A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

Size: px
Start display at page:

Download "A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network"

Transcription

1 A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania Irina Giea Global Service Delivery Department Alcatel-Lucent Timisoara, Romania Abstract In the telecommunication domain, the simulation methodology is very important for the researchers because there are many simulation software. This paper presents a method of implementing a Voice over IP network in two steps. The first step is creating a real network, then analyze the call sessions. The second step is simulating the network and analyzing the traffic. Keywords VoIP network, network simulator, call sessions, traffic flow. I. Introduction More and more people need to communicate. Through this direction were implemented many technologies. The Voice over IP (VoIP) is one of them. It allows the user to make/receive a call from/to its telephone or personal computer (PC) using the IP cloud. VoIP comes as an answer to the call users who want to benefit of the same security, speed and quality of service as the network users already have [8-10]. Specific protocols were designed for this new type of network, like Session Initiation Protocol (SIP). Implementing, simulating and analyzing a VoIP network can be done in different ways and using various tools and simulators. In he next chapters, we will present one of this methods[1]. II. tools and simulators To develop our VoIP network, we used the following tools: X-LITE, PBX Manager, Asterisk, Hammer Call Analyzer, GNS3 and Wireshark [6-7]. For the first step, the tools (X-LITE, PBX Manager, Asterisk and Hammer Call Analyzer) are described below. X-LITE is a software that enables a PC to receive or execute telephone calls, calls that can originate from another PC or from an IP telephone. The type of calls are audio, video or both (conferences). You can also send messages towards different devices that supports this service. In order to be able to use this software, the PC has to accomplish several minimum performance conditions: Processor: Intel Core Duo (or its equivalent), Video Card with support for DirectX 9.0c Memory: 2 GB RAM This paper is supported by the Human Resources Development Programme POSDRU/159/1.5/S/ financed by the European Social Fund and by the Romanian Government. Space on Hard Disk: 50 MB Operating system: Microsoft XP Service Pack2, Vista (32 or 64 bits), 7 or MAC OS 10.5 Connection: connection to a network (broadband, LAN, wireless), permanent connection to Internet Sound adaptor: Full-duplex, 16 bit or using a USB Headset PBX Manager is a software that depends on Asterisk. It is a graphical management interface which allows the configuration and management of a PC in order for it to act like a conventional PBX (Private Branch Exchange). This software allows the construction of a VOIP PBX with the integration of capabilities and characteristics which can't be found in the PBX conventional systems. Asterisk is an open source program that transforms a PC into a communication server. It is used with PBX systems based on IP, VOIP gateways, conference servers and others. The most important files are extensions.conf and sip.conf. Extensions.conf defines the PBX calling plan for each user. In the sip.conf file we can configure everything that is related with the SIP protocol, like the creation of new users or the definition of the SIP suppliers. Hammer Call Analyzer can discover, isolate and fix signaling or transmission problems. With its help you can visualize what protocols were used, you can correlate call sessions over multiple protocols or domains and you can also visualize and analyze call session flows. The simulation of the network, for the second step, was possible using the GNS3 and Wireshark. GNS3 is a graphical network simulator which allows the simulation of complex networks. In order for it to function, it is dependent on three other programs that must run simultaneous: Dynamips (the core for GNS3 that emulates IOS CISCO images), Dynagen (text-based software that is necessary to Dynamips ) and Qemu (open source emulator and virtualization tool). Wireshark is the most common tool for analyzing the network protocols, fixing the network problems, developing software products and communication protocols. Wireshark captures the traffic of packets in real time but the analyze can be made offline. 109

2 Fig.2 Case 1 - capture window III. CREATING A REAL VOIP NETWORK In order to create the network, we connected three PCs with a router [2-3]. Each PC is behaving like a telephone, meaning that it can receive or make calls. connecting the PC as a telephone was possible using three software: X-LITE, PBX Manager and Asterisk. For the identification of each PC, we attached an ID number that can be used as a telephone number also. One PC will act as a telephone and also as a PBX station. Because the network is connected to the Internet, each PC will have the IP address of the PBX station. This must not be confused with its own IP address [Fig.1]. The PC that runs as both a telephone and a station is PC3, with the calling number Each PC has the IP address in the range of x. In order to study this network from the point of view of the protocols involved, we captured the packets using Hammer Call Analyzer software. In the case of our network, only one PC has this program installed (PC1), which is why the sessions that will be studied, will be initiated only by PC1. There are four windows in the capture program Hammer Call Analyzer as you can see above (from left to right, updown): list of captured packets, call flow with the list of calls and statistics, a detailed list of the protocols used in the sessions, protocol list in hexadecimal format. In the second case, PC1 calls PC3. The caller is announced that PC3 is already in a conversation and receives two choices: it can leave a message which PC3 will receive after it closes the call or it can terminate the session. We can visualize all the steps of a call session in the callflow window. This window presents each command the SIP protocols requires in order to establish a correct call session. In the figure below are shown several statistics for the packets (Ethernet, IP, UDP-User Datagram Protocol) and other information (Fig.3). Fig.3 Protocol statistics Fig.1 The configuration of the real VOIP network For the capturing of the packets we chose three situations. In the first case, PC1 calls PC2 but after a few seconds PC2 is put on hold for 10 sec. during which PC1 calls PC3, a session that also lasts for 10sec. PC1 ends the session with PC3 because it's not answering. PC1 returns to the session created with PC2 and also closes shortly (Fig.2). In the last case, PC1 calls PC2. PC2 answers and talks for 10sec. PC2 then puts on hold PC1 and calls PC3. PC3 answers and talks for 10sec. before closes. PC2 returns to the call with PC1 and closes after a short time. Because the calls go through the PBX station PC3, the IP addresses for the called PCs will not be showed (Fig.4). Fig.4 Case 3 - call flow 110

3 IV. SIMULATING THE VOIP NETWORK For the simulation we used a router from the 1700 platform and three PCs. For the router to be accepted by the program IOS images had to be loaded as well as configuring each PC to accept connections towards the router. GNS3 has five windows were you can see the devices available to create a network, the network implementation area, a console that can be used as a telnet, a summary of the network topology and a window with the packet captures that are running (Fig.5). Fig. 5 The network topology Both router and the PCs have special menus where you can modify certain information. Once the network is created and works, you can proceed to analyze it with Wireshark. To start the capture of packets, you need to right-click on any connection and select "Start Wireshark". All of the captures are for the traffic between the router and PC2 (Fig.6). Fig.7 Capture menu In the Analyze menu you can select and visualize the filters, you can see the TCP (Transmission Control Protocol), UDP or SSL (Secure Socket Layer) flows and you can validate protocols. One of the most important menus is the Statistics menu. The first option you can select presents a summary of the capture that is running. There you can find information about the topology's name, the encapsulation that is used or the size limit of the packets. Also, you can see when the first and the last packet arrived and the duration between these packets. The summary also presents information about the traffic (Fig.8). Fig.6 Packet capture between router and PC2 The most revealing actions that can be taken to analyze a network are the ones from the menus: capture, analyze statistics and telephony (when using the virtual models for IP telephones). The capture of packets depends on different options. You can choose the interface you are using for the capture, you can select the filter meaning that only the packets that are passing through the filer will be captured (Fig. 7). Fig.8 Statistics menu - Flow graph To see the protocol hierarchy used by this network, the conversations that were captured, the input-output graphic of the data and the traffic analysis, we used the interface between the router and PC2 (Fig. 9). 111

4 select on X axe the packets by their hour, minute or second when their appeared (Fig. 12). Fig. 12 Input-Output traffic graphic Fig.9 Protocol hierarchy statistics The conversations between these devices are of two types: Ethernet and UDP [4-5]. Both present the number of sessions captured and the number of packets, their size and the direction from which they were captured. The traffic analyze depends on the selected options from the Statistics menu-flow graph (Fig. 8). Once they are selected the window from figure Fig.13 will appear. There we can observe each message that was received by the two devices. For this analysis we chose the TCP flows with the standard addresses for the source and destination. Each message received is detailed in the right side of the window (Fig.13). Fig. 10 Ethernet sessions The difference is that the UDP session also presents the port number of the device involved and the IP addresses of the devices (Fig. 11). Fig. 13 Traffic analysis V. CONCLUSIONS Implementing the network using this method reflects many advantages. The tools and simulators are both used by the researchers and in the engineering field. The analyzers work in real-time but the troubleshooting can be done in offline mode. The capture of packets offers an accuracy of milliseconds for each packet. Using this network model, the same principle can be applied to various network sizes from a company s intranet to a city s Metropolitan Access Network (MAN). Fig. 11 UDP sessions The window opened to visualize the input-output graphic of the traffic has options for choosing the filter. You can also modify the axes of the graphic. The axe X is the time axe and has a range between a few milliseconds and a few minutes. The Y axe can linear, logarithmic or automatic. You can also Acknowledgment This paper is supported by the Human Resources Development Programme POSDRU/159/1.5/S/ financed by the European Social Fund and by the Romanian Government. References [1] J. Davidson, J.Peters and Brian Gracely, Voice over IP Funtamentals, Cisco Press, March

5 [2] A. M. Law and W. D. Kelton, Simulation modelling and analysis, thirded. New York: McGraw-Hill, [3] E. K. Bowdon, "Using simulation to evaluate system performance "presented at Proceedings of the 11th workshop on Design automation1974, pp [4] B. Goode, Voice over Internet Protocol(VoIP), Proceedings of the IEEE, vol.90, 2002, pp [5] J. J. Yi and D. J. Lilja, "Simulation of computer architectures:simulators, benchmarks, methodologies and recommendations," IEEETransaction on Computers, vol. 55, no. 3, pp , [6] Thomas P., H.323 Mediated Voice over IP: Protocols, Vulnerabilities; Remediation, updated 2 November 2010, [online] Available: mediated-voice-overip-protocols-vulnerabilitiesamp-remediation [7] Florian Fankhauser, at. al., Security Test Environment for VoIP Research, International Journal for Information Security Research (IJISR), 1(1/2), Pages 53-60, (2011). [8] Park P, Voice over IP security, Cisco Press, (2009). [9] R. G. Cole and J. H. Rosenbluth, Voice over IP performance monitoring, SIGCOMM Computer Communnication Review, vol. 31, pp , 2011 [10] H. P. Singh, S. Singh, J. Singh, and S. A. Khan, VoIP: state of art for global connectivity a critical review, Journal of Network and Computer Applications, vol. 37, no. 1, pp ,

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

Configuring Bria 3 Windows for Virtual Contact Center

Configuring Bria 3 Windows for Virtual Contact Center Configuring Bria 3 Windows for Virtual Contact Center 8x8 issues Counterpath s Bria softphone licenses to Virtual Contact Center customers. Bria 3 is a softphone application that enables you to manage

More information

Cisco IP Communicator (Softphone) Compatibility

Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows

More information

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step

More information

Configuring a Softphone for Windows for Virtual Contact Center

Configuring a Softphone for Windows for Virtual Contact Center Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all

More information

Configuring Bria 3 Mac for Virtual Contact Center

Configuring Bria 3 Mac for Virtual Contact Center Configuring Bria 3 Mac for Virtual Contact Center Counterpath s Bria 3 is a softphone application that enables you to manage your Virtual Contact Center VOIP calls easily from your desktop replacing or

More information

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP. 1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise

More information

AT&T Unified Communications Voice. IP Communicator Installation Guide

AT&T Unified Communications Voice. IP Communicator Installation Guide AT&T Unified Communications Voice IP Communicator Installation Guide For Customer s System Administrator V1.1 July, 2015 Disclaimer The contents of the document may be revised by AT&T at any time without

More information

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering

More information

Lab - Using Wireshark to Observe the TCP 3-Way Handshake

Lab - Using Wireshark to Observe the TCP 3-Way Handshake Topology Objectives Part 1: Prepare Wireshark to Capture Packets Select an appropriate NIC interface to capture packets. Part 2: Capture, Locate, and Examine Packets Capture a web session to www.google.com.

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

Configure A VoIP Network

Configure A VoIP Network Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: alto.ec@gmail.com Ms. Zarna M. Gohil Electronics & Communication

More information

AUTOMATIC BILLING SYSTEM FOR CISCO ANALOG TELEPHONE ADAPTOR ATA 186/188

AUTOMATIC BILLING SYSTEM FOR CISCO ANALOG TELEPHONE ADAPTOR ATA 186/188 AUTOMATIC BILLING SYSTEM FOR CISCO ANALOG TELEPHONE ADAPTOR ATA 186/188 Rosen Ivanov Technical University of Gabrovo, BULGARIA E-mail: rs-soft@ieee.org Abstract: This paper presents an automatic billing

More information

Controlling Ashly Products From a Remote PC Location

Controlling Ashly Products From a Remote PC Location Controlling Ashly Products From a Remote PC Location Introduction Ashly networked products can be accessed from a remote PC on a different network if the router used for the Ashly device is properly configured.

More information

Cisco Analog Telephone Adaptor Overview

Cisco Analog Telephone Adaptor Overview CHAPTER 1 This section describes the hardware and software features of the Cisco Analog Telephone Adaptor (Cisco ATA) and includes a brief overview of the Skinny Client Control Protocol (SCCP). The Cisco

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

AC 2007-2976: A PRACTICAL APPROACH TO INTEGRATE TEACHING VOICE-OVER-IP TECHNOLOGY IN THE CLASSROOM

AC 2007-2976: A PRACTICAL APPROACH TO INTEGRATE TEACHING VOICE-OVER-IP TECHNOLOGY IN THE CLASSROOM AC 2007-2976: A PRACTICAL APPROACH TO INTEGRATE TEACHING VOICE-OVER-IP TECHNOLOGY IN THE CLASSROOM Farid Farahmand, farahmandfar@ccsu.edu American Society for Engineering Education, 2007 Page 12.91.1 A

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions The following FAQ s are intended to address common questions regarding the AvayaLive Connect service. The full set of legal terms and conditions applicable to the AvayaLive Connect

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Cisco UC500 IP PBX to connect to Integra Telecom SIP Trunks.

More information

Simulation of SIP-Based VoIP for Mosul University Communication Network

Simulation of SIP-Based VoIP for Mosul University Communication Network Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

OAISYS and ShoreTel: Call Recording Solution Configuration. An OAISYS White Paper

OAISYS and ShoreTel: Call Recording Solution Configuration. An OAISYS White Paper OAISYS and ShoreTel: Call Recording Solution Configuration An OAISYS White Paper Table of Contents Introduction... 3 ShoreTel Networks... 4 Trunk Side Recording... 4 Station Side Recording... 6 Active

More information

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC.

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC. 4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC. Wireshark (see Section 6) is a network packet analyser. It is used to: troubleshoot network problems, examine security problems, debug protocol implementations,

More information

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Enabling NAT and Routing in DGW v2.0 June 6, 2012 Enabling NAT and Routing in DGW v2.0 June 6, 2012 Proprietary 2012 Media5 Corporation Table of Contents Introduction... 3 Starting Services... 4 Distinguishing your WAN and LAN interfaces... 5 Configuring

More information

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VOIP TELEPHONY: CURRENT SECURITY ISSUES VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the

More information

Installation of the On Site Server (OSS)

Installation of the On Site Server (OSS) Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit

More information

Keywords: VoIP calls, packet extraction, packet analysis

Keywords: VoIP calls, packet extraction, packet analysis Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,

More information

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument. TA Instruments TRIOS Software Installation Instructions Installation Requirements Your TRIOS Instrument Control software includes all the components necessary to install or update the TRIOS software, as

More information

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Internet Basics Thursday, November 20, 2008

Internet Basics Thursday, November 20, 2008 Internet Basics Thursday, November 20, 2008 Welcome to Internet Basics, the first section of the Basic Networking course of the online Allworx Reseller technical training. This course provides general

More information

SmartPTT File Transfer User's Guide. Version 2.0

SmartPTT File Transfer User's Guide. Version 2.0 SmartPTT File Transfer User's Guide Version 2.0 Introduction 2 Introduction SmartPTT File Transfer was designed to transfer files over-the-air by means of MOTOTRBO radios. It is an easy-to-use and very

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

IP Office IP Office Softphone Installation

IP Office IP Office Softphone Installation Softphone Installation - Issue 1a - (15 March 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

About Company. Who We Are?

About Company. Who We Are? About Company From small start up to fully fledged company, Adore Infotech today dominates the VoIP Communication Business. Robust Performance Distinctive Design and to offer exhilarating and refined communication

More information

Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis

Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis Application Note Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis Introduction This application note is one in a series of local area network (LAN) troubleshooting papers from JDSU

More information

Considerations for a successful demo and implementation of Simplicity Video

Considerations for a successful demo and implementation of Simplicity Video CLOUD SOLUTIONS Considerations for a successful demo and implementation of Simplicity Video Client Requirements: PC Requirements Windows Software Processor RAM Video Memory Hard Drive Space Camera Audio

More information

Cisco Configuration Assistant

Cisco Configuration Assistant Cisco Configuration Assistant Configuring a Small Business s Entire Routing, Switching, Wireless, Security, and Voice Network with a Single, Easy-to-Use Tool. Today s businesses depend more than ever on

More information

Evaluation of Security for a H.323-based VoIP Emulated Architecture

Evaluation of Security for a H.323-based VoIP Emulated Architecture Evaluation of Security for a H.323-based VoIP Emulated Architecture Eng. MARIUS HERCULEA, Professor VIRGIL DOBROTA Ph.D. Abstract Evaluation tests were conducted on H.323 Cisco Gatekeeper, Gateways and

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Enabling Users for Lync services

Enabling Users for Lync services Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

Cisco SPA525G2 5-Line IP Phone

Cisco SPA525G2 5-Line IP Phone Q & A Cisco SPA525G2 5-Line IP Phone Q. What is the Cisco SPA525G2 5-Line IP Phone? A. The Cisco SPA525G2 IP Phone is a five-line phone that features a high resolution color display. The phone operates

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright (robert.wright@ultra-audiosoft.com), BSc (Hons) Ultra Electronics AudioSoft, October

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Traditional Telephony IP Telephony Voice, Data, Video Integration. Media Convergence. IP Router Server IP Router. Video Distribution Fax

Traditional Telephony IP Telephony Voice, Data, Video Integration. Media Convergence. IP Router Server IP Router. Video Distribution Fax Introduction IP telephony allows organizations and individuals to lower the costs of existing services such as data and broadcast video, while broadening their means of communication to include modern

More information

Alcatel-Lucent Office Communication Solutions

Alcatel-Lucent Office Communication Solutions Alcatel-Lucent Office Communication Solutions PIMphony, your personal communication manager Frequently Asked Questions April, 2007 All Rights Reserved Alcatel-Lucent 2007 Alcatel-Lucent Office Communication

More information

Alcatel-Lucent IP Desktop Softphone OMNIPCX ENTERPRISE

Alcatel-Lucent IP Desktop Softphone OMNIPCX ENTERPRISE Alcatel-Lucent IP Desktop Softphone OMNIPCX ENTERPRISE Alcatel-Lucent IP Desktop Softphone is an application installed on a user s desktop (PC or MAC) or tablet (ipad). This multimedia, fully-integrated

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Application Note. Onsight Connect Network Requirements V6.1

Application Note. Onsight Connect Network Requirements V6.1 Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Document Summary This document provides information on several integration scenarios

More information

Requirements. System Requirements. System Requirements, page 1 Port Requirements, page 4 Supported Codecs, page 5

Requirements. System Requirements. System Requirements, page 1 Port Requirements, page 4 Supported Codecs, page 5 System, page 1 Port, page 4 Supported Codecs, page 5 System Each of the components listed in the following table must meet the requirements. Use of unsupported components can result in a nonfunctional

More information

CQG/LAN Technical Specifications. January 3, 2011 Version 2011-01

CQG/LAN Technical Specifications. January 3, 2011 Version 2011-01 CQG/LAN Technical Specifications January 3, 2011 Version 2011-01 Copyright 2011 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows XP, Windows Vista,

More information

VoIP telephony over internet

VoIP telephony over internet VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)

More information

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging

More information

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full

More information

Ports utilisés. Ports utilisés par le XT1000/5000 :

Ports utilisés. Ports utilisés par le XT1000/5000 : Ports utilisés Ports utilisés par le XT1000/5000 : 80 HTTP (TCP) WEB server 123 SNTP (UDP) SNTP Client 161 SNMP (UDP) SNMP Configuration and Status 162 SNMP (UDP) SNMP Traps and events 1718 H.225/RAS (UDP)

More information

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying

More information

VoIP-PSTN Interoperability by Asterisk and SS7 Signalling

VoIP-PSTN Interoperability by Asterisk and SS7 Signalling VoIP-PSTN Interoperability by Asterisk and SS7 Signalling Jan Rudinsky CESNET, z. s. p. o. Zikova 4, 160 00 Praha 6, Czech Republic rudinsky@cesnet.cz Abstract. PSTN, the world's circuit-switched network,

More information

Alcatel-Lucent OmniVista TM 4760 Network Management System

Alcatel-Lucent OmniVista TM 4760 Network Management System Alcatel-Lucent OmniVista TM 4760 Network Management System Network Management Systems Telecom managers need flexible network management tools to deal with the challenge of staying current with today s

More information

Open-Source Software Toolkit for Network Simulation and Modeling

Open-Source Software Toolkit for Network Simulation and Modeling Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu Abstract This paper summarizes

More information

Smoking and any food or drinks are not permitted in the Applications Lab!

Smoking and any food or drinks are not permitted in the Applications Lab! 220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks

More information

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.

More information

Integrate Microsoft Office Communicator Client and Microsoft Lync Client for Cisco UC

Integrate Microsoft Office Communicator Client and Microsoft Lync Client for Cisco UC Integrate Microsoft Office Communicator Client and Microsoft Lync Client for Cisco UC Overview, page 1 Limitations and considerations, page 2 Cisco UC Integration for Microsoft Office Communicator client

More information

Cisco IP Communicator

Cisco IP Communicator Cisco IP Communicator 2.1 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, delivering a media-rich collaboration experience across

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

TamoSoft Throughput Test

TamoSoft Throughput Test TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...

More information

CT505-30 LANforge-FIRE VoIP Call Generator

CT505-30 LANforge-FIRE VoIP Call Generator 1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP

More information

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7

More information

Wireshark Tutorial INTRODUCTION

Wireshark Tutorial INTRODUCTION Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation

More information

Cisco Unified CallConnector for Microsoft Windows

Cisco Unified CallConnector for Microsoft Windows Cisco Unified CallConnector for Microsoft Windows Cisco Unified Communications is a comprehensive IP communications system of voice, video, data, and mobility products and applications. It enables more

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

Customer Contract. MX Columbia. December 8, 2011. s u p p o r t @ t e l d i o. c o m. P h o n e : 6 1 3. 2 7 1. 5 9 8 0. F a x : 6 1 3. 2 7 1.

Customer Contract. MX Columbia. December 8, 2011. s u p p o r t @ t e l d i o. c o m. P h o n e : 6 1 3. 2 7 1. 5 9 8 0. F a x : 6 1 3. 2 7 1. Customer Contract MX Columbia December 8, 2011 s u p p o r t @ t e l d i o. c o m P h o n e : 6 1 3. 2 7 1. 5 9 8 0 F a x : 6 1 3. 2 7 1. 9 8 1 0 INTRODUCTION Congratulations on your purchase of a Teldio

More information

The Experimental Practices of VoIP Based on the Commercial Softswitch Device

The Experimental Practices of VoIP Based on the Commercial Softswitch Device , pp. 167-176 http://dx.doi.org/10.14257/ijfgcn.2015.8.5.17 The Experimental Practices of VoIP Based on the Commercial Softswitch Device Liang Xin-tao 1, Zhu Hong-yuan 2 and Wang Dun-ci 1 1 College of

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information