Report Overview
The convergence of two highly disruptive technologies, VoIP and WLAN, is set to drastically alter the way we communicate, do business, and play. VoWLAN represents both an opportunity and a threat to traditional business and communications. This report provides the foundation knowledge and understanding necessary to capitalize on this evolution from wireline to wireless and from circuit to packet.
Table Of Contents
Table of Contents
Executive Summary
VoIP Standards and Protocols – A Brief Overview
Signaling Protocols
ITU-T, H.323
Session Initiation Protocol (SIP)
Table 1 – SIP Vs H.323 Comparison Table
Cisco Client Control Protocol (CSCCP)
Media Gateway Control Protocols
VoIP Media Transport Protocols
Section Summary
The VoIP Market Opportunity
A Disruptive Technology at Play
Tech Convergence – Cell Phones, PCs and Other Toys
The Global Economy and Enterprise Networking
IP Telephony (IPT)
Voice Services Over the Internet
Telephony in the Enterprise Network
Unified Messaging
Presence
Custom Applications Development
Figure 1 – Voice Services Over the Internet
The Telecommunications Services Frenzy
Internet Telephone Service Providers
Cable Network Telephone Service
Call Centers
Figure 2 - IP Enabled Call Center
Wireless Network Service Providers
Cellular Telephone Networks
Fixed Wireless Network Service Providers
Regulatory Impacts on the VoIP Market Opportunity
Section Summary
WLAN Systems/Standards – A Brief Overview
Table 2 – Spectrum Bands
802.11a, 802.11b, 802.11g
Emerging 802.11 Specifications & Feature Enhancements
Table 3 - 802.11a - 802.11b/g Comparison Table
HiperLAN & HiperMAN
802.16 WiMax
MMDS, 2.5 GHz Super-cells
WLL, 3.5 GHz Multi-cells
Section Summary
The Wireless LAN/WAN Market
Hot Spots and Hot Zones
An Interesting Case Study – The Insurance Industry
The Medical Industry Opportunity
Convergence to the Rescue
The Corporate WLAN – Wired Network Extensions
Radio Frequency Identification Systems (RFID)
Wireless Wide Area Networks
Mesh Networks
Mesh Networks, VoWLAN, and Homeland Security
Section Summary
Why VoIP and Wireless?
The VoIP/WLAN Market Opportunity
Corporate Enterprise Solutions
Convergence to the Rescue
Economic Assessment – Does It Pay?
Wide Area Networks
Economic Assessment – Does It Profitable?
Third World Nations
Rural America/Urban America
Second Line Service/Life Line Service
Section Summary
VoWLAN Implementation – Issues and Answers
RF Bandwidth – The Critical Resource
Spectrum Constraints and Technology Selections
Network Audits
Identify Your Traffic
Identify Your Network Technologies
Traffic Planning
VoIP Coding Algorithms & Bandwidth Usage
Engineering Voice Traffic in an IP World – Erlangs
The “V” Challenge
Television Broadcast Video
Digitized Broadcast Video
Video Conferencing
Internet Streaming Video & MPEG Files
Security/Surveillance Video
Digital Collaborative Video
JPEG Files
Traffic Loading – The “Active” User
(Sub) Section Summary
The RF Channel – Characteristics and Planning
Bandwidth
“Raw” Data Rate
Modulation Format
Channel Plan
Figure 3 – Example Channel Plan Using 802.11a
Planning WLAN Channel Capacity
RF Coverage Requirements – Who’s on Net?
Orthogonal Frequency Division Multiplexing
Mesh Networking
FDD Vs TDD
RF Site Surveys
Other Networks and Overheads
Protocol Overheads
A Technology Overhead
System Management Overhead
(Sub) Section Summary
Bandwidth Management Techniques
Managing the RF Bandwidth for QoS
Data Grams – MIR & CIR
Dynamic Bandwidth Allocation
Dynamic Adaptive Modulation
Smart Antenna Systems
Networking Protocols & Techniques for BW Management
Policing and Shaping
Congestion Avoidance
IP Class and Marking
Traffic Queuing
Class Based Weighted Fair Queuing
Low Latency Queuing
IP RTP Priority Queuing
Resource Reservation Protocol
Performance Monitoring Tools
(Sub) Section Summary
Network Security – More Issues and Answers
Radio Frequency Interception and Hacking
Wireless Network Security Techniques
Wi-Fi Protected Access (WPA)
IEEE 802.11i, aka WPA2
Upgrading to 802.11i
Security Recommendations for Hot Spot Users
Encrypted Virtual Private Network (VPN) & Security
A WLAN View of VPNs
Authentication
Data Encryption
Management and Security Policy Enforcement
User and Device Management
Security Issues Related to VoIP
SIP Issues
Other Bad News
Intrusion Detection and Counter Measures
A Pro-Active Defense Approach
Intrusion Detection System
Secure Your SIP Network
Section Summary
Emerging Technology – Hopes for the Future
Emerging Technology
It’s in The Chips
Advancements in VoIP QoE
More VoWLAN from Mind Commerce
VoWLAN Planning and Operations
VoWLAN Training
About the Author
About the Publisher
List of Figures
List of Tables