Interdomain Communications in IP Telephony
|
|
- Shanna Walton
- 8 years ago
- Views:
Transcription
1 Interdomain Communications in IP Telephony Prof. MAURIZIO LONGO DIIIE Department University of Salerno VINCENZO LANGONE Switching & Routing Division Alcatel Italia GIUSEPPE FOLINO European Wireless Institute Abstract: - We face a fundamental aspect of IP telephony: a call that leaves from an administrative domain and needs to reach another one to be completed. We analyze the various approaches adopted to treat and solve this issue by the main organizations of standardization, like ETSI, IETF, ITU- T. Key-Words. Administrative Domain, Clearing, Settlement, Clearinghouse, Border Element, OSP, Annex G, H.323,. 1 Introduction Voice over IP means the trasmission of voice traffic on a packet-switched network. The main aspects that have favoured the development of this kind of communication can be summarized as follows: The business case (integration of voice and data, bandwidth consolidation, tariff arbitrage). Ubiquitous presence of IP. Improvement of technologies. The migration to data networks. Even if IP telephony seems to be a turnkey solution for our communication needs, it presents new challenges [1]. 2 Problem Formulation When a call leaves an administrative domain (the set of equipments administrated by the same entity, e.g. gateways and gatekeepers owned by a certain Internet Service Provider) many problems have to be solved. First, a call needs to be authorized to travel outside a provider s domain. Second, a call has to be routed to reach the terminating party. Third, because the prices adopted by providers are generally different, a call must be correctly billed. Finally, terminating operators will complete the call only if they re sure it will be paid for. 3 Problem Solutions In principle here are two solutions to the problem just seen: 1) bilateral agreements between IP Telephony Service Providers: each provider has to stipulate an agreement with all of the others. Evidently this approach becomes unfeasible as the number of providers grows. 2) clearinghouse: centralized entity that deals with the various aspects of business relations between providers. The result is a single agreement for each provider. The clearinghouse acts as the trusted third party without being directly involved in the communication path between originating and terminating IP networks. We can now summarize the functions of a clearinghouse: Call routing: selecting a route according to a certain criterion (e.g. least cost) indicated by the member service provider and communicating that address to the originating gateway. Call authorization: authorizing a call attempt and communicating to the terminating party that the call is authorized and will be paid for. Settlement and billing: providing the usage reporting and accounting for each service provider s credits and debits [2]. The main value of a clearinghouse service is access to new market. From originating network operators point of view, they should expect to pay lower termination
2 fees as commercial access to new termination points increases. From terminating network operators point of view, they can get access to new sources of traffic demand [3]. We can now examine the protocols proposed by the main organizations of standardization for the dialogue between the clearinghouse and an entity in the administrative domain, which depends on the scenario we consider. 3.1 Open Settlement Protocol The first protocol we review is the one proposed by ETSI (European Telecommunications Standards Institute) in december It is called Open Settlement Protocol (OSP) and belongs to the TYPHON (Telecommunication and Internet Protocol Harmonization Over Network) project. OSP doesn t depends on the IP telephony protocol used, so it works either with H.323 or. It allows communication between clearinghouse and gateways (in a H.323 scenario) or policy s (case of ). Conforming systems use a combination of the Hypertext Transfer Protocol (HTTP), and either the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to transfer pricing, authorization, and usage information. As Figure 1 indicates, these protocols are layered on top of the Transmission Control Protocol (TCP) for communication across Internet Protocol (IP) networks. Figure 1 The Secure Sockets Layer and Transport Layer Security protocols add authentication and privacy to TCP connections. SSL is the standard protocol for securing web browsing. As such, it is widely deployed on the Internet and it is distinguished by considerable operational experience. SSL also enjoys near universal support from firewalls and proxy s. TLS is an updated version of SSL currently being developed within the Internet Engineering Task Force (IETF). The Hypertext Transfer Protocol (HTTP) is the standard protocol for web-based communications. HTTP has been adopted for a wide variety of purposes: it is by far the most widely used application protocol on the Internet, and it is supported by all significant firewalls and proxy s. OSP messages must be conformed to Multipurpose Internet Mail Extension (MIME) specification. They are structured in a HTTP Header, a body written according to XML (extensible Markup Language) rules, and an optional digital signature, which follows the Secure MIME (S/MIME) specification. HTTP Header Message Content Digital Signature Figure 2 The MIME specifications define mechanisms to combine individual components of arbitrary format (e.g. text, graphics, audio information, binary data, etc.) into a single message. Originally designed for electronic mail, the MIME specification has been adapted for a variety of communication applications, including web browsing. MIME format is widely supported by existing firewalls and proxy s. The first part of each MIME message is a document conforming to the Extensible Markup Language (XML) standard. As an extension of the widely deployed Hypertext Markup Language (HTML), XML can be readily parsed by firewalls and proxy s. Unlike HTML, though, XML is readily extensible and can easily support rich, structured data such as pricing and usage information. The second part of each MIME message, if present, is a digital signature conforming to the S/MIME format, which includes support for multiple digest and signing algorithms and for variable cryptographic strength (e.g. key lengths). S/MIME format is also selfidentifying with respect to these parameters, so that a recipient can derive the necessary information for verifying the signature from the signature data. All messages shall conform to the overall XML framework. Messages consist of a single root entity, which contains one or more components, each of which consists in turn of one or more elements. These elements may include XML attributes. Components are the main elements within each message. The <Message> element shall contain at least one and may contain more than one component. The components include pairs to perform pricing
3 exchange(pricing Indication and Pricing Confirmation), obtain authorization (Authorization Request and Authorization Response), verify authorization (Authorization Indication and Authorization Confirmation), refresh authorization (Reauthorization Request and Reauthorization Response) and report usage (UsageIndication and UsageConfirmation). Examples of elements are Amount, CallId, Currency, DestinationInfo, Increment, SourceInfo, Timestamp, UsageDetail. authorized, so it can complete it An authorization message will contain a AuthorizationRequest component and at least CallId and DestinationInfo elements; a usage exchange message will contain a UsageIndication component and at least CallId and UsageDetail elements. If present, the digital signature shall conform to the application/pkcs7-signature format specified in the S/MIME standard. This clause specifies how that signature is created, including the canonicalization procedure, signature algorithm, and transfer encoding [4] OSP and H.323 Let s see now the steps of a communication using OSP in a H.323 scenario. Figure 3 1. A user tries to start a call, which is received by the originating gateway. If the called number is not available in the originating domain, this gateway queries the clearinghouse for the IP address of a gateway to complete the call. 2. The clearinghouse determines a list of the IP addresses of convenient gateways to terminate the call to the called number. The criteria used for the number resolution may be based on price, type of service requested or quality of service requested. The list of possible destinations is then returned to the originating gateway with digitally signed, cryptographic authorization tokens for each candidate-terminating gateway. 3. The call can now be set up from the originating gateway to the terminating gateway, using the routing information and the token gained by the. The authorization token is inserted directly to a H.323 set-up signal. The terminating gateway operator may or may not have any commercial relationship with the originating one, but after verifying the token he understands the call was authorized, so it can be completed. Figure 4 After the call has been completed, both the originating and terminating gateways send Call Details Records (CDRs) to the clearinghouse where these CDRs are reconciled and rated. A running settlement account balance is mantained for each operator, so that authorization to originate traffic can be denied if their prepaid deposit with the clearinghouse falls below a certain limit. 4. Periodically, the clearinghouse executes a net settlement of funds from the net originators to the net terminators [3] OSP and As already said, OSP is independent of the signaling protocol used, so it was adopted by IETF (Internet Engineering Task Force) as a support of its. The scenario is as depicted in Figure 5, making use of the following terms:
4 OSP OSP COPS policy TRANSIT RETE DI TRANSITO NETWORK policy COPS phone edge border border edge PSTN gateway RSVP RSVP ISP 1 ISP 2 Figure 5 RSVP transit network: a network which has no directly conncted hosts neither knowledge of individual calls between parties connected to adjacent ISP. policy : controls policy for all QoS usage by all types of clients. The policy authorizes internal QoS for microflows and may communicate for telephony with an outside clearinghouse, or directly with an outside policy in the correspondent administrative domain. : provides services to all clients, which have to be first registered with the before a call setup request. After the registration, the will handle all call request to/from that client. This does not exclude however direct client-client call setup without the benefits of any. edge : communicates with the correspondent border in the transit network, accepts or rejects Resource reservation Protocol (RSVP) requests for clients, aggregates all RSVP flows into classes of Differentiated Services (DS), namely the RSVP DCLASS Objects. border : connects the transit network with adjacent domains. The protocols in Figure 5 are: Session Initiation Protocol (): used to set up telephony calls and other Internet multimedia session. Open Settlement Protocol (OSP): used between policy s and clearinghouse for pricing, call authorization and settlement. Common Open Policy Service (COPS): used between the policy and other network elements to communicate policies applicable for microflows that have QoS support. Resource Reservation Protocol (RSVP): signaling protocol used to request QoS from the network. RSVP is an end-to-end protocol and can be used between corresponding telephony clients in the respective domains. In the first step of a call, a client sends an INVITE message to its, which tries to terminate the call inside the domain. If it s not possible, it sends a COPS REQ OSP message to the policy, asking to contact the clearinghouse. The policy then queries the clearinghouse through an OSP Authorization Request message, and it responds with an OSP Authorization Response message, returning up to three destination IP address and an authorization token. ROUTER 1 HELLO! Figure 6 The policy then installs policies in network elements to accept the RSVP and requests for the particular flow to the client. The RSVP messages can now be sent. After the reservation of bandwidth has been established, the OK and messages allow the beginning of voice flow (Figure 7). ROUTER 2
5 Figure 7 At the end of the call, as outlined in Figure 8, the policy removes the policy previously installed using COPS messages, while the RSVP TEAR and TEAR messages remove the bandwidth facilities [5]. BYE DRQ OSP DRQ/LPD TEAR/SBM TEAR/SBM DEC REM LPD RPT ROUTER 1 ROUTER 1 HELLO! GOOD BYE! BYE TEAR TEAR Figure Annex G The other protocol used in an interdomain context is the Annex G, proposed by ITU-T (International Telecommunication Union - Telecommunication Standardization Sector) on May It is an appendix of H.323 protocol and was added to solve problems that occur when a user (an endpoint) in one administrative domain wants to reach a user (an endpoint) serviced by another administrative domain. While the H Registration Admission Server (RAS) protocol can support many of the communication needs between administrative domains, it is neither complete nor efficient for this purpose. Annex G allows communication between clearinghouse and a border element, that is a ROUTER 2 ROUTER 2 DEC REM LPD RPT TEAR/SBM DRQ/LPD TEAR/SBM BYE functional element which supports public access into an administrative domain for the purposes of call completion or any other service that involves multimedia communication with other elements within the administrative domain. The border element controls the external view of the administrative domain. This element may exist in combination with other H.323 elements, for example a combination of border element, gatekeeper, and gateway. An administrative domain may contain any number of border elements. A border element will maintain templates for all the zones for which it is responsible. An address template ( template for short) defines a set of AliasAddress identifiers, pricing information to complete calls to those addreses, and the protocol to be used in reaching addresses in that set. An administrative domain advertises templates to indicate the calls it can resolve. Templates are grouped together by an identifier known as a descriptor. Template information may allow the aggregation of addressing information if the addressing scheme is arranged in some hierarchical or routable manner (for example, a given zone might handle *, meaning all telephone numbers that begin with ). These templates may be explicitly provisioned in the border element, or these templates may be formed by summarizing information obtained from gatekeepers within its domain. The border element may make this information available to other border elements via responses to requests. The clearinghouse holds addressing information for all administrative domains for which the clearinghouse provides service, in fact it stores templates from all domains. Examples of messages are: AccessRequest (sent by a border element to another border element to ask for resolution of a specific alias address) and AccessConfirmation, DescriptorRequest (allows an entity to query a border element for specific descriptors) and DescriptorConfirmation, Descriptor Update (is a border element s notification that address information has changed) and DescriptorUpdateAcknowledgement, UsageIndication (reports call details and usage information) and UsageConfirmation [6] inow! inow!, which stands for interoperability NOW!, is a broad-based, multi-vendor initiative established to quickly provide interoperability among IP telephony platforms. It was proposed by Lucent, VocalTec and ITXC and is based on Annex G specification. The following scenario shows some of the high-level process flows for call routing, call setup, call teardown
6 and call usage transmissions. Note that the border elements, as specified in Annex G, will be considered co-resident with the gatekeeper. Play collect req collect welcome userid destination 1 BE 1 Figure 9 The originating gateway prompts the caller for authentication and authorization information before requesting validation from its gatekeeper (ARQ message). After the gatekeeper has validated the user (ACF), the originating gateway prompts the caller for the destination number and contacts its gatekeeper for a termination gateway. The originating gatekeeper/border element looks it up in its database and determines that the call needs the clearinghouse to be completed. The border element then requests from the clearinghouse a list of possible termination gatekeepers or gateways (AccessRequest message). The clearinghouse generates the list using the templates, requests each border element and the gatekeeper on the list to generate a termination token for each appropriate termination gateway, and finally forwards the list with the tokens back to the origination gatekeeper (AccessConfirmation message) along with a clearinghouse token. The call originating gatekeeper initiates the call setup with the termination gatekeeper: after some Q.931 messages, the reverse and forward channels are established and starts. 1 digits ARQ ACF SETUP CallProceeding Facility Alerting Connect ReleaseComplete BE 1 AR AC SETUP AC CallProceeding reverse media channel usable Ringback tone Hello! AR Alerting Connect BE 2 forward media channel usable UI UC Goodbye! ReleaseComplete UI UC BE 2 ARQ ACF IRR 2 I 2 At the end of the call the gateway initiating the termination signals the end of the call to the other gateway and the call is terminated at both gateways. Each gatekeeper sends its Call Details Record (CDR) to the clearinghouse for settlement purposes [7]. 4 Conclusion We treated schematically the still evolving topic of interdomain communication. The considered problem has been faced in recent years by the main standardization bodies, which have proposed different solutions. In particular, we considered a star topology of administrative domains, which refer to a clearinghouse for all commercial relationships among them. We outlined two protocols used for the dialogue between domains and the third party. The first, the ETSI OSP (december1998) is distinguished by independence upon the signaling protocol used, H.323 or, so it was adopted by IETF as a support of its standard. ITU-T, months later, proposed Annex G as an appendix to its H.323 suite, in order to deal with the aspects of interdomain communication not previously considered. Comparing the two solutions, we observe that Annex G is limited to scenarios in which H323 is adopted, while OSP, independent of the standard used, represents a more general solution, and therefore it s an important step in the direction of a unique regolamentation in the fragmented world of IP telephony. References: [1] Uyless Black, Voice Over IP, Prentice Hall, 0. [2] [3] [4] ETSI Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON), Interdomain Pricing, Authorization, and Usage Exchange, TS v1.4.2, December [5] H. Sinnreich; S. Donovan; D. Rawlins; S. Thomas Interdomain IP Communications with QoS, Authorization and Usage Reporting. Internet Draft, March 0. [6] ITU Telecommunication Standardization Sector. Study Group 16, H Annex G, May ftp://standard.pictel.com/avc-site/9905_san/ [7] T. Anderson, D. Clowes, G. Freundlich, P. Gerhardt, and others, inow! Standards-Based Ip Telephony Interoperability Profile. Version 2, February 1999, Figure 10
Peer to Peer Settlement for Next Generation IP Networks Using the ETSI OSP Protocol (ETSI TS 101 321) for Cascading Peering Settlements
Peer to Peer Settlement for Next Generation IP s Using the ETSI OSP Protocol (ETSI TS 101 321) for Cascading Peering Settlements Table of Contents 1 Introduction... 1 2 Requirements... 2 3 The ETSI Open
More informationMaster Kurs Rechnernetze Computer Networks IN2097
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann
More informationTSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
More informationSIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
More informationMethods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
More informationAuthentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
More information1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
More informationVIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
More informationPacketizerTM. Overview of H.323 http://www.packetizer.com/voip/h323/papers/ Paul E. Jones. Rapporteur, ITU-T Q2/SG16 paulej@packetizer.
A resource for packet-switched conversational protocols Overview of H.323 http:///voip/h323/papers/ Paul E. Jones Rapporteur, ITU-T Q2/SG16 paulej@packetizer.com June 2004 Copyright 2004 Executive Summary
More informationThis specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
More informationSession Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
More informationInteroperability Test Plan for International Voice services (Release 6) May 2014
INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (i3 FORUM) Workstream Technical Aspects Workstream Operations Interoperability Test Plan for International Voice services (Release 6) May 2014 Interoperability
More informationMixer/Translator VOIP/SIP. Translator. Mixer
Mixer/Translator VOIP/SIP RTP Mixer, translator A mixer combines several media stream into a one new stream (with possible new encoding) reduced bandwidth networks (video or telephone conference) appears
More informationABOUT AT&T GLOBAL CLEARINGHOUSE
ABOUT AT&T GLOBAL CLEARINGHOUSE Established in 1998, AT&T Global Clearinghouse (GCH) is the industry's first carrier-grade VoIP clearinghouse. The clearinghouse service enables ISPs to quickly establish
More informationEXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)
More informationSession Initiation Protocol (SIP)
Session Initiation Protocol (SIP) An Alcatel Executive Briefing August, 2002 www.alcatel.com/enterprise Table of contents 1. What is SIP?...3 2. SIP Services...4 2.1 Splitting / forking a call...4 2.2
More informationHow To Interwork On An Ip Network
An Overview of - Interworking 2001 RADVISION. All intellectual property rights in this publication are owned by RADVision Ltd. and are protected by United States copyright laws, other applicable copyright
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationNTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: chgan@csie.nctu.edu.tw Date: 2006/05/02 1 Outline Introduction NTP VoIP
More informationOverview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
More informationA Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
More informationVoice over IP (VoIP) Part 2
Kommunikationssysteme (KSy) - Block 5 Voice over IP (VoIP) Part 2 Dr. Andreas Steffen 1999-2001 A. Steffen, 10.12.2001, KSy_VoIP_2.ppt 1 H.323 Network Components Terminals, gatekeepers, gateways, multipoint
More informationBy Paolo Galtieri The public switched telephone network The Internet Convergence
By Paolo Galtieri This article provides an overview of Voice over Internet Protocol (VoIP), one of the many applications taking advantage of the enormous growth of the Internet over the last several years.
More informationA Comparison of H.323 vs SIP
A Comparison of vs SIP Pavlos Papageorgiou pavlos@eng.umd.edu University of Maryland at College Park June 4, 2001 Unpublished and incomplete manuscript. Missing experiments. Contents 1 Introduction 1 1.1
More information3GPP TS 24.623 V8.1.0 (2008-09)
TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol
More informationUser authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
More informationApplication Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
More informationUK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
More informationEE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationMODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM
MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,
More informationNeed for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
More informationVOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS
VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS Master of Science in Networking and Data Communications THESIS Thesis Title Voice over IP (VoIP) to Enterprise Users Dissertation submitted
More informationMedia Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationSIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
More informationApplication Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the
More informationSecuring SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
More information(Refer Slide Time: 6:17)
Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol
More informationInternet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
More informationAvancerede Datanet VoIP
Avancerede Datanet VoIP Ole Brun Madsen Professor University of Aalborg Avancerede Datanet VoIP 1 Voice over IP (VoIP) IP telephony switches enable voice calls to be made within Protocol (IP) networks,
More informationApplication Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
More informationApplication Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring
More informationStatus Report on IP/Telecommunications Interworking
GSC#5/RAST#8 Williamsburg, Virginia, USA 23-26 August 1999 GSC5 (99) 32 SOURCE: TITLE: Committee T1 Status Report on IP/Telecommunications Interworking AGENDA ITEM: 10.6 DOCUMENT FOR: Decision Discussion
More informationPacketized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
More informationChapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
More informationACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source
More informationApplication Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationContents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
More informationSoftware Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
More informationA Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network
A Telephone Domain Name System (T-DNS) for Telephony Service at All IP Network o Mi-Ryong Park, Chang-Min Park, and Jong-Hyup Lee Router Technology Department, Network Research Lab., ETRI 161 Kajong-Dong,
More informationSpecial Module on Media Processing and Communication
Special Module on Media Processing and Communication Multimedia Communication Fundamentals Dayalbagh Educational Institute (DEI) Dayalbagh Agra PHM 961 Indian Institute of Technology Delhi (IITD) New Delhi
More informationAnalysis of Call scenario in NGN network
Analysis of Call scenario in NGN network Skënder Rugova, Arianit Maraj Post and telecommunication of Kosova-PTK NGN network department PRISHTINA-REPUBLIC OF KOSOVA arianit.maraj@ptkonline.com,skender.rugova@ptkonline.com
More informationUnit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
More informationReceiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
More informationImplementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More informationA Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationApplication Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
More informationPart II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: acpang@csie.ntu.edu.tw
More informationPSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
More information3 The Network Architecture
SIP-H323: a solution for interworking saving existing architecture G. De Marco 1, S. Loreto 2, G. Sorrentino 3, L. Veltri 3 1 University of Salerno - DIIIE- Via Ponte Don Melillo - 56126 Fisciano(Sa) Italy
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationIntroduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols
Introduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols SS7 is a set of telephony signaling protocols that are used to set up
More informationChapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
More informationLifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
More informationClearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
More informationVOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet
VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet 1 Outlines 1. Introduction 2. QoS in VoIP 3. H323 4. Signalling in VoIP 5. Conclusions 2 1. Introduction to VoIP Voice
More informationTechnical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks
Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Huawei Technologies Co., Ltd. All rights reserved. Contents Contents 1 Overview... 1 2 H.323...
More informationof the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
More informationAn Introduction to Voice over the IP. Test1 Pool Questions
Dr. Mona Cherri Business and Technology North Lake College/DCCCD An Introduction to Voice over the IP I. True and False Questions Test1 Pool Questions 1. The first Internet-telephony software, Internet
More informationSIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
More informationVoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion
VoIP Jakob Aleksander Libak jakobal@ifi.uio.no 1 Overview Introduction Pros and cons Protocols Services Conclusion 2 1 Introduction Voice over IP is routing of voice conversations over the internet or
More information5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
More informationQuality of Service Testing in the VoIP Environment
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
More informationIntegrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
More informationLow Investment, High Returns
Leveraging Standards for Low Investment, High Returns Out of the box clearinghouse billing system uses OSP to capture new VoIP traffic, provide low cost termination, and generate new revenue streams. The
More informationALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationAN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL
AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL João Paulo Sousa Instituto Politécnico de Bragança R. João Maria Sarmento Pimentel, 5370-326 Mirandela, Portugal + 35 27 820 3 40 jpaulo@ipb.pt Eurico Carrapatoso
More informationSIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
More informationTrait-based Authorization Mechanisms for SIP Based on SAML
Trait-based Authorization Mechanisms for SIP Based on SAML Douglas C. Sicker, University of Colorado Boulder Hannes Tschofenig, Siemens Jon Peterson, Neustar Abstract - This paper presents a method for
More informationInformation Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
More informationImplementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
More informationApplication Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationInternet Communications Using SIP
Internet Communications Using SIP Delivering VolP and Multimedia Services with Session Initiation Protocol John Wiley & Sons, Inc. NEW YORK CHICHESTER WEINHEIM BRISBANE SINCAPORE TORONTO Contents Foreword
More informationComparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios
An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice
More informationSession Border Controller
CHAPTER 13 This chapter describes the level of support that Cisco ANA provides for (SBC), as follows: Technology Description, page 13-1 Information Model Objects (IMOs), page 13-2 Vendor-Specific Inventory
More informationDifferentiated Services
March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: chaffee@bmrc.berkeley.edu URL: http://bmrc.berkeley.edu/people/chaffee 1 Outline Architecture
More informationSIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
More informationAn End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks
An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks Ala Khalifeh Department of EECS University of California, Irvine [akhalife]@uci.edu Abstract in this paper, we present
More informationThis topic describes dial peers and their applications.
Dial Peers What is Dial Peer? This topic describes dial peers and their applications. What is a Dial Peer? A dial peer is an addressable call endpoint. Dial peers establish logical connections, called
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationDistrict of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
More informationNATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
More informationEarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking NEC SV8100 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011
More information