SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
H.323, SIP, H460.17, ICE, DTLS-SRTP, WebRTC… different protocols for different things 
Unified Communications 
by innovaphone 
Jueves, 9 de Octubre 2014 
Victor M. Moracho Oliva 
vmo@innovaphone.com 
Area Sales Manager IBERIA
Fabricante Alemán 
Empresa tecnológica oriententada al sector profesional 
Comunicaciones IP para empresas cuidando el diseño y un manejo 
intuitivo: Diseño e Innovación. 
Fundada en 1997 por el Consejo Directivo actual. 
Las oficinas centrales se hallan en Sindelfingen (Stuttgart) 
y con otras 5 sedes en toda Europa. 
innovaphone AG no cotiza en Bolsa y es 100% capital privado. 
Bajo la marca „innovaphone PBX“ se engloba una completa solución de 
comunicaciones IP (Comunicaciones Unificadas - UC) para empresas. 
innovaphone AG
Agenda: Different Protocols for Different Things 
SIP vs. H.323 H.460.17 & STUN Server ICE & DTLS-SRTP 
WebRTC & ORTC 
The Real Time Multimedia Questions: Where am I and how do I find someone else? Am I allowed to make/receive a call? What sort of session – voice, video, messaging? 
–Endpoint Registration and Call Routing 
–Call Admission Control & Establishment 
–Media Negotiation & Media Transport
Unified Communications 
IP-DECT 
SIP Provider 
PBX 
Legacy PBX 
WiFi 
Analog Adapter 
ISDN 
Mobile Integration 
IP Phones 
IP PBX 
ISDN 
Cloud - IPVA 
innovaphone Complete Solution
SIP & H.323: Multiprotocolo y estándares 
Mayor escalabilidad e interoperabilidad máxima! 
Gateway 
Interfaces ISDN/Analog 
DSPs para Transcoding/Conferencing 
Relay para registros de números de llamada 
PBX 
H. 323 Gatekeeper / SIP Proxy 
Telco-Interfaces 
LDAP Server 
Conectores para 3rd Party Applications 
Linux Application Plattform 
Fax to Email 
Exchange Connector 
Reporting 
más… 
Aplicaciones UC 
myPBX UC Client (CTI/Presence/Chat/Video) 
Voicemail 
Audioconference Server 
Mobilityfunktion 
Queue Monitor
The „VoIP War“: SIP vs. H.323 
SIP 
H.323 
1996
SIP and H.323 are equivalent Similarities 
-Use RTP and RTCP for media transport 
-Support call routing through proxies/gatekeepers using username, phone numbers or URLs 
-Similar flows Differences 
-ITU and IETF 
-Encoding (ASN.1 vs.Text) 
-Standardized Feature sets 
-Conference control 
-Attended and blind transfer 
-Caller Preferences 
H.323 
SIP
SIP and H.323: pros and cons Advantages 
-H.323 is more teleco-oriented and provides decentralized (GWs, terminals,.) and well-defined architecture supporting peer-to-peer 
-SIP is more flexible (internet-oriented) and easier to develop and requiresonly a proxy server to route calls. 
While SIP is extremly flexible and can be adapted for the use of other applications, H.323 offers better network management and call control. 
INTEROPERABILITY!!! 
Disadvantages 
-H.323 any update of the standard requires backward compatibility with the existing standard. 
-SIP can result in interoperability problems due to different implementations of the standard. 
Both of them, SIP & H.323, are necessary to provide universal access and to support value-add IP services.
H.460.17 STUN Server
H.460.17 Basic protocol „without fireworks“, however you can set up a telephony scenario very easily. The innovative application: 
–So far for H.323 with UDP for RAS and TCP for H.225 
–Now is used from RAS inside H.225 
–Thereby can reach the TCP/TLS connection to the well-known Port 1720/1300 
–In order to let the Signaling in a Private Network over the inbound Mapping Advantages 
–Still safe and secure through TLS 
–The PBX can check external Devices Certification 
–For Siganalling no VPN is needed.
Configuration: directly on the Phone
STUN Server Configuration Actually you don‘t need one of your own, but you can use any if you still want to connect it. But: For test purposes we used one STUN Server. It was very easy to implement (<100 Lines Code) It is not neccesary to depend on foreign infrastructure as necessary For this case the STUN server is part of the NAT router so only one public IP address is needed
H.460.17/STUN 
Internet 
PBX 
STUN 
NAT 
NAT 
Fritz-Box 
Private Network 192.168.0.x outgoing call 
H.323 goes thru NAT via 
STUN in order to build the RTP Mapping 
Private Network 172.16.x.x NAT. Inbound Mapping for H.323/H.460.17 STUN carries out the RTP Mapping 
Note: Only works with ICE because it depends on where are the Phones and each of them is required to provide location 
STUN (Session Traversal Utilities for NAT) is a network protocol to allow an end host to discover its public IP address if it is located behind a NAT. The STUN server allows NAT clients to find out their public address. A STUN server allows IP Phones behind a firewall to setup calls outside of the local network.
H.460.17/STUN in a Home Office Szenario Home Office integration is realized currently over PPTP 
–Often desire for higher security (eg. IPSEC) 
–Architecture challenge, since PPTP is not always possible? (GuestWLAN etc.) The answer:: 
–Use of a standardized H.323 registration directly over the Internet via H.460.17 
–Admitted even in high security environments such Banks 
www 
PSTN 
1. Telefon registriert sich über das Internet via H.323/TLS an der PBX 
2. Der Ende zu Ende Weg erfolgt verschlüsselt via DTLS
ICE 
DTLS-SRTP
ICE (Interactive Connectivity Establishment):RFC 5245 
Protocol to find and select the network way between two terminals. DTLS-SRTP (DTLS Extension to Establish Keys for SRTP): RFC 5245 
Setup an encrypted conversation over an unsafe infrastructure What's this? 
Two new standards for connection of media channels 
Focus on communication over the public Internet, instead of only on the local network Why do we need now? 
Mandatory for WebRTC 
Meaningful standards, solve the problems that affect us 
Compatibility with peers in the future 
ICE & DTLS-SRTP: Motivation
The siganlling provide for each side an IP-Adress 
In local Networks is not problem to can set up a call 
ICE – Problem Solving 
The problem come when both sides are in different Networks 
Or what happens if both side have different IP versions.
Candidates are all network addresses (incl. Port), under which an endpoint could be reached. 
ICE – Candidates 
a=candidate:1 1 UDP 2130706431 172.16.4.62 16394 typ host a=candidate:1 2 UDP 2130706430 172.16.4.62 16395 typ host a=candidate:2 1 UDP 1694498815 145.253.157.4 50096 typ srflx raddr 172.16.4.62 rport 16394 a=candidate:2 2 UDP 1694498814 145.253.157.4 50097 typ srflx raddr 172.16.4.62 rport 16395 a=candidate:3 1 UDP 2121609471 fec0:9033::290:33ff:fe2f:3da 16394 typ host a=candidate:3 2 UDP 2121609470 fec0:9033::290:33ff:fe2f:3da 16395 typ host a=candidate:4 1 UDP 2121609471 2002:91fd:9d04:0:290:33ff:fe2f:3da 16394 typ host a=candidate:4 2 UDP 2121609470 2002:91fd:9d04:0:290:33ff:fe2f:3da 16395 typ host
Check the connectivity of each candidate pair using STUN 
Selection of an effective path through the controller 
ICE – Connectivity check
ICE – Interconnection 
The media stream is started on the selected path 
In case there is not working path, the call is terminated. 
Benefits 
RTP through NAT boundaries without VPN or Media Relay 
Selection of the network interface 
Selection between IPv4 and IPv6 
Prevent one-way audio and no audio
For encrypted calls (SRTP) both endpoints require a shared key. 
How to transfer the key safe from one end point to another? 
SRTP – „Key Exchange“
Key exchange with the signaling 
Hop-by-hop encryption 
All PBXs see the SRTP key 
SDES – „Key Exchange“
A compromised PBX can forward key and link data to an attacker. 
The attacker can then decrypt and listen and record conversations. 
SDES – Attack scenario
Key exchange in the media inband channel using DTLS 
End-to-end encryption 
Only the endpoints see the key in plain text 
DTLS-SRTP - „Key Exchange“
Advantages 
End-to-end encryption 
No confidence necessary in infrastructure 
Manual detection of man-in-the-middle attacks by Key Fingerprint Suitable for Internet telephony! Disadvantages 
Computational intensive 
Additional delay at the beginning of a conversation 
DTLS-SRTP – Assessment 
Configuration
What is WebRTC? Open standard for real-time communication within a web browser WITHOUT additional plugins Driven by Google, Mozilla Foundation and Opera Software WebRTC based on HTML5 and JavaScript WebRTC based based on various open-source codecs: Opus (Audio) VP8 (Video) Source Wikipedia: WebRTC was taken as an attack on the monopoly from Skype on the VoIP Desktop Appliccations,[7] when Microsoft wanted to put with Skype itself appears WebRTC.[8]
How does WebRTC work? WebRTC, establishes beyond corporate boundaries point-to-point connections. Several architectutal limitation were solved: Find direct ways behind different routes via STUN and ICE Support of required codecs (We focus on the G.711 audio) End to end encryption using DTLS 
Signalling 
Signalling 
Media
Technological structure of WebRTC @ innovaphone 
PSTN 
2. innoWebphone registers with the PBX as to Audio / Video Device. 
3. User selects WebRTC as 
Device to be controlled from 
1. Browser innoWebphone Ask for perimission to use Micro/Headset and Camera.Fragt einfach per Kontext nach Zugriffserlaubnis auf Headset / Kamera (later can be omitted) 
4. call setup to another subscriber via G.711
innovaphone WebRTC external 
www 
PSTN 
1. Browser innoWebphone 
Ask for perimission to use Micro/Headset and Camera.Fragt einfach per Kontext nach Zugriffserlaubnis auf Headset / Kamera (can also be a customized javascript widget in an individual design ) 
2. Browser application innoWebphone Registers with the PBX as audio / video device to 
3. The end-to-end path for audio / video data to that device will be establisched (STUN und ICE) 
4. This device can be like any other innovaphone device, achieved and controlled. 
Call 
Me
Innovaphone WebRTC DEMO
Very easy Configuration: Objects plus WebRTC capability
Advantages and additional Options with WebRTC Due to a more secure encryption method with DTLS a "key pair" is only known at the endpoints. 
innoWebphone can be much easier implemented as a „Javascript Widget“ into any existing website as a communication path. 
WebRTC allows through the option DATA to transfer other encrypted Content. Since innovaphone Application Sharing (View) is also based exclusively on browser technology, you don’t need any plugin. 
WebRTC will be supported on all browsers and is therefore usable across platforms (MacOS, Linux, Android, etc.). Interoperability 
Thanks to the support in the innovaphone PBX, it is possible to carry out an end-to-end connectivity without gateways and other "bottlenecks“.
How are other Vendors position in WebRTC 
Source: onsip http://www.onsip.com/files/images/Telecom-WebRTC-Infographic-OnSIP.png
WebRTC is here to stay Why is so attractive for developers: Manage multiple media channels HighPerforming Audio&Video by adapting to network Conditions Use in concert with HTML5 to create communications apps Easily create videoconferencing solutions Ensures that collaborating parties have the same technology Alliviates privacy and security fears of downloading plugins Disagreement with the use of SDP (Session Description Protocol) in WebRTC.: unneeded – much too high level an API arcane format – legacy and problematic offer/answer incompatibilities lack of API contact doesn’t truly solve goal of compatibility to legacy systems 
The Future of WebRTC: ORTC (Object RTC)
The Future Work 
2015
innovaphone AG 
Böblinger Straße 76 
D-71065 Sindelfingen 
Germany 
www.innovaphone.com 
info@innovaphone.com 
Vielen Dank für Ihre Aufmerksamkeit!

Weitere ähnliche Inhalte

Was ist angesagt?

Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityP1Security
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceVideoguy
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP VideoVideoguy
 
S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002Nam Nguyen
 
Lec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencingLec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencingShona Hira
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencingDom Mike
 
Clarity4050
Clarity4050Clarity4050
Clarity4050jonanrp
 
Matrix Telecom | ETERNITY IP-PBX
Matrix Telecom | ETERNITY IP-PBXMatrix Telecom | ETERNITY IP-PBX
Matrix Telecom | ETERNITY IP-PBXmatrixtelesol
 
Matrix Telecom Solutions: ETERNITY PE - IP-PBX
Matrix Telecom Solutions: ETERNITY PE  - IP-PBXMatrix Telecom Solutions: ETERNITY PE  - IP-PBX
Matrix Telecom Solutions: ETERNITY PE - IP-PBXMatrix Comsec
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing TechnologyVideoguy
 
Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications
 
VoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol ProblemsVoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol Problemsseanhn
 
Remote setup guide
Remote setup guideRemote setup guide
Remote setup guideVoicent
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsP1Security
 
I pv6 tutorial
I pv6 tutorialI pv6 tutorial
I pv6 tutorialFred Bovy
 

Was ist angesagt? (20)

Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 
Sangoma SS7 Gateway Training
Sangoma SS7 Gateway TrainingSangoma SS7 Gateway Training
Sangoma SS7 Gateway Training
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing Service
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002S13. sip trunk to trunk 2015 1002
S13. sip trunk to trunk 2015 1002
 
Linkedin
LinkedinLinkedin
Linkedin
 
14 Net Quintum
14 Net Quintum14 Net Quintum
14 Net Quintum
 
ETERNITY NE
ETERNITY  NEETERNITY  NE
ETERNITY NE
 
Lec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencingLec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencing
 
Lec40 45 video conferencing
Lec40 45 video conferencingLec40 45 video conferencing
Lec40 45 video conferencing
 
Clarity4050
Clarity4050Clarity4050
Clarity4050
 
Matrix Telecom | ETERNITY IP-PBX
Matrix Telecom | ETERNITY IP-PBXMatrix Telecom | ETERNITY IP-PBX
Matrix Telecom | ETERNITY IP-PBX
 
Matrix Telecom Solutions: ETERNITY PE - IP-PBX
Matrix Telecom Solutions: ETERNITY PE  - IP-PBXMatrix Telecom Solutions: ETERNITY PE  - IP-PBX
Matrix Telecom Solutions: ETERNITY PE - IP-PBX
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing Technology
 
Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014
 
VoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol ProblemsVoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol Problems
 
Remote setup guide
Remote setup guideRemote setup guide
Remote setup guide
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elements
 
I pv6 tutorial
I pv6 tutorialI pv6 tutorial
I pv6 tutorial
 

Ähnlich wie 2014 innovaphone different protocols for different things

Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVideoguy
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Voice over internet_protocol
Voice over internet_protocolVoice over internet_protocol
Voice over internet_protocolammugowri
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth AplicationEr Bhaduri
 
H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...Videoguy
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptxmashiur
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...cscpconf
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoguy
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2Carl Ford
 
Lec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencingLec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencingDom Mike
 
SIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationSIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationFlowroute
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1Adebayo Ojo
 

Ähnlich wie 2014 innovaphone different protocols for different things (20)

Vo ip
Vo ipVo ip
Vo ip
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
Voip basics
Voip   basicsVoip   basics
Voip basics
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Voice over internet_protocol
Voice over internet_protocolVoice over internet_protocol
Voice over internet_protocol
 
Ip
IpIp
Ip
 
Ip
IpIp
Ip
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
R43019698
R43019698R43019698
R43019698
 
H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2
 
Voip security
Voip securityVoip security
Voip security
 
Lec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencingLec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencing
 
SIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communicationSIP trunking: Weapon of mass communication
SIP trunking: Weapon of mass communication
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

2014 innovaphone different protocols for different things

  • 1. H.323, SIP, H460.17, ICE, DTLS-SRTP, WebRTC… different protocols for different things Unified Communications by innovaphone Jueves, 9 de Octubre 2014 Victor M. Moracho Oliva vmo@innovaphone.com Area Sales Manager IBERIA
  • 2. Fabricante Alemán Empresa tecnológica oriententada al sector profesional Comunicaciones IP para empresas cuidando el diseño y un manejo intuitivo: Diseño e Innovación. Fundada en 1997 por el Consejo Directivo actual. Las oficinas centrales se hallan en Sindelfingen (Stuttgart) y con otras 5 sedes en toda Europa. innovaphone AG no cotiza en Bolsa y es 100% capital privado. Bajo la marca „innovaphone PBX“ se engloba una completa solución de comunicaciones IP (Comunicaciones Unificadas - UC) para empresas. innovaphone AG
  • 3. Agenda: Different Protocols for Different Things SIP vs. H.323 H.460.17 & STUN Server ICE & DTLS-SRTP WebRTC & ORTC The Real Time Multimedia Questions: Where am I and how do I find someone else? Am I allowed to make/receive a call? What sort of session – voice, video, messaging? –Endpoint Registration and Call Routing –Call Admission Control & Establishment –Media Negotiation & Media Transport
  • 4. Unified Communications IP-DECT SIP Provider PBX Legacy PBX WiFi Analog Adapter ISDN Mobile Integration IP Phones IP PBX ISDN Cloud - IPVA innovaphone Complete Solution
  • 5. SIP & H.323: Multiprotocolo y estándares Mayor escalabilidad e interoperabilidad máxima! Gateway Interfaces ISDN/Analog DSPs para Transcoding/Conferencing Relay para registros de números de llamada PBX H. 323 Gatekeeper / SIP Proxy Telco-Interfaces LDAP Server Conectores para 3rd Party Applications Linux Application Plattform Fax to Email Exchange Connector Reporting más… Aplicaciones UC myPBX UC Client (CTI/Presence/Chat/Video) Voicemail Audioconference Server Mobilityfunktion Queue Monitor
  • 6. The „VoIP War“: SIP vs. H.323 SIP H.323 1996
  • 7. SIP and H.323 are equivalent Similarities -Use RTP and RTCP for media transport -Support call routing through proxies/gatekeepers using username, phone numbers or URLs -Similar flows Differences -ITU and IETF -Encoding (ASN.1 vs.Text) -Standardized Feature sets -Conference control -Attended and blind transfer -Caller Preferences H.323 SIP
  • 8. SIP and H.323: pros and cons Advantages -H.323 is more teleco-oriented and provides decentralized (GWs, terminals,.) and well-defined architecture supporting peer-to-peer -SIP is more flexible (internet-oriented) and easier to develop and requiresonly a proxy server to route calls. While SIP is extremly flexible and can be adapted for the use of other applications, H.323 offers better network management and call control. INTEROPERABILITY!!! Disadvantages -H.323 any update of the standard requires backward compatibility with the existing standard. -SIP can result in interoperability problems due to different implementations of the standard. Both of them, SIP & H.323, are necessary to provide universal access and to support value-add IP services.
  • 10. H.460.17 Basic protocol „without fireworks“, however you can set up a telephony scenario very easily. The innovative application: –So far for H.323 with UDP for RAS and TCP for H.225 –Now is used from RAS inside H.225 –Thereby can reach the TCP/TLS connection to the well-known Port 1720/1300 –In order to let the Signaling in a Private Network over the inbound Mapping Advantages –Still safe and secure through TLS –The PBX can check external Devices Certification –For Siganalling no VPN is needed.
  • 12. STUN Server Configuration Actually you don‘t need one of your own, but you can use any if you still want to connect it. But: For test purposes we used one STUN Server. It was very easy to implement (<100 Lines Code) It is not neccesary to depend on foreign infrastructure as necessary For this case the STUN server is part of the NAT router so only one public IP address is needed
  • 13. H.460.17/STUN Internet PBX STUN NAT NAT Fritz-Box Private Network 192.168.0.x outgoing call H.323 goes thru NAT via STUN in order to build the RTP Mapping Private Network 172.16.x.x NAT. Inbound Mapping for H.323/H.460.17 STUN carries out the RTP Mapping Note: Only works with ICE because it depends on where are the Phones and each of them is required to provide location STUN (Session Traversal Utilities for NAT) is a network protocol to allow an end host to discover its public IP address if it is located behind a NAT. The STUN server allows NAT clients to find out their public address. A STUN server allows IP Phones behind a firewall to setup calls outside of the local network.
  • 14. H.460.17/STUN in a Home Office Szenario Home Office integration is realized currently over PPTP –Often desire for higher security (eg. IPSEC) –Architecture challenge, since PPTP is not always possible? (GuestWLAN etc.) The answer:: –Use of a standardized H.323 registration directly over the Internet via H.460.17 –Admitted even in high security environments such Banks www PSTN 1. Telefon registriert sich über das Internet via H.323/TLS an der PBX 2. Der Ende zu Ende Weg erfolgt verschlüsselt via DTLS
  • 16. ICE (Interactive Connectivity Establishment):RFC 5245 Protocol to find and select the network way between two terminals. DTLS-SRTP (DTLS Extension to Establish Keys for SRTP): RFC 5245 Setup an encrypted conversation over an unsafe infrastructure What's this? Two new standards for connection of media channels Focus on communication over the public Internet, instead of only on the local network Why do we need now? Mandatory for WebRTC Meaningful standards, solve the problems that affect us Compatibility with peers in the future ICE & DTLS-SRTP: Motivation
  • 17. The siganlling provide for each side an IP-Adress In local Networks is not problem to can set up a call ICE – Problem Solving The problem come when both sides are in different Networks Or what happens if both side have different IP versions.
  • 18. Candidates are all network addresses (incl. Port), under which an endpoint could be reached. ICE – Candidates a=candidate:1 1 UDP 2130706431 172.16.4.62 16394 typ host a=candidate:1 2 UDP 2130706430 172.16.4.62 16395 typ host a=candidate:2 1 UDP 1694498815 145.253.157.4 50096 typ srflx raddr 172.16.4.62 rport 16394 a=candidate:2 2 UDP 1694498814 145.253.157.4 50097 typ srflx raddr 172.16.4.62 rport 16395 a=candidate:3 1 UDP 2121609471 fec0:9033::290:33ff:fe2f:3da 16394 typ host a=candidate:3 2 UDP 2121609470 fec0:9033::290:33ff:fe2f:3da 16395 typ host a=candidate:4 1 UDP 2121609471 2002:91fd:9d04:0:290:33ff:fe2f:3da 16394 typ host a=candidate:4 2 UDP 2121609470 2002:91fd:9d04:0:290:33ff:fe2f:3da 16395 typ host
  • 19. Check the connectivity of each candidate pair using STUN Selection of an effective path through the controller ICE – Connectivity check
  • 20. ICE – Interconnection The media stream is started on the selected path In case there is not working path, the call is terminated. Benefits RTP through NAT boundaries without VPN or Media Relay Selection of the network interface Selection between IPv4 and IPv6 Prevent one-way audio and no audio
  • 21. For encrypted calls (SRTP) both endpoints require a shared key. How to transfer the key safe from one end point to another? SRTP – „Key Exchange“
  • 22. Key exchange with the signaling Hop-by-hop encryption All PBXs see the SRTP key SDES – „Key Exchange“
  • 23. A compromised PBX can forward key and link data to an attacker. The attacker can then decrypt and listen and record conversations. SDES – Attack scenario
  • 24. Key exchange in the media inband channel using DTLS End-to-end encryption Only the endpoints see the key in plain text DTLS-SRTP - „Key Exchange“
  • 25. Advantages End-to-end encryption No confidence necessary in infrastructure Manual detection of man-in-the-middle attacks by Key Fingerprint Suitable for Internet telephony! Disadvantages Computational intensive Additional delay at the beginning of a conversation DTLS-SRTP – Assessment Configuration
  • 26.
  • 27. What is WebRTC? Open standard for real-time communication within a web browser WITHOUT additional plugins Driven by Google, Mozilla Foundation and Opera Software WebRTC based on HTML5 and JavaScript WebRTC based based on various open-source codecs: Opus (Audio) VP8 (Video) Source Wikipedia: WebRTC was taken as an attack on the monopoly from Skype on the VoIP Desktop Appliccations,[7] when Microsoft wanted to put with Skype itself appears WebRTC.[8]
  • 28. How does WebRTC work? WebRTC, establishes beyond corporate boundaries point-to-point connections. Several architectutal limitation were solved: Find direct ways behind different routes via STUN and ICE Support of required codecs (We focus on the G.711 audio) End to end encryption using DTLS Signalling Signalling Media
  • 29. Technological structure of WebRTC @ innovaphone PSTN 2. innoWebphone registers with the PBX as to Audio / Video Device. 3. User selects WebRTC as Device to be controlled from 1. Browser innoWebphone Ask for perimission to use Micro/Headset and Camera.Fragt einfach per Kontext nach Zugriffserlaubnis auf Headset / Kamera (later can be omitted) 4. call setup to another subscriber via G.711
  • 30. innovaphone WebRTC external www PSTN 1. Browser innoWebphone Ask for perimission to use Micro/Headset and Camera.Fragt einfach per Kontext nach Zugriffserlaubnis auf Headset / Kamera (can also be a customized javascript widget in an individual design ) 2. Browser application innoWebphone Registers with the PBX as audio / video device to 3. The end-to-end path for audio / video data to that device will be establisched (STUN und ICE) 4. This device can be like any other innovaphone device, achieved and controlled. Call Me
  • 32. Very easy Configuration: Objects plus WebRTC capability
  • 33. Advantages and additional Options with WebRTC Due to a more secure encryption method with DTLS a "key pair" is only known at the endpoints. innoWebphone can be much easier implemented as a „Javascript Widget“ into any existing website as a communication path. WebRTC allows through the option DATA to transfer other encrypted Content. Since innovaphone Application Sharing (View) is also based exclusively on browser technology, you don’t need any plugin. WebRTC will be supported on all browsers and is therefore usable across platforms (MacOS, Linux, Android, etc.). Interoperability Thanks to the support in the innovaphone PBX, it is possible to carry out an end-to-end connectivity without gateways and other "bottlenecks“.
  • 34. How are other Vendors position in WebRTC Source: onsip http://www.onsip.com/files/images/Telecom-WebRTC-Infographic-OnSIP.png
  • 35. WebRTC is here to stay Why is so attractive for developers: Manage multiple media channels HighPerforming Audio&Video by adapting to network Conditions Use in concert with HTML5 to create communications apps Easily create videoconferencing solutions Ensures that collaborating parties have the same technology Alliviates privacy and security fears of downloading plugins Disagreement with the use of SDP (Session Description Protocol) in WebRTC.: unneeded – much too high level an API arcane format – legacy and problematic offer/answer incompatibilities lack of API contact doesn’t truly solve goal of compatibility to legacy systems The Future of WebRTC: ORTC (Object RTC)
  • 37. innovaphone AG Böblinger Straße 76 D-71065 Sindelfingen Germany www.innovaphone.com info@innovaphone.com Vielen Dank für Ihre Aufmerksamkeit!