datatracker.ietf.org
Sign in
Version 5.4.0, 2014-04-22
Report a bug

Private Session Initiation Protocol (SIP) Proxy-to-Proxy Extensions for Supporting the PacketCable Distributed Call Signaling Architecture
RFC 5503

Network Working Group                                       F. Andreasen
Request for Comments: 5503                                         Cisco
Obsoletes: 3603                                              B. McKibben
Category: Informational                                        CableLabs
                                                             B. Marshall
                                                                    AT&T
                                                              March 2009

Private Session Initiation Protocol (SIP) Proxy-to-Proxy Extensions for
   Supporting the PacketCable Distributed Call Signaling Architecture

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (c) 2009 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents in effect on the date of
   publication of this document (http://trustee.ietf.org/license-info).
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

Andreasen, et al.            Informational                      [Page 1]
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009

Abstract

   In order to deploy a residential telephone service at a very large
   scale across different domains, it is necessary for trusted elements
   owned by different service providers to exchange trusted information
   that conveys customer-specific information and expectations about the
   parties involved in the call.  This document describes private
   extensions to the Session Initiation Protocol, RFC 3261, for
   supporting the exchange of customer information and billing
   information between trusted entities in the PacketCable Distributed
   Call Signaling Architecture.  These extensions provide mechanisms for
   access network coordination to prevent theft of service, customer
   originated trace of harassing calls, support for operator services
   and emergency services, and support for various other regulatory
   issues.  The use of the extensions is only applicable within closed
   administrative domains, or among federations of administrative
   domains with previously agreed-upon policies where coordination of
   charging and other functions is required.

Andreasen, et al.            Informational                      [Page 2]
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009

Table of Contents

   1. Applicability Statement .........................................4
   2. Introduction ....................................................4
   3. Trust Boundary ..................................................6
   4. Conventions Used in This Document ...............................7
   5. P-DCS-TRACE-PARTY-ID ............................................7
      5.1. Syntax .....................................................8
      5.2. Procedures at an Untrusted User Agent Client (UAC) .........9
      5.3. Procedures at a Trusted User Agent Client (UAC) ............9
      5.4. Procedures at an Untrusted User Agent Server (UAS) .........9
      5.5. Procedures at a Trusted User Agent Server (UAS) ............9
      5.6. Procedures at Proxy .......................................10
           5.6.1. Procedures at Originating Proxy ....................10
           5.6.2. Procedures at Terminating Proxy ....................11
   6. P-DCS-OSPS .....................................................11
      6.1. Syntax ....................................................11
      6.2. Procedures at an Untrusted User Agent Client (UAC) ........12
      6.3. Procedures at a Trusted User Agent Client (UAC) ...........12
      6.4. Procedures at an Untrusted User Agent Server (UAS) ........13
      6.5. Procedures at a Trusted User Agent Server (UAS) ...........13

[include full document text]