Intro to VoIP Telephony (Part 1)

Site: QSC
Course: Q-SYS Quantum Level 1 Training (Online)
Book: Intro to VoIP Telephony (Part 1)
Printed by: Guest user
Date: Thursday, 21 November 2024, 4:28 AM

Description

Video Transcript

00:07
Welcome to VoIP Telephony training, as part of our QSC Quantum Training,
00:11
an advanced service and troubleshooting curriculum.
00:14
My name is Patrick Heyn and I’ll be giving you this brief overview on VoIP.
00:19
I'm not gonna lie, this is gonna be dense.
00:21
So buckle up, don’t be a hero, take breaks when you need them, and let's get started!
00:26
At its most basic, Voice Over Internet Protocol (VoIP) is a group of protocols.
00:32
We are going to focus on the one that most people use today, which is SIP.
00:37
VoIP is a method of sending audio over an IP network instead of a circuit based network like PSTN.
00:44
There are a bunch of different protocols that work with SIP like SDP, DTMF, RTP, and audio codecs.
00:53
We're going to dive into all of these as well.
00:55
The first one is the PSTN network. That sits outside your enterprise and makes up the telephony backbone.
01:02
That network is all digital now as well.
01:05
SIP stands for Session Initiation Protocol. It's a signaling protocol so it doesn't actually send audio.
01:12
It's a method we use to control, set up the call, and register with the call server.
01:17
We also have Session Description Protocol (or SPD).
01:21
This is used in a variety of technologies and it's not just VoIP, like video applications,
01:26
session announcements, invitations, and parameter negotiations.
01:30
The Real Time Transport Protocol (or RTP) is used to transport all multimedia
01:36
(including audio, video and other data)
01:38
over a packet switch network, which could be over the internet or over a private network.
01:43
SDP also negotiates the audio codec,
01:46
which are the algorithms used to encode and digitize the audio, each of which have its own benefits.
01:53
Dual-Tone Multi Frequency (or DTMF) is the protocol for how we send digits over the network.
02:00
The PSTN network is mostly digital,
02:02
and the only remaining analog portions are the local loop which are the things like your landlines.
02:08
Make no mistake, landlines are going away but many people still do have one.
02:13
Here we have a basic diagram of the telephone network and various components.
02:17
On the left you have your corporate network which might include a PBX or similar device like a call manager.
02:24
In the middle you have the PSTN and then on the right you also have celluar networks.
02:30
VoIP consists of two main components.
02:33
The signaling plane and the bearer plane. Let's keep those in mind for later.
02:38
We use SIP because…. well, because it's most popular, and it’s a well defined protocol.
02:44
There are many RFCs that describe SIP.
02:48
Our SIP engineers at QSC that write the software for our softphone follow the RFCs.
02:53
They are also available for anyone to look up and check if someone is following SIP protocols.
02:59
The problem is that people are allowed to interpret them however they deem fit.
03:04
The primary one is RFC 3261, but as you can see, there are many others.
03:11
SIP can use TCP, UDP or TLS. UDP and TCP are not secure connections and TLS encrypts the SIP signaling.
03:21
The proxy or call server is the device that we need to register with, also set up or receive the calls.
03:28
It also keeps a record of all the endpoints that are registered with it
03:32
and routes the call in and out of the proxy.
03:34
Each individual device registration is known as the line,
03:38
extension or directory number, and depending on the SIP service you use, carries it’s own ID number.
03:45
The server or proxy will either be an on premise server or a hosted service provider.
03:50
On- premise devices like Cisco Call Manager and Avaya are still very common
03:55
but hosted providers like Ring Central are quite popular nowadays.
03:59
If you use a hosted provider then you'll need to be able to reach the internet from the LAN you are using.
04:04
Before you get started on a SIP registration, you’ll need the proxy address
04:09
(or a fully qualified domain name of the server),
04:12
the line ID (sometimes called the extension or the directory number), and the password.
04:18
Now, some devices like Cisco Call Manager require a few other things.
04:23
You might need to have a username or digest credentials, and in some cases,
04:27
the username or authentication ID may be different than the extension.
04:32
Within SIP, there are messages called requests and responses.
04:36
You don't need to memorize all of these, but let’s take a look at a couple of them.
04:40
The INVITE is the message to start the call, and the BYE message ends the call.
04:46
If you need to end a call before a successful connection, the you get a CANCEL message.
04:52
There are only 14 types of requests but far more types of responses.
04:58
Responses can be categorized into various groups.
05:01
There are provisional, successful, redirection, and a few types of failure responses.
05:07
Here are some of the more common responses.
05:09
A “100 Trying” acknowledges a call phone request and indicates that the server is processing the request.
05:16
The client will send the invite and the server will respond with a trying.
05:22
A “200 OK” indicates a successful registration when you make a call.
05:27
A 401 unauthorized seems like it would be an error but that is part of the SIP protocol.
05:34
500 series messages represent a failure of some kind. Normally those failures would be on the server side.
05:42
For example, when you see several 503 errors in Cisco Call Manager,
05:47
this usually means that something is not set up properly.
05:50
Here’s a phone registration example from the RFC.
05:54
First a registration packet is sent and the server responds with a 401 Unauthorized.
06:00
Now, that is normal and by design.
06:02
It’s just trying to register without a password and that's how we're supposed to do it.
06:07
That's how the SIP protocol works.
06:09
The server comes back and say there's no password and sends us a hash which we will use to hash our password,
06:16
and then sends it back. The second REGISTER F3 message sends the password.
06:21
And then the “200 OK” verifies a correct password and registration.
06:27
At this point, if we see anything else, like a 503 or other error,
06:33
then we are going to show that fault in a softphone.
06:36
If you do a network capture this is what it's going to looks like in Wireshark.
06:40
The request is a registration request and the destination we are sending it to, asking for a response.
06:46
Our transport type in this case is UDP.
06:50
Once we get the 200 OK the green light goes on in the softphone, and we are ready to make calls.
06:56
You can show this in the call flow form in Wireshark and it gives you a bit of a better view of what it looks like.
07:03
At this point we are registered with a server.
07:05
When we get back from a break, we’re going to take a look and see how to make those calls in and out.
07:11
We’ll see you when you get back!