DG SBC For Dummies (Adwords)
DG SBC For Dummies (Adwords)
7th Ribbon
Floyd Earl Smith Special Edition
Session Border
Controllers
7th Ribbon Special Edition
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Session Border Controllers For Dummies®, 7th Ribbon Special Edition
Published by
John Wiley & Sons, Inc.
111 River Street
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2024 by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the
Rest of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress
are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the
United States and other countries, and may not be used without written permission. Ribbon
Communications and the Ribbon Communications logo are registered trademarks of Ribbon
Communications. All other trademarks are the property of their respective owners. John Wiley &
Sons, Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For
Dummies book for your business or organization, please contact our Business Development
Department in the U.S. at 877-409-4177, contact info@dummies.biz, or visit www.wiley.com/go/
custompub. For information about licensing the For Dummies brand for products or services,
contact BrandedRights&Licenses@Wiley.com.
ISBN: 978-1-394-19693-7 (pbk); ISBN: 978-1-394-19694-4 (ebk). Some blank pages in the
print version may not be included in the ePDF version.
Publisher’s Acknowledgments
We’re proud of this book and of the people who worked on it. Some of the
people who helped bring this book to market include the following:
Project Manager and Editor: Client Account Manager:
Carrie Burchfield-Leighton Jeremith Coward
Acquisitions Editor: Traci Martin Key Ribbon Contributors:
Sr. Managing Editor: Rev Mengle Daniel Teichman, Greg Zweig
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 1
Icons Used in This Book........................................................................ 2
Beyond the Book................................................................................... 2
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 6: Determining the Value and ROI of an SBC............. 33
Reducing Costs with Intelligent Policies........................................... 33
Increasing Efficiency............................................................................ 34
Minimizing Costly Downtime............................................................. 36
Consolidating Multiple Functions...................................................... 36
Getting Real about Cost Savings........................................................ 37
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
I
n the early days of online communications, many people used
phone lines to connect to online services, the Internet, and the
web. Today, ironically, a great deal of telephone service is pro-
vided over Internet Protocol (IP) networks. And even plain old
telephone service (POTS) that uses traditional phone lines may be
managed remotely via the Internet.
Introduction 1
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» How a virtual or cloud-native SBC can benefit enterprises
and service providers (Chapter 3)
» SBC use cases and real-world deployment scenarios
(Chapter 4)
» How a contact center is dependent on an SBC (Chapter 5)
» How to determine the value and ROI of an SBC (Chapter 6)
» Why your organization needs a Ribbon SBC (Chapter 7)
This icon points out information that you should commit to your
non-volatile memory, including important dates.
The Tip icon points out information that aids in your understand-
ing of a topic or that may save you time, money, or a headache.
This information tells you to steer clear of things that may cost
you big bucks, are time sinks, or are just poor practice in using
an SBC.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding the role of the SBC in
real-time communications
Chapter 1
Protecting Real-Time
Communications
with SBCs
R
eal-time communications in modern businesses include
phone calls, video conferencing, chat, text messaging,
desktop sharing, and team collaboration. In this chapter,
you learn how a session border controller (SBC) enables and
secures enterprise and service provider real-time communication
infrastructure and services.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
SBCs are deployed at the network perimeter (that is, at the
network’s border) so that they can control and secure real-time
communications for both enterprises and service providers. An
SBC performs the following functions:
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Savings from SIP trunking, trunking consolidation, and the
move to VoIP and unified communications (UC) can reduce
traditional enterprise telecom bills by up to 75 percent, with
higher quality of service. Additionally, the SBC can provide
secured access to SIP trunking services, so an enterprise can
maintain security while saving money.
» Interconnecting and interworking networks and
protocols: An SBC provides a smooth experience in terms of
interconnecting and interworking between different
networks and the protocols running over them. Specifically,
the SBC performs tasks such as
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Alternatives to SBCs include virtual private network (VPN) tun-
nels and firewalls, but each of these alternatives has some
disadvantages:
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
VoIP (as well as other session-oriented applications) is an appli-
cation that, by its very nature, is exposed to devices and networks
that are beyond the control of an enterprise or a network pro-
vider. VoIP isn’t like traditional telephony in which a very highly
circumscribed set of devices, protocols, and private networks
was involved in the process of placing and carrying calls. In the
old days when you placed a phone call, the call was placed on an
approved device and carried across the phone company’s private
network.
Many hackers consider telephony of all kinds fair game for dis-
ruption. Steve Jobs and Steve Wozniak, for instance, were involved
in “phone phreaking” before they founded Apple in 1976. Service
providers are likely to face talented and determined hackers, so
robust effort and constant vigilance are a requirement.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
An SBC employs various techniques to protect enterprises and
service providers from cyberattacks against their real-time com-
munication networks, including the following:
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IPv6 HAS ARRIVED
The IP variant (IPv4) that powered the Internet for many years started
to have an issue. IPv4 used a 32-bit address space, which meant that
it was limited to only about 4.3 billion addresses — and it ran out of
available addresses in 2015.
The move to IPv6 caused other issues. For example, not all networks
were configured to support IPv6. When two clients wanted to commu-
nicate, and one was on an IPv4 network and the other on IPv6, some-
thing needed to be placed in the middle to help them communicate.
An SBC serves this purpose. It resolves these issues in two ways:
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding SIP and call transcoding
»» Supporting video
Chapter 2
Identifying the Key
Requirements of an SBC
A
session border controller (SBC) does much more than
just provide security. In fact, many in the telecommuni
cations industry say that it’s the security that gets
customers interested, but it’s the other functionality in an SBC
that makes the sale. This other functionality is all about SBCs
making Voice over Internet Protocol (VoIP) calls and real-time
communications (RTC) work in situations where they otherwise
might not work. And, beyond that, SBCs simply make VoIP and
RTC services work better.
In this chapter, you find out about all the other essential functions
of an SBC.
Normalizing SIP
Session Initiation Protocol (SIP) is the primary protocol that
establishes the connection between two endpoints and termi
nates the connection when the call is finished. At the most basic
level, SIP is the VoIP equivalent of the dialing tones that directed
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
old-fashioned analog calls to the right switches and across phone
networks. SIP is the common language that telecom providers and
equipment makers use to communicate with each other.
An SBC must be able to speak all the different dialects of SIP and
do on-the-fly translations in both directions. So, if a call is cross
ing a border between a system using Dialect X and another system
using Dialect Y, the SBC must find the parts of Dialect X and Y that
don’t quite match up and convert them back and forth as the call
moves across the SBC. It’s not rocket science in concept, but it’s
hard to do, especially within milliseconds; the best SBCs make the
whole process transparent and seamless.
Transcoding Calls
Another of the SBC’s jobs is to transcode, or change, codecs as
media sessions pass through the SBC. The SBC knows which
codecs are supported on each side of the network border and is
required to decode and then re-encode the voice or video signal as
it crosses the network border by using a combination of special
ized software or special-purpose digital signal processors (DSPs).
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Many codecs — the encode/decode algorithms that compress
voice and other signals, such as video streaming across the net
work in a videoconferencing environment — are in use in various
VoIP and unified communications (UC) systems. Low-bandwidth
and high-bandwidth video and voice codecs are designed to work
on various devices, such as
HD voice
The sound quality of voice calls in general took a step backward
over the years as convenience (mobile phones) and econom
ics (VoIP) drove the replacement of traditional landline phones
with a range of new devices. However, high-definition (HD) voice
reversed that trend. HD voice can reproduce a greater range of
frequencies at higher clarity by using wideband codecs rather
than traditional narrowband codecs (so called because they cut off
both the top and bottom frequencies found in a person’s voice).
You may have heard the effects of this firsthand because many
popular cloud-based collaboration tools such as Teams, Zoom,
Webex, and so on use wideband codecs.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
There’s a gotcha to HD voice: There’s no single codec used by
every HD voice-capable system. However, having an appropriate
SBC — one with robust transcoding capabilities — in the middle
of the call solves the problem. The SBC can transcode and keep
the call HD all the way, but a lot of software and/or hardware are
doing some heavy lifting behind the scenes.
Bandwidth restrictions
Sometimes a call is made to someone who’s connected to an older
mobile network with poor infrastructure. Other times, a call is
made to a person in a home office or a hotel with a limited Wi-Fi
connection. To address these bandwidth restrictions, codecs that
trade fidelity and audio/video quality for greater compression are
available, and they use less bandwidth.
Users may not want to default to these low-fidelity codecs all the
time, but sometimes they’re necessary over at least part of the
call’s path. An SBC sitting between network segments can recog
nize this situation and transcode to and from lower-bandwidth
codecs when required. This situation is much better than rely
ing on the VoIP clients themselves to do this kind of calculation
upfront, especially because not all clients support all codecs.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
sessions, like VoIP, and requires some translation to happen
between public and private addresses — translation beyond what
a network router can do.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
centralized call recording (SIPRec), and other functions in real
time. CPU utilization during both normal and peak periods
should allow for sufficient overhead.
» Concurrent calls (or sessions) supported: How many
concurrent calls is the SBC rated for, and how does this
match your network’s usage patterns? If your usage grows
and begins to exceed the capacity of your SBC, what are your
upgrade options?
» Redundancy: Put a different way, this means “avoiding
single points of failure.” SBCs perform a mission-critical role
for enterprises and service providers, so you need to know
what your redundancy options are and which of those
options will work best for your needs.
» Registration rate: How many clients can the SBC register in
a fixed period? When a lot of users are connecting at once,
make sure that the SBC can handle it.
» QoS policies: The QoS policy of a network and prioritization
of data flows are implemented by the SBC. QoS policies
perform such functions as traffic policing, resource alloca-
tion, rate limiting, and call admission control (CAC).
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Defining the virtual SBC
Chapter 3
Virtualization and
Cloud-Native SBC
I
n this chapter, you learn how virtualization and cloud-native
design work and how your organization can benefit from a vir-
tual or cloud-native session border controller (SBC).
» Application virtualization
» Desktop virtualization
» Storage virtualization
» Network virtualization
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Communications systems use virtualization in the design,
deployment, and management of network services by separating
network functions from hardware devices. This process removes
the need for you to purchase dedicated hardware such as routers,
firewalls, and SBCs, among others.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Greater agility: Service providers must be able to quickly
scale their services up or down to meet changing market
demands. They also need to innovate quickly and get those
innovations to market as quickly and easily as possible.
Virtual SBCs allow for services to be delivered to customers
on private or public clouds to achieve greater agility.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The result of being run-time ready is service velocity with
operational efficiency, because it’s possible to instantiate a
running, configured SBC that’s immediately capable of call
processing without the need for operator intervention.
» Elasticity (auto-scaling): The advantage of a cloud-native
environment is the ease, speed, and ultimately cost-
effectiveness with which an SBC can be auto-scaled. With
automated life cycle management, provided by Kubernetes,
SBC workload scaling can match traffic d
emand in real time.
This rapid scale-up/scale-down functionality is the very
essence of elasticity.
Achieving elasticity also means that instantiation is optimized
for both horizontal scaling (adding more workloads) and
vertical scaling (adding more capacity or performance
within a workload).
» Optimal load balancing: Load balancing is the mechanism
that optimizes resource utilization, ensuring that traffic is
evenly balanced across multiple service instances, in align-
ment with the dynamic traffic load. With load balancing,
variances in traffic are optimized across aggregate capacity;
as a result, solution resiliency is increased by avoiding server
overload situations that could potentially cause processing
failures. Furthermore, traffic will be rebalanced automatically
in the event of a workload failure.
For the SBC application, load balancing must have knowl-
edge of session persistence and the performance status of
each workload.
» Resiliency and high availability: Certain attributes of an
SBC are considered table stakes for deployment. Resiliency
and high availability (HA) fit this designation. One goal of a
cloud-native design based on microservices is to be able to
exceed the fault tolerance that was found in more traditional
hardware deployments but to do so without the overhead
of multiple hardware platforms. In a cloud-native design, it’s
possible to support many different redundancy options. For
example, this would include active–active configurations, N:1
(this is “N” active nodes backed up by “1” standby node), and
N:M (this is “N” active nodes backed up by “M” standby
nodes) configurations. A high-availability implementation
can maintain session and media continuity in the event of
the failure of any workload.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Performance at scale: Performance at scale gets to the very
heart of how an ideal SBC is designed and why moving SBCs
to a cloud-native deployment model, rather than using
traditional, proprietary hardware devices, is imperative.
The cloud-native deployment model, based on microservices
and containers, makes it possible to enable (turn on) feature
capabilities such as encryption, interworking for IPv4 to IPv6
or for Real-time Transport Protocol (RTP) to Secure Real-time
Transport Protocol (SRTP), and SIP header manipulation, while
also ensuring that they have no impact on overall session
performance. For example, call control functions scale based
on the rate of calls per second, which is a very different
measure than how a transcoding service needs to scale, based
on packets per second. Scaling performance for specific
microservices also means that a cloud-native SBC is capable of
handling sustained denial-of-service (DoS) attacks or registra-
tion floods without negative impact on call performance or
call quality.
» Open APIs and integration with an observability frame-
work: Network functions such as an SBC don’t work in a
vacuum; they’re part of an overall network infrastructure to
secure and ensure the delivery of real-time communications. As
such, they need to fit into the management infrastructure that
an enterprise or service provider has in place. For a cloud-native
SBC, this means support for open APIs and integration with an
open telemetry-based observability framework.
Integration for monitoring metrics and logs, and interfacing
with open source/third-party tools such as Prometheus and
EFK (Elasticsearch, Fluentd, and Kibana), reduces the friction
for seamlessly fitting into a framework that is common
across multiple cloud-native applications or workloads. For
example, while resource utilization statistics are commonly
used for life cycle management and load balancing, visibility
to them can also be used for capacity planning across all
resources in a cloud deployment.
» Subscription-based, network-wide licensing: A subscription-
based licensing model is appropriate for virtual and cloud-
native deployments. Instead of traditional licensing that was
typically coupled with a system’s capacity, a subscription-based
licensing model aligns with the dynamic usage of resources.
By extension, licenses need to be available on a network-wide
basis because virtual or cloud-native deployments remove the
construct of a license tied to a physical device or location.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Supporting unified communications
»» Enabling WebRTC
Chapter 4
Deploying SBCs for
Different Use Cases
S
ession border controllers (SBCs) play a role in many differ-
ent types of environments and use cases such as unified
communications (UC), Session Initiation Protocol (SIP)
trunking, mobile and IP multimedia subsystem (IMS) networks,
interworking with web real-time communications (WebRTC), and
contact centers. In this chapter, you discover the unique require-
ments and challenges for each of these use cases.
Unified Communications
Gone are the days when enterprise communications meant a
phone on every employee’s desk. Today’s employees expect rich,
seamless collaboration from almost any desktop or mobile device.
Enterprises need to harness the power of unified communica-
tions (UC) and the flexibility of bring your own device (BYOD)
policies to increase employee productivity, reduce costs, and
improve customer service.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
communications, yet a common barrier to UC adoption is a lack
of interoperability between the vendor-specific voice, video, and
messaging systems that exist in most enterprise networks.
While SIP was meant to break down many of those barriers, even
SIP-based systems face issues, and they often require signifi-
cant interworking and transcoding to provide acceptable levels
of interoperability. Thus, most enterprises fall short of a truly
unified model of communications and collaboration, potentially
limiting the ability of users to easily and consistently consume
rich media services.
The road to UC has been paved with wasted time and money: time
spent on long service engagements and endless interoperabil-
ity testing, and money spent on private branch exchange (PBX)
upgrades and new equipment. But an SBC can provide a session
management framework for UC and SIP communications that
coordinates PBXs, room-based videoconferencing, and business
collaboration tools across a wide variety of IP devices (smart-
phones, tablets, and so on), so enterprises can more easily inte-
grate and create a true UC environment.
As you move more services and applications into the cloud, SBC-
based session management unites cloud-based services with your
existing on premises-based enterprise communications to ensure
a rich, easy-to-manage UC experience.
Enterprise Connectivity
Deployment of SBCs in enterprises is becoming more common as
businesses replace legacy PBXs and on-premises contact centers
with cloud-based services such as Microsoft Teams, Zoom Phone,
Cisco Webex, Genesys Cloud, Five9, NICE CXone, and dozens of
similar services. For an enterprise, the SBC is the first line of
defense between its telecom provider and its cloud-based collab-
oration system, providing cost-effective and secure connections
across enterprise networks and branch offices.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
to protect their customers’ information and maintain regulatory
compliance.
Mobile
Real-time communications has changed rapidly from home and
office landline phones to widespread use of mobile smartphones.
An increasing number of homes no longer even have landline
phones, and a growing number of businesses are replacing their
landline phones and even IP phones with mobile devices.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In most countries, mobile data communications are handled by
systems in 4G or increasingly in 5G networks. These systems
allow for the latest in high-speed data for mobile phones and
other mobile devices for streaming video, data from Internet
applications, social media, and streaming music services (such as
Pandora and Spotify).
SBCs are the right place to perform the following IMS functions:
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Interconnect border control/gateway function (I-BCF/
I-BGF): Handles the signaling and media of calls. An intercon-
nect SBC performs functions such as network topology hiding,
monitoring and lawful intercept, routing of signaling into the
core of the IMS, and policy management on a per-trunk basis.
WebRTC
WebRTC is a technology that allows end-users to access phone,
video, or texting capability right from a web page and also to
share screens (have multiple users see the screen of one user
at the same time). The SBC plays an important role in WebRTC,
including
• Session control
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Video support: Consider a WebRTC-enabled web page
initiating a video chat with a non-WebRTC-enabled IP video
phone. The SBC provides
Contact Center
The contact center brings together the challenges faced by other
use cases for SBCs. The contact center is often among the most
important functions a business has, and both employee and end-
user expectations are high.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding the unique needs of
contact centers
Chapter 5
Exploring the
Contact Center
I
n this chapter, you learn how the contact center has evolved
into a critical point of, well, contact between a business and its
current and future customers. You also discover how a session
border controller (SBC) can help address the critical real-time
communication challenges the contact center poses to an
organization.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
hang up and try another company. If support is needed, custom-
ers who have a poor experience are likely to form a poor opinion
of the company, negatively affecting future purchases. Customers
may also create negative online reviews and say negative things
to work colleagues, friends, and family about the company and
its offerings.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
contact centers that need to record each call that comes into
the system. Instead, an SBC simply replicates the call session
to send the signaling (SIP) and media (RTP) to the recording
system, providing reliable data transfer and freeing up data
ports to allow more incoming calls from customers.
» Security for remote agents: Remote or work-at-home
agents enable contact centers to be flexible and scale up or
down as business requires without the added expense of
office space and facility expansion. Consider, for example, a
retailer that sees dramatically higher sales during the holiday
season. This retailer can add temporary remote agents to
handle peak demand periods. Mobile technology allows
workers to work out of their homes with flexible hours,
making this arrangement appealing to workers.
Remote agent configurations do, however, present some
challenges for the contact center. Contact centers require a
scalable solution in which devices don’t need to be config-
ured and agents don’t need to use a virtual private network
(VPN; see Chapter 1). Security is also an important factor
with remote agent configurations because sensitive cus-
tomer data is exchanged over the network during these
interactions. An SBC eliminates the need for a VPN with
IP phones, yet still provides the necessary security (see
Chapter 1).
» Internal transfers: In many cases, calls need to be trans-
ferred to a different agent in another contact center within
the organization. This can often lead to higher costs and
increased security risks if these transfers must traverse
public networks. SBCs can identify internal transfers and
route the call appropriately to ensure that it stays on the
private network, avoiding the additional costs and security
risks inherent with traversing public networks.
One case to consider is a video kiosk in a store where a
customer can make a video call to ask for assistance — a
call that’s routed from a contact center to a remote agent.
In a non-SBC environment, this setup is complicated
because both voice and video data could travel across
multiple networks, requiring each border traversal to be
secured. An SBC provides the necessary security, call routing,
and load balancing features to make this type of transfer
secure and cost efficient.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Implementing intelligent routing policies
»» Lowering costs
Chapter 6
Determining the Value
and ROI of an SBC
Y
ou’re all hyped up. You’ve done your research, and you
know the benefits (Chapter 1) and services (Chapter 2) you
can get from a session border controller (SBC). Now it’s
time to pitch the investment to your chief financial officer (CFO —
who may also be known as your CF-No).
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
toll charges — for example, by routing calls onto least-cost net-
work paths, and by avoiding transferring calls to external public
networks whenever possible. An SBC can also reduce expensive
downtime and provide enhanced security for both employees and
customers, improving metrics such as customer satisfaction and
the employer brand.
The same policy engine can move calls away from an overloaded
contact center to a back-up site or “follow the sun” so that calls
are automatically routed to the right contact center based on
time of day. Intelligent policy capabilities enable organizations to
implement policies such as
Increasing Efficiency
Localized policy management in an SBC enables organizations
to efficiently manage VoIP policies at a single point in your
network — right at the network perimeter, where your SBC is
already securing and providing interoperability for signaling and
media traffic. You spend less time and money managing multiple
devices such as routers, firewalls, and transcoders.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FLYING HIGH WITH RIBBON SBCs
A U.S.-based, international airline maintains a global contact center
to deal with reservations, rewards programs, flight changes, seating
assignments, and other business-critical calls. The airline also
supports numerous voice applications for maintenance and
support teams, ground support (baggage, fueling, and so on),
logistics, in-cockpit and paging systems, airport ticket counters,
mobile workforce support, and even airport courtesy phones.
The airline installed Ribbon SBCs and a Ribbon policy and routing
server (PSX) to provide
(continued)
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
(continued)
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Reduced capital expenditures (CAPEX): Simply put, you
have fewer things to buy, and SBCs cost less money. For
those network elements and functions that you need for
other functionality, you don’t need to overbuild/over-specify
them to allow capacity for the SBC functionality that’s
handled elsewhere.
» Lower operating expenses (OPEX): You can save money
on recurring expenses such as rack space, power, and
cooling with an SBC solution — whether physical, virtual,
or cloud native — compared to multiple devices installed in
your data center or telecom equipment room.
Your CF-No will be itching to write you a check when you explain
that the choice of an SBC is a classic “buy or build” scenario that
reduces CAPEX, lowers OPEX, and offers greater security, less
downtime, and enhanced functionality.
(continued)
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
(continued)
• A rapid rollout, with the ability to convert all stores to SIP trunking
within a few years
• Specialized routing for inbound IVR calls directed to its in-store
pharmacies (specifically, the ability to provide dial tone to
these calls)
• Data security restrictions related to its pharmacy business
To solve its issues, the retailer deployed a Ribbon SBC and PSX in
two data centers to provide a centralized dial plan for all stores.
The retailer leveraged Ribbon to develop an installation plan,
perform configuration, and develop and implement a test plan.
The initial deployment was successfully defined, designed, tested,
and implemented in just a few weeks. The deployment produced
the following results:
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Improving management efficiency and
performing under pressure
Chapter 7
Ten Reasons to Choose
a Ribbon SBC
W
hether you’re an enterprise using Voice over Internet
Protocol (VoIP) or unified communications (UC), or a
service provider offering VoIP or UC services to your
customers, your choice of session border controllers (SBCs) is
integral to your real-time communications architecture and the
success of those services. In this chapter, you discover ten reasons
to choose a market-leading Ribbon SBC solution.
Robust Security
Securing the Session Initiation Protocol (SIP) network is a high-
priority task for enterprises and service providers alike. Ribbon
SBCs are designed to
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Protect the network from distributed denial-of-service
(DDoS) and telephony denial-of-service (TDoS) attacks while
maintaining the capability to connect legitimate sessions
(Chapter 1 describes DDoS/TDoS attacks).
» Implement block lists, grey lists, and allow lists (see
Chapter 1).
Peak Performance
The proliferation of applications and devices has led to an explo-
sion in the volume of SIP traffic on enterprise and service provider
networks. Ribbon SBCs are designed to deliver peak performance
at scale, regardless of traffic load or features that are enabled.
They’ve been field-proven in Tier 1 service providers and in some
of the largest enterprises in mission-critical roles, including in
demanding verticals such as financial services and healthcare.
High-Scale Transcoding
Both transcoding and transrating are computationally complex
processes — imagine what it takes to completely disassemble
and reassemble a voice in real time without inducing noticeable
latency or delay into the stream. Not all SBCs can scale trans-
coding for thousands of simultaneous sessions, but Ribbon’s
SBCs can scale to support high levels of transcoding without any
effect on other computational functions, such as security and call
admission control (CAC), that the SBC must also perform.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
» Securing converged networks
» Providing quality of service (QoS) to ensure an outstanding
customer experience
» Performing the necessary transcoding or transrating to
interoperate on all media streams
Interoperability
Different vendors and different VoIP networks may speak in
slightly incompatible ways when they use SIP (see Chapter 1).
This incompatibility can result in calls that can’t be completed or
that are degraded in some way (such as missing some function-
ality). The SBC provides the critical role for interoperating across
the different variants of SIP.
Ribbon SBCs support all known variants of SIP through SIP nor-
malization (translating between different SIP variants), either by
using static rules configured on the SBC, or on the fly as different
varieties of SIP are encountered by the SBC.
Multiple Certifications
An SBC provides interoperability with real-time communication
products from many vendors. With the rapid adoption of unified
communications as a service (UCaaS), one of the attributes to look
for is certification from leading UCaaS providers such as Microsoft
Teams, Zoom, and Ring Central. Ribbon SBCs have been certi-
fied for Microsoft Teams Direct Routing, including media bypass
and local media optimization options. Ribbon SBCs have also been
certified for interoperability with Zoom Phone and Ring Central.
And a special note for those of you who work in the United States
federal government: Ribbon has certifications for U.S. government
deployment with certified compliance to the Joint Interoperability
Test Command (JITC) and Federal Information Processing Stan-
dard (FIPS) 140-2 requirements.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Seamless Scalability
Ribbon uses a three-dimensional approach to scalability by sepa-
rating the processing functionality of the SBC so that individual
tasks, such as transcoding or encryption, can scale up or down
without impacting the performance of other SBC tasks.
Ribbon innovation has now delivered the next step in SBC evo-
lution with an industry-leading, cloud-native SBC. Optimized
to take advantage of microservices design, deployment in con-
tainers, automated life cycle management using Kubernetes, and
integration with an observability framework, Ribbon’s cloud-
native SBC further extends and amplifies the attributes of high
availability, reliability, and support for new and advanced fea-
tures, while delivering performance at scale.
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Centralized Policy and Routing Control
In conjunction with Ribbon’s policy and routing server (PSX),
Ribbon SBCs deliver localized policy control without the overhead
of separately managing policies at each SBC. Ribbon’s PSX deliv-
ers policy management in which provisioning policy and routing
data is centrally managed and policy and routing information is
automatically pushed to every SBC. Not only is this faster, but also
it’s less prone to error because changes are made once instead
of many times (potentially hundreds of times across hundreds of
sites).
These materials are © 2024 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
ISBN: 978-1-394-19693-7
Not For Resale
dummies
A Wiley Brand
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.