Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Private Session Initiation Protocol (SIP) Proxy-to-Proxy Extensions for Supporting the PacketCable Distributed Call Signaling Architecture (RFC3603)

IP.com Disclosure Number: IPCOM000019909D
Original Publication Date: 2003-Oct-01
Included in the Prior Art Database: 2003-Oct-10
Document File: 29 page(s) / 67K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

W. Marshall: AUTHOR [+4]

Abstract

In order to deploy a residential telephone service at very large scale across different domains, it is necessary for trusted elements owned by different service providers to exchange trusted information that conveys customer-specific information and expectations about the parties involved in the call. This document describes private extensions to the Session Initiation Protocol (SIP) (RFC3261) for supporting the exchange of customer information and billing information between trusted entities in the PacketCable Distributed Call Signaling Architecture. These extensions provide mechanisms for access network coordination to prevent theft of service, customer originated trace of harassing calls, support for operator services and emergency services, and support for various other regulatory issues. The use of the extensions is only applicable within closed administrative domains, or among federations of administrative domains with previously agreed-upon policies where coordination of charging and other functions is required.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 6% of the total text.

Network Working Group W. Marshall, Ed.

Request for Comments: 3603 AT&T

Category: Informational F. Andreasen, Ed.

Cisco

October 2003

Private Session Initiation Protocol (SIP) Proxy-to-Proxy Extensions

for Supporting the PacketCable Distributed Call Signaling Architecture

Status of this Memo

This memo provides information for the Internet community. It does

not specify an Internet standard of any kind. Distribution of this

memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2003). All Rights Reserved.

Abstract

In order to deploy a residential telephone service at very large

scale across different domains, it is necessary for trusted elements

owned by different service providers to exchange trusted information

that conveys customer-specific information and expectations about the

parties involved in the call. This document describes private

extensions to the Session Initiation Protocol (SIP) (RFC3261) for

supporting the exchange of customer information and billing

information between trusted entities in the PacketCable Distributed

Call Signaling Architecture. These extensions provide mechanisms for

access network coordination to prevent theft of service, customer

originated trace of harassing calls, support for operator services

and emergency services, and support for various other regulatory

issues. The use of the extensions is only applicable within closed

administrative domains, or among federations of administrative

domains with previously agreed-upon policies where coordination of

charging and other functions is required.

Table of Contents

1. Applicability Statement . . . . . . . . . . . . . . . . . . . 3

2. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 3

3. Trust Boundary. . . . . . . . . . . . . . . . . . . . . . . . 5

4. Conventions used in this document . . . . . . . . . . . . . . 6

Marshall & Andreasen Informational [Page 1]

RFC 3603 SIP Proxy-to-Proxy Extensions October 2003

5. P-DCS-TRACE-PARTY-ID. . . . . . . . . . . . . . . . . . . . . 6

5.1. Syntax. . . . . . . . . . . . . . . . . . . . . . . . . 7

5.2. Procedures at an Untrusted User Agent Client (UAC). . . 7

5.3. Procedures at a Trusted User Agent Client (UAC) . . . . 7

5.4. Procedures at an Untrusted User Agent Server (UAS). . . 7

5.5. Procedures at a Trusted User Agent Server (UAS) . . . . 7

5.6. Procedures at Proxy . . . . . . . . . . . . . . . . . . 8

5.6.1. Procedures at Originating Proxy . . . . . . . . 8

5.6.2. Procedures at Terminating Proxy . . . . . . . . 8

6. P-DCS-OSPS. . . . . . . . . . . . . . . . . . . . . . . . . . 8

6.1. Syntax. . . . . . . . . . . . . . . . . . . . . . . . . 9

6.2. Procedures at an Untrusted User Agent Client (UAC). . . 9

6.3. Procedures at a Trusted User Agent Client (UAC) . . . . 10

6.4. Procedures at an Untrusted User Agent Server (UAS). . . 10

6.5. Procedures at a Trusted User Agent Server (UAS) . . . . 11

6.6. Procedures at Proxy . . . . . . . . . . . . . . . . . . 11

7. P-DCS-BILLING-INFO. . . . . . . ....