Documente Academic
Documente Profesional
Documente Cultură
SECTION
IP overview
Ed.03
A L C T E L
Section - IP overview
SUMMARY
IP Overview
General information ......................................................................................... . 3
1. IP network overview ................................................................................ . 3
2. IP network and OmniPCX Enterprise....................................................... . 4
3. Speech processing on IP .......................................................................... . 5
4. Modem/fax/data communications........................................................... . 7
5. Quality of Service ..................................................................................... . 8
6. Connection of Call Server to Media Gateways ........................................ . 8
7. The H323 gateway function of the OmniPCX Enterprise ......................... . 9
8. Alcatel IP-Phones..................................................................................... .10
9. Configuring IP equipment........................................................................ .11
10. Summary table....................................................................................... .12
Management - QoS ........................................................................................... .13
1. Definitions................................................................................................ .13
2. Using the ToS / DiffServ field ................................................................... .14
3. 802.1p/Q tagging .................................................................................... .17
4. Summary .................................................................................................. .23
Management - Compression ............................................................................. .25
1. Introduction.............................................................................................. .25
2. Managing system parameters................................................................. .26
3. H323 Calls ................................................................................................ .27
4. VPN hop on IP.......................................................................................... .27
5. Negotiation mechanism........................................................................... .28
6. IP-Phones................................................................................................. .33
7. Inter-Media Gateway Call ....................................................................... .37
8. Bandwidth requirements according to the compression
algorithm ................................................................................................ .37
Management - Call Restrictions ........................................................................ .39
1. Call restrictions within the same node .................................................... .39
2. Restriction by management of IP boards ................................................ .39
3. Restricting calls by VPN overflow ............................................................ .40
Appendix - H323 standard................................................................................ .43
1. H323 Standard Presentation ................................................................... .43
2. Structure of the datagrams...................................................................... .48
3. Summary of H3XX standard characteristics ............................................ .53
4. Voice quality............................................................................................. .53
5. TCP/IP tools (present on a PC running Windows NT) .............................. .56
Ed.03 Ref.3EU19919ENAA .1
A L C T E L
Glossary............................................................................................................. .59
1. A ............................................................................................................... .59
2. B ............................................................................................................... .60
3. C ............................................................................................................... .61
4. D............................................................................................................... .62
5. E ............................................................................................................... .63
6. F ............................................................................................................... .64
7. G .............................................................................................................. .65
8. H............................................................................................................... .65
9. I ................................................................................................................ .66
10. J.............................................................................................................. .69
11. K ............................................................................................................. .69
12. L ............................................................................................................. .69
13. M ............................................................................................................ .70
14. N ............................................................................................................ .70
15. O ............................................................................................................ .71
16. P ............................................................................................................. .71
17. Q ............................................................................................................ .73
18. R ............................................................................................................. .73
19. S ............................................................................................................. .74
20. T ............................................................................................................. .75
21. U............................................................................................................. .76
22. V ............................................................................................................. .76
23. W ............................................................................................................ .77
24. X ............................................................................................................. .77
25. Y ............................................................................................................. .78
26. Z ............................................................................................................. .78
.2 Ref.3EU19919ENAA Ed.03
A L C T E L
44A01F01000A000AAEN
IP Overview
General information
Edition: 03
The OmniPCX Enterprise architecture has been designed:
- to render the communications control application (Call Server) independent from the physical
platform: the Call Server can be hosted by an S or L rack, an ACT shelf (as from R5.1) as well as
by a PC (appliance server).
- It requires the same support for both computer and telephone networks, which reduces investment
cost and simplifies installation process,
- It uses a standard protocol, which allows standard terminals to be connected (especially H323 and
SIP terminals).
1. IP network overview
On an ISDN network, voice is digitized and transported on a channel (or Time Slot) in the form of a
continuous flow of bits. The channel is reserved when the call is set up. Transfer rate is guaranteed.
On an IP network, voice is digitized and possibly compressed and then transformed into datagrams by
the encoder/decoder. These datagrams are then transmitted over the IP network. At reception, voice
is extracted from the messages and the digital flow reconstituted before being sent to the recipient.
ISDN network
Digital G711
Digital G711
Digital G711
IP network
Coder Decoder
The part of an IP network that is "inside a company is often supported by an Ethernet network. Ethernet
is a competitive type network and voice frames compete with the frames of other applications (file
transfer, etc.).
Ed.03 Ref.3EU19919ENAA .3
A L C T E L
The Ethernet network is not secure, data transfer time (delay) and integrity are not guaranteed. This is
also the case for the entire IP network, where losses and delay depend on congestion and the media
used.
The Ethernet network throughput may vary (10 Mb/s, 100 Mb/s, 1 Gb/s).
- to establish a link to voice over IP equipment: Alcatel IP-Phones, Alcatel PCMM, H323 terminals
and gateways, SIP terminals,
- to implement an ABC link over IP between two OmniPCX Enterprises or between one OmniPCX
Enterprise and one OmniPCX 4400 (release R4.2 minimum).
.4 Ref.3EU19919ENAA Ed.03
A L C T E L
Node 1 Node 2
IP network
e-Reflexe
ACT Media set
Gateway
There are two main standards used to manage voice over IP communications, both are supported by
the OmniPCX Enterprise:
- H323: used for ABC links over IP and for communications with H323 terminals and gateways,
- SIP (Session Invitation Protocol): used for communications with SIP phones or gateways.
H323 and SIP standards are different from the signaling exchange point of view. For voice transport,
both of them use the RTP (Real Time Protocol) and voice is coded using G711, G723 or G729 algo-
rithms (see below).
3. Speech processing on IP
To limit throughput between the sender and the receiver, the system performs the following processing
operations:
- speech compression,
Ed.03 Ref.3EU19919ENAA .5
A L C T E L
- silence suppression.
These operations can be enabled or disabled in management: see module IP Overview - Management
- Compression.
Compression is ensured by "Codecs", also referred to as "Audio codecs", supported by GD, GA and
INT-IP boards and by IP-Phones and PCMM equipment. These circuits are programmable; the mana-
ger configures the processing standard to be applied. Standards available include:
- G711, no compression, call throughput is then 56 kbps or 64 kbps, according to the case.
They accept the "A" or "µ" law. G711 is recommended when there is no bandwidth problem,
e.g. on a LAN.
- G723.1 and G723.1 Appendix A (with silence suppression), call throughput is then 6.3 kbps.
Audio quality is slightly below that of the public phone network.
- G729 Annex A and G729 Annex A & Annex B (with silence suppression), call throughput is then
8 kbps. Audio quality is similar to that of the phone network.
A default type of compression (G723.1 or G729A) is manage by the PCX. If the default compressor is
not appropriate for a specific access, G711 type processing (no compression) may be locally imposed
on this access.
To reduce voice throughput (also referred to as "bandwidth") yet further, the Codecs have a voice activity
detector that allows no data to be transmitted during pauses (silences) in a conversation. This process
would result in total silence at the receiving end. This would be unpleasant for the listener. To avoid
this problem, they incorporate a "background noise generator" that gives the user the impression that
he is using a standard phone line. This "noise" is also referred to as "Comfort noise".
Voice flows are transferred on the IP network, except when equipment is connected to the same Media
Gateway.
On OmniPCX Media Gateway, the interface with the IP network is ensured by the GA or GD boards
that uses the MCV8 or MCV24 daughterboard compressors.
On ACT Media Gateway, the interface with the IP network is ensured by the INT-IP A or INT-IP B boards
that uses the GIP4 or GIP6 daughterboard compressors.
.6 Ref.3EU19919ENAA Ed.03
A L C T E L
Daughter boards
GD
OmniPCX Media - MCV24: 21 compressors max.
Gateway - MCV8: 7 compressors max.
GA
- 1 GIP6 board: 30 comp. max.
- 2 GIP6 boards: 60 comp. max.
INT-IP A - 1 GIP4 board: 30 comp. max.
ACT Media Gateway
INT-IP B - 2 GIP4 boards: 60 comp. max.
- 1 GIP6A board: 8 comp. max.
- 1 GIP4A board: 8 comp. max.
In certain cases, according to the equipment communicating, voice (RTP flow) does not transit through
Media Gateways. When two equipments use the same compression algorithm, the RTP flow can be
direct. Only the signaling will be processed by PCXs (see module Direct RTP in ABC network - Functional
description).
Node 1 Node 2
IP network
In the above figure, voice flow between two IP-Phones do not transit through Media Gateways and is
directly routed between terminals.
4. Modem/fax/data communications
- fax Relay over IP (group 3 fax) communications, whose implementation may be:
• proprietary, with an inter OmniPCX 4400 or OmniPCX Enterprise configuration. Maximum
speed: 9600 bits/s,
• standard (H323 standard, T38 procedure): allows faxes over IP with non-OmniPCX
4400/OmniPCX Enterprise H323 gateways, such as the OmniPCX Office or from other
manufacturers (see module ABC links through IP - Management - § Fax parameters).
Ed.03 Ref.3EU19919ENAA .7
A L C T E L
- as from R5.1, transparent modem/fax/data communications (see module Modem and data
transparency over IP - General information):
• within the same node (or the same domain) for transparent modem/fax communication,
• over an entire ABC network for transparent data communications.
Note: fax relay and transparent modem/data communications cannot be performed simultaneously
on the same system. These latter communications must be authorized or prohibited in management.
5. Quality of Service
The IP network supports both voice and data equipment. This is why mechanisms have been developed
to give preference to voice frame transfer (voice frames must be transferred in real time) over data
frame transfer and to separate voice and data flows.
- 802.1p: Specifies the marking of level 2 frames of the ISO model to enable IP equipment to
process them according to the desired priority. High priority frames (voice) are processed before
low level frames (data) level 2 equipment,
- 802.1Q: Allows a VLAN (Virtual LAN) number to be defined to separate voice flow from data flow.
The principle is to define two separate VLANs containing the voice over IP equipment on one hand
and data equipment on the other hand. Each VLAN domain represents a broadcast domain. For
example, a broadcast message transmitted by an IP-Phone is only broadcast within the IP-Phone
VLAN and will not be received by data equipment (PC) which is part of a different VLAN.
- Diffserv: Allows a priority level to be assigned to level 3 frames of the ISO model.
For more information on QoS management, see module IP Overview - Management - QoS.
In the case of a Call Server on CS board or on Appliance Server, the link to Media Gateways is over IP.
From the Call Server side, there is an inter-shelf link over IP, the Call Server being the main shelf (shelf
0) and the Media Gateway being the peripheral shelf.
On an OmniPCX Media Gateway, the link is established on the GD board (rack controller board).
On an ACT Media Gateway, the link is established on an INT-IP B board. There may be one or two
INT-IP B boards: one is the active board and the other is the backup board.
.8 Ref.3EU19919ENAA Ed.03
A L C T E L
OmniPCX Main
Media INT-IP B
Gateway ACT Media
Backup Gateway
Call INT-IP B (M2 cabinet)
GD
Server
IP network
Remote IP link
A Call Server hosted on CPU5 or CPU6 board is linked with the main ACT boards via link C1 and a
group of shelves can be connected via a wired link (RT2, INTOF). There can also be remote ACT or
OmniPCX Media Gateways over IP (see module Topology - General information).
A gateway is used for the interconnection of two networks using different protocols e.g. an IP network
and the telephone network behind the PCX.
- another H323 gateway to be reached (for example: the IP board of an OmniPCX Office or
the H323 gateway of another manufacturer),
Important:
- in R5.0, the OmniPCX Enterprise H323 gateway function support only voice and data
communications (proprietary fax and T38 fax). Data communications (modem, TA and minitel) are
not supported,
- as from R5.1, ABC links over IP support transparent data communications.
The H323 gateway function is ensured by GA, GD and INT-IP A boards. The H323v2 standard
applies to exchanges.
Ed.03 Ref.3EU19919ENAA .9
A L C T E L
Node 1 Node 2
OmniPCX Office
GD GD
Call Server IP board
UAI
Call Server
H323 terminal
H323 calls are made using the E164 numbering scheme (standard dialing). E164 number translation
into IP addresses is carried out:
- module H.323: terminals, gateway, gatekeeper - General information on how to declare a H323
terminal and a gatekeeper.
8. Alcatel IP-Phones
- IP-Phones V1 and V1S: association of an UA3G (4020 or 4035) set and a TSC-IP V1 or TSC-IP
V1S adapter (see the module TSC-IP V1 (4098RE) - Hardware description and the module TSC-IP
V1S (4098FRE) - Hardware description).
For more information on implementing Alcatel IP-Phones, see the module IP-Phones - General infor-
mation.
9. Configuring IP equipment
- dynamically: the settings are automatically assigned by a DHCP server: used, for example, by the
GD and INT-IP B boards,
- statically: for example, for a GA board, the settings are assigned by the board management on
the PCX.
The DHCP server is an equipment that defines IP address ranges that are available to equipment that
requests them, with other information (TFTP server address) used to initialize equipment.
- internal: The Call Server has its own DHCP server that can be activated or not (see the module
DHCP Server - Functional description).
OmniPCX Media
Call ACT Media Gateway
Gateway
Server
GA GD INT-IP A INT-IP B
H323 gateway (internode link and
x x x
link to H323 equipment)
SIP Gateway x
Signaling transfer for IP-Phones x x x x
IP compression for H323, SIP and
x x x
IP-Phones
Remote IP link x x x x
Transparent modem/data (as from
x x x x
R5.1)
44A01F01000A160AAEN
IP Overview
Management
QoS
Edition: 03
1. Definitions
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
User Priority CFI VID: VLAN Identifier
- The User Priority field, on 3 bits, is described in the 802.1p standard. Possible values of this
field are:
The IEEE provides the following description for the seven traffic levels:
• 0: Best Effort traffic: traffic carried without constraint, as is the case today.
• 1: Background traffic: traffic liable to be carried on the network without any impact on the
users and applications.
• 2: Reserved for future use.
• 3: Excellent Effort traffic: traffic carried with optimum effort.
• 4: Controlled Load traffic: major applications traffic.
• 5: Video traffic: traffic requiring a transmission delay lower than 100 ms.
• 6: Voice traffic: traffic requiring a delay and jitter lower than 10 ms.
• 7: Network Control traffic: traffic required for network management.
- the CFI field (1 bit) indicates the presence of the RIF (Routing Information Field), used for Token
Ring frames transiting via an Ethernet network:
• 0 (default): RIF field absent.
• 1 : RIF field present.
- The VLAN Identifier field, on 12 bits (3 hexa digits), indicates VLAN No. Values 000, 001 and
FFF are reserved. A VID at 0x000 indicates that the TCI field contains only one priority data
item (only 802.1p is used).
0 1 2 3 4 5 6 7
DSCP Not used
The ToS/Diffserv field value is managed by MAO. For IP-Phones, IP and Call Server boards, manage-
ment is performed via Quality of Service categories.
For signaling on hybrid logical links over IP, the ToS value is managed separately.
For GD and INT-IP B boards, it is also possible to specify a priority level directly on the board. This is
used during board initialization to download binaries.
- Example 1 (TOS): in client routers/switches, the TOS field is to be used for VoIP flows and the
value to be used is 5. This means that the "precedence" mechanism is used.
To obtain the value to be entered on the Call Server:
• Convert the hexadecimal value to binary: 5 → 101,
• As the precedence level is coded on the first 3 most significant bits of the TOS field, add three
zeros to the previous result, as follows: 101000,
• Convert 101000 into decimal → 40.
40 is thus the value to be entered in the TOS/diffServ attribute.
- Example 2 (Diffserv): in client routers/switches, the TOS field is to be used for VoIP flows and
the value to be used is B8. This means that the “Diffserv” mechanism is used.
To obtain the value to be entered on the Call Server:
• Convert the hexadecimal value to binary: B8 → 10111000,
• Since IP marking only uses the first 6 bits of the TOS field, remove the last 2 bits from the
previous result as follows: 101110,
• Convert 101110 into decimal → 46.
46 is thus the value to be entered in the TOS/diffServ attribute.
Note: Whether TOS or Diffserv is used, the recommended value is 46.
2.2. IP-Phones
On IP-Phones, the Quality of Service category is linked to the IP domain. The Quality of Service cate-
gory previously modified must therefore be assigned to the IP domain of the IP-Phone.
Object name: IP > IP Domain
Attributes:
2.3. Boards
For INT-IP A, INT-IP B, Call Server, GA, and GD boards, the Quality of Service is managed in the
Ethernet parameters of the board.
Object name: Shelf > Boards > Ethernet Parameters
Attributes:
Note:
- For the Call Server, the Quality of Service category number is managed in the Ethernet parameters
of the virtual INT-IP A boards, located in shelf 19, in positions 1 and 2.
- For A4645 voice mail, the Quality of Service category number is managed on the Call Server in the
Ethernet parameters of the GD board, located in shelf 18, in position 0.
Warning: Changing the number of the IP Quality of service COS causes the board to be reset
automatically.
- Connect the 3BA 28112 cable to the front panel of the board.
- During the boot phase, press "Enter" to stop start-up and to access the IP configuration menu of the
board (this menu is used to specify the start mode of the board (static or dynamic), to configure
the IP parameters in static mode as well as the QoS parameters):
2.5. GD board
For voice calls and signaling, the values are managed via MAO as described above.
To download binaries, it is possible to specify a TOS/Diffserv value directly on the GD board before it
is started:
- Either, by using the mgconfig command, while logged onto the board with the root account:
Select 8. VLAN menu, then 6. Change Diffserv DSCP,
then reboot the board.
- Or, on one of the UA sets of the main shelf, if the GD board is started without an IP connection
cable to the LAN.
3. 802.1p/Q tagging
From R5.1, a VLAN number may be configured in the parameters of each subnetwork on the DHCP
server: it is used by IP-Phones initializing via the DHCP server. This avoids having to manually configure
each set.
802.1p/Q configurations must be mutually consistent (i.e VLAN number must be the same).
The VLAN value must also be managed in the same way at the level of the switch port to which the
device is connected.
Figure 3 : Example
Router
Switch Switch
- Priority level management is performed via MAO in the Ethernet parameters of the virtual INT-IP A
boards, (shelf 19, couplers 1 and 2).
Warning: If 802.1p/Q has not been activated by netadmin, priority level management via MAO
has no impact.
Operation
- Outgoing frames: when 802.1q tagging is enabled on the Call Server, outgoing frames are
tagged with the configured number.
- Incoming frames: all incoming frames are accepted, even if tagged with a different VLAN number
to that of the Call Server.
Frames leaving the Call Server have VLAN number set to 1, they are accepted by ports 2, 3 and 4 of
the switch.
Frames leaving telephone equipment (GD board, IP-Phone) have VLAN number set to 2, they are
accepted by ports 1, 2 and 3 of the switch.
Frames leaving the PC do not have a VLAN number. When they reach the switch, they are tagged with
VLAN 4 (primary port VLAN) and thus accepted by port 1.
Conclusion: The Call Server can dialog with telephone equipment and the PC, but telephone equip-
ment cannot dialog with the PC.
- If the voice mail service is on a dedicated CPU: activate 802.1p/Q and manage the VLAN number
by netadmin on this CPU.
Run the command netadmin -m, select 14. 'VLan configuration', then 2. 'VLan feature'
VLan Setup update
=================
Do you want to activate 802.1q frame tagging (y/n default is 'n') ? y
Enter the VLan ID to use (0-4094, default is 0): 3
- Manage priority level on the Call Server via MAO in the Ethernet parameters of the GD board,
(shelf 18, coupler 0).
Warning: If 802.1p/Q has not been activated by netadmin, priority level management via MAO
has no impact.
3.3. GD board
- VLAN number management must be performed directly on the GD board before board start-up:
• Either, by using the mgconfig command, while logged onto the board with the root account:
Select 8. VLAN menu, then 2. Change vlan id,
and, if necessary, 4. Change user priority.
then reboot the board.
• Or, on one of the UA sets of the main shelf, if the GD board is started without an IP connection
cable to the LAN.
- A priority level can be managed directly on the GD board, by using one of the two methods
described above.
- A priority level can also be managed via MAO: this level applies after board start-up for RTP/RTCP
flows, Call Server/GD signaling, IP-Phones GD and H323.
3.4. GA board
A Quality of Service category number must be managed at the level of the board Ethernet parameters,
and a VLAN number as well as a priority level in this category must be specified.
- VLAN number and, if necessary, priority level must be managed directly on the board when it
is started:
• Start the board as described in module ACT Media Gateway - Commissioning.
• Connect the 3BA 28112 cable to the front panel of the board.
• During the boot phase, press "Enter" to stop the startup and to access board IP configuration
menu:
• Type chqualto configure VLAN number and priority:
Config:chqual
UseDscp (0 no 1 yes) (default 0) :0
Use802 (0 no 1 yes) (default 0):1
Define Default Vlan ID parameter (between 0 and 4095) (default 0): 2
Define Default Priority parameter (between 0 and 7) (default 0): 5
Config:save
- A Quality of Service category number must also be managed at the level of board Ethernet
parameters and VLAN number and priority level in this category must be specified.
3.6. IP Phone
- VLAN number can be configured in two ways, depending on set startup mode:
a. Dynamic start: VLAN number can be directly assigned by the DHCP server at set initialization.
Note:
- VLAN number must be configured in each subnetwork's parameters when the DHCP server is
configured: See the module DHCP Server - Functional description - § Distributing VLAN ID by
DHCP and module DHCP Server - Management - § Creating the subnetwork.
- This VLAN configuration mode implies that switches accept untagged frames because, in
this case, the DHCP request is not tagged.
b. Static start: VLAN number must be assigned in the supervisor menu at set startup (only
possible on V1S and V2 sets):
To access the supervisor menu, at set initialization consecutively enter [i] or Menu, then #.
Select 2. IP Parameters, then 7. Default VLAN,.
By default, there is no managed VLAN, the display indicates: 1. tag disabled.
Enter 1, then enter VLAN number (0 to 4095), and confirm by typing # (to cancel, type *).
The display indicates, for example:
- Priority level and VLAN number are managed via the MAO.
3.7.2. IP-Phones
On IP-Phones, the Quality of Service category is linked to the IP domain. The Quality of Service cate-
gory previously modified must therefore be assigned to the IP domain of the IP-Phone.
3.7.3. Boards
For INT-IP A, INT-IP B, Call Server, GA, and GD boards, the Quality of Service is managed in the
Ethernet parameters of the board.
Note:
- For the Call Server, the Quality of Service category number is managed in the Ethernet parameters
of the virtual INT-IP A boards, located in shelf 19, in positions 1 and 2.
- For A4645 voice mail, the Quality of Service category number is managed on the Call Server in the
Ethernet parameters of the GD board, located in shelf 18, in position 0.
Warning: Changing the number of the IP Quality of service COS causes the board to be reset
automatically.
4. Summary
- Call Server: Manage a Quality of Service at the level of shelf 19, couplers 1 and 2. Specify in
this category the TOS/diffserv field (recommended value: 46).
- 4645 Voice mail: manage a Quality of Service at the level of shelf 18, coupler 0. Specify in
this category the TOS/diffserv field (recommended value: 46).
- GD Board:
• Configure TOS/Diffserv level via the mgconfig command (or via the UA set configuration menu).
• manage a Quality of Service category in board Ethernet parameters. Configure the
TOS/diffserv field for this category (recommended value: 46).
- GA Board: manage a Quality of Service category in board Ethernet parameters. Configure the
TOS/diffserv field for this category (recommended value: 46).
- INT-IP A Board: manage a Quality of Service category in board Ethernet parameters. Configure
the TOS/diffserv field for this category (recommended value: 46).
- INT-IP B Board:
• During the boot phase, configure the TOS/Diffserv level directly on the board, using the
chqual command.
• Manage a Quality of Service category in board Ethernet parameters and configure the
TOS/diffserv field for this category (recommended value: 46).
- IP-Phone: manage a Quality of Service category in the parameters of the domain assigned to
the board. Configure the TOS/diffserv field for this category (recommended value: 46).
Note: For an IP board, the Quality of Service category managed in the associated domain is not
taken into account. The category that counts is that specified in board Ethernet parameters.
- Call Server:
• Enable 802.1p/Q via netadmin.
• Specify a VLAN number via netadmin.
• Repeat the operation on the duplicated Call Server.
• Manage a Quality of Service category number in the Ethernet parameters of the INT-IP A virtual
boards (shelf 19, couplers 1 and 2), and specify the desired priority and VLAN number in
this category.
• If the voice mail service is on a dedicated CPU, activate 802.1p/Q and specify a VLAN number
on this CPU via netadmin.
• On the Call Server, manage a Quality of Service category number at the level of the shelf 18,
coupler 0; specify the desired priority and VLAN number in this category.
- GD Board:
• Specify a VLAN number and, if required, a priority level using the mgconfig command (or via
the configuration menu on a UA set).
• Manage a Quality of Service category number at the level of board Ethernet parameters, and
specify a VLAN number and priority level in this category.
- GA Board:
• Manage a Quality of Service category number at the level of board Ethernet parameters, and
specify a VLAN number and priority level in this category.
- INT-IP A Board:
• Manage a Quality of Service category number at the level of board Ethernet parameters, and
specify VLAN number and priority level in this category.
- INT-IP B board
• During the boot phase, specify a VLAN number using the chqual command.
• Manage a Quality of Service category number at the level of board Ethernet parameters, and
specify a VLAN number and priority level in this category.
- IP-Phone:
• For IP-Phones in dynamic initialization mode: Specify VLAN number in DHCP server parameters.
• For IP-Phones in static initialization mode: at set initialization, specify a VLAN number using
the supervisor menu.
• Manage a Quality of Service category number at the level of set domain and specify VLAN
number and priority level in this category.
Note: For an IP board, the Quality of Service category managed in the associated domain is not
taken into account. The category that counts is that specified in board Ethernet parameters.
44A01F01001A160AAEN
IP Overview
Management
Compression
Edition: 03
1. Introduction
- An algorithm without compression: G711, call throughput is then 56 kbps or 64 kbps, according
to the case. Coding can be performed following “A” law or “µ” law. G711 is recommended when
there is no bandwidth problem, e.g. on a LAN.
- The compression algorithm managed by default for the system: G723 or G729.
The following parameters are managed for the entire system, they must be homogeneous on all
network nodes.
2.2. Multi-algorithms
This parameter is used to make both the G723 and G729 algorithms simultaneously available on the
PCX. It is involved in building the list established for algorithm negotiation: if it set to "Yes", both the
G723 and G729 algorithms will be included in the list.
Object name: System > Other. System Param. > Compression Parameters
Attributes:
Attributes:
Note: The value of this parameter must be homogeneous on all network nodes.
Warning: If the system has V2 IP-Phones (e-Reflexes) in G711, this parameter must be left at "No".
Note: The value of this parameter must be homogeneous on all network nodes.
3. H323 Calls
An IP compression type is specified in the IP trunk group parameters. But this algorithm is not ne-
cessarily used for H323 calls. This is because, to ensure compatibility with the remote, the choice of
algorithm is the result of negotiation between the caller and called party. See § 5 : Negotiation me-
chanism.
Object name: Trunk Groups > Trunk Group
4. VPN hop on IP
An IP compression type is specified in the VPN overflow parameters. But, as is the case with H323
calls, the algorithm which is effectively used is the result of negotiation between the caller and called
party. See § 5 : Negotiation mechanism.
Object name: Inter-Node Links > VPN Overflow
Attributes:
Node X - Node Y : Enter the numbers of the VPN hop end nodes, starting with the
smallest (X<Y).
IP Compression Type : - Default: the system default algorithm is chosen in priority.
- G711: the G711 coding algorithm is chosen in priority.
Remark: VPN algorithm type is broadcast. If broadcasting is not set up, it must be managed in the
same way on each side of the link.
5. Negotiation mechanism
The negotiation mechanism is involved in H323 calls and VPN overflow on IP. It applies to the compres-
sion algorithm, to VAD, and to the quantization law (A or µ law). This negotiation varies depending
on operating mode:
1. The call is from a poor set: the following are listed in order:
• Poor set algorithm: G723 or G729.
• If different, trunk group algorithm (for calls to non OmniPCX Enterprise equipment) or
VPN hop algorithm.
• The complementary algorithm to the first algorithm, if multi-algorithm is set to "Yes".
2. The IP compression type of the trunk group or the VPN overflow is G711: the following are
listed in order:
1 The term poor set refers to a set belonging or linked to a board belonging to a poor domain.
The term poor domain is used to refer to a domain with a compressed type Extra domain coding
algorithm and a Max. No. of connections/domain of less than 10 000.
• Trunk group algorithm (for calls to non OmniPCX Enterprise equipment) or VPN hop
algorithm: G711.
• The system algorithm: G723 or G729.
• The complementary algorithm to the second algorithm, if multi-algorithm is set to "Yes".
3. The IP compression type of the trunk group or the VPN overflow is Default: the following are
listed in order:
• The system algorithm: G723 or G729.
• The complementary algorithm to the first algorithm, if multi-algorithm is set to "Yes".
In this case, G711 is not listed.
Trunk group or
Multi. Algorithms
Poor set algorithm VPN overflow IP List sent
for Compression
compression type
G723 G711 No G729 G723
G723 G711 Yes G723 G711 G729
G723 Default No G723
G723 Default Yes G723 G729
G729 G711 No G729 G711
G729 G711 Yes G729 G711 G723
G729 Default No G729
G729 Default Yes G729 G723
In this case, insertion of the set algorithm at the head of the list is to avoid the call being made in
partial direct RTP mode.
Example:
Domain 1
Intra-domain coding: G711
Extra-domain coding: G723
UA set
Direct RTP flow G723
WAN
IP network
Domain 0
Intra-domain coding: G711 Node 2
Extra-domain coding: G711
Trunk group or
System Multi. Algorithms
VPN overflow IP List sent
Compression type for Compression
compression type
G711 G723 No G711 G723
G711 G723 Yes G711 G723 G729
G711 G729 No G729 G723
G711 G729 Yes G711 G729 G723
Default G723 No G723
Default G723 Yes G723 G729
Default G729 No G729
Default G729 Yes G729 G723
- The list of algorithms that can be used (and sent) by the caller: referred to as the received list,
- The list of algorithms available on the OmniPCX Enterprise, built as described in § 5.3.1 :
Building the list: referred to as the Enterprise list.
The selection principle is as follows:
- The first algorithm in the received list that is also contained in the Enterprise list is selected.
- If there is no algorithm common to both lists and if G711 is included in the received list, G711 is
selected.
- If there is no algorithm common to both lists and if G711 is not included in the received list, the
call fails.
Table 7 : Examples
6. IP-Phones
The compression algorithm configured for an IP-Phone is applied for local calls and public network
calls set up from the set if it is a poor set. For other network calls, the set algorithm is not applied, the
algorithm is selected by the negotiation mechanism described above (see § 5.3.1 : Building the list).
2. At IP domain level, specify for all IP-Phones in the domain whether compression is to be used or
not, or whether the settings made at IP set parameters level are to be applied.
3. At IP set parameters level, specify whether compression is to be used or not for all IP-Phones.
4. On the PCX, compression type is specified for the entire PCX: G723 or G729.
In the case of an intra-domain call, the algorithm applied for the IP-Phone is determined as indicated
in the figure below.
Users
IP Domain
Coding algorithm:
INTRA-domain
- Default coding algorithm:
IP phone
parameters
Default coding
- Default
algorithm:
- Without
- Without compression: System
- Without G711
compression: parameters
compression:
G711 G711 - With compression Compression
type:
- With
- G723
compression
- With
compression - G729
In the case of an extra-domain call, IP-Phone settings are not involved. Only domain settings apply,
as indicated in the figure below.
IP Domain
EXTRA-domain
coding algorithm:
IP phone
parameters
Default coding
- Default
algorithm:
- Without compression: System
- Without G711 parameters
compression:
G711 - With compression Compression
type:
- With
- G723
compression
- G729
Algorithm selection: once the algorithm of the two domains (or of the two IP-Phones) has been
determined (according to the principle presented in the above two figures), the algorithm selected will
be that which uses the least bandwidth. If one of the two algorithms is G723 (or G729), the call will
be made in G723 (or G729). If both algorithms are G711, the call will be made in G711. See § 6.5
: Example.
6.1. IP Phone
Attributes:
6.2. IP domain
Attributes:
6.3. IP Phones
Attributes:
6.5. Example
A remote Media Gateway is accessible via a link whose bandwidth is restricted. To meet this constraint,
call compression on this link is mandatory: the extra-domain compression algorithm is set to With
Compression.
For intra-domain calls (that use the LAN), voice quality is given preference: the intra-domain compres-
sion algorithm is set to Without Compression.
- The call between B and E is compressed: the extra-domain algorithm has precedence over set
settings.
- The call between C and D is compressed because one of the two sets is configured with
compression.
Domain 0 Domain 1
Intra-domain coding: G711 Intra-domain coding: G711
Extra-domain coding: G723 Extra-domain coding: G723
G723 C (With
CS compression)
IP network
G723 G711
If the two Media Gateways belong to the same domain, the Intra-domain Coding Algorithm pa-
rameter is used.
If the two Media Gateways belong to two different domains, the Extra-domain Coding Algorithm
parameter is used. If the two domains are managed with a different algorithm, the call is made with
compression.
The table below lists bandwidth requirements according to algorithm, framing and network type.
Framing is the transmission period of voice packets on the network. It is always 30 ms for G723. It
can be 20 or 30 ms for G729 and G711. Selection is performed using the following parameter.
Attributes:
G723.1
Codec G 729A G 711
(MP-MLQ)
Bit rate 6.4 kb/s 8 kb/s 64 kb/s
Packet transmission period 30 ms 20 ms 30 ms 20 ms 30 ms
(framing)
RTP payload size (in bytes) 24 20 30 160 240
IP frame size (in bytes)2 64 60 70 200 280
Bandwidth at IP level 17.1 kb/s 24 kb/s 18.7kb/s 80 kb/s 74.7kb/s
Bandwidth at Ethernet level 27.2 kb/s 39.2 kb/s 28.8kb/s 95.2 kb/s 84.7kb/s
(Full Duplex Media)3
G723.1
Codec G 729A G 711
(MP-MLQ)
Bandwidth at WAN level 19.2 kb/s 27.2 kb/s 20.8 kb/s 83.2 kb/s 76.8 kb/s
without CRTP4
Bandwidth at WAN level with 9.1 kb/s 12 kb/s 10.7 kb/s 68 kb/s 66.7 kb/s
2-octet CRTP.45
44A01F01002A160AAEN
IP Overview
Management
Call Restrictions
Edition: 03
Several parameters are used to restrict voice calls on IP in order to adapt to the network's bandwidth.
Domain 0 Domain 1
max calls : 2
max calls : -1
Media Gateway
CS CS
IP Network
Allocated links
128 kbit/s
2 calls max
Call
IP-Phones IP-Phones
prohibited
Object name: Shelf > Board, attributes: No. of Compressors for Gateway and Nb Compres-
sors for IP Devices
These two parameters are used to assign certain compressors of a board to the Gateway H323 function
and others to calls to IP-Phones and Media Gateway.
Example: to take into account the bandwidth of the link between nodes 1 and 2, the number of calls
is limited to 5. On the boards which support the logical link, the maximum number of compressors
for the Gateway function is managed at 5.
Node 1 Node 2
Nb calls for Gateway : 5
Nb calls for Gateway : 5 Nb calls for IP-Phones :2
Nb calls for IP-Phones :19
CS
CS
IP-Phones IP-Phones
Restrictions:
- if the direct RTP in network is validated, the allocation of compressors is dynamic, the restriction
of calls on the logical link is therefore no longer possible with these two parameters. In this
case, the sum of the two parameters defines the sum total of compressors that can be used
simultaneously on this board.
- If the same board supports the links to several nodes, the restriction can only be applied globally
at the start of a node and not according to the direction.
Warning: The time intervals of the IP trunk group T0/T1/T2 access must never be modified.
Object name: Inter-Nodes Links > VPN Overflow, attribute : Maximum number of IP calls
See also module VPN overflow - Functional description - § Limiting VPN calls.
Managing the maximum number of IP calls on a VPN hop is used to restrict the number of calls between
two given nodes. Indeed, inter-node calls are performed by VPN overflow.
Example: with 3 nodes interconnected by ABC links on IP.
Between the node 1 network and the node 2 network, the IP link is restricted to 5 calls.
Between the node 1 network and the node 3 network, the IP link is restricted to 10 calls.
There is no direct IP link between the IP networks of nodes 2 and 3.
To take into account these constaints, the number of calls on the logical links is restricted, by managing
a maximum number of calls by VPN hop, as indicated in the figure below.
Node 1 Node 2
Max Nb VPN hop 1-2 : 3 Max Nb VPN hop 1-2 : 3
Max Nb VPN hop 1-3 : 8 Max Nb VPN hop 2-3 : 2
IP link 5 log. link 1-2 :
calls max 3 calls max
CS
CS
IP link 10
calls max log. link 2-3 : Node 3
2 calls max CS Max Nb VPN hop 1-3 : 8
log. link 1-3 : Max Nb VPN hop 2-3 : 2
8 calls max
44A01F01000A980AAEN
IP Overview
Appendix
H323 standard
Edition: 03
1.1. Generalities
H323 is part of the H32x series of standards dealing with video conferencing over different networks. It
is an extension of standard H320 (video conferencing on ISDN (Integrated Services Digital Network)),
as is standard H324 (video conferencing on PSTN (Public Switched Telephone Network), H323 being
the standard describing video conferencing on the LAN.
Standard H323 provides for voice/data convergence around IP protocol.
H323 is the internationally adopted standard (approved in 1996) for real-time multimedia communi-
cations (audio, video and data) over a network. H323 is adapted for voice transmission on IP
It provides a common protocol enabling communications software to operate together.
This standard was developed by the International Telecommunications Union (ITU) for networks not
guaranteeing a quality of service (QoS ): IP and IPX on Ethernet, Fast Ethernet and Token Ring.
This standard is intended for LAN and, in the future, for INTERNET.
It concerns call control, multimedia management, management of the bandwidth and the interfacing
between the LAN and the other networks.
G7XX H26X
H225 H245 T120 RTCP
RTP
TCP UDP
IP
H323 can be implemented regardless of the physical medium and the layer 2 protocol used:
- WAN: ATM
- LAN:
• FDDI (optical fibres),
• Ethernet,
• etc.
The H323 architecture comprises:
- signalling,
- control,
- data.
The H323 protocols associated with TCP are:
- H225 handles signalling between 2 stations during connection establishment. This is a signalling
protocol based on Q931.
- H245 handles call control. This protocol handles the negotiation of channel opening and
communications parameter establishment. It determines whether the communication is audio or
video and/or data and which type of compression is to be used.
- Audio,
- Video.
The H323 protocols associated with UDP are:
- RTP (Real Time Protocol). By using RTP, H323 guarantees good transmission conditions for audio
and video flows. RTP adds a header to each packet. This header contains:
• time stamp,
• order number.
RTP allows to:
• eliminate any packets received twice,
• put the packets back in order,
• synchronize the audio, video and data.
RTP is associated with RTCP control protocol.
- G711: does not allow for optimal compression. It is used for transporting voice at a throughput
between 56 and 64 Kbps.
H323 imposes at least G711 compression even though G711 was essentially designed for a
constant throughput network (ISDN type) rather than a variable throughput one (e.g.: LAN).
- G723: The compression mode present in the G723 CODEC is used to transport voice at
throughputs of 5.3 Kbps or 6.4 Kbps, namely a throughput 10 times less than the one proposed
by G711.
Voice quality is variable and is slightly below that of public telephony.
- G729: This CODEC is the one which best meets the VoIP applications.
It uses slightly more bandwidth than G723 (8/13 Kbps). Voice quality is close to telephone quality.
Video CODECs are:
- H261: H261 is used to transport video at throughputs equal to or higher than 64 Kbps.
- H263: H261 is used to transport video at throughputs equal to or less than 64 Kbps.
- the terminal,
- the Gateway,
- the Gatekeeper,
- The multipoint control unit or multipoint controller (MCUs - MC: Multipoint Controller, MP:
Multipoint Processor).
- a PC,
- a telephone set,
- H245 protocol,
PCM Ethernet
(e.g.: T2) Gateway
- Restrict bandwidth (if need be) and handle the traffic on the LAN.
- Translation of the H323 addresses of the users into IP addresses. The H323 addresses of the users
can be telephone number type or e-mail address type.
Its presence in an H323 network is not mandatory. However, if there is one, all the H323 terminals must
use it. For this, the H323 standard proposes a signalling type: RAS (Registration Admission Status).
1. Network to Network
H323 Terminal H323 Terminal
e.g.: netmeeting e.g.: netmeeting
Intranet
2. Network to Telephone
H323
Terminal
e.g.: netmeeting
H323 Telephone
Intranet gateway network
3. Telephone to Telephone
H323 H323
gateway
Intranet gateway
2.1. IPv4
0 31
Version Length Service type Total length
Identification Flags fragment re-allocation
Lifespan Protocol Header control
Source IP address
Destination IP address
Further IP options Jam
Data
..........
Description of fields
- Version
The version field allows the sender, recipient, router to agree about the structure of the datagram.
The machines reject the datagrams if the version of their IP software is different from the IP data-
grams received. The value is 4.
- Length
The length field defines the header of the IP datagram. The header fields are fixed except for the
IP options and stuffing fields.
- Type of service
0 7
Priority D T R Unused
• Priority
"Priority" indicates the priority of a datagram (0= normal priority, ..., 7= network supervision).
As a rule, the machines and routers ignore this field. It is used to ensure that control information
takes priority over data. This is used for congestion control.
• Bit "D"
indicates the type of routing. If D=1, then there will be a short routing delay.
• Bit "T"
indicates a high throughput request.
• Bit "R"
indicates a high reliability request.
- Total length
The total length field defines the total length of the IP datagram (header plus data).
- Identification
The identification field is used to identify the fragment. It allows the recipient to reassemble the
fragment.
- Flags
• the first low-order bit is called the “non fragmentation bit”. If bit=0, then there will be no
fragmentation. An application can inhibit fragmentation to ensure the integrity of the datagram.
• the second bit is called “data to come”. If bit=1, then there are data to come.
- Life cycle
The life cycle field indicates, in seconds, the maximum duration of datagram transit. The routers
decrement this counter. When a datagram is destroyed, an error message is generated (ICMP). This
field is used to avoid having a datagram loop endlessly over the network.
- Protocol
The protocol field indicates the type of higher layer protocol used (TCP=6; UDP=17; ICMP=1, etc.).
- Header control
The header control field ensures the integrity of the header content. The checksum is only carried
out on the header. This is used to reduce the processing time of the IP datagrams at router level.
- IP Options
Allows to make tests, upgrading.
- Stuffing
Allows the header to be multiple of 32.
- Data
Indicates the content of upper layers.
2.2. IPv6
0 31
Description of fields
- Version
The version field allows the sender, recipient, router to agree about the structure of the datagram.
The machines reject the datagrams if the version of their IP software is different from the IP data-
grams received. The value is 6.
- Flow label
The flow label field (with priorities) replaces the IPv4 datagram type of service field. It increases its
possibilities by making possible acceptance in the routers of the quality of service. This field has
been extended to meet the constraints of real-time services.
- Total length
The total length field defines the total length of the IP datagram (header plus data).
- Next header
Extension possibilities for the headers and options exist via the next header field (8 bits). This field is
used to organize the information elements, indicating the protocol entity to be invoked in order to
process the next envelope. This field appears at the start of each option header. In IPv6, the options
are stored in additional headers located between the IPv6 header and the transport packet header.
There is a small number of header extensions, each one identified by a separate next header value.
An IPv6 datagram can contain a variable number of additional headers. Most of the options in the
headers are neither examined, nor processed by the intermediary routers. Unlike IPv4, the options
can have a random length; there is no limit on the size. Each additional header has a length which
is a multiple of 8 bytes.
- Life cycle
The life cycle field indicates, in seconds, the maximum duration of datagram transit. The routers
decrement this counter. When a datagram is destroyed, an error message is generated (ICMP). This
field is used to avoid having a datagram loop endlessly over the network.
Voice is transported in the RTP/RTCP sessions above UDP. The RTP protocol is used to encapsulate the
data packets. The RTCP protocol is used to control line quality.
RTP provides a point-to-point delivery service for data with real-time characteristics (voice, video).
15 0
PT M CC X P Version
Sequence number
Time stamping (LSB)
Time stamping (MSB)
SSCR (LSB)
SSCR (MSB)
CSCR (LSB)
CSCR (MSB)
........
Description of fields
- PT
Payload Type. The PT (payload type) field identifies the format of the data field and determines how
it is interpreted by the application.
- G711 law µ 0
- G711 law A 8
- G723.1 4
- Noise Comfort 13
- G729A 18
- Bit "M"
Bit “M” is used to define specific events.
- CC
CSRC Count. the CSRC number identifies what follows the header. This number is greater than 1
if the RTP packet data contain data from several sources (in the conferencing case, for example).
- Bit "X"
Used for a future extension.
If the value is 1, this means that the header is followed by an extension header.
- Bit "P"
Bit “P” specifies the presence of a stuffing field at the end of the packet (not used at present).
- Version
- Sequence Number
The sequence number field increases by 1 with each RTP packet sent. It can be used by the recipient
to detect lost packets and to restore the packet sequence.
- Time stamp
The time stamp field specifies the time when the RTP packet was formatted. When frame exchange
is constant, this field is used to synchronize the RTCP and RTP packets.
- SSCR
Source Synchronization. The SSCR (Synchronization Source) field defines the identification of the
source synchronization. It is a value chosen at random to distinguish the synchronization sources
within a same RTP session.
- CSCR
Contributing Source. The CSCR (Contributing Source) field informs the sources intervening for the
data field contained in this packet. The contributor number is given by the CC field.
In the first step, the fields used are the PT, sequence number and SSCR fields.
RTP is an IP-based protocol allowing transfer of data such as video or audio flows in real-time. RTP
provides the scheduling and timing devices required by multimedia transmissions.
RTCP is used with RTP to control the latter. Two types of RTCP packets can be generated in order to
monitor the QoS of a multimedia data transmission in real-time:
- RR (Receiver Report):
Return on the data reception quality.
• highest packet number received,
• number of packets lost,
• inter-arrival jitter,
• time stamps to calculate round-trip.
- SR (Sender Report):
Reception quality (RR) + transmission specific information:
• inter-media synchronization,
• cumulative packet counters,
• of bytes sent.
This protocol is therefore used to assess the QoS level of a transmission in both directions (transmis-
sion/reception). It is used to monitor the QoS for the VIP PC product.
(M) = Mandatory.
4. Voice quality
- Service Availability
Average availability of a service over a given period. This must be the maximum and as close as
possible to the "five nines" rule (99.999%) which is the telephony norm.
- Delay
Time between the transmission of a packet and its reception over the network. In the case of voice
and video interactive applications, the appearance of delays may give the impression that the system
is not responding.
- Jitter
Jitter presents the variation of the end-to-end transmission delay. High levels of jitter are not accep-
table for applications running in real-time.
This results in signal distortion, requiring the introduction of additional delays necessary for packet
re-assembly, thus making it very difficult to propose interactive sessions.
- Throughput
The throughput is the maximum transfer rate that can be attained between two points in a network.
It is not only limited by the physical infrastructure of the path followed (which nonetheless indicates a
theoretical limit), but also by the quantity of miscellaneous traffic sharing the common components
of the selected path.
- Bandwidth Conservation
This involves restricting total traffic so that the network operates more efficiently, by using techniques
such as IP multicast, data compression, allocation of bandwidth on demand, etc.
- Traffic Prioritization
Each packet sent over the network has an associated priority level used by the network equipment
responsible for transmission. This technique is founded on the fact that certain types of traffic are
deemed more important than others.
4.3.1. 802.1p
The 802.1p standard is used to assign levels of priority to the ISO model layer 2 frames (Link). The
standard defines the following parameters:
- 802.1QPpriority: defines the priority level allocated to the datagram, 0 being the lowest priority
level, 7 being the highest priority level. Thus in the level 2 switching equipment, the datagrams
with the highest priority level are processed before the datagrams with the lowest priority level.
- 802.1QvLAN: defines virtual LAN domains. Thus the level 2 switching equipment disable
inter-vLAN communications. Thus closed user groups are created. Then the inter-vLAN
communications require routers configured as inter-vLAN gateways.
- 802.1Qsubnet: defines the sub-network type. This parameter is not used in the PCX.
Warning: Not all switching equipment process the 802.1Q standard. Some of them even ignore it
and consider this field when present as an error. The corresponding datagrams are then erased.
- Round-Trip (RT)
Duration between the transmission and reception of a network message. RTmax =0.5s
RTmax =0.5 s.
Command Remark
ipconfig indicates the IP address of the machine, its subnetwork mask and the
address of the default gateway.
ping tests the connectivity to a remote machine.
Command Remark
telnet used to connect to any port on a remote server. This means it is
possible to check the response of a service to the connection on
the corresponding port.
tracert indicates the route used by IP datagrams to reach a remote machine.
netstat displays all the connections established on a server.
route access to the IP routing tables of a machine.
arp access to the Ethernet IP addresses translation tables (MAC
addresses).
44A01F01000A015AAEN
IP Overview
Glossary
Edition: 03
1. A
10Base T A variant of Ethernet, connecting stations via twisted pair cabling (shielded or
unshielded) wiring at 10Mbps.
10Base F A variant of Ethernet which runs on optical Fiber (mono-mode or umti-mode) at
10 Mbps.
100Base TX A variant of Ethernet which runs on Category 5 unshielded twisted pair wiring at
100Mbps. This is one version of Fast Ethernet.
100Base FX A variant of Ethernet which runs on optical Fiber (mono-mode or multi-mode) at
100 Mbps.
1000Base T A variant of Ethernet, connecting stations via twisted pair cabling at 1 Gigabit.
1000Base LX A variant of Ethernet, connecting stations via Long-wawe optical fiber at 1 Gigabit
1000Base SX A variant of Ethernet, connecting stations via Short-wawe optical fiber at 1 Gigabit
802.x The set of IEEE standards defining LAN protocols
AAL ATM Adaptation Layer Corresponds to a service-dependant sublayer of the
dala-link layer. The AAL accepts data from different applications and provides it to the ATM layer in
48 bytes payload segments. AALs differs depending on the service required : e.g Constant Bit Rate or
Variable Bit Rate. The ITU recommends four types of AALs : AAL1, AAL2, AAL3/4, AAL5.
AAL1 ATM adaptation layer 1 used for connection oriented, delay-sensitive service
requiring constant bit rate like voice.
ACELP Algebraic-Code-Excited Liner Pediction Analog to digital coding providing good
voice quality at only 8 kb/s. Has been standardized by the ITU in G729 as CS-ACELP.
Access Control Method This is the main distinguishing feature between different LAN technologies. It
regulates each workstation’s physical access to the cable (transmission medium), and determines the
order in which nodes gain access so that each user gets efficient service. Access methods include
token passing, which is used in token ring and FDDI, and Carrier Sense Multiple Access with Collision
Detection (CSMA/CD), which is employed by Ethernet and Fast Ethernet.
ACL Access Control Lists Rules for packet filters (typically routers) that define which
packets to pass and which to block.
Access Router A router that connects your network to the external Internet. Typically, this is your
first line of defense against attackers from the outside Internet. By enabling access control lists to
this router, you’ll be able to provide a level of protection for all of the hosts « behind » that router,
effectively making that network a DMZ instead of an unprotected external LAN.
ADPCM Adaptative Differential Pulse Code Modulation Analog to digital coding providing
high-quality digital signals at 32 kb/s or 16 kb/s.
ADSL Asymmetric Digital Subscriber Line By using the latest technology in DSP, bitrates
of over 8 Mb/s (downstream) and 800 Kb/s (upstream) are possible over the existing telephone
network. The telephone traffic and the Internet traffic are separated by a filter allowing simultaneous
use of the telephone and the Internet service.
AH Authentication Header Part of the IPSec protocol suite. It is the header used in
IPSec-compliant IP packets to carry authentication data permitting verification of the sending party.
ANT ADSL Network Termination (ADSL Modem)
Application-Level Firewall A firewall system in which service is provided by processes that maintain
complete TCP connection state and sequencing. Application level firewalls often re-address traffic so
that outgoing traffic appears to have originated from the firewall, rather than the internal host.
ARP Address Resolution Protocol Used to translate an IP address to an ethernet
physical address.
ARPA : Advanced Research Project Agency
ASP Application Service Provider
ATM Asynchronous Transfer Mode A high speed, connection-oriented switching
and multiplexing technology for transmitting information across a WAN or a LAN. ATM divides
information into fixed-length cells of 53 bytes capable of transmitting different types of traffic
simultaneously, including voice, video, and data. Fixed-length cells allows cell processing to be done
by the hardware, thereby reducing transit delays.
2. B
Backbone LAN or WAN connectivity between subnets across a high-speed network. Fiber
optic cable is often used.
BACP Bandwith Allocation Control Protocol Is the associated control protocol for BAP.
Bandwith reservationProcess of assigning or allocating bandwith to users or applications in a network
based on priority in order to make the best use of available bandwith.
BAP Bandwith Allocation Protocol Can be used to manage the number of links in a
multi-link bundle. BAP defines datagrams to coordinate adding and removing individual links in
a multi-link bundle, as well as specifying which peer is responsible for various decisions regarding
managing bandwith during a multi-link connection.
BAS Broadband Access Server
Bastion Host A system that has been hardened to resist attack, and which is installed on a
network in such a way that it is expected to potentially come under attack. Bastion hosts are often
components of firewalls, or may be « outside » web servers or public access systems.
BGP Border Gateway Protocol BGP4 is a replacement for older EGP Based on RFC
1771
BOD Bandwith on Demand
BOOTP Like DHCP, BOOTP provides an IP address to a client and also a file name
in order to boot with TFTP.
BRAS Broadband RAS (idem as BAS)
BRI Basic Rate Interface ISDN interface composed of two B channels and one D
channel. A throughput of up to 128Kb/s is possible.
Broadcast A service in which information is sent from a central source to multiple
destinations.
3. C
Cable modem Via the cable network, bitrates up to 10Mb/s (downstream) and 28..768 Kb/s
(upstream) are possible.
CAR Commited Access Rate CAR, a function of CISCO « switch routers », allows
static banwith management by limiting the amount of bandwith consumed on a link by any given
application . Provides a minimum or a maximum bandwith for a specific type of traffic flow.
CAS Channel Associated Signaling A type of in-band trunk signaling.
CBQ Class-Based Queuing Is a public-domain scheme which divides all user traffic
into categories and assigns bandwith to each class. The classes themselves can be established by
configuring CBQ by combinations of IP address, protocols such as TCP or UDP and ports that
represent the applications such as file transfer, Web access and so on.
CCP Compression Control Protocol
CCS Common Channel Signaling A type of out-of-band trunk signaling (for example,
using Primary Rate Interface) in which a control channel carries signaling for separate voice and data
channels. In CCS signaling is passed in messages.
CDDI Copper Distributed Data Interface
CELP Code –Excited Linear Prediction An analog to digital voice coding and
compression scheme used in transmission of voice over data networks.
CGI Common Gateway Interface
CHAP Challenge-Handshake Authentication Protocol Is a more secure procedure for
connecting to a system than the PAP. It avoids the password to be sent over the link as in PAP.
CIDR Classless Inter-Domain Routing Based on RFC 1519
CIR Commited Information Rate Average rate of information transfer a subscriber
(for example the network administrator) has stipulated for a Frame Relay PVC.
Circuit Switching A method of communication whereby a circuit is held open and maintained
only while the sender and recipient are communicating. This is different from a dedicated circuit
which is held open regardless of wether data is being sent or not, and different from a datagram /
connectionless network, in which data flows without establishing a connection.
CLNS Connection Less Network Services This type of service allows information to be
transferred over a network without having to set up and end-to-end connection before information is
sent.
CODEC Coder-decoder Technique of transforming analog voice into a digital bitstream
and vice versa; also used to indicate the compression type (for example, G.729 CODEC).
CONS Connection Oriented Network Services A connection-oriented service in a
network is one in which a connection has to be set up between the source and destination before the
communication can proceed.
COPS Common Open Policy Services Being standardized by the IETF, aims to manage
multiple network equipments from a central policy server.
CoS Class of Service In the 802.1p specification, COS uses 3 bits in the LAN frame
header to assign seven priority levels to LAN frames. Cos levels can be mapped to IP type of service
(ToS) levels or supported in routers with a number of other mechanisms.
CPE Customer Premises Equipment Is the end-user’s home equipment. It can concern
residential users or corporate users.
CSMA/CD Carrier Sense Multiple Access with Collision Detection A contention-based
network access method in which any computer may attempt to communicate at any time. Since there
is no centralized force controlling the medium, a device must first sense wether or not the medium is
in use. If the medium is unused, the device then transmits. If two computers sense that a channel is
open and transmit at the same time, the result is a collision, after which there is a random pause
determined individually by each transmitting machine. Each machine then senses the line again and,
if it is available, retransmits.
CRC Cyclic Redundancy Check Error checking technique
CRM Customer Relationship Management
CRTP Compression for RTPheader CRTP is a hop by hop compression similar to TCP
header compression. CRTP reduces the IP/UDP/RTP header to 2-4 bytes.
4. D
Datagram A form of packet switching in which the packets that make up a conversation
do not all take the same path through the network, thus improving the robustness and security
of the network.
DES: Data Encryption StandardA symetric encryption algorithm. DES uses a 56-bit key. DES has the
advantage that is is easily implemented in hardware but its keyspace may not be large enough for
continued use.
5. E
6. F
FTP File Transfer Protocol Is a standard protocol within the TCP/IP protocol suite,
which is the simplest way to exchange files between computers.
7. G
8. H
H225 Performs the signalling for call control. Defines a much larger set of capabilities
than those used in systems concerned only with voice traffic. H225 itself uses messages defined in
H245 to establish and terminate individual logical channels for audio. H225.0 corresponds to the
RAS signaling function (see H323 RAS).
H235 Securisation and authentication of recording sequences for H323 Gatekeeper.
H323 An ITU standard for multimedia communication (voice, video and data) over
connectionless networks that do not provide a guaranteed quality of service such as IP based network.
It addresses call control, media management, and bandwith management for point-to-point and
multipoint conferences. It refers to a set of other standards (H.245, H.225.0, and Q.931) to describe
its actual protocol.
H323 RAS Registration, admission, and status. The RAS signaling function performs
registration, admissions, bandwidth changes, status, and disengage procedures between the VoIP
gateway and the gatekeeper.
H450 This corresponds to the supplementary services associated to H323 version
2 (similar to QSIG).
HDLC High-Level Data Link Control A bit-oriented synchronous data-link layer protocol
developed by ISO. HDLC specifies a data encapsulation method on synchronous serial links using
frame characters and checksums.
HTML Hypertext Markup Language. A form of page description language used in
the World Wide Web.
HTTP Hypertext Transfer Protocol Is the set of rules for exchanging files (text, graphic
images, sound video, and other multimedia files) on the Web. Relative to the TCP/IP suite of
protocols, HTTP is an application protocol.
HTTPS Is a Web protocol developped by Netscape and built into many browsers
that encrypts and decrypts user page requests as well as the pages that are returned by the Web
server. HTTPS is really just the use of the Secure Socket Layer as a sublayer under the regular HTTP
application layer.
Hub The center of a star topology network or cabling system. Typically used in older
Ethernet and token ring networks. A device connected to a hub receives all the transmissions of all
other devices connected to that hub. Hubs are now being replaced in many cases by LAN switches.
9. I
IEEE 802.2 A data link standard outlining how basic data connectivity over cable should be
set up. Used with the IEEE 802.3, 802.4 and 802.5 standards.
IEEE 802.3 The IEEE’s specification for Ethernet, including both physical cabling and
layer-two protocol.
IEEE 802.3ad Specifies link aggregation
IEEE 802.4 Specifies the Tken Bus protocol
IEEE 802.5 Specifies the Token Ring protocol
IEEE 802.11b Direct sequence standard for WLAN in the 2,4 GHz frequency range. Maximum
throughput is 11Mbit/s
IETF Internet Engineering Task Force Task force consisting of over 80 working groups
responsible for developing Internet standards.
IGMP Internet Group Management Protocol Is used in case of multicast streams
IGP Internal Gateway Protocol
IGRP Interior Gateway Routing Protocol
IIS Internet Information Server
IKE Internet Key Exchange Part of the IPSec protocol suite. IKE is the current IPSec
standard for SA rules negotiation, key management and key exchange.
IMAP4 Internet Message Access Protocol 4 With IMAP, you view your e-mail at the
server as though it was on your client computer. An e-mail message deleted locally is still on the
server. E-mail can be kept on and searched at the server. Nethertheless, applications using IMAP
sometimes include a synchronize function to download new mails onto a PC and to upload new
mails towards a mail-server.
Internet The Internet is a global information system constructed by interconnecting
thousands of networks which are logically linked by a global system of unique addresses based on
the Internet protocol (IP). It supports communications using the TCP/IP suite in order to provide
public or private high level services.
Intranet The term intranet refers typically to a corporate network which uses the same
technology that is behind the Internet. Intranets can run over private WAN networks or public
networks such as the Internet.
IP Internet Protocol The layer-three protocol used in TCP/IP set of protocols which
support the Internet and many private networks. IP provides a connectionless datagram delivery
service for transport-layer protocols such as TCP and UDP. IP provides also features for addressing,
type-of-service specification, fragmentation and reassembly, and security. IP is defined in RFC 791.
IPv4 Currently used IP version.
IP v6 the proposed next generation standard for IP addresses, incorporating IPSec
security features and other additions. Ipv6 addresses are 128 bits wide.
IP addressing Each computer (known as a host) has at least one address that uniquely identifies
it from all other computers on the Internet.
telecommunications industry. The fundamental standards for ATM have been defined and published
by the ITU (previously CCITT).
10. J
Jitter A short term timing deviation It’is one of the three major concerns when carrying
Voice over IP. It corresponds to the variation in the delay between packets.
11. K
12. L
L2F Layer 2 Forwarding Is a protocol that allows corporations to extend their own
corporate network through private « tunnels » over the public Internet. L2F is a proposed standard
sponsored by CISCO systems.
L2TP Layer Two Tunneling Protocol Is a standard that combines the best features of two
existing tunneling protocols : CISCO’s L2F and PPTP.
LAN Local Area Network A group of computers and other devices dispersed over a
relatively limited area and connected by a communication link that enables any device to interact
with any other on the network. The LAN corresponds to the network inside the enterprise.
LCP Link Control Protocol Used by PPP for the negociation of the communication
parameters : authentication method, maximum receive unit,…
LDAP Lightweight Directory Access Protocol Protocol for access to directory services
managed by a directory server. Informations about hosts, users (e.g. authentication, access
information), traffic handling policy (QoS) can be managed by a directory server.
LL Leased Line
13. M
14. N
NAS Network Access Server NAS are devices composing a POP. They can be connected
to different kind of networks and interfaces such as PRI, BRI, ATM, Ethernet … A point-to-point
connection is established between the Internet user and the NAS which will route the packets to
the correct interface.
NAT Network Address Translation Is the translation of an IP address used within one
network to a different IP address known within another network. Typically, a company maps its
local inside network addresses to one or more global outside IP addresses and unmaps the global
IP addresses on incoming packets back into local IP addresses. It allows to share a single address
between multiple equipments, and to connect them all to the Internet at the same time.
NCP Network Control Protocol Used within PPP to negotiate the network protocol
options.
NetBEUI Network Bios Extended User Interface In charge of transport functions (level 4
ofOSI model). Used in particular in case of IBM PC networks.
NetBIOS Network Basic Input/Output System
NFS Network File System
NMC Network Management Centre
NNTP Network News Transfer Protocol Is the predominant protocol used by computers
(servers and clients) for managing the notes posted on Usenet newsgroups.
NTP Network Time Protocol NTP is a UDP-based protocol used for synchronizing a
set of network clocks using a set of distributed clients and servers. Implementation is based on RFC
1305. Simple NTP is documented in RFC 2030.
15. O
16. P
Packet A packet is the basic unit of transmission under IP. Data streams are broken
into packets by the transmitting machine, passed through the network and then reassembled
at the receiving end.
Packet filtering The ability of a bridge, router or gateway to limit propagation of packets between
two or more interconnected networks.
Packet switching A communications method in which variable-length packets are individually
routed between hosts.
PAP Password Authentication Protocol Is a procedure used by PPP servers to validate a
connection request. Passwords are sent in clear text without security and the originator can make
repeated attempts to gain access. For these reasons a server that supports CHAP will offer to use that
protocol before using PAP.
PAT Port Address Translation
Payload Refers to the portion of a packet following the header.
PCM Pulse Code Modulation
PDU Protocol Data Unit
PoP Point of Presence The node at which an ISP connects a subscriber to the Internet.
To give individual access at the lowest rate possible, dial-in facilities (a POP) are installed by the
Internet Service Provider (ISP) in every telephone area. A POP consists of one or more NAS.
POP3 Post Office Protocol version 3 Is the most recent version of a standard protocol
for receiving e-mail. POP3 is a client-server protocol in which e-mail is received and held for you
by your Internet server. This protocol includes commands to login, logout, fetch messages and
deletes messages. The point of the POP is to transmit the E-mails from the E-mail server towards the
user s PC to be read later.
Port Number Fields of the TCP and UDP header which identifies the source and destination
application program . Is coded on 2 bytes.
POTS Plain Old Telephone Set (System) The basic telephone service supplying standard
single-line telephones, telephone lines, and access to the public switched telephone network.
PPP Point to Point Protocol An Internet protocol which is used to connect serial terminal
devices, usually over dial-up lines. PPP (Point-to-Point Protocol) is a protocol for communication
between two computers using a serial interface. PPP is a full-duplex datalink protocol that can be
used on various physical media, including twisted pair or fiber optic lines or satellite transmission.
It uses a variation of High Speed Data Link Control (HDLC) for packet encapsulation. The PPP
protocol handles : error detection, support of multiple protocols (IP, IPX, …), dynamic IP address,
authentication of the user.
PPPoE PPP over Ethernet Primarily deployed in DSL environments. Allows authentication,
control of the connection in case of a connection to an ISP through Ethernet. PPPoE leverages existing
Ethernet infrastructures to allow users to initiate multiple PPP sessions within the same LAN.
PPTP Point to Point Tunneling Protocol Is a layer 2 tunneling protocol based on PPP that
allows corporations to extend their own corporate network through private « tunnels » over the public
Internet. PPTP is a proposed standard sponsored by Microsoft and other companies.
PQ Priority Queuing
PRI Primary Rate Interface ISDN interface composed of 30 B channels and one D
channel. A throughput of up to 2Mb/s is possible.
Proxy A software agent that acts on behalf of a user. Typical proxies accept a connection
from a user, make a decision as to whether or not the user or client IP address is permitted to use
the proxy, perhaps does additional authentication, and then completes a connection on behalf
of the user to a remote destination.
17. Q
QoS Quality of Service Quality of service means the ability of networks to guarantee
and maintain certain performance levels for each application, according to the specified needs of
each user. It will consist in a special type of treatment applied to a flow of traffic or for a certain user
e.g. Regarding VoIP, Quality of service will help to reduce transit delay, jitter and ensure bandwith
needs.
18. R
application. It delivers QoS requests to all nodes along the path (s) of the flows and establish
/maintain state of the requested service. RSVP also includes provisions for constraining packet
delay and guaranteeing bandwith availability , but on a managed corporate IP network, only the
prioritization feature needs to be used. RFCs : 2210, 2209, 2208, 2207, 2206, 2205
RTP/RTCP Real-time Transport Protocol / Real-time Transport Control Protocol This provides
the media stream packetization and synchronization for all data networks.
19. S
Subnet A portion of a network in which all stations share a common subnet address.
Subnet Mask Used to subdivide a network into subnets. Defines the number of bits borrowed
for the subnet address. The mask is 32 bits long. Example : 255.255.255.0
Internet routers use only the network id of the destination address to route traffic
to a subnetted environment. Routers within the subnetted environment use the extended-network-id
(network id + subnet id) to route traffic between the individual subnets.
SVC Switched Virtual Circuit
20. T
Trafic shaping This applies at access devices to prevent a huge burst of traffic from congesting
the backbone network. Shaping involves accepting a burst from an input device, buffering the traffic
and then « smoothing » out the flow so that the burst is distributed over a long period of time, a
time period based on configuration parameters.
21. U
22. V
V.34/V.34bis V.34 is a standard, approved by the ITU, for transmitting data to modems.
V.34bis provides up to 33.6kbps of fallback to 31.2 kbps or V.34 transfer rates (28.8Kbps or fallback
to 24 Kbps and 19.2 Kbps and backwards compatibility with V.32 and V.32bis).
V.90 Is a standard approved by the ITU for transmitting data downstream to modems
at 56Kbps. 56Kbps transmission technologies exploit the fact that most telephone company offices
are interconnected with digital lines.
VAD Voice Activity Detection In Voice over IP (VOiP), voice activation detection (VAD)is
a software application that allows a data network carrying voice traffic over the Internet to detect
the absence of audio and conserve bandwidth by preventing the transmission of "silent packets"
over the network.
VLAN Virtual Lan In a VLAN, individual devices are assigned membership in a group
that has connectivity only to each other and whose traffic does not mix with other traffic as it crosses
backbone networks, distant switches and shared hubs. Many of these groups or VLAN’s may
coexist on the same network infrastructure. VLAN also allows to reduce the broadcast domain to
the ports belonging to the VLAN. 802.1Q provides virtual LAN capability whereas 802.1p provides
prioritizing time-critical flows. The 802.1p header includes three bits for prioritization, allowing eight
priorities to be established.
VoIP Voice over IP Is the voice carrying on IP network
VPIM Voice Protocol over Internet Messaging
VPN Virtual Private Network A Virtual Private Network enables to send data between
two hosts across a shared or public internetwork (ex the Internet) in the same way as in case
of a point-to-point private link. It corresponds to extend an Intranet (Home/remote workers or
LAN-to-LAN connection)
It gives the appearance and benefits of a private network, including continuous
availability and reliability.
23. W
WAIS Wide Area Information System Is an application layer protocol which can be
used to look for information in a large number of documents.
WAN Wide Area Network This corresponds to a network outside the business, and one
that is accessible (such as the Internet, and an Intranet Extension)
WFQ Weighted Fair Queuing WFQ applies to the bandwith an application receives on
an output link :
– Traffic is assigned a priority – Priority influences which traffic is transmitted first
on a congested pipe
It has no impact on a non-congested pipe.
WINS Windows Internet Naming Service
WLAN Wireless LAN
WRED Weighted Random Early Discard Is a variation of RED. A pure RED router just
randomly selects packets to drop when some buffer threshold is reached independently from the
priority of the packet. WRED tries to identify the low-priority traffic and randomly discard those
packets when congestion occurs.
WWW World Wide Web A worldwide network of interconnected computer servers which
allow users to access information rapidly and easily via the Internet.
24. X
X25 ITU standard which was the first international standard for packet switching.
Covers only the bottom three layers of the OSI Model.
XML eXtensible Markup Language
25. Y
26. Z