SlideShare a Scribd company logo
1 of 36
2
Introduction
Alan D Percy
Chief Marketing Officer
alan.percy@telcobridges.com
@AlanDPercy
Luc Morissette
Director of Customer Support
luc.morissette@telcobridges.com
3
Agenda
• Introductions
• TB Forum and Wiki
• Our Favorite FAQ
• Where to Learn More
• Your Questions
4
TB Wiki Overview
https://docs.telcobridges.com/tbwiki/FreeSBC
5
FreeSBC/ProSBC Forums
http://forums.freesbc.com/
6
FAQ:
Q: What is “Transcoding?”
7
FAQ: Transcoding
A: “Transcoding” is converting the
media from one format to another
SBC
Media Server
G.711 G.729
8
FAQ:
Q: What is a “Session?”
9
FAQ: Session
A1: A “Session” is one call path
traversing through an SBC
SBC
Media Server
10
FAQ: Session
A2: If the call passes through the SBC
twice, it will be 2 sessions
SoftSwitch
SBC
11
FAQ:
Q: Can you explain why some
providers offer SIP over UDP,
while others offer TCP, or TLS?
12
FAQ: SIP Protocols
1. SIP over UDP was first (and still widely used
by operators for SIP Trunking)
2. As SIP messages got larger, operators and
application developers began using TCP
3. With more SIP traffic traversing the Internet,
operators began using TLS to encrypt call
control messaging
13
FAQ:
Q: Why not just use VPN for remote
offices?
14
FAQ: VPN
A: VPN is a good solution – everything
is encrypted, including data
Requires to setup VPN connections to
each destination
15
FAQ:
Q: How does SRTP secure the media?
Q: Can an SBC convert from SRTP to
RTP?
16
FAQ: sRTP
A: SIP over TLS and SRTP work together
to secure call control and media content
SBC
SIP/UDP RTP
Private Network
SIP/TLS SRTP
Public Network
17
FAQ:
Q: How do SBCs resolve SIP
interoperability issues?
SIP
Session
s
B2BUA
UAS
Session Border
Controller
Session Border Controller Architecture
UAC
Unique
settings
Unique
settings
SBCs can modify SIP messaging using
Back-to-Back User Agents
19
FAQ:
Q: What causes one-way audio and
how do you diagnose the issue?
20
Trouble with One Way Audio
Confidential
SMB/Enterprise
IAD/Router
w/ Firewall
Service Provider
SoftSwitch
Common causes for One-way Audio:
1) Firewall closes RTP pin-hole prematurely
2) SBC not configured for remote NAT
3) Codec mis-match
4) RTP port range settings
21
FAQ:
Q: How is VoIP voice quality
measured?
Q: My MOS scores are low, how can I
improve?
22
FAQ: Quality
A:
1. SBC monitors RTP and RTCP traffic for
jitter, latency, lost packets and other errors.
2. Type of codec used (G.711 is 4.3, G.729 is
4.0 and G.723 is 3.6)
3. Compile a reference value at the end of the
call – MOS score (value of 5 maximum)
23
FAQ: Improve Quality
A: Make sure there are no errors on the
RTP streams – fix network if necessary
Use high quality vocoders
24
FAQ:
Q: Explain the difference between
call routing and packet routing?
25
FAQ: Call vs Packet Routing
A1: Call routing
SBC
Call Routing Table
SoftSwitch
Cloud Network
26
FAQ: Call vs Packet Routing
A2: Packet routing
SBC
Network#4
Vlan200
Network#3
Vlan100
Second Interface
(Public)
First Interface
(Private)
Untagged
27
FAQ:
Q: How does an SBC protect against
DOS and DDOS attacks?
Q: How about TDOS attacks?
28
FAQ: DOS/DDOS
A: DOS and DDOS are bursts of packets
sent to prevent service
How to protect:
• Efficiently drop packets from bad or unknown sources
• Quickly identify packets from trusted sources and allow to
pass
• Monitor traffic of trusted sources
29
FAQ: TDOS
A: TDOS attacks appear to be legitimate calls.
To block them it requires to analyze the
incoming call and drop invalid ones
SBC
Call validation
Cloud Service Provider
30
FAQ:
Q: What are the differences between
FreeSBC and ProSBC?
Q: What is the upgrade process?
31
FAQ:
Q: How can I get training on SIP?
Q: Training on ProSBC?
32
FAQ:
A great resource on the basics of SIP
Your training for ProSBC starts at:
https://www2.telcobridges.com/TechTrained
Video Library on YouTube
• ProSBC Training Modules
• Recorded webinars
• How-to Tutorials
• Customer interviews
• Frequently Asked Questions
• Recorded podcasts
• And more…
33
youtube.com/telcobridges
Enabling the Migration to
Cloud Communications
34
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
VoIP Frequently
Asked Questions
Answers to your most
frequently asked questions
about voice-over-IP technology
View the Full-Length Video at:
www2.telcobridges.com/videolibrary
36

More Related Content

What's hot

message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoTFabMinds
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?Mark Smith
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Insights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryInsights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryNicolas Navet
 
Visualizing and Troubleshooting BGP Routing
Visualizing and Troubleshooting BGP RoutingVisualizing and Troubleshooting BGP Routing
Visualizing and Troubleshooting BGP RoutingThousandEyes
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNgandhimb
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Videoguy
 
Ipv6 application in 5G bearer network--C&T RF Antennas Inc
Ipv6 application in 5G bearer network--C&T RF Antennas IncIpv6 application in 5G bearer network--C&T RF Antennas Inc
Ipv6 application in 5G bearer network--C&T RF Antennas IncAntenna Manufacturer Coco
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsUday Bhatia
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PROIDEA
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaNitish Jadia
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9newbie2019
 

What's hot (20)

Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
 
MQTT and CoAP
MQTT and CoAPMQTT and CoAP
MQTT and CoAP
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Insights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryInsights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service Discovery
 
Visualizing and Troubleshooting BGP Routing
Visualizing and Troubleshooting BGP RoutingVisualizing and Troubleshooting BGP Routing
Visualizing and Troubleshooting BGP Routing
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
Ipv6 application in 5G bearer network--C&T RF Antennas Inc
Ipv6 application in 5G bearer network--C&T RF Antennas IncIpv6 application in 5G bearer network--C&T RF Antennas Inc
Ipv6 application in 5G bearer network--C&T RF Antennas Inc
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
IETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTPIETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTP
 
PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview PLNOG 6: Julian Curtis - IPv6 Overview
PLNOG 6: Julian Curtis - IPv6 Overview
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 

Similar to VoIP Frequently Asked Questions

Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQTelcoBridges Inc.
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQAlan Percy
 
SWIFT: Tango's Infrastructure For Real-Time Video Call Service
SWIFT: Tango's Infrastructure For Real-Time Video Call ServiceSWIFT: Tango's Infrastructure For Real-Time Video Call Service
SWIFT: Tango's Infrastructure For Real-Time Video Call ServiceMeng ZHANG
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityTelcoBridges Inc.
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityAlan Percy
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012Tiffany Hamburg Hamburg
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoguy
 
Voip
VoipVoip
VoipPTCL
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep DiveAlan Percy
 
Bnt203 internetworking with tcpip
Bnt203 internetworking with tcpipBnt203 internetworking with tcpip
Bnt203 internetworking with tcpipsmumbahelp
 
Practical Use Cases for Ethernet Redundancy
Practical Use Cases for Ethernet RedundancyPractical Use Cases for Ethernet Redundancy
Practical Use Cases for Ethernet RedundancyRealTime-at-Work (RTaW)
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdfmashiur
 

Similar to VoIP Frequently Asked Questions (20)

Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
SWIFT: Tango's Infrastructure For Real-Time Video Call Service
SWIFT: Tango's Infrastructure For Real-Time Video Call ServiceSWIFT: Tango's Infrastructure For Real-Time Video Call Service
SWIFT: Tango's Infrastructure For Real-Time Video Call Service
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
SIP Presentation
SIP PresentationSIP Presentation
SIP Presentation
 
Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Voip
VoipVoip
Voip
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
seminar4
seminar4seminar4
seminar4
 
Bnt203 internetworking with tcpip
Bnt203 internetworking with tcpipBnt203 internetworking with tcpip
Bnt203 internetworking with tcpip
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
Practical Use Cases for Ethernet Redundancy
Practical Use Cases for Ethernet RedundancyPractical Use Cases for Ethernet Redundancy
Practical Use Cases for Ethernet Redundancy
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdf
 

More from Alan Percy

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxAlan Percy
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionAlan Percy
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionAlan Percy
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Alan Percy
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsAlan Percy
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Alan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCAlan Percy
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCsAlan Percy
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCAlan Percy
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media GatewaysAlan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksAlan Percy
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialAlan Percy
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs ExplainedAlan Percy
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsAlan Percy
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsAlan Percy
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introductionAlan Percy
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANAlan Percy
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQAlan Percy
 

More from Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

VoIP Frequently Asked Questions

Editor's Notes

  1. Some introductions to get started: I’m Alan Percy, Senior Director of Product Marketing for TelcoBridges and today’s event moderator. Joining us again is Luc Morissette, Director of Customer Support and one of the founders of TelcoBridges. Luc, thanks for being a part of today’s event. Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session. We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen. Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable. And we’re glad to have you, our attendees, with us today and encourage you to use the opportunity to interact with our speakers by posing your questions and comments.
  2. Once installed, it is fully integrated in the SBC configuration Media server is dense and low power
  3. ProSBC will not be using another session
  4. 1. The protocol will use segmentation if the SIP packet is too large. 3. Keys must be exchanged prior to setting up a connection for every destination.  It may be mandatory to use TLS with some providers like Microsoft Teams. RTP is always on UDP
  5. Compare with internet connection – to reach the world, we can't use VPNs
  6. Encryption method for RTP is negotiated in the SIP messages, protected by TLS
  7. Stored in Call Detail Records at the end of the call Can also be seen in the call trace
  8. Alternatively, the routing can be done with and external service, either with Radius or SIP redirect
  9. Packets are routed automatically according to the call routing programmed
  10. DOS: from one source DDOS: from multiple sources
  11. Use SIP or APIs to validate the call TelcoBridges partners with other vendors to validate calls and prevent TDOS attacks
  12. A: Same binary – refreshing the license. No need to install a new server
  13. Tell us you are doing the training and we can get you certified - Quiz