Interdomain Communications in IP Telephony

Size: px
Start display at page:

Download "Interdomain Communications in IP Telephony"

Transcription

1 Interdomain Communications in IP Telephony Prof. MAURIZIO LONGO DIIIE Department University of Salerno VINCENZO LANGONE Switching & Routing Division Alcatel Italia GIUSEPPE FOLINO European Wireless Institute Abstract: - We face a fundamental aspect of IP telephony: a call that leaves from an administrative domain and needs to reach another one to be completed. We analyze the various approaches adopted to treat and solve this issue by the main organizations of standardization, like ETSI, IETF, ITU- T. Key-Words. Administrative Domain, Clearing, Settlement, Clearinghouse, Border Element, OSP, Annex G, H.323,. 1 Introduction Voice over IP means the trasmission of voice traffic on a packet-switched network. The main aspects that have favoured the development of this kind of communication can be summarized as follows: The business case (integration of voice and data, bandwidth consolidation, tariff arbitrage). Ubiquitous presence of IP. Improvement of technologies. The migration to data networks. Even if IP telephony seems to be a turnkey solution for our communication needs, it presents new challenges [1]. 2 Problem Formulation When a call leaves an administrative domain (the set of equipments administrated by the same entity, e.g. gateways and gatekeepers owned by a certain Internet Service Provider) many problems have to be solved. First, a call needs to be authorized to travel outside a provider s domain. Second, a call has to be routed to reach the terminating party. Third, because the prices adopted by providers are generally different, a call must be correctly billed. Finally, terminating operators will complete the call only if they re sure it will be paid for. 3 Problem Solutions In principle here are two solutions to the problem just seen: 1) bilateral agreements between IP Telephony Service Providers: each provider has to stipulate an agreement with all of the others. Evidently this approach becomes unfeasible as the number of providers grows. 2) clearinghouse: centralized entity that deals with the various aspects of business relations between providers. The result is a single agreement for each provider. The clearinghouse acts as the trusted third party without being directly involved in the communication path between originating and terminating IP networks. We can now summarize the functions of a clearinghouse: Call routing: selecting a route according to a certain criterion (e.g. least cost) indicated by the member service provider and communicating that address to the originating gateway. Call authorization: authorizing a call attempt and communicating to the terminating party that the call is authorized and will be paid for. Settlement and billing: providing the usage reporting and accounting for each service provider s credits and debits [2]. The main value of a clearinghouse service is access to new market. From originating network operators point of view, they should expect to pay lower termination

2 fees as commercial access to new termination points increases. From terminating network operators point of view, they can get access to new sources of traffic demand [3]. We can now examine the protocols proposed by the main organizations of standardization for the dialogue between the clearinghouse and an entity in the administrative domain, which depends on the scenario we consider. 3.1 Open Settlement Protocol The first protocol we review is the one proposed by ETSI (European Telecommunications Standards Institute) in december It is called Open Settlement Protocol (OSP) and belongs to the TYPHON (Telecommunication and Internet Protocol Harmonization Over Network) project. OSP doesn t depends on the IP telephony protocol used, so it works either with H.323 or. It allows communication between clearinghouse and gateways (in a H.323 scenario) or policy s (case of ). Conforming systems use a combination of the Hypertext Transfer Protocol (HTTP), and either the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to transfer pricing, authorization, and usage information. As Figure 1 indicates, these protocols are layered on top of the Transmission Control Protocol (TCP) for communication across Internet Protocol (IP) networks. Figure 1 The Secure Sockets Layer and Transport Layer Security protocols add authentication and privacy to TCP connections. SSL is the standard protocol for securing web browsing. As such, it is widely deployed on the Internet and it is distinguished by considerable operational experience. SSL also enjoys near universal support from firewalls and proxy s. TLS is an updated version of SSL currently being developed within the Internet Engineering Task Force (IETF). The Hypertext Transfer Protocol (HTTP) is the standard protocol for web-based communications. HTTP has been adopted for a wide variety of purposes: it is by far the most widely used application protocol on the Internet, and it is supported by all significant firewalls and proxy s. OSP messages must be conformed to Multipurpose Internet Mail Extension (MIME) specification. They are structured in a HTTP Header, a body written according to XML (extensible Markup Language) rules, and an optional digital signature, which follows the Secure MIME (S/MIME) specification. HTTP Header Message Content Digital Signature Figure 2 The MIME specifications define mechanisms to combine individual components of arbitrary format (e.g. text, graphics, audio information, binary data, etc.) into a single message. Originally designed for electronic mail, the MIME specification has been adapted for a variety of communication applications, including web browsing. MIME format is widely supported by existing firewalls and proxy s. The first part of each MIME message is a document conforming to the Extensible Markup Language (XML) standard. As an extension of the widely deployed Hypertext Markup Language (HTML), XML can be readily parsed by firewalls and proxy s. Unlike HTML, though, XML is readily extensible and can easily support rich, structured data such as pricing and usage information. The second part of each MIME message, if present, is a digital signature conforming to the S/MIME format, which includes support for multiple digest and signing algorithms and for variable cryptographic strength (e.g. key lengths). S/MIME format is also selfidentifying with respect to these parameters, so that a recipient can derive the necessary information for verifying the signature from the signature data. All messages shall conform to the overall XML framework. Messages consist of a single root entity, which contains one or more components, each of which consists in turn of one or more elements. These elements may include XML attributes. Components are the main elements within each message. The <Message> element shall contain at least one and may contain more than one component. The components include pairs to perform pricing

3 exchange(pricing Indication and Pricing Confirmation), obtain authorization (Authorization Request and Authorization Response), verify authorization (Authorization Indication and Authorization Confirmation), refresh authorization (Reauthorization Request and Reauthorization Response) and report usage (UsageIndication and UsageConfirmation). Examples of elements are Amount, CallId, Currency, DestinationInfo, Increment, SourceInfo, Timestamp, UsageDetail. authorized, so it can complete it An authorization message will contain a AuthorizationRequest component and at least CallId and DestinationInfo elements; a usage exchange message will contain a UsageIndication component and at least CallId and UsageDetail elements. If present, the digital signature shall conform to the application/pkcs7-signature format specified in the S/MIME standard. This clause specifies how that signature is created, including the canonicalization procedure, signature algorithm, and transfer encoding [4] OSP and H.323 Let s see now the steps of a communication using OSP in a H.323 scenario. Figure 3 1. A user tries to start a call, which is received by the originating gateway. If the called number is not available in the originating domain, this gateway queries the clearinghouse for the IP address of a gateway to complete the call. 2. The clearinghouse determines a list of the IP addresses of convenient gateways to terminate the call to the called number. The criteria used for the number resolution may be based on price, type of service requested or quality of service requested. The list of possible destinations is then returned to the originating gateway with digitally signed, cryptographic authorization tokens for each candidate-terminating gateway. 3. The call can now be set up from the originating gateway to the terminating gateway, using the routing information and the token gained by the. The authorization token is inserted directly to a H.323 set-up signal. The terminating gateway operator may or may not have any commercial relationship with the originating one, but after verifying the token he understands the call was authorized, so it can be completed. Figure 4 After the call has been completed, both the originating and terminating gateways send Call Details Records (CDRs) to the clearinghouse where these CDRs are reconciled and rated. A running settlement account balance is mantained for each operator, so that authorization to originate traffic can be denied if their prepaid deposit with the clearinghouse falls below a certain limit. 4. Periodically, the clearinghouse executes a net settlement of funds from the net originators to the net terminators [3] OSP and As already said, OSP is independent of the signaling protocol used, so it was adopted by IETF (Internet Engineering Task Force) as a support of its. The scenario is as depicted in Figure 5, making use of the following terms:

4 OSP OSP COPS policy TRANSIT RETE DI TRANSITO NETWORK policy COPS phone edge border border edge PSTN gateway RSVP RSVP ISP 1 ISP 2 Figure 5 RSVP transit network: a network which has no directly conncted hosts neither knowledge of individual calls between parties connected to adjacent ISP. policy : controls policy for all QoS usage by all types of clients. The policy authorizes internal QoS for microflows and may communicate for telephony with an outside clearinghouse, or directly with an outside policy in the correspondent administrative domain. : provides services to all clients, which have to be first registered with the before a call setup request. After the registration, the will handle all call request to/from that client. This does not exclude however direct client-client call setup without the benefits of any. edge : communicates with the correspondent border in the transit network, accepts or rejects Resource reservation Protocol (RSVP) requests for clients, aggregates all RSVP flows into classes of Differentiated Services (DS), namely the RSVP DCLASS Objects. border : connects the transit network with adjacent domains. The protocols in Figure 5 are: Session Initiation Protocol (): used to set up telephony calls and other Internet multimedia session. Open Settlement Protocol (OSP): used between policy s and clearinghouse for pricing, call authorization and settlement. Common Open Policy Service (COPS): used between the policy and other network elements to communicate policies applicable for microflows that have QoS support. Resource Reservation Protocol (RSVP): signaling protocol used to request QoS from the network. RSVP is an end-to-end protocol and can be used between corresponding telephony clients in the respective domains. In the first step of a call, a client sends an INVITE message to its, which tries to terminate the call inside the domain. If it s not possible, it sends a COPS REQ OSP message to the policy, asking to contact the clearinghouse. The policy then queries the clearinghouse through an OSP Authorization Request message, and it responds with an OSP Authorization Response message, returning up to three destination IP address and an authorization token. ROUTER 1 HELLO! Figure 6 The policy then installs policies in network elements to accept the RSVP and requests for the particular flow to the client. The RSVP messages can now be sent. After the reservation of bandwidth has been established, the OK and messages allow the beginning of voice flow (Figure 7). ROUTER 2

5 Figure 7 At the end of the call, as outlined in Figure 8, the policy removes the policy previously installed using COPS messages, while the RSVP TEAR and TEAR messages remove the bandwidth facilities [5]. BYE DRQ OSP DRQ/LPD TEAR/SBM TEAR/SBM DEC REM LPD RPT ROUTER 1 ROUTER 1 HELLO! GOOD BYE! BYE TEAR TEAR Figure Annex G The other protocol used in an interdomain context is the Annex G, proposed by ITU-T (International Telecommunication Union - Telecommunication Standardization Sector) on May It is an appendix of H.323 protocol and was added to solve problems that occur when a user (an endpoint) in one administrative domain wants to reach a user (an endpoint) serviced by another administrative domain. While the H Registration Admission Server (RAS) protocol can support many of the communication needs between administrative domains, it is neither complete nor efficient for this purpose. Annex G allows communication between clearinghouse and a border element, that is a ROUTER 2 ROUTER 2 DEC REM LPD RPT TEAR/SBM DRQ/LPD TEAR/SBM BYE functional element which supports public access into an administrative domain for the purposes of call completion or any other service that involves multimedia communication with other elements within the administrative domain. The border element controls the external view of the administrative domain. This element may exist in combination with other H.323 elements, for example a combination of border element, gatekeeper, and gateway. An administrative domain may contain any number of border elements. A border element will maintain templates for all the zones for which it is responsible. An address template ( template for short) defines a set of AliasAddress identifiers, pricing information to complete calls to those addreses, and the protocol to be used in reaching addresses in that set. An administrative domain advertises templates to indicate the calls it can resolve. Templates are grouped together by an identifier known as a descriptor. Template information may allow the aggregation of addressing information if the addressing scheme is arranged in some hierarchical or routable manner (for example, a given zone might handle *, meaning all telephone numbers that begin with ). These templates may be explicitly provisioned in the border element, or these templates may be formed by summarizing information obtained from gatekeepers within its domain. The border element may make this information available to other border elements via responses to requests. The clearinghouse holds addressing information for all administrative domains for which the clearinghouse provides service, in fact it stores templates from all domains. Examples of messages are: AccessRequest (sent by a border element to another border element to ask for resolution of a specific alias address) and AccessConfirmation, DescriptorRequest (allows an entity to query a border element for specific descriptors) and DescriptorConfirmation, Descriptor Update (is a border element s notification that address information has changed) and DescriptorUpdateAcknowledgement, UsageIndication (reports call details and usage information) and UsageConfirmation [6] inow! inow!, which stands for interoperability NOW!, is a broad-based, multi-vendor initiative established to quickly provide interoperability among IP telephony platforms. It was proposed by Lucent, VocalTec and ITXC and is based on Annex G specification. The following scenario shows some of the high-level process flows for call routing, call setup, call teardown

6 and call usage transmissions. Note that the border elements, as specified in Annex G, will be considered co-resident with the gatekeeper. Play collect req collect welcome userid destination 1 BE 1 Figure 9 The originating gateway prompts the caller for authentication and authorization information before requesting validation from its gatekeeper (ARQ message). After the gatekeeper has validated the user (ACF), the originating gateway prompts the caller for the destination number and contacts its gatekeeper for a termination gateway. The originating gatekeeper/border element looks it up in its database and determines that the call needs the clearinghouse to be completed. The border element then requests from the clearinghouse a list of possible termination gatekeepers or gateways (AccessRequest message). The clearinghouse generates the list using the templates, requests each border element and the gatekeeper on the list to generate a termination token for each appropriate termination gateway, and finally forwards the list with the tokens back to the origination gatekeeper (AccessConfirmation message) along with a clearinghouse token. The call originating gatekeeper initiates the call setup with the termination gatekeeper: after some Q.931 messages, the reverse and forward channels are established and starts. 1 digits ARQ ACF SETUP CallProceeding Facility Alerting Connect ReleaseComplete BE 1 AR AC SETUP AC CallProceeding reverse media channel usable Ringback tone Hello! AR Alerting Connect BE 2 forward media channel usable UI UC Goodbye! ReleaseComplete UI UC BE 2 ARQ ACF IRR 2 I 2 At the end of the call the gateway initiating the termination signals the end of the call to the other gateway and the call is terminated at both gateways. Each gatekeeper sends its Call Details Record (CDR) to the clearinghouse for settlement purposes [7]. 4 Conclusion We treated schematically the still evolving topic of interdomain communication. The considered problem has been faced in recent years by the main standardization bodies, which have proposed different solutions. In particular, we considered a star topology of administrative domains, which refer to a clearinghouse for all commercial relationships among them. We outlined two protocols used for the dialogue between domains and the third party. The first, the ETSI OSP (december1998) is distinguished by independence upon the signaling protocol used, H.323 or, so it was adopted by IETF as a support of its standard. ITU-T, months later, proposed Annex G as an appendix to its H.323 suite, in order to deal with the aspects of interdomain communication not previously considered. Comparing the two solutions, we observe that Annex G is limited to scenarios in which H323 is adopted, while OSP, independent of the standard used, represents a more general solution, and therefore it s an important step in the direction of a unique regolamentation in the fragmented world of IP telephony. References: [1] Uyless Black, Voice Over IP, Prentice Hall, 0. [2] [3] [4] ETSI Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON), Interdomain Pricing, Authorization, and Usage Exchange, TS v1.4.2, December [5] H. Sinnreich; S. Donovan; D. Rawlins; S. Thomas Interdomain IP Communications with QoS, Authorization and Usage Reporting. Internet Draft, March 0. [6] ITU Telecommunication Standardization Sector. Study Group 16, H Annex G, May ftp://standard.pictel.com/avc-site/9905_san/ [7] T. Anderson, D. Clowes, G. Freundlich, P. Gerhardt, and others, inow! Standards-Based Ip Telephony Interoperability Profile. Version 2, February 1999, Figure 10

Peer to Peer Settlement for Next Generation IP Networks Using the ETSI OSP Protocol (ETSI TS 101 321) for Cascading Peering Settlements

Peer to Peer Settlement for Next Generation IP Networks Using the ETSI OSP Protocol (ETSI TS 101 321) for Cascading Peering Settlements Peer to Peer Settlement for Next Generation IP s Using the ETSI OSP Protocol (ETSI TS 101 321) for Cascading Peering Settlements Table of Contents 1 Introduction... 1 2 Requirements... 2 3 The ETSI Open

More information

Master Kurs Rechnernetze Computer Networks IN2097

Master Kurs Rechnernetze Computer Networks IN2097 Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

Methods for Lawful Interception in IP Telephony Networks Based on H.323

Methods for Lawful Interception in IP Telephony Networks Based on H.323 Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

1. Public Switched Telephone Networks vs. Internet Protocol Networks

1. Public Switched Telephone Networks vs. Internet Protocol Networks Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol

More information

VIDEOCONFERENCING. Video class

VIDEOCONFERENCING. Video class VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes

More information

PacketizerTM. Overview of H.323 http://www.packetizer.com/voip/h323/papers/ Paul E. Jones. Rapporteur, ITU-T Q2/SG16 paulej@packetizer.

PacketizerTM. Overview of H.323 http://www.packetizer.com/voip/h323/papers/ Paul E. Jones. Rapporteur, ITU-T Q2/SG16 paulej@packetizer. A resource for packet-switched conversational protocols Overview of H.323 http:///voip/h323/papers/ Paul E. Jones Rapporteur, ITU-T Q2/SG16 paulej@packetizer.com June 2004 Copyright 2004 Executive Summary

More information

This specification this document to get an official version of this User Network Interface Specification

This specification this document to get an official version of this User Network Interface Specification This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

Interoperability Test Plan for International Voice services (Release 6) May 2014

Interoperability Test Plan for International Voice services (Release 6) May 2014 INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (i3 FORUM) Workstream Technical Aspects Workstream Operations Interoperability Test Plan for International Voice services (Release 6) May 2014 Interoperability

More information

Mixer/Translator VOIP/SIP. Translator. Mixer

Mixer/Translator VOIP/SIP. Translator. Mixer Mixer/Translator VOIP/SIP RTP Mixer, translator A mixer combines several media stream into a one new stream (with possible new encoding) reduced bandwidth networks (video or telephone conference) appears

More information

ABOUT AT&T GLOBAL CLEARINGHOUSE

ABOUT AT&T GLOBAL CLEARINGHOUSE ABOUT AT&T GLOBAL CLEARINGHOUSE Established in 1998, AT&T Global Clearinghouse (GCH) is the industry's first carrier-grade VoIP clearinghouse. The clearinghouse service enables ISPs to quickly establish

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) An Alcatel Executive Briefing August, 2002 www.alcatel.com/enterprise Table of contents 1. What is SIP?...3 2. SIP Services...4 2.1 Splitting / forking a call...4 2.2

More information

How To Interwork On An Ip Network

How To Interwork On An Ip Network An Overview of - Interworking 2001 RADVISION. All intellectual property rights in this publication are owned by RADVision Ltd. and are protected by United States copyright laws, other applicable copyright

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

NTP VoIP Platform: A SIP VoIP Platform and Its Services

NTP VoIP Platform: A SIP VoIP Platform and Its Services NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: chgan@csie.nctu.edu.tw Date: 2006/05/02 1 Outline Introduction NTP VoIP

More information

Overview of Voice Over Internet Protocol

Overview of Voice Over Internet Protocol Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Voice over IP (VoIP) Part 2

Voice over IP (VoIP) Part 2 Kommunikationssysteme (KSy) - Block 5 Voice over IP (VoIP) Part 2 Dr. Andreas Steffen 1999-2001 A. Steffen, 10.12.2001, KSy_VoIP_2.ppt 1 H.323 Network Components Terminals, gatekeepers, gateways, multipoint

More information

By Paolo Galtieri The public switched telephone network The Internet Convergence

By Paolo Galtieri The public switched telephone network The Internet Convergence By Paolo Galtieri This article provides an overview of Voice over Internet Protocol (VoIP), one of the many applications taking advantage of the enormous growth of the Internet over the last several years.

More information

A Comparison of H.323 vs SIP

A Comparison of H.323 vs SIP A Comparison of vs SIP Pavlos Papageorgiou pavlos@eng.umd.edu University of Maryland at College Park June 4, 2001 Unpublished and incomplete manuscript. Missing experiments. Contents 1 Introduction 1 1.1

More information

3GPP TS 24.623 V8.1.0 (2008-09)

3GPP TS 24.623 V8.1.0 (2008-09) TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol

More information

User authentication in SIP

User authentication in SIP User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia

More information

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

UK Interconnect White Paper

UK Interconnect White Paper UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have

More information

EE4607 Session Initiation Protocol

EE4607 Session Initiation Protocol EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS Master of Science in Networking and Data Communications THESIS Thesis Title Voice over IP (VoIP) to Enterprise Users Dissertation submitted

More information

Media Gateway Controller RTP

Media Gateway Controller RTP 1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

SIP, Session Initiation Protocol used in VoIP

SIP, Session Initiation Protocol used in VoIP SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1

More information

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

(Refer Slide Time: 6:17)

(Refer Slide Time: 6:17) Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Avancerede Datanet VoIP

Avancerede Datanet VoIP Avancerede Datanet VoIP Ole Brun Madsen Professor University of Aalborg Avancerede Datanet VoIP 1 Voice over IP (VoIP) IP telephony switches enable voice calls to be made within Protocol (IP) networks,

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Status Report on IP/Telecommunications Interworking

Status Report on IP/Telecommunications Interworking GSC#5/RAST#8 Williamsburg, Virginia, USA 23-26 August 1999 GSC5 (99) 32 SOURCE: TITLE: Committee T1 Status Report on IP/Telecommunications Interworking AGENDA ITEM: 10.6 DOCUMENT FOR: Decision Discussion

More information

Packetized Telephony Networks

Packetized Telephony Networks Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.

More information

Chapter 2 PSTN and VoIP Services Context

Chapter 2 PSTN and VoIP Services Context Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using

More information

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source

More information

Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0

Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol

More information

A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network

A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network A Telephone Domain Name System (T-DNS) for Telephony Service at All IP Network o Mi-Ryong Park, Chang-Min Park, and Jong-Hyup Lee Router Technology Department, Network Research Lab., ETRI 161 Kajong-Dong,

More information

Special Module on Media Processing and Communication

Special Module on Media Processing and Communication Special Module on Media Processing and Communication Multimedia Communication Fundamentals Dayalbagh Educational Institute (DEI) Dayalbagh Agra PHM 961 Indian Institute of Technology Delhi (IITD) New Delhi

More information

Analysis of Call scenario in NGN network

Analysis of Call scenario in NGN network Analysis of Call scenario in NGN network Skënder Rugova, Arianit Maraj Post and telecommunication of Kosova-PTK NGN network department PRISHTINA-REPUBLIC OF KOSOVA arianit.maraj@ptkonline.com,skender.rugova@ptkonline.com

More information

Unit 23. RTP, VoIP. Shyam Parekh

Unit 23. RTP, VoIP. Shyam Parekh Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP

More information

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched

More information

Implementing SIP and H.323 Signalling as Web Services

Implementing SIP and H.323 Signalling as Web Services Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures

More information

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: acpang@csie.ntu.edu.tw

More information

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch. As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched

More information

3 The Network Architecture

3 The Network Architecture SIP-H323: a solution for interworking saving existing architecture G. De Marco 1, S. Loreto 2, G. Sorrentino 3, L. Veltri 3 1 University of Salerno - DIIIE- Via Ponte Don Melillo - 56126 Fisciano(Sa) Italy

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

Introduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols

Introduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols Introduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols SS7 is a set of telephony signaling protocols that are used to set up

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet 1 Outlines 1. Introduction 2. QoS in VoIP 3. H323 4. Signalling in VoIP 5. Conclusions 2 1. Introduction to VoIP Voice

More information

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Huawei Technologies Co., Ltd. All rights reserved. Contents Contents 1 Overview... 1 2 H.323...

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

An Introduction to Voice over the IP. Test1 Pool Questions

An Introduction to Voice over the IP. Test1 Pool Questions Dr. Mona Cherri Business and Technology North Lake College/DCCCD An Introduction to Voice over the IP I. True and False Questions Test1 Pool Questions 1. The first Internet-telephony software, Internet

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts

More information

VoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion

VoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion VoIP Jakob Aleksander Libak jakobal@ifi.uio.no 1 Overview Introduction Pros and cons Protocols Services Conclusion 2 1 Introduction Voice over IP is routing of voice conversations over the internet or

More information

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,

More information

Quality of Service Testing in the VoIP Environment

Quality of Service Testing in the VoIP Environment Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

Low Investment, High Returns

Low Investment, High Returns Leveraging Standards for Low Investment, High Returns Out of the box clearinghouse billing system uses OSP to capture new VoIP traffic, provide low cost termination, and generate new revenue streams. The

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL

AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL João Paulo Sousa Instituto Politécnico de Bragança R. João Maria Sarmento Pimentel, 5370-326 Mirandela, Portugal + 35 27 820 3 40 jpaulo@ipb.pt Eurico Carrapatoso

More information

SIP A Technology Deep Dive

SIP A Technology Deep Dive SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing

More information

Trait-based Authorization Mechanisms for SIP Based on SAML

Trait-based Authorization Mechanisms for SIP Based on SAML Trait-based Authorization Mechanisms for SIP Based on SAML Douglas C. Sicker, University of Colorado Boulder Hannes Tschofenig, Siemens Jon Peterson, Neustar Abstract - This paper presents a method for

More information

Information Technology Security Guideline. Network Security Zoning

Information Technology Security Guideline. Network Security Zoning Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning

More information

Implementing Intercluster Lookup Service

Implementing Intercluster Lookup Service Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end

More information

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Internet Communications Using SIP

Internet Communications Using SIP Internet Communications Using SIP Delivering VolP and Multimedia Services with Session Initiation Protocol John Wiley & Sons, Inc. NEW YORK CHICHESTER WEINHEIM BRISBANE SINCAPORE TORONTO Contents Foreword

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

Session Border Controller

Session Border Controller CHAPTER 13 This chapter describes the level of support that Cisco ANA provides for (SBC), as follows: Technology Description, page 13-1 Information Model Objects (IMOs), page 13-2 Vendor-Specific Inventory

More information

Differentiated Services

Differentiated Services March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: chaffee@bmrc.berkeley.edu URL: http://bmrc.berkeley.edu/people/chaffee 1 Outline Architecture

More information

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott

More information

An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks

An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks Ala Khalifeh Department of EECS University of California, Irvine [akhalife]@uci.edu Abstract in this paper, we present

More information

This topic describes dial peers and their applications.

This topic describes dial peers and their applications. Dial Peers What is Dial Peer? This topic describes dial peers and their applications. What is a Dial Peer? A dial peer is an addressable call endpoint. Dial peers establish logical connections, called

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking NEC SV8100 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011

More information