CTN 8

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

Module: Current Trends in Networking

Lesson: Emerging network applications

© 2018 Arden University Ltd. All rights reserved.


Arden University Limited reserves all rights of copyright and all other intellectual property rights in these learning materials. No part of
any learning materials may be reproduced, stored in a retrieval system or transmitted in any form or by any means, including
without limitation electronic, mechanical, photocopying, recording or otherwise, without the prior written consent of Arden
University Limited.
Emerging network applications

Emerging network applications

With the convergence of voice, video and data onto a single transport network, it has become
easier to transport multimedia, anywhere across the network. This has enabled the design of
voice services purely on IP networks and made it a strong competitor to the traditional Public
Switched Telephone Network (PSTN). Similarly, with Internet access being available at every
home, the potential of delivering live multimedia content was an opportunity that the television
(TV) industry began to exploit by tying up with broadband providers. Out of this evolved IPTV
services. With the continued evolution of connectivity and related technologies, several devices
were connectivity enabled. In the recent past, everyday gadgets such as TVs, kettles, ovens,
refrigerators, and even light bulbs are available with interactive controls and can cooperatively
and intelligently function in the context of a home. This has heralded what is known as the
Internet of Things (IoT) era. In a larger context, where the control aspect of such devices is
concerned, cyber-physical systems (CPS) are in context. Although CPS is a part of the larger
domain of IoT, it is substantially big to be treated separately, given the vast variety of physical
systems it addresses. IoT, the term, is mostly used in the context of big data and decision-
making.

In this lesson, you will navigate through Voice over Internet Protocol (VoIP), Internet Protocol
Television (IPTV) and CPS (in the context of IoT). By the end of this lesson you will be able to
demonstrate an understanding of existing and emerging networked applications such as Voice
over IP, IPTV and IoT applications.

Voice over IP (VoIP)

The basic idea of VoIP is simple. Analogue voice can be digitally encoded, meaning an
analogue waveform is convertible into equivalent digital information. This digital information
can be packetised and transported using the Internet Protocol (IP) over the Internet or any
network infrastructure that uses IP. Once the packets are delivered at the destination, the
digital information must be decoded using a similar, but reverse, technique applied at the
source to retrieve the original audio.

© 2018 Arden University Ltd. ALl rights reserved


Figure 8.01 - Sampling and encoding a signal

The transformation from analogue to digital typically includes three functions namely sampling,
encoding and compression. Sampling (Figure 8.01) specifies how often the analogue
waveform is sampled for instantaneous values. The sampling frequency is the parameter
specified in the context of digitisation. The sampling frequency has to be at least twice the
highest frequency value expected in the signal. The encoding defines how the sample value is
encoded or represented digitally. There are several encoding schemes that have evolved,
each with a different objective in terms of quality or in terms of the volume of data generated.
One of the first was pulse code modulation (PCM)

https://www.youtube.com/watch?v=wXpnPFUwLKk

(Capra Physics 2013).

Once the encoding is done, the resulting bit stream can be compressed to reduce the overall
size of the data. In the case of audio, especially speech, silence suppression is a basic form of
compression. Other conventional compression techniques can be applied in addition to silence
suppression to achieve the smallest possible data size. The complete process of analogue
voice to digital speech signal is illustrated in Figure 8.02. On the receiving side, the exact
reverse process is applied, resulting in the voice being heard in the handset.

© 2018 Arden University Ltd. ALl rights reserved


Figure 8.02 - From analogue to digital - the process

Now, such a digitisation was patented in the late 1940s and was first implemented on
telecommunication networks in 1961. Subsequent uses of digital encoding were extended to
music as well as video, leading to the evolution of the compact disc as a medium for digitised
content. Subsequently, the technology has been implemented on mobile networks also. With
the arrival of the Internet, the possibility of transmitting the digitised voice arose. However, the
limitation was that the Internet and the telecom world were totally different in several aspects,
predominantly - centralised vs. distributed architecture, dumb vs. intelligent end
points/terminals, and telephone numbers vs. IP addresses. The Internet community developed
protocols to provide voice services on the Internet, like that available on the telecommunication
networks.

The next task was to interface the voice services on the two different networks and enable
making calls from one network to another. This was primarily required since most
organisations deployed LANs and could deploy internal voice services using VoIP. They
required to interface with the external telephone network for inbound calling as well as for
outbound calling. In the following sections, you will learn about the VoIP architecture, its
functional components and addressing. The most recent standards for the mobile networks
specify the transport of voice over IP, addressed using the industry term voice over LTE or
VoLTE. The technology itself is proliferating rapidly (Figure 8.03) across different networks.

© 2018 Arden University Ltd. ALl rights reserved


Figure 8.03 - Growth of the VoIP industry

doInteractive("fi05", "CTN_08_2.ini", "500");

Proliferation of VoIP

The reasons why VoIP has gained ground are:

For consumers:

Cheaper and simpler pricing: The explosive growth of companies such as Skype and
Vonage demonstrates the power of consumer demand in driving the growth of VoIP.
Consumers can also find bundling and flat-rate pricing packages attractive. In addition, with
the arrival of smartphones and mobile data, several mobile applications provide voice
calling.

For service providers:

Lower investment, capital and operating costs: These are achieved through innovation,
economies of scale, reductions in the bandwidth required to send a voice message, and
the possibility of offering converged services over a single, unified network.

Entry into new markets: IP networks can be used to offer telephony, Internet access, and a
host of other services. VoIP can be offered by firms that previously specialised in content. It
can also lower barriers to entering new geographical markets. VoIP revenues could

© 2018 Arden University Ltd. ALl rights reserved


compensate for flagging traditional voice revenues and enable operators to enter the
growing broadband market.

Enhanced innovation: It is relatively simple to add media to IP-based communications. New


services can also be offered over a converged IP network, and some of these can be
added via interfaces with existing PSTN equipment.

New business models: VoIP offers the possibility of moving to new business models, such
as flat-rate pricing, or bypassing the traditional accounting rate settlement system.

For businesses:

Cost savings: Small businesses that switch to VoIP (Figure 8.04) reduce the cost of their
local calls by up to 40%. Those same small businesses reduce the cost of their
international calls by up to 90%. VoIP can cut initial startup costs for a new business by up
to 90%.

Security at a lower cost: For institutional and business users, a private network can offer
cost efficiencies as well as greater security and reliability, with no discernible loss in quality
of service.

Figure 8.04 - Features desired from a VoIP system

In a larger context, there were barriers to its deployment that have been overcome over the

© 2018 Arden University Ltd. ALl rights reserved


last few years:

Problems with QoS and reliability: Voice, video and high-speed data services have different
requirements, so bundled products place different burdens on networks in terms of quality
of service (QoS). In terms of security, only limited calling party information may be
available over VoIP.

Resistance by incumbents: Established operators viewed VoIP as a threat to their PSTN


revenues, mainly in countries where the market was monopoly-based or less
mature. However, the benefits of VoIP outweighed those initial concerns, especially when
the trunk traffic on the networks moved to transport over IP. Most operators across the
world have collaborated with content providers and mobile networks to get the complete
benefits of VoIP.

Regulatory uncertainty. Operators had to primarily invest in IP networks and transition their
services to IP. They had argued that, in order to justify heavy investment in broadband
networks for VoIP, they must have a clear and predictable regulatory framework that helps
to guarantee returns on investment. These were solved by specific regulatory changes for
the services.

Initially, the providers had to invest in the IP infrastructure on their networks. Once that
investment was done, what are the potential ways in which they have increased their services
as well as user base? Browse the Internet to gather information and discuss on the Lesson 8
forums, online.

Attempt to find out the variety of new services introduced by the providers. From the user
perspective what are all the communications services you would want? Can you get them all
from a single provider? (After all, you wouldn’t want several bills arriving each month from
different providers, if each of them provided only one service you wanted!)

VoIP architecture

The primary component of the VoIP system is the user end device, which could either be a
VoIP phone, connected to the local data network via a wired or a wireless network, or a
computer with a VoIP application on it. These devices communicate with a local VoIP private
branch exchange (PBX) unit to place calls within and outside the local network, via the
Internet. There are devices that are available, individually or integrated into other devices such

© 2018 Arden University Ltd. ALl rights reserved


as a router, to interface the existing PSTN devices via the local data network, to the PSTN
network. These are the devices marked “FXS” and “FXO” in Figure 8.05. Notice that the FXO
interconnects to the traditional telephone exchange and enables the PSTN phone and the Fax
terminal to interconnect to the PSTN network via the local network. Also notice how the VoIP
gateway services provider interconnects to the PSTN exchange in order to interconnect the
VoIP world and the PSTN world.

Figure 8.05 - A basic VoIP system

© 2018 Arden University Ltd. ALl rights reserved


Figure 8.06 - Interconnectivity of VoIP with other systems

Figure 8.06 illustrates how VoIP interconnects with other systems. Notice that the VoIP PBX or
a VoIP router provide the necessary interfaces between the VoIP systems and the PSTN
systems (traditional phone/PBX, in the figure). The purple clouds indicate the various network
infrastructure that are used for transport. Notice how two PSTN networks can be
interconnected through a VoIP service provider. Switching over to VoIP over long distance
links brought in extra capacity on the existing links and that resulted in the price cuts in the
tariff.

What components might you require for setting up a VoIP service on your local network (LAN)
and interconnect it with a similar VoIP service on another LAN? Discuss this on the Lesson 8
forums online.

VoIP functional components

There are four major VoIP functional components, each with their own standard. They are the
signalling gateway (SG), the media gateway (MG), the media server (or media gateway
controller - MGC) and the application server. Their functions involve identifying the user or user
agent or the calling party, negotiating the call parameters between the calling and the called
parties, transmitting packets between the end points, providing voice mail and/or video
conferencing, and providing specific application level features to users such as personalising
their dialling activities, etc.

© 2018 Arden University Ltd. ALl rights reserved


Figure 8.07 - Role of SG, MGC and MG

Figure 8.08 - Call signalling vs. MGC signalling between SG, MGC and MG

We now look at each of the components in some functional detail. Figure 8.07 shows the
interactions between the components. Notice that the signalling translations (SS7) and the

© 2018 Arden University Ltd. ALl rights reserved


media translations (encoding, compression, etc.) between the PSTN network and the IP
network requires the signalling and a media gateway, each handling the signalling and media
components, respectively. Figure 8.08 clearly illustrates the interactions in terms of call
signalling (dashed lines) and media gateway signalling (solid lines).

Figure 8.09 - Protocols in the context of SG, MGC and MG

Figure 8.09 illustrates the protocols involved in signalling and media transfer. The Integrated
Services Digital Network User Part (ISUP) is used for the establishment of wired connections
between exchanges. It includes messages associated with the connection and disconnection
of calls. ISUP is the protocol used to support the signalling necessary to provide voice and non-
voice services in telephone communications. It is an extension of the signalling standard no. 7
(SS7, defined by the ITU-T's Q.700-series recommendations in 1988), used as the interface
protocol for voice and data within, and for ingression or egression to/from the PSTN. ISUP is
designed to use the services of the SS7 Message Transfer Part (MTP). The corresponding
protocols on the IP network are SIP and IP. For the media part, the digital stream from the
PSTN is packetised and transported as RTP packets over IP.

© 2018 Arden University Ltd. ALl rights reserved


Figure 8.10 - Standards and protocols in the context of SG, MGC and MG

Figure 8.10 provides a comprehensive view of the standards and the protocols used in the
context of the signalling and media gateways. The predominant standard for call control on
PSTN is H.323 from the ITU, and for media, the T.120 suite of protocols. The figure also
illustrates which transport layer TCP or UDP is used by each of the upper layer
functions/protocols. Most signalling protocols use both TCP and UDP whereas media
predominantly uses UDP.

doInteractive("fi05", "CTN_08_3.ini", "500");


doInteractive("fi03", "CTN_08_1.ini", "346");

Signalling Gateway (SG)

The Signalling Gateway (SG) is known as a called agent because of its call control function
and is also commonly referred to as a Media Gateway Controller because of its Media
Gateway control function.

The SGC entity has multiple roles. Its primary role is to interconnect the PSTN and the IP
network. The main characteristics of the SGC are:

Provide a Signalling System 7 (SS7) protocol stack

which is the PSTN’s signalling protocol suite. Often, a separate entity termed as the Signalling
Gateway is used instead.

Full support of voice call control protocols

© 2018 Arden University Ltd. ALl rights reserved


such as H.323 or SIP which are IP signalling protocols, specifically used to set up calls,
negotiate the call parameters like the encoding, compression, encryption methods between the
end points and for tearing down a call.

Full support of media control protocols

such as MGCP or Megaco (H.248) which are used for controlling Media Gateway session
connections and parameters. A media gateway provides translation between different formats
of voice encoding schemes.

Generate Call Detailed Records (CDRs)

for billing purposes.

Provide bandwidth management control

through admission control mechanisms, in other words, new sessions are admitted only if the
system is able in terms of bandwidth to provide an acceptable service to them.

Support of bandwidth policing mechanisms

with the use of media flow profiles, the Signalling Gateway Controller instructs the Media
Gateway to monitor the RTP (real-time protocol) media flow and apply rate limit policies to
aggressive flows. This mechanism also preserves appropriate Quality of Service levels.

Provisioning media connection

allocating media connection characteristics such as coding and packetisation to Media


Gateways as well as specific DS0 allocation for the reservation of media resources.

Support of MGCP or MEGACO

for call control under the administration of the Media Gateway Controller.

Transmission of Voice data using RTP

packetisation of data is necessary when data from the TDM trunks are transferred on to calls
on the IP networks.

Interfaces for PSTN trunks

for transferring voice in SS7 networks.

Support of different Compression algorithms

© 2018 Arden University Ltd. ALl rights reserved


for fulfilling the requirements of the call as instructed by the SGC.

Transmission of call progress tones and special service announcements.

The progress of the call is conveyed by means of tones and is accompanied by special service
announcements

Voicemail functionality.

Provision to use voice mail

Voice activated dialling.

Ability to mention a name and the dialer will dial an associated number

Voicemail to email transmission

voicemail is transmitted as an attachment to an email address.

Support for Interactive Voice Response (IVR)

call routing as well as service activation can be performed based on the dialled DTMF digits.
The caller selects the appropriate DTMF digit that triggers the required service.

Support of customised private dialling plans.

Private dialing plans for end users are supported.

Basic service offering

Basic services such as call forward always, call forward on busy, call waiting, call transfer, call
park and voicemail are offered through the Application Server.

Advance service offering

Advanced features such as call authorisation using PIN, remote office, "follow me" plans can
be offered by this component.

Generation of Call Detailed Records (CDRs).

Ability to generate call information for purposes of usage accounting and billing

FreePhone Service

© 2018 Arden University Ltd. ALl rights reserved


support of 800 number service where charging is applied to the called party.

doInteractive("fi05", "CTN_08_4.ini", "500");

How does IPTV work?

Similar to cable TV, IPTV requires a set-top box (STB) as the customer premises equipment
(CPE). The STB, in turn, connects to the TV, to display the content. Unlike in the case of
traditional delivery of television programme content (broadcast), the IPTV service only streams
the channel selected by the user. When the channel is changed, the stream is changed
appropriately to the new channel/programme. Therefore, at a given point in time, only one
stream is delivered to the user. It is obvious here that sending the content of all live channels to
the user would potentially choke the user’s connection to the Internet. In the context of
charging, the data volumes would become high, causing high download charges, payable by
the user. This is avoided be streaming only the channel selected by the user.

IPTV architecture

Figure 8.11 - IPTV architecture

The IPTV architecture (Figure 8.11) consists of four functional parts:

Operational Support System:

© 2018 Arden University Ltd. ALl rights reserved


This comprises all the necessary functional components necessary for operation. The most
important function here is the management of user subscriptions, verification and their
authentication before providing the content they request for. This function is front-ended by an
application server and employs an email server to provide user support.

Head end:

This is the functional component that contains all the television programme content in different
formats, for delivery on appropriate media. A satellite feed from a remote provider too can be
made accessible at the head end of a provider. This content can be distributed via IPTV to the
subscribers. The head end (so termed because all the content flows downstream from there)
typically houses the live stream server (ironically termed as the broadcast server) that can
stream the live programmes as per the programme schedule, a video server that typically
stores the “catch-up TV” content and behaves like a video-on-demand (VoD) service and an
application server and an email server that are part of the operational support system.

Network:

This is the data network to which the head end is interconnected to. By virtue of this
interconnection, all users connected to that network can access the IPTV services, provided
they are subscribed to it.

Home:

The STB in the home is interconnected to the network via a gateway router, as are other
devices such as a desktop. A TV is connected to the STB.

doInteractive("fi05", "CTN_08_5.ini", "500");

IP multicast is preferred for sending IPTV content streams over the IP network. Read the
paper titled The necessity of multicast for IPTV streaming (Maraj 2011) and discuss on the
Lesson 8 online forums, the associated mechanisms such as IGMP required for multicast.
Could multicast services be provided without the use of IGMP?

Internet of Things (IoT) and Cyber-Physical Systems (CPS)

In the last two decades, wireless communications and wireless networking have grown
significantly fast. Substantial progress is seen in mobile ad hoc networks (MANET), wireless
sensor networks (WSN), and Internet of Things (IoT). More recently, the cyber-physical
systems (CPS) have evolved as a means to enrich human-to-human, human-to-object, and
object-to-object interactions in the physical world as well as in the virtual world. CPS would
adopt, and even nurture, the areas of MANET and WSN because more sensor inputs and
richer network connectivity is necessary. These three areas will therefore appear as part of the
same larger system. They will be used together up to a point that their names may be used
interchangeably and even synonymously - especially WSN, IoT and CPS.

© 2018 Arden University Ltd. ALl rights reserved


The term cyber-physical systems (CPS) refers to a new generation of systems with integrated
computational and physical capabilities that can interact with humans through many new
modalities. The ability to interact with, and expand the capabilities of, the physical world
through computation, communication, and control is a key enabler for future technology
developments.

Despite the close affiliation of Cyber-Physical Systems and Internet of Things (IoT)
technologies, state-of-the-art IoT architectures tend to completely ignore key CPS building
blocks, such as the structure of CPS systems and processes, as well as the real-world events
that trigger their dynamic behaviours. Moreover, the majority of IoT systems tend to be overly
focused on sensor monitoring and data analytics applications - therefore paying limited
attention to the real-time actuation and control functions. These functions are a very integral
part of a class of IoT applications. In this context, the blending of CPS concepts and models
into IoT architecture could endow IoT systems with context-awareness and self-adaptability to
changes of the physical world. In most cases, CPSs are parts of a larger IoT system.

While MANET, WSN, Internet of Things (IoT), and CPS are quite similar in many networking
aspects, there are some major differences. Generally, MANETs are used for supporting ad hoc
communications or extending the coverage of infrastructure networks. WSNs are utilised
specifically for delivering sensor-related data. CPS typically involves multiple dimensions of
sensing data, crosses multiple sensor networks and the Internet, and aims to construct
intelligence across these domains. Below, we compare the features of MANET, WSN, and
CPS.

CPSs are different from desktop computing, traditional embedded/real-time systems, today’s
wireless sensor network (WSN), etc. and they have some defining characteristics as follows:

Closely integrated: CPSs are the integrations of computation and physical processes.

Cyber capability in every physical component and resource-constrained: The


software is embedded in every embedded system or physical component, and the system
resources such as computing, network bandwidth, etc. are usually limited.

Networked at multiple and extreme scales: CPSs, the networks of which include
wired/wireless network, WLAN, Bluetooth, GSM, etc., are distributed systems. Moreover,
the system scales and device categories appear to be highly varied.

Complex at multiple temporal and spatial scales: In CPSs, different components could
have different granularity of time and spatiality.

Dynamically reorganising/reconfiguring: CPSs as very complicated systems must have


adaptive capabilities.

High degrees of automation, closed control loops: CPSs are in favour of convenient
man-machine interaction, and the advanced feedback control technologies are widely
applied to these systems.

Operation must be dependable, certified in some cases: As a large-scale/complicated


system, the reliability and security assurances are necessary for CPSs.

Cyber-Physical Systems (CPSs) integrate the dynamics of the physical processes with those

© 2018 Arden University Ltd. ALl rights reserved


of the software and communication, providing abstractions and modelling, design, and analysis
techniques for the integrated whole. The dynamics among computers, networking and physical
systems interact in ways that require fundamentally new design technologies. The technology
depends on the multi-disciplines such as embedded systems, computers, communications,
etc. and the software is embedded in devices whose principle mission is not computation
alone, e.g. cars, medical devices, scientific instruments and intelligent transportation systems.

Cyber-physical systems bridge the cyber world (e.g., information, communication, and
intelligence) to the physical world through sensors and actuators. A CPS may consist of
multiple static/mobile sensors and actuator networks integrated under an intelligent decision
system. For each individual WSN, the issues such as network formation,
network/power/mobility management, security, etc. would remain the same. However, CPS is
featured by cross-domain sensor cooperation, heterogeneous information flow and intelligent
decision/actuation.

For example, a CPS can facilitate an application such as greenhouse asset management with
the deployment of multiple WSNs. Each WSN is composed of multiple sensors and actuators
to form a climate control system with lighting, cooling, heating, carbon dioxide generating,
watering, and fertilising subsystems. Thus, light intensity, temperature, humidity and density of
carbon dioxide need to be collected and reported. The decision system will transform these
sensing data into high-level knowledge (e.g., the proportion of each type of fertiliser) to trigger
actuators to maintain good environmental factors in the greenhouse. Note that multiple
actuations may coexist (e.g., the cooling subsystem may work along with the carbon dioxide
generating subsystem).

Applications of CPS

Cyber-physical systems interact with people as well, both as users controlling them and as part
of the environment in which the systems operate. Because these systems control aspects of
the physical world; they are life-critical. Such systems must be designed to be correct, which
requires formal models, verification methods and the ability to be certified.

The need for CPS arises in several situations. For example:

Transportation: Many of the long-haul passenger flights we take now are almost
unmanned - there are pilots, but they may not need to do anything outside of being
available, if needed. Semi-autonomous and autonomous automobiles are also being
developed to reduce automobile crashes. More than 90% of the automobile crashes are
caused by human error, and 1 in 5 crashes are due to distracted drivers. Semi-autonomous
automobiles are predicted to be commercially available in a few years, but to get to fully
autonomous automobiles that can operate with human-controlled cars, pedestrians and so
on, is ongoing research in CPS areas.

Manufacturing: The complexity of manufacturing and the products designed and


manufactured are constantly increasing. The modern assembly line is itself a cyber-
physical system, with automated machines and humans working together to deliver
products to a supply chain controlled by computer algorithms. Increasingly, the products
that are being produced in factories - including systems for the military - are also CPS. For
this reason, understanding CPS at a fundamental level is vital for designing and
manufacturing smart and secure systems.

Health: In many countries across the world, the population is getting older. Ageing,

© 2018 Arden University Ltd. ALl rights reserved


coupled with the rise of chronic, lifelong diseases like cancer, diabetes and arthritis, is
giving rise to medical and healthcare issues. By combining inexpensive sensing, ubiquitous
communication and powerful computation, cyber-physical medical devices and health
monitoring and maintenance products stand to revolutionise care and wellness.

Sustainability: With a projected global population surpassing 9 billion people by 2050, an


uncertain and changing climate, and up to 50 per cent of food lost between production and
consumption, our agricultural systems need to be more autonomous and efficient. CPS
technologies supporting both conventional and vertical farming (urban farming in
skyscraper greenhouses) and food logistics (moving food from producers to consumers)
are key to increasing efficiency throughout the value chain, improving our environmental
footprint and securing food supply.

There are many other examples of situations that benefit from CPS, including: energy, building
control, military and national defence, emergency response, global commerce logistics and
"smart cities" that encompass many of these situations. The potential macro-economic benefit
of the development and deployment of CPS in the coming decades is enormous.

In industrial practice, many engineering systems have been designed by decoupling the control
system design from the hardware/software implementation details. After the control system is
designed and verified by extensive simulation, ad hoc tuning methods have been used to
address modelling uncertainty and random disturbances. However, the integration of various
subsystems, while keeping the system functional and operational, has been time-consuming
and costly. For example, in the automotive industry, a vehicle control system relies on system
components manufactured by different vendors with their own software and hardware. A major
challenge for original equipment manufacturers (OEMs) that provide parts to a supply chain is
to hold down costs by developing components that can be integrated into different vehicles.
The increasing complexity of components and the use of more advanced technologies for
sensors and actuators, wireless communication, and multicore processors pose a major
challenge for building next-generation vehicle control systems.

Many CPS applications are safety-critical; their failure can cause irreparable harm to the
physical system under control and to the people who depend on it. In particular, the protection
of our critical infrastructures that rely on CPSs, such as the electric power transmission and
distribution; industrial control systems; oil and natural gas systems; water and wastewater
treatment plants; healthcare devices; and transportation networks, that play a fundamental and
large-scale role in our society. Their disruption can have a significant impact to individuals and
nations at large.

IoT systems and CPS go hand-in-hand in cases where control is a necessary functional factor.
Reflect on the fact that CPS could be the building blocks of IoT systems. Is there a way of
clearly delineating the two? What might those factors be?

© 2018 Arden University Ltd. ALl rights reserved


A primary component of any digital service is interconnectivity. The widespread
interconnectivity requirements for services like VoIP makes it vulnerable largely due to the
wireless communications as well as the criticality of the voice services. Consequently, a key
concern is the security of the VoIP services as well as the VoIP system as a whole. The
application protocols and the transfer protocols have security elements that ensure that the
content is secure from end-to-end. Even if the data is captured during the transfer, the intruder
will not be able to identify the caller, the callee or elements of a conversation. Take a look at
the presentation titled security on VoIP to understand how security is implemented. With the
implementations available, would you anticipate the need for an additional element of
security?

https://vimeo.com/251286123/a7b6561b37

Transcript

Summary

In this lesson, you have had a look through VoIP and how it functions. The entire voice industry
is now going to use VoIP, with the arrival of 4G on the mobile segment and the use of Voice
over LTE (VoLTE). IT is expected to provide a great deal of flexibility to the user in terms of
mobility as well as to the provider in ensuring that the resources are spread well enough to
provide coverage to the user using 4G/LTE as well as Wi-Fi. Similarly, IPTV as a service is
now proliferating both on broadband as well as on mobile broadband with the speeds available
with 4G. In contrast, IoT and CPS are enabling smaller and smaller devices to interconnect to
the larger Internet and enable various kinds of innovative services, in almost all areas/sectors
of the industry. With this widespread connectivity also comes the concern of security. Both
existing security mechanisms and secure versions of the protocols enable the service, as a
whole, to be secure.

Further and wider reading

Key text

Ali, S., Qaisar, S., Saeed, H., Khan, M., Naeem, M. & Anpalagan, A., 2015. Network
Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on
Reliable Pipeline Condition Monitoring. Sensors (14248220) [online], 15(4), pp. 7172-7205,
Academic Search Complete, EBSCOhost. Available from: [Accessed 19 December 2017].

Goralski, W., 2009. The Illustrated Network : How TCP/IP Works In A Modern Network
[online] Amsterdam: Morgan Kaufmann, eBook Collection (EBSCOhost), EBSCOhost.
Available from: [Accessed 19 December 2017].

Mosterman, P. & Zander, J., 2016. Industry 4.0 as a Cyber-Physical System


study. Software & Systems Modeling [online], 15(1), pp. 17-29, Academic Search
Complete, EBSCOhost. Available from: [Accessed 19 December 2017].

Varshney, U., Snow, A., McGivern, M. & Howard, C., 2002. Voice over IP. Communications

© 2018 Arden University Ltd. ALl rights reserved


Of The ACM [online], 45(1), pp. 89-96, Business Source Complete, EBSCOhost. Available
from: [Accessed 19 December 2017].

Zeadally, S., Siddiqui, F. & Kubher, P., 2004. Voice over IP in Intranet and Internet
environments. IEE Proceedings - Communications [online], 151(3), pp. 263-269, Academic
Search Complete, EBSCOhost. Available from: [Accessed 19 December 2017].

Zeinab, K.A.M. & Elmustafa, S.A.A., 2017. Internet of Things Applications, Challenges and
Related Future Technologies.pdf - Internet of Things Applications, Challenges and Related
Future Technologies. World Scientific News [online], 2(67), pp126-148. Available from:
[Accessed 01 December 2017].

Wider reading

Dantu, R., Fahmy, S., Schulzrinne, H. and Cangussu, J., 2009. Issues and challenges in
securing VoIP. computers & security [online], 28(8), pp.743-753. Available from: [Accessed
01 December 2017].

Rehman, U.U. and Abbasi, A.G., 2014, December. Security analysis of VoIP architecture
for identifying SIP vulnerabilities. In: Emerging Technologies (ICET), 2014 International
Conference on (pp. 87-93). IEEE. [online] Available from: [Accessed 01 December 2017]

Walsh, T.J. and Kuhn, D.R., 2005 Challenges in securing voice over IP. IEEE Security &
Privacy [online], 3(3), pp.44-49. Available from: [Accessed 01 December 2017].

EVSP 2003, Implementing Voice Over IP, pp. 32-48, Computers & Applied Sciences
Complete, EBSCOhost.

References

Capra Physics, 2013. How Analogue-Digital Conversion & Multiplexing Works [video,
online]. Capra Physics, 11 May 2013. Available from: [Accessed 17 November 2017].

Maraj, A. and Shehu, A., 2011, May. The necessity of multicast for IPTV streaming. In
Proceedings of the 10th WSEAS international conference on Telecommunications and
informatics and microelectronics, nanoelectronics, optoelectronics, and WSEAS
international conference on Signal processing (pp. 132-136). World Scientific and
Engineering Academy and Society (WSEAS).

© 2018 Arden University Ltd. ALl rights reserved


© 2018 Arden University Ltd. ALl rights reserved
© 2018 Arden University Ltd. ALl rights reserved

Powered by TCPDF (www.tcpdf.org)

You might also like