Voip (Voice Over Internet Protocol)

Total Page:16

File Type:pdf, Size:1020Kb

Voip (Voice Over Internet Protocol) Seminar 2004 VoIP-Voice over Internet Protocol Department of Electronics & Communication Govt Engineering College Thrissur VoIP (Voice over Internet Protocol) Submitted On Submitted by 15-10-04 Lakshmi Menon S7 ECE 630 Co-ordinator:Muneera C R Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol ACKNOWLEDGEMENT First,and foremost I thank God Almighty for making this venture a success. I extend my sincere gratitude to Prof. Indiradevi, Head of Electronics and Communication Department, Govt Engineering College, Thrissur for providing me with necessary infrastructure. I would like to convey a deep sense of gratitude to the seminar co-ordinator Mrs. C R Muneera for the timely advices. I also extend my sincere thanks to my friends for their help. Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol ABSTRACT The development of very fast, inexpensive microprocessors and special-purpose switching chips, coupled with highly reliable fibre-optic transmission systems, has made it possible to build economical, ubiquitous, high speed packet-based data networks. Similarly, the development of very fast, inexpensive digital signal processors (DSPs) has made it practical to digitize and compress voice and fax signals into data packets. The natural evolution of these two developments is to combine digitized voice and fax packets with packet data, creating integrated data-voice networks. The voice-over-Internet protocol (VoIP) technology allows voice information to pass over IP data networks. Primarily, the cost savings that accrue from operating a single, shared network have motivated this convergence of telecommunications and data communications. VoIP allows you to make telephone calls using a computer network, over a data network like the Internet. VoIP converts the voice signal from your telephone into a digital signal that travels over the Internet then converts it back at the other end so you can speak to anyone with a regular phone number. Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol INDEX PAGE S.No TOPIC NO. BASIC FLOW OF VoIP NETWORK 1 VOICE GATEWAY 2 A TYPICAL VoIP NETWORK 3 APPLICATIONS 4 IDENTIFICATION OF MAJOR SYSTEM COMPONENTS • Gateways • Gatekeepers 5 • IP Telephones • PC Software Phones VoIP PRODUCTS • Hard Phones 6 • Soft Phones VoIP QoS (Quality of Service) ISSUES • Delay 7 • Lost Packet Compensation • Echo Compensation ADVANTAGES OF USING VoIP 8 TECHNICAL BARRIERS 9 FUTURE OF VoIP TELEPHONY 10 CONCLUSION 11 REFERENCES 12 Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol BASIC FLOW OF VOIP NETWORK The VoIP networks replace the traditional public-switched telephone networks (PSTNs), as these can perform the same functions as the PSTN networks. The functions performed include signaling, databasing, call connect and disconnect, and coding- decoding. Signaling. Signaling in a VoIP network is accomplished by the exchange of datagram messages between the components. The format of these messages is covered by the standard datalink layer protocols. Database services. Database services are a way to locate an endpoint and translate the addressing that two networks use; for example, the PSTN uses phone numbers to identify endpoints, while a VoIP network could use an IP address and port numbers to identify an endpoint. A call control database contains these mappings and translations. Call connect and disconnect (bearer control). The connection of a call is made by two endpoints opening communication sessions between each other. In the PSTN,the public (or private) switch connects logical channels through the network to complete the calls. In a VoIP implementation, a multimedia stream (audio, video, or both) is transported in real time. The connection path is the bearer channel and represents the voice or video content being delivered. When communication is complete, the IP sessions are released and, optionally, network resources are freed. CODEC operations. Voice communication is analogue, while data networking is digital. Analogue waveforms are converted into digital information by using a coder-decoder (CODEC). Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol VOICE GATEWAY The VoIP network acts as a gateway to the existing PSTN network. This gateway forms the interface for transportation of the voice content over the IP network. Gateways are responsible for call origination, call detection, analogue-to-digital conversion of voice, and creation of voice packets (CODEC functions). Voice(analogue and/or digital) compression, echo cancellation, silence suppression, and statistics gathering are their optional features. The gateways must also perform some of the database services, such as phone number translations, host lookup, and signaling. The extent of gateway functionalities is based on the VoIP-enabling products used. Fig. 1 shows the architecture of a typical gateway. The DSP in a gateway is responsible for signal processing functions such as analogue- to-digital conversion of voice signals, voice compression, echo cancellation, and voice- activity detection. The functions like call origination, call detection, signaling, and phone number translations are performed by the microprocessor. Gateways exist in several forms; for example, the gateway could be a dedicated telecommunication equipment chassis, or even a generic PC running VoIP software. FIG 1 ARCHITECTURE OF A TYPICAL GATEWAY Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol A TYPICAL VOIP NETWORK Fig. 2 shows a typical VoIP network. The IP network should ensure smooth delivery of voice and signaling information to the VoIP elements. Since the IP network is to carry both voice and data, it must be able to prioritize the voice traffic. This prioritization is required for real-time VoIP applications to ensure that voice traffic is unaffected by other network traffic. Without prioritization, the voice packets may be bogged down by heavy data traffic like large file transfers using file transfer protocol (FTP).The voice packets are encapsulated with real-time protocol (RTP) and real-time control protocol (RTCP) for real-time transfer. The resource reservation protocol (RSVP) is used at the networking gateways (such as the routers) to reserve a particular amount of bandwidth for real-time applications (VoIP, video multicasting, etc). FIG 2 A TYPICAL FULL SERVICE VOIP NETWORK Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol Unlike the PCM data streams in circuitswitched telephony, VoIP data travels over the networks in packets. In VoIP digitized voice is bundled into IP packets and sent out into the network for delivery. Routers, switches, and other network equipment direct the packets to their destination IP address. This mode is called packetswitched telephony. The transport of voice packets is affected by several factors, such as the amount of bandwidth available in the network connection, the delay that the packet experiences, and any packet loss or corruption that occurs. The ability of the network to deliver the voice packets quickly and consistently is referred to as Quality of Service (QoS). Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol APPLICATIONS A wide variety of applications are enabled by the transmission of VoIP networks. The first application, shown in Figure 1, is a network configuration of an organization with many branch offices (e.g., a bank) that wants to reduce costs and combine traffic to provide voice and data access to the main office. This is accomplished by using a packet network to provide standard data transmission while at the same time enhancing it to carry voice traffic along with the data. Typically, this network configuration will benefit if the voice traffic is compressed. Voice over packet provides the interworking function (IWF), which is the physical implementation of the hardware and software that allows the transmission of combined voice and data over the packet network. The interfaces the IWF must support in this case are analog interfaces, which directly connect to telephones or key systems. The IWF must emulate the functions of both a private branch exchange (PBX) for the telephony terminals at the branches, as well as the functions of the telephony terminals for the PBX at the home office. FIGURE 1. BRANCH OFFICE APPLICATION Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol A second VoIP application, shown in Figure 2, is a trunking application. In this scenario, an organization wishes to send voice traffic between two locations over the packet network and replace the tie trunks used to connect the PBXs at the locations. This application usually requires the IWF to support a higher-capacity digital channel than the branch application, such as a T1/E1 interface of 1.544 or 2.048 Mbps. The IWF emulates the signaling functions of a PBX, resulting in significant savings to companies' communications costs. FIGURE 2. INTEROFFICE TRUNKING APPLICATION A third application of VoIP software is interworking with cellular networks, as shown in Figure 3. The voice data in a digital cellular network is already compressed and packetized for transmission over the air by the cellular phone. Packet networks can then transmit the compressed cellular voice packet, saving a tremendous amount of bandwidth. The IWF provides the Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol transcoding function required to convert the cellular voice data to the
Recommended publications
  • Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction
    Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction Eversheds Sutherland is pleased to present REDIAL, our annual in-depth analysis of key Telephone Consumer Protection Act (TCPA) issues and trends. REDIAL reports on issues affecting the industries that face TCPA class action liability. Did you know? 2ND 100,000 3X For the fourth consecutive year, The FCC has reported that as many The TCPA imposes liability of TCPA cases are the second most as 100,000 cell phone numbers $500 per call, text or fax, trebled filed type of case in federal are reassigned every day. to $1,500 if the sender’s conduct courts nationwide. is deemed willful. Eversheds Sutherland Industry Knowledge and Focus Few industries are immune from TCPA liability. In 2016, the insurance, financial services, energy and health sectors were uniquely affected by TCPA litigation. REDIAL analyzes key legal issues affecting these industries. Eversheds Sutherland tracks daily all TCPA cases filed across the country. This allows us to spot trends and keep our clients informed. We understand the law and our clients’ businesses, allowing us to design compliance and risk management programs uniquely suited to our clients' specific needs and to spot issues before they result in litigation. When litigation is filed, Eversheds Sutherland’s TCPA team has the depth of experience necessary to zealously defend its clients’ interests in court. Why Eversheds Sutherland? STRENGTH in representing STRENGTH in knowing STRENGTH in advising
    [Show full text]
  • Phoneypot: Data-Driven Understanding of Telephony Threats
    Phoneypot: Data-driven Understanding of Telephony Threats Payas Gupta Bharat Srinivasan Vijay Balasubramaniyan Mustaque Ahamad New York University Georgia Institute of Technology Pindrop Security Georgia Institute of Technology Abu Dhabi [email protected] [email protected] New York University Abu Dhabi [email protected] [email protected] Abstract—Cyber criminals are increasingly using robocalling, the telephony channel can be attributed to the availability of voice phishing and caller ID spoofing to craft attacks that are IP telephony (Voice over Internet Protocol). Such calls can being used to scam unsuspecting users who have traditionally be made at no or low cost at scale in an automated fashion trusted the telephone. It is necessary to better understand similar to email spam, and criminals are already exploiting telephony threats to effectively combat them. Although there the telephony channel to craft attacks such as voice phishing exist crowd sourced complaint datasets about telephony abuse, (vishing). Unfortunately, attacks that utilize the telephone as a such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important resource are more successful because people in the past have information. We believe honeypot technologies can be used to trusted the telephony channel. In fact, telephony has reportedly augment telephony abuse intelligence and improve its quality. become the weak link even for web security because cyber However, a telephony honeypot presents several new challenges criminals have used social engineering over the phone to reset that do not arise in other traditional honeypot settings. We online banking credentials to steal money [48].
    [Show full text]
  • Landline Free Ebook
    FREELANDLINE EBOOK Rainbow Rowell | 368 pages | 30 Jul 2015 | Orion Publishing Co | 9781409152125 | English | London, United Kingdom Landline () - IMDb A landline telephone also known as Landline lineland-linemain linehome phonelandlinefixed-lineand wireline is a phone that uses a metal wire or optical fiber Landline line for transmission as distinguished Landline a mobile cellular line Landline, which uses radio waves for transmission. China had more than any other country at million and the United States was second with million. The United Kingdom had The statistics show that the total number of fixed-telephone subscribers in the Landline was about 1. A fixed phone line a line that Landline not a mobile phone line can be hard-wired or cordless and typically refers to the operation of wireless devices or systems in fixed locations such as homes. Landline wireless devices usually derive their Landline power from the utility mains electricity, unlike mobile wireless or portable wireless, which tend to be battery- powered. Although mobile and portable systems can be used in Landline locations, efficiency and bandwidth are compromised Landline with fixed systems. Mobile or portable, battery-powered Landline systems can be used as Landline backups Landline fixed Landline in case of a power blackout or natural disaster. The term landline is also used Landline describe a connection between two or more points that consists Landline a Landline physical cable, as opposed to an always-available private link that is actually implemented as a circuit in a wired switched system usually the public switched telephone network. So-called leased lines are invariably of the latter type; Landline implications of a land line in this context are security and survivability.
    [Show full text]
  • Standard Operating Procedures
    WARRANT PROCEDURES Standard Operating Procedure: #1 Approved: 1/1/09 Revised: 12/13/19 The following Standard operating Procedure (SOP) applies to Warrant arrests, abstracts, cancellations, and other related administrative tasks. Arresting a Subject on a UPD Warrant • If the subject you’ve arrested has been issued a citation for our warrant, follow the procedure below. o Copy the warrant o Find the “warrant yellow”. It may be with the original warrant or in the silver box in patrol. The warrant yellow is where you will write the date, what happened with the subject (arrested and booked or issued a citation) and your initials. o Clear the warrant out of WPS via CLIPS. Use the W07-cancel wanted person screen. Print the cancellation. Using the “entered by” stamp, stamp the cancellation and sign with your initials. o Keep everything together: Original warrant, copy of warrant, your printouts, original citation, a copy of your citation, face card and warrant jacket. Leave for the dispatcher to finish clearing the warrant out of ICJIS and HTE. • If the subject you’ve arrested needs to be booked into jail, follow the procedure below. o Copy the warrant o Find the “warrant yellow”. It may be with the original warrant or in the silver box in patrol. The warrant yellow is where you will write the date, what happened with the subject (arrested and booked or issued a citation) and your initials. o The original warrant will accompany you and the subject to jail. The copy will stay with your report. o Clear the warrant out of WPS via CLIPS W07- cancel wanted person screen.
    [Show full text]
  • V-2, Page 1 of 13
    Department Order V-2, Page 1 of 13 California State University, Los Angeles Department of Public Safety NUMBER: V-2 APPROVED: Joseph Curreri, Chief of Police EFFECTIVE: August 7, 2013 SUPERSEDES: March 10, 2011 Reviewed/Revised: August 7, 2013 SUBJECT: Audio, Video, and Telephone Operations I. PURPOSE: To provide a written guideline for telephone and 9-1-1 operations related to the Communications Center. II. POLICY: The Department of Public Safety shall provide for staffing in the Communications Center 24-hours a day, seven days a week, to answer emergency calls for service. III. DEFINITIONS: Refer to Department Order V-1 for appropriate definitions. IV. PROCEDURES: A. 9-1-1 and emergency telephone systems. 1. The 9-1-1 and the campus telephone systems are utilized to provide the campus community with 24-hour, toll-free telephone access for emergency calls. a. 9-1-1 is the single emergency telephone number established for emergency calls for service, with TDD capability. b. Originating point of emergency calls displayed on the Automatic Location Identification (ALI) screen are: 1) Campus pay telephones; 2) Housing telephones; 3) Emergency Operations Center telephones; 4) Campus Emergency telephones; 5) Campus elevator telephones; and, 6) Campus telephones. 2. The following resources are to be used by the dispatcher to help identify the location of the caller, particularly when the caller is unable to speak for themselves: a. An emergency cross-reference list containing campus telephone numbers and their respective locations; b. A campus directory; and, c. AT&T’s 24-hour security hotline number. Department Order V-2, Page 2 of 13 B.
    [Show full text]
  • POLICY/PROCEDURE NUMBER: 01-LEO-001 PATROL Page 1 Of
    California State University NORTHRIDGE Department of Police Services POLICY/PROCEDURE NUMBER: 07-S.O.-011 Page 1 of 42 with five Appendices SUBJECT: POLICE SERVICES COMMUNICATIONS EFFECTIVE DATE: January 7, 2015 REVIEW DATE: January 7, 2016 AMENDS/SUPERSEDES: Department Policies 100-20: Dispatch Area Security, Feb. 5, 2001; 200-10: Elevator Response, Jan. 1, 2000; 200-7: Emergency Notification System, Oct. 15, 1999; 200-6: Emergency Telephones, Jan. 1, 2000; 100-11: Patrol Beats, Jan. 24, 2000; Department Procedural Directives 2003-07: Blue Light Emergency Telephone Information, May 12, 2003; 2003-10: Dispatch and Police Response to Elevator Emergency Calls, June 25, 2003; 2003-13: Emergency Blue Light Response Procedures, Nov. 24, 2003; 2003-11: Student Health Center requests for Ambulances, Aug. 29, 2003; 2004-006: Revision of Procedural Directive Governing On-Campus Injury Notifications, Aug. 3, 2004; 2004-06: Police Notification to Environmental Health & Safety, Aug. 3, 2004; 2004-007: Log Entry onto JDIC/CLETS, Aug. 10, 2004; 2005-01: LAPD Radio Unit Designations for CSUN PD, March 12, 2005; 2005-10: Notifications in Medical Emergency Situations, Aug. 27, 2005; 2005-11: Radio Log Documentation, Aug. 31, 2005; 2005-12: Medical Calls and Assistance from Klotz Health Center, Sept. 6, 2005; 2007-02: Police Officer Call Sign Change, Feb. 16, 2007; and 2007-03: Consolidated Dispatch, March 5, 2007; 2004-015: Science 1101 Alarm (Howitzer Room), December 23, 2004; 2004-014: Blood and Infectious Materials Clean-Up, December 6, 2004; 2005-003: RIMS/Patrol Designations, May 12, 2005; 2008-003: NOAA Public Alert Radio, September 25, 2008; August 9, 2007 version entitled Public Safety Communications; January 27, 2010 version; February 16, 2011 version; January 8, 2014 version.
    [Show full text]
  • Human Factors in Telecommunications? Links in Norway, Steinar M
    Contents Feature Special Guest editorial, Knut Nordby ........................................ 1 First installations of WDM, optical ADM and optical in-line amplifiers on long-haul cable Do we need human factors in telecommunications? links in Norway, Steinar M. Svendsen ..................... 115 Knut Nordby ................................................................. 2 Consumers, not Clients – Empowering users of new technology, Frode Volden ..................................... 9 Speech quality, usability and service quality, Norman Gleiss ............................................................ 14 Status Some current issues of Human Factors in International research and standardization telecommunications, Knut Nordby ............................. 33 activities in telecommunication: Introduction, Per Hjalmar Lehne ................................................... 125 Feedback tones in public telephone networks: Human Factors work at ETSI, Donald M. Anderson .65 The ACTS Project AC215 CRABS; Cellular Radio Access for Broadband Services, The ergonomics of teleworking, John W. Bakke ........ 78 Agne Nordbotten ....................................................... 126 Human factors of videotelephony, Knut Nordby ....... 90 AC066 OPEN – Open Pan-European Network, Torodd Olsen ............................................................ 129 A tactile marker for telephone cards: – From idea to global standard, Knut Nordby ............ 98 MoMuSys, Robert Danielsen ................................... 133 The User-Interface Design
    [Show full text]
  • Emergency Services Access Fundamentals Release: 7.0 Document Revision: 04.01
    Nortel Communication Server 1000 Emergency Services Access Fundamentals Release: 7.0 Document Revision: 04.01 www.nortel.com .NN43001-613 Nortel Communication Server 1000 Release: 7.0 Publication: NN43001-613 Document release date: 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners. 3 . Contents New in this release 9 Features 9 RLI and DMI enhancement 9 Other changes 9 How to get help 11 Contents 11 Getting help from the Nortel web site 11 Getting help over the telephone from a Nortel Solutions Center 11 Getting help from a specialist by using an Express Routing Code 12 Getting help through a Nortel distributor or reseller 12 Introduction 13 Subject 13 Applicable systems 13 Intended audience 14 Conventions 14 Related information 15 ESA Overview 17 Overview 17 ESA feature summary 18 ESA deployment options 18 Basic ESA 18 Optional internal location determination 18 Optional external location determination 18 Concepts and principles 18 Conveying information to the PSAP 19 The ALI record 19 System components 20 System Components 20 Feature operation 23 Location determination of IP phones 23 Determining that an emergency number has been dialed 23 Determining the correct PSAP responder for caller location 24 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks.
    [Show full text]
  • Minnesota Department of Commerce Telecommunications Access Minnesota
    This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp MINNESOTA DEPARTMENT OF COMMERCE TELECOMMUNICATIONS ACCESS MINNESOTA MINNESOTA RELAY AND TELEPHONE EQUIPMENT DISTRIBUTION PROGRAM 2008 ANNUAL REPORT TO THE MINNESOTA PUBLIC UTILITIES COMMISSION DOCKET NO. P999/M-09-5 JANUARY 29, 2009 Department of Commerce – Telecommunications Access Minnesota 85 7 th Place East, Suite 600 St. Paul, Minnesota 55101-3165 [email protected] 651-297-8941 / 1-800-657-3599 TABLE OF CONTENTS TABLE OF CONTENTS .......................................................................................................1 EXECUTIVE SUMMARY ....................................................................................................2 Minnesota Relay .................................................................................................................2 Telephone Equipment Distribution (TED) Program ........................................................3 TAM Fund ..........................................................................................................................3 PROGRAM HISTORY ..........................................................................................................4 TELECOMMUNICATIONS ACCESS MINNESOTA (TAM) ............................................6 TAM Administration ..........................................................................................................6
    [Show full text]
  • University of Florida Thesis Or Dissertation Formatting
    ISLAND CONNECTIONS: MOBILE PHONES AND SOCIAL CHANGE IN RURAL FIJI By RYAN PESECKAS A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2014 1 © 2014 Ryan Peseckas 2 To my parents, who have given me love and unconditional support in all of my pursuits 3 ACKNOWLEDGMENTS I wish to acknowledge the assistance of a number of individuals, communities and organizations, without whose generous help and cooperation I could not have successfully completed this research. At the University of Florida I thank first and foremost my committee chair, Gerald Murray. Jerry took me on as a graduate student in 2006 despite my lack of undergraduate training in anthropology, and has offered helpful advice and encouragement at each step of the way. Peter Collings served as a committee member for both my master’s and PhD research, and likewise has provided much advice, as well as assistance with reading drafts and writing letters of recomendation. I also wish to thank the members of my committee, C.K. Shih, Abdoulaye Kane, and Michael Bannister, for agreeing to oversee my project and for providing valuable input throughout. Also at the University of Florida I am grateful to Christopher McCarty, who went out of his way to assist me with my data analysis, and Paul Richards, who supervised me as a teaching assistant and has been very supportive in my search for post-graduate employment. Finally, I thank my fellow graduate students at the University of Florida, who have been my friends and colleagues during the 7 memorable years I have spent in Gainesville.
    [Show full text]