The way ahead to Voice Over. Convergence or Non-Convergence



Similar documents
Voice over IP Basics for IT Technicians

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future

VoIP Survivor s s Guide

Recommended IP Telephony Architecture

Voice over IP (VoIP) Basics for IT Technicians

IP Telephony Management

Course 4: IP Telephony and VoIP

UW CAMPUS SITE CONFIGURATION STANDARDS

VoIP in Military Applications

PETER CUTLER SCOTT PAGE. November 15, 2011

UW MEDICINE SITE CONFIGURATION STANDARDS Overview

What is Unified Capabilities?

How To Set Up An Ip Trunk For A Business

FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction

VoIP and Beyond. Alex Gatiragas Product Manager Enterprise Convergence NEC Business Solutions Limited

Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

Packetized Telephony Networks

Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing).

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Contents. Specialty Answering Service. All rights reserved.

VoIP / SIP Planning and Disclosure

VitalPBX. Hosted Voice That Works. For You

Convergence: The Foundation for Unified Communications

VoIP Solutions Guide Everything You Need to Know

Securing SIP Trunks APPLICATION NOTE.

Voice over IP is Transforming Business Communications

Integrate VoIP with your existing network

ICTNPL5071A Develop planning strategies for core network design

Best Practices for Securing IP Telephony

An Oracle White Paper February Centralized vs. Distributed SIP Trunking: Making an Informed Decision

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Security Guidance for Deploying IP Telephony Systems

Security and Risk Analysis of VoIP Networks

IP-PBX for Small to Large Enterprises

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Introducing Cisco Voice and Unified Communications Administration Volume 1

Jive Core: Platform, Infrastructure, and Installation

Enhanced Enterprise SIP Communication Solutions

Global Headquarters: 5 Speen Street Framingham, MA USA P F

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Indepth Voice over IP and SIP Networking Course

An Introduction to SIP

SIP-ing? Pipeline Articles

Hosted PBX Platform-asa-Service. Offering

Cisco Virtual Office Unified Contact Center Architecture

An XOP Networks White Paper

Why Should Unified Communications Be Part Of Your Strategy?

SIP Trunking with Microsoft Office Communication Server 2007 R2

How To Make A Cell Phone Converged Into A Cell Network

Troubleshooting Voice Over IP with WireShark

VOIP Security Essentials. Jeff Waldron

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

Allstream Converged IP Telephony

Ingate Firewall/SIParator SIP Security for the Enterprise

Building Voice VPN with Simton IPX

Federal Communications Commission Public Safety and Homeland Security Bureau

Which VoIP Architecture Makes Sense For Your Contact Center?

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents

Leveraging Asterisk to Deliver Large Scale VoIP Services in a Carrier Environment. JR Richardson

Office of Emergency Communications Next Generation Network Priority Services

Network Services Internet VPN

Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge

SUBJECT: Special Interoperability Test Certification of the Avaya Call Management System (CMS) Release 16.3

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Thanks

VOICE SOLUTIONS NGN. Telephone-Handbook NEXT GENERATION NETWORK. UAN: (051) /Nayatel

BLACK BOX. The Changing Communications Market. PBX Systems for Voice over IP (VoIP)

AT&T IP Flexible Reach Service

promise of lower-cost, network-based voice communications. The shift to VoIP which in truth represents a subset of the larger convergence

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

FDIC Division of Supervision and Consumer Protection

Voice and Data Convergence

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

BT Hosted IPT (VoIP)

Voice Over IP and Firewalls

White Paper. avaya.com 1. Table of Contents. Starting Points

Convergence Technologies Professional (CTP) Course 1: Data Networking

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga

Hands on VoIP. Content. Tel +44 (0) Introduction

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

Time Division Multiplexing to Internet Protocol Business.Frontier.com/Solutions 1

Evolution of the DISN-Pacific Towards an Integrated ATM Infrastructure

SIP Trunking Configuration with

Security & Reliability in VoIP Solution

Security issues in Voice over IP: A Review

An Introduction to VoIP Protocols

White Paper VoIP Crash Phone Systems

Voice over IP Security: Issues and Answers

Internet Telephony Terminology

A Look into the Cloud

Efficient evolution to all-ip

State of Texas. TEX-AN Next Generation. NNI Plan

NGN Interconnection Standards & Protocols

VoIP Conformance Labs

LAN Planning Guide LAST UPDATED: 1 May LAN Planning Guide

Transcription:

The way ahead to Voice Over Internet t Protocol (VOIP) in DoD D Convergence or Non-Convergence Dr. Eugene W.P. Bingue IT Planner, NCTAMS-PAC, Wahiawa, Hawaii Eugene.Bingue@navy.mil Dr. David A. Cook Senior Research Scientist and Principal Member of the Technical Staff The AEgis Technologies Group, Inc. Albuquerque, NM dcook@aegistg.com

Objectives Introduction JITC and Command & Control issues VOIP desktop solution alternatives Enterprise architectures convergence The next step planning the move SSTC 2008 The Way ahead to VOIP 2

Introduction VOIP is becoming the smart way to embrace expanding broadband d technology. Alexander Graham Bell s telephone of 1876 has evolved over two centuries to become an integral part of DoD s operations providing incidental communication to command and control of some of the most lethal arsenal on earth. Does VOIP change the paradigm of telephony in the 21st century? And, if so how do we adapt to IP Telephony (IPT)? SSTC 2008 The Way ahead to VOIP 3

Introduction Why VOIP 1539 - Mexico began using the first printing press in the Western Hemisphere. 1844 - Samuel Morse transmitted the first public telegraph message. 1858 - The first Transatlantic cable was laid 1876- Alexander Graham Bell invented the telephone in Boston in 1876, 120 years later there are over 360 million telephone numbers, and that figure grows each year. 1906 - First wireless communication of human speech. 1936 - First television broadcast made in London, England. 1973 - The first public telephone call placed on a portable cellular phone. FEB 2009 The telegraph key Samuel Morse used on his first line in 1844 Martin Cooper demonstrates the first portable cellular telephone. SSTC 2008 The Way ahead to VOIP ArrayComm 4

Introduction Time Division Multiplexing (TDM) network that dedicates channels and reserves bandwidth as needed out of the trunk links: Circuit switching IP networks are different from circuit-switching, in that it is a packet-network, based on statistical availability. Class of service (CoS) ensures that packets of a specific application are given priority. Analog to Digital Analog Signal-Voice Digital Signal-Data SSTC 2008 The Way ahead to VOIP 5

Introduction DISA Network Centric Warfare Voice Over Internet Protocol (VoIP) is an emerging technology that is a critical component of network centric warfare. All major common carriers and telecommunications switch vendors plan to migrate to VoIP. As they migrate, their support to DSN circuit switches will diminish. VoIP is a critical step toward DoD's ability to effectively provide all DoD communications traffic (data, voice, video, etc.) on an IP network. This is the key concept to effective Net Centric warfare SSTC 2008 The Way ahead to VOIP 6

Introduction DISA Network Centric Warfare The Joint Chief of Staff (JCS) Military Communications Electronics Board (MCEB) endorsed three near-term major operational drivers for the introduction of VoIP services to support network centric warfare: Convergence of secure desktop services at major command centers is driving the need for VoIP service on the SIPRNet and gateways to the DRSN Small footprint and highly mobile tactical deployments are driving the need for tactical extensions via both SIPRNet and DSN gateways Investment many Military Departments and Agencies have deployed VoIP systems at the edge of the DSN as on-base intercoms and as pilots SSTC 2008 The Way ahead to VOIP 7

JITC and Command & Control issues DISA JITC provides a full-range of agile and cost-effective test, evaluation, and certification services to support rapid acquisition and fielding of global net-centric warfighting capabilities. SSTC 2008 The Way ahead to VOIP 8

JITC and Command & Control issues TSSI The Telecom Switched Services Interoperability (TSSI) Program includes interoperability certification of DOD's voice, video, and data services across the circuit it switched network. The circuit switched network comprises the Defense Switched Network (DSN) and customer premise equipment (CPE). As approved by Office of the Secretary of Defense (OSD), the DSN, is an interbase, nonsecure or secure Command & Control (C2) telecommunications system that provides end-to-end command use and dedicated telephone service, voice-band data, and dial-up video teleconferencing (VTC) for C2 and non-c2 DOD authorized users in accordance with national security directives. Non-secure dial-up voice (telephone) service is the system's s principal requirement. SSTC 2008 The Way ahead to VOIP 9

JITC and Command & Control issues General and Military-Unique Requirements The DSN must adhere to the capability objectives below to ensure its ability to support effective military C2 functions. Survivable Service. DSN supports C2 user traffic during peacetime, crisis, conflict, natural disaster, and network disruptions and possesses the robustness to provide a surge capability when needed. System robustness through maximum use of alternative routing, backup, etc. Assured Connectivity. DSN is required to provide assured voice communications to C2 users. Assured service or connectivity is defined as the ability of the DSN to optimize i call completion rates for all C2 users in accordance with the guidelines in this instruction, despite degradation because of network disruptions, natural disasters, or surges during crisis or war. The DSN was designed with militaryunique feature (MUF) requirements such as multi-level precedence and preemption (MLPP). MLPP permits higher precedence users to preempt lower precedence calls. Special C2 users (FLASH and FLASH OVERRIDE within the current DSN MLPP framework) are provided with nonblocking service (P.00 threshold) from user to user. (P.00 = out of every 100 calls, the probability is that zero calls will be blocked. SSTC 2008 The Way ahead to VOIP 10

JITC and Command & Control issues General and Military-Unique Requirements (con t) Responsive Service. DSN service must be responsive to the needs of C2 users. Special C2 users under current DSN MLPP scheme -- FLASH and FLASH OVERRIDE -- are provided nonblocking service. Surge Capacity. Mitigation of short-term term traffic surges is inherent in the MLPP capabilities of the DSN. DISA will ensure that PRIORITY and IMMEDIATE traffic will encounter, at a minimum, GOS of P.02 (two calls out of 100 will be blocked during the busy hour ) and P.01 respectively during a 100 percent increase above normal precedence usage. Secure Service. DSN permits, through the use of secure instruments, protection of classified and sensitive information being passed, to ensure its confidentiality, integrity, and authentication. Where possible, the DSN is configured to minimize attacks on the system that could result in denial or disruption of service. SSTC 2008 The Way ahead to VOIP 11

JITC and Command & Control issues General and Military-Unique Requirements (con t) Interoperable Service. DSN is designed with the capability to permit interconnection and interoperation with similar tactical, federal government, allied, and commercial networks. All hardware and software in the network must be JITC certified as being interoperable. NS/EP Compliant Service. DSN complies with the requirements, priorities, and procedures established by the National Communication System (NCS) regarding national security and emergency preparedness (NS/EP). In the United States and its territories, NS/EP support is provided in accordance with Federal Communications Commission (FCC) rules and regulations through the commercial telecommunications industry and the Telecommunications Service Priority (TSP) system. For example, access to the Government Emergency Telecommunications Service (GETS) is available via the DSN. The DSN must comply with the NS/EP s TSP system for service restoration. ti Within the continental t United States t (CONUS), NS/EP TSP-approved requirements will be provisioned within 72 hours. In outside-conus (OCONUS) areas, not under the control of the US Government, DOD will provide NS/EP support where feasible and available through h agreements with host governments and in accordance with TSP. OCONUS requirements will be provisioned as quickly as possible. SSTC 2008 The Way ahead to VOIP 12

SAC Primary Alert Network C2 SAC Automated Command and Control System (SACCS) 465L System Looking Glass March AFB Blytheville AFB Little Rock AFB Offutt AFB Barksdale AFB Redundant Diverse Physical Paths Fully Redundant A/B system Only 256K iron core memory SSTC 2008 The Way ahead to VOIP 13

VOIP desktop solution alternatives Softphone (Software) turn any PC or laptop into a full-functioning telephone Cost $50, Speakers, Microphone, Software Costs less than $.03 minute IP-Phone (Hardware) Replace traditional POT Cost $150 and up Additional Inside Service Plant SSTC 2008 The Way ahead to VOIP 14

VOIP desktop solution alternatives (con t) Call-signaling protocols Session Initiation Protocol (SIP), defined by the Internet Engineering Task Force (IETF) SCCP (Skinny), --Cisco H.323, defined by the International Telecommunications Union (ITU) that defines the protocols to provide audio-visual communication sessions on any packet network. These two protocols basically do the same thing, and most VoIP devices use one or the other. Under the hood, the two protocols work differently to accomplish the establishment of a VoIP connection; SIP is ASCII-based, and H.323 is binary-based. SSTC 2008 The Way ahead to VOIP 15

VOIP desktop solution alternatives (con t) Mitigations If softphones are in use, then another VLAN should be created and all PCs with softphones should be placed on this VLAN. Traffic filtering rules should allow VoIP traffic between this VLAN and the IPT VLANs. VoIP traffic should not be allowed on the data VLAN. Similarly, general data traffic should not be allowed to the IPT server or IPT phone VLANs. If softphones are densely deployed throughout the network, it is not practical to have a data VLAN and a softphone VLAN. Instead, all PCs, whether or not they have softphones installed, should be placed in a data VLANs. Traffic should be filtered as described for the softphone VLAN in the previous paragraph. When softphones are used as the primary voice communication mechanism, then a backup communication method, which does not depend on the PC, must be available in every office area. SSTC 2008 The Way ahead to VOIP 16

Enterprise architectures convergence A VoIP network can be viewed as one logical switch in distributed form with the IP backbone providing connectivity to the distributed elements in the network. Convergence (DISA) The IP infrastructure must ensure smooth delivery of voice and signaling packets to the VoIP elements. If an IP network is to carry both voice and data traffic, it must be able to prioritize iti the different traffic types. SSTC 2008 The Way ahead to VOIP 17

Enterprise architectures convergence An IP Centric VoIP architecture is designed around an IP based core- switching system. IP Centric (DISA) Centric solutions have distributed IP devices that work together to perform the functions of a TDM based circuit-switch. IP centric solution connect to the rest of the switched network (i.e., TDM DSN/PSTN) via a dedicated trunk (i.e. T1/E1,or Integrated Services Digital Network (ISDN))equivalent. e SSTC 2008 The Way ahead to VOIP 18

Enterprise architectures convergence IP enabled architectures are considered hybrid solutions because they incorporate the services of a traditional TDM circuit-switch while providing VoIP terminals to the end subscriber. IP Enabled (DISA) IP enabled solution use TDM based circuit-switch to provide the core call processing and switching. The DSN/PSTN interface is provided via the TDM based circuit-switch. An integrated Ethernet interface provides connectivity to the IP Local Area Network supporting the IP Phones. SSTC 2008 The Way ahead to VOIP 19

Enterprise architectures convergence VoIP Threats VoIP Networks have many of the same threats to security, privacy and reliability as data networks do, but they also bring in the problems of the telephone system and have some special threats all their own. Converged networks can combine threats from the data and VoIP world -- making the new network less secure (in the opinion of some). Data network people p are afraid VoIP infrastructure will weaken the security of their data network and the voice/telecom people feel the same about data / IP networks. SSTC 2008 The Way ahead to VOIP 20

Enterprise architectures convergence VoIP vs. POTS (Plain Old Telephone Service) Remember that POTS telephones have little security -- ordinary phone conversations are not encrypted and can be tapped or eavesdropped. You can actually have better security using VoIP via VLAN, VPN, DES3. SSTC 2008 The Way ahead to VOIP 21

Enterprise architectures convergence IP Network Threats Ethernet, IP and DNS address spoofing ARP and DNS Cache Poisoning i Quantity-based packet flooding Stack DoS attacks VLAN jumping QoS / prioritization attacks SSTC 2008 The Way ahead to VOIP 22

The next step planning the move New C2 Definition needed for 21 st Century C2 vs Administrative Secure Administrative IPT to replace 20 th Century unsecure POT Virtual IPT Networks extending to homeland security New DoD Framework DWDM (dedicated wavelength for IPT) WiMax (redundant network for IPT) SSTC 2008 The Way ahead to VOIP 23

The next step planning the move (con t) MILCONS IPT only Next Gen DSN Integrate current demonstration IPT projects USN Pearl Harbor -3000 VOIP JICPAC 2000 VOIP Change the transport model SSTC 2008 The Way ahead to VOIP 24

The next step planning the move (con t) Phase OUT TDM IPT only BCO Techs the correct skill set to manage IPT systems Lessons learned from deployment of IPT at AAFB, Guam It is easier and more logical flow to train BCO tech on IP issues then to train IP Tech on Telephony. Capt Leuenburger, OPS, Andersen AFB, Guam Next Gen Telephony BCO of the 20 th century is going the way of the dinosaur BCOs fighting g battles each day for funding BCOs need to design themselves in to extension Industry must standardize,voice, Video, handsets protocols Joint Chief of Staff (JCS) DISA/JITC deploy new model for IP services Administrative vs. C2 SSTC 2008 The Way ahead to VOIP 25

4 7 PQ RS 1 2 A B C 4 5 G H I J K L 7 8 P Q R S T U V 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 4 7 P QRS 1 2 A B C 4 5 G H I J K L 7 8 T U V P Q R S 4 7 P Q RS 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 1 2 A B C 4 5 G H I J K L 7 8 P Q R S T U V 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 4 7 P Q RS 1 2 A B C 4 5 G H I J K L 7 8 P Q R S T U V 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 4 7 P Q RS 1 2 A B C 4 5 G H I J K L 7 8 P Q R S T U V 4 7 P Q RS 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 1 2 A B C 4 5 G H I J K L 7 8 T U V P Q R S 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 4 7 P Q RS 1 2 A B C 4 5 J K L G H I 7 8 T U V P Q R S 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 4 7 PQ RS 1 2 A B C 4 5 G H I J K L 7 8 P Q R S T U V 4 7 P Q RS 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES 1 2 A B C 4 5 G H I J K L 7 8 P Q R S T U V 3 D E F 6 M N O 9 W X Y Z 0 # CISCO IP PHONE 7905 SERIES Basic Solution o JITC Cert DSN PBX CM CM SSTC 2008 The Way ahead to VOIP 26

SSTC 2008 The Way ahead to VOIP 27

Abbreviations SSTC 2008 The Way ahead to VOIP 28