Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Speermint Group Tackles SIP Peering Shortcomings: Page 3 of 4

For enterprises or providers that cannot justify joining a federation, Speermint provides a series of BKMs (Best Known Methods) that outline methodologies for handling real-time sessions over peered networks.

The overarching purpose of the Speermint group is to extend the SIP protocol with the development of various architectures designed for specific use-case scenarios. All architectures are constructed to provide identification, signaling and routing of real-time and delay-sensitive communication while establishing and maintaining trust, security and resistance to abuse and attack.

To operate truly independent of network type, the group has set its focus on the application layers--Layer 5 and above. This lets it generate models that are generic enough to satisfy its efforts independent of the underlying network, be it a DSL connection or OC-48. It may be an overly optimistic assumption at this point since there are considerable differences--such as QoS capabilities--between those two technologies. The group acknowledges that fact and may consider rechartering in the future to encapsulate QoS and traffic-engineering mechanisms.

At the time of this writing, the Speermint group had released five Internet Drafts that outline some of the basic principles of SIP peering. In essence, these drafts extend the established SIP standards to accomplish Speermint's objectives. Of note, two of the drafts outline a logical grouping of peering functions and subsequent message-flow phases.

The Internet Draft related to message-flow phases introduces discovery, policy and security phases to a SIP session, consisting of exchanges and agreements between peers before the communication of SIP signals and call setup. These additional sequences are the first steps toward establishing dynamic policies configurable by system administrators amongst multiple SIP peers.