Welcome.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
MOHAMMAD QAHIR WARDAK LEGAL & LICENSING MANAGER AFGHANISTAN TELECOM REGULATORY AUTHORITY (ATRA) Introduction to Voice over Internet Protocol (VoIP)
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
From Voice on the Net to Real Time Communications Jawad Khaki Vice President Windows Networking & Communications Microsoft Corporation.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
How does Samsung compete with Cisco VoIP solutions?
How Green is IP-Telephony? Salman Abdul Baset*, Joshua Reich*, Jan Janak**, Pavel Kasparek**, Vishal Misra*, Dan Rubenstein*, Henning Schulzrinne* Department.
Presented by Kathleen Ritchie COMP 1631 – Winter 2011 Mount Allison University.
Voice over Internet Protocol (VoIP) Training and Development.
Enterprise Infrastructure Solutions for SIP Trunking
CHAPTER 15 & 16 Service Provider VoIP Applications and Services Advanced Enterprise Applications.
1 CCM Deployment Models Wael K. Valencia Community College.
VOIP ENGR 475 – Telecommunications Harding University November 16, 2006 Jonathan White.
VoIP lets you make toll bypass voice and fax calls over existing IP data networks instead of the public switched telephone network (PSTN). Today businesses.
17 th Jan 06 IP40 Sales Brief. 2Plantronics, Inc. Contact Center Desktop – The changes Infrastructure in the contact center is now following the trends.
VOIP (Voice Over Internet Protocol) CDA 4527 Fall 2006.
Extending Traditional Desktop Office Communication Systems Chuck Harden, System Analyst Nick Kwiatkowski, System Analyst.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Presenters :Deepak Yadav Voice Over Internet Protocol.
What is internet telephony?  IP telephony uses the Internet to send audio, video, fax etc between two or more users in real time, so the users can converse.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
VoIP Voice over Internet Protocol
VoIP Citizen Decreasing Cost For Communication Voice over Internet Protocol Implement VoIP on your office Bona Simanjuntak, Mei 2004
Copyrights © All rights Reserved. Asterisk and VoIP issues Chetan Vaity March 2007.
MAEDS 45 th Annual Conference October , 2009.
1 BBTelsys and Secure SIP Calling Providing Solutions that Work in the Real World.
Building an Infrastructure for At-Home Agents Presented by : Mohita Chawla Director- Business Development
PRESENTED BY: PRIYANKA SINGH BRANCH:ETC REG NO
Unified Communications LITN Spring  A set of products that provides a consistent, unified user interface and user experience across multiple devices.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 3 – VoIP: An Overview.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Voice over IP B 林與絜.
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
Introduction to Asterisk Mark Turner Siteseers Inc June 2004.
Communication Methods
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Cisco SP Voice solutions Review Ching-Ying Tong
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
Network customization
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
On-Site PBX Vs Hosted PBX.
By Asma Hamad Alharbi.
MISY 3312: Introduction to Telecommunications Summer 2012 VoIP
VoIP Basics A high level overview of Voice Over IP and it’s place in the New Zealand Market.
IP Telephony (VoIP).
2.7 Communication Methods
Global Asterisk Voice over IP Implementation
SIX MONTHS INDUSTRIAL TRAINING REPORT
VoIP -Voice over Internet Protocol
Asterisk: The Open Source PBX
Introduction to Networking
Trends in Enterprise VoIP
VOICE OVER INTERNET PROTOCOL
Developing Innovative Unified Communications Applications
Network Research at CTI
Lecture 5: Voice Over IP (VoIP): Internet Telephony
Network Research at CTI
11/23/2018 8:30 AM BRK3037 BRK3037: Dive deep on building apps and services with the Office 365 Communications Platform David Newman Senior Program Manager.
VoIP—Voice over Internet Protocol
ENGR 475 – Telecommunications
Enterprise Infrastructure Solutions for SIP Trunking
Bonrix Software Systems
Helping to Achieve ROI Targets with SIP Trunking
Network customization
Ingate & Dialogic Technical Presentation
Presentation transcript:

Welcome

IP Telephony VOIP

What is VOIP 1st Voice App 1995 VocalTec Voice packets transported over IP network instead of PSTN Uses call connection standards such as H.323, SIP, MGCP Uses well known Media standards such as G.711, G.728, GSM, etc Cisco uses SKINNY, but changes in v5.x Access to PSTN via gateways VOIP will become the default, already out sells traditional PBX Reported to be the Broadband Killer App Parks Associates UK forms trade body Internet Telephony Service Providers Association ITSPA We will all be users

BT 21CN The BT 21st Century network Started 2004 –bypass core PSTN service for Cambridge & Woolwich £10 Billion spend over next 5 years 50% customers moved by 2008 1500 customers to trial fibre to the home Projected savings of £1 Billion per year by adopting single infrastructure

Service Providers Babble BT Call1886 FreeWorldDialup PipeMedia SIPGate Vonage Gossiptel VoipGate FreeSpeech.co.uk ……………….and many more

Phones Softphones Xten Snom KPhone Windows Messenger Ineen SJ-Labs LinPhone Gizmo HardPhones 3COM DLink Cisco Grandstream Avaya Siemens ATA’s Mobile Phones Motorola & SIPCPE GSM + 802.11 abg ………………………………….plus many many more

Current Trial 2Mb/s PCM link to the BTEX PBX Call Signalling conversion DPNSS to QSIG Link to Cisco CallManager CallManager connection to main Call Billing data collection service Extension numbers 15XX allocated

Current Trial

Advantages Lower call costs Lower Network Leasing costs Integrated Voice and Data Applications Single Communications Management Domain Moves, Adds, Changes Flexibility Hot-desking Remote Workers Voicemail Text to Speech MoH

Issues Layer 1 needs to meet ‘real-time’ requirements Loss, Jitter & Delay QoS present from end-to-end New management techniques for converged network Queuing at egress points Power Emergency Services Cost of Handsets Security

Security Eavesdropping Identity Theft DOS SPIT/SPAM VOMIT Phishing Theft of Service Manipulation of CDR Compliance with Law & Policy

Security The bottom line VOIP doesn’t make your network less secure It needs protected like any other network application.

So concerns with security for the phone network is something new then?

The S word Skype

The problem with Skype P2P technology Proprietary Can act as an agent even when you not using it Payload encrypted A true P2P system, in our opinion, is one where all nodes in a network join together dynamically to participate in traffic routing-, processing- and bandwidth intensive tasks that would otherwise be handled by central servers Skype FAQ Client License

Skype Article 4 Utilization of Your computer 4.1 Utilization of Your computer. You hereby acknowledge that the Skype Software may utilize the processor and bandwidth of the computer (or other applicable device) You are utilizing, for the limited purpose of facilitating the communication between Skype Software users. 4.2 Protection of Your computer (resources). You understand that the Skype Software will use its commercially reasonable efforts to protect the privacy and integrity of the computer resources (or other applicable device) You are utilizing and of Your communication, however, You acknowledge and agree that Skype cannot give any warranties in this respect.

Skype Breaks Connection Policy – no P2P apps Breaks ICT software policy – standards based Can break JANET AUP wasting staff effort or network resources using JANET in a way that denies service to other users see UKERNA VAG document March 2006

Future Some DPNSS signalling issues to solve Bring SIP Proxy into service Rollout DNS SRV records Add DD extensions Move to CM ver 5 Use phones for real Develop STUN server Follow developments for convergence of Voice, Video and IM services

In Tomorrows World style The Live Demo

Questions Steven Jack Computing Service Multimedia Communications Unit X3828 s.jack@compserv.gla.ac.uk