SlideShare a Scribd company logo
1 of 25
INTRODUCTION TO
                 VoIP
Elastix® Certification
© 2012, PALOSANTO SOLUTIONS All rights reserved. This documentation is confidential and
its intellectual property belongs to PaloSanto Solutions. Any unauthorized use, reproduction,
preparation of derivative works, performance, or display of this document, or software
represented by this document, without the express written permission of PaloSanto Solutions is
strictly prohibited. PaloSanto Solutions, Elastix and Elastix logo design, trademarks and/or
service marks belongs to Megatelcon S.A. all other trademarks, service marks, and trade
names are owned by their respective companies.
What is VoIP?

 Voice over IP or VoIP consists in transmitting voice over an IP
  protocol.

 This is a very broad concept and there are many protocol
  alternatives. It is truly a protocol soup.

 Voice is packetized so it can be transmitted over an IP
  network.

 The IP protocol was not designed specifically for transporting
  voice.
VoIP: a protocol soup
IP Protocol

 One of the most well-known protocols
 Its name comes from Internet Protocol.
 This protocol offers a service with ”no guarantees” and is also
  referred to as ”best effort”.
 The packets can arrive out of order, and be reordered at the
  destination.
 Some packets can even be lost on the way.
 This disorder and loss of packets can affect the quality of the
  voice.
 Despite all of this, intelligent ways have been found to solve
  these problems in the best way possible.
IP address (1)

 It's a unique number that identifies a host connected to an IP
  network.

 It's made up of 32 bits, or 4 octets. In practice a notation is
  used in which each octet is translated into decimal, and
  separated with a period. An example of an IP address is
  130.5.5.26.

 An IP address is composed in two parts: One identifies the
  host, and the other identifies the network to which that host
  belongs.

 To find these parts another parameter is used, called a
  network mask.
IP address (2)

 The network mask is a 32 bit binary number that is also
  represented in a notation that is similar to the IP address.

 It begins with ones and continues this way until it reaches a
  number of ones equal to the portion of the IP address that
  corresponds to the network.
IP address (3)

 Therefore, in the previous example we obtain an IP address
  of 130.5.5.26 with a mask of 255.255.255.0 belonging to the
  130.5.5.0 network.

 The previous mask was a 24 bit mask, since there were 24
  ”ones”.

 Once the network where the host is located is known it is
  easier to send the IP packets to their destination.

 Routers store tables of routes or rules on how to find other
  networks
IP Packets (1)
 An IP packet contains all the necessary information to arrive
  to its destination.

 It can be divided into two parts: the header and the payload.

 The header contains information that allows the packet to be
  delivered to its destination, and the payload retrieved.

 This header decreases slightly the quantity of information that
  can be transported since it occupies space.

 The payload can be used to encapsulate other protocols like
  UDP or TCP.
IP Packets (2)




 Header of an IP packet
IP routing
 Routers are necessary to direct packets on its way to a
  destination.

 Routers are devices with tables of routes.

 This “table of routes” is made up of destination networks, and
  for each one the IP address of the router to reach them.

 The router that provides a route to external networks is called
  a gateway.

 The IP packet that arrives at the router is examined to see
  what network it belongs to, the proper route is chosen, and
  the packet it is sent there.
TCP Protocol (1)

 Transport Control Protocol

 It is an IP protocol that allows packet retransmission, packet
  order management, and receipt acknowledgement.

 To achieve this goal, TCP carries additional information that
  adds weight to the packet. That is why it is not recommended
  for real time applications like voice.

 However, it can work for voice signaling.
TCP Protocol (2)

 TCP introduces the concept of port.

 A port is an abstraction that allows us to relate flows of data
  with services on the network.

 For example, port 80 corresponds to the Web service, or
  HTTP protocol.
UDP Protocol

 UDP (User Datagram Protocol) is another transport protocol.

 It divides information into packets called datagrams.

 This protocol doesn't care if the data arrives with errors or if it
  doesn´t arrive at all. That is the main difference with TCP.

 This is why it introduces little extra weight to the IP packet
  which makes it ideal for real-time applications like voice.
VoIP Signaling

 As in traditional telephony, it's necessary to signalize VoIP
  calls.

 There are some alternatives in signaling protocols, like SIP,
  H.323, MGCP, IAX2, and others.

 The most popular protocols on Asterisk are SIP and IAX2.

 Regarding SIP or H.323, many people confuse them and think
  that voice is transmitted through this protocol, but it is only
  used for signaling.
VoIP Transport

 RTP means Realtime Transport Protocol.

 The RTP protocol is the one that really transports encoded
  audio.

 RTP is transported over UDP.

 Using SIP, audio is transmitted over RTP after the network
  port between Elastix and the endpoint / telephone is
  negotiated.
Relationship between protocols
Voice codification

 Voice is adequately encoded for transmission.

 After encoding, it is transmitted over RTP.

 Encoding can serve to reduce the chance of error, as well as
  to minimize the amount of bandwidth used.

 To encode this data, an algorithm called a codec is used.

 There are several different codecs, each has pros and cons.
G.711
 One of the most widely used codecs of all time.

 Comes from the ITU-T standard that was released in 1972.

 Comes in two types called μ-Law (or u-law, primarily used in
  Europe) and a-Law (used in the USA).

 Advantage 1: Good voice quality since it uses 64kbit/s, that is a
  sampling of 8 bits at 8kHz.

 Advantage 2: It is already enabled in Elastix, it's not necessary to
  pay for it.

 Disadvantage: It uses a lot of bandwidth. It is not recommended
  for connections with low bandwidth.
G.729
 Also a very popular codec.

 Licensed by Intel.

 Advantage: It compresses voice very well without a significant
  loss of quality.

 Disadvantage 1: It is licensed          per   voice   channel,
  approximately USD$10 per channel.

 Disadvantage 2: Voice quality is lower than than G.711
GSM

 It is related to the cellular telephony standard GSM (Global
  System for Mobile communications), hence its name.

 It compresses voice very well, with a quality similar to cell
  phones.

 It is enabled by default in Elastix.

 Good as an alternative to G.729, although its audio quality is
  slightly inferior to G.729.
Protocol overload (1)
 The different protocols increase the total amount of data
  transmitted, in addition to the actual voice payload.

 Headers are added for Ethernet, IP, TCP/UDP, RTP.

 That makes the actual bandwidth for transmitting voice to be
  more than just what is required for the codec.

 For example, to transmit voice using G.711, in theory we should
  use 64Kbps (the payload of the codec), but we are really using
  95.2Kbps of BW.

 In codecs with more compression, overload is even more
  significant (percentage-wise).
Protocol overload (2)
Protocol overload (3)
– Let's calculate the bandwidth for G.711

•    Bytes transmitted every 20ms

– 38 + 20 + 12 + 8 + 160 = 238 bytes

•    Bits transmitted every 20ms

– 238 bytes * 8 bits/byte = 1904 bits

•    Bits transmitted every second

– 1904 bits/frame * 50 frames/seg. = 95,200 bits/second =
  95.2Kbps!
Comparing Codecs

   Table for the actual bandwidth for common codecs (using
    Ethernet):

             Codec       BW codec         BW actual (Ethernet)

         G.711            64 Kbps              95.2 Kbps
         G.726*           32 Kbps              63.2 Kbps
         iLBC*            15.2 Kbps            46.4 Kbps
         GSM              13 Kbps              43.7 Kbps
         G.729A            8 Kbps              39.2 Kbps


    * For these codecs, multiple data rates may be used.
More at:

www.elastixbook.com

More Related Content

What's hot

Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Aakura Pyakura
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocolasimnawaz54
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLRajan Kumar
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?broadconnect
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Fringe Division
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)Abdullah Shah
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energySaptadeep Pal
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS garishma bhatia
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services HayderThary
 
Wireless local loop 26 june
Wireless local loop 26 juneWireless local loop 26 june
Wireless local loop 26 juneAhmed Albidhany
 

What's hot (20)

VOIP
VOIPVOIP
VOIP
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 
VOIP
VOIPVOIP
VOIP
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
Voip
Voip Voip
Voip
 
Isdn networking
Isdn networkingIsdn networking
Isdn networking
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Wireless local loop 26 june
Wireless local loop 26 juneWireless local loop 26 june
Wireless local loop 26 june
 

Similar to Introduction to VoIP

Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)mashiur
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)mashiur
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptxmashiur
 
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2mashiur
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...cscpconf
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
Intro tcpip-part1
Intro tcpip-part1Intro tcpip-part1
Intro tcpip-part1Kit Ramsey
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVideoguy
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 

Similar to Introduction to VoIP (20)

Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)
 
Ch 2
Ch 2Ch 2
Ch 2
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
 
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2
 
Report
ReportReport
Report
 
Voip
VoipVoip
Voip
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
Intro tcpip-part1
Intro tcpip-part1Intro tcpip-part1
Intro tcpip-part1
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Skype
SkypeSkype
Skype
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
A glance-at-voip
A glance-at-voipA glance-at-voip
A glance-at-voip
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 

More from PaloSanto Solutions

Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...PaloSanto Solutions
 
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?PaloSanto Solutions
 
Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...PaloSanto Solutions
 
Queuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadasQueuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadasPaloSanto Solutions
 
La evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadasLa evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadasPaloSanto Solutions
 
Integrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyXIntegrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyXPaloSanto Solutions
 
Usando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MTUsando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MTPaloSanto Solutions
 
Todo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBXTodo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBXPaloSanto Solutions
 
Gestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMSGestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMSPaloSanto Solutions
 
Escalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIPEscalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIPPaloSanto Solutions
 
Elastix unified communications server cookbook
Elastix unified communications server cookbookElastix unified communications server cookbook
Elastix unified communications server cookbookPaloSanto Solutions
 
Seguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detalladoSeguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detalladoPaloSanto Solutions
 
Dynamic calls with Text To Speech
Dynamic calls with Text To SpeechDynamic calls with Text To Speech
Dynamic calls with Text To SpeechPaloSanto Solutions
 
Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)PaloSanto Solutions
 
Building a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsBuilding a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsPaloSanto Solutions
 
Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia PaloSanto Solutions
 
Módulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de ElastixMódulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de ElastixPaloSanto Solutions
 

More from PaloSanto Solutions (20)

Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
 
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
 
Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...
 
Queuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadasQueuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadas
 
La evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadasLa evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadas
 
WebRTC … ¡vamos a discar!
WebRTC … ¡vamos a discar!WebRTC … ¡vamos a discar!
WebRTC … ¡vamos a discar!
 
Integrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyXIntegrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyX
 
Usando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MTUsando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MT
 
Todo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBXTodo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBX
 
Gestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMSGestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMS
 
Escalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIPEscalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIP
 
Elastix unified communications server cookbook
Elastix unified communications server cookbookElastix unified communications server cookbook
Elastix unified communications server cookbook
 
Seguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detalladoSeguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detallado
 
Dynamic calls with Text To Speech
Dynamic calls with Text To SpeechDynamic calls with Text To Speech
Dynamic calls with Text To Speech
 
Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)
 
Building a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsBuilding a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communications
 
Asterisk: the future is at REST
Asterisk: the future is at RESTAsterisk: the future is at REST
Asterisk: the future is at REST
 
Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia
 
Voicemail Avanzado
Voicemail AvanzadoVoicemail Avanzado
Voicemail Avanzado
 
Módulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de ElastixMódulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de Elastix
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Introduction to VoIP

  • 1. INTRODUCTION TO VoIP Elastix® Certification © 2012, PALOSANTO SOLUTIONS All rights reserved. This documentation is confidential and its intellectual property belongs to PaloSanto Solutions. Any unauthorized use, reproduction, preparation of derivative works, performance, or display of this document, or software represented by this document, without the express written permission of PaloSanto Solutions is strictly prohibited. PaloSanto Solutions, Elastix and Elastix logo design, trademarks and/or service marks belongs to Megatelcon S.A. all other trademarks, service marks, and trade names are owned by their respective companies.
  • 2. What is VoIP?  Voice over IP or VoIP consists in transmitting voice over an IP protocol.  This is a very broad concept and there are many protocol alternatives. It is truly a protocol soup.  Voice is packetized so it can be transmitted over an IP network.  The IP protocol was not designed specifically for transporting voice.
  • 4. IP Protocol  One of the most well-known protocols  Its name comes from Internet Protocol.  This protocol offers a service with ”no guarantees” and is also referred to as ”best effort”.  The packets can arrive out of order, and be reordered at the destination.  Some packets can even be lost on the way.  This disorder and loss of packets can affect the quality of the voice.  Despite all of this, intelligent ways have been found to solve these problems in the best way possible.
  • 5. IP address (1)  It's a unique number that identifies a host connected to an IP network.  It's made up of 32 bits, or 4 octets. In practice a notation is used in which each octet is translated into decimal, and separated with a period. An example of an IP address is 130.5.5.26.  An IP address is composed in two parts: One identifies the host, and the other identifies the network to which that host belongs.  To find these parts another parameter is used, called a network mask.
  • 6. IP address (2)  The network mask is a 32 bit binary number that is also represented in a notation that is similar to the IP address.  It begins with ones and continues this way until it reaches a number of ones equal to the portion of the IP address that corresponds to the network.
  • 7. IP address (3)  Therefore, in the previous example we obtain an IP address of 130.5.5.26 with a mask of 255.255.255.0 belonging to the 130.5.5.0 network.  The previous mask was a 24 bit mask, since there were 24 ”ones”.  Once the network where the host is located is known it is easier to send the IP packets to their destination.  Routers store tables of routes or rules on how to find other networks
  • 8. IP Packets (1)  An IP packet contains all the necessary information to arrive to its destination.  It can be divided into two parts: the header and the payload.  The header contains information that allows the packet to be delivered to its destination, and the payload retrieved.  This header decreases slightly the quantity of information that can be transported since it occupies space.  The payload can be used to encapsulate other protocols like UDP or TCP.
  • 9. IP Packets (2) Header of an IP packet
  • 10. IP routing  Routers are necessary to direct packets on its way to a destination.  Routers are devices with tables of routes.  This “table of routes” is made up of destination networks, and for each one the IP address of the router to reach them.  The router that provides a route to external networks is called a gateway.  The IP packet that arrives at the router is examined to see what network it belongs to, the proper route is chosen, and the packet it is sent there.
  • 11. TCP Protocol (1)  Transport Control Protocol  It is an IP protocol that allows packet retransmission, packet order management, and receipt acknowledgement.  To achieve this goal, TCP carries additional information that adds weight to the packet. That is why it is not recommended for real time applications like voice.  However, it can work for voice signaling.
  • 12. TCP Protocol (2)  TCP introduces the concept of port.  A port is an abstraction that allows us to relate flows of data with services on the network.  For example, port 80 corresponds to the Web service, or HTTP protocol.
  • 13. UDP Protocol  UDP (User Datagram Protocol) is another transport protocol.  It divides information into packets called datagrams.  This protocol doesn't care if the data arrives with errors or if it doesn´t arrive at all. That is the main difference with TCP.  This is why it introduces little extra weight to the IP packet which makes it ideal for real-time applications like voice.
  • 14. VoIP Signaling  As in traditional telephony, it's necessary to signalize VoIP calls.  There are some alternatives in signaling protocols, like SIP, H.323, MGCP, IAX2, and others.  The most popular protocols on Asterisk are SIP and IAX2.  Regarding SIP or H.323, many people confuse them and think that voice is transmitted through this protocol, but it is only used for signaling.
  • 15. VoIP Transport  RTP means Realtime Transport Protocol.  The RTP protocol is the one that really transports encoded audio.  RTP is transported over UDP.  Using SIP, audio is transmitted over RTP after the network port between Elastix and the endpoint / telephone is negotiated.
  • 17. Voice codification  Voice is adequately encoded for transmission.  After encoding, it is transmitted over RTP.  Encoding can serve to reduce the chance of error, as well as to minimize the amount of bandwidth used.  To encode this data, an algorithm called a codec is used.  There are several different codecs, each has pros and cons.
  • 18. G.711  One of the most widely used codecs of all time.  Comes from the ITU-T standard that was released in 1972.  Comes in two types called μ-Law (or u-law, primarily used in Europe) and a-Law (used in the USA).  Advantage 1: Good voice quality since it uses 64kbit/s, that is a sampling of 8 bits at 8kHz.  Advantage 2: It is already enabled in Elastix, it's not necessary to pay for it.  Disadvantage: It uses a lot of bandwidth. It is not recommended for connections with low bandwidth.
  • 19. G.729  Also a very popular codec.  Licensed by Intel.  Advantage: It compresses voice very well without a significant loss of quality.  Disadvantage 1: It is licensed per voice channel, approximately USD$10 per channel.  Disadvantage 2: Voice quality is lower than than G.711
  • 20. GSM  It is related to the cellular telephony standard GSM (Global System for Mobile communications), hence its name.  It compresses voice very well, with a quality similar to cell phones.  It is enabled by default in Elastix.  Good as an alternative to G.729, although its audio quality is slightly inferior to G.729.
  • 21. Protocol overload (1)  The different protocols increase the total amount of data transmitted, in addition to the actual voice payload.  Headers are added for Ethernet, IP, TCP/UDP, RTP.  That makes the actual bandwidth for transmitting voice to be more than just what is required for the codec.  For example, to transmit voice using G.711, in theory we should use 64Kbps (the payload of the codec), but we are really using 95.2Kbps of BW.  In codecs with more compression, overload is even more significant (percentage-wise).
  • 23. Protocol overload (3) – Let's calculate the bandwidth for G.711 • Bytes transmitted every 20ms – 38 + 20 + 12 + 8 + 160 = 238 bytes • Bits transmitted every 20ms – 238 bytes * 8 bits/byte = 1904 bits • Bits transmitted every second – 1904 bits/frame * 50 frames/seg. = 95,200 bits/second = 95.2Kbps!
  • 24. Comparing Codecs  Table for the actual bandwidth for common codecs (using Ethernet): Codec BW codec BW actual (Ethernet) G.711 64 Kbps 95.2 Kbps G.726* 32 Kbps 63.2 Kbps iLBC* 15.2 Kbps 46.4 Kbps GSM 13 Kbps 43.7 Kbps G.729A 8 Kbps 39.2 Kbps * For these codecs, multiple data rates may be used.