A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

Size: px
Start display at page:

Download "A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network"

Transcription

1 A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania Irina Giea Global Service Delivery Department Alcatel-Lucent Timisoara, Romania Abstract In the telecommunication domain, the simulation methodology is very important for the researchers because there are many simulation software. This paper presents a method of implementing a Voice over IP network in two steps. The first step is creating a real network, then analyze the call sessions. The second step is simulating the network and analyzing the traffic. Keywords VoIP network, network simulator, call sessions, traffic flow. I. Introduction More and more people need to communicate. Through this direction were implemented many technologies. The Voice over IP (VoIP) is one of them. It allows the user to make/receive a call from/to its telephone or personal computer (PC) using the IP cloud. VoIP comes as an answer to the call users who want to benefit of the same security, speed and quality of service as the network users already have [8-10]. Specific protocols were designed for this new type of network, like Session Initiation Protocol (SIP). Implementing, simulating and analyzing a VoIP network can be done in different ways and using various tools and simulators. In he next chapters, we will present one of this methods[1]. II. tools and simulators To develop our VoIP network, we used the following tools: X-LITE, PBX Manager, Asterisk, Hammer Call Analyzer, GNS3 and Wireshark [6-7]. For the first step, the tools (X-LITE, PBX Manager, Asterisk and Hammer Call Analyzer) are described below. X-LITE is a software that enables a PC to receive or execute telephone calls, calls that can originate from another PC or from an IP telephone. The type of calls are audio, video or both (conferences). You can also send messages towards different devices that supports this service. In order to be able to use this software, the PC has to accomplish several minimum performance conditions: Processor: Intel Core Duo (or its equivalent), Video Card with support for DirectX 9.0c Memory: 2 GB RAM This paper is supported by the Human Resources Development Programme POSDRU/159/1.5/S/ financed by the European Social Fund and by the Romanian Government. Space on Hard Disk: 50 MB Operating system: Microsoft XP Service Pack2, Vista (32 or 64 bits), 7 or MAC OS 10.5 Connection: connection to a network (broadband, LAN, wireless), permanent connection to Internet Sound adaptor: Full-duplex, 16 bit or using a USB Headset PBX Manager is a software that depends on Asterisk. It is a graphical management interface which allows the configuration and management of a PC in order for it to act like a conventional PBX (Private Branch Exchange). This software allows the construction of a VOIP PBX with the integration of capabilities and characteristics which can't be found in the PBX conventional systems. Asterisk is an open source program that transforms a PC into a communication server. It is used with PBX systems based on IP, VOIP gateways, conference servers and others. The most important files are extensions.conf and sip.conf. Extensions.conf defines the PBX calling plan for each user. In the sip.conf file we can configure everything that is related with the SIP protocol, like the creation of new users or the definition of the SIP suppliers. Hammer Call Analyzer can discover, isolate and fix signaling or transmission problems. With its help you can visualize what protocols were used, you can correlate call sessions over multiple protocols or domains and you can also visualize and analyze call session flows. The simulation of the network, for the second step, was possible using the GNS3 and Wireshark. GNS3 is a graphical network simulator which allows the simulation of complex networks. In order for it to function, it is dependent on three other programs that must run simultaneous: Dynamips (the core for GNS3 that emulates IOS CISCO images), Dynagen (text-based software that is necessary to Dynamips ) and Qemu (open source emulator and virtualization tool). Wireshark is the most common tool for analyzing the network protocols, fixing the network problems, developing software products and communication protocols. Wireshark captures the traffic of packets in real time but the analyze can be made offline. 109

2 Fig.2 Case 1 - capture window III. CREATING A REAL VOIP NETWORK In order to create the network, we connected three PCs with a router [2-3]. Each PC is behaving like a telephone, meaning that it can receive or make calls. connecting the PC as a telephone was possible using three software: X-LITE, PBX Manager and Asterisk. For the identification of each PC, we attached an ID number that can be used as a telephone number also. One PC will act as a telephone and also as a PBX station. Because the network is connected to the Internet, each PC will have the IP address of the PBX station. This must not be confused with its own IP address [Fig.1]. The PC that runs as both a telephone and a station is PC3, with the calling number Each PC has the IP address in the range of x. In order to study this network from the point of view of the protocols involved, we captured the packets using Hammer Call Analyzer software. In the case of our network, only one PC has this program installed (PC1), which is why the sessions that will be studied, will be initiated only by PC1. There are four windows in the capture program Hammer Call Analyzer as you can see above (from left to right, updown): list of captured packets, call flow with the list of calls and statistics, a detailed list of the protocols used in the sessions, protocol list in hexadecimal format. In the second case, PC1 calls PC3. The caller is announced that PC3 is already in a conversation and receives two choices: it can leave a message which PC3 will receive after it closes the call or it can terminate the session. We can visualize all the steps of a call session in the callflow window. This window presents each command the SIP protocols requires in order to establish a correct call session. In the figure below are shown several statistics for the packets (Ethernet, IP, UDP-User Datagram Protocol) and other information (Fig.3). Fig.3 Protocol statistics Fig.1 The configuration of the real VOIP network For the capturing of the packets we chose three situations. In the first case, PC1 calls PC2 but after a few seconds PC2 is put on hold for 10 sec. during which PC1 calls PC3, a session that also lasts for 10sec. PC1 ends the session with PC3 because it's not answering. PC1 returns to the session created with PC2 and also closes shortly (Fig.2). In the last case, PC1 calls PC2. PC2 answers and talks for 10sec. PC2 then puts on hold PC1 and calls PC3. PC3 answers and talks for 10sec. before closes. PC2 returns to the call with PC1 and closes after a short time. Because the calls go through the PBX station PC3, the IP addresses for the called PCs will not be showed (Fig.4). Fig.4 Case 3 - call flow 110

3 IV. SIMULATING THE VOIP NETWORK For the simulation we used a router from the 1700 platform and three PCs. For the router to be accepted by the program IOS images had to be loaded as well as configuring each PC to accept connections towards the router. GNS3 has five windows were you can see the devices available to create a network, the network implementation area, a console that can be used as a telnet, a summary of the network topology and a window with the packet captures that are running (Fig.5). Fig. 5 The network topology Both router and the PCs have special menus where you can modify certain information. Once the network is created and works, you can proceed to analyze it with Wireshark. To start the capture of packets, you need to right-click on any connection and select "Start Wireshark". All of the captures are for the traffic between the router and PC2 (Fig.6). Fig.7 Capture menu In the Analyze menu you can select and visualize the filters, you can see the TCP (Transmission Control Protocol), UDP or SSL (Secure Socket Layer) flows and you can validate protocols. One of the most important menus is the Statistics menu. The first option you can select presents a summary of the capture that is running. There you can find information about the topology's name, the encapsulation that is used or the size limit of the packets. Also, you can see when the first and the last packet arrived and the duration between these packets. The summary also presents information about the traffic (Fig.8). Fig.6 Packet capture between router and PC2 The most revealing actions that can be taken to analyze a network are the ones from the menus: capture, analyze statistics and telephony (when using the virtual models for IP telephones). The capture of packets depends on different options. You can choose the interface you are using for the capture, you can select the filter meaning that only the packets that are passing through the filer will be captured (Fig. 7). Fig.8 Statistics menu - Flow graph To see the protocol hierarchy used by this network, the conversations that were captured, the input-output graphic of the data and the traffic analysis, we used the interface between the router and PC2 (Fig. 9). 111

4 select on X axe the packets by their hour, minute or second when their appeared (Fig. 12). Fig. 12 Input-Output traffic graphic Fig.9 Protocol hierarchy statistics The conversations between these devices are of two types: Ethernet and UDP [4-5]. Both present the number of sessions captured and the number of packets, their size and the direction from which they were captured. The traffic analyze depends on the selected options from the Statistics menu-flow graph (Fig. 8). Once they are selected the window from figure Fig.13 will appear. There we can observe each message that was received by the two devices. For this analysis we chose the TCP flows with the standard addresses for the source and destination. Each message received is detailed in the right side of the window (Fig.13). Fig. 10 Ethernet sessions The difference is that the UDP session also presents the port number of the device involved and the IP addresses of the devices (Fig. 11). Fig. 13 Traffic analysis V. CONCLUSIONS Implementing the network using this method reflects many advantages. The tools and simulators are both used by the researchers and in the engineering field. The analyzers work in real-time but the troubleshooting can be done in offline mode. The capture of packets offers an accuracy of milliseconds for each packet. Using this network model, the same principle can be applied to various network sizes from a company s intranet to a city s Metropolitan Access Network (MAN). Fig. 11 UDP sessions The window opened to visualize the input-output graphic of the traffic has options for choosing the filter. You can also modify the axes of the graphic. The axe X is the time axe and has a range between a few milliseconds and a few minutes. The Y axe can linear, logarithmic or automatic. You can also Acknowledgment This paper is supported by the Human Resources Development Programme POSDRU/159/1.5/S/ financed by the European Social Fund and by the Romanian Government. References [1] J. Davidson, J.Peters and Brian Gracely, Voice over IP Funtamentals, Cisco Press, March

5 [2] A. M. Law and W. D. Kelton, Simulation modelling and analysis, thirded. New York: McGraw-Hill, [3] E. K. Bowdon, "Using simulation to evaluate system performance "presented at Proceedings of the 11th workshop on Design automation1974, pp [4] B. Goode, Voice over Internet Protocol(VoIP), Proceedings of the IEEE, vol.90, 2002, pp [5] J. J. Yi and D. J. Lilja, "Simulation of computer architectures:simulators, benchmarks, methodologies and recommendations," IEEETransaction on Computers, vol. 55, no. 3, pp , [6] Thomas P., H.323 Mediated Voice over IP: Protocols, Vulnerabilities; Remediation, updated 2 November 2010, [online] Available: mediated-voice-overip-protocols-vulnerabilitiesamp-remediation [7] Florian Fankhauser, at. al., Security Test Environment for VoIP Research, International Journal for Information Security Research (IJISR), 1(1/2), Pages 53-60, (2011). [8] Park P, Voice over IP security, Cisco Press, (2009). [9] R. G. Cole and J. H. Rosenbluth, Voice over IP performance monitoring, SIGCOMM Computer Communnication Review, vol. 31, pp , 2011 [10] H. P. Singh, S. Singh, J. Singh, and S. A. Khan, VoIP: state of art for global connectivity a critical review, Journal of Network and Computer Applications, vol. 37, no. 1, pp ,

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

Configuring Bria 3 Windows for Virtual Contact Center

Configuring Bria 3 Windows for Virtual Contact Center Configuring Bria 3 Windows for Virtual Contact Center 8x8 issues Bria softphone licenses to Virtual Contact Center customers. Bria 3 is a softphone application that allows you to manage your Virtual Contact

More information

Configuring Bria 3 Windows for Virtual Contact Center

Configuring Bria 3 Windows for Virtual Contact Center Configuring Bria 3 Windows for Virtual Contact Center 8x8 issues Counterpath s Bria softphone licenses to Virtual Contact Center customers. Bria 3 is a softphone application that enables you to manage

More information

Cisco IP Communicator (Softphone) Compatibility

Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP. 1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise

More information

Configuring Bria 3 Mac for Virtual Contact Center

Configuring Bria 3 Mac for Virtual Contact Center Configuring Bria 3 Mac for Virtual Contact Center Counterpath s Bria 3 is a softphone application that enables you to manage your Virtual Contact Center VOIP calls easily from your desktop replacing or

More information

AT&T Unified Communications Voice. IP Communicator Installation Guide

AT&T Unified Communications Voice. IP Communicator Installation Guide AT&T Unified Communications Voice IP Communicator Installation Guide For Customer s System Administrator V1.1 July, 2015 Disclaimer The contents of the document may be revised by AT&T at any time without

More information

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step

More information

Lab - Using Wireshark to Observe the TCP 3-Way Handshake

Lab - Using Wireshark to Observe the TCP 3-Way Handshake Topology Objectives Part 1: Prepare Wireshark to Capture Packets Select an appropriate NIC interface to capture packets. Part 2: Capture, Locate, and Examine Packets Capture a web session to www.google.com.

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Configure A VoIP Network

Configure A VoIP Network Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: alto.ec@gmail.com Ms. Zarna M. Gohil Electronics & Communication

More information

OAISYS and ShoreTel: Call Recording Solution Configuration. An OAISYS White Paper

OAISYS and ShoreTel: Call Recording Solution Configuration. An OAISYS White Paper OAISYS and ShoreTel: Call Recording Solution Configuration An OAISYS White Paper Table of Contents Introduction... 3 ShoreTel Networks... 4 Trunk Side Recording... 4 Station Side Recording... 6 Active

More information

Controlling Ashly Products From a Remote PC Location

Controlling Ashly Products From a Remote PC Location Controlling Ashly Products From a Remote PC Location Introduction Ashly networked products can be accessed from a remote PC on a different network if the router used for the Ashly device is properly configured.

More information

AC 2007-2976: A PRACTICAL APPROACH TO INTEGRATE TEACHING VOICE-OVER-IP TECHNOLOGY IN THE CLASSROOM

AC 2007-2976: A PRACTICAL APPROACH TO INTEGRATE TEACHING VOICE-OVER-IP TECHNOLOGY IN THE CLASSROOM AC 2007-2976: A PRACTICAL APPROACH TO INTEGRATE TEACHING VOICE-OVER-IP TECHNOLOGY IN THE CLASSROOM Farid Farahmand, farahmandfar@ccsu.edu American Society for Engineering Education, 2007 Page 12.91.1 A

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright (robert.wright@ultra-audiosoft.com), BSc (Hons) Ultra Electronics AudioSoft, October

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

ISOM3180 Telecommunications & Computer Networking Management

ISOM3180 Telecommunications & Computer Networking Management ISOM3180 Telecommunications & Computer Networking Management Spring 2015-16 Course Description This course includes lecture and practical training of the foundation concepts and techniques of computer

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions The following FAQ s are intended to address common questions regarding the AvayaLive Connect service. The full set of legal terms and conditions applicable to the AvayaLive Connect

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Teacher Assessment Blueprint Test Code: 5910 / Version: 01 Copyright 2011 NOCTI. All Rights Reserved. General Assessment Information Blueprint Contents General Assessment Information Written Assessment

More information

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering

More information

Cisco Analog Telephone Adaptor Overview

Cisco Analog Telephone Adaptor Overview CHAPTER 1 This section describes the hardware and software features of the Cisco Analog Telephone Adaptor (Cisco ATA) and includes a brief overview of the Skinny Client Control Protocol (SCCP). The Cisco

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Course Outline Module 1. Introduction to Networking 1.1 Your Connection to the Internet 1.1.1 The Internet 1.1.2 Requirements for

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC.

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC. 4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC. Wireshark (see Section 6) is a network packet analyser. It is used to: troubleshoot network problems, examine security problems, debug protocol implementations,

More information

AT&T Unified Communications Services Installing Jabber for AT&T UC Voice on Windows PCs

AT&T Unified Communications Services Installing Jabber for AT&T UC Voice on Windows PCs AT&T Unified Communications Services Installing Jabber for AT&T UC Voice on Windows PCs For End Users V1.0 February, 2014 The contents of the document may be revised by AT&T at any time without notice.

More information

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.

More information

Keywords: VoIP calls, packet extraction, packet analysis

Keywords: VoIP calls, packet extraction, packet analysis Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,

More information

Using Remote Desktop Software with the LAN-Cell 3

Using Remote Desktop Software with the LAN-Cell 3 Using Remote Desktop Software with the LAN-Cell 3 Technote LCTN3010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:

More information

AUTOMATIC BILLING SYSTEM FOR CISCO ANALOG TELEPHONE ADAPTOR ATA 186/188

AUTOMATIC BILLING SYSTEM FOR CISCO ANALOG TELEPHONE ADAPTOR ATA 186/188 AUTOMATIC BILLING SYSTEM FOR CISCO ANALOG TELEPHONE ADAPTOR ATA 186/188 Rosen Ivanov Technical University of Gabrovo, BULGARIA E-mail: rs-soft@ieee.org Abstract: This paper presents an automatic billing

More information

Intel Pentium 4 or AMD Athlon Dual Core, 1.6 GHz (or higher) with SSE2 technology. Microsoft Windows Vista 32 bit SP2 (or later) or

Intel Pentium 4 or AMD Athlon Dual Core, 1.6 GHz (or higher) with SSE2 technology. Microsoft Windows Vista 32 bit SP2 (or later) or Revit 2012 Platform Install s Minimum: Entry level configuration Operating System Microsoft Windows XP SP2 (or later) Home Professional Microsoft Windows Vista 32 bit SP2 (or later) Business Home Premium

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

Alcatel-Lucent Office Communication Solutions

Alcatel-Lucent Office Communication Solutions Alcatel-Lucent Office Communication Solutions PIMphony, your personal communication manager Frequently Asked Questions April, 2007 All Rights Reserved Alcatel-Lucent 2007 Alcatel-Lucent Office Communication

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Simulation of SIP-Based VoIP for Mosul University Communication Network

Simulation of SIP-Based VoIP for Mosul University Communication Network Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Wireshark Tutorial INTRODUCTION

Wireshark Tutorial INTRODUCTION Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation

More information

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

Functional Specifications Document

Functional Specifications Document Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007

More information

Lab Using Wireshark to Observe the TCP Three-way Handshake

Lab Using Wireshark to Observe the TCP Three-way Handshake Lab 9.1.3 Using Wireshark to Observe the TCP Three-way Handshake Objectives Use Wireshark to monitor an Ethernet interface for recording packet flows Generate a TCP connection using a web browser Observe

More information

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument. TA Instruments TRIOS Software Installation Instructions Installation Requirements Your TRIOS Instrument Control software includes all the components necessary to install or update the TRIOS software, as

More information

T e c h n i c a l D o c u m e n t. Cisco 3750G, 3560G, 3650 and 3850 Configuration for WheatNet-IP

T e c h n i c a l D o c u m e n t. Cisco 3750G, 3560G, 3650 and 3850 Configuration for WheatNet-IP [3750G/3560G/3650/3850 SWITCH CONFIG FOR WHEATNET-IP] 1 T e c h n i c a l D o c u m e n t Cisco 3750G, 3560G, 3650 and 3850 Configuration for WheatNet-IP Overview Let s take a look at what needs to be

More information

Traditional Telephony IP Telephony Voice, Data, Video Integration. Media Convergence. IP Router Server IP Router. Video Distribution Fax

Traditional Telephony IP Telephony Voice, Data, Video Integration. Media Convergence. IP Router Server IP Router. Video Distribution Fax Introduction IP telephony allows organizations and individuals to lower the costs of existing services such as data and broadcast video, while broadening their means of communication to include modern

More information

Enabling Users for Lync services

Enabling Users for Lync services Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option

More information

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Document Summary This document provides information on several integration scenarios

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

DMZ Network Visibility with Wireshark June 15, 2010

DMZ Network Visibility with Wireshark June 15, 2010 DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ

More information

Lab Exercise Protocol Layers

Lab Exercise Protocol Layers Lab Exercise Protocol Layers Objective To learn how protocols and layering are represented in packets. They are key concepts for structuring networks that are covered in the text. The trace for this lab

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

Alcatel-Lucent OmniVista TM 4760 Network Management System

Alcatel-Lucent OmniVista TM 4760 Network Management System Alcatel-Lucent OmniVista TM 4760 Network Management System Network Management Systems Telecom managers need flexible network management tools to deal with the challenge of staying current with today s

More information

Alcatel-Lucent IP Desktop Softphone OMNIPCX ENTERPRISE

Alcatel-Lucent IP Desktop Softphone OMNIPCX ENTERPRISE Alcatel-Lucent IP Desktop Softphone OMNIPCX ENTERPRISE Alcatel-Lucent IP Desktop Softphone is an application installed on a user s desktop (PC or MAC) or tablet (ipad). This multimedia, fully-integrated

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Cisco UC500 IP PBX to connect to Integra Telecom SIP Trunks.

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Computer Networks - Lab Session #4 Layer 2: CSMA-CD & VLANs

Computer Networks - Lab Session #4 Layer 2: CSMA-CD & VLANs Notes : Computer Networks - Lab Session #4 Layer 2: CSMA-CD & VLANs 1 Observing CSMA/CD protocol on a simple example The protocol of the MAC (Multiple Access Carrier) sub-layer of layer 2 is called CSMA/CD

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4414 / Version: 01 Copyright 2011. All Rights Reserved. General Assessment Information Computer Networking Fundamentals Blueprint

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Prestige 650R-31/33 Read Me First

Prestige 650R-31/33 Read Me First Prestige 650R-31/33 Read Me First Prestige Rear Panel Connections PORT DSL CONSOLE LAN 10/100M POWER Connect to a telephone jack using a telephone wire. CONNECTION Connect to a serial port (COM port) on

More information

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol

More information

Cisco Unified Personal Communicator

Cisco Unified Personal Communicator Data Sheet Cisco Unified Personal Communicator An integral part of the Cisco Unified Communications family of products, Cisco Unified Personal Communicator is a desktop computer application that helps

More information

SmartPTT File Transfer User's Guide. Version 2.0

SmartPTT File Transfer User's Guide. Version 2.0 SmartPTT File Transfer User's Guide Version 2.0 Introduction 2 Introduction SmartPTT File Transfer was designed to transfer files over-the-air by means of MOTOTRBO radios. It is an easy-to-use and very

More information

Avaya Call Recording Solution Configuration

Avaya Call Recording Solution Configuration Avaya Call Recording Solution Configuration Avaya IP Office Americas Headquarters OAISYS 7965 South Priest Drive, Suite 105 Tempe, AZ 85284 USA www.oaisys.com (480) 496-9040 CONTENTS 1 Introduction 2 Overview

More information

Using CounterPath X-Lite with Virtual PBX - PC

Using CounterPath X-Lite with Virtual PBX - PC Using CounterPath X-Lite with Virtual PBX - PC Installing X-Lite - Exit any software applications that use sound such as CD and media players. - Run the setup executable file. - Follow the prompts offered

More information

Cisco Configuration Assistant

Cisco Configuration Assistant Cisco Configuration Assistant Configuring a Small Business s Entire Routing, Switching, Wireless, Security, and Voice Network with a Single, Easy-to-Use Tool. Today s businesses depend more than ever on

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

VoIP-PSTN Interoperability by Asterisk and SS7 Signalling

VoIP-PSTN Interoperability by Asterisk and SS7 Signalling VoIP-PSTN Interoperability by Asterisk and SS7 Signalling Jan Rudinsky CESNET, z. s. p. o. Zikova 4, 160 00 Praha 6, Czech Republic rudinsky@cesnet.cz Abstract. PSTN, the world's circuit-switched network,

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell

2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell Management Information Systems, 10/e Raymond McLeod and George Schell 1 Chapter 5 Computing and Communications Resources 2 Learning Objectives Know the various computer components. Know about personal

More information

INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0

INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0 INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0 PLEASE NOTE PRIOR TO INSTALLING On Windows 8, Windows 7 and Windows Vista you must have Administrator rights to install the software. Installing Enterprise Dynamics

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full

More information

Installation of the On Site Server (OSS)

Installation of the On Site Server (OSS) Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper Qfiniti Enterprise and VoIP for Avaya Qfiniti Enterprise and VoIP An etalk Technical White Paper Table of Contents etalk Product Briefing...3 Integration Overview...3 VoIP Connection...4 Layer 2 Connectivity...4

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Troubleshooting Voice Over IP with WireShark

Troubleshooting Voice Over IP with WireShark Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service

More information

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VOIP TELEPHONY: CURRENT SECURITY ISSUES VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the

More information

Program the Broadband Module Plus

Program the Broadband Module Plus Program the Broadband Module Plus Only Systems that have been enabled by BT to use Softphone Features will accept connections from the Softphone Application on your PC. If you are unsure, then please contact

More information

CQG Trader Technical Specifications. December 1, 2014 Version 2014-05

CQG Trader Technical Specifications. December 1, 2014 Version 2014-05 CQG Trader Technical Specifications December 1, 2014 Version 2014-05 Copyright 2014 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows Vista, Windows,

More information

About Company. Who We Are?

About Company. Who We Are? About Company From small start up to fully fledged company, Adore Infotech today dominates the VoIP Communication Business. Robust Performance Distinctive Design and to offer exhilarating and refined communication

More information

Version 2.8. Product Overview. ZTI Communications / 1 rue Ampère / LANNION / France

Version 2.8. Product Overview. ZTI Communications / 1 rue Ampère / LANNION / France Version 2.8 IP Traffic Generator & QoS Measurement Tool for IP Networks (IPv4 & IPv6) ------------------------------------------------------------------ FTTx, LAN, MAN, WAN, WLAN, WWAN, Mobile, Satellite,

More information

1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM

1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM 1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM 1.1 PRECONDITIONS FOR USING HAL E-BANK: An appropriate PC with Windows XP, Windows 2003, Windows Vista or Windows 7 operating system installed;

More information