TDM services over IP networks
|
|
|
- Derrick McCarthy
- 10 years ago
- Views:
Transcription
1 Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which provide reliable and low-delay services for voice, data and video transport, are migrating towards Internet Protocol (IP) based packet switched networks. The primary reason for the migration of these circuits is to reduce the cost of transport and management by having a converged network for all services. Due to the sheer magnitude of the installed legacy TDM equipment, this migration to end-to-end IP will go through a transitional phase where some services will continue to use legacy equipment, while the core network moves towards IP. In this transitional phase, there is a need for technology allowing seamless transmission of TDM services across the packet switch networks. The Internet Engineering Task Force (IETF) and International Telecommunication Union (ITU) provide specifications for interoperability to emulate TDM circuits over IP networks. These emulated services can be implemented using a gateway device that provides for inter-working function (IWF) between TDM and IP networks. The primary challenge of the gateway device is to provide the equivalent level of reliability and security of traditional TDM networks. To that extent, the gateway device must be able to achieve an equivalent level of synchronization of TDM circuits across the IP network and cope with packet impairments of the underlying IP network. In addition, the gateway can provide value added services such as echo cancellation, multicasting and IP security. The remainder of this paper explores the architecture of a Gateway device such as Harris s NetXpress, which can facilitate a smooth transition for legacy TDM applications as the core network is migrating from TDM circuit switched to IP based packet switched networks. 2. NETWORK EVOLUTION Over the years, TDM based Wide Area Networks (WANs) have enabled transport of a multitude of user applications including: basic telephony, trunked radio, low to medium rate data services and studio to transmitter links for broadcast audio and video. Figure 1 shows a basic model for an end to end TDM system. Legacy End System TDM TDM Mux/ Demux TDM Switched WAN Network TDM Mux/ Demux TDM Legacy End System Figure 1 End to End TDM Network 1
2 The TDM network dedicates a circuit with a fixed amount of bandwidth for the duration of a session, regardless of its actual usage. For voice applications, these networks have performed well, however for emerging data intensive applications, these networks do not scale effectively. As a result, IP based WANs are deployed to allow for cost efficient expansion of capacity and statistical multiplexing gain for new emerging applications. In addition, IP based WANs are built on open standards allowing inter-operability of equipment from different vendors. To allow for a smooth migration of legacy equipment, the IP WANs will be required to support legacy TDM applications in a seamless manner. The convergence of TDM traffic into the IP networks has to be well managed for maintaining the performance level of the TDM applications. For transporting voice across IP networks, Voice over IP (VoIP) technology has emerged at the forefront. While this technology provides the most flexible way of routing telephony calls, it is very complex. The complexity of protocol inter-working between TDM and IP call processing may not be suitable and needed for many applications. Alternatively, Circuit Emulation Service (CES) technology has emerged as an option to transport TDM trunks containing legacy applications across managed IP networks. This technology is sometimes referred to as pseudo-wire, as it emulates the TDM circuit across a packet network using virtual IP tunnel or path. The primary benefit of this technology is the cost and simplicity of deployment to support all types of legacy TDM applications without the need for complex protocol inter-working. Figure 2 shows a reference diagram for supporting Legacy TDM applications over IP networks using CES. Figure 2 Reference model for CES over IP In the figure above, the Gateway device supports CES by providing an Inter Working Function (IWF) between TDM and IP. Among standard bodies and working groups, the IETF s pseudo wire (PWE3) working group provides a standard framework for emulating structured and unstructured T1, E1, T3 and E3 circuits across IP networks. This framework provides specifications for traffic encapsulation and functions that are required for successful emulation of TDM circuits across IP networks. Figure 3 shows one such possible protocol encapsulation at the Gateway. 2
3 Figure 3 CES protocol encapsulation The IWF at the Gateway accepts the TDM data from the attached circuit. This data is either in NxDS0 or unstructured format. The IP side encapsulation of the TDM data is done by adding the following layers to the payload. CES Control Word: This layer is used to convey the status of the attached TDM circuit to the far end for re-generation of alarms and status. RTP Layer: This layer is used for providing sequence numbers for in-order delivery and conveying synchronization information. UDP Layer: This layer, along with the IP layer provides de-multiplexing information to the far end so that the incoming payload can be properly switched to the local TDM circuits. IP Layer: Provides for de-multiplexing and routing across IPV4 or IPV6 networks. Besides providing for the IWF, the Gateway s architecture must provide functionalities to overcome various challenges introduced by the IP network. The next section describes the challenges that must be overcome within the Gateway. 3. CHALLENGES There are numerous technical challenges that arise from emulating circuit switched services across connectionless IP networks. The performance of the emulated circuits is expected to be the same as that of current TDM networks. As a result, the Gateway must be architected to overcome challenges posed by the underlying IP network to maintain the same quality of service. 3.1 Achieving Synchronization A TDM circuit must establish the same TDM clock frequency on both endpoints of the network. A Plesiochronous Digital Hierarchy (PDH) network used to transport circuit emulated services such as T1, has built-in mechanisms, using bit stuffing techniques for transporting timing across the PDH network. 3
4 Within a packet network, there is no inherit transport of timing information and packets are discontinuous in time. In a CES application, the Gateway device must also transport timing, establishing the same frequency. The consequence of a long term mismatch in frequency is that the packet queue of the Gateway device at the egress of the network will either fill-up and overflow or empty and underflow. The direction depends on whether the regenerated clock is slower or faster than the original. This will cause loss of data and degradation of service. One way to achieve synchronization is to provide a local same frequency clock to the Gateway devices at the endpoints of the circuit emulation. This can be done via GPS receivers, or by linking the Gateway devices to other network devices that recovers a clock traceable to the network clock strata. The disadvantage of such a method is the cost and complexity of this additional equipment. A variation on the local clock method is for the Gateway device to use Network Time Protocol (NTP). NTP is an IP protocol used for synchronizing the clocks of hosts to servers over packet networks. NTP accounts for variable latency packet networks and is designed particularly to resist the effects of variable latency (Jitter). A disadvantage of NTP is the requirement of having NTP servers available to the Gateway devices. Another method of synchronization is for the Gateway device at the egress of the network to employ an adaptive timing recovery algorithm. This algorithm examines the timestamps of the incoming CES packets in relation to its own local reference clock. Based on the timestamps, the algorithm can measure and extract the far-end timing information and regenerate a local same frequency TDM clock. The regenerated clock is a plesiochronous representation of the original. The fidelity of the regenerated clock is impacted by several factors including the packet rate, the packet jitter and loss within the network, and the quality of the algorithm itself. The advantage of this method is the CES itself is the source of timing with no other overhead and no other equipment required. 3.2 Managing network jitter The variation in the inter-packet arrival time at the receiving Gateway is caused by the network jitter. The jitter in the TDM networks is of a much smaller scale than that of IP networks. This is primarily because TDM networks provide for fixed end-to-end circuits for the duration of the session, while the paths in the IP Networks are connectionless and statistically multiplexed with other sessions. The amount of network jitter depends on how well the network is engineered and how many hops or routers must be traversed. A well engineered IP network can be designed to control the network variation, while an unmanaged network, such as the public Internet, can produce large amount of jitter. The Gateway s architecture absorbs this variation in the delay by providing a de-jitter buffer. The de-jitter buffer adds additional delay to the end-to-end service. Thus, the Gateway must provide for a flexible configuration of this parameter so that it can be optimally engineered to work in a variety of IP networks, from extremely well managed to public Internet. 4
5 4. MANAGING PACKETIZATION DELAY AND BANDWIDTH One of the factors in the overall delay for CES is the transmit delay. The most important element of the transmit delay is packetization (or packet generation delay). The packetization is delay associated with the process of accumulating payload for the CES packet from the TDM circuit. The packetization parameter is configured in terms of number of TDM bytes from which to accumulate the packet payload. A higher number results in longer packetization delay and bigger payload size. In an NxDS0 or structured application, the lowest possible packetization is one TDM frame, which contains payload from one TDM frame and will have packet generation latency of 125 microseconds, resulting in 8000 packets/seconds. The bandwidth utilization of CES is inversely proportional to the packetization delay. This is because each CES packet contains a fixed number of overhead bytes for protocol headers. Therefore, a bigger payload size in each packet will yield better bandwidth efficiency. The tradeoff between bandwidth efficiency and overall service delay has to be done based on the latency tolerance of the underlying application. To this extent, the Gateway s architecture must support a wide range of packetization parameters to allow for maximum flexibility to engineer CES, based on the type of application transported and the network constraints. 5. SERVICES IMPLEMENTATION This section discusses the value added functionalities that can be integrated in to the architecture of the Gateway to provide for a smoother transition. 4.1 Echo cancellation The legacy telephony equipment that provide for a hybrid conversion between 2 and 4 wire circuits are a source of voice echo. In the scenario where the end-to-end delay is less than 25 msec, the echo may not be perceptible. When this application is transported across the IP network, the additional end-to-end delay may be severe enough where echo cancellation is desirable. Figure 4 shows a reference model for this application. Figure 4 Integrated Echo canceller 5
6 For certain deployment cases, having an integrated Echo cancellation function within the Gateway that can be enabled based on the underlying TDM application will reduce both, the capital and operational cost of having external echo cancellation equipment. 4.2 Mitigating packet loss Unlike TDM networks, the IP networks are prone to packet loss caused by various events within the network. The amount of packet loss and jitter are two key attributes of the underlying network and varies based on the network, with the worst case being the public Internet. There are two options for handling packet loss: error concealment or error recovery. The error concealment option is media-dependent and generally does not incur additional delay. This option is best suited for real-time TDM applications. The error recovery is an option that is suited for applications that are more sensitive to packet loss than delay. The Gateway should integrate an interoperable error recovery scheme that works in a media independent manner in a low or high packet loss network. One option is to use TCP as oppose to UDP for transport. This provides retransmission capabilities. However, using TCP has several disadvantages: It increases the end-to-end delay and use of system resources. It does not work with multicast application. Has bandwidth throttling mechanisms incompatible with real time data applications. IETF s RFC 2733 provides the framework for a forward error correction (FEC) that operates at packet level, as shown in figure Figure 5 Integrated Forward Error Correction The FEC operates at the application layer by grouping original data packets and sending a parity packet along with the original data packets. At the receiver, the parity packets are discarded if the original data packets are received without error, otherwise the lost data packets are attempted to be recovered from the received data packets within the group and the corresponding parity packet. The RFC specifies multiple modes of FEC operation, where each mode provides for a different degree of protection from packet loss. The FEC modes that provide higher levels of packet loss protection incur more delay and system resources, hence the Gateway must provide for a flexible configuration to allow the user to adequately engineer the FEC protection based on the network condition through which the TDM trunks are transported. 6
7 4.3 Multicasting TDM networks provide only point-to-point connection. When legacy TDM applications require point to multipoint connections, the user has to setup and manage multiple physical TDM connections from the source to each destination. For example consider the example of Figure 6. The contribution site needs to send the content to multiple radio distribution sites. Figure 6 Integrated Multicast host The Gateway at the contribution site performs the functions of a multicast source, while the Gateways at the distribution sites act as multicast listeners. By supporting multicasting, applications requiring point-to-multipoint connections can be easily created and managed. 4.4 Transport security The TDM networks are perceived to be secure against eavesdropping due to their physical nature. Certain legacy TDM applications, such as tactical communications, are relying on this physical security to prevent unauthorized eavesdropping. When these applications are transported across IP networks, they become susceptible to security threats that were previously not present. The ubiquitous nature of the IP network is not only a threat for eavesdropping, but also for impersonation of a device s peer. Standard security protocols such as IP security (IPSEC) provide for secure IP transport using strong authentication and encryption schemes. Authentication provides protection against identity verification and strong encryption algorithms such as AES128 provide protection from eavesdropping. The Gateway s architecture integrates a security engine which allows any legacy TDM application to be securely transported to its destination across the IP network. Figure 7 shows a reference model for secure transport. 7
8 Figure 7 Integrated transport security Having an integrated security engine not only provides for flexibility in configuring secure transport for TDM services but also reduces cost and risk of having an external equipment or outsourcing the service it to the network provider. 6. PLATFORM MANAGEABILITY The management plane provides an important element in the operation of IP networks. The manageability of an IP device factors in to the overall operational cost of the IP network and therefore, to integrate within an existing network management scheme, the Gateway must support standardize interface for management. The following lists some of the key management functions architected within the Gateway: Support of standard protocols such as SNMP and HTTP for configuration and status monitoring. Support of management plane security using SNMPv3 and HTTPs. These protocols provide for authentication and encryption of management messages. Support of protocols such as ICMP, FTP, Telnet for maintenance and trouble shooting. Support of user level access control and protection from common denial of service (DOS) attacks. 7. CONCLUSION Circuit emulation services allow existing TDM based applications to be transported across packet switch networks, thus extending the life of legacy TDM equipment and providing for a smoother transition from TDM to packet based networks. The architecture of the CES Gateway provides for a critical element in maintaining equivalent performance and enabling appropriate IP services for legacy TDM applications. 8. REFERENCES IETF: draft-ietf-pwe3-cesopsn-07 ITU-T Rec Y.1413: TDM-MPLS Network Interworking 8
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Combining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Methods for Mitigating IP Network Packet Loss in Real Time Audio Streaming Applications
Methods for Mitigating IP Network Packet Loss in Real Time Audio Streaming Applications Keyur Parikh and Junius Kim Harris Broadcast Mason Ohio Abstract Increasingly, IP based networks are being used for
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Voice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents
Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
VegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
Circuit Emulation Pseudo-Wire (CE-PW) WHITE PAPER
Circuit Emulation Pseudo-Wire (CE-PW) WHITE PAPER Important Notice This document is delivered subject to the following conditions and restrictions: This document contains proprietary information belonging
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Understanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Glossary of Terms and Acronyms for Videoconferencing
Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
How To Understand The Differences Between A Fax And A Fax On A G3 Network
The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...
12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, [email protected]
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com
Voice over IP (VoIP) for Telephony Advantages of VoIP Migration for SMBs BLACK BOX Hybrid PBX VoIP Gateways SIP Phones Headsets 724-746-5500 blackbox.com Table of Contents Introduction...3 About Voice
Application Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
SDH and WDM: a look at the physical layer
SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and
Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402
Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Synchronization Essentials of VoIP WHITE PAPER
Synchronization Essentials of VoIP WHITE PAPER Synchronization Essentials of VoIP Introduction As we accelerate into the New World of VoIP we assume we can leave some of the trappings of wireline telecom
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
SDH and WDM A look at the physical layer
SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This
Quality of Service Testing in the VoIP Environment
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
VoIP over MPLS & Voice Services over MPLS. Jim McEachern [email protected]
VoIP over & Voice Services over Jim McEachern [email protected] Voice Services over Standards IETF RFC 3032 () draft-ietf-pwe3-requirements-08.txt draft-ietf-pwe3-arch-07.txt and Frame Relay Alliance
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
QoS in VoIP. Rahul Singhai Parijat Garg
QoS in VoIP Rahul Singhai Parijat Garg Outline Introduction The VoIP Setting QoS Issues Service Models Techniques for QoS Voice Quality Monitoring Sample solution from industry Conclusion Introduction
IP/MPLS. Marios Parperis - Alcatel-Lucent Energy Systems Integration Division. October 2012. Alcatel-Lucent 2010 All Rights Reserved
IP/MPLS Marios Parperis - Alcatel-Lucent Energy Systems Integration Division October 2012 Agenda Today s Landscape in Electric Utilities Why Consider IP/MPLS as a Network solution? MPLS Concerns TDM Applications
Nortel - 920-803. Technology Standards and Protocol for IP Telephony Solutions
1 Nortel - 920-803 Technology Standards and Protocol for IP Telephony Solutions QUESTION: 1 To achieve the QoS necessary to deliver voice between two points on a Frame Relay network, which two items are
Introduction to Circuit Emulation Services over Ethernet
Introduction to Circuit Emulation Services over Ethernet Abstract This paper provides an introduction to Circuit Emulation Services over Ethernet (CESoE) enabling the support of synchronous services such
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS
SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. [email protected] www.netforecast.com VoIP Deployment Realities VoIP is not just another application
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?
Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Integrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
Technote. SmartNode Quality of Service for VoIP on the Internet Access Link
Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed
Solving the Big Dilemma of Big Data
shaping tomorrow with you Our thirst for information and communication is, it seems, insatiable. This is particularly apparent in the online world, where data sets are getting steadily larger. These massive
An architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT
An architecture for the delivery Datasheet User guide White paper þ of DVB services over IP networks Rennes, January 2007 INTRODUCTION Present paper proposes to look around technologies used today for
Configuration Guide. T.38 Protocol in AOS. 61950851L1-29.1D September 2011
61950851L1-29.1D September 2011 Configuration Guide This configuration guide describes the T.38 fax protocol and its use on ADTRAN Operating System (AOS) voice products including a protocol overview, common
1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette
SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Strategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
Voice over IP (VoIP) and QoS/QoE
Voice over IP (VoIP) and QoS/QoE Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Understanding jitter and methods to overcome problems with jitter Quality
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Smart Solutions for Network IP Migration
for Network IP Migration Network Access Timing and Synchronization Test & Measurement Agenda: Architectures and Topologies Product life cycle Media and Protocol Conversion Application Cases Conclusion
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
MIGRATING TDM SERVICES TO PACKET NETWORKS ENSURING RELIABLE AND EFFICIENT TRANSPORT WITH THE ALCATEL-LUCENT 9500 MICROWAVE PACKET RADIO
MIGRATING TDM SERVICES TO PACKET NETWORKS ENSURING RELIABLE AND EFFICIENT TRANSPORT WITH THE ALCATEL-LUCENT 9500 MICROWAVE PACKET RADIO ABSTRACT As bandwidth-hungry IP services become more common, it is
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH)
677 A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) Olabenjo Babatunde 1, Salim Mbarouk 2 1 (Department of Information Systems Engineering, Cyprus International
Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples
Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks
Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Document Overview This document provides an overview of how to effectively and securely provide IP-based videoconferencing
LEASED-LINE REPLACEMENT
WHITE PAPER LEASED-LINE REPLACEMENT 10 Things to Consider Before Choosing Your IP Gateway WWW.OMNITRONICSWORLD.COM Outline Leased-lines are still being used in many parts of the world to carry voice communications
Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross
Multimedia Communication Multimedia Systems(Module 5 Lesson 2) Summary: H Internet Phone Example Making the Best use of Internet s Best-Effort Service. Sources: H Chapter 6 from Computer Networking: A
Troubleshooting VoIP and Streaming Video Problems
Using the ClearSight Analyzer to troubleshoot the top five VoIP problems and troubleshoot Streaming Video With the prevalence of Voice over IP and Streaming Video applications within the enterprise, it
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
White paper. Latency in live network video surveillance
White paper Latency in live network video surveillance Table of contents 1. Introduction 3 2. What is latency? 3 3. How do we measure latency? 3 4. What affects latency? 4 4.1 Latency in the camera 4 4.1.1
Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
