Professional Documents
Culture Documents
Charles Moreman
Director of Engineering
Scientific Atlanta, a Cisco Company
www.scientificatlanta.com
G1631A
Abstract VoIP BACKGROUND
Voice over Internet Protocol (VoIP) is growing in VoIP Packet Flows
popularity around the world and provides a tre- Unlike calls in traditional PSTN (Public Switched
mendous opportunity for extracting more value Telephone Networks), a VoIP call is not a single,
from existing cable networks. Pressure to effec- continuous end-to-end connection, but instead is
tively compete with new players in the voice, video made up of many individual IP “packets.” With VoIP,
and data delivery marketplace continues to mount. voice packets travel across IP networks intermixed
with millions of other data packets. Each call is made
For the cable operator, VoIP represents opportuni- up of both signaling packets and media packets
ties that include: — signaling packets contain information required to
connect and then disconnect callers, while media
• Increased Revenue – Bundled services pro-
packets contain the actual voice conversation.
vide new opportunities to increase revenue,
paired with greater scalability and flexibility Because UDP/IP (User Datagram Protocol over IP) is
for future growth mainly used for VoIP applications, it does not pro-
• Bandwidth Efficiency - VoIP extracts more vide a mechanism to ensure that data packets are
revenue from the network by sharing band- delivered in sequential order, or provide Quality of
width between voice and data Service guarantees, VoIP implementations can face
• Customer Appeal – Multiple services from challenges dealing with latency and varying delays
one vendor simplifies bill paying and service (otherwise known a “jitter”). The receiving node must
calls for customers restructure IP packets that may be out of order,
• Competitive Advantage – Increase the value delayed or missing, while ensuring that the audio
of cable service, build subscriber loyalty and stream maintains a proper time consistency.
attract new customers
Signaling packets go to the call agent or proxy, setting
Most VoIP deployments today use one of two protocols: up, changing or deleting calls. This is because service
providers need control over calls being made.
• Session Initiation Protocol (SIP)
Once call is set up, the media packets go directly
• Media Gateway Control Protocol/Network
between VoIP endpoints (phones). The signaling
Control Signaling (MGCP/NCS)
and media paths may be different, using separate
These call control protocols are used to setup, resources, either physical, logical or both.
maintain and tear down VoIP calls. This paper
will explore the advantages and disadvantages of
each. It will also cover the underlying architectural
differences and how this relates to real world VoIP
services, as well as establishing a foundation for
future services.
#ALL !GENT OR
0ROXY
#ALL #ONTROL #ALL #ONTROL
0ACKETS 0ACKETS
!UDIO 0ACKETS
-4! -4!
%NDPOINT %NDPOINT
3IGNALING PACKETS GO TO THE CALL AGENT OR PROXY SETTING UP CHANGING OR DELETING CALLS 4HIS IS BECAUSE
SERVICE PROVIDERS NEED CONTROL OVER CALLS BEING MADE /NCE CALL IS SET UP THE MEDIA PACKETS GO DIRECTLY
BETWEEN 6O)0 ENDPOINTS PHONES 4HE SIGNALING AND MEDIA PATHS MAY BE DIFFERENT USING SEPARATE
RESOURCES EITHER PHYSICAL LOGICAL OR BOTH
2 VoIP Architecture
Audio Quality • Call control to setup only authorized calls – Only
In a successful VoIP deployment, customers need to the calls that originate from valid devices and
receive the same quality of audio transmission they users should be accepted
receive with traditional telephone services –meaning
• Collection of per call billing records – Important
high-quality voice transmissions on a consistent basis.
for the providers to earn money on the VoIP
For VoIP transmissions to be intelligible to the receiver,
serverice
voice packets should not be dropped, excessively
delayed or suffer jitter. • Prevention of unauthorized network QOS – Only
authorized devices and users can get quality of
Factors that affect VoIP audio quality include: CODEC
service (QoS) for VoIP calls.
choice, network packet loss, special considerations
including echo, analog modem and FAX calls and Privacy
home security systems, and analog losses and noise, In the PSTN it is difficult to learn about calls as
as compared to the PSTN. the calls are carried by networks that have very
limited access. VoIP calls can be part of Internet
End to End Audio Delay
traffic and are more vulnerable to others seek-
Latency is also a critical factor in VoIP call quality.
ing access to it. To make sure the privacy is met,
From a technical perspective, end to end audio delay
these elements have to be considered:
should meet acceptable standards to achieve optimal
performance and meet end user expectations. As one • Encryption of Call Control Data
would expect, smaller delays are always better, as they
enable more natural sounding phone calls. Typical PSTN - Phone numbers dialed and received – only
delays are <20mS round trip. Typical VoIP service the parties in a call and the operator’s switch
provider delay goals are approximately 150 to 200mS should be able to see this information
round trip. Delay sources vary and can be caused by
- Call duration and call time - gaining informa-
the following:
tion about call time and duration can reveal the
• CODEC delays - 2mS to 40mS intentions of conversations so this information
• Packetization delays - 10mS to 30mS has to be protected
• Network delays - <1mS to 20mS
• Encryption of Audio Content - it is important to
• Jitter buffer delays – 5mS to 100mS
make sure that nobody can evesdrop on a VoIP
To minimize latency, dynamic adaptive jitter buffer conversation.
approaches work best, allowing the service provider
CALEA - Communications Assistance for Law
to resize jitter buffers upward and downward. The best
Enforcement Act
implementations are able to adjust in 5mS increments.
• Call Detail Reporting
Security
VoIP Call Control Protocols – Features
The Internet universe continues to expand, and with
Almost all VoIP call control protocols support
that growth, harmful computer viruses and hacker
similar features:
activity have also grown. Security is vital for successful
VoIP deployments over public IP networks, and service Setup new phone calls
providers must keep their customers safe, with • Pass information to other network resources
consideration in mind for: regarding each new phone call.
VoIP Architecture 3
VoIP Call Control Protocols – Approaches MGCP/NCS Protocol
When it comes to VoIP call control protocol, there are
three primary approaches. With the master/slave ap-
Background
MGCP was created from two other protocols – Inter-
proach, endpoints notify a call agent when an “event”
net Protocol Device Control (IPDC) and Simple Gate-
happens. The call agent makes all relative decisions
way Control Protocol (SGCP). This protocol emerged
and then sends commands back to the endpoints. In
in the Internet Engineering Task Force (IETF) in the
turn, endpoints act on the commands to play tones, etc.
late 1990s. In 2000, CableLabs® released its initial
With the peer to peer approach, “smart” endpoints locate PacketCable™ specifications for MGCP/NCS, spe-
other “smart” endpoints, and the endpoints setup and cifically created to enable cable operators to launch
tear down calls directly. All traffic passes directly VoIP-based phone service over cable.
between users, not to a service provider.
NCS includes much of MGCP, but there are differenc-
With a peer to peer approach with proxy agents, es as some items were added, some were deleted
the proxy Agents are inserted to act as a mediator and some were changed. This being the case, MGCP/
between endpoints. The proxy agents are under the NCS is best thought of as the NCS profile of MGCP.
control of a service provider and maintain control to
prevent theft of service and collect billing informa-
Standards
In 2003, the IETF announced RFC 3435, which made
tion. Proxy Agents can also enforce CODEC choices,
an earlier definition in RFC 2705 obsolete, and de-
packetization rates and other parameters.
fined the base MGCP standard. PacketCable defines
Examples of VoIP call control protocols include H.323, MGCP/NCS – the latest draft is PKT-SP-NCS1.5-
Session Initiation Protocol (SIP), Media Gateway I02-050812. Additionally, PacketCable defines many
Control Protocol (MGCP) and MGCP Network Control other specifications used to deploy VoIP services,
Signaling (MGCP/NCS). such as device provisioning, common open policy
service (COPS), dynamic quality of service (DQoS),
Cable operators must keep in mind that call control security, management information bases (MIBs) and
protocols are used to setup, maintain and tear down CODECs. MGCP/NCS is also supported for EuroPack-
VoIP calls, but are not used to pass audio content etCable™ applications.
-'#0.#3 .ETWORK $IAGRAM
%MBEDDED -4!
#LIENT #ALL -ANAGEMENT !NNOUNCEMENT
3ERVER 3ERVER
!NNOUNCEMENT
#ONTROLLER
#ABLE !.#
-4!
-ODEM $/#3)3 (&#
ACCESS
NETWORK
M !NNOUNCEMENT
0LAYER
!.0
#-43
!NNOUNCEMENT
-ANAGED )0 3ERVER
.ETWORK -EDIA 'ATEWAY
#ONTROLLER 034.
%MBEDDED -4!
-'#
#LIENT
-EDIA 'ATEWAY
-'
#ABLE 3IGNALLING 'ATEWAY
-4! $/#3)3 (&#
-ODEM 3'
ACCESS
NETWORK
4ICKET 'RANTING 3ERVER 4'3
#-43
$(#0 3ERVERS
/33
"ACK /FFICE
$.3 3ERVERS
3ERVERS AND
4&40 OR (440 3ERVERS
!PPLICATIONS
393,/'