SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services 952-738-7005 David Bailey-Aldrich Technology.

Slides:



Advertisements
Similar presentations
VoIP PRESENTATION BY HÜSEYİN SAVRAN OUTLINE PSTN an brief history of telephone.
Advertisements

Presented By:- Yash Jariwala Paras Patel Deep Amrutiya.
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Chapter 3: Planning a Network Upgrade
SIP Trunk – Northwest Branch Training
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Connecting to Remote Networks © 2004 Cisco Systems, Inc. All rights reserved. Using Packet Switching in WANs INTRO v2.0—7-1.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
VoIP/SIP Trunking Wholesale/Enterprise.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Copyright © 2006 VoEX, Inc. All Rights Reserved1.
© 2010 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets and the Level 3 Communications logo are registered.
Chapter 6 Telecommunications & Networks.
Internet Telephony Vincent Declercq MSIT 526: Fall December 2005.
IP Telephony (Article Presentation) by Samir Goswami Source: Rivier College, CS699 Professional Seminar.
VoIP Michael Laport Robin Heath “I truly believe that VoIP is the telecommunications wave of the future,” said Travis Mack, a VoIP customer of only a year.
Voice over Internet Protocol (VoIP) Training and Development.
NENA Development Conference | October 2014 | Orlando, Florida ESIND working group Jim Lockard, Joel McCamley Co-Chairs.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Virtual Data Systems, Inc. Value Proposition of IP Telephony Voice over IP Technologies.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
SIP Trunking Last Update Copyright Kenneth M. Chipps Ph.D. 1.
1 CCM Deployment Models Wael K. Valencia Community College.
VOIP ENGR 475 – Telecommunications Harding University November 16, 2006 Jonathan White.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
Voice over IP Fundamentals M. Arvai NEC Senior Technical Eng. 1.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Basic Networking Components
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
January 23-26, 2007 Ft. Lauderdale, Florida Integrating Your IP PBX with an ITSP Leveraging SIP Trunking for Broadband Services John Blasko Vice President.
VOIP (Voice Over Internet Protocol) CDA 4527 Fall 2006.
Comparing modem and other technologies
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Basics of IP Telephony Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
MAEDS 45 th Annual Conference October , 2009.
 he_shape_shifting_future_of_the_mobile_pho ne.html he_shape_shifting_future_of_the_mobile_pho.
Introduction to WAN Technologies
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
1 Proprietary & Confidential December 9, 2008 Bandwidth.com Saving You Money Through Voice & Data.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
October 10-13, 2006 San Diego Convention Center, San Diego California SIP Trunking… Why is it so important?
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Chapter2 Networking Fundamentals
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
An Application of VoIP and MPLS Advisor: Dr. Kevin Ryan
Voice Over IP (VoIP): Internet Telephony Dr. Najla Al-nabhan 1.
Voice and Video over IP.
1 Business in a Box Partner With Us. 2 What is Business in a Box? Business in a Box Xact Communications leverages VoIP (Voice Over Internet Protocol)
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
LAN, WANs and More. LAN Switch Router Server Farm Wireless Access High Speed Connectivity Firewall Local Control Gateway.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
The Business Value of SIP Trunking
ANEEL ABBASI MUHAMMAD ADNAN MOIZ SHAH MUHAMMAD KHAYAM GROUP MEMBERS.
VoIP—Voice over Internet Protocol
ENGR 475 – Telecommunications
The Business Value Of SIP Trunking
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
Presentation transcript:

SIP & How It Relates To YOUR Business

Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology Advisor - Carrier Services

Agenda  Welcome  What is SIP?  History of SIP  Why Consider SIP?  Considerations  Where do I go from here?  Q & A

 Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions.  Applications of SIP:  Voice  Video Calls  Instant Messaging  SIP must work in conjunction with other application layer protocols What is SIP?

 Initially only the traditional switch-based telephone system (PSTN) was the main medium for voice traffic  The advent of the Internet created the need to create a system to connect over an IP-based network – VoIP  Internet Engineering Task Force (IETF) set standards in 1999  There are multiple VoIP protocols in use today:  H.323 – developed by International Telecommunications Union (ITU) and IETF  MGCP (Megaco) – developed by Cisco as an alternative to H.323  SIP – developed by 3Com as an alternative to H.323 History of SIP

 Potential to scale total voice trunks across a multi-site organization  Scalable to meet actual voice trunk needs (single site or multi-site)  Perceived cost savings - “Free long distance?” – “Overall reduced trunking?”  Flexible deployment options – delivered over public and private network topologies  Disaster Recovery/Business Continuity applications Why Consider SIP?

 Connectivity  Security  Session Border Controller  911 Emergency Call Handling Considerations

 Best Efforts  Cable or DSL service  Shared infrastructure on the carrier network  No performance guarantees  Low-cost option  Dedicated  Delivered over copper or fiber physical connections  Will include Service Level Agreement requirements or network availability  Cost dependent upon local access  Very limited availability of Quality of Service (QoS) Connectivity – Public/Internet

 Switched Ethernet  Layer 2 (switched) connection to customer site  Customer responsible for providing routers and controlling Quality of Service (QoS)  MPLS (Multi-Protocol Label Switched)  Layer 3 (routed) connection to customer site  Customer may provide and manage routers, or elect for the carrier to provide for an additional monthly fee  QoS controlled in routers (customer and carrier provided) Connectivity – Private WAN

 Internet Security  Less secure than landlines - subject to hackers/cybercriminals  No encryption – easily stolen  Phone Set Patches  VoIP-based phone handsets need to be updated with security patches to ensure they are protected  Network Security  Proper network security is required – gateway security, firewall configuration, patching procedures, periodic syslog review and wireless security  Denial of Service (DoS)  Successful DoS will shut down company’s Internet system – loss of telephone service  Spam over IP Telephony (SPIT)  SPIT slows down employees’ productivity – phones ring with unsolicited messages  DoS attacks and unauthorized use of resources - bandwidth Security

 A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.  Acts as a router between the enterprise and carrier service  Defines and monitors the quality of service status for all sessions  Serves as a firewall for session traffic, applying its own QoS rules and identifying specific incoming threats Session Border Controller

 SIP and other VoIP service offerings are not regulated similar to traditional (PSTN) voice services such as analog lines, or ISDN PRI circuits  911 emergency call resolution is not handled in the same way  If not addressed properly, 911 calls may end up sending emergency personnel to the wrong location 911 Emergency Call Handling

CenturyLink has three (3) SIP trunks types to choose from: Basic Standard Enterprise Level3 has two (2) SIP trunk types to choose from: Basic Enhanced AT&T SIP Product Requires choice of calling plans Plan A = Long Distance only (local calling not included) Plan B = Unlimited Local calling, with Long Distance access available and paid per minute Plan C = Same as Plan B, but includes some outbound domestic LD minutes based on quantity of trunks across the organization What codecs are supported? Examples include: G.711, G.729 (compressed), and T-38. Carrier SIP Offerings Differ

 Establish and define business goals  There is no “one size fits all”  Not all carrier SIP offerings are the same  Upper level executive management and sponsorship for the project is critical  Plan for bumps in the road  Ensure long-term carrier support after installation Where do I go from here?

Q & A