Voice Over IPv6 (eBook)
384 Seiten
Elsevier Science (Verlag)
978-0-08-048165-4 (ISBN)
IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater robustness. It will also be fully backwards compatible with existing IPv4 systems. These capabilities will finally make Internet telephony a viable competitor to conventional switched telephone networks. In this book, Dan Minoli clearly explains IPv6 and how telephone networks can be built on its foundations.
This is not just another IPv6 book, instead, it focuses on those aspects of IPv6 relevant to Internet telephony systems and voice networks. Minoli uses a compare/contrast approach, exploring where IPv6 is similar to IPv4 and where it differs, to let you quickly grasp the essence of IPv6 and the similarities (and differences) between current IPv4-based systems and IPv6-based systems.
If you will be designing, implementing, or maintaining the next generation of Internet telephony systems, then you need the information in this book!
*Explains the essential concepts of IPv6 and how they relate to Internet telephony
*Describes how Internet telephony systems using IPv6 are different from, and better than, Internet telephony systems based on the older IPv4 standard
*Discusses how to transition existing IPv4 Internet telephony systems and conventional switched systems to IPv6-based systems
*Extensive treatment of security issues, including IP layer encryption and authentication methods
*Explains connection techniques, including plug and play approaches, for equipment used in IPv6 systems
* The first title describing how the next generation Internet protocol-IPv6-can be used for Internet telephony
* Explains IPv6 as it applies to Internet telephony (VoIP)
* Shows how IPv6 gives better security, QoS, and signal integrity in Internet telephony
IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater robustness. It will also be fully "e;backwards compatible with existing IPv4 systems. These capabilities will finally make Internet telephony a viable competitor to conventional switched telephone networks. In this book, Dan Minoli clearly explains IPv6 and how telephone networks can be built on its foundations.This is not just another IPv6 book; instead, it focuses on those aspects of IPv6 relevant to Internet telephony systems and voice networks. Minoli uses a compare/contrast approach, exploring where IPv6 is similar to IPv4 and where it differs, to let you quickly grasp the essence of IPv6 and the similarities (and differences) between current IPv4-based systems and IPv6-based systems. If you will be designing, implementing, or maintaining the next generation of Internet telephony systems, then you need the information in this book!*Explains the essential concepts of IPv6 and how they relate to Internet telephony*Describes how Internet telephony systems using IPv6 are different from, and better than, Internet telephony systems based on the older IPv4 standard*Discusses how to transition existing IPv4 Internet telephony systems and conventional switched systems to IPv6-based systems*Extensive treatment of security issues, including IP layer encryption and authentication methods*Explains connection techniques, including "e;plug and play approaches, for equipment used in IPv6 systems* The first title describing how the next generation Internet protocol-IPv6-can be used for Internet telephony* Explains IPv6 as it applies to Internet telephony (VoIP) * Shows how IPv6 gives better security, QoS, and signal integrity in Internet telephony
front cover 1
copyright 5
table of contents 8
front matter 12
Preface 12
Acknowledgments 14
body 16
1 Introduction 16
1.1 Overview 16
1.2 Introductory Overview of IPv6 19
1.2.1 IPv6 Benefits 20
1.2.2 Network Address Translation Issues in IPv4 21
1.2.3 IPv6 Address Space 24
1.2.4 Basic Protocol Constructs 25
1.2.5 IPv6 Autoconfiguration 27
1.2.6 Applications 29
1.2.7 Transition Approaches 32
1.3 Introductory Overview of VoIP 32
1.3.1 Overview 32
1.3.2 First-Generation 1G VoIP Networks 33
1.3.3 Second-Generation 2G VoIP Networks 35
1.3.4 Pragmatic Enterprise 2G VoIP Deployment Approaches 36
1.3.5 2G VoIP Trunking Only 37
1.3.6 2G Traditional PBXs with IP Adjunct Extensions (Enhancements) 39
1.3.7 2G Hybrid TDM and IP Systems 40
1.3.8 2G Pure IP Server-Based Telephony Systems 41
1.3.9 Possible Evolution Paths for 2G Deployments 42
1.4 Third-Generation 3G VoIP Networks 43
1.5 Deployment/Penetration Issues 44
1.6 Line of Investigation 46
Appendix A: Basic IPv6 Terminology 47
Appendix B: Basic Bibliography 56
2 Basic VoP/VoIP Concepts 64
2.1 Introduction and Background 64
2.1.1 Carriers' Voice Networks 67
2.1.2 VoIP in Cable TV Environments 69
2.2 Voice Digitization and Encoding 69
2.2.1 Overview of Speech Encoding Methods 70
2.2.2 Technology and Standards for Low Bit Rate Vocoding Methods 84
2.3 Signaling 93
2.3.1 H.323 Standards 95
2.3.2 Introduction to Session Initiation Protocol (SIP) 100
2.3.3 MEGACO 105
2.4 Numbering 106
2.5 VoIP and Wireless Networks 109
2.5.1 Approaches 109
2.5.2 Wireless VoIP Service Offering Dynamics 117
2.5.3 Wireless Summary 121
2.6 Conclusion 121
3 Basic VoIP Signaling and SIP Concepts 122
3.1 Introduction 122
3.2 Overview 123
3.3 Fundamental SIP Functionality 123
3.4 Overview of Operation 124
3.5 Structure of the Protocol 129
3.6 SIP Details 130
Appendix A 130
A.1 Definitions 130
A.2 SIP Messages 134
A.2.1 Requests 134
A.2.2 Responses 135
A.2.3 Header Fields 135
A.2.4 Bodies 138
A.2.5 Framing SIP Messages 138
A.3 General User Agent Behavior 138
A.3.1 UAC Behavior 139
A.3.2 UAS Behavior 145
A.3.3 Redirect Servers 148
A.4 Canceling a Request 149
A.4.1 Client Behavior 150
A.4.2 Server Behavior 150
A.5 Registrations 151
A.5.1 Overview 151
A.5.2 Constructing the REGISTER Request 152
A.5.3 Processing REGISTER Requests 153
A.6 Querying for Capabilities 155
A.6.1 Construction of OPTIONS Request 155
A.6.2 Processing of OPTIONS Request 156
A.7 Dialogs 157
A.7.1 Creation of a Dialog 157
A.7.2 Requests within a Dialog 159
A.7.3 Termination of a Dialog 162
A.8 Initiating a Session 162
A.8.1 Overview 162
A.8.2 UAC Processing 162
A.8.3 UAS Processing 165
A.9 Modifying an Existing Session 167
A.9.1 UAC Behavior 167
A.9.2 UAS Behavior 168
A.10 Terminating a Session 168
A.10.1 Terminating a Session with a BYE Request 169
A.11 Proxy Behavior 170
A.11.1 Overview 170
A.11.2 Stateful Proxy 171
A.11.3 Summary of Proxy Route Processing 171
A.12 Transactions 175
A.12.1 Client Transaction 176
A.12.2 Server Transaction 176
A.13 Transport 177
A.13.1 Clients 177
A.13.2 Servers 179
A.13.3 Framing 180
A.13.4 Error Handling 180
A.14 Additional Details 180
4 Basic “Presence” Concepts 182
4.1 Introduction 182
4.2 Abstract Model for a Presence and Instant Messaging 183
4.2.1 Introduction 183
4.2.2 Overview 183
4.2.3 Model 189
4.3 Instant Messaging/Presence Protocol Requirements 192
4.3.1 Machinery 192
4.3.2 Shared Requirements 192
4.3.3 Additional Requirements for PRESENCE INFORMATION 194
4.3.4 Additional Requirements for INSTANT MESSAGES 195
4.4 SIP Applications 196
4.4.1 Introduction 196
4.4.2 Terminology 197
4.4.3 Definitions 197
4.4.4 Overview of Operation 197
4.4.5 Usage of Presence URIs 199
4.4.6 Presence Event Package 200
4.4.7 Learning Presence State 204
4.4.8 Example Message Flow 205
4.5 Conclusion 206
5 Issues with Current VoIP Technologies 208
5.1 General Enterprise Security Issues 208
5.1.1 Typical Enterprise Network Approaches 209
5.1.2 Typical Enterprise Network VoIP Security/Integration Approaches 216
5.1.3 Firewall Issues for VoIP 219
5.2 What is NAT? 221
5.2.1 Introduction 221
5.2.2 Overview of Traditional NAT 222
5.2.3 Translation Phases of a Session 226
5.2.4 Packet Translations 226
5.2.5 Miscellaneous Issues 228
5.2.6 NAT Limitations 229
5.3 STUN-Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) 230
5.3.1 Applicability Statement 230
5.3.2 Introduction 231
5.3.3 Applicability to VoIP 231
5.3.4 Definitions 232
5.3.5 NAT Variations 232
5.3.6 Overview of Operation 232
5.3.7 Message Overview 234
5.3.8 Server Behavior 235
5.3.9 Client Behavior 238
5.3.11 Protocol Details 245
5.4 Overview of MIDCOM Approaches 250
5.4.1 Background 250
5.4.2 Terminology 251
5.4.3 Architectural Framework for Middleboxes 255
5.4.4 MIDCOM Protocol 255
5.4.5 MIDCOM Agents 256
5.4.6 MIDCOM PDP Functions 258
5.4.7 MIDCOM Framework Illustration Using an In-Path Agent 259
5.4.8 Operational Considerations 266
5.4.9 Applicability Statement 267
5.5 Pragmatic Approaches using SIP Border Gateways 268
6 Basic IPv6 Concepts 274
6.1 Introduction 274
6.2 Terminology 274
6.3 IPv6 Header Format 275
6.4 IPv6 Extension Headers 276
6.4.1 Extension Header Order 277
6.4.2 Options 278
6.4.3 Hop-by-Hop Options Header 279
6.4.4 Routing Header 280
6.4.5 Fragment Header 283
6.4.6 Destination Options Header 287
6.4.7 No Next Header 287
6.5 Packet Size Issues 288
6.6 Flow Labels 288
6.7 Traffic Classes 289
6.8 Upper-Layer Protocol Issues 289
6.8.1 Upper-Layer Checksums 289
6.8.2 Maximum Packet Lifetime 290
6.8.3 Maximum Upper-Layer Payload Size 290
6.8.4 Responding to Packets Carrying Routing Headers 290
6.9 Semantics and Usage of the Flow Label Field 291
6.10 Formatting Guidelines for Options 292
6.11 Introduction to Addressing 294
6.12 IPv6 Addressing 294
6.12.1 Addressing Model 294
6.12.2 Text Representation of Addresses 295
6.12.3 Text Representation of Address Prefixes 296
6.12.4 Address Type Identification 297
6.12.5 Unicast Addresses 297
6.12.6 Anycast Addresses 300
6.12.7 Multicast Addresses 301
6.12.8 A NodeÌs Required Addresses 304
6.13 IANA Considerations 304
6.14 Creating Modified EUI-64 Format Interface Identifiers 305
6.15 64-Bit Global Identifier (EUI-64) Registration Authority 306
6.16 Additional Technical Details 307
7 Using IPv6 to Support 3G VoIP 308
7.1 Overview of VoIPv6 Positioning 308
7.2 IPv6 Infrastructure 312
7.2.1 Protocol Mechanisms 312
7.2.2 Protocol-Support Mechanisms 313
7.3 IPv6 Addressing Mechanisms 316
7.3.1 Conventions 316
7.3.2 Addressing issues/reachability 318
7.3.3 Scope/Reachability 320
7.3.4 Address Types 321
7.3.5 Addresses for Hosts and Routers 325
7.4 Configuration Methods 328
7.5 Routing and Route Management 330
7.6 Deployment Status 332
7.6.1 Deployment Approach 332
7.6.2 Network Infrastructure Deployment 333
7.6.3 Applications, Middleware and Management for IPv6 Deployment 333
7.6.4 Security Deployment and Business Challenge for IPv6 334
8 Issues Related to Transitioning to IPv6 338
8.1 Introduction 338
8.1.1 Terminology 339
8.1.2 Approach 340
8.2 Dual-IP Layer Operation 340
8.2.1 Address Configuration 340
8.2.2 Domain Naming System 341
8.2.3 Advertising Addresses in the DNS 341
8.3 Common Tunneling Mechanisms 342
8.3.1 Encapsulation 343
8.3.2 Tunnel MTU and Fragmentation 343
8.3.3 Hop Limit 345
8.3.4 Handling IPv4 ICMP errors 345
8.3.5 IPv4 Header Construction 346
8.3.6 Decapsulation 347
8.3.7 Link-Local Addresses 347
8.3.8 Neighbor Discovery over Tunnels 348
8.4 Configured Tunneling 348
8.4.1 Default Configured Tunnel 348
8.4.2 Default Configured Tunnel Using IPv4 "Anycast Address" 349
8.4.3 Ingress Filtering 349
8.5 Automatic Tunneling 349
8.5.1 IPv4-Compatible Address Format 349
8.5.2 IPv4-Compatible Address Configuration 350
8.5.3 Automatic Tunneling Operation 350
8.5.4 Use With Default Configured Tunnels 351
8.5.5 Source Address Selection 351
8.5.6 Ingress Filtering 351
8.6 Application Aspects of IPv6 Transition 352
8.6.1 Transition Issues 352
8.6.2 Overview of IPv6 Application Transition 352
8.6.3 Problems with IPv6 Application Transition 353
8.6.4 Description of Transition Scenarios and Guidelines 354
8.6.5 Application Porting Considerations 357
back matter 358
References 358
About the Author 364
Index 366
Erscheint lt. Verlag | 1.4.2011 |
---|---|
Sprache | englisch |
Themenwelt | Sachbuch/Ratgeber |
Informatik ► Netzwerke ► TCP / IP und IPv6 | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
ISBN-10 | 0-08-048165-5 / 0080481655 |
ISBN-13 | 978-0-08-048165-4 / 9780080481654 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.