陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 所 TEL: # 340

Size: px
Start display at page:

Download "陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340"

Transcription

1 Advanced Issues- Wireless VoIP, IPv6 and Security 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 所 TEL: # 340

2 Outline Wireless VoIP IPv6 Solutions and Transition SIP Security 2

3 Wireless VoIP

4 Introduction to wireless VoIP Voice over Wireless LAN expands the capability of Wireless LANs Wireless VoIP is a natural extension of VolP Wireliess VoIP is the added feature which will enable users to make phone calls using this mobile internet access 4

5 Introduction to wireless VoIP VoIP and Wireless LAN VoIP SIP, RTP, H.323 Wireless LAN WiFi : a/b/g WiMAX :

6 Introduction to wireless VoIP Wireless VoIP Protocol stack 6

7 Why wireless VoIP? Low cost Free Charge of ISM Band ISM band : free ( GHz) 3G band : NTD 10 Billion Inexpensive network deployment Reuse of existing network, and easy to setup Low cost of Access Point VS. High cost of Base Station 7

8 Why wireless VoIP? Low complexity Centralized architecture in cellular network PBX contains most intelligence of the network Hard to maintain the proprietary system Decentralized architecture in VoIP network Intelligence are implemented in User Agent Easy for maintenance 8

9 Why wireless VoIP? Low transmission power Small coverage of the AP, small transmission power needed GSM: 500mW ~ 2W WLAN: < 100mW Easy for providing value-added service Voice and data service is integrated into VoIP Flexibility of SIP protocol 9

10 Why wireless VoIP? Market trend Voice over WLAN market will reach $507 million (end user revenue) by 2007 (In Stat/MDR) Voice over WLAN handset will grow by more than 89 percent annually until 2007 when there will be more than 653,000 (On world) 10

11 Requirements of wireless VoIP Performance Voice quality must be as well as wired network Delay >100 ms is sensible by human Low latency : <50 ms latency is recommended Reliable transmission over wireless channel Low packet lost rate User mobility management Support roaming between wireless network 11

12 Requirements of wireless VoIP Capacity management Heavy traffic load increase packet lost rate and latency Number of Users must be controlled Channel assignment 11 channels in b Manage operating channel among adjacent Access Point 12

13 Requirements of wireless VoIP Security Data ciphering Wireless channel is insecure Data over wireless should be protected AAA Authentication : legal user identification Authorization : different service levels Accounting : billing statistics ti ti Location Tracking 13

14 Challenges of wireless VoIP Due to the requirements of wireless VoIP, several issue should be solved User Mobility Issue Power Consumption Issue Security Issue QoS Issue Capacity Issue Other Related Issue 14

15 Challenges of wireless VoIP User mobility User mobility is an important feature of wireless VoIP Concern on two factors Handoff latency Packet lost rate Seamless handoff Fast handover : reducing handoff latency Smooth handover : reducing packet loss during handoff 15

16 Challenges of wireless VoIP Power consumption issue Limited battery power available at mobile device System CPU, Memory, LCD, DSP/Codec WLAN Physical Layer: Radio Frequency MAC Layer: a/b/g, , and Network Layer: TCP/IP 16

17 Challenges of wireless VoIP Security issue Data ciphering WEP, i AAA (Authentication, Authorization, Accounting) 802.1x, RADIUS, DIAMETER 17

18 Challenges of wireless VoIP QoS issue Voice quality is depend on the delay and loss rate of packets No QoS guarantee in legacy DCF, since each mobile device contends for the channel by using CSMA/CA There are some proprietary QoS schemes proposed, but QoS is still an open issue 18

19 Challenges of wireless VoIP Capacity Issue Voice quality is a key component of voice service (realtime, high throughput) CSMA/CA mechanism limits the max number of subscribers under the AP A VoIP streams typically requires less than 10Kbps Ideally, the number of simultaneously VoWLAN sessions is 11M / (10K * 2) = 550 However, the maximum number of fvoip sessions is about t12 if GSM 6.10 (13.2Kbps) is used 19

20 Challenges of wireless VoIP Other Related Issue Codec Compression The ability to maximize the wireless bandwidth for voice, intelligent use of compression codec is important. Often require hardware assist, the target device is hardware dependent and needs to be specially designed 20

21 Challenges of wireless VoIP Other Related Issue Combine WLAN and Cellular WLAN High bandwidth, Low Cost, Multimedia Service, Video Phone Cellular Large Coverage, High Mobility, Mature Billing System, Popularity 21

22 Challenges of wireless VoIP Other Related Issue Combine WLAN and Cellular 22

23 Summary for Wireless VoIP The existing wireless VoIP solutions may not be robust and reliable enough to support deployment for a large base of users QoS of wireless VoIP is always an open issue Security and Capabilities for fast handoff between APs still needs improvement 23

24 IPv6 Solutions and Transition

25 IP Header [1/2] Version 4 Header Length Type of Service Total Length Identification, Flags, and Fragment Offset TTL A datagram can be split into fragments Identify data fragments Flags a datagram can be fragmented or not Indicate the last fragment A number of hops (not a number of seconds) 25

26 IP Header [2/2] Protocol The higher-layer protocol TCP (6); UDP (17) Source and Destination IP Addresses 26

27 IP Version 6 The explosive growth of the Internet IPv4 address space, 32-bit Real-time and interactive applications Expanded address space, 128 bits Simplified header format Enabling easier processing of IP datagrams Improved support for headers and extensions Enabling greater flexibility for the introduction of new options Flow-labeling capability Btt Better support at tthe IPlevel lfor real-time lti app. Authentication and privacy 27

28 IPv6 Header [1/3] 28

29 IPv6 Header [2/3] Version 6 Traffic Class, 8-bit For the quality of service Flow Label, 20-bit Label sequences of packets that belong to a single flow A flow := source address, destination address, flow label 29

30 IPv6 Header [3/3] Payload Length, 16-bit unsigned integer The length of payload in octets Header extensions are part of the payload Next Header, 8-bit The next higher-layer h protocol Same as the IPv4 The existence of IPv6 header extensions Hop Limit, 8-bit unsigned integer The TTL field of the IPv4 header Source and Destination Addresses, 128-bit 30

31 IPv6 addresses XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XX XX:XXXX X is a hexadecimal character E.g., 1511:1:0:0:0:FA22:45:11 The symbol :: can be used to represent a number of contiguous fields with zero values. = 1511:1::FA22:45: :0:0:0:AA11:50:22:F77 = ::AA11:50:22:F77 :: can appears only once 31

32 IPv6 special addresses The all-zeros address, :: An unspecified address; a node does not yet know its address The loopback address, ::1 On a virtual internal interface IPv6 address with embedded IPv4 address (type 1) 96-bit zeros + 32-bit IPv4 address :: Used by IPv6 hosts and routers that tunnel IPv6 packets through an IPv4 infrastructure IPv6 address with embedded IPv4 address (type 2) 80-bit zeros + FFFF + 32-bit IPv4 address 0:0:0:0:0:FFFF: ::FFFF: Applied to nodes that do not support IPv6 32

33 IPv6 Header Extensions To be placed between the fixed header and the actual data payload Next Header The type of payload carried in the IP datagram The type of header extension Each extension has its own next header field. 33

34 Header extension Use the next header field 34

35 UDP Client/Server Programming g UDP Client UDP Server socket socket sendto recvfrom data data bind recvfrom sendto close/ closesocket close/ closesocket These functions are the same for both IPv4 and IPv6. 35

36 IPv4/IPv6 Socket Parameter Mapping Socket 參 數 名 稱 轉 換 IPv4 IPv6 AF_INET AF_INET6 PF_INET PF_INET6 IN_ADDR_ANY inaddr6_any 36

37 IPv4/IPv6 Data Structure Mapping 資 料 結 構 轉 換 IPv4 in_addr IPv6 in6_addr sockaddr sockaddr_in6 sockaddr_in sockaddr_in6 37

38 IPv4/IPv6 Data Structure Mapping 資 料 結 構 參 數 轉 換 IPv4 sin_len sin_family sin_port IPv6 sin6_len sin6_family sin6_port sin_addr sin6_addr s_addr s6_addr 38

39 Domain Name and IP Conversion APIs 函 式 轉 換 Name-to-address Functions IPv4 inet_aton() inet_addr() inet_ntoa() IPv6 inet_pton() inet_ntop() Address conversion Functions gethostbyname() gethostbyaddr() getipnodebyname() getipnodebyaddr() getnameinfo() getaddrinfo() 39

40 Results of Using Checkv4.exe 40

41 IPv4 SIP User Agent Provided by CCL/ITRI and NTPO SIP-based VoIP phone running on Windows Support H.263 Video codec Support G.711u/G.711a/G.723/G.729 Audio codecs Support registration Support authentication 41

42 GUI Problem IP Address Control IPv4 specified Do not accept domain name and IPv6 The Variable-length l Input Component (A) (B) 42

43 Get Local Address SIP User Agent should provide the IPv4 and IPv6 address of the local host. The IPHelper functions Microsoft Windows system provides this function from Windows 98 This solution works on both Windows XP and 2003 I It s a Windows-only solution Function name: GetAdaptersAddresses() 43

44 Parsing IPv6 URI in SIP and SDP IPv4 SIP URI IPv6 SIP URI IPv4 parser assumes that semicolon is used to separate the IP address and port number, and the SIP parser in SIP and SDP protocol stacks should be modified to process IPv6 address and port number. IP6 address type and IPv6 address in Session Description Protocol (SDP) c=in IP6 FE80:60::2 44

45 IPv6 Link-local Address Problem Link-local IPv6 address with scope-id E.g. fe80::201:2ff:fe85:37ed%3 Used by link-local local address Identify the same address on different interface Scope-id must be specified when connecting to sites using link-local address An extra parameter should be added in the data structure 45

46 Porting IPv4 SIP UA to IPv6 Results IPv4 SIP UA contains about 100,000-line codes in 150 files. We change about 600-line codes in 39 files. About 300-line codes are not identified by checkv4.exe SIPv6 UA supports IPv4 or IPv6 communication IPv6 address in SIP and SDP IPv6 address in GUI 46

47 Result: A SIPv6 User Agent 4.Video Using IPv6 Addresses 1.Configuration SIPv6 UA 4. RTP 4Vid 4.Video 3.1 INVITE OK 3.7 ACK IPv6 Network (Showroom) 2.Dialing Dual-stack Router Tunneling 3.2 INVITE OK 3.8 ACK 4. RTP 圖 例 : Internet (IPv4) SIP Signaling (IPv6) SIP Signaling (Tunnel) Dual-stack Router 3.3 INVITE OK 3.9 ACK IPv6 Network SIPv6 UA 4. RTP (NCTU VoIP Lab) 47

48 Why we need to modify our applications? v4/v6 Protocol-independent IPv4 APP. IPv6 APP. Application WinSock WinSock TCP/UDP TCP/UDPv6 Dual Stack IPv4 IPv6 Host TCP/UDP IPv4 TCP/UDPv6 IPv6 PHY & MAC PHY & MAC AF_INET AF_INET6 Some Socket APIs, parameters and data structures of IPv6 are different from that of IPv4 and should be modified. 48

49 Socket-layer Translator (SLT) IPv4 Applications Function Mapper Address Mapper Name Resolver Users can access IPv6 resources through IPv4 applications and SLT. 49

50 Address Translation Example: Originator Dual Stack Host6 DNS IPv4 app. Extension Name Resolver Address Mapper Translator IPv6 Resolve an IPv4 address for host6 Query A Query A and AAAA for host6 Reply only with AAAA Request one IPv4 address (internal IPv4 address allocation) Reply with the IPv4 address Reply with the A record Send an IPv4 packet to Host6 An IPv4 packet Request IPv6 address Reply with the IPv6 address Translation (v4->v6) Translate IPv4 to IPv6 An IPv6 Packet An IPv6 packet ( Reply) Request IPv4 address Reply with the IPv4 address Translate IPv6 into IPv4 An IPv4 packet Translation (v6->v4) 50

51 Address Translation Example: Recipient Dual Stack Host6 IPv4 app. Extension Name Resolver Address Mapper Translator IPv6 Receive a data from host6 An IPv6 packet Request IPv4 address from table Reply with the IPv4 address Translate IPv6 to IPv4 header An IPv4 packet Translation (v6->v4) Reply an IPv4 data to host6 An IPv4 reply packet Request IPv6 address from table Reply with the IPv6 address Translation (v4->v6) Translate v4 packet to v6 An IPv6 packet 51

52 SIPv6 Translator Through manual modification and Socket-layer Translator, we have IPv6 SIP UAs (SIPv6 UAs). However, only using SIPv6 UAs, which can utilize rich IPv6 addresses, does NOT solve the IP address shortage problem in VoIP deployment, because a SIPv6 UA cannot communicate with a SIPv4 UA (e.g. CISCO7960). To solve this problem, we develop a SIPv6 Translator based on the architecture proposed p in IETF RFC 2766 (Network Address Translation and Protocol Translation, NAT-PT). The SIPv6 Translator is a gateway between IPv6 and IPv4 networks. The SIPv6 Translator can translate not only the IP headers but also the application-layer headers (e.g. SIP and SDP). 52

53 NAT-PT with DNS-ALG DNS1 DNS 3ffe:3600:1::2 IPv6 Network DNS-ALG Translator DNS2 DNS IPv4 Network UA1 The NAT-PT translator configuration UA2 3ffe:3600:1::3 Address Pool: ua1.ipv6.nctu.edu.tw NAT-PT Prefix: 3ffe:3600:2::/96 ua2.ipv4.nctu.edu.tw tw 53

54 NAT-PT operations with DNS-ALG (IPv6 IPv4) IPv4) IPv6 Network IPv4 Network DNS-ALG UA1 DNS1 + DNS2 UA2 NAT-PT DNS Query (AAAA) DNS Query (AAAA) DNS Query (A) 1.4 DNS Response (A) DNS Response (AAAA) DNS Response (AAAA) 1.9 ICMPv6 Message (MAC Address Query) 1.10 ICMPv6 Message (MAC Address Response) 1.11 IPv6 Packet 1.12 ARP Message (MAC Address Query) ARP Message (MAC Address Response) IPv4 Packet 54

55 NAT-PT operations with DNS-ALG (IPv4 IPv6) IPv6) UA1 IPv6 Network DNS1 IPv4 Network DNS-ALG + NAT-PT DNS2 UA2 DNS Query (A) 2.2 DNS Query (A) DNS Query (AAAA) 2.5 DNS Response (AAAA) DNS Response (A) DNS Response (A) ARP Message (MAC Address Query) ARP Message (MAC Address Response) ICMPv6 Message (MAC Address Query) IPv4 Packet ICMPv6 Message (MAC Address Response) 2.14 IPv6 Packet 55

56 System Architecture of SIPv6 Translator IPv6-IPv4 Address Mapping SIIT Component ALG: Application Level Gateway DNS: Domain Name Service SIP: Session Initiation Protocol NIC: Network Interface Controller SIIT: Simple IP and ICMP Translation; see IETF RFC 2765 NAT-PT: Network Address Translation and Protocol Translation; see IETF RFC

57 IPv4/IPv6 Translation for Registration UA3 SIP-ALG SIPv4 Server 3.1 REGISTER sip.ipv4.nctu.edu.tw Via: SIP/2.0/UDP [3ffe:3600:1::4]:5060 To: [3ffe:3600:1::3]:5060> 3.2 REGISTER sip.ipv4.nctu.edu.tw Via: SIP/2.0/UDP :5061 To: :5061> OK Via: SIP/2.0/UDP : OK To: 4 t Via: SIP/2.0/UDP [3ffe:3600:1::4]:5060 From:<sip:3456@ipv4.nctu.edu.tw> To: <sip:1234@ipv4.nctu.edu.tw> Contact:<sip:1234@ :5061> From:<sip:3456@ipv4.nctu.edu.tw> Contact:<sip:1234@ [3ffe:3600:1::3]:5060> IPv6 Network IPv4 Network 57

58 IPv4/IPv6 Translation for INVITE Transaction (IPv4->IPv6) IPv6 Network IPv4 Network SIP-ALG UA1 NAT-PT SIPv4 Server UA2 4.3 INVITE Via: SIP/2.0/UDP [3ffe:3600:2:: ]:5060 Via: SIP/2.0/UDP : INVITE Via: SIP/2.0/UDP :5060 Via: SIP/2.0/UDP :5060 Contact: c=in IP d / Contact: t <sip:5678@sip.ipv4.nctu.edu.tw> i i t m=audio 9000 RTP/AVP c=in IP6 3ffe:3600:2:: m=audio 9000 RTP/AVP INVITE sip:1234@sip.ipv4.nctu.edu.tw Via: SIP/2.0/UDP :5060 Contact: <sip:5678@sip.ipv4.nctu.edu.tw> c=in IP m=audio 9000 RTP/AVP OK Via: SIP/2.0/UDP / [3ffe:3600:2:: ]:5060 Via: SIP/2.0/UDP :5060 Contact: sip:1234@sip.ipv4.nctu.edu.tw c=in IP6 3ffe:3600:1::3 m=audio 9000 RTP/AVP OK Via: SIP/2.0/UDP :5060 Via: SIP/2.0/UDP :5060 Contact: <sip:1234@sip.ipv4.nctu.edu.tw> c=in IP m=audio 9002 RTP/AVP OK Via: SIP/2.0/UDP :5060 Contact: <sip:1234@sip.ipv4.nctu.edu.tw> c=in IP m=audio 9002 RTP/AVP ACK sip:1234@[3ffe:3600:1::3]:5060 Via: SIP/2.0/UDP [3ffe:3600:2:: ]:5060 Via: SIP/2.0/UDP :5060 Contact: <sip:5678@sip.ipv4.nctu.edu.tw> 4.8 ACK sip:1234@ :5061 Via: SIP/2.0/UDP : :5060 Via: SIP/2.0/UDP :5060 Contact: <sip:5678@sip.ipv4.nctu.edu.tw> 4.7 ACK sip:1234@sip.ipv4.nctu.edu.tw Via: SIP/2.0/UDP :5060 Contact: <sip:5678@sip.ipv4.nctu.edu.tw> i i 58

59 SIPv6 Analyzer Control Panel Packet List Protocol Parser (using Ethereal parser) Hex Dump 59

60 SIP Viewer Call-ID From To SIP Flowchart SIP Dialog Collection SIP Viewer automatically collect SIP messages. SIP Flowchart from Headers 60

61 RTP Viewer RTP Viewer can play back Video and Voice! Yueh-Hsin Sung RTP Session List Video Playback Video and Voice Control Panel RTP Viewer automatically collect RTP packets according to the SDP c and m fields. 61

62 The IPv6 SIP-based VoIP Deployment XXX is assign to IPv6 network XXX is assign to IPv4 network. The forwarding rules are set in the SIP proxies. 62

63 The IPv6 and IPv4 SIP Environment PSTN Speaker Phone (PSTN) Snom 200 CISCO 7940 Pingtel Windows Messenger SIPv6 Translator &SIP SIPv6 6Analyzer SIPv6 UA (implemented by NCTU VoIP Lab) 63

64 The PSTN Gateways CISCO 2621XM Gateway Vontel Gateway (implemented by ITRI/CCL Taiwan) 64

65 The Interoperability Test Results SIP Message SDP Message Request URI Contact Via From To c m o IP Soft Phone CCL Skin UA Windows Messenger IP Hard Phone PingTel snom 200 Cisco IP Phone 7940 Series PSTN Gateway Vontel PSTN Gateway Cisco PSTN Gateway The SIPv6 UA developed by NCTU can communicate with all of the commercial IPv4 SIP UAs through the SIPv6 Translator. The IPv4 SIP UAs are deploy in the NTP VoIP platform. 65

66 SIP Security

67 SIP Security SIP communications are susceptible to several types of attacks. The simplest attack in SIP is snooping, which permits an attacker to gain information on users identities, services, media, network topology, and so on. 67

68 SIP Security SIP messages may contain information a user or server wishes to keep private. The headers can reveal information about the communication patterns and content of individuals, or other confidential information. The SIP message body may also contain user information (media type, codec, addresses and ports, etc.) that should not tbe revealed. 68

69 SIP Security Securing SIP header and body information can be motivated by two different reasons: Maintain private user and network information in order to guarantee a certain level of privacy Avoiding SIP sessions being set up or changed by someone faking the identity of someone else 69

70 SIP Security The mechanisms that provide security in SIP can be classified as end-to-end or hop-by-hop protection. Edt End-to-end dmechanisms involve the caller and/or callee SIP user agents and are realized by features of the SIP protocol specifically designed for this purpose (e.g., SIP authentication and SIP message body encryption). Hop-by-hop p mechanisms secure the communication between two successive SIP entities in the path of signaling messages. 70

71 SIP Security SIP does not provide specific features for hop-by- hop protection and relies on network-level (IPsec) or transport-level security y( (TLS). Hop-by-hop mechanisms are needed because intermediate elements may play an active role in SIP processing by reading and/or writing some parts of the SIP messages. 71

72 SIP Security End-to-end security cannot apply to these parts of messages that are read/written by intermediate SIP entities. 72

73 SIP Security Two main security mechanisms are used with SIP: Authentication Data encryption 73

74 SIP Security Data authentication is used to authenticate the sender of the message, and to ensure that some critical message information was unmodified in transit. This is to prevent an attacker from modifying and/or replaying SIP requests and responses. 74

75 SIP Security SIP makes use of Proxy-Authenticate,, Proxy- Authorization, Authorization, and WWW- Authenticate header fields, similar to those of HTTP, for authentication of the end system by means of a digital signature. Instead, hop-by-hop authentication can be performed using transport- or network-layer authentication protocols such as TLS or IPsec. 75

76 SIP Security Data encryption is used to ensure confidentiality of SIP communications, letting only the intended recipient decrypt and read the data. This is usually done using encryption algorithms such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). 76

77 SIP Security SIP supports two forms of encryption: end-to-end hop-by-hop 77

78 SIP Security End-to-end encryption provides confidentially for all information (some SIP headers and the message body) that does not need to be read by intermediate proxy servers. End-to-end encryption is performed by S/MIME mechanisms. 78

79 SIP Security Hop-by-hop pencryption of whole SIP messages can be used in order to protect the information that should be accessed by intermediate entities, such us From, To, and Via headers. Encryption of such information can prevent malicious users from determining who calls who, or accessing route information. 79

80 SIP Security Hop-by-hop pencryption can be performed by security mechanisms external to SIP (IPsec or TLS). 80

81 SIP Security IPsec is a network layer mechanism that can be used to introduce security directly at the IP layer. Usually IPsec is used to provide security based on network node identity, and this is done independently by the SIP architecture. 81

82 SIP Security For this reason, IPsec can be used in SIP mainly between SIP entities that have a preconfigured and quite static security association (e.g., servers within the same IP telephony provider). 82

83 SIP Security TLS provides transport-layer security over connection-oriented protocols (TCP), and it is suited to architectures in which hop-by-hop psecurity is required between hosts with a more dynamic security association. 83

84 SIP Security Note that if a user agent uses IPsec or TLS to send SIP requests to a proxy server (hop by hop), this does not guarantee that secure transport will be used on the rest of the end-to-end path. 84

85 SIP Security The most recent version of the SIP specification includes a way to specify that a resource (e.g., a server or user) should be reached securely using TLS. In particular, the address of a user is normally defined in SIP using a SIP uniform resource identifier (URI) in the form of sip:hsn@ndhuee.com. 85

86 SIP Security If a user address is expressed using a new type of URI, a SIP Secure (SIPS) URI (sips:hsn@ndhuee.com), it means that the use of TLS is requested. The security mechanisms must be combined properly to obtain a trusted network scenario. 86

87 SIP Security An example of this combination: 87

88 SIP Security The Authentication Procedure in SIP: The SIP authentication procedure is derived from HTTP Digest authentication It is a challenge-based mechanism when a server receives a request, it may challenge the initiator of the request to provide assurance of its identity. 88

89 SIP Security Digest authentication: 89

IPv4/IPv6 Transition for SIP VoIP Applications

IPv4/IPv6 Transition for SIP VoIP Applications IPv4/IPv6 Transition for SIP VoIP Applications Dr. Whai-En Chen Research Assistant Professor Department of Computer Science National Chiao Tung University, Taiwan 300, R.O.C. TEL: +886-3-5731924 FAX: +886-3-5716929

More information

IPv6/IPv4 Translation for SIP Applications- Socket-Layer Translator and SIPv6 Translator

IPv6/IPv4 Translation for SIP Applications- Socket-Layer Translator and SIPv6 Translator IPv6/IPv4 Translation for SIP Applications- Socket-Layer Translator and SIPv6 Translator Whai-En Chen Research Assistant Professor Department of Computer Science and Information Engineering National Chiao

More information

NTP VoIP Platform: A SIP VoIP Platform and Its Services

NTP VoIP Platform: A SIP VoIP Platform and Its Services NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: chgan@csie.nctu.edu.tw Date: 2006/05/02 1 Outline Introduction NTP VoIP

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Porting applications & DNS issues. socket interface extensions for IPv6. Eva M. Castro. ecastro@dit.upm.es. dit. Porting applications & DNS issues UPM

Porting applications & DNS issues. socket interface extensions for IPv6. Eva M. Castro. ecastro@dit.upm.es. dit. Porting applications & DNS issues UPM socket interface extensions for IPv6 Eva M. Castro ecastro@.upm.es Contents * Introduction * Porting IPv4 applications to IPv6, using socket interface extensions to IPv6. Data structures Conversion functions

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

SIP-based VoIP Deployment in Taiwan

SIP-based VoIP Deployment in Taiwan SIP-based VoIP Deployment in Taiwan Aaron Solomon (a.k.a. Dr. Quincy Wu in Taiwan) TWAREN solomon@ipv6.club.tw 2004.01.29 1 Outline Introduction to TWAREN NTP SIP-based VoIP Platform Plans of VoIP Working

More information

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

Overview of Voice Over Internet Protocol

Overview of Voice Over Internet Protocol Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Media Gateway Controller RTP

Media Gateway Controller RTP 1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Integrating Voice over IP services in IPv4 and IPv6 networks

Integrating Voice over IP services in IPv4 and IPv6 networks ARTICLE Integrating Voice over IP services in IPv4 and IPv6 networks Lambros Lambrinos Dept.of Communication and Internet studies Cyprus University of Technology Limassol 3603, Cyprus lambros.lambrinos@cut.ac.cy

More information

Software changes for Website and Application IPv6 Readiness

Software changes for Website and Application IPv6 Readiness Software changes for Website and Application IPv6 Readiness Ahmed Abu-Abed, P.Eng. Tamkien Systems ahmed@tamkien.com 1 Agenda Introduction Enabling Website IPv6 and Forum Certification Intro to Socket

More information

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. Tasuka@Tailyn.com.tw

VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. Tasuka@Tailyn.com.tw VoIP with SIP Session Initiation Protocol RFC-3261/RFC-2543 Tasuka@Tailyn.com.tw 1 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy

More information

SIP, Session Initiation Protocol used in VoIP

SIP, Session Initiation Protocol used in VoIP SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

802.11: Mobility Within Same Subnet

802.11: Mobility Within Same Subnet What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple

More information

Mike Saywell and Tim Chown University of Southampton, UK ms@ecs.soton.ac.uk, tjc@ecs.soton.ac.uk Global IPv6 Summit, Madrid, 12 th May 2003

Mike Saywell and Tim Chown University of Southampton, UK ms@ecs.soton.ac.uk, tjc@ecs.soton.ac.uk Global IPv6 Summit, Madrid, 12 th May 2003 Mike Saywell and Tim Chown University of Southampton, UK ms@ecs.soton.ac.uk, tjc@ecs.soton.ac.uk Global IPv6 Summit, Madrid, 12 th May 2003 IPv6 s primary advantage is address space Global addresses re-enable

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

Internet Technology Voice over IP

Internet Technology Voice over IP Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

EE4607 Session Initiation Protocol

EE4607 Session Initiation Protocol EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional

More information

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX

More information

Aculab digital network access cards

Aculab digital network access cards Aculab digital network access cards Adding and Using IPv6 Capabilities Guide Revision 1.0.2 PROPRIETARY INFORMATION Aculab Plc makes every effort to ensure that the information in this document is correct

More information

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars

More information

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340 Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

SIP Trunking and Voice over IP

SIP Trunking and Voice over IP SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

How to make free phone calls and influence people by the grugq

How to make free phone calls and influence people by the grugq VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

Windows Socket Programming & IPv6 Translation Middleware

Windows Socket Programming & IPv6 Translation Middleware Windows Socket Programming IPv6 Translation Middleware Dr. Whai-En Chen VoIP and IPv6 Laboratory Research Assistant Professor Dept. of Computer Science and Information Engineering National Chiao Tung University

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia

More information

AV@ANZA Formación en Tecnologías Avanzadas

AV@ANZA Formación en Tecnologías Avanzadas SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and

More information

Internet Services & Protocols Multimedia Applications, Voice over IP

Internet Services & Protocols Multimedia Applications, Voice over IP Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dipl.-Inform. Stephan Groß Room: GRU314

More information

NTP VoIP Platform: A SIP VoIP Platform and Its Services 1

NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,

More information

IPv4/IPv6 Translation Technology

IPv4/IPv6 Translation Technology / Translation Technology V Masaki Nakajima V Nobumasu Kobayashi (Manuscript received December 24, 2003) The ubiquitous network society in which anyone can connect to the Internet and enjoy services anytime,

More information

Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007.

Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007. Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255 SIP Traversal over NAT 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255 Outline Introduction to SIP and NAT NAT Problem Definition NAT Solutions on NTP VoIP

More information

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application

More information

gianluca.verin verin@libero. @libero.itit Vicenza.linux.it\LinuxCafe 1

gianluca.verin verin@libero. @libero.itit Vicenza.linux.it\LinuxCafe 1 gianluca.verin verin@libero. @libero.itit Vicenza.linux.it\LinuxCafe 1 Agenda IPv6 Basics Connecting to 6Bone Why do we need IPv6? IPv6 Introduction-Transition IPv6 and open source community Future applications

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete pgrosset@cisco.com Dennis Vogel dvogel@cisco.com 2 Agenda Native security in IPv6 IPv6 challenges

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

Unit 23. RTP, VoIP. Shyam Parekh

Unit 23. RTP, VoIP. Shyam Parekh Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks Voice over IP Introduction VoIP Voice over IP The use of IP networks, namely the LAN and WAN, to carry voice Voice was originally carried over circuit switched networks PSTN (Public Switch Telephone Network)

More information

Internet Services & Protocols Multimedia Applications, Voice over IP

Internet Services & Protocols Multimedia Applications, Voice over IP Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

Firewalls und IPv6 worauf Sie achten müssen!

Firewalls und IPv6 worauf Sie achten müssen! Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG pascal.raemy@asecus.ch Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)

More information

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched

More information

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Voice over IP Fundamentals

Voice over IP Fundamentals Voice over IP Fundamentals Duration: 5 Days Course Code: GK3277 Overview: The aim of this course is for delegates to gain essential data networking and Voice over IP (VoIP) knowledge in a single, week-long

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,

More information

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and

More information

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VOIP TELEPHONY: CURRENT SECURITY ISSUES VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the

More information

This specification this document to get an official version of this User Network Interface Specification

This specification this document to get an official version of this User Network Interface Specification This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper

Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper Release 2 October 2003 Copyright Copyright 2003 Mitel Networks Corporation. This document is unpublished and the following

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS Master of Science in Networking and Data Communications THESIS Thesis Title Voice over IP (VoIP) to Enterprise Users Dissertation submitted

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research

More information

A Scalable Multi-Server Cluster VoIP System

A Scalable Multi-Server Cluster VoIP System A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation

More information

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Why SSL is better than IPsec for Fully Transparent Mobile Network Access Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. aidan.gogarty@hob.de What are we all trying to achieve? Fully transparent network access

More information

An Overview of IPv6 CHAPTER

An Overview of IPv6 CHAPTER 56982_CH02I 12/12/97 3:29 PM Page 23 2 CHAPTER 2 An Overview of IPv6 This second chapter is meant to provide a general overview of the IPv6 protocol and of the way network layer protocols operate. These

More information

SIP A Technology Deep Dive

SIP A Technology Deep Dive SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Implementation of Wireless VoIP System based on VPN

Implementation of Wireless VoIP System based on VPN Implementation of Wireless VoIP System based on VPN DAE-HYUN RYU Department of IT, Hansei University 604-5, Dangjung-Dong, Kunpo-Si, Kyunggi-Do KOREA SEUNG-HOON NAM Division of Metrology for Quality Life,

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information