Course Hero Logo

Exam tip wan link t carriers t1 t3 and e e1 e3

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 535 - 537 out of 817 pages.

EXAM TIPWan link T carriers (T1, T3) and e (e1, e3) carriers use time-division multiplexing (TDM) toshare the media among multiple systems or customers.Private Branch exchange (PBx)Not allinformation commuting over these various networks is data. With improved perfor-mance and priority-rating mechanisms such as QoS, digital networks carry time-sensitivepayloads such as voice and video. One such system is the PBX.ThePBX systemis a privately (business) owned telephone exchange that connects to a T1or T3 dedicated line. Each B channel represents another phone extension on the system, orthe unused channels could be aggregated to provide high-speed Internet connectivity.PBXs have been the target of various attacks and are often overlooked during securityaudits and penetration testing. Most PBXs can be remotely configured by way of an ana-log modem connected to the device’s administrative console. These connections are oftenforgotten and left unsecured by strong and changing passwords. Many attacks have occurredby an attacker dialing in to the administrative console and configuring remote, long-distancecalling accounts. The attacker would sell long-distance service, but the PBX owner would paythe long-distance charges. The attacker could also interrupt or eavesdrop on phone calls onthe PBX.Voice over Internet ProtocolVoIPis another WAN technology. By using audio and videocodecs(encoder/decoders) toencode speech into digital data, VoIP places voice (and possibly video) data into the payloadsof IP packets for delivery to the recipient. If the recipient is also on a VoIP system, the packetswill quite likely commute directly to the recipient wholly over the IP network. This can drasti-cally reduce or eliminate long-distance charges, something that used to take their toll on thecompany budget. If the recipient is not on a VoIP phone, the packets will be delivered to aVoIP media gatewaythat connects VoIP to many telecommunications systems, such as PSTN,cellular, and PBX.Session Initiation Protocol(SIP), by the IETF, is commonly used to create, modify, and termi-nate two-party (unicast) or multiple party (multicast) VoIP sessions. Interestingly, SIP is largelybased on HTTP request and response mechanisms to establish the VoIP calls. A competingtechnology to SIP is theH.323 protocolfrom ITU-T for initiating audio and video sessions overa network.KeyKeyKey
492CHAPTER 7Telecommunications and network securityVoIP is not without its share of technological and logistical problems. Audio and videodata is time sensitive and must arrive promptly, or it has lost its usefulness. Because packet-switched networks, like most IP networks today, can introduce variable delays in the deliveryof packets, VoIP is subject to latency (time lag) and jitter (interruptions in the voice stream). Toovercome this, VoIP relies heavily on QoS features to require priority forwarding of the VoIPpackets through the IP network. TheReal-Time Protocol(RTP), another IETF protocol, assistswith these time-sensitive communications, which helps improve QoS and session initiation.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 817 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
yuo

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture