Automatic Monitoring & Detection System (AMDS) for Grey Traffic
|
|
|
- Laurence McCoy
- 9 years ago
- Views:
Transcription
1 , October 21-23, 2015, San Francisco, USA Automatic Monitoring & Detection System (AMDS) for Grey Traffic Mahmood A. Khan, Syed Yasir Imtiaz, Mustafa Shakir Abstract International incoming grey traffic is currently one of the most important issues for both the Regulator and legal telecommunication operators in Pakistan. The major reason for higher grey traffic in Pakistan is because of international settlement rates which are higher than the cost of domestic termination rate. The grey traffic operators gain financial advantage by offering low international incoming termination rate to international carriers and thus bypass the legally established telecom network. In this paper, a detailed overview of grey route along with its termination techniques is discussed. Some of the existing techniques for monitoring and detection of grey traffic are compared and a novel method is proposed using the flow level characteristics of network traffic that will be more efficient and accurate for monitoring and detection of Grey traffic. Index Terms Grey traffic monitoring, Grey traffic detection, Network Security, Legal & ethical issues For example, telecom traffic originating from United States of America (USA) is transmitted via Internet Protocol (IP) to Voice over Internet Protocol (VoIP) [1] routers in Pakistan and from there, it is terminated to local Pakistani Public Switch Telephone Network (PSTN) via Wireless Local Loop (WLL) and local mobile numbers. This whole process is white from USA s perspective but is black from Pakistan prospective. In general, there are three types of routes that are used in communication networks: White Route: both source and destination have legal termination. Black Route: both source and destination have illegal termination. Grey Route: the termination is legal for one entity or country, but illegal for the other end. T I. INTRODUCTION HE world has become a global village due to interconnectivity of different types of communication networks around the world. These communication networks are easily accessible but at the same time vulnerable to security risks. The telecommunication networks are managed by different Telco s, however; these telco s are supervised and controlled by regulatory authorities. The companies also pay taxes to the government from their profits. The use of Grey traffic in communication network affects not only the telco s but also the government. Grey Traffic is a term used for illegal termination of international communication traffic in any country. The communication done via defined routes is termed as legal but if it is routed through un-defined routes is grey traffic. These few entities providing communication through illegal routes cause revenue loss to the telecom companies as well as the Government. Manuscript received June 19, 2015; revised July 23, This work was funded by the National ICT R&D Fund working under Ministry of IT & Telecom: Grant ICTRDF/TR&D/2012/22. M. A. Khan is the Director of Center for Advanced Studies in Telecommunication (CAST), COMSATS Institute of Information Technology, Islamabad, Pakistan (corresponding author to provide phone: ; [email protected]). S. Y. Imtiaz is an Assistant Professor at Center for Advanced Studies in Telecommunication (CAST), COMSATS Institute of Information Technology, Islamabad, Pakistan ( [email protected]). M. Shakir is an Assistant Professor at the Department of Electrical Engineering, COMSATS Institute of Information Technology, Islamabad, Pakistan ( [email protected]). Fig 1: Grey traffic routing This research paper focuses on the influence of Grey Traffic in the Telecom sector of Pakistan. We have analysed the existing technologies used around the world and then proposed a solution named Automatic Monitoring and Detection System (AMDS) for Grey Traffic. AMDS will be installed at the main gateway exchange where all the communication traffic is routed; in our case, it is Pakistan Internet Exchange (PIE). AMDS is able to collect and analyse large volumes of data from several sources and deliver effective solution to cater the revenue loss caused by Grey Traffic. The main objectives of this solution are: To develop an independent and automatic system that monitors and detects grey traffic on Telco s network to assure national security. To contribute to local and international Telecom industry by supplying a vendor independent solution for detection of grey traffic that could compete with the international market of similar products. To develop a novel algorithm that acquires real-time CDRs (binary files) by interfacing to WAN at Telco s site and further store them to large database for analysis. To develop application software (KPI Engine) that analyzes the stored data (CDRs) and detect grey traffic by using specified parameters.
2 , October 21-23, 2015, San Francisco, USA A. Grey Traffic Detection II. LITERATURE REVIEW There are several methods of identifying grey traffic [2]. Previously, the communication traffic was identified on the basis of signatures of payloads or port numbers in packet headers, but that technique was unable to provide precise results because these elements can be changed or masked by the applications or likely to vary with the arrival of newer versions. Therefore, in this paper an effective detection technique is proposed which is based on flow-level characteristics of the traffic such as packet rate, packet length and inter-arrival time etc. As these features cannot be changed by applications, therefore, it is ought to be more effective in VoIP detection process. On the basis of our developed solution, the Grey routes can easily be detected by heavy loads in certain network areas or incomplete call information or short voice calls. In case of heavy load on network, the Grey Traffic can be detected by three methods which include: Mobile phones (or Global System for Mobile (GSM) Gateway) termination that cause heavy loads on local mobile phone exchanges Media Gateway (MGW) in IP backbone termination that cause heavy load on MGW and soft switch Subscriber Access Line termination that cause heavy load in local telephone exchange Calls that are routed by using Grey Route often lack the complete call information like originating source number, bearer service information etc.; so such call can be considered as grey traffic. Short voice calls are another sign of grey traffic that are caused by the repetitive dialling by the customer to get better voice quality. 1) Approaches used to address grey traffic Mainly two approaches are used to address the grey traffic problem i.e. future fraud (fraud that has not yet occurred) and ongoing fraud (fraud that is in process, meaning that the fraudulent call has already been connected). a) Preventing Future Fraud To prevent future fraud situation from occurring, mainly two approaches are used: Modifying the individual network elements configurations (i.e. databases, exchanges etc.) so that they restrict some fraudulent users from utilizing the network resources. This approach is difficult to implement as it only provide variable degrees of control. Relying on other operators to block fraud that is being generated on their network. By using this approach, a carrier has no real control over the outcome. Furthermore, there is also a chance that inter-carrier fraud prevention does not rank high enough on other operator s priorities list. b) Controlling Ongoing Fraud In this approach, when an ongoing fraudulent call has been identified by lawful interception [3], an in-band blocking method is used where noise or silence is injected in the call with the help of a probe so that the calling parties release the ongoing call, and further loss is avoided. Although this method can save further loss but it has following drawbacks: Costly as it needs probe coverage to every available T1/E1 link. Alerts the calling parties that someone is controlling the call. Does not disconnect the call itself but requires the parties to release the call. B. Existing Technologies Different companies around the world have been working to tackle the grey telephony problem. Almost all of them focus to rectify the grey traffic that is being operated through SimBox. The mechanism behind Sevis system [4], a global provider of signalling solutions to network operators and telecom equipment manufacturers, is based on its signalling Application and Service Engine (ASE) platform, a standardbased carrier-grade SS7/C7 network mode that functions as an application and service engine. The technique behind this method is platform transparent which eliminates the complexity of a network. Basically standardized industry interfaces are used to allow the operator to correctly bill the terminating traffic maintaining network efficiency and call quality. The Teralight Prevail Application [5] provided by Teralight Limited is another useful product for detecting Grey Traffic. The Prevail application is an integrated fraud-detection application that can detect and track down fraudulent traffic in real-time. The basic design behind the application is a realtime monitoring of all the data from the Caller ID Box in forms of Call Detail Records (CDRs) and then process them to generate the required reports in real-time. Mocean Subscriber Identity Module (SIM) Box Detector [7] is another effective method of detecting grey traffic by providing a tracking Caller Line Identification (CLI) to facilitate mobile operators for monitoring of international calls on international mobile networks. The Cibertec s Bypass Detection System [6] is based on the inspection of international calls to the customer networks in a country. This application comprises remote traffic generator, target frame, irregular traffic report server and user/supervisor support services. Although many companies have presented solutions to tackle grey traffic, but most of these are designed to detect grey traffic through SIM Boxes only. There are many other ways for the occurrence of gray traffic e.g. through VoIP Gateways. Since the proposed solution is designed for the higher hierarchy therefore it will cover all the gateway bypass methods including these two, which implies that it will be a complete solution; not limited to only SiMBOX or VoIP generated grey traffic.
3 , October 21-23, 2015, San Francisco, USA III. GREY TRAFFIC IN PAKISTAN According to Pakistan Telecommunication Authority (PTA), Grey telephony is defined as: [8] [9] The use of illegal gateway exchanges to bypass legal Pakistan Telecommunication Company Limited (PTCL) gateways and terminate/originate international traffic, including through VoIP gateways, GSM gateways, WLL phones, mobile SIM or other related equipment so as to avoid applicable taxes and/or regulatory fee The telecommunication market of Pakistan was an exponentially growing market during the last decade. With the emergence of IP Based applications and technologies, telecommunication market has been revolutionized but at the same time, it has given rise to VoIP traffic which bypasses the legal communication gateways or switches. This process spoofs the voice traffic into the country and makes it appear as locally originated traffic. The illegal routes make it possible for the companies to offer reduced call rate as compared to the actual telecom operator tariff. In addition to this, grey calls will cost less than normal white route calls for obvious reasons as they don t provide full services to the end user. They have certain drawbacks like bad voice quality, low call completion rate, congested network calls, no call receiving for inbound roamers and no proper access of network services by outbound roamers. minutes per day or more than 50% of total international traffic entering the country) it is estimated that the Government faces a loss of over $35M per annum [11]. A. Measures Taken By PTA to Control Grey Traffic PTA is continuously engaged to control grey traffic. On one side, it has taken forced measures to control the illegal use of gateway exchanges to originate/terminate international traffic through GSM Gateways, WLL Phones, VoIP gateways and mobile SIMs. On the other side, it has also taken both technical and regulatory measures which helped in reducing grey traffic. PTA imposed a financial premium called as Approved Settlement Rate (ASR) on Mobile cellular operators for every international call. ASR comprises of Access Promotion Contribution (APC) and Long Distance and International (LDI) operator share. During the past couple of years, PTA has collected around $400 Million against APC for Universal Service Fund (USF) to promote services and utilize infrastructure in rural areas where telecom services are unavailable. Recently, the government has taken a step towards elimination of grey traffic by withdrawing the controversial International Clearing House (ICH) policy which has brought the APC to zero. Due to the implementation of this policy, call rates for international incoming calls to Pakistan are likely to go down which will result a significant decline in grey traffic [12]. Fig 2: International incoming cellular traffic in Pakistan [10] The telecom sector has grown enormously which is depicted in fig 2. This growth has caused a severe competition between telecom Operators to reduce their tariff which affected their profit. Under such conditions, this cumulative loss is further enhanced by the usage of Grey Telephony. Grey Traffic also cause a security risk as, it cannot be monitored directly. Therefore, there is a strong requirement of a system that may enable the Government to detect grey traffic. Generally, the grey traffic is initiated by small entities through VOIP routers setup in homes and offices throughout Pakistan. Due to this grey traffic (which is estimated about 13.3 million IV. WORKING OF AMDS Our developed solution of Automatic Monitoring and Detection System (AMDS) functions as a real-time mediation platform to facilitate a large number of VoIP data requests. The AMDS will be able to provide information of where and how much grey traffic is being channelled. As far as the blocking of grey traffic is concerned, the traditional methods will be relied upon. This implies human intervention will be required in the form of help from Police, Federal Investigation Agency (FIA) or any other law enforcement agency as per PTA requirement. A. AMDS Building Blocks The building blocks of AMDS are depicted in fig 3. It consists of CDR collection block to collect data, CDR analysis and mediation block where collected CDRs are processed to generate analysis which are finally used by the reporting block known as Service Performance Reporting (SPR). The reports generated by the SPR are then used by the traffic management block in order to track and manage protocols and service level agreements to get best value reporting.
4 , October 21-23, 2015, San Francisco, USA application. Beyond the analysis of mediated/generated CDR, this system is unique because it provides all the data that is needed for testing a Telecom Information System component. The binary/hex data, which is captured by the DCC, must contain all the data required such as Source IP, Destination IP, Source HW Address, Destination HW address, Protocols, Source Ports, Target Ports, Text message showing the details of the process etc. The above fields may be for further monitoring and detection purpose. Fig 3: A detailed component diagram of AMDS These blocks are further explained individually as follows. 1) CDR Collection The key part of this solution is data capturing through Data Capturing Console (DCC). The DCC directly collect LIVE data in the form of Call Detail Records (CDRs) from the External Device/System, which is communicating through the Gateway. This CDR collection process is the responsibility of probes which can be active probes or passive probes depending on the mode of operation of the AMDS. When the system starts, the DCC starts receiving live data from the link in background on the main server. Data will be captured continuously through it and will be forwarded to the DB for storage in the Database. Due to huge live data capturing at this console, it necessary to forward this to DB engine. This CDR generator or mediation software has been developed with.net framework environment under J# support. This module produces records based on customer's usage profiles. The probes are connected to WAN which consist of E1 links of all the operators connected to the Transit Exchange, NGN or a PIE (Pakistan Internet Exchange) in this case. For the first time, the AMDS needs to be trained through passive probes. Once the training of the AMDS is complete, active probes are deployed in real-time for grey traffic detection. 2) CDR Analysis and Mediation Once the CDRs are collected, they need to be translated and analysed. The CDR Analysis and Mediation Block is responsible for the translation and mediation of collected data. The combined process of collection, validation, normalization and consolidation is referred to as mediation and is one of the most important blocks of AMDS. The main module of this block is Signalling Based Data Network Monitoring (SBDNM) system which will be responsible for capturing and managing of the signalling traffic that are later used for generation of reports by SPR for the traffic management and grey traffic detection. The Key Performance Indicator (KPI) tool/module will provide a comprehensive suite of technologies enabling businesses to monitor, visualize, and analyse signalling based data network. The system supports visual data mining of the data extracted and aggregated from signalling based data network and interactions with the 3) Traffic Reporting This module inserts records into Databases in specific order where code is based on Multi-Threading technique. The whole record is being distributed into threads or small pieces of codes for fast system execution in microseconds. The technique helps to manage huge data in tera-bytes without providing extra load on the system or hanging the system. Reporting is done in order to give the data a representation for a specific purpose. In this block, the Service Performance Reporting (SPR) module provides an independent end to end online and batch performance QoS reporting of networks. This block is a User Interface to filter, display or export the required data into MS Excel or PDF file. System provides a front end Screen for Filtering criteria during specific dates selected by user. Based on these dates, system will display all the dates available in the system in a dropdown menu. User will select a date from this list for displaying data of that particular date. Source/ Destination IP Address Source/ Destination Hardware Address Source/ Destination Ports Protocols selection with the Check Boxes Any text string for Text data filtering Since the Ports are thousands in number, an option has been given where user can enter multiple ports by separating them by commas. System will filter data based on all the ports entered by the user one by one. For protocols, system displays all protocols in the list found in the System data. User has the option to check one or multiple protocols. Another way is to select AND option from the list that will filter data by combining the entire field s data, entered by the user. 4) Traffic Management The reports generated by the SPR module are used by the traffic management block for statistical review in order to track and manage protocols and service level agreements to get best value reporting. Some of these reports include: Circuit Switched Interconnect (CSI) statistical reports - contain all the required data to analyse service performance of calls passing through a network based on recommendations by the ITU (E.425) & ETSI ( ) Answer Seizer Ratio and Network Efficiency Ratio reports - follow the industry standards E.422 & E.425 and are readily available for in-depth analysis. This analysis
5 , October 21-23, 2015, San Francisco, USA easily identifies that which suppliers provide best service for a particular destination for call completion. The report provides complete traffic record of calls in and out of the network used for production of quality of service reports, based on true and accurate traffic measurements. V. CONCLUSION AND FUTURE WORK In today s world, the communication networks are the source of interconnectivity between different regions of the world. These networks are growing rapidly and more and more traffic is being routed between different sources and destinations per second. The communication through IP networks has provided opportunity to small organizations to come into the business and earn more with small investments. These organizations offer cheap rates on international traffic and by-pass the legal routes. This Grey traffic causes huge revenue loose to Telco s which effect government revenue in terms of taxes. In this funded project, a technique has been developed for the detection of illegal network traffic termed as Grey Traffic. Government of Pakistan has made a lot of efforts to control grey traffic, but as the technology is upgrading, the Grey Traffic Operators are also using latest techniques/tools to bypass the System. We have presented a system that accurately identify and detect grey traffic by using the flow level characteristics of network traffic rather than the signature of payloads and restrict it to save the loss in revenue. In future, this AMDS can be integrated as main component of Fraud Management system. By further adding features of GIS, the system can locate the exact location of illegal international gateways and thus can enable the regulators to stop grey traffic efficiently. REFERENCES [1] Idrees F. and Khan U. A.: A Generic Technique for Voice over Internet Protocol (VoIP), International Journal of Computer Science and Network Security, vol. 8, no. 2, pp , [2] Rasheed C. M. A., Khaliq A.: Sajid A. and Ajmal S., Identification of Hidden VoIP (Grey Traffic), Journal of Computer Networks, vol. 1, no. 2, pp , [3] Singh J. Kaur L. and Gupta S., A Cross-Layer Based Intrusion Detection Technique for Wireless Networks, The International Arab Journal of Information Technology, vol. 9, no. 3, pp , [4] Active Fraud Eliminator, Sevis Systems, [Online]. Available: [5] Bypass Fraud Detection Services, Teralight, [Online]. Available: [6] Bypass Detection, Cibertec Internacional, [Online]. Available: [Accessed April 2015]. [7] MOCEAN SIM Box Detector, Micro Ocean Technologies, [Online]. Available: [8] Bhatti B., Grey Telephony in Pakistan, TelecomPk.net, [Online]. Available: [9] PTA, Annual Report [Online]. Available: [Accessed March 2015]. [10] PTA, Annual Report [Online]. Available: [Accessed March 2015]. [11] Baloch F., Telecom: PTA s new system to curb grey traffic up and running, The Express Tribune, [Online]. Available: [12] Business Recorder, "Access Promotion Contribution made zero: Controversial ICH policy withdrawn," [Online]. Available: [Accessed May 2015].
Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed
Distributed Network Monitoring and Analysis System for Multi- Protocol Environments TAMS TAMS is a powerful, customized traffic analysis and monitoring system for multi-protocol environments. Featuring
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group May 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
Network Overview. Background Traditional PSTN Equipment CHAPTER
CHAPTER 1 Background Traditional PSTN Equipment Traditional telephone services are engineered and offered over the public switched telephone network (PSTN) via plain old telephone service (POTS) equipment
Telephone Charging System
Telephone Charging System Helsinki University of Technology Yao Yanjun Petteri Tulikoura Agenda Introduction Traditional telephone charging system Outdated Charging Charging Nowadays Future scenarios for
VoIP in the Enterprise
VoIP in the Enterprise Date: March. 2005 Author: Sonia Hanson Version: 1.1 1 1 Background Voice over IP In the late 1990s Voice over IP (VoIP) was seen as a disruptive new technology that had the potential
HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description November 2009
HG-4000/3U VoIP GSM Gateway Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description November 2009 Contents Next Page Hypermedia HG-4000/3U 3 Contents ABSTRACT...5 Savings
Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents
Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
Using Asterisk with Odin s OTX Boards
Using Asterisk with Odin s OTX Boards Table of Contents: Abstract...1 Overview...1 Features...2 Conclusion...5 About Odin TeleSystems Inc...5 HeadQuarters:...6 Abstract Odin TeleSystems supports corporate
NCAS National Caller ID Authentication System
NCAS National Caller ID Authentication System The National Telecom Security Border Controller OmniBud INC. 2003 2013 Dedicate to Internet Communication and Access Security NCAS Registration Module PSTN
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
VegaStream Information Note QOS Statistics
VegaStream Information Note QOS Statistics Why does the voice quality of this call, that sounded great yesterday, not sound so good today? or why do calls to this destination sound choppy? It is likely
Session 4 Developing a Regulatory Framework for Quality of Service / Quality of Experience ITU ASP RO
Session 4 Developing a Regulatory Framework for Quality of Service / Quality of Experience 1 ITU ASP RO Quality of Service Regulatory Framework License Regulation KPI Measurement Techniques Monitoring
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
ADTRAN SBC and Cisco Unified Call Manager SIP Trunk Interoperability
6AOSSG0004-42A April 2013 Interoperability Guide ADTRAN SBC and Cisco Unified Call Manager SIP Trunk Interoperability This guide describes an example configuration used in testing the interoperability
IP Telephony (Voice over IP)
(Voice over IP) Instructor Ai-Chun Pang, [email protected] Office Number: 417, New building of CSIE Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements
Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:
Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia
ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; [email protected] Voice over (Vo) was developed at some universities to diminish
Interoperability Test Plan for International Voice services (Release 6) May 2014
INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (i3 FORUM) Workstream Technical Aspects Workstream Operations Interoperability Test Plan for International Voice services (Release 6) May 2014 Interoperability
Troubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source
Understanding IP Faxing (Fax over IP)
Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Session Border Controller
Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element
[PRIVATE LABEL TELEPHONY SOLUTION]
POWERED BY: [PRIVATE LABEL TELEPHONY SOLUTION] DISTRIBUTION UNDER 3NG NETWORKS NON-DISCLOSURE AGREEMENT ONLY Table of Contents INTRODUCTION:... 3 MISSION:... 4 OVERVIEW:... 5 WHAT DO OUR PARTNERS GET WITH
Advanced LCR (Least Cost Router) With SIP Proxy Server
With SIP Proxy Server It s all about Reducing Cost!!! WHY ADVANCED LCR (Least Cost Routing) Advanced LCR is a product by Advanced Communications; the same parent company of AdvancedVoIP.com, a widely used
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Parlay i60 - Application
Parlay i60 ISDN Access Multiplexer with advanced call routing features Solutions for Carriers & Service Providers Parlay i60 ISDN Access Multiplexer a miracle in terms of possible applications Cost efficient
Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?
Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high
VoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
ADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability
6AOSSG001-42B March 2014 Interoperability Guide ADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability This guide describes an example configuration used in testing the interoperability of an ADTRAN
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
SOUL S DIGITAL VOICE 30
SOUL S DIGITAL VOICE 30 SOUL S CONVERGENT NETWORK SOUL S DIGITAL VOICE 30 Soul is a new age telecommunications company capable of delivering both voice and data via an IP network to offer our customers
SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE
SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE The following terms and conditions are additional to those in the prevailing Viatel General Terms and
TELECOM FRAUD CALL SCENARIOS
TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple
The Analysis and Simulation of VoIP
ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci [email protected] Conrad Wang [email protected] Jiang
Understanding IP Faxing (Fax over IP)
A RICOH COMPANY Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures
Voice over IP is Transforming Business Communications
White Paper Voice over IP is Transforming Business Communications Voice over IP (VoIP) is changing the world of telecommunications. It entails the transmission of voice calls over data networks that support
An Introduction to SIP
SIP trunking, simply put, is a way for you to accomplish something that you already do, for less money, with equal or better quality, and with greater functionality. A Guide to SIP V4 An Introduction to
Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE
Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Integrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
VoIP Solutions Guide Everything You Need to Know
VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,
White Paper: Voice Over IP Networks
FREE FREE One One Hour Hour VoIPonline VoIPonline Seminar TM Seminar TM For additional information contact: Terry Shugart - [email protected] http://www.analogic.com/cti TEL: 978-977-3000 FAX: 978-977-6813
Measurement of IP Transport Parameters for IP Telephony
Measurement of IP Transport Parameters for IP Telephony B.V.Ghita, S.M.Furnell, B.M.Lines, E.C.Ifeachor Centre for Communications, Networks and Information Systems, Department of Communication and Electronic
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,
ehealth and VoIP Overview
ehealth and VoIP Overview Voice over IP (VoIP) configurations can be very complex. Your network could contain a variety of devices, applications, and configuration capabilities to support voice traffic.
3CX Guide sip.orbtalk.co.uk
3CX Guide sip.orbtalk.co.uk Table of Contents 1. Outbound Dialling 2. Inbound Routing 3. Outbound CLI 4. Additional Network Configuration 1. Outbound dialling: The Customer will have been provided with
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Wave SIP Trunk Configuration Guide FOR BROADVOX
Wave SIP Trunk Configuration Guide FOR BROADVOX Last updated 1/7/2014 Contents Overview... 1 Special Notes... 1 Before you begin... 1 Required SIP trunk provisioning and configuration information... 1
Voice Over IP is it hype or can it work for me? By American Business Communication Inc.
Voice Over IP is it hype or can it work for me? By American Business Communication Inc. In the world of telecom, it seems like everywhere you turn there is a buzz about Voice over IP (VoIP). Hardly a day
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
White Paper. SIP Trunking. Abstract
White Paper SIP Trunking Abstract This paper provides a brief description of SIP Trunks, how they are deployed and the benefits widely put forward in the marketplace as a reason for adopting them. Analysts
ABOUT AT&T GLOBAL CLEARINGHOUSE
ABOUT AT&T GLOBAL CLEARINGHOUSE Established in 1998, AT&T Global Clearinghouse (GCH) is the industry's first carrier-grade VoIP clearinghouse. The clearinghouse service enables ISPs to quickly establish
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
IP Office - Job Aid Remote Access
IP Office - Job Aid Remote Access Summary This document covers how to allow a remote PC or device to gain access to the IP Office network. 016 Issue 1 (15th November 2002) Remote Access The following document
Signaling System 7 (SS7) Gateway Solution for Internet Access
Signaling System 7 (SS7) Gateway Solution for Internet Access Definition A signaling system 7 (SS7) gateway is an intelligent network (IN) based system that can be used in conjunction with network-access
Guidelines on International Gateway Access and Voice over Internet Protocol (VoIP) Issued by the Nigerian Communications Commission
Guidelines on International Gateway Access and Voice over Internet Protocol (VoIP) Issued by the Nigerian Communications Commission 1. Background (1) The Nigerian Communications Commission ( the Commission
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
High-performance VoIP Traffic Optimizer Client Solution
AP-VTO200 VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features
How To Understand The Concept Of Circuit Switching
Module 2 Communication Switching Lesson 2 Circuit Switching INSTRUCTIONAL OBJECTIVES GENERAL This lesson is aimed at developing the concept and application of circuit switching which is a very important
White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers
TeleCommunication Systems, Inc. www.telecomsys.com Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers Notices 2004 TeleCommunication Systems,
Truffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
International Dialing and Roaming: Preventing Fraud and Revenue Leakage
page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related
PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.
STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected]
Low Investment, High Returns
Leveraging Standards for Low Investment, High Returns Out of the box clearinghouse billing system uses OSP to capture new VoIP traffic, provide low cost termination, and generate new revenue streams. The
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
CHECKLIST FOR CDR INTEGRATIONS
CHECKLIST FOR CDR INTEGRATIONS HOW TO PREPARE CDR INTEGRATIONS This document is intended to provide an overview of the requirements for preparing and configuring CDR integrations for the CyberTech Recording
Dual Usage Strategy of Lawful Interception Systems
Septier Communication Ltd. Dual Usage Strategy of Lawful Interception Systems Elan Sharon Chief Sales, Marketing & Operations Officer [email protected] www.septier.com ISS Prague 2008 La#ful In*erce.*ion
Application Note - Using Tenor behind a Firewall/NAT
Application Note - Using Tenor behind a Firewall/NAT Introduction This document has been created to assist Quintum Technology customers who wish to install equipment behind a firewall and NAT (Network
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Optimizing the Avaya Communications Architecture: Calculating SIP Bandwidth With Infortel Select 9.0 Reporting
ISI SOLUTIONS WHITE PAPER Optimizing the Avaya Communications Architecture: Calculating SIP Bandwidth With Infortel Select 9.0 Reporting By: Mitchell Weiss Director of Product Strategy ISI Telemanagement
Toll Free 1 800 498 6429
About Company From small start up to fully fledged company, today dominates the VoIP Communication Business. Robust Performance Distinctive Design and to offer exhilarating and refined communication experience
com.sat IP Basic ISDN
com.sat IP Basic ISDN com.sat Multichannel Gateway 1 2009 com.sat GmbH Kommunikationssysteme Schwetzinger Str. 19 D-68519 Viernheim www.comsat.de Tel: +49-(0)6204-7050-0 1. General Overview IP BASIC ISDN:
High-performance VoIP Traffic Optimizer Client Solution
GSM Gateway VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features
White Paper. Solutions to VoIP (Voice over IP) Recording Deployment
White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright ([email protected]), BSc (Hons) Ultra Electronics AudioSoft, October
VOICE SOLUTIONS NGN. Telephone-Handbook NEXT GENERATION NETWORK. UAN: (051) 111 11 44 44 www.nayatel.com /Nayatel
VOICE SOLUTIONS NGN Telephone-Handbook NEXT GENERATION NETWORK UAN: (051) 111 11 44 44 www.nayatel.com / Table of Contents Sr.No Contents Page No. 1. Introduction 1 2. Hosted Exchange Solution 2-9 2a.
FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below:
FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below: Title: Signaling System #7 Second Edition Author: Travis Russell Publisher:
Synchronization Essentials of VoIP WHITE PAPER
Synchronization Essentials of VoIP WHITE PAPER Synchronization Essentials of VoIP Introduction As we accelerate into the New World of VoIP we assume we can leave some of the trappings of wireline telecom
Configuring SIP Trunking and Networking for the NetVanta 7000 Series
61200796L1-29.4E July 2011 Configuration Guide Configuring for the NetVanta 7000 Series This configuration guide describes the configuration and implementation of Session Initiation Protocol (SIP) trunking
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
Operation Manual Voice Overview (Voice Volume) Table of Contents
Operation Manual Voice Over (Voice Volume) Table of Contents Table of Contents Chapter 1 Voice Over... 1-1 1.1 Introduction to VoIP... 1-1 1.1.1 VoIP System... 1-1 1.1.2 Basic VoIP Call Flow... 1-2 1.1.3
Automatic Route Selection (ARS)
Automatic Route Selection (ARS) 19 Objectives When you finish this module, you will: Program numbers for external local calls. Use ARS to route a call. Understand how the system uses various CO dial tones.
AWITEL solution and services for PTTs:
AWITEL solution and services for PTTs: AWITEL Voice Traffic Solutions for Carriers using IP backbone AWITEL supports PTTs; International carriers and service providers with high quality voice/data traffic
