Sie sind auf Seite 1von 9

VoIP Voice over IP

Mohammad Adil Khan Saghir Malik Hashir Zariwala


Engineering Department Engineering Department Engineering
Department

Abstract The VoIP signaling protocols use TCP to set up, manage
and tear down the VoIP phone call. Signaling protocols
This report consists of information regarding VoIP that are not concerned with the actual media stream of voice
how it is used to establish multimedia session (audio, or
video) traffic to be transmitted over Internet Protocol. video. Their basic functions are to first initiate a session,
VoIP uses communication services for transmission of then to find common ground for communication between
voice, fax, SMS and other voice messaging applications the parties involved and to terminate the session when
via the internet rather than PSTN (Public Switched the calls end. On a closed IP network, real time two way
Telephone Network). Signaling and media channel communications between nodes can be managed
establishment is done by two Protocols (H.323) and SIP. relatively easily. Signaling protocols take additional
responsibilities such as address translation, bandwidth
management, and authorization and in some cases make
Keywords: Unified Communication, routing decisions, while many sets of protocols have
Teleconferencing, H.323, SIP, gate keepers, gateways been developed over the years to handle above described
function.
Introduction There are two types of Signaling protocol in VoIP.
• H.323
Voice over Internet Protocol (Voice over IP, VoIP) is a • SIP (Session initiation Protocol)
general term used for the transmission of voice and H.323
multimedia sessions over (IP) Internet Protocol
networks, such as the Internet. The other terms that can H.323 was developed in mid nineties and was originally
be used with VoIP are IP telephony, VoBB (voice over established for the videoconferencing over a packet
broadband), Internet telephony and broadband phone. based network, but was quickly adopted for Voice over
VoIP uses communication services for transmission of IP. As a session layer protocol, its main function is to
voice, fax, SMS and other voice messaging applications perform call control and management on an IP network.
via the internet rather than PSTN (Public Switched The following H.323 suite of protocols is used for
Telephone Network). The steps involved in originating a signaling purpose.
VoIP telephone call are signaling and media channel
setup, digitization (and under some conditions
compression) of the analog voice signal, packetization
and transmission as Internet Protocol (IP) packets over a
packet-switched network. On the receiving side similar
steps reproduce the original voice stream.
Following are the steps used in establishing a VOIP call:
• Signaling
• Media Channel Setup
http://en.wikipedia.org/wiki/Voice_over_IP

Signaling
An H.323 network is comprised of four logical
components, not all of which will be needed on every
network and that can reside on a wide variety of devices.

Terminals
A terminal is an endpoint device such as an IP telephone,
a computer running an H.323 software application or a
dedicated conferencing device. An H.323 compliant
terminal must support H.245 for channel and capabilities
negotiation, RAS (Registration, Admission, Status),
Q931 for signaling and setup and support for RTP and
RTCP on which to stream the media. Terminals must
support audio with video and T.120 data
communications being optional.

Multipoint Control Units


An MCU provides services to allow three or more
terminals to participate in a conference. The MCU
consists of a Multipoint Controller (MC) and an optional
Multipoint Processor (MP). The MC is responsible for
H.245 functions (negotiating common ground) while the
optional MP handles the actual mixing of media streams,
The H323 specification relies on two additional and manages the streams to avoid bandwidth contention.
signaling protocols, H.225 and H.245 for call setup and H.323 supports Centralized, Decentralized, and a Hybrid
management. When a session is initiated between two concept of multipoint conferencing. When terminals
H.323 devices, the H.225 standard uses the Q931 ISDN participating in a conference reside in both a centralized
protocol to perform setup and teardown functions using and decentralized environment (mixed) the MCU acts as
TCP for a reliable connection. H.245 then opens another a bridge between the two.
TCP connection to establish the capabilities of the MC and MP functions can reside on a dedicated
devices, negotiate the codec’s, and determine which component, terminal, a gateway or a gatekeeper, but
ports will be used for the session. A channel is then when endpoints exist off network (i.e. PSTN), it is
opened on which the actual media will travel using UDP recommended that the MC be utilized on a gateway.
for transport because of its speed and relying on the
upper layer Real Time Protocol (RTP) for sequencing Gateways
and timing information. It is important to note that for
session set up, negotiation, and management, TCP is Gateways provide a variety of services, not the least of
used for its reliability. For time sensitive media such as which is protocol conversion between H.323 networks
voice and video, UDP is utilized as the transport and non-H.232, e.g. switched circuit networks (SCN). A
mechanism because of its speed and low overhead. The gateway performs call setup and teardown, translates
packet size can be further reduced by using RTP header audio, video and data formats, and can perform RAS for
compression, reducing the combined IP/UDP/RTP registration with the gatekeeper. On the H.323 side, the
header from over 65% to as low as 10% of the entire gateway uses H.225 and H.245 for call setup and
packet size. Smaller means faster, and in IP Telephony, management, and on the circuit switched side, it utilizes
the name of the game is speed. the protocols specific to SCNs such as ISDN and SS7. A
gateway can be implemented on a gatekeeper, an MCU,
or on a voice enabled router or switch.

Gatekeepers
As an optional component that is usually found in larger
Enterprise networks, the gatekeeper is the most
Components of H.323 important component in the H.323 configuration. The
gatekeeper manages all the registered terminals,
gateways, and MCUs in a single H.323 zone, which can streams. The modification can involve changing
span multiple LAN/WAN segments. Services such as addresses or ports, inviting more participants and adding
addressing, authorization and authentication of H.323 or deleting media streams. The SIP protocol is
components, bandwidth management, accounting and an Application Layer protocol designed to be
billing can all be configured on the gatekeeper. But once independent of the underlying transport layer; it can run
they are, all endpoints must obey! The king of the zone on Transmission Control Protocol (TCP), User Datagram
can make routing decisions, and can also simplify Protocol (UDP) or Stream Control Transmission
management of multiple gateways by handling their call Protocol (SCTP). It is a text-based protocol,
control functions in a centralized manner. While a incorporating many elements of the Hypertext Transfer
gatekeeper can be implemented on a gateway or MCU, Protocol (HTTP) and the Simple Mail Transfer
in larger organizations you will usually find them on a Protocol (SMTP). Other feasible application examples
dedicated server (such as Microsoft’s ISA server) or on a include video conferencing, streaming multimedia
Cisco IOS router. distribution, instant messaging, presence
information, file transfer and online games.

SIP Network Elements

SIP employs design elements similar to the HTTP


request/response transaction model. Each transaction
consists of a client request that invokes a particular
method or function on the server and at least one
response. SIP reuses most of the header fields, encoding
rules and status codes of HTTP, providing a readable
text-based format.
A SIP user agent (UA) is a logical network end-point
used to create or receive SIP messages and thereby
manage a SIP session. A SIP UA can perform the role of
a User Agent Client (UAC), which sends SIP requests,
and the User Agent Server (UAS), which receives the
requests and returns a SIP response. These roles of UAC
and UAS only last for the duration of a SIP transaction.
A SIP phone is a SIP user agent that provides the
traditional call functions of a telephone, such as dial,
answer, reject, hold/unhold, and call transfer. SIP phones
may be implemented by dedicated hardware controlled
One big advantage that the H.323 standard seems to have by the phone application directly or through an
over its nearest competitor is in the area of address embedded operating system (hardware SIP phone) or as
resolution. The gatekeeper has the ability to use a a soft phone, a software application that is installed on a
number of methods and protocols to resolve a destination personal computer or a mobile device. E.g. A personal
address. First, it can ask another gatekeeper. If that digital assistant (PDA) or cell phone with IP
doesn’t work, it can use Annex G/H.225.0, TRIP, connectivity. Each resource of a SIP network, such as a
ENUM, or DNS protocols for address resolution. User Agent or a voicemail box, is identified by
Security enhancements to H.323 are provided by H.235, a Uniform Resource Identifier (URI), based on the
adding authentication, encryption and integrity to the general standard syntax also used in Web services and e-
mix. Optional password based and PKI security profiles mail. A typical SIP URI is of the form,
can be used to authenticate the person and the call sip:username:password@host:port. The URI scheme
signaling channel can be encrypted using TLS or IPSec. used for SIP is sip. If secure transmission is required, the
scheme sips: is used and SIP messages must be
www.protocols.com/pbook/h323.htm transported over Transport Layer Security (TLS).
SIP (Session Initiation Protocol) In SIP the user agent may identify itself using a message
header field 'User-Agent', containing a text description
of the software/hardware/product involved. The User-
SIP (Session Initiation Protocol) is another signaling Agent field is sent in request messages, which means
protocol used to control multimedia communication such that the receiving SIP server can see this information.
as voice and video calls over Internet Protocol (IP). The SIP network elements sometimes store this
protocol can be used for creating, modifying and information and it can be useful in diagnosing SIP
terminating two-party (unicast) or multiparty compatibility problems.SIP also defines server network
(multicast) sessions consisting of one or several media
elements. Although two SIP endpoints can communicate
without any intervening SIP infrastructure, which is why
the protocol is described as peer-to-peer, this approach is
often impractical for a public service.

RFC 3261 defines these server elements

A proxy server "is an intermediary entity that acts as


both a server and a client for the purpose of making
requests on behalf of other clients. A proxy server
primarily plays the role of routing, which means its job
is to ensure that a request is sent to another entity
"closer" to the targeted user. Proxies are also useful for
enforcing policy (for example, making sure a user is
allowed to make a call). A proxy interprets, and, if
necessary, rewrites specific parts of a request message
before forwarding it."
"A registrar is a server that accepts REGISTER requests
and places the information it receives in those requests
into the location service for the domain it handles."
"A redirect server is a user agent server that generates
3xx responses to requests it receives, directing the client
to contact an alternate set of URIs. The redirect server
allows SIP Proxy Servers to direct SIP session invitations
to external domains." SIP messages
The RFC specifies: "It is an important concept that the
distinction between types of SIP servers is logical, not SIP is a text-based protocol with syntax similar to that of
physical." HTTP. There are two different types of SIP messages:
Other SIP related network elements are requests and responses. The first line of a request has
Session border controllers (SBC), they serve as middle a method, defining the nature of the request, and a
boxes between UA and SIP server for various types of Request-URI, indicating where the request should be
functions, including network topology hiding, and sent. The first line of a response has a response code.
assistance in NAT traversal. For SIP requests, RFC 326s1 defines the following
Various types of gateways at the edge between a SIP methods:
network and other networks (as a phone network)  REGISTER: Used by a UA to indicate its
current IP address and the URLs for which it
would like to receive calls.
 INVITE: Used to establish a media session
between user agents.
 ACK: Confirms reliable message exchanges.
 CANCEL: Terminates a pending request.
 BYE: Terminates a session between two users
in a conference.
 OPTIONS: Requests information about the
capabilities of a caller, without setting up a call.
The SIP response types defined in RFC 3261 fall in one
of the following categories.
 Provisional (1xx): Request received and being
processed.
 Success (2xx): The action was successfully
received, understood, and accepted.
 Redirection (3xx): Further action needs to be
taken (typically by sender) to complete the
request.
 Client Error (4xx): The request contains bad
syntax or cannot be fulfilled at the server.
 Server Error (5xx): The server failed to fulfill
an apparently valid request.
 Global Failure (6xx): The request cannot be • And much, much more.
fulfilled at any server.
Disadvantages of VoIP
SIP-ISUP Networking
Although most experts agree that the minus points of
SIP-I, or the Session Initiation Protocol with VoIP are just a “temporary” problem that will be
encapsulated ISUP, is a protocol used to create, modify, eliminated as the technology goes from strength to
and terminate communication sessions based on ISUP strength, let have a look at it anyway, and so does Voice
using SIP and IP networks. Services using SIP-I include over IP. While the pros may be overwhelmingly
voice, video telephony, fax and data. SIP-I and SIP-T are attractive, as a small business owner, you should know
two protocols with similar features, notably to allow the disadvantages as well. Here are some of the main
ISUP messages to be transported over SIP networks. disadvantages of VoIP:
http://en.wikipedia.org/wiki/Session_Initiation_Protocol Power Supply Dependency
VoIP service depends on power supply. No power, no
Advantage of VoIP phone calls. This is mainly because the equipment is
hosted on your side, and not in some
Cost Savings & FREE Calls telecommunications exchange like the usual PSTN
networks. However, in the future when most countries
This is perhaps the most obvious. True enough, the very make a complete shift to IP based networks, and most
nature of VoIP technology means that everyone can Telco’s go 100% VoIP, this problems should by all
make significant cost savings for their business, means cease to exist. Most PSTN lines are power-
especially if you have multiple branches nationwide or independent simply because they have back-up power in
overseas. Cheap calls and free calls may be the attraction the exchanges, and even during blackouts you’ll be able
for VoIP right now, but the future will be about value- to make calls. This is one thing that VoIP does not have
added VoIP services, and cost will take the backseat. at the moment. This disadvantage would mean that you
will need a back-up PSTN line in case of emergencies;
Portability - One Global Number In fact, most businesses we have consulted do indeed
have at least one backup PSTN phone line.
One important concept to understand about VoIP is that Security Issues
unlike it’s forefathers (let’s call them PSTN for now), it Experts agree that security is a major concern when
is not distance or location dependent. As far as VoIP is choosing a VoIP solution. One of the major concerns is
concerned, you could be calling your supplier 1,000 “packet sniffing” means call can be “spy” without
miles away in Indonesia or calling your business partner effecting the conversation at all. However, there ARE
on the other end of town, and it doesn’t make any things in your control, and you can take simple steps to
difference at all, in terms of connectivity and cost. Many make sure you’re getting the best protection that money
of our recommended VoIP service providers have this can buy.
feature. A VoIP phone number, unlike your regular
phone number, is completely portable. Most commonly Quality Control
referred to as a virtual number, you can take it with you
anywhere you go. Even if you change your office The basics of VoIP are very different from regular
address to another state, your phone number can go with PSTN, which uses “C7 signals” for controlling quality of
you. You can even take your whole business with you service. Due to the nature of VoIP, your calls are
wherever you travel. streamed by packets to the destination, and any
Integrated Communications inconsistency would mean issues like jitter, packet loss
The best business phone systems can stand the test of and echo. These problems, while posing some
time and grow with your business needs. Businesses considerable inconvenience a few years back, are being
simply send all of their information over their Broadband eliminated even as you’re reading this.
Internet connection whether it be Internet data from PCs
or voice calls from their employees.
• Making cheap local and international phone Bandwidth Dependent
calls
• Audio conferencing & Video conferencing In any small business or home office setting, you’ll
• Have Voice messages sent to your email typically have one broadband line which is shared by
• Call forwarding, call waiting multiple users, for downloading data, sending emails,
• Fax thru e-mail and viewing web sites and multimedia applications. Add
• Send and receive multimedia files a VoIP system to that and your bandwidth will soon be
• Sharing photos while talking sucked dry. The only way to solve this problem is to
have a dedicated E1 (larger user base) or at least a
dedicated broadband connection. Home offices may not of group activities that would bring benefits to a wide
face this problem if there are less than 3 simultaneous range of users
users.
http://www.cisco.com/en/US/products/sw/voicesw/index. To provide a Telepresence experience, technologies are
html required that implement the human sensory elements of
vision, sound, and manipulation.

Telepresence

Tele presence refers to a set of technologies which allow


a person to feel as if they were present, to give the
appearance that they were present, or to have an effect,
via telerobotics, at a place other than their true location.
Tele presence requires that the users' senses be provided
with such stimuli as to give the feeling of being in that
other location. Additionally, users may be given the
ability to affect the remote location. In this case, the
user's position, movements, actions, voice, etc. may be
sensed, transmitted and duplicated in the remote location
to bring about this effect. Therefore information may be
traveling in both directions between the user and the
remote location.
A popular application is found in Tele presence
videoconferencing, a higher level of video telephony
which deploys greater technical sophistication and
improved fidelity of both video and audio than
in traditional videoconferencing.
Vision

A minimum system usually includes visual feedback.


Ideally, the entire field of view of the user is filled with a
view of the remote location, and the viewpoint
corresponds to the movement and orientation of the
user's head. In this way, it differs from
television or cinema, where the viewpoint is out of the
control of the viewer.
In order to achieve this, the user may be provided with
either a very large (or wraparound) screen, or small
displays mounted directly in front of the eyes. The latter
provides a particularly convincing 3D sensation. The
movements of the user's head must be sensed, and
the camera must mimic those movements accurately and
in real time. This is important to prevent unintended
motion sickness. Another source of future improvement
to Telepresence displays, compared by some
to holograms, is a projected display technology featuring
life-sized imagery

Implementation Sound

Telepresence has been described as the human Sound is generally the easiest sensation to implement
experience of being fully present at a live real-world with high fidelity, based on the
location remote from one's own physical location. foundational telephone technology dating back more
Someone experiencing video Telepresence would than 130 years. Very high-fidelity sound equipment has
therefore be able to behave, and receive stimuli, as also been available for a considerable period of time,
though part of a meeting at the remote site. The with stereophonic sound being more convincing
aforementioned would result in interactive participation than monaural sound.
sports events, or disasters such as the September 11
Manipulation terrorist attacks, can elicit strong emotions from viewers.
As the screen size increases, so does the sense of
The ability to manipulate a remote object or immersion, as well as the range of subjective mental
environment is an important aspect of real Telepresence experiences available to viewers. Some viewers
systems, and can be implemented in large number of have reported a sensation of genuine vertigo or motion
ways depending on the needs of the user. Typically, the sickness while watching IMAX movies of flying or
movements of the user's hands (position in space, and outdoor sequences.
posture of the fingers) are sensed by wired Because most currently feasible Telepresence gear
gloves, inertial sensors, or absolute spatial position leaves something to be desired; the user must suspend
sensors. A robot in the remote location then copies those disbelief to some degree, and choose to act in a natural
movements as closely as possible. This ability is also way, appropriate to the remote location, perhaps using
known as teleportation. some skill to operate the equipment. In contrast, a
The more closely the robot re-creates the form factor of telephone user does not see herself as "operating" the
the human hand, the greater the sense of Telepresence. telephone, but merely talking to another person with it.
Complexity of robotic effectors varies greatly, from
simple one axis grippers, to fully anthropomorphic robot Advantages
hands.
Hap tic teleportation refers to a system that provides An industry expert described some benefits of
some sort of tactile force feedback to the user, so the Telepresence: "There were four drivers for our decision
user feels some approximation of the weight, firmness, to do more business over video and Telepresence. We
size, and/or texture of the remote objects manipulated by wanted to reduce our travel spend, reduce our carbon
the robot. footprint and environmental impact, improve our
employees' work/life balance, and improve employee
Transparency of implementation productivity."
Rather than traveling great distances in order to have a
A good Telepresence strategy puts the human factors face-face meeting, it is now commonplace to instead use
first, focusing on visual collaboration solutions that a Telepresence system, which uses a multiple codec
closely replicate the brain's innate preferences for video system (which is what the word "Telepresence"
interpersonal communications, separating from the most currently represents). Each member/party of the
unnatural "talking heads" experience of traditional meeting uses a Telepresence room to "dial in" and can
videoconferencing. These cues include life–size see/talk to every other member on a screen as if they
participants, fluid motion, accurate flesh tones and the were in the same room. This brings enormous time and
appearance of true eye contact. This is already a well- cost benefits. It is also superior to phone conferencing
established technology, used by many businesses today. (except in cost), as the visual aspect greatly enhances
Telepresence to teleporting from Star Trek, and said that communications, allowing for perceptions of facial
he saw the technology as a potential expressions and other body language.
billion dollar market for Cisco.
Rarely will a Telepresence system provide such a http://en.wikipedia.org/wiki/Telepresence
transparent implementation with such comprehensive
and convincing stimuli that the user perceives no
differences from actual presence. But the user may set
aside such differences, depending on the application. Unified communications (UC)
The fairly simple telephone achieves a limited form of
Telepresence using just the human sensory element of
hearing, in that users consider themselves to be talking Unified communications (UC) -- also called unified
to each other rather than talking to the telephone itself. messaging or UM -- is the new buzzword in the IT
industry, but what does it really mean? In some cases, it
depends on whom you ask; vendors tend to put their own
spin on the definition depending on what they're trying
Watching television, for example, although it stimulates to sell you. But by most definitions, UC refers to the
our primary senses of vision and hearing, rarely gives the ability to integrate different types of communications --
impression that the watcher is no longer at home. including voice mail, e-mail, faxes, instant messages,
However, television sometimes engages the senses and video conferencing -- into one common interface
sufficiently to trigger emotional responses from viewers and/or repository.
somewhat like those experienced by people who directly Unified Communications is NOT necessarily a product;
witness or experience events. Televised depictions of Unified Communications is really a STRATEGY!
A strategy to dramatically reduce the effort needed to options. Furthermore, services offered on call managers
establish effective communications between people, and media servers are rudimentary at best, lacking
whether they are colleagues, partners or customers. adequate service level guarantees.
Effective communications is accomplished over the most
appropriate medium to reach the right person, with the Adoption of VoIP brings with it numerous potential risks
right device, the very first time! that must be addressed to maximize benefit and
That said, there are many ways to implement a unified minimize risk exposure. Today, compromising your
communications solution in an organization. In its legacy phone system means someone has to physically
simplest form, it provides a way for users to access their cut the line to your PBX or gain access to the physical
faxes and voice mail messages via their e-mail clients. phone network. This is no longer the case with VoIP.
More sophisticated implementations provide advanced Modern messaging protocols such as SIP remove call
features such as the ability to hear e-mail messages read functions from the circuit switch (PBX) and place call
to you over the phone as well as the ability to dictate a management (setup, teardown) at the VoIP endpoint;
reply and send it as an e-mail, instant message, fax, or greatly increasing an organization’s exposure to risk.
audio message. Like your data network, your phone system is now
You don't necessarily need VoIP to implement UC; you vulnerable to Viruses, Trojans, Hijacking, Spoofing, and
can use the regular phone system. But VoIP does make it Denial of Service Attacks. A defense-in-depth strategy is
easier: VoIP services already include mechanisms for required, yet this strategy cannot come at the cost of
forwarding voice mail to e-mail, Find Me Follow Me serviceability and QoS. Legacy solutions are not a
(FMFM) functionality, and other features used in a UC survivable solution.
system. In addition, you get more scalability and better
integration with VoIP than with UC-type products that www.cisco.com/unified communication
rely on traditional phone services.
References
Combining an asynchronous communication type such 1. http://en.wikipedia.org/wiki/Telepresence
as e-mail with a real-time communication type such as
telecommunications presents some challenges. However, 2. http://en.wikipedia.org/wiki/Voice_over_IP
it gives users far more flexibility and allows each of 3. www.protocols.com/pbook/h323.htm
them to receive, process, and send messages in the way 4. www.microsoft.com/uc/en/ca/default.aspx
that works best for that individual. 5. http://www.cisco.com/en/US/products/sw/voice
sw/index.html
VoIP and Unified Messaging Challenges
Enterprises are moving towards Voice over Internet
6. http://en.wikipedia.org/wiki/Session_Initiation_
Protocol
Protocol (VoIP) and Unified Communications (UC) in
corporate networks because of its many benefits,
including
• Substantial cost savings by using the internet to
bypass long distance tolls
• Implementing advanced applications such as
unified messaging and presence.

• Improving employee collaboration and


productivity.

VoIP and Unified Communications Applications are


poised to become the dominant form of communications
within enterprises, replacing traditional circuit switched
telephony technology. Enterprises must ensure there
networks are secure, scalable and reliable; dial tone
reliability is paramount.
VoIP and Unified Communications applications provide
numerous challenges for enterprise networks. All VoIP
handsets require IP addresses to send and receive data
over the network; in most cases, deploying VoIP will
double IP allocation requirements overnight. Traditional
DHCP services offered on a switch or router do not
address the issues of failover, centralized management,
firmware management or management of custom vendor

Das könnte Ihnen auch gefallen