SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Seminar on
VoIP SERVICES
By: Pankaj Saharan
Student ID: 77197A
Masters in Mobile Computing
Contents
• How VoIP came into picture?
• What is VoIP exactly?
• What are the advantages?
• How can we use it?
• What are the different standards?
• Who are the different service providers?
• What technology the leader in VoIP is using?
• What are the challenges ahead
• How is the future
Circuit-Switched Telephony
Traditional PSTN Approach
SCP

SS7 Signaling Network
Signaling

Class 5
Switch

Class 4
Switch

Most service logic in
local switches, rest in
SCPs

Circuit-based Trunks
64 kb/s digital voice

Typically analog “loop”,
conversion to digital at
local switch

Media stream

• Data travels over a parallel (but separate) network

Class 5
Switch
When was the last time you called the phone company just to say, "I am just
calling to say thank you for my phone service being so reliable?"

“The truth is phone companies work to have an uptime of 99.999%”.

Then,

VOIP ???????
“Voice over IP (VoIP) defines a way to carry voice calls over an IP
network including the digitization and packetization of the voice
streams. IP Telephony utilizes the VoIP standards to create a
telephony system where higher level features such as advanced call
routing, voice mail, contact centers, etc., can be utilized.”
What Is VoIP?

Public Switched
Telephone Network

Initially, PC to PC
voice calls over the
Internet

Gateways allow PCs to
also reach phones

PSTN
(NY)
Gateway

Multimedia
PC
Gateway

IP Network
Multimedia
PC

PSTN
(DC)

…or phones to reach
phones
Origins of VoIP
Lessons learned
• Internet Telephony software for multimedia PCs (1995)
• Users frustrated by poor QoS, difficulty of use, lack of interoperability
S ta nd ards a re critical f or s ucces s
Coding/de coding (c ode c) be twe en analog voic e and digi tal packe ts
L oc ati ng the par ty you want to cal l
Signali ng to s et up, m
odify, tear down the voic e c all
Acc es s to ve rtic al ser vi ces (c all forwar di ng, 3-way calling, …)
Gate ways to P N
ST

•

•
•
•
•
•
VoIP
Goals and Potential Benefits
• Reduced cost
• Mobility
• Consolidation of voice, data on a single network
• Simplify infrastructure, operations; provide bundled services

• Support for intelligent terminals as well as phones
• Increased flexibility
• Multiple bit rates, multiple media types, richer signaling

• Separation of service control from switching/routing
• Accelerate new service development, increase end-user control, evolve from VoIP
towards advanced services

• Expansion of competition
Packet Voice Transport
• Key targets for voice call service quality:
• Average packet loss: < 2%
• End-to-end (lip-to-ear) delay: < 150 ms for comfortable conversation

• Packet loss cannot be corrected by retransmission (TCP), because the
packets arrive too late to be useful
• Use RTP (Real-time Transport Protocol) over UDP (User Datagram
Protocol) for voice or video transport
• Payload ID, sequence numbers, timestamps, monitoring via RTCP

• Packet and buffer lengths limited by constraint on end-to-end delay
• Typical codes: G.711 (64 kb/s), G.729 (8 kb/s) G.723 (~ 6 kb/s)
• Transmitted bit rates depend on overheads, optional silence suppression
Enterprise VOIP architecture (2)
Wireless VoIP
NETGEAR- Skype WiFi Phone
• A mobile WiFi phone that enables you (without a PC) to
make free Internet calls to anyone else in the world who
has Skype.
• Makes calls wherever you have open WiFi access
• Communicates with ordinary phones worldwide for
pennies a minute
• Manages your contact list and displays who's available
to talk
• Designed to deploy Wireless Encryption Protocol
(WEP) for WiFi security.
Some standards used in VOIP
What is SIP?

“

Session Initiation Protocol - An application
layer signaling protocol that defines
initiation, modification and termination of
interactive, multimedia communication
sessions between users.
IETF RFC 2543 Session Initiation Protocol

”
SIP Messages – Methods and Responses

SIP components communicate by exchanging SIP messages:

•

SIP Methods:
– INVITE – Initiates a call by inviting
user to participate in session.
– ACK - Confirms that the client has
received a final response to an
INVITE request.
– BYE - Indicates termination of the
call.
– CANCEL - Cancels a pending
request.
– REGISTER – Registers the user
agent.
– OPTIONS – Used to query the
capabilities of a server.
– INFO – Used to carry out-of-bound
information, such as DTMF digits.

•

SIP Responses:
–
–
–
–
–
–

1xx - Informational Messages.
2xx - Successful Responses.
3xx - Redirection Responses.
4xx - Request Failure Responses.
5xx - Server Failure Responses.
6xx - Global Failures Responses.
Simplified SIP Call Setup and Teardown

Proxy Server

User Agent
INVITE

Location/Redirect Server
INVITE
302
(Moved Temporarily)

User Agent

Proxy Server

ACK
INVITE
INVITE
302
(Moved Temporarily)
ACK

Call
Setup

180 (Ringing)
200 (OK)
ACK

Media
Path
Call
Teardown

180 (Ringing)
200 (OK)
ACK

INVITE
180 (Ringing)
200 (OK)
ACK

RTP MEDIA PATH
BYE

BYE

BYE

200 (OK)

200 (OK)

200 (OK)
SIMPLE (SIP for IM and Presence)
Simplified Example
lts.ncsc.mil

telcordia.com
Presence
server

Proxy
SUBSCRIBE
peter@telcordia.com

Linda

SUBSCRIBE
NOTIFY
NOTIFY

Proxy
Update
Presence

Peter

Linda subscribes to notifications of changes in Peter’s status:
Off-line, on-line, busy, away, available, ...
SIP – Design Framework
• SIP was designed for:
• Integration with existing IETF protocols.
• Scalability and simplicity.
• Mobility.
• Easy feature and service creation.
What is H.323?

“

Describes terminals and other entities that provide
multimedia communications services over Packet
Based Networks (PBN) which may not provide a
guaranteed Quality of Service. H.323 entities may
provide real-time audio, video and/or data
communications.
ITU-T Recommendation H.323 Version 4

”
H.323 Components

Gatekeeper

Multipoint
Control Unit

Packet Based
Networks
Terminal

Circuit Switched
Networks
Gateway
Simplified H.323 Call Setup
– Both endpoints have previously
registered with the gatekeeper.
– Terminal A initiate the call to the
gatekeeper. (RAS messages are
exchanged).
– The gatekeeper provides
information for Terminal A to
contact Terminal B.
– Terminal A sends a SETUP message
to Terminal B.
– Terminal B responds with a Call
Proceeding message and also
contacts the gatekeeper for
permission.
– Terminal B sends a Alerting and
Connect message.
– Terminal B and A exchange H.245
messages to determine master slave,
terminal capabilities, and open
logical channels.
– The two terminals establish RTP
media paths.

Terminal A

Gatekeeper

Terminal B

1. ARQ
2. ACF
3. SETUP
4. Call Proceeding
5. ARQ
6. ACF
7.Alerting
8.Connect
H.245 Messages
RTP Media Path
RAS messages
Call Signaling Messages
Note: This diagram only illustrates a simple pointto-point call setup where call signaling is not routed
to the gatekeeper. Refer to the H.323
recommendation for more call setup scenarios.
Some VOIP Service providers
sult,
…as a re
software
to fall
e
expected
use Skyp
M people AT&T and MCI are
an 41 M
ues of
“More th
05 reven
bined 20 5%”
com
)
n or 1
ne 2005
by $7.4 B ess Week (20 Ju
Busin
ail”
new tr
lazed a eek (30 May
b
e has iness W
“Skyp
Bus
2005)

s struck
radical ha
ström the
“Zenn
2005)
again”
(30 May
ss week
Busine
mbent
od of incu
“The peri y is over”
nc
5 May
complace
, Daiwa (2
mes Enck
Ja
2005)
“It’s fr
ee. It’
s a ph
eno
2005) Dow Jones N menon”
ewswi
re (28
April

“Th
e
dou most p
btle
opu
ss
serv
la
ice” the w r ever
orld
's m Interne
t
ost
Ame
vira downl
rica
o
l tel
s Ne
ecom ads an
two
d
rk (1
5 Ja
nua
ry 2
005
)

“Better quality at no cost”
Jason Donahue, Meiosys (30 May 2005)
To G
“Sk oogle
is
y
com pe” is to se
a
put
t
er” o call rch an
som
d
200
eon ….“To
4)
e ov
USA
er y
Tod
our
ay (
17 D
ece
mbe
r
“Skype, wh
eth
“It's
not, has bec er you like it or
no ex
ome the iPo
the t
a
d of the
Internet tele
eleco ggeratio
phony world
n to
m ind
neve
”
Jeff Pulver
s
r be
(20 April 20
the s ustry wil ay
05)
Bus
l
ame”
2005 iness We
ek (3
)
0 Ma
y

“Every now and then a company [Skype] comes along
with an idea that’s not only good and marketable but
that captures the spirit of the moment”
FierceWireless (2005)
“Distributed Peer-to-Peer Overlay approach for IP
Telephony”
With very rich functionality
Send any kind of file
Find other Skype users
Global Directory
Make conference calls
Instant Messaging
Online Presence

Groups ($)

Wallet ($)

Contact list
Voice content market ($)
Call any phone ($)

Expressive Content ($)

Get calls from any phone on
your Skype client ($)

Forward calls to any
number ($)
Video

Leave voicemail ($)
With a fast-growing ecosystem
Voice Content
Marketplace

Digital Goods
Marketplace

1000+
Developers
200+ Hardware
devices labeled as
Skype-compatible

30+ partnerships
with world-class
companies

10,000+ Affiliates

150+ Skype-enabled
Applications
Example(2)
Example (3)
VOIP PHONES: Five of the most interesting IP telephones for VOIP
Top Economic and Technical Challenges for VoIP Deployment

- Which are the most critical?

Consumer
Subscription
Development/Deploy
ment
Revenue Assurance
Taxation
QoS
Standards (IETF, ITU,
ANSI/ATIS)
E911
Security
Lawful Surveillance
0.00%

10.00%

20.00%

30.00%

40.00%
VoIP Security Issues
VoIP…….
• Adds new access points to the corporate network
• Adds new devices that can be attacked or used to launch attacks
• Adds new protocols to be used to launch threats
• Adds a new channel for blended threats…
VoIP Security Axioms
• Voice networks are targets
• Data and voice segmentation is key
• Telephony devices don’t support
confidentiality
• IP-phones provide access to datavoice segments
• PC-based IP phones require open
access

• PC-based IP phones are
especially susceptible to attacks
• Controlling the voice-to-data
segment interaction is key
• Establishing identity is key
• Rogue devices pose serious
threats
• Secure and monitor all voice
servers and segments
VoIP Security Challenges
• Quality of Service (QoS)
• Latency
• Jitter
• Packet loss

• Security Breaches
• Access
• Disruption
• Confidentiality and privacy

• Network Elements
•
•
•
•
•
•

Denial of Service (DoS)
Power failure
Viruses, Trojan Horse
Physical security
Operating System
Life and Safety (E-911)

• 802.11

• Protocols
• H.323
• SIP
Issues in accessing emergency services
• Identify call as emergency call (large number of different national emergency
numbers)
• Information on the location of the caller.
• Routing emergency call to the appropriate emergency center.
• Delivering call with CLI and providing call back possibility.
Future Vision….
My Guess at the future:

• High speed wireless access
• Collaboration Age
• SIP trunks from carriers
• Large scale adoption of video
• Telecommunications Mega-Mergers
• IP TV
• P2P-SIP Hybrid Model for VoIP
• SIP Growth

What do you think ?
Questions…

Kiitos!!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Voip Voice over IP IP telephony
Voip Voice over IP IP telephony Voip Voice over IP IP telephony
Voip Voice over IP IP telephony Premchand92
 
Security Challenges In VoIP
Security Challenges In VoIPSecurity Challenges In VoIP
Security Challenges In VoIPTomGilis
 
VoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONVoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONKarama Said(BEng,MSc)
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLRajan Kumar
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IPVideoguy
 
Wimax and VoIP Presentation
Wimax and VoIP PresentationWimax and VoIP Presentation
Wimax and VoIP PresentationMario B.
 
VOIP business model
VOIP business modelVOIP business model
VOIP business modelLatte Media
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?broadconnect
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Modelsguesta5f2fb
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3Vishnu M Dinesan
 
Final report of dcn
Final report of dcnFinal report of dcn
Final report of dcnMohsin Arif
 

Was ist angesagt? (20)

Voip Voice over IP IP telephony
Voip Voice over IP IP telephony Voip Voice over IP IP telephony
Voip Voice over IP IP telephony
 
Security Challenges In VoIP
Security Challenges In VoIPSecurity Challenges In VoIP
Security Challenges In VoIP
 
Voip Ppt
Voip PptVoip Ppt
Voip Ppt
 
VoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONVoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATION
 
VoIP
VoIPVoIP
VoIP
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IP
 
Wimax and VoIP Presentation
Wimax and VoIP PresentationWimax and VoIP Presentation
Wimax and VoIP Presentation
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 
VOIP business model
VOIP business modelVOIP business model
VOIP business model
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
voip gateway
 voip gateway voip gateway
voip gateway
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
VoIP Research Paper
VoIP Research PaperVoIP Research Paper
VoIP Research Paper
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Models
 
Research paper on VOIP Technology
Research paper on VOIP TechnologyResearch paper on VOIP Technology
Research paper on VOIP Technology
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3
 
Final report of dcn
Final report of dcnFinal report of dcn
Final report of dcn
 
Voip
VoipVoip
Voip
 

Ähnlich wie VOIP services (20)

VOIP security
VOIP securityVOIP security
VOIP security
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
VoIP
VoIPVoIP
VoIP
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
Voip
VoipVoip
Voip
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
VOIP
VOIPVOIP
VOIP
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
MULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSMULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKS
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 
VoIP
VoIPVoIP
VoIP
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
voip elements by Karan singh cypher
voip elements by Karan singh cypher voip elements by Karan singh cypher
voip elements by Karan singh cypher
 
Ip
IpIp
Ip
 
Ip
IpIp
Ip
 
ccna project
ccna projectccna project
ccna project
 
4 g
4 g4 g
4 g
 

Mehr von Pankaj Saharan

Startup Equity - Startup summer camp, 2014
Startup Equity - Startup summer camp, 2014Startup Equity - Startup summer camp, 2014
Startup Equity - Startup summer camp, 2014Pankaj Saharan
 
Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...
Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...
Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...Pankaj Saharan
 
Demand-supply-analysis (Nokia)
Demand-supply-analysis (Nokia)Demand-supply-analysis (Nokia)
Demand-supply-analysis (Nokia)Pankaj Saharan
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPankaj Saharan
 
PESTE analysis - Nokia
PESTE analysis - NokiaPESTE analysis - Nokia
PESTE analysis - NokiaPankaj Saharan
 
Do security toolbars actually prevent phishing attacks
Do security toolbars actually prevent phishing attacksDo security toolbars actually prevent phishing attacks
Do security toolbars actually prevent phishing attacksPankaj Saharan
 
Service Oriented & Model Driven Architectures
Service Oriented & Model Driven ArchitecturesService Oriented & Model Driven Architectures
Service Oriented & Model Driven ArchitecturesPankaj Saharan
 
Web Services Foundation Technologies
Web Services Foundation TechnologiesWeb Services Foundation Technologies
Web Services Foundation TechnologiesPankaj Saharan
 
Building an effective product strategy (Early stage start-ups) - UX India, 2013
Building an effective product strategy (Early stage start-ups) - UX India, 2013Building an effective product strategy (Early stage start-ups) - UX India, 2013
Building an effective product strategy (Early stage start-ups) - UX India, 2013Pankaj Saharan
 

Mehr von Pankaj Saharan (9)

Startup Equity - Startup summer camp, 2014
Startup Equity - Startup summer camp, 2014Startup Equity - Startup summer camp, 2014
Startup Equity - Startup summer camp, 2014
 
Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...
Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...
Enterprise job vs Entrepreneurship @ Entrepreneurship Days Event, Lahti, Finl...
 
Demand-supply-analysis (Nokia)
Demand-supply-analysis (Nokia)Demand-supply-analysis (Nokia)
Demand-supply-analysis (Nokia)
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - Nokia
 
PESTE analysis - Nokia
PESTE analysis - NokiaPESTE analysis - Nokia
PESTE analysis - Nokia
 
Do security toolbars actually prevent phishing attacks
Do security toolbars actually prevent phishing attacksDo security toolbars actually prevent phishing attacks
Do security toolbars actually prevent phishing attacks
 
Service Oriented & Model Driven Architectures
Service Oriented & Model Driven ArchitecturesService Oriented & Model Driven Architectures
Service Oriented & Model Driven Architectures
 
Web Services Foundation Technologies
Web Services Foundation TechnologiesWeb Services Foundation Technologies
Web Services Foundation Technologies
 
Building an effective product strategy (Early stage start-ups) - UX India, 2013
Building an effective product strategy (Early stage start-ups) - UX India, 2013Building an effective product strategy (Early stage start-ups) - UX India, 2013
Building an effective product strategy (Early stage start-ups) - UX India, 2013
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

VOIP services

  • 1. Seminar on VoIP SERVICES By: Pankaj Saharan Student ID: 77197A Masters in Mobile Computing
  • 2. Contents • How VoIP came into picture? • What is VoIP exactly? • What are the advantages? • How can we use it? • What are the different standards? • Who are the different service providers? • What technology the leader in VoIP is using? • What are the challenges ahead • How is the future
  • 3. Circuit-Switched Telephony Traditional PSTN Approach SCP SS7 Signaling Network Signaling Class 5 Switch Class 4 Switch Most service logic in local switches, rest in SCPs Circuit-based Trunks 64 kb/s digital voice Typically analog “loop”, conversion to digital at local switch Media stream • Data travels over a parallel (but separate) network Class 5 Switch
  • 4. When was the last time you called the phone company just to say, "I am just calling to say thank you for my phone service being so reliable?" “The truth is phone companies work to have an uptime of 99.999%”. Then, VOIP ???????
  • 5. “Voice over IP (VoIP) defines a way to carry voice calls over an IP network including the digitization and packetization of the voice streams. IP Telephony utilizes the VoIP standards to create a telephony system where higher level features such as advanced call routing, voice mail, contact centers, etc., can be utilized.”
  • 6. What Is VoIP? Public Switched Telephone Network Initially, PC to PC voice calls over the Internet Gateways allow PCs to also reach phones PSTN (NY) Gateway Multimedia PC Gateway IP Network Multimedia PC PSTN (DC) …or phones to reach phones
  • 7. Origins of VoIP Lessons learned • Internet Telephony software for multimedia PCs (1995) • Users frustrated by poor QoS, difficulty of use, lack of interoperability S ta nd ards a re critical f or s ucces s Coding/de coding (c ode c) be twe en analog voic e and digi tal packe ts L oc ati ng the par ty you want to cal l Signali ng to s et up, m odify, tear down the voic e c all Acc es s to ve rtic al ser vi ces (c all forwar di ng, 3-way calling, …) Gate ways to P N ST • • • • • •
  • 8.
  • 9.
  • 10. VoIP Goals and Potential Benefits • Reduced cost • Mobility • Consolidation of voice, data on a single network • Simplify infrastructure, operations; provide bundled services • Support for intelligent terminals as well as phones • Increased flexibility • Multiple bit rates, multiple media types, richer signaling • Separation of service control from switching/routing • Accelerate new service development, increase end-user control, evolve from VoIP towards advanced services • Expansion of competition
  • 11. Packet Voice Transport • Key targets for voice call service quality: • Average packet loss: < 2% • End-to-end (lip-to-ear) delay: < 150 ms for comfortable conversation • Packet loss cannot be corrected by retransmission (TCP), because the packets arrive too late to be useful • Use RTP (Real-time Transport Protocol) over UDP (User Datagram Protocol) for voice or video transport • Payload ID, sequence numbers, timestamps, monitoring via RTCP • Packet and buffer lengths limited by constraint on end-to-end delay • Typical codes: G.711 (64 kb/s), G.729 (8 kb/s) G.723 (~ 6 kb/s) • Transmitted bit rates depend on overheads, optional silence suppression
  • 12.
  • 13.
  • 16. NETGEAR- Skype WiFi Phone • A mobile WiFi phone that enables you (without a PC) to make free Internet calls to anyone else in the world who has Skype. • Makes calls wherever you have open WiFi access • Communicates with ordinary phones worldwide for pennies a minute • Manages your contact list and displays who's available to talk • Designed to deploy Wireless Encryption Protocol (WEP) for WiFi security.
  • 18. What is SIP? “ Session Initiation Protocol - An application layer signaling protocol that defines initiation, modification and termination of interactive, multimedia communication sessions between users. IETF RFC 2543 Session Initiation Protocol ”
  • 19. SIP Messages – Methods and Responses SIP components communicate by exchanging SIP messages: • SIP Methods: – INVITE – Initiates a call by inviting user to participate in session. – ACK - Confirms that the client has received a final response to an INVITE request. – BYE - Indicates termination of the call. – CANCEL - Cancels a pending request. – REGISTER – Registers the user agent. – OPTIONS – Used to query the capabilities of a server. – INFO – Used to carry out-of-bound information, such as DTMF digits. • SIP Responses: – – – – – – 1xx - Informational Messages. 2xx - Successful Responses. 3xx - Redirection Responses. 4xx - Request Failure Responses. 5xx - Server Failure Responses. 6xx - Global Failures Responses.
  • 20. Simplified SIP Call Setup and Teardown Proxy Server User Agent INVITE Location/Redirect Server INVITE 302 (Moved Temporarily) User Agent Proxy Server ACK INVITE INVITE 302 (Moved Temporarily) ACK Call Setup 180 (Ringing) 200 (OK) ACK Media Path Call Teardown 180 (Ringing) 200 (OK) ACK INVITE 180 (Ringing) 200 (OK) ACK RTP MEDIA PATH BYE BYE BYE 200 (OK) 200 (OK) 200 (OK)
  • 21. SIMPLE (SIP for IM and Presence) Simplified Example lts.ncsc.mil telcordia.com Presence server Proxy SUBSCRIBE peter@telcordia.com Linda SUBSCRIBE NOTIFY NOTIFY Proxy Update Presence Peter Linda subscribes to notifications of changes in Peter’s status: Off-line, on-line, busy, away, available, ...
  • 22. SIP – Design Framework • SIP was designed for: • Integration with existing IETF protocols. • Scalability and simplicity. • Mobility. • Easy feature and service creation.
  • 23. What is H.323? “ Describes terminals and other entities that provide multimedia communications services over Packet Based Networks (PBN) which may not provide a guaranteed Quality of Service. H.323 entities may provide real-time audio, video and/or data communications. ITU-T Recommendation H.323 Version 4 ”
  • 24. H.323 Components Gatekeeper Multipoint Control Unit Packet Based Networks Terminal Circuit Switched Networks Gateway
  • 25. Simplified H.323 Call Setup – Both endpoints have previously registered with the gatekeeper. – Terminal A initiate the call to the gatekeeper. (RAS messages are exchanged). – The gatekeeper provides information for Terminal A to contact Terminal B. – Terminal A sends a SETUP message to Terminal B. – Terminal B responds with a Call Proceeding message and also contacts the gatekeeper for permission. – Terminal B sends a Alerting and Connect message. – Terminal B and A exchange H.245 messages to determine master slave, terminal capabilities, and open logical channels. – The two terminals establish RTP media paths. Terminal A Gatekeeper Terminal B 1. ARQ 2. ACF 3. SETUP 4. Call Proceeding 5. ARQ 6. ACF 7.Alerting 8.Connect H.245 Messages RTP Media Path RAS messages Call Signaling Messages Note: This diagram only illustrates a simple pointto-point call setup where call signaling is not routed to the gatekeeper. Refer to the H.323 recommendation for more call setup scenarios.
  • 26. Some VOIP Service providers
  • 27. sult, …as a re software to fall e expected use Skyp M people AT&T and MCI are an 41 M ues of “More th 05 reven bined 20 5%” com ) n or 1 ne 2005 by $7.4 B ess Week (20 Ju Busin ail” new tr lazed a eek (30 May b e has iness W “Skyp Bus 2005) s struck radical ha ström the “Zenn 2005) again” (30 May ss week Busine mbent od of incu “The peri y is over” nc 5 May complace , Daiwa (2 mes Enck Ja 2005) “It’s fr ee. It’ s a ph eno 2005) Dow Jones N menon” ewswi re (28 April “Th e dou most p btle opu ss serv la ice” the w r ever orld 's m Interne t ost Ame vira downl rica o l tel s Ne ecom ads an two d rk (1 5 Ja nua ry 2 005 ) “Better quality at no cost” Jason Donahue, Meiosys (30 May 2005) To G “Sk oogle is y com pe” is to se a put t er” o call rch an som d 200 eon ….“To 4) e ov USA er y Tod our ay ( 17 D ece mbe r “Skype, wh eth “It's not, has bec er you like it or no ex ome the iPo the t a d of the Internet tele eleco ggeratio phony world n to m ind neve ” Jeff Pulver s r be (20 April 20 the s ustry wil ay 05) Bus l ame” 2005 iness We ek (3 ) 0 Ma y “Every now and then a company [Skype] comes along with an idea that’s not only good and marketable but that captures the spirit of the moment” FierceWireless (2005)
  • 28. “Distributed Peer-to-Peer Overlay approach for IP Telephony”
  • 29. With very rich functionality Send any kind of file Find other Skype users Global Directory Make conference calls Instant Messaging Online Presence Groups ($) Wallet ($) Contact list Voice content market ($) Call any phone ($) Expressive Content ($) Get calls from any phone on your Skype client ($) Forward calls to any number ($) Video Leave voicemail ($)
  • 30.
  • 31. With a fast-growing ecosystem Voice Content Marketplace Digital Goods Marketplace 1000+ Developers 200+ Hardware devices labeled as Skype-compatible 30+ partnerships with world-class companies 10,000+ Affiliates 150+ Skype-enabled Applications
  • 34. VOIP PHONES: Five of the most interesting IP telephones for VOIP
  • 35. Top Economic and Technical Challenges for VoIP Deployment - Which are the most critical? Consumer Subscription Development/Deploy ment Revenue Assurance Taxation QoS Standards (IETF, ITU, ANSI/ATIS) E911 Security Lawful Surveillance 0.00% 10.00% 20.00% 30.00% 40.00%
  • 36. VoIP Security Issues VoIP……. • Adds new access points to the corporate network • Adds new devices that can be attacked or used to launch attacks • Adds new protocols to be used to launch threats • Adds a new channel for blended threats…
  • 37. VoIP Security Axioms • Voice networks are targets • Data and voice segmentation is key • Telephony devices don’t support confidentiality • IP-phones provide access to datavoice segments • PC-based IP phones require open access • PC-based IP phones are especially susceptible to attacks • Controlling the voice-to-data segment interaction is key • Establishing identity is key • Rogue devices pose serious threats • Secure and monitor all voice servers and segments
  • 38. VoIP Security Challenges • Quality of Service (QoS) • Latency • Jitter • Packet loss • Security Breaches • Access • Disruption • Confidentiality and privacy • Network Elements • • • • • • Denial of Service (DoS) Power failure Viruses, Trojan Horse Physical security Operating System Life and Safety (E-911) • 802.11 • Protocols • H.323 • SIP
  • 39. Issues in accessing emergency services • Identify call as emergency call (large number of different national emergency numbers) • Information on the location of the caller. • Routing emergency call to the appropriate emergency center. • Delivering call with CLI and providing call back possibility.
  • 40.
  • 42. My Guess at the future: • High speed wireless access • Collaboration Age • SIP trunks from carriers • Large scale adoption of video • Telecommunications Mega-Mergers • IP TV • P2P-SIP Hybrid Model for VoIP • SIP Growth What do you think ?