Quobis presented information on IP telephony and SIP. They discussed the history and evolution of telephony from fixed lines to mobile networks. IP telephony offers advantages like reusing existing infrastructure and open source projects. SIP is the dominant signaling protocol and allows for establishing multimedia sessions through signaling and negotiation of session parameters. Kamailio is an open source SIP softswitch that can perform proxy and registrar roles and is high performance software used in commercial VoIP networks.
Surf Solutions intro to new partner jan2011 Rudy Shainer
This document discusses Surf's enabling technology products for multimedia applications and services. It introduces Surf's two product lines - enabling technology and complete "box" solutions. The enabling technology line includes boards and mezzanine cards with video/audio/voice codecs and modems. These include the SURFAce-812 PCIe card with 8 DSPs, the SURFExpress PCIe board, and the SURFRider AMC mezzanine card. These products offer modular designs using Surf's SURFDocker architecture and are aimed at OEM customers and systems integrators to enable high capacity multimedia applications.
This document discusses IPTV (Internet Protocol Television), which is the delivery of television content over IP networks. It describes how video is compressed and transmitted using protocols like MPEG-2 Transport Stream, RTP, RTSP, and UDP to allow video to be delivered over the internet. Two common distribution models for IPTV are discussed: multicast for live content and unicast for video-on-demand. Centralized and distributed transport models as well as peer-to-peer distribution are also covered. The document outlines the technical requirements and challenges of delivering high quality IPTV.
Ocean's Network S.L. is a privately-held telecommunications company based in Spain that provides fixed, mobile, IP telephony, internet, and television services. It has operated as a licensed telecom carrier in Spain since 2004. The document outlines Ocean's history, services, and goals to expand its wholesale business and develop unique converged mobile and fixed products.
The Clarity 4050 is an IP phone that functions as a 16-extension IP PBX embedded in a compact handset. It offers unified communications over fixed, mobile, and IP services using PacketRoute intelligent routing technology. PacketRoute allows multiple Clarity handsets to be connected to form a scalable hybrid IP PBX and intelligently routes calls between available SIM cards, PSTN trunks, and IP trunks. The Clarity 4050 provides flexibility through its routing plans and ability to reduce mobile call costs.
This document discusses Internet Protocol Television (IPTV), which delivers television and audio content over an Internet Protocol (IP) network. It begins with a brief history of IPTV and an overview of how it works. Key points covered include the end-to-end architecture of an IPTV network, including elements like video servers and set-top boxes. The document also examines the IPTV protocols, advantages, applications, and limitations. It concludes by discussing the future growth of IPTV and its potential to integrate with other IP-based services.
1. IPTV delivers television content over the internet rather than through traditional cable or broadcast means. It allows viewing on computers, televisions through set-top boxes, and mobile devices.
2. Key advantages of IPTV include interactive programming, content on-demand, multi-screen viewing, and potentially lower costs compared to cable.
3. IPTV uses internet protocols to compress and deliver video and audio content. Live television uses multicast transmission while video on-demand uses unicast.
This document provides an overview of Alcatel-Lucent's 7360 ISAM FX fiber access platform, including its shelf types, board types, and line cards. The 7360 ISAM FX offers various shelf configurations (FX-16, FX-8, FX-4) that can accommodate different mixtures of fiber line cards. It supports both GPON and EPON fiber technologies as well as point-to-point Ethernet services. The document describes the control and line cards available, including high-capacity GPON and 10G PON options. It positions the 7360 ISAM FX as a flexible fiber access platform for residential, business, and mobile backhaul services.
This document provides a bill of quantities (BoQ) for an optical fiber to the home (FTTH) project to provide public broadband services to 80,000 subscribers. The BoQ includes costs for fiber optic cables, connectivity equipment, outdoor cabinets, subscriber drops, poles, grounding equipment, ducting, and related infrastructure needed to implement the FTTH network from the backbone to subscribers' homes. The project will deploy a passive optical network (PON) architecture using GPON technology to deliver triple play services of data, voice, and video over the FTTH network.
Surf Solutions intro to new partner jan2011 Rudy Shainer
This document discusses Surf's enabling technology products for multimedia applications and services. It introduces Surf's two product lines - enabling technology and complete "box" solutions. The enabling technology line includes boards and mezzanine cards with video/audio/voice codecs and modems. These include the SURFAce-812 PCIe card with 8 DSPs, the SURFExpress PCIe board, and the SURFRider AMC mezzanine card. These products offer modular designs using Surf's SURFDocker architecture and are aimed at OEM customers and systems integrators to enable high capacity multimedia applications.
This document discusses IPTV (Internet Protocol Television), which is the delivery of television content over IP networks. It describes how video is compressed and transmitted using protocols like MPEG-2 Transport Stream, RTP, RTSP, and UDP to allow video to be delivered over the internet. Two common distribution models for IPTV are discussed: multicast for live content and unicast for video-on-demand. Centralized and distributed transport models as well as peer-to-peer distribution are also covered. The document outlines the technical requirements and challenges of delivering high quality IPTV.
Ocean's Network S.L. is a privately-held telecommunications company based in Spain that provides fixed, mobile, IP telephony, internet, and television services. It has operated as a licensed telecom carrier in Spain since 2004. The document outlines Ocean's history, services, and goals to expand its wholesale business and develop unique converged mobile and fixed products.
The Clarity 4050 is an IP phone that functions as a 16-extension IP PBX embedded in a compact handset. It offers unified communications over fixed, mobile, and IP services using PacketRoute intelligent routing technology. PacketRoute allows multiple Clarity handsets to be connected to form a scalable hybrid IP PBX and intelligently routes calls between available SIM cards, PSTN trunks, and IP trunks. The Clarity 4050 provides flexibility through its routing plans and ability to reduce mobile call costs.
This document discusses Internet Protocol Television (IPTV), which delivers television and audio content over an Internet Protocol (IP) network. It begins with a brief history of IPTV and an overview of how it works. Key points covered include the end-to-end architecture of an IPTV network, including elements like video servers and set-top boxes. The document also examines the IPTV protocols, advantages, applications, and limitations. It concludes by discussing the future growth of IPTV and its potential to integrate with other IP-based services.
1. IPTV delivers television content over the internet rather than through traditional cable or broadcast means. It allows viewing on computers, televisions through set-top boxes, and mobile devices.
2. Key advantages of IPTV include interactive programming, content on-demand, multi-screen viewing, and potentially lower costs compared to cable.
3. IPTV uses internet protocols to compress and deliver video and audio content. Live television uses multicast transmission while video on-demand uses unicast.
This document provides an overview of Alcatel-Lucent's 7360 ISAM FX fiber access platform, including its shelf types, board types, and line cards. The 7360 ISAM FX offers various shelf configurations (FX-16, FX-8, FX-4) that can accommodate different mixtures of fiber line cards. It supports both GPON and EPON fiber technologies as well as point-to-point Ethernet services. The document describes the control and line cards available, including high-capacity GPON and 10G PON options. It positions the 7360 ISAM FX as a flexible fiber access platform for residential, business, and mobile backhaul services.
This document provides a bill of quantities (BoQ) for an optical fiber to the home (FTTH) project to provide public broadband services to 80,000 subscribers. The BoQ includes costs for fiber optic cables, connectivity equipment, outdoor cabinets, subscriber drops, poles, grounding equipment, ducting, and related infrastructure needed to implement the FTTH network from the backbone to subscribers' homes. The project will deploy a passive optical network (PON) architecture using GPON technology to deliver triple play services of data, voice, and video over the FTTH network.
The document provides an update on CRC's open and free DAB tools. It discusses the Canadian context of digital radio, explains why CRC develops tools with open/free licenses, describes several of CRC's DAB tools including CRC-DABMUX, CRC-DABMOD and Openmokast, discusses limitations and future plans, and concludes by emphasizing the benefits of open source approaches.
IPTV, Internet Video and Adaptive Streaming TechnologiesCisco Canada
The document discusses IPTV, Internet video, and adaptive streaming technologies. It provides an agenda that covers IPTV architecture, protocols, and quality of service, as well as Internet video and adaptive streaming over HTTP. The presenter is from Cisco and works on video transport and distribution architectures.
Passive Optic Network (PON) provides a point-to-multipoint fiber connection between an optical line terminal at the operator's central office and multiple optical network units near customers. PON uses passive splitters to enable a single fiber to serve multiple premises, reducing network installation costs compared to point-to-point architecture. Major PON technologies include Ethernet PON (EPON), which uses Ethernet packet transmission, and Gigabit PON (GPON), which supports higher speeds of up to 2.5 Gbps downstream and 1.25 Gbps upstream. PON is increasingly seen as an affordable way to deliver high-speed broadband and triple-play services to both urban and rural areas.
IPTV supports multicast and unicast transmission of TV content. Multicast transmits the same content to multiple receivers simultaneously, while unicast transmits different content to each receiver. Video and audio are encoded using codecs into a compressed transport stream. The Real-time Transport Protocol controls media servers by issuing commands and maintains state between clients and servers for unicast transmission. Quality of experience for IPTV relies on error-free delivery to avoid issues like pixelation.
1) GlobalInvacom introduced its FibreIRS fiber optic system 5 years ago, and it has since connected over 2 million households to satellite signals via fiber optic cables.
2) The FibreIRS system allows satellite and terrestrial TV signals to be distributed over long distances without signal attenuation. It has seen year-over-year sales growth of 20% as both individual homes and larger installations adopt the technology.
3) GlobalInvacom continues developing the FibreIRS system, recently introducing products that allow up to 4,096 connections from a single satellite LNB and easy-to-install fiber optic cables. The company now has 1,600 employees across multiple international offices and facilities.
The proliferation of consumer devices, HDTV and internet based services will continue to drive consumer bandwidth demand and Fiber is the only access technology capable of supporting dedicated gigabit Ethernet bandwidths.
The document provides an overview of Gigabit Passive Optical Network (GPON) technology as the new standard for structured cabling and LAN connectivity. Some key points include:
- GPON offers significant capital and operational savings compared to traditional Ethernet networks, with up to 70% lower capital expenditures, 80% lower power consumption, and 90% less space utilization.
- It provides a fiber optic LAN infrastructure that is more reliable, secure, scalable and future-proof compared to copper-based networks.
- The passive optical network architecture consolidates voice, video, data and wireless services over a single fiber infrastructure for both residential and business applications.
These are sample slides taken from my 4 days long "GPON-FTTx" training course. This course has over 380 slides and it is a great source of learning about various topics related to GPON & FTTx. There are tons of exercises and real-world examples provided in teaching material.
GlobalInvacom's fibre optic technology called FibreIRS has been very successful, connecting over 2 million households in the past 5 years. Their newest system, the O2E Converter, allows up to 4,096 connections from a single satellite dish. Sales of fibre optic products have increased 20% annually, with northern Europe being the largest market at 40-50% of sales. GlobalInvacom continues developing new fibre optic products and systems to expand connectivity capabilities.
The Outlook of Broad Band Optical Access NetworksCedric Lam
The document summarizes the outlook of broadband optical access networks. It discusses drivers for continuing growth in internet traffic and new applications. This will require higher bandwidth access networks. Technologies like fiber to the premises (FTTP) networks using passive optical networks (PON) can meet these needs. Standards like Gigabit PON (GPON) and Ethernet PON (EPON) are discussed and compared. Video on demand (VoD) is highlighted as a bandwidth intensive killer application that will strain existing networks. The deployment of fiber networks globally and in the US is summarized. 10 Gigabit Ethernet PON is presented as an upgrade path to meet future bandwidth demands.
GPON (Gigabit Passive Optical Network) is a fiber optic technology that brings optical fiber closer to homes and businesses to deliver high bandwidth internet access. It uses a point-to-multipoint architecture with passive splitters to deliver fiber connectivity in a cost-effective manner. GPON supports high speeds, legacy services, and new services like IPTV through efficient encapsulation methods. It consists of an optical line terminal at the provider and multiple optical network terminals connected through a passive optical distribution network.
This document provides an overview of GPON (Gigabit-capable Passive Optical Network) technology:
- GPON uses wavelength division multiplexing to enable bidirectional communication over a single fiber, with downstream broadcast and upstream TDMA for multiplexing user signals.
- Key standards include ITU-T G.984 for parameters, G.984.2 for physical layer specs, G.984.3 for transmission convergence layer, and G.984.4 for OMCI management.
- The GPON architecture consists of an OLT, ONUs, a passive optical splitter, and supports transmission speeds up to 2.5Gbps downstream and 1.25Gbps upstream.
Derek Lane presented on PROFINET for IoT, IIoT, and Industry 4.0. He discussed how PROFINET and the PROFINET of Things supports the IIoT through data access, uptime, and open standards. PROFINET provides connectivity from the enterprise level to the field level and supports data transfer through various application profiles and proxies. Security is also important for IIoT and PROFINET complies with necessary security measures. PROFINET is moving towards Industry 4.0 through technologies like TSN that enable high determinism and real-time communication over converged networks.
PLNOG 8: Przemysław Dziel - NG - PON - Lights The Future Way for Broadband PROIDEA
This document discusses next generation passive optical networks (NG-PON) and the transition to 10G PON technologies. It provides background on the increasing bandwidth demands driven by new services that require speeds beyond 100Mbps. 10G GPON is presented as a solution, providing 10Gbps downstream and 2.5Gbps upstream speeds while being compatible with existing GPON networks through wavelength division multiplexing. The status and roadmap of 10G GPON standards, components, trials and products are also summarized, with the technology expected to be used initially for FTTB/FTTO applications as costs decrease.
This document discusses GPON (Gigabit Passive Optical Network) technology. It provides details on GPON network architecture and components like the OLT and ONT. It then analyzes competition between major GPON equipment vendors like Alcatel-Lucent, Huawei, ZTE, and Ericsson. Their key GPON products are described and example deployments listed. Finally, the document shows Huawei, ZTE, and Alcatel-Lucent have the largest shares of the global GPON market, together commanding over half of all GPON lines.
GlobalInvacom is a UK-based fiber optic manufacturer that developed FiberIRS, a technology for distributing satellite signals via fiber optic cables. Since its introduction 5 years ago, FiberIRS has connected over 2 million households. GlobalInvacom continues improving FiberIRS, allowing it to now support up to 4,096 connections from a single satellite dish. The company has grown significantly, with 1,600 employees working across multiple offices and 14 engineers dedicated to further developing FiberIRS. GlobalInvacom is working on new products to transmit more signal types over fiber optic networks and make installation easier.
This document provides an overview of TELEHOUSE data centers including their locations, services, and history. TELEHOUSE offers colocation and managed IT services from their 16 data centers located globally. They provide stable infrastructure, flexible networking options, and 24/7 operations and maintenance support. TELEHOUSE has been in business for over 20 years and now has data centers in major cities around the world.
The document discusses key concepts and technologies of GPON (Gigabit-capable Passive Optical Networks), including:
1) The basic architecture of PON networks consisting of an OLT, ONUs, and a passive optical splitter.
2) Reasons for adopting the GPON standard such as supporting high-bandwidth transmission and long reach.
3) Key GPON technologies including ranging, equalization delay, dynamic bandwidth assignment (DBA), and wavelength division multiplexing (WDM) for upstream/downstream transmission.
Presentación utilizada por Iago Soto el 11 de Febrero de 2010 en la sede ON de la Rua Nova de Santiago dentro de la primera reunión de Grupo Exportación Tic Galicia
This document discusses VoIP security threats like fraud and denial of service attacks. It provides examples of VoIP fraud causing losses of thousands of dollars or euros. It also describes common VoIP attacks like extension/password brute forcing, INVITE attacks, and exploiting default passwords. The document demonstrates using the Metasploit framework to launch SIP-based denial of service floods and discusses countermeasures like firewalls, monitoring, and session border controllers. It includes exercise notes about configuring Kamailio to defend a VoIP provider serving a lawless island from various attacks.
The document provides an update on CRC's open and free DAB tools. It discusses the Canadian context of digital radio, explains why CRC develops tools with open/free licenses, describes several of CRC's DAB tools including CRC-DABMUX, CRC-DABMOD and Openmokast, discusses limitations and future plans, and concludes by emphasizing the benefits of open source approaches.
IPTV, Internet Video and Adaptive Streaming TechnologiesCisco Canada
The document discusses IPTV, Internet video, and adaptive streaming technologies. It provides an agenda that covers IPTV architecture, protocols, and quality of service, as well as Internet video and adaptive streaming over HTTP. The presenter is from Cisco and works on video transport and distribution architectures.
Passive Optic Network (PON) provides a point-to-multipoint fiber connection between an optical line terminal at the operator's central office and multiple optical network units near customers. PON uses passive splitters to enable a single fiber to serve multiple premises, reducing network installation costs compared to point-to-point architecture. Major PON technologies include Ethernet PON (EPON), which uses Ethernet packet transmission, and Gigabit PON (GPON), which supports higher speeds of up to 2.5 Gbps downstream and 1.25 Gbps upstream. PON is increasingly seen as an affordable way to deliver high-speed broadband and triple-play services to both urban and rural areas.
IPTV supports multicast and unicast transmission of TV content. Multicast transmits the same content to multiple receivers simultaneously, while unicast transmits different content to each receiver. Video and audio are encoded using codecs into a compressed transport stream. The Real-time Transport Protocol controls media servers by issuing commands and maintains state between clients and servers for unicast transmission. Quality of experience for IPTV relies on error-free delivery to avoid issues like pixelation.
1) GlobalInvacom introduced its FibreIRS fiber optic system 5 years ago, and it has since connected over 2 million households to satellite signals via fiber optic cables.
2) The FibreIRS system allows satellite and terrestrial TV signals to be distributed over long distances without signal attenuation. It has seen year-over-year sales growth of 20% as both individual homes and larger installations adopt the technology.
3) GlobalInvacom continues developing the FibreIRS system, recently introducing products that allow up to 4,096 connections from a single satellite LNB and easy-to-install fiber optic cables. The company now has 1,600 employees across multiple international offices and facilities.
The proliferation of consumer devices, HDTV and internet based services will continue to drive consumer bandwidth demand and Fiber is the only access technology capable of supporting dedicated gigabit Ethernet bandwidths.
The document provides an overview of Gigabit Passive Optical Network (GPON) technology as the new standard for structured cabling and LAN connectivity. Some key points include:
- GPON offers significant capital and operational savings compared to traditional Ethernet networks, with up to 70% lower capital expenditures, 80% lower power consumption, and 90% less space utilization.
- It provides a fiber optic LAN infrastructure that is more reliable, secure, scalable and future-proof compared to copper-based networks.
- The passive optical network architecture consolidates voice, video, data and wireless services over a single fiber infrastructure for both residential and business applications.
These are sample slides taken from my 4 days long "GPON-FTTx" training course. This course has over 380 slides and it is a great source of learning about various topics related to GPON & FTTx. There are tons of exercises and real-world examples provided in teaching material.
GlobalInvacom's fibre optic technology called FibreIRS has been very successful, connecting over 2 million households in the past 5 years. Their newest system, the O2E Converter, allows up to 4,096 connections from a single satellite dish. Sales of fibre optic products have increased 20% annually, with northern Europe being the largest market at 40-50% of sales. GlobalInvacom continues developing new fibre optic products and systems to expand connectivity capabilities.
The Outlook of Broad Band Optical Access NetworksCedric Lam
The document summarizes the outlook of broadband optical access networks. It discusses drivers for continuing growth in internet traffic and new applications. This will require higher bandwidth access networks. Technologies like fiber to the premises (FTTP) networks using passive optical networks (PON) can meet these needs. Standards like Gigabit PON (GPON) and Ethernet PON (EPON) are discussed and compared. Video on demand (VoD) is highlighted as a bandwidth intensive killer application that will strain existing networks. The deployment of fiber networks globally and in the US is summarized. 10 Gigabit Ethernet PON is presented as an upgrade path to meet future bandwidth demands.
GPON (Gigabit Passive Optical Network) is a fiber optic technology that brings optical fiber closer to homes and businesses to deliver high bandwidth internet access. It uses a point-to-multipoint architecture with passive splitters to deliver fiber connectivity in a cost-effective manner. GPON supports high speeds, legacy services, and new services like IPTV through efficient encapsulation methods. It consists of an optical line terminal at the provider and multiple optical network terminals connected through a passive optical distribution network.
This document provides an overview of GPON (Gigabit-capable Passive Optical Network) technology:
- GPON uses wavelength division multiplexing to enable bidirectional communication over a single fiber, with downstream broadcast and upstream TDMA for multiplexing user signals.
- Key standards include ITU-T G.984 for parameters, G.984.2 for physical layer specs, G.984.3 for transmission convergence layer, and G.984.4 for OMCI management.
- The GPON architecture consists of an OLT, ONUs, a passive optical splitter, and supports transmission speeds up to 2.5Gbps downstream and 1.25Gbps upstream.
Derek Lane presented on PROFINET for IoT, IIoT, and Industry 4.0. He discussed how PROFINET and the PROFINET of Things supports the IIoT through data access, uptime, and open standards. PROFINET provides connectivity from the enterprise level to the field level and supports data transfer through various application profiles and proxies. Security is also important for IIoT and PROFINET complies with necessary security measures. PROFINET is moving towards Industry 4.0 through technologies like TSN that enable high determinism and real-time communication over converged networks.
PLNOG 8: Przemysław Dziel - NG - PON - Lights The Future Way for Broadband PROIDEA
This document discusses next generation passive optical networks (NG-PON) and the transition to 10G PON technologies. It provides background on the increasing bandwidth demands driven by new services that require speeds beyond 100Mbps. 10G GPON is presented as a solution, providing 10Gbps downstream and 2.5Gbps upstream speeds while being compatible with existing GPON networks through wavelength division multiplexing. The status and roadmap of 10G GPON standards, components, trials and products are also summarized, with the technology expected to be used initially for FTTB/FTTO applications as costs decrease.
This document discusses GPON (Gigabit Passive Optical Network) technology. It provides details on GPON network architecture and components like the OLT and ONT. It then analyzes competition between major GPON equipment vendors like Alcatel-Lucent, Huawei, ZTE, and Ericsson. Their key GPON products are described and example deployments listed. Finally, the document shows Huawei, ZTE, and Alcatel-Lucent have the largest shares of the global GPON market, together commanding over half of all GPON lines.
GlobalInvacom is a UK-based fiber optic manufacturer that developed FiberIRS, a technology for distributing satellite signals via fiber optic cables. Since its introduction 5 years ago, FiberIRS has connected over 2 million households. GlobalInvacom continues improving FiberIRS, allowing it to now support up to 4,096 connections from a single satellite dish. The company has grown significantly, with 1,600 employees working across multiple offices and 14 engineers dedicated to further developing FiberIRS. GlobalInvacom is working on new products to transmit more signal types over fiber optic networks and make installation easier.
This document provides an overview of TELEHOUSE data centers including their locations, services, and history. TELEHOUSE offers colocation and managed IT services from their 16 data centers located globally. They provide stable infrastructure, flexible networking options, and 24/7 operations and maintenance support. TELEHOUSE has been in business for over 20 years and now has data centers in major cities around the world.
The document discusses key concepts and technologies of GPON (Gigabit-capable Passive Optical Networks), including:
1) The basic architecture of PON networks consisting of an OLT, ONUs, and a passive optical splitter.
2) Reasons for adopting the GPON standard such as supporting high-bandwidth transmission and long reach.
3) Key GPON technologies including ranging, equalization delay, dynamic bandwidth assignment (DBA), and wavelength division multiplexing (WDM) for upstream/downstream transmission.
Presentación utilizada por Iago Soto el 11 de Febrero de 2010 en la sede ON de la Rua Nova de Santiago dentro de la primera reunión de Grupo Exportación Tic Galicia
This document discusses VoIP security threats like fraud and denial of service attacks. It provides examples of VoIP fraud causing losses of thousands of dollars or euros. It also describes common VoIP attacks like extension/password brute forcing, INVITE attacks, and exploiting default passwords. The document demonstrates using the Metasploit framework to launch SIP-based denial of service floods and discusses countermeasures like firewalls, monitoring, and session border controllers. It includes exercise notes about configuring Kamailio to defend a VoIP provider serving a lawless island from various attacks.
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2012-2...Quobis
1. This document outlines an exercise for configuring the Kamailio softswitch to support a simulated telecommunications system across multiple islands.
2. Students will choose one of four options to expand the basic call functionality between 100 users to include load balancing international calls, call transfer, security testing, or adapting codecs based on weather conditions.
3. The document provides general considerations, tools recommended, and references for completing the exercise.
This document describes a virtual audio conferencing system called Multi Conference Unit. It allows multiple phone lines to participate in the same call simultaneously without additional communication costs. The system can integrate with existing corporate telephone systems and supports a minimum of 20 concurrent audio conferences each with 20 or more users. Licenses are available based on the number of virtual conference rooms needed.
Voice Traffic Data Mining (VTDM) es una solución de monitorización del tráfico telefónico saliente que permite agrupar líneas y destinos, estimar costes, y mejorar la gestión de los recursos de comunicaciones a través de la automatización de tareas de control.
Quobis webinar Siete avances clave en la operabilidad de redes VoIP y NGNQuobis
Este documento describe 7 avances clave en la operabilidad de redes VoIP y NGN: 1) mayor flexibilidad y seguridad que soluciones de fabricante, 2) diseño de entornos escalables orientados a la continuidad de negocio, 3) especialización tecnológica para ayudar a grandes retos de clientes, 4) proyectos llave en mano desde fases iniciales.
Este documento describe varios ataques y medidas de protección para redes VoIP. Los ataques incluyen denegación de servicio, fraude en llamadas, escuchas ilegales y control ilegal. La protección se logra mediante el diseño de la infraestructura, tecnologías seguras como TLS, SRTP y SBC, y monitoreo de la calidad de servicio.
Quobis Networks provides expertise in network integration, voice security, service assurance, and application servers focused on service providers and enterprises. They have 6 years experience working on SIP projects and developing their own products for over 2 years, including their Click to Call Application Server called VoiceInstant. VoiceInstant is an application server that enables click-to-call functionality in corporate networks and integrates with corporate applications through a multilingual API. It unifies call flows across different office locations and network topologies.
Este documento presenta los servicios y soluciones de Quobis Networks para proyectos de comunicaciones unificadas. Ofrece consultoría, diseño de arquitecturas, integración de sistemas y soporte basados en estándares abiertos. Quobis se especializa en proyectos llave en mano para grandes redes, con foco en interconexión, seguridad, gestión de tráfico y plataformas.
¿Cómo está cambiando la industria del call center?Quobis
El documento describe cómo la industria de los call centers está cambiando hacia el uso de VoIP SIP trunks, IMS y la nube. Esto permite una mayor flexibilidad, funcionalidad y ahorro de costos en comparación con las líneas TDM tradicionales. También cubre consideraciones de seguridad, calidad y aplicaciones avanzadas como grabación, conferencias y autenticación de llamadas.
Quobis develops the TalkStorage voice call recording platform. TalkStorage provides a simple and cost-effective solution for basic call recording needs in small call centers or outsourcers. It can record up to 300 calls concurrently and integrate easily with various VoIP PBX systems without needing additional hardware. Recorded calls can be stored on TalkStorage or the customer's storage and accessed through a web interface.
The document discusses Voice over IP (VoIP) and its description and operation. It defines VoIP as using private networks for IP telephony and Internet telephony as using public networks. It describes how audio is digitized, compressed, and transported via IP packets. Common VoIP deployments like IP phone to IP phone are also outlined. The differences between SIP and H.323 protocols are highlighted. Typical call flows for SIP, H.323, and interworking between SIP and H.323 are illustrated. Implementing VoIP requires IP-IP gateways or Asterisk servers to connect IP and PSTN networks. Using VoIP eliminates traditional time-based telephony charges and distinctions between local and long distance calls.
This document provides an overview and introduction to VoIP and SIP signaling. It discusses key topics such as VoIP architecture and components, the process of a VoIP telephone call including conversion between analog and digital signals and quality of service, SIP architecture including what SIP is, its capabilities and message format, and SIP call flow. The document is intended as a training presentation that includes definitions of terms, descriptions of concepts, diagrams, and quizzes related to VoIP and SIP.
The document provides information about a company that has been distributing IT equipment including networking, VOIP, and security products in the Philippines since 1997. It lists their contact information and location in Makati City, and authorizations to distribute various brands including Linksys, 3Com, Kingston, and Sophos. The company aims to provide the latest data communication and information access equipment to the growing Philippine IT market.
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
This document discusses Voice over Internet Protocol (VoIP) including its protocols, security issues, benefits, and challenges. It begins by introducing VoIP and describing its basic operation and advantages like lower costs. It then covers specific VoIP protocols like SIP and H.323. The document analyzes VoIP considerations like delay, jitter, packet loss, and discusses how these issues can affect call quality. It also provides an overview of VoIP technologies and their benefits for businesses. Finally, it presents a case study on assessing network readiness for VoIP deployment.
VoIP (Voice Over IP) allows users to make phone calls using an Internet connection rather than a traditional phone line. It works by converting voice signals into digital data packets which are transmitted over the Internet or other IP-based networks. Common protocols used for VoIP include UDP, RTP, and SIP. While VoIP provides advantages like lower costs, it also faces challenges of packet loss, latency, jitter, and firewall restrictions that can impact call quality.
The document provides an overview of VoIP components, standards, architectures and implementation choices. It discusses key VoIP elements like terminals, packetized voice, soft switches, media servers, gateways, LANs/WANs and standards. It also describes common VoIP architectures for computer-computer, computer-phone, phone-phone communication over the internet. Finally, it outlines VoIP solutions for businesses using VoIP-enabled PBXs, replacing PBXs with softswitches, and hosted PBX solutions.
VoIP allows users to make phone calls using an Internet connection rather than a traditional phone line. It works by converting the voice signal from analog to digital, breaking it into packets, sending it over IP, reassembling it at the destination, and converting it back to analog. VoIP has advantages like low cost and portability but disadvantages like quality issues during power outages or network instability. Major challenges include addressing latency, echo, jitter, connection problems through firewalls and NAT, and overall reliability.
This document provides an overview of VoIP services through a seminar presentation. It discusses how VoIP came about as an alternative to traditional circuit-switched telephony using the PSTN. VoIP allows carrying voice calls over an IP network by digitizing and packetizing voice streams using protocols like SIP and H.323. Some key benefits of VoIP include reduced costs, increased flexibility, and mobility. Popular VoIP service providers include Skype, while security poses ongoing challenges to VoIP adoption.
This document provides an overview of key concepts related to Voice over IP (VoIP) technology. It defines common VoIP terms and standards, describes how VoIP works by breaking analog voice signals into digital packets, and outlines typical system elements like softswitches, terminals, and gateways. It also discusses media standards, signaling protocols, quality of service measures, fax transmission methods, and various Patton Electronics VoIP products.
VoIP allows users to make voice calls over the internet instead of traditional phone lines. It works by converting voice signals to digital data packets that are transmitted over the internet and then reconverted at their destination. Key components include gateways, codecs, servers, and protocols like SIP and H.323. VoIP offers advantages like lower costs and integration with other systems but relies on internet connectivity and faces some security risks.
VoIP and the Telcos - Is there a life after death?webhostingguy
This document summarizes the impact of Voice over IP (VoIP) technology on traditional telephone companies (telcos). It discusses how VoIP allows users to make calls without relying on telco networks and services. VoIP shifts intelligence from centralized networks to distributed edge devices. This disrupts telcos' vertically integrated business models. To survive, telcos must change to more horizontal layered models and provide broadband access, backbone routing, gateways to public switched telephone networks, ENUM services, and VoIP hosting. There are opportunities for telcos in these areas as well as intelligent packaging and participation in trust circles for billing. The document concludes that while VoIP poses challenges, telcos can adapt and there is still life beyond their
This document discusses the requirements and considerations for implementing voice over IP (VoIP) networks. It covers topics like the impact of packet loss, delay and jitter on voice quality in an IP network. It also addresses the need for consistent throughput, reliability, and different types of gateways. Additional sections provide details on encapsulating voice in IP packets, major VoIP protocols like RTP and RTCP, and calculating bandwidth requirements.
This document discusses the requirements and considerations for implementing voice over IP (VoIP) networks. It covers topics like the impact of packet loss, delay and jitter on voice quality in an IP network. It also addresses the need for consistent throughput, reliability, and different types of gateways. Additional sections provide details on encapsulating voice in IP packets, major VoIP protocols like RTP and RTCP, and calculating bandwidth requirements.
This document discusses the requirements and considerations for implementing voice over IP (VoIP) networks. It covers topics like the effects of packet loss, delay and jitter on voice quality in an IP network. It also addresses the need for consistent throughput, reliability, and different types of gateways. Additional sections provide details on encapsulating voice in IP packets, major VoIP protocols like RTP and RTCP, and calculating bandwidth requirements.
This document discusses the requirements and considerations for implementing voice over IP (VoIP) networks. It covers topics like the impact of packet loss, delay and jitter on voice quality in an IP network. It also addresses the need for consistent throughput, reliability, and different types of gateways. Additional sections provide details on encapsulating voice in IP packets, major VoIP protocols like RTP and RTCP, and calculating bandwidth requirements.
Cisco CallManager Express (CME) is a call processing solution that provides VoIP functionality for small to medium sized networks of up to 120 IP phones. It allows connection to the PSTN via analog or digital trunks and supports protocols like Skinny and H.323 for call control. CME is configured on Cisco IOS routers and gateways to provide integrated voice and data services over IP.
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
This manual provides solid practical advice on application, implementation and, most importantly, troubleshooting Voice Over IP (VOIP) systems.
MORE INFORMATION: http://www.idc-online.com/content/practical-fundamentals-voice-over-ip-voip-21?id=151
VoIP allows users to make phone calls using an Internet connection instead of a traditional phone line. It works by converting voice signals to digital data that is transmitted in packets over the Internet. A VoIP network uses protocols like SIP and RTP to setup calls and transmit voice data. Components include VoIP protocols, gateways to interface with the PSTN, and codecs to compress voice signals. Businesses are attracted to VoIP as it can help reduce costs while improving utilization of bandwidth and network management. However, security risks like hacking and eavesdropping exist since VoIP uses the public Internet.
A short presentation on SIP Trunking. A background with SIP training and PSTN (T-1, ISDN PRI) and TCP/IP knowledge will be helpful. For more info connect with me at http://TrainingCity.com
VoIP allows voice calls over the internet using IP packets. It has advantages over traditional telephone networks like lower costs and ability to make calls anywhere internet can reach. Quality of service for VoIP calls can be impacted by packet loss, delay, and jitter. Standards like H.323 and SIP define protocols for call signaling, while RTP and SRTP are used for media transport and security. H.323 specifies components like terminals, gateways, MCUs and gatekeepers that work together to enable VoIP calls.
Similar to Presentacion kamailio uvigo_09262011 (20)
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
WebRTC inherits all the threats of traditional VoIP services together with existing web attacks. In this session Antón Román will explain this together with ad-hoc WebRTC attacks and ways to deal with Identity and keep the services secure.
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations
This document provides an overview of WebRTC, including:
- WebRTC allows real-time communications directly in web browsers using JavaScript APIs without plugins.
- It covers the definition, implementations, signaling methods, demos of WebRTC applications, and the relationship between WebRTC and SIP.
- The document also discusses QoffeeSIP, a JavaScript SIP stack that can be used with WebRTC, and potential final year project proposals related to WebRTC.
Quobis is a leading European provider of carrier-class unified communications solutions with a focus on security and interconnection. They offer advisory services, product development, and integration of session border controllers, webRTC, voice applications, and softswitches. Quobis has experience developing open source solutions and has worked on SIP projects for six years, developing their own products for two years.
WebRTC will enable real-time communications like voice and video directly in web browsers without plugins. The presenters will discuss their vision for this technology and how to implement it for corporations and telecom networks. They will cover introductions to HTML5, WebRTC, and network architectures; technical challenges around codecs, encryption, and NAT traversal; application cases for telecoms, companies, social media, and manufacturers; and demos of WebRTC applications and identity management. The presentation aims to show how voice traffic will migrate to the web, with browsers as new endpoints and websites as potential call centers, changing how telephone numbers and communications are managed.
WebRTC permitirá comunicaciones de voz y video nativas en los navegadores. La presentación describe WebRTC y HTML5, arquitecturas de red, retos técnicos como códecs y NAT, casos de aplicación como telcos y empresas, y una demo de TalkSetup. Gestión de identidad es crucial para la seguridad y privacidad de WebRTC.
La Unión Europea ha acordado un paquete de sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen restricciones a las importaciones de productos rusos de alta tecnología y a las exportaciones de bienes de lujo a Rusia. Además, se congelarán los activos de varios oligarcas rusos y se prohibirá el acceso de los bancos rusos a los mercados financieros de la UE.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
“Pode a Ibéria ser um mercado único para uma start-up?”Quobis
O documento discute se a Península Ibérica pode ser um mercado único para startups. Aponta que Portugal e Espanha têm mercados complementares, história comum, línguas acessíveis e fortes laços comerciais, o que torna a região atraente. Sugere seis passos para startups aproveitarem essa oportunidade: 1) realizar missões comerciais; 2) contratar funcionários do outro país; 3) ter fornecedores do outro país; 4) conquistar o primeiro cliente estrangeiro; 5) participar de associações do outro
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
2. Presentation
Quobis, who we are: www.quobis.com
● Quobis is a Engineering company focused on VoIP technologies.
● Founded in 2006 by Teleco Uvigo alumnus.
● Premises at O Porriño.
● 90% engineers.
● Main customers: operators, call centers and enterprises
● Partnerships: AcmePacket, Aheeva, SIPWise and Iptego.
● Own products: MTRP, SecVoID, MCU,...
● R&D activities. Currently involved in Avanza and FP7 projects.
2
3. Motivation
Why are we doing this?
●
We strongly believe University must be linked to real world.
● Part of our contribution to Kamailio Open Source Project.
● Professionals with qualified VoIP skills are demanded.
● Close cooperation with university in R&D projects.
Quobis Networks SLU
Todos los derechos reservados 3
4. st
1 Part
Biref introduction to telephony
Basics of IP Telephony (ToIP)
Quobis Networks SLU
Todos los derechos reservados 4
6. Introduction to telephony.
● 1833 Samuel Morse invents telegraph
● 1871 Antonio Meuci invents telephone
● 1876 Alexander Graham Bell patents telephone
● 1877 First telephone call in Spain
Quobis Networks SLU
Todos los derechos reservados 6
7. Introduction to telephony.
1870
● Fix line between two endpoints
● Manual conmutation
● Automatic conmutation (relay-based)
● Computer-controlled automatic conmutation
● Digital conmutation only electronic
● IP Conmutation!!
2010
Quobis Networks SLU
Todos los derechos reservados 7
11. Introduction to telephony.
What advantages does ToIP offer?:
●TDM and ISDN conmutation technologies
were a monopoly of big corporations:
operators and makers.
● It allows to re-use knowhow and
infrastructure → high speed evolution
●It allows to re-use generic hardware →
reduces coste.
● Open Source ToIP projects are born.
Quobis Networks SLU
Todos los derechos reservados 11
12. Introduction to telephony.
What about mobile telephony?:
●Maybe the most important milestone in
history of telephony. 1970
●It was born as a circuit-oriented technology
(GSM)
●It will be an all-IP network (4G→LTE) in a few
years.
2010
●ToIP concepts can be applied to Mobile
telephony → convergence!
Quobis Networks SLU
Todos los derechos reservados 12
13. Basics of IP telephony
Quobis Networks SLU
Todos los derechos reservados 13
14. 1. Basics of IP telephony
VoIP (Voice over IP) technologies
allow multimedia data transmission
(voice, video, IM... ) over IP networks.
ToIP (Telephony over IP) means
telephony systems implemented with VoIP
technology.
Quobis Networks SLU
Todos los derechos reservados 14
15. 2. Basics of IP telephony
VoIP = Signaling Protocols (SIP) +
Voice transport protocols (RTP/RTCP)
There are more signaling protocols
besides SIP: H323, Skype(*), MGCP, IAX,
Skinny... however SIP is and will be the
most used in short and middle term.
(*) closed protocol
15
16. 4. Basics of IP telephony
Normally signaling and voice are sent separately
(different protocols and ports).
This gives flexibility to protocols and allows them
to be adapted to new codecs and future multimedia
requirements:
● H323 → TDM signaling over IP
● SIP → native IP protocol → easily readable!
16
20. 1. SIP
SIP (Session Initiation Protocol)
Protocol defined in RFC3261.
RFC(Request For Comments) are published by
IETF (Internet Engineering Task Force) and
define Internet standards. Many actors are
involved (academia, makers, operators...).
20
21. 2. SIP
Since it is based on RFC3261, many others
RFCs add new functionality: presence, IM...
SIP uses clear text messages (like HTTP,
actually it's based on it).
Designed to establish any type of
multimedia session (voice, videocall,
videostreaming, electrocardiogram values... ).
21
24. 5. SIP
SIP Roles
User Agent examples: a SIP phone or a Media Server. It can play two
roles:
User Agent Client (UAC) – User Agent which sends a request
User Agent Server (UAS) User Agent which answers a request
Redirect Server User Agent Server which redirect requests
Proxy – sends request on behalf of users. It is what users 'see' of a SIP
network .
Registrar accepts REGISTER messages and stores user location in a
Database.
24
25. 6. SIP
SIP transport
SIP messages can be sent over TCP (port 5060) and UDP
(port 5060). Normally UDP is used.
It can also be transported over TLS.
SIP URI: identifies and locates a user.
sip:user@domain.com → sip:1234@<ip-server>
sips:user@domain.com
Domain is resolved by DNS. Three types of DNS records
involved: SRV (protocol and port), NAPTR (protocols
available) and A.
25
26. 7. SIP
SIP messages
Requests:
● REGISTER: register users
● INVITE: session establishment
● BYE: end of session
● ACK: acknowledge (INVITE, 407,...)
● SUBSCRIBE: event subscription
● INFO: transmit info during a call (DTMF)
Page 26
Copyright Quobis Networks 2010 – All rights reserved
27. 8. SIP
SIP responses:
Provisional (1xx): Redirection (3xx):
100 Trying 302 Moved Temporaly
180 Ringing
Request failure (4xx):
Successful (2xx): 401 Unauthorized
200 OK 404 Not found
202 OK 407 Proxy Authentication Required
408 Request Timeout
Page 27
Copyright Quobis Networks 2010 – All rights reserved
29. 10. SIP
Register + Call
A ……...... Kamailio ……...... B
(Registrar local services)
Register
200 Ok
Invite Invite
100 Trying 100 Trying
180 Ringing 180 Ringing
200 Ok 200 Ok
Ack
Media Session
Bye
200 Ok
Page 29
Copyright Quobis Networks 2010 – All rights reserved
36. 1. Kamailio
Kamailio (formerly known as OpenSER): is a SIP
softswitch. It can peform every SIP role (for us it will be
Proxy and Registar).
It is a high performance and robust software. It is used
by VoIP providers: Voztelecom (Spain) and 1&1
(Germany).
Kamailio is released under GPL license. Several
companies offer professional support.
Now it is part of the SIP Router project.
Page 36
Copyright Quobis Networks 2010 – All rights reserved
37. 2. Kamailio
Kamailio can be installed on any Linux distribution.
Real test: 150 calls/s. Virtual
machine with 512MB RAM and
1,4GHz.
A dedicated server with 4GB RAM
could provide service to 300,000
users → Vigo!
Page 37
Copyright Quobis Networks 2010 – All rights reserved
38. 3. Kamailio
Kamailio can be used in different scenarios:
● NAT Traversal: mediaproxy, rtpproxy, nathelper
● Presence server: presence, presence_xml
● Load balancer: dispatcher, path
● Instant Messaging: imc, xmpp
Page 38
Copyright Quobis Networks 2010 – All rights reserved
39. 4. Kamailio
●Kamailio is based on modules with a kernel which
performs following tasks: memory management,
parsing and transport message.
● Kamailio's funcionality can be enriched with modules
(dynamic libraries, .so) included in the configuration.
● Configuration is just a file: /etc/kamailio/kamailio.cfg
●Modules param and users are provisioned in Database
(MySQL, Postgres, Oracle).
Page 39
Copyright Quobis Networks 2010 – All rights reserved
40. 5. Kamailio
Image got from www.kamailio.org
Page 40
Note: in 3.x versions Database and MI API are not in the kernel.
Copyright Quobis Networks 2010 – All rights reserved
41. 6. Kamailio. Configuration (1)
Configuration
● Routing behaviour is configured in kamailio.cfg.
●Kamailio must be restarted to apply in changes
kamailio.cfg.
●Variable params are configured in Database and can
be reloaded in execution time: user provision, ACL,
LCR...
Page 41
Copyright Quobis Networks 2010 – All rights reserved
42. 7. Kamailio. Configuration (2)
Configuration file has several parts:
1. General parameter setup : port, protocol...
2. Module load and module param setup:
loadmodule “permissions.so”
loadmodule “permissions.so”
...
...
modparam(“permissions”, “db_mode”, 1)
modparam(“permissions”, “db_mode”, 1)
3. Main route: every request that reaches Kamailio is
executed in the main route.
route{
route{
...
...
route[TO_KAMAILIO2]
route[TO_KAMAILIO2]
...
...
}}
Page 42
Copyright Quobis Networks 2010 – All rights reserved
43. 8. Kamailio. Configuration (3)
4. Secondary routes (route[x]()): accesed from the
main route (route()).
route[TO_KAMAILIO2]{
route[TO_KAMAILIO2]{
...
...
t_on_failure(“1”)
t_on_failure(“1”)
……
t_on_reply(“3”)
t_on_reply(“3”)
}}
5. Error route route{}: executed when Kamailio
receives an error reply to a sent request.
failure_route[1]{
failure_route[1]{
...
...
}}
Page 43
Copyright Quobis Networks 2010 – All rights reserved
44. 10. Kamailio. Configuration (4)
6. Reply routes (onreply_route[x]()): executed
when a 2xx reply to a sent request is received.
onreply_route[1]{
onreply_route[1]{
...
...
}}
7. Branch routes (branch_route[x]()): executed to
create a parallel route to send request to another server
branch_route[1]{
branch_route[1]{
...
...
}}
Page 44
Copyright Quobis Networks 2010 – All rights reserved
45. 11. kamailio. Configuration (5)
Fuente: Asipto
Page 45
Image got from www.kamailio.org
Copyright Quobis Networks 2010 – All rights reserved
46. 12. Kamailio. Configuration (6)
Fuente: Asipto
Page 46
Image got from www.kamailio.org
Copyright Quobis Networks 2010 – All rights reserved
47. 13. Kamailio. Init.d and kamctl
How to launch Kamailio:
/etc/init.d/kamailio start/stop/restart/status
Kamctl: tool to control and monitor kamailio
● Check main stats: kamctl monitor
● Check uptime: kamctl fifo uptime
● Add user to Kamailio DB: kamctl add 101 secret101
Page 47
Copyright Quobis Networks 2010 – All rights reserved