BASICS OF IP TELEPHONY. Guidelines for calculation-graphic works 5В specialty Radio engineering, electronics and telecommunications
|
|
- Maude Bond
- 5 years ago
- Views:
Transcription
1 Non-profit joint-stock company АУЭС ALMATY UNIVERSITY OF POWER ENGINEERING AND TELECOMMUNICATIONS The chair of infocommunicational technology BASICS OF IP TELEPHONY Guidelines for calculation-graphic works 5В specialty Radio engineering, electronics and telecommunications Almaty Summary plan 2015, pos. 126
2 Katipa Chezhimbayeva Sharafat Mirzakulova Vyacheslav Bublik BASICS OF IP - TELEPHONY Guidelines for calculation-graphic works 5В specialty Radio engineering, electronics and telecommunications Editor Kozlov V. S. Specialist for standardization Moldabekova N.K. Approved for publishing.. Format 60х84 1/16 Release 20 items Paper typographic 1 Value 1,3125 ed.-pub.p. Order Price 656 tenge Copy office of non-profit joint-stock company "Almaty university of power engineering and telecommunications" , Almaty, Baitursynov str., 126 5
3 1 Calculation-graphic work Compression by the method of reiterations lengths encoding Task 1.1: - using initial images from Appendix A, it is necessary to compress binarycoded (two-color) representation measuring 8 elements in a line and 8 elements in a column. Thus an empty cell designates white color, and cell with "X" sign designates a black; - input data set number of task equals student's number in teacher's students list. Scan a two-color image on lines (to two colors dark-and-light will correspond 0 and 1). As a result will get the binary vector of data Task 1.2: Describe the scenario (complete, registration, cancellation of registration, etc.) of communication between devices on IP-telephony network. Input data sets of tasks are described in Appendix B Guidelines for the task 1.1. The encoding of messages may be performed to reduce the amount of information and improve its transmission speed or reduce the bandwidth required for transmission. Such coding is called economical, or cost effective coding and data compression. The goal of data compression is to provide a compact representation of the data produced by the source, for their more efficient storage and transmission. Data compression system consists of a source encoder and decoder. The encoder converts the source data to compressed data, and a decoder for restoring the source data from the compressed data. The recovered data generated by the decoder can either be exactly the same as the original data source, or slightly different. We consider the compression method in which same sign sequences coded as its length in this paper. This method is quite effective in compression of binary data, such as black and white facsimile images, black and white images comprising a plurality of straight lines and uniform portions, circuits, etc. Length encoding is part of the well-known image compression algorithm JPEG (Joint Photographic Experts Group). The idea of data compression based on length coding repetitions is that instead of coding the actual data were coded numbers corresponding to long sections on which data is stored in fixed length value. Suppose we want to encode a binary (two-color) image size of 8 elements in the row and 8 elements in the column as shown in figure 1.1. After scanning the image along the lines get binary data vector X [1]. Х=( ) length of 64 bits (the speed of the source code is 1 bit per pixel). Isolate vector X areas on which data is stored have equal values, and define their length. The resulting sequence of lengths of positive integers corresponding to the original data vector X has the form r = (1, 9, 6, 6, 1, 9, 9, 1, 6, 1, 6, 9). Definite repeatability is noticeable in this sequence that can be coded in any static code (Table 1.1). 6
4 Figure 1.1 A two-color image Table 1.1 Codewords The length of sequence Codeword In order to indicate that the encoded sequence starts with zero, character "0" should be added at the beginning of the codewords sequence. The result is a codewords sequence of length of 25 bits, that is, the resultant code rate R will be 25/64, or a little more than 0.39 bits per pixel. When compressing images larger and containing many repetitive elements the compression efficiency can be substantial. B(r)=( ) Guidelines for the task 1.2. IP-telephony - telephony over IP. IP-telephony means a set of communication protocols, technologies and methods, providing traditional telephony dialing, dialing, and two-way voice communication, as well as video calling over the Internet or any other IP-based networks. The signal is transmitted over a communication channel in digital form and is usually converted before transmission (compressed) in order to remove the excess information and reduce the load on the data network. Consider steps of the scenario of establishing a connection between two H.323 terminals (figure 1.2): - end point A (the caller) is connected to a terminal point B (the called party) and sends a initial request (Setup), which includes a call type (eg, audio signals only), numbers of called and calling parties; - endpoint B responds notification message (Alerting). Endpoint A shall take this message before elapsed time allotted for the Setup message; - when a user at the terminal station B answers the call (off-hook), the message Connect (Connect) is transferred to the end point A; 7
5 Figure Scenario of establishing a connection between terminals H both terminals transmit information about their capabilities (media type, codec selection and information about multiplexing) reported Terminal Capability Set (checking of terminal capabilities); - each terminal responds Terminal Capability Set Ack (confirmation of terminal capabilities). If the remote endpoint does not have some features, a message will be sent TerminalCapabilitySetReject (deviation setting terminal capabilities), and terminals will continue to send these messages until they determine that the features are supported by both endpoints; - each terminal transmits H.245 OpenLogicalChannel (open logical channel), allowing you to open a logical channel to the remote endpoint for voice transmition; - in the case of readiness for acceptance each terminal transmits data OpenLogicalChannelAck (confirmation of the opening of the logical channel) to the 8
6 remote endpoint, specifying the port number on which the remote endpoint must transmit RTP data; - edpoints exchange information in RTP packets. During this exchange RTCP packets are transmitted for the quality control data; - when the endpoint A hangs up (hangs up), it shall send a message H.245 CloseLogicalChannel (close logical channel) for each channel open at a terminal point B; - endpoint B responds CloseLogicalChannelAck (confirmation of the closing of a logical channel); - endpoint A sends H.245 EndSessionCommand (logout), and closes the channel after receiving a similar message from the terminal point B; - send a message to both terminals H ReleaseComplete (complete exemption) for call signaling channel, which closes the channel and terminates the connection. 9
7 2 Calculation-graphic work Choice of the shortest way in a network using the Dijkstra s algorithm Task 2.1: - using basic data of topology of IP network (figure 2.1), it is necessary to choose the shortest way between nodes 1 and 5 using the Dijkstra s algorithm; - input data option number for task equals student's number in teacher's students list. Options are presented in Appendix C. Figure 2.1 Initial topology of network Task 2.2: - describe the operation of the network protocols; - input data option number for task equals student's number in teacher's students list. Options are presented in Appendix D Guidelines for the task 2.1. An Dijkstra s algorithm is the algorithm on columns, invented by the scientist Dijkstra in Netherlands in The algorithm finds the shortest distance from one of graph nodes to all other. An algorithm is widely used in programming and technologies. For example, it is used by routing protocols OSPF (Open Shortest Path First) and IS - IS (Intermediate System to Intermediate System). In this algorithm we will assign value to every node of graph, where a router is set - well-known minimum distance from one node to other. An algorithm works incrementally - on every step it visits one node and tries to decrease assigned values. Work of algorithm is completed, when all nodes are visited. We will consider an example implementation of algorithm on the example of telecommunications network topology, presented on a figure 2.2, consisting of four routers. There are channels between routers. Distance between routers shown near lines. 10
8 Figure Example of telecommunications network topology The mark of initial node of "1" relies equal to the zero, marks of other nodes are infinity. What this means is that distances from "1" to other nodes are unknown (figure 2.3). Figure 2.3 Zero stage A zero stage is fixed on only purpose to specify an eventual site with a node "1", the mark of that is equal to zero. A node with a minimum mark is "1". Its neighbours are nodes "2" and "3" (figure 2.4). Figure First step First in turn neighbour of node "1" is node "2" because a distance to it is minimum (5). Thus a pathlength is equal to the sum of the shortest distance to the 11
9 node 1 and value assigned to node "1": 0+5=5. This value is less than currently assigned value of node 2 - infinity, therefore the new value of node "2" is equal to 5 (figure 2.5). Figure New value of the node "2" We will continue same operations with a node 3 (figure 2.6) Figure New value of the node "3" All neighbours of node "1" tested. We will blot it out from the graph to mark that this node is visited (figure 2.7). Figure 2.7 Node "1" removed 12
10 Again we find the nearest from the unvisited nodes. It is a node "2" with the current shortest path - 5 (figure 2.8). Figure Visit of node "2" Again we try to decrease the marks of neighbours of the chosen node, trying to get in them through the node "2". Neighbours of node "2" are nodes "3" and "4". First in turn neighbour of node "2" is a node "1", but she is already visited, therefore with the node "1" nothing to do. A next neighbour is a node "3", because it has a minimum assigned value from the nodes (8) marked however visited. If to go to node "3" through a node "2", then length of such way will be equal to 16 (5+11). But currently assigned value of node "3" equals to 8 which is less than 16, currently assigned value does not change therefore. Figure Visit of node "2" (a mark of node "3" does not change) Another neighbour of node "2" is a node "4". Way to node "4" through a node "2" equals to 14. Because 14 is less than infinity (currently assigned to node "4"), we set the mark of node 4 equal to 14 (figure 2.10). All neighbours of node "2" tested. We will blot it out from the graph to mark that this node is visited (figure 2.11). We repeat choosing a node "3" (figure 2.12). As a result it will be canceled. We repeat for remaining node "4" (figure 2.13). Completion of implementation of algorithm takes place then, when all nodes are removed. As a result got shortest path from a node "1" to "2" equals to 5, to "3" - 8 and to "4"
11 Figure 2.10 New mark of node "4" Figure Node "2" removed Figure 2.12 Node "3" removed Figure Node "4" removed 14
12 List of abbreviations PC - Personal computer ARP - Address Resolution Protocol DHCP - Dynamic Host Configuration Protocol DNS - Domain Name System FTP - File Transfer Protocol HTTP HyperText Transfer Protocol ICMP - Internet Control Message Protocol IGMP - Internet Group Management Protocol IRC - Internet Relay Chat IS-IS - Intermediate System to Intermediate System ISDN - Integrated Services Digital Network ISUP - ISDN User Part IP - Internet Protocol MGCP - Media Gateway Control Protocol MPLS multiprotocol label switching SSH Secure Shell RMON Remote Network MONitoring RTCP - RTP Control Protocol RTP - Real-Time Transport Protocol RIP - Routing Information Protocol RTSP Real Time Streaming Protocol RSVP Resource ReSerVation Protocol OSPF - Open Shortest Path First SCTP Stream Control Transmission Protocol SIP - Session Initiation Protocol SNMP Simple Network Management Protocol SMTP Simple Mail Transfer Protocol TCP - Transmission Control Protocol UDP - User Datagram Protocol VoIP Voice over IP 15
13 Appendix А Input data for task 1.1 Data set 1 Data set 2 Data set 3 X X X X X X X X X X X X X X X X X X X X X X Data set 4 Data set 5 Data set 6 X X X X X X X X X X X X X X X X X X X X X X Data set 7 Data set 8 Data set 9 X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X Data set 10 Data set 11 Data set 12 X X X X X X X X X X X X X X X X X X X X X X X X 16
14 Continuation of appendix A Data set 13 Data set 14 Data set 15 X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X Data set 16 Data set 17 Data set 18 X X X X X X X X X X X X X X X X X X X X X X Data set 19 Data set 20 Data set 21 X X X X Data set 22 Data set 23 Data set 24 X X X X 17
15 Continuation of appendix A Data set 25 Data set 26 Data set 27 X X X X X X X X X X X X X X X X X X X X Data set 28 Data set 29 Data set 30 X X 18
16 Appendix B Input data for task 1.2 Data set Procedures Automatic detection of Process of registration, Connection of terminals the gatekeeper (Н.323) registration cancellation without gatekeeper (Н.323) (Н.323) Data set Procedures Via the readdressing server (SIP) Via the proxy server (SIP) Between terminals H.323 Data set Procedures Management of access to network resources (Н.323) Determination of location of the equipment in a network (Н.323) Data set Procedures Release of a pass-band Detection and registration of the device Data set Procedures Poll of current state of the equipment Release of a pass-band Data set Procedures Establishment of connection on to protocols. Н.245 Termination of a communication session (Н.323) Data set Procedures Н.323 Connection of SIP from FEET Poll of current state of the equipment (Н.323) Establishment of an intrazone call Teams of management protocol. Н.245 Connection of SIP from FEET Н.323 separation of a session The elementary call by the SIP protocol Data set Procedures СТОП-IP-СТОП СТОП-VoIP VoIP- СТОП Data set Procedures Between the SIP hubs Between SIP nodes (ISAP) The redirection of inquiries in SIP Data set Procedures Establishment of connection (Н.323) Interactions of locks with agents (MGCP) Establishment of an interzone call (Н.323) 19
17 Appendix C Input data for task 2.1 Data set a b Distance between routers, km c d e f
18 Appendix D Input data for task 2.2 Data set Protocol IP IGMP RIP RSVP UDP Data set Protocol TCP DNS DHCP HTTP OSPF Data set Protocol ARP ICMP TELNET SNMP RMON Data set Protocol RTCP RTP SIP H323 MGCP Data set Protocol MPLS SCTP FTP HDLC SNMP Data set Protocol SSH RSVP SMTP IRC RTSP 21
19 References 1 Digital packet switching networks. -A Bektybaev T. Multilayer connection networks. -A., Goldstein AB IP - telephony. -M Goldstein, B.S., Pinchuk A., Sukhovitskaya A.L. IP-telephony. - Moscow: Radio svyaz Roslyakov A.V. IP - telephony. -M., Ivanov T.I. User terminals and computer telephony. -Moscow.: ECO- TRENDZ, with. 7 Goldstein A.B. CALL- centers and computer telephony. -SPb., Bektіbaev T.K. SA Abstract lecture. -A., Davidson D. Basics of voice data over IP. - M., p. 10 Electronic power Electronic power
20 AUTHORS: Chezhimbayeva K., Mirzakulova S., Bublik V. Basics of IP - telephony. Guidelines for calculation-graphic works for students of specialty 5В Radio engineering, electronics and telecommunications. - Almaty: AUPET, p. Calculation-graphic works on subject "Basics of IP - telephony" are presented. Tasks on compression by the method of reiterations lengths encoding and choice of the shortest way in a network using the Dijkstra s algorithm are included. Figures - 14, tables - 1, references- 7 sources. Reviewer: head of FL chair Kozlov V. Published according to the plan of non-profit joint-stock company "Almaty university of power engineering and telecommunications" for 2015 year NPJSC "Almaty university of power engineering and telecommunications", 2016 y. 23
Overview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationBLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS
BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture
More informationCisco ATA 191 Analog Telephone Adapter Overview
Cisco ATA 191 Analog Telephone Adapter Overview Your Analog Telephone Adapter, page 1 Your Analog Telephone Adapter The ATA 191 analog telephone adapter is a telephony-device-to-ethernet adapter that allows
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationPROTOCOLS FOR THE CONVERGED NETWORK
Volume 2 PROTOCOLS FOR THE CONVERGED NETWORK Mark A. Miller, P.E. President DigiNet Corporation A technical briefing from: March 2002 Table of Contents Executive Summary i 1. Converging Legacy Networks
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationH.323. Definition. Overview. Topics
H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationSeminar report IP Telephony
A Seminar report On IP Telephony Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY:
More informationH.323 Tutorial Realsoft Corporation January 12, 2000
H.323 Tutorial 2000 Realsoft Corporation http://www.realsoft-corp.com/ January 12, 2000 Abstract: This document summarizes the H.323 (H.225, H.245) Recommendation into an understandable tutorial. Much
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationRab Nawaz Jadoon. Characterizing Network Traffic DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan
Characterizing Network Traffic DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Characterizing
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationDepartment of Computer Science. Burapha University 6 SIP (I)
Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important
More informationGLOSSARY. Advanced Encryption Standard. Cisco Adaptive Security Appliance. Business-to-business. Binary Floor Control Protocol.
GLOSSARY Revised: March 30, 2012, A AES ASA Advanced Encryption Standard Cisco Adaptive Security Appliance B B2B BFCP bps Business-to-business Binary Floor Control Protocol Bits per second C CA CAPF CBWFQ
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationStream Control Transmission Protocol - Wikipedia, the free encyclopedia
Page 1 of 9 Stream Control Transmission Protocol From Wikipedia, the free encyclopedia In the field of The five-layer TCP/IP model 5. Application layer DHCP DNS FTP Gopher HTTP IMAP4 IRC NNTP XMPP MIME
More informationExam Questions
Exam Questions 920-180 ncts real time networking https://www.2passeasy.com/dumps/920-180/ 1. Which three components are H.323 endpoints? (Choose three.) A. Gatekeeper B. Terminal C. Gateway D. Multipoint
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationDMP 128 Plus C V DMP 128 Plus C V AT
DMP 128 Plus C V DMP 128 Plus C V AT Interactive Intelligence Configuration Guide REVISION: 1.0.1 DATE: MARCH 7 TH 2018 Revision Log Date Version Notes Feb 9 th 2018 1.0 First Release: Applies to Firmware
More informationOFTP2 kurs Odette File r Transfer ansfer Pr otocol
OFTP2 kurs Odette File Transfer Protocol 2 Version 0.8 Main data flows in between Trading Partners in various Business structures Bilateral Value chain Value network Flow of files in B2B EDI, sketch EDI
More informationSession 1. Introduction to Communication Networks
Session 1. Introduction to Communication Networks Networks 1 Network Services The Traditional Networks Postal mail Water supply networks Electricity power networks Transportation networks Cable and television
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationModern Internet architecture, technology & philosophy Advanced Internet Services Dept. of Computer Science Columbia University
1 Modern Internet architecture, technology & philosophy Advanced Internet Services Dept. of Computer Science Columbia University Henning Schulzrinne Spring 2015 02/09/2015 2 Key concepts The concept of
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationNetwork+ Guide to Networks 6th Edition. Chapter 12 Voice and Video Over IP
Network+ Guide to Networks 6th Edition Chapter 12 Voice and Video Over IP Objectives Use terminology specific to converged networks Explain VoIP (Voice over IP) services, PBXs, and their user interfaces
More informationThe Session Initiation Protocol
The Session Initiation Protocol N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 25 Roadmap for Multimedia Networking 2 1. Introduction why QoS? what are the problems?
More informationCisco Analog Telephone Adaptor Overview
CHAPTER 1 This section describes the hardware and software features of the Cisco Analog Telephone Adaptor (Cisco ATA) and includes a brief overview of the Skinny Client Control Protocol (SCCP). The Cisco
More informationGOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN
Appendix - C GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering Academic Year: 2016-17 Semester: EVEN COURSE PLAN Semester: VI Subject Code& Name: 10CS64 & Computer
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationGuide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services
Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply
More informationTODAY AGENDA. VOIP Mobile IP
VOIP & MOBILE IP PREVIOUS LECTURE Why Networks? And types of Networks Network Topologies Protocols, Elements and Applications of Protocols TCP/IP and OSI Model Packet and Circuit Switching 2 TODAY AGENDA
More informationOverview p. 1 Broadband and ATM p. 2 The Evolution Toward Broadband p. 3 Access Networks, Core Networks, and Service Providers p.
Contents p. v Preface p. xxiii Conventions p. xxiv Acknowledgments p. xxiv Overview p. 1 Broadband and ATM p. 2 The Evolution Toward Broadband p. 3 Access Networks, Core Networks, and Service Providers
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationBasic Architecture of H.323 C. Schlatter,
Basic Architecture of H.323 C. Schlatter, schlatter@switch.ch 2003 SWITCH Agenda Background to H.323 Components of H.323 H.323 Protocols Overview H.323 Call Establishment 2003 SWITCH 2 Background to H.323
More informationUMG 50. Typical Applications. Main Characteristics. Overview E1 AND VOIP USER MEDIA GATEWAY
E1 AND VOIP USER MEDIA GATEWAY Main Characteristics Typical Applications Modular E1: 10 E1 channels - Expansion for every 5 channels acquired through additional license. Maximum of 30 channels (1 E1 link)
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationFaculty of Science and IT Course title. Pre-requisite/corequisite
Faculty Course number Faculty of Science and IT 022242 Department Course title Computer Science Network Protocols Number of credit hours 3 Pre-requisite/corequisite Computer network Brief course description.
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationMidterm Review. EECS 489 Computer Networks Z. Morley Mao Monday Feb 19, 2007
Midterm Review EECS 489 Computer Networks http://www.eecs.umich.edu/courses/eecs489/w07 Z. Morley Mao Monday Feb 19, 2007 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Adminstrivia
More informationTroubleshooting Voice Over IP with WireShark
Hands-On Troubleshooting Voice Over IP with WireShark Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services
More informationMultimedia Applications. Classification of Applications. Transport and Network Layer
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationVolume SUPPORTING THE CONVERGED NETWORK. Mark A. Miller, P.E. President DigiNet Corporation. A technical briefing from: July 2002
Volume 6 SUPPORTING THE CONVERGED NETWORK Mark A. Miller, P.E. President DigiNet Corporation A technical briefing from: July 2002 Table of Contents Executive Summary i 1. The Challenge of Supporting Converged
More informationMulti-Service Access and Next Generation Voice Service
Hands-On Multi-Service Access and Next Generation Voice Service Course Description The next generation of telecommunications networks is being deployed using VoIP technology and soft switching replacing
More informationOperating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski
Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,
More informationDHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL
DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL 2017-04-01 Topics In This Course Background Introduction of Internet TCP/IP and OSI/RM Socket programmingtypical Internet Applications DHCP (Dynamic
More informationPRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS
PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS Objectives At the end of this workshop participants will: Be able to configure, maintain and manage routers have a clear practical understanding
More informationChapter 2. Communicating Over The Network
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
More informationAPOSd TM Audio/Video DSP Codec Solution APOSd : AddPac Operating System for DSP
APOSd TM DSP Codec Solution APOSd : AddPac Operating System for DSP www.addpac.com AddPac Technology 2007, Sales and Marketing Contents APOSd Solution APOSd Overview APOSd Software Service Video Codec
More informationData Communications and Networks Spring Syllabus and Reading Assignments
Data Communications and Networks Spring 2018 Syllabus and Assignments Revision Date: January 24, 2018 Course : This course teaches the design and implementation techniques essential for engineering robust
More informationTECHNICAL WHITE PAPER. Avaya SIP Enablement Services (SIP) 3.0 / Ports and Protocols
TECHNICAL WHITE PAPER Services (SIP) 3.0 / Version: 0.6 Date: Aug. 12, 2005 Author: Avaya GCS Abstract: This technical white paper covers the network ports and protocols used by the Avaya Converged Communications
More informationReti di Calcolatori I
Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria
More informationAP500 4-Port FXS VoIP Gateway
AP500 4-Port FXS VoIP Gateway High Performance VoIP Gateway Solution Product Overview www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification APOS Technology
More informationOSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationVoice over IP (VoIP)
Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationOmniPeek Report: 21/01/ :17:00. Start: 21/01/ :16:06, Duration: 00:00:33. Total Bytes: , Total Packets: 5274
OmniPeek Report: 21/01/2015 14:17:00 Start: 21/01/2015 14:16:06, Duration: 00:00:33 Total Bytes: 1307284, Total Packets: 5274 Summary Statistics: Reported 21/01/2015 14:17:00 Name Bytes Packets Pct of
More information521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing
521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service
More informationVoIP / RoIP for Technicians
Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going
More informationPilsung Taegyun A Fathur Afif A Hari A Gary A Dhika April Mulya Yusuf Anin A Rizka B Dion Siska Mirel Hani Airita Voice over Internet Protocol Course Number : TTH2A3 CLO : 2 Week : 7 ext Circuit Switch
More informationComputer Networks (Unit wise Questions)
Unit I Unit II 1. What are different transmission modes?[4] 2. Encode the following binary data stream into Manchester and differential Manchester codes 1 1 0 0 1 0 1 0 [8] 3. What are different topologies
More informationDMP 128 Plus C V DMP 128 Plus C V AT. Avaya IP Office Configuration Guide REVISION: 1.2 DATE: JANUARY 9 TH 2018
DMP 128 Plus C V DMP 128 Plus C V AT Avaya IP Office Configuration Guide REVISION: 1.2 DATE: JANUARY 9 TH 2018 Revision Log Date Version Notes August 6 th 2017 1.0 First Release: Applies to Firmware 1.01.0004.002
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationFundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1
Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationSS7 VoIP Gateway Solution
SS7 VoIP Gateway Solution AddPac Technology 2013, Sales and Marketing www.addpac.com Contents SS7 VoIP Gateway Service Diagram SS7 VoIP Gateway Comparison Table Digital VoIP Gateways(1~1616 E1/T1) VoIP
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationComputer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University
Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges
More informationAPOSd TM Audio/Video DSP Codec Solution APOSd : AddPac Operating System for DSP
APOSd TM DSP Codec Solution APOSd : AddPac Operating System for DSP www.addpac.com AddPac Technology 2005, Sales and Marketing Contents APOSd Solution APOSd Overview APOSd Software Service Video Codec
More informationReview of Important Networking Concepts TCP/IP
Review of Important Networking Concepts / / Protocol Suite Assignment of Protocols to Layers Addressing / Layers in the Example Encapsulation and Demultiplexing Different Layers Views of Networking / Protocol
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 29 Multimedia Department of Information Technology Eastern Mediterranean University 2/75 Objectives After completing this chapter you should be able to do the following:
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationAP-SAV100 Analog Voice Intercom
AP-SAV100 Analog Voice Intercom IP Gateway High Performance IP Extension Solution for Legacy Analog Door Phone www.addpac.com AddPac Technology Sales and Marketing Contents Product Overview Hardware Specification
More informationDMP 128 Plus C V DMP 128 Plus C V AT. Avaya Aura Configuration Guide REVISION: 1.1 DATE: SEPTEMBER 1 ST 2017
DMP 128 Plus C V DMP 128 Plus C V AT Avaya Aura Configuration Guide REVISION: 1.1 DATE: SEPTEMBER 1 ST 2017 Revision Log Date Version Notes August 6 th 2017 1.0 First Release. Applies to Firmware 1.01.0004.002
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationCMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Fall'10 1 Announcements Forum #2 due on 11.05. CMPE 80N Fall'10 2 Last
More informationApplication Notes for Configuring SIP Trunking between Bandwidth.com SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Bandwidth.com SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These
More informationDMP 128 Plus C V DMP 128 Plus C V AT. Cisco CUCM Configuration Guide REVISION: 1.1 DATE: SEPTEMBER 1 ST 2017
DMP 128 Plus C V DMP 128 Plus C V AT Cisco CUCM Configuration Guide REVISION: 1.1 DATE: SEPTEMBER 1 ST 2017 Revision Log Date Version Notes August 4 th 2017 1.0 First Release: Applies to Firmware Version
More informationSecurity and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California
Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in
More informationImplementing Cisco Unified Communications Manager Part 2, Volume 1
Implementing Cisco Unified Communications Manager Part 2, Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationCompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]
s@lm@n CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 3: Troubleshooting 140
More informationMEA: Telephony systems MEB: Voice over IP MED: VoIP systems MEC: C7 signalling systems MEE: Video principles MEF: Video over IP
learntelecoms interactive e-learning suite of courses from PTT: MediaNet v3 Voice and video service delivery MediaNet is a suite of interactive, online e-learning courses that provides training in the
More informationJust enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL
Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationLocation Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos
Location Based Advanced Phone Dialer A mobile client solution to perform voice calls over internet protocol Jorge Duda de Matos Superior Institute of Technology (IST) Lisbon, Portugal Abstract Mobile communication
More informationKommunikationssysteme [KS]
Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationCisco Cisco Voice over IP (CVOICE) Practice Test. Version QQ:
Cisco 642-436 642-436 Cisco Voice over IP (CVOICE) Practice Test Version 3.8 QUESTION NO: 1 Cisco 642-436: Practice Exam Which two statements describe the purpose of the technology prefix? (Choose two.)
More informationUniversity of Southern California EE450: Introduction to Computer Networks
University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal
More information