IMPLEMENTING VOICE OVER IP

Size: px
Start display at page:

Download "IMPLEMENTING VOICE OVER IP"

Transcription

1 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network Egress at Destination; Buffer; Decompression LATENCY IS THE KEY The ability to implement a voice-over-ip solution depends on the oneway latency or delay between the originator and recipient of the call. This delay is variable and depends on several parameters, some of which are under one s control and others that, when using a public network, may be beyond one s control. Exhibit 1 lists the major components associated with the end-to-end analog-to-digital coding, transmission, and conversion back to voice of a packet carrying a digitized portion of a conversation. Note that the fixed and variable delays associated with the end-to-end transmission of a packet can generally range between approximately 60 and 289 ms. To put this time in perspective, a typical human ear can accept up to 250 ms of delay every once in awhile prior to the conversation becoming annoying. While full-duplex transmission is desirable for most data applications, it is not useful and in fact creates problems when voice is carried over a network. This is because rational humans do not have a conversation by both talking at the same time. Instead, rational humans wait for one party to finish talking before the other party to the conversation begins a response. If the latency or delay begins to exceed a quarter of a second for significant portions of a conversation, the conversation will begin to PAYOFF IDEA Unlike the weather that people like to talk about but over which they have a minimum of control, there are many tools and techniques to ensure that a voice-over-ip application has good potential for success. The reason this author uses the term good results from the fact that a public IP network, such as the Internet, is currently incapable of reserving bandwidth. This fact means that the random process of packet flow can turn a viable solution today into an impractical one tomorrow. However, by using some well-known TCP/IP application tools and a handful of logical networking techniques, one can literally stack the deck in one s favor and enhance the chance of a successful voice-over-ip implementation which is the focus of this article.

2 EXHIBIT 1 Packet Network Delays Fixed and variable delays (ms) Minimum Maximum Compression (voice coding) Inter-process (origin) Network access at origin Network transmission delay Network egress at destination Buffer (configurable) Decompression Total fixed and variable delays resemble a CB-radio conversation, with each party having to say over to inform the other party it is OK to talk. Otherwise, the delay will result in one party periodically thinking the other has finished talking when they have not, resulting in a full-duplex conversation that requires one party to stop and the other party to begin anew. In fact, the International Telecommunications Union (ITU) standard for one-way delay for a voice call requires a maximum latency of 150 ms, which ensures that the call will not turn into a full-duplex conversation. For most organizations, a maximum latency of 200 ms and a mean latency approaching or under 150 ms should be sufficient to provide good quality of reconstructed voice. For those curious about the latency associated with the use of the public switched telephone network (PSTN), it can be considered almost negligible. That is, telephone company switches introduce delay measured in microseconds (ms), one thousandth of a millisecond (ms). Similarly, pulse code modulation (PCM) and adaptive differential pulse code modulation (ADPCM) have a coding delay of a few microseconds, which represents a thousandth of the delay associated with the use of low-bit voice encoding methods. With an appreciation for the amount of oneway delay a voice-over-ip application can tolerate, examine the component of delay listed in Exhibit 1. In doing so, there are several techniques one can use to modify or adjust certain delays. COMPRESSION There are numerous low-bit rate compression or coding methods one can select. In fact, most equipment vendors typically support between four and six voice coding methods. Most of these methods are members of the code excited linear prediction (CELP) family of voice coders. The original CELP voice coder was a hybrid, incorporating both waveform coding similar to PCM and ADPCM and linear predictive coding. Although the first CELP voice coder operated at a relatively low bit rate in comparison to PCM and ADPCM, its coding delay was relatively high, ap-

3 proaching 60 ms. Since the first CELP voice coder was introduced, numerous variations have been developed, with approximately half a dozen now standardized by the ITU. Two of the more popular members of the CELP family are the low-delay (LD) CELP (G.723) that operates at 16 Kbps but has a delay of 10 ms, and the G multicoder that operates at both 5.3 and 6.3 Kbps and has a coding delay of approximately 30 ms. Other coders have delays up to 45 ms. By carefully examining the specification sheets associated with different voice coding techniques, one will note that there is normally a direct relationship between the coder bit rate and its mean optimum score (MOS), the latter a measurement of voice quality; that is, the higher the bit rate, the higher the MOS. There is also an inverse relationship between the coder s bit rate and its coding delay; that is, the higher the resulting bit rate produced by the coder, the lower the coding delay. Thus, one technique to consider when making a voice-over-ip application work when there is too much latency is to consider changing the voice coding method. In general, changing the coder from one that operates at 5.3/6.3 Kbps to 8 Kbps will reduce the coding delay by approximately 10 ms. If one changes the coder to an LD-CELP coder, one can remove an additional 10 ms of delay. While 20 ms is not earth shattering, it may be enough to ensure that the quality of reconstructed voice is acceptable for one s voice-over-ip application. In addition, if one saves a few milliseconds here and a few milliseconds with other techniques, the cumulative effect of these savings will really add up. The effect of changing these settings may be sufficient to provide an acceptable level of reconstructed voice that might otherwise preclude one s organization from implementing a voice-over-ip application. INTERPROCESSING DELAY The interprocessing delay represents the time required to form an IP datagram from each segment of digitized voice produced by a voice coder and route the resulting datagram to a router connected to the IP network. The total interprocessing delay is approximately 10 ms and represents a series of delays that can be variable due to the fact that the level of utilization of the LAN that connects the voice gateway to the router governs the gateway-to-router delay. In addition to the gateway-to-router delay, the gateway itself has some processing delay as it forms an IP datagram. Similarly, the router must process each datagram prior to sending it on its way toward its destination. Although this author used 10 ms for the total interprocess delay at the origin, it is possible to slightly reduce this time. To do so, consider obtaining a faster processor for the voice gateway. Most voice gateways are modular devices, with voice processing boards that are inserted into a PC. Although each voice processing board contains its own processor, which enables support for different voice

4 coding methods and actually performs the analog-to-digital conversion, the formation and movement of datagrams through the gateway is a function of its main processor. This means that the use of a Pentium III 700 MHz system will have less delay and support the faster movement of datagrams through the gateway and onto the LAN than a Pentium III 500 MHz-based system. From tests performed by this author, the replacement of the gateway system with a faster processor can be expected to shave 1 ms per extra 100 MHz of processor power. A second method one can consider using to reduce the interprocess delay is to upgrade the LAN if it is operating at a level of utilization beyond 50 percent. Based on this author s experience, the replacement of an Ethernet LAN operating at slightly over a 50 percent level of utilization by a Fast Ethernet network reduced delay by approximately 1 ms. Thus, by upgrading the gateway process from a 500 MHz system to a 700 MHz system and the Ethernet network that connects the gateway to the router by a Fast Ethernet network, one may be able to shave approximately 3 ms off the end-to-end delay. NETWORK ACCESS AT ORIGIN A digitized voice conversation consists of a stream of very small datagrams to reduce the impact of one or more being lost. If the router is connected to the Internet at 56 Kbps and the average datagram length is 49 bytes, then the network access delay at the origin becomes (49 bytes 8 bits/byte)/56 Kbps, or 7.0 ms. Of the 49 bytes in a typical datagram, 20 represent the IP header and 8 represent the UDP header, resulting in 21 actual bytes transporting digitized voice. Although one may encounter references to the use of TCP and UDP for transporting voice, in actuality TCP is used for the connection setup while UDP is used for the actual transport of digitized voice. Because one cannot retransmit lost or erroneous datagrams, UDP is used to transport digitized voice because it is a connectionless, besteffort protocol. Because it is extremely important to ensure that call setup information such as the number dialed is received correctly, TCP, which is a connection-oriented error-free protocol, is used to transport call setup information. If the access line is upgraded to a T1 line operating at Mbps, then the network access delay becomes (49 bytes 8 bits/byte) (1.536 Mbps), or 0.25 ms. Note that a divisor of Mbps was used instead of Mbps for the T1 line because 8 Kbps is used for framing and is not available for data transfer. In examining the network access delay at the origin, it becomes possible to reduce the latency associated with moving datagrams from the local network into the Internet by upgrading the access line. As shown by the previous computations, moving from a 56 Kbps access line to a

5 T1 access line can reduce latency by almost 7 ms. If the cost of a T1 is prohibitive, one can consider different types of fractional T1 (FT1) access lines that operate between 56 Kbps and Mbps and could be used to reduce network access delays. NETWORK TRANSMISSION DELAY Because it is very rare to use voice-over-ip for intra-city communications, assume that the IP network will route data between dissimilar geographical areas. Because there will then be at least two backbone routers involved in the routing process, one can expect a minimum delay of 20 ms. Because most network transmission delays are under 200 ms, the range of delays is listed in Exhibit 1 as 20 to 200 ms. One of the key tools that can be used ahead of time to determine the viability of a voice-over-ip application is the Ping utility program. Exhibit 2 illustrates the basic format of Ping implemented under different versions of Microsoft Windows. Note that one can simply enter Ping with a host name or IP address, or one can enter one or more of the options listed in Exhibit 2. Although the primary use of Ping is to determine the operational status of the target host or address, it will also provide the round-trip delay from originator to destination. Exhibit 3 illustrates the use of the Ping utility to determine the roundtrip delay time between the author s computer and the Web server operated by Yale University. In examining Exhibit 3, note that the Microsoft implementation of Ping results in the transmission of a sequence of four echo-request packets to the target. The target will respond with an echoreply to each echo-request, with the originating station computing the round-trip delay. If a response is not received within 250 ms, which is the default timeout value, the originating station will consider its request to have timed out and will generate its next echo-request. In Exhibit 3, note that the initial round-trip delay was 156 ms, while the second and fourth round-trip delays were computed to be 125 ms and 110 ms, respectively. One of the most common mistakes many persons make when using Ping is to use the first round-trip delay time. In actuality, if one enters a host name that was not previously resolved, the resolution of the host name into an IP address will result in the first round-trip delay being longer than subsequent delays. The only exception to this is when traffic or processing at a router reaches the point where it results in significant delays that cause Ping to timeout. This is illustrated by the third line after the Pinging message in Exhibit 3. Thus, when using Ping to determine the round-trip delay through a network, one should always discard the first delay as it can include time for a host-to-ip address resolution. In addition, one should consider running Ping throughout the day to determine if there are one or more periods of time when delays escalate. One can either write a script to run

6 EXHIBIT 2 Displaying the Format of Ping by Entering the Command Without Any Options

7 EXHIBIT 3 Pinging the Web Server at Yale University

8 Ping at different times, or use the -t option to run it continuously during the day. If one pipes the results to a file, one can then read the file into a spreadsheet and easily determine the mean, peak, and average values, as well as other statistics about round-trip delay. For example, the following DOS command would run Ping on the target continuously and pipe its output to the file test: Ping -t >test If the response to a series of Pings issued over a period of time indicates the network delay is too great to allow a voice-over-ip application to have an overall delay under 200 ms, many people would be tempted to give up on the application. Instead, one should consider the use of a second TCP/IP application tool built into Windows and other operating systems. That tool is the traceroute application, which is named tracert under Windows. Tracert operates by initially transmitting a series of packets with the time-to-live (TTL) field value set to 1. Routers automatically decrement the TTL field value. If its value then equals zero, the packet is discarded and the router returns an error message to the originator, along with the IP address of the router and many times textual information about the router and its network connection. The originator then transmits a new series of packets with the TTL field value incremented by 1 to 2. The packets flow through the first router on the path to the destination, where the TTL field value in each packet is decremented by 1 to 1. Thus, the second router in the packet to the destination discards the series of packets and returns error messages to the originator. This process continues until a sequence of packets either reaches its destination or the maximum default TTL value is reached. Under Windows, the default maximum TTL value is 30 hops. Exhibit 4 illustrates the format of the Microsoft Widows version of traceroute called tracert. Note that one can change the maximum number of hops in one s search for the route to a target via the use of the -h option. Because Ping was used to determine the round-trip delay to the Web server at Yale University, now use tracert to trace the path to the Web server. Exhibit 5 illustrates the resulting display from the use of tracert. Note that a total of 15 hops were required to reach the destination. Also note that the Microsoft version of traceroute issues a sequence of three packets for each TTL value used, resulting in three round-trip delay computations. On the 12th hop, the second packet had a response time that exceeded 250 ms, resulting in an asterisk (*) being displayed to indicate a timeout condition. If the use of Ping indicates a periodic delay that exceeds the amount of latency required for a voice-over-ip application to work, one can use tracert to determine if there are one or more routers abnormally contrib-

9 EXHIBIT 4 The Format of the Microsoft Windows Version of Traceroute, Called Tracert

10 EXHIBIT 5 Tracing the Route to the Yale University Web Server

11 uting to the delay. If so, it may be possible to request one s Internet service provider (ISP) to reroute the path packets must take, or perhaps the ISP would be willing to upgrade or replace a router that acts as a bottleneck. In carefully examining Exhibit 5, one notes that the routers at hops 11, 12, and 13 represent bottlenecks. If planning a voice-over-ip application to the Yale campus, this author would certainly bring this to the attention of his ISP. NETWORK EGRESS AT DESTINATION Returning to Exhibit 1, note that the latency or delay for datagrams flowing from the Internet is shown to be between 0.25 ms and 7 ms. Once again, this range represents the variance in delay resulting from the use of a T1 access line (0.25 ms) and a 56 Kbps access line (7 ms). Thus, by upgrading one or both access lines, it becomes possible to reduce endto-end delay. BUFFER As a person talks, a voice coder produces a series of datagrams with a uniform time delay between each datagram. As the datagrams flow through the Internet, they experience random delays at each node in the network based on the flow of traffic to the router as well as the state of its queues. By the time the datagrams exit the Internet and flow toward the destination gateway, the gaps between datagrams have random delays. If these datagrams were directly used to reconstruct voice, the result would be awkward-sounding gaps between each small segment of voice. Thus, instead of being directly converted back to analog voice, the datagrams are first moved into a jitter buffer. Then they are removed in order with a uniform time delay between extractions, resulting in natural sounding voice when the contents of the datagrams are converted back into analog voice. Most jitter buffers can be set from 0 (disabled) to a maximum of 255 ms. Because one needs to reduce the random delays between received datagrams, the jitter buffer should never be set to a value of 0. Similarly, because the human ear can only tolerate 200 ms of delay and there are many other delays that must be considered, the jitter buffer should never be configured anywhere near its maximum value. Instead, a good rule of thumb is to initially set its value to a delay of 10 ms. If the total delay to include the jitter buffer delay is well under 200 ms, one can then experiment and gradually increase the jitter buffer delay to determine if doing so makes reconstructed voice sound better. DECOMPRESSION Unlike voice coding delays that can significantly vary based upon the coding technique, decompression is relatively fixed at approximately

12 10 ms, regardless of method used. Thus, while there are minor differences in decompression time between voice coding methods, a good rule of thumb is to use a 10 ms delay for compression. RECOMMENDED COURSE OF ACTION As indicated in this article, there are seven major components associated with the end-to-end delay or latency of datagrams transporting voice. While some components are relatively fixed and there is little to be gained by altering their parameters, other delay components are quite variable and there are several techniques for altering their contribution to overall delay. In addition, through the use of Ping and tracert, one obtains the tools to examine the major contributing factor to end-to-end delay network transmission delay. By carefully examining each component of delay and using applicable tools, it becomes possible to successfully implement voice-over-ip applications that otherwise might never become a reality. Gilbert Held is an award-winning author and lecturer. Gil is the author of over 40 books and 250 technical articles. Some of Gil s recent publications include Internetworking Voice and Data, 2nd edition, and Cisco Security Architecture (co-authored with Kent Hundley) published by McGraw-Hill, and Managing TCP/IP and Frame Relay Networking published by John Wiley & Sons. Gil can be reached via at gil_held@yahoo.com.

INTRODUCTION TO VOICE OVER IP

INTRODUCTION TO VOICE OVER IP 52-30-20 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO VOICE OVER IP Gilbert Held INSIDE Equipment Utilization; VoIP Gateway; Router with Voice Modules; IP Gateway; Latency; Delay Components; Encoding;

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Combining Voice over IP with Policy-Based Quality of Service

Combining Voice over IP with Policy-Based Quality of Service TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Voice over IP. Better answers

Voice over IP. Better answers This white paper provides an overview of voice and data convergence. It discusses enabling business drivers and technical factors, such as compression techniques and QOS parameters, that have complemented

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Voice Over IP Per Call Bandwidth Consumption

Voice Over IP Per Call Bandwidth Consumption Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Voice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries

Voice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Voice over IP Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Latin American Networking School (Fundación EsLaRed)

More information

Simple Voice over IP (VoIP) Implementation

Simple Voice over IP (VoIP) Implementation Simple Voice over IP (VoIP) Implementation ECE Department, University of Florida Abstract Voice over IP (VoIP) technology has many advantages over the traditional Public Switched Telephone Networks. In

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

VoIP Bandwidth Calculation

VoIP Bandwidth Calculation VoIP Bandwidth Calculation AI0106A VoIP Bandwidth Calculation Executive Summary Calculating how much bandwidth a Voice over IP call occupies can feel a bit like trying to answer the question; How elastic

More information

1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed.

1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed. SLAC-PUB-8384 February 2000 1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed. W. Matthews, L. Cottrell, R. Nitzan Presented at International Conference On Computing In High Energy Physics And

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Evaluating Data Networks for Voice Readiness

Evaluating Data Networks for Voice Readiness Evaluating Data Networks for Voice Readiness by John Q. Walker and Jeff Hicks NetIQ Corporation Contents Introduction... 2 Determining Readiness... 2 Follow-on Steps... 7 Summary... 7 Our focus is on organizations

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information

12 Quality of Service (QoS)

12 Quality of Service (QoS) Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th

More information

Challenges and Solutions in VoIP

Challenges and Solutions in VoIP Challenges and Solutions in VoIP Challenges in VoIP The traditional telephony network strives to provide 99.99 percent uptime to the user. This corresponds to 5.25 minutes per year of down time. Many data

More information

IP videoconferencing solution with ProCurve switches and Tandberg terminals

IP videoconferencing solution with ProCurve switches and Tandberg terminals An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and

More information

SIP Trunking and Voice over IP

SIP Trunking and Voice over IP SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential

More information

Voice over IP Protocols And Compression Algorithms

Voice over IP Protocols And Compression Algorithms University of Tehran Electrical and Computer Engineering School SI Lab. Weekly Presentations Voice over IP Protocols And Compression Algorithms Presented by: Neda Kazemian Amiri Agenda Introduction to

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Understanding Latency in IP Telephony

Understanding Latency in IP Telephony Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402 Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

51-30-21 Selecting a Web Server Connection Rate Gilbert Held

51-30-21 Selecting a Web Server Connection Rate Gilbert Held 51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence

More information

ASIST Administração de Sistemas

ASIST Administração de Sistemas ASIST Administração de Sistemas Aula 1 9 de Outubro de 2006 Alexandre Bragança Bibliografia: IBM Redbook: TCP/IP Tutorial and Technical Overview, Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke

More information

IP Telephony Design Guide AN ALCATEL WHITE PAPER

IP Telephony Design Guide AN ALCATEL WHITE PAPER AN ALCATEL WHITE PAPER April, 2003 Overview........................................................................3 IP Telephony vs. VoIP................................................................3

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

INTRODUCING PRACTICAL IP TELEPHONY INTO CORPORATE INTRANETS

INTRODUCING PRACTICAL IP TELEPHONY INTO CORPORATE INTRANETS 52-30-10 DATA COMMUNICATIONS MANAGEMENT INTRODUCING PRACTICAL IP TELEPHONY INTO CORPORATE INTRANETS John Fiske INSIDE Internet Voice Technology Basics, Gateways, Open versus Proprietary Systems, Architecture,

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP Performance of Various Related to Jitter Buffer Variation in VoIP Using SIP Iwan Handoyo Putro Electrical Engineering Department, Faculty of Industrial Technology Petra Christian University Siwalankerto

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Comparison of Voice over IP with circuit switching techniques

Comparison of Voice over IP with circuit switching techniques Comparison of Voice over IP with circuit switching techniques Author Richard Sinden Richard Sinden 1 of 9 Abstract Voice-over-IP is a growing technology. Companies are beginning to consider commercial

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

How To Understand The Differences Between A Fax And A Fax On A G3 Network

How To Understand The Differences Between A Fax And A Fax On A G3 Network The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...

More information

Glossary of Terms and Acronyms for Videoconferencing

Glossary of Terms and Acronyms for Videoconferencing Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical

More information

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

IT-5302-3 Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture

IT-5302-3 Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture IT-5302-3 Internet Architecture and Protocols Punjab University College of Information Technology, University of the Punjab, Pakistan. Lecture 02 Overview of Internet Architecture Lecture 02 - Roadmap

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose

ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine

More information

Knowledge Is Power: Do what s best for the client.

Knowledge Is Power: Do what s best for the client. Knowledge Is Power: Do what s best for the client. 1. Understanding Voice and Data Differences Even when they are carried on the same network, voice traffic and data traffic cannot be handled the same

More information

Effect of Windows XP Firewall on Network Simulation and Testing

Effect of Windows XP Firewall on Network Simulation and Testing Issues in Informing Science and Information Technology Volume 4, 2007 Effect of Windows XP Firewall on Network Simulation and Testing Akram Al-Rawi College of CS & IT, King Faisal University, Al-Hassa,

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

SIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops

SIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops SIP (Session Initiation Protocol) Technical Overview Presentation by: Kevin M. Johnson VP Engineering & Ops Page 1 Who are we? Page 2 Who are we? Workforce Automation Software Developer Page 3 Who are

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

What is Network Latency and Why Does It Matter?

What is Network Latency and Why Does It Matter? What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

Application Performance Analysis and Troubleshooting

Application Performance Analysis and Troubleshooting Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency

More information

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Introduction to Packet Voice Technologies and VoIP

Introduction to Packet Voice Technologies and VoIP Introduction to Packet Voice Technologies and VoIP Cisco Networking Academy Program Halmstad University Olga Torstensson 035-167575 olga.torstensson@ide.hh.se IP Telephony 1 Traditional Telephony 2 Basic

More information

Configuring an efficient QoS Map

Configuring an efficient QoS Map Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable

More information

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

VoIP Analysis Fundamentals with Wireshark. Phill Shade (Forensic Engineer Merlion s Keep Consulting)

VoIP Analysis Fundamentals with Wireshark. Phill Shade (Forensic Engineer Merlion s Keep Consulting) VoIP Analysis Fundamentals with Wireshark Phill Shade (Forensic Engineer Merlion s Keep Consulting) 1 Phillip D. Shade (Phill) phill.shade@gmail.com Phillip D. Shade is the founder of Merlion s Keep Consulting,

More information

ProCurve and Wired and Wireless Voice-over-IP Applications

ProCurve and Wired and Wireless Voice-over-IP Applications ProCurve and Wired and Wireless Voice-over-IP Applications Andy Rawll Global Product Manager Avaya HP ProCurve & Avaya IP Telephony Appliances 2 Overview Benefits to Business of ProCurve for VoIP Applications!

More information