DCE Project 1999 - Internet Telephony1 Internet Telephony %Introduction %What is it? %History %IP Telephony v. PSTN.

Slides:



Advertisements
Similar presentations
National Institute of Science & Technology TECHSEM PRESENTATION 2004 Tanusri Panda Under the guidance of pradeep kumar jena Presented by Tanusri Panda(IT )
Advertisements

CAUSES & CURE OF LATENCY IN THE INTERNET TELEPHONY DR. OLUMIDE SUNDAY ADEWALE Dept of Industrial Math & Computer Science Federal University of Technology.
Presented By:- Yash Jariwala Paras Patel Deep Amrutiya.
Unified Communications
H. 323 Chapter 4.
A Presentation on H.323 Deepak Bote. , IM, blog…
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Packet Based Multimedia Communication Systems H.323 & Voice Over IP Outline 1. H.323 Components 2. H.323 Zone 3. Protocols specified by H Terminal.
24/08/2005 IP Telephony1 Guided by: Presented by: Dr.S.K.Ghosh Nitesh Jain 05IT6008 M.Tech 1 st year.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
SCSC 455 Computer Security Virtual Private Network (VPN)
AIMS Workshop Heidelberg, 9-11 March /20 A Telecom and IP Project from ETSI Gerald Meyer
WAN Technologies Dial-up modem connections Cheap Slow
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
VoIP Voice Transmission Over Data Network. What is VoIP?  A method for Taking analog audio signals Turning audio signals into digital data Digital data.
IP Telephony (Article Presentation) by Samir Goswami Source: Rivier College, CS699 Professional Seminar.
H.323: Multimedia Conferencing for Packet Switched Networks Dave Lindbergh Manager, Technical Standards Group PictureTel.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Voice over Internet Protocol (VoIP) Training and Development.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Voice & Data Convergence Network Services January 11, 2001.
What is internet telephony?  IP telephony uses the Internet to send audio, video, fax etc between two or more users in real time, so the users can converse.
Comparing modem and other technologies
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 © 2002, Cisco Systems, Inc. All rights reserved. H.323 Voice Market H.323-Forum, November 2002, New York, USA H.323 Voice Market Haluk Keskiner Cisco.
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
Voice Over Internet Protocol (VoIP). Basic Components of a Telephony Network.
VOICE OVER INTERNET PROTOCOL. INTRODUCTION SCENARIOS IN INTERNET TELEPHONY VOIP GATEWAYS IMPORTANCE OF VOICE OVER IP BENEFITS & APPLICATIONS ADVANTAGES.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY [1] VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY ROLL # EC
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Voice Over Internet Protocol
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
DUE VoIP I Chapter 1 v3 JEOPARDY Name: student name K. Martin.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Telecommunications Essentials Chapter 9. Cost savings & revenue generation Logical rather than physical connections IPT – Telephony IPTV – Digital Television.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
An IP Multimedia Communication switch
VOICE OVER INTERNET PROTOCOL
VoIP—Voice over Internet Protocol
Topic 12: Virtual Private Networks
Presentation transcript:

DCE Project Internet Telephony1 Internet Telephony %Introduction %What is it? %History %IP Telephony v. PSTN

DCE Project Internet Telephony2 IP Telephony v PSTN %Calls broken to pieces and sent to destination %Better use of network capacity %Data Network 80% reliable %Downtime is 4 hours per month (Data Communications) %Dedicated circuit for each call %Telephone Network % reliable %Downtime measured in seconds per year %Regulation Data Packet SwitchedCircuit Switched

DCE Project Internet Telephony3 Voice Gateways %Physical interface %Placed between PSTN and IP Network %Handles %signaling to and from telephone network %reception of telephone numbers %conversion of tel nos to IP addresses %voice processing %reception of voice signal %compression(to reduce bandwidth and delay impact from Network) and packetization %echo cancellation %silence suppression %No of gateways crucial - around 500 in existence

DCE Project Internet Telephony4 IP Telephony Network Gatekeeper Gateway RTRT RTRT PSTN ISDN RTRT RTRT IP Network Gateway :Bridge between PSTN & IP Networks Gatekeeper :Admission control for network Bandwidth control and management Address translation (E.164 IP address) Call Management

DCE Project Internet Telephony5 IP Telephony Services %Encompasses mphone-to-phone mphone-to-PC mPC-to-PC mfax-to-fax mvideo conferencing mdesktop collaboration %Software such as mMicrosoft NetMeeting mDeltaThree’s DotDialer mIDT’s Net2Phone

DCE Project Internet Telephony6 Standards %Why do we need them? %The benefits of standardisation Interoperability billing, settlement and reconciliation uniformity for carriers marketability %Currently no standards for signaling no standard agreement on accounting records or billing %These issues being handled through maturing standards such as ITU’s H.323 Tiphon

DCE Project Internet Telephony7 H.323-The Vendors Choice? %H.323 recommends G.723 compresses voice to 5.3 or 6.3 kbit/s %Some using GSM algorithm compresses to 13.3 kbit/s, appears to provide superior quality to G.723 %Tiphon based on H.323 specifies network architecture, numbering, supplementary services integration

DCE Project Internet Telephony8 Security %Initially somewhat overlooked, now being raised by carriers and business users %Security Issues User and data authentication Data privacy (integrity, confidentiality) Access control Policy management %Security Measures Encryption –SSL (secure sockets layer) –TLS (transport layer security) Tunnelling –Layer 2 Tunnelling Protocol (L2TP) –establish a secure tunnel between gateways or gatekeepers

DCE Project Internet Telephony9 Encryption %SSL, TLS on transport level, suitable for Gatekeeper-to-gatekeeper, but not if unreliable, connectionless UDP transports the voice %IETF IPsec working group describes security architecture for IP protocol that makes it suitable for secure VPN mauthenticates users mencrypts payload mtracks who has changed packet %Incorporated in H.323 V2 via H.235 also called H Secure %Encryption Problems mPolitical/military issues (limits on keys etc) mHardware issues (processing power) %Dealing with security issues mUS Chamber of commerce announced automatic approvals for financial institutions mTherefore encryption more readily available??

DCE Project Internet Telephony10 Effect on the Traditional Communications Companies %Telecommunications or information service? %Telecommunications Act 1996 lpromote competition lfacilitate new telecommunications technologies

DCE Project Internet Telephony11 Economics %Cost savings dependent on the provider and location %Calls between London and Tokyo around 30 cents per minute ($1 per minute for POTS)

DCE Project Internet Telephony12 The Future %Market predicted to grow to $560 million by end of 1999 %By 2002, 3% of US long-distance traffic, 5% of European long-distance traffic, 14% of US international traffic and 11% of European international traffic %Not economic but service benefit %Used with video and data sharing for multi-media communications