Free Essay

Networking Sip Trunking

In:

Submitted By sbontiff
Words 576
Pages 3
Introduction
SIP which means Session Initiation Protocol is used for signaling system for connecting, monitoring and disconnection multimedia and voice based communications sessions over the internet. Internet Engineering Task Force defines SIP as “Peer-to-peer multimedia signaling protocol that integrates with other internet services to deliver rich communications”.
Definition
SIP trunking means that the IP media streams that are transmitted from within an enterprise remains an IP Media stream and passes to anywhere else within the enterprise or to across the boundary of the enterprise to another enterprise via Internet protocol. In other words, a SIP trunk is the digital data transmission link with SIP protocol which signals interfaces recognizing SIP signals and SIP media protocols using the Real Time Protocol (RTP) for voice transmission (media) and Real Time Control Protocol (RTCP) and Quality of Service (QoS). This setting reduces the need to be dependent on a local telephone system by employing hardware media gateways at the carrier edge and the enterprise edge and results in significant savings for the enterprise. This is often referred to as the PSTN-Public Switched Telephone Network) In addition to this, further cost savings is possible by cutting down on the expensive telephone desk sets that are used in many offices across the globe by introducing intelligent softphones in its place and eliminating expensive SDN Basic Rate Interfaces (BRI) and Primary Rate Interfaces (PRI).
Components of SIP trunking
To deploy an SIP trunk the following three components are necessary: a PBX with a SIP enabled trunk side: PBX is an Internet Telephony based PBX that communicates with all endpoints over an Internet Telephony and it can be both the modern digital PBX and the analog PBX. The only requirement is that the interface for SIP trunking connectivity should be available.
An Enterprise edge device which can understand SIP: The LAN enabled PBX connects to the ITSP via the Enterprise edge element. The enterprise edge component can be both a firewall enabled with full support for SIP or simply an edge device which connects to the firewall and handles to the transversal of the SIP traffic.
Internet telephony SIP trunking service provider: ITSP provides connectivity to the Public Switched Telephone Network for communication with cellular and landline phones.
Benefits of SIP trunking
There are additional benefits of SIP trunking apart from the ones already covered above:
It facilitates optimum utilization of bandwidth by combining both data and voice in the same connection
It provides maximum flexibility for the usage of lines by eliminating the need of buying capacity in chunks of 23 (T1) or 30 (E1) lines
It facilitates flexible termination of calls to preferred provider which means international call can be made with the cost of a local call.
SIP trunking enables redundancy with multiple service providers and links.

RFC and SIP trunk
For SIP, RFC - 3261 is defined but if we go explicitly for SIP trunk, no RFC is clearly mentioned. Though the third party component on which success of SIP depends are compliant with some RFCs.

Works Cited
Lync, M. S. (2011, 09 22). SIP Trunking in Deploying Lync: Advice. Retrieved from http://www.telecomreseller.com: http://www.telecomreseller.com/2011/09/22/sip-trunking-in-deploying-lync-advice/
Magnusson, J. (n.d.). SIP Trunking Benefits and Best Practices. Retrieved from http://www.ingate.com: http://www.ingate.com/files/white_paper_What_is_SIP_Trunking_A.pdf
SIP Trunk. (n.d.). Retrieved from http://www.siptrunk.org: http://www.siptrunk.org/whatissiptrunking.php

Similar Documents

Premium Essay

Network Design

...Security Proposal Nickolas Dunkle Isaac Mundt Michael Yeager Thomas Sevastos John Dyer Jacob Skrzynski Joseph Weidner Pam Marshall Christopher Montgomery ITT Technical Institute Network Systems Administration Capstone Project Ryan Rucker May 17, 2015 Part 1 - Structure of WAN In this design of a high level network for ABC Company we will provide a basic written infrastructure of both the local and wide area networks we are to build for them, being such an early stage this document is subject to change. This design includes the infrastructure for the corporate headquarters located in San Francisco, as well as the other design centers in Detroit, Paris, Tokyo, and Sao Paulo. We then follow up by explaining the infrastructure of the sales offices, which may not require as high grade of equipment as the design centers depending on its requirements. Finishing with the overview of the entire wide area network, connecting each site to the corporate headquarters which is where we will begin our design. The corporate office being the main headquarters will include many services such as file, print, email, directory, and application. These services will be separated onto at least two different servers due to the constant strain we may see from directory and email services. If necessary we will implement an application server as well to run any in-house programs the company may be familiar with. We also suggest the use of a database server dedicated to storing...

Words: 5812 - Pages: 24

Premium Essay

List of Protocols

...List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e | பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX...

Words: 1041 - Pages: 5

Premium Essay

Computer

...and D, Public vs. Private); Classless (CIDR); IPv4 vs. IPv6 (formatting); MAC address format; Subnetting; Multicast vs. unicast vs. broadcast; APIPA Explain the purpose and properties of routing and switching: EIGRP; OSPF; RIP; Link state vs. distance vector vs. hybrid; Static vs. dynamic; Routing metrics (Hop counts, MTU, bandwidth, Costs, Latency); Next hop; Spanning-Tree Protocol; VLAN (802.1q); Port mirroring; Broadcast domain vs. collision domain; IGP vs. EGP; Routing tables; Convergence (steady state) Identify common TCP and UDP default ports: SMTP – 25; HTTP – 80; HTTPS – 443; FTP – 20, 21; TELNET – 23; IMAP – 143; RDP – 3389; SSH – 22; DNS – 53; DHCP – 67, 68 Explain the function of common networking protocols: TCP; FTP; UDP; TCP/IP suite; DHCP; TFTP; DNS; HTTPS; HTTP; ARP; SIP (VoIP); RTP (VoIP); SSH; POP3; NTP; IMAP4; Telnet; SMTP; SNMP2/3; ICMP; IGMP; TLS Summarize DNS concepts and its components: DNS servers; DNS records (A, MX, AAAA, CNAME, PTR); Dynamic DNS Given a scenario, implement the following network troubleshooting methodology: Identify...

Words: 680 - Pages: 3

Premium Essay

Business

...Small Logo White Paper Introduction to Cloud Computing Introduction to Cloud Computing White Paper Executive Summary A common understanding of “cloud computing” is continuously evolving, and the terminology and concepts used to define it often need clarifying. Press coverage can be vague or may not fully capture the extent of what cloud computing entails or represents, sometimes reporting how companies are making their solutions available in the “cloud” or how “cloud computing” is the way forward, but not examining the characteristics, models, and services involved in understanding what cloud computing is and what it can become. This white paper introduces internet-based cloud computing, exploring the characteristics, service models, and deployment models in use today, as well as the benefits and challenges associated with cloud computing. Also discussed are the communications services in the cloud (including ways to access the cloud, such as web APIs and media control interfaces) and the importance of scalability and flexibility in a cloud-based environment. Also noted for businesses desiring to start using communication services, are the interface choices available, including Web 2.0 APIs, media control interfaces, Java interfaces, and XML based interfaces, catering to a wide range of application and service creation developers. Introduction to Cloud Computing Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 3208 - Pages: 13

Free Essay

Speaks

...Mr. Dimakh Sahastrabuddhe, CEO, Dimakh Consultants Dimakh is the CEO of Dimakh Consultants Pvt Ltd, a leading IT consulting firm in Pune India. He is a first generation entrepreneur and started the enterprise at a young age of 23. The company provides varied IT offerings in software development, website designing & hosting and networking solutions.  Dimakh holds a Bachelor of Engineering degree from the University of Pune. He is on the visiting faculty at Symbiosis University,Tasmac-Wales University and IIPM for last 15 years. With his real life experience in IT fields he simplifies the learning process and makes it an interesting session for techies as well as non-techies. Dimakh is a sought-after speaker and has delivered lectures at several corporations including Wipro, Reliance, Mphasis, Convergent, Msource, Infosys. Dimakh has written a number of articles in IT magazines and TOP B school journals and is the author of "E-Business" a book on current e-commerce trends.  He was invited by the ministry of communication Afghanistan, to design the rules- regulations and cyber laws for Afghanistan after the Taliban war and he has successfully deployed a complete telecom billing system for Kabul, which was the first revenue generation project for Afghanistan.  Dimakh is the winner of the "Budding Entrepreneur Award" and "Outstanding achievements in the field of Information Technology" given by Rotary International's Rotary club. He is the winner of young marathi achiever...

Words: 1507 - Pages: 7

Premium Essay

Voip Network Service Implementation

...Voice Over IP Solutions------------------------------------------------------------------10 - Conclusion----------------------------------------------------------------------------------12 - References----------------------------------------------------------------------------------13 EXECUTIVE SUMMARY The term “Voice over Internet Protocol” (VoIP) describes the transport of voice over IP based networks; it is a generic term that covers deployments ranging in complexity from hobbyists using the internet to get free phone calls on a peer to peer basis, to full scale PSTN replacement networks. In carrier networks VoIP has been mainly deployed in enterprise networks or as a trunking technology to reduce transport costs in voice backbone networks. In order to deploy a VoIP network that is capable of providing a PSTN scale solution the following issues must be addressed: What services need to be offered, for example full PSTN equivalence, a more restricted? “cheap second line” service, or a simple user-to-user voice service. Voip focus on a service set that provides full PSTN equivalence – what we are...

Words: 2981 - Pages: 12

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502

Premium Essay

Netw600 Capstone Travel Agency Inc Rfp Response

...NETW600 Capstone Team E Week 7 Final Project Travel Agency Inc (TAI) RFP Response Table of Contents: Executive Summary 3 Background 3 Industry Trends and Projections Problem Definition 6 Requirements Definition 8 Project Goals and Objectives Project Assumptions Current Configuration of Network Identification of Business Issues and Requirements Budget Requirements Network Design 11 Alternative Approaches Customer Ownership Outsourcing and the Cloud Comparison of Alternatives Cost differences Workflow differences Reliability Maintenance Performance Findings, Conclusions, and Recommendations 16 Implementation Plan 17 Project Plan Milestones Implementation Plan Training Follow-up Appendices 19 Appendix A Appendix B Appendix C Appendix D Appendix E Appendix F References 27 Executive Summary: Travel Agency Incorporated, (TAI), has reached a pivotal point in the travel industry and is at a stage for which changing business model operations is critical and may determine their very survival. Make no mistake TAI is at a crossroad. It is crucial that TAI reduce costs and employee turnover, eliminate network congestion, and develop a presence for online bookings. It is also imperative that TAI’s reputation and business model of providing complete and very personal service while building and maintaining excellent relationships with their customers cannot be...

Words: 5744 - Pages: 23

Free Essay

Capstone

...WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to...

Words: 18593 - Pages: 75

Premium Essay

Sql Quiz

...Emory University | Internetworking Technology Handbook | [Type the document subtitle] | | SAVIOUR EMMANUEL UDOBONG | [Pick the date] | [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet...

Words: 217433 - Pages: 870

Premium Essay

Top Down Cisco

...Top-Down Network Design Third Edition Priscilla Oppenheimer Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco...

Words: 79785 - Pages: 320

Premium Essay

Industry Analysis of Telecom Sector in Bangladesh

...Executive summary This term paper is prepared on the telecommunication sector of Bangladesh. Telecom sector of Bangladesh is a very fast growing and dynamic sector. This sector marked its inception in 1989. In this report we have analyzed the history, the value chain activities, the competitive forces, mobile network portability, and national telecom policy etc. We have conducted the risk analysis of the industry in terms of different analysis tools that is SWOT, PESTEL etc. We have covered in and out of the industry in the part A of our report. In part B, we have analyzed the industry players. We have done TTF of our respective company that we have chosen. Then in part C, we have written the case of the respective company that the group members have chosen. Bangladesh’s mobile phone market has achieved exceptional growth since the beginning of 2004, registering a massive 100% growth in its subscriber base during 2004, and 137% during 2005. In recent year of 2012, 15% has been observed in the industry. This trend is forecast to continue over the coming years as the 3G will further boost up the pace of subscribers’ acquisition Many foreign investors are now interested to do business in telecom sector in Bangladesh which reveals that Bangladesh has become a significant hub for telecoms. It has been forecasted that the average revenue from telecoms sector will be Tk 2500 crore a year. Bangladesh is a country which is densely populated and also is a flat and easily extends able...

Words: 27987 - Pages: 112