Common Voip Architecture: Executive Summary
Common Voip Architecture: Executive Summary
Executive Summary
This white paper describes the architecture of AT&T’s common infrastructure for real-time communications
services over Internet protocol, commonly referred to as VoIP. The infrastructure will be used to
implement all planned and future real-time services that use IP as their main transport technology.
Existing voice services will migrate to this architecture over time and when appropriate.
AT&T is migrating to a single Multiprotocol Label Switching (MPLS)-enabled IP core network in support
of a major initiative, the Concept of One, which will ensure optimum use of resources by maximizing
commonality. All services will eventually be carried over this IP network. The common infrastructure
described in this paper is limited to the essential capabilities and components that will enable AT&T to
develop and deploy real-time services, such as voice, interactive text and video, and various multi-media
collaboration services.
The main goal of the AT&T VoIP architecture is to provide a single, common, and shared infrastructure
that facilitates the development of real-time services with the highest quality and availability, the shortest
possible time-to-market, and the lowest cost of operations and maintenance feasible. To accomplish this,
the architecture is divided into separate independent layers. Each layer has a well-defined role and
provides a set of capabilities for the layer immediately above it by utilizing the set of capabilities provided
to it by the layer immediately below it.
The VoIP infrastructure is built as a virtual network on top of AT&T’s Converged IP/MPLS Core Network
and is called the VoIP Connectivity Layer. The Core Network is surrounded by a Multi-Service
Access/Multi-Service Edge network that supports all popular access technologies including TDM, ATM,
Frame Relay and Ethernet. Thus, the VoIP infrastructure can be reached via any of these access
technologies. Moreover, the architecture provides capabilities to support various access protocols such
as, H.323, MGCP, MEGACO, SIP,TDM/SS7, as well as any VoIP protocol may emerge in the future. This is
achieved by surrounding the VoIP Connectivity Layer with Border Elements (BEs), which mark the trust
boundaries of the VoIP Infrastructure and translate the specifics of various VoIP access protocols into
Session Initiation Protocol (SIP) – the single common internal protocol used by all VoIP infrastructure
components. BEs not only provide protocol conversion, but also enforce various policies including those
needed for call admission control and VoIP-level security.
Concept of Zero is followed to provide “zero-touch” provisioning and maintenance from a single virtual
operations center.
that is, each layer has a well-defined role and provides a set of
Connectivity Layer
well-defined capabilities to the layer to which it is sending
BE BE BE BE BE BE
information, by using the capabilities of the layer it received
information from. Core Network Layer
Access
Access
Access
Access
Access
Access
Principles
AT&T’s VoIP Common Architecture Access Layer
• Use a common architecture for all real-time communications services Figure 1:VoIP Layers
• Use SIP as the common internal signaling protocol for all signaling The Connectivity Layer provides the VoIP
between components infrastructure needed to process basic calls,
• Leverage the latest, cost-reduced technologies support high performance network
functions, send network primitives, provide
• Allow only Open Standard Protocols for all internal interfaces
media services, interact with Application
• Ensure that components are interchangeable and interoperable Servers for more advanced calls, and
• Design performance and reliability into all components, services support Call Detail Recording. Border
and processes Elements translate the access protocol to SIP.
• Provide for the necessary security to protect AT&T and customer assets The Applications Layer consists of several
• Support “users” in addition to “lines” Application Servers, each providing one or
more services.
• Ensure that capacity closely tracks demand
The Operations Support Layer consists of multiple applications, databases and a supporting data communications
network, which are used by internal and external personnel to manage the VoIP network and its elements.
Service Creation
Environment (SCE) Network
Resource
Resource Layer
SLEE XML, CPL, Servlets
App App
Logic Logic Application
Server (AS)
LAN
TA / MTA PBX
IP Phone IP PBX
IP Device
Access Layer
Functional Architecture
In Figure 2, layers are represented in a high-level AT&T VoIP functional architecture. This is a logical functional
architecture and is not intended to represent the physical implementation. The architecture does not specify how
functions will be distributed to devices. Instead, it allows the flexibility to package functions into various servers
using cost-effective methods, as long as open interfaces to those functions are available for use by other functions.
For each access type, a corresponding Border Element (BE) is deployed to manage the access-specific
requirements and interfaces. BEs are the demarcation points for the Connectivity Layer, which is a common
and shared layer on top of the converged IP/MPLS network, or Core Network Layer. The BEs translate access
This architecture supports all real-time communications scenarios, like prepaid card, click-to-chat, and
teleconferencing. For a simplified basic call flow, the following steps are performed:
1.The caller’s phone connects to the BE using the appropriate access-specific signaling protocol.
2.The BE sends a SIP INVITE to the CCE with Request-URI for the destination’s phone number. The CCE
consults with the Service Broker, which indicates that this call has no features.
3.The CCE sends an INVITE to the destination’s BE, which communicates with the destination’s device using the
appropriate signaling protocol.
4.The call is set up between the two end-points, and the caller and destination talk.
5.The destination hangs up. The BE sends a SIP BYE to the CCE.
6.The CCE sends a BYE to caller’s BE, which disconnects the caller.
Access Layer
The Access Layer provides connectivity between the Customer Premises Equipment (CPE) and the BEs. The
Access Layer must support the endusers’ service requirements such as Quality of Service (QoS), Security, and
Availability. Current technologies will be supported allowing AT&T to continue to offer existing profitable
services at a low cost.
Network MEGACO
The VoIP architecture is designed to Gateway BE BE SIP BE H.323 BE
H.323
3
H.32
services that are independent of
SIP
SIP
Edge SS7
Capability Network
MEGACO
Partner IP Managed
access technologies. In the past, new Carrier Gateway
SIP
4E TDM LS 3
H.32
Gateway / Gateway /
Router Router
AT&T Access
differently. With this architecture, new
access technologies will be deployed Customer / 3rd Customer
Party Access Managed
Gateway
quickly and efficiently without ILEC PBX
DSL /Cable LAN
disturbing the existing VoIP
infrastructure. PBX
TA / MTA
LAN
IP PBX
PBX PBX IP Device
• TDM via Edge Switching – Customer access occurs via existing connections to AT&T Edge switches. This
includes shared access from the ILEC and dedicated access to 4E or 5E switches. Bearer and SS7 signaling for
Edge switches interface with the Network Gateway BE. In the future, the Edge switches could support an IP
interface, eliminating the need for TDM to IP conversion in the BE.
• TDM Direct Access – Customer PBX or ILEC switches could interface directly to a Network Gateway BE.
Full range of SS7, ISDN, CAS signaling needs to be supported.
• TDM via IP Direct Access (Managed Router/Gateway) – A direct-access line shared with an AT&T IP Data
Service, (e.g. MIS, MDNS, MRS, EVPN) in conjunction with a VoIP Gateway on the CPE Managed Router, is
used to provide a TDM service demarcation on the customer’s premises. QoS implementation is at
Layer 3 for direct IP Access, and at both Layers 2 and 3 for FR/ATM access.
• IP MIS (Managed Router) – A direct-access line shared with an AT&T IP Data Service, (e.g. MIS, MDNS, MRS,
EVPN) in conjunction with a CPE Managed Router, is used to provide an IP service demarcation for VoIP
service on the customer premises. VoIP protocols supported include SIP for SIP Phones or SIP Proxies and
H.323 for IP PBXs. QoS implementation is at Layer 3 for direct IP Access, with possible additional Layer 2
QoS features for FR/ATM access.
• IP Broadband Agnostic – Customer-purchased Broadband Access, (e.g. Cable, DSL) in conjunction with an
AT&T-provided Terminal Adapter, is used to provide Remote Office or second-line service to individual end
users. End user devices can be SIP Phones, SIP Clients, Black Phones or other IP devices. For Black Phones,
the AT&T Terminal Adapter will convert to VoIP. QoS is achieved by queuing mechanisms implemented in the
Terminal Adapter. Privacy is achieved by IPSec sessions between the Terminal Adapter and BEs.
• IP Peering – AT&T provides or purchases VoIP minutes over an IP Interconnect with another VoIP carrier.
Currently, the VoIP signaling protocol is H.323. Potential relationships with cable operators may introduce
CMSS, a PacketCable variant of SIP. Encryption for Privacy is an option.
gateways, IP PBXs, and IP phones. AT&T selects and certifies CPE to work with AT&T’s VoIP architecture.
CPE interfaces will comply with standard protocols such as SIP, MEGACO, MGCP, and H.323.
Media Control – CPE terminate the media streams going in and out of the Connectivity Layer and provide for
final media format conversion.
The primary function of the Core H.323 Implements a gateway or terminal function for access.
Media
CCE
Security Server
Elements
service (DDOS) attacks intended to AR
In the early stages of this architecture, these trust domains may need to be implemented by classifying all of the
traffic on a given interface to be part of a particular type of VPN. In the target implementation, MPLS VPN will be
used, which will both improve the flexibility of VPN management, and allow the components in the other layers of
the VoIP Architecture to mark different traffic streams (via labels) that belong in different VPNs on the same
physical interface.
Connectivity Layer
The VoIP Connectivity Layer provides all network primitives needed for applications to implement services. This
includes establishing simple connectivity between end-points by providing capabilities to create, join, remove (tear
down) and report the status of call legs. The following services are also enabled in this layer: Basic media services,
E-911, CALEA and Call Detail Recording.
a unified, shared environment that Border Element (BE) Translates an access protocol to and from SIP, enforces security,
enforces admission pollicies in coordination with CAC, detects
supports the addition of new DTMF and other types of in-band user requests and redirects
media when instructed by the CCE.
services and access technologies
without changing the basic
CALEA Server Responsible for the interception of communications for law
infrastructure. enforcement and other purposes.
This layer is comprised of a number Call Admission Responsible for the enforcement of network-wide
Control (CAC) admission policies.
of zones and a collection of network
functions. A zone consists of a CCE Call Control Manages and interacts with all BEs in a zone, sets up and tears
managing one or more BEs. Network Element (CCE) down call legs and interacts with ASs to implement their requests.
Media Server (MS) Handles and terminates media streams, providing functions such
as announcement, DTMF, text-to-speech (TTS), automatic
Border Element speech recognition (ASR), bridging and transcoding.
The Border Element (BE) is the Networking Routing Provides route information and translates a network address
Engine or logical address to an IP address.
point of demarcation for the
Connectivity Layer. It identifies the
Service Broker (SB) Provides the CCE, upon request, the address of the appropriate
Boundary of Trust for the AT&T VoIP AS to treat the call.
BE Functional Components
A BE has four main functions: Signaling, Media Control, Security and Call Admission Control.
Signaling – A BE proxies both the caller and the called end-points, thereby providing a point of signaling control
at the edge. It translates the access protocol (H.323, MGCP, MEGACO, SS7, CAS, ISDN, etc.) to and from SIP.
Media Control – A BE examines all media streams going in and out of the Connectivity Layer for security, media
format conversion, and media transfer. The BE also redirects media streams upon request from the CCE without
impacting the actual caller and called party, and provides the means for the CCE to define, detect and report
DTMF strings during the call.
Some services require the ability for the AS to detect a signal that does not need to be on the media path
(e.g. DTMF, flash hook). For example, a prepaid card application may permit the caller to enter a sequence of
digits (e.g. “**9”). This forces a hang-up of the destination and provides the opportunity for another call to be
placed. To enable efficient utilization of network resources, the BE will allow an AS to register event triggers via
the CCE, and the BE will signal the AS when the event occurs. While there is not currently a standard mechanism
for accomplishing this task, AT&T supports the IETF proposal, using HTTP to send DTMF signals.
Security – A BE provides all necessary security and screening for the customer sites it interacts with. It
authenticates subscribers, customers, and partners, and provides NAT and firewall functions as appropriate.
Call Admission Control – A BE enforces admission policies over the access pipe such as:
• Call limiting – limiting the Network Gateway Provides all required PSTN interface functions, including SS7
POINT OF VIEW
number and type of calls (NG) signaling and media conversion. The NG BE also operates as a
gateway between circuit-switching and packet-switching networks.
• Bandwidth management – From the CCE, it acts as a SIP User Agent (UA).
Service
calls terminating at logical end-points.
An AS can ask the CCE to establish a Call 2
call leg to or from a logical end-point UA
Leg 3
(user), to join call legs to form calls, BE - 1
and to tear down call legs and calls. media
The CCE may receive a “call invocation” (SIP INVITE) from any BE on behalf of a subscriber, or from any server
inside the network. An invocation has information about the caller, the called party, and characteristics of the call
(class of service, media type, bandwidth, compression algorithm, etc.). The CCE may instruct a BE to redirect the
media channels associated with a call to a different destination.
A CCE manages all BEs in its zone. It is aware of the status of each BE it manages, including whether the BE is
POINT OF VIEW
operational or congested. Moreover, the CCE enforces various routing policies, such as deciding which BE to
use to set up a call leg.
The CCE interacts with the Service Broker (SB), the Network Routing Engine, (NRE), the User Profile Engine
(UPE), and the Call Admission Control (CAC). In addition, the CCE also communicates with the resource
servers residing in the Connectivity Layer, such as MS, E-911, and CALEA.
The CCE interacts with the SB to determine the services associated with a call leg (either in-bound or
out-bound). For each call, the CCE provides relevant information and requests the AS to execute the
corresponding service logic.
The CCE may also consult with the NRE to learn the terminating BE’s address. If the terminating BE is not in the
zone of the originating CCE, the NRE returns the address of the CCE in charge of the terminating BE. Then, the
originating CCE consults with the terminating CCE, which functions as a SIP redirect proxy, to learn the address
of the terminating BE.
The CCE interacts with the UPE to determine if a user is registered or logged-on, and to determine which
address or number should be used to route the call.
The CCE interacts with the CAC to authorize users and admit calls at the time of call setup, leveraging
network-wide conditions and policies. The CCE formulates the QoS/Bandwidth/SLA policy for network-wide
resources in conjunction with the local policy and customer-specific requirements provided by the BE.
In the future, policy information will be obtained from the lower IP network layer entity, like Bandwidth
Broker/Router, to verify bandwidth is reserved, thus ensuring QoS before acceptance of the call (e.g., ringing will
not be provided unless resources have been reserved).
Common Network
Functions AS
UPE
SIP NRE
Connectivity Layer are the Service SIP
POINT OF VIEW
SIP
To peer
CCE BE
Policy AAA
Protocol
The SB also performs service precedence and identifies to the CCE the primary applicable AS and a list of other
services applicable to the call.
When a user registers or subscribes to a service, the database used by the NRE may be provisioned with the
addresses of the end-points, residing in the access network, that are reachable through a particular BE. Also, the
database is populated with a list of BEs through which a user can be reached.
The Location Server is part of the NRE and uses the same database. It collects the telephony route information
(E.164) from the PSTN/TDM-IP gateway when users are reachable through those gateways in the PSTN/TDM
network. The PSTN-IP gateway may be a part of the BE while the TDM-IP gateway may be a part of the CPE.
The following protocols are used:
• TRIP-GW registration protocol is used by the gateways to register and transfer the route information from
the gateway to the Location Server (LS)
• I-TRIP protocol is used between the NRE and the LS, and between the LSs within the AT&T network
• TRIP protocol is used between the LSs of the AT&T Network and AT&T partner or other service provider network
POINT OF VIEW
The CAC is envisioned as a centralized function controlled by the CCE in collaboration with the BEs. While a
BE implements local and customer-specific policy and provides authentication for entities that access the AT&T
network, CAC functional entities help the CCE determine whether to admit or reject a call request. These
functional entities include the Policy Server and the Authentication, Authorization and Accounting (AAA) server.
The Authentication,Authorization and Accounting (AAA) Server receives authentication from the BE and uploads
security policy. The AAA protocol used between the AAA server and other functional entities (e.g., CCE or BE) must
be an open standard protocol that can interwork with SIP once appropriate extensions are added to the protocol.
The Registration Server receives SIP registration requests under the control of the CCE, via BEs. The user
location information obtained from the registration messages is updated into the user profile database. Users
who subscribe to AT&T services will register with this server under the control of the CCE, via BEs.
The Presence Server (future implementation) stores and conveys the user’s location and status (e.g., offline, busy,
other). Users will register with the Presence Server (PS) under the control of the CCE, via BEs. The PS will
subscribe to the users’ presence information. When a status changes, (e.g., online, offline, busy) notifications will
be sent by users’ presence agents and immediately update the PS. User’s availability should map to presence
information so that the call can be expediently routed to the address where the user is currently available.
Media Servers
Media Servers (MS) typically operate with ASs to handle and terminate media streams, and to provide services
such as announcements, bridges, transcoding, and Interactive Voice Response (IVR) messages. Using SIP to
communicate, the AS sends an invite to the MS, via the CCE, setting up the call and specifying the script the MS
executes or the function it performs. The MS returns the status and results to the AS via HTTP posts. With the
POINT OF VIEW
exception of network-busy announcements provided by NG BEs, components of this architecture will not provide
their own MS functions.
CALEA Servers provide the ability to identify and collect content of voice telephone calls traversing the
VoIP network, as mandated by the Communications Assistance for Law Enforcement Act (CALEA). When a
CCE detects that a call needs to be monitored for legal reasons, it sets up the call via the CALEA server.
E-911 Servers route calls to the appropriate Public Safety Answering Points (PSAPs) based on the caller’s
location. When the CCE receives an emergency 911 call, it sends the call to the E-911 server and ensures
that call waiting is disabled for the duration of the call.
• Near-real time delivery to traffic monitoring, fraud detection, and billing systems
• Vendor-independent formats based on industry or standards-based formats
• Inclusion of quality of call and routing information
• Capturing PSTN interconnection and termination release codes
• Capturing a Unique Call ID from the originating BE
• Clearly-defined audit methods
• Record storage and redelivery in the case of lost connectivity
Applications Layer
Application Servers (ASs) implement features that leverage the VoIP Architecture, using a common interface
to the VoIP Connectivity Layer. The “plug-in” paradigm facilitates fast and easy addition of new features, and
SIP creates a unified interface to the Connectivity Layer.
“Plug-In” Features
The CCE, as directed by the SB, uses SIP to invoke an AS.The AS may also initiate communication sessions via
the CCE (third party call control). While each AS is responsible for implementing its own service logic, all ASs
implement a common interface to the CCE, by which the CCE may invoke an AS, and by which an AS may ask
the CCE to set up, tear down, modify, or join call legs. This interface is implemented using SIP, thus providing
common SIP signaling throughout the VoIP Architecture. ASs are free to implement only the subset of this
interface that they require in order to perform their functions. While this interface may evolve over time, it will
maintain backwards compatibility so existing ASs will continue to function, as the interface evolves.
POINT OF VIEW
While SIP provides the flexibility to allow ASs to set up call legs without leveraging the CCE, in the AT&T VoIP
Architecture, ASs must use the CCE to set up, tear down, modify, and join call legs. Thus, from the AS’s point of
view, each AS has a CCE acting as its SIP Proxy for all inbound and outbound SIP messages.
While there is a well-defined SIP-based interface between the CCE and all ASs, each AS may invoke other Network
Resources, using the appropriate protocol for that resource. Thus, an AS implements an abstract that enables new
feature “plug-ins” without having to introduce new capabilities or protocols to the core VoIP Architecture.
For example, a voice mail application may leverage an IMAP message store and an LDAP directory, both of
which are examples of Network Resources. Network Resources need not be operated or even hosted by the
VoIP service provider, as in the case of a “Find Me” application leveraging a user’s calendar that is available over
the Internet as an XML Web Service.
The Service Creation Environment (SCE) allows a development team to develop and test new service logic
scripts. These scripts integrate various building blocks into a service, where the building blocks may be
precompiled, implemented by other SIP-based ASs, or implemented as Network Resources.
Service Profiles
ability to deploy new services quickly,
HTTP HTTP
leveraging the capabilities of the SCE,
SIP App
Server
as well as web-based management
MS BE
of subscribers and web-based service
customization.
SIP
CCE
• Concept of One – Evolve to one Virtual Operations center from which all network elements can be monitored
and managed. Accordingly, consolidations toward one organization, one network, one operations support
architecture and one process result in reduced costs and increased efficiencies.
• Zero Touch – Minimize manual
operator touch of the network Web based tools
elements for all network
External Users Internal Users
management functions. Requires
an accurate network inventory to
support process automation. Network & Service Data
Customer-specific Data
Management
Management
Management
Management
Performance
Provisioning
Capacity
Fault
the work centers into the VoIP
infrastructure components
via a single step cut-through.
• Open Standards – Allow multiple Open Interfaces
vendors to interoperate, and
EMS
AT&T to adopt off-the-shelf
solutions and processes to meet
POINT OF VIEW
Terminal
The VoIP infrastructure components Server
Configuration Management
Configuration Management supports the initial loading of element parameters, changes in element configuration,
and retention of data for recovery for all network elements (BE, Server, Engine, Database, CCE, CAC) that are
physically connected to the VoIP Converged Network.
Configuration Management refers to the core operations process of loading the following types of data:
POINT OF VIEW
• Data elements needed to uniquely identify the component and to establish connectivity with other IP
network elements and operations systems
• Data elements that are static and populated at the time of installation
• Ongoing loading of data triggered from facility, trunk (group), link, or routing orders
• Retention of golden copy configurations and a configuration validation process (where configuration data
is stored in the network element)
• An interface with the Network Inventory Database to maintain growth changes in the overall VoIP Network
topology, in concordance with the Capacity Management process.
Network Provisioning
Network Provisioning is the process External Internal
Users Users
that assigns previously installed
and configured VoIP network
element capacity (e.g., NG BE) Network
Inventory
to support a level of service. EMS Converged
VoIP
Network and Service Provisioning Network
Golden Configuration
are interdependent, as Service Configuration Mgmt
transactions and report successful completion of transactions, or reason for failure, to upstream provisioning systems.
Service Provisioning
VoIP Service Provisioning requires a flow-through mechanism to provision customer-specific orders within the
Converged VoIP network, as well as orders to provision facility, trunking, and routing associated with access to the
VoIP converged Network.
In adherence to Concept of Zero, the VoIP infrastructure elements will support flow-through of customer service
requests by allowing the following:
• Real-time system interfaces to SB, allowing update and query of the services or applications (8YY, SDN, etc.)
that a customer has purchased
Capacity Management
Capacity Management is the primary External Internal
Users Users
tool used to maintain adequate
EMS Converged
in-service inventories of all VoIP VoIP
Network
Network Elements, (BEs, Servers,
Network Controls via
Engines, Databases, CCEs, CACs, Fault Network Management Protocol
Mgmt
Data
etc.) in order to meet customer
demands of the network. AT&T
PM Data
uses extensive performance
PM and
measurement data on the network IM Tool
From Fault
elements, including average and peak Mgmt
maintains the highest performance levels. Direct and indirect control of people, process and network is
coordinated in these functions, with the goal of increasing service quality. The functions of Performance and
Incident Management can be divided into four functions: Performance Surveillance, Incident Management,
Traffic Management and Performance Reporting.
Performance Surveillance functions require near real-time availability of network behavior measurements
(e.g., faults, call processing irregularities, traffic measurements, equipment alarms, quality of service information
(delay, loss, jitter) and configuration changes. Measurements are analyzed against configurable and perhaps
dynamic thresholds. Resultant performance surveillance information is used to detect and locate problems
that degrade service. Measurements also provide feedback on the effectiveness of restoration and traffic
management activities.
Traffic Management is the practice of real-time traffic control to protect network resources from overload, or
to redirect traffic to make better use of under-utilized network resources. Either goal serves to maximize the
effectiveness of the network. Traffic management is most often associated with mass calling events and national
crises. This discipline allows for prioritization of restorative activities to reflect business imperatives.
Performance Reporting functions are supported by data extracted from stored aggregate performance
measurements. This data needs to be reported by time series (trending), by event, by customer, by service, by
network device or by any ad-hoc extract, for the purposes of quality assurance, process improvement, equipment
maintenance, network configuration, network planning, and business evaluation or customer inquiry.
Performance and Incident management are interdisciplinary, multi-service and centralized functions. OS solutions
from multiple vendors for multiple services need to interoperate. OS support requires centralization and high
levels of integration. Open APIs and standardized system interfaces are needed for network elements, EMSs
and Network Management Systems (NMSs).
AT&T has employed various layers of protection to support survivability by preventing and, when required,
restoring the network/service with minimal customer impact. These layers of protection include outage
prevention, equipment protection switching, facility restoration, routing resiliency, network management and
disaster recovery.
Conclusion
This document has illustrated the high-level concepts of AT&T’s Common VoIP Architecture. The architectural
POINT OF VIEW
platform will enable AT&T to develop and deploy existing and new real-time communication services that use
IP as their transport mechanism. By sharing a single, common VoIP infrastructure with interoperable network
elements that support open standard interfaces and protocols, AT&T will be able to develop new services and
applications, and interconnect with various access networks.
AT&T is committed to creating a high-capacity VoIP network that ensures reliability, availability and performance.
In adherence to the Concept of One, a single infrastructure will be developed to support existing and new
services. And, in adherence to the Concept of Zero, intelligence will be built into AT&T’s core network, providing
little or no need for human intervention. The AT&T Common VoIP Architecture creates a foundation for
the complex and intricate process of migrating voice and other real-time communications services from a
circuit-switched to an IP packet-switched network.
The information contained in this document represents current considerations of the AT&T Common VoIP Infrastructure
as of the date of publication. The contents of this document should not be interpreted to be a commitment or legal
representation on the part of AT&T to you regarding AT&T’s VoIP Infrastructure, and are subject to change without notice.
AT&T MAKES NO WARRANTIES, WHETHER EXPRESS OR IMPLIED, IN THIS DOCUMENT. BY PUBLISHING THIS
PAPER AT&T IS NOT GRANTING TO YOU, EITHER EXPRESSLY OR IMPLIEDLY, ANY RIGHTS UNDER ANY OF ITS
INTELLECTUAL PROPERTY.
The AT&T logo is a registered trademark of AT&T Corp. in the United States and other countries.
AT&T Point of View / VoIP – 12/22/03. © 2003 AT&T. All Rights Reserved. Printed in U.S.A. AB-0139 21