An Effective Calibration of VOIP Internet Telephony Performance using VPN between PAC and PNS

Size: px
Start display at page:

Download "An Effective Calibration of VOIP Internet Telephony Performance using VPN between PAC and PNS"

Transcription

1 An Effective Calibration of VOIP Internet Telephony Performance using VPN between PAC and PNS Hyung Moo Kim, and Jae Soo Yoo, Member, IEEE Abstract In this paper, we have created VoIP terminals that use Virtual Private Network (VPN) to eliminate security risks due to the complexity of protocols involved and network equipments used. Point-to-Point Tunneling Protocol (PPTP) is used on the session initiation protocol (SIP) stack, which is enabled by Internet telephony terminal to test its performance and feasibility. To measure the performance of call quality, we have built the experiment environment and observed that the delay caused by encapsulation between internet and VoIP telephones is under 8ms at most. The major delay is assumed the time required to capsulate the packet for tunneling of VPN. Because the difference of average delay time is under 4ms~5ms, the difference of call quality between VoIP and VoIP telephone adopting VPN is negligible. We have concluded that the capsulation process between PPTP access concentrator (PAC) and PPTP network server (PNS) is the major factor influencing the network load by changing the number of fames in a packet during communication. Also, we have concluded that the most suitable frame numbers is two or three by adding the frame numbers in a packet to obtain the suitable frames in a packet and setting up end to end delay to be 160ms~170ms. We have suggested, developed, and evaluated an internet telephony system that implements secure user authentication and data transmission. Through measuring the delay time between a conventional VoIP telephone and the proposed system, the quality of call made through the proposed system and its feasibility are discussed. Index Terms PPTP access concentrator(pac), PPTP network server concentrator(pns), Point-to-Point Tunneling Protocol(PPTP), Voice over Internet Telephony(VoIP), Virtual Private Network(VPN) T I. INTRODUCTION he use of Internet telephone has advantages over the conventional telephone. These include cheaper calls Manuscript received May 15, This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD) (The Regional Research Universities Program / Chungbuk BIT Research-Oriented University Consortium). An Effective Calibration of VOIP Internet Telephony Performance using VPN between PAC and PNS. Hyung Moo Kim is with the School of Electrical Electronics & Computer Engineering Chungbuk National University, Gaesindong, Heungdukgu, Cheongju, Chungbuk, , Korea (corresponding author to provide phone: ; fax: ; hyungmookim@chonbuk.ac.kr). Jae Soo Yoo is with the School of Electrical Electronics & Computer Engineering Chungbuk National University, Gaesindong, Heungdukgu, Cheongju, Chungbuk, , Korea ( yjs@chungbuk.ac.kr). and the possibility to provide not only voice services but other internet services as well. However Internet telephony uses shared network, and therefore is venerable to security issues. Internet services such as VoIP and P2P over fast fiber optic links will become common communicational channels in near future [1]. However, due to the nature of the Internet, that it uses shared networks, it is often hard to ensure the security. Measures to increase the security are increasing but in most cases, their practical implementations are often difficult. It is especially difficult to secure the VoIP system due to the complexity of protocols involved and network equipments used [2][3]. To overcome these security problems, many different solutions are in the stage of being standardized. Unfortunately, it will take some time and hence in this paper, we have developed an Internet telephony system that implements secure user authentication and data transmission. Also in this paper, the performance of the proposed system is measured. Ⅱ. Making a Call, Secure Internet Telephony The Secure Internet telephony system developed in this paper uses SIP protocol, and to prevent any eavesdrop, PPTP (Point-to-Point Tunneling Protocol) is used to implement PAC (PPTP Access Concentrator). Through measuring the delay time between a conventional VoIP telephone and the proposed system, the quality of call made through the proposed system and its feasibility are discussed. PAC controls the PPTP Client side and creates a control connect to PNS(PPTP Network Server). The control connection is created before PPTP Tunneling, and is to control the PPTP connection. To create the control connection, PAC sends a request to PNS, and after receiving a reply from PNS, it will request configuration for the call. After receiving configuration from PNS, to configure the connection link between PAC and PNS, they finished configuring the control connection through the use of Set-Link-Info message. After configuration of the control link, PPP ( Point-to- Point Protocol ) is used to configure the link and to negotiate which protocols will be used between PAC and PNS. Firstly use LCP(Link Control Protocol) to configure the PPP Link, and negotiate whether to use authentication protocol or not, and which authentication

2 protocol will be used. Also the use of the compression algorithm is negotiated. These options negotiated here in the LCP process will determine the protocols that will be used in the next process. In this paper, the authentication protocol and CHAP(Challenge Handshake Authentication Protocol) are used, so PNS sends a CHAP Challenge message to PAC to request authentication. PAC responds after analyzing data from PNS and its user-id and password with a CHAP response. If received data is OK, PNS sends a CHAP success message to successfully finish the authentication process. In LCP process, it was negotiated that a compression algorithm will be used, so it the next stage, the type the compression protocol is negotiated along with the protocol for the Network Layer. In this paper, MPPC (Microsoft Point-To-Point Compression) is used for PPP packet compression, is used for the compression protocol, Stateless Mode is selected, and 128bit encryption is used. When Stateless Mode is selected, MPPE (Microsoft Point-To-Point Encryption) packet's Coherency Count Field value is set differently for every packet, differentiating each packet. IP(Internet Protocol) is used for the Network Layer, and IPCP(Internet Protocol Control Protocol) requests network information to PNS. PAC receives IP address, network mask, gateway, IP address information and sets PAC's Network Layer. After finishing above process, the devices are then connected as one VPN. Every PAC can access the proxy server, and at each PAC, proxy server's private IP address is configured so that after connecting to the private network, its own private IP along with the pre-configured VoIP telephone number are registered at the proxy server. After registration, a call can be make by dialing a number through SIP protocol. We use of Internet telephone has advantages over the conventional telephone. These include cheaper calls and the possibility to provide not only voice services but other internet services as well. III. VPN SIGNALING PROTOCOL The Sound quality and the call quality is dependent on the network performance and network configuration of devices Hence the call quality can be determined by the quality of the sound and the voice quality. Three factors affect the call quality [4][5]. 3.1 Clarity Call Quality can be determined by the call's voice Fidelity, Clearness, Distortion, Intelligibility. Packet loss is one of the reasons that reduce call clarity. VoIP network used non-persistent protocol such as UDP where packet losses are common. These packet losses result in loss of voice data and affect the overall call quality. The call quality will degrade with the higher percentage of UDP Packet loss. Voice codec affect call clarity. Voice codec convert analog voice to digitized bit streams, and to decrease the volume of data, compression is often used and some data is striped. In this paper G codec is used, and it is mainly used for low bit stream conversion of multi-media service voice and other audio signals. Two main coders are defined namely, 5.3Kbps and 6.3Kbps, 6.3Kbps is based on MP-MLP and is higher in quality. 3.2 End-to-End Delay End to end delay in VoIP network is the delay associated with delivering voice date from the sender to the receiver, and with increasing delay, the call will feel more distant. It can be divided into the IP network delay and the VoIP equipment delay. IP network delay can be divided into the propagation delay and the handling delay. The propagation delay is the delay associated with physical delay that are existent in fiber option or copper connections, and the handling delay is sometimes called serialization delay and it is introduced in the devices handling the voice data. This handling delay can be further categorized to Packet Processing Delay, Packet Switching / Routing delay, packets arriving out of order in IP network, Queuing Delay created due to limited physical line speed at the switches, routers. Router's Queuing Delay is the most significant End-toend delay in the VoIP network, and describes packets arriving at irregular intervals due to changes in the network quality. Packets must travel from the sender to the receiver in certain time limit, and this time interval is called jitter. The VoIP equipment delay time is introduced by the voice signal process between the end terminals and the VoIP gateway. Encoding and Decoding delay is included in this delay, and depending on the codec used, more delay is possible. In VoIP equipment's receiving process, packet delay is introduced, it is the delay associated with packing voice data into packets with bigger packets the delay is introduced. Smaller packets reduce the packet delay, but increase header data and as a result decrease overall network bandwidth. End-to-end delay is caused by the delay associated in sending voice packets from the Client, the delay associated with equipment and network access, the IP packet queuing delay, the packet delay and echo the elimination delay at the gateway and the delay associated with accessing PSTN network. The VoIP system proposed in this paper, as shown in Fig. 1, has the additional encapsulation delay introduced since tunneling is used to transfer data between PAC and PNS to the conventional VoIP system. Other delays are same or similar.

3 IV. IMPLEMENT VOIP TELEPHONY CALL QUALITY Fig. 1. VoIP delays End-to-End The implemented VoIP system's VPN based test environment is described in Fig. 3. With emphasis on packet arrival interval, network delay and overload, the system will be tested to show the feasibility of VPN based SIP. Echo is voice that travels back to the original senders receiving terminal, and it is also considered when determining the overall call quality. As shown in Fig. 2, three factors can influence the call quality, they are clarity, end-to-end delay and echo, and they are closely interrelated. Hence, with decreasing Voice Quality Space, the overall call quality increases. Table 1. Cell quality in R-scale Fig. 2. Relationship among voice clarity, delay and Echo In this paper, the delay additional to the conventional VoIP system, which is introduced during encapsulation, will be tested. I.E. Clarity and Echo of the two systems does not differ significantly and hence will be omitted in the test. To test the call qualifies of VoIP telephony, test method described in ITU-T G.107 will be used [6]. With various different parameters as the default and values from 0 to 100, quality will be measure in the Rscale. If the call quality is above 70, the general quality considered good and with R-scale, MOS(Mean Option Score) is measured. MOS is used to benchmark voice codec performance. Large test group and large test samples are needed because the call quality and the sound quality are very subjective. MOS measures each test sample from 1(bad) to 5(good) in each listening test group, and calculates the average value. If MOS value is above 3.6, the quality is said to be fair and adequate for use. Parameters, which are affected the value of R, are related as below; The test network is setup as in Fig. 4, with 3 PAC and with each local network connected through routers to the proxy server and PNS. There are 10 sub-networks, PNS responsible for PPTP Server side, when a request is received from PAC for the Control-Connection, it replies and creates the tunnel between PACs. With this tunnel, a VPN network is created to PAC using PPP. PAC is responsible for PPTP Client side and becomes a member of the network by creating a tunnel to PNS. The proxy server uses SIP and to make VoIP calls, has SIP UA information. PNS is where PPTP Server Side is implemented and has PAC#1 and PAC#2's user-id and password, also has private IP pool to form VPN. There are 2 network interfaces in use. The local network interface connects the private network and the external network interface connects the Internet. There is 1 PPTP interface responsible for transferring encrypted GRE packets that are delivered from the external network interface, to the local network or to clients on other private network [7]. Here, 0 R, s I, d I, e I and A denote Signal-to Noise, Impairment transferred with voice, Delay Impairment, Low bandwidth code Impairment, Correction value, respectively. Table 1 describes user satisfactory level according to the R-scale as shown in ITU-'s G.109 Recommendation. If the R s value is below 50, then it is not practical in any use. Fig. 3. VPN Based SIP test environment PAC#1 and PAC#2 are VoIP terminals that implement PPTP Client Side, and have PNS's public IP and port number. To authenticate themselves at PNS, they also have their user-id and password information. Below are

4 the initialization and the call process. 1 1) To create the tunnel PAC#1 sends control con nection message to PNS like in PPTP control connection process. PNS replies. 2 2) Through the created tunnel, PAC#1 uses PPP to authenticate itself and receives the private IP address. 3 3) PAC#1 creates a virtual internal interface call ed pptp0 using the private IP address. 4 4) PAC#1 using SIP's registration function, regis ters its SIP information with the proxy server. From this stage VoIP calls can be made. 5 5) At PAC#2, step 1) ~ 4) is repeated and it is V oip call ready. 6 6) At PAC#1, the headpiece is lifted and PAC#2' s numbers are pressed (2134). 7 7) At PAC#1, a SIP messages travels through the tunnel to the proxy server. All messages trave ling the tunnel are encrypted. 8 8) At PNS, the packet with GRE header received from the external interface is decrypted and p rivate IP header's destination IP is retrieved. If the address is for the local network, forward to itself local interface, and if it's for a private terminal in other external network, forward to the external interface after re-encrypting through the tunnel to PAC#2. In this paper, to show that the overall quality of the calls made in the test system meets the standard quality (150ms to 200ms) by measuring the RTT value of the one-way delay. However PNS is involved with the decryption and can become a bottleneck in heavy traffic and its performance must be considered. 4.1 RTP Packet Format ERTP packet is transferred by UDP datagram's payload. It uses a very simple header format to eliminate the overload in applications. In common real-time applications needs high bandwidth, and to reduce the delay and to increase RTP transfer rate, message and header size is reduced. The Packet used in SIP using G codec has format of being a 64Byte IP packet. It is made up of an 8 Byte UDP header and a 32 Byte RTP packet. A RTP packet is further divided into a 12 Byte header and 24 Byte voice data. 64 Bytes are the overall size of the encrypted packet used in the test SIP application using G.723.1(6.3K) codec. Transferred voice data length varies with different codec used and are detailed below; G => 6.3Kbps, every 30ms transfer 24bytes G.729A => 8Kbps, every 10ms transfer 10bytes G.711 => 64Kbps, every 20ms transfer 160bytes Encapsulated IP Packet length varies as below; G (64bytes) private-ip header(20) + UDP header(8) + RTP header(12) + voice data(24) G.729A (50bytes) private-ip header(20) + UDP header(8) + RTP header(12) + voice data(10) G.711 (200bytes) private-ip header(20) + UDP header(8) + RTP header(12) + voice data(160) 4.2 Encapsulation Delay With emphasis on network overload, voice calls are tested using VoIP's SIP protocol on how many frames are most efficient in one packet for transfer. It is important to note the differences in performance when sending a packet with many frames for longer delay times and when sending a packet with lesser frames for shorter delay times. In this paper, SIP application uses 64 Byte frames in one packet. Fig. 4 shows the difference in overall delay with variation of number of frames in one packet. This is important as 64 Byte overhead header is added for encapsulation between PAC and PNS. It is important to save bandwidth with increasing number of VoIP terminals. However sending more frames in one packet will increase the delay time and the overall call quality will drop. Fig. 4. Network overload 4.3 Frames per Packet The most efficient ratio can be observed in Fig. 5. In this picture packet arrival interval is graphed against different frames per packet. Two center graphs are the optimal graphs for 99% quality, and upper and lower graphs are the worst case and the best case packet arrival graphs. To minimize the delay between terminals, the optimal number of frames is 2-3 per packet. Most commonly used internet telephony inserts pre-delay-frame in packets, and as internet telephony becomes popular, it is recommended to send 2-3 frames per packet.

5 Furthermore, RTT time varies with different codec when sending number of frames in one packet as well as the encrypted data length. For codec G.723.1, if a packet sends one frame, the total encrypted size is 64bytes, and for 2 frames, 88bytes, and 112bytes for 3 frames. In case of G.729A, the total encrypted size is 50bytes for one frame, 60bytes for two frames and 70bytes for three frames. The overall quality is acceptable as the maximum encrypted data length is 112bytes for G and 70bytes for G.729A, with the difference in total delay time being less than 4ms against the conventional VoIP telephony system. network), security issues with internet telephony can be minimized. However the PPTP protocol used in this paper dose not use encrypted Control Connection messages and authentication, and the whole system can be compromised by stealing the control connection message. This problem can be solved with L2TP. PPTP is on IP based network whereas L2TP is packet based and more versatile. It is expendable and uses certificate based IPSec. Despite that, IPSec's key management protocol ISAKMP/IKE is too complex to manage and that its implementation is limited, but with right infrastructure, these problems will vanish. For better security, VPN's L2TP and IPSec will be used which encrypts the control connection message and has authentication for future internet telephony implementation. ACKNOWLEDGMENT This work was supported by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD) (The Regional Research Universities Program/Chungbuk BIT Research-Oriented University Consortium). Fig. 5. Packet arrival interval time with respect to No. frames per packet V. CONCLUSIONS Internet Telephony system proposed in this paper, measures call success rate with 10 seconds calls. A tone was sent from one PAC to another PAC, and if the confirmation time was less then 10 seconds, a call was retried to make the total call time to about 15 seconds. After testing call for 24 hours under these methods, it was confirmed that the success rate was near 100%. In the test to measure the overall call quality, it was observed that the encapsulation delay time is introduced in the proposed system was at maximum about 5ms, and the difference in total delay time against the conventional internet telephony system was roughly 4-5ms. These results reflect that the call quality between the two systems is negligible. Using VoIP's SIP protocol for make voice calls with emphasis on network over load, the optimal number of frame in one packet was measured. A 64 Byte header is added for encapsulation between PAC and PNS, and as more terminals are present, the network traffic will increase and it's important to reduce the use of network bandwidth. However, sending a large number of frames in one packet will increase the total delay time and will decrease the call quality. SIP application used in this paper uses G codec, and sends 24 Bytes of voice data in one packet. In was concluded from testing with different number of frames per packet, that the optimal ratio was 2-3 frames per packet since the encapsulation process between PAC and PNS has the most significant effect on network traffic and that the acceptable delay time between two nodes is about 160ms to 170ms. In addition, it was shown that with VPN(Virtual private REFERENCES [1]. Percy, A. Understanding Latency in IP Telephony, Brook root Technology, [2]. Uyless Black, Internet Telephony: call processing protocols, Prentice Hall PTR, [3]. Kim S.T., Yoo, S. S., Lee, S. K., A Study on Internet Telephony using VPN, Journal of the Korean Institute of Communication Sciences, 2005, 30: [4]. TIA/EIA/TSB116, Voice Quality Recommendations for IP Telephony, March [5]. ITU-T Recommendation G.109, Definition of categories of Speech Transmission Quality, September [6]. ITU-T Recommendation G.107, The E-model, a Computational Model for Use in transmission Planning, May [7]. Hamzeh, K., Pall, G., Verthein, G., Taarud, J., Little, W., Zorn, G., Point-to-Point Tunneling

Development of Internet Phone(VoIP) for Voice Security on VPN Environment

Development of Internet Phone(VoIP) for Voice Security on VPN Environment International Conference on Convergence and Hybrid Information Technology 2008 Development of Internet Phone(VoIP) for Voice Security on VPN Environment Sang-Jo Youk 1, Seung-Sun Yoo 2, Bong-Keun Lee 3,

More information

Synopsis of Basic VoIP Concepts

Synopsis of Basic VoIP Concepts APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter

More information

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

ABSTRACT. that it avoids the tolls charged by ordinary telephone service ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet

More information

VOIP Network Pre-Requisites

VOIP Network Pre-Requisites VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2637 Category: Informational K. Hamzeh Ascend Communications G. Pall Microsoft Corporation W. Verthein 3Com J. Taarud Copper Mountain Networks W. Little ECI

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Alcatel OmniPCX Enterprise

Alcatel OmniPCX Enterprise Alcatel OmniPCX Enterprise QoS for VoIP Overview 1 OBJECTIVE: Describe the essential parameters for QoS The QoS parameters regarding the data network IP Packet Transfer Delay (IPTD): Time for the packet

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

Voice Quality Assessment for Mobile to SIP Call over Live 3G Network

Voice Quality Assessment for Mobile to SIP Call over Live 3G Network Abstract 132 Voice Quality Assessment for Mobile to SIP Call over Live 3G Network G.Venkatakrishnan, I-H.Mkwawa and L.Sun Signal Processing and Multimedia Communications, University of Plymouth, Plymouth,

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have

More information

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet

More information

GUIDELINES FOR VOIP NETWORK PREREQUISITES

GUIDELINES FOR VOIP NETWORK PREREQUISITES GUIDELINES FOR VOIP NETWORK PREREQUISITES WHITE PAPER October 2016 Unified Networks Unified User Clients Unified Messaging Mobility 100+ Call Management Features Executive Summary This document contains

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW CHAPTER 2 LITERATURE REVIEW 2.1 FILE FORMATS Facsimile file format defines the typical way in which the information will be encoded. 2.1.1 Group 3 terminal file format The characteristics of G3 facsimile

More information

Introduction to Quality of Service

Introduction to Quality of Service Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies

More information

Improving QoS of VoIP over Wireless Networks (IQ-VW)

Improving QoS of VoIP over Wireless Networks (IQ-VW) Improving QoS of VoIP over Wireless Networks (IQ-VW) Mona Habib & Nirmala Bulusu CS522 12/09/2002 1 Agenda Voice over IP (VoIP): Why? VoIP Protocols: H.323 and SIP Quality of Service (QoS) Wireless Networks

More information

TODAY AGENDA. VOIP Mobile IP

TODAY AGENDA. VOIP Mobile IP VOIP & MOBILE IP PREVIOUS LECTURE Why Networks? And types of Networks Network Topologies Protocols, Elements and Applications of Protocols TCP/IP and OSI Model Packet and Circuit Switching 2 TODAY AGENDA

More information

B.Eng. (Hons.) Telecommunications. Examinations for / Semester 1

B.Eng. (Hons.) Telecommunications. Examinations for / Semester 1 B.Eng. (Hons.) Telecommunications Cohort: BTEL/12/FT Examinations for 2014-2015 / Semester 1 MODULE: IP TELEPHONY MODULE CODE: TELC 3107 Duration: 3 Hours Instructions to Candidates: 1. Answer all questions.

More information

Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches

Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Dr. Elmabruk M Laias * Department of Computer, Omar Al-mukhtar

More information

Whitepaper IP SLA: Jitter. plixer. International

Whitepaper IP SLA: Jitter. plixer. International Whitepaper IP SLA: Jitter 1 plixer Table of Contents Table of Contents Introduction IP SLA VoIP Measurement Tools Jitter Latency Packet Loss MOS ICPIF Score IOS Version Warning Steps to Configure the IP

More information

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved. VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Configuring Client-Initiated Dial-In VPDN Tunneling

Configuring Client-Initiated Dial-In VPDN Tunneling Configuring Client-Initiated Dial-In VPDN Tunneling Client-initiated dial-in virtual private dialup networking (VPDN) tunneling deployments allow remote users to access a private network over a shared

More information

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

QoS in a SOHO Virtual Private Network for IP Telephony

QoS in a SOHO Virtual Private Network for IP Telephony CHAPTER 5 QoS in a SOHO Virtual Private Network for Telephony This chapter provides information about implementing QoS in an AVVID-enabled Small Office Home Office (SOHO) Virtual Private Network (VPN)

More information

Investigation of Algorithms for VoIP Signaling

Investigation of Algorithms for VoIP Signaling Journal of Electrical Engineering 4 (2016) 203-207 doi: 10.17265/2328-2223/2016.04.007 D DAVID PUBLISHING Todorka Georgieva 1, Ekaterina Dimitrova 2 and Slava Yordanova 3 1. Telecommunication Department,

More information

A B S T R A C T. Index Terms: MPPE; PPTP; RC4; Cipher; VPN; MSCHAPv2 I. INTRODUCTION

A B S T R A C T. Index Terms: MPPE; PPTP; RC4; Cipher; VPN; MSCHAPv2 I. INTRODUCTION Performance and Strength Comparison Of Various Encryption Protocol of PPTP VPN. Anupriya Shrivastava,M A Rizvi National Institute of Technical Teacher s Training and Research Bhopal, India 1, 2 anushrivastava1989@gmail.com

More information

Protocol & Port Information for the deployment of. and. within IP Networks

Protocol & Port Information for the deployment of. and. within IP Networks Protocol & Port Information for the deployment of and within IP Networks SpliceCom Ltd The Hall Business Centre Berry Lane Chorleywood Herts WD3 5EX Phone: 01923-287700 Fax: 01923-287722 E-mail: info@splicecom.com

More information

Computer Networks Technologies and Services January 31 st, Question 11

Computer Networks Technologies and Services January 31 st, Question 11 Computer Networks Technologies and Services January 31 st, 2014 First and last name... Student ID...... Answers to multiple choice questions 1 2 3 4 5 6 7 8 9 10 Answers to essay questions Question 11

More information

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Esra Musbah Mohammed Musbah 1 Khalid Hamed Bilal 2 Amin Babiker A./Nabi Mustafa 3 Abstract VoIP stands for voice over internet protocol. It is one

More information

Bandwidth, Latency, and QoS for Core Components

Bandwidth, Latency, and QoS for Core Components Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Chapter 11: Understanding the H.323 Standard

Chapter 11: Understanding the H.323 Standard Página 1 de 7 Chapter 11: Understanding the H.323 Standard This chapter contains information about the H.323 standard and its architecture, and discusses how Microsoft Windows NetMeeting supports H.323

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

Chapter 10 Security Protocols of the Data Link Layer

Chapter 10 Security Protocols of the Data Link Layer Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols

More information

Performance Management: Key to IP Telephony Success

Performance Management: Key to IP Telephony Success Performance Management: Key to Telephony Success Alan Clark, President & CEO Telchemy, Incorporated http://www.telchemy.com Vo Performance Management Voice, Video and other Real Time Applications Vo Performance

More information

REACTION PAPER 01 TEL 500

REACTION PAPER 01 TEL 500 TEL 500 Session Initiation Protocol Improvement Using Inter-Asterisk exchange Introduction: Within the VoIP network environment, H323, SIP and IAX are three protocols that solve the problem of voice packet

More information

Location Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos

Location Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos Location Based Advanced Phone Dialer A mobile client solution to perform voice calls over internet protocol Jorge Duda de Matos Superior Institute of Technology (IST) Lisbon, Portugal Abstract Mobile communication

More information

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009 VPN and IPsec Network Administration Using Linux Virtual Private Network and IPSec 04/2009 What is VPN? VPN is an emulation of a private Wide Area Network (WAN) using shared or public IP facilities. A

More information

PfR Voice Traffic Optimization Using Active Probes

PfR Voice Traffic Optimization Using Active Probes PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

Configuring L2TP over IPsec

Configuring L2TP over IPsec CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

PSTN Fallback. Finding Feature Information

PSTN Fallback. Finding Feature Information The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the

More information

H.323. Definition. Overview. Topics

H.323. Definition. Overview. Topics H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,

More information

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes ZyXEL V120 (V120 IP Attendant 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V120 IP Attendant...3 2. Setting up the V120...4 3. Auto Provision...7 4. V120

More information

Assessing Call Quality of VoIP and Data Traffic over Wireless LAN

Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Wen-Tzu Chen and Chih-Yuan Lee Institute of Telecommunications Management, National Cheng Kung University, No. 1 University Road, Tainan

More information

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 642-845 Title : Optimizing Converged Cisco Networks Vendors : Cisco Version

More information

Troubleshooting Packet Loss. Steven van Houttum

Troubleshooting Packet Loss. Steven van Houttum Troubleshooting Packet Loss Steven van Houttum INTRODUCTION Steven van Houttum Consultant/Trainer MVP Office Server & Services (Skype for Business) TROUBLESHOOTING PACKET LOSS, IS IT REALLY THE NETWORK?

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Avaya PBX SIP TRUNKING Setup & User Guide

Avaya PBX SIP TRUNKING Setup & User Guide Avaya PBX SIP TRUNKING Setup & User Guide Nextiva.com (800) 285-7995 2 P a g e Contents Description... 3 Avaya IP PBX Configuration... 3 Licensing and Physical Hardware... 4 System Tab Configuration...

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

OneXS will provide users with a reference server (IP, FQDN, or other means to connect to the service). This must be obtained before setup can begin.

OneXS will provide users with a reference server (IP, FQDN, or other means to connect to the service). This must be obtained before setup can begin. 1 SIP Carriers 1.1 OneXS 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

PSTN Fallback. Finding Feature Information

PSTN Fallback. Finding Feature Information The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the

More information

Review on protocols of Virtual Private Network

Review on protocols of Virtual Private Network Review on protocols of Virtual Private Network Shaikh Shahebaz 1, Sujay Madan 2, Sujata Magare 3 1 Student, Dept. Of MCA [JNEC College] Cidoco N-6, Aurangabad, Maharashtra, India 2 Student Dept. of MCA

More information

Configuration information in this document is based on IC version 3.0, so the menus shown may vary slightly from your product implementation.

Configuration information in this document is based on IC version 3.0, so the menus shown may vary slightly from your product implementation. 1 SIP Carriers 1.1 Telepacific 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be

More information

Measurement QoS Parameters of VoIP Codecs as a Function of the Network Traffic Level

Measurement QoS Parameters of VoIP Codecs as a Function of the Network Traffic Level Measurement QoS Parameters of VoIP Codecs as a Function of the Network Traffic Level Jugoslav Jocić *, Zoran Veličković ** * Telekom Srbija AD, Prokuplje, Serbia ** College of Applied Technical Sciences,

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

VOIP SOLUTIONS. telecomsni

VOIP SOLUTIONS. telecomsni VOIP SOLUTIONS telecomsni Why are businesses turning to VoIP? Low cost In general, a telephone service via VoIP costs less than an equivalent service from traditional providers. There are also some cost

More information

1 SIP Carriers. 1.1 LightBound Warnings Vendor Contact Vendor Web Site:

1 SIP Carriers. 1.1 LightBound Warnings Vendor Contact Vendor Web Site: 1 SIP Carriers 1.1 LightBound 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information

Virtual Private Networks.

Virtual Private Networks. Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies

More information

Understanding RoIP Networks

Understanding RoIP Networks White Paper Understanding RoIP Networks Revision 1.0 www.omnitronicsworld.com 1. INTRODUCTION TO RADIO OVER IP (ROIP) Radio over IP describes the application of Voice over Internet Protocol technology

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Technical Tip No: 026 Configuring IP Office and IP Endpoints across The Public Internet via Manager in a SoHO environment Date: Product: IP Office Version: 2.0(x) Revision: 1.0

More information

RTP implemented in Abacus

RTP implemented in Abacus Spirent Abacus RTP implemented in Abacus 编号版本修改时间说明 1 1. Codec that Abacus supports. G.711u law G.711A law G.726 G.726 ITU G.723.1 G.729 AB (when VAD is YES, it is G.729AB, when No, it is G.729A) G.729

More information

GSM Gateway High Performance GSM Gateway Solution

GSM Gateway High Performance GSM Gateway Solution GSM Gateway High Performance GSM Gateway Solution WEB Setup Guide AP-GS1001 / AP-GS1002 / AP-GS1004 www.addpac.com Contents 1. WEB Connection 2. Network Setup 3. Language 4. GSM Setup 5. VoIP Setup 6.

More information

CS519: Computer Networks. Lecture 9: May 03, 2004 Media over Internet

CS519: Computer Networks. Lecture 9: May 03, 2004 Media over Internet : Computer Networks Lecture 9: May 03, 2004 Media over Internet Media over the Internet Media = Voice and Video Key characteristic of media: Realtime Which we ve chosen to define in terms of playback,

More information

Outline. Computer Communication and Networks. The Network Core. Components of the Internet. The Network Core Packet Switching Circuit Switching

Outline. Computer Communication and Networks. The Network Core. Components of the Internet. The Network Core Packet Switching Circuit Switching Outline Computer Communication and Networks 1 Department of Computer Science & Information Technology University of Balochistan Lecture 03 1/26 2/26 Two major components The mesh of packet switches and

More information

WhitePaper: XipLink Real-Time Optimizations

WhitePaper: XipLink Real-Time Optimizations WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability

More information

Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0

Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Abstract These Application Notes

More information

Network Security. Chapter 10 Security Protocols of the Data Link Layer

Network Security. Chapter 10 Security Protocols of the Data Link Layer Network Security Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol () Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) Virtual Private Networks

More information

Seamless Traffic Migration between the Mobile and Fixed Networks

Seamless Traffic Migration between the Mobile and Fixed Networks Data Traffic Migration Seamless Traffic Migration between the Mobile and Fixed Networks We have developed traffic migration technology for distributing communication traffic from mobile networks to fixed

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network FAQ 07/2014 Latency on a Switched Ethernet Network RUGGEDCOM Ethernet Switches & Routers http://support.automation.siemens.com/ww/view/en/94772587 This entry is from the Siemens Industry Online Support.

More information

Overcoming Barriers to High-Quality Voice over IP Deployments

Overcoming Barriers to High-Quality Voice over IP Deployments Whitepaper Overcoming Barriers to High-Quality Voice over IP Deployments Intel in Communications Overcoming Barriers to High-Quality Voice over IP Deployments Whitepaper Contents Executive Summary 1 Introduction

More information

Impact of Voice Coding in Performance of VoIP

Impact of Voice Coding in Performance of VoIP Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in

More information

Introduction. H.323 Basics CHAPTER

Introduction. H.323 Basics CHAPTER CHAPTER 1 Last revised on: October 30, 2009 This chapter provides an overview of the standard and the video infrastructure components used to build an videoconferencing network. It describes the basics

More information

Problem verification during execution of H.323 signaling

Problem verification during execution of H.323 signaling Problem verification during execution of H.323 signaling 1 ESAD KADUSIC & 2 NATASA ZIVIC & 3 NARCIS BEHLILOVIC & 4 ALIJA VEGARA 1,3,4 Faculty of Electrical Engineering in Sarajevo Zmaja od Bosne, 71 000

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

White Paper Voice Quality Sound design is an art form at Snom and is at the core of our development utilising some of the world's most advance voice

White Paper Voice Quality Sound design is an art form at Snom and is at the core of our development utilising some of the world's most advance voice White Paper Voice Quality Sound design is an art form at and is at the core of our development utilising some of the world's most advance voice quality engineering tools White Paper - Audio Quality Table

More information

Music on Hold with IP Connectivity

Music on Hold with IP Connectivity Music on Hold with IP Connectivity And an introduction to Network Regions Abstract Music On Hold has long been a standard feature in Avaya communications systems. Traditional TDM based systems take a music

More information

Vodafone MachineLink. PPTP Configuration Guide

Vodafone MachineLink. PPTP Configuration Guide Vodafone MachineLink PPTP Configuration Guide Document history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone MachineLink 4G (NWL-22)

More information

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets CHAPTER 16 Fragmenting and Interleaving Real-Time and Nonreal-Time Packets Integrating delay-sensitive real-time traffic with nonreal-time data packets on low-speed links can cause the real-time packets

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

Secure Telephony Enabled Middle-box (STEM)

Secure Telephony Enabled Middle-box (STEM) Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components

More information

Secure Transmission for Interactive Three-Dimensional Visualization System

Secure Transmission for Interactive Three-Dimensional Visualization System Secure Transmission for Interactive Three-Dimensional Visualization System 저자저널명발행기관 NDSL URL Yun, H.Y. ; Yoo, Sun Kook Journal of International Society for Simulation Surgery International Society for

More information

Configuring Auto IP SLAs in IP SLAs Engine 3.0

Configuring Auto IP SLAs in IP SLAs Engine 3.0 This document describes the auto IP Service Level Agreements (SLAs) function in IP SLAs Engine 3.0, including the following: Auto-measure groups--each template, endpoint list, and scheduler can be configured

More information

LCOS Manual VoIP

LCOS Manual VoIP LCOS 10.12 Manual VoIP Contents Contents Copyright...4...5 1.1 Introduction...5 1.2 VoIP implementation in LANCOM VoIP routers...6 1.2.1 Example applications...6 1.2.2 The central position of the LANCOM

More information

ENSC 427 COMMUNICATION NETWORKS

ENSC 427 COMMUNICATION NETWORKS ENSC 427 COMMUNICATION NETWORKS Implementation of VoIP over a Campus Wide Network Spring 2010 FINAL PROJECT Xuan Lu Kevan Thompson Zhiyu Zhou http://www.sfu.ca/~zzhou/project.html xla9@sfu.ca kjthomps@sfu.ca

More information

EarthLink Business SIP Trunking. ShoreTel 14.2 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. ShoreTel 14.2 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking ShoreTel 14.2 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0

More information