`
`a commercial product sold by Network Associates, was created in 1991. lt is one of
`the most popular public key exchange (PKE) schemes.
`Without a functioning universal public key infrastntcture, we cannot reliably
`and easily acqu ire certificates that contain public keys for persons or organizations
`we want to communicate with. Standards are emerging, including Public Key lnfra(cid:173)
`stntcture (PKl) , IETF Public Key Infrastructure X.509 (PKIX), Simple PKI (SPKI) ,
`and Public-Key Cryptography Standards (PKCS).
`PKI is a system that provides protocols and services for managing public keys
`in an intranet or an Internet environment-it involves distributing keys in a secure
`way. PKl secures e-business applications such as private e-mail, purchase orders,
`and workflow au tomation. It uses digital certificates and digital signatures to
`authenticate and encrypt messages and a CA to handle the verification process. lt
`permits the creation of legally verifiable identification objects, and it also dictates
`an encryption technique to protect data transmitted over the Internet. Trusted PKI
`suppliers include Entrust and VeriSign. PKI technology is now moving from pilot
`testing into the real world of e-commerce. Web browsers such as Microsoft Internet
`Explorer and Netscape Navigator include rudimentary support for PKI by provid(cid:173)
`ing an interface into a computer's certificate store, and browsers often include the
`certificates for some top-level CAs, so that the users can know, incontrovertibly,
`that the roots are valid and trustworthy.
`IKE is the key exchange protocol used by IPSec, in computers that need to
`negotiate security associations with one another. A security association is a con(cid:173)
`nection between two systems, established for the purpose of securing the packets
`transmitted across the connection. lt supports preshared keys, which is a simpli(cid:173)
`fied form of key exchange. It does n ot require digital certificates. Every node must
`be linked to every other node by a unique key, and th e number of keys needed can
`grow out of control; for example, 2 devices need l key, and 8 devices need 28 keys.
`New versions of IKE generate new keys through a CA. Legal and political problems
`will most likely delay 'vvidescale use of IKE.
`One of the biggest hurdles e-commerce companies face is con firming the iden(cid:173)
`tity of the parties involved. Ensuring identity requires an encrypted lD object that
`can be verified by a third party and accepted by a user's browser. Personal digital
`IDs con tained in the user's browser accomplish this. Historically, these client certif(cid:173)
`icates have been used to control access to resources on a business network, bu t
`th ey can also contain other user information , including identity discount level or
`customer type. Third parties (that is, CAs) guarantee these types of certificates.
`The user's browser reads the server certificate, and if it's accepted, the browser gen(cid:173)
`erates a symmetric session key, using the server's public key. The server then
`decrypts the symmetric key, which is then used to encrypt the rest of the transac(cid:173)
`tion. The transaction is then signed, using the user's digital iD, verifying the user's
`identity and legally binding the user to the transaction.
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 328
`
`
`
`348
`
`Chapter 11
`
`• Next-Generation Network Services
`
`Digital Certificates
`Digital certificates, based on the ANSl X.509 specification, have become a de facto
`Internet standard for establishing a trusting relationship using technology Digital
`certificates are a method for registering user identities with a third party, a CA (such
`as Entrust, UserTrust, or VeriSign). A digital certificate binds a user to an electronic
`signature that can be trusted like a written signature and includes authentication,
`access rights, and verification information. CAs prepare, issue, and manage the digi(cid:173)
`tal certificates, and they keep a directory database of user information , verify its accu(cid:173)
`racy and completeness, and issue the electronic certificates based on that
`information. A CA signs a certificate, verifying the integrity of the information in it.
`By becoming their own digital CAs, service providers can package electronic
`security with offerings such as VPN and applications services. Vendors that pro(cid:173)
`vide the technology required to set up as a CA include Baltimore Technologies (in
`Ireland), Security Dynamics Technologies, and Xcert.
`Server certificates ensure Internet buyers of the identity of the seller's Web site.
`They contain details about the Web site, such as the domain name of the site and
`who owns it. Third parties, such as Thawthe in South Africa, then guarantee this
`information. Sites with server certificates post the CA, and Internet browsers
`accept their certificates for secure transactions.
`There are still many security developments to come and there is a bit of unsettle(cid:173)
`ment in this area. Standards need to be defined and formalized before e-commerce
`will truly be able to function with the security that it mandates. For now, these
`are the types of mechanisms that are necessary to ensure that your data remains
`with you.
`
`VoiP has been drawing a lot of attention in the past couple years. This section cov(cid:173)
`ers the types of applications that are anticipated for VoiP, as well as what network
`elements are required to make VoiP work and provide similar capabilities to what
`we're used to from the PSTN.
`
`VoiP Trends and Economics
`Although VolP calling is used for billions of billed minutes each year, it still repre(cid:173)
`sents a very small percentage of the market-less than 5% overall. According to
`Telegeography (www.telegeography.com), 40% of VolP traffic originates in Asia
`and terminates in North America or Europe; 30% travels between North America
`and Latin America; one-third of U.S. international VoiP traffic goes to Mexico , with
`future volume increases predicted for calling to China, Brazil, and India, and the
`
`• VoiP
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 329
`
`
`
`VoiP
`
`rest moves among the U.S., Asia Pacific, and Western European regions. It is
`important to closely examine who wi.ll be using this and what carriers or operators
`will be deploying these technologies. Probe Research (www.proberesearch.com)
`believes that by 2002, 6% of all voice lines will be VoiP This is still rather minor,
`given the fact that some have been saying that VoiP would have replaced circuit(cid:173)
`switched calling by now. Piper ]affray (www.piperjaffray.com) reports that minutes
`of communication services traveling over lP telephony networks will grow from an
`anticipated 70 billion minutes and 6% of all the PSTN traffic in the year 2003 to
`over a trillion minutes by the year 2006. In the United States alone, the PSTN is
`handling some 3.6 trillion minutes of traffic monthly.
`Although VolP has a very important place in telecommunications, it's impor(cid:173)
`tant to realize that it is not yet taking over the traditional circuit-switched approach
`to accommodating voice teleph9ny. The exciting future of VolP lies in advanced
`and interesting new applications, an environment where voice is but one of the
`information streams comprising a rich media application. Many expect that sales of
`VoiP equipment will grow rapidly in the coming months and years. Part of the rea(cid:173)
`son for this growth is that the network-specific cost for VolP on dedicated net(cid:173)
`works is quite a bit lower than the cost of calls on circuit-switched networks(cid:173)
`about US l.l cents per minute as compared with US 1.7 cents per minute. Using
`VolP to carry telephony traffic greatly reduces the cost of the infrastructure for the
`provider, but at the expense of possibly not being able to maintain QoS. Potential
`savings are even greater if VolP is implemented as an adjunct to data network
`Another factor encouraging customers to examine VoiP is the use of shared net(cid:173)
`works. Because IP emphasizes logical rather than physical connections, it's easier for
`multiple carriers to coexist on a single network. This encourages cooperative shar(cid:173)
`ing of interconnected networks, structured as anything from sale of wholesale cir(cid:173)
`cuits to real-time capacity exchanges. Also , VoiP can reduce the barriers to entry in
`this competitive data communications world. New companies can enter the market
`\vithout the huge fixed costs that are nom1ally associated with the traditional cir(cid:173)
`cuit-switched network models. Furthermore, because IP telephony will enable new
`forms of competition, there will be pressure to better align government-controlled
`prices with underlying service costs. International VoiP services are already priced
`well below the official rates and some of VoiP's appeal is that it eliminates the
`access charges interexchange carriers normally have to pay to interconnect to the
`local exchange carrier. ln the United States, these charges range from US 2 cents to
`US 5 cents per minute.
`
`Advantages of VoiP
`The key benefits of VoiP are cost savings associated with toll calls, enhanced voice
`services, and creative and innovative new applications. The key concerns related to
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 330
`
`
`
`350
`
`Chapter 11
`
`• Next-Generation Network Services
`
`Regulations Related to VoiP
`It's one thing to approach telephony on the Internet such that the incumbent is pro(cid:173)
`tected from competition with other voice telephony services on the Internet. But stat(cid:173)
`ing that voice on the Internet should not be allowed would be to cut your own throat.
`All the exciting new applications on the Internet do involve the use of multimedia
`applications, and voice is part of that overall stream. So, we have to be very careful
`about what we're regulating-whether it's voice, which is increasingly part of a larger
`application set, or whether it's traditional voice telephony.
`
`VoiP are voice quality compared to that in today's PSTN; the cost of QoS to ensure
`the same quality as in the PSTN; security; the current lack of compelling applica(cid:173)
`tions; and regulatory issues, such as whether voice wi.ll be allowed on the Internet
`and whether voice will be treated as an altogether different environment- as a con(cid:173)
`verged, integrated application.
`
`VoiP Applications
`VolP includes any set of enabling technologies and infrastructures that digitize
`voice signals and transmit them in packetized format. Three major network archi(cid:173)
`tectures can be used in support of VolP applications:
`
`Voice-over intranets, which could be based on leased lines, Frame Relay,
`ATM, or VPNs
`• Voice-over extranets, which could also be based on leased lines, Frame
`Relay, ATM, or VPNs
`• Voice over the public Internet
`
`The following sections discuss some of the key issues related to VolP applications.
`
`IP Long-Distance Wholesale
`So far, the most compelling business case for VolP has been in IP long-distance
`wholesale, where there are clear financial benefits and low barriers to entry. Early
`pioneers in this area include iBasis, ITXC, and Level 3, which predominantly offer
`lP services to domestic and international carriers, but also offer services to corpo(cid:173)
`rations and other service providers. What the customers gain by doing business in
`this fashion is a reduction in cost associated with carrying their traffic over expen(cid:173)
`sive toll or international transit links.
`ln IP long-distance wholesale, the voice service levels must match those of the
`PSTN. End customers of the international carriers expect to perceive the same voice
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 331
`
`
`
`VoiP
`
`351
`
`D 5oftswitch
`
`'
`
`'
`
`/
`
`557
`Network
`
`P5TN
`
`Broadband
`Packet Network
`
`P5TN
`
`VOIP{Trunking
`Gateway
`
`VOIP/Trunking
`Gateway
`
`VOIP{Trunking
`Gateway
`
`P5TN
`
`---- i
`
`L
`
`Figure 11.11 A converged long-distance network
`
`quality throughout. How can providers guarantee that when it's almost impossible to
`control QoS over the public Internet? Even in the case of IP backbones, QoS depends
`on the underlying architecture used. The solution lies in smart management of
`packet latency, to ensure circuit-like behavior inside the IP network. For example,
`iBasis developed a proprietary routing algorithm that monitors performance on the
`Internet; when it detects that congestion levels may affect the quality of the voice, it
`swi.tches the calls over to the circuit-switched network, thereby ensming that cus(cid:173)
`tomers experience the high quality that they expect end-to-end.
`The lP long-distance wholesale environment takes advantage of a converged
`voice/data backbone by using trunking gateways to leverage the PSTN (see Figure
`11.11). This allows support and processing of voice calls. The trunking gateways
`enable connection of the data network to the PSTN, to support long-haul carrying of
`the switched calls. In addition, svvitching services can be added to the data networks
`through the use of softswitches. (The functions and types of softswitches and gate(cid:173)
`ways that make up the new public network are discussed later in this chapter.)
`These are main issues in selecting providers of IP long-distance wholesale:
`
`Voice quality versus bandwidth- How much bandwidth do you use to
`ensure the best quality?
`Connecting to the customer-How many services need to be supported
`(voice, data, dialup modem, fax, ISDN, xDSL, cable modem)?
`Maintaining voice quality- As bandwidth becomes constrained, how do
`you maintain the voice quality?
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 332
`
`
`
`352
`
`Chapter 1 1
`
`• Next-Generation Network Services
`
`IP Telephony
`There are two main approach es to IP telephony. First, there's IP telephony over the
`Internet. Calls made over the public Internet using IP telephony products provide
`great cost-efficiencies. But the Internet is a large, unmanaged public network, with
`no reliable service guarantee, so the low costs come at a trade-off. International
`long-distance consumer calls are the major application of IP telephony over the
`Internet. Second, the use of private IP telephony networks is rapidly emerging. In
`this approach, calls are made over private WANs, using IP telephony protocols.
`The network owner can control how resources are allocated, thereby providing
`QoS and a managed network. Many private IP telephony networks are being built.
`They enable an enterprise to take advantage of its investments in the IP infrastruc(cid:173)
`ture. Again, because this is a single-owner network, th e QoS issues are much easier
`to contend with; in fact, a single-owner network makes it possible to contend with
`QoS issues!
`Multinational enterprises spend billions of dollars on international voice ser(cid:173)
`vices each year, so the savings that lP telephony offers is compelling. The cost ben(cid:173)
`efit of nmning voice services over a private IP network is on th e order of 20% or
`more savings on international long distance, as compared to using traditional voice
`services. Private IP transport platforms will be increasingly deployed, therefore, as
`an enterprisewide telephony option.
`Recent deployment of IP local exchange products, coupled with low-band(cid:173)
`width, high-quality voice compression , creates a solid foundation for extending
`business telephone service to telecommuters at home or on the road. Th e efficien(cid:173)
`cies of IP packet technology, coupled with the ITU G.723. l voice compression
`standards at 6.4Kbps, enable road warriors and small office/home office workers to
`have a complete virtual office over a standard 56Kbps Internet modem connection
`to the office. The really great feature of this environment is that your current loca(cid:173)
`tion is your office and your IP phone rings wherever you are. However, this
`requires an lP local exchange- a carrier-class product that resides in the service
`provider network and provides PBX-like telephony service to multiple business
`and telecommuter customers. It also requires a softswitch (that is, call-agent soft(cid:173)
`ware) that's used for purposes of managing call processing functions and adminis(cid:173)
`tration. Also, end-user services are delivered via IP Ethernet phones or analog
`telephones that use Ethernet-to-analog adapters.
`There are three major categories of IP phones:
`
`• POTS phone-The advantage of the POTS phone is high availability and
`low price. The disadvantage is that it has no feature buttons and the
`required Ethernet-to-analog adapter is quite costly.
`• Soft phone-A soft phone is software that runs on the user's PC and graphi(cid:173)
`cally resembles a telephone. Its advantage is low price. Its disadvantage is that
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 333
`
`
`
`VoiP
`
`353
`
`•
`
`it relies on the PC sound card, and it can create volume level problems when
`you switch between it and other applications that use the PC sound card.
`IP Ethernet phone-This device looks and works just like a traditional
`multiline business display phone, and it plugs into an Ethernet Rj-45 jack.
`It's priced similarly to PBX phones, at US$300 and up . Emerging "IP phone
`on a chip" technologies promise dramatically lower prices in the near
`future.
`
`The evolution of IP telephony will involve many different types of applica(cid:173)
`tions, including long-distance wholesale voice services; the support of voice appli(cid:173)
`cations for campus or enterprise networks in bringing VolP to the desktop in the
`form of new advanced applications that involve converged streams (such as video
`conferencing or multimedia in the establishment of remote virtual offices); Inter(cid:173)
`net smart phones; IP PBXs; IP centrex service; unified messaging; Internet call
`waiting; and virtual second-line applications.
`
`Vo/P Enhanced Services
`Another approach to supporting voice services is to look toward enhanced ser(cid:173)
`vices. There are two categories of enhanced services:
`
`• Transaction-oriented services-These services include Click-N-Call appli(cid:173)
`cations, interactive chat, Surf-With-Me, videoconferencing, and varieties of
`financial transactions.
`• Productivity-enhancing services-These services include worldwide for(cid:173)
`warding, multiparty calling, a visual second line, unified messaging, collab(cid:173)
`oration, access to online directories, visual assistance, CD-quality sound,
`personal voice response, and video answering machines.
`
`The key to enhanced services is not cost savings, but cost savings are realized
`through toll bypass, QoS differentiation, the capability to support remote access,
`an d the capability to create new forms of messaging. Because of the cost savings
`and features available, the use of enhanced services will grow by leaps and bounds
`over the next several years.
`VolP is part of a larger trend toward innovative voice-enabled Internet applica(cid:173)
`tions and network interactive multimedia. This trend includes various facilities to
`enhance e-commerce, customer service, converged voice and visual applications,
`new intelligent agents and variou s forms of bots, and e-calling campaigns. These
`sorts of advanced services make it possible to gain greater value from the IP invest(cid:173)
`ments that have been made, and at the same time, they create interesting n ew reve(cid:173)
`nue streams with altogether n ew businesses.
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 334
`
`
`
`354
`
`Chapter 11
`
`• Next-Generation Network Services
`
`We'll see VolP applications increasingly used in a number of ways. VolP appli(cid:173)
`cations will be included on Web-based call centers as automatic call-backs from
`customer service-based phone numbers entered into a Web page; as multiparty
`conference calls, with voice links and data sharing, initiated also from a Web page;
`and in the process of reviewing and paying bills. The key is to blend rich, Internet(cid:173)
`based content with a voice service. An example of an emerging application that
`illustrates such innovation is online gaming. lnnoMedia and Sega Enterprises are
`integrating lnnoMedia Internet telephony into Sega Dreamcast game consoles to
`allow game players worldwide to voice chat with each other while playing games.
`This device can also be used to cost-effectively place calls in more than 200 coun(cid:173)
`tries through InnoSphere, InnoMedia's global network. For example, the rate from
`the United States to Hong Kong will be US2 cents per minute, from the United
`States to the United Kingdom it will be USS cents, and from the United States to
`j apan, Australia, and most of Europe, it will be US9 cents.
`Another example of an interesting new VolP application is Phonecast, a media
`network of Internet-sourced audio channels for news, entertainment, and shop(cid:173)
`ping, available to telephones. Created by PhoneRun and WorldCom, Phonecast is
`modeled after television and radio broadcasting, and it allows callers to create a
`personal radio station and direct it by using simple voice commands. This is the
`first of a series of innovative content and service partnerships, assembled to form a
`comprehensive voice-portal product line.
`
`VoiP Service Categories
`There are several main VolP service categories:
`
`•
`
`• Enterprise-based VoiP-ln enterprise-based VolP, whether for the LAN or
`WAN, specialized equipment is required at the customer site.
`IP telephony service providers-These providers are generally involved in
`toll-bypass operations. They do not require specialized equipment at the
`customer site, but they may require additional dialing procedures to gain
`access to the network. Currently, multistage dialing is one of the problems
`we still face: You have to dial a seven- or eight-digit number to gain access
`to your ISP, and then you have to dial a string of digits for the auth entica(cid:173)
`tion code, and then you have to dial the string of digits corresponding to
`the number you want to reach. Single-stage dialing will remedy this situa(cid:173)
`tion in the very n ear future.
`• Converged service providers- These companies will bundle together
`voice, data, and video services.
`• Consumer VoiP-Consumer VolP is generally geared toward consumer
`connections over the public Internet.
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 335
`
`
`
`VoiP
`
`355
`
`VoiP Network Elements
`VoiP may seem like rocket science compared to conversations, but the concept is
`really quite simple: Convert voice into packets for transmission over a company's
`TCPIIP network. Two characteristics determine the quality of the VolP transmis(cid:173)
`sion: latency and packet loss. Latency is the time it takes to travel from Point A to
`Point B. The maximum toleran ce for voice latency is about 250 milliseconds, and
`it's recommended that the delay be less than 150 milliseconds. Small amounts of
`packet loss introduce pops and clicks that you can work around, but large amounts
`of packet loss render a conversation unintelligible. With too much packet loss, you
`would sound like you were saying "Da dop yobla bleep op bop," because little
`packets with much of your conversation would have been lost in congestion and
`could not be retransmitted while working within the delay requirements of voice.
`Hence, packet loss with VoiP can cause big chunks of a conversation to be lost.
`(We will talk about ways to resolve that a little later in this chapter.)
`VoiP gateways have allowed IP telephony applications and new, innovative
`VolP applications to move into the mainstream. Other features that have helped
`the development of VoiP are Internet telephony directory, media gateways, and
`softswitches, as well as telephony signaling protocols.
`
`Vo/P Gateways
`VoiP gateways bridge the traditional circuit-switched PSTN and the packet(cid:173)
`switched Internet. Gateways overcome the addressing problem. A couple years ago,
`for two VoiP users to communicate, they had to be using the same software, they
`had to have sound cards and microphones attached to their PCs , and they had to
`coordinate a common time during which both would be online in order to engage
`in a VoiP session. Gateways have made all that unnecessary, and now the only
`requirement is that you know the user's phone number. Phone-to-PC or PC-to(cid:173)
`phone operation requires the use of only one gateway. Phone-to-phone operation
`requires two gateways, one at each end.
`VolP gateway functionality includes packetizing and compressing voice;
`enhancing voice quality by applying echo cancellation and silence suppression;
`dual-tone multifrequency (DTMF) signaling support (that is, touch-tone dialing);
`routing of voice packets; authentication of users; address management; administra(cid:173)
`tion of a network of gateways; and the generation of call detail records that are
`used to create bills and invoices.
`To place a call over a VolP network, the customer dials the number the same
`way as on a traditional phone. The edge device, the VoiP gateway, communicates
`the dialed number to the server, where call-agent software-
`that is, a softswitch(cid:173)
`determines what is the appropriate IP address for that destination call number and
`returns that IP address to the edge device. The edge device then converts the voice
`signal to IP format, adds the given address of the destination node, and sends the
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 336
`
`
`
`356
`
`Chapter 11
`
`• Next-Generation Network Services
`
`signal on its way. If enhanced services are required, th e softswitch is called back
`into action to perform the additional functions . (The softswitch is also referred to
`as a Class 5 agent because it behaves like a local exchange or a Class 5 office.)
`There are two primary categories of VolP gateways:
`
`• Gateways based on existing router or remote access concentrator (RAC)
`platforms- The key providers here include the traditional data networking
`vendors, such as 3Com , Cisco, Lucent, and Motorola. As incumben t equip(cid:173)
`ment suppliers to ISPs, the data networking vendors are capturing the larg(cid:173)
`est percentage of these sales. They represented the majority of VolP gateway
`sales through 2000 because ISPs were buying gateways at a fast rate based
`on the significant wholesale opportunity available to larger carriers.
`• Server-based gateways- These are designed from the ground up to support
`VolP Key providers of server-based gateways include telecommunications
`vendors, as well as companies specifically designed for this business; Clar(cid:173)
`ent, Ericsson , Lucent, NetSpeak, Nortel, Nuera, and VocalTec are among
`the vendors involved. These gateways will overtake router and RAC solu(cid:173)
`tions as incumbent carriers deploy more server-based gateways with exten(cid:173)
`sive call server and signaling capabilities.
`
`More and more merger and acquisition activities will lead to blended solutions,
`causing the distinction between the different types of gateways to blur. RAC- and
`router-based gateways will take on more enhanced call-server characteristics as a result.
`The market segments for the two categories, then, are composed of the following:
`
`•
`
`• Enterprise VolP gateways- These gateways are customer premise equipment
`deployed between a PBX and a WAN device, typically a router, to provide call
`setup, call routing, and conversion of voice into IP packets and vice versa.
`• VoiP routers-Voice cards perform packetization and compression func(cid:173)
`tions and are inserted into a router chassis. The router then directs the
`packets to their ultimate destination.
`IP PBXs-An IP PBX is an infrastructure of distributed telephony servers that
`operates in packet-switched mode and offers the benefits of statistical multi(cid:173)
`plexing and IP routing. We are still in the early days for IP PBXs, although
`they are beginning to emerge as a viable alternative. A key concern is reliabil(cid:173)
`ity. (IP PBXs are discussed in more detail later in this chapter.)
`• Service-provider VolP gateways- These are used to aggregate incoming
`VolP traffic and route the traffic accordingly. The role is analogous to that of
`the local exchange. Challenges include the local loop competition among the
`incumbent carriers, quality concerns, shortage of product, interoperability
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 337
`
`
`
`VoiP
`
`357
`
`issues, the lack of hot-swappable and redundant support, and the lack of Net(cid:173)
`work Equipment Building Systems (NEBS) compliance.
`• VolP access concentrators- VoiP cards fit into an existing dial access
`concentrator.
`• SS7 gateways- SS7 gateways are critical to enabling us to tap into the intelli(cid:173)
`gence services that enhance so much of the telephony activity on the PSTN.
`
`Th ere are many gateway vendors. All gateway vendors share the need for digi(cid:173)
`tal signal processors and embedded software solutions that provide for silen t sup(cid:173)
`pression, echo cancellation, compression and decompression, DTMF signaling,
`and packet management. Th erefore, another very important part of this equation is
`the component vendors. Manufacturers of VoiP equipment need to con tinue to
`make quality improvements in the underlying technology. This includes address(cid:173)
`ing interoperability between different gateway vendors' equipment; improving the
`tradeoffs between cost, function, and quality; and introducing single-stage dialing
`and the ability to dial from any telephone.
`
`Internet Telephony Directory
`An Internet telephony directory is a vital piece of the VolP puzzle, so this section
`talks a little bit about the IETF Request for Comment 2916, also known as ENUM
`services. ENUM services convert telephone numbers into the Internet address
`information required to support all forms of IP-enabled communication services,
`including real-time voice, voicemail, fax, remote printing, and unified messaging.
`In other words, ENUM is a standard for mapping telephone numbers to IP
`addresses. DNS translates URLs to IP addresses, and EMUM uses the DNS to map a
`PSTN phone number (based on th e E.l64 standard) to the appropriate URLs.
`ICANN is considering three proposals for the . tel domain. The applicants are
`NetNumber, which currently runs the Global Internet Telephony Directory (an
`implementation of ENUM that is used by IP-enabled platforms to convert standard
`telephone numbers in to Internet address information) , Number. tel, and Telnic
`based in the United Kingdom. The ITU is trying to advance an implementation of
`the IETF ENUM standard under the domain el64.arpa. In this implementation,
`control of telephone number addressing on the Internet would be distributed to
`the more than 240 national public network regulatory bodies that administer tele(cid:173)
`phone numbers for the PSTN.
`
`Media Gateways
`Media gateways provide seamless interoperability between circuit-switched, or
`PSTN, networking domains and those of the packet-switched realm (that is, IP, AIM,
`and Frame Relay networks). They interconnect with the SS7 network and enable the
`
`APPENDIX C
`
`AT&T, Exh. 1003, p. 338
`
`
`
`358
`
`Chapter 11
`
`Next-Generation Network Services
`
`handling of IP services. They're designed to support a variety of telephony signaling
`protocols. Media gateways are designed to support Class 4, or toll-switch, functions,
`as well as Class 5, or local exchange, services. They operate in the classic public net(cid:173)
`work environment, where call con trol is separate from media flow. They support a
`variety of traffic-
`including data, voice, fax , and multimedia-over a data backbone.
`Enhanced applications of media gateways include network conferencing, network(cid:173)
`integrated voice response, fax serving, network, and directory services.
`As shown in Figure 11.12, media gateways fit between the access and core lay(cid:173)
`ers of the network, and they include several categories: VoiP trunking gateways,
`VoiP access gateways, and network access service devices. They provide service
`interconnection or intercarrier call handling. The trunking gateways interface
`between the PSTN and VoiP networks, terminating trunks associated with SS7 con(cid:173)
`trol links. These Time Division Multiplexed trunks carry media from an adjacent
`switch in the traditional circuit-switched network, and the adjacent switch gener(cid:173)
`ally belongs to another service provider. (Depending on the agreements between
`service providers, these are also referred to as cocarrier trunks or feature group D
`trunks.) The trunking gateways manage a large number of digital virtual circuits.
`The access gateways provide traditional analog or ISDN interfaces to the VoiP net(cid:173)
`work