The use of Xen Virtualization Technology for the Analysys and Teaching of Communications Protocols

Size: px
Start display at page:

Download "The use of Xen Virtualization Technology for the Analysys and Teaching of Communications Protocols"

Transcription

1 The use of Xen Virtualization Technology for the Analysys and Teaching of Communications Protocols Jose Saldana, Julián Fernández-Navajas, José Ruiz-Mas Communication Technologies Group (GTC) Aragon Institute of Engineering Research (I3A) Dpt. IEC. Ada Byron Building. CPS Univ. Zaragoza Zaragoza, Spain {jsaldana, navajas, Abstract. The European Higher Education Area (EHEA) proposes an education centered on the student, and in the acquisition of competences. The possibility of using complex systems for tests, being able to analyze the interactions between their elements is an interesting experience for learning. For the students that are performing their Final Degree Project in Computer Science, the disposal of an environment including a high number of connected nodes can be useful in order to test applications and protocols. This article presents some experiences related to the use of Xen virtualization while performing these projects, and remarks the competences which can be strengthened. Some use cases, in which the characteristics of the environment are especially interesting, are explained. Finally, virtualization has been found as an interesting technology suitable for students interested on research. Keywords. Virtualization, EHEA, competences, virtual laboratory 1 Introduction After some years of study, many Engineering students of European Higher Education Area (EHEA) have to face their last challenge, i.e. the Final Degree Project. They have to use all the acquired skills and knowledge in order to perform a rigorous work, using a proper methodology. This project can either be oriented to the professional world, or it can be seen as their first research work. The new framework proposes a student-oriented education, in which the acquisition of competences is of the first importance. As a consequence, it is important for the student to be able to analyze a set of systems. The availability of a tool allowing the control of a multi-node network can be interesting in order to test their knowledge and skills. In the concrete case of Computer Science, systems consist of a set of nodes, networks, protocols and applications. The student may need to use a number of connected machines, and this fact may cause budget and control problems because of the number of required nodes. In addition, the possibility of having a complete control over the machines using a protocol, and all the applications, from a single interface, can be an interesting option. This kind of systems, assuming scalability and ease of use, can be an interesting teaching environment with a high potential.

2 In the last years, our group is using Xen virtualization to provide the students with a virtual network including a number of machines in the same physical one. These virtual machines have a complete operating system, and use real protocol stacks. A network scenario can be created, in which every machine has a number of network interfaces (Fig. 1). One of the interfaces is only used for control traffic, i.e. it is used to send the commands indicating the virtual machine the tasks to perform. The rest of the interfaces are used to create a network which corresponds to the emulated scenario. Thus, control and test traffic do not interfere, as they do not share the same links, which could reduce the tests realism. This scheme allows us to provide an isolated scenario which can be used by a single student, who can deploy network tests using a low or mid-end PC, which does not require special hardware features. The scheme has been used for teaching, and also for research and knowledge transfer to enterprises. The article is organized as follows: the next section includes the related works. Section 3 presents some use cases of the virtualization platform. The next section details the competences which can be improved by the use of virtualization, and the paper ends with the conclusions. 2 Related Works Many network testbeds and emulators are used in research and academic contexts [1]. In [2] a comparative of the performance of virtualization solutions was performed. Xen presented good results in terms of performance, linearity and isolation between different machines. This is the main reason for selecting it four our platform. A classification of virtualization technologies can be found in [3]. Regarding educational uses of networks, in [4] the design of a laboratory for practical sessions, allowing a big set of network configurations was presented. The main objective was to permit the students to directly configure the machines, and also the capacity for a number of groups to simultaneously work in the laboratory. Research activities were also supported. Public IP Physical machine Control traffic Virtual network Test traffic Fig. 1. A virtual scenario included in a physical machine

3 Regarding the use of virtualization in an educational environment, in [5] a set of experiences was presented, for both theoretical and practical sessions. Xen was used in some of the tests, especially in the ones related to research. The results of a survey about the knowledge of virtualization technologies, between professors and students were also presented. The best known one was found to be VirtualBox, and Xen was used in a smaller percentage, because of its difficulty for managing graphical environments. The main reported strengths of virtualization were its easiness of installation and management, and its public availability. The main weaknesses are hardware requirements and resource consumption. These results are interesting as, according to our experience, Xen can be a very practical solution when used in long-term work, as Final Degree Project is. Other virtualization technologies which permit graphical environments can be more interesting for practical sessions, due to the fact that they are easier to use, although the control over the systems may be smaller. Finally, in [6] the authors present the migration of a laboratory infrastructure, used for network security teaching, from a real-machine environment to a virtual-machine one, based in Xen. More than 40 virtual machines were included into a physical one, also including network components. The students were not aware of the use of virtualization, as it was totally transparent. The authors remark the advantages of Xen, especially in terms of costs and administrative tasks reduction, which were divided by six. Other advantage of the use of Xen virtualization is that the students can get familiar with a technology which they will later probably use in the professional world. 3 Use Cases of the Platform In order to illustrate the usefulness of the platform, we will explain in this section two use cases in which different protocols can be tested and analyzed by students. First, mobility protocols are analyzed and next an IP telephony system is included in the platform by means of virtual machines. 3.1 Mobility Protocols Some tests using MIPv4 mobility protocol were performed, with the aim of measuring handover delay for multimedia flows. The different elements of the scenario are translated into virtual machines (Fig. 2a). The students are able to observe the difference in terms of delay caused by triangle routing when the mobile node is in the destination network (Fig. 2b). An increase of packet size is also present due to IP-over-IP tunneling. The fact of being able to capture traffic traces at eth or IP level allows the students to observe the ARP messages sent by the home agent using the IP address of the mobile node, once the handover is detected, and the rest of exchanged packets during a handover.

4 Mobile Node Mobility One Way Delay (ms) Home Agent OWD (ms) Correspondent Node (a) Foreign Agent packet number Fig. 2. Mobility scheme and measurement of a handover using the test platform (b) Data center Ext PBX ape52 Office Gateway MySQL ape37 ape Ext Xenbr Xenbr SIP Proxy Gateway ape38 ape ape58 Ext ape36 Softphone ape09 SIP Proxy Xenbr Xenbr10 ape54 Ext 300 Office ape51 Gateway Softphone Ext ape42 ape ape41 Xenbr12 ape57 Xenbr14 SIP Proxy Ext ape Office Ext Office Gateway SIP Proxy Softphone ape55 Softphone ape56 ape11 Ext 301 ape05 Office 1 database IP phone SIP proxy PBX SIP proxy Gateway 183 Session Progress 183 Session Progress 302 Moved Temporarily (a) (b) Fig. 3. IP Telephony system scheme and analysis of SIP protocol flow database SIP proxy Gateway Office i Office j 3.2 Protocols for Real-time Service The virtualization platform has also been used to test a real-time distributed application, i.e. a SIP-based IP telephony system which uses a software PBX and a proxy located in each office. Each element of the system has been emulated using a virtual machine, as shown in Fig. 3a. The system also includes a MySQL database server, which is located at the data center. The proxies are in charge of call admission control, which only permits a certain number of simultaneous calls in an office. The calls can also be redirected when there are not available lines at the destination gateway (Fig. 3b). The availability of a complete system for the use of a single student makes it possible to deeply analyze the protocol and debug configuration files. Virtualization permits the use a scenario including 19 machines, which would not be possible if real hardware was used. 4 Acquisition of Competences In this section we will present the competences which we consider that can be improved by the use of this platform, making reference to the use cases we have explained in previous section. The competences have been mainly extracted from [7].

5 Tidiness, Clarity and Precision. The methodology requires from the student to be especially tidy and methodical so as to manage all the machines included in the system. The machines are controlled via remote sessions, so the students have to clearly identify the ones which they are working with, and which are the traffic generators and destinations. Synchronization is a common problem when measuring network delays in Computer Science. This environment can help the student to be aware of this problem and to find solutions. If synchronization is not correct, the results can be illogical, e.g. the arrival can be previous to the sending of packets. The precision provided in these virtual networks is high, and synchronization can be roughly one millisecond, as the network works at processor speed. This fact implies that the student has to emulate network delays, and also has to add some effects offline, as dejitter delay for voice applications. This helps them to correctly identify and distinguish the different delays present, i.e. processing times, transmission, etc. The integration of online and offline tests is good so as to improve the skills related to tidiness. Analytical Thinking and Skillfulness. It can be frequent for an IT professional to cope with applications that do not work correctly. Different tests have to be then performed, so as to identify the level where the problem is. An error may be at physical level, of it may be caused by routing, NAT, application ports, etc. In the presented scenario the access to all communication levels is granted to the students, so they are able to identify the problem wherever it is. Skill in the use of Tools. The fact of including a number of virtual machines into a single physical one makes it impossible the utilization of graphical interfaces for interacting with machines. These environments have high requirements, so a single machine is not able to execute a number of them. As a result, the student has to use command line interface to control all the machines, and this is also interesting, taking into account that it permits a better control. In addition, command line interface is frequently used by IT professionals in enterprises. There is also an interesting ability, which is the capacity of using script languages in order to automatize repetitive tasks. Initiative and Creativity. The virtual environment permits the use of the same tools present in real machines. But some existing limitations imply the need of emulating some behaviors. In these cases, the students have to use their creativity so as to find a way to reproduce or emulate in the virtual environment a situation which can be found in the real one. As an example, IP mobility was emulated by means of creating a duplicate network interface, which was disconnected from the origin network and simultaneously connected to the destination one, while maintaining its IP address. Other example is the use of netem Linux tool to add network delays, when the bridges that connect machines are not real but only virtual ones working at processor speed. Search for Information. The need of using command line interfaces makes it necessary to install non-commercial applications developed by other research groups. The information about these tools may be scarce, so the student has to ask in forums or even has to write to the authors of the programs. Cooperation and Relate Well to Others. The importance of working in a group is growing, and it is getting more and more importance in enterprise environments. In

6 some occasions, a number of students have had to share the same machine, using different networks of virtual ones. In these cases, they have been able to cooperate in different ways, e.g. a student can be in charge of maintaining the database which is used by the rest, or a virtual machine with a correctly installed and configured application can be copied and used by other student. The finding of ways for sharing of experience is also an interesting competency. Finally, coordination between the students is necessary, as measurements cannot be performed at the same time, due to the fact that all the machines share the same hardware resources. 5 Conclusions This work has presented the advantages of the use of Xen virtualization in the performance of Final Degree Projects or long-term works which can be oriented to education or research. The different competences which can be improved by its use have been analyzed. Xen has been found as a suitable environment for learning, as it permits a good control over the different levels of communications protocols Two use cases have been exposed, showing the interest of this platform so as to permit a high control and capacity of analysis of applications and protocols in systems including a high number of nodes. The advantages of virtualization have been highlighted, showing its interest for providing a complete test environment to students. Acknowledgements. This work has been partially financed by CPUFLIPI Project (MICINN TIN ), MBACToIP Project, of Aragon I+D Agency and Ibercaja Obra Social, Project of Catedra Telefonica, Univ. of Zaragoza. References 1. Göktürk, E.: A stance on emulation and testbeds. In Proc. 21st European Conference on Modelling and Simulation ECMS (2007) 2. Quetier, B., Neri, V., Cappello, F.: Selecting A Virtualization System For Grid/P2P Large Scale Emulation. In Proc. Workshop on Experimental Grid testbeds for the assessment of large-scale applications and tools EXPGRID'06, Paris (2006) 3. Tim Jones, M.: Virtual Linux. An overview of virtualization methods, architectures, and implementations. developerworks/linux/library/l-linuxvirt/ 4. Caicedo, C.E., Cerroni, W.: Design of a computer networking laboratory for efficient manageability and effective teaching. Frontiers in Education Conference. FIE '09. 39th IEEE, pp.1-6, (2009) 5. Fuertes, W., López de Vergara, J. E., Meneses, F.: Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Uses Cases. In Proc. II ACE Seminar: Knowledge Construction in Online Collaborative Communities (2009) 6. Lindinger, T., Reiser, H., Felde, N. G.: Virtualizing an IT-Lab for Higher Education Teaching. In für Informatike. V., G., editor, 1. GI/ITG KuVSFachgespräch "Virtualisierung", pp , Paderborn, Germany (2008) 7. Jurse, M., Tominc, P.: Professional competences of graduates as a labour market mechanism for aligning business school curriculum reform with the Bologna declaration principles. Management, 13, (2008)

Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases

Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases W. Fuertes 1,2, J. E. López de Vergara 2, F. Meneses 1 1 Departament of Computer Science, Escuela

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania enache.biancaemilia@gmail.com

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402 Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Department of Communications and Networking. S-38.2131/3133 Networking Technology, laboratory course A/B

Department of Communications and Networking. S-38.2131/3133 Networking Technology, laboratory course A/B Department of Communications and Networking S-38.2131/3133 Networking Technology, laboratory course A/B Work Number 29: VoIP Student Edition Preliminary Exercises and Laboratory Assignments Original document

More information

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: rfarha@comm.utoronto.ca ABSTRACT This paper presents a novel solution to

More information

Main characteristics. System

Main characteristics. System VoipSwitch is a software platform allowing for rapid VoIP services roll-out. It contains all necessary elements required in successful implementation of various VoIP services. Our customers can make money

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

The Experimental Practices of VoIP Based on the Commercial Softswitch Device

The Experimental Practices of VoIP Based on the Commercial Softswitch Device , pp. 167-176 http://dx.doi.org/10.14257/ijfgcn.2015.8.5.17 The Experimental Practices of VoIP Based on the Commercial Softswitch Device Liang Xin-tao 1, Zhu Hong-yuan 2 and Wang Dun-ci 1 1 College of

More information

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,

More information

A dual redundant SIP service. White paper

A dual redundant SIP service. White paper A dual redundant SIP service White paper Ian Colville, Product Manager, Aculab Introduction The Session Initiation Protocol (SIP) eco-system: a unit of interdependent protocols functioning together within

More information

Advanced LCR (Least Cost Router) With SIP Proxy Server

Advanced LCR (Least Cost Router) With SIP Proxy Server With SIP Proxy Server It s all about Reducing Cost!!! WHY ADVANCED LCR (Least Cost Routing) Advanced LCR is a product by Advanced Communications; the same parent company of AdvancedVoIP.com, a widely used

More information

Introduction to VoIP Technology

Introduction to VoIP Technology Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of

More information

Methods for Lawful Interception in IP Telephony Networks Based on H.323

Methods for Lawful Interception in IP Telephony Networks Based on H.323 Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering

More information

Internet Telephony PBX System. IPX-300 Series. Quick Installation Guide

Internet Telephony PBX System. IPX-300 Series. Quick Installation Guide Internet Telephony PBX System IPX-300 Series Quick Installation Guide Overview PLANET IPX-300/IPX-300W IP PBX telephony systems ( IP PBX in the following term) are designed and optimized for the small

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Voice over IP Communications

Voice over IP Communications SIP The Next Big Step Voice over IP Communications Presented By: Stephen J. Guthrie VP of Operations Blue Ocean Technologies Goals What are our Goals for Today? Executive Summary: It is expected that real-time

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

ETM System SIP Trunk Support Technical Discussion

ETM System SIP Trunk Support Technical Discussion ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with

More information

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch. Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Enabling NAT and Routing in DGW v2.0 June 6, 2012 Enabling NAT and Routing in DGW v2.0 June 6, 2012 Proprietary 2012 Media5 Corporation Table of Contents Introduction... 3 Starting Services... 4 Distinguishing your WAN and LAN interfaces... 5 Configuring

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

http://d-nb.info/1041302002

http://d-nb.info/1041302002 Contents 1 Introduction 1 1.1 Requirements for Evaluation Techniques 1 1.2 Performance Evaluation Techniques 2 1.2.1 Network Testbeds / Real-World Measurements 2 1.2.2 Network Simulators 3 1.2.3 Analytic

More information

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style

More information

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj abhishek.bajaj@iiitb.net 2. Anargha Biswas anargha.biswas@iiitb.net 3. Ambarish Kumar ambarish.kumar@iiitb.net 4.

More information

Packetized Telephony Networks

Packetized Telephony Networks Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Research Article Video Conferences through the Internet: How to Survive in a Hostile Environment

Research Article Video Conferences through the Internet: How to Survive in a Hostile Environment e Scientific World Journal Volume 14, Article ID 8617, 13 pages http://dx.doi.org/1.1155/14/8617 Research Article Video Conferences through the Internet: How to Survive in a Hostile Environment Carlos

More information

Towards a virtualized Internet for computer networking assignments

Towards a virtualized Internet for computer networking assignments Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and

More information

Testing Intelligent Device Communications in a Distributed System

Testing Intelligent Device Communications in a Distributed System Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) dgoughnour@trianglemicroworks.com United States Smart Grid systems

More information

VoIP Fraud and Misuse

VoIP Fraud and Misuse DFN Tagung 15.10.2013 VoIP Fraud and Misuse Detection and Mitigation Prof. Dr.-Ing. Erwin P. Rathgeb Dirk Hoffstadt, M.Sc. Networking Technology Group Institute for Experimental Mathematics & Institute

More information

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks How-to guides for configuring VPNs with GateDefender Integra Panda Security wants

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

QuickSpecs. Models. Features and benefits Configuration. HP VCX x3250m2 IP Telecommuting Module. HP VCX x3250m2 IP Telecommuting Module Overview

QuickSpecs. Models. Features and benefits Configuration. HP VCX x3250m2 IP Telecommuting Module. HP VCX x3250m2 IP Telecommuting Module Overview Overview Models JE404A Key features Based on a security-hardened version of Linux Works in conjunction with existing firewalls Receives SIP signaling directly from Internet Transparently supports NAT;

More information

IBM WebSphere Application Server Communications Enabled Applications

IBM WebSphere Application Server Communications Enabled Applications IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

Implementing a Voice Over Internet (Voip) Telephony using SIP. Final Project report Presented by: Md. Manzoor Murshed

Implementing a Voice Over Internet (Voip) Telephony using SIP. Final Project report Presented by: Md. Manzoor Murshed Implementing a Voice Over Internet (Voip) Telephony using SIP Final Project report Presented by: Md. Manzoor Murshed Objectives Voice Over IP SIP H.323 MGCP Simulation using Westplan Conclusion 5/4/2006

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16

More information

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts

More information

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Russell Bennett UC Insights www.ucinsights.com russell@ucinsights.com Introduction Those familiar with unified communications

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School

More information

Cisco Unity PBX and T1 IP Media Gateways

Cisco Unity PBX and T1 IP Media Gateways Cisco Unity PBX and T1 IP Media Gateways Description The Cisco Unity IP Media Gateway products are integration devices designed to offer a highquality connection between Cisco Unity or Cisco Unity Connection

More information

Integrating Voice over IP services in IPv4 and IPv6 networks

Integrating Voice over IP services in IPv4 and IPv6 networks ARTICLE Integrating Voice over IP services in IPv4 and IPv6 networks Lambros Lambrinos Dept.of Communication and Internet studies Cyprus University of Technology Limassol 3603, Cyprus lambros.lambrinos@cut.ac.cy

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU

More information

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

UTILIZATION OF VIRTUAL MACHINES IN LABORATORY STANDS ON EXAMPLE OF SIP EXPRESS ROUTER APPLICATION

UTILIZATION OF VIRTUAL MACHINES IN LABORATORY STANDS ON EXAMPLE OF SIP EXPRESS ROUTER APPLICATION 2007 Poznańskie Warsztaty Telekomunikacyjne Poznań 6-7 grudnia 2007 POZNAN POZNAN UNIVERSITY UNIVERSITYOF OF TECHNOLOGY ACADEMIC ACADEMIC JOURNALS JOURNALS No 54 Electrical Engineering 2007 Bartosz PAWŁOWICZ*

More information

Cisco Networking Academy CCNP Multilayer Switching

Cisco Networking Academy CCNP Multilayer Switching CCNP3 v5 - Chapter 5 Cisco Networking Academy CCNP Multilayer Switching Implementing High Availability in a Campus Environment Routing issues Hosts rely on a router to find the best path Issues with established

More information

Presented By Quentin Hartman System Administrator InsightsNow, Inc. IT Pro Forum 4/17/2007 itproforum.org

Presented By Quentin Hartman System Administrator InsightsNow, Inc. IT Pro Forum 4/17/2007 itproforum.org Server Virtualization with VMware Products Presented By Quentin Hartman System Administrator InsightsNow, Inc. IT Pro Forum 4/17/2007 itproforum.org What is Server Virtualization? Virtualization is an

More information

Simulation of SIP-Based VoIP for Mosul University Communication Network

Simulation of SIP-Based VoIP for Mosul University Communication Network Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Part Number: 203285. HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD.

Part Number: 203285. HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD. Part Number: 203285 HG253s V2 Home Gateway Issue V100R001_01 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

VoIP Conformance Labs

VoIP Conformance Labs VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP

More information

Hyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud

Hyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud Hyper-V Network Virtualization Gateways - nappliance White Paper July 2012 Introduction There are a number of challenges that enterprise customers are facing nowadays as they move more of their resources

More information

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May 2014. 2014 Far South Networks

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May 2014. 2014 Far South Networks Com.X Router/Firewall Module Use Cases White Paper Version 1.0, 21 May 2014 2014 Far South Networks Document History Version Date Description of Changes 1.0 2014/05/21 Preliminary 2014 Far South Networks

More information

Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX

Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX Whitepaper The Top 10 Advantages of 3CX Phone System Why your next phone system should be software based and by 3CX This whitepaper outlines the top 10 advantages of choosing 3CX Phone System, a Windows

More information

2 Voice over IP Network

2 Voice over IP Network 2 Voice over IP Network VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 8 2.1 VoIP Network Elements...3 2.2 Single-Site VoIP Location...4 2.3 Multi-Site VoIP Location...5 2.4 PBX Networking

More information

SIP Infrastructure Performance Testing

SIP Infrastructure Performance Testing SIP Infrastructure Performance Testing MIROSLAV VOZNAK, JAN ROZHON Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15, Ostrava CZECH REPUBLIC miroslav.voznak@vsb.cz,

More information

How To Understand The Concept Of Circuit Switching

How To Understand The Concept Of Circuit Switching Module 2 Communication Switching Lesson 2 Circuit Switching INSTRUCTIONAL OBJECTIVES GENERAL This lesson is aimed at developing the concept and application of circuit switching which is a very important

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Internet Telephony PBX System

Internet Telephony PBX System Internet Telephony PBX System GSM Gateway PSTN call busy forward to GSM Configuration Copyright PLANET Technology Corporation. All rights reserved. Case 32: PSTN call busy forward to GSM Configuration

More information

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper Qfiniti Enterprise and VoIP for Avaya Qfiniti Enterprise and VoIP An etalk Technical White Paper Table of Contents etalk Product Briefing...3 Integration Overview...3 VoIP Connection...4 Layer 2 Connectivity...4

More information

Application Description

Application Description Application Description Firewall in front of LAN Different Servers located behind Firewall Firewall to be accessible from Internet Load Balancer to be installed in a TRANSPARENT MODE between Firewall and

More information

High-performance VoIP Traffic Optimizer Client Solution

High-performance VoIP Traffic Optimizer Client Solution AP-VTO200 VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Allworx 6x IP PBX to connect to Integra Telecom

More information

Solving the Firewall and NAT Traversal Issues for SIP-based VoIP

Solving the Firewall and NAT Traversal Issues for SIP-based VoIP Solving the Firewall and Traversal Issues for SIP-based VoIP Yevgeniy Yeryomin Technische Universität Ilmenau Germany, 98693 Ilmenau EMail: yevgeniy.yeryomin@tu-ilmenau.de Florian Evers Technische Universität

More information

UK Interconnect White Paper

UK Interconnect White Paper UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have

More information

Avaya IP Office Unified Communications for Small Business

Avaya IP Office Unified Communications for Small Business Avaya IP Office Unified Communications for Small Business Unified Communications for Small Business is a suite of applications that: Turns a home phone into an IP Office telephone with the Phone Manager

More information

SWOON: A Testbed for Secure Wireless Overlay Networks

SWOON: A Testbed for Secure Wireless Overlay Networks SWOON: A Testbed for Secure Wireless Overlay Networks Y. L. Huang, J. D. Tygar, H. Y. Lin, L. Y. Yeh, H. Y. Tsai, K. Sklower, S. P. Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, C. W. Hsu,

More information

The changing face of global data network traffic

The changing face of global data network traffic The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This

More information

ISERink Overview. Version 1.1. February 1, 2015

ISERink Overview. Version 1.1. February 1, 2015 ISERink Overview Version 1.1 February 1, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to undertake

More information

White Paper: ShoreTel versus Zultys Comparison [February 2009]

White Paper: ShoreTel versus Zultys Comparison [February 2009] White Paper: ShoreTel versus Zultys Comparison [February 29] 1. ShoreTel: Are you sure? ShoreTel is a familiar name in the small (up to seats) and medium ( to seats) sized IP telephony market. Its products

More information

Asterisk: A Non-Technical Overview

Asterisk: A Non-Technical Overview Asterisk: A Non-Technical Overview Nasser K. Manesh nasser@millenigence.com Millenigence, Inc. 5000 Birch St., Suite 8100 Newport Beach, CA 92660 June 2004, Revised December 2004 Executive Summary Asterisk

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D

How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: zklebic@openinformatics.net Configuring a Vyatta 4.0 release

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,

More information

Disaster Recovery White Paper

Disaster Recovery White Paper Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase

More information