102
Convergence Technologies

Convergence Technologies

  • Upload
    shino

  • View
    26

  • Download
    0

Embed Size (px)

DESCRIPTION

Convergence Technologies. Lesson 1: Convergent Network Traffic Protocols. Objectives. Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traverse multiple WAN links, and call and call flow descriptions - PowerPoint PPT Presentation

Citation preview

Page 1: Convergence  Technologies

Convergence Technologies

Page 2: Convergence  Technologies

Lesson 1:Convergent Network

Traffic Protocols

Page 3: Convergence  Technologies

Convergence Technologies

Objectives

• Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traverse multiple WAN links, and call and call flow descriptions

• Define the Realtime Transport Protocol (RTP) and the Realtime Transport Control Protocol (RTCP)

• Identify the components of Session Initiation Protocol (SIP) and describe the format of an SIP Uniform Resource Identifier (URI)

• Identify the functions of signaling protocols for converged networks (e.g., Session Initiation Protocol [SIP], H.323, H.225, H.320, H.450, Media Gateway Control Protocol [MGCP], Media Gateway Control [Megaco])

• Compare and contrast the functions of gatekeepers, gateways and proxies in relation to SIP and H.323 devices

• Compare and contrast SIP, H.323 and Megaco/MGCP

Page 4: Convergence  Technologies

Convergence Technologies

Defining Convergence

• Convergence – The integration of telephony and data technologies

• Integration includes:– Placing the voice network (telephony), the

video network (television, satellite) and the Internet (rich media) onto common platforms

Page 5: Convergence  Technologies

Convergence Technologies

Smart Network and Dumb Network

Page 6: Convergence  Technologies

Convergence Technologies

Circuit-Based vs.Convergence Calling

• Circuit-switched network – uses a dedicated physical path to send and receive information

• Circuit-based calls:– Provide very good voice quality– May fail if the destination is busy or the network fails

at any point in the connection• Packet-switched network – places addressing information

into data packets• Convergence-based calls:

– Dynamically reroute packets to other network nodes if a network node fails

– Result in increased latency because packetization and compression add processing time to the signal

Page 7: Convergence  Technologies

Convergence Technologies

Transport Through a Packet-Switched Network

• Packets are encapsulated in Ethernet frames– At Layer 4, source and destination port

numbers are added– At Layer 3, source and destination IP

addresses are added– At Layer 2, source and destination MAC

addresses are added

Page 8: Convergence  Technologies

Convergence Technologies

User Datagram Protocol

• UDP header is very simple, consisting of source and destination port numbers, a length field, and a checksum field

Page 9: Convergence  Technologies

Convergence Technologies

Realtime Transport Protocol (RTP)

• Used to transport voice and video payloads for real-time applications

• Provides end-to-end delivery services• Runs over both UDP and TCP• Uses even port numbers that are generally

assigned dynamically• Default port is 5004• RTP profiles define a set of codes for each type

of payload

Page 10: Convergence  Technologies

Convergence Technologies

RTP Packets

• RTP packets are encapsulated in UDP packets

Page 11: Convergence  Technologies

Convergence Technologies

Realtime Transport Control Protocol (RTCP)

• Does not transport any data itself• Partners with Realtime Transport Protocol (RTP)• Monitors the media stream• Provides feedback on the Quality of Service

(QoS) being provided by RTP• While RTP uses an even port number, RTCP

always uses the next odd port number• Default port is 5005

Page 12: Convergence  Technologies

Convergence Technologies

Session Initiation Protocol (SIP)

• Signaling protocol only — does not deliver media streams, nor does it control the delivery of media streams

• Initiates and manages sessions (or connections) between 2 or more participants

• Primary function is to set up, modify and tear down a connection

• Developed by the IETF, SIP is modeled after Hypertext Transfer Protocol (HTTP)

Page 13: Convergence  Technologies

Convergence Technologies

SIP Related Protocols

• Session Description Protocol (SDP)– Describes the characteristics of end points in

a session• Multiprotocol Label Switching (MPLS)

– Can provide QoS for SIP connections• Resource Reservation Protocol (RSVP)

– Can provide QoS for SIP connections• Differentiated Services (DiffServ)

– Can provide QoS for SIP connections

Page 14: Convergence  Technologies

Convergence Technologies

SIP ports and URIs

• SIP uses both UDP and TCP ports 5060 by default

• SIP URI takes the following format:sip:user@host

• SIP URI examples:sip:[email protected]:[email protected]:[email protected]

Page 15: Convergence  Technologies

Convergence Technologies

SIP Components

• User agents– User agent client (UAC): initiates an SIP request– User agent server (UAS): responds to SIP request

• Servers:– Proxy: perform routing, authentication and

accounting functions– Redirect: relays information to a user agent, such

as the IP address of the party to be called– Registrar: enables a client to let a proxy or

redirect server know how the client can be reached

Page 16: Convergence  Technologies

Convergence Technologies

SIP Messages

• Requests– INVITE– ACK– BYE– Cancel– Options– Register

• Each request (except for an ACK request) requires a response

Page 17: Convergence  Technologies

Convergence Technologies

SIP Messages (cont'd)

• Responses are composed of a 3-digit Status Code and an associated Reason Phrase

Page 18: Convergence  Technologies

Convergence Technologies

SIP Calls

Session Invitation• Consists of one

INVITE request, usually sent to an SIP proxy

• A 200 OK response is generated when the called party answers the phone

• Media streams are sent directly between end points

Page 19: Convergence  Technologies

Convergence Technologies

H.323

• Defines the following:– How an audiographic call is set up across a

network– How to negotiate capabilities– How to transmit data and control

conferencing– Which default audio and video codecs to use

Page 20: Convergence  Technologies

Convergence Technologies

H.323 Architecture

• Terminals – H.323 end points– Can be a stand-alone device (IP phone) or a

logical device within a PC– Includes audio and video codecs– Must support H.245 for capabilities

negotiation– Uses Q.931 for call signaling and setup– Uses H.225 RAS for communicating with

gatekeepers– Must support RTP and RTCP

Page 21: Convergence  Technologies

Convergence Technologies

H.323 Architecture (cont'd)

• Gateways– Connect and translate protocols between

dissimilar networks– Provide protocol translation, media format

conversion and data transfer between H.323 and non-H.323 networks

– Optional element; not required for connections within one LAN

– Required to establish connections between terminals in H.323 networks and terminals in networks with different protocols

Page 22: Convergence  Technologies

Convergence Technologies

H.323 Architecture (cont'd)

• Gatekeeper functionality:– Admission control– Address translation– Bandwidth control– Zone management– Call control for point-to-point conferences– Codec translation– Call authorization– Bandwidth and call management– Accounting and billing– Call routing

• Multipoint Control Unit (MCU) – required whenever three or more H.323 terminals are connected

Page 23: Convergence  Technologies

Convergence Technologies

H.323 Protocol Stack

Page 24: Convergence  Technologies

Convergence Technologies

H.225 RAS

• RAS messages (requests and responses) are sent between end points and gatekeepers via UDP– Gatekeeper messages are sent for gatekeeper

discovery (GRQ, GCF, GRJ)– Registration messages are sent for negotiating a

registration with a gatekeeper (RRQ, RCF, RRJ)– Admission messages are requests and replies for

address translation (ARQ, ACF, ARJ)– Status messages are used to monitor end point status

during calls that are routed through a gatekeeper (IRQ, IRR)

– Disengage messages signal the end of a call (DRQ, DCF)

Page 25: Convergence  Technologies

Convergence Technologies

H.323 Calls

• In a typical call:– A client contacts a gatekeeper and requests

an address using H.225 RAS admission request (ARQ)

– Gatekeeper forwards address to the client– Client establishes session using H.225– Session is negotiated using H.245

Page 26: Convergence  Technologies

Convergence Technologies

H.323 Calls (cont'd)

H.225 call signaling is used between terminals to set up and tear down a connection

Page 27: Convergence  Technologies

Convergence Technologies

H.323 Calls (cont'd)

H.245 call control signaling is used for negotiating capabilities and master/slave determination

Page 28: Convergence  Technologies

Convergence Technologies

Media Gateway Control Protocol (MGCP)

• Media Gateway Control Protocol (MGCP) – a signaling protocol used in IP telephony systems– MGCP controls media gateways by sending

signals from a media gateway controller– MGCP is a master/slave protocol– MGCP assumes that call logic and call state

are maintained by intelligent end points

Page 29: Convergence  Technologies

Convergence Technologies

Network Call Signaling (NCS)

• Network Call Signaling (NCS) – a protocol that creates embedded agents to use MGCP in a network

Page 30: Convergence  Technologies

Convergence Technologies

Megaco/H.248

• Enhanced version of MGCP• Result of a joint effort between IETF and ITU• Megaco enables the separation of call control

from media conversion• Megaco instructs an MG to connect streams

coming from outside a packet or cell data network onto a packet or cell stream such as Realtime Transport Protocol (RTP) streams

Page 31: Convergence  Technologies

Convergence Technologies

SIP vs. H.323 vs. Megaco

Page 32: Convergence  Technologies

Convergence Technologies

Summary

Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traverse multiple WAN links, and call and call flow descriptions

Define the Realtime Transport Protocol (RTP) and the Realtime Transport Control Protocol (RTCP)

Identify the components of Session Initiation Protocol (SIP) and describe the format of an SIP Uniform Resource Identifier (URI)

Identify the functions of signaling protocols for converged networks (e.g., Session Initiation Protocol [SIP], H.323, H.225, H.320, H.450, Media Gateway Control Protocol [MGCP], Media Gateway Control [Megaco])

Compare and contrast the functions of gatekeepers, gateways and proxies in relation to SIP and H.323 devices

Page 33: Convergence  Technologies

Lesson 2:Implementing VoIP

Page 34: Convergence  Technologies

Convergence Technologies

Objectives

• List essential steps for qualifying a network's ability to support convergence (e.g., cable inspection, existing and maximum device capacity, replacing hubs with switches, Power over Ethernet [PoE] requirements, VLAN creation, conducting network reconnaissance)

• Describe the features of Telephony Application Programming Interface (TAPI) and Messaging Application Programming Interface (MAPI) in a converged solution

• Implement Telephone Number Mapping (ENUM), elements of global and private numbering plans, Local Number Portability (LNP)/Wireless LNP, end-point addressing, path selection, calling classes, digit manipulation, overlapping number ranges

• Identify common G.7xx codecs and their bandwidth requirements in a converged environment (e.g., G.711, G.729, G.729a, G.726 and others)

Page 35: Convergence  Technologies

Convergence Technologies

Objectives (cont'd)

• Describe the impact of compression on voice quality, and identify issues involved when converting voice to analog and digital formats

• Identify benefits and drawbacks of various codecs in relation to bandwidth and voice quality

• Calculate and estimate bandwidth usage for various codecs, including considerations of overhead, connection quality, and other factors that affect theoretical calculations (e.g., capacity planning, choosing connection speeds)

• Recommend codecs for use with local/in-network/within-LAN calls, and for across WAN connections

• Explain wireless convergence technologies, including Digital Enhanced Cordless Telecommunications (DECT) and DECT layers, Personal Wireless Telephone (PWT), Generic Access Profile (GAP), expected ranges for interference-free communication, and the MHz ranges for each standard

Page 36: Convergence  Technologies

Convergence Technologies

Objectives (cont'd)

• Identify the elements of the IP Multimedia Subsystem (IMS)

• Explain real-time faxing, according to standards such as ITU T.38

• Explain store-and-forward faxing, according to standards such as ITU T.37

• Identify the features, benefits, problems and management of presencing, including single sign-on, features available in various devices

• List unified message methods and benefits (e.g., fax, voice, text, video)

• Identify common and essential videoconferencing codecs, standards and practices (e.g., Moving Picture Experts Group [MPEG], Quarter Common Intermediate Format [QCIF], etc.), and choose the appropriate codecs for various bandwidths

Page 37: Convergence  Technologies

Convergence Technologies

Objectives (cont'd)

• Summarize television/video-calling standards and practices

• Identify multimedia conferencing standards, including all subsets of T.120 (e.g., T.123, T.124, T.135)

• Explain fundamentals of Internet Protocol television (IPTV), including set-top box, Video on Demand (VoD), accepted codecs (e.g., Video Codec [VC-1])

• Identify the purpose and function of voice and videoconferencing hardware (e.g., Multipoint Control Unit [MCU], set-top box, Session Border Controller [SBC])

• Compare and contrast traditional and IP-based private branch exchange (PBX) systems

• Identify convergent terminal equipment and software, including analog telephone adapter (ATA), single line adapter, soft phones (WiFi, PDA, PC-based), analog phones, time division multiplexer (TDM), protocol-specific handsets (e.g., SIP, Megaco)

Page 38: Convergence  Technologies

Convergence Technologies

Objectives (cont'd)

• Explain power issues, including redundancy planning, Power over Ethernet (PoE)/802.3af, PoE classes, expected voltage, wattage, power sourcing equipment (PSE), powered devices (PDs)

Page 39: Convergence  Technologies

Convergence Technologies

Planning aConvergent Network

• Major phases of an implementation plan include these steps:– Identifying expectations– Determining bandwidth requirements– Performing a network health check– Creating a phased deployment plan

Page 40: Convergence  Technologies

Convergence Technologies

Identifying Expectations

• Identify how network(s) will be used• Identify specific protocols that will be used• Identify and explain potential challenges

Page 41: Convergence  Technologies

Convergence Technologies

Determining Bandwidth Requirements

• Identify current digital connection• Determine bandwidth required by existing

network• Monitor current network performance• Evaluate current network performance• Calculate additional requirements for VoIP• Take wide area network (WAN) links into

account• Take growth into account

Page 42: Convergence  Technologies

Convergence Technologies

Performing a Network Health Check

• Check network cabling• Replace hubs with Layer 2 switches• Implement VLANs• Prioritize VLAN traffic• Check routers• Identify the entity that manages Internet router• Examine current IP addressing scheme• Examine Domain Name System (DNS)• Examine firewall• Identify whether NAT will be implemented• Identify whether VPNs must be supported• Identify whether any part of the LAN will be wireless

Page 43: Convergence  Technologies

Convergence Technologies

Creating a Phased Deployment Plan

• Create a detailed, approved implementation plan

• Use a test network• Deploy incrementally• Do not begin with the sales department

Page 44: Convergence  Technologies

Convergence Technologies

TAPI and MAPI

• Telephony Application Programming Interface (TAPI) is an API used for connecting a Windows PC to telephone services

• Messaging Application Programming Interface (MAPI) is a Windows API that allows different e-mail applications to work together to distribute mail

Page 45: Convergence  Technologies

Convergence Technologies

Numbering Plans

• Private numbering plans allow a company to create its own numbering system

• Extensions can be created based on an organization’s needs

• Number plan defines the format of telephone numbers

• Implementing VoIP involves designing a numbering plan and a dial plan.

• Dial plan must include rules for dealing with:– End point addressing– Path selection– Calling classes– Digit manipulation– Overlapping number

ranges

Page 46: Convergence  Technologies

Convergence Technologies

Telephone Number Mapping (ENUM)

• Maps E.164 telephone numbers into the Domain Name System (DNS)

• Creates a dynamic mapping of E.164 addresses to IP addresses

• ENUM domain names are hosted in the e164.arpa domain– A telephone number such as +1 (602) 555-

1212 is converted into the ENUM domain name 2.1.2.1.5.5.5.2.0.6.1.e164.arpa

– ENUM domain name resolves to one or more DNS NAPTR records

Page 47: Convergence  Technologies

Convergence Technologies

G.7xx Codecs

• Various codecs provide different amounts of compression

• Compression allows more voice traffic, but can also:– Introduce delay– Adversely affect voice quality– Put a significant strain on CPU resources,

depending on the complexity of the algorithm and the amount of compression

Page 48: Convergence  Technologies

Convergence Technologies

Comparison of G.7xx Codecs

Page 49: Convergence  Technologies

Convergence Technologies

Calculating VoIP Bandwidth Requirements

• Calculations for bandwidth requirements must factor in:– Codec, sample period and frame size– Frames per packet– IP overhead– Ethernet overhead– Number of simultaneous calls– Silence suppression– Compressed headers

Page 50: Convergence  Technologies

Convergence Technologies

Wireless Convergence Technologies

• Components– Radio exchange– Base stations (transceivers)– Portable phones

• Digital Enhanced Cordless Telecommunications (DECT) is an ETSI standard for digital portable phones– Generic Access Profile (GAP) guarantees

interoperability between any handset and any base station, regardless of make or model

– Operates in the 1880 MHz to 1900 MHz band in Europe, Africa, Australia and Asia (except China)

– Operates in the following bands in North America: 902 MHz to 928 MHz, 2400 MHz to 2483.5 MHz, 5725 MHz to 5850 MHz

Page 51: Convergence  Technologies

Convergence Technologies

IP Multimedia Subsystem (IMS)

• IP Multimedia Subsystem (IMS) is a network architecture designed to enable convergence of voice and data applications and various mobile network technologies

• IMS architecture includes 3 layers:– Connectivity layer (also called the transport layer)

composed of routers, media gateways and switches– Control layer composed of network control servers that

manage call setup, modification and release– Application layer (also called the service layer)

composed of application and content servers that deliver services within the network

Page 52: Convergence  Technologies

Convergence Technologies

Facsimile

• Fax transmissions impose special demands on VoIP because fax standards were designed for circuit-switched connections

• T.30 standardizes the way in which faxes are sent across standard circuit-switched telephone lines

• T.38 designed for real-time fax transmissions over an IP network

• T.37 designed for store-and-forward fax transmission over an IP network

Page 53: Convergence  Technologies

Convergence Technologies

Presencing

• Presence information is a status indicator that conveys a person’s willingness and ability to engage in communications

• Presencing can span different communication channels

• Multiple Points of Presence (MPOP) describes how multiple communications devices can combine state to provide a multidimensional view of a user’s availability status

• Presencing requires collaboration among a number of devices and the presence services with which each of them is connected

• Presencing raises privacy concerns

Page 54: Convergence  Technologies

Convergence Technologies

Unified Messaging

• In unified messaging (UM), all messaging media can come together in the form of a unified mailbox and/or alert service

• Unified messaging offers– Single delivery– Single repository– Single access– Single notification

Page 55: Convergence  Technologies

Convergence Technologies

Video Services

• Video codecs and standards include:– H.261– Common Intermediate Format (CIF)

• Quarter CIF (QCIF)• Sub Quarter CIF (SQCIF)• 4CIF• 16CIF

– H.263– Moving Picture Experts Group (MPEG)

• MPEG-1• MPEG-2/H.262• MPEG-4

– H.264/MPEG-4 Advanced Video Coding (AVC)– Realtime Streaming Protocol (RTSP)

Page 56: Convergence  Technologies

Convergence Technologies

T.120 Multimedia Conferencing Standards

• Key features:– Support for real-time communication between

two or more entities– Support for application sharing, electronic

whiteboarding, file exchange and chat– Support for interoperability between end

points from multiple vendors– Support for a broad range of transport

options– Co-existence with other standards

Page 57: Convergence  Technologies

Convergence Technologies

T.120 Architecture

Additional protocols:• T.128: Multipoint application sharing• T.134: Text chat application entity• T.135: User-to-reservation system transactions with T.120

conferences• T.136: Remote device control application protocol• T.137: Virtual meeting room management services and

protocol

Page 58: Convergence  Technologies

Convergence Technologies

Internet Protocol TV (IPTV)

• Internet Protocol TV (IPTV) can include – Live broadcast (uses Internet Group

Messaging Protocol [IGMP] version 2)– Video on Demand (uses Realtime Streaming

Protocol [RTSP])• Requires a set-top box or PC to receive content

from a media server• Common codecs include: H.264/MPEG-4 AVC,

MPEG-2, VC-1

Page 59: Convergence  Technologies

Convergence Technologies

Common Convergence Devices

• Videoconferencing hardware– Multipoint Control Unit (MCU)– Session Border Controller (SBC)

• IP PBX or traditional PBX• Terminal equipment

– VoIP phones– Digital phones– Analog telephones and adapters – Soft phones– Single line adapter– Time division multiplexer

Page 60: Convergence  Technologies

Convergence Technologies

Power Issues for Convergent Networks

• Redundant power – Uninterruptible power supply (UPS)

• Power over Ethernet (PoE)– Power Sourcing Equipment (PSE) provides power– Powered Devices (PD) use the power provided– Maximum power supplied is 15.4 watts at 48 volts– Five power classes (0-4)– Two power modes (Mode A and Mode B)

• PSE capable of determining the mode a PD uses– Injector supplies power into the appropriate wires of

the Ethernet cable– Deployment of PoE requires a power budget to ensure

that PSE can supply sufficient power to all PDs

Page 61: Convergence  Technologies

Convergence Technologies

Summary

List essential steps for qualifying a network's ability to support convergence (e.g., cable inspection, existing and maximum device capacity, replacing hubs with switches, Power over Ethernet [PoE] requirements, VLAN creation, conducting network reconnaissance

Describe the features of Telephony Application Programming Interface (TAPI) and Messaging Application Programming Interface (MAPI) in a converged solution

Implement Telephone Number Mapping (ENUM), elements of global and private numbering plans, Local Number Portability (LNP)/Wireless LNP, end-point addressing, path selection, calling classes, digit manipulation, overlapping number ranges

Identify common G.7xx codecs and their bandwidth requirements in a converged environment (e.g., G.711, G.729, G.729a, G.726 and others)

Page 62: Convergence  Technologies

Convergence Technologies

Summary (cont'd)

Describe the impact of compression on voice quality, and identify issues involved when converting voice to analog and digital formats

Identify benefits and drawbacks of various codecs in relation to bandwidth and voice quality

Calculate and estimate bandwidth usage for various codecs, including considerations of overhead, connection quality, and other factors that affect theoretical calculations (e.g., capacity planning, choosing connection speeds)

Recommend codecs for use with local/in-network/within-LAN calls, and for across WAN connections

Explain wireless convergence technologies, including Digital Enhanced Cordless Telecommunications (DECT) and DECT layers, Personal Wireless Telephone (PWT), Generic Access Profile (GAP), expected ranges for interference-free communication, and the MHz ranges for each standard

Page 63: Convergence  Technologies

Convergence Technologies

Summary (cont'd)

Identify the elements of the IP Multimedia Subsystem (IMS)

Explain real-time faxing, according to standards such as ITU T.38

Explain store-and-forward faxing, according to standards such as ITU T.37

Identify the features, benefits, problems and management of presencing, including single sign-on, features available in various devices

List unified message methods and benefits (e.g., fax, voice, text, video)

Identify common and essential videoconferencing codecs, standards and practices (e.g., Moving Picture Experts Group [MPEG], Quarter Common Intermediate Format [QCIF], etc.), and choose the appropriate codecs for various bandwidths

Page 64: Convergence  Technologies

Convergence Technologies

Summary (cont'd)

Summarize television/video-calling standards and practices

Identify multimedia conferencing standards, including all subsets of T.120 (e.g., T.123, T.124, T.135)

Explain fundamentals of Internet Protocol television (IPTV), including set-top box, Video on Demand (VoD), accepted codecs (e.g., Video Codec [VC-1])

Identify the purpose and function of voice and videoconferencing hardware (e.g., Multipoint Control Unit [MCU], set-top box, Session Border Controller [SBC])

Compare and contrast traditional and IP-based private branch exchange (PBX) systems

Identify convergent terminal equipment and software, including analog telephone adapter (ATA), single line adapter, soft phones (WiFi, PDA, PC-based), analog phones, time division multiplexer (TDM), protocol-specific handsets (e.g., SIP, Megaco)

Page 65: Convergence  Technologies

Convergence Technologies

Summary (cont'd)

Explain power issues, including redundancy planning, Power over Ethernet (PoE)/802.3af, PoE classes, expected voltage, wattage, power sourcing equipment (PSE), powered devices (PDs)

Page 66: Convergence  Technologies

Lesson 3:Traffic, Troubleshooting

and Security

Page 67: Convergence  Technologies

Convergence Technologies

Objectives

• Define latency, jitter and wander • Implement methods for reducing or eliminating latency,

jitter and wander (e.g., implementing a jitter buffer, implementing QoS, traffic shaping, VLANs)

• Explain the impact of large frames on real-time communications

• Identify factors that affect the bandwidth of voice and video calls on convergent networks (e.g., latency, protocol incompatibility, MTU, codec choice, compression, QoS issues, packet reordering, loss of feature set)

• Use accepted industry standards such as the Mean Opinion Score (MOS) to determine voice and video quality, including MOS for popular codecs, standard MOS numbers, R-value and subjective video quality

Page 68: Convergence  Technologies

Convergence Technologies

Objectives (cont'd)

• Identify common network bottlenecks in convergent networks, including solutions (e.g., monitoring network devices and protocols, creating a baseline, changing configuration, upgrading hardware)

• Analyze traffic in a convergent network and resolve problems using a packet sniffer, monitoring software, and hardware solutions

• Troubleshoot convergent communications over wireless networks

• Identify problems in contacting emergency services through convergent networks

• Parse a Call Detail Record (CDR) and list relevant entries

Page 69: Convergence  Technologies

Convergence Technologies

Objectives (cont'd)

• Identify types and effects of attacks in convergent networks, including man-in-the-middle attacks (e.g., packet sniffing, TCP connection hijacking, registration hijacking), voice mail compromises, viruses, brute-force and dictionary attacks, zero-day attacks, illicit servers, toll fraud and unsolicited calls

• Define denial-of-service (DOS) and distributed DOS (DDOS) attacks, and identify ways to counteract them, including common traffic types used (e.g., SYN, UDP or ICMP flood), reconfiguring core upstream routers, using alternative sites, intentional and unintentional DOS

• Explain the practice and impact of VLAN hopping • Explain the significance and impact of MAC address

movements, additions and changes • Identify types of intrusion detection (e.g., host-based,

network-based, defining effective signatures, proactive detection)

Page 70: Convergence  Technologies

Convergence Technologies

Objectives (cont'd)

• Back up, upgrade and scan systems to thwart attacks, including backup types, system patches, service packs, firmware upgrades, optimal backup schedule

Page 71: Convergence  Technologies

Convergence Technologies

VoIP Variables

• VoIP variables – conditions that cause problems in voice communications

• VoIP variables include:– Delay – the amount of wait time between the

time a signal is sent and received– Latency – the amount of time required for

data to be transmitted across a network– Jitter – variability in the arrival rate of data

packets transmitted over a network– Wander – variability of more than one second

in the arrival rate of data packets transmitted over a network (long-term jitter)

Page 72: Convergence  Technologies

Convergence Technologies

Delay• Fixed delays

– Propagation delay – caused by the distance between the request and the server fulfilling the request

– Serialization delay – the time required to physically place voice call bits on a trunk line

– End point processing delay – caused by compressing/ decompressing and encoding/decoding data

– Packetization delay – the time required to place digital traffic into a particular medium

• Variable delays– Queuing delay – the time packets wait for other

packets to be placed onto a trunk line– Router processing delay – the time required for a

router to apply QoS settings, or to process packets that have arrived out of order

Page 73: Convergence  Technologies

Convergence Technologies

Latency

• Latency results when multiple delays occur• The most significant source of latency is the

digital signal processing that occurs in gateways and routers

• Round-trip latency is the total delay experienced by two users on a phone call

• Round-trip latency in the PSTN is typically less than 150 milliseconds, except on international calls

• ITU recommends that for good voice quality in VoIP calls, one-way latency must not exceed 150 milliseconds

Page 74: Convergence  Technologies

Convergence Technologies

Jitter

• Jitter occurs when packets in a voice transmission take different paths over a network, causing them to arrive out of sequence

• A jitter buffer can correct this variability by providing a space in memory that allows packet resequencing

Page 75: Convergence  Technologies

Convergence Technologies

Packet Handling in the Enterprise

• A chief cause of delay and jitter is queuing at the router

• By default, routers process queues on a first in first out (FIFO) basis

• Implementing QoS on routers improves voice quality

• Convergent QoS technologies include:– Creating VLANS– Assigning prioritization– Setting IP precedence values– Employing traffic-shaping algorithms

Page 76: Convergence  Technologies

Convergence Technologies

Wander

• Wander is due to synchronization problems in the network clocks used to control transmissions

• When wander is detected, the signal must be reclocked, or synchronized, at the next network element to avoid propagating the wander activity

• The Network Time Protocol (NTP) ensures that systems are accurate to within milliseconds

• NTP servers belong to two strata:– Stratum 1 – clocks that are the most accurate;

often GPS-enabled timekeeping systems– Stratum 3/3E – VoIP gatekeepers, gateways

and PBXs

Page 77: Convergence  Technologies

Convergence Technologies

Large Data Packets

• Voice packets can get “stuck” behind large data packets and incur significant delay

• Segmenting large data packets on the network can help control latency and jitter of voice services

Page 78: Convergence  Technologies

Convergence Technologies

Other Throughput Considerations

• Additional factors that affect the quality of voice transmissions include:– Choice of codec– Complexity of compression algorithm– Lack of QoS support on the network– Overutilization of routers– Packet reordering (caused by congestion and

queuing at routers)– Protocol and codec incompatibility– MTU setting– Loss of feature set

Page 79: Convergence  Technologies

Convergence Technologies

Connection QoS: Using Multiple Connections

• Connection QoS ensures that the gateway can protect calls from network problems in several ways, including:– Trunk busy-out– Alternative gateway selection– Fallback to the PSTN

• The gateway prevents a trunk from servicing a call if: – The IP network fails– The gateway detects an internal problem

Page 80: Convergence  Technologies

Convergence Technologies

Mean Opinion Score (MOS)

MOS is an industry standard numerical measurement of voice quality

Page 81: Convergence  Technologies

Convergence Technologies

R-value

• R-value is another industry standard for measuring voice quality

• R-values are derived from direct measurements of equipment and traffic parameters

• R-value score ranges from 1 (worst) to 100 (best)

• One MOS point is roughly equal to 20 R-value points, but the correlation is not linear

Page 82: Convergence  Technologies

Convergence Technologies

Mean Opinion Scores for Popular Audio Codecs

Page 83: Convergence  Technologies

Convergence Technologies

Maintaining and Troubleshooting Convergent Networks

• Monitoring is an important aspect of maintaining convergent networks

• The first step in monitoring is establishing a baseline– A baseline is a record of normal network

activity that serves as an example for comparing future network activity

Page 84: Convergence  Technologies

Convergence Technologies

Establishing a Baseline

• Baseline measurement statistics should include data on:– Traffic analysis/end-to-end performance

• Identifies latency, percentage of packet loss and link utilization

• Tools include: ping and traceroute, and hardware monitoring mode

– Device performance• Identifies factors such as CPU and memory

usage

Page 85: Convergence  Technologies

Convergence Technologies

Device Configuration

• Device configuration directly affects the performance of convergent networks

• Check configurations of – Switches

• Ensure VLANs are properly configured• Ensure proper communication mode (full-duplex,

half-duplex, auto-negotiation) settings on switch ports

– End points• Ensure each end point has a valid IP address• Ensure that communication mode on NIC is set

properly • Install firmware or software updates as they

become available

Page 86: Convergence  Technologies

Convergence Technologies

Troubleshooting Convergence in Wireless Networks

• In wireless networks, points for troubleshooting include:– Access points (APs):

• Should support enterprise-level QoS• Should provide overlapping coverage• Should be deployed in sufficient number• Should be able to reject calls when becoming

overloaded• Should support roaming

– Environment• Check for sources of interference

– Handsets• Ensure proper configurations (for example,

encryption keys)• Install available updates/upgrades

Page 87: Convergence  Technologies

Convergence Technologies

Call Detail Records

• Call Detail Records include information about the the following call details:– Time– Date– Call duration– Number dialed– Caller ID information– Extension– Line/trunk location– Cost– Call completion status

Page 88: Convergence  Technologies

Convergence Technologies

Security in Convergent Networks

• Security is a set of procedures designed to protect transmitted and stored information, as well as network resources

• In convergent networks, security includes preventing:– Call interception– Phone fraud– Network attacks

Page 89: Convergence  Technologies

Convergence Technologies

Protocol Review

• Inherent weaknesses in IPv4 include:– Transmission Control Protocol (TCP) handshake

– often manipulated by hackers– Internet Protocol (IP) – does not sign or encrypt

packets, and packets are easily manipulated– User Datagram Protocol (UDP) – often used to

conduct scans of systems, and UDP packets can be forged to wage distributed denial-of-service attacks

– Address Resolution Protocol (ARP) – does not authenticate the hosts it resolves and is subject to ARP cache poisoning

Page 90: Convergence  Technologies

Convergence Technologies

Overview of Network Attacks

• Network attacks include:– Spoofing attacks

• IP spoofing• ARP spoofing• DNS spoofing

– Man-in-the-middle (hijacking) attacks• Password sniffing• Connection termination• Connection hijacking• Packet insertion• Poisoning

– Password-guessing attacks• Brute-force attacks• Dictionary attacks

Page 91: Convergence  Technologies

Convergence Technologies

Malicious Code

• Types of malicious code include:– Viruses– Worms– Illicit servers– Trojan horses

• To avoid malicious code, use:– Virus and worm protection– Application management and testing– Configuration management– File signature checking software

Page 92: Convergence  Technologies

Convergence Technologies

Denial-of-Service (DOS) Attacks

• Purpose of a denial-of-service attack is to:– Crash a server and make it unusable to

everyone– Assume the identity of the system being

crashed– Install a Trojan

• Flooding is the process of sending an overwhelming number of packets to a system

• Flooding techniques include:– SYN flood– Ping flood– UDP flood

Page 93: Convergence  Technologies

Convergence Technologies

Distributed Denial-of-Service (DDOS) Attacks

• Involve the cooperation of several systems to wage a coordinated attack that generates an overwhelming amount of network traffic

• DDOS attacks involve: – A controlling application– An illicit service– A zombie– A target

• DOS and DDOS attacks can be diagnosed by:– Using a packet sniffer to view traffic– Using the netstat command to view connections– Using intrusion-detection systems

Page 94: Convergence  Technologies

Convergence Technologies

VLAN Hopping

• VLAN hopping is an attack in which a hacker intercepts packets as they are sent from one VLAN to another on a trunk

• To avoid VLAN hopping:– Disable autotrunking– Remove the native VLAN setting (VLAN 1)

from any trunk port

Page 95: Convergence  Technologies

Convergence Technologies

MAC Address Movements

• Sudden changes in MAC addresses, such as two systems suddenly exchanging IP addresses, can indicate that someone is attempting to poison the ARP cache

• Monitoring the ARP cache with a tool such as Arpwatch can guard against ARP spoofing

Page 96: Convergence  Technologies

Convergence Technologies

Intrusion Detection

• Intrusion detection strategies rely on:– Signature detection– Anomaly detection (less common)

• IDS applications require a current signature database• IDS application types are:

– Host-based• Captures traffic only on host, not on the network

wire– Network-based

• Does not capture traffic on switched networks• Port mirroring enables captures and monitoring on

switched networks

Page 97: Convergence  Technologies

Convergence Technologies

Maintaining Your Networks

• Essential tasks for maintaining a convergent network include:– Scan systems regularly to detect unusual behavior– Upgrade equipment as necessary– Install system patches and service packs– Keep antivirus files current– Install firmware upgrades– Perform regular backups

• Full• Differential• Incremental

– Verify that backups are successful– Ensure careful (off-site) storage of backup media– Choose an optimal backup schedule

Page 98: Convergence  Technologies

Convergence Technologies

Summary

Define latency, jitter and wander Implement methods for reducing or eliminating latency,

jitter and wander (e.g., implementing a jitter buffer, implementing QoS, traffic shaping, VLANs)

Explain the impact of large frames on real-time communications

Identify factors that affect the bandwidth of voice and video calls on convergent networks (e.g., latency, protocol incompatibility, MTU, codec choice, compression, QoS issues, packet reordering, loss of feature set)

Use accepted industry standards such as the Mean Opinion Score (MOS) to determine voice and video quality, including MOS for popular codecs, standard MOS numbers, R-value and subjective video quality

Page 99: Convergence  Technologies

Convergence Technologies

Summary (cont'd)

Identify common network bottlenecks in convergent networks, including solutions (e.g., monitoring network devices and protocols, creating a baseline, changing configuration, upgrading hardware)

Analyze traffic in a convergent network and resolve problems using a packet sniffer, monitoring software, and hardware solutions

Troubleshoot convergent communications over wireless networks

Identify problems in contacting emergency services through convergent networks

Parse a Call Detail Record (CDR) and list relevant entries

Page 100: Convergence  Technologies

Convergence Technologies

Summary (cont'd)

Identify types and effects of attacks in convergent networks, including man-in-the-middle attacks (e.g., packet sniffing, TCP connection hijacking, registration hijacking), voice mail compromises, viruses, brute-force and dictionary attacks, zero-day attacks, illicit servers, toll fraud and unsolicited calls

Define denial-of-service (DOS) and distributed DOS (DDOS) attacks, and identify ways to counteract them, including common traffic types used (e.g., SYN, UDP or ICMP flood), reconfiguring core upstream routers, using alternative sites, intentional and unintentional DOS

Explain the practice and impact of VLAN hopping Explain the significance and impact of MAC address

movements, additions and changes

Page 101: Convergence  Technologies

Convergence Technologies

Summary (cont'd)

Identify types of intrusion detection (e.g., host-based, network-based, defining effective signatures, proactive detection)

Explain the practice and impact of VLAN hopping Back up, upgrade and scan systems to thwart attacks,

including backup types, system patches, service packs, firmware upgrades, optimal backup schedule

Page 102: Convergence  Technologies

Convergence Technologies

Convergence Technologies

Convergent Network Traffic Protocols Implementing VoIP Traffic, Troubleshooting and Security