View
26
Download
0
Category
Preview:
DESCRIPTION
Convergence Technologies. Lesson 1: Convergent Network Traffic Protocols. Objectives. Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traverse multiple WAN links, and call and call flow descriptions - PowerPoint PPT Presentation
Citation preview
Convergence Technologies
Lesson 1:Convergent Network
Traffic Protocols
Convergence Technologies
Objectives
• Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traverse multiple WAN links, and call and call flow descriptions
• Define the Realtime Transport Protocol (RTP) and the Realtime Transport Control Protocol (RTCP)
• Identify the components of Session Initiation Protocol (SIP) and describe the format of an SIP Uniform Resource Identifier (URI)
• Identify the functions of signaling protocols for converged networks (e.g., Session Initiation Protocol [SIP], H.323, H.225, H.320, H.450, Media Gateway Control Protocol [MGCP], Media Gateway Control [Megaco])
• Compare and contrast the functions of gatekeepers, gateways and proxies in relation to SIP and H.323 devices
• Compare and contrast SIP, H.323 and Megaco/MGCP
Convergence Technologies
Defining Convergence
• Convergence – The integration of telephony and data technologies
• Integration includes:– Placing the voice network (telephony), the
video network (television, satellite) and the Internet (rich media) onto common platforms
Convergence Technologies
Smart Network and Dumb Network
Convergence Technologies
Circuit-Based vs.Convergence Calling
• Circuit-switched network – uses a dedicated physical path to send and receive information
• Circuit-based calls:– Provide very good voice quality– May fail if the destination is busy or the network fails
at any point in the connection• Packet-switched network – places addressing information
into data packets• Convergence-based calls:
– Dynamically reroute packets to other network nodes if a network node fails
– Result in increased latency because packetization and compression add processing time to the signal
Convergence Technologies
Transport Through a Packet-Switched Network
• Packets are encapsulated in Ethernet frames– At Layer 4, source and destination port
numbers are added– At Layer 3, source and destination IP
addresses are added– At Layer 2, source and destination MAC
addresses are added
Convergence Technologies
User Datagram Protocol
• UDP header is very simple, consisting of source and destination port numbers, a length field, and a checksum field
Convergence Technologies
Realtime Transport Protocol (RTP)
• Used to transport voice and video payloads for real-time applications
• Provides end-to-end delivery services• Runs over both UDP and TCP• Uses even port numbers that are generally
assigned dynamically• Default port is 5004• RTP profiles define a set of codes for each type
of payload
Convergence Technologies
RTP Packets
• RTP packets are encapsulated in UDP packets
Convergence Technologies
Realtime Transport Control Protocol (RTCP)
• Does not transport any data itself• Partners with Realtime Transport Protocol (RTP)• Monitors the media stream• Provides feedback on the Quality of Service
(QoS) being provided by RTP• While RTP uses an even port number, RTCP
always uses the next odd port number• Default port is 5005
Convergence Technologies
Session Initiation Protocol (SIP)
• Signaling protocol only — does not deliver media streams, nor does it control the delivery of media streams
• Initiates and manages sessions (or connections) between 2 or more participants
• Primary function is to set up, modify and tear down a connection
• Developed by the IETF, SIP is modeled after Hypertext Transfer Protocol (HTTP)
Convergence Technologies
SIP Related Protocols
• Session Description Protocol (SDP)– Describes the characteristics of end points in
a session• Multiprotocol Label Switching (MPLS)
– Can provide QoS for SIP connections• Resource Reservation Protocol (RSVP)
– Can provide QoS for SIP connections• Differentiated Services (DiffServ)
– Can provide QoS for SIP connections
Convergence Technologies
SIP ports and URIs
• SIP uses both UDP and TCP ports 5060 by default
• SIP URI takes the following format:sip:user@host
• SIP URI examples:sip:555-1110@ctpcertified.comsip:charles.chaplin@64.128.206.2sip:charles.chaplin@sip.ctpcertified.com
Convergence Technologies
SIP Components
• User agents– User agent client (UAC): initiates an SIP request– User agent server (UAS): responds to SIP request
• Servers:– Proxy: perform routing, authentication and
accounting functions– Redirect: relays information to a user agent, such
as the IP address of the party to be called– Registrar: enables a client to let a proxy or
redirect server know how the client can be reached
Convergence Technologies
SIP Messages
• Requests– INVITE– ACK– BYE– Cancel– Options– Register
• Each request (except for an ACK request) requires a response
Convergence Technologies
SIP Messages (cont'd)
• Responses are composed of a 3-digit Status Code and an associated Reason Phrase
Convergence Technologies
SIP Calls
Session Invitation• Consists of one
INVITE request, usually sent to an SIP proxy
• A 200 OK response is generated when the called party answers the phone
• Media streams are sent directly between end points
Convergence Technologies
H.323
• Defines the following:– How an audiographic call is set up across a
network– How to negotiate capabilities– How to transmit data and control
conferencing– Which default audio and video codecs to use
Convergence Technologies
H.323 Architecture
• Terminals – H.323 end points– Can be a stand-alone device (IP phone) or a
logical device within a PC– Includes audio and video codecs– Must support H.245 for capabilities
negotiation– Uses Q.931 for call signaling and setup– Uses H.225 RAS for communicating with
gatekeepers– Must support RTP and RTCP
Convergence Technologies
H.323 Architecture (cont'd)
• Gateways– Connect and translate protocols between
dissimilar networks– Provide protocol translation, media format
conversion and data transfer between H.323 and non-H.323 networks
– Optional element; not required for connections within one LAN
– Required to establish connections between terminals in H.323 networks and terminals in networks with different protocols
Convergence Technologies
H.323 Architecture (cont'd)
• Gatekeeper functionality:– Admission control– Address translation– Bandwidth control– Zone management– Call control for point-to-point conferences– Codec translation– Call authorization– Bandwidth and call management– Accounting and billing– Call routing
• Multipoint Control Unit (MCU) – required whenever three or more H.323 terminals are connected
Convergence Technologies
H.323 Protocol Stack
Convergence Technologies
H.225 RAS
• RAS messages (requests and responses) are sent between end points and gatekeepers via UDP– Gatekeeper messages are sent for gatekeeper
discovery (GRQ, GCF, GRJ)– Registration messages are sent for negotiating a
registration with a gatekeeper (RRQ, RCF, RRJ)– Admission messages are requests and replies for
address translation (ARQ, ACF, ARJ)– Status messages are used to monitor end point status
during calls that are routed through a gatekeeper (IRQ, IRR)
– Disengage messages signal the end of a call (DRQ, DCF)
Convergence Technologies
H.323 Calls
• In a typical call:– A client contacts a gatekeeper and requests
an address using H.225 RAS admission request (ARQ)
– Gatekeeper forwards address to the client– Client establishes session using H.225– Session is negotiated using H.245
Convergence Technologies
H.323 Calls (cont'd)
H.225 call signaling is used between terminals to set up and tear down a connection
Convergence Technologies
H.323 Calls (cont'd)
H.245 call control signaling is used for negotiating capabilities and master/slave determination
Convergence Technologies
Media Gateway Control Protocol (MGCP)
• Media Gateway Control Protocol (MGCP) – a signaling protocol used in IP telephony systems– MGCP controls media gateways by sending
signals from a media gateway controller– MGCP is a master/slave protocol– MGCP assumes that call logic and call state
are maintained by intelligent end points
Convergence Technologies
Network Call Signaling (NCS)
• Network Call Signaling (NCS) – a protocol that creates embedded agents to use MGCP in a network
Convergence Technologies
Megaco/H.248
• Enhanced version of MGCP• Result of a joint effort between IETF and ITU• Megaco enables the separation of call control
from media conversion• Megaco instructs an MG to connect streams
coming from outside a packet or cell data network onto a packet or cell stream such as Realtime Transport Protocol (RTP) streams
Convergence Technologies
SIP vs. H.323 vs. Megaco
Convergence Technologies
Summary
Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traverse multiple WAN links, and call and call flow descriptions
Define the Realtime Transport Protocol (RTP) and the Realtime Transport Control Protocol (RTCP)
Identify the components of Session Initiation Protocol (SIP) and describe the format of an SIP Uniform Resource Identifier (URI)
Identify the functions of signaling protocols for converged networks (e.g., Session Initiation Protocol [SIP], H.323, H.225, H.320, H.450, Media Gateway Control Protocol [MGCP], Media Gateway Control [Megaco])
Compare and contrast the functions of gatekeepers, gateways and proxies in relation to SIP and H.323 devices
Lesson 2:Implementing VoIP
Convergence Technologies
Objectives
• List essential steps for qualifying a network's ability to support convergence (e.g., cable inspection, existing and maximum device capacity, replacing hubs with switches, Power over Ethernet [PoE] requirements, VLAN creation, conducting network reconnaissance)
• Describe the features of Telephony Application Programming Interface (TAPI) and Messaging Application Programming Interface (MAPI) in a converged solution
• Implement Telephone Number Mapping (ENUM), elements of global and private numbering plans, Local Number Portability (LNP)/Wireless LNP, end-point addressing, path selection, calling classes, digit manipulation, overlapping number ranges
• Identify common G.7xx codecs and their bandwidth requirements in a converged environment (e.g., G.711, G.729, G.729a, G.726 and others)
Convergence Technologies
Objectives (cont'd)
• Describe the impact of compression on voice quality, and identify issues involved when converting voice to analog and digital formats
• Identify benefits and drawbacks of various codecs in relation to bandwidth and voice quality
• Calculate and estimate bandwidth usage for various codecs, including considerations of overhead, connection quality, and other factors that affect theoretical calculations (e.g., capacity planning, choosing connection speeds)
• Recommend codecs for use with local/in-network/within-LAN calls, and for across WAN connections
• Explain wireless convergence technologies, including Digital Enhanced Cordless Telecommunications (DECT) and DECT layers, Personal Wireless Telephone (PWT), Generic Access Profile (GAP), expected ranges for interference-free communication, and the MHz ranges for each standard
Convergence Technologies
Objectives (cont'd)
• Identify the elements of the IP Multimedia Subsystem (IMS)
• Explain real-time faxing, according to standards such as ITU T.38
• Explain store-and-forward faxing, according to standards such as ITU T.37
• Identify the features, benefits, problems and management of presencing, including single sign-on, features available in various devices
• List unified message methods and benefits (e.g., fax, voice, text, video)
• Identify common and essential videoconferencing codecs, standards and practices (e.g., Moving Picture Experts Group [MPEG], Quarter Common Intermediate Format [QCIF], etc.), and choose the appropriate codecs for various bandwidths
Convergence Technologies
Objectives (cont'd)
• Summarize television/video-calling standards and practices
• Identify multimedia conferencing standards, including all subsets of T.120 (e.g., T.123, T.124, T.135)
• Explain fundamentals of Internet Protocol television (IPTV), including set-top box, Video on Demand (VoD), accepted codecs (e.g., Video Codec [VC-1])
• Identify the purpose and function of voice and videoconferencing hardware (e.g., Multipoint Control Unit [MCU], set-top box, Session Border Controller [SBC])
• Compare and contrast traditional and IP-based private branch exchange (PBX) systems
• Identify convergent terminal equipment and software, including analog telephone adapter (ATA), single line adapter, soft phones (WiFi, PDA, PC-based), analog phones, time division multiplexer (TDM), protocol-specific handsets (e.g., SIP, Megaco)
Convergence Technologies
Objectives (cont'd)
• Explain power issues, including redundancy planning, Power over Ethernet (PoE)/802.3af, PoE classes, expected voltage, wattage, power sourcing equipment (PSE), powered devices (PDs)
Convergence Technologies
Planning aConvergent Network
• Major phases of an implementation plan include these steps:– Identifying expectations– Determining bandwidth requirements– Performing a network health check– Creating a phased deployment plan
Convergence Technologies
Identifying Expectations
• Identify how network(s) will be used• Identify specific protocols that will be used• Identify and explain potential challenges
Convergence Technologies
Determining Bandwidth Requirements
• Identify current digital connection• Determine bandwidth required by existing
network• Monitor current network performance• Evaluate current network performance• Calculate additional requirements for VoIP• Take wide area network (WAN) links into
account• Take growth into account
Convergence Technologies
Performing a Network Health Check
• Check network cabling• Replace hubs with Layer 2 switches• Implement VLANs• Prioritize VLAN traffic• Check routers• Identify the entity that manages Internet router• Examine current IP addressing scheme• Examine Domain Name System (DNS)• Examine firewall• Identify whether NAT will be implemented• Identify whether VPNs must be supported• Identify whether any part of the LAN will be wireless
Convergence Technologies
Creating a Phased Deployment Plan
• Create a detailed, approved implementation plan
• Use a test network• Deploy incrementally• Do not begin with the sales department
Convergence Technologies
TAPI and MAPI
• Telephony Application Programming Interface (TAPI) is an API used for connecting a Windows PC to telephone services
• Messaging Application Programming Interface (MAPI) is a Windows API that allows different e-mail applications to work together to distribute mail
Convergence Technologies
Numbering Plans
• Private numbering plans allow a company to create its own numbering system
• Extensions can be created based on an organization’s needs
• Number plan defines the format of telephone numbers
• Implementing VoIP involves designing a numbering plan and a dial plan.
• Dial plan must include rules for dealing with:– End point addressing– Path selection– Calling classes– Digit manipulation– Overlapping number
ranges
Convergence Technologies
Telephone Number Mapping (ENUM)
• Maps E.164 telephone numbers into the Domain Name System (DNS)
• Creates a dynamic mapping of E.164 addresses to IP addresses
• ENUM domain names are hosted in the e164.arpa domain– A telephone number such as +1 (602) 555-
1212 is converted into the ENUM domain name 2.1.2.1.5.5.5.2.0.6.1.e164.arpa
– ENUM domain name resolves to one or more DNS NAPTR records
Convergence Technologies
G.7xx Codecs
• Various codecs provide different amounts of compression
• Compression allows more voice traffic, but can also:– Introduce delay– Adversely affect voice quality– Put a significant strain on CPU resources,
depending on the complexity of the algorithm and the amount of compression
Convergence Technologies
Comparison of G.7xx Codecs
Convergence Technologies
Calculating VoIP Bandwidth Requirements
• Calculations for bandwidth requirements must factor in:– Codec, sample period and frame size– Frames per packet– IP overhead– Ethernet overhead– Number of simultaneous calls– Silence suppression– Compressed headers
Convergence Technologies
Wireless Convergence Technologies
• Components– Radio exchange– Base stations (transceivers)– Portable phones
• Digital Enhanced Cordless Telecommunications (DECT) is an ETSI standard for digital portable phones– Generic Access Profile (GAP) guarantees
interoperability between any handset and any base station, regardless of make or model
– Operates in the 1880 MHz to 1900 MHz band in Europe, Africa, Australia and Asia (except China)
– Operates in the following bands in North America: 902 MHz to 928 MHz, 2400 MHz to 2483.5 MHz, 5725 MHz to 5850 MHz
Convergence Technologies
IP Multimedia Subsystem (IMS)
• IP Multimedia Subsystem (IMS) is a network architecture designed to enable convergence of voice and data applications and various mobile network technologies
• IMS architecture includes 3 layers:– Connectivity layer (also called the transport layer)
composed of routers, media gateways and switches– Control layer composed of network control servers that
manage call setup, modification and release– Application layer (also called the service layer)
composed of application and content servers that deliver services within the network
Convergence Technologies
Facsimile
• Fax transmissions impose special demands on VoIP because fax standards were designed for circuit-switched connections
• T.30 standardizes the way in which faxes are sent across standard circuit-switched telephone lines
• T.38 designed for real-time fax transmissions over an IP network
• T.37 designed for store-and-forward fax transmission over an IP network
Convergence Technologies
Presencing
• Presence information is a status indicator that conveys a person’s willingness and ability to engage in communications
• Presencing can span different communication channels
• Multiple Points of Presence (MPOP) describes how multiple communications devices can combine state to provide a multidimensional view of a user’s availability status
• Presencing requires collaboration among a number of devices and the presence services with which each of them is connected
• Presencing raises privacy concerns
Convergence Technologies
Unified Messaging
• In unified messaging (UM), all messaging media can come together in the form of a unified mailbox and/or alert service
• Unified messaging offers– Single delivery– Single repository– Single access– Single notification
Convergence Technologies
Video Services
• Video codecs and standards include:– H.261– Common Intermediate Format (CIF)
• Quarter CIF (QCIF)• Sub Quarter CIF (SQCIF)• 4CIF• 16CIF
– H.263– Moving Picture Experts Group (MPEG)
• MPEG-1• MPEG-2/H.262• MPEG-4
– H.264/MPEG-4 Advanced Video Coding (AVC)– Realtime Streaming Protocol (RTSP)
Convergence Technologies
T.120 Multimedia Conferencing Standards
• Key features:– Support for real-time communication between
two or more entities– Support for application sharing, electronic
whiteboarding, file exchange and chat– Support for interoperability between end
points from multiple vendors– Support for a broad range of transport
options– Co-existence with other standards
Convergence Technologies
T.120 Architecture
Additional protocols:• T.128: Multipoint application sharing• T.134: Text chat application entity• T.135: User-to-reservation system transactions with T.120
conferences• T.136: Remote device control application protocol• T.137: Virtual meeting room management services and
protocol
Convergence Technologies
Internet Protocol TV (IPTV)
• Internet Protocol TV (IPTV) can include – Live broadcast (uses Internet Group
Messaging Protocol [IGMP] version 2)– Video on Demand (uses Realtime Streaming
Protocol [RTSP])• Requires a set-top box or PC to receive content
from a media server• Common codecs include: H.264/MPEG-4 AVC,
MPEG-2, VC-1
Convergence Technologies
Common Convergence Devices
• Videoconferencing hardware– Multipoint Control Unit (MCU)– Session Border Controller (SBC)
• IP PBX or traditional PBX• Terminal equipment
– VoIP phones– Digital phones– Analog telephones and adapters – Soft phones– Single line adapter– Time division multiplexer
Convergence Technologies
Power Issues for Convergent Networks
• Redundant power – Uninterruptible power supply (UPS)
• Power over Ethernet (PoE)– Power Sourcing Equipment (PSE) provides power– Powered Devices (PD) use the power provided– Maximum power supplied is 15.4 watts at 48 volts– Five power classes (0-4)– Two power modes (Mode A and Mode B)
• PSE capable of determining the mode a PD uses– Injector supplies power into the appropriate wires of
the Ethernet cable– Deployment of PoE requires a power budget to ensure
that PSE can supply sufficient power to all PDs
Convergence Technologies
Summary
List essential steps for qualifying a network's ability to support convergence (e.g., cable inspection, existing and maximum device capacity, replacing hubs with switches, Power over Ethernet [PoE] requirements, VLAN creation, conducting network reconnaissance
Describe the features of Telephony Application Programming Interface (TAPI) and Messaging Application Programming Interface (MAPI) in a converged solution
Implement Telephone Number Mapping (ENUM), elements of global and private numbering plans, Local Number Portability (LNP)/Wireless LNP, end-point addressing, path selection, calling classes, digit manipulation, overlapping number ranges
Identify common G.7xx codecs and their bandwidth requirements in a converged environment (e.g., G.711, G.729, G.729a, G.726 and others)
Convergence Technologies
Summary (cont'd)
Describe the impact of compression on voice quality, and identify issues involved when converting voice to analog and digital formats
Identify benefits and drawbacks of various codecs in relation to bandwidth and voice quality
Calculate and estimate bandwidth usage for various codecs, including considerations of overhead, connection quality, and other factors that affect theoretical calculations (e.g., capacity planning, choosing connection speeds)
Recommend codecs for use with local/in-network/within-LAN calls, and for across WAN connections
Explain wireless convergence technologies, including Digital Enhanced Cordless Telecommunications (DECT) and DECT layers, Personal Wireless Telephone (PWT), Generic Access Profile (GAP), expected ranges for interference-free communication, and the MHz ranges for each standard
Convergence Technologies
Summary (cont'd)
Identify the elements of the IP Multimedia Subsystem (IMS)
Explain real-time faxing, according to standards such as ITU T.38
Explain store-and-forward faxing, according to standards such as ITU T.37
Identify the features, benefits, problems and management of presencing, including single sign-on, features available in various devices
List unified message methods and benefits (e.g., fax, voice, text, video)
Identify common and essential videoconferencing codecs, standards and practices (e.g., Moving Picture Experts Group [MPEG], Quarter Common Intermediate Format [QCIF], etc.), and choose the appropriate codecs for various bandwidths
Convergence Technologies
Summary (cont'd)
Summarize television/video-calling standards and practices
Identify multimedia conferencing standards, including all subsets of T.120 (e.g., T.123, T.124, T.135)
Explain fundamentals of Internet Protocol television (IPTV), including set-top box, Video on Demand (VoD), accepted codecs (e.g., Video Codec [VC-1])
Identify the purpose and function of voice and videoconferencing hardware (e.g., Multipoint Control Unit [MCU], set-top box, Session Border Controller [SBC])
Compare and contrast traditional and IP-based private branch exchange (PBX) systems
Identify convergent terminal equipment and software, including analog telephone adapter (ATA), single line adapter, soft phones (WiFi, PDA, PC-based), analog phones, time division multiplexer (TDM), protocol-specific handsets (e.g., SIP, Megaco)
Convergence Technologies
Summary (cont'd)
Explain power issues, including redundancy planning, Power over Ethernet (PoE)/802.3af, PoE classes, expected voltage, wattage, power sourcing equipment (PSE), powered devices (PDs)
Lesson 3:Traffic, Troubleshooting
and Security
Convergence Technologies
Objectives
• Define latency, jitter and wander • Implement methods for reducing or eliminating latency,
jitter and wander (e.g., implementing a jitter buffer, implementing QoS, traffic shaping, VLANs)
• Explain the impact of large frames on real-time communications
• Identify factors that affect the bandwidth of voice and video calls on convergent networks (e.g., latency, protocol incompatibility, MTU, codec choice, compression, QoS issues, packet reordering, loss of feature set)
• Use accepted industry standards such as the Mean Opinion Score (MOS) to determine voice and video quality, including MOS for popular codecs, standard MOS numbers, R-value and subjective video quality
Convergence Technologies
Objectives (cont'd)
• Identify common network bottlenecks in convergent networks, including solutions (e.g., monitoring network devices and protocols, creating a baseline, changing configuration, upgrading hardware)
• Analyze traffic in a convergent network and resolve problems using a packet sniffer, monitoring software, and hardware solutions
• Troubleshoot convergent communications over wireless networks
• Identify problems in contacting emergency services through convergent networks
• Parse a Call Detail Record (CDR) and list relevant entries
Convergence Technologies
Objectives (cont'd)
• Identify types and effects of attacks in convergent networks, including man-in-the-middle attacks (e.g., packet sniffing, TCP connection hijacking, registration hijacking), voice mail compromises, viruses, brute-force and dictionary attacks, zero-day attacks, illicit servers, toll fraud and unsolicited calls
• Define denial-of-service (DOS) and distributed DOS (DDOS) attacks, and identify ways to counteract them, including common traffic types used (e.g., SYN, UDP or ICMP flood), reconfiguring core upstream routers, using alternative sites, intentional and unintentional DOS
• Explain the practice and impact of VLAN hopping • Explain the significance and impact of MAC address
movements, additions and changes • Identify types of intrusion detection (e.g., host-based,
network-based, defining effective signatures, proactive detection)
Convergence Technologies
Objectives (cont'd)
• Back up, upgrade and scan systems to thwart attacks, including backup types, system patches, service packs, firmware upgrades, optimal backup schedule
Convergence Technologies
VoIP Variables
• VoIP variables – conditions that cause problems in voice communications
• VoIP variables include:– Delay – the amount of wait time between the
time a signal is sent and received– Latency – the amount of time required for
data to be transmitted across a network– Jitter – variability in the arrival rate of data
packets transmitted over a network– Wander – variability of more than one second
in the arrival rate of data packets transmitted over a network (long-term jitter)
Convergence Technologies
Delay• Fixed delays
– Propagation delay – caused by the distance between the request and the server fulfilling the request
– Serialization delay – the time required to physically place voice call bits on a trunk line
– End point processing delay – caused by compressing/ decompressing and encoding/decoding data
– Packetization delay – the time required to place digital traffic into a particular medium
• Variable delays– Queuing delay – the time packets wait for other
packets to be placed onto a trunk line– Router processing delay – the time required for a
router to apply QoS settings, or to process packets that have arrived out of order
Convergence Technologies
Latency
• Latency results when multiple delays occur• The most significant source of latency is the
digital signal processing that occurs in gateways and routers
• Round-trip latency is the total delay experienced by two users on a phone call
• Round-trip latency in the PSTN is typically less than 150 milliseconds, except on international calls
• ITU recommends that for good voice quality in VoIP calls, one-way latency must not exceed 150 milliseconds
Convergence Technologies
Jitter
• Jitter occurs when packets in a voice transmission take different paths over a network, causing them to arrive out of sequence
• A jitter buffer can correct this variability by providing a space in memory that allows packet resequencing
Convergence Technologies
Packet Handling in the Enterprise
• A chief cause of delay and jitter is queuing at the router
• By default, routers process queues on a first in first out (FIFO) basis
• Implementing QoS on routers improves voice quality
• Convergent QoS technologies include:– Creating VLANS– Assigning prioritization– Setting IP precedence values– Employing traffic-shaping algorithms
Convergence Technologies
Wander
• Wander is due to synchronization problems in the network clocks used to control transmissions
• When wander is detected, the signal must be reclocked, or synchronized, at the next network element to avoid propagating the wander activity
• The Network Time Protocol (NTP) ensures that systems are accurate to within milliseconds
• NTP servers belong to two strata:– Stratum 1 – clocks that are the most accurate;
often GPS-enabled timekeeping systems– Stratum 3/3E – VoIP gatekeepers, gateways
and PBXs
Convergence Technologies
Large Data Packets
• Voice packets can get “stuck” behind large data packets and incur significant delay
• Segmenting large data packets on the network can help control latency and jitter of voice services
Convergence Technologies
Other Throughput Considerations
• Additional factors that affect the quality of voice transmissions include:– Choice of codec– Complexity of compression algorithm– Lack of QoS support on the network– Overutilization of routers– Packet reordering (caused by congestion and
queuing at routers)– Protocol and codec incompatibility– MTU setting– Loss of feature set
Convergence Technologies
Connection QoS: Using Multiple Connections
• Connection QoS ensures that the gateway can protect calls from network problems in several ways, including:– Trunk busy-out– Alternative gateway selection– Fallback to the PSTN
• The gateway prevents a trunk from servicing a call if: – The IP network fails– The gateway detects an internal problem
Convergence Technologies
Mean Opinion Score (MOS)
MOS is an industry standard numerical measurement of voice quality
Convergence Technologies
R-value
• R-value is another industry standard for measuring voice quality
• R-values are derived from direct measurements of equipment and traffic parameters
• R-value score ranges from 1 (worst) to 100 (best)
• One MOS point is roughly equal to 20 R-value points, but the correlation is not linear
Convergence Technologies
Mean Opinion Scores for Popular Audio Codecs
Convergence Technologies
Maintaining and Troubleshooting Convergent Networks
• Monitoring is an important aspect of maintaining convergent networks
• The first step in monitoring is establishing a baseline– A baseline is a record of normal network
activity that serves as an example for comparing future network activity
Convergence Technologies
Establishing a Baseline
• Baseline measurement statistics should include data on:– Traffic analysis/end-to-end performance
• Identifies latency, percentage of packet loss and link utilization
• Tools include: ping and traceroute, and hardware monitoring mode
– Device performance• Identifies factors such as CPU and memory
usage
Convergence Technologies
Device Configuration
• Device configuration directly affects the performance of convergent networks
• Check configurations of – Switches
• Ensure VLANs are properly configured• Ensure proper communication mode (full-duplex,
half-duplex, auto-negotiation) settings on switch ports
– End points• Ensure each end point has a valid IP address• Ensure that communication mode on NIC is set
properly • Install firmware or software updates as they
become available
Convergence Technologies
Troubleshooting Convergence in Wireless Networks
• In wireless networks, points for troubleshooting include:– Access points (APs):
• Should support enterprise-level QoS• Should provide overlapping coverage• Should be deployed in sufficient number• Should be able to reject calls when becoming
overloaded• Should support roaming
– Environment• Check for sources of interference
– Handsets• Ensure proper configurations (for example,
encryption keys)• Install available updates/upgrades
Convergence Technologies
Call Detail Records
• Call Detail Records include information about the the following call details:– Time– Date– Call duration– Number dialed– Caller ID information– Extension– Line/trunk location– Cost– Call completion status
Convergence Technologies
Security in Convergent Networks
• Security is a set of procedures designed to protect transmitted and stored information, as well as network resources
• In convergent networks, security includes preventing:– Call interception– Phone fraud– Network attacks
Convergence Technologies
Protocol Review
• Inherent weaknesses in IPv4 include:– Transmission Control Protocol (TCP) handshake
– often manipulated by hackers– Internet Protocol (IP) – does not sign or encrypt
packets, and packets are easily manipulated– User Datagram Protocol (UDP) – often used to
conduct scans of systems, and UDP packets can be forged to wage distributed denial-of-service attacks
– Address Resolution Protocol (ARP) – does not authenticate the hosts it resolves and is subject to ARP cache poisoning
Convergence Technologies
Overview of Network Attacks
• Network attacks include:– Spoofing attacks
• IP spoofing• ARP spoofing• DNS spoofing
– Man-in-the-middle (hijacking) attacks• Password sniffing• Connection termination• Connection hijacking• Packet insertion• Poisoning
– Password-guessing attacks• Brute-force attacks• Dictionary attacks
Convergence Technologies
Malicious Code
• Types of malicious code include:– Viruses– Worms– Illicit servers– Trojan horses
• To avoid malicious code, use:– Virus and worm protection– Application management and testing– Configuration management– File signature checking software
Convergence Technologies
Denial-of-Service (DOS) Attacks
• Purpose of a denial-of-service attack is to:– Crash a server and make it unusable to
everyone– Assume the identity of the system being
crashed– Install a Trojan
• Flooding is the process of sending an overwhelming number of packets to a system
• Flooding techniques include:– SYN flood– Ping flood– UDP flood
Convergence Technologies
Distributed Denial-of-Service (DDOS) Attacks
• Involve the cooperation of several systems to wage a coordinated attack that generates an overwhelming amount of network traffic
• DDOS attacks involve: – A controlling application– An illicit service– A zombie– A target
• DOS and DDOS attacks can be diagnosed by:– Using a packet sniffer to view traffic– Using the netstat command to view connections– Using intrusion-detection systems
Convergence Technologies
VLAN Hopping
• VLAN hopping is an attack in which a hacker intercepts packets as they are sent from one VLAN to another on a trunk
• To avoid VLAN hopping:– Disable autotrunking– Remove the native VLAN setting (VLAN 1)
from any trunk port
Convergence Technologies
MAC Address Movements
• Sudden changes in MAC addresses, such as two systems suddenly exchanging IP addresses, can indicate that someone is attempting to poison the ARP cache
• Monitoring the ARP cache with a tool such as Arpwatch can guard against ARP spoofing
Convergence Technologies
Intrusion Detection
• Intrusion detection strategies rely on:– Signature detection– Anomaly detection (less common)
• IDS applications require a current signature database• IDS application types are:
– Host-based• Captures traffic only on host, not on the network
wire– Network-based
• Does not capture traffic on switched networks• Port mirroring enables captures and monitoring on
switched networks
Convergence Technologies
Maintaining Your Networks
• Essential tasks for maintaining a convergent network include:– Scan systems regularly to detect unusual behavior– Upgrade equipment as necessary– Install system patches and service packs– Keep antivirus files current– Install firmware upgrades– Perform regular backups
• Full• Differential• Incremental
– Verify that backups are successful– Ensure careful (off-site) storage of backup media– Choose an optimal backup schedule
Convergence Technologies
Summary
Define latency, jitter and wander Implement methods for reducing or eliminating latency,
jitter and wander (e.g., implementing a jitter buffer, implementing QoS, traffic shaping, VLANs)
Explain the impact of large frames on real-time communications
Identify factors that affect the bandwidth of voice and video calls on convergent networks (e.g., latency, protocol incompatibility, MTU, codec choice, compression, QoS issues, packet reordering, loss of feature set)
Use accepted industry standards such as the Mean Opinion Score (MOS) to determine voice and video quality, including MOS for popular codecs, standard MOS numbers, R-value and subjective video quality
Convergence Technologies
Summary (cont'd)
Identify common network bottlenecks in convergent networks, including solutions (e.g., monitoring network devices and protocols, creating a baseline, changing configuration, upgrading hardware)
Analyze traffic in a convergent network and resolve problems using a packet sniffer, monitoring software, and hardware solutions
Troubleshoot convergent communications over wireless networks
Identify problems in contacting emergency services through convergent networks
Parse a Call Detail Record (CDR) and list relevant entries
Convergence Technologies
Summary (cont'd)
Identify types and effects of attacks in convergent networks, including man-in-the-middle attacks (e.g., packet sniffing, TCP connection hijacking, registration hijacking), voice mail compromises, viruses, brute-force and dictionary attacks, zero-day attacks, illicit servers, toll fraud and unsolicited calls
Define denial-of-service (DOS) and distributed DOS (DDOS) attacks, and identify ways to counteract them, including common traffic types used (e.g., SYN, UDP or ICMP flood), reconfiguring core upstream routers, using alternative sites, intentional and unintentional DOS
Explain the practice and impact of VLAN hopping Explain the significance and impact of MAC address
movements, additions and changes
Convergence Technologies
Summary (cont'd)
Identify types of intrusion detection (e.g., host-based, network-based, defining effective signatures, proactive detection)
Explain the practice and impact of VLAN hopping Back up, upgrade and scan systems to thwart attacks,
including backup types, system patches, service packs, firmware upgrades, optimal backup schedule
Convergence Technologies
Convergence Technologies
Convergent Network Traffic Protocols Implementing VoIP Traffic, Troubleshooting and Security
Recommended