Multimedia networking Voice/data integration
|
|
- Magdalen Fields
- 8 years ago
- Views:
Transcription
1 Multimedia networking Voice/data integration Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 1 Agenda XXth Century voice = Analog thentime Division Multiplexing (TDM) XXIst Century voice packetization Quality of service Signalling Issues with NAT Security 3 1
2 Loop Start Signaling On-hook, open loop Off-hook, close loop BELL BELL Station Loop (Local or Station) T R DC Current PBX or Central Office + 48v + 48v Ring on-hook Ans off-hook BELL BELL!! Ringing + 48v 5 Echo in Voice Networks Listener Talker Delay in the network Talker Echo Listener Echo 6 2
3 Echo Is Always Present - 50 High Loss Echo Loss (db) Echo Is Unnoticeable Echo Is a Problem Low Loss - 10 ~20 ~200 Echo Path Delay (ms) 7 Speech and the Telephone Network 3700Hz voice bandwidth Power / Volume Human Ear Response Telephone Network 300Hz 3400Hz 4kHz 16kHz Frequency / Pitch 8 3
4 Mean Opinion Score Source Channel Simulation Impairment Codec X Nowadays, a chicken leg is a rare dish Rating Speech Quality Level of Distortion 5 Excellent Imperceptible 4 Good Just perceptible but not annoying 3 Fair Perceptible and slightly annoying 2 Poor Annoying but not objectionable 1 Unsatisfactory Very annoying and objectionable MOS of 4.0 = Toll Quality 9 Agenda XX Century voice XXI Century voice packetization Quality of service Signalling Issues with NAT Security 11 4
5 IP Phones QoS in phones - standard 802.1p/q Integrated Ethernet switching Easy access to new world features IPv6 GigaEthernet Video IEEE 802.1x 12 Inline Power: IEEE 802.3AF IP phone are power hungry and you do not want to have a 220V power cable => get power through the UTP cable 10/100 Ethernet without Inline Power 13 5
6 Agenda XXth Century voice XXIst Century voice Packetization Quality of service Signalling Issues with NAT Security 14 Analogue to Digital Voice Pulse Code Modulation Nyquist Theorem Analogueue Audio Source B/W = 300 to 4000Hz Sampling Stage 1 sample = 8 bits; 8000 samples/sec = 64,000 bit/s Digital Audio Stream 15 6
7 Speech Compression Techniques Overview 16 Subjective Quality (MOS) Hybrid Coders (LD-CELP & CS-ACELP) Vocoders (Older Technology) Waveform Coders (ADPCM) Kbps Score Quality Description of Impairment Excellent Good Fair Poor Bad Imperceptible Just Perceptible, not Annoying Perceptible and Slightly Annoying Annoying but not Objectionable Very Annoying and Objectionable Source: A.M. Kondoz, Digital Speech Coding for Low Bit-Rate Communications Systems,
8 RTP/RTCP RFCs 1889/1890 End-to-end network transport function Payload type identification voice, video, compression type Sequence numbering Time stamping Delivery monitoring RTCP (Real-Time Control Protocol) 4 Bytes V E R CC M Payload Type Sequence Number 4 Bytes 4 Bytes RTP Timestamp Synchronization Source (SSRC) ID 19 Bandwidth Per IP Call 8kbit/s of compressed voice IP Header (20) UDP (8) RTP (12) Header is 40 bytes 26 kbps of bandwidth per call Compressing RTP Header gives
9 Agenda XXth Century voice XXIst Century voice Packetization Quality of service Signalling Issues with NAT Security 22 Delay and Voice Sender Receiver Network First Bit Transmitted A A Last Bit Received Processing Delay Network Transit Delay End-to-End Delay Processing Delay t 23 9
10 Delay Variation Jitter SenderA ReceiverB Network C B A Sender Transmits d2 d1 t C B A B Receives Jitter D2 = d2 D1 = d1 t 24 Delay and Jitter Delay and jitter are generated when a packet is stored and forwarded: by router and switches Delay is also generated by links 1 microsecond every 200 Km Jitter is also caused by burst Jitter requires play-back buffers Adding more delay
11 Differentiated Services Finance Manager Remote Campus Classification Enforcement Campus Backbone Classification Multimedia Training Servers 27 Version Length Packet Classification Layers ToS 1 Byte 3 bits called IP Precedence for differentiated services (DiffServ may use 6 D.S. bits plus 2 for flow ctrl) Len ID offset TTL Proto FCS IP-SA IP-DA Data 6 diff serv code points + 2 for flow control Version Length Traffic Class 1 Byte Flow Label Len Next Hdr Hop Limit IP-SA IP-DA Data 3 bits used for COS (user priority) PREAM. SFD DA SA TAG 4 Bytes PT DATA FCS 28 11
12 Evolving Business Requirements Business Requirements Will Evolve and Expand over Time 4-Class Model Realtime Signaling / Control 8-Class Model Voice Interactive Video Streaming Video Call Signaling 12-Class Model Voice Realtime Interactive Multimedia Conferencing Broadcast Video Multimedia Streaming Call Signaling Critical Data Best Effort Network Control Critical Data Best Effort Scavenger Network Control Network Management Transactional Data Bulk Data Best Effort Scavenger Time 29 Collaboration & Presence Presence augmented Instant Messaging Who is on-line Are they busy? Where are they? All of this pieces of information Can be automated Crucial for quick and efficient interaction
13 Collaboration & Teleconference High-speed, ubiquitous Internet allows Cheap (Internet based) communications Visual interaction Sharing slides, documents Seeing others on video Working on the same document 32 Collaboration and Telepresence 33 13
14 New Application Requirements The Impact of HD on the Network User demand for HD video has a major impact on the network (H.264) 720p HD video requires twice as much bandwidth as (H.323) DVD (H.264) 1080p HD video requires twice as much bandwidth as (H.264) 720p 35 Agenda 36 14
15 SIP: Session Initiated Protocol SIP is another VoIP signaling protocol Web like Text format messages Similar to HTTP Fast call setup Run over UDP or TCP SIP proxies are the equivalent of H.323 gatekeepers 39 SIP Basics SIP is a peer-to-peer protocol where end-devices (User Agents - UAs) initiate sessions SIP defines the signaling mechanism SIP works for voice, video, instant messaging SIP uses IETF protocols HTTP 1.1 Session Description Protocol (SDP) media (RTP) name resolution & mobility (DHCP & DNS) application encoding (MIME) SIP is ASCII text-based:- implementation & debugging 40 15
16 VoIP Architecture Based on Session Initiation Protocol Old Phone network Internet or private IP network 3) External voice SIP Trunk SIP Proxy Extensio n IP Address :db8::abba:babe 1) SIP registration SIP Clients! Ext: 2000 IP: ) Voice Ext: 6000 IP: 2001:db8::abba:babe 41 VoIP Pricing... SIP: Session Initiation Protocol Used to allow only authenticated device SIP Proxy Register the IP address of a phone extension SIP Trunk: gateway to classical analog voice SIP proxy: free software (Asterisk) on an existing server SIP trunk: cheap calls fixed price for Europe 5 EUR/month SIP client on mobile/pc: free SIP physical IP phones: 100 EUR 42 16
17 SIP Commands/Responses Commands Responses INVITE CONNECTED BYE UNREGISTER REGISTER 1XX Information 2XX Success 3XX Redirection 4XX Client Error 5XX Server Error 6XX Global Failure 43 SIP Call Flow SIP Phone INVITE 3xx Redirect Redirect Server Or SIP proxy SIP UA / GW INVITE to Address Returned in Contact: of 3XX response 100 Trying 180 Ringing 200 OK ACK BYE 200 OK 44 17
18 Web Real Time Communication = WebRTC IETF & W3C work supported by Google, Mozilla, Opera Do peer-to-peer communication IN the browser Goal is interoperation of browsers and applications Big $$$ involved in codec licenses... Relies on DTLS (SSL for UDP), SCTP, STUN,... (see later) Source: Creative Commons, Feyd-Aran 45 What Is (or or 9-9-9)? A simple, easy to remember telephone number that allows automated call routing to the local public safety agency, based on where you are calling from In some jurisdictions (North America) there are many different destinations; source routed Mostly ubiquitous for residential service Varying degrees of deployment globally Enhanced in North America European Union current efforts to converge on India currently has country-wide rollout of
19 Legacy Architecture Smart Network Dumb Endpoints OSI Model Layer 7 Mydialtone PhoneCompany, Inc. The End Device Location Layer 3 Mynetwork Layer 1/2 Mywires PhoneCompany, Inc. PhoneCompany, Inc. 48 Internet Architecture Dumb Network Smart Endpoints OSI Model Layer 7 Application Location/Presence.com Location Common Point The End Device I Think I ll Advertise My Location Layer 3 Network Layer 2 Access ISP, Inc. Last Mile, Inc. Location 49 19
20 VPN to Corporate Problem: The Global Road Warrior Hotel in Chicago 112, What s That? Chicago, Where s That? Internet Corporate HQ in Paris How Do I Route This One? Chicago PSAP This issue Must be solved! 50 SIP Routing Based on UAC s Location Alice Outbound Proxy INVITE w/ SDP and Location SIP Routing based on Location urn:service:sos is not globally unique If LoST query done by UA, may be as a Route header Though not sure yet Proxy MUST learn UAC s location, determine where UAC is, then Route the call to the proper Public Safety Answering Point (PSAP) * Short form means not enough room here INVITE sips:urn:service:sos SIP/2.0 Via: SIP/2.0/TLS pc33.atlanta.com;branch=z9hg4bk74 Max-Forwards: 70 From: Alice <sip:alice@atlanta.com>;tag=9fxced76sl To: <sip:urn:service:sos> Call-ID: @pc33.atlanta.com CSeq: INVITE Geolocation: <cid:alice123@atlanta.example.com> Route: <sips:psap1@orlando.fl.gov;lr> Contact: <sip:alice@atlanta.com> Content-Type: multipart/mixed; boundary=0a0 Content-Length: a0 Content-Type: application/sdp v=0 o=alice IN IP4 atlanta.com c=in IP t=0 0 m=audio RTP/AVP 0 a=rtpmap:0 PCMU/ a0 Content-Type: application/pidf+xml (short form*) <gml:location> <gml:coordinates>28.44n 81.46W </gml:coordinates> </gml:location> <method>802.11</method> <provided-by> --0a
21 Agenda 52 Network Address Translation: IP at Home IPv4 addresses are scarce and close to exhaustion Network Address Translation helps ! Internet! ! ADSL or Cable modem:! 1 IPv4 address! WiFi ʻRouterʼ! Multiplex all inside! Hosts over the ISP address! ADSL Modem! 53 21
22 Different NAT Behaviors... Good reading: The Internet Protocol Journal, Volume 7, Number 3 by Geoff Huston 54 Symmetric NAT 55 22
23 Full Cone NAT 56 What is STUN/ICE? STUN Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NAT) STUN (RFC3489) is a request/response protocol Response contains IP address and UDP port of request Allows client behind a NAT to find out its public address, the type of NAT it is behind and the internet side port associated by the NAT Example application: Googletalk ICE Interactive Connectivity Establishment Defines a standardized method for SIP-enabled clients to determine a set of IP addresses where clients can establish contact behind firewall Leverages STUN to collect IP addresses Example: MSN Live Messenger 57 23
24 STUN Overview Simple Traversal of UDP through NAT RFC 3489 Client-server protocol Allows a client behind a NAT find out its public address the internet side port associated by NAT with a particular local port type of NAT it is behind This information is used for UDP communication between two hosts that are both behind NAT routers. Free implementation of STUN client/server 58 STUN Operation STUN server located on the public Internet. Using 2 addresses and 2 ports. STUN STUN usages binding discovery, NAT keepalives STUN messages are sent on the very same ports that RTP will use latter First 2 bits allow to differentiate between STUN and RTP STUN Server NAT2 NAT1 STUN Client Public Internet Private Net 2 Private Net
25 Interactive Connectivity Establishment (ICE) Overview offer-answer model for media streams through NAT. use of STUN and its relay extension TURN in a specific methodology which avoids many of the pitfalls of using any one alone. Each agent can have its own STUN server, or they can be the same ICE agents (endpoints) discover their topologies to find a path or paths by which they can communicate. Agents L and R are capable of engaging in an offer/answer exchange SDP messages to set up a media session between L and R. Exchange will occur through a SIP server Gathering Candidate Addresses each agent has a variety of candidate transport addresses: directly attached network interface A translated address on the public side of a NAT (a "server reflexive" address) The address of a media relay the agent is using Could be IPv4 or IPv6 or both 61 25
26 Example Stun Srvr Binding discovery usage :3478 NAT Agent L Agent R 2001:db8:bad::f00d 62 Connectivity Checks Local Order highest to lowest priority candidates Sends them to R over the signaling channel in the SDP offer. When R receives the offer: same gathering process responds with its own ordered list of candidates. sorts the candidate pairs in priority order. Sends checks on each candidate pair in priority order. Both acknowledge checks received from the other agent
27 Agenda 64 Voice and Data Threat Models Merge IP Telephony inherits IP data network threat models: Reconnaissance, DoS, host vulnerability exploit, surveillance, hijacking, identity, theft, misuse, etc. QoS requirements of IP Telephony increase exposure to DoS attacks that affect: Delay, jitter, packet loss, bandwidth PC endpoints typically require user authentication, phones typically allow any user (exceptions: access/billing codes, Class of Service) 65 27
28 Securing the IP Telephony Itself Plain SIP/SCCP protocols: No authentication No integrity No confidentiality Secure SIP/SCCP protocols With authentication: using X.509 certificates With integrity and confidentiality Rely on cryptographically secure protocols Secure firmware and configuration with RSA signatures 70 Protecting Signaling TLS: Transport Layer Security Supports any application protocol HTTP SCCP SIP LDAP TLS TCP IP Needs secure method to exchange shared secret Bi-directional PKI pairs for mutual authentication Shared secret exchanged using RSA Computes Hashed Message Authentication Code (HMAC) Allows MD5 or SHA1 Conventional cryptography using shared secret DES, 3DES, AES RC2, RC4 IDEA 71 28
29 Authentication and Encryption Basics Protecting the Signaling TLS is the transport for signed (RSA), authenticated (HMAC- SHA1) and encrypted (AES-128) signaling (1) 72 SRTP: Secure RTP RFC 3711 for transport of secure media Uses AES-128 for both authentication and encryption High throughput, low packet expansion V P X CC M PT sequence number timestamp synchronization source (SSRC) identifier contributing sources (CCRC) identifiers RTP extension (optional) RTP payload SRTP MKI -- 0 bytes for voice Authentication tag -- 4 bytes for voice Encrypted portion Authenticated portion 73 29
30 Authentication and Encryption Basics Protecting the Media Streams CTL Client CAPF SRTP is the transport for authenticated and encrypted (AES-128) media (2) 74 Final Words IP Telephony is now a proven technology SIP is the standard IP Telephony can be secured 77 30
Multimedia networking Voice/data integration
Multimedia networking Voice/data integration Eric Vyncke Distinguished Engineeer Cisco Systems evyncke@cisco.com Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 1 Agenda XXth
More informationSIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationSIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops
SIP (Session Initiation Protocol) Technical Overview Presentation by: Kevin M. Johnson VP Engineering & Ops Page 1 Who are we? Page 2 Who are we? Workforce Automation Software Developer Page 3 Who are
More informationSIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. andreas.steffen@zhwin.ch
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen andreas.steffen@zhwin.ch Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationApplied Networks & Security
Applied Networks & Security VoIP with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 Critical analysis
More informationMultimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
More informationInternet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
More informationAV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
More informationEE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
More informationVoice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007.
Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationInternet Technology Voice over IP
Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every
More informationHow To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
More informationVoice Over IP. Priscilla Oppenheimer www.priscilla.com
Voice Over IP Priscilla Oppenheimer www.priscilla.com Objectives A technical overview of the devices and protocols that enable Voice over IP (VoIP) Demo Packet8 and Skype Discuss network administrator
More informationNAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
More informationVoice over IP Fundamentals
Voice over IP Fundamentals Duration: 5 Days Course Code: GK3277 Overview: The aim of this course is for delegates to gain essential data networking and Voice over IP (VoIP) knowledge in a single, week-long
More informationNAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
More informationVoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. Tasuka@Tailyn.com.tw
VoIP with SIP Session Initiation Protocol RFC-3261/RFC-2543 Tasuka@Tailyn.com.tw 1 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy
More informationVIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
More informationOnline course syllabus. MAB: Voice over IP
Illuminating Technology Course aim: Online course syllabus MAB: Voice over IP This course introduces the principles and operation of telephony services that operate over Internet Protocol (IP) networks
More informationSIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
More informationInternet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5
Internet Voice, Video and Telepresence Harvard University, CSCI E-139 Lecture #5 Instructor: Len Evenchik len_evenchik@harvard.edu sip:len.evenchik@harvard.edu AT&T Dimension PBX, 1980 Lecture Agenda Welcome
More informationHow to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
More informationSIP Essentials Training
SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through
More informationWhite paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
More informationOverview of VoIP Systems
2 Overview of VoIP Systems In their simplest form, Voice over IP protocols simply enable two (or more) devices to transmit and receive real-time audio traffic that allows their respective users to communicate.
More informationCurso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 1 Introducción Mg. Antonio Ocampo Zúñiga Conceptos Generales VoIP Essentials Family of technologies Carries voice calls over an IP network VoIP services convert
More informationSession Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
More informationMINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
More informationUnderstanding Voice over IP
Introduction Understanding Voice over IP For years, many different data networking protocols have existed, but now, data communications has firmly found its home in the form of IP, the Internet Protocol.
More informationAsymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
More informationInternet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dipl.-Inform. Stephan Groß Room: GRU314
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationMedia Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
More informationApplications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
More informationUnit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
More informationVoIP Analysis Fundamentals with Wireshark. Phill Shade (Forensic Engineer Merlion s Keep Consulting)
VoIP Analysis Fundamentals with Wireshark Phill Shade (Forensic Engineer Merlion s Keep Consulting) 1 Phillip D. Shade (Phill) phill.shade@gmail.com Phillip D. Shade is the founder of Merlion s Keep Consulting,
More informationBasic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future
More informationB12 Troubleshooting & Analyzing VoIP
B12 Troubleshooting & Analyzing VoIP Phillip Sherlock Shade, Senior Forensics / Network Engineer Merlion s Keep Consulting phill.shade@gmail.com Phillip Sherlock Shade (Phill) phill.shade@gmail.com Phillip
More informationVoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
More informationVoice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
More informationInternet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:
More informationVoice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
More informationData Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationIntroduction to VoIP. 陳 懷 恩 博 士 副 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255
Introduction to VoIP 陳 懷 恩 博 士 副 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 3-93574 # 55 Outline Introduction VoIP Call Tpyes VoIP Equipments Speech and Codecs Transport Protocols
More informationSIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
More informationCompTIA Convergence+ 2006 Examination Objectives
CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform
More informationA Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
More information12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th
More informationNTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: chgan@csie.nctu.edu.tw Date: 2006/05/02 1 Outline Introduction NTP VoIP
More informationComputer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
More informationNAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
More informationVoice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries
Voice over IP Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Latin American Networking School (Fundación EsLaRed)
More informationTSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
More informationApplication Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
More informationVoice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples
Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead
More informationGoal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?
Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high
More informationThe use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks
Voice over IP Introduction VoIP Voice over IP The use of IP networks, namely the LAN and WAN, to carry voice Voice was originally carried over circuit switched networks PSTN (Public Switch Telephone Network)
More informationSession Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation
More informationA Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
More informationConfiguring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
More informationOptimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth
More informationSIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
More informationVoice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
More informationEDA095 Audio and Video Streaming
EDA095 Audio and Video Streaming Pierre Nugues Lund University http://cs.lth.se/pierre_nugues/ April 22, 2015 Pierre Nugues EDA095 Audio and Video Streaming April 22, 2015 1 / 35 What is Streaming Streaming
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationInternet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
More informationChapter 2 Voice over Internet Protocol
Chapter 2 Voice over Internet Protocol Abstract This chapter presents an overview of the architecture and protocols involved in implementing VoIP networks. After the overview, the chapter discusses the
More informationThe SIP School- 'Mitel Style'
The SIP School- 'Mitel Style' Course Objectives This course will take delegates through the basics of SIP into some very technical areas and is suited to people who will be installing and supporting SIP
More informationIP-Telephony Real-Time & Multimedia Protocols
IP-Telephony Real-Time & Multimedia Protocols Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Media Transport RTP Stream Control RTCP RTSP Stream Description SDP 2 Real-Time Protocol
More informationARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
More informationSession Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
More informationVoice over IP Protocols And Compression Algorithms
University of Tehran Electrical and Computer Engineering School SI Lab. Weekly Presentations Voice over IP Protocols And Compression Algorithms Presented by: Neda Kazemian Amiri Agenda Introduction to
More informationVoice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com
Voice over IP (VoIP) for Telephony Advantages of VoIP Migration for SMBs BLACK BOX Hybrid PBX VoIP Gateways SIP Phones Headsets 724-746-5500 blackbox.com Table of Contents Introduction...3 About Voice
More informationTraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic
TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm
More informationCourse 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
More informationSimulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
More informationNetwork administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
More informationImplementation of Voice over IP and Audio over IP in the Studio environment
Mediatech 2015 Implementation of Voice over IP and Audio over IP in the Studio environment Wilfried Hecht, Managing Director AVT Audio Video Technologies GmbH Nordostpark 12 90411 Nuernberg Germany Email:
More informationNAT and Firewall Traversal. VoIP and MultiMedia 2011 emil.ivov@jitsi.org 1/77
and Firewall Traversal VoIP and MultiMedia 2011 emil.ivov@jitsi.org 1/77 Introduction Does anyone remember why we started working on IPv6? ICAN says IPv4 addresses will run out by 2011 XXXX says the same
More informationApplication Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application
More informationAdvanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
More informationSecuring SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
More informationSIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
More informationIP Telephony and Network Convergence
IP Telephony and Network Convergence Raimo.Kantola@hut.fi Rkantola/28.11.00/s38.118 1 Today corporations have separate data and voice networks Internet Corporate Network PSTN, ISDN Rkantola/28.11.00/s38.118
More informationVoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
More informationVoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution
ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite
More informationSecure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India prashukhobragade@gmail.com Disha Gupta Department of Computer Science
More informationConvergence Technologies Professional (CTP) Course 1: Data Networking
Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent
More informationACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source
More informationBroadCloud PBX Customer Minimum Requirements
BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service
More informationVoIP and IP Telephony
VoIP and IP Telephony Reach Out and Ping Someone ISAC Spring School 2006 21 March 2006 Anthony Kava, Sr. Network Admin Pottawattamie County IT Definition VoIP Voice over Internet Protocol Voice Transport
More informationVoice over IP (VoIP) Part 2
Kommunikationssysteme (KSy) - Block 5 Voice over IP (VoIP) Part 2 Dr. Andreas Steffen 1999-2001 A. Steffen, 10.12.2001, KSy_VoIP_2.ppt 1 H.323 Network Components Terminals, gatekeepers, gateways, multipoint
More informationApplication Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
More informationIP-Telephony SIP & MEGACO
IP-Telephony SIP & MEGACO Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Session Initiation Protocol Introduction Examples Media Gateway Decomposition Protocol 2 IETF Standard
More informationSession Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
More information