PROVIDING INTEROPERABLE SECURE VOICE IN CONVERGING HETEROGENOUS NETWORKS: THE NATO SECURE VOICE STRATEGY
|
|
- Michael Chad Lucas
- 6 years ago
- Views:
Transcription
1 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE PROVIDING INTEROPERABLE SECURE VOICE IN CONVERGING HETEROGENOUS NETWORKS: THE NATO SECURE VOICE STRATEGY Michael Street, Brian Bottesini, Rita Russo NATO C3 Agency, Brussels, Belgium and The Hague, The Netherlands Michael.Street, Brian.Bottesini, Patrick DeLaere SHAPE, Mons, Belgium Gerard Elzinga NATO HQ C3 Staff, Brussels, Belgium Ric Murtland Supreme Allied Command Transformation, Norfolk, Virginia, USA ABSTRACT This paper provides an overview to the NATO secure voice strategy which will ensure the continued provision of the essential user service of secure voice. Even in today s era of network-centric capabilities the need for military users to talk securely to each other remains a crucial requirement. Providing a reliable voice service over heterogeneous networks presents an increasingly challenging problem as network technologies proliferate and military users make greater use of networks over which they have limited control via service provision contracts for telecommunication services. The NATO secure voice strategy (SVS) [1] sets out a course through the evolving network technologies, accounting for obsolescent and developing technologies, and reflecting the needs of the operational community for interoperability to support current and future NATO operations. Keywords: Secure voice, heterogeneous networks, SCIP, NINE. INTRODUCTION Even in a network centric environment voice communications are an essential service for military planning and operation execution. Secure voice communication provides a service which is still unrivalled for its responsiveness, interaction and trustworthiness. In addition to the military role, in NATO secure voice is one of the key services used for political consultation and command and control of military forces. Therefore even in the current era of NATO network-enabled capability (NNEC) operations, secure voice remains an essential requirement. The NATO secure voice strategy addresses NATO s transition strategy towards network-enabled end-to-end (person-to-person or person-to-process) secure voice. The strategy leads from the current position and addresses incremental transitions towards the desired end state of omnipresent secure voice.
2 Prague, Czech Republic - September, 29-30, 2009 NEED FOR A SECURE VOICE STRATEGY The NATO secure voice strategy has been developed in response to key drivers, namely: Evolving, diverse communication network technologies, Equipment obsolescence, Availability of new cryptographic technologies, Demand for wider interoperability, Need for simplified key distribution, Perceived inadequacies of many current secure voice solutions. Equipment obsolescence and changing network technologies are endangering the current secure voice capability. Historic key management mechanisms are inefficient in current operations. Plans for the telecommunication networks necessary to support NNEC, coupled with new cryptographic technologies, can offer significant enhancements to available secure voice services and their mobility and interoperability. CURRENT STATUS Today s communications networks and their associated technologies are changing at an ever increasing rate. Traditional real-time voice communication circuits are steadily being replaced by other technologies such as Voice over Internet Protocol (VoIP). The dramatic increase in the use of mobile (e.g. cellular, GSM) phones has changed the way we communicate and users expectations. Individuals are always connected not only with voice communications, but with and web browsing capabilities as well. Many developing countries are even completely by-passing the implementation of terrestrial telephone infrastructures and establishing cellular telephone networks instead. In the tactical environment, voice communications require interoperable and flexible infrastructures to support the rapid reaction capabilities of an operational commander. Current operational needs require these services to be interoperable between wired and wireless networks, between networks deployed by different nations and between military and civilian organisations. The services are required within and between all levels of command. The requirement for secure voice communications adds an additional layer of complexity to this already challenging environment due to the additional stringent timing and reliability requirements for the synchronization of security protocols, cryptographic algorithm exchanges needed to support a realtime encrypted service and the need for a supporting cryptographic key management infrastructure. NATO has several secure voice solutions in use today, shown in figure 1. These solutions have largely evolved independently of one another, resulting in the terminals and their supporting infrastructures being non-interoperable. Figure 1 shows a diverse range of non-interoperable secure voice solutions and only considers secure voice in NATO. Virtually every nation has at least one, and often many, bespoke secure voice equipments, usually developed exclusively for a specific network technology e.g. PSTN, ISDN, GSM, CDMA, personal satellite communications, high-frequency radio etc.
3 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE Figure 1. Disparate secure voice solutions Secure voice interoperability between each of the systems shown in figure 1 where possible is only possible through bespoke secure voice gateways. These have to be developed specifically for particular pairs of secure voice equipment. Use of bespoke gateways has a number of problems. Voice is decrypted and decoded back to analogue, therefore the gateway must be located in a secure area and voice quality is degraded [2]. Bespoke nature often relies on use of end terminal secure telephones in the gateway, requiring manual operators or inelegant solutions such as mechanical fingers for the gateways to control the secure telephone. Equipment limitations restrict the number of secure calls between different secure voice cryptographic families to the number of channels supported by the gateway. Inability to support secondary dialling e.g. the user must dial the number of the gateway but has no mechanism to provide the desired destination number. This can be resolved by using a manual operator or through more sophisticated methods using a programmable gateway [3]. User Perception and Voice Encoding Secure voice services depend on voice coders 1 to digitise the voice before it is encrypted. The voice coder is one of the closest functions to the user, therefore the behaviour and performance of the voice coder has a major impact in the user s perception of particular secure voice equipment. 1 The term voice coder is used generically in this paper where distinction may be made between voice coders and waveform coders.
4 Prague, Czech Republic - September, 29-30, 2009 Voice coder performance is heavily influenced by the data rate available between the terminals 2 and by the signal processing power available to provide real-time analysis and synthesis of the voice signal. The continuing increase in available signal processing technology results in improvements in voice quality as more sophisticated voice coders become realisable. The widespread, but aging Narrow-Band Secure Voice II (NBSV-II) equipment uses STANAG 4198, a linear predictive coder (LPC-10e). This voice coder is limited by the technology available thirty years ago when it was developed. It was also limited by the need to operate on strategic networks of the time which could only offer 2.4 kbps links. As a consequence, voice quality and intelligibility of LPC-10e is considered poor by many users today. In contrast STANAG 4209, a continuous slope variable delta (CVSD) waveform coder was developed for tactical networks. On these networks typically covering shorter distances and with fewer network switches - higher data rates (16 kbps) were available, allowing a higher rate, simpler coder to be used. Using a range of voice coders allows for the optimum compromise between network limitations and quality of the voice service. However, the more voice coder standards that are used to provide secure voice the greater the problem to provide interoperability. As a result, the NATO secure voice strategy is restricting the number of voice coders. In order to support secure voice service on constrained networks, the mixed excitation linear prediction-enhanced (MELPe) coder is used. This coder, standardised as STANAG 4591, provides a reasonable voice quality on 2.4kbps channels, making it suitable for narrowband channels such as radio and satellite links. Where appropriate, commercial voice coder standards are also encouraged, primarily G.729D and G.711. These three voice coders can cover a variety of scenarios, ranging from toll-quality voice on high-capacity networks (G.711 at 64kbps); STANAG 4591 offering near toll-quality voice on very narrowband channels; and G.729D covering the middle ground between these two extremes. Figure 2. Speech quality of voice coders in diverse noise environments [4] 2 For this reason 2G cellular systems use a variable bit rate (VBR) codec, so users can be given a high quality voice service possible, but quality and bit rate can be reduced when the network is congested in order to increase network capability.
5 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE Figure 2 shows the relative performance of three voice coders routinely used in secure voice equipment: the historic LPC-10e and CVSD coders and the more modern MELPe. Figure 2 shows the speech intelligibility performance which is measured as a %. This is shown in four different noise environments; quiet - with an infinite signal to noise ratio (SNR) is shown at the back of the graph, a modern office environment typical SNR 20dB, a noisier environment 12dB SNR, and finally a very noisy environment is shown at the first of the graph with a 6 db SNR. Figure 2 shows that MELPe offers significant improvement in performance in all environments over the other 2.4kbps coder, LPC-10e. Compared to CVSD, MELPe offers improved performance in all but the noisiest of environments at a fraction of the data rate. MELPe is therefore the natural choice of voice coder for low throughput networks and should lead to an improvement in performance for the users. NEW TECHNOLOGIES Two recent technologies provide significant portions of the solution to the complex problem of providing secure voice services on NATO networks. These are the use of voice over secure IP networks (VoSIP) and the NATO secure communication interoperability protocol (SCIP). Secure communication interoperability protocol (SCIP) SCIP has been developed to provide end to end encrypted voice and data communication between terminals operating on heterogeneous networks. As such it meets many of the requirements for NATOs secure voice strategy and provides a fundamental piece of the solution. STANAG 5068 (Draft) covers the suite of SCIP specifications that define SCIP. SCIP is the product of a multi-national group involving NATO, national governments and industry. The SCIP specifications are available to nations and industry in order to develop interoperable secure voice and data terminals. As a result a SCIP terminal from vendor A in nation X will be interoperable with a SCIP terminal from vendor B in nation Y. SCIP uses the STANAG 4591 voice coder which offers state of the art voice coding, giving comparatively high voice quality and intelligibility from a 2.4 kbps channel. SCIP terminals place some demands on the intervening networks, although in general these are only that the networks conform to the characteristics and interfaces defined in their respective standards e.g. PSTN (V.32), ISDN (V.110), GSM (bearer service 26) etc. In providing SCIP over IP networks SCIP relies on standard VoIP services and protocols rather than rely on a proprietary VoIP solution. Session initiation protocol (SIP) and real-time protocol (RTP) are both used by SCIP terminals to establish an IP connection between SCIP terminals which is capable of transporting the real-time encrypted traffic needed to support SCIP [5]. SCIP over IP may be referred to as secure voice over IP (SVoIP). SCIP was developed to operate over heterogeneous networks therefore the network interfaces must also support SCIP. This is of particular concern at the boundary between circuit-switched and packet-transfer networks. Here, SCIP uses the ITU-T standard v [6]. V is commonly referred to as modem over IP. Although this is an agreed international standard, it is not widely available and steps must be taken to ensure that military and commercial networks will be able to support SCIP across these interfaces. The SVS recommends use of SCIP to provide secure voice through SCIP enabled terminals operating on a wide range of military and commercial networks e.g. PSTN, ISDN GSM, CDMA, Iridium SATCOM, IP etc. Obsolescent secure voice terminals should be replaced by SCIP equipment as necessary.
6 Prague, Czech Republic - September, 29-30, 2009 The NATO SVS identifies use of SCIP over heterogeneous networks - military and commercial, wired and wireless, circuit-switched and packet-transport. The strategy also identifies a number of steps to ensure future NATO telecommunication networks and network interfaces will support SCIP. This can be achieved by procuring future voice switches which will support V Voice over Secure IP In many areas, such as static headquarters or major deployed bases, NATO has established high capacity, resilient IP networks. These networks typically rely on a combination of physical security of the network infrastructure coupled with IP network encryption to protect all network traffic and signalling. Conventional VoIP telephones can be used on such a network to provide secure voice through voice over secure IP (VoSIP). This can be considered as a system high voice and data network where the voice is provided by insecure VoIP on a secure IP network. The NATO SVS recommends use of VoSIP to provide secure voice in headquarters and locations where a secure IP network is available to large numbers of users on a secure local area network (LAN) and where the majority of secure voice traffic is within the LAN. VoSIP service can be provided between secure LANs where there is a sufficient capacity, quality of service and security between the LANs. In future secure IP networks encryption of these inter-lan connections will be provided by the NATO IP network encryptor (NINE) which provides another common element to the solution. Secure voice requirements beyond NATO The two technical solutions, SCIP and VoSIP, between them are expected to accommodate virtually every current and future NATO requirement for secure voice. National secure voice requirements are expected to be similar. SCIP is capable of supporting NATO, coalition and national modes. Similarly, VoSIP is suitable for secure IP networks operating in a range of security domains. As a result, the SVS is capable of being extended to support the secure voice needs of nations as well as of the NATO Alliance. SCIP can also support operational modes with reduced security levels which are suitable for sharing with user communities outside the military. This capability allows military and civil actors to communicate in a trusted manner to facilitate information sharing, cooperation and collaboration. Secure voice interoperability to facilitate such interaction is necessary to enable a comprehensive approach, involving military and civil organisations in order to achieve the desired outcomes of many current and future NATO operations. FUTURE ARCHITECTURE Having proposed two different solutions to provide secure voice in order to meet the future needs, it is clear that gateways between SCIP and VoSIP will be necessary. These are likely to be located at the edge of VoSIP enclaves to allow secure voice users within the enclave to communicate securely with other users equipped with SCIP devices and vice versa. Figure 3 shows the envisaged future secure voice architecture based on SCIP terminals operating on a variety of networks. These networks support the requisite interfaces to allow SCIP calls to transit the full range of networks. SCIP-VoSIP gateways are located at the edge of VoSIP enclaves to provide secure voice interoperability between the two solutions. This reduces the gateway requirements to a single gateway family to operate between SCIP and VoSIP although there will be numerous locations where these gateways will be required.
7 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE Figure3. Future secure voice architecture Gateways to national secure voice systems Other gateways may be required to legacy NATO and national secure voice equipment families. The SCIP signalling and gateway specifications are capable of supporting these services as well as those required above. However as legacy systems will phase out in the future, less and less different gateways will be required CONCLUSIONS Secure voice, like many military requirements, is not an area where one size fits all. However by making sensible use of recent and developing technologies it is possible that two sizes fit virtually all. By adopting this approach NATO and Nations are able to benefit from cost-effective solutions to provide their secure voice requirements. This allows NATO to plan for the major steps needed to deliver these capabilities. The NATO secure voice strategy identifies over 40 specific recommendations which should be carried out within the short (0-3 years), medium (3-5 years) and long-term (5-10 years) timeframes. These recommendations are providing specific guidance to strategic commands and organisations within the NATO C3 structure. The recommendations are reflected in a number of technical initiatives and procurement plans.
8 Prague, Czech Republic - September, 29-30, 2009 The general guidance can be summarised in four high level recommendations of the secure voice strategy, which are to: halt procurement of any non-essential secure voice capabilities which are not consistent with the NATO secure voice strategy, to facilitate the deployment of NATO SCIP terminals and appropriate key management system to provide end to end secure voice; to enforce support for SCIP on the black communications infrastructure, to enable VoSIP for local secure voice services, to encourage the development and deployment of gateways from SCIP to VoSIP and national systems as required. ACKNOWLEDGEMENT The authors wish to thank the many colleagues within NATO and the Alliance who have contributed to the NATO secure voice strategy and without whom this paper would not have been possible. BIBLIOGRAPHY [1] NATO C3 Board, NATO Secure Voice Strategy v.1.0, AC/322-D(2009)0020-AS1, May 2009 [2] Blašková, L, Holub, J, Street, M, Szczucki, F and Tomíška O., Objective and subjective degradations of transcoded voice for heterogeneous radio network interoperability, RTO Tactical Communications symposium, Prague, Czech Republic, April [3] Street, M, Secure voice conferencing facility, Technical Note 1067, NATO C3 Agency, Netherlands, July [4] Street, M, Future NATO narrowband voice coder (STANAG 4591): selection process (phase two), Technical Note 913, NATO C3 Agency, Netherlands, July [5] Velasco, L. and Street, M, Performance of SCIP devices on public and classified heterogeneous networks, Military CIS Conference, Krakow, Poland, September [6] SCIP-216 Rev 2.0 Minimum Essential Requirements (MER) for V Gateways, SCIP International Interoperability Control Working Group, November 2007.
ABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationSecure Communications Interoperability Protocols (SCIP)
John S. Collura NATO C3 Agency P.O. Box 174 2501 CD The Hague THE NETHERLANDS John.Collura@nc3a.nato.int ABSTRACT The concept of NATO Network Enabled Capabilities, (NNEC) including network-ready communications
More informationAi-Chun Pang, Office Number: 417. Homework x 3 30% One mid-term exam (5/14) 40% One term project (proposal: 5/7) 30%
IP Telephony Instructor Ai-Chun Pang, acpang@csie.ntu.edu.tw Office Number: 417 Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements Homework x 3 30% One mid-term
More informationNEXIUM THEATRE. Tactical networks for defence and security forces
w w w. t h a l e s g r o u p. c o m NEXIUM THEATRE Tactical networks for defence and security forces DEFENCE SECURITY B ased on its long experience and worldwide leadership in military communications and
More informationCommunications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
More informationZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes
ZyXEL V120 (V120 IP Attendant 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V120 IP Attendant...3 2. Setting up the V120...4 3. Auto Provision...7 4. V120
More informationassuredcommunications Wireless RF-6750W RF-6710W
assuredcommunications Wireless E-mail RF-6750W RF-6710W Cutting-Edge Performance. Unmatched Capability. Harris email software runs on a wide variety of COTS PCs. Data communications Harris takes data communications
More informationNext Generation 112 ecall
Next Generation 112 ecall ecall Final Event - Brussels 15 th May 2018 Harold Linke Luxembourg Agenda Introduction Next Generation ecall Migration Path Satellite and ecall Proof of Concept How ecall works
More informationLecture 1 Overview - Data Communications, Data Networks, and the Internet
DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationITU-APT Workshop on NGN Planning March 2007, Bangkok, Thailand
ITU-APT Workshop on NGN Planning 16 17 March 2007, Bangkok, Thailand 1/2 Riccardo Passerini, ITU-BDT 1 Question 19-1/2: Strategy for migration from existing to next-generation networks (NGN) for developing
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationTASMUS.
TASMUS www.aselsan.com.tr TACTICAL AREA COMMUNICATIONS SYSTEM TASMUS Tactical Area Communications System TASMUS, Tactical Area Communications System, is a network centric communication infrastructure that
More informationSecure information exchange
www.thales.no Secure information exchange 2 together. Safer. everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,
More informationPresents 2006 IMTC Forum ITU-T T Workshop
Presents 2006 IMTC Forum ITU-T T Workshop G.729EV: An 8-32 kbit/s scalable wideband speech and audio coder bitstream interoperable with G.729 Presented by Christophe Beaugeant On behalf of ETRI, France
More informationPublic Switched TelephoneNetwork (PSTN) By Iqtidar Ali
Public Switched TelephoneNetwork (PSTN) By Iqtidar Ali Public Switched Telephone Network (PSTN) The term PSTN describes the various equipment and interconnecting facilities that provide phone service to
More informationTACOMS Post 2000 Interoperability in Communications
Krzysztof Lysek, PhD Military Communication Institute 05-130 Zegrze, Poland k.lysek@wil.waw.pl TACOMS POST 2000 PROJECT In NATO, interoperable communications standardization activities have taken many
More informationAbout Your SIP Service Solution
whitepaper 5 Key Questions to Ask About Your SIP Service Solution By Gaetan Brichet, COO, Voxbone Voxbone US LLC - San Francisco Office 535 Voxbone Mission US St San 535 Mission Francisco, St CA San 94105
More informationETSI TS V2.1.3 ( )
TS 101 329-2 V2.1.3 (2002-01) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; End-to-end Quality of Service in TIPHON systems; Part 2: Definition
More informationTraditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business
Traditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business CONTENTS Summary... 3 What s The Buzz About?... 3 What It Means For Businesses... 3 What It Means For Employees...
More informationTELECOMMUNICATION SYSTEMS
TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 Public Switched Telephone Network Structure The Local Loop Trunks and Multiplexing Switching 2 Network Structure Minimize
More informationSignaling System 7 (SS7) By : Ali Mustafa
Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network
More informationUser Services of TASMUS in the Digital Battlefield
Şenol Uzun, Esra Çiftçibaşi Erkan ASELSAN Inc. Communications Division Ankara TURKEY E-mail: eciftcibasi@aselsan.com ABSTRACT Increasing demands on an extensive amount of digital data and information flows
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationLTE : The Future of Mobile Broadband Technology
LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms
More informationChapter 11: Understanding the H.323 Standard
Página 1 de 7 Chapter 11: Understanding the H.323 Standard This chapter contains information about the H.323 standard and its architecture, and discusses how Microsoft Windows NetMeeting supports H.323
More informationIntroduction. H.323 Basics CHAPTER
CHAPTER 1 Last revised on: October 30, 2009 This chapter provides an overview of the standard and the video infrastructure components used to build an videoconferencing network. It describes the basics
More informationIntroducing Unified Critical Communications
Introducing Unified Critical Communications for Public Safety EXECUTIVE SUMMARY Public safety agencies already use a range of wireless communications networks, including Land Mobile Radio (LMR), public
More informationINSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1. Roch H. Glitho- Ericsson/Concordia University
INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1 1 Outline 1. Essentials of circuit switched telephony 2. Introduction to value added services 3. IN fundamental
More informationTHE BUSINESS CASE FOR SIP
THE BUSINESS CASE FOR SIP TIMES, THEY ARE A CHANGIN Over the past few decades, cultural and technological trends have dramatically transformed the workplace. Today, flexible working is a way of life. Employees
More informationNGN Presentation. Four buzzwords in the air 2/8/2015 2
NGN Presentation Four buzzwords in the air 2/8/2015 2 AGENDA What is current generation network Why Next Generation networks required What is NGN Basic Terms in NGN 2/8/2015 3 Current Scenario Today Separate
More informationSystem Manual Part 2: TetraNode Architecture
System Manual Part 2: TetraNode Architecture System Manual i Copyright 2009, Rohill Technologies B.V. Issue 1.00, June 2009 Information in this manual is subject to change without notice and does not represent
More informationMultiDSLA. Measuring Network Performance. Malden Electronics Ltd
MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission
More informationTCCA White Paper PPDR Roadmap for evolution from LMR/PMR to 4G/5G
Critical communications for all professional users Follow us on @TCCAcritcomms January 2019 TCCA White Paper PPDR Roadmap for evolution from LMR/PMR to 4G/5G Important Note The opinions and information
More informationSYNERGISTIC WARFARE COMMUNICATION SOLUTIONS
SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories
More informationModule 3. Wide Area Networking (WAN)
Module 3 Wide Area Networking (WAN) When many nodes or LAN s are connected together in a large scale, we have a WAN. This may be world wide. Because of the separation of the nodes, the Public Data Network
More informationGUIDELINES FOR VOIP NETWORK PREREQUISITES
GUIDELINES FOR VOIP NETWORK PREREQUISITES WHITE PAPER October 2016 Unified Networks Unified User Clients Unified Messaging Mobility 100+ Call Management Features Executive Summary This document contains
More informationDigital Speech Coding
Digital Speech Processing David Tipper Associate Professor Graduate Program of Telecommunications and Networking University of Pittsburgh Telcom 2700/INFSCI 1072 Slides 7 http://www.sis.pitt.edu/~dtipper/tipper.html
More informationDigital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model
Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model 1. Description of Services. 1.1 SIP IP Trunk with Field Trial for Legacy PBX Verizon will assist
More informationTACLINK. Tactical Communications System. Complete Communications Management System
TACLINK Tactical Communications System Complete Communications Management System TACLINK : Tactical Communications System Integration, Control, Adaptation and Routing Currently, the biggest challenge with
More informationChapter 2 The 3G Mobile Communications
Chapter 2 The 3G Mobile Communications 2.1 The Vision for Third Generation (3G) Mobile Communication Systems: The vision for the emerging mobile and personal communication services for the new century
More informationIMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE
IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE Draft ITU-T Rec. Y.IMT2020-reqts Brice MURARA, ITU-T SG 13 Vice-chairman Agenda Background IMT Systems evolution towards 5G IMT-2020
More information4G Mobile Communications
4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to
More informationNetwork Systems for Emerging WAN Applications
Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking
More informationCh.16 - Wireless WAN System Architectures
Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will
More informationINTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP. (i3 FORUM) Interoperability Test Plan for International Voice services
INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (i3 FORUM) Workstream Technical Aspects Workstream Operations Interoperability Test Plan for International Voice services (Release 3.0) May 2010
More informationRECOMMENDATION ITU-R F * Generic requirements for fixed wireless access systems
Rec. ITU-R F.1490-1 1 RECOMMENDATION ITU-R F.1490-1 * Generic requirements for fixed wireless access systems (Questions ITU-R 125/9 and ITU-R 215/8) (2000-2007) Introduction Today many technologies have
More informationDominique Carrega, Emmanuel Fournier, Hervé Muyal (Tecsi).
Project Number: Project Title: Deliverable Type: (K/N)* AC343 MOVE K CEC Deliverable Number: AC343 / TEC / WP1 / DS / K / 1 / Contractual Date of Delivery to the CEC: July 1998 Actual Date of Delivery
More informationDISN Evolution. TDM Elimination. Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 UNITED IN SERVICE TO OUR NATION
DISN Evolution TDM Elimination Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 The IT Combat Support Agency RESOURCING ACQ/PROC DEV/TEST IMPLEMENTATION OPERATIONAL ENVIRONMENT
More informationDVB Interaction Channel through the Public switched Telecommunications System (PSTN) / Integrated Services Digital Network (ISDN)
DVB Interaction Channel through the Public switched Telecommunications System (PSTN) / Integrated Services Digital Network (ISDN) DVB DOCUMENT A022 February 1997 Reproduction of the document in whole or
More informationE-Seminar. Voice over IP. Internet Technical Solution Seminar
E-Seminar Voice over IP Internet Technical Solution Seminar Voice over IP Internet Technical Solution Seminar 3 Welcome 4 Objectives 5 Telephony in Business 6 VoIP and IP Telephony 7 Traditional Telephony
More informationAntelope Consulting FINAL, JULY Appendix K: Glossary
Antelope Consulting FINAL, JULY 2001 DFID Internet Costs Study Appendix K: Glossary TESSA N GROVES, 16 SEPTEMBER 2001 Admin Lease rate APEC APEC TEL Call Detail Record Circuit-switched, Circuit switching
More informationInternet Telephony. Definition. Overview. Topics. 1. Introduction
Internet Telephony Definition Internet telephony refers to communications services voice, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the public switched
More informationFederated Mission Networking
Federated Mission Networking Learning & Applying the Lessons John Palfreyman, IBM V4; 20 Mar 14 Agenda Future Mission Networking - Context Effective Coalitions through OPEN Integration Save money through
More informationSpeech-Coding Techniques. Chapter 3
Speech-Coding Techniques Chapter 3 Introduction Efficient speech-coding techniques Advantages for VoIP Digital streams of ones and zeros The lower the bandwidth, the lower the quality RTP payload types
More informationTranscoder Free Operation
GPP S.R00-0 Version.0 Version Date: March 00 0 Transcoder Free Operation 0 Stage Requirements COPYRIGHT NOTICE GPP and its Organizational Partners claim copyright in this document and individual Organizational
More informationINFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE
More informationWireless Network Policy and Procedures Version 1.5 Dated November 27, 2002
Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made
More informationChapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology
Chapter 5 Voice Communication Concepts and Technology Voice Network Concepts Telephone switchboard - Circa 1898 Voice Network Concepts Telephone calls are connected from source via circuit switching. Circuit
More informationVOIP Network Pre-Requisites
VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.
More informationPrivate Mobile Office creating mobility and improving contact ability in island environments
Private Mobile Office creating mobility and improving contact ability in island environments Contents Overview Business Requirements Target Customer Benefits of PMO v DECT Reseller Benefits Competitive
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationAFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey
AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationSynopsis of Basic VoIP Concepts
APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter
More informationINTRODUCTION. BridgeWay. Headquarters
MILITARY PRODUCTS INTRODUCTION Voiceboard Corporation s MediaPro products provide enhanced communications capabilities for military applications. State of the art technology, including redundant networking,
More informationNGN interconnection: technology challenges. Dr. Rochdi ZOUAKIA.
ITU/ Arab Regional Workshop on NGN interconnection: technology challenges Dr. Rochdi ZOUAKIA zouakia@anrt.net.ma TODAY We have different networks offering different services. Networks with Different architectures.
More informationMission Critical MPLS in Utilities
Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationThe Migration to Ipv6
GSM Europe The European interest group of the GSM Association http://gsmeurope.gsmworld.com The Migration to Ipv6 GSM Europe Policy Statement for the IPv6 Task Force- GSME, 6 August 2001 1. Background
More informationWireless IP for IoT / M2M 101 The Basics
Wireless IP for IoT / M2M 101 The Basics Aeris White Paper A concise introduction to using wireless devices for Internet of Things (IoT) and machine-to-machine (M2M) data transmissions. www.aeris.com 1
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationWhite paper NEXIUM Critical Services for EUFOR
w w w. t h a l e s g r o u p. c o m THE DOCUMENT IS FOR INTERNAL USE ONLY. ARCHITECT, INTEGRATOR AND OPERATOR OF SERVICE SOLUTIONS FOR DEFENCE AND SECURITY White paper NEXIUM Critical Services for EUFOR
More informationThuraya NettedComms How to integrate different telecommunication technologies to manage disasters effectively
Thuraya NettedComms How to integrate different telecommunication technologies to manage disasters effectively Geneva, October 7th, 2009 Dr Sven Rohte Chief Commercial Officer Page 0 Contents 1 2 3 Managing
More informationVoIP Core Technologies. Aarti Iyengar Apricot 2004
VoIP Core Technologies Aarti Iyengar Apricot 2004 Copyright 2004 Table Of Contents What is Internet Telephony or Voice over IP? VoIP Network Paradigms Key VoIP Protocols Call Control and Signaling protocols
More informationApproaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches
Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Dr. Elmabruk M Laias * Department of Computer, Omar Al-mukhtar
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004
ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004 ABSTRACT Wireless technology has gained popularity in enterprises
More informationDigital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model
Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model 1. Description of Services. 1.1 SIP Centralized IP Trunk with Field Trial Verizon will assist
More informationVoice over Internet Protocol
Voice over Internet Protocol Voice over Internet Protocol Contents Introduction Benefits of Integrating Voice and Data Networks Converting Voice to Data Efficient and Reliable Network Infrastructures
More informationMicrosoft Enterprise Voice and Online Services with Microsoft Lync Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20337 - Enterprise Voice and Online Services with Microsoft Lync Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This five-day instructor-led
More informationSecure Military Messaging in a Network Enabled Environment
Secure Military Messaging in a Network Enabled Environment BGen.Murat ÜÇÜNCÜ Chief of IS Dept. Turkish General Staff 02.06.2010 1 IT HAS ALWAYS BEEN DIFFICULT TO BE THE LAST SPEAKER IN AN EVENT LIKE THIS.
More informationSetting up a National Transmission Plan & QoS for International Connections. Senior Engineer, TIS ETSI STQ Vice Chair Joachim POMY
Setting up a National Transmission Plan & QoS for International Connections Senior Engineer, TIS ETSI STQ Vice Chair Joachim POMY Outline Setting up a National Transmission Plan QoS for International Connections
More informationManaging Costs in Growing Networks with SEGway STPs and Point Code Emulation
Managing Costs in Growing Networks with SEGway STPs and Point Code Emulation Deb Brunner-Walker, Performance Technologies Technology White Paper www.pt.com Introduction Voice networks are evolving from
More informationThis is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett.
This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. For more information or to buy the paperback or ebook editions, visit
More informationOptical networking technology
1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the
More informationPersonal Handyphone Systems in Urban Infrastructure
Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service
More informationCOPYRIGHTED MATERIAL. Introduction. 1.1 Introduction
1 Introduction 1.1 Introduction One of the most fascinating characteristics of humans is their capability to communicate ideas by means of speech. This capability is undoubtedly one of the facts that has
More information2014 NASCIO Recognition Award Nomination
2014 NASCIO Recognition Award Nomination TITLE: Network Communication Partnerships for Public Safety and Economic Opportunity CATEGORY: Cross Boundary Collaboration and Partnerships CONTACT: Shannon Barnes
More informationMobile TeleSystems (MTS) Converges Fixed and Mobile Telephony
Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE
More informationNetwork Devices Introduction into Network Devices
Network Devices Introduction into Network Devices Aims Gain a knowledge about network devices. Discuss what network devices are required to create a basic network Draw a bespoke network drawing using Visio
More informationData and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet
Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,
More informationYour Secrets are Safe with Tiger
Your Secrets are Safe with Tiger The more important the message, the greater the outside interest In today s fast moving and everchanging world, secure communications are key to the accomplishment of a
More informationChapter 10: Wireless Networking. School of information science and Engineering, SDU
Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate
More informationSECTION CORRECTION EFFECTIVE DATE
Errata Sheet Changes to UCR 2008, Change 2 made by UCR 2008, Change 3 for Section 5.1, Requirements Categories and Language and 5.2, Customer Premise Equipment and Legacy Interfaces SECTION CORRECTION
More informationIntroduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationInmarsat Airborne ISR Solutions
Solutions Inmarsat Airborne ISR Solutions Global Government Airborne ISR Solutions Mission First: Connectivity Always Intelligence, Surveillance and Reconnaissance (ISR) systems are integral to the ultimate
More informationFacilitator. Introduction to IT Networking for Facilities Managers. Class Logistics
Introduction to IT Networking for Facilities Managers APPA Institute for Facilities Management Dallas, TX January 16, 2017 Facilitator J. Craig Klimczak, D.V.M., M.S. Chief Information Officer Community
More informationSatellite-Based Cellular Backhaul in the Era of LTE
Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only
More information