Professional Documents
Culture Documents
A SEMINAR REPORT
SUBMITTED TOWARDS PARTIAL FULFILLMENT FOR THE AWARD
OF DEGREE
Master of Technology
In
Submitted By
PRAKASH RANJAN
MECE-170-2K10
INDEX
2
1. Abstract 3
2. Introduction 4
3. History of VoIP 5
4. How VoIP works ? 6
5. Requirements of a VoIP 9
6. H.323 Protocol 13
7. SIP Protocol 18
8. Q.923 Protocol 19
9. H.245 Protocol 20
10. Advantages of VoIP 20
11. Advanced Applications 22
12. Opportunities 22
13. Weaknesses (limitations) 23
14. Security issue 25
15. VoIP “Equipment and Solution” Vendors 28
16. Conclusion 30
17. REFERENCES 31
1) Abstract
3
Ever tried placing a voice call over the Internet ? If you have, we are sure you
haven’t had a pleasant experience. You might have even promised yourself
never to try it again.
But , Stop right there!!
Now get ready to change your mind. In the near future, if you make a telephone
call, it is more than likely that it would be over the Internet or some other packet
network. But, what is it that would make this possible? It is a bunch of protocols
and standards; and years of research done by organizations all over the world
that would bring about this revolution. They call it ‘VOICE OVER IP’,
‘INTERNET TELEPHONY’ & a host of other names. VoIP (voice over IP -
that is, voice delivered using the Internet Protocol) is a term used in IP
telephony for a set of facilities for managing the delivery of voice information
using the Internet Protocol (IP). In general, this means sending voice
information in digital form in discrete packets rather than in the traditional
circuit-committed protocols of the public switched telephone network (PSTN).
A major advantage of VoIP and Internet telephony is that it avoids the tolls
charged by ordinary telephone service. VoIP is therefore telephony using a
packet based network instead of the PSTN (circuit switched).
With the passes of time VoIP replace the PSTN and people will acquaint with
the new technology which will reduce their cost and they will no more inclined
to the PSTN to make a call anywhere. Somehow it will take time to replace the
communication system invented by Bell.
2) Introduction
4
Voice over IP (VoIP) is a blanket description for any service that delivers
standard voice telephone services over Internet Protocol (IP). Computers to
transfer data and files between computers normally use Internet protocol.
VoIP saves bandwidth also by sending only the conversation data and not
sending the silence periods. This is a considerable saving because generally
only one person talks at a time while the other is listening. By removing the
VoIP packets containing silence from the overall VoIP traffic we can reach up
to 50% saving. In a circuit switched network, one call consumes the entire
circuit. That circuit can only carry one call at a time.
3) History of VoIP
During the early 90's the Internet was beginning its commercial spread. The
Internet Protocol (IP), part of the TCP/IP suite (developed by the U.S.
Department of Defense to link dissimilar computers across many kinds of data
networks) seemed to have the necessary qualities to become the successor of the
PSTN.
Let us look at very simple VoIP call. Consider two VoIP telephones connected
via an IP network .In this example both VoIP telephones are connected to a
local LAN. Sally’s phone has an IP address of 192.168.1.1 ,Bill’s phone is
192.168.1.2, the IP addresses uniquely identify the telephones. Both our phones
are configured to use a widely used VoIP standard called H.323.
Bill wants to talk to Sally and his phone knows the IP address of Sally’s phone.
Bill lifts the handset and 'dials' Sally, the phone sends a call setup request
packet to Sally's phone, Sally’s phone starts to ring, and responds to Bill's phone
with a call proceeding message. When Sally lifts the handset the phone sends a
connect message to Bill's phone. The two phones will now exchange the data
packets containing the speech. At the end of the call Bill replaces his handset
and phone stops sending voice data sends a disconnect message and Sally's
phone responds with a release message.
7
IP PBX A traditional Private Branch Exchange (PBX) connects all the phones
within an organization to the public telephone network. Essentially IP PBX
replaces all the internal phones with VoIP telephones. The IP PBX has standard
telephone trunk connections to the public telephone network. The IP PBX is a
PBX with VoIP, but it also has the ability to support VoIP over the Internet and
Office to Office VoIP.
encoder/decoder to use when they send the speech to the other phone, Bill and
Sally both have phones that support G.723.1, G.711 and G729. The main
difference between each of these encoders is the amount of bandwidth they use,
G.711 uses 64kbit/s and G.723.1 can use as little as 5.3kbit/s. Although it would
seem obvious to use the encoder with the lowest bandwidth, there is a loss of
quality with a lower bandwidth.. At the same time a stream of G723.1 encoded
voice data starts being sent from each phone to the other phone.
G.711. The ITU standardised PCM (Pulse Code Modulation) as G.711. This
allows carrier class quality audio signals to be encoded for transmission at data
rates of 56Kbps or 64Kbps. G.711 uses A-Law or Mu-Law for amplitude
compression and is the baseline requirement for most ITU multimedia
communications standards.
5) Requirements of a VoIP
Software Requirements
Hardware Requirements
Protocol Requirements
i. Software Requirements
The software package chosen will reflect the organizational needs, but should
contain the following modules - Voice Over IP Publication, and other sources.
Packet Processing Module. This module is required to process the voice and
signaling packets ready for transmission on the IP based network.
between the protocols used on an IP based network and the protocols used on
the PSTN.
The PC's attached to the IP based network require the voice/fax software
outlined above. They also require Full Duplex Voice Cards which allow both
communicating parties to speak at the same time - as often happens in reality.
It defines a standardized packet format for delivering audio and video over IP
networks. It is the standard protocol for streaming applications developed
within the IETF (Internet Engineering Task Force).
6) What is H.323 ?
It is designed to act above transport layer and is mainly used for transmission of
voice, data and video conferencing over packet networks .Over the next few
years, the industry will address the bandwidth limitations by upgrading the
Internet backbone to asynchronous transfer mode (ATM), the switching fabric
designed to handle voice, data, and video traffic. Such network optimization
will go a long way toward eliminating network congestion and the associated
packet loss. The Internet industry also is tackling the problems of network
14
reliability and sound quality on the Internet through the gradual adoption of
standards.
H.323 Components :-
Terminals
Gateways,
Gatekeepers,
Multipoint Control Units (MCU’s).
15
i. Terminals:
H.323 terminals are the client endpoints on the LAN that provide real-time,
two-way communication. They can be realized either as SW-Clients running on
a PC or workstation or as a dedicated HW-devices. All terminals must support
voice communication; video and are optional.
H.232
H.245 (Control channel usage & capabilities)
sQ.931 (Call setup & signaling )
16
ii. Gateways :
The Gateway also translates between audio and video codec’s and performs call
setup and clearing on both the LAN side and the PSTN side.
Task-translation.
Audio Codec
Video codec
H.245 H.221 (ISDN Conference)
H.245 H.242 (Audio-Visual terminals)
17
iii. Gatekeepers :-
A gatekeeper can be considered the brain of the H.323 network. It is the most
important component of an H.323 enabled network.
It is the focal point for all calls within the H.323 network.
Although they are not required, gatekeepers provide important services such as
addressing, authorization and authentication of terminals and gateways;
bandwidth management; accounting; billing; and charging. Gatekeepers may
also provide call-routing service.
MCU’s provide support for conferences of three or more H.323 terminals. All
terminals participating in the conference establish a connection with the MCU.
The MCU manages conference resources, negotiates between terminals for the
purpose of determining the audio or video coder/decoder (CODEC) to use, and
may handle the media stream.
18
The gatekeepers, gateways and MCU’s are logically separate components of the
H.323 standard but can be implemented as a single physical device.
7) What is SIP ?
The Session Initiation Protocol (SIP) is a signaling protocol for initiating,
managing and terminating voice and video sessions across packet networks.
SIP sessions involve one or more participants and can use unicast or multicast
communication. Borrowing from ubiquitous Internet protocols, such as HTTP
and SMTP, SIP is text-encoded and highly extensible
A SIP network is composed of four types of logical SIP entities. Each entity has
specific functions and participates in SIP communication as a client (initiates
requests), as a server (responds to requests), or as both.
8) What is Q.923 ?
a) the Caller,
b) the ISDN Switch, and
c) the Receiver.
9) What is H.245 ?
VoIP uses "soft" switching which eliminates most of the legacy PBX
equipment. Reducing the cost of installing a communications infra-structure and
the maintenance cost once installed.
Simple upgrade path. The VoIP PBX technology is software based. It is easier
to expand, upgrade and maintain than its traditional telephony counterparts.
Bandwidth efficiency. VoIP can compress more voice calls into available
bandwidth than legacy telephony.. IP Telephony helps to eliminate wasted
bandwidth by not transporting the 60% of normal speech which is silence
22
Only one physical network is required to deal with both voice/fax and
data traffic instead of two physical networks. Having only one physical network
has the following advantages:
12) Opportunities
Many vendors offer the ability to incorporate Virtual Private Networking (VPN)
with relative ease into the IP Telephony solutions they provide. This allows any
transmission to be encrypted using a number of cryptographic techniques and
providing security by transmitting the communications through a 'tunnel' which
is set up using PPTP (Point-to-Point Tunnelling Protocol) before commencing
communications.IP Telephony allows companies to exploit Computer
Telephony Integration to its full extent.
23
While there are many aspects of VoIP which provide considerable benefits, the
technology is still very young and problems remain. The following section
looks at some of the weaknesses of this technology and their consequences.
The Internet is not the best medium for real time communications.
Individual packets can take different routes and varying delays can be
encountered and packets lost in transit. Waiting for delayed packets or
retransmission of lost packets can result in considerable degradation of quality.
Long delays in transit can affect quality so much that the technology can
become unusable, though many vendors do have solutions which aim to negate
the degradation suffered due to transit delays.
While some standards have been set by the ITU, the technology is not fully
standardized and there is no guarantee that products from different vendors will
be interoperable. Some vendors are trying to resolve this problem by forming
groups and making guarantees about the products in the group but this is only a
partial solution - vendors out with the group cannot guarantee interoperability.
Since only one physical network for both data and voice/fax transmissions is
required, failure of the network could be catastrophic, as all communications
capabilities are lost.
25
a) The concern:-
VoIP networks and devices are vulnerable to unique security threats and
exploits, because of the real-time nature of the traffic. In addition, many new
protocols and products make up the VoIP infrastructure, which traditional
security products and approaches are not designed to protect.
Network, could obtain full access to the UCM by getting the remote shell on the
attacker's machine.
Subsequently the attacker could either disable UCM completely, download all
the information from UCM to the attacker's machine or upload an executable
file to the UCM.
Then the attacker could force all the Cisco softphones connected to this UCM to
reboot and download that executable file.
Once the executable is downloaded and executed an attacker is able to have full
access to the user’s laptop running the softphone.
VoIP Vulnerability Assessment (VVA) and penetration testing tool has been
deployed by enterprise security and telecom professionals in many network
scenarios and is being used for both risk assessment, compliance focused
auditing as well as operationally by security staff to ensure their Voice over IP
network are secure at all times.
VoIPguard is the industry’s first VoIP Intrusion Prevention System (VIPS) with
comprehensive protection for Voice over IP systems from the leading VoIP
27
VoIP PBX monitoring tool provides around the clock monitoring for hardware
failures and systems events generated by VoIP IP Public branch exchanges
(PBX). VoIPmonitor empowers PBX administrators to selectively forward
events in real-time to destinations such as in-house Network Operations Centers
(NOC), Network Management Systems (NMS) and Operational Support
Systems (OSS) while preserving local administration processes without the
need for external monitoring services.
VoIP PBX configuration management tool enables PBX administrators to
quickly catalog, assess and report on configuration status and configuration
changes as they apply to regulator requirements. It allows the PBX
administrators detect configuration issues and changes improving overall
security and reliability of VoIP installations.
…….. and many more companies are providing the similar solutions.
some of them are:-
Nextiva
Vocality
SecureWorks, Inc.
CREDANT Technologies
Avaya
Avaya is the leader on the VoIP market. It has a vast variety of equipment and
solutions including IP phones, media gateways, routers, communication servers,
PBXs, wireless phones, voice application etc. Its hottest product is the IP Office
platform and communications system.
Nortel
Nortel is one of the oldest vendors around - it has been here since 1995. The
range of products it offers is more or less like Avaya, but it is more reputed for
its PBXs. Nortel is the first vendor to provide an end-to-end IP telephony
solution certified by U.S. Defence Department Joint Interoperability Test
Command (JITC) in 2004.
Cisco
Before VoIP, Cisco has been around as a networking vendor giant. Now, it is a
leading player in the VoIP equipment arena, with good IP Phones, routers and
other devices and solutions. Cisco owns Linksys, which is also well known on
the market.
Shoretel
Shoretel is a fast-growing vendor providing complete IP telephony solutions
and PBXs. Shoretel's strong points are performance and ease of installation and
use.
29
Siemens
Siemens is another giant in technology which has extended its reach to VoIP
and unified communications. It provides phones, PBXs and ... just anything
concerning communication.
Mitel
Mitel is a global provider of communications solutions for enterprises and small
business. It aims at blending good human interface with powerful infrastructure.
Mitel brands include SX and ICP series.
Asterisk
Asterisk is not hardware, but a software PBX that can run on Linux, Unix,
MacOS and some other operating systems. It is open source (meaning free) and
is extremely flexible and very robust.
Taridium
Taridium is a fast growing open standards VoIP solution provider. Taridium's
offering ranges from managed VoIP services for small and medium sized
businesses through to high capacity telephony solutions for large enterprises and
service providers.
Talkswitch
Toshiba
Fonality
3Com
Polycom
Alcatel
Lucent (now owned by Avaya)
Linksys (now owned by Cisco)
D-Link
30
16) Conclusion :-
Without a doubt, the data revolution will only gain momentum in the coming
years, with more and more voice traffic moving onto data networks. Vendors of
voice equipment will continue to develop integrated voice and data devices
based on packetized technology. Users with ubiquitous voice and data service
integrated over one universal infrastructure will benefit from true, seamless,
transparent interworking between voice and all types of data. “It is not Voice
over IP, it is Everything over IP…”
31
17) REFERENCES
Journals
Conference Recomendations
ITEXPO- Conference
Books
Website:-
http://www.voip.com
http://www.networkworld.com
http://www.itu.int
32