Endpoint vs. Network VoIP Services

Slides:



Advertisements
Similar presentations
Insert Tradeshow or Event Name -- Date Insert Presentation Title Trends in Instant Messaging and Telephony Jonathan Rosenberg Chief.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Voice over Internet Protocol at Space Telescope Science Institute.
Name | Title | Microsoft Corporation
1 UCaaS Subscription Detail FunctionalitySupported Devices / Endpoints Types of UCaaS subscriptions EssentialBasicFoundationP1Professional Maximum # of.
Which server is right for you? Get in Contact with us
Vodacom Microsoft Hosted Lync
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
1 ZIP 4x5 The world’s most functional telephone. 2 PSTN Internet Dallas, TX Sunnyvale, CA VPN Outside callers dial a single extension - phone at the office.
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Endpoint vs. Network VoIP Services Henning Schulzrinne (with Xiaotao Wu) Columbia University FCC Technical Advisory Council III Washington, DC – October.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Where should services reside in Internet Telephony Systems? Xiaotao Wu, Henning Schulzrinne {xiaotaow, Department of Computer Science,
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
A Guide to major network components
1 CCM Deployment Models Wael K. Valencia Community College.
Presented by Zhi-Hong Guo Instructed by Assistant Professor Quincy Wu
 CHAPTER 2  Understanding the Pieces of Cisco Unified Communication.
Extending Traditional Desktop Office Communication Systems Chuck Harden, System Analyst Nick Kwiatkowski, System Analyst.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
1 © 2002, Cisco Systems, Inc. All rights reserved. A. Clemm; MMNS 02 panel Is the Internet ready for Multimedia? Alexander Clemm Cisco Systems
MAEDS 45 th Annual Conference October , 2009.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
B2BUA – A New Type of SIP Server Name: Stephen Cipolli Title: System Architect Date: Feb. 12, 2004.
Introduction to SIP Based ENUM IP Telephony Infrastructure 資策會 網路及通訊實驗室 Conference over IP Team 楊政遠 博士
Appendix A UM in Microsoft® Exchange Server 2010.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
XP Practical PC, 3e Chapter 7 1 Connecting to the Internet.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Endpoint vs. Network Services Henning Schulzrinne (with Xiaotao Wu) Columbia University Siemens ICN Innovation Symposium Munich – December 16, 2003.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Core VoIP and 911 issues and alternatives Henning Schulzrinne Columbia University August 2003.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
ROI for VoIP in the Enterprise A business case for Zultys VoIP Solutions.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
CompTIA Network+ Certification Exam
INTERNET PROTOCOL TELEVISION (IP-TV)
Aria Telecom Solutions Pvt. Ltd.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
Lab A: Planning an Installation
IP Telephony (VoIP).
CONNECTING TO THE INTERNET
IOT Critical Impact on DC Design
SIX MONTHS INDUSTRIAL TRAINING REPORT
Deploying IP Telephony
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Session Initiation Protocol (SIP)
Introduction to Networking
Introducing To Networking
CompTIA Network+ Certification Exam
Connecting to the Internet
INTERNET PROTOCOL TELEVISION (IP-TV)
Where should services reside in Internet Telephony Systems?
Level 3 Voice Services Network Architecture June 15, 2004
* Essential Network Security Book Slides.
The Business Value of SIP Trunking
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Virtual Private Network
Prof. Henning Schulzrinne Internet Real-Time Laboratory
VoIP—Voice over Internet Protocol
Internet Real-Time Laboratory demonstration
Simple, Flexible and Easy-to-Scale Cloud PBX Solution
Web Manager Features Diagram
Presentation transcript:

Endpoint vs. Network VoIP Services Henning Schulzrinne (with Xiaotao Wu) Columbia University FCC Technical Advisory Council III Washington, DC – October 20, 2003

What are services? Call routing services  subset of CLASS services name/number translation terminal, user mobility call forward busy/no answer call forward conditional (time-of-day, call center) Directory services white and yellow pages global and corporate Media services media encoding translation for bandwidth media type conversion: language, speech-to-text media combining: conferencing Identity services identity assertion (“Columbia attests that Joe Smith, an employee, is calling”) identity hiding (“agent42@anonymizer.com is calling”) configuration repository media preferences address book and speed dial

PSTN vs. Internet Telephony end system PSTN Number of lines or pending calls is virtually unlimited Generally, end system in Internet Telephony logically have multiple lines. It can deal with unlimited incoming phone calls. PCs can be considered as the end-user devices and can perform many service functionalities. Unlimited lines, no feature interaction, good or not? Keep all the things in human’s mind? More (per-user) processing power than most network servers Single line, 12 buttons and hook flash to signal

PSTN vs. Internet Telephony Signaling & Media Signaling & Media can be far away from either user With a few exceptions, in Internet telephony, end systems are the only entities where signaling and media flows converge. Thus, any service that requires interaction with user media is likely to be easier to implement in the end systems. More seperately Internet Telephone: Signaling Signaling Media

PSTN vs. VoIP PSTN: only carriers can get full signaling functionality (SS7) UNI vs. NNI signaling VoIP: same signaling, same functionality

Network vs. end system services Really two meanings: services implemented in user agent (instead of proxy) services implemented in server run by end user (instead of carrier)  business residential Variation on old Centrex vs. PBX argument except that media routing no longer an issue Often, services require or can use both: e.g., the history of speed dial CLASS service: translation in CO (semi)intelligent end systems: locally, possibly with hotsync to PC intelligent end system, but network-synchronized

End system vs. network trade-offs Criteria network end system availability high (backup systems & power) lower, but maintain local services during network outage bandwidth high lower ( large centralized conferences) addressing global IPv4 addresses often NATs  can’t run servers IPv6 may fix security professional maintenance more visible target trust third party with content update tracking lower disruption end-to-end encryption user control protection of shared resources  limit user programmability full control processing high aggregate, lower per-user low on residential GW, unbounded on PCs

End system vs. Network services – the easier cases PSTN gateway multiplexing gain SS7 access Backup services e.g., no answer from enterprise due to failure no permanent connectivity for residential users Large-scale conferences for residential users bandwidth availability End system/user services media processing distinctive ringing programmable services user control but: security maintenance

Call routing services Outsourcing allows temporarily disconnected end users Staged service: carrier proxy user proxy personal preferences basic call routing

Identity management Identity assertion (notary) services best done by larger organization server certificates name recognition recourse Anonymity services needs to have large user population to provide effective hiding Portable services high availability and universal reachability

Service architecture Programming language model

Service location examples End system Network (proxy) Network with media (UA) Distinctive ringing Yes Can assist Visual call id Call waiting No Yes(*) CF busy CF no answer CF no device Location hiding Transfer Conference bridge Gateway to PSTN Firewall control Voicemail (*) = with information provided by end system  

Analogies False either/or choice See email and web for precedent carrier-provided (ISPs) basic service name portability issues enterprise provide and manage own infrastructure only purchase “raw bits” home user albeit actively discouraged hosting companies = bandwidth + service shared and dedicated facilities but not an ISP in the traditional sense service-only companies web mail mail forwarding

The vanishing phone Old model: New model: explicit, user-visible signaling  dialing, ringing small number of phone lines, (mostly) each with one E.164 identifier New model: session initiation from IM session  no dialing and ringing game session  proximity triggers conversation event based  connect if event occurs no notion of lines teenager (or telemarketer…) may have dozens of chat windows open some identifiers may make no PSTN calls at all from monthly service  calling card-like any number of identifiers one per wire or device  multiple per person (role-based)

Example: VoIP embedded in VR

The impact of regulations Phone (service) companies are not required any more, but may be useful don’t have (many) email companies, either Regulation should not bias technical and business decisions on in-house vs. out-sourcing Avoid conflicts of interest for ISPs that provide phone service: no port blocking except by user request traffic neutrality  provide differentiated services to all provide externally routable addresses address shortage excuse  NAT  difficult to have inbound connections distinguish residential / business via application-neutral measures, e.g., bandwidth or availability Goal: ensure “transparent Internet” + service providers for added value encourages service innovation encourages service competition

Impact of regulations: E911 Traditional notion: small number of phone companies (often, one) do selective routing of 911 calls to PSAPs PSAP information tightly guarded public information, but hard/$$$ to get For service competition: should be able to route to PSAP from my home proxy open access to PSAP information See my ex-parte filing for details

Conclusions VoIP enables, but does not force, end point services Move service location decision to end user, with trade-offs in cost control availability functionality technical sophistication needed Regulatory framework should ensure this user choice prevent network operators from stifling service competition Consumer protection  define service rules for effective monopoly & oligopoly providers goal of transparent (end-to-end) Internet