Академический Документы
Профессиональный Документы
Культура Документы
Introduction to VoIP
Technology Tutorials
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Agenda
What is VoIP? VoIP Components VoIP Control Plane Protocols VoIP Data Plane Protocols CODECs Design Considerations and Architectures VoIP Performance QoS Mechanisms for VoIP Security VoIP Management Lifecycle On the Horizon
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
What is VoIP?
Telephony over an IP network
PSTN
Cell Phone
Traditional Phone
Internet
IP Phone
IP Phone
Soft Phone
4
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
G.729 8kbps compression, 20 msec frame size = 24 kbps 1544 / 24 = 64 calls per T1
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Basic Components
End-user devices
IP-enabled Phones Soft Phones
Media Gateway
Convert signal from digital to analog (and vice versa)
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Advanced Components
Interactive Voice Response (IVR)
A computerized system designed to interact with a caller
Voicemail System
A centralized system for sending, storing and retrieving messages
Emergency Responder
A system in charge of ensuring that 911 calls will go through
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Example Network
10
Example Network
11
Example Network
12
Example Network
13
Example Network
14
Example Network
15
Example Network
16
17
Server
LAN
IP Phone IP Phone
5. Called party accepts the call by picking up the telephone receiver. An accept message is sent back to the caller.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
18
server
LAN
IP Phone IP-to-PSTN Gateway
PSTN
Ordinary Telephone 6. Called party accepts the call by picking up the telephone receiver. An accept message is sent back to the gateway.
19
7.Gateway converts the PSTN accept message into VoIP accept message and sends it back to the caller
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
H.323
H.248/Megaco
Others:
Avaya proprietary
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
20
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
21
SIP Components
INVITE sip:joe@sip.com From: bob@opnet.com To:joe@sip.com Call-ID:12345@opnet.com
INVITE sip:joe@123.23.44.3 From: bob@opnet.com To:joe@sip.com Call-ID:12345@opnet.com OK 200 From: bob@opnet.com To:joe@sip.com Call-ID:12345@opnet.com
IP Network
IP Phone bob@opnet.com IP Phone joe@sip.com
OK 200 From: bob@opnet.com To:joe@sip.com Call-ID:12345@opnet.com
ACK joe@sip.com
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
22
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
23
24
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
25
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
26
Compressed RTP
Technique for reducing the bandwidth requirements for RTP-UDP-IP headers Reduces all three headers from 40 bytes to 2-4 bytes
RTP Header = 12 bytes UDP Header = 8 bytes IP Header = 20 bytes
Utilizes the fact that much the headers contents remain the same from packet to packet Critical for low-speed links However, it adds delay! (~3ms) Versions:
RFC 2508, CRTP for low-speed serial links RFC 3545, Enhanced CRTP for high delay, packet loss, and reordering
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
27
Agenda: CODECs
What is VoIP? VoIP Components VoIP Control Plane Protocols VoIP Data Plane Protocols CODECs Design Considerations and Architectures VoIP Performance QoS Mechanisms for VoIP Security VoIP Management Lifecycle On the Horizon
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
28
CODECs
Conversion analog digital Sampling: create blocks of data at fixed intervals Each block contains a fixed number of bytes Customizable to insert more or less samples in one IP packet
Small packets less delay, but more layer 2/3 overhead Large packets more delay, less layer 2/3 overhead
CODEC
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
29
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
30
31
Premised-Based solutions
Switching and intelligence is local On-site equipment: phones, servers, switches Advantages Flexibility in services deployment Disadvantages High startup cost Maintenance (servers, upgrades, etc) More difficulty growing the system
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
32
Call Centers
Different options:
Hosted / On-demand Premised-based Outsourced
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
33
VS.
SIP H323 MGCP
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
34
35
Sound Quality
Sound quality depends on many factors
Telephone quality Type of CODEC used Higher compression leads to lower quality Network performance Quality of Service Metrics
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
36
Delay How much time elapses between when an utterance is spoken and when it is played back at the receiver
Must be less than 150 ms for real-time conversations
37
MOS VQMon
Provided by Telchemy, Inc Extension of the E-Model Incorporates the effects of time-varying IP network impairments
PESQ
ITU-T Recommendation P.862
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
38
39
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
40
Data Flows
As the queue length grows, so does the average delay The varying length of the queue adds to the jitter
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
41
Priority Queue
WFQ Queues
Scheduler
Data Flows
Best-effort Queue
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
42
Rate Limiter
Priority Queue
WFQ Queues
Scheduler
Data Flows
Best-effort Queue
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
43
QoS Mechanisms
Ethernet QoS 802.1p IntServ A mechanism for a reserving resources on devices via RSVP signaling
Fine-grained Not scalable
DiffServ A static mechanism for marking packets at the edge of the network and giving per-class treatment within the network
Coarse Scalable No signaling
MPLS-DiffServ-TE
Using label switched paths to control the paths that packets take through the network as well as the treatment they receive at each hop
Aggregate RSVP
More scalable IntServ.
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
44
Agenda: Security
What is VoIP? VoIP Components VoIP Control Plane Protocols VoIP Data Plane Protocols CODECs Design Considerations and Architectures VoIP Performance QoS Mechanisms for VoIP Security VoIP Management Lifecycle On the Horizon
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
45
Security
Main types of attacks:
Denial of Service (DoS /DDoS)
Saturation of the targeted server(s)
VoIP Eavesdropping
Tapping into VoIP calls
Vishing
VoIP + phishing = vishing
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
46
Security
Protection at 3-level
Network architecture
Separate VoIP traffic (ex: Hosting VoIP on a VPN) Separate trusted and untrusted zones
Protocols
Encryption Standard protocols could be more exposed than proprietary
Users
Training of employees
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
47
48
Re-engineering Adding capacity or QoS mechanisms Tuning queues based on measured data Trending traffic and predict future bottlenecks Testing configuration changes
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
49
50
Hype Cycle
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
51
Mobile VoIP
Different approaches:
Mobile device uses SIP directly Bridging SIP/RTP into the mobile networks SS7 infrastructure i2Telecom, Tango Networks, Outsmart, NewStep, BridgePort, BroadSoft
Voice-over-Wifi is already here Fixed and Mobile telephony Convergence (FMC): provide seamless roaming from GSM/CDMA to VoIP
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
52
IMS Convergence
IP based telephony and multimedia services Convergence of voice, data, video and mobile technology Features:
IP-based QoS-enabled Common multimedia services platform Independent of the users location
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
53
SIP information
http://www.sipforum.org/
VoIP tester
http://www.testyourvoip.com/
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
54
Documentation References
H.323 ITU Standard for Voice/Video over IP SIP Session Initialization Protocol, IETF RFC 2543 MGCP Media Gateway Control Protocol, IETF RFC 2705 H.248, Megaco, IETF RFC 2885 SCCP Skinny Client Control Protocol RTP Real-time Transport Protocol, IETF RFC 1889 RTCP RTP Control Protocol, IETF RFC 1889 CRTP for low-speed serial links, RFC 2508 Enhanced CRTP for high delay, packet loss, and reordering, RFC 2508 ITU-T.37 Procedures for the Transfer of Facsimile Data Via Store-and-forward on the Internet ITU-T.38 Procedures for Real-time Group 3 Facsimile Communication over IP Networks
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
55
Tuesday 09:00 to 12:00 Thursday 09:00 to 12:00 Tuesday 14:00 to 17:00 Thursday 09:00 to 12:00 Monday 16:00 to 18:00 Wednesday 16:00 to 18:00 Thursday 16:00 to 18:00 Monday 09:00 to 12:00 Thursday 09:00 to 12:00
56
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
Take-Away Points
Plan
Monitor
Stay Informed
57
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
RTP
12 bytes
UDP
8 bytes
Bandwidth:
64 kbps +
40 bytes 20 msec
= 80 kbps
CONFIDENTIAL RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. 2008 OPNET Technologies, Inc.
58