SlideShare a Scribd company logo
0
Introduction to VoIP, RTP and SIP
Archana Kesavan
Product Marketing Manager
1
About ThousandEyes
ThousandEyes delivers visibility into every network your organization relies on.
Founded by network
experts; strong
investor backing
Relied on for
critical operations by
leading enterprises
Recognized as
an innovative
new approach
27 Fortune 500
5 top 5 SaaS Companies
4 top 6 US Banks
2
Telephony – A Brief History
Mr. Watson – Come
here – I want to see
you
Manual Switchboard
3
Telephony – A Brief History
Business Office Callers
Local Exchange
PBX
Individual Callers
International Gateway Tandem Junction/Exchange
PSTN Network
4
Voice-Over-IP
• Set of protocols designed to deliver communication
services over the IP network
• Analog voice converted into data packets to be sent over
the Internet.
• Two phases
• Phase 1: Signaling (SIP)
• Phase 2: Audio transport (RTP)
5
IP Telephony or Voice-Over-IP
Local Exchange
PBX
Individual
Callers
International Gateway Tandem Junction
PSTNNetwork
IP- PBX
VoIP Servers
Ethernet (IP Network)
Internet
SIP Trunk
Mobile
Voice
Mobile
Data
6
Type of VoIP Services
On-Prem
Branch Office
Branch Office
DMZ
CRM
Web
Data Center
IP-PBX
VoIP server
• All hardware and software
owned and managed by
the enterprise.
• IP-PBX and adjoining
systems reside in the
datacenter or on premise.
• Voice packets go through
the LAN and WAN
7
Type of VoIP Services
Hosted
• IP-phones are owned by the
enterprise
• All other equipment and
software located in the
service provider data center
and provided as a service
• VoIP packets travel over the
Internet or dedicated WAN
connectivity to the hosted
site
Data
Center
Branch Office
Branch Office
DMZ
CRMWeb
IP-PBX
VoIP
Provider
Data
Center
Branch Office
Branch Office
DMZ
CRMWeb
IP-PBX
VoIP
Provider
Data
Center
Data
Center
Enterprise A
Enterprise B
8
So how does VoIP work?
• Session Initiation Protocol (SIP)
• Pre-requisite for the voice call
– RFC 3261: Standard protocol (however
propriety versions exist to force vendor
lock-down)
– Application level protocol residing above
TCP/IP stack
– TCP or UDP
– Text-based protocol like HTTP
– Encrypted with TLS
– Response Codes indicates the state of
the request message
Phase1: Signaling
VoIP Phone A SIP Server/Proxy VoIP Phone B
SIP RegisterSIP Register
SIP INVITE
100 Trying
SIP INVITE
180 Ringing
180 Ringing
200 OK
200 OK
AUDIO CALL
SIP BYE
200 OK
SIP ACK SIP ACK
SIP BYE
200 OK
9
So how does VoIP work?
Phase1: Signaling
VoIP Phone A SIP Server/Proxy VoIP Phone B
SIP RegisterSIP Register
SIP INVITE
100 Trying
SIP INVITE
180 Ringing
180 Ringing
200 OK
200 OK
AUDIO CALL
SIP BYE
200 OK
SIP ACK SIP ACK
SIP BYE
200 OK
REGISTER
INVITE
CONNECT
DISCONNECT
10
• Real Transport Protocol (RTP)
– Analog voice signals converted into data
packets and sent over UDP
– Audio frames are encapsulated in RTP
packets
– RTP packets are encapsulated in UDP
packets
– UDP packets are encapsulated in IP
packets
So how does VoIP work?
Phase 2: Audio Data
IP
header
UDP
header
Frame 1
RTP
header
Frame 2
RTP Audio Stream
SIP Network
11
• How voice traffic is encoded and decoded
• Determines the quality of the VoIP conversation
• G.711, G.722, SILK
Key VoIP Concepts
• MoS
• Latency
• Jitter (De-Jitter buffer)
• PDV
Codecs
VoIP Metrics
• Prioritization of VoIP Traffic
• DSCP codes
– Traffic shaping, firewall and LB configuration
– 3 bits for class: Best effort, Assured Forwarding,
Expedited Forwarding, Voice Admit
QoS
12
Time
Packet delay (from sender to receiver)
Latency
Packet 1 Packet 2 Packet 4Sent at
Packet 1 Packet 2 Packet 4Received at Packet 3
Packet 3
Latency LatencyLatency Latency
13
Time
Variation of the latency
Jitter
Packet 1 Packet 2 Packet 4Sent at
Packet 1 Packet 2 Packet 4Received at Packet 3
Packet 3
Min Latency Max Latency
14
Time
99.9th percentile of the packet delay variation
Packet Delay Variation
Packet 1 Packet 2 Packet 4Sent at
Packet 1 Packet 2 Packet 4Received at Packet 3
Packet 3
Played at
Delayed
playback
Min Latency Max Latency PDV = max latency – min latency
De-jitter buffer should be able to
accommodate PDV.
15
E-Model (ITU-T Recommendation G.107, 1998-2014)
Based on a mathematical model in which the individual transmission parameters are transformed into
different individual "impairment factors” such as codec characteristics, delay, loss ratio, discard ratio,
etc., to obtain a quality metric called R factor:
Mean Opinion Score (MOS)
Basic signal-
to-noise ratio
Delay
impairment
Equipment
impairment
Advantage
factor
(expectation)
• Network latency
• De-jitter buffer size
• Ie (codec)
• Packet loss robustness (codec)
• Packet loss probability
• Network latency
Simultaneous
impairment
1 Calculation of the transmission rating factor, R
ccording to the equipment impairment factor method, the fundamental principle of the E-model
ased on a concept given in the description of the OPINE model (see [b-ITU-T P-Sup.3]).
sychological factors on the psychological scale are additive.
he result of any calculation with the E-model in a first step is a transmission rating factor R, whic
ombines all transmission parameters relevant for the considered connection. This rating factor R
omposed of:
AIe-effIdIsRoR +−−−= (7-1
o represents in principle the basic signal-to-noise ratio, including noise sources such as circu
oise and room noise. Factor Is is a combination of all impairments which occur more or le
multaneously with the voice signal. Factor Id represents the impairments caused by delay and th
fective equipment impairment factor Ie-eff represents impairments caused by low bit-rate codec
also includes impairment due to randomly distributed pack losses. The advantage factor A allow
r compensation of impairment factors when the user benefits from other types of access to th
ser. The term Ro and the Is and Id values are subdivided into further specific impairment value
he following clauses give the equations used in the E-model.
16
• Data records that contain specific information about a call. For
eg, timestamp, call duration etc
• CDRs are generated at specified triggers
• Record call quality, loss, latency experienced
• Billing, Law Enforcement
Monitoring Techniques for VoIP
• Packet sniffer that can record every SIP and RTP transaction
• Can typically decode speech and replay for call quality analysis
• Detect MOS score and other voice metrics
• Maximum overhead
Call Detail
Records
Packet Capture
• Simulate VoIP traffic from strategic vantage points in periodic
intervals
• Quickly pinpoint when and where an issue occurs
• Real time detection of voice quality degradation
• Less overhead
Active
Monitoring
17
Demo
• Dip in MOS score due to DSCP change
• https://earhhpng.share.thousandeyes.com
18
VoIP Metrics
Average of packet
delays
99.9th percentile of
packet delay
variation
Packets dropped by
the de-jitter buffer
Packets dropped by
the network
MOS Score (1-5)
Audio codec used
Source
Destination
19
Thank You!
Ad

More Related Content

What's hot (20)

Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
Michal Hrncirik
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
Santhosh Somu
 
Sip
SipSip
Sip
Anirban Roy
 
Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here... Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here...
Cisco Canada
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
William Lee
 
Voip
VoipVoip
Voip
Muhammad Hamza
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
Mahmoud Abudaqa
 
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
Vikas Shokeen
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
Kishore Kumar
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
LivePerson
 
Voip
VoipVoip
Voip
Rajan Kumar
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
orionnow
 
SOMEIP-protocol.pptx
SOMEIP-protocol.pptxSOMEIP-protocol.pptx
SOMEIP-protocol.pptx
PushkarBaheti1
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
stefansayer
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
Marius FAILLOT DEVARRE
 
SIP - The Basics
SIP - The BasicsSIP - The Basics
SIP - The Basics
Jonas Borjesson
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
Hossein Yavari
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
dhara patel
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
ALTANAI BISHT
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
habib_786
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
Michal Hrncirik
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
Santhosh Somu
 
Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here... Calling VoWiFi... The Next Mobile Operator Service is here...
Calling VoWiFi... The Next Mobile Operator Service is here...
Cisco Canada
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
William Lee
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
Mahmoud Abudaqa
 
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
Vikas Shokeen
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
LivePerson
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
orionnow
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
stefansayer
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
Marius FAILLOT DEVARRE
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
Hossein Yavari
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
ALTANAI BISHT
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
habib_786
 

Viewers also liked (20)

Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
Fraj Alshahibi
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
Kundan Singh
 
ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management
ThousandEyes
 
VoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONVoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATION
Karama Said(BEng,MSc)
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
ThousandEyes
 
ServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for ShoretelServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for Shoretel
ServicePilot
 
SIP dilivery methods and ROI
SIP dilivery methods and ROISIP dilivery methods and ROI
SIP dilivery methods and ROI
markbiltonsmith
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
Savvius, Inc
 
Take a sip of sip
Take a sip of sipTake a sip of sip
Take a sip of sip
LuxoftTraining
 
Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Summit Day 2 -What's new in CXP 14Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Corp
 
SIP in Service Quality Monitoring
SIP in Service Quality MonitoringSIP in Service Quality Monitoring
SIP in Service Quality Monitoring
TTI Telecom
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
Kundan Singh
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
Thomas Mangin
 
Introduction to TTI Telecom
Introduction to TTI TelecomIntroduction to TTI Telecom
Introduction to TTI Telecom
TTI Telecom
 
Internet Telephony by Aria technologies
  Internet Telephony by Aria technologies  Internet Telephony by Aria technologies
Internet Telephony by Aria technologies
David Meadow
 
Internet telephony by abhishek mahajan
Internet telephony by abhishek mahajanInternet telephony by abhishek mahajan
Internet telephony by abhishek mahajan
Abhishek Mahajan
 
Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
Savvius, Inc
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
Kiran Munir
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
Varinder Singh Walia
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
Ragheb Gmira
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
Fraj Alshahibi
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
Kundan Singh
 
ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management
ThousandEyes
 
VoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONVoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATION
Karama Said(BEng,MSc)
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
ThousandEyes
 
ServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for ShoretelServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for Shoretel
ServicePilot
 
SIP dilivery methods and ROI
SIP dilivery methods and ROISIP dilivery methods and ROI
SIP dilivery methods and ROI
markbiltonsmith
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
Savvius, Inc
 
Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Summit Day 2 -What's new in CXP 14Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Summit Day 2 -What's new in CXP 14
Voxeo Corp
 
SIP in Service Quality Monitoring
SIP in Service Quality MonitoringSIP in Service Quality Monitoring
SIP in Service Quality Monitoring
TTI Telecom
 
Introduction to TTI Telecom
Introduction to TTI TelecomIntroduction to TTI Telecom
Introduction to TTI Telecom
TTI Telecom
 
Internet Telephony by Aria technologies
  Internet Telephony by Aria technologies  Internet Telephony by Aria technologies
Internet Telephony by Aria technologies
David Meadow
 
Internet telephony by abhishek mahajan
Internet telephony by abhishek mahajanInternet telephony by abhishek mahajan
Internet telephony by abhishek mahajan
Abhishek Mahajan
 
Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
Savvius, Inc
 
Infomation System Security
Infomation System SecurityInfomation System Security
Infomation System Security
Kiran Munir
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
Ragheb Gmira
 
Ad

Similar to Introduction to VoIP, RTP and SIP (20)

VOIP services
VOIP servicesVOIP services
VOIP services
Pankaj Saharan
 
VOIP
VOIPVOIP
VOIP
guest43d211
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
hajAli4
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
sangusajjan
 
Voip
VoipVoip
Voip
Sumit Joshi
 
A glance-at-voip
A glance-at-voipA glance-at-voip
A glance-at-voip
Nicola Marinelli
 
Common VoIP Security Issues and Solutions
Common VoIP Security Issues and SolutionsCommon VoIP Security Issues and Solutions
Common VoIP Security Issues and Solutions
dheghouy
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
Christopher Duffy
 
VOIP security
VOIP securityVOIP security
VOIP security
Rohit Gurjar
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
Videoguy
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt
ssuser05aebc1
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt
nebepa7907
 
Introduction to Cisco Voice over IP details
Introduction to Cisco Voice over IP detailsIntroduction to Cisco Voice over IP details
Introduction to Cisco Voice over IP details
AlexGeorge385172
 
1. VoIP.ppt
1. VoIP.ppt1. VoIP.ppt
1. VoIP.ppt
shabdrang
 
tftyfty.ppt
tftyfty.ppttftyfty.ppt
tftyfty.ppt
AlKir1
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
Iazon Danelia
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
 
Telefonia_IP (1).ppt
Telefonia_IP (1).pptTelefonia_IP (1).ppt
Telefonia_IP (1).ppt
acaldere
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
Adebayo Ojo
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
Abdullah Shah
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
hajAli4
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
sangusajjan
 
Common VoIP Security Issues and Solutions
Common VoIP Security Issues and SolutionsCommon VoIP Security Issues and Solutions
Common VoIP Security Issues and Solutions
dheghouy
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
Christopher Duffy
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
Videoguy
 
2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt2.Intro-to-VoIP.ppt
2.Intro-to-VoIP.ppt
nebepa7907
 
Introduction to Cisco Voice over IP details
Introduction to Cisco Voice over IP detailsIntroduction to Cisco Voice over IP details
Introduction to Cisco Voice over IP details
AlexGeorge385172
 
tftyfty.ppt
tftyfty.ppttftyfty.ppt
tftyfty.ppt
AlKir1
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
 
Telefonia_IP (1).ppt
Telefonia_IP (1).pptTelefonia_IP (1).ppt
Telefonia_IP (1).ppt
acaldere
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
Adebayo Ojo
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
Abdullah Shah
 
Ad

More from ThousandEyes (20)

ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital ExperiencesAssuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
ThousandEyes
 
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital ExperiencesAssuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
ThousandEyes
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Introduction to ThousandEyes platform March 2025
Introduction to ThousandEyes platform March 2025Introduction to ThousandEyes platform March 2025
Introduction to ThousandEyes platform March 2025
ThousandEyes
 
What's New? ThousandEyes Product Features and Highlights for February 2025
What's New? ThousandEyes Product Features and Highlights for February 2025What's New? ThousandEyes Product Features and Highlights for February 2025
What's New? ThousandEyes Product Features and Highlights for February 2025
ThousandEyes
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
 
What's New? ThousandEyes Product Features and Highlights
What's New? ThousandEyes Product Features and HighlightsWhat's New? ThousandEyes Product Features and Highlights
What's New? ThousandEyes Product Features and Highlights
ThousandEyes
 
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top  Outages of 2024, Explained: Lessons in Digital ResilienceTop  Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience
ThousandEyes
 
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital ResilienceTop Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience
ThousandEyes
 
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital ResilienceTop Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience
ThousandEyes
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
New ThousandEyes Product Features and Release Highlights: December 2024
New ThousandEyes Product Features and Release Highlights: December 2024New ThousandEyes Product Features and Release Highlights: December 2024
New ThousandEyes Product Features and Release Highlights: December 2024
ThousandEyes
 
ThousandEyes and Webex Assure Seamless Collaboration for Insight Global
ThousandEyes and Webex Assure Seamless Collaboration for Insight GlobalThousandEyes and Webex Assure Seamless Collaboration for Insight Global
ThousandEyes and Webex Assure Seamless Collaboration for Insight Global
ThousandEyes
 
New ThousandEyes Product Features and Release Highlights: October 2024
New ThousandEyes Product Features and Release Highlights: October 2024New ThousandEyes Product Features and Release Highlights: October 2024
New ThousandEyes Product Features and Release Highlights: October 2024
ThousandEyes
 
Troubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned NetworksTroubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned Networks
ThousandEyes
 
Troubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned NetworksTroubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned Networks
ThousandEyes
 
Troubleshooting Digital Experiences Webinar
Troubleshooting Digital Experiences WebinarTroubleshooting Digital Experiences Webinar
Troubleshooting Digital Experiences Webinar
ThousandEyes
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital ExperiencesAssuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
ThousandEyes
 
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital ExperiencesAssuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
ThousandEyes
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Introduction to ThousandEyes platform March 2025
Introduction to ThousandEyes platform March 2025Introduction to ThousandEyes platform March 2025
Introduction to ThousandEyes platform March 2025
ThousandEyes
 
What's New? ThousandEyes Product Features and Highlights for February 2025
What's New? ThousandEyes Product Features and Highlights for February 2025What's New? ThousandEyes Product Features and Highlights for February 2025
What's New? ThousandEyes Product Features and Highlights for February 2025
ThousandEyes
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
 
What's New? ThousandEyes Product Features and Highlights
What's New? ThousandEyes Product Features and HighlightsWhat's New? ThousandEyes Product Features and Highlights
What's New? ThousandEyes Product Features and Highlights
ThousandEyes
 
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top  Outages of 2024, Explained: Lessons in Digital ResilienceTop  Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience
ThousandEyes
 
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital ResilienceTop Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience
ThousandEyes
 
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital ResilienceTop Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience
ThousandEyes
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
New ThousandEyes Product Features and Release Highlights: December 2024
New ThousandEyes Product Features and Release Highlights: December 2024New ThousandEyes Product Features and Release Highlights: December 2024
New ThousandEyes Product Features and Release Highlights: December 2024
ThousandEyes
 
ThousandEyes and Webex Assure Seamless Collaboration for Insight Global
ThousandEyes and Webex Assure Seamless Collaboration for Insight GlobalThousandEyes and Webex Assure Seamless Collaboration for Insight Global
ThousandEyes and Webex Assure Seamless Collaboration for Insight Global
ThousandEyes
 
New ThousandEyes Product Features and Release Highlights: October 2024
New ThousandEyes Product Features and Release Highlights: October 2024New ThousandEyes Product Features and Release Highlights: October 2024
New ThousandEyes Product Features and Release Highlights: October 2024
ThousandEyes
 
Troubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned NetworksTroubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned Networks
ThousandEyes
 
Troubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned NetworksTroubleshooting Digital Experiences Across Owned and Unowned Networks
Troubleshooting Digital Experiences Across Owned and Unowned Networks
ThousandEyes
 
Troubleshooting Digital Experiences Webinar
Troubleshooting Digital Experiences WebinarTroubleshooting Digital Experiences Webinar
Troubleshooting Digital Experiences Webinar
ThousandEyes
 

Recently uploaded (20)

Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 

Introduction to VoIP, RTP and SIP

  • 1. 0 Introduction to VoIP, RTP and SIP Archana Kesavan Product Marketing Manager
  • 2. 1 About ThousandEyes ThousandEyes delivers visibility into every network your organization relies on. Founded by network experts; strong investor backing Relied on for critical operations by leading enterprises Recognized as an innovative new approach 27 Fortune 500 5 top 5 SaaS Companies 4 top 6 US Banks
  • 3. 2 Telephony – A Brief History Mr. Watson – Come here – I want to see you Manual Switchboard
  • 4. 3 Telephony – A Brief History Business Office Callers Local Exchange PBX Individual Callers International Gateway Tandem Junction/Exchange PSTN Network
  • 5. 4 Voice-Over-IP • Set of protocols designed to deliver communication services over the IP network • Analog voice converted into data packets to be sent over the Internet. • Two phases • Phase 1: Signaling (SIP) • Phase 2: Audio transport (RTP)
  • 6. 5 IP Telephony or Voice-Over-IP Local Exchange PBX Individual Callers International Gateway Tandem Junction PSTNNetwork IP- PBX VoIP Servers Ethernet (IP Network) Internet SIP Trunk Mobile Voice Mobile Data
  • 7. 6 Type of VoIP Services On-Prem Branch Office Branch Office DMZ CRM Web Data Center IP-PBX VoIP server • All hardware and software owned and managed by the enterprise. • IP-PBX and adjoining systems reside in the datacenter or on premise. • Voice packets go through the LAN and WAN
  • 8. 7 Type of VoIP Services Hosted • IP-phones are owned by the enterprise • All other equipment and software located in the service provider data center and provided as a service • VoIP packets travel over the Internet or dedicated WAN connectivity to the hosted site Data Center Branch Office Branch Office DMZ CRMWeb IP-PBX VoIP Provider Data Center Branch Office Branch Office DMZ CRMWeb IP-PBX VoIP Provider Data Center Data Center Enterprise A Enterprise B
  • 9. 8 So how does VoIP work? • Session Initiation Protocol (SIP) • Pre-requisite for the voice call – RFC 3261: Standard protocol (however propriety versions exist to force vendor lock-down) – Application level protocol residing above TCP/IP stack – TCP or UDP – Text-based protocol like HTTP – Encrypted with TLS – Response Codes indicates the state of the request message Phase1: Signaling VoIP Phone A SIP Server/Proxy VoIP Phone B SIP RegisterSIP Register SIP INVITE 100 Trying SIP INVITE 180 Ringing 180 Ringing 200 OK 200 OK AUDIO CALL SIP BYE 200 OK SIP ACK SIP ACK SIP BYE 200 OK
  • 10. 9 So how does VoIP work? Phase1: Signaling VoIP Phone A SIP Server/Proxy VoIP Phone B SIP RegisterSIP Register SIP INVITE 100 Trying SIP INVITE 180 Ringing 180 Ringing 200 OK 200 OK AUDIO CALL SIP BYE 200 OK SIP ACK SIP ACK SIP BYE 200 OK REGISTER INVITE CONNECT DISCONNECT
  • 11. 10 • Real Transport Protocol (RTP) – Analog voice signals converted into data packets and sent over UDP – Audio frames are encapsulated in RTP packets – RTP packets are encapsulated in UDP packets – UDP packets are encapsulated in IP packets So how does VoIP work? Phase 2: Audio Data IP header UDP header Frame 1 RTP header Frame 2 RTP Audio Stream SIP Network
  • 12. 11 • How voice traffic is encoded and decoded • Determines the quality of the VoIP conversation • G.711, G.722, SILK Key VoIP Concepts • MoS • Latency • Jitter (De-Jitter buffer) • PDV Codecs VoIP Metrics • Prioritization of VoIP Traffic • DSCP codes – Traffic shaping, firewall and LB configuration – 3 bits for class: Best effort, Assured Forwarding, Expedited Forwarding, Voice Admit QoS
  • 13. 12 Time Packet delay (from sender to receiver) Latency Packet 1 Packet 2 Packet 4Sent at Packet 1 Packet 2 Packet 4Received at Packet 3 Packet 3 Latency LatencyLatency Latency
  • 14. 13 Time Variation of the latency Jitter Packet 1 Packet 2 Packet 4Sent at Packet 1 Packet 2 Packet 4Received at Packet 3 Packet 3 Min Latency Max Latency
  • 15. 14 Time 99.9th percentile of the packet delay variation Packet Delay Variation Packet 1 Packet 2 Packet 4Sent at Packet 1 Packet 2 Packet 4Received at Packet 3 Packet 3 Played at Delayed playback Min Latency Max Latency PDV = max latency – min latency De-jitter buffer should be able to accommodate PDV.
  • 16. 15 E-Model (ITU-T Recommendation G.107, 1998-2014) Based on a mathematical model in which the individual transmission parameters are transformed into different individual "impairment factors” such as codec characteristics, delay, loss ratio, discard ratio, etc., to obtain a quality metric called R factor: Mean Opinion Score (MOS) Basic signal- to-noise ratio Delay impairment Equipment impairment Advantage factor (expectation) • Network latency • De-jitter buffer size • Ie (codec) • Packet loss robustness (codec) • Packet loss probability • Network latency Simultaneous impairment 1 Calculation of the transmission rating factor, R ccording to the equipment impairment factor method, the fundamental principle of the E-model ased on a concept given in the description of the OPINE model (see [b-ITU-T P-Sup.3]). sychological factors on the psychological scale are additive. he result of any calculation with the E-model in a first step is a transmission rating factor R, whic ombines all transmission parameters relevant for the considered connection. This rating factor R omposed of: AIe-effIdIsRoR +−−−= (7-1 o represents in principle the basic signal-to-noise ratio, including noise sources such as circu oise and room noise. Factor Is is a combination of all impairments which occur more or le multaneously with the voice signal. Factor Id represents the impairments caused by delay and th fective equipment impairment factor Ie-eff represents impairments caused by low bit-rate codec also includes impairment due to randomly distributed pack losses. The advantage factor A allow r compensation of impairment factors when the user benefits from other types of access to th ser. The term Ro and the Is and Id values are subdivided into further specific impairment value he following clauses give the equations used in the E-model.
  • 17. 16 • Data records that contain specific information about a call. For eg, timestamp, call duration etc • CDRs are generated at specified triggers • Record call quality, loss, latency experienced • Billing, Law Enforcement Monitoring Techniques for VoIP • Packet sniffer that can record every SIP and RTP transaction • Can typically decode speech and replay for call quality analysis • Detect MOS score and other voice metrics • Maximum overhead Call Detail Records Packet Capture • Simulate VoIP traffic from strategic vantage points in periodic intervals • Quickly pinpoint when and where an issue occurs • Real time detection of voice quality degradation • Less overhead Active Monitoring
  • 18. 17 Demo • Dip in MOS score due to DSCP change • https://earhhpng.share.thousandeyes.com
  • 19. 18 VoIP Metrics Average of packet delays 99.9th percentile of packet delay variation Packets dropped by the de-jitter buffer Packets dropped by the network MOS Score (1-5) Audio codec used Source Destination

Editor's Notes

  • #2: \
  • #4: PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned. It's also referred to as the Plain Old Telephone Service (POTS).
  • #8: Ser
  • #9: Ser