Category Archives: Networks

You are viewing Networks archive...

5 Reasons Why A Hacker Might Be Tapping Into Your VoIP Phone System

Businesses seem to be turning to VoIP phone systems in huge numbers and it might be something to do with how many online businesses are operating these days. If you’re one of those companies you’ll get tons of benefits from using VoIP, but what about the negatives you’ve got to watch out for?

dark-secretive-hacker-person-illegal-attempt-breach-security-blue-light-fingers-close-up-cracker-voip-crop

One threat you might experience is a hacker making their way into your system. You’ve already got to deal with software security and all your important data will be stored on hard drives, so a hacker attacking your phones is the last thing you need. If you’re wondering why a hacker would want to target your VoIP we’ll look at a few of the main things going through their mind.

Ruin your business

Your phone lines could be the heart of your business and if someone has a bone to pick with you they might want to destroy it. Try running a business when you can’t get anyone on the other end of the line and you’ll not succeed. Even if the hacker was to cause a small delay in the traffic flow it would be hard to speak to anyone without giving up after a few minutes. If someone wanted to sabotage your phone system you’ll know they have a huge grudge against you.

Get free calls

When you call someone over VoIP it’s not free if you’re calling landlines and it can actually be quite expensive if you’re calling people in other countries. Skype to Skype chats are great, but there is big money involved when you start calling international landlines. Do you think a hacker will want to pay for those calls by themselves when they could easily hack into your system? It would mean they don’t have to pay anything because you’re left picking up the bills.

Obtain certain information

We’re getting into secret agent territory here because someone could be listening in on your conversations if they want to discover secret information. You could be betting tapped by the FBI because you’re smuggling drugs in and out of South America, or maybe your wife has hired a private detective because she thinks you’re playing around with your secretary. Just realize someone might be listening in because they want some information you don’t want them to have.

Divert sales calls

Your sales staff could be sitting on their VoIP phones right now making you lots of money. A competitor might know you’re doing okay and they’ll try to steal business off you. If they can hack into your VoIP system they might be able to divert some of your calls. That means people looking to buy something will be speaking to the hacker instead of your sales staff. It’s always something to think about if you suffer a sudden drop in phone calls.

To prove something

Most hackers won’t even know who you are and they won’t give a crap about you. They don’t care what happens to your company because all they care about is their hacking skills. They just want to prove something to themselves and everyone who will listen to them on their hacker forum. These are definitely the ones you want to deal with because they won’t want to see your suffer, plus they won’t stick around for too long because they’ll eventually get bored.

Life will surely go on

At least you can be happy about one thing. Even if hackers decide to mess with your VoIP phone system it’s not the end of the world. You will eventually realize what is happening and you’ll be able to deal with it as quickly as possible. If they messed with your hard drives it would be even more painful because data recovery is a lot more annoying than a few missed phone calls. Once you deal with the problem you should be up and running in no time.

 

Who’s gonna be at the ISE 2014 – Integrated Systems Europe

ISE Logo

ISE 2014 in Amsterdam RAI

It is that time of the year again and they come from all over the place. Manufacturers, installers, solution architects and everyone interested in Audio Visual and electronic system technology. And they all seek to get the latest news on their own hot topics.

So from the 4th through to the 6th of February will be this years ISE fair in Amsterdam. Ever since 2004 a great annual event to meet old partners and make new acquaintances alike throughout the Audio Visual business. If you seek to:

  • See the latest developments in technology
  • Trial new products
  • Network and mingle with people like you
  • Spot new break-through companies or solutions
  • Drink a coffee at every booth and corner

… then this is for you.

Who is going to be at the ISE 2014?

To name only a few of the exhibitors please find our quick list below:

Get the total overview of the 952 exhibitors at the official ISE 2014 homepage.

I wish all of you, who are going a lot of fun there and make sure you drop us your comments below. If you cannot be there, make sure to follow the ISE 2014 Social Channels on Twitter for updates live from the scene.


ISE in 60 Seconds (Footage of 2013)

[youtube=http://www.youtube.com/watch?v=wbZkbB8Djvs&w=575]

How SMEs Can Get The Most Out Of Server Storage

google-server-data-centre-dc-open-hardware-technology-cables-messy-server-storage

Example for the first iteration of Google production servers (Photo: Pargon)

In the current economic climate, running an SME (Small to Medium Enterprise) can feel impossible sometimes. With so many things against your success, it can seem like you will never manage to build up your business to one which is strong and successful, but with perseverance and a lot of knowhow there is always a chance you will get to where you want to be.

In business, knowing how to make the most of a bad situation is always a handy skill. And, as the world is changing and becoming increasingly technological, knowing how to make the most of your computing choices is even more important. Everything from your own computer to your printer needs to be perfect, as choosing an inferior system could have repercussions further down the line.

And, as always, your server is possibly the most important piece of technological kit that you could invest in. Servers are used to store all of the programmes and files that your network may need access to, so they are basically giant computers that always run in the background. With this in mind, it is easy to see why it is vital that you make the most of your server space and capabilities, as not doing so could end up costing you important time and money.

So, if you would like to find out more about how you can do this, read on:

Choose the right server host

First and foremost, when choosing your server host you will need to make sure that you select one which is reputable and which will be able to do the job you want it to. The last thing you want is to take out a contract with a server host that doesn’t provide enough storage space or which is not fast enough or your needs, so always read the label, so to speak.

You should also do some background research in server hosts and companies offering server space. You will want to pick one which has much experience in this area of computing, and one that is known for being able to handle issues and problems ASAP.

Always run maintenance

Of course, it probably won’t be you that actually runs the maintenance, but this is why it is vital that you ensure you choose the right server company at the end of the day. You should be able to trust that your chosen server company will run regular maintenance on your server to ensure it is always performing to the best of its capabilities and that no errors have cropped up.

Back everything up

Again, this will be the job of the server host, but you should also inform them that you wish to have everything synched and backed up. Should the server fail, it is essential that you have access to these backed up files so that you can always find the important documents that you need for your business.

Don’t just go for the cheapest option

It can be all too tempting to be ruled by price when choosing server space, but this isn’t always the best policy. Compare the products and services that you will be provided with to ensure you get the best one for your SME.

How would you suggest SMEs can get the most out of their server storage space?

Introduction to Session Border Controllers

High definition video conferencing is a standard right now. If it will change, it will only change to an ever higher definition such as Ultra HD (involving 4K and 8K). Virtual workplaces, telecommuting and working from home becomes more and more easy and so organisations go expanding, sometimes forgetting about network requirements ending up with new capacity limits or reduced quality of their video communication solution.

A Session Border Controller can help with many problems there might be, but it is not a remedy for every issue ever to occur on your video conferencing network. I wrote this article to give you some more insight into what a Session Border Controller is, what it does and how it can help your corporate communication.

Session-Border-Controller-Setup-Visio-Drawing-Network-Video-Conference-Example-Gatekeeper-Endpoint-Data-Media-Signaling-Telepresence24-Unified-Communications

Click for large version

What is a Session Border Controller?

A Session Border Controller is a network component designed to safely link networks with a different security requirement and setup. They are mostly utilised for VoIP and video conferencing networks to establish secure connection sessions. The Session Border Controller therefore allows control of signaling and transfer of media data in a secure way.

What can I do with a Session Border Controller?

Session management allows service providers to control the session routing, establish interoperability across environments with differentiating standards, enforce bandwidth policies or create an interface to a third party application. To keep it short and simple: A Session Border Controller optimizes solution performance and overall service quality, it allows a rapid service deployment or growth and it protects infrastructure from malicious attacks.

Who develops Session Border Controllers?

Based on Gartner’s Magic Quadrant for Session Border Controllers from October 2012, Acme Packet (recently acquired by Oracle) excels in execution as well as vision scope, making them the leader of the magic quadrant (see graphic). Other competitors are Huawei, Sonus, Genband, Metaswitch Networks, Dialogic, ZTE and Technicolor.

gartner-research-analyst-magic-quadrant-session-border-controllers-acme-packet-oracle-leader

Magic Quadrant for Session Border Controllers by Gartner Research

Acme Packet is very interesting due to their focus on unified communications networks and even offering solutions especially designed for video conference networks of manufacturers such as Alcatel-Lucent, Avaya / Radvision, Cisco (including former Codian / Tandberg technologies), LifeSize, Polycom and Vidyo. Supporting and enabling interworking these technologies the Acme Packet solution avoids potential for vendor lock-in, protecting the investment made in video conferencing infrastructure and endpoints.

What are the technical functions of a Session Border Controller?

The functional scope of a Session Border Controller can vary, depending on what the individual device is designed to do. However to reflect a maximum of capability information, we would like to list the following functions that can be found in Session Border Controllers:

Connectivity

  • IPv4 / IPv6 interworking
  • SIP manipulation
  • NAT traversal
  • VPN connectivity
  • H.323 / SIP interworking

Quality of Service (QoS)

  • Traffic policies
  • Call admission control
  • ToS / DSCP bit setting
  • Resource allocation
  • Rate limiting

Security

  • Defense against DoS attacks
  • Can prevent toll fraud
  • No topology hiding possible
  • Malformed packet protection
  • Signaling protection via TLS and IPSec
  • Media protection via SRTP

Media processing

  • DTMF delay and interworking
  • Media transcoding
  • Tones and announcements
  • Data and Fax interworking
  • Support for Voice and Video calls

Regulatory

  • Call prioritization (e.g. for VIP usage or emergencies)
  • Auditing functions for internal audit or for law enforcing organisation
  • Business Intelligence, reporting, management information, source for billing information

Summary

Even though not a mandatory part for VoIP or video conferencing networks, Session Border Controllers have a great potential to add value to the communication services of organisations. The relevance increases for service providers companies as the functions described above can significantly increase the quality and performance of a serviced network.

If you have questions, remarks or other types of feedback please drop us a line in the comment section below. Thank you!

IPv6 and its Impact on Videoconferencing

I’m sure most of the people working with technology are familiar with the terms IPv4 and IPv6. In a nutshell – every device connected on a network (Internet or private network) requires an IP address in order to “communicate” to other devices. The current standard for these addresses is called IPv4 (Internet Protocol version 4), and it forms the foundation of most Internet communication today. IPv4 however suffers from several important shortfalls, most importantly the lack of sufficient address space. For that reason, IPv6 was developed which introduces a number of other improvements especially to QoS (Quality of Service) and Security.

ipv6, ipv4, ip, internet, protocol, stone, mural, prophecy, version, 4, 6, four, six, crayon, chalk, circle, visualisation, visualziation, addresses, available

Visualisation on how we are running out of IPv4 addresses (Photo: Abode of Chaos)

In order to utilize a device for a video conference, regardless whether it is a high end video codec or a smartphone, that device needs to be connected to a network, so naturally it will require an IP address. Without going in too much technical details, but still mentioning the most important terms,  let’s see how IPv6 features will affect video communication.

Huge address space

The most important benefit of IPv6 implementations is that it will provide virtually unlimited address space, by introducing 128-bit address, versus the 32-bit address used by IPv4. Just as an analogy, it will be enough to assign IPv6 address to every atom on the earth and still have enough left to do another 100+ earths. This will allow virtually any device in future to be assigned a globally reachable address, which in turn means that NAT (Network Address Translation) will be no longer necessary in the long term, and removing NAT from the equation will solve a lot of the interoperability issues in real-time services such as VoIP and Videoconferencing. It will also be possible to assign multiple network  addresses to devices which means they can stay connected to several different networks at the same time.

Improved Quality of Service (QoS)

Quality of Service refers to the ability of the network to prioritize certain traffic to other and is especially important to VoIP (Voice over IP) and Video Communication, since we don’t want to have any delay here. The way data is transmitted in today’s IP networks is in form of network packets. These packets consist of two parts: packet header – containing control information, and payload – containing the used data. IPv6 improves over IPv4 in terms of QoS is by introducing new field in the packet header called “Flow Label”. This  “label” is used to identify and prioritize certain packet flow, for eg. video stream and allows devices on the same path (routers, switches…) to read the flow label and take appropriate action based on it.

Plug-and-Play support

With IPv6, addresses can be assigned automatically and dynamically by the client device, by getting the network prefix from any router it finds and then generate the full IP address for that network, based on the hardware MAC address. This means there will be no need for DHCP servers like with IPv4, and also less configuration requirements.  DHCPv6 will of course still be available for assigning IPv6 addresses.

ipv6-ipv4-ip-internet-protocol-example-difference-address

Example of how IPv4 and IPv6 can look (by webopedia.com)

Improved Security

IPv6 will provide better security than IPv4 when it comes to authentication and encryption of the transmitted data. The main reason for that is IPsec – a security protocol that is mandatory for IPv6 systems, and only optional for IPv4 environments. IPsec is defined as a set of security standards, originally written as part of the IPv6 specifications, and allows data to be secured from the originating to the destination host (through the various network elements such as routers, gateways…) by maintaining data confidentiality, integrity and authentication at the network layer. Another security improvement comes from the fact that IPv6 subnets will be so large so any attempt for hackers to scan them searching for a specific host will be ineffective.

Improved Mobility

Mobility refers to the ability of a device to move between different IP networks and still maintain the same IP address. This is very important for IP enabled real-time communication services, no one wants to be disconnected from a call while moving from one physical location to another. For that purpose, the Mobile IP protocol was designed by IETF. This protocol was further enhanced with Mobile IPv6 and Hierarchical Mobile IPv6 (HMIPv6) which propose higher level of security and more efficient data transmitting.

Big packets and improved routing

Another benefit to visual communications is IPv6 support for very big packet payloads, up to 4 billion bytes (IPv4 supports up to 65535 bytes only). With bandwidth becoming cheaper and the increase in device processing power, supporting big packets delivery  will be important when dealing with high quality multimedia content of the future. Even though the packet can be a lot bigger than in IPv4 systems, the actual routing of the information is improved due to the simplified packet header and structured approach to addressing, which reduces the amount of information network routers must store and leads to faster packet forwarding.

binoculars, outlook, gray, hands

When should we implement IPv6 and with what approach? (Photo: ºNit Soto)

Migration considerations

When talking about IPv6 impact on the network, it is very important to consider the  migration strategy as well, from Ipv4 to IPv6. Basically there are three ways to manage this: dual-stack implementation where all the network components and devices support both IPv4 and IPv6, tunneling – is implementation method where IPv4 packets get encapsulated and transported over IPv6 network backbone, and proxy translation – where network border element performs the mapping of packets from one IP version to another.

Outlook

Most likely, providers and businesses will opt to upgrade the existing network infrastructure to dual stack in order to support both customers. Some network elements that do not support dual-stack mode will have to be upgraded or replaced and new infrastructure that will be deployed will have to support IPv6 dual stack from the beginning.

Each migration strategy will definitely introduce certain level of latency in the network, so that is just a reason more that all services must be properly tested before a production rollout.