Endpoint vs. Network VoIP Services Henning Schulzrinne (with Xiaotao Wu) Columbia University FCC Technical Advisory Council III Washington, DC – October.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

Fall IM 2000 Evfolution of Presence Based Networks Evolution of Presence Based Networks Jonathan Rosenberg Chief Scientist.
IM May 23-25, 2000 Evolution of IP Based Presence Services Evolution of IP-Based Presence Services Jonathan Rosenberg Chief.
Insert Tradeshow or Event Name -- Date Insert Presentation Title Trends in Instant Messaging and Telephony Jonathan Rosenberg Chief.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Any Questions?.
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
Which server is right for you? Get in Contact with us
Vodacom Microsoft Hosted Lync
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
1 ZIP 4x5 The world’s most functional telephone. 2 PSTN Internet Dallas, TX Sunnyvale, CA VPN Outside callers dial a single extension - phone at the office.
August 2005IETF 63 VOIPEER1 Issues in Numbering, Naming and Addressing voipeer BoF IETF 63 – Paris, August 2005 Richard Stastny ÖFEG.
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Internet Gateway Device (IGD)
A Conversation on the Future of Telephony What’s Your Skype Strategy? Stuart Henshall May 10, 2005.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Where should services reside in Internet Telephony Systems? Xiaotao Wu, Henning Schulzrinne {xiaotaow, Department of Computer Science,
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Applications Morris Sloman Christian Hoene Henning Schulzrinne.
NET NEUTRALITY:THE TECHNICAL SIDE OF THE DEBATE A WHITE PAPER Author:Jon Crowcroft Speaker : 游文霖.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
1 CCM Deployment Models Wael K. Valencia Community College.
George Njoroge CSCIE 139 Hosted vs. Managed VoIP Hosted VOIP is utilizing a company for phone connectivity (soft and hard), extensions,
Presented by Zhi-Hong Guo Instructed by Assistant Professor Quincy Wu
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Extending Traditional Desktop Office Communication Systems Chuck Harden, System Analyst Nick Kwiatkowski, System Analyst.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
1 NGN Issues - Numbering and Addressing Peter Darling ACIF NGN FOG No. 3.
RIPE64 Enum Working Group DE-CIX NGN Services.
IP telephony overview and demonstration
 he_shape_shifting_future_of_the_mobile_pho ne.html he_shape_shifting_future_of_the_mobile_pho.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
B2BUA – A New Type of SIP Server Name: Stephen Cipolli Title: System Architect Date: Feb. 12, 2004.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Appendix A UM in Microsoft® Exchange Server 2010.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Endpoint vs. Network Services Henning Schulzrinne (with Xiaotao Wu) Columbia University Siemens ICN Innovation Symposium Munich – December 16, 2003.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Architecting the Network Part 2 Geoff Huston Chief Scientist, Internet Telstra ISOC Workshop.
Core VoIP and 911 issues and alternatives Henning Schulzrinne Columbia University August 2003.
Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
April 30, 2007 NYC network neutrality hearing Network Neutrality Prof. Henning Schulzrinne Dept. of Computer Science Columbia University.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
ROI for VoIP in the Enterprise A business case for Zultys VoIP Solutions.
Interconnection and Access Presentation by Dale N. Hatfield Chief, Office of Engineering and Technology Federal Communications Commission June 6, 2000.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Endpoint vs. Network VoIP Services
CONNECTING TO THE INTERNET
Deploying IP Telephony
Introduction to Networking
Connecting to the Internet
Where should services reside in Internet Telephony Systems?
Level 3 Voice Services Network Architecture June 15, 2004
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Presentation transcript:

Endpoint vs. Network VoIP Services Henning Schulzrinne (with Xiaotao Wu) Columbia University FCC Technical Advisory Council III Washington, DC – October 20, 2003

What are services? Call routing services  subset of CLASS services name/number translation terminal, user mobility call forward busy/no answer call forward conditional (time-of-day, call center) Directory services white and yellow pages global and corporate Media services media encoding translation for bandwidth media type conversion: language, speech-to-text media combining: conferencing Identity services identity assertion (“Columbia attests that Joe Smith, an employee, is calling”) identity hiding is calling”) configuration repository media preferences address book and speed dial

PSTN vs. Internet Telephony Number of lines or pending calls is virtually unlimited Single line, 12 buttons and hook flash to signal More (per-user) processing power than most network servers PSTN Internet Telephony end system

PSTN vs. Internet Telephony Signaling & Media Signaling Media PSTN: Internet Telephone: can be far away from either user

PSTN vs. VoIP PSTN: only carriers can get full signaling functionality (SS7) UNI vs. NNI signaling VoIP: same signaling, same functionality

Network vs. end system services Really two meanings: services implemented in user agent (instead of proxy) services implemented in server run by end user (instead of carrier)  business residential Variation on old Centrex vs. PBX argument except that media routing no longer an issue Often, services require or can use both: e.g., the history of speed dial CLASS service: translation in CO (semi)intelligent end systems: locally, possibly with hotsync to PC intelligent end system, but network-synchronized

End system vs. network trade- offs Criterianetworkend system availabilityhigh (backup systems & power) lower, but maintain local services during network outage bandwidthhighlower (  large centralized conferences) addressingglobal IPv4 addressesoften NATs  can’t run servers IPv6 may fix securityprofessional maintenance more visible target trust third party with content update tracking lower disruption end-to-end encryption user control protection of shared resources  limit user programmability full control processinghigh aggregate, lower per-user low on residential GW, unbounded on PCs

End system vs. Network services – the easier cases Network services PSTN gateway multiplexing gain SS7 access Backup services e.g., no answer from enterprise due to failure no permanent connectivity for residential users Large-scale conferences for residential users bandwidth availability End system/user services media processing distinctive ringing programmable services user control but: security maintenance

Call routing services Outsourcing allows temporarily disconnected end users Staged service: carrier proxyuser proxy basic call routing personal preferences

Identity management Identity assertion (notary) services best done by larger organization server certificates name recognition recourse Anonymity services needs to have large user population to provide effective hiding Portable services high availability and universal reachability

Service architecture Programming language model

Service location examples ServiceEnd systemNetwork (proxy)Network with media (UA) Distinctive ringingYesCan assist Visual call idYesCan assist Call waitingYesNoYes(*) CF busyYesYes(*) CF no answerYes CF no deviceNoYes Location hidingNoYes TransferYesNo Conference bridgeYesNoYes Gateway to PSTNNo Yes Firewall controlNo Yes Voic YesNoYes (*) = with information provided by end system

Analogies False either/or choice See and web for precedent carrier-provided (ISPs) basic service name portability issues enterprise provide and manage own infrastructure only purchase “raw bits” home user albeit actively discouraged hosting companies = bandwidth + service shared and dedicated facilities but not an ISP in the traditional sense service-only companies web mail mail forwarding

The vanishing phone Old model: explicit, user-visible signaling  dialing, ringing small number of phone lines, (mostly) each with one E.164 identifier New model: session initiation from IM session  no dialing and ringing game session  proximity triggers conversation event based  connect if event occurs no notion of lines teenager (or telemarketer…) may have dozens of chat windows open some identifiers may make no PSTN calls at all from monthly service  calling card-like any number of identifiers one per wire or device  multiple per person (role-based)

Example: VoIP embedded in VR

The impact of regulations Phone (service) companies are not required any more, but may be useful don’t have (many) companies, either Regulation should not bias technical and business decisions on in-house vs. out-sourcing Avoid conflicts of interest for ISPs that provide phone service: no port blocking except by user request traffic neutrality  provide differentiated services to all provide externally routable addresses address shortage excuse  NAT  difficult to have inbound connections distinguish residential / business via application-neutral measures, e.g., bandwidth or availability Goal: ensure “transparent Internet” + service providers for added value encourages service innovation encourages service competition

Impact of regulations: E911 Traditional notion: small number of phone companies (often, one) do selective routing of 911 calls to PSAPs PSAP information tightly guarded public information, but hard/$$$ to get For service competition: should be able to route to PSAP from my home proxy open access to PSAP information See my ex-parte filing for details

Conclusions VoIP enables, but does not force, end point services Move service location decision to end user, with trade-offs in cost control availability functionality technical sophistication needed Regulatory framework should ensure this user choice prevent network operators from stifling service competition Consumer protection  define service rules for effective monopoly & oligopoly providers goal of transparent (end-to-end) Internet