Voice Calls Over Wi-Fi
|
|
|
- Abraham Carson
- 10 years ago
- Views:
Transcription
1 Voice Calls Over Wi-Fi Venkatraman.S, Siddharth Natarajan and T.V. Padmavathi, Member, IAENG Abstract The use of Wi-Fi enabled cell phones to access internet away from the PC is increasing day-by-day. The use of Wi-Fi enabled phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows data and voice transmissions to be sent across a wide range of interconnected networks. The models, which are Wi-Fi enabled and have J2ME platform, can be used to communicate with each other through the free 2.4GHz communication channel. Since this is a free channel, security is a priority. In order to engender security, the packets of data may be encrypted in the header and payload by different encryption techniques. However even the security is a concern only within the specific network, the communication is completely safe from attacks external to this local network. Each mobile device connects to a WLAN router and identifies itself in the routing table. Calls can be placed by a user by sending the packets to the router, which then tries to find the destination. The destination must also be connected to the WLAN; if not the Wi-Fi server can tunnel the calls to the GSM network using UNC (Unified Mobile Access Network Converter). Since the communication channel is only capable of being affected by an inside influence (hacking), it is provided with complex cryptography techniques, which engenders high security. Our proposal allows free calls within the network with high quality voice transmission. This model will be a prototype of itinerant devices communicating through in the Wi-Fi bandwidth and will greatly reduce the communication cost in large organizations. Index Terms IP phones mobile phones with a logical IP addresses, J2ME- application installed on the mobile device. I. INTRODUCTION Communication systems have developed steadily and new means of communications are being developed from time to time. Cell phones have evolved from being simple communication devices to a powerful portable computer. The instrument has become so commercial that it s available as a key-item in everyone s pocket, benefitting the user and serving as a lucrative business for the manufacturers. The increase in the number of service providers has made it a battle-field for each of them to Manuscript received July 15, This work is supported and sponsored by SSN college of engineering, India. S.Venkatraman and N. Siddharth are under-graduate students of SSN college of engineering (Phone no: ; ; [email protected]; [email protected]). T.V. Padmavathi, Assistant professor in SSN college of Engineering, ( [email protected] ) gain more customers, and the cheaper one always manages to outstrip others. Service providers such as Vodafone, CSL, Star hub have already earned a name in market and are still expanding their service all over the world. The idea of having a common channel (air) for sending innumerable frequencies and use the bandwidth that s available has always been fascinating for all of us but at what cost? It is a hectic task to design a communication system knowing how badly it is susceptible to noise. The whole idea of modulation made it possible to neglect the low noise frequencies and making it feasible for long distance transmission at high efficiency. The concept is too deep to explore and has certainly made its mark in the field of data transmission. There is now emerging demands to have cheap communication within a fixed range, like in an office or a township. Intercom is also a similar system but in this case it has fixed phones connected by guided media. The recent advancements in the mobile phone technology have incorporated the features of accessing Wi-Fi from such a small device. The presence of Wi-Fi in the latest mobiles allows the user to access the internet with the help of a Wi-Fi router. Exploiting the entire bandwidth of 2.4GHz for making voice calls between devices, it eliminates the need of using the service provider s bandwidth. Hence voice calls can be made at zero cost. Most of the latest models of phones come with Wi-Fi. The number of people using Wi-Fi devices has been increasing and may even rise higher this year. Our proposal shall eliminate the usage of service providers for short-distance calls and decreases the cost that gets accrued in the consumers monthly bill. The base idea is unifying voice and data onto a single network infrastructure by digitizing the voice signals, convert them into IP packets and send them through an IP network together with the data information, instead of using a separate telephony network. II. EXISTING TECHNOLOGY Voice Over Internet Protocol (VOIP) provides the ideas for connecting two clients through voice over the internet. The advent of Voice over Internet Protocol (VoIP) has fundamentally been transforming the way telecommunication evolves. Driven by the ongoing deployment of broadband infrastructure and the increasing demand of telecommunication service, VoIP technologies and applications have led to the development of economical IP phone equipment based on embedded systems. IP phone application can satisfyingly provide the
2 necessary interfaces between telephony signals and IP networks. Although IP phone communication over the data networks such as LAN exists but these IP phones are fixed type. We implement wireless IP phone communication using the Wi-Fi network, VOIP phones call without the use of a computer; instead they connect directly to the IP network (using technologies such as Wi-Fi or Ethernet). Fig 1: UMA connection methods Unlicensed Mobile Access (UMA) is a 3rd Generation Partnership Program global specification that provides a standard for service providers to merge mobile networks and wireless LANs into a single seamless access network with one mobile device, one user interface, and a common set of network services for both voice and data. In fact, the UMA solution converge cellular networks with any IP-based access networks, including wired and wireless technologies such as IEEE WiMAX networks, IEEE Mobile Broadband Wireless Access, and Ultra Wideband (UWB)-based networks (Fig. 1). With UMA, subscribers can move between mobile networks and WLANs with seamless voice and data session continuity as effortlessly and transparently as they move between cells within the mobile network. The UMA solution effectively creates a parallel radio access network, the UMA Network (UMAN), which interfaces to the mobile core network using existing mobility-enabled, standards-defined interfaces. The existing service provider Business Support Systems (BSS), service delivery systems, content services, regulatory compliance systems, and Operation Support Systems (OSS) will support the UMA network without change. Service enhancements and technology evolution of the mobile core network apply transparently to both the GSM access network and the UMA network. III. CALLING WITHIN THE LAN The use of J2ME- For a mobile device to communicate with a router it needs a platform. A J2ME application can be used in a mobile device that is Wi-Fi enabled to communicate with a router. This is a very useful tool because by communicating with the router directly, many processes of networking can be simplified. J2ME provides a robust, flexible environment for applications running on mobile. It includes flexible user interfaces, robust security, built-in network protocols, and support for networked and offline applications that can be downloaded dynamically. So this platform is what connects the user and his device to the router. The developed software will perform the payload encryption on the transmission side and payload decryption of packets in the receiver side through software manipulations of digital format of data. When placing a call to a phone within the network, the number is dialed and passed through the J2ME to the router. The application then sends the number in 128 bit encrypted form to the router, requesting a call to be placed. The J2ME application at destination intimates the user of the incoming call; if the call is accepted, the router changes both phones status to busy. When busy no further calls can from be made or received by the phones. This is because, we are using the limited free bandwidth of the Wi-Fi, so conference calls and similar features are not supported easily. After a call is made and connection is established router routes the packets to the destination number. If the sender or receiver goes out of the Wi-Fi range then the message is tunneled through to GSM. However if the receiver is initially not within the Wi-Fi range, then the sender needs to dial *. This tells J2ME that the call is to the outside world, so directly GSM connection is activated. When a call is transferred from Wi-Fi to GSM, the talk time charged by the service provider is only that amount of time which the phone went out of range. So this is a very cost effective solution. SEQUENCE OF STEPS- On the Wi-Fi route IP phones registers its fixed IP, where the router will update its routing table with this IP phone being active IP addressing and sub-netting is available in the same way as in any computer system Each phone is identified by a user name. So the routing table updates its IP with a corresponding user name Calls can be made to any user in the routing table identified by user name and this information is made available to all users logged into the network. When * is used before a number, the call is tunneled to GSM. When the phone goes out of Wi-Fi range, then hand off.
3 IV. HAND OFF Hand off is a process where one network hands over the connection responsibilities to another network. This happens when the device goes out of range of the one system. This is very common in mobile communications with towers, where one tower hands over the carrier and communications links to another tower when the device moves from one region to another region. Any handoff operation is a three-stage process that includes handoff decision, radio link transfer and channel assignment. The hand off is only initiated when the signal strength goes below a certain predefined standard. The base station usually measures the quality of the radio link channels being used by mobile nodes in its service area. This is done periodically so that degradations in signal strength below a prescribed threshold can be detected and handoff to another radio channel or cell can be initiated. Hand off can be implemented in two ways - Make before break -The mobile node s connection may be created at the target base station before the old base station connection is released. Break before make - The new connection may be set up after the old connection has been torn down. Wi-Fi ti N Decrypt, hand over to GSM Configure routing table Packet-data To router Is destination in same network? A End? N Y Y Next A Route data via Wi-Fi End Fig 3: Flow Chart V. PROPOSED MODEL Fig 2: WLAN and logged IP phones It is preferable to have the make before break hand off to ensure smooth transition from one station to next. In our case the hand off is from a Wi-Fi stage to GSM. But in our Wi-Fi communication we use a few encryption methods and techniques which are irrelevant to GSM communication standards, so before hand off, all the messages must be decrypted. First the mobile unit has to detect that the Wi-Fi signal has completely faded out. Also now the Wi-Fi service is no longer acceptable. At this stage the mobile unit sends a handover request to a neighboring GSM cell. The selection of mobile cell depends upon the SIM card present in the mobile unit at that time. Then the core network of the service provider has to handle the resource allocation procedure with the base station controller (BSC) for the GSM calls. Once the allocation is complete a signal is sent to the mobile unit indicating the handover has taken place. Voice communications are more delay sensitive than error sensitive. UDP provides less efficient communication but at rates faster than TCP and also UDP is used for wireless systems. So in transport layer we use the UDP protocols for communication. Several signaling protocols have been proposed for IP phone applications. SIP is peer to- peer protocols. Being simple and similar to HTTP, SIP will bring the benefits of WWW architecture into IP telephony and readily run wherever HTTP runs. It is a gradual evolution from existing circuit-switched networks to IP packet-switched network. In this model of communication voice to be transmitted by one user is encrypted by the device and J2ME by software modifications of digital form of the signal. Then this is packetized and communicated to router through Wi-Fi channel in the same way data is communicated. The router performs header decryption and finds the destination phone from it routing table. The encrypted voice is sent by same means as communication of data by Wi-Fi. VI. WORKING Figure 3 gives the basic flowchart of the algorithm for Wi-Fi based communication. Algorithm has to be defined for the J2ME software and the router. The regular standards of communication are used for the data transmission.
4 Destination Fig 4: Block diagram. However for the routing table we suggest these parameters: IP, masking, user name, busy, next, mode and strength. When one phone connects to another, their busy flags are marked. Once the busy flag is set, more data transfer through the Wi-Fi layers is not permitted. So this restricts communication to be one to one. When the call is cut, the busy flags are reset again. This method of communication is an indirect approach. We know that any number of Wi-Fi enabled phones can access the network. So this ensures that there is no limit to the number of users in the WLAN. So to make it possible for so many users to communicate with each other, we transfer the voice as data to the router, similar to uploading something to a network. But now this message is cannot be accessed by all the phones because of encryption. Then the receiver phone can download this data from the router and hence then acquire the voice from that data. So in effect the mobile devices do not communicate directly with each other; data is uploaded to the network by the sender and then it is downloaded only by one other device; the intended receiver. So communication is indirectly done through uploads and downloads. Note: Upload and download speeds and hence communication time depends on the traffic and the speed of the Wi-Fi. So a fast LAN with moderate traffic shows good communication performance. To make the communication continuous and transparent to the users, uploads and downloads must be fast. The block diagram shows the basic working of the communication process of upload by the user 1. Now only depending on the presence of receivers ID in the routing table the type of communication is determined. Accordingly we have two results: (i.) If the destination is also logged in to the Wi-Fi network, it establishes connection through the free communication bandwidth of WLAN. (ii.) If the destination is not logged in to the same WLAN, it hands off control to the GSM, thereby allowing calls through the service provider. To avoid redundant uploads and then transfer communication to GSM, we use * button in the J2ME software to indicate communication to the world outside the network. By this way we can save traffic caused by redundant uploads. However if the J2ME platform is not being used then calls will automatically only go through the service provider. This is because only the J2ME software communicates with the router and integrates the device to send voice over Wi-Fi channel..
5 Table 1. Comparison between conventional IP phones and our model Sr. No Attributes Current Fixed IP Phones Proposed Model 1. Working Works through PC phones connected to fixed lines Works with itinerant devices communicating with router 2. Range Confined to the Local network It is not confined and works universally with the world outside the network 3. Software Skype, CTK J2ME 4. Flexibility Less flexible as it provides services within a fixed network Fully flexible and allows voice as well as data communications 5. Data rates Higher date rates Relatively lower data rates 6. Cost No cost is involved after the set up charges No cost within local network and within Wi-Fi range 7. Hand off -- Hand off feature is available to ensure connectivity thorough GSM outside the Wi-Fi range 8. Applications Communications within the native network Communication over entire range. VII. ADVANTAGES IX. CONCLUSION Allows phone calls at zero cost. It is highly secured, because no outside device has access to the data uploaded and downloaded between routers and the device Easy to implement. Does not require any extra hardware to be installed in the device; only software ( j2me) is used. VIII. CONSTRAINTS This model can service any number of users but it shows poor performance in a slow network and may be slowed down by problems like cross talk, delay, routing failure in high traffic situations. Hand off to GSM after being sent to the router wastes the bandwidth. Initial cost is high and it will only work on phones that are Wi-Fi enabled (which are more expensive than non-wi-fi enabled handsets). Communication is a field where it is highly possible for the data to get corrupted, and it s highly imperative to secure the data to be transmitted. Our proposal provides an efficient mechanism to send voice calls over the Wi-Fi bandwidth by using encryption and decryption mechanism that can render secured packet reception. This project provides a cheap, effective and secure means of communication within a specified network. The cost involved is only the initial set up cost and all calls within the network are free. This model will be very useful to solve the communication problems in large organizations, by making free voice calls through Wi-Fi. X. REFERENCES [1]. Implementing , , Wireless Networks: Planning, Troubleshooting, and Operations, Ron Olexa [2]. Real Security: Wi-Fi Protected Access and i, Jon Edney, William A. Arbaugh [3]. A Field Guide to Wireless LANS for Administrators and Users, Thomas Maufer [4]. Build Your Own Wi-Fi Network, Shelly Brisbin [5]. Y.-J. Cho, Y.-B. Lin and C.-H. Rao, Reducing the network cost of call delivery to GSM roamers, IEEE Network Magazine 11(5) (1997) [6]. A.-C. Pang, Y.-B. Lin and Y.-R. Haung, System and method of providing voice communications for radio network, USA Patent Pending. [7]. H.C.-H. Rao, Y.-B. Lin and S.-L. Chou, igsm: VoIP service for mobile networks, IEEE Communications Magazine 4(38) (2000)
Messaging and Voice Conferencing through Wi-Fi Network
RESEARCH ARTICLE OPEN ACCESS Messaging and Voice Conferencing through Wi-Fi Network Miss. Nayana H S, Dr. M C Padma Mtech (CE) Department of C S & E, PES College of Engineering, Mandya, Karnataka, India.
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: & Print ISSN: Voice Calls between Wireless
A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction...
Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... 7 Fixed-WiMAX based on the IEEE 802.16-2004... 8 Mobile
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
White Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
P2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross [email protected], {YongLiu, Panwar, Ross}@poly.edu, [email protected]
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Chapter 6 Telecommunications, Networks, and Wireless. Computing
Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and
Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Wi-Fi calling for business: ROGERS WHITE PAPER. An Executive Overview
1 ROGERS WHITE PAPER Wi-fi calling for business An Executive Overview page 2 2 TABLE OF CONTENTS Introduction 3 What Is Wi-Fi Calling? 4 How Does It Work? 5 What Are the Business Benefits? 7 What Are the
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
Best Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
Audio Over IP. Building Pro AolP Systems. with Livewire. Skip Pizzi. Steve Church. Focal. Press ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON
Audio Over IP Building Pro AolP Systems with Livewire Steve Church Skip Pizzi ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Focal press
Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8
INDEX Introduction Page 2 Understanding Bandwidth Units Page 3 Internet Bandwidth V/s Download Speed Page 4 Factors Affecting Download Speed Page 5-7 Optimum Utilization of Bandwidth Page 8 Conclusion
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless
Fixed Mobile Convergence Options for the Enterprise
March 08 Fixed Mobile Convergence Options for the Enterprise Michael F. Finneran d B r n A s s o c i a t e s, I n c. 8 9 C u r t i s R o a d, W o o d m e r e, N Y 5 9 8 5 6. 5 6 9. 4 5 5 7 FMC Options
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
TCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth
Technical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?
FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...
Part Number: 203285. HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD.
Part Number: 203285 HG253s V2 Home Gateway Issue V100R001_01 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.
KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to
an interconnected collection of autonomous computers interconnected = able to exchange information
Overview: Network Introduction what is a computer network? digital transmission components of a computer network network hardware network software What is a computer network? an interconnected collection
Appendix A: Basic network architecture
Appendix A: Basic network architecture TELECOMMUNICATIONS LOCAL ACCESS NETWORKS Traditionally, telecommunications networks are classified as either fixed or mobile, based on the degree of mobility afforded
Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3
Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
WAN Technology. Heng Sovannarith [email protected]
WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
MOBILITY AND MOBILE NETWORK OPTIMIZATION
MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Interactive Voice Response System by Using Asterisk
Interactive Voice Response System by Using Asterisk Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel Student, Dept. of C.S.E., SRMCEW, RTM University, Nagpur, India. Professor, Dept.
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004
Wharf T&T Limited Version: 1.0 Date: 26 January 2004 This document is the property of Wharf T&T Limited who owns the copyright therein. Without the written consent of Wharf T&T Limited given by contract
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Understanding IP Faxing (Fax over IP)
Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice
Setting up of a Wireless Distribution System (WDS)
Setting up of a Wireless Distribution System (WDS) - a user s perspective Sudipto Das Co worker: Rajesh Roy Department of Computer Science & Engineering Jadavpur University Kolkata 32 {sudipto.das,rajesh.roy}@rediffmail.com
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Getting Started KX-TDA5480
4-Channel VoIP Gateway Card Getting Started KX-TDA5480 Model KX-TDA0484 Thank you for purchasing the Panasonic 4-Channel VoIP Gateway Card, KX-TDA5480/KX-TDA0484. Please read this manual carefully before
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
FatPipe Networks Network optimisation and link redundancy for satellite communications
FatPipe Networks Network optimisation and link redundancy for satellite communications Next generation WAN acceleration Version 01 rev 05 Gregory Fedyk Regional Director UK/IRE, France and Benelux Isik
Forced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN [email protected]
Analysis of Performance of VoIP
ENSC 427 Communication Networks Analysis of Performance of VoIP Over various scenarios OPNET 14.0 Spring 2012 Final Report Group 11 Yue Pan Jeffery Chung ZiYue Zhang Website : http://www.sfu.ca/~ypa11/ensc%20427/427.html
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol
International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo
