has good solid Authentication, Authorization, and Accounting (AAA) functions that will provide security and billing functionality. One problem is found in the media control between the STB and the streaming server. This interface lacked specification at the time of investigation, and some problems have been identified. These problems have to be solved before a system can be brought into service and be regarded as secure. Keywords: Threat analysis, Security, NGN, IMS, SIP, UE, IPTV, STB, VoD, AAA, RTSP, Threat tree, Authentication, IPsec

8

9 Acknowledgements This thesis would not have been what it is without the contributions of a number of people who deserve to be acknowledged. There are a few people that have directly affected the content of this thesis report, most of all my supervisors Anders Weiland and Åsa Detterfelt who gave me the opportunity to do this thesis work and guided me into the world of consulting. Both of them deserve many thanks. And of course my first examiner Claudiu Duma, previously at LiU and my final examiner Nahid Shahmehri, ADIT, LiU both for their valuable knowledge and their guidance through out the completion of my work. Without their help and effort this report would never have been possible. I also want to thank Henrik Carlsson at Motorola for introducing the topic of the thesis and for his valuable insights in real-world IPTV systems. He also deserves gratitude for helping out with the sometimes complicated jungle of embedded systems. Among my colleagues Stefan Östergaard deserve a special acknowledgment for his help with getting into the world of IMS, and for always providing fast and accurate answers to my questions. He also provided valuable input on how to complete a thesis in general, with his own fresh experience. And finally I am forever grateful to my grandmother for giving me my first home computer, a Sinclair XZ Spectrum 1 in the Christmas of This gift made me discover the world of computer science. 1

10

11 Innehåll Figurer Tabeller xiii xv 1 Introduction Background Purpose Scenario Use Case Constraints IMS STB Billing and Security Goal Problem Description Method Limits Target Audience Outline of the Report I Theoretical Background 7 2 IPTV IP Television Common configuration Multicasting MPEG-TS RTSP Future SIP Session Initiation Protocol User Agents Servers Location Servers SIP Methods SIP Response Codes SDP Authentication ix

12 x INNEHÅLL 3.8 Register Invite Basic Network Media Service RTP/RTCP IMS IP Multimedia Subsystem Overview CSCF Call Session Control Function HSS Home Subscriber Server AS Application Server PEP/PDF CCF/OCS ISIM Reference Points Gm Mw Cx ICS Sh Ro Security Introduction Attacks on Communication Man-in-the-middle Replay DoS Denial of Service Basic cryptography Symmetric cryptography Asymmetric cryptography Cryptographic Signatures SSL/TLS IPsec Transport and Tunnel Mode ESP Encapsulating Security Payload SIP Security IMS Security NDS/IP Network Domain Security IP AKA Authentication and Key Agreement Diameter Risk Analysis Secure Vocabulary Overview Asset Vulnerability Threat Attack Countermeasure

13 INNEHÅLL xi Risk Peltier s Ten Step Method Step 1: Develop a Scope Statement Step 2: Assemble a Quality Team Step 3: Identify Threats Step 4: Prioritize Threats Step 5: Threat Impact Step 6: Risk Factor Determination Step 7: Identify Safeguards and Controls Step 8: Cost-Benefit Analysis Step 9: Rank Safeguards in Recommended Order Step 10: Risk Assessment Report Threat Tree Threat Analysis of NGN IMS II Investigation 39 7 Adapted Risk Analysis Method Goal What is a Risk Analysis Foundation Overview Adapted Risk Analysis Method Step 1: Define the Scope of the Analysis Step 2: Assemble the Quality Team Step 3: Identify Assets Step 4: Identify Threats Step 5: Refine Threats Using Threat Trees Step 6: Assign Probabilities and Impact to Leaves Step 7: Calculate Risk Factors Step 8: Identify Safeguards and Controls Step 9: Cost-Benefit Analysis Step 10: Rank Proposed Safeguards Step 11: Risk Assessment Report Purpose Discussion Threat Analysis Method Description of System Boundaries of the Analysis Threat Analysis Step 1: Scope Statement Step 2: Assemble a Quality Team Step 3: Identify Assets Step 4: Threats Step 5-8: Refine Threats Using Threat Trees False Authorization

14 xii INNEHÅLL Unauthorized Media Access Traffic Snooping Free Service Access Incorrect Billing Step 9: Cost-Benefit Analysis Step 10: Rank Proposed Safeguards Step 11: Risk Assessment Report Different Authorization Methods Hardware ISIM Software ISIM Bluetooth Pass-through Billing Through Another UE IRG IMS Residential Gateway Secure Processor Step 10: Rank Proposed Safeguards Hardware ISIM Secure Processor Software ISIM Gaps in IMS IPTV Integration SIP RTSP Handover III Conclusions Conclusions Recommendations General IMS Security STB/UE Core Network Gaps in IMS IPTV Integration RTSP Security Discussion Validity Further Studies Security Litteraturförteckning 75

15 Figurer 1.1 Activity diagram for the default use case A schematic view of an IPTV network A basic use case for SIP A setup of a session RTP and RTCP An RTP package is encapsulated in a UDP datagram Overview of IMS entities Reference points in IMS IPsec Transport and Tunnel Modes IPsec Transport Mode[16] IPsec Tunnel Mode[16] IPsec ESP[16] Registration with Authentication and Key Agreement (AKA) UML diagram for the vocabulary of risk analysis.[5] A common notation for threat trees Threat tree showing the notation used in this thesis The model of the system used for the risk analysis Activity diagram for the default use case Sequence diagram for the default use case. The IMS core network is simplified to the nodes CSCF and OCS Threat tree for a false authorization Threat tree for unauthorized media access Threat tree for traffic snooping Threat tree for free access to services Threat tree for incorrect billing Hardware ISIM card in the STB Software emulation of an ISIM card Bluetooth pass-through from mobile phone to STB Billing trough another UE IMS Residential Gateway IRG xiii

16 xiv FIGURER 9.6 Secure Processor IMS/IPTV control channels for VoD

17 Tabeller 2.1 An RTSP SETUP example SIP Methods SIP Response Code Classes[44] An SDP offer example[44] An SDP answer example[44] Basic threats in the IPTV system Example of SIP and RTSP setup of video session xv

18 xvi TABELLER

19 Kapitel 1 Introduction This chapter gives an introduction to the thesis work with a short background and problem description. It also defines the goal, limitations and method of the thesis work. 1.1 Background Traditionally, communication networks have been built to support one type of service. During the evolution of communication services the demand for better services has increased, and this increases the cost of the network. At the same time, competition has decreased the price of these services. This has lowered the Average Return Per User (ARPU) and has increased the network to service cost ratio. To cope with the demand for better services and to lower the cost for the network, service providers have begun to investigate converging networks into a common infrastructure delivering multiple services. This will increase the revenues from the services and offer new possibilities of combined and complex services. One fast growing service is IP Television (IPTV), this is television sent over an IPconnection which provides many advantages over normal air broadcasted, cable or satellite TV. The most important advantages are the availability of an unlimited channel space, two way communication, and support for personalized content based on the preferences of the viewer. One of the most important IPTV services will be Video on Demand (VoD), i.e. the ability to buy content directly by using a remote control. This could change the role of television from a passive medium to an interactive medium. The prime candidate for a standard for a converged communication network is the IP Multimedia Subsystem (IMS)[43]. IMS is standardized by the 3rd Generation Partnership Project[1] (3GPP) which is also behind the current Third Generation (3G) mobile system; Universal Mobile Telecommunication System (UMTS). The IMS system is a part of UMTS and it reuses most of its protocols from the Internet standard organization Internet Engineering Task Force[19] (IETF). The main function of IMS is to route calls but it is also a profound base for different services. Because of this, the system receives attention from more than just telephone service actors. 1

20 PURPOSE 1.2 Purpose There is a growing interest among Triple Play 1 actors for the IMS Next Generation Network (IMS NGN) which is a variant of IMS that focuses on a wider use of IMS. It focuses on providing a service platform in fixed access networks, such as Digital Subscriber Line (xdsl) and Fiber To The Premises (FTTP), to give fixed broadband access to an IMS network. These will deliver a multitude of services including telephony, TV, and Internet. [45] IPTV is one of the major services in an IMS NGN network, without it the deployment of such a network is of much less value. To be able to use on-demand services in an IPTV/IMS network it has to be reasonably secure to allow the service provider to charge for the services. The purpose of this thesis work is to investigate the security of such a network and to provide useful input for developers of a Set-Top-Box (STB) on which technologies to use and what threats there are that have to be addressed to build a secure IPTV/IMS system. 1.3 Scenario The system I investigated consists of an IMS (home-) network, an STB and a streaming server. The complete network is under the control of the IPTV/IMS service provider Use Case The basic scenario to investigate is when a user powers up the STB that is connected to an IMS system and selects a video to watch. The user is charged for the service on his account. The activity diagram for this use case is shown in figure 1.1. The system requires that the subscriber has the correct credentials present in the STB as described in 1.6. The scenario does not specify any certain business model for billing or any restriction on the contents the user can access. 1.4 Constraints There are some constraints on the system investigated. These are given by Motorola to constrain the investigation to a setup that is interesting to them to develop IMS IMS should be used for Authentication, Authorization, and Accounting (AAA). The IMS system has a security architecture that should be used to the greatest possible extent. This leads to easier administration and has the advantage of a well known security architecture. 1 Triple Play Using a single connection to provide phone, TV and Internet

21 KAPITEL 1. INTRODUCTION ActivityDiagram DefaultUseCase OrderMovie 3 Authorization? Register OrderMovie Suceded Failed FailedSuceded ChargingforService P ermisioncontrol? Checkfunds? Notenough MovieStreamStarts Enough WatchMovie Figur 1.1: Activity diagram for the default use case STB The STB should be able to send requests for VoD services to IMS using SIP signaling through a common API. UE s have a single way of communicating with IMS, they only differ in their capabilities, such as connection speed, screen resolution, input methods, etc (see 4) Billing and Security The most important aspect of this thesis is to investigate a secure technology for billing. This should be done by evaluating the existing security methods in IMS and by considering

22 GOAL each modification required to add the STB into the IMS system. 1.5 Goal This thesis should present a well investigated solution to incorporating an STB in an IMS network with functions for handling VoD services in a secure way. A threat analysis will show what threats the system has to be protected from. The conclusion should present an evaluation of different technologies for authentication and weaknesses in the current specification.

23 KAPITEL 1. INTRODUCTION Problem Description The problem can be specified as follows: Is it possible to, in a secure way, use an STB to connect to an IMS system and order VoD services? This requires a definition of the word secure. I choose to use the following definition: Using the same security features as IMS does to achieve security. This does not explain what is secure, it just declares that if 3GPP uses the same security features in an equivalent scenario it will be regarded as secure. To answer the question it is refined into two smaller questions: Which technologies can be used for authentication? Are there any security gaps in merging IPTV and IMS? 1.7 Method To solve the problem, a structured method will be used. First I will investigate how an IMS and IPTV system works. Then a threat analysis method will be chosen and adapted to suit the specific needs of the task. With the help of the threat analysis, countermeasures can be evaluated and weak points in the system can be identified. Different technologies for authentication will be evaluated to answer these question for each of the technologies: 1. Is the technology acceptably secure? 2. What are the advantages and drawbacks of the technology? These two questions go hand-in-hand, since what is acceptable in one system or stage of deployment may not be acceptable in a later stage or in another system. This information will help guide a system designer to choose the correct solution depending on different demands on the architecture, usability, business model and legal demands. 1.8 Limits This thesis focuses on using IMS for billing of VoD services in an IPTV network. Other types of Pay-Per-View (PPV) will not be considered. Furthermore the confidentiality of the media stream will neither be taken into account. Since a VoD media stream is singelcast it can be solved with encryption without much difficulties on the client side. 1.9 Target Audience This report is intended to be read by developers with a basic knowledge of SIP/IMS, IPTV and a good understanding of modern security technologies. The thesis will present a basic overview of IPTV, IMS and security techniques. To fully understand the topic the reader should have more knowledge especially in the areas of IMS and security.

24 OUTLINE OF THE REPORT 1.10 Outline of the Report The outline of the thesis is: Part I Theoretical Background 2. IPTV: Describes IPTV systems and the technology used today. This system is one of the base parts in this thesis. 3. SIP: SIP is the signaling protocol in IMS and very important to understand how connections are established in IMS. 4. IMS IP Multimedia Subsystem: IMS is a complex system but an overview of the system is given in this chapter. It describes the parts necessary to understand the problems investigated in this thesis. 5. Security: This chapter mostly serves as a reminder for the user. It is not on its own enough to present all important aspects of information security. 6. Risk Analysis: Describes the basics of risk analysis used in this report. Part II Investigation 7. Adapted Risk Analysis Method: An adapted risk analysis method is used to analyze the risks in the system. This is used to structure and break down the complex problem. 8. Threat Analysis: This sections contains the analysis of threats to the system. These are presented in section 8.3 and are used to evaluate the different authorization methods in the next section. 9 Different Authorization Methods: Presents some authorization methods that could be used in the STB. It uses results of the threat analysis to evaluate different alternatives of authorization. 10 Gaps in IMS IPTV Integration: Describes problems with specifications and integration between an IMS system and IPTV. This section does not cover this topic, but rather pointing out the problems found by the author. Part III Conclusions

25 Del I Theoretical Background 7

26

27 Kapitel 2 IPTV IP Television IPTV is TV broadcasted over an IP network. The main advantage is that instead of building and maintaining a special network for cable TV it can be combined with a normal IP network used for Internet access. This gives opportunities for advanced TV services, such as web browsing, , Electronic Program Guides (EPG), and Video on Demand (VoD). There is no standard for IPTV networks and transmission, but the general setup is common and most protocols for the network are well known standard protocols. The network is always under control of the service provider who has to be able to guarantee Quality of Service (QoS). The transmission starts at the Video Head End (VHE), which is a streaming server receiving video feeds from satellite or cable, and encodes and compresses it into a digital video stream. The transmission could also start in a VoD server streaming video to customers. These video streams are stored in the server. 2.1 Common configuration A common configuration of an IPTV network is shown in figure 2.1. The figure shows the backbone which connects all local networks with a high bandwidth connection. At the backbone there is a live feed server that captures, encodes and streams live video over the network. This server captures the video from some external source such as satellite or a cable-tv connection. It uses multicast to transmit channels to viewers. Commonly there is also an application server that supplies customers with mostly non-video services, such as web browsing, and content information. Finally there is a VoD server storing video for distribution by unicast to customers on demand. The backbone is connected to the local networks through at least one layer of routers. Since the VoD media is unicasted, the VoD server and the network would soon be overloaded if many customers used VoD at the same time. To solve this there are caching servers closer to the customer that cache VoD contents that pass the network. The next time a customer accesses the VoD contents the VoD server can delegate to the caching server to provide it. 9

28 COMMON CONFIGURATION Figur 2.1: A schematic view of an IPTV network Multicasting Multicast is to send one-to-many, this is vital for live transmissions of TV in an IP network. This gives the VHE the ability to send a stream for one channel to every subscriber that watches that particular channel. If normal unicasting where to be used the VHE had to set up a stream to every viewer. This would make up-scaling of the network impossible and in reality make it unprofitable to build IPTV networks. Since VoD does not use multicast, no further information will be given on this topic even though it is vital for live feeds in IPTV networks MPEG-TS The most common way to transport live video media in an IPTV network is to use Motion Pictures Expert Group (MPEG)[40] version 2 or 4. The stream is actually an MPEG Transport Stream (MPEG-TS) that runs on top of UDP and encapsulates the media in small 188 byte datagrams[15] RTSP The Real-time Streaming Protocol (RTSP)[21] is used as a remote control for a video stream. It can be used to setup feeds, play, pause, forward and record. This is mostly used for VoD services where these functions make sense but it could also be used for remote recording of a live feed to a server for later viewing.

29 KAPITEL 2. IPTV IP TELEVISION 11 C S: S C: SETUP rtsp://example.com/foo/bar/baz.rm RTSP/1.0 CSeq: 302 Transport: RTP/AVP;unicast;client_port= RTSP/ OK CSeq: 302 Date: 23 Jan :35:06 GMT Session: Transport: RTP/AVP;unicast;client_port= ; server_port= Tabell 2.1: An RTSP SETUP example Since the topic for this thesis is VoD we go into some detail on RTSP. RTSP is mostly used on a reliable transport protocol, normally TCP. It uses commands and responses similar to HTTP to make it possible to use an HTTP parser to build an RTSP server. In contrast to an HTTP server an RTSP server is not stateless, it has to maintain a state for each connected client. The central commands in RTSP are: DESCRIBE is used to get parameters for a stream such as type, bitrates, encoding, and decryption keys. Describe uses SDP to describe the session, see section 3.6 for information on SDP. SETUP is used to order a stream, with a specific set of parameters. PLAY/RECORD can be issued after a successful SETUP has been executed. This orders the server to start the stream or to connect to the stream and start recording it. PAUSE stops the streaming but keeps the current state in the RTSP server. If a PLAY/RECORD command is issued after PAUSE without arguments the playing/recording is continued from the same place as it was paused. TEARDOWN is used to close a connection. This is important since it allows the RTSP server to free the resources reserved for the connection. To show some important properties of RTSP we look a bit closer at the setup and play commands. An example setup and response is shown in table 2.1. RTSP can use the HTTP basic authentication or HTTP digest authentication mechanisms [23]. It can also be used with security from the network layer, e.g. IPsec[35]. 2.2 Future IPTV is quite a new technology for distributing TV. It has been built without standardization or common technology. To successfully continue to develop and deploy these systems they have to be based on an open standard. IPTV is mostly deployed by companies also providing phone and

30 FUTURE Internet services to their customers and the demand for a converged network from the service providers is strong.

31 Kapitel 3 SIP Session Initiation Protocol Session Initiation Protocol (SIP)[27] is a protocol for setting up media streams between two parties. The protocol was originally intended for setting up audio and video calls over an IP network, but since it is so flexible it can be used to setup any type of stream. SIP is a signaling protocol used for Voice-over-IP (VoIP) and general signaling in IMS systems. As such it is one of the basic building blocks of the next generation of IP based telephone systems. There are three types of elements in SIP: User Agents (UA), Servers, and Location servers. A basic use case of SIP is shown in figure 3.1. SIP users are identified by their Figur 3.1: A basic use case for SIP. SIP URI. It is similar to an address but is proceeded by sip:// or sips:// for transport layer encrypted connections, e.g. sip://adam@nosite.com. 3.1 User Agents UA s are the end devices in the SIP network. They communicate with each other through zero or more SIP servers. A UA may be a mobile phone, software phone, or a traditional wired phone in a Public Switched Telephone Network (PSTN) calling through an SIP gateway. It could also be a voice mail server which acts on behalf of an unregistered or busy UA. 13

32 SERVERS 3.2 Servers There are three types of SIP servers: SIP proxies, Redirect servers, and Registrar servers. An SIP proxy is a signaling only server which modifies and/or controls the passing SIP signaling. It is often used to enforce policies, for anonymizer services, or similar. A Redirect server is also a signaling only server. It answers the invite method with a redirection response (3xx). This is used to direct a caller to the correct UA where the callee is currently registered. A Registrar server is used by UA s to register their current status and location into the location server. This information is used by the caller to reach the callee by calling a redirect server. 3.3 Location Servers A location server[27] is a database containing information about users registered IP addresses, features, and other preferences. The UA does not directly communicate with the location server, this is done through a proxy, redirect, or a registrar server. These servers communicate with the location server in an unspecified way and act as an SIP front-end for the location server. 3.4 SIP Methods SIP uses plain text message methods similar to HTTP[22] and Simple Mail Transfer Protocol (SMTP)[26]. The most common SIP methods are shown in table 3.1. The first six are defined in the basic RFC[27], the rest of the methods are extensions to SIP. Method RFC Description INVITE RFC3261[27] Session setup ACK RFC3261 Acknowledgment to INVITE BYE RFC3261 Session termination CANCEL RFC3261 Abort session REGISTER RFC3261 Register a user s URI OPTIONS RFC3261 Query of options and capabilities INFO RFC2976[25] Midcall signaling transport PRACK RFC3262[28] Provisional response acknowledgment REFER RFC3515[31] Redirect user to another URL SUBSCRIBE RFC3265[29] Request notification of an event NOTIFY RFC3265 Notification of an event MESSAGE RFC3428[30] Instant message body Tabell 3.1: SIP Methods

33 KAPITEL 3. SIP SESSION INITIATION PROTOCOL SIP Response Codes SIP uses a set of numeric response codes as response to each method sent. These response codes correspond to and extend the ones used in HTTP. The codes can be followed by a text string, the content of which is insignificant to the client and only used to simplify debugging. The response codes are divided into classes shown in table 3.2. Class 1xx 2xx 3xx 4xx 5xx 6xx Description Provisional or Informational: the request is progressing but not yet complete Success: the request has completed successfully Redirection: the request should be tried at another location Client Error: the request was not completed due to error in the request and can be retried when corrected Server Error: the request was not completed due to error in the recipient and can be retried at another location Global Failure: the request has failed and should not be retried again Tabell 3.2: SIP Response Code Classes[44] 3.6 SDP To negotiate the setup of streams SIP uses another protocol named Session Description Protocol (SDP)[37]. It is a special protocol for describing sessions and their parameters used by a number of different protocols. An SDP offer is shown in table 3.3. v is the version of the protocol, the current version is 0. c is the connection, with the arguments IN for Internet, IP4 for IP version 4, and finally the IP address. m is the media type, in this case there are two: one video and one audio. Each of them are followed by a port and two Real-time Transport Protocol/Audio Video Profile (RTP/AVP). a is the attributes: rtpmap maps an RTP/AVP to a codec e.g. RTP/AVP 14 is MPA with a sampling rate of 90000Hz. The callee answers with an SDP with a subset of the offered media sessions. In this particular example the GSM encoded audio is kept. But video is declined by specifying a zero (0) port number. SDP includes many more descriptors, these are just the basic ones needed for understanding and reasoning in the thesis. For any details the reader is directed to the RFC 4566[37]. SDP is also used by RTSP for session description, see section for more information.

34 AUTHENTICATION v=0 o= s= c=in IP t= m=video 4004 RTP/AVP a=rtpmap:14 MPA/90000 a=rtpmap:26 JBEG/90000 m=audio 4006 RTP/AVP 0 4 a=rtpmap:0 PCMU/8000 a=rtpmap:4 GSM/8000 Tabell 3.3: An SDP offer example[44] v=0 o= s= c=in IP t= m=video 0 RTP/AVP 14 m=audio 6002 RTP/AVP 4 a=rtpmap:4 GSM/8000 Tabell 3.4: An SDP answer example[44] 3.7 Authentication The specification for SIP[27] requires that it has some authentication mechanisms, these are inherited from HTTP. The most important one for this thesis is the HTTP digest authentication[23] that is used in IMS. See Register To be able to find the correct UA from an SIP URI the UA has to register its current location and status in the location service. By issuing a register method to a registrar server connected to the location server, the UA is registered. Later when a caller calls an SIP URI it starts by looking up the address to the server part of the URI. This lookup is done by Domain Name System Service (DNS SRV)[24]. The DNS SRV response gives a redirect server for the domain. The caller issues an invite to the redirect server. It answers with a redirect response, calling for a redirect to the UA previously registered by the user. Often the DNS SRV response directs the caller to a

35 KAPITEL 3. SIP SESSION INITIATION PROTOCOL 17 proxy server instead of a redirect server. 3.9 Invite The invite method is used to setup communication between two UA s. The caller, A, issues an invite to the callee, B. The invite includes an SDP with the available encodings and options that the caller wants to use. The callee s UA answers with trying and ringing. When the callee answers the call the UA sends an OK message including an SDP with the selected codec s and options. This is answered with an acknowledgment from the callers UA. After this the media streams negotiated by the exchange of SDP messages can begin. See figure 3.2. Figur 3.2: A setup of a session 3.10 Basic Network Media Service The request for media from an SIP media server is done by issuing an invite to the SIP URI with the user annc at the media server and with the parameter: play=[media URL][34]. E.g. sip:annc@ms2.example.net; \ play= This is useful since it limits the usernames needed for the media server and eases the load of the registrar server. If each media file were to be selected just by a username part of the URI, the media server would have to register each of them with the registrar server and renew them before they timed out. This could easily lead to overloading of the registrar,

36 RTP/RTCP Figur 3.3: RTP and RTCP Figur 3.4: An RTP package is encapsulated in a UDP datagram. e.g. an on-demand repository of music could collect millions of items that need to be re-registered, usually every hour RTP/RTCP Real-time Transport Protocol (RTP)[32] is a transport layer protocol for sending media streams over an IP-network. RTP is typically used on top of User Datagram Protocol (UDP)[20]. UDP lacks information important to a media stream, such as the datagram sequence in the stream and timestamps to keep the playback in real-time and to sync different streams. RTP implements these vital functions on top of UDP. It adds type information, sequencing, time stamping, and mixing information to the UDP datagram. Since RTP is a transport layer protocol it does not have a well defined port number, but an RTP-connection always uses an even port number to send its data. The odd port numbers are used for the Real-time Transport Control Protocol (RTCP)[32] that commonly accompanies an RTP-connection. The associated RTCP-connection uses the succeeding port number of the RTP port number which it is controlling. RTCP is mainly used to return feedback on the reception of the stream to the sending server.

37 Kapitel 4 IMS IP Multimedia Subsystem IP Multimedia Subsystem (IMS) is the service platform for the next generation phone systems, both fixed and mobile. By using this open standard on an IP based network, telecommunication will move towards using cheap and well known IP networks. IMS also adds functions to satisfy the strict QoS and Authentication, Authorization, and Accounting (AAA) (see 5.1) demands on a telecommunication network. The open standard ensures interoperability between operators and system providers. To speed up the development, IMS mostly uses well known protocols used on the Internet, specified by IETF. This will be the next big step for the telecom industry according to Ericsson [43], the world leading telecommunication system provider[13]. 4.1 Overview An IMS system is built in four layers: the Access network plane, the user plane, the control plane, and the application plane. The access network plane consists of a physical network infrastructure supplying IP connectivity. The access network can consist of RAN, WLAN, xdsl, or other types of IP able networks. Some of these access methods are not fully specified in IMS yet, but they are being investigated in Next Generations Network (NGN), and will eventually find their way into a release of IMS. The user plane transports the media between the different users. It consist of the logical connections between users. The control plane contains control signaling and enforces policies and security on lower levels of the network. It is also responsible for the QoS of the network. This is very important since it ensures that a standard best-effort IP network is usable as a telecommunication network with its strict QoS requirements. The two most important functions in the control plane are the Call Session Control Function (CSCF) and the Home Subscriber Server (HSS), see figure 4.1. There are more functions in the control plane but they are not crucial to the scenario in this thesis. At the top is the application plane where the Application Server (AS) and Online Charging System (OCS) reside. AS s implement different services for the users such as voice mail, teleconferencing etc. The IMS specifications do not define how each function works, it rather specifies reference points and how the functions communicate with each other. 19

38 CSCF CALL SESSION CONTROL FUNCTION AS OCS HSS Application Plane UE P-CSCF I-CSCF S-CSCF Control Plane Media Stream IPv6 Backbone User Plane Figur 4.1: Overview of IMS entities 4.2 CSCF Call Session Control Function The Call Session Control Function (CSCF) consists of three different functions, the Proxy CSCF (P-CSCF), the Interrogating CSCF (I-CSCF), and the Serving CSCF (S-CSCF). All UA signaling first passes the edge gateway, the P-CSCF, which directs the traffic to an I-CSCF or an S-CSCF. The P-CSCF is responsible for finding the correct I/S-CSCF and handles the security of the UE. The I-CSCF is the contact point for all SIP signaling from another operator s network destined to a UE in the I-CSCF s network. It is usually also responsible for hiding the topology of the operator s network from other operators by a function called Topology Hiding Inter-network Gateway (THIG). The S-CSCF is the function that actually handles the session. It routes the connection to its correct destination, controls the type of connection set up between UE s, takes care of registration etc.

39 KAPITEL 4. IMS IP MULTIMEDIA SUBSYSTEM HSS Home Subscriber Server The HSS maintains a database of all the subscribers, their setup, and their current registration state. This information is used by the CSCF s to route the signaling to the correct S/I-CSCF. The HSS also produces AAA vectors to be used by the network when authenticating itself and the UE. In an NGN IMS-network the HSS is called User Profile Server Function (UPSF) and has some additional capabilities; it is however functionally equivalent for the purpose of this investigation. 4.4 AS Application Server An Application Server (AS) provides the IMS system with a specialized service. Since they communicate with well defined protocols, the deployment time is short and they can be used in all IMS systems. This is one of the main advantages of IMS; by using an open platform it opens for competitive development of services that do not need to be tailored for each service provider. 4.5 PEP/PDF The Policy Enforcement Point (PEP) is an entity in the network that enforces policies. This is usually done by filtering the traffic. The Policy Decision Function (PDF) controls the network by controlling the PEP s. For example, S-CSCF can reserve QoS in a router for a call. Then the S-CSCF acts as a PDF and the router as a PEP. This is a complicated matter, but it is necessary in order to make the best-effort IP network to a strict QoS network acceptable for telecommunication services. 4.6 CCF/OCS There are two functions for charging (billing) in IMS: the Charging Collection Function (CCF) for offline charging and the Online Charging System (OCS) for online charging. Offline charging is classical charging where service usage is collected on a bill at the end of the month. Online charging is used when the user prepays for services by buying credits. When an OCS is used, the charging entity, e.g. an S-CSCF, reserves a certain amount of credits and deducts them as the service session continues. If the user runs out of credits the OCS notifies the charging entity which will terminate its service. OCS can also be used for traditional billing at the end of the month. 4.7 ISIM All UE in an IMS network will have a Universal Integrated Circuit Card (UICC) with an IMS Subscribers Identity Module (ISIM) function. The ISIM is an advanced version of the old Subscribers Identity Module (SIM) and the UMTS Subscribers Identity Module (USIM). It contains information regarding public and private user identity, home network

40 REFERENCE POINTS information, and administrative data. It also contains security keys used to calculate responses to authentication challenges and session keys. There will be more about this in section 5.7 IMS security. 4.8 Reference Points By tradition, all connections between different functional entities in telecommunications are assigned a name, usually consisting of two letters. The reference point is specified by its protocol and the messages that are sent through it. The reference points important for this thesis in a basic IMS system are shown in figure 4.2. Figur 4.2: Reference points in IMS Gm Gm is the reference point between the UE and the P-CSCF. It is used to send SIP messages to initiate services. This is probably the most important reference point since it is the one between the user owned UE and the service provider s core network. It cannot be physically protected since it should be possible to use in a mobile environment and to roam through other service providers networks. It also requires a high compatibility between P-CSCF s and different UE s in contrast to equipment within the core network which can be fine tuned to inter-operate.

41 KAPITEL 4. IMS IP MULTIMEDIA SUBSYSTEM 23 The Gm interface has three main categories of messages: registration, session control and transactions. Registration handles the authentication of the user and setup of the security on the reference point. The session control messages are used to initiate, setup, and terminate sessions. The transaction messages are standalone messages that carry for example Instant Messages (IM) that do not create a dialog Mw Mw is the reference point between the CSCF s which transmits SIP messages. The Mw reference point has the same classes of messages as the Gm interface Cx Cx is the reference point between I/S-CSCF and the HSS which uses the Diameter protocol ICS The IMS Service Control (ICS) is used between the I/S-CSCF and an AS. When an I/S- CSCF gets a session initiation request it analyzes it and if required routes it to an AS for further processing. Also, initial invites can originate from an AS in response to some external event. This could be an automated wake up call where the AS calls a subscriber on a requested time Sh An AS may need user information or parameters stored in the HSS. this is what the Sh reference point is used for. It uses the Diameter protocol to handle data and for subscription/notification. The HSS has a list of the AS s permissions to read and alter data Ro Online charging is done over the Ro reference point towards the OCS. It communicates over Ro using Diameter with AS s and S-CSCF s. The OCS can reserve, control and charge the user depending on the request from the peer.

42 REFERENCE POINTS

43 Kapitel 5 Security This chapter has a brief introduction to some security concepts and a description of some security technologies used by IPTV or IMS. 5.1 Introduction Security for services and communication is often divided into three properties Confidentiality, Integrity, and Availability (CIA). Confidentiality is the property that only authorized users can access the information. This is often enforced by Access Control (AC) and/or encryption, which only allows the holders of the key to read the information. Integrity is the property that only authorized users can modify and create the information. This is also enforced by AC and cryptographic signatures or sometimes with encryption. Availability is the property that ensures the availability of the service or the information. This requires good design of the services and networks, so that they are not easily exhausted of resources. To ensure the CIA-properties there have to be three systems or functions in a service or communication: Authentication, Authorization, and Accounting (AAA). Authentication it the function which identifies the user. It must exist an authentication system since it is the base of all security. This does not have to be a classic username and password system, it could be implicit, e.g. the holder of the secret key is authenticated by the ability to encrypt a message that the receiver can decrypt producing a meaningful message. Authorization is the system which determines if a user is granted or denied a resource. The authorization system enforces the access policies based on the identified user and the resource requested. Accounting is the system which logs activities. This information can be used in multiple ways, e.g. for billing, for monitoring attempts to breach security, and for monitoring legitimate users use of services and resources. 25

HTTP Based Adap ve Bitrate Streaming Protocols in Live Surveillance Systems

HTTP Based Adap ve Bitrate Streaming Protocols in Live Surveillance Systems HTTP Based Adapve Bitrate Streaming Protocols in Live Surveillance Systems Daniel Dzabic Jacob Mårtensson Supervisor : Adrian Horga Examiner : Ahmed Rezine External supervisor : Emil Wilock Linköpings

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final Thesis Network usage profiling for applications on the Android smart phone by Jakob Egnell LIU-IDA/LITH-EX-G 12/004

More information

Department of Electrical Engineering. Division of Information Coding. Master Thesis. Free Viewpoint TV. Mudassar Hussain.

Department of Electrical Engineering. Division of Information Coding. Master Thesis. Free Viewpoint TV. Mudassar Hussain. Department of Electrical Engineering Division of Information Coding Master Thesis Free Viewpoint TV Master thesis performed in Division of Information Coding by Mudassar Hussain LiTH-ISY-EX--10/4437--SE

More information

Design and evaluation of a system that coordinate clients to use the same server

Design and evaluation of a system that coordinate clients to use the same server Linköpings universitet/linköping University IDA Department of Computer and Information Science Bachelor Thesis Information Technology Spring term 2017 LIU-IDA/LITH-EX-G--17/067--SE Design and evaluation

More information

Institutionen för datavetenskap

Institutionen för datavetenskap Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer Final thesis and Information Science Minimizing memory requirements

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis Case Study of Development of a Web Community with ASP.NET MVC 5 by Haci Dogan LIU-IDA/LITH-EX-A--14/060--SE 2014-11-28

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis Introducing Mock framework for Unit Test in a modeling environment by Joakim Braaf LIU-IDA/LITH-EX-G--14/004--SE

More information

Design, Implementation, and Performance Evaluation of HLA in Unity

Design, Implementation, and Performance Evaluation of HLA in Unity Linköping University IDA Bachelor Thesis Computer Science Spring 2017 LIU-IDA/LITH-EX-G-17/007--SE Design, Implementation, and Performance Evaluation of HLA in Unity Author: Karl Söderbäck 2017-06-09 Supervisor:

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis Migration process evaluation and design by Henrik Bylin LIU-IDA/LITH-EX-A--13/025--SE 2013-06-10 Linköpings universitet

More information

Evaluation of BizTalk360 From a business value perspective

Evaluation of BizTalk360 From a business value perspective Linköpings universitet Institutionen för IDA Kandidatuppsats, 16 hp Högskoleingenjör - Datateknik Vårterminen 2018 LIU-IDA/LITH-EX-G--18/069--SE Evaluation of BizTalk360 From a business value perspective

More information

HTTP/2, Server Push and Branched Video

HTTP/2, Server Push and Branched Video Linköping University Department of Computer Science Bachelor thesis, 16 ECTS Datateknik 2017 LIU-IDA/LITH-EX-G--17/073--SE HTTP/2, Server Push and Branched Video Evaluation of using HTTP/2 Server Push

More information

Functional and Security testing of a Mobile Application

Functional and Security testing of a Mobile Application Linköping University Department of Computer Science Bachelor thesis, 16 ECTS Information Technology 2017 LIU-IDA/LITH-EX-G--17/066--SE Functional and Security testing of a Mobile Application Funktionell

More information

Slow rate denial of service attacks on dedicated- versus cloud based server solutions

Slow rate denial of service attacks on dedicated- versus cloud based server solutions Linköping University Department of Computer and Information Science Bachelor thesis, 16 ECTS Information technology 2018 LIU-IDA/LITH-EX-G--18/031--SE Slow rate denial of service attacks on dedicated-

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis A systematic literature Review of Usability Inspection Methods by Ali Ahmed LIU-IDA/LITH-EX-A--13/060--SE 2013-11-01

More information

Multi-Video Streaming with DASH

Multi-Video Streaming with DASH Linköping University Department of Computer Science Bachelor thesis, 16 ECTS Datateknik 217 LIU-IDA/LITH-EX-G--17/71--SE Multi-Video Streaming with DASH Multi-video streaming med DASH Sebastian Andersson

More information

Design and Proof-of-Concept Implementation of Interactive Video Streaming with DASH.js

Design and Proof-of-Concept Implementation of Interactive Video Streaming with DASH.js Linköping University Department of Computer and Information Science Bachelor thesis, 16 ECTS Datateknik 2017 LIU-IDA/LITH-EX-G--17/081--SE Design and Proof-of-Concept Implementation of Interactive Video

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis Towards efficient legacy test evaluations at Ericsson AB, Linköping by Karl Gustav Sterneberg LIU-IDA/LITH-EX-A--08/056--SE

More information

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 Outline 3.1

More information

Object Migration in a Distributed, Heterogeneous SQL Database Network

Object Migration in a Distributed, Heterogeneous SQL Database Network Linköping University Department of Computer and Information Science Master s thesis, 30 ECTS Computer Engineering (Datateknik) 2018 LIU-IDA/LITH-EX-A--18/008--SE Object Migration in a Distributed, Heterogeneous

More information

Session Initiation Protocol (SIP) Overview

Session Initiation Protocol (SIP) Overview Session Initiation Protocol (SIP) Overview T-110.7100 Applications and Services in Internet 5.10.2010 Jouni Mäenpää NomadicLab, Ericsson Research Contents SIP introduction, history and functionality Key

More information

Department of Computer Science. Burapha University 6 SIP (I)

Department of Computer Science. Burapha University 6 SIP (I) Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important

More information

Creating a Framework for Consumer-Driven Contract Testing of Java APIs

Creating a Framework for Consumer-Driven Contract Testing of Java APIs Linköping University IDA Bachelor s Degree, 16 ECTS Computer Science Spring term 2018 LIU-IDA/LITH-EX-G--18/022--SE Creating a Framework for Consumer-Driven Contract Testing of Java APIs Fredrik Selleby

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis A database solution for scientific data from driving simulator studies By Yasser Rasheed LIU-IDA/LITH-EX-A--11/017

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

Comparing Costs of Browser Automation Test Tools with Manual Testing

Comparing Costs of Browser Automation Test Tools with Manual Testing Linköpings universitet The Institution of Computer Science (IDA) Master Theses 30 ECTS Informationsteknologi Autumn 2016 LIU-IDA/LITH-EX-A--16/057--SE Comparing Costs of Browser Automation Test Tools with

More information

Personlig visualisering av bloggstatistik

Personlig visualisering av bloggstatistik LiU-ITN-TEK-G-13/005-SE Personlig visualisering av bloggstatistik Tina Durmén Blunt 2013-03-22 Department of Science and Technology Linköping University SE-601 74 Norrköping, Sweden Institutionen för teknik

More information

Creating User Interfaces Using Web-based Technologies to Support Rapid Prototyping in a Desktop Astrovisualization Software

Creating User Interfaces Using Web-based Technologies to Support Rapid Prototyping in a Desktop Astrovisualization Software LiU-ITN-TEK-A--17/062--SE Creating User Interfaces Using Web-based Technologies to Support Rapid Prototyping in a Desktop Astrovisualization Software Klas Eskilson 2017-11-28 Department of Science and

More information

Internet Streaming Media. Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006

Internet Streaming Media. Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 Multimedia Streaming UDP preferred for streaming System Overview Protocol stack Protocols RTP + RTCP SDP RTSP SIP

More information

Evaluation of a synchronous leader-based group membership

Evaluation of a synchronous leader-based group membership Linköping University Department of Computer Science Bachelor thesis, 16 ECTS Information Technology Spring 2017 LIU-IDA/LITH-EX-G--17/084--SE Evaluation of a synchronous leader-based group membership protocol

More information

Storage and Transformation for Data Analysis Using NoSQL

Storage and Transformation for Data Analysis Using NoSQL Linköping University Department of Computer Science Master thesis, 30 ECTS Information Technology 2017 LIU-IDA/LITH-EX-A--17/049--SE Storage and Transformation for Data Analysis Using NoSQL Lagring och

More information

IMS signalling for multiparty services based on network level multicast

IMS signalling for multiparty services based on network level multicast IMS signalling for multiparty services based on network level multicast Ivan Vidal, Ignacio Soto, Francisco Valera, Jaime Garcia, Arturo Azcorra UniversityCarlosIIIofMadrid Av.Universidad,30 E-28911, Madrid,

More information

Session Initiation Protocol (SIP) Overview

Session Initiation Protocol (SIP) Overview Session Initiation Protocol (SIP) Overview T-110.7100 Applications and Services in Internet 6.10.2009 Jouni Mäenpää NomadicLab, Ericsson Contents SIP introduction, history and functionality Key concepts

More information

Optimizing a software build system through multi-core processing

Optimizing a software build system through multi-core processing Linköping University Department of Computer Science Master thesis, 30 ECTS Datateknik 2019 LIU-IDA/LITH-EX-A--19/004--SE Optimizing a software build system through multi-core processing Robin Dahlberg

More information

Multimedia Communication

Multimedia Communication Multimedia Communication Session Description Protocol SDP Session Announcement Protocol SAP Realtime Streaming Protocol RTSP Session Initiation Protocol - SIP Dr. Andreas Kassler Slide 1 SDP Slide 2 SDP

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Bachelor thesis A TDMA Module for Waterborne Communication with Focus on Clock Synchronization by Anders Persson LIU-IDA-SAS

More information

Semi-automatic code-to-code transformer for Java

Semi-automatic code-to-code transformer for Java Linköping University Department of Computer Science Master thesis, 30 ECTS Datateknik 2016 LIU-IDA/LITH-EX-A--16/031--SE Semi-automatic code-to-code transformer for Java Transformation of library calls

More information

Multi-Service Access and Next Generation Voice Service

Multi-Service Access and Next Generation Voice Service Hands-On Multi-Service Access and Next Generation Voice Service Course Description The next generation of telecommunications networks is being deployed using VoIP technology and soft switching replacing

More information

Compliance with RFC 3261

Compliance with RFC 3261 APPENDIX A Compliance with RFC 3261 This appendix describes how the Cisco Unified IP Phone 7960G and 7940G complies with the IETF definition of SIP as described in RFC 3261. It contains compliance information

More information

Design of video players for branched videos

Design of video players for branched videos Linköping University Department of Computer and Information Science Bachelor thesis, 16 ECTS Computer Science 2018 LIU-IDA/LITH-EX-G--18/053--SE Design of video players for branched videos Design av videospelare

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

An Approach to Achieve DBMS Vendor Independence for Ides AB s Platform

An Approach to Achieve DBMS Vendor Independence for Ides AB s Platform Linköping University Department of Computer Science Bachelor thesis, 16 ECTS Datateknik 2017 LIU-IDA/LITH-EX-G--17/008--SE An Approach to Achieve DBMS Vendor Independence for Ides AB s Platform Niklas

More information

Design Optimization of Soft Real-Time Applications on FlexRay Platforms

Design Optimization of Soft Real-Time Applications on FlexRay Platforms Institutionen för Datavetenskap Department of Computer and Information Science Master s thesis Design Optimization of Soft Real-Time Applications on FlexRay Platforms by Mahnaz Malekzadeh LIU-IDA/LITH-EX-A

More information

Information visualization of consulting services statistics

Information visualization of consulting services statistics LiU-ITN-TEK-A--16/051--SE Information visualization of consulting services statistics Johan Sylvan 2016-11-09 Department of Science and Technology Linköping University SE-601 74 Norrköping, Sweden Institutionen

More information

Analysis of GPU accelerated OpenCL applications on the Intel HD 4600 GPU

Analysis of GPU accelerated OpenCL applications on the Intel HD 4600 GPU Linköping University Department of Computer Science Master thesis, 30 ECTS Computer Science Spring term 2017 LIU-IDA/LITH-EX-A--17/019--SE Analysis of GPU accelerated OpenCL applications on the Intel HD

More information

Automatic LOD selection

Automatic LOD selection LiU-ITN-TEK-A--17/054--SE Automatic LOD selection Isabelle Forsman 2017-10-20 Department of Science and Technology Linköping University SE-601 74 Norrköping, Sweden Institutionen för teknik och naturvetenskap

More information

Information About SIP Compliance with RFC 3261

Information About SIP Compliance with RFC 3261 APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

Extending the Stream Reasoning in DyKnow with Spatial Reasoning in RCC-8

Extending the Stream Reasoning in DyKnow with Spatial Reasoning in RCC-8 Institutionen för Datavetenskap Department of Computer and Information Science Master s thesis Extending the Stream Reasoning in DyKnow with Spatial Reasoning in RCC-8 by Daniel Lazarovski LIU-IDA/LITH-EX-A

More information

Tablet-based interaction methods for VR.

Tablet-based interaction methods for VR. Examensarbete LITH-ITN-MT-EX--06/026--SE Tablet-based interaction methods for VR. Lisa Lönroth 2006-06-16 Department of Science and Technology Linköpings Universitet SE-601 74 Norrköping, Sweden Institutionen

More information

Popular protocols for serving media

Popular protocols for serving media Popular protocols for serving media Network transmission control RTP Realtime Transmission Protocol RTCP Realtime Transmission Control Protocol Session control Real-Time Streaming Protocol (RTSP) Session

More information

Calibration of traffic models in SIDRA

Calibration of traffic models in SIDRA LIU-ITN-TEK-A-13/006-SE Calibration of traffic models in SIDRA Anna-Karin Ekman 2013-03-20 Department of Science and Technology Linköping University SE-601 74 Norrköping, Sweden Institutionen för teknik

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Master s Thesis An Approach on Learning Multivariate Regression Chain Graphs from Data by Babak Moghadasin LIU-IDA/LITH-EX-A--13/026

More information

Debug Interface for Clone of DSP. Examensarbete utfört i Elektroniksystem av. Andreas Nilsson

Debug Interface for Clone of DSP. Examensarbete utfört i Elektroniksystem av. Andreas Nilsson Debug Interface for Clone of 56000 DSP Examensarbete utfört i Elektroniksystem av Andreas Nilsson LITH-ISY-EX-ET--07/0319--SE Linköping 2007 Debug Interface for Clone of 56000 DSP Examensarbete utfört

More information

IPTV Explained. Part 1 in a BSF Series.

IPTV Explained. Part 1 in a BSF Series. IPTV Explained Part 1 in a BSF Series www.aucklandsatellitetv.co.nz I N T R O D U C T I O N As a result of broadband service providers moving from offering connectivity to services, the discussion surrounding

More information

Automatic Test Suite for Physics Simulation System

Automatic Test Suite for Physics Simulation System Examensarbete LITH-ITN-MT-EX--06/042--SE Automatic Test Suite for Physics Simulation System Anders-Petter Mannerfelt Alexander Schrab 2006-09-08 Department of Science and Technology Linköpings Universitet

More information

ITU-T Kaleidoscope Conference Innovations in NGN. Cross-fertilization of IMS and IPTV services over NGN

ITU-T Kaleidoscope Conference Innovations in NGN. Cross-fertilization of IMS and IPTV services over NGN ITU-T Kaleidoscope Conference Innovations in NGN Cross-fertilization of IMS and IPTV services over NGN Christian Riede Fraunhofer FOKUS christian.riede@fokus.fraunhofer.de Geneva, 12-13 May 2008 Agenda

More information

Delivering Quadruple Play with IPTV over IMS

Delivering Quadruple Play with IPTV over IMS Delivering Quadruple Play with IPTV over IMS Bruno Chatras, Mikhaël Saïd France Telecom Research & Development 38-40 rue du Général Leclerc F-92794 Issy Moulineaux Cedex 9 Email: {bruno.chatras,mikhael.said}@orange-ftgroup.com

More information

Internet Streaming Media. Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007

Internet Streaming Media. Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007 Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007 Multimedia Streaming UDP preferred for streaming System Overview Protocol stack Protocols RTP + RTCP SDP RTSP SIP

More information

Context-based algorithm for face detection

Context-based algorithm for face detection Examensarbete LITH-ITN-MT-EX--05/052--SE Context-based algorithm for face detection Helene Wall 2005-09-07 Department of Science and Technology Linköpings Universitet SE-601 74 Norrköping, Sweden Institutionen

More information

Implementation and Evaluation of Bluetooth Low Energy as a communication technology for wireless sensor networks

Implementation and Evaluation of Bluetooth Low Energy as a communication technology for wireless sensor networks Linköpings universitet/linköping University IDA HCS Bachelor 16hp Innovative programming Vårterminen/Spring term 2017 ISRN: LIU-IDA/LITH-EX-G--17/015--SE Implementation and Evaluation of Bluetooth Low

More information

8.4 IMS Network Architecture A Closer Look

8.4 IMS Network Architecture A Closer Look 8.4 IMS Network Architecture A Closer Look 243 The anchoring of the media in TrGW also has an implicit topology-hiding effect. Without anchoring, the SDP answer provided to the other network would contain

More information

Institutionen för datavetenskap. Study of the Time Triggered Ethernet Dataflow

Institutionen för datavetenskap. Study of the Time Triggered Ethernet Dataflow Institutionen för datavetenskap Department of Computer and Information Science Final thesis Study of the Time Triggered Ethernet Dataflow by Niclas Rosenvik LIU-IDA/LITH-EX-G 15/011 SE 2015-07-08 Linköpings

More information

A latency comparison of IoT protocols in MES

A latency comparison of IoT protocols in MES Linköping University Department of Computer and Information Science Master thesis Software and Systems Division Spring 2017 LIU-IDA/LITH-EX-A--17/010--SE A latency comparison of IoT protocols in MES Erik

More information

Ad-hoc Routing in Low Bandwidth Environments

Ad-hoc Routing in Low Bandwidth Environments Master of Science in Computer Science Department of Computer and Information Science, Linköping University, 2016 Ad-hoc Routing in Low Bandwidth Environments Emil Berg Master of Science in Computer Science

More information

AMERICAN NATIONAL STANDARD

AMERICAN NATIONAL STANDARD ENGINEERING COMMITTEE Data Standards Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 173-3 2017 Specification for Authentication in Preferential Telecommunications over IPCablecom2 Networks NOTICE The

More information

Permissioned Blockchains and Distributed Databases: A Performance Study

Permissioned Blockchains and Distributed Databases: A Performance Study Linköping University Department of Computer and Information Science Master thesis, 30 ECTS Datateknik 2018 LIU-IDA/LITH-EX-A--2018/043--SE Permissioned Blockchains and Distributed Databases: A Performance

More information

Adapting network interactions of a rescue service mobile application for improved battery life

Adapting network interactions of a rescue service mobile application for improved battery life Linköping University Department of Computer and Information Science Bachelor thesis, 16 ECTS Information Technology Spring term 2017 LIU-IDA/LITH-EX-G--2017/068--SE Adapting network interactions of a rescue

More information

IP TV påverkan och anpassning av IP-nätet hos en datakomoperatör.

IP TV påverkan och anpassning av IP-nätet hos en datakomoperatör. Examensarbete LITH-ITN-KTS-EX--06/004--SE IP TV påverkan och anpassning av IP-nätet hos en datakomoperatör. Jessica Eriksson 2006-02-03 Department of Science and Technology Linköpings Universitet SE-601

More information

Development of water leakage detectors

Development of water leakage detectors LiU-ITN-TEK-A--08/068--SE Development of water leakage detectors Anders Pettersson 2008-06-04 Department of Science and Technology Linköping University SE-601 74 Norrköping, Sweden Institutionen för teknik

More information

A Back-End for the SkePU Skeleton Programming Library targeting the Low- Power Multicore Vision Processor

A Back-End for the SkePU Skeleton Programming Library targeting the Low- Power Multicore Vision Processor Linköping University Department of Computer Science Master thesis, 30 ECTS Datateknik 2016 LIU-IDA/LITH-EX-A--16/055--SE A Back-End for the SkePU Skeleton Programming Library targeting the Low- Power Multicore

More information

Real Time Protocols. Overview. Introduction. Tarik Cicic University of Oslo December IETF-suite of real-time protocols data transport:

Real Time Protocols. Overview. Introduction. Tarik Cicic University of Oslo December IETF-suite of real-time protocols data transport: Real Time Protocols Tarik Cicic University of Oslo December 2001 Overview IETF-suite of real-time protocols data transport: Real-time Transport Protocol (RTP) connection establishment and control: Real

More information

Progressive Web Applications and Code Complexity

Progressive Web Applications and Code Complexity Linköping University Department of Computer and Information Science Master thesis, 30 ECTS Datateknik 2018 LIU-IDA/LITH-EX-A--18/037--SE Progressive Web Applications and Code Complexity An analysis of

More information

Network Intrusion and Detection

Network Intrusion and Detection Linköping University Department of Computer and Information Science Bachelor thesis, 16 ECTS Datateknik 202017 LIU-IDA/LITH-EX-G--2017/085--SE Network Intrusion and Detection An evaluation of SNORT Nätverksintrång

More information

Multimedia Applications. Classification of Applications. Transport and Network Layer

Multimedia Applications. Classification of Applications. Transport and Network Layer Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management

More information

Optimal Coherent Reconstruction of Unstructured Mesh Sequences with Evolving Topology

Optimal Coherent Reconstruction of Unstructured Mesh Sequences with Evolving Topology LiU-ITN-TEK-A-14/040-SE Optimal Coherent Reconstruction of Unstructured Mesh Sequences with Evolving Topology Christopher Birger 2014-09-22 Department of Science and Technology Linköping University SE-601

More information

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

Development of a Game Portal for Web-based Motion Games

Development of a Game Portal for Web-based Motion Games Linköping University Department of Computer Science Master thesis, 30 ECTS Datateknik 2017 LIU-IDA/LITH-EX-A--17/013--SE Development of a Game Portal for Web-based Motion Games Ozgur F. Kofali Supervisor

More information

IMS Client Framework for All IP-Based Communication Networks

IMS Client Framework for All IP-Based Communication Networks IMS Client Framework for All IP-Based Communication Networks D. Jayaram, S. Vijay Anand, Vamshi Raghav, Prashanth Kumar, K. Riyaz & K. Kishan Larsen & Toubro InfoTech Limited Research and Development Group,

More information

OMSI Test Suite verifier development

OMSI Test Suite verifier development Examensarbete LITH-ITN-ED-EX--07/010--SE OMSI Test Suite verifier development Razvan Bujila Johan Kuru 2007-05-04 Department of Science and Technology Linköpings Universitet SE-601 74 Norrköping, Sweden

More information

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP

CSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP CSCD 433/533 Advanced Networks Fall 2012 Lecture 14 RTSP and Transport Protocols/ RTP 1 Topics Multimedia Player RTSP Review RTP Real Time Protocol Requirements for RTP RTP Details Applications that use

More information

The Session Initiation Protocol

The Session Initiation Protocol The Session Initiation Protocol N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 25 Roadmap for Multimedia Networking 2 1. Introduction why QoS? what are the problems?

More information

Visual Data Analysis using Tracked Statistical Measures within Parallel Coordinate Representations

Visual Data Analysis using Tracked Statistical Measures within Parallel Coordinate Representations Examensarbete LITH-ITN-MT-EX--05/030--SE Visual Data Analysis using Tracked Statistical Measures within Parallel Coordinate Representations Daniel Ericson 2005-04-08 Department of Science and Technology

More information

3GPP TR V7.0.0 ( )

3GPP TR V7.0.0 ( ) TR 24.930 V7.0.0 (2006-12) Technical Report 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Signalling flows for the session setup in the IP Multimedia core

More information

Voice over IP Consortium

Voice over IP Consortium Voice over IP Consortium Version 1.6 Last Updated: August 20, 2010 121 Technology Drive, Suite 2 University of New Hampshire Durham, NH 03824 Research Computing Center Phone: +1-603-862-0186 Fax: +1-603-862-4181

More information

Name of Course : E1-E2 CFA. Chapter 7A. Topic : SIP. Date of Creation :

Name of Course : E1-E2 CFA. Chapter 7A. Topic : SIP. Date of Creation : E1-E2(CFA)/SIP Rev Date 28.03.2011 Name of Course : E1-E2 CFA Chapter 7A Topic : SIP Date of Creation : 28.03.2011 For internal circulation of BSNL only Page 1 E1-E2(CFA)/SIP Rev Date 28.03.2011 Session

More information

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint

More information

Internet Streaming Media

Internet Streaming Media Multimedia Streaming Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 preferred for streaming System Overview Protocol stack Protocols + SDP SIP Encoder Side Issues

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

Network optimisation and topology control of Free Space Optics

Network optimisation and topology control of Free Space Optics LiU-ITN-TEK-A-15/064--SE Network optimisation and topology control of Free Space Optics Emil Hammarström 2015-11-25 Department of Science and Technology Linköping University SE-601 74 Norrköping, Sweden

More information

Application Scenario 1: Direct Call UA UA

Application Scenario 1: Direct Call UA UA Application Scenario 1: Direct Call UA UA Internet Alice Bob Call signaling Media streams 2009 Jörg Ott 1 tzi.org INVITE sip:bob@foo.bar.com Direct Call bar.com Note: Three-way handshake is performed only

More information

INTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0

INTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0 8x8 Interface Specification Version 2.0 Table of Contents Introduction....3 Feature Set....3 SIP Interface....3 Supported Standards....3 Supported SIP methods....4 Additional Supported SIP Headers...4

More information

EDA095 Audio and Video Streaming

EDA095 Audio and Video Streaming EDA095 Audio and Video Streaming Pierre Nugues Lund University http://cs.lth.se/pierre_nugues/ May 15, 2013 Pierre Nugues EDA095 Audio and Video Streaming May 15, 2013 1 / 33 What is Streaming Streaming

More information

All-IP Core Network Multimedia Domain

All-IP Core Network Multimedia Domain GPP X.S00-00-0 Version.0 Version Date: July 00 0 All-IP Core Network Multimedia Domain IP Multimedia (IMS) session handling; IP Multimedia (IM) Call Model; Stage 0 COPYRIGHT NOTICE GPP and its Organizational

More information

Institutionen för datavetenskap Department of Computer and Information Science

Institutionen för datavetenskap Department of Computer and Information Science Institutionen för datavetenskap Department of Computer and Information Science Final thesis Implementation of a Report Template Editing Tool in Java and JSP by Jacob Matiasson LIU-IDA/LITH-EX-G--14/059--SE

More information

Pilsung AB Taegyun A Fathur AB Afif A Hari A Gary A Dhika AB April AB Mulya AB Yusuf AB Anin A Rizka B Dion AB Siska AB Mirel AB Hani AB Airita AB List of countries by number of Internet users 100,00%

More information

Z24: Signalling Protocols

Z24: Signalling Protocols Z24: Signalling Protocols Mark Handley H.323 ITU protocol suite for audio/video conferencing over networks that do not provide guaranteed quality of service. H.225.0 layer Source: microsoft.com 1 H.323

More information