SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
0
Introduction to VoIP, RTP and SIP
Archana Kesavan
Product Marketing Manager
1
About ThousandEyes
ThousandEyes delivers visibility into every network your organization relies on.
Founded by network
experts; strong
investor backing
Relied on for
critical operations by
leading enterprises
Recognized as
an innovative
new approach
27 Fortune 500
5 top 5 SaaS Companies
4 top 6 US Banks
2
Telephony – A Brief History
Mr. Watson – Come
here – I want to see
you
Manual Switchboard
3
Telephony – A Brief History
Business Office Callers
Local Exchange
PBX
Individual Callers
International Gateway Tandem Junction/Exchange
PSTN Network
4
Voice-Over-IP
• Set of protocols designed to deliver communication
services over the IP network
• Analog voice converted into data packets to be sent over
the Internet.
• Two phases
• Phase 1: Signaling (SIP)
• Phase 2: Audio transport (RTP)
5
IP Telephony or Voice-Over-IP
Local Exchange
PBX
Individual
Callers
International Gateway Tandem Junction
PSTNNetwork
IP- PBX
VoIP Servers
Ethernet (IP Network)
Internet
SIP Trunk
Mobile
Voice
Mobile
Data
6
Type of VoIP Services
On-Prem
Branch Office
Branch Office
DMZ
CRM
Web
Data Center
IP-PBX
VoIP server
• All hardware and software
owned and managed by
the enterprise.
• IP-PBX and adjoining
systems reside in the
datacenter or on premise.
• Voice packets go through
the LAN and WAN
7
Type of VoIP Services
Hosted
• IP-phones are owned by the
enterprise
• All other equipment and
software located in the
service provider data center
and provided as a service
• VoIP packets travel over the
Internet or dedicated WAN
connectivity to the hosted
site
Data
Center
Branch Office
Branch Office
DMZ
CRMWeb
IP-PBX
VoIP
Provider
Data
Center
Branch Office
Branch Office
DMZ
CRMWeb
IP-PBX
VoIP
Provider
Data
Center
Data
Center
Enterprise A
Enterprise B
8
So how does VoIP work?
• Session Initiation Protocol (SIP)
• Pre-requisite for the voice call
– RFC 3261: Standard protocol (however
propriety versions exist to force vendor
lock-down)
– Application level protocol residing above
TCP/IP stack
– TCP or UDP
– Text-based protocol like HTTP
– Encrypted with TLS
– Response Codes indicates the state of
the request message
Phase1: Signaling
VoIP Phone A SIP Server/Proxy VoIP Phone B
SIP RegisterSIP Register
SIP INVITE
100 Trying
SIP INVITE
180 Ringing
180 Ringing
200 OK
200 OK
AUDIO CALL
SIP BYE
200 OK
SIP ACK SIP ACK
SIP BYE
200 OK
9
So how does VoIP work?
Phase1: Signaling
VoIP Phone A SIP Server/Proxy VoIP Phone B
SIP RegisterSIP Register
SIP INVITE
100 Trying
SIP INVITE
180 Ringing
180 Ringing
200 OK
200 OK
AUDIO CALL
SIP BYE
200 OK
SIP ACK SIP ACK
SIP BYE
200 OK
REGISTER
INVITE
CONNECT
DISCONNECT
10
• Real Transport Protocol (RTP)
– Analog voice signals converted into data
packets and sent over UDP
– Audio frames are encapsulated in RTP
packets
– RTP packets are encapsulated in UDP
packets
– UDP packets are encapsulated in IP
packets
So how does VoIP work?
Phase 2: Audio Data
IP
header
UDP
header
Frame 1
RTP
header
Frame 2
RTP Audio Stream
SIP Network
11
• How voice traffic is encoded and decoded
• Determines the quality of the VoIP conversation
• G.711, G.722, SILK
Key VoIP Concepts
• MoS
• Latency
• Jitter (De-Jitter buffer)
• PDV
Codecs
VoIP Metrics
• Prioritization of VoIP Traffic
• DSCP codes
– Traffic shaping, firewall and LB configuration
– 3 bits for class: Best effort, Assured Forwarding,
Expedited Forwarding, Voice Admit
QoS
12
Time
Packet delay (from sender to receiver)
Latency
Packet 1 Packet 2 Packet 4Sent at
Packet 1 Packet 2 Packet 4Received at Packet 3
Packet 3
Latency LatencyLatency Latency
13
Time
Variation of the latency
Jitter
Packet 1 Packet 2 Packet 4Sent at
Packet 1 Packet 2 Packet 4Received at Packet 3
Packet 3
Min Latency Max Latency
14
Time
99.9th percentile of the packet delay variation
Packet Delay Variation
Packet 1 Packet 2 Packet 4Sent at
Packet 1 Packet 2 Packet 4Received at Packet 3
Packet 3
Played at
Delayed
playback
Min Latency Max Latency PDV = max latency – min latency
De-jitter buffer should be able to
accommodate PDV.
15
E-Model (ITU-T Recommendation G.107, 1998-2014)
Based on a mathematical model in which the individual transmission parameters are transformed into
different individual "impairment factors” such as codec characteristics, delay, loss ratio, discard ratio,
etc., to obtain a quality metric called R factor:
Mean Opinion Score (MOS)
Basic signal-
to-noise ratio
Delay
impairment
Equipment
impairment
Advantage
factor
(expectation)
• Network latency
• De-jitter buffer size
• Ie (codec)
• Packet loss robustness (codec)
• Packet loss probability
• Network latency
Simultaneous
impairment
1 Calculation of the transmission rating factor, R
ccording to the equipment impairment factor method, the fundamental principle of the E-model
ased on a concept given in the description of the OPINE model (see [b-ITU-T P-Sup.3]).
sychological factors on the psychological scale are additive.
he result of any calculation with the E-model in a first step is a transmission rating factor R, whic
ombines all transmission parameters relevant for the considered connection. This rating factor R
omposed of:
AIe-effIdIsRoR +−−−= (7-1
o represents in principle the basic signal-to-noise ratio, including noise sources such as circu
oise and room noise. Factor Is is a combination of all impairments which occur more or le
multaneously with the voice signal. Factor Id represents the impairments caused by delay and th
fective equipment impairment factor Ie-eff represents impairments caused by low bit-rate codec
also includes impairment due to randomly distributed pack losses. The advantage factor A allow
r compensation of impairment factors when the user benefits from other types of access to th
ser. The term Ro and the Is and Id values are subdivided into further specific impairment value
he following clauses give the equations used in the E-model.
16
• Data records that contain specific information about a call. For
eg, timestamp, call duration etc
• CDRs are generated at specified triggers
• Record call quality, loss, latency experienced
• Billing, Law Enforcement
Monitoring Techniques for VoIP
• Packet sniffer that can record every SIP and RTP transaction
• Can typically decode speech and replay for call quality analysis
• Detect MOS score and other voice metrics
• Maximum overhead
Call Detail
Records
Packet Capture
• Simulate VoIP traffic from strategic vantage points in periodic
intervals
• Quickly pinpoint when and where an issue occurs
• Real time detection of voice quality degradation
• Less overhead
Active
Monitoring
17
Demo
• Dip in MOS score due to DSCP change
• https://earhhpng.share.thousandeyes.com
18
VoIP Metrics
Average of packet
delays
99.9th percentile of
packet delay
variation
Packets dropped by
the de-jitter buffer
Packets dropped by
the network
MOS Score (1-5)
Audio codec used
Source
Destination
19
Thank You!

Contenu connexe

Tendances

IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Mohammad Adil
 

Tendances (20)

Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Sip trunking - future of tomorrow communications
Sip trunking  -  future of tomorrow communicationsSip trunking  -  future of tomorrow communications
Sip trunking - future of tomorrow communications
 
VoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacksVoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacks
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Rip
RipRip
Rip
 
SIP Tutorial/Workshop 1
SIP Tutorial/Workshop 1SIP Tutorial/Workshop 1
SIP Tutorial/Workshop 1
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentals
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Sip architecture
Sip architectureSip architecture
Sip architecture
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 

En vedette

Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
Fraj Alshahibi
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
habib_786
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
Kiran Munir
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
Santhosh Somu
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
Mahmoud Abudaqa
 

En vedette (20)

Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management
 
SIP - The Basics
SIP - The BasicsSIP - The Basics
SIP - The Basics
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
ServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for ShoretelServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for Shoretel
 
SIP dilivery methods and ROI
SIP dilivery methods and ROISIP dilivery methods and ROI
SIP dilivery methods and ROI
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
Take a sip of sip
Take a sip of sipTake a sip of sip
Take a sip of sip
 
Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Summit Day 2 -What's new in CXP 14Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Summit Day 2 -What's new in CXP 14
 
SIP in Service Quality Monitoring
SIP in Service Quality MonitoringSIP in Service Quality Monitoring
SIP in Service Quality Monitoring
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
Introduction to TTI Telecom
Introduction to TTI TelecomIntroduction to TTI Telecom
Introduction to TTI Telecom
 
Internet Telephony by Aria technologies
  Internet Telephony by Aria technologies  Internet Telephony by Aria technologies
Internet Telephony by Aria technologies
 
Internet telephony by abhishek mahajan
Internet telephony by abhishek mahajanInternet telephony by abhishek mahajan
Internet telephony by abhishek mahajan
 
Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 

Similaire à Introduction to VoIP, RTP and SIP

VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
sangusajjan
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
Videoguy
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
Adebayo Ojo
 

Similaire à Introduction to VoIP, RTP and SIP (20)

VOIP services
VOIP servicesVOIP services
VOIP services
 
VOIP
VOIPVOIP
VOIP
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Voip
VoipVoip
Voip
 
A glance-at-voip
A glance-at-voipA glance-at-voip
A glance-at-voip
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt
 
1. VoIP.ppt
1. VoIP.ppt1. VoIP.ppt
1. VoIP.ppt
 
tftyfty.ppt
tftyfty.ppttftyfty.ppt
tftyfty.ppt
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
 
Telefonia_IP (1).ppt
Telefonia_IP (1).pptTelefonia_IP (1).ppt
Telefonia_IP (1).ppt
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
 
Introduction to VOIP
Introduction to VOIPIntroduction to VOIP
Introduction to VOIP
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
 
Voip basics
Voip   basicsVoip   basics
Voip basics
 

Plus de ThousandEyes

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
 

Plus de ThousandEyes (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
 
New ThousandEyes Product Features and Release Highlights: February 2024
New ThousandEyes Product Features and Release Highlights: February 2024New ThousandEyes Product Features and Release Highlights: February 2024
New ThousandEyes Product Features and Release Highlights: February 2024
 
The Top Outages of 2023: Analyses and Takeaways
The Top Outages of 2023: Analyses and TakeawaysThe Top Outages of 2023: Analyses and Takeaways
The Top Outages of 2023: Analyses and Takeaways
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for Partners
 
The Top Outages of 2023: Analysis and Takeaways
The Top Outages of 2023: Analysis and TakeawaysThe Top Outages of 2023: Analysis and Takeaways
The Top Outages of 2023: Analysis and Takeaways
 
The Top Outages of 2023: Analysis and Takeaways
The Top Outages of 2023: Analysis and TakeawaysThe Top Outages of 2023: Analysis and Takeaways
The Top Outages of 2023: Analysis and Takeaways
 
ThousandEyes Enterprise Digital Workshop - Spanish
ThousandEyes Enterprise Digital Workshop - SpanishThousandEyes Enterprise Digital Workshop - Spanish
ThousandEyes Enterprise Digital Workshop - Spanish
 
ThousandEyes Enterprise Digital Workshop - German
ThousandEyes Enterprise Digital Workshop - GermanThousandEyes Enterprise Digital Workshop - German
ThousandEyes Enterprise Digital Workshop - German
 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital Workshop
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Introduction to VoIP, RTP and SIP

  • 1. 0 Introduction to VoIP, RTP and SIP Archana Kesavan Product Marketing Manager
  • 2. 1 About ThousandEyes ThousandEyes delivers visibility into every network your organization relies on. Founded by network experts; strong investor backing Relied on for critical operations by leading enterprises Recognized as an innovative new approach 27 Fortune 500 5 top 5 SaaS Companies 4 top 6 US Banks
  • 3. 2 Telephony – A Brief History Mr. Watson – Come here – I want to see you Manual Switchboard
  • 4. 3 Telephony – A Brief History Business Office Callers Local Exchange PBX Individual Callers International Gateway Tandem Junction/Exchange PSTN Network
  • 5. 4 Voice-Over-IP • Set of protocols designed to deliver communication services over the IP network • Analog voice converted into data packets to be sent over the Internet. • Two phases • Phase 1: Signaling (SIP) • Phase 2: Audio transport (RTP)
  • 6. 5 IP Telephony or Voice-Over-IP Local Exchange PBX Individual Callers International Gateway Tandem Junction PSTNNetwork IP- PBX VoIP Servers Ethernet (IP Network) Internet SIP Trunk Mobile Voice Mobile Data
  • 7. 6 Type of VoIP Services On-Prem Branch Office Branch Office DMZ CRM Web Data Center IP-PBX VoIP server • All hardware and software owned and managed by the enterprise. • IP-PBX and adjoining systems reside in the datacenter or on premise. • Voice packets go through the LAN and WAN
  • 8. 7 Type of VoIP Services Hosted • IP-phones are owned by the enterprise • All other equipment and software located in the service provider data center and provided as a service • VoIP packets travel over the Internet or dedicated WAN connectivity to the hosted site Data Center Branch Office Branch Office DMZ CRMWeb IP-PBX VoIP Provider Data Center Branch Office Branch Office DMZ CRMWeb IP-PBX VoIP Provider Data Center Data Center Enterprise A Enterprise B
  • 9. 8 So how does VoIP work? • Session Initiation Protocol (SIP) • Pre-requisite for the voice call – RFC 3261: Standard protocol (however propriety versions exist to force vendor lock-down) – Application level protocol residing above TCP/IP stack – TCP or UDP – Text-based protocol like HTTP – Encrypted with TLS – Response Codes indicates the state of the request message Phase1: Signaling VoIP Phone A SIP Server/Proxy VoIP Phone B SIP RegisterSIP Register SIP INVITE 100 Trying SIP INVITE 180 Ringing 180 Ringing 200 OK 200 OK AUDIO CALL SIP BYE 200 OK SIP ACK SIP ACK SIP BYE 200 OK
  • 10. 9 So how does VoIP work? Phase1: Signaling VoIP Phone A SIP Server/Proxy VoIP Phone B SIP RegisterSIP Register SIP INVITE 100 Trying SIP INVITE 180 Ringing 180 Ringing 200 OK 200 OK AUDIO CALL SIP BYE 200 OK SIP ACK SIP ACK SIP BYE 200 OK REGISTER INVITE CONNECT DISCONNECT
  • 11. 10 • Real Transport Protocol (RTP) – Analog voice signals converted into data packets and sent over UDP – Audio frames are encapsulated in RTP packets – RTP packets are encapsulated in UDP packets – UDP packets are encapsulated in IP packets So how does VoIP work? Phase 2: Audio Data IP header UDP header Frame 1 RTP header Frame 2 RTP Audio Stream SIP Network
  • 12. 11 • How voice traffic is encoded and decoded • Determines the quality of the VoIP conversation • G.711, G.722, SILK Key VoIP Concepts • MoS • Latency • Jitter (De-Jitter buffer) • PDV Codecs VoIP Metrics • Prioritization of VoIP Traffic • DSCP codes – Traffic shaping, firewall and LB configuration – 3 bits for class: Best effort, Assured Forwarding, Expedited Forwarding, Voice Admit QoS
  • 13. 12 Time Packet delay (from sender to receiver) Latency Packet 1 Packet 2 Packet 4Sent at Packet 1 Packet 2 Packet 4Received at Packet 3 Packet 3 Latency LatencyLatency Latency
  • 14. 13 Time Variation of the latency Jitter Packet 1 Packet 2 Packet 4Sent at Packet 1 Packet 2 Packet 4Received at Packet 3 Packet 3 Min Latency Max Latency
  • 15. 14 Time 99.9th percentile of the packet delay variation Packet Delay Variation Packet 1 Packet 2 Packet 4Sent at Packet 1 Packet 2 Packet 4Received at Packet 3 Packet 3 Played at Delayed playback Min Latency Max Latency PDV = max latency – min latency De-jitter buffer should be able to accommodate PDV.
  • 16. 15 E-Model (ITU-T Recommendation G.107, 1998-2014) Based on a mathematical model in which the individual transmission parameters are transformed into different individual "impairment factors” such as codec characteristics, delay, loss ratio, discard ratio, etc., to obtain a quality metric called R factor: Mean Opinion Score (MOS) Basic signal- to-noise ratio Delay impairment Equipment impairment Advantage factor (expectation) • Network latency • De-jitter buffer size • Ie (codec) • Packet loss robustness (codec) • Packet loss probability • Network latency Simultaneous impairment 1 Calculation of the transmission rating factor, R ccording to the equipment impairment factor method, the fundamental principle of the E-model ased on a concept given in the description of the OPINE model (see [b-ITU-T P-Sup.3]). sychological factors on the psychological scale are additive. he result of any calculation with the E-model in a first step is a transmission rating factor R, whic ombines all transmission parameters relevant for the considered connection. This rating factor R omposed of: AIe-effIdIsRoR +−−−= (7-1 o represents in principle the basic signal-to-noise ratio, including noise sources such as circu oise and room noise. Factor Is is a combination of all impairments which occur more or le multaneously with the voice signal. Factor Id represents the impairments caused by delay and th fective equipment impairment factor Ie-eff represents impairments caused by low bit-rate codec also includes impairment due to randomly distributed pack losses. The advantage factor A allow r compensation of impairment factors when the user benefits from other types of access to th ser. The term Ro and the Is and Id values are subdivided into further specific impairment value he following clauses give the equations used in the E-model.
  • 17. 16 • Data records that contain specific information about a call. For eg, timestamp, call duration etc • CDRs are generated at specified triggers • Record call quality, loss, latency experienced • Billing, Law Enforcement Monitoring Techniques for VoIP • Packet sniffer that can record every SIP and RTP transaction • Can typically decode speech and replay for call quality analysis • Detect MOS score and other voice metrics • Maximum overhead Call Detail Records Packet Capture • Simulate VoIP traffic from strategic vantage points in periodic intervals • Quickly pinpoint when and where an issue occurs • Real time detection of voice quality degradation • Less overhead Active Monitoring
  • 18. 17 Demo • Dip in MOS score due to DSCP change • https://earhhpng.share.thousandeyes.com
  • 19. 18 VoIP Metrics Average of packet delays 99.9th percentile of packet delay variation Packets dropped by the de-jitter buffer Packets dropped by the network MOS Score (1-5) Audio codec used Source Destination

Notes de l'éditeur

  1. \
  2. PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned. It's also referred to as the Plain Old Telephone Service (POTS).
  3. Ser
  4. Ser