WELCOME TO THE LUCENT TECHNOLOGIES REMOTE ACCESS BUSINESS UNIT THE EDGE PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: WELCOME TO THE LUCENT TECHNOLOGIES REMOTE ACCESS BUSINESS UNIT THE EDGE


1
WELCOME TO THE LUCENT TECHNOLOGIESREMOTE ACCESS
BUSINESS UNITTHE EDGE
ENTERPRISE SEMINAR
2
Seminar Agenda
900 - 915 a.m. Introduction 915 - 1000
a.m. View From the Edge 1000 - 1045
a.m. VPN 1045 - 1100 a.m. Break 1100 - 1145
a.m. Voice over IP 1145 - 1200 p.m.
Break 1200 - 130 p.m. Panel Discussion
3
WELCOME TO THE LUCENT TECHNOLOGIESREMOTE ACCESS
BUSINESS UNITTHE EDGE
ENTERPRISE SEMINAR
4
View From the Edge
5
Agenda
  • View from the edge of the network
  • Market drivers
  • A common view of the edge
  • How can Lucent Technologies help?
  • Simplify the edge - A new view
  • Product solutions
  • New technologies
  • Leverage existing infrastructures

6
Edge Networking Market Drivers
  • Remote user communities growing exponentially
  • Branch offices, telecommuters, mobile user,
    vendors, customers
  • Evolving telecommuting policies
  • Increasing need for high-speed connectivity
  • Users now have more sophisticated requirements

7
A Common View of the Edge
8
A Common View of the Edge
MOBILE USER
MODEM
ANALOG
T1
T1
9
A Common View of the Edge
MOBILE USER
MODEM
ANALOG
T1
TELECOMMUTER/ SOHO
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
10
A Common View of the Edge
MOBILE USER
MODEM
ANALOG
T1
TELECOMMUTER/ SOHO
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
ISDN
BRANCH OFFICE
MODEM
ISDN TA
11
A Common View of the Edge
MOBILE USER
MODEM
ANALOG
T1
TELECOMMUTER/ SOHO
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
ISDN
BRANCH OFFICE
MODEM
ISDN TA
T1/FRAME RELAY
LARGE REGIONAL SITE OFFICE
ROUTER
T1
PBX
12
A Common View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
T1
TELECOMMUTER/ SOHO
COMM. SERVER
SERVER
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
MODEM BANK
RADIUS AUTHENTICATION SERVER
ISDN
T1, T3
CORP. ROUTER
BRANCH OFFICE
MODEM
ISDN TA
INTERNET
T1/FRAME RELAY
LARGE REGIONAL SITE OFFICE
ROUTER
T1
PBX
13
A Common View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
T1
TELECOMMUTER/ SOHO
COMM. SERVER
SERVER
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
MODEM BANK
RADIUS AUTHENTICATION SERVER
ISDN
T1, T3
CORP. ROUTER
BRANCH OFFICE
MODEM
ISDN TA
INTERNET
T1/FRAME RELAY
SCALABILITY
LARGE REGIONAL SITE OFFICE
ROUTER
T1
PBX
14
A Common View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
T1
TELECOMMUTER/ SOHO
COMM. SERVER
SERVER
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
MODEM BANK
RADIUS AUTHENTICATION SERVER
ISDN
T1, T3
CORP. ROUTER
BRANCH OFFICE
MODEM
ISDN TA
INTERNET
T1/FRAME RELAY
RELIABILITY
LARGE REGIONAL SITE OFFICE
ROUTER
T1
PBX
15
A Common View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
T1
TELECOMMUTER/ SOHO
COMM. SERVER
SERVER
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
MODEM BANK
RADIUS AUTHENTICATION SERVER
ISDN
T1, T3
CORP. ROUTER
BRANCH OFFICE
MODEM
ISDN TA
INTERNET
T1/FRAME RELAY
SECURITY
LARGE REGIONAL SITE OFFICE
ROUTER
T1
PBX
16
A Common View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
T1
TELECOMMUTER/ SOHO
COMM. SERVER
SERVER
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
MODEM BANK
RADIUS AUTHENTICATION SERVER
ISDN
T1, T3
CORP. ROUTER
BRANCH OFFICE
MODEM
ISDN TA
INTERNET
T1/FRAME RELAY
COST
LARGE REGIONAL SITE OFFICE
ROUTER
T1
PBX
17
A Common View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
T1
TELECOMMUTER/ SOHO
COMM. SERVER
SERVER
ANALOG/ISDN
ANALOG
T1
MODEM
ANALOG
ANALOG
MODEM BANK
RADIUS AUTHENTICATION SERVER
ISDN
T1, T3
CORP. ROUTER
BRANCH OFFICE
MODEM
ISDN TA
INTERNET
T1/FRAME RELAY
MANAGEABILITY
LARGE REGIONAL SITE OFFICE
ROUTER
T1
PBX
18
How Lucent Technologies Can Help
  • Simplify, create efficiencies in your network
  • Lucent Technologies edge portfolio
  • Small business access routers
  • Remote access servers
  • PortMaster 3
  • Remote access concentrators
  • PortMaster 4
  • Leverage existing network infrastructures to take
    advantage of new technologies

19
A New View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
TELECOMMUTER/ SOHO
SERVER
ISDN
ROUTER
ISDN
T1/DS3 FR/ATM
RADIUS AUTHENTICATION SERVER
BRANCH OFFICE
ROUTER
FRAME RELAY
LARGE REGIONAL SITE OFFICE
PBX
T1 OR FRAME RELAY
T1
20
A New View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
TELECOMMUTER/ SOHO
SERVER
ISDN
ROUTER
ISDN
T1/DS3 FR/ATM
RADIUS AUTHENTICATION SERVER
BRANCH OFFICE
ROUTER
FRAME RELAY
LARGE REGIONAL SITE OFFICE
PBX
T1 OR FRAME RELAY
T1
21
Lucent TechnologiesAccess Routers
  • Allow multiple users (1-100) to share single
    connection
  • Flexible port configurations
  • High performance routing
  • Built-in security features
  • Firewall support
  • Ultra-reliable ComOS

22
A New View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
TELECOMMUTER/ SOHO
SERVER
ISDN
ROUTER
ISDN
T1/DS3 FR/ATM
RADIUS AUTHENTICATION SERVER
BRANCH OFFICE
ROUTER
FRAME RELAY
LARGE REGIONAL SITE OFFICE
PBX
T1 OR FRAME RELAY
T1
23
Lucent Technologies PortMaster 3
  • Multi-service, Remote Access Server
  • V.90 digital modems, ISDN, Frame Relay
  • Multiprotocol routing
  • Scalable design
  • Built-in security
  • RADIUS, Firewall
  • Internet-proven Lucent Technologies ComOS

24
A New View of the Edge
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
TELECOMMUTER/ SOHO
SERVER
ISDN
ROUTER
ISDN
T1/DS3 FR/ATM
RADIUS AUTHENTICATION SERVER
BRANCH OFFICE
ROUTER
FRAME RELAY
LARGE REGIONAL SITE OFFICE
PBX
T1 OR FRAME RELAY
T1
25
Lucent Technologies PortMaster 4
  • Next generation access concentrator
  • Any service, any port, any time
  • Modem, ISDN, Frame Relay
  • Scalable design
  • 5 Gbps ATM switching fabric
  • Linearly scalable performance
  • Engineered for emerging technologies
  • Fault tolerant
  • Robust ComOS

26
New Ways to Optimize the Edge
  • Two new technologies are allowing customers to
  • Leverage existing network infrastructures
  • Offer more enhanced services
  • Reduce cost and network complexity

27
Virtual Private Networks (VPN)
  • What is a VPN?
  • A means of augmenting a shared network on a
    secure basis through encryption and/or tunneling
  • Tunnels created between endpoints for
    transporting data securely across public
    networks
  • Benefits
  • Leverages existing Service Provider
    infrastructure for private data communications
  • Cost savings

28
VPN
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
TELECOMMUTER/ SOHO
SERVER
ISDN
ROUTER
VPN Tunnel
ISDN
T1/DS3 FR/ATM
RADIUS AUTHENTICATION SERVER
REMOTE ACCESS CONCENTRATOR
BRANCH OFFICE
ROUTER
FRAME RELAY
VPN Tunnel
LARGE REGIONAL SITE OFFICE
PBX
RAS
PSTN
T1 OR FRAME RELAY
T1
29
Voice over IP (VoIP)
  • What is VoIP?
  • A developing technology that offers an
    alternative to the traditional PSTN for voice
    applications
  • VoIP Benefits
  • Leverages existing private enterprise data
    network for voice
  • Reduces need to add capacity to enterprise voice
    networks
  • Significant cost savings

30
Voice over IP
MOBILE USER
CORPORATE SITE
MODEM
PBX
ANALOG
TELECOMMUTER/ SOHO
SERVER
ISDN
ROUTER
ISDN
T1/DS3 FR/ATM
RADIUS AUTHENTICATION SERVER
REMOTE ACCESS CONCENTRATOR
BRANCH OFFICE
ROUTER
FRAME RELAY
VoIP Call
VoIP Call
LARGE REGIONAL SITE OFFICE
T1 OR FRAME RELAY
RAS
PSTN
PBX
31
Summary
  • Evaluate your current view
  • Consider the issues
  • Build with growth and future technologies in mind
  • Lucent Technologies is the edge networking
    expert

32
WELCOME TO THE LUCENT TECHNOLOGIESREMOTE ACCESS
BUSINESS UNITTHE EDGE
ENTERPRISE SEMINAR
33
Secure Virtual Private Networking (VPN)
34
Agenda
  • Why Virtual Private Networks (VPN)
  • What is a VPN
  • How VPNs work
  • Applications
  • Lucent Technologies products

35
Why Virtual Private Networking (VPN)?
  • Mobile workforce
  • Growth of telecommuting
  • Decentralization of corporations (Intranets)
  • Tighter integration of supply chains (Extranets)
  • Data theft is rising
  • Pressures to cut networking costs

36
How VPNs Save Money
Total Annual Communications Charges for 500 Users
Flat-rate ISP account for VPN access
Usage-based quality VPN service with SLAs
800 service for traditional dial access
19.95/month
0.05/min.
0.08/min.
0.10/min.
2.50/hour
Average hours connected per month per user
150K 225K 300K
10 hrs./month 15 hrs./month 20 hrs./month
288K 432K 576K
180K 270K 360K
360K 540K 720K
119.7K 119.7K 119.7K
37
What is a VPN?
  • Virtual Private Networking (VPN) to transmit data
    over the Internet or managed IP-based network
  • Tunneling
  • Authentication
  • Secure VPN adds
  • Encryption
  • Digital certificates
  • Automates key management

38
Sound Security Characteristics
  • Confidentiality
  • 168-bit Triple DES encryption
  • Integrity
  • IPSec ESP encapsulation
  • Authentication
  • x.509 v.3 Digital Certificate Authentication
  • IPSec Authentication Header (AH)
  • Secure Hash Algorithm
  • HMAC-SHA1
  • HMAC-MD5

39
Secure VPN Standards
  • Standards proposed by IETF IPSec working group
  • Internet Key Exchange (IKE)
  • IPESP, ESP Mode and AH Mode
  • Full 56-bit DES and 168-bit Triple DES encryption
  • X.509 v.3 Digital Certificates
  • RSA and Digital Signature Standard (DSS)
  • Secure Hash Algorithm (HMAC-SHA1) MD5
    (HMAC-MD5)
  • RSA and Diffie-Hellman key exchange

40
IPSec VPN Standards
  • Internet Key Exchange (IKE) is the mandatory
    IETF IPSec standard
  • Enables companies to use single standard
    architecture
  • Allows for a broad range of electronic commerce
    applications
  • Interoperability with other vendorseventually

41
Secure VPN Standards
  • Internet Protocol Encapsulating Security Payload
    (IPESP)
  • Provides capability to use a remote IP address
    from a corporate LAN for remote users/units
  • Benefits
  • Strongest level of security
  • Corporation can provide access to internal
    resources based on internal IP addresses
  • Encapsulation of internal IP addresses allows
    for the routing of non-routable address
    spaceover the public network

42
How Does a Secure VPN Device Work?
  • Prior to shipment, each Secure VPN hardware unit
    will generate a unique Public/Private Key and a
    X.509 v.3 Digital Certificate
  • Enables authentication and access control of VPN
    units by a network administrator

PortMaster 3
43
How Does a Secure VPN Device Work?
  • Step 1
  • Branch Office client sends query to Corporate
    server over the Internet

Hub Corporate HQ Server
Spoke Branch Office Client
SVPN Hardware
SVPN Hardware
Internet
Query Server
44
How Does A Secure VPN Device Work?
  • Step 2
  • Branch Office query triggers IKE
  • Branch Office VPN device sends X.509 v.3 Digital
    Certificate with Public Key tothe SVPN unit at
    Corporate HQ

Spoke Branch Office Client
Hub Corporate HQ Server
SVPN Hardware
SVPN Hardware
Internet
x.509v3
45
How Does A Secure VPN Device Work?
  • Step 3
  • Corporate HQ SVPN unit extracts Digital
    Certificate and Public Key from packet sent by
    Branch Office
  • Digital signature verified using
  • SVPN Vendor Public Key
  • Packet verified using
  • Public Key from received Certificate
  • Once verified, Corporate HQ SVPN unit has
    authenticated Branch Office SVPN

Spoke Branch Office Client
Hub Corporate HQ Server
SVPN Hardware
SVPN Hardware
Internet
Verifies x.509v3
46
How Does A Secure VPN Device Work?
  • Step 4
  • Branch Office SVPN unit extracts X.509 v.3
    Digital Certificate and Public Key from packet
    sent by Corp HQ SVPN
  • Verification of digital signatures using
  • CA Vendor Public Key in each and used to verify
    the X.509 v.3 Certificate
  • Public Key received from X.509 v.3 Certificate to
    verify packet
  • Once verified, Branch Office SVPN unit
    authenticates Corporate HQ SVPN

Hub Corporate HQ Server
Spoke Branch Office Client
SVPN Hardware
SVPN Hardware
Internet
Verifies x.509v3
47
How Does A Secure VPN Device Work?
  • STEP 5
  • SVPN unit on the Corporate HQ LAN and the Branch
    Office LAN used public information IKE and
    private information from its own private keys
    generating a shared encryption key to have DES or
    Triple DES encryption between the SVPN units
  • Shared secret

Spoke Branch Office Client
Hub Corporate HQ Server
SVPN Hardware
SVPN Hardware
Internet
Shared DES Key
Shared DES Key
48
How Does A Secure VPN Device Work?
  • STEP 6
  • Corporate HQ and Branch Office now havesecure,
    encrypted and authenticated communications over
    network
  • Corporate HQ VPN unit and Branch Office VPN unit
    have exchanged Public Keys and generated shared
    secret (DES) keys
  • Private keys never left respective VPN units

Spoke Branch Office Client
Hub Corporate HQ Server
SVPN Hardware
SVPN Hardware
Internet
Secure Association
49
How Some People Are Implementing VPNs
  • Pilot VPN for remote access application
  • Drop in a Gateway product for site-to-site VPN
  • Add IPSec or L2TP VPN to Frame Relay site-to-site
    connections
  • Use a Service Provider/ISP for a VPN service

50
Secure Virtual Private Networks (SVPN)
  • Enterprise focused
  • Enabler of secure communications over a public
    network savings
  • Secure Extranets
  • Secure Intranets
  • Secure Remote Access

51
Secure Extranets Applications
  • Secure connections for multiple corporations and
    users on its high speed cable based network

PortMaster 3
PortMaster 3
VPN Gateway
52
Secure Intranets Application
  • Secure access between corporateworkgroups (LAN
    to LAN over WAN, and LAN subnet-to-subnet)

IT Department
Research Group B
Research Goup A
53
Secure Remote Access Application
  • Securely connecting remote, mobile, and
    telecommuting users securely to corporate
    information via VPN

IPSec Remote Client
54
What To Look For
  • Reliability
  • Failover, routing, redundancy
  • Scalability/performance
  • Hardware support for IPSec and L2TP network
    server (LNS), compression
  • Flexibility
  • Gateway, routing, firewalling, RAS, high-end,
    low-end, client support
  • Interoperability/standards compliance
  • Published results, participation, and proper
    expectations
  • Ease of use
  • Default configurations

55
PortMaster 3 Reliability
  • Multi-service functionality
  • Remote access concentration, routing and/or IPSec
    VPN tunneling from the same platform
  • Packet filter firewall
  • Reliable, proven routing capabilities
  • Routing protocols RIP, OSPF, BGP4
  • Frame Relay support
  • Support for both L2TP and IPSec VPN
  • Stackable virtual-chassis for failover
    capability
  • Up to two integrated CSU/DSU ports (T1/E1/PRI or
    Frame)
  • One asynchronous routable port (115.2kbps)
  • One Ethernet port

56
PMVision Manageability
  • Simplifies PortMaster network management and
    diagnostics
  • Provides real-time visual status
  • Java-based graphical user interface
  • Easy to use
  • Cross-platform portability
  • Default configurations for IPSec
  • Monitoring of active, inactive, errors, stats,
    connections, and health of
  • All sessions
  • All modems
  • All lines and connections
  • Interface summary

57
Lucent Technologies VPN Gateway
  • VPN Gateway includes
  • Rack-mountable stateful firewall
  • IPSec Encryption Acceleration Card
  • License for 100 IPSec clients (Windows NT 4.0
    and Windows 95)
  • ICSA Firewall Certification Complete
  • ICSA IPSec Certification 1.0 underway (IPSec,
    IKE)

58
Lucent Technologies VPN Gateway
  • Performance
  • VPN Gateway 5-50 Mbps 2000 simultaneous
    users
  • Security Management System (SMS)
  • Java-based, runs on Windows NT 4.0 and Solaris
    2.5.1
  • Enables tiered hierarchical management of
    security policies
  • Enables policy enforcement

59
Why VPN?
  • In summary, Virtual Private Networks
  • Reduce corporate networking costs
  • Provides easy growth and migration
  • Addresses security issues associated with using
    the Internet or any public network

60
WELCOME TO THE LUCENT TECHNOLOGIESREMOTE ACCESS
BUSINESS UNITTHE EDGE
ENTERPRISE SEMINAR
61
Voice over IP
62
Agenda
  • Market dynamics and drivers
  • VoIP theory of operation
  • IP Telephony architecture

63
VoIP Industry Growth
Arbitrage
Applications
Differentiation
DIFFERENTIATION
Competitive
COMPETITIVE PRESSURES
Network Services Applications
Pressures
Interoperable
INTEROPERABLE NETWORKS
Networks
Deregulation
DEREGULATION FOSTERS GROWTH
Network Providers Overlay Existing Networks
fosters Growth
Arbitrage
ARBITRAGE
Next Generation IP Telephony Deploy New Networks
Early Adopters Trial
1997
64
Market Drivers
  • Arbitrage
  • Transport benefits
  • Operational advantages
  • New service access options
  • Value added integrated services

65
Total Voice over IP Revenue Share by Segment
30
24.39
25
20
15.65
RESIDENTIAL
BILLIONS OF
15
SMALL BUSINESS
MEDIUM/LARGE BUSINESS
10
8.53
4.10
5
1.89
.70
.44
0
1996
1997
1998
1999
2000
2001
2002
Source IDC Packetized Voice Services Market
Assessment and Forecast
66
Components of a Voice Conversation
ESSENTIAL COMPONENTS 22
SILENCE 56
REPETITIVE 22
67
Time Division Multiplexing
WASTED BANDWIDTH
VOICE
SNA
LAN
VIDEO
SINGLE WAN LINK
TDM
68
Packet/Cell
VOICE
NO WASTED BANDWIDTH
Circuit
DATA
Q
Packet
PACKETS
ATM
VIDEO
69
Delay
TOLL QUALITY
The importance of delay in Voice over IP networks
and the usability of voice circuit as a function
of end-to-end delay
TIME (msec)
70
Defining QoS
  • Quality of Service
  • Differing traffic characteristics based on
  • Controlled latency
  • Dedicated bandwidth
  • Improved loss characteristics

71
QoS Requires CQS - Classify, Queue, Schedule
72
Components of a H.323 Network
H.323 Terminal
H.323 Gateway
QoS WAN
H.323 Gatekeeper
H.323 MCU
73
H.323 Terminal Functions
  • System Control Unit with client registration,
    admission and status function to talk with
    Gatekeeper
  • Q.931 to do call set-up
  • H.245 to do call control
  • Audio codec/streams module
  • RTP/RTCP
  • Video codec/streams module - optional
  • User data applications (T.120) - optional

74
H.323 Gateway
  • Convert call control to/from H.323 and other side
    of Gateway (SS7, ATM, ISDN, H.320, H.324, etc.)
  • Transcode audio and video from H.323 formats to
    formats understood on the other side of Gateway

75
H.323 Gatekeeper
  • Mandatory
  • Address translation
  • Admissions control
  • Bandwidth control
  • Zone management
  • Optional
  • Call control signaling
  • Call authorization
  • Bandwidth management
  • Call management
  • Directory services
  • Gatekeeper management
  • Bandwidth reservation

76
H.323 Multipoint Control Unit (MCU)
  • Manages audio/video conferencing using H.245
  • Provides common conference mode
  • Distribute multicast addresses if utilized
  • Two types of media exchange
  • Centralized (audio and video)
  • Decentralized (audio and video)

77
IP Telephony Architecture
ZONE 2
ZONE 1
PSTN
BILLING SERVER
FEATURE SERVER
FEATURE SERVER
PC
PC
PC
DATA STORES
DATA STORES
PC
SAM
SAM
PSTN
PSTN
GATEWAY 1000
GATEWAY 1000
PSTN
PSTN
78
Typical Enterprise Network
PortMaster 4
T1, E1 n Voice
2-4 Analog
Small PBX, Keyset or POTs
PBX
PSTN
79
Integrated Voice Network Applications
Service Provider
Customer Premises
REMOTE PC/LAPTOP
PSTN
PC (H.323)
RAS
LAN
IP TELEPHONY GATEWAY
LAN PHONE
BASE STATION
IP ExchangeLink
CORDLESS WIRELESS PHONE
IP NETWORK
TRADITIONAL PHONE FEATURES
FAX
80
PBX Services Applications
Service Provider
Customer Premises
REMOTE PC
PSTN
RAS
PC (H.323)
LAN
IP TELEPHONY GATEWAY
LAN PHONE
Router
CORDLESS WIRELESS PHONE
BASE STATION
IP NETWORK
ANALOG, FEATURE PHONE
EXCHANGE ADAPTER
FAX
81
Voice Virtual Private Network
PAY PHONES
PC (H.323)
IP ExchangeLink
CELLULAR/PCS PHONE
PHONES
With Optional IP Telephony Gateway
FAX (TIP/RING)
ROUTER
PC (H.323)
PC (H.323)
ROUTER
IP ExchangeComm
BACKBONE
LAN PHONE
PHONES
EXCHANGE ADAPTER
POTS PHONE
Exchange Adapter
FAX (TIP/RING)
FAX (TIP/RING)
82
Internet Telephony Services and Enhanced
Applications
  • Internet voice telephony
  • Traditional telephone services
  • Call waiting, caller ID, call forwarding
  • Internet fax
  • Internet messaging
  • Call centers
  • Multimedia collaboration
  • Audio conferencing
  • Video conferencing

83
IP Telephony ApplicationKanematsu USA
PHONE CONNECTIONS FROM OTHER KANEMATSU USA
OFFICES
LUCENT ITS-E
TOKYO
NEW YORK
PSINet INTERNET CONNECTION
T1
NEC PBX
LUCENT ITS-E
OSAKA, JAPAN
LUCENT ITS-E
84
Integrated Architecture
COMPRESSION
WAN INTERFACE
CELL SWITCH
ROUTING ENGINE
ENCRYPTION
VOIP PROCESSING
ATM, FRAME RELAY LEASED LINES
TRUE DIGITAL DSP POOL
HDLC POOL
INTEGRAL PPP PROCESSING
VIRTUAL SWITCHING
WAN Interface
DS0/DS1/DS3/HSSI FR
T1/E1/PRI/T3/STS1
OC1/OC3 ATM
Telco
Modem/ISDN
Leased Line Router
VoIP
VoIP
ISDN Router
85
Communications Network Architecture
VALUE ADDED APPLICATION
Server based telephony gateways evolve to layered
architecture of applications servers, modular
gateways, and an integrated communications
infrastructure.
NETWORK POLICY MANAGEMENT
PacketStar IP Manager
  • ADMINISTRATION
  • PROVISIONING
  • MONITORING AND ALARMING
  • CALL SET-UP AND HANDLING
  • REGISTRATION, AUTHENTICATION STATUS
  • ADDRESS TRANSLATION
  • SIGNALING TO END-POINT

PacketStar IP Gatekeeper
MODULAR GATEWAYS
PacketStarTM Gateway Solution
PacketStarTM IP Gateway 1000
INTEGRATED COMMUNICATIONS INFRASTRUCTURE
Remote Access Servers (PortMaster 4)
CO Routing (PacketStar IP Switch)
PBX (Definity IP Trunk)
86
WELCOME TO THE LUCENT TECHNOLOGIESREMOTE ACCESS
BUSINESS UNITTHE EDGE
ENTERPRISE SEMINAR
Write a Comment
User Comments (0)
About PowerShow.com