* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download What is wireless networking?
Survey
Document related concepts
TV Everywhere wikipedia , lookup
Network tap wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Net neutrality law wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wireless USB wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
IEEE 802.11 wikipedia , lookup
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Transcript
ITNW 1380 COOPERATIVE EDUCATION – NETWORKING Seminar # 5 VOIP and Wireless Networking Solutions Unified Communications and Collaboration Solution Unified Communications IP Convergence: Voice, data & video on the same network. Voice: Voice over IP - VOIP. Collaboration Solution IM: Yahoo, MSN, Novell, Skype... 3G Wireless: CDMA, UMTS. 4G Wireless: Wireless LAN. Today's Collaboration Solution VOIP Wireless LAN PART I VOIP Presenter: Nguyen Chi Thanh VOIP VOIP Definition VOIP Service Providers VOIP Benefits VOIP Protocols VOIP Networks VOIP Open Source Software VoIP Definition VoIP (Voice Over Internet Protocol). Voice transmission over packet based network such as Internet, corporate intranet, LAN, WAN. VoIP known as Internet telephony. Integrate VoIP enabled voice signals with faxes & data into a unified network. Telephone conversation over Internet. VOIP VOIP Definition VOIP Service Providers VOIP Benefits VOIP Protocols VOIP Networks VOIP Open Source Software VoIP Service providers With VoIP you can call PC to PC, PC to VoIP phone, or VoIP phone to ordinary phone over Internet. VoIP is popular international calling. VoIP enables you to call from virtually anywhere. VoIP provider offer low rates or free service deals – Free World Dial & Skype... VOIP VOIP Definition VOIP Service Providers VOIP Benefits VOIP Protocols VOIP Networks VOIP Open Source Software VOIP Benefits Lower long distance rates: requires only Internet connection. Simplicity: VoIP transmission combines voice & data. Capacity: VoIP better uses you network for less. Global outsourcing: International call centers rely on VoIP. Automatic routing: Receive calls automatically to your VoIP phone. Portability: Travel with your VoIP phones. VOIP VOIP Definition VOIP Service Providers VOIP Benefits VOIP Protocols VOIP Networks VOIP Open Source Software VoIP Protocols H.323 Session Initiation Protocol (SIP) H.323 Published by Telecommunication Standardization Sector (ITU-T) in November 1996. ITU-T defines H.323 protocols to provide audiovisual communication sessions on any packet network. Widely implemented by voice and videoconferencing equipment manufacturers. Widely deployed worldwide by service providers and enterprises for both voice and video services over Internet Protocol (IP) networks. H.323 (Cont.) Suited for transmitting calls across networks using a mixture of IP, PSTN, ISDN, and QSIG over ISDN. Within the context of H.323, an IP-based PBX might be an H.323 Gatekeeper. Codecs: Video codec: H.261, H.263, H.264 Audio codec: G.711, G.729 (including G.729a), G.723.1, G.726 Text codecs: T.140 H.323 (Cont.) H.323 Architecture: The H.323 system defines several network elements that work together in order to deliver rich multimedia communication capabilities Terminals, Multi-point Control Units (MCUs), Gateways, Gatekeepers, and Border Elements. A complete, sophisticated H.323 protocol stack VoIP Protocols (Cont.) H.323 Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Purpose of SIP SIP URI SIP Network Elements SIP Messages Transactions Dialogs Typical SIP Scenarios Purpose of SIP Application-layer control protocol which has been developed and designed within the IETF. The most important one is RFC3261 which contains the core protocol specification. The protocol is used for creating, modifying, and terminating sessions with one or more participants. By sessions we understand a set of senders and receivers that communicate and state kept those senders and receivers during the communication. Purpose of SIP (Cont.) Purpose of SIP is just to make the communication possible, the communication itself must be achieved by another means. Two protocols that are most often used along with SIP are RTP and SDP. RTP – Real Time Protocol is used to carry the real-time multimedia data (including audio, video, and text), the protocol makes it possible to encode and split the data into packets and transport such packets over the Internet. Purpose of SIP (Cont.) SDP – Session Description Protocol, which is used to describe and encode capabilities of session participants. Such a description is then used to negotiate the characteristics of the session so that all the devices can participate (negotiation of codecs used to encode media so all participants will be able to decode it). SIP is based on HTTP protocol. SIP is used to carry the description of session parameters, the description is encoded into a document using SDP. SIP URI SIP entities are identified using SIP URI (Uniform Resource Identifier). A SIP URI has form of sip:username@domain, for instance, sip:[email protected]. As we can see, SIP URIs are similar to e-mail addresses, it is, for instance, possible to use the same URI for e-mail and SIP communication, such URIs are easy to remember. SIP Network Elements Basic SIP elements are: User Agents: Internet end points that use SIP to find each other and to negotiate a session characteristics are called user agents (cellular phones, PSTN gateways, PDAs) Proxy Servers: In addition to that SIP allows creation of an infrastructure of network hosts called proxy servers. User agents can send messages to a proxy server. They perform routing of a session invitations according to invitee's current location, authentication, accounting and many other important functions SIP Network Elements (Cont.) Registrar: The registrar is a special SIP entity that receives registrations from users, extracts information about their current location (IP address, port and username in this case) and stores the information into location database. Purpose of the location database is to map sip:[email protected] to sip:[email protected]:5060. The location database is then used by thanhnc's proxy server. When the proxy receives an invitation for sip:[email protected], it will search the location database. SIP Network Elements (Cont.) Redirect Server: The entity that receives a request and sends back a reply containing a list of the current location of a particular user is called redirect server. A redirect server receives requests and looks up the intended recipient of the request in the location database created by a registra. SIP Messages SIP Requests: ACK This message acknowledges receipt of a final response to INVITE. BYE Bye messages are used to tear down multimedia sessions. CANCEL Cancel is used to cancel not yet fully established session. REGISTER Purpose of REGISTER request is to let registrar know of current user's location. SIP Messages (Cont.) SIP Responses; The reply code is an integer number from 100 to 699 and indicates type of the response. 1xx are provisional responses. A provisional response is response that tells to its recipient is received but result of the processing is not known yet. 2xx responses are positive final responses. 3xx responses are used to redirect a caller. 4xx are negative final responses. 5xx means that the problem is on server's side. 6xx reply code means that the request cannot be Transactions SIP is transactional protocol. A transaction is a sequence of SIP messages exchanged between SIP network elements. SIP messages: SIP user#1 INVITE ----------> SIP user#2 <---------- 200 OK ACK ----------> SIP Messages Dialogs A dialog represents a peer-to-peer SIP relationship between two user agents. For instance, INVITE message establishes a dialog, because it will be later followed by BYE request which will tear down the session established by the INVITE. This BYE is sent within the dialog established by the INVITE. SIP Dialogs Typical SIP Scenarios Registration Session Invitation Session Termination Record Routing Event Subscription and Notification Instant Messages VOIP VOIP Definition VOIP Service Providers VOIP Benefits VOIP Protocols VOIP Networks VOIP Open Source Software VoIP Network Solution for Enterprise from AudioCodes Ltd.: IP-PBX IP Telephony Survivable Network PBX VoIP Networking Contact Center for Enterprises Unified Messaging for Enterprises Conferencing for Enterprises IP-PBX IP Telephony Survivable Network PBX VoIP Networking Contact Center for Enterprises Unified Messaging for Enterprises Conferencing for Enterprises VOIP VOIP Definition VOIP Service Providers VOIP Benefits VOIP Protocols VOIP Networks VOIP Open Source Software VOIP Open Source Software IPTEL SIP Server: SER – SIP Express Router (Registrar/Proxy/Redirect server) Support database backends: MySQL, Oracle, Postgres. RTP Proxy, NAT traversal Interoperability with Cisco, Microsoft. PingTel, Siemens, Xten and many others. http://www.iptel.org/ser VOIP Open Source Software (Cont.) Asterisk: Most popular open source VOIP software. IP PBX which connect users over IP to PSTN, T1/E1. Media gateway, bridge the legacy PSTN to IP telephony. Media server with IVR, voice mail, automated attendant, unified messaging. Call Center, ACD, advance skills-based routing. http://www/asterisk.org References SIP: http://www.sip.org/ IPTEL: http://www.iptel.org IPTel: http://www.iptel.org/sip/intro AudiCodes: http://www.audiocodes.com/Content.aspx?voip=2 421 Asterisk: http://www.asterisk.org The End of PART I Questions PART II WIRELESS NETWORKING WIRELESS NETWORKING Presenter: Nhan Nguyên Phương Section One - Wireless Networking Section Two - Wireless Networking and the Internet Section One - Wireless Networking 1. What is wireless networking? Wireless network components? What is IEEE 802.11? Wireless equipment from different vendors? Communications between computers from WLAN and LAN Wireless network range? How many wireless networked computers can use a single access point? Can I have more than one access point? What is Roaming? How can I use a wireless network to interconnect two LANs? Is it true that wireless networking is only good for laptop computers? Wireless Network Security? 1. What is wireless networking? Wireless networking: two or more computers to communicate using standard network protocols without network cabling. IEEE 802.11 (WiFi) IEEE 802.16 (WiMax - Worldwide Interoperability for Microwave Access, operates < 66 GHz) IEEE 802.20 (MBWA - Mobile Broadband Wireless Access) IEEE 802.22 (WRAN – Wireless Regional Area Network) HomeLAN Bluetooth …. 2. Wireless network components Two kinds of wireless networks: a. Ad-hoc / peer-to-peer wireless network consists of A number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers. They can share files and printers, but may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software. (This is called "bridging") • Figure 1: Ad-Hoc or Peer-to Peer Networking. Each computer with a wireless interface can communicate directly with all of the others. b. Infrastructure Wireless Network: A wireless network can also use an access point, or base station. It can connect (or "bridge") the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources. There are two types of access points: Hardware access points offer comprehensive support of most wireless features Figure 2: Hardware Access Point. Wireless connected computers using a Hardware Access Point. Software Access Points which run on a computer equipped with a wireless network interface card as used in an ad-hoc or peer-to-peer wireless network. (See Figure 3) Figure 3: Software Access Point. Wireless connected computers using a Software Access Point. 3. What is IEEE 802.11? The most widely used standard is IEEE802.11 produced by the Institute of Electrical and Electronic Engineers (IEEE). This is a standard defining all aspects of Radio Frequency Wireless networking. 802.11b 802.11g 802.11a 802.11n 802.11b: slowest and least expensive. IEEE802.11b transmits in the 2.4 GHz frequency band of the radio spectrum. It can handle up to 11 megabits of data per second, and it uses complimentary code keying (CCK) coding. 802.11g transmits at 2.4 GHz like 802.11b, but much faster it can handle up to 54 megabits of data per second. (Mbps) It also uses orthogonal frequency-division multiplexing (OFDM), a more efficient coding technique that splits that radio signal into several sub-signals before they reach a receiver 802.11a transmits at 5GHz and can move up to 54 megabits of data per second. It is also much faster because it uses the same OFDM coding as 802.11g.. 802.11n : newest. This standard significantly improves speed and range. IEEE802.11n can achieve speeds as high as 140 megabits per second. 4. Wireless equipment from different vendors Yes and No: Frequency Hopping (FH) and Direct Sequence Spread Spectrum (DSSS or DS) are not interoperable. Be sure to obtain guarantees from the vendors that the hardware will interoperate and follows the standards. 5. Communications between computers from WLAN and LAN Bridge between the wireless and wired network is needed either with a hardware access point or a software access point. If more features required on wired network, a software access point may be the best solution. 6. Wireless Network Range? The actual distance varies depending upon the environment; indoor and outdoor ranges Typical indoor ranges are 150-300 feet, but can be shorter if the building construction interferes with radio transmissions. Longer ranges are possible, but performance will degrade with distance. Outdoor ranges are quoted up to 1000 feet, but again this depends upon the environment. To extend the range, by using more than a single access point or using a wireless relay /extension point 7. How many wireless networked computers can use a single access point? This depends upon the manufacturer. Some limit of 10, more expensive units support up to 100 wireless connections. Using more computers than recommended will cause performance and reliability to suffer. Software access points has user limitations, but this depends upon the specific software, and the host computer's ability 8. Can I have more than one access point? Yes, multiple access points can be connected to a wired LAN, or sometimes even to a second wireless LAN if the access point supports this. In most cases, separate access points are interconnected via a wired LAN, providing wireless connectivity in specific areas such as offices or classrooms, but connected to a main wired LAN for access to network resources, such as file servers. (See Figure 4) Figure 4: Multiple Access Points. Wireless connected computers using Multiple Access Points. If a single area is too large to be covered by a single access point, then multiple access points or extension points can be used. – (Note that an "extension point" is not defined in the wireless standard, but have been developed by some manufacturers). Some manufacturers produce extension points, which act as wireless relays, extending the range of a single access point. Multiple extension points can be strung together to provide wireless access to far away locations from the central access point. (See Figure 5) Figure 5: Extension Point. Wireless connected computers using an Access Point with an Extension Point. 9. What is Roaming? A wireless computer can "roam" from one access point to another, Usually this is completely transparent to the user. Some access point configurations require security authentication when swapping access points, usually in the form of a password dialog box. Access points are required to have overlapping wireless areas to achieve this as can be seen in the following diagram: Figure 6: Roaming. A user can move from Area 1 to Area 2 transparently. The Wireless networking hardware automatically swaps to the Access Point with the best signal. Not all access points are capable of being configured to support roaming. Any access points for a single vendor should be used when implementing roaming, as there is no official standard for this feature. 10. Connecting 2 LANS using Wireless Network Wireless networking offers a cost-effective solution to users with difficult physical installations such as campuses, hospitals or businesses with more than one location in immediate proximity but separated by public thoroughfare. This type of installation requires two access points. Each access point acts as a bridge or router connecting its own LAN to the wireless connection. The wireless connection allows the two access points to communicate with each other, and therefore interconnect the two LAN's. Figure 7: LAN to LAN Wireless Communications A Hardware Access Point providing wireless connectivity to local computers and a software access point. The software access point provides Wired Ethernet network 2 computers access to Wired Network 1. Note that not all hardware access points have the ability to directly interconnect to another hardware access point, and that the subject of interconnecting LAN's over wireless connections is a large and complex one, and is beyond the scope of this introduction 11. Is it true that wireless networking is only good for laptop computers? Wireless networking has benefits for mobile laptop. There are benefits for users of fixed position computers as well. It is also beneficial to many schools and businesses with unsuitable building layouts or walls that cannot be wired making it difficult or impossible to build a wired network. computers are separated from a main network a wireless link may be more cost effective than network cabling although the latter is perfectly feasible. Temporary wireless LANs can easily be created for exhibitions, school or business projects, all without any trailing cabling. 12. Wireless Network Security Wireless communications is easy to get intruded. IEEE 802.11 wireless communications have a function called WEP (Wired Equivalent Privacy), a form of encryption which provides privacy comparable to that of a traditional wired network Traditional Virtual Private Networking (VPN) techniques will work over wireless networks in the same way as traditional wired networks. Section Two - Wireless Networking and the Internet How can I use a wireless network to share an Internet connection? 1. If I have more than one hardware access point, how can I share a single Internet connection? 13. Internet Share Connection over Wireless Network? To share an Internet connection across a LAN you need two things: an Internet sharing hardware device or software program a LAN Requires: Hardware or software access point and a wireless LAN. Figure 8: Software Access Point. Wireless connected computers using a Software Access Point for shared Internet access. A hardware access point may provide Internet Sharing capabilities to Wired LAN computers, but does not usually provide much flexibility beyond very simple configurations. (See Figure 9) Figure 9: Hardware Access Point. Wireless connected computers using a Hardware Access Point for shared Internet access 14. If I have more than one hardware access point, how can I share a single Internet connection? If an existing wired LAN already has an Internet connection, then the hardware access points simply connect to your LAN and allow wireless computers to access the existing Internet connection in the same way as wired LAN computers. Figure 10: Multiple Access Points. Wireless connected computers using Multiple Access Points . The End of Part II Thank you for your attention