SlideShare a Scribd company logo
1 of 9
Download to read offline
North South Univetsity
                               (NSU)

                        Project on IP telephony

TOPIC: VoIP to the Wireless network and business market and challenges.

                 Prepared for: Dr.Mashiur Rahman
              Dept of Computer Science And Engineering

                            Submitted by:
                     Name:Md.Shahanshah sarkar
                    ID#072802556
                    Course: ETE 607.2

                    Date of Submission: 15th April,2008
Abstract
The paper discusses the implementation of Voice over IP (VoIP) and IP Multimedia Subsystem
services (IMS) over the much sought after wireless standard WiMAX (802.16). The key issues
addressed are: Introduction to the working of VoIP and multimedia transmission over wireless.
The soft switching
technique for compatibility with WiMAX.


Table of Contents
1. Introduction to VoIP
   1.1 How does VoIP work?
   1.2 Signaling Protocols
   1.2.1 H.323
   1.2.2 Session Initiation Protocol (SIP)
   1.3 Softswitch
   1.4 Market and Main Challenges
   1.4.1 Voice Quality
   1.4.2 Security
   1.4.3 E911/CALEA Support
2. Introduction to IMS
   2.1 WiMAX IPTV
   2.2 Services offered
   2.3.1 Personal Video Recorder
   2.3.2 Interactive TV
   2.3.3 PC-TV
3. WiMAX - Quality of Service (QoS)
4. Impact on the Telecom and Satellite/Cable TV Industry
5. Pre WiMAX Happenings and Industry Forecasts
6. Summary
7. References
1.0 Introduction to VoIP
VoIP has opened new doors for telephony bringing forward immense possibilities.
The basic reason for the popularity of VoIP is the cost which is very low as compared to the
conventional telephony services. The concept of transmission of voice over data stream makes it
possible to have VoIP transmitted and received using anything.

1.1 How does VoIP work?
VoIP uses Internet Protocol for transmission of voice as packets over IP networks. The process
involves digitization of voice, the isolation of unwanted noise signals and then the compression
of the voice signal using compression algorithms/codecs. After the compression the voice is
packetized to send over an IP network, each packet needs a destination address and sequence
number and data for error checking. The signaling protocols are added at this stage to achieve
these requirements along with the other call management requirements. When a voice packet
arrives at the destination, the sequence number enables the packets to be place in order and then
the decompression algorithms are applied to recover the data from the packets. Here the
synchronization and delay management needs to be taken care of to make sure that there is
proper spacing. Jitter buffer is used to store the packets arriving out of order through different
routes, to wait for the packets arriving late.

1.2 Signaling Protocols
The signaling protocols H.323, SIP are used to setup the route for the transmission over the IP
network; the Gateway protocols like the Media Gateway Control Protocol are used to establish
control and status in the media and signaling gateways. Routing (UDP, TCP) and transport
protocols (RTP) are used once the route is established for the transport of the data stream as
shown in Figure 1




1.2.1 H.323
H.323 is the ITU-T standard for packet based multimedia communication, though originally
developed for multimedia conferencing over LAN's it was later modified for VoIP as well.
H.323uses a number of other sub protocols for the various functions.
   H.255.0 - Registration, Admission, Status, Call Signaling, Control
   H.245 - Terminal Capability Exchange, Media Description, Control of Logical Channel .Also
H.323 offers specifications for call control, channel setup, codecs for the transmission of Real
time video and voice over the networks where the QoS and guaranteed services are not available.
For the transport RTP is used for real time audio and video streaming.

1.2.2 Session Initiation Protocol (SIP)
SIP is the IETF standard for VoIP signaling. It is based on the existing protocols like SMTP and
HTTP, and uses a text based syntax that is comparable to HTTP uses in web addresses. A web
address is comparable to a telephone number in a SIP network, also the PSTN phone numbers
are also compatible in a SIP network ensuring interfacing with PSTN systems. SIP also provides
a mobility function to the users. SIP also supports multiple media sessions during a single call
hence users can - share a game, use instant message (IM), and talk at the same time. SIP works
with most protocols like RTP, Session, Description Protocol (SDP), and Session Announcement
Protocol (SAP). A lot of other protocols are also needed when it comes to the transport and
signaling with the PSTN networks - RSVP, LDAP, and RADIUS. SIP works on a client server
architecture, where the clients are referred to as User Agents (UA). UA interact with the server
mainly through a PC with a telephony agent or IP phone. The servers are of four types :
   Registration
   Redirect Server
   Proxy Server
   UA server
The SIP messages used for communication between the client-server are INVITE, ACK,
OPTIONS,REGISTER, CANCEL, BYE

1.3 Softswitch
The softswitch coordinates the call control, signaling, and the other features that enables making
a call across networks possible. It provides all the essential call control and service logic
functions, coordinates routing of signaling messages between networks, it also provides all the
administrative functions like billing statistics and providing other value added services to the
users.

The various components of the Softswitch are described and shown in Figure 2:
  Signaling Gateway
  Media Gateway
  Application Server




1.4 Market and Challenges Faced:
VoIP and WiMAX: Market Update
• What has happened since WCA 2005…– Not much…
• WiMAX build-outs focus on core deployment
• Some major new players add VoIP offerings
– E.g., Clear wire
– Mostly residential
• Broadband prices declining
• Voice-data bundles increasingly successfully
– E.g., Verizon (FIOS)
– Cable quad play
– Vodafone adding fixed line services
– CBeyond “business triple play”
WiMAX Challenge: Beyond Data Services

   •   IPS

   •   Mobile Operators

   •   Next-Gen Provider
We have to maintain the quality and services, so we have to face some challenges:
1.4.1 Voice Quality
Presently, the telephone companies are losing so much of their business to the VoIP counterparts,
but still the speculation exists on the kind of voice quality that VoIP service providers would
give to customers. The techniques used to measure the voice quality of a VoIP call are the Mean
Opinion Score (MOS) and Perceptual Speech Quality Measurement (PSQM)
   MOS
MOS follows the measurement techniques specified in ITU-T P.800, where different people are
made to listen the voice signals and are made to rate the factors like distortion, delay, echo, noise
etc on a scale of 1 to 5 where 1 is the minimum and 5 being the maximum.
   PSQM
Based on ITU-T P.861 standard, this technique uses artificial speech, to provides numeric values
of approximate speech intelligibility taking into account effects such as noise, coding errors,
packet reordering, phase jitter, and excessive bit error rate. PSQM=0 signifies no impairment,
while PSQM=6.5 indicates that the signal is totally unusable.
The other factors affecting the voice quality are :
   Delay
   Packet Loss/ Dropped Packets
   Jitter
When the transmission times of the arriving packets varies as a result of different queuing times
or different routes it is referred to as Jitter.

1.4.2 Security
Securing the voice communication is also a big challenge for VoIP over WiMAX as care has to
be taken that it cannot be eavesdropped or intercepted. The Double encryption process - X.509
for Authentication and 152-bit AES, 3DES or 56-bit DES for data flow ensure the transmission
is secure and eavesdropping is very difficult on the traffic. When a Subscriber Station (SS) needs
to associate with a Base Station (BS), it sends an authorization request along with authentication
information in a X.509 certificate (Figure 3). The BS after verifying the certificate responds by
sending the authorization message which has the authorization key encrypted with subscriber's
public key, to enable the subscriber to register with the network. An IP address is given to the SS
by the DHCP. The DHCP server also provides the address of the TFTP server, from where the
SS gets the vendor specific configuration information file. After this, the BS accepts the
subscriber. The data stream is further encrypted using 56-bit DES, 3DES or 152-bit AES (Figure
4). This prevents the possibility of eavesdropping on the data and theft of service as the links
between the BS and SS are encrypted. Also WiMAX has built in virtual LAN (VLAN) support
which provides protection for data transmitted by multiple users on the same BS.




1.4.3 E911/CALEA Support
   E911 Support
   2.0 IP Media Subsystem Services - IMS
Today WiMAX is the only standard capable of providing the Quadruple play Technologies -
Data,Voice, Video, Mobility (802.16e) using a single network. Collectively these services are
referred to as IP Media Subsystem Services - IMS .




2.1 WiMAX IPTV
Uses the simple principle of converting a TV program to IP. This packetized program is
streamed to the Viewer.




2.3 Services Offered
   2.2.1 Video on Demand
   2.2.2 Personal Video Recorder
   2.2.3 PC - TV
3.0 WiMAX QoS
WiMAX provides Quality of Service at both physical and MAC layer using the following
techniques:
   Physical Layer
   Frequency division duplex (FDD)
Time division duplex (TDD)
   Forward Error Correction (FEC)
   Orthogonal frequency-division multiplexing (OFDM)
   Orthogonal Frequency Division Multiple Access (OFDMA)
   MAC Layer - Service Types
   Unsolicited Grant Service (UGS)
   Real Time Polling Service (RTPS)
   Non Real Time Polling Service (NRTPS)
   Best Effort (BE)
4.0 Impact on the Telecom and Satellite/Cable TV Industry
The Quadruple Play as we call it, will definitely have a catastrophic effect on the existing
Telecom and Satellite/Cable TV Industry.
The reasons being
   A Wimax network is a lot less expensive to deploy as compared to the conventional PSTN and
the Cable TV networks. It is highly flexible supporting several architectures, provides point to
point and point to multipoint access.
   The equipment is much more simpler, smaller in size and a lot convenient to handle.
   Highly Secure network by means of complex handshakes, X.509 certificates and use of AES,
3DES encryptions
   Ease of deployment and portability, as no hassles of wiring is involved.
   WiMAX’s different modulation schemes - BPSK, QPSK, 16-QAM, 64-QAM.
5.0 Pre WiMAX Happenings and Industry Forecasts
   WiMAX Telecom is first in the world to market telephony via WiMAX technology in Vienna,
Austria
http://www.wimaxxed.at/english/aboutus/press/pressrelease/06_02_20_First_WiMAX_telephon
y_via_WiMAX_
   California-based fixed wireless provider NextWeb to launch services in parts of California
http://www.internetnews.com/wireless/article.php/3500176
   Alcatel demonstrates IMS over WiMAX Network
http://www.wimax.com/commentary/news/wimax_industry_news/news9-26-2005mw1
   Intel collaborates with Municipal Authorities in Pune, India to make a Wireless City
http://www.business-standard.com/common/storypage.php
   Intel released its first WiMAX complaint broadband network interface device – Intel
PRO/Wireless 5116
http:www.intel.com/network/connectivity/products/wireless/prowireless_5116.htm


6.0 Summary
In this paper, we discussed the transmission of VoIP and IMS over WiMAX, the changes
required in the existing protocols. The working of a Softswitch which makes VoIP over WiMAX
possible. The possible challenges encountered and their solutions. Working of Wimax IPTV. The
effects of the advent of quadruple play offered by WiMAX on the existing telecom and Cable
TV industry. Lastly we looked into the products being launched compliant to the standard and
some pre standard implementations happening around the world.
7.0 References
   [Ohrtman05W] Frank, D. Ohrtman : "The WiMAX VoIP Presentation" - Monnoz Publishing
2005
   [Ohrtman05T] Frank, D. Ohrtman : "The WiMAX Seminar: Triple-Play, Quadruple Play,
IPTV,
VoIP, IMS and Mobility for Next Generation Networks" - Monnoz Publishing 2005
   [Orthman 05] Frank, D. Ohrtman : "WiMAX Handbook, Building 802.16 Wireless Networks
"-
McGraw Hill Communications 2005
   [WiMAX05] WiMAX Forum : "Can WiMAX Address your Applications?"
http://www.wimaxforum.org/news/downloads/Can_WiMAX_Address_Your_Applications_final.
pdf
   [JDSU03] JDSU :"White Paper - VoIP Overview" - JDSU Corporation 2003
http://www.jdsu.com/test_and_measurement/technical_resources/product_documents/whitepaper
/voipterm_wp_ Wimax Forum "Wimax - Overview and Performance"
http://www.wimaxforum.org/home/Mobile_WiMAX-_Part_1-
Overview_and_Performance_v2.pdf
   Wimax Forum "Telephony's Complete Guide to WiMAX"
http://www.wimaxforum.org/news/press_releases/Telephony_WiMAX.pdf
   Arunabha Ghosh and David R. Wolter "WiMAX/8O2.16: Current Performance Benchmarks
and
Future Potential" IEEE Communications Magazine - February 2005
http://ieeexplore.ieee.org/iel5/35/30297/01391513.pdf?arnumber=1391513
   Siemens "How to Implement Wimax in a Mobile Network "
http://www.siemens.com/Daten/siecom/HQ/COM/Internet/Mobile_Networks/WORKAREA/co
m_mnen/templatedata/-Siemens_WP_v16-final_1311829.pdf

More Related Content

What's hot

Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paperHema Makani
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewNarasimham Settipalli
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentationJoe Trial
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 
Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2mashiur
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IPALTANAI BISHT
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBasePacketBase, Inc.
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptxmashiur
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocolSanthosh Somu
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
Certified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalHuy Pham
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...thesakshi12
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 

What's hot (19)

Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
 
VII VoIP
VII VoIPVII VoIP
VII VoIP
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentation
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IP
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
Certified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology Professional
 
Digital network lecturer8
Digital network  lecturer8Digital network  lecturer8
Digital network lecturer8
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 

Viewers also liked

Ete411 Lec11
Ete411 Lec11Ete411 Lec11
Ete411 Lec11mashiur
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdfmashiur
 
Ete411 Lec12
Ete411 Lec12Ete411 Lec12
Ete411 Lec12mashiur
 
Ete411 Lec6
Ete411 Lec6Ete411 Lec6
Ete411 Lec6mashiur
 
ETE444-lec6-nanofabrication.pptx
ETE444-lec6-nanofabrication.pptxETE444-lec6-nanofabrication.pptx
ETE444-lec6-nanofabrication.pptxmashiur
 
ETE444-lec7-lab-on-a-chip-microfluidics.pdf
ETE444-lec7-lab-on-a-chip-microfluidics.pdfETE444-lec7-lab-on-a-chip-microfluidics.pdf
ETE444-lec7-lab-on-a-chip-microfluidics.pdfmashiur
 
Lec2 Algorth
Lec2 AlgorthLec2 Algorth
Lec2 Algorthhumanist3
 
ETE405-lec9.pdf
ETE405-lec9.pdfETE405-lec9.pdf
ETE405-lec9.pdfmashiur
 
ETE444-lec3.pptx
ETE444-lec3.pptxETE444-lec3.pptx
ETE444-lec3.pptxmashiur
 

Viewers also liked (9)

Ete411 Lec11
Ete411 Lec11Ete411 Lec11
Ete411 Lec11
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdf
 
Ete411 Lec12
Ete411 Lec12Ete411 Lec12
Ete411 Lec12
 
Ete411 Lec6
Ete411 Lec6Ete411 Lec6
Ete411 Lec6
 
ETE444-lec6-nanofabrication.pptx
ETE444-lec6-nanofabrication.pptxETE444-lec6-nanofabrication.pptx
ETE444-lec6-nanofabrication.pptx
 
ETE444-lec7-lab-on-a-chip-microfluidics.pdf
ETE444-lec7-lab-on-a-chip-microfluidics.pdfETE444-lec7-lab-on-a-chip-microfluidics.pdf
ETE444-lec7-lab-on-a-chip-microfluidics.pdf
 
Lec2 Algorth
Lec2 AlgorthLec2 Algorth
Lec2 Algorth
 
ETE405-lec9.pdf
ETE405-lec9.pdfETE405-lec9.pdf
ETE405-lec9.pdf
 
ETE444-lec3.pptx
ETE444-lec3.pptxETE444-lec3.pptx
ETE444-lec3.pptx
 

Similar to Shahnshah Sarker 072802556

Voip
VoipVoip
VoipPTCL
 
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...IRJET Journal
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...cscpconf
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)mashiur
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVideoguy
 
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET Journal
 
Voip – An Insight Into A Progressing Technology
Voip – An Insight Into A Progressing TechnologyVoip – An Insight Into A Progressing Technology
Voip – An Insight Into A Progressing TechnologyLeonardo Pimenta
 
IJSRED-V2I3P59
IJSRED-V2I3P59IJSRED-V2I3P59
IJSRED-V2I3P59IJSRED
 

Similar to Shahnshah Sarker 072802556 (20)

How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Voip
VoipVoip
Voip
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax He...
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
R43019698
R43019698R43019698
R43019698
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Skype
SkypeSkype
Skype
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)
 
Report
ReportReport
Report
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
 
Voip – An Insight Into A Progressing Technology
Voip – An Insight Into A Progressing TechnologyVoip – An Insight Into A Progressing Technology
Voip – An Insight Into A Progressing Technology
 
VOIP
VOIPVOIP
VOIP
 
IJSRED-V2I3P59
IJSRED-V2I3P59IJSRED-V2I3P59
IJSRED-V2I3P59
 
Voip
VoipVoip
Voip
 

More from mashiur

Touseef Kamal062159056
Touseef Kamal062159056Touseef Kamal062159056
Touseef Kamal062159056mashiur
 
Towfique 063382056
Towfique 063382056Towfique 063382056
Towfique 063382056mashiur
 
Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)mashiur
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056mashiur
 
Syeda Farhana Shirin Id#062681056
Syeda Farhana Shirin  Id#062681056Syeda Farhana Shirin  Id#062681056
Syeda Farhana Shirin Id#062681056mashiur
 
Shihab Uddin 062483056
Shihab Uddin  062483056Shihab Uddin  062483056
Shihab Uddin 062483056mashiur
 
Shahriar Khaled 062473056
Shahriar Khaled 062473056Shahriar Khaled 062473056
Shahriar Khaled 062473056mashiur
 
Shah M Saklaen 072809056
Shah M Saklaen 072809056Shah M Saklaen 072809056
Shah M Saklaen 072809056mashiur
 
Sayef Almaji (063170056)
Sayef Almaji (063170056)Sayef Almaji (063170056)
Sayef Almaji (063170056)mashiur
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)mashiur
 
Shahed.Anwar 061708556
Shahed.Anwar 061708556Shahed.Anwar 061708556
Shahed.Anwar 061708556mashiur
 
Sajjad Hossain 071297056
Sajjad Hossain  071297056Sajjad Hossain  071297056
Sajjad Hossain 071297056mashiur
 
S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)mashiur
 
Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)mashiur
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056mashiur
 
Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)mashiur
 
Riaz Rahman (072878056)
Riaz Rahman (072878056)Riaz Rahman (072878056)
Riaz Rahman (072878056)mashiur
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)mashiur
 
Rehana Zakia (063411056)
Rehana Zakia (063411056)Rehana Zakia (063411056)
Rehana Zakia (063411056)mashiur
 
Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)mashiur
 

More from mashiur (20)

Touseef Kamal062159056
Touseef Kamal062159056Touseef Kamal062159056
Touseef Kamal062159056
 
Towfique 063382056
Towfique 063382056Towfique 063382056
Towfique 063382056
 
Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056
 
Syeda Farhana Shirin Id#062681056
Syeda Farhana Shirin  Id#062681056Syeda Farhana Shirin  Id#062681056
Syeda Farhana Shirin Id#062681056
 
Shihab Uddin 062483056
Shihab Uddin  062483056Shihab Uddin  062483056
Shihab Uddin 062483056
 
Shahriar Khaled 062473056
Shahriar Khaled 062473056Shahriar Khaled 062473056
Shahriar Khaled 062473056
 
Shah M Saklaen 072809056
Shah M Saklaen 072809056Shah M Saklaen 072809056
Shah M Saklaen 072809056
 
Sayef Almaji (063170056)
Sayef Almaji (063170056)Sayef Almaji (063170056)
Sayef Almaji (063170056)
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)
 
Shahed.Anwar 061708556
Shahed.Anwar 061708556Shahed.Anwar 061708556
Shahed.Anwar 061708556
 
Sajjad Hossain 071297056
Sajjad Hossain  071297056Sajjad Hossain  071297056
Sajjad Hossain 071297056
 
S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)
 
Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056
 
Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)
 
Riaz Rahman (072878056)
Riaz Rahman (072878056)Riaz Rahman (072878056)
Riaz Rahman (072878056)
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
 
Rehana Zakia (063411056)
Rehana Zakia (063411056)Rehana Zakia (063411056)
Rehana Zakia (063411056)
 
Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)
 

Recently uploaded

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Shahnshah Sarker 072802556

  • 1. North South Univetsity (NSU) Project on IP telephony TOPIC: VoIP to the Wireless network and business market and challenges. Prepared for: Dr.Mashiur Rahman Dept of Computer Science And Engineering Submitted by: Name:Md.Shahanshah sarkar ID#072802556 Course: ETE 607.2 Date of Submission: 15th April,2008
  • 2. Abstract The paper discusses the implementation of Voice over IP (VoIP) and IP Multimedia Subsystem services (IMS) over the much sought after wireless standard WiMAX (802.16). The key issues addressed are: Introduction to the working of VoIP and multimedia transmission over wireless. The soft switching technique for compatibility with WiMAX. Table of Contents 1. Introduction to VoIP 1.1 How does VoIP work? 1.2 Signaling Protocols 1.2.1 H.323 1.2.2 Session Initiation Protocol (SIP) 1.3 Softswitch 1.4 Market and Main Challenges 1.4.1 Voice Quality 1.4.2 Security 1.4.3 E911/CALEA Support 2. Introduction to IMS 2.1 WiMAX IPTV 2.2 Services offered 2.3.1 Personal Video Recorder 2.3.2 Interactive TV 2.3.3 PC-TV 3. WiMAX - Quality of Service (QoS) 4. Impact on the Telecom and Satellite/Cable TV Industry 5. Pre WiMAX Happenings and Industry Forecasts 6. Summary 7. References
  • 3. 1.0 Introduction to VoIP VoIP has opened new doors for telephony bringing forward immense possibilities. The basic reason for the popularity of VoIP is the cost which is very low as compared to the conventional telephony services. The concept of transmission of voice over data stream makes it possible to have VoIP transmitted and received using anything. 1.1 How does VoIP work? VoIP uses Internet Protocol for transmission of voice as packets over IP networks. The process involves digitization of voice, the isolation of unwanted noise signals and then the compression of the voice signal using compression algorithms/codecs. After the compression the voice is packetized to send over an IP network, each packet needs a destination address and sequence number and data for error checking. The signaling protocols are added at this stage to achieve these requirements along with the other call management requirements. When a voice packet arrives at the destination, the sequence number enables the packets to be place in order and then the decompression algorithms are applied to recover the data from the packets. Here the synchronization and delay management needs to be taken care of to make sure that there is proper spacing. Jitter buffer is used to store the packets arriving out of order through different routes, to wait for the packets arriving late. 1.2 Signaling Protocols The signaling protocols H.323, SIP are used to setup the route for the transmission over the IP network; the Gateway protocols like the Media Gateway Control Protocol are used to establish control and status in the media and signaling gateways. Routing (UDP, TCP) and transport protocols (RTP) are used once the route is established for the transport of the data stream as shown in Figure 1 1.2.1 H.323 H.323 is the ITU-T standard for packet based multimedia communication, though originally developed for multimedia conferencing over LAN's it was later modified for VoIP as well. H.323uses a number of other sub protocols for the various functions. H.255.0 - Registration, Admission, Status, Call Signaling, Control H.245 - Terminal Capability Exchange, Media Description, Control of Logical Channel .Also H.323 offers specifications for call control, channel setup, codecs for the transmission of Real
  • 4. time video and voice over the networks where the QoS and guaranteed services are not available. For the transport RTP is used for real time audio and video streaming. 1.2.2 Session Initiation Protocol (SIP) SIP is the IETF standard for VoIP signaling. It is based on the existing protocols like SMTP and HTTP, and uses a text based syntax that is comparable to HTTP uses in web addresses. A web address is comparable to a telephone number in a SIP network, also the PSTN phone numbers are also compatible in a SIP network ensuring interfacing with PSTN systems. SIP also provides a mobility function to the users. SIP also supports multiple media sessions during a single call hence users can - share a game, use instant message (IM), and talk at the same time. SIP works with most protocols like RTP, Session, Description Protocol (SDP), and Session Announcement Protocol (SAP). A lot of other protocols are also needed when it comes to the transport and signaling with the PSTN networks - RSVP, LDAP, and RADIUS. SIP works on a client server architecture, where the clients are referred to as User Agents (UA). UA interact with the server mainly through a PC with a telephony agent or IP phone. The servers are of four types : Registration Redirect Server Proxy Server UA server The SIP messages used for communication between the client-server are INVITE, ACK, OPTIONS,REGISTER, CANCEL, BYE 1.3 Softswitch The softswitch coordinates the call control, signaling, and the other features that enables making a call across networks possible. It provides all the essential call control and service logic functions, coordinates routing of signaling messages between networks, it also provides all the administrative functions like billing statistics and providing other value added services to the users. The various components of the Softswitch are described and shown in Figure 2: Signaling Gateway Media Gateway Application Server 1.4 Market and Challenges Faced: VoIP and WiMAX: Market Update
  • 5. • What has happened since WCA 2005…– Not much… • WiMAX build-outs focus on core deployment • Some major new players add VoIP offerings – E.g., Clear wire – Mostly residential • Broadband prices declining • Voice-data bundles increasingly successfully – E.g., Verizon (FIOS) – Cable quad play – Vodafone adding fixed line services – CBeyond “business triple play” WiMAX Challenge: Beyond Data Services • IPS • Mobile Operators • Next-Gen Provider We have to maintain the quality and services, so we have to face some challenges: 1.4.1 Voice Quality Presently, the telephone companies are losing so much of their business to the VoIP counterparts, but still the speculation exists on the kind of voice quality that VoIP service providers would give to customers. The techniques used to measure the voice quality of a VoIP call are the Mean Opinion Score (MOS) and Perceptual Speech Quality Measurement (PSQM) MOS MOS follows the measurement techniques specified in ITU-T P.800, where different people are made to listen the voice signals and are made to rate the factors like distortion, delay, echo, noise etc on a scale of 1 to 5 where 1 is the minimum and 5 being the maximum. PSQM Based on ITU-T P.861 standard, this technique uses artificial speech, to provides numeric values of approximate speech intelligibility taking into account effects such as noise, coding errors, packet reordering, phase jitter, and excessive bit error rate. PSQM=0 signifies no impairment, while PSQM=6.5 indicates that the signal is totally unusable. The other factors affecting the voice quality are : Delay Packet Loss/ Dropped Packets Jitter
  • 6. When the transmission times of the arriving packets varies as a result of different queuing times or different routes it is referred to as Jitter. 1.4.2 Security Securing the voice communication is also a big challenge for VoIP over WiMAX as care has to be taken that it cannot be eavesdropped or intercepted. The Double encryption process - X.509 for Authentication and 152-bit AES, 3DES or 56-bit DES for data flow ensure the transmission is secure and eavesdropping is very difficult on the traffic. When a Subscriber Station (SS) needs to associate with a Base Station (BS), it sends an authorization request along with authentication information in a X.509 certificate (Figure 3). The BS after verifying the certificate responds by sending the authorization message which has the authorization key encrypted with subscriber's public key, to enable the subscriber to register with the network. An IP address is given to the SS by the DHCP. The DHCP server also provides the address of the TFTP server, from where the SS gets the vendor specific configuration information file. After this, the BS accepts the subscriber. The data stream is further encrypted using 56-bit DES, 3DES or 152-bit AES (Figure 4). This prevents the possibility of eavesdropping on the data and theft of service as the links between the BS and SS are encrypted. Also WiMAX has built in virtual LAN (VLAN) support which provides protection for data transmitted by multiple users on the same BS. 1.4.3 E911/CALEA Support E911 Support 2.0 IP Media Subsystem Services - IMS
  • 7. Today WiMAX is the only standard capable of providing the Quadruple play Technologies - Data,Voice, Video, Mobility (802.16e) using a single network. Collectively these services are referred to as IP Media Subsystem Services - IMS . 2.1 WiMAX IPTV Uses the simple principle of converting a TV program to IP. This packetized program is streamed to the Viewer. 2.3 Services Offered 2.2.1 Video on Demand 2.2.2 Personal Video Recorder 2.2.3 PC - TV 3.0 WiMAX QoS WiMAX provides Quality of Service at both physical and MAC layer using the following techniques: Physical Layer Frequency division duplex (FDD)
  • 8. Time division duplex (TDD) Forward Error Correction (FEC) Orthogonal frequency-division multiplexing (OFDM) Orthogonal Frequency Division Multiple Access (OFDMA) MAC Layer - Service Types Unsolicited Grant Service (UGS) Real Time Polling Service (RTPS) Non Real Time Polling Service (NRTPS) Best Effort (BE) 4.0 Impact on the Telecom and Satellite/Cable TV Industry The Quadruple Play as we call it, will definitely have a catastrophic effect on the existing Telecom and Satellite/Cable TV Industry. The reasons being A Wimax network is a lot less expensive to deploy as compared to the conventional PSTN and the Cable TV networks. It is highly flexible supporting several architectures, provides point to point and point to multipoint access. The equipment is much more simpler, smaller in size and a lot convenient to handle. Highly Secure network by means of complex handshakes, X.509 certificates and use of AES, 3DES encryptions Ease of deployment and portability, as no hassles of wiring is involved. WiMAX’s different modulation schemes - BPSK, QPSK, 16-QAM, 64-QAM. 5.0 Pre WiMAX Happenings and Industry Forecasts WiMAX Telecom is first in the world to market telephony via WiMAX technology in Vienna, Austria http://www.wimaxxed.at/english/aboutus/press/pressrelease/06_02_20_First_WiMAX_telephon y_via_WiMAX_ California-based fixed wireless provider NextWeb to launch services in parts of California http://www.internetnews.com/wireless/article.php/3500176 Alcatel demonstrates IMS over WiMAX Network http://www.wimax.com/commentary/news/wimax_industry_news/news9-26-2005mw1 Intel collaborates with Municipal Authorities in Pune, India to make a Wireless City http://www.business-standard.com/common/storypage.php Intel released its first WiMAX complaint broadband network interface device – Intel PRO/Wireless 5116 http:www.intel.com/network/connectivity/products/wireless/prowireless_5116.htm 6.0 Summary In this paper, we discussed the transmission of VoIP and IMS over WiMAX, the changes required in the existing protocols. The working of a Softswitch which makes VoIP over WiMAX possible. The possible challenges encountered and their solutions. Working of Wimax IPTV. The effects of the advent of quadruple play offered by WiMAX on the existing telecom and Cable TV industry. Lastly we looked into the products being launched compliant to the standard and some pre standard implementations happening around the world.
  • 9. 7.0 References [Ohrtman05W] Frank, D. Ohrtman : "The WiMAX VoIP Presentation" - Monnoz Publishing 2005 [Ohrtman05T] Frank, D. Ohrtman : "The WiMAX Seminar: Triple-Play, Quadruple Play, IPTV, VoIP, IMS and Mobility for Next Generation Networks" - Monnoz Publishing 2005 [Orthman 05] Frank, D. Ohrtman : "WiMAX Handbook, Building 802.16 Wireless Networks "- McGraw Hill Communications 2005 [WiMAX05] WiMAX Forum : "Can WiMAX Address your Applications?" http://www.wimaxforum.org/news/downloads/Can_WiMAX_Address_Your_Applications_final. pdf [JDSU03] JDSU :"White Paper - VoIP Overview" - JDSU Corporation 2003 http://www.jdsu.com/test_and_measurement/technical_resources/product_documents/whitepaper /voipterm_wp_ Wimax Forum "Wimax - Overview and Performance" http://www.wimaxforum.org/home/Mobile_WiMAX-_Part_1- Overview_and_Performance_v2.pdf Wimax Forum "Telephony's Complete Guide to WiMAX" http://www.wimaxforum.org/news/press_releases/Telephony_WiMAX.pdf Arunabha Ghosh and David R. Wolter "WiMAX/8O2.16: Current Performance Benchmarks and Future Potential" IEEE Communications Magazine - February 2005 http://ieeexplore.ieee.org/iel5/35/30297/01391513.pdf?arnumber=1391513 Siemens "How to Implement Wimax in a Mobile Network " http://www.siemens.com/Daten/siecom/HQ/COM/Internet/Mobile_Networks/WORKAREA/co m_mnen/templatedata/-Siemens_WP_v16-final_1311829.pdf