A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
Internet protocol telephony
1. Tec-Sem Presentation
National Institute of Science & Technology
INTERNET PROTOCOL TELEPHONY
PRESENTED
Madhumita Routray
BY
Madhumita Routray (cs200157301)
2. Tec-Sem Presentation
Overview
Technology
Introduction to IP Telephony
What is IP Telephony goods for?
& Goal Of IP Telephony
Science Architecture of IP Telephony
How It works?
of Institute Advantages and Challenges
Scenario of IP Telephony
National Future of IP Telephony
Security Issues
[2] Madhumita Routray
3. Tec-Sem Presentation
Introduction
[3] National Institute of Science & Technology
Internet Protocol, as its name suggests, uses the Internet for
carrying the Communication
Vo IP comes in two different guises. One is as Internet
Telephony with voice traffic routed on a ‘best effort’ basis over
PC-Internet-PC, PC-Internet-PSTN and PSTN Internet-PSTN
networks. The other is as Vo BB with voice traffic transmitted
over managed & proprietary ‘Q o S’ (Quality of Service)
networks that use IP technology to render end-to-end IP
. IP telephony means placing telephony calls over IP networks
instead of public switched telephone networks (PSTN).
Currently IP telephony offers cheaper call prices with less
Madhumita Routray
4. Tec-Sem Presentation
What is IP Telephony goods for?
Technology
Ip telephony is a technology in which IP networks are
being used as the medium to transmit voice traffic. IP
telephony has numerous deployment scenarios and
architectures in which the following terms are usually
& associated with:
Science 1-> Voice over IP (Vo IP)
2->Voice on the Net (VON) or Internet
telephony
of 3-> Locating a user
Institute IP telephony, or voice over IP, means that voice and fax
calls are transmitted over an IP network such as the
Internet, rather than over the familiar public switched
telephone network (PSTN).
National [4] Madhumita Routray
5. Tec-Sem Presentation
Goals Of IP Telephony
[5] National Institute of Science & Technology
Learn the fundamentals of IP Telephony including voice
compression, Gatekeeper functionality, and the protocols that
drive convergence.
Understand the Data Networking components and how does
components handle typical circuit switched Voice services.
Examine Quality of Service including Queuing, RSVP, Diff- Serve
and COPS.
Describe and detail multi-service Voice Products and how those
solutions will be handled in a converged environment.
Explain Call Manager and IP Telephony Solutions, including the
roll of an IP PBX in your telephony environment.
Explain the basics of Voice Signaling and how Signaling is handled
in a converged network.
Compare and Contrast Voice over IP, Voice over Frame and
Voice over ATM from both a technical and a business prospective.
Madhumita Routray
6. Tec-Sem Presentation
Architecture
Technology
Architecture: the Internet telephony systems are
composed of these elements:
1-> end devices;
& 2->gateways;
Science 3->Gatekeepers/proxies
It has two types of Architecture
of A->Network Architecture
Institute A.1->H.323 model
A.2->SIP model
B->Protocol Architecture
National [6] Madhumita Routray
7. Tec-Sem Presentation
Technology
End Devices:-these are clients which are able to
receive or initiate calls.They generate and receive
& Science bi-directional real time information streams.
Gatekeeper:-It manages a so called Zone ,which is
a collection of terminals,gateways and
of MCU.Gatekeeper may also provide call control
Institute signaling,call authorization and call management.
Proxies:-It is responsible for connecting IP
telephone network to other type of
National networks,PSTN or ISDN.
[7] Madhumita Routray
8. Tec-Sem Presentation
Network architecture of SIP
[8] National Institute of Science & Technology
The network architecture consists of four types of network
elements:Terminals,Gatekeepers, Gateways and Multipoint
Control unit(MCU).
Madhumita Routray
9. Tec-Sem Presentation
How is It works
[9] National Institute of Science & Technology
You pick up the receiver and listen for a dial tone. This
lets you know that you have a connection to the local
office of your telephone carrier.
You dial the number of the party you wish to talk to.
The call is routed through the switch at your local carrier
to the party you are calling.
A connection is made between your telephone and the
other party's line using several interconnected switches
along the way.
The phone at the other end rings, and someone answers
the call.
The connection opens the circuit.
You talk for a period of time and then hang up the
receiver.
When you hang up, the circuit is closed, freeing your line
and all the lines in between.
Madhumita Routray
10. Tec-Sem Presentation
Scenarios of IP Telephony
[10] National Institute of Science & Technology
There are three basic business scenarios for IP telephony:
IP terminal to IP terminal:-
IP terminal to Phone or Phone to IP terminal:-
Phone to Phone:-
Madhumita Routray
11. Tec-Sem Presentation
Challenges of IP Telephony
[11] National Institute of Science & Technology
Greater storage capabilities, an increase in silicon processing
power, stronger compression engines.
MPLS (Multi Protocol Label Switching) is another key
technology that allows the Internet to give higher priority to
Vo IP communications so that conversations will not cut in
and out.
For many large established telephone monopolies, those
operators encumbered with legacy networks and not terribly
innovative or swift to change.
Assembled at the other end and converted where necessary
back into a traditional phone signal just before the call
reaches its destination. Many carriers have been using Vo IP
technology for a long time to carry international voice traffic
and do the reassembly of packets in exchanges rather than at
the receiver end. Vo IP providers complete PSTN-bound
calls by teaming with CLECs
Madhumita Routray
12. Tec-Sem Presentation
Security issues
Technology
• The internet is an open network where everyone
can receive and transmit packets relatively easily.
• Four basic security aspects are addressed in IP
telephony:-
& Science Authentication:A process to ensure that the
participants really are who they claim to be.
Integrity:A process to ensure that the contents of
of the packet remains unchanged during
Institute transmission.
Privacy:-Using ciphering mechanisms
eavesdroppers are prevented to listen the
National contents of transmitted packets.
Building Conesus:-A process to prevent that
someone can deny he or she done something.
[12] Madhumita Routray
13. Tec-Sem Presentation
Advantage of IP Telephony
Technology
High availability
Security Performance
Manageability
& Adaptability
Science Product flexibility
Converge system
of Share information
Institute Improve quality
Stay available
Maximum security
National Offer options
Building consensus
[13] Madhumita Routray
14. Tec-Sem Presentation
Future Orientation of IP Telephony
Technology
Technology is developing very fast.In the
future,there will be many different kind of IP
telephones popping out.
& The following list few properties that future IP
Science Telephony terminals should have:
1->video telephony
2->Voice Reorganization:-
of Institute 3->Design.
4->Entertainment
National [14] Madhumita Routray
15. Tec-Sem Presentation
Conclusion
Technology
Vo IP in its various forms raises several complex
questions that go beyond the
immediacy of whether or not consumers get cheaper
telephone calls, but at the same
& Science time IP technology is ushering in a world of peer-to-peer
communications that
provides opportunities (and dangers) for multiple
of business models and players. Which
Institute ones survive and which ones thrive should be market-determined,
but markets can
also fail unless supported by sensible regulation
National facilitating competition. Emergency
[15] Madhumita Routray