What would it take to overthrow the PSTN using SIP? Dayton Turner ClueCon 2013.

Slides:



Advertisements
Similar presentations
IP-PBX & Voice-Gateway Solution From Green Path Technologies Co.,ltd.
Advertisements

THIS IS THE WAY ENUM Variants Jim McEachern Carrier VoIP Standards Strategy THIS IS.
IPv6 Privacy Hannes Tschofenig, Tara Whalen. Agenda Privacy Threats Layering Addressing Policy Questionnaire.
Voice over IP Fundamentals
Defence R&D Canada R et D pour la défense Canada Dynamic VPN Controller Developed by NRNS Inc. July 2, 2003.
Routing: Cores, Peers and Algorithms
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Introduction to Asterisk with
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Module Summary BGP has reliable transport provided by TCP, a rich set of metrics called BGP.
Sales Is A Contact Sport. A Contact Sport??? You Must Make Contact How Do I Do That? Once I Make Contact – Then What? How Do I Keep Contact? What If This.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Network Layer. The Network layer, or OSI Layer 3, provides services to exchange the individual pieces of data over the network between identified end.
1 CCNA 1 v3.1 Module 10 Review. 2 What is the address that is changed when a frame is received at a router interface? MAC address.
Internet Protocol Security (IPSec)
 Joseph Fuccillo  CTO & Co-Founder  Nectar Corp  Tom Tuttle  VP Business Development  Nectar Corp  James Fry  Global Manager for Managed Lync.
OIS Model TCP/IP Model.
1 CCM Deployment Models Wael K. Valencia Community College.
VoIP - Abridged - Stephen R. Nelson November 11,
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
RIPE64 Enum Working Group DE-CIX NGN Services.
Service Provider Network Customer Site Customer Site First Offering... WAN... PSTN LAN Enterprise Gateway Enterprise Gateway vmail gen d OSS ConfIM Network.
Research on design and implementation of Internet measurement infrastructure Lv Jun Aug 28, 2003.
To Build Context-Aware VoIP Support using Session Initiation Protocol By Prasad Vunnam Ritesh Reddy Gunna.
Benefits of VoIP Peering in a Challenging Economy (SP-10) Tuesday - 02/03/09 4:00-4:45pm Mark Benisz, VP Americas, XConnect Global Networks.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
Voice over IP Are we there yet ? Presented by: Mark Caswell, Empire Technologies, LLC. Voice over IP.
© Synergon Informatika Rt., 1999 Chapter 12 Connecting Enterprises to an Internet Service Provider.
The Network Layer Introduction  functionality and service models Theory  link state and distance vector algorithms  broadcast algorithms  hierarchical.
Np163 Dennis Baron, April 3, 2008 Page 1 VoIP at MIT Merit VoIP Seminar Dennis Baron April 3, 2008.
Media Gateway Figure 8-1 Comparing PSTN and VoIP voice call setup.
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
Call signaling/Media control
The RISE Internet Architecture Nick Feamster (Georgia Tech) Brighten Godfrey (UIUC) Nick McKeown (Stanford) Guru Parulkar (Stanford) Jennifer Rexford (Princeton)
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
Scalable Trust Community Framework STCF (01/07/2013)
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
1 VoIP Peering Peering, it’s not just for IP anymore Kingsley Hill XConnect Global Networks, Ltd VP for Strategic Federations.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
To Rent or Buy the IP PBX? Maybe it’s Both…. Building a VoIP Solution That Enables Both.
MX Groups. Page 2 Multiple Sites – What Most are Offering Centralized Intelligence Survivable Gateways at remote sites DISASTER AT MAIN SITE ONLY BASIC.
Route Selection Using Policy Controls
SPEERMINT Architecture - Reinaldo Penno Juniper Networks SPEERMINT, IETF 70 Vancouver, Canada 2 December 2007.
© 2006 Open Grid Forum Network Services Interface Policy-based routing enforcement John MacAuley, ESnet 4 th February 2015.
IP Telephony (VoIP).
THIS IS THE WAY ENUM Variants Jim McEachern
Connecting an Enterprise Network to an ISP Network
Information Security Professionals
VoIP Plans: H.323, SIP and ENUM
Network Operating Systems Examples
Cluster Communications
Peer-to-peer networking
The Domain Policy DDDS Application
Understanding the OSI Reference Model
THE Financial Services NETWORK Planning for Next Season –
(1888 PressRelease) First Decentralized Private Communication Solution
Advanced Network Training
Module Summary BGP is a path-vector routing protocol that allows routing policy decisions at the AS level to be enforced. BGP is a policy-based routing.
BGP Overview BGP concepts and operation.
Connecting an Enterprise Network to an ISP Network
© 2006 ITT Educational Services Inc.
ECE453 – Introduction to Computer Networks
Peer-to-peer networking
Agenda Overview Extending the Reach of VoIP Application Examples Standards and Other Resources Summary.
Abingdon SBM Group VoIP presentation
Presentation transcript:

What would it take to overthrow the PSTN using SIP? Dayton Turner ClueCon 2013

Objectives Reduce (or eliminate!) the dependency on the PSTN Establish de-centralized routing database / phone book Increase functionality and flexibility of current routing mechanisms Get the conversation started

Similar systems ENUM Centralized Requires explicit verification per DID Simply provides raw SIP URI DUNDi Asterisk only BGP Operates on same basic principles of peers and trust

What is necessary? Identify areas where other systems failed to reach mass adoption Define secure peering mechanism Protocol for data exchange Build ready-to-go implementation

Ideas Service broadcast (like Bonjour) Peer to peer neighbor learning Inbound DID directory White/Yellow page replacement Outbound routing possibilities

More ideas Health monitoring between sites Potentially offer alternate media routing paths that were designed for voice Allow for advanced routing criteria (avoid known un-trusted networks) ?????

Concerns Security is huge Need network operators to experiment and test Privacy in an open directory?! Love to hear your concerns and ideas!

Where do we start? Discussion ClueCon, mailing list We are starting work using Kazoo Building with API abstraction in mind for connecting to arbitrary data stores

More information? theMesh.io Thank you! (I'll be here all week)