Telecommunications Essentials Chapter 9. Cost savings & revenue generation Logical rather than physical connections IPT – Telephony IPTV – Digital Television.

Slides:



Advertisements
Similar presentations
Voice over IP By: Adiel AKPLOGAN CAFE Informatique S. A. - TOGO - Web:
Advertisements

1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Figure 7-1 Softswitch Components Signaling Gateway Feature Server Softswitch Universal Media Gateway SGCP SIP MGCP MGCP (Media Gateway Control Protocol)
Presented By:- Yash Jariwala Paras Patel Deep Amrutiya.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
24/08/2005 IP Telephony1 Guided by: Presented by: Dr.S.K.Ghosh Nitesh Jain 05IT6008 M.Tech 1 st year.
Chapter 5 standards for multimedia communications
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
SCSC 455 Computer Security Virtual Private Network (VPN)
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Semantic Web Services in the environment of Next Generation Network.
April 1999Networking Trends/Habib Youssef 1 Networking Trends Habib Youssef, Ph.D. Department of Computer Engineering King Fahd.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Real-time Transport Protocol Matt Boutell CS457: Computer Networks November 15, 2001.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
K. Salah 1 Chapter 28 VoIP or IP Telephony. K. Salah 2 VoIP Architecture and Protocols Uses one of the two multimedia protocols SIP (Session Initiation.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
VoIP Conception and Implementation LANtel Telecommunication Corp. Senior Product Manager Jeremy Chan.
Voice over IP Fundamentals M. Arvai NEC Senior Technical Eng. 1.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
Asterisk based web real time communication Advisor : Lian-Jou Tsai Student : Jhe-Yu Wu.
1 Leveraging SS7 to Deliver IP Services Carl Bergstrom Director – IN & IP Services VeriSign Telecommunication Services Internet Telephony Conference, February.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile.
Convergence of Voice, Video, and Data. Objectives In this chapter, you will learn to: Identify terminology used to describe applications and other aspects.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
CHAPTER 14 PSTN and VoIP Interworking. Cisco Packet Telephony: Connection Control Call Control Services.
The Convergence of: Voice, Video, and Data. Objectives Identify terminology used to describe applications and other aspects of converged networks Describe.
MAEDS 45 th Annual Conference October , 2009.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
MATERI KULIAH 6 SP 2005 PENJASTEL. Next Generation Networks ( NGN ) Adapted from PT. INTI internal documents for teaching purposes.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Introduction to SIP Based ENUM IP Telephony Infrastructure 資策會 網路及通訊實驗室 Conference over IP Team 楊政遠 博士
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 28 Multimedia.
Chapter 28. Network Management Chapter 29. Multimedia
Internet Protocol TeleVision
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Voice and Video over IP.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
Multimedia Communication Systems Techniques, Standards, and Networks Chapter 4 Distributed Multimedia Systems.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
Cisco Networking Academy Program
Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP Telephony (VoIP).
Virtual Private Networks
Voice over IP Presentation on Voice over IP Telecommunication and Computer Networks Presenter: Subash Chandra Pakhrin (072MSI616) MSC in Infromation and.
VOICE AND VIDEO OVER IP VOIP, RTP, RSVP.
Cisco Networking Academy Program
Cisco Networking Academy Program
VoIP—Voice over Internet Protocol
Presentation transcript:

Telecommunications Essentials Chapter 9

Cost savings & revenue generation Logical rather than physical connections IPT – Telephony IPTV – Digital Television VPN Presence-aware communication Presence Over hyped QoS a serious obstacle

IPTIPT ~ VoIP ~ Internet TelephonyVoIP

Cost motivation 10% cost difference between Frame relay, ATM, & MPLS 25% difference with IPT & MPLS Application LAN – LAN or Enterprise Concerns 911 emergency services Law enforcement surveillance (decryption time)

Application – Infrastructure separation The most important paradigm shift – Golnienwski Potential involvement by: ITU EC FCC (IPT not covered by the Universal Services Fund) FCCUniversal Services Fund

Application Layer (or platform) Signaling Layer (or platform) Media Layer Video

Carrier grade Enable multimedia services over NextGen networks NextGen Connect circuit & packet switched networks Support Class 5 & 4 PSTN switches Note: Not to be confused with enterprise media gateways.enterprise media gateways

Carrier grade - resides in the central office Nortel Softswitch Enterprise grade Often decomposed to a Call Agent & Media Gateway No standard definition

Features: Voice mail Fax Conferencing Collaborative applications Replaces multiple standalone systems Open source IP PBX

Waveform Coders PCM: G.711, A-law & mu-lawG.711A-lawmu-law ADPCM G.722 Subband coder G.722 Transform coding Vocoder G.728 LD-CELP G.728 G.729 CELP G.729CELP

Comfort noise End to end delay Voice < 100 mSec Video < 80 mSec Games 30 – 50 mSec Jitter Fixed buffer – internet radio, fax Adaptive buffer – variable rate signal processing Error concealment Replay, interpolate, predict Layered coding – for multicast Layered coding

RTP – VoIP & real-time applications RTP RTCP – control packets, RTCP Flow & congestion control QoS measurements SRTP – encryption & authentication SRTP VoIP Privacy Requires XR (reporting extension) for diagnostics VoIP Software

H.324 – H.324 Voice, video & data over analog loops H.323 Audio visual communication on packet networks MGCP – Media Gateway Control Protocol MGCP Signaling & control over a distributed system SIP – Session Initiation Protocol SIP Call setup & tear down

Media Gateway Also called Call Agent Enable multimedia communication across networks Media Gateway Controller Also called a Softswitch Provides call processing functions Competing Protocols Megaco or H.248 Megaco MGCP - Cisco MGCP

Widespread industry support Peer-to-peer protocol OSI application & session layers Uses proxy servers or user agents Users are given a SIP address Sip addressed can be placed in web pages

Translates telephone numbers to URLs Based on DNS architecture Present service providers use their own address mapping

MPEG-2 TS MPEG-2TS Managed network (Possible) Bi-directional capability Can deliver high quality full screen content IGMP – Multicasting (not broadcasting) IGMP RTSP - VoD RTSPVoD

A concept A logical network on shared service provider facilities Internet based VPN Uses the public internet, limited QoS Multiple service providers User groups are defined by encryption Provisioned VPN (multiple protocols) Operated on service provider’s backbone Improved performance Frame relay or ATM IP VPN (single protocol) Operated on service provider’s backbone MPLS

CPE IPsec VPNIPsec OSI layer 3 Traffic is encrypted to run over the internet Transport mode IP payload encrypted Used between host & router Tunnel mode IP datagram is encrypted and given a new IP header Used between gateways Network IPsec VPN MPLS VPN

Combines Ethernet & MPLSEthernetMPLS Uses pseudo-wires to emulate a LANpseudo-wires Leverages existing technologies Lack of QoS Throw bandwidth at the problem

GRE Datagram based IP in IP L2TP GPRS PPTP PPPoE PPPoA Streaming base TLS SSH Tunneling requires three different protocols: 1.Carrier protocol - The protocol used by the network that the information is traveling over 2.Encapsulating protocol - The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data 3.Passenger protocol - The original data (IPX, NetBeui, IP) being carried

Symmetric encryption Both parties use the same key DES IDEA & PGP IDEAPGP AES Asymmetric (public key) encryptionpublic key