An Effective Calibration of VOIP Internet Telephony Performance using VPN between PAC and PNS
|
|
- Ellen Sophie Fox
- 5 years ago
- Views:
Transcription
1 An Effective Calibration of VOIP Internet Telephony Performance using VPN between PAC and PNS Hyung Moo Kim, and Jae Soo Yoo, Member, IEEE Abstract In this paper, we have created VoIP terminals that use Virtual Private Network (VPN) to eliminate security risks due to the complexity of protocols involved and network equipments used. Point-to-Point Tunneling Protocol (PPTP) is used on the session initiation protocol (SIP) stack, which is enabled by Internet telephony terminal to test its performance and feasibility. To measure the performance of call quality, we have built the experiment environment and observed that the delay caused by encapsulation between internet and VoIP telephones is under 8ms at most. The major delay is assumed the time required to capsulate the packet for tunneling of VPN. Because the difference of average delay time is under 4ms~5ms, the difference of call quality between VoIP and VoIP telephone adopting VPN is negligible. We have concluded that the capsulation process between PPTP access concentrator (PAC) and PPTP network server (PNS) is the major factor influencing the network load by changing the number of fames in a packet during communication. Also, we have concluded that the most suitable frame numbers is two or three by adding the frame numbers in a packet to obtain the suitable frames in a packet and setting up end to end delay to be 160ms~170ms. We have suggested, developed, and evaluated an internet telephony system that implements secure user authentication and data transmission. Through measuring the delay time between a conventional VoIP telephone and the proposed system, the quality of call made through the proposed system and its feasibility are discussed. Index Terms PPTP access concentrator(pac), PPTP network server concentrator(pns), Point-to-Point Tunneling Protocol(PPTP), Voice over Internet Telephony(VoIP), Virtual Private Network(VPN) T I. INTRODUCTION he use of Internet telephone has advantages over the conventional telephone. These include cheaper calls Manuscript received May 15, This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD) (The Regional Research Universities Program / Chungbuk BIT Research-Oriented University Consortium). An Effective Calibration of VOIP Internet Telephony Performance using VPN between PAC and PNS. Hyung Moo Kim is with the School of Electrical Electronics & Computer Engineering Chungbuk National University, Gaesindong, Heungdukgu, Cheongju, Chungbuk, , Korea (corresponding author to provide phone: ; fax: ; hyungmookim@chonbuk.ac.kr). Jae Soo Yoo is with the School of Electrical Electronics & Computer Engineering Chungbuk National University, Gaesindong, Heungdukgu, Cheongju, Chungbuk, , Korea ( yjs@chungbuk.ac.kr). and the possibility to provide not only voice services but other internet services as well. However Internet telephony uses shared network, and therefore is venerable to security issues. Internet services such as VoIP and P2P over fast fiber optic links will become common communicational channels in near future [1]. However, due to the nature of the Internet, that it uses shared networks, it is often hard to ensure the security. Measures to increase the security are increasing but in most cases, their practical implementations are often difficult. It is especially difficult to secure the VoIP system due to the complexity of protocols involved and network equipments used [2][3]. To overcome these security problems, many different solutions are in the stage of being standardized. Unfortunately, it will take some time and hence in this paper, we have developed an Internet telephony system that implements secure user authentication and data transmission. Also in this paper, the performance of the proposed system is measured. Ⅱ. Making a Call, Secure Internet Telephony The Secure Internet telephony system developed in this paper uses SIP protocol, and to prevent any eavesdrop, PPTP (Point-to-Point Tunneling Protocol) is used to implement PAC (PPTP Access Concentrator). Through measuring the delay time between a conventional VoIP telephone and the proposed system, the quality of call made through the proposed system and its feasibility are discussed. PAC controls the PPTP Client side and creates a control connect to PNS(PPTP Network Server). The control connection is created before PPTP Tunneling, and is to control the PPTP connection. To create the control connection, PAC sends a request to PNS, and after receiving a reply from PNS, it will request configuration for the call. After receiving configuration from PNS, to configure the connection link between PAC and PNS, they finished configuring the control connection through the use of Set-Link-Info message. After configuration of the control link, PPP ( Point-to- Point Protocol ) is used to configure the link and to negotiate which protocols will be used between PAC and PNS. Firstly use LCP(Link Control Protocol) to configure the PPP Link, and negotiate whether to use authentication protocol or not, and which authentication
2 protocol will be used. Also the use of the compression algorithm is negotiated. These options negotiated here in the LCP process will determine the protocols that will be used in the next process. In this paper, the authentication protocol and CHAP(Challenge Handshake Authentication Protocol) are used, so PNS sends a CHAP Challenge message to PAC to request authentication. PAC responds after analyzing data from PNS and its user-id and password with a CHAP response. If received data is OK, PNS sends a CHAP success message to successfully finish the authentication process. In LCP process, it was negotiated that a compression algorithm will be used, so it the next stage, the type the compression protocol is negotiated along with the protocol for the Network Layer. In this paper, MPPC (Microsoft Point-To-Point Compression) is used for PPP packet compression, is used for the compression protocol, Stateless Mode is selected, and 128bit encryption is used. When Stateless Mode is selected, MPPE (Microsoft Point-To-Point Encryption) packet's Coherency Count Field value is set differently for every packet, differentiating each packet. IP(Internet Protocol) is used for the Network Layer, and IPCP(Internet Protocol Control Protocol) requests network information to PNS. PAC receives IP address, network mask, gateway, IP address information and sets PAC's Network Layer. After finishing above process, the devices are then connected as one VPN. Every PAC can access the proxy server, and at each PAC, proxy server's private IP address is configured so that after connecting to the private network, its own private IP along with the pre-configured VoIP telephone number are registered at the proxy server. After registration, a call can be make by dialing a number through SIP protocol. We use of Internet telephone has advantages over the conventional telephone. These include cheaper calls and the possibility to provide not only voice services but other internet services as well. III. VPN SIGNALING PROTOCOL The Sound quality and the call quality is dependent on the network performance and network configuration of devices Hence the call quality can be determined by the quality of the sound and the voice quality. Three factors affect the call quality [4][5]. 3.1 Clarity Call Quality can be determined by the call's voice Fidelity, Clearness, Distortion, Intelligibility. Packet loss is one of the reasons that reduce call clarity. VoIP network used non-persistent protocol such as UDP where packet losses are common. These packet losses result in loss of voice data and affect the overall call quality. The call quality will degrade with the higher percentage of UDP Packet loss. Voice codec affect call clarity. Voice codec convert analog voice to digitized bit streams, and to decrease the volume of data, compression is often used and some data is striped. In this paper G codec is used, and it is mainly used for low bit stream conversion of multi-media service voice and other audio signals. Two main coders are defined namely, 5.3Kbps and 6.3Kbps, 6.3Kbps is based on MP-MLP and is higher in quality. 3.2 End-to-End Delay End to end delay in VoIP network is the delay associated with delivering voice date from the sender to the receiver, and with increasing delay, the call will feel more distant. It can be divided into the IP network delay and the VoIP equipment delay. IP network delay can be divided into the propagation delay and the handling delay. The propagation delay is the delay associated with physical delay that are existent in fiber option or copper connections, and the handling delay is sometimes called serialization delay and it is introduced in the devices handling the voice data. This handling delay can be further categorized to Packet Processing Delay, Packet Switching / Routing delay, packets arriving out of order in IP network, Queuing Delay created due to limited physical line speed at the switches, routers. Router's Queuing Delay is the most significant End-toend delay in the VoIP network, and describes packets arriving at irregular intervals due to changes in the network quality. Packets must travel from the sender to the receiver in certain time limit, and this time interval is called jitter. The VoIP equipment delay time is introduced by the voice signal process between the end terminals and the VoIP gateway. Encoding and Decoding delay is included in this delay, and depending on the codec used, more delay is possible. In VoIP equipment's receiving process, packet delay is introduced, it is the delay associated with packing voice data into packets with bigger packets the delay is introduced. Smaller packets reduce the packet delay, but increase header data and as a result decrease overall network bandwidth. End-to-end delay is caused by the delay associated in sending voice packets from the Client, the delay associated with equipment and network access, the IP packet queuing delay, the packet delay and echo the elimination delay at the gateway and the delay associated with accessing PSTN network. The VoIP system proposed in this paper, as shown in Fig. 1, has the additional encapsulation delay introduced since tunneling is used to transfer data between PAC and PNS to the conventional VoIP system. Other delays are same or similar.
3 IV. IMPLEMENT VOIP TELEPHONY CALL QUALITY Fig. 1. VoIP delays End-to-End The implemented VoIP system's VPN based test environment is described in Fig. 3. With emphasis on packet arrival interval, network delay and overload, the system will be tested to show the feasibility of VPN based SIP. Echo is voice that travels back to the original senders receiving terminal, and it is also considered when determining the overall call quality. As shown in Fig. 2, three factors can influence the call quality, they are clarity, end-to-end delay and echo, and they are closely interrelated. Hence, with decreasing Voice Quality Space, the overall call quality increases. Table 1. Cell quality in R-scale Fig. 2. Relationship among voice clarity, delay and Echo In this paper, the delay additional to the conventional VoIP system, which is introduced during encapsulation, will be tested. I.E. Clarity and Echo of the two systems does not differ significantly and hence will be omitted in the test. To test the call qualifies of VoIP telephony, test method described in ITU-T G.107 will be used [6]. With various different parameters as the default and values from 0 to 100, quality will be measure in the Rscale. If the call quality is above 70, the general quality considered good and with R-scale, MOS(Mean Option Score) is measured. MOS is used to benchmark voice codec performance. Large test group and large test samples are needed because the call quality and the sound quality are very subjective. MOS measures each test sample from 1(bad) to 5(good) in each listening test group, and calculates the average value. If MOS value is above 3.6, the quality is said to be fair and adequate for use. Parameters, which are affected the value of R, are related as below; The test network is setup as in Fig. 4, with 3 PAC and with each local network connected through routers to the proxy server and PNS. There are 10 sub-networks, PNS responsible for PPTP Server side, when a request is received from PAC for the Control-Connection, it replies and creates the tunnel between PACs. With this tunnel, a VPN network is created to PAC using PPP. PAC is responsible for PPTP Client side and becomes a member of the network by creating a tunnel to PNS. The proxy server uses SIP and to make VoIP calls, has SIP UA information. PNS is where PPTP Server Side is implemented and has PAC#1 and PAC#2's user-id and password, also has private IP pool to form VPN. There are 2 network interfaces in use. The local network interface connects the private network and the external network interface connects the Internet. There is 1 PPTP interface responsible for transferring encrypted GRE packets that are delivered from the external network interface, to the local network or to clients on other private network [7]. Here, 0 R, s I, d I, e I and A denote Signal-to Noise, Impairment transferred with voice, Delay Impairment, Low bandwidth code Impairment, Correction value, respectively. Table 1 describes user satisfactory level according to the R-scale as shown in ITU-'s G.109 Recommendation. If the R s value is below 50, then it is not practical in any use. Fig. 3. VPN Based SIP test environment PAC#1 and PAC#2 are VoIP terminals that implement PPTP Client Side, and have PNS's public IP and port number. To authenticate themselves at PNS, they also have their user-id and password information. Below are
4 the initialization and the call process. 1 1) To create the tunnel PAC#1 sends control con nection message to PNS like in PPTP control connection process. PNS replies. 2 2) Through the created tunnel, PAC#1 uses PPP to authenticate itself and receives the private IP address. 3 3) PAC#1 creates a virtual internal interface call ed pptp0 using the private IP address. 4 4) PAC#1 using SIP's registration function, regis ters its SIP information with the proxy server. From this stage VoIP calls can be made. 5 5) At PAC#2, step 1) ~ 4) is repeated and it is V oip call ready. 6 6) At PAC#1, the headpiece is lifted and PAC#2' s numbers are pressed (2134). 7 7) At PAC#1, a SIP messages travels through the tunnel to the proxy server. All messages trave ling the tunnel are encrypted. 8 8) At PNS, the packet with GRE header received from the external interface is decrypted and p rivate IP header's destination IP is retrieved. If the address is for the local network, forward to itself local interface, and if it's for a private terminal in other external network, forward to the external interface after re-encrypting through the tunnel to PAC#2. In this paper, to show that the overall quality of the calls made in the test system meets the standard quality (150ms to 200ms) by measuring the RTT value of the one-way delay. However PNS is involved with the decryption and can become a bottleneck in heavy traffic and its performance must be considered. 4.1 RTP Packet Format ERTP packet is transferred by UDP datagram's payload. It uses a very simple header format to eliminate the overload in applications. In common real-time applications needs high bandwidth, and to reduce the delay and to increase RTP transfer rate, message and header size is reduced. The Packet used in SIP using G codec has format of being a 64Byte IP packet. It is made up of an 8 Byte UDP header and a 32 Byte RTP packet. A RTP packet is further divided into a 12 Byte header and 24 Byte voice data. 64 Bytes are the overall size of the encrypted packet used in the test SIP application using G.723.1(6.3K) codec. Transferred voice data length varies with different codec used and are detailed below; G => 6.3Kbps, every 30ms transfer 24bytes G.729A => 8Kbps, every 10ms transfer 10bytes G.711 => 64Kbps, every 20ms transfer 160bytes Encapsulated IP Packet length varies as below; G (64bytes) private-ip header(20) + UDP header(8) + RTP header(12) + voice data(24) G.729A (50bytes) private-ip header(20) + UDP header(8) + RTP header(12) + voice data(10) G.711 (200bytes) private-ip header(20) + UDP header(8) + RTP header(12) + voice data(160) 4.2 Encapsulation Delay With emphasis on network overload, voice calls are tested using VoIP's SIP protocol on how many frames are most efficient in one packet for transfer. It is important to note the differences in performance when sending a packet with many frames for longer delay times and when sending a packet with lesser frames for shorter delay times. In this paper, SIP application uses 64 Byte frames in one packet. Fig. 4 shows the difference in overall delay with variation of number of frames in one packet. This is important as 64 Byte overhead header is added for encapsulation between PAC and PNS. It is important to save bandwidth with increasing number of VoIP terminals. However sending more frames in one packet will increase the delay time and the overall call quality will drop. Fig. 4. Network overload 4.3 Frames per Packet The most efficient ratio can be observed in Fig. 5. In this picture packet arrival interval is graphed against different frames per packet. Two center graphs are the optimal graphs for 99% quality, and upper and lower graphs are the worst case and the best case packet arrival graphs. To minimize the delay between terminals, the optimal number of frames is 2-3 per packet. Most commonly used internet telephony inserts pre-delay-frame in packets, and as internet telephony becomes popular, it is recommended to send 2-3 frames per packet.
5 Furthermore, RTT time varies with different codec when sending number of frames in one packet as well as the encrypted data length. For codec G.723.1, if a packet sends one frame, the total encrypted size is 64bytes, and for 2 frames, 88bytes, and 112bytes for 3 frames. In case of G.729A, the total encrypted size is 50bytes for one frame, 60bytes for two frames and 70bytes for three frames. The overall quality is acceptable as the maximum encrypted data length is 112bytes for G and 70bytes for G.729A, with the difference in total delay time being less than 4ms against the conventional VoIP telephony system. network), security issues with internet telephony can be minimized. However the PPTP protocol used in this paper dose not use encrypted Control Connection messages and authentication, and the whole system can be compromised by stealing the control connection message. This problem can be solved with L2TP. PPTP is on IP based network whereas L2TP is packet based and more versatile. It is expendable and uses certificate based IPSec. Despite that, IPSec's key management protocol ISAKMP/IKE is too complex to manage and that its implementation is limited, but with right infrastructure, these problems will vanish. For better security, VPN's L2TP and IPSec will be used which encrypts the control connection message and has authentication for future internet telephony implementation. ACKNOWLEDGMENT This work was supported by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD) (The Regional Research Universities Program/Chungbuk BIT Research-Oriented University Consortium). Fig. 5. Packet arrival interval time with respect to No. frames per packet V. CONCLUSIONS Internet Telephony system proposed in this paper, measures call success rate with 10 seconds calls. A tone was sent from one PAC to another PAC, and if the confirmation time was less then 10 seconds, a call was retried to make the total call time to about 15 seconds. After testing call for 24 hours under these methods, it was confirmed that the success rate was near 100%. In the test to measure the overall call quality, it was observed that the encapsulation delay time is introduced in the proposed system was at maximum about 5ms, and the difference in total delay time against the conventional internet telephony system was roughly 4-5ms. These results reflect that the call quality between the two systems is negligible. Using VoIP's SIP protocol for make voice calls with emphasis on network over load, the optimal number of frame in one packet was measured. A 64 Byte header is added for encapsulation between PAC and PNS, and as more terminals are present, the network traffic will increase and it's important to reduce the use of network bandwidth. However, sending a large number of frames in one packet will increase the total delay time and will decrease the call quality. SIP application used in this paper uses G codec, and sends 24 Bytes of voice data in one packet. In was concluded from testing with different number of frames per packet, that the optimal ratio was 2-3 frames per packet since the encapsulation process between PAC and PNS has the most significant effect on network traffic and that the acceptable delay time between two nodes is about 160ms to 170ms. In addition, it was shown that with VPN(Virtual private REFERENCES [1]. Percy, A. Understanding Latency in IP Telephony, Brook root Technology, [2]. Uyless Black, Internet Telephony: call processing protocols, Prentice Hall PTR, [3]. Kim S.T., Yoo, S. S., Lee, S. K., A Study on Internet Telephony using VPN, Journal of the Korean Institute of Communication Sciences, 2005, 30: [4]. TIA/EIA/TSB116, Voice Quality Recommendations for IP Telephony, March [5]. ITU-T Recommendation G.109, Definition of categories of Speech Transmission Quality, September [6]. ITU-T Recommendation G.107, The E-model, a Computational Model for Use in transmission Planning, May [7]. Hamzeh, K., Pall, G., Verthein, G., Taarud, J., Little, W., Zorn, G., Point-to-Point Tunneling
Development of Internet Phone(VoIP) for Voice Security on VPN Environment
International Conference on Convergence and Hybrid Information Technology 2008 Development of Internet Phone(VoIP) for Voice Security on VPN Environment Sang-Jo Youk 1, Seung-Sun Yoo 2, Bong-Keun Lee 3,
More informationSynopsis of Basic VoIP Concepts
APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter
More informationABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationVOIP Network Pre-Requisites
VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.
More informationNetwork Working Group
Network Working Group Request for Comments: 2637 Category: Informational K. Hamzeh Ascend Communications G. Pall Microsoft Corporation W. Verthein 3Com J. Taarud Copper Mountain Networks W. Little ECI
More informationA common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert
A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationAlcatel OmniPCX Enterprise
Alcatel OmniPCX Enterprise QoS for VoIP Overview 1 OBJECTIVE: Describe the essential parameters for QoS The QoS parameters regarding the data network IP Packet Transfer Delay (IPTD): Time for the packet
More informationL2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application
Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features
More informationVoice Quality Assessment for Mobile to SIP Call over Live 3G Network
Abstract 132 Voice Quality Assessment for Mobile to SIP Call over Live 3G Network G.Venkatakrishnan, I-H.Mkwawa and L.Sun Signal Processing and Multimedia Communications, University of Plymouth, Plymouth,
More informationVoice over IP (VoIP)
Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have
More informationIntroduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony
Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet
More informationGUIDELINES FOR VOIP NETWORK PREREQUISITES
GUIDELINES FOR VOIP NETWORK PREREQUISITES WHITE PAPER October 2016 Unified Networks Unified User Clients Unified Messaging Mobility 100+ Call Management Features Executive Summary This document contains
More informationCHAPTER 2 LITERATURE REVIEW
CHAPTER 2 LITERATURE REVIEW 2.1 FILE FORMATS Facsimile file format defines the typical way in which the information will be encoded. 2.1.1 Group 3 terminal file format The characteristics of G3 facsimile
More informationIntroduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationImproving QoS of VoIP over Wireless Networks (IQ-VW)
Improving QoS of VoIP over Wireless Networks (IQ-VW) Mona Habib & Nirmala Bulusu CS522 12/09/2002 1 Agenda Voice over IP (VoIP): Why? VoIP Protocols: H.323 and SIP Quality of Service (QoS) Wireless Networks
More informationTODAY AGENDA. VOIP Mobile IP
VOIP & MOBILE IP PREVIOUS LECTURE Why Networks? And types of Networks Network Topologies Protocols, Elements and Applications of Protocols TCP/IP and OSI Model Packet and Circuit Switching 2 TODAY AGENDA
More informationB.Eng. (Hons.) Telecommunications. Examinations for / Semester 1
B.Eng. (Hons.) Telecommunications Cohort: BTEL/12/FT Examinations for 2014-2015 / Semester 1 MODULE: IP TELEPHONY MODULE CODE: TELC 3107 Duration: 3 Hours Instructions to Candidates: 1. Answer all questions.
More informationApproaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches
Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Dr. Elmabruk M Laias * Department of Computer, Omar Al-mukhtar
More informationWhitepaper IP SLA: Jitter. plixer. International
Whitepaper IP SLA: Jitter 1 plixer Table of Contents Table of Contents Introduction IP SLA VoIP Measurement Tools Jitter Latency Packet Loss MOS ICPIF Score IOS Version Warning Steps to Configure the IP
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationConfiguring Client-Initiated Dial-In VPDN Tunneling
Configuring Client-Initiated Dial-In VPDN Tunneling Client-initiated dial-in virtual private dialup networking (VPDN) tunneling deployments allow remote users to access a private network over a shared
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationQoS in a SOHO Virtual Private Network for IP Telephony
CHAPTER 5 QoS in a SOHO Virtual Private Network for Telephony This chapter provides information about implementing QoS in an AVVID-enabled Small Office Home Office (SOHO) Virtual Private Network (VPN)
More informationInvestigation of Algorithms for VoIP Signaling
Journal of Electrical Engineering 4 (2016) 203-207 doi: 10.17265/2328-2223/2016.04.007 D DAVID PUBLISHING Todorka Georgieva 1, Ekaterina Dimitrova 2 and Slava Yordanova 3 1. Telecommunication Department,
More informationA B S T R A C T. Index Terms: MPPE; PPTP; RC4; Cipher; VPN; MSCHAPv2 I. INTRODUCTION
Performance and Strength Comparison Of Various Encryption Protocol of PPTP VPN. Anupriya Shrivastava,M A Rizvi National Institute of Technical Teacher s Training and Research Bhopal, India 1, 2 anushrivastava1989@gmail.com
More informationProtocol & Port Information for the deployment of. and. within IP Networks
Protocol & Port Information for the deployment of and within IP Networks SpliceCom Ltd The Hall Business Centre Berry Lane Chorleywood Herts WD3 5EX Phone: 01923-287700 Fax: 01923-287722 E-mail: info@splicecom.com
More informationComputer Networks Technologies and Services January 31 st, Question 11
Computer Networks Technologies and Services January 31 st, 2014 First and last name... Student ID...... Answers to multiple choice questions 1 2 3 4 5 6 7 8 9 10 Answers to essay questions Question 11
More informationComparison of QoS Performance Over WLAN, VoIP4 and VoIP6
Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Esra Musbah Mohammed Musbah 1 Khalid Hamed Bilal 2 Amin Babiker A./Nabi Mustafa 3 Abstract VoIP stands for voice over internet protocol. It is one
More informationBandwidth, Latency, and QoS for Core Components
Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page
More informationRSVP Support for RTP Header Compression, Phase 1
RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing
More informationChapter 11: Understanding the H.323 Standard
Página 1 de 7 Chapter 11: Understanding the H.323 Standard This chapter contains information about the H.323 standard and its architecture, and discusses how Microsoft Windows NetMeeting supports H.323
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationChapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols
More informationPerformance Management: Key to IP Telephony Success
Performance Management: Key to Telephony Success Alan Clark, President & CEO Telchemy, Incorporated http://www.telchemy.com Vo Performance Management Voice, Video and other Real Time Applications Vo Performance
More informationREACTION PAPER 01 TEL 500
TEL 500 Session Initiation Protocol Improvement Using Inter-Asterisk exchange Introduction: Within the VoIP network environment, H323, SIP and IAX are three protocols that solve the problem of voice packet
More informationLocation Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos
Location Based Advanced Phone Dialer A mobile client solution to perform voice calls over internet protocol Jorge Duda de Matos Superior Institute of Technology (IST) Lisbon, Portugal Abstract Mobile communication
More informationVPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009
VPN and IPsec Network Administration Using Linux Virtual Private Network and IPSec 04/2009 What is VPN? VPN is an emulation of a private Wide Area Network (WAN) using shared or public IP facilities. A
More informationPfR Voice Traffic Optimization Using Active Probes
PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationConfiguring L2TP over IPsec
CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over
More informationCisco How Virtual Private Networks Work
Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:
More informationPSTN Fallback. Finding Feature Information
The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the
More informationH.323. Definition. Overview. Topics
H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,
More informationZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes
ZyXEL V120 (V120 IP Attendant 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V120 IP Attendant...3 2. Setting up the V120...4 3. Auto Provision...7 4. V120
More informationAssessing Call Quality of VoIP and Data Traffic over Wireless LAN
Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Wen-Tzu Chen and Chih-Yuan Lee Institute of Telecommunications Management, National Cheng Kung University, No. 1 University Road, Tainan
More informationInternet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho
Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 642-845 Title : Optimizing Converged Cisco Networks Vendors : Cisco Version
More informationTroubleshooting Packet Loss. Steven van Houttum
Troubleshooting Packet Loss Steven van Houttum INTRODUCTION Steven van Houttum Consultant/Trainer MVP Office Server & Services (Skype for Business) TROUBLESHOOTING PACKET LOSS, IS IT REALLY THE NETWORK?
More informationFirewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
More informationAvaya PBX SIP TRUNKING Setup & User Guide
Avaya PBX SIP TRUNKING Setup & User Guide Nextiva.com (800) 285-7995 2 P a g e Contents Description... 3 Avaya IP PBX Configuration... 3 Licensing and Physical Hardware... 4 System Tab Configuration...
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationOneXS will provide users with a reference server (IP, FQDN, or other means to connect to the service). This must be obtained before setup can begin.
1 SIP Carriers 1.1 OneXS 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationPSTN Fallback. Finding Feature Information
The feature monitors congestion in the IP network and redirects calls to the Public Switched Telephone Network (PSTN) or rejects calls on the basis of network congestion. This feature can also use the
More informationReview on protocols of Virtual Private Network
Review on protocols of Virtual Private Network Shaikh Shahebaz 1, Sujay Madan 2, Sujata Magare 3 1 Student, Dept. Of MCA [JNEC College] Cidoco N-6, Aurangabad, Maharashtra, India 2 Student Dept. of MCA
More informationConfiguration information in this document is based on IC version 3.0, so the menus shown may vary slightly from your product implementation.
1 SIP Carriers 1.1 Telepacific 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be
More informationMeasurement QoS Parameters of VoIP Codecs as a Function of the Network Traffic Level
Measurement QoS Parameters of VoIP Codecs as a Function of the Network Traffic Level Jugoslav Jocić *, Zoran Veličković ** * Telekom Srbija AD, Prokuplje, Serbia ** College of Applied Technical Sciences,
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationSample excerpt. Virtual Private Networks. Contents
Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationFirewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
More informationVOIP SOLUTIONS. telecomsni
VOIP SOLUTIONS telecomsni Why are businesses turning to VoIP? Low cost In general, a telephone service via VoIP costs less than an equivalent service from traditional providers. There are also some cost
More information1 SIP Carriers. 1.1 LightBound Warnings Vendor Contact Vendor Web Site:
1 SIP Carriers 1.1 LightBound 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found
More informationVirtual Private Networks.
Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies
More informationUnderstanding RoIP Networks
White Paper Understanding RoIP Networks Revision 1.0 www.omnitronicsworld.com 1. INTRODUCTION TO RADIO OVER IP (ROIP) Radio over IP describes the application of Voice over Internet Protocol technology
More informationIP Office Technical Tip
IP Office Technical Tip Technical Tip No: 026 Configuring IP Office and IP Endpoints across The Public Internet via Manager in a SoHO environment Date: Product: IP Office Version: 2.0(x) Revision: 1.0
More informationRTP implemented in Abacus
Spirent Abacus RTP implemented in Abacus 编号版本修改时间说明 1 1. Codec that Abacus supports. G.711u law G.711A law G.726 G.726 ITU G.723.1 G.729 AB (when VAD is YES, it is G.729AB, when No, it is G.729A) G.729
More informationGSM Gateway High Performance GSM Gateway Solution
GSM Gateway High Performance GSM Gateway Solution WEB Setup Guide AP-GS1001 / AP-GS1002 / AP-GS1004 www.addpac.com Contents 1. WEB Connection 2. Network Setup 3. Language 4. GSM Setup 5. VoIP Setup 6.
More informationCS519: Computer Networks. Lecture 9: May 03, 2004 Media over Internet
: Computer Networks Lecture 9: May 03, 2004 Media over Internet Media over the Internet Media = Voice and Video Key characteristic of media: Realtime Which we ve chosen to define in terms of playback,
More informationOutline. Computer Communication and Networks. The Network Core. Components of the Internet. The Network Core Packet Switching Circuit Switching
Outline Computer Communication and Networks 1 Department of Computer Science & Information Technology University of Balochistan Lecture 03 1/26 2/26 Two major components The mesh of packet switches and
More informationWhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability
More informationApplication Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Abstract These Application Notes
More informationNetwork Security. Chapter 10 Security Protocols of the Data Link Layer
Network Security Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol () Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) Virtual Private Networks
More informationSeamless Traffic Migration between the Mobile and Fixed Networks
Data Traffic Migration Seamless Traffic Migration between the Mobile and Fixed Networks We have developed traffic migration technology for distributing communication traffic from mobile networks to fixed
More informationDPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0
DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any
More informationLatency on a Switched Ethernet Network
FAQ 07/2014 Latency on a Switched Ethernet Network RUGGEDCOM Ethernet Switches & Routers http://support.automation.siemens.com/ww/view/en/94772587 This entry is from the Siemens Industry Online Support.
More informationOvercoming Barriers to High-Quality Voice over IP Deployments
Whitepaper Overcoming Barriers to High-Quality Voice over IP Deployments Intel in Communications Overcoming Barriers to High-Quality Voice over IP Deployments Whitepaper Contents Executive Summary 1 Introduction
More informationImpact of Voice Coding in Performance of VoIP
Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationFINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material
FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding
More informationSecurity and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California
Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in
More informationIntroduction. H.323 Basics CHAPTER
CHAPTER 1 Last revised on: October 30, 2009 This chapter provides an overview of the standard and the video infrastructure components used to build an videoconferencing network. It describes the basics
More informationProblem verification during execution of H.323 signaling
Problem verification during execution of H.323 signaling 1 ESAD KADUSIC & 2 NATASA ZIVIC & 3 NARCIS BEHLILOVIC & 4 ALIJA VEGARA 1,3,4 Faculty of Electrical Engineering in Sarajevo Zmaja od Bosne, 71 000
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationWhite Paper Voice Quality Sound design is an art form at Snom and is at the core of our development utilising some of the world's most advance voice
White Paper Voice Quality Sound design is an art form at and is at the core of our development utilising some of the world's most advance voice quality engineering tools White Paper - Audio Quality Table
More informationMusic on Hold with IP Connectivity
Music on Hold with IP Connectivity And an introduction to Network Regions Abstract Music On Hold has long been a standard feature in Avaya communications systems. Traditional TDM based systems take a music
More informationVodafone MachineLink. PPTP Configuration Guide
Vodafone MachineLink PPTP Configuration Guide Document history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone MachineLink 4G (NWL-22)
More informationFragmenting and Interleaving Real-Time and Nonreal-Time Packets
CHAPTER 16 Fragmenting and Interleaving Real-Time and Nonreal-Time Packets Integrating delay-sensitive real-time traffic with nonreal-time data packets on low-speed links can cause the real-time packets
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationGrandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide
Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN
More informationSecure Telephony Enabled Middle-box (STEM)
Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components
More informationSecure Transmission for Interactive Three-Dimensional Visualization System
Secure Transmission for Interactive Three-Dimensional Visualization System 저자저널명발행기관 NDSL URL Yun, H.Y. ; Yoo, Sun Kook Journal of International Society for Simulation Surgery International Society for
More informationConfiguring Auto IP SLAs in IP SLAs Engine 3.0
This document describes the auto IP Service Level Agreements (SLAs) function in IP SLAs Engine 3.0, including the following: Auto-measure groups--each template, endpoint list, and scheduler can be configured
More informationLCOS Manual VoIP
LCOS 10.12 Manual VoIP Contents Contents Copyright...4...5 1.1 Introduction...5 1.2 VoIP implementation in LANCOM VoIP routers...6 1.2.1 Example applications...6 1.2.2 The central position of the LANCOM
More informationENSC 427 COMMUNICATION NETWORKS
ENSC 427 COMMUNICATION NETWORKS Implementation of VoIP over a Campus Wide Network Spring 2010 FINAL PROJECT Xuan Lu Kevan Thompson Zhiyu Zhou http://www.sfu.ca/~zzhou/project.html xla9@sfu.ca kjthomps@sfu.ca
More informationEarthLink Business SIP Trunking. ShoreTel 14.2 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking ShoreTel 14.2 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0
More information