<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-124133521939044276</id><updated>2026-03-26T04:36:23.718-07:00</updated><category term="VoIP network management"/><category term="ladder diagram"/><category term="post dial delay"/><category term="quality managed services"/><category term="VoIP toubleshooting on demand"/><category term="cloud based VoIP troubleshooting"/><category term="wireshark"/><category term="mean opinion score"/><category term="speech quality metric"/><category term="mos"/><category term="polqa"/><category term="call"/><category term="cloud based network"/><category term="fraud prevention"/><category term="high definition telephony"/><category term="password pbx"/><category term="pbx hack"/><category term="pesq"/><category term="toll fraud"/><category term="Customer Experience"/><category term="Customer Experience Management"/><category term="IP-telephony"/><category term="Revenue Assurance"/><category term="Telecom fraud"/><category term="based network monitoring"/><category term="based service assurance"/><category term="billing"/><category term="calling party"/><category term="cloud-based"/><category term="customer service"/><category term="demand"/><category term="endpoint phone"/><category term="entire network"/><category term="expired"/><category term="fraud detection"/><category term="high quality analog"/><category term="host service assurance"/><category term="incoming call"/><category term="international carrier"/><category term="internet"/><category term="ip pbx"/><category term="itsp"/><category term="knowledge"/><category term="lte"/><category term="management"/><category term="narrowband focus scale"/><category term="network"/><category term="network health"/><category term="network monitoring"/><category term="network real-time"/><category term="network security"/><category term="outgoing calls"/><category term="pbx calls"/><category term="plug internet"/><category term="quality measurement"/><category term="reduce customer churn"/><category term="registration"/><category term="revenue leakage"/><category term="rtp"/><category term="scale super wideband"/><category term="service"/><category term="service assurance"/><category term="speech quality"/><category term="track state"/><category term="traffic analysis"/><category term="udp"/><category term="voip"/><title type='text'>The CODEC Translator</title><subtitle type='html'>Reassembling VoIP Packets For You</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>23</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-1304602470457116963</id><published>2014-03-26T09:50:00.001-07:00</published><updated>2014-03-26T09:50:56.467-07:00</updated><title type='text'>Under Correlation &amp; Over Correlation in Your Voice Monitoring System</title><content type='html'>&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-color: white; color: black; width: 600px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; width=&quot;100%&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;0&quot; id=&quot;content_LETTER.BLOCK4&quot; style=&quot;margin-bottom: 6px; margin-top: 6px; width: 100%px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align=&quot;left&quot; colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;font-family: Verdana, Geneva, Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;&lt;strong&gt;One of the big contributions of a Voice Monitoring System to reducing costs in voice operations is the ability to bring all legs of a VoIP call from all segments or even geographical parts of your network together in one message flow or ladder diagram.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
Sometimes the process is not perfect.&amp;nbsp;&lt;strong&gt;Most commonly seen is under correlation.&lt;/strong&gt;This is where some of the legs of the calls are not correlated together. In some monitoring systems the user can see multiple instances of the same call. In other monitoring systems, it is not evident and pieces remain missing.&lt;br /&gt;
&lt;br /&gt;
When a SIP call passes through an SBC (Session Border Controller) implementing theBack-To-Back User Agent [B2BUA]&amp;nbsp;functionality, the call ID will be changed. This usually presents a problem to monitoring systems attempting to correlate the two legs of the call together. However the caller or called part of the User Agent i.e. the phone number may remain the same or at least some part thereof. The format of the caller or called number may change in which case the correlation function needs to use only the common digits, which weakens the process.&lt;br /&gt;
&lt;br /&gt;
Alternatively, the SDP session ID may remain the same and be used for correlation.&lt;img border=&quot;0&quot; height=&quot;117&quot; hspace=&quot;5&quot; name=&quot;ACCOUNT.IMAGE.17&quot; src=&quot;https://origin.ih.constantcontact.com/fs170/1110743282396/img/17.png&quot; style=&quot;font-size: 10pt;&quot; vspace=&quot;5&quot; width=&quot;264&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Correlating the same value in a given field is time sensitive. Such values rotate and need to be reused. In addition, calling and called numbers maybe redialed, causing separate calls. So the call merging function needs to look only within a given time interval, to avoid pulling pieces of different calls into the same call record or ladder diagram.&lt;br /&gt;
&lt;br /&gt;
Sometimes all values are uniquely generated by a network element. This leaves no common values to search for relating to the same call.&lt;br /&gt;
&lt;br /&gt;
Fortunately,&amp;nbsp;&lt;strong&gt;Palladion, now known as Oracle Communications Operations Monitor (OCOM) is a little different from other voice monitoring systems.&lt;/strong&gt;&amp;nbsp;it has a totally customizable&amp;nbsp;Call Merging Algorithm&amp;nbsp;or&amp;nbsp;correlation function&amp;nbsp;which is user scriptable or configurable. This means regardless of how your network is setup or how your network elements treat the SIP signaling protocol packets, Palladion can always find some common information in the different legs of the SIP call to pull it altogether.&lt;br /&gt;
&lt;br /&gt;
Sometimes over correlation is seen. This occurs when legs or segments from different calls are correlated into the same call record. This may be because the parameters on which correlation is achieved are identical between different calls over the time correlation interval.&lt;br /&gt;
&lt;br /&gt;
However, now with some fine-tuning or a bit of scripting, we can ensure 100% accurate call correlation. This means that instead of taking an hour or two to troubleshoot a complex problem involving a trace, with Palladion/OCOM, it takes you 1-2 minutes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; width=&quot;100%&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;0&quot; id=&quot;content_LETTER.BLOCK5&quot; style=&quot;margin-bottom: 6px; margin-top: 6px; width: 100%px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td align=&quot;left&quot; colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;font-family: Verdana, Geneva, Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;&lt;div&gt;
If you need help with such optimization, please do contact us!&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
Sincerely,&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Segoe Print&#39;, &#39;Comic Sans MS&#39;, Arial, sans-serif;&quot;&gt;
Richard Jobson, Teraquant Corporation&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12pt;&quot;&gt;
&lt;a href=&quot;http://r20.rs6.net/tn.jsp?e=001yceLWn2rgWVNNNUcpXm3C9IvW0c1GwNmhY2CHKOp7AtDvDi4hpPmU81xBgvgAEKpCMoEYd9eufv5gmoz_iEr63ywiS8FYTujJSeNFDk9VbA=&quot; linktype=&quot;1&quot; shape=&quot;rect&quot; style=&quot;color: blue;&quot; target=&quot;_blank&quot; track=&quot;on&quot;&gt;www.teraquant.com&lt;/a&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/1304602470457116963/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2014/03/under-correlation-over-correlation-in.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/1304602470457116963'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/1304602470457116963'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2014/03/under-correlation-over-correlation-in.html' title='Under Correlation &amp; Over Correlation in Your Voice Monitoring System'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-487720505252547535</id><published>2012-04-11T08:13:00.000-07:00</published><updated>2012-04-25T08:27:08.344-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based VoIP troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="mean opinion score"/><category scheme="http://www.blogger.com/atom/ns#" term="speech quality metric"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP toubleshooting on demand"/><title type='text'>Solutions for SIP NAT/Firewall Traversal for VoIP</title><content type='html'>&lt;span xmlns=&quot;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;SIP-based communication does not reach users on the local area network (LAN) behind firewalls and Network Address Translation (NAT) routers automatically. Firewalls are designed to prevent inbound unknown communications and NAT stops users on a LAN from being addressed. Firewalls are almost always combined with NAT and typically still do not support the SIP protocol properly.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;The issue of SIP traffic not traversing enterprise firewalls or NAT is critical to any VoIP implementation. At some point, all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications. However, in the short term, several solutions have been proposed to work around the firewall/NAT traversal problem. The bad news is that many of these solutions have serious security implications.  The good news: there are other solutions that allow you to remain in control to various degrees. It is important to consider to what level you are prepared to surrender the control of your corporate or carrier infrastructure when choosing a NAT/firewall traversal solution in your network.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;As you envision your solution, you should consider these questions:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;Who should be in control of my security infrastructure: the firewall administrator, the user or a peering service provider? &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Do we want a solution that is predictable and functions reliably with SIP standard compliant equipment or is it sufficient with a best effort solution that works in certain scenarios and maybe only with specific operators?&lt;/span&gt;&lt;br /&gt;     &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 14pt;&quot;&gt;&lt;strong&gt;Universal Plug-and-Play (UPnP) – The SIP client or Windows&lt;sup&gt;&lt;br /&gt;      &lt;/sup&gt;is in control &lt;/strong&gt;&lt;br /&gt;    &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;Universal Plug-and-Play (UPnP) for NAT control allows Microsoft Windows or a UPnP-capable SIP client to take control of the firewall. Both the client and firewall must support UPnP. This is a viable alternative only for those that can be sure there will never be anything malevolent on the LAN. UPnP is only supported by few firewalls and SIP clients. Due to the inherent high security risk in allowing a third party software to take control of the firewall this method is rarely used and in practice only for home users. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 14pt;&quot;&gt;&lt;strong&gt;STUN, TURN, ICE – The SIP client is in control &lt;/strong&gt;&lt;br /&gt;    &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;These are all protocols proposed by the IETF for solving the firewall/NAT traversal issue with intelligence in the clients together with external servers. With these methods, pinholes are created in the NAT/firewall for SIP signaling and media to pass through. It is also the responsibility of the SIP client to emulate what the protocol should have looked like outside the firewall. These methods assume certain behavior from the NAT/firewall and cannot work in all scenarios. In addition, they remove control from the firewall, which must be sufficiently open to allow the users to create the necessary pinholes. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 14pt;&quot;&gt;&lt;strong&gt;Session Border Controllers at Service Provider – The service provider is in control &lt;/strong&gt;&lt;br /&gt;    &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;Most service providers use some sort of session border controller (SBC) in their core network to perform a number of tasks related to their SIP services. One of these tasks is to make sure that the SIP services can be delivered to their customers. They may use STUN, TURN, ICE for this by acting as a server component for these protocols. However, not all clients support these protocols so the SBC may also use far-end-NAT traversal (FENT) technology for NAT traversal. The FENT function will aid remote SIP clients by transforming any SIP message by rewriting all relevant information and relay media, as well as keeping the client on the NATed network reachable. This solution only works with firewalls that are open from the inside, and may not work with all equipment and in all call scenarios. FENT is best suited for road warriors working at a hotel or at a conference, rather than at fixed location where there are more reliable and secure solutions. FENT also removes control from the firewall, which must be sufficiently open to allow FENT from the service provider SBC to work. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 14pt;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 14pt;&quot;&gt;&lt;strong&gt;SIP-capable Firewalls or enterprise SBC – The firewall administrator is in control &lt;/strong&gt;&lt;br /&gt;    &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;This is a long-term solution where the problem is solved where it occurs, at the firewall or in tandem with an existing firewall using an enterprise session border controller. When deployed at the enterprise edge the SBC offers the same security and control as it does for the service provider&#39;s core network. The enterprise SBC typically has a built-in SIP proxy and/or back-to-back user agent (B2BUA) functionality to give unparalleled flexibility in real-life enterprise deployments. Most vendors of SBCs for service providers have products that can be deployed at the enterprise and then there are other companies that have developed products for the enterprise market from the very beginning. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;For an enterprise, there are special security and functional requirements that make the SIP-capable firewall or enterprise SBC the solution of choice. First, it is the only solution that allows the firewall to maintain control of what is traversed between the LAN and the outside world. In addition, it is becoming more and more common to have a SIP server on the LAN. In fact, all SIP-based IP PBXs are SIP servers. In order for these SIP servers to communicate over IP with the outside world, the firewall simply must be SIP-enabled. As many IP-PBXs have done their own SIP-extensions outside the SIP standard it is very important that the firewall or enterprise SBC be adapted to support these extensions. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;Due to the complexity of real-life installations, it is highly recommended that you deploy specialized SIP-enabling devices such as SIP-proxy firewalls even in the SOHO and SMB markets, even if it might not be motivated from a security policy perspective.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;With the explosion of these various solutions and protocols, comes another potential headache.  What do I do if something goes wrong?  How do I find the offending service or equipment if jitter occurs or my users start experiencing &lt;a href=&quot;http://codec-translator.blogspot.com/2012/01/one-way-audio-voip-dilemma.html&quot;&gt;one way audio&lt;/a&gt;?  What is causing echo on the conversation?  Before considering a large scale enterprise or service provider deployment, you should also consider a robust troubleshooting package.  You might determine that additional test equipment is needed, but you will likely find that&lt;a href=&quot;http://www.teraquant.com/content/palladion-demand&quot;&gt; hosted troubleshooting packages&lt;/a&gt; are much more cost effective and future-proof.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: 12pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/487720505252547535/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/04/solutions-for-sip-natfirewall-traversal.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/487720505252547535'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/487720505252547535'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/04/solutions-for-sip-natfirewall-traversal.html' title='Solutions for SIP NAT/Firewall Traversal for VoIP'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-480868097065315995</id><published>2012-04-04T08:52:00.000-07:00</published><updated>2012-04-25T08:32:42.119-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based VoIP troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="mean opinion score"/><category scheme="http://www.blogger.com/atom/ns#" term="polqa"/><category scheme="http://www.blogger.com/atom/ns#" term="speech quality metric"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP toubleshooting on demand"/><title type='text'>Packet Voice Quality Problems and Answers</title><content type='html'>&lt;span xmlns=&quot;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Almost all packet-based voice quality issues are attributable to some type of degradation on the packet network that the voice traffic&#39;s RTP stream traverses. Voice traffic brings to light network problems that might otherwise go unnoticed when just carrying normal data traffic. This is because in voice &lt;strong&gt;co&lt;/strong&gt;mpressor-&lt;strong&gt;dec&lt;/strong&gt;ompressors (CODECs) packet loss and variable delay in the IP telephony network must be minimized. Let&#39;s explore some common network issues that result in poor voice quality and what you can do about it:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Packet Drops&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Packet-based telephony demands that speech packets find their destination within a predictable amount of time. There is very little tolerance for them to be dropped somewhere along the way from the source to the destination. In a properly designed network with Quality of Service (QoS) provisioning in place, packet loss should be nearly zero. All voice CODECs can tolerate degrees of packet loss without adversely affecting voice quality. Upon detecting a missing packet, the CODEC decoder on the receiving device makes a best guess as to what the waveform during the missing period of time should have been. Most CODECs can tolerate up to five percent random packet loss without noticeable voice quality degradation. This assumes that the five percent of packets being lost are not being lost at the same time, but rather are randomly dropped in groups of one or two packets. However, losing multiple simultaneous packets, even as a low percentage of total packets, can cause noticeable voice quality problems.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt;&amp;nbsp;You should design your network for zero packet loss for packets that are tagged as voice packets. A converged voice/data network should be engineered to ensure that only a specific number of calls are allowed over a limited-bandwidth link. You should guarantee the bandwidth for those calls by giving priority treatment to voice traffic over all other traffic. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;There are various tools and procedures that you can use to determine whether you are experiencing packet loss in your network and where in the network the packets are getting dropped. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;1. Examine IP phone statistics:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;margin-left: 54pt;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;If you are troubleshooting at the phone experiencing the problem, access the phone statistics by pressing the help (i or&amp;nbsp;?) button on the IP phone twice in quick succession during an active call.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;If you are working with a remote user, open a web browser on your computer and enter the IP address of the user&#39;s phone. During an active call, choose the Streaming Statistics &amp;gt; Stream 1 options from the display.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;2. Examine the counters RxDisc and RxLost shown on the IP phone (or Rcvr Lost Packets if you are viewing the statistics remotely using a web browser).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;margin-left: 54pt;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;RxLost measures the number of packets that were never received because they were dropped in the network somewhere. By detecting a missing RTP sequence number, the IP phone can determine that a packet has been lost.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;RxDisc corresponds to packets that were received but were discarded because they could not be used at the time they arrived. RxDisc can come from an out-of-order packet or a packet that arrived too late.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;3. If either of these two counters increments, you should investigate to learn why packets are being lost or discarded.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Regardless of how low your packet loss is, if it is not zero, you should investigate the root cause. It just might be a sign of a bigger problem that will get worse with higher call volume. Always remember that packet loss can be occurring at any layer of the OSI-like transmission model, so be sure to check for all layers possible in each hop. For example, if there is a Frame Relay connection over a T1 between two sites, you should:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;margin-left: 54pt;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Make certain that there are no errors at the physical layer on the T1.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Determine if you are exceeding your committed information rate (CIR) on the Frame Relay connection.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Verify that you are not dropping the packets at the IP layer because you are exceeding your buffer sizes.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Check that you have your QoS improperly configured.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Ensure that your service provider not only guarantees packet delivery but also guarantees a low-jitter link. Some service providers may tell you that they do not provide a CIR but guarantee that they will not drop any packets. In a voice environment, delay is as important as packet loss. Many service providers&#39; switches can buffer a large amount of data, thereby causing a large amount of jitter.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Another common cause of drops in an Ethernet environment is a duplex mismatch, when one side of a connection is set to full duplex and the other side is set to half duplex. To determine if this is the case, perform the following steps:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ol style=&quot;margin-left: 74pt;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Check all the switch ports through which a given call must travel and ensure that there are no alignment or frame check sequence (FCS) errors. Poor cabling or connectors can also contribute to such errors; however, duplex mismatches are a far more common cause of this kind of problem.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Examine each link between the two endpoints that are experiencing packet loss and verify that the speed and duplex settings match on either side.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Although duplex mismatches are responsible for a large number of packet loss problems, there are many other opportunities for packet loss in other places in the network as well. When voice traffic must traverse a WAN, there are several places to look. First, check each interface between the two endpoints, and look for packet loss.  If you are seeing dropped packets on any interface, there is a good chance that you are oversubscribing the link. This could also be indicative of some other traffic that you are not expecting on your network. The best solution in this case is to take a  trace to examine which traffic is congesting the link.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;&lt;a href=&quot;http://www.teraquant.com/iptego&quot;&gt;Hosted/Web-based analysis tools&lt;/a&gt; are invaluable in troubleshooting voice quality problems. With these tools, you can examine each packet in an RTP stream to see if packets are really being lost and where in the network they are being lost. With such a tool, perform the following steps:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ol style=&quot;margin-left: 74pt;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Start at the endpoint that is experiencing the poor-quality audio where you suspect packet loss.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Take a trace of a poor-quality call and filter it so that it shows you only packets from the far end to the endpoint that is hearing the problem. The packets should be equally spaced, and the sequence numbers should be consecutive with no gaps.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;If you are seeing all the packets in the trace, continue taking traces after each hop until you get a trace where packets are missing.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;When you have isolated the point in the network where the packet loss is occurring, look for any counters on that device that might indicate where the packets are being lost.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Queuing Problems&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Queuing delay can be a significant contributor to variable delay (jitter). When you have too much jitter end-to-end, you encounter voice quality problems. A voice sample that is delayed over the size of the receiving device&#39;s jitter buffer is no better than a packet that is dropped in the network because the delay still causes a noticeable break in the audio stream. In fact, high jitter is actually worse than a small amount of packet loss because most CODECs can compensate for small amounts of packet loss. The only way to compensate for high jitter is to make the jitter buffer larger, but as the jitter buffer gets larger, the voice stream is delayed longer in the jitter buffer. If the jitter buffer gets large enough such that the end-to-end delay is more than 200ms, the two parties on the call feel like the conversation is not interactive and start talking over each other.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white;&quot;&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Remember that every network device between the two endpoints involved in a call (switches, routers, firewalls, and so on) is a potential source of queuing or buffering delays. The ideal way to troubleshoot a problem in which the symptoms point to delayed or jittered packets is to use a &lt;a href=&quot;http://www.teraquant.com/iptego&quot;&gt;hosted diagnostic tool&lt;/a&gt; at each network hop to see where the delay or jitter is being introduced.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: black; font-family: Arial;&quot;&gt;Also remember that once you&#39;ve made changes to your network elements and call paths that it is always appropriate to perform regression testing across your network with some type of &lt;a href=&quot;http://www.teraquant.com/malden/&quot;&gt;automated voice quality test package&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/480868097065315995/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/04/packet-voice-quality-problems-and.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/480868097065315995'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/480868097065315995'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/04/packet-voice-quality-problems-and.html' title='Packet Voice Quality Problems and Answers'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-5961544228301877106</id><published>2012-03-28T12:36:00.002-07:00</published><updated>2012-04-04T12:46:26.547-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="billing"/><category scheme="http://www.blogger.com/atom/ns#" term="Customer Experience"/><category scheme="http://www.blogger.com/atom/ns#" term="Customer Experience Management"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud prevention"/><category scheme="http://www.blogger.com/atom/ns#" term="IP-telephony"/><category scheme="http://www.blogger.com/atom/ns#" term="network monitoring"/><category scheme="http://www.blogger.com/atom/ns#" term="Revenue Assurance"/><category scheme="http://www.blogger.com/atom/ns#" term="revenue leakage"/><title type='text'>A Practical Guide to Revenue Assurance Management</title><content type='html'>&lt;span xmlns=&quot;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #365f91; font-family: Verdana, sans-serif;&quot;&gt;&lt;strong&gt;Five Rules on how to enhance your Communication Service Provider Revenue&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #365f91; font-family: Verdana, sans-serif;&quot;&gt;&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;With the growing trend of LTE and an increasing mobile market, telecom companies today are facing the challenge of providing a variety of enhanced services to customers, but while staying profitable and securing their revenues. Revenue Assurance is key when it comes to ensuring long-term growth and the financial security of a company. But what does an efficient Revenue Assurance strategy look like? It doesn&#39;t need to be rocket science; but sometimes it helps to consider new methods to optimize a company&#39;s revenue. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;Codec Translator accepted the challenge and has put together an easy guide of five rules for Communication Service Providers to ensure an efficient Revenue Assurance Management. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;1. Look for hidden revenue&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;Have you ever thought of what happens if you don&#39;t pay your bill? Well, for some reason many Service Providers have a tendency to avoid invoicing some of their customers, not only because of unclear billing reports, but can also be because of their customer status. It is often reported that there is a specific customer base considered as &quot;untouchable&quot;, even when this customer would not pay the bill. But why shouldn&#39;t correct billing apply to these customers?&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;A first step here in order to avoid this kind of revenue leakage is obviously a well working reporting tool for your billing records. Then, reflect what payment strategy is most appropriate for you. In a serious case of parties that are not willing to pay, you might possibly consider stronger contract bindings, or even penalties for non-paying customers or distributors for infringing their legal agreements.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;Looking for the leakages in your billing strategy could make you easy money, all by just applying your standard billing Terms and Conditions.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;2. Communicate with other departments&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;The bigger your company is, the more correct billing will become a serious challenge, especially when various customer bases are registered in different departments. Cross-departmental communication might be the key here to solve billing questions, and tools that provide a revenue transparency should be encouraged. You might be surprised and discover new invoicing models or customer groups that have not been invoiced so far, because they&#39;ve been out of your department&#39;s scope. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;Therefore, supporting open communication with other departments and by adopting standards and policies to help regulate communication will certainly help you enhancing the Revenue Assurance Management. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;3. Revenue Protection is also fraud prevention&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;New ways of communication such as IP-telephony, messaging, and new services not only bring new opportunities, but also give fraudsters new opportunities to steal money. The Press and several fraud associations frequently report about significant losses in the telecom sector due to fraud attacks. One single fraud attack can have an impact of losses of up to five digits USD for just the one fraudulent call placed illegally in a Service Provider&#39;s network. Facing the potential for disastrous consequences in revenues and reputation, the telecom industry starts to rethink of prevention mechanisms to protect their customers from fraud attacks. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;In order to reduce fraud as an obvious source of revenue leakage, installing a high performance solution that will protect LTE, IMS and VoIP networks of fraud attacks is a good investment. Today, &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;a href=&quot;http://www.iptego.com/palladion-ngn-optimization/palladion-fraud-detection-prevention&quot;&gt;light-weight solutions&lt;/a&gt;&lt;/span&gt;&amp;nbsp;can detect fraudulent attack in near real-time, and the ability to block fraudulent calls as they happen reduces any further revenue losses.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;4. Know your customers &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Obviously, an appropriate billing infrastructure is crucial when it comes to invoicing customers. Moreover, it&#39;s good to know what services your customers most value. To better understand your customer&#39;s behavior, you will need a solution that provides an end-to-end &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;a href=&quot;http://www.iptego.com/palladion-ngn-optimization&quot;&gt;network visibility&lt;/a&gt;&lt;/span&gt;, which displays user behavior in the past as well as trends of current usage. This information, together with the ability to group and organize your customers will help you to learn about your customer&#39;s preferences or any issues they might experience while using your service. The better you know your customer, the better your Customer Experience Management will be. A solution to measure the Customer Experience will not only help you to troubleshoot service issues, but also to understand what your customers really want and which of your services they value the most. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot; xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;5.  Set reachable goals &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;This simple life rule also applies to an efficient Revenue Assurance Management. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Whenever you decide to adopt a billing system, new systems for network monitoring, or fraud prevention mechanisms, you might need to consider opting for high performance, yet easy to use solutions. The lower the barriers are to implementing and using new solutions, the more likely you and your team will be to successfully adopting the new systems. This will not only be paying off your investment, but also fostering an enhanced Revenue Assurance Management.&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/5961544228301877106/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/04/practical-guide-to-revenue-assurance.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5961544228301877106'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5961544228301877106'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/04/practical-guide-to-revenue-assurance.html' title='A Practical Guide to Revenue Assurance Management'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-5587218780773661472</id><published>2012-03-03T22:41:00.014-08:00</published><updated>2012-03-13T22:58:04.378-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based VoIP troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="mean opinion score"/><category scheme="http://www.blogger.com/atom/ns#" term="speech quality metric"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP toubleshooting on demand"/><title type='text'>MOS Results are Good but Customers Still Complain of Poor Speech Quality</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;When monitoring the speech packets of a VoIP network, i.e. the RTP stream, protocol analyzers or VoIP service monitoring systems may analyze the packets and calculate a &lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html&quot;&gt;Mean opinion score (MOS)&lt;/a&gt; which describes the quality of the speech. If customers call into your call center or NOC and complain about speech quality this is the first place you would go to analyze the problem.&amp;nbsp;Finding the bad call the customer is referring to will take a few seconds with a good &lt;a href=&quot;http://www.teraquant.com/content/palladion-demand&quot;&gt;voice service assurance system&lt;/a&gt;.&amp;nbsp;&lt;b&gt;&lt;i&gt;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;Sometimes when you find the call, the MOS maybe 4.0 or greater indicating good speech quality.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;How can we explain this discrepancy?&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The method used to &lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html&quot;&gt;calculate MOS&lt;/a&gt; by a monitoring system which needs to monitor thousands of active calls and produce voice quality measurements or QoS of all of them is R-factor based on the E-model (ITU-T G.107). R-factor takes into account the codecs used by the endpoints (VoIP Phones) in the call. But most of the calculation is derived from what happens to the packet stream as it transits an IP packet network. So R-factor requires measurements for packet loss and jitter of the packets in the stream of VoIP (RTP) packets&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;How is packet loss and jitter detected in an RTP stream? The RTP packets contain a sequence number and a time stamp and from this packet loss and jitter can be calculated. It is however, important to understand that these measurements can only be made on the received RTP streams i.e. packet loss and jitter is only measured up to that point in the network where the monitoring system probe is connected. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;RTP streams leaving your network going to your customer’s premises will not be measured unless you have a probe on the customer’s premises or their VoIP phones support RTCP. A sophisticated good &lt;a href=&quot;http://www.teraquant.com/content/palladion-demand&quot;&gt;voice service assurance system&lt;/a&gt; will also read the RTCP packets coming back from the customer’s probes and so that leg of the call can be included in the R factor measurement. Some &lt;a href=&quot;http://www.teraquant.com/content/palladion-demand&quot;&gt;monitoring systems&lt;/a&gt; will show you in which leg of the call the packet impairments are added. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If call quality is bad but &lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html&quot;&gt;MOS&lt;/a&gt; is good, perhaps you are not monitoring all legs of the call.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Another reason may account for this discrepancy. &lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html&quot;&gt;MOS&lt;/a&gt; or Perceptual Speech Quality does not include echo or overall end-to-end delay. So if the customer is experiencing echo, this will not degrade the &lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html&quot;&gt;MOS values&lt;/a&gt;. Similarly, if there is delay in the network (as opposed to jitter, which is short-term varying delay), this will not impact the&lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html&quot;&gt; MOS value&lt;/a&gt;. Network Delay in VoIP causes cold or stinted conversation, so this this could be a reason for your customer to call you.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If customers complain of poor speech quality but the &lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html&quot;&gt;MOS results&lt;/a&gt; are good, use your voice&lt;a href=&quot;http://www.teraquant.com/content/palladion-demand&quot;&gt; service assurance system&lt;/a&gt;&lt;b&gt;&lt;i&gt;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;to record the calls from this customers (with disclaimers and forwarding necessary of course) and listen to a sample for &lt;a href=&quot;http://codec-translator.blogspot.com/2011/10/can-you-hear-me-now.html&quot;&gt;echo or delay&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/5587218780773661472/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/03/mos-results-are-good-but-customers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5587218780773661472'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5587218780773661472'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/03/mos-results-are-good-but-customers.html' title='MOS Results are Good but Customers Still Complain of Poor Speech Quality'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-1971713587973189892</id><published>2012-02-25T14:51:00.002-08:00</published><updated>2012-03-19T22:43:51.764-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based VoIP troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="high definition telephony"/><category scheme="http://www.blogger.com/atom/ns#" term="mean opinion score"/><category scheme="http://www.blogger.com/atom/ns#" term="mos"/><title type='text'>Methods to Objectively Evaluate Speech Quality</title><content type='html'>&lt;span xmlns=&quot;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;This post gives an overview of methods to objectively evaluate perceptual quality of speech. The science of perceptual speech quality measurements assessment has been progressing for the past two decades. Current state-of-the-art for full referenced measurements uses the third iteration of the standard. Good-quality implementations of the standards of the algorithms contained within the standards will deliver the 97% correlation with the subjective tests database depending on implantation of the test set up.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Commercial test solutions exist to measure speech from acoustic, electronic analog and digital interfaces.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Mean Opinion Score [MOS] is a scale used in voice telecommunications predicting the perceived quality of a speech sample. MOS describes speech clarity or intelligibility. The measure does not measure delay across a network or Echo. The scales runs from 1 to 5, a score of &#39;1&#39; is bad and &#39;5&#39; is excellent. MOS [Mean Opinion Score] test sessions comprise 15 to 25 people listening to speech files of good quality and of poor quality with impairments and scoring them subjectively. This subjective test process is specified in the standard ITU-T P.800.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;table border=&quot;0&quot; style=&quot;border-collapse: collapse;&quot;&gt;&lt;colgroup&gt;&lt;col style=&quot;width: 41px;&quot;&gt;&lt;/col&gt;&lt;col style=&quot;width: 69px;&quot;&gt;&lt;/col&gt;&lt;col style=&quot;width: 208px;&quot;&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;tbody valign=&quot;top&quot;&gt;
&lt;tr&gt;&lt;td colspan=&quot;3&quot; style=&quot;border-bottom: none; border-left: none; border-right: none; border-top: none; padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;Mean opinion score (MOS)&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;MOS&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;Quality&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;Impairment&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;5&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Excellent&lt;/span&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Imperceptible&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Good&lt;/span&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Perceptible but not annoying&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Fair&lt;/span&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Slightly annoying&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Poor&lt;/span&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Annoying&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Bad&lt;/span&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12pt;&quot;&gt;Very annoying&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;MOS is valuable for the characterization of any device where the voice is compressed and transmitted over networks. Such devices may be handsets, mobile phones and networks such as packet-based VoIP networks or wireless networks. Networks employing state-of-the-art codecs are optimized for the compression of voice and treat tomes such as DTMF tones in a different way from the voice. Therefore to the characterize quality of the network or the System under Test, real speech files need to be transmitted. Frequency response, levels, Echo and delay must be measured, but in addition to the perceived speech quality.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;Subjective testing is obviously time-consuming and expensive. So algorithms have been developed to allow a computer to reference the pure incidented speech file and compare it with the received degraded file and calculate the MOS with a high degree of correlation to subjective MOS. The first such objective speech quality measurements were standardized in 1998 with the PSQM algorithm P.861 Objective quality measurement of telephone-band (300-3400 Hz) speech codecs. This was followed by ITU-T Recommendation P.862: Perceptual evaluation of speech quality (PESQ) which has gained widespread worldwide usage as a reliable method for characterizing most narrowband telephony systems.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;The following are examples of Mean Opinion Scores for one implementation of different codecs:&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;table border=&quot;0&quot; style=&quot;border-collapse: collapse;&quot;&gt;&lt;colgroup&gt;&lt;col style=&quot;width: 89px;&quot;&gt;&lt;/col&gt;&lt;col style=&quot;width: 61px;&quot;&gt;&lt;/col&gt;&lt;col style=&quot;width: 126px;&quot;&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;tbody valign=&quot;top&quot;&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;strong&gt;Codec&lt;/strong&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;strong&gt;Data rate&lt;br /&gt;
[kbit/s]&lt;/strong&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;strong&gt;Mean opinion score&lt;br /&gt;
(MOS)&lt;/strong&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G.711&quot; title=&quot;G.711&quot;&gt;G.711&lt;/a&gt; (&lt;a href=&quot;http://en.wikipedia.org/wiki/ISDN&quot; title=&quot;ISDN&quot;&gt;ISDN&lt;/a&gt;)&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;64&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;4.1&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/ILBC&quot; title=&quot;ILBC&quot;&gt;iLBC&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;15.2&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;4.14&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Adaptive_multi-rate_compression&quot; title=&quot;Adaptive multi-rate compression&quot;&gt;AMR&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;12.2&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;4.14&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G.729&quot; title=&quot;G.729&quot;&gt;G.729&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;8&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.92&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G.723.1&quot; title=&quot;G.723.1&quot;&gt;G.723.1&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;6.3&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.9&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/GSM&quot; title=&quot;GSM&quot;&gt;GSM&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Enhanced_Full_Rate&quot; title=&quot;Enhanced Full Rate&quot;&gt;EFR&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;12.2&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.8&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G.726&quot; title=&quot;G.726&quot;&gt;G.726 ADPCM&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;32&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.85&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G.729a&quot; title=&quot;G.729a&quot;&gt;G.729a&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;8&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.7&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G.723.1&quot; title=&quot;G.723.1&quot;&gt;G.723.1&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;5.3&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.65&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/G.728&quot; title=&quot;G.728&quot;&gt;G.728&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;16&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.61&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/GSM&quot; title=&quot;GSM&quot;&gt;GSM&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Full_Rate&quot; title=&quot;Full Rate&quot;&gt;FR&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;12.2&lt;/td&gt;&lt;td style=&quot;padding-bottom: 1px; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;middle&quot;&gt;3.5&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM0IstCiIVa1Dff5DRtjbbLpgwG-E59Ip-8D5UubN4TB2tjMW4nKOodU_p6H58yawRHNZeTpmTXkVcBu6nfzZszkQ7GDyaLBlSNlguaytGPNvscyhXbX0cvxYDGSNYH9jB2aHgfcT4ospW/s1600/compression_effects.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;294&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM0IstCiIVa1Dff5DRtjbbLpgwG-E59Ip-8D5UubN4TB2tjMW4nKOodU_p6H58yawRHNZeTpmTXkVcBu6nfzZszkQ7GDyaLBlSNlguaytGPNvscyhXbX0cvxYDGSNYH9jB2aHgfcT4ospW/s400/compression_effects.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;Wideband telephony networks are expected to improve the user experience including the intelligibility of voice conversations over highly compressed codecs as used in both packet and wireless networks. Hopefully the tardy phrase &quot;can you hear me now&quot; will become a less frequent part of our vocabulary.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt; &lt;br /&gt;
High Definition or Wideband Telephony is just now coming into common usage. G.722 is the Wideband Telephony codec for VoIP and WB-AMR is now being tested for wireless networks.  However, they do need to be tested to tune codec implementations, packet loss concealment algorithms and performance in areas of poor coverage or high congestion.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;Here are the analog frequency definitions for the different forms of telecommunications:&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq9ArqoR8A80Xbvx2d9u_WNCD3qtWhqvhNMm3qOwQRpK-ropETF_XRMVi-pMRHudNoJHn5tMPlpN4ZUid5-JsG4mBNn3rkXGuTSlWauCEAk2gp7dDcL43WdfHQDODw2HpjMcoJbI3sin5j/s1600/frequency_defs.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq9ArqoR8A80Xbvx2d9u_WNCD3qtWhqvhNMm3qOwQRpK-ropETF_XRMVi-pMRHudNoJHn5tMPlpN4ZUid5-JsG4mBNn3rkXGuTSlWauCEAk2gp7dDcL43WdfHQDODw2HpjMcoJbI3sin5j/s400/frequency_defs.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;PESQ was never designed to address wideband networks. In addition, vendors of time warping code codecs [e.g. EVRC] and Skype and iLBC were not content that PESQ accurately measured the full quality of their codecs.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;In 2006 ITU-T commenced work on a new standard to address the limitations of PESQ and during 2011 the POLQA standard, Recommendation P.863, was published.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijiM77_bBHkhdk_S0ycNup-Xc-zZHl3dBEBuWJBg6-VN6I26fvxitJClYxcF_aUUsBbyUQD1TPwBQCCTg3kZq7kakqARu8y9uXjCcFAhCC_EuE1MBcEdFdDwPhc6RX2yEFICm5XBWIpfM2/s1600/shortcomings.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;291&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijiM77_bBHkhdk_S0ycNup-Xc-zZHl3dBEBuWJBg6-VN6I26fvxitJClYxcF_aUUsBbyUQD1TPwBQCCTg3kZq7kakqARu8y9uXjCcFAhCC_EuE1MBcEdFdDwPhc6RX2yEFICm5XBWIpfM2/s400/shortcomings.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Speech uses the new POLQA speech quality metric for objective protection of MOS. The old PESQ algorithm (ITU-T P.862) has been used for narrowband telephony since it was approved in 2000. PESQ was not designed for Wideband Telephony and also did not represent well the speech quality of time warping codecs. POLQA addresses all these short comings and provides a scale that goes all the way to 24kHz audio.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;It is desirable to use the same scale so that laboratories can compare new results for wideband telephony with their old PESQ database. However, the question of human expectation comes into play because all these objective measurements performed by computers must correlate or predict subjective experience. If you watch a video on your smart phone, you might consider the picture quality as being good. Your expectations are put in the context of the small screen and the convenience of the video being played on a handheld smartphone. If you would give you the same video on your brand-new expensive high-definition 1080P TV, you would be very disappointed even if the pixel resolution had been scaled to the 62 inches screen size. Your expectation of quality is tempered to the format in which you are viewing it.&lt;br /&gt;
&lt;br /&gt;
Similarly with speech and audio. If you were to participate in a MOS test and invited into a studio where there were high fidelity speakers, orchestral classical music playing and told and asked to rate the quality of the High Definition speech you are about to hear, your expectations would be set high and you&#39;d be more critical. You would score the audio lower than if you had been asked to rate the speech quality of your most recent cellular phone call.&lt;br /&gt;
&lt;br /&gt;
POLQA offers two scales, the narrowband scale and the super wideband scale. Super wideband telephony reaches 14 kHz analog audio frequency. The narrowband focus scale maps directly onto the old desk scale and exploits the higher scores not given by test participants in narrowband tests.&lt;br /&gt;
&lt;br /&gt;
• NB: Maximum MOS value 4.25&lt;br /&gt;
&lt;br /&gt;
• WB: Maximum MOS value 4.5&lt;br /&gt;
&lt;br /&gt;
• SWB: Maximum MOS value 4.75&lt;br /&gt;
&lt;br /&gt;
So a score of 4.5, on the narrowband POLQA scale is experimentally the best value you will ever obtain with wideband telephony equipment. For POLQA, the maximum MOS value in tests is 4.75 .&lt;br /&gt;
&lt;br /&gt;
In future years, the industry will migrate exclusively to using the super wideband POLQA scale as soon as users&#39; expectations always expect high-definition or hi-fi quality to the communications audio.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;table border=&quot;0&quot; style=&quot;background: #f2f2f2; border-collapse: collapse;&quot;&gt;&lt;colgroup&gt;&lt;col style=&quot;width: 315px;&quot;&gt;&lt;/col&gt;&lt;col style=&quot;width: 111px;&quot;&gt;&lt;/col&gt;&lt;col style=&quot;width: 100px;&quot;&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;tbody valign=&quot;top&quot;&gt;
&lt;tr style=&quot;height: 52px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: solid white 1.0pt; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: solid white 1.0pt; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;strong&gt;POLQA SWB&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: solid white 1.0pt; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;strong&gt;POLQA NB&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;14kHz 16 bit Linear&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 4.75&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;7kHz 16 bit Linear&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 4.5&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;AMR - WB&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 4&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;3.4KHz 16 bit Linear&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.8&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 4.5&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;G.711&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.7&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 4.3&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;EFR/AMR-FR 12.2kbps&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.6&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 4.1&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;EVRC 9.5 kbps&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.4&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.9&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;EVRC-B  9.5 kbps&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.5&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 4&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;height: 27px;&quot;&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: solid white 1.0pt; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;AMR-HR 7.95 kbps&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.4&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid white 1.0pt; border-left: none; border-right: solid white 1.0pt; border-top: none; padding-left: 1px; padding-right: 1px; padding-top: 1px;&quot; valign=&quot;bottom&quot;&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt; 3.8&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;h1&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Applications for Perceptual Speech Quality Measurements&lt;/span&gt;&lt;span style=&quot;background-color: #fefdfa;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Perceptual speech quality measurements are used to make End-to-End measurements, for any network where voice codecs are used to compress the speech or where speech transmission systems or networks may introduce impairments, such as weak radio signals or multipath or packet loss or packet jitter.&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Examples of systems where Perceptual Speech Quality Measurements are valuable:&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;background-color: #fefdfa; color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Codec evaluation&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: #fefdfa; color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Frame or packet concealment implementation&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Headsets combining the digitization of sound&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;VoIP phone assessment, both softphone and dedicated VoIP phones&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Mobile handsets&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Digitizing radio &amp;amp; Intercom systems&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;VoIP networks&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;Wireless cellular networks&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;speech enhancement and noise reduction systems&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;transcoders&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;A new important feature added to POLQA is its ability to measure the improvement of speech quality for speech enhancement and noise reduction systems. &lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjnCdIu2WjoPf1n9zXcbK4AQq_Ms2jes0SXAiai3JBgICMf81SVntDp2VZ4WbHUkNMeUhNYBJSUmqdmSw4y_wOKa5qSPmdLKZKmKc3W84Sg9I_8nU0jW8sK3Ym7bGybQ2cOmM162L9zyC/s1600/Picture1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjnCdIu2WjoPf1n9zXcbK4AQq_Ms2jes0SXAiai3JBgICMf81SVntDp2VZ4WbHUkNMeUhNYBJSUmqdmSw4y_wOKa5qSPmdLKZKmKc3W84Sg9I_8nU0jW8sK3Ym7bGybQ2cOmM162L9zyC/s1600/Picture1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjnCdIu2WjoPf1n9zXcbK4AQq_Ms2jes0SXAiai3JBgICMf81SVntDp2VZ4WbHUkNMeUhNYBJSUmqdmSw4y_wOKa5qSPmdLKZKmKc3W84Sg9I_8nU0jW8sK3Ym7bGybQ2cOmM162L9zyC/s1600/Picture1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;145&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbjnCdIu2WjoPf1n9zXcbK4AQq_Ms2jes0SXAiai3JBgICMf81SVntDp2VZ4WbHUkNMeUhNYBJSUmqdmSw4y_wOKa5qSPmdLKZKmKc3W84Sg9I_8nU0jW8sK3Ym7bGybQ2cOmM162L9zyC/s400/Picture1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
The picture shows the iLBC codec measuring 4.21 and the narrowband &lt;/span&gt;POLQA &lt;span style=&quot;font-size: 10pt;&quot;&gt;scale.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial;&quot;&gt; &lt;span style=&quot;font-size: 10pt;&quot;&gt;In over 2 decades where these tests have taken place, no statistically significant number of participants ever scored any speech recording as being excellent or 5.0. The highest score typically obtained in any test was 4.54. So this measurement for iLBC of 4.21 is a good score for the codec.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&lt;br /&gt;
For more information on making PESQ and POLQA measurements, ensure you contact only renowned and well-respected test vendors because the science of speech quality measurements requires expertise and experience in many different areas - audio, analog electronics as well as computing. It is easy to make a measurement but care is required to ensure that measurement is accurate correlates to human subjective experience and is put into the context of the environment, resolution, format etc.&lt;br /&gt;
&lt;br /&gt;
one of the most admired vendors for&lt;a href=&quot;http://www.teraquant.com/malden/&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;a href=&quot;http://www.teraquant.com/malden/&quot;&gt;&lt;span style=&quot;color: #7d181e;&quot;&gt;&amp;nbsp;speech quality metrics&lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;is Malden Electronics, available in USA through Teraquant Corporation –&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://www.teraquant.com/&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;a href=&quot;http://www.teraquant.com/&quot;&gt;&lt;span style=&quot;color: #7d181e;&quot;&gt;www.teraquant.com&lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;a href=&quot;http://www.teraquant.com/&quot;&gt;More information can be obtained at:&lt;br /&gt;
&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/POLQA&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 10pt;&quot;&gt;http://en.wikipedia.org/wiki/POLQA&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background: #fefdfa;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/1971713587973189892/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/03/methods-to-objectively-evaluate-speech.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/1971713587973189892'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/1971713587973189892'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/03/methods-to-objectively-evaluate-speech.html' title='Methods to Objectively Evaluate Speech Quality'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM0IstCiIVa1Dff5DRtjbbLpgwG-E59Ip-8D5UubN4TB2tjMW4nKOodU_p6H58yawRHNZeTpmTXkVcBu6nfzZszkQ7GDyaLBlSNlguaytGPNvscyhXbX0cvxYDGSNYH9jB2aHgfcT4ospW/s72-c/compression_effects.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-664747354974108381</id><published>2012-02-05T07:19:00.000-08:00</published><updated>2012-02-20T18:22:12.986-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fraud detection"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud prevention"/><category scheme="http://www.blogger.com/atom/ns#" term="network security"/><category scheme="http://www.blogger.com/atom/ns#" term="Telecom fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="toll fraud"/><title type='text'>Some Key Facts About Communications Fraud</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;According to a recent study from the Communications Fraud Control Association (CFCA), a high number of Communication Service Providers are increasingly facing fraud attacks. Based on the results of the CFCA’s “2011 Global Fraud Loss Survey”, the annual Global Fraud Loss Estimate reportedly is $40.1 Billion (USD), whereas the real number is probably much higher. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The CFCA which is a not-for-profit global educational association with mission to combat communications fraud, describes the 5 most current fraud types as follows:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;text-indent: -0.25in;&quot;&gt;$4.96Billion–Compromised PBX/Voicemail systems&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -0.25in;&quot;&gt;$4.32Billion–Subscription/Identity (ID)Theft&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -0.25in;&quot;&gt;$3.84Billion–International Revenue Share Fraud (IRSF)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -0.25in;&quot;&gt;$2.88Billion–Bypass Fraud&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;text-indent: -0.25in;&quot;&gt;$2.40Billion–Credit Card Fraud&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;However, there are many other existing fraud types such as Identity Theft, Social Engineering, Roaming Fraud, SS7 Manipulation just to name a few. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;When asked how many fraud incidents the surveyed telecom operators handle per month, 42.6% said less than 50 incidents, 13% report to have had 51-100 incidents, 24.1% (101-500 incidents), 3.7% (501-1,000 incidents) and 16.7% (1,001+ incidents). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;With the migration to Next Generation Networks, the risk of new fraud attack methods keeps on growing and the need to protect these networks becomes an obvious necessity for network operators. Current available solutions to fight telecom fraud might still be limited, but to prevent fraud attacks efficiently, you might need a &lt;a href=&quot;http://www.iptego.com/palladion-ngn-optimization/palladion-fraud-detection-prevention&quot;&gt;solution that runs in real-time&lt;/a&gt; to detect fraud incidents instantly, with a powerful technology to prevent any fraud attack on IMS, LTE and VoIP networks.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Source: all provided numbers and facts are based on the CFCA’s “2011 Global Fraud Loss Survey”.&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=124133521939044276&amp;amp;postID=664747354974108381&amp;amp;from=pencil&quot; name=&quot;_GoBack&quot;&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;For more information about the Communications Fraud Control Association, please contact &lt;a href=&quot;mailto:fraud@cfca.org&quot;&gt;fraud@cfca.org&lt;/a&gt; or visit the official website: &lt;a href=&quot;http://www.cfca.org/&quot;&gt;www.cfca.org&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/664747354974108381/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/02/some-key-facts-about-communications.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/664747354974108381'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/664747354974108381'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/02/some-key-facts-about-communications.html' title='Some Key Facts About Communications Fraud'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-2423582889888730307</id><published>2012-01-25T13:24:00.000-08:00</published><updated>2012-04-25T08:26:37.382-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based VoIP troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><title type='text'>The One-Way Audio VoIP Dilemma</title><content type='html'>One-way audio is an annoying anomaly where one person can hear the other caller, but that caller can&#39;t hear them. &amp;nbsp;It is uncommon in non-VoIP telephony, but seems to occur frequently in systems that have just been deployed.&lt;br /&gt;
&lt;br /&gt;
In traditional TDM voice transmissions, the circuits are reserved for two-way voice transmission, but in VoIP each voice stream is independent. &amp;nbsp;Should one of the streams be lost, deferred, or misdirected, the call the results on has one active stream in one direction.&lt;br /&gt;
&lt;br /&gt;
The most common reason for one-way audio is the result of improper&amp;nbsp;negotiation&amp;nbsp;of the RTP voice stream by a server that is behind a firewall - an&amp;nbsp;unaccommodating&amp;nbsp;firewall. &lt;br /&gt;
&lt;br /&gt;
In a &lt;a href=&quot;http://codec-translator.blogspot.com/2012/04/solutions-for-sip-natfirewall-traversal.html&quot;&gt;future post&lt;/a&gt; we will talk about how to isolate the offending firewall and how to work with the system or firewall administrator to set NAT parameters appropriately so that both RTP streams can be negotiated successfully.</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/2423582889888730307/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/01/one-way-audio-voip-dilemma.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2423582889888730307'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2423582889888730307'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/01/one-way-audio-voip-dilemma.html' title='The One-Way Audio VoIP Dilemma'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-4099714105120249156</id><published>2012-01-05T22:02:00.000-08:00</published><updated>2012-02-05T10:21:37.781-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="VoIP toubleshooting on demand"/><title type='text'>Attacking VoIP Call-Quality Issues</title><content type='html'>Call-quality issues are a bit trickier with VoIP than with traditional telephony.&lt;br /&gt;
&lt;br /&gt;
One of the main problems with VoIP are the negative effects of the delays in transmission of packets. &amp;nbsp;The latency is always inherent in converting a call to and from VoIP. &amp;nbsp;But no matter how quickly that conversion occurs, if there are several, the&amp;nbsp;cumulative effective latency can have&amp;nbsp;noticeable degradation in quality. &amp;nbsp;An end-to-end&amp;nbsp;cumulative latency of great than 200 milliseconds (ms) causes human perceptible delay and results in conversations with participants that repeatedly interrupt each other.&lt;br /&gt;
&lt;br /&gt;
Fluctuations&amp;nbsp;in latency are also common on VoIP networks. &amp;nbsp;This is commonly referred to as jitter. &amp;nbsp;Jitter is in most cases caused by a leg in the call path that is sharing traffic with other applications or calls. &amp;nbsp;The most common &amp;nbsp;symptom of jitter is called &quot;clipping.&quot;&lt;br /&gt;
&lt;br /&gt;
A normal&amp;nbsp;conversation sounds like this:&lt;br /&gt;
&quot;Hi dear, shall I stop at the store to pick up some milk?&quot;&lt;br /&gt;
but clipping produces:&lt;br /&gt;
&quot;I ear, all op de ore ick om ilk&quot;&lt;br /&gt;
&lt;br /&gt;
In future posts we&#39;ll explore how to isolate latency and jitter to one or many legs of a VoIP call.</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/4099714105120249156/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2012/01/attacking-voip-call-quality-issues.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/4099714105120249156'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/4099714105120249156'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2012/01/attacking-voip-call-quality-issues.html' title='Attacking VoIP Call-Quality Issues'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-845535442173470687</id><published>2011-12-15T09:52:00.000-08:00</published><updated>2012-02-05T10:02:08.951-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based VoIP troubleshooting"/><title type='text'>The Essence of VoIP Issues</title><content type='html'>In the telephony world VoIP is a hybrid.&lt;br /&gt;
&lt;br /&gt;
A VoIP solution usually has dedicated Internet connections, dedicated T1 voice circuits, and at two or or more points in a call a digital to analog conversion.&lt;br /&gt;
&lt;br /&gt;
On top of these common telephony components, you add the complexities associated with IP packets: &amp;nbsp;latency, real time transport of packets, call control channels translations, and dial plan nuances.&lt;br /&gt;
&lt;br /&gt;
One of the first questions to ask yourself when troubleshooting a VoIP call is whether or not a problem exhibits itself on all of your calls or just select ones.&lt;br /&gt;
&lt;br /&gt;
In future posts we will begin to begin to isolate trouble to the various components of the call circuit and learn what clues to look for with each isolated issue or problem.</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/845535442173470687/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/12/essence-of-voip-issues.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/845535442173470687'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/845535442173470687'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/12/essence-of-voip-issues.html' title='The Essence of VoIP Issues'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-5535313712657728263</id><published>2011-11-18T13:57:00.000-08:00</published><updated>2011-11-30T09:01:04.174-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based network"/><category scheme="http://www.blogger.com/atom/ns#" term="host service assurance"/><category scheme="http://www.blogger.com/atom/ns#" term="traffic analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP toubleshooting on demand"/><title type='text'>The True Customer Experience of a Voice Service</title><content type='html'>Customers perceive the quality of a voice service and the reliability of a voice service based on many different experiences. Such experiences may be good or bad, but very often customers notice only the bad experience – obviously as they buy a service that is meant to work 100% at any time and from anywhere.&lt;br /&gt;
&lt;br /&gt;
Bad experiences are often caused by network related problems:&lt;br /&gt;
&lt;br /&gt;
• Calls with degraded voice quality&lt;br /&gt;
• Interrupted or Dropped calls or VoIP Dropped calls&lt;br /&gt;
• Unsuccessful call attempts&lt;br /&gt;
• Missed calls that did not ring or calls that were not signaled&lt;br /&gt;
&lt;br /&gt;
Also end device related problems bring negative user experience:&lt;br /&gt;
&lt;br /&gt;
• Empty battery on smartphone&lt;br /&gt;
• End device &amp;amp; VoIP Endpoint crashes&lt;br /&gt;
• Inability to setup 3 party conference call&lt;br /&gt;
&lt;br /&gt;
For all voice operators, over-the-top (OTT) and legacy networks, these end-device related troubles are very important.  Because in the end the customer does not care at all why something is not working! He will blame it on his voice service provider anyway.&lt;br /&gt;
&lt;br /&gt;
As a result when considering the management of customer experience in next generation voice networks, it is very important to look beyond your own network infrastructure. Internet connections, utilization and network problems on the customers’ corporate LAN and end devices cause a large portion of the problems. So it would definitively not be a good idea to consider a service running well, simply because in one’s own network, all systems are up and running.&lt;br /&gt;
&lt;br /&gt;
Instead operators also need to manage:&lt;br /&gt;
&lt;br /&gt;
• End device &amp;amp; VoIP Endpoint firmware versions&lt;br /&gt;
• App/softphone software versions&lt;br /&gt;
• IP link quality characteristics&lt;br /&gt;
• Performance and problems at your Customers’ premises&lt;br /&gt;
• Error logs from the end device&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiduWMyEYIZfiio6MtngzMFLH1v800U3_9J-ujxagSKMzsObceQJamJHp9cyOkIyn0rgwCE77iYefOI3oIIVyVNG1bIpwWR8THqP2aoIjtVndh8aA579ZFcIDZmhQlOdDXgQIA2YGdqrBIl/s1600/best_practices.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;228&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiduWMyEYIZfiio6MtngzMFLH1v800U3_9J-ujxagSKMzsObceQJamJHp9cyOkIyn0rgwCE77iYefOI3oIIVyVNG1bIpwWR8THqP2aoIjtVndh8aA579ZFcIDZmhQlOdDXgQIA2YGdqrBIl/s400/best_practices.PNG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Very often problems can be solved by optimizing configurations, codec settings, centralized firmware updates or pro-actively contacting the customer about up-coming problems with his device or software. So a tool is needed that see the endpoint or VoIP device as well as the network. But for all of that, a customer experience management system must provide the full set of information about how the customer truly perceives the service End-to-End.&lt;br /&gt;
&lt;br /&gt;
When looking at customer experience management for VoIP networks, operators should choose a holistic approach and carefully select &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;software solutions&lt;/a&gt; that are designed to look far beyond the usual scope and take care about the most important stakeholder in this game – the customer.</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/5535313712657728263/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/11/true-customer-experience-of-voice.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5535313712657728263'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5535313712657728263'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/11/true-customer-experience-of-voice.html' title='The True Customer Experience of a Voice Service'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiduWMyEYIZfiio6MtngzMFLH1v800U3_9J-ujxagSKMzsObceQJamJHp9cyOkIyn0rgwCE77iYefOI3oIIVyVNG1bIpwWR8THqP2aoIjtVndh8aA579ZFcIDZmhQlOdDXgQIA2YGdqrBIl/s72-c/best_practices.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-6199250635666062451</id><published>2011-11-14T19:50:00.000-08:00</published><updated>2011-12-11T14:47:26.774-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="based network monitoring"/><category scheme="http://www.blogger.com/atom/ns#" term="based service assurance"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud based network"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud-based"/><category scheme="http://www.blogger.com/atom/ns#" term="demand"/><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="service assurance"/><title type='text'>VoIP Service Assurance Available in the Cloud</title><content type='html'>Due to the huge amounts of traffic, telephone network analyzers are complex systems with beefy hardware requirements, complex setup procedures and the need for constant monitoring. For bigger networks the costs to run them is easily worth it, but for smaller networks deploying them might not be feasible. Be it for lack of time to learn how to run them, or because of a too big initial investment.&lt;br /&gt;
&lt;br /&gt;
A recent trend in IT is the introduction of cloud services including for example cloud based service assurance or cloud based VoIP troubleshooting. In this setup the main part of the analyzer system is run in a central system, where it is managed by a knowledgeable and dedicated staff experienced in network monitoring and efficient VoIP troubleshooting. This leads to rapid deployment times and minimal investment to the point where one can just &#39;Try before you buy&#39; so in other words, troubleshooting on Demand. The advantage of economy of scale brought by cloud based Network Management or cloud based Network Monitoring makes the most advanced analyzers available for even the smallest VoIP providers, leveling the playing field for all. You can even install it at the last minute in just a few seconds and use it when you have a problem&lt;br /&gt;
&lt;br /&gt;
By deploying a VoIP traffic analysis in the cloud, you can usually achieve up-times far better than by using a complicated local setup and you can make sure that your running costs stay predictable. With today&#39;s technologies, security and data safety are a well-managed issue, all traffic streams being encrypted. A centralized software setup or hosted service assurance makes updates easier and your service provider is also able to diagnose and fix problems more efficiently by having complete access to the stack.&lt;br /&gt;
&lt;br /&gt;
Cloud-based service assurance or network monitoring or VoIP troubleshooting can now be made available on a pay for use basis. Basically, you pay when you login to troubleshoot a problem on your network. If you do not have a problem, do not ever log in, you do not pay a cent. If you do login, for a small charge for one use, you fix the urgent problem that is troubling your customer. The return on investment for use of the network troubleshooting service is instant. The advantage of having paid the Per-Use fee is obvious to your management, because you have just fixed a difficult problem impacting your voice service. Keeping your customer, your customer and allowing you to move on to creating a new service or engineering your network&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.iptego.com/&quot;&gt;Cloud-based network monitoring&lt;/a&gt; gives you universal visibility and centralized and universal access to the analysis. One Installation and setup is so rapid it can be used on-demand when needed i.e. VoIP troubleshooting on Demand. In summation, cloud computing brings lots of advantages to VoIP service providers, (ITSP’s) who could not previously afford or justify the expense for a traffic analysis. With generally better availability, a transparent pricing structure (based on usage) and better support options, &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;cloud solutions&lt;/a&gt; are surely an understandable trend in today&#39;s VoIP software stack market.</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/6199250635666062451/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/11/voip-service-assurance-available-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/6199250635666062451'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/6199250635666062451'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/11/voip-service-assurance-available-in.html' title='VoIP Service Assurance Available in the Cloud'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-3705030425183378511</id><published>2011-11-10T07:27:00.000-08:00</published><updated>2011-12-11T14:45:55.666-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="customer service"/><category scheme="http://www.blogger.com/atom/ns#" term="entire network"/><category scheme="http://www.blogger.com/atom/ns#" term="knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="lte"/><category scheme="http://www.blogger.com/atom/ns#" term="network"/><category scheme="http://www.blogger.com/atom/ns#" term="network health"/><category scheme="http://www.blogger.com/atom/ns#" term="network real-time"/><title type='text'>Network Visibility Matters</title><content type='html'>“Knowledge is power” as the phrase goes and effectively, no matter what you want to achieve in your network management, a truly in-depth knowledge about your network processes is THE key asset when it comes to offering an excellent Customer Service and troubleshooting or to managing the overall network health with ease. Network knowledge and visibility allows you to find problems in minutes rather than hours, reducing operations costs and impressing your customer with rapid resolution of problems.&lt;br /&gt;
&lt;br /&gt;
Today’s fast evolving telecommunication market with its multiple video &amp;amp; audio streams, a fast growing user base and geographically dispersed deployments is challenging and keeping an eye on the entire network doesn’t seem to be an easy task. Often, telecommunication operators are recurring to different systems or are not able to track back single network incidents which don’t provide a satisfying network visibility in the end. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
First, choosing a solution that is able to process all signaling messages traversing the network in real-time and that instantly correlates multiple sites and network protocols is vital. Also, you will want to know the detailed status of the entire network health, the different application layers of the network, the end user devices and all the segments that a media stream is traversing through. A fully correlated end-to-end overview of all parts in the network can easily be provided when distributed agents are installed locally enabling a quick root-cause detection of network issues. &lt;br /&gt;
&lt;br /&gt;
Talking about visibility, it is not only helpful to have an overall view of what is happening in the network, drilling-down into single calls, users, end devices and network devices is very valuable information as well. The perspective should be changed easily from a high-level overview for e.g. the operations department down to a granular and in-depth view of an individual user and its history which is helpful information for the customer service or support department.  A filtering option will furthermore provide a high value to track users or to search for specific devices, numbers or customer groups, we which are known as realms.&lt;br /&gt;
&lt;br /&gt;
A powerful network management tool should be able to provide past information about historical data, process data in real-time and should also allow a current and future proactive network management. Finally, a future-proof solution is a system which is easily integrated into an existing infrastructure reducing hereby the complexity, and instead of installing more hardware, it should be a lightweight solution that smoothly grows with the network.&lt;br /&gt;
&lt;br /&gt;
A &lt;a href=&quot;http://www.iptego.com/&quot;&gt;real-time intelligence software suite&lt;/a&gt; increases the ROI of LTE, IMS and VoIP deployments. It provides fixed and mobile operators a full end-to-end visibility and supports a multi-site and &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;protocol call correlation&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/3705030425183378511/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/11/network-visibility-matters.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/3705030425183378511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/3705030425183378511'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/11/network-visibility-matters.html' title='Network Visibility Matters'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-5309095742920004060</id><published>2011-11-06T06:35:00.000-08:00</published><updated>2011-12-11T14:44:53.762-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="password pbx"/><category scheme="http://www.blogger.com/atom/ns#" term="pbx hack"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="toll fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP toubleshooting on demand"/><category scheme="http://www.blogger.com/atom/ns#" term="wireshark"/><title type='text'>Visualizing a VOIP Security Attack</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;300&quot; src=&quot;http://player.vimeo.com/video/19997906?title=0&amp;amp;byline=0&amp;amp;portrait=0&quot; webkitallowfullscreen=&quot;&quot; width=&quot;400&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;a href=&quot;http://vimeo.com/19997906&quot;&gt;Visualizing a cyber attack on a VOIP server&lt;/a&gt; from &lt;a href=&quot;http://vimeo.com/dataviz&quot;&gt;Ben Reardon, Dataviz Australia&lt;/a&gt; on &lt;a href=&quot;http://vimeo.com/&quot;&gt;Vimeo&lt;/a&gt;.&lt;br /&gt;
Prevent a &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;VoIP security attack&lt;/a&gt; on your systems!</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/5309095742920004060/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/11/visualizing-voip-security-attack_06.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5309095742920004060'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5309095742920004060'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/11/visualizing-voip-security-attack_06.html' title='Visualizing a VOIP Security Attack'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-8124162412095317155</id><published>2011-11-02T20:16:00.000-07:00</published><updated>2011-12-11T14:43:40.461-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="call"/><category scheme="http://www.blogger.com/atom/ns#" term="calling party"/><category scheme="http://www.blogger.com/atom/ns#" term="endpoint phone"/><category scheme="http://www.blogger.com/atom/ns#" term="expired"/><category scheme="http://www.blogger.com/atom/ns#" term="incoming call"/><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="outgoing calls"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="registration"/><category scheme="http://www.blogger.com/atom/ns#" term="rtp"/><category scheme="http://www.blogger.com/atom/ns#" term="service"/><category scheme="http://www.blogger.com/atom/ns#" term="track state"/><category scheme="http://www.blogger.com/atom/ns#" term="udp"/><category scheme="http://www.blogger.com/atom/ns#" term="voip"/><title type='text'>One Way Audio and the Inability to Receive Incoming VoIP Calls</title><content type='html'>&lt;span xmlns=&quot;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;As a VoIP Service Provider, you will no doubt have heard customers complaining about these two problems. In one case, the customer makes a call or Receives an incoming call and can hear their calling party. However, the calling party complains they cannot hear you. This is possibly because the VoIP Endpoint phone has a problem or there could be routing problem in the network.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieHr3-rEr8hyc4UtPGz-XOsP9Q50NVU5z0KzyAqU27soqjlKcRupRdjA4yOOJcYbV4-M7GjeggsipCdQPXGuTohxUQeBQx9BrgzqRalUa8_698Qfso1wO-wmXd2OoqdYEMuMQT5OpM5qLm/s1600/pal1.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieHr3-rEr8hyc4UtPGz-XOsP9Q50NVU5z0KzyAqU27soqjlKcRupRdjA4yOOJcYbV4-M7GjeggsipCdQPXGuTohxUQeBQx9BrgzqRalUa8_698Qfso1wO-wmXd2OoqdYEMuMQT5OpM5qLm/s320/pal1.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span xmlns=&quot;&quot;&gt;More commonly, this is a problem with the firewall belonging to the enterprise. The enterprise network Administrator prefers not to allow incoming data sessions and for the VoIP session, the incoming RTP uses a different port to the outgoing RTP. The UDP port number used by RTP is negotiated by the SDP inside the SIP signaling at the commencement of the session or phone call. The actual details are subject to the implementation and configuration of the network and sometimes outgoing and incoming UDP ports for the RTP may be dissimilar.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;Re-configuring&amp;nbsp;the firewall and ensuring that the RTP port is the same for incoming and outgoing RTP streams will rectify this problem.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEUdYpZUYCLhO8aiITgERI3i1wgiSVkEsEpWegciCKSr0rZBbcta0Pu04NLY_YkA1-WezRJOsJO1yB-xGfIWLvADZbx7Seac9R4nydkRvkBGPSsdArB2SFKVf8JwQrBhEwOqVeOH7yOGoR/s1600/pal2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEUdYpZUYCLhO8aiITgERI3i1wgiSVkEsEpWegciCKSr0rZBbcta0Pu04NLY_YkA1-WezRJOsJO1yB-xGfIWLvADZbx7Seac9R4nydkRvkBGPSsdArB2SFKVf8JwQrBhEwOqVeOH7yOGoR/s320/pal2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;A similar problem, but more difficult to isolate, is where a customer complains they can make outgoing calls but their colleagues say they called your customer but their VoIP phone did not ring. The user can make outgoing calls. Failure of the incoming call is caused by &lt;em&gt;REGISTRATION&lt;/em&gt; of their VoIP phone having expired on its registration server.&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;When a VoIP endpoint successfully registers on the registration server or the network, the registration server includes in its response, a time frame during which the &lt;em&gt;REGISTRATION&lt;/em&gt; is valid. The VoIP endpoint/phone should RE-REGISTER with the registration server before &lt;strong&gt;&lt;em&gt;half&lt;/em&gt;&lt;/strong&gt; of the time period has expired. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQKDS_pkmmFveoCFoEuHjQSeI2Bkyya3LNbgwl0-jcmIMSH2ED6fz2cpjO-YV1sxR_qegWKRw_eKIp6RX0uxLIZtMiErkXhverbTP5Cvj6vPS3x7Uxx9onG1q-xRJcLj3Sv3A2p6Oa5wCC/s1600/pal3.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQKDS_pkmmFveoCFoEuHjQSeI2Bkyya3LNbgwl0-jcmIMSH2ED6fz2cpjO-YV1sxR_qegWKRw_eKIp6RX0uxLIZtMiErkXhverbTP5Cvj6vPS3x7Uxx9onG1q-xRJcLj3Sv3A2p6Oa5wCC/s320/pal3.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span xmlns=&quot;&quot;&gt;Frequently, there is an imbalance between when the endpoint believes it should renew the registration and when the registration server expires the registration. A tool which can track the state of registration [New, Unauthorized, Expired or Gone] is invaluable in being able to find these stealth problems.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;Wireshark will show you the time and relationship between such &lt;em&gt;REGISTRATION&lt;/em&gt; messages. However, an &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;advanced intelligent Service Assurance&lt;/a&gt; tool such as Palladion will track the state of each endpoint, and also the firmware release of each endpoint, allowing you to find these anomalies in seconds.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/8124162412095317155/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/11/one-way-audio-and-inability-to-receive.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/8124162412095317155'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/8124162412095317155'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/11/one-way-audio-and-inability-to-receive.html' title='One Way Audio and the Inability to Receive Incoming VoIP Calls'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieHr3-rEr8hyc4UtPGz-XOsP9Q50NVU5z0KzyAqU27soqjlKcRupRdjA4yOOJcYbV4-M7GjeggsipCdQPXGuTohxUQeBQx9BrgzqRalUa8_698Qfso1wO-wmXd2OoqdYEMuMQT5OpM5qLm/s72-c/pal1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-6949065611814087671</id><published>2011-10-29T17:21:00.000-07:00</published><updated>2011-12-11T14:42:13.072-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="mean opinion score"/><category scheme="http://www.blogger.com/atom/ns#" term="mos"/><category scheme="http://www.blogger.com/atom/ns#" term="narrowband focus scale"/><category scheme="http://www.blogger.com/atom/ns#" term="pesq"/><category scheme="http://www.blogger.com/atom/ns#" term="polqa"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="scale super wideband"/><category scheme="http://www.blogger.com/atom/ns#" term="speech quality metric"/><title type='text'>MOS [Mean Opinion Score] for High Definition or Wideband Telephony</title><content type='html'>Mean Opinion Score [MOS] is a scale from 1 to 5 indicating speech quality - 1 is bad and 5 is excellent. MOS test sessions comprise 15 to 25 people listening to speech files of good quality and of poor quality with impairments and scoring them subjectively. This subjective test process is specified in ITU-T P.800. In over 16 years where these tests have taken place, no statistically significant number of participants ever scored any speech recording as being excellent or 5.0. The highest score typically obtained in any test was 4.5.&lt;br /&gt;
&lt;br /&gt;
High Definition or Wideband Telephony speech uses the new POLQA speech quality metric for objective protection of MOS. The old PESQ algorithm has been used for narrowband telephony since it was approved in 2000. It is desirable to use the same scale so that laboratories can compare new results for wideband telephony with their old PESQ database. However, the question of human expectation comes into play because all these objective measurements performed by computers must correlate or predict subjective experience. If you watch a video on your smart phone, you might consider the picture quality as being good. Your expectations are put in the context of the small screen and the convenience of the video being played on a handheld smartphone. If you would give you the same video on your brand-new expensive high-definition 1080P TV, you would be very disappointed even if the pixel resolution had been scaled to the 62 inches screen size. Your expectation of quality is tempered to the format in which you are viewing it.&lt;br /&gt;
&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;Similarly with speech and audio. If you were to participate in a MOS test and invited into a studio where there were high fidelity speakers, orchestral classical music playing and told and asked to rate the quality of the High Definition speech you are about to hear, your expectations would be set high and you&#39;d be more critical. You would score the audio lower than if you had been asked to rate the speech quality of your most recent cellular phone call.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;POLQA offers two scales, the narrowband scale and the super wideband scale. Super wideband telephony reaches 14 kHz analog audio frequency. The narrowband focus scale maps directly onto the old desk scale and exploits the higher scores not given by test participants in narrowband tests.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;• NB: Maximum MOS value 4.25&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;• WB: Maximum MOS value 4.5&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;• SWB: Maximum MOS value 4.75&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;So a score of 4.5, on the narrowband POLQA scale is experimentally the best value you will ever obtain with wideband telephony equipment. You could conceivably measure a MOS value of 4.75 if you were measuring super wideband equipment.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;In future years, the industry will migrate exclusively to using the super wideband POLQA scale as soon as users&#39; expectations always expect high-definition or hi-fi quality to the communications audio.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;The picture shows the iLBC codec measured measuring 4.21 narrowband focus scale. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCM0WoCoqYurwSb7Qn3LyFDwH1bSBvaPBTRYWp5du7K1BRSzY-Q6V0hOYNrEgKEpZQdoVwevfxH1W2VIR57bXuU5akMUmNskgsgm44o11q0F-BhC_Z-nEMLpEZp7vv3ixW5v48xpFlgR48/s1600/mos.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;142&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCM0WoCoqYurwSb7Qn3LyFDwH1bSBvaPBTRYWp5du7K1BRSzY-Q6V0hOYNrEgKEpZQdoVwevfxH1W2VIR57bXuU5akMUmNskgsgm44o11q0F-BhC_Z-nEMLpEZp7vv3ixW5v48xpFlgR48/s400/mos.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span xmlns=&quot;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;For more information on making PESQ and POLQA measurements, ensure you contact only renown and well-respected test vendors because the science of speech quality measurements requires expertise and experience in many different areas audio, analog electronics as well as computing. It is easy to make a measurement but care is required to ensure that measurement is accurate and correlates to human subjective experience&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span xmlns=&quot;&quot;&gt;The most trusted vendor for&lt;a href=&quot;http://www.teraquant.com/malden/&quot;&gt; speech quality metrics&lt;/a&gt; is Malden Electronics, available in USA through Teraquant Corporation – &lt;a href=&quot;http://www.teraquant.com/&quot;&gt;www.teraquant.com&lt;/a&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #fcffe8; color: #222222; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; line-height: 16px;&quot;&gt;See use in&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://technorati.com/&quot;&gt;http://technorati.com&lt;/a&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #fcffe8; color: #222222; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; line-height: 16px;&quot;&gt;- X84QTD2E9BS6&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/6949065611814087671/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/6949065611814087671'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/6949065611814087671'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/hd-mean-opinion-score-pesq-vs-polqa.html' title='MOS [Mean Opinion Score] for High Definition or Wideband Telephony'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCM0WoCoqYurwSb7Qn3LyFDwH1bSBvaPBTRYWp5du7K1BRSzY-Q6V0hOYNrEgKEpZQdoVwevfxH1W2VIR57bXuU5akMUmNskgsgm44o11q0F-BhC_Z-nEMLpEZp7vv3ixW5v48xpFlgR48/s72-c/mos.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-2065253737344597603</id><published>2011-10-25T10:11:00.000-07:00</published><updated>2011-12-11T14:41:19.651-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="high definition telephony"/><category scheme="http://www.blogger.com/atom/ns#" term="high quality analog"/><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="mos"/><category scheme="http://www.blogger.com/atom/ns#" term="pesq"/><category scheme="http://www.blogger.com/atom/ns#" term="polqa"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="quality measurement"/><category scheme="http://www.blogger.com/atom/ns#" term="speech quality"/><title type='text'>Can You Hear Me Now?</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;PolQA is the new ITU-T Standard for Speech Quality Measurement which embraces Wideband or High Definition Telephony.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;“Can you hear me now?”&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
We’ve all heard the refrain. How often have you been on a mobile phone &amp;amp; not been able to hear your calling party? How often have you experienced drop-outs on a VoIP call and missed that vital clue, that&#39;s important piece of information the caller mentioned which allowed you to understand their needs. May be you lost the business as a result. Good clear speech quality means productivity, both in business and in personal life. Everyone is critically busy these days and if you have to ask folks to repeat themselves, you waste time, first-rate meaningful conversation and miss information.&lt;br /&gt;
&lt;br /&gt;
The existing telephony network uses 200-34000Hz analog bandwidth, digitized at a sampling rate of 8kbps. 8 bits of vertical resolution multiplied by 8kbps gives the traditional 64kbps bandwidth required for a voice channel. Compression by codecs such as G.729 and iLBC VoIP and specifically iSAC for Skype and GSM-FR &amp;amp; EVRC for wireless transmits narrowband traditional telephony at data rates as low as 4kbps.&lt;br /&gt;
So now we can compress voice sports to very low bandwidths and at the same time we have broadband Internet. so what can we do to improve speech quality.&lt;br /&gt;
&lt;br /&gt;
Wideband or High Definition Telephony technology is now appearing in VoIP networks and wireless networks using voice codecs such as G.722 and WB-AMR. This provides speech with an analog bandwidth up to 7kHz and gives a richer listening experience. Those problems you currently have trying to recognize which of your young nieces or nephews is speaking to you is due to high frequencies filtered out with narrowband telephony. Wideband telephony will reinstate these, enriching your telephone conversation experience and improving productivity through speech clarity. This technology will eventually send telephony speech all the way up to 20 kHz, the limit of human hearing, equivalent to hi-fi music systems.&lt;br /&gt;
&lt;br /&gt;
3gpp release 5 introduces AMR-WB codec which gives enhanced speech quality using data rates of only 16kbps. So wideband telephony or high definition telephony is being made available to wireless cellular networks.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Tools to Automatically Measure Speech Quality&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Determining the subjective speech quality of a transmission system has always been an expensive and laborious process. The tool described in ITU-T Rec. P.862 Perceptual Evaluation of Speech Quality – PESQ provides a rapid and repeatable result in a few moments. PESQ is an objective measurement tool i.e. a computer measures the quality of the received audio in relation to the audio that was transmitted. PESQ predicts or has a very accurate close correlation to the results of subjective listening tests [i.e. human beings listening to speech files] On telephony systems. The resulting quality score is analogous to the subjective “Mean Opinion Score” (MOS) measured using panel tests according to ITU-T P.800. Strictly speaking, MOS is a score derived from human subjective testing. The PESQ scores are calibrated using a large database of subjective tests.&lt;br /&gt;
&lt;br /&gt;
The ITU-T selection process that resulted in the standardization of PESQ involved a wide range of conditions, with demanding correlation requirements set to ensure that it has good performance in assessing conventional fixed and mobile networks and packet-based transmission systems.&lt;br /&gt;
&lt;br /&gt;
Since ITU-T Rec. P.862 was originally released in 2000, further mappings of the PESQ score have been created. PESQ-LQ modified the score to improve correlation with subjective test results at the high and low ends of the scale where the raw PESQ score was found to be less accurate. A new mapping described in ITU-T Rec. P.862.1 was been released that further modified the raw score and correlated better to subjective testing.&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF44vbJzPVrhWyadWHczxqlE63UiG3NTQvVYKHw5ix5P9T0GGoEhvKIwZ6F7dWa21gLChQ0p4-YV7LR1jDAs46FuL8r8nN_MODeuy5lp58W15D93Irux2mohwcwy1m-tBnCuOwq0H2pJ4s/s1600/pesq-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF44vbJzPVrhWyadWHczxqlE63UiG3NTQvVYKHw5ix5P9T0GGoEhvKIwZ6F7dWa21gLChQ0p4-YV7LR1jDAs46FuL8r8nN_MODeuy5lp58W15D93Irux2mohwcwy1m-tBnCuOwq0H2pJ4s/s400/pesq-1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;PESQ Shortcomings - Time Warping&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
PESQ takes into account coding distortions, errors, packet loss, delay and variable delay, and filtering in analogue network components. The user interfaces have been designed to provide a simple access to this powerful algorithm, either directly from the analogue connection or from speech files recorded elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcQMQoKLXz59pUIPaPlPsl2t8FwMqxtThFW6LfLbPZUTm9ujRNRclKFuvOYVXRpIMmmmYyYyI264eH01BqCuCQQ382TCe9cV7U_DubgRrht0bt05LVaV67cl9uoL0MKs78sb0PoRWhXVmL/s1600/pesq-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcQMQoKLXz59pUIPaPlPsl2t8FwMqxtThFW6LfLbPZUTm9ujRNRclKFuvOYVXRpIMmmmYyYyI264eH01BqCuCQQ382TCe9cV7U_DubgRrht0bt05LVaV67cl9uoL0MKs78sb0PoRWhXVmL/s400/pesq-2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;b&gt;PESQ Shortcomings&lt;br /&gt;
Noise Reduction: &amp;nbsp;(Subjective&amp;nbsp; &amp;gt;&amp;nbsp; PESQ)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;The performance of a network or a network element can be fully characterized using high quality analog test equipment and PESQ. High quality analog interfaces are needed because the test equipment itself very easily introduces impairments which are included in the measurement and drank the desk score lower than should be measured for the system under test or network element. Whilst it is possible to use phonetically balanced sentences and other test patterns, accurate and repeatable measurements of the active speech level, activity, delay, echo, noise and speech quality can be obtained quickly using artificial speech test stimulus in different languages, which comprehensively tests all voice sounds the codec may be incident with, but at the same time achieves the process quickly in a time efficient way. A graphical mapping of the errors provides a useful insight into how the signal has been degraded and exactly what kind of sounds course the codec core system and test problems.&lt;br /&gt;
&lt;br /&gt;
Since the launch of PESQ in 2000, there have been many advances in codec design. Unfortunately, PESQ was not trained on these later designs and can produce scores that are lower than expected from subjective tests. Time-warping and voice quality enhancement techniques are particularly difficult for PESQ. The ITU agreed on a new standard, P.863 POLQA, in 2010. POLQA addresses many of the issues and produces reliable scores for codecs, both old and new. POLQA is Now available on a couple of speech quality measurement platforms but &lt;a href=&quot;http://www.teraquant.com/malden/&quot;&gt;Malden&lt;/a&gt; is the only platform that provides a quiet, &lt;a href=&quot;http://www.teraquant.com/malden/&quot;&gt;high-quality analog front-end&lt;/a&gt; and the only platform to be recommended.</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/2065253737344597603/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/can-you-hear-me-now.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2065253737344597603'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2065253737344597603'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/can-you-hear-me-now.html' title='Can You Hear Me Now?'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF44vbJzPVrhWyadWHczxqlE63UiG3NTQvVYKHw5ix5P9T0GGoEhvKIwZ6F7dWa21gLChQ0p4-YV7LR1jDAs46FuL8r8nN_MODeuy5lp58W15D93Irux2mohwcwy1m-tBnCuOwq0H2pJ4s/s72-c/pesq-1.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-2899252314427152582</id><published>2011-10-21T14:28:00.000-07:00</published><updated>2011-12-11T14:39:42.146-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud based VoIP troubleshooting"/><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="reduce customer churn"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP toubleshooting on demand"/><category scheme="http://www.blogger.com/atom/ns#" term="wireshark"/><title type='text'>Network Monitoring - It&#39;s Your Livelihood</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;What are your daily duties as the VoIP network operations director? You have to keep your network up and running. You have to answer calls which may relate to situations like “X location is down” or “Y location is slow”. &amp;nbsp;My we suggest that you proactively monitor your network as described below and perform tasks like:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaZN_wcsxgJ_POEKXGSNdKmBFRLuE3Hz2AAnWoHEpgDFV6j0AKnmyz0OXsaCCj3zk5nFuQFcBdjPUHVYr3e0hW_wL-7KzwkOIUaJ7VYhO2ds9-ICxPG0gyixejyIKHttxqW395k5VuF593/s1600/network-diagram-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;221&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaZN_wcsxgJ_POEKXGSNdKmBFRLuE3Hz2AAnWoHEpgDFV6j0AKnmyz0OXsaCCj3zk5nFuQFcBdjPUHVYr3e0hW_wL-7KzwkOIUaJ7VYhO2ds9-ICxPG0gyixejyIKHttxqW395k5VuF593/s320/network-diagram-2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ol&gt;&lt;li style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Monitor your network and take actions with respect to situations like device and line failures.&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px; line-height: 16px;&quot;&gt;Analyze line/physical facility&amp;nbsp;utilization, errors on the facility and be sure about network performance and conformance to SLAs.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Be aware of what &quot;talks to what&quot; and when? &amp;nbsp;Be sure how much bandwidth is needed for every single application riding your network (and the networks you traverse.)&lt;/li&gt;
&lt;li style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Know your exact data flows over your networks.&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;b&gt;If you have all this information at your disposal, people will think twice before they point finger at you.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;But how can you achieve this?&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;br /&gt;
You need a phased approach to understand network monitoring. I am not talking about network layers, but network monitoring layers. We have to involve deeply to monitoring layers before deciding about network monitoring software needs. A simple summary could include these:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;Preconditions of network monitoring.&lt;/span&gt;&lt;/li&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;
&lt;li&gt;Up/Down monitoring&lt;/li&gt;
&lt;li&gt;Performance Monitoring / SNMP monitoring&lt;/li&gt;
&lt;li&gt;Who talks with whom? / Netflow monitoring&lt;/li&gt;
&lt;li&gt;Data capture / Data sniffing&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;Preconditions of Network Monitoring&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Network documentation is essential to monitor a network. Trying to set up network monitoring tools before going through the documentation is a complete waste of time. You will see everything green on the screen, but this maybe due to one of the redundant lines that are down. You will sit staring without knowing what is happening. Always remember, documentation comes first and everything follows.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Suggested Network documentation tools: Powerpoint/Visio, NetViz&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;Up/Down monitoring&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Design a map in which you can see some red and green lights glowing. Green means up and red means down. It is simple yet powerful. You will immediately come to know that there is some problem if the red light glows.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;This is based on ping. Almost every IP devices support echo/echo reply. So, you can monitor all IP devices in your network by using ping. &amp;nbsp;Go one step further by monitoring one application at a time present on a device instead of whole device. All network applications utilize TCP/UDP ports. You can monitor the applications by trying to access with telnet to its TCP/UDP ports. The port being open suggests that the application is running&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Suggested monitoring tools: WhatsupGold, nmap&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;Performance monitoring / SNMP monitoring&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;The lines are up, the devices are up, but life is not perfect. People may complain about the performance of data lines, but are they saturated or do they have plenty of spare bandwidth? &amp;nbsp;Is there packet loss on the lines? Are routers running out of memory? We need SNMP to monitor the heart beat of the network.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Suggested monitoring tools: MRTG, Solarwinds Orion, PRTG&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;What is &quot;talking&quot; with what? / Netflow monitoring&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;You may realize that the line is full, but is someone or some applications increasing traffic load enormously. Who are they? Is it necessary traffic? In some devices, by using “ip accounting” command you can get an idea of current traffic sources and destinations. Nevertheless, to analyze and to optimize the traffic we need flow monitoring. We need to know source and destination IP addresses and TCP/UDP ports and number of packages/bytes.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Everyone blames the network speed until you publish an network usage report that clearly shows only 15% of the traffic is ERP traffic and rest comes from Internet access.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;You should know that flow monitoring tools requires more server resources, since they collect enormous amount of data.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Suggested monitoring tools: Fluke Netflow monitor, Paasler&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;strong&gt;Data capture / RMON – Sniffer tools&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;Sometimes you need to observe the exact data flow on the line and not just information about it. Just have a look at this sample scenario. After you find out that the web service causes inappropriately high network traffic, the owner of the application just can say “No, we are not pushing this much of data to network. We just respond Yes or No in this web service and it is just 100 bytes”. Therefore, you should sniff the data flow on the line. Maybe, you will find that web service responds yes or no (100 bytes) and with the definition of web service (6 kilobytes).&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;Suggested monitoring tools&lt;/a&gt;: Wireshark, &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;Palladion&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;You can have a look at&amp;nbsp;&lt;a href=&quot;http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html&quot; style=&quot;color: #af1e2d; font-weight: bold;&quot;&gt;Network Monitoring Tools&lt;/a&gt;&amp;nbsp;in Stanford University web site for a superb list of network monitoring tools. You can find another tidy list at&amp;nbsp;&lt;a href=&quot;http://www.topology.org/comms/netmon.html&quot; style=&quot;color: #af1e2d; font-weight: bold;&quot;&gt;Network Traffic Monitoring&amp;nbsp;&lt;/a&gt;in Alan Kennington’s topology.org.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #666666; font-family: Verdana, Helvetica, serif; font-size: 12px; line-height: 16px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/2899252314427152582/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/network-monitoring-its-your-livelihood.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2899252314427152582'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2899252314427152582'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/network-monitoring-its-your-livelihood.html' title='Network Monitoring - It&#39;s Your Livelihood'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaZN_wcsxgJ_POEKXGSNdKmBFRLuE3Hz2AAnWoHEpgDFV6j0AKnmyz0OXsaCCj3zk5nFuQFcBdjPUHVYr3e0hW_wL-7KzwkOIUaJ7VYhO2ds9-ICxPG0gyixejyIKHttxqW395k5VuF593/s72-c/network-diagram-2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-2099146416302017273</id><published>2011-10-17T19:20:00.001-07:00</published><updated>2011-12-11T14:38:16.084-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="call"/><category scheme="http://www.blogger.com/atom/ns#" term="international carrier"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="ip pbx"/><category scheme="http://www.blogger.com/atom/ns#" term="itsp"/><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="password pbx"/><category scheme="http://www.blogger.com/atom/ns#" term="pbx calls"/><category scheme="http://www.blogger.com/atom/ns#" term="pbx hack"/><category scheme="http://www.blogger.com/atom/ns#" term="plug internet"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><title type='text'>IP PBX Toll Fraud - Everyone Is At Risk</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;It seems no one is safe. Every IP Telephony Service Provider [ITSP] I have talked to has suffered an IP PBX hack. End Users of VoIP phones most commonly do not remember or know how to change the password on their PBX or voicemail account. Default passwords for a PBX are usually the last four digits of the phone extension so hackers can easily cycle though to determine a weak or discoverable password. Once into the PBX, they can originate calls from anywhere on the Internet and pump traffic volume to numbers that will realize them fraudulent revenues &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Voicemail can be configured to dial out eg when you hear the greeting “please wait while we attempt to reach your party”, of course the voicemail system is making an outbound call which is setup by the hacker to redirect to their intended destination.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The fraudster can resell such phone capacity. One of the nice advantages of VoIP is its built in features for Moves, Adds and Changes. When the time comes to move office, you can just pack you VoIP phone and take it with you. Plug it into the internet or your companies IP cloud and it will register with your IP PBX and you can make calls. If you travel, you can take your VoIP phone with you and plug it into the internet in your hotel room and makes calls as if from your desk. So The PBX has no concept of your physical location or who is using the phone and so fraudsters, once they hack your PBX can make calls from anywhere, using your account.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The Telecommunications industry has annual revenues of $2.1 Trillion. Telecom fraud is calculated to cost the telecom industry $40 Billion each year.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The calls come out of your IP PBX, to your ITSP, offering a SIP Trunking service (i.e. a service that routes calls from a VoIP environment to the PSTN and therefore to any expensive international destination offered. So your ITSP receives an invoice from the International carrier for all these international calls. Fraudsters often choose weekends or other times outside business hours to attack. This way, the attack goes unnoticed and the account is beaten to death whilst no one notices or cuts it off.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;“How to lose your year’s profits in 15 minutes!” was the way one of our customers described Toll Fraud. The ITSP receives this rather large bill from the international carrier. If he demands payment from the enterprise which has allowed their IP PBX to be hacked, he will surely loose a customer. Small companies who typically have small telecom bills can afford suddenly to pay up for a $20,000 to $30,000 bill. Many events run into the hundreds of thousands.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Although the ITSP caught in the middle may be to share some of the costs with their customer and the international or long distance carrier, they cannot afford to lose customers and will not often impose the charges on their client. So this is a loss the ITSP usually has to take on the chin.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;How can we detect it in real-time and turn it off in real-time to prevent the cost leakage? &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;Advanced monitoring systems&lt;/a&gt; are now available which will not only detect the fraud attack in real-time but will also turn if off.&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=124133521939044276&amp;amp;postID=2099146416302017273&quot; name=&quot;_GoBack&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/2099146416302017273/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/ip-pbx-toll-fraud-everyone-is-at-risk.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2099146416302017273'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/2099146416302017273'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/ip-pbx-toll-fraud-everyone-is-at-risk.html' title='IP PBX Toll Fraud - Everyone Is At Risk'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-1367298234252471357</id><published>2011-10-13T16:21:00.000-07:00</published><updated>2011-12-11T14:37:15.804-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="wireshark"/><title type='text'>11 Million Euro Loss - 1 Million in Profits - VoIP Fraud</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: black; font-family: &#39;Trebuchet MS&#39;, Trebuchet, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3 class=&quot;post-title entry-title&quot; style=&quot;font-size: 18px; line-height: 1.4em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0.25em; padding-bottom: 4px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/h3&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot; style=&quot;margin-bottom: 0.75em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;b style=&quot;line-height: 1.6em;&quot;&gt;Recent &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;Voice over IP fraud&lt;/a&gt; attackers made over 1 million Euro in profits.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.6em;&quot;&gt;It seems that they simply were scanning for PBX servers with phone extensions that have weak passwords. Then they abused these accounts to make phone calls for &quot;free&quot;, except that free has the price of 11 million EUR for the service provider victims!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.6em;&quot;&gt;Apparently, originally they used these accounts for their own personal phone calls. However they got greedy and between October 2009 to February 2010, they made 23500 calls / 315000 minutes to premium numbers. Then (from what I understood), they got even more greedy and used a Shadow Communication Company and&amp;nbsp;prices for premium numbers that then linked to another site further&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 25px;&quot;&gt;obfuscating&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.6em;&quot;&gt;&amp;nbsp;their &quot;business.&quot; Using this scheme they recruited other people to make&amp;nbsp; 1,541,187 fraudulent calls or 11,094,167 minutes of talk time.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; line-height: 1.6em; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 20px;&quot;&gt;They used other premium numbers affiliate networks at first and then, when they realized the potential, they set up a company in the UK - Shadow Communications Inc. - through which they were able to sign a&amp;nbsp; contract on their own with a premium rate number provider and offer their own affiliates service, basically taking their &quot;business&quot; to a whole new level.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 25px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.6em;&quot;&gt;One of the original articles on this can be found&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.adevarul.ro/locale/bucuresti/40_de_tineri_au_facut_11_milioane_de_euro_prin_telefonie_prin_internet_0_389961122.html&quot; style=&quot;line-height: 1.6em; text-decoration: none;&quot;&gt;here&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.6em;&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot; style=&quot;margin-bottom: 0.75em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.6em;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/1367298234252471357/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/11-million-euro-loss-1-million-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/1367298234252471357'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/1367298234252471357'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/11-million-euro-loss-1-million-in.html' title='11 Million Euro Loss - 1 Million in Profits - VoIP Fraud'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-5883265548393934354</id><published>2011-10-09T16:12:00.000-07:00</published><updated>2011-12-11T14:35:49.480-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="wireshark"/><title type='text'>Storming SIP - VoIP Systems Are The New Target</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black; font-size: 12.5pt;&quot;&gt;You Will Be Attacked - Reduce Exposure&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px;&quot;&gt;When implementing a VoIP infrastructure or any kind of net­work technology, it is best to reduce the exposure to attack. The fact that the VoIP infrastructure is typically sitting next to other network entities makes the SIP network elements reachable and possibly vulnerable to an attack coming from the other network serv­ers. The number of VoIP phones and PBXs on the Internet is constantly growing, and if the infrastructure does not require exposure to the Internet, then avoid it. To help you separate the VoIP network from the rest, various network switch vendors allow you to set up a VLAN specifically for VoIP. However, be aware that VLANs are not a panacea, and tools like VoIPhop­per make it easy to demonstrate the fact that VLAN is not enough. Cisco published a white paper called &lt;i&gt;VLAN Security&lt;/i&gt;, where they describe how to protect against a number of attacks aimed at VLAN technology. Segregat­ing the VoIP network can also be done through the use of firewalls or physical separation. VPN tunneling has also been previously suggested because it provides both encryption and can also be used to separate the VoIP traffic from the normal traffic.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;Pa4&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Pa5&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;However, these solutions might not always be feasible – especially since one major advantage of VoIP is that it integrates with other network elements on the Internet. In fact, various VoIP vendors market the fact that you can use your existing network infrastruc­ture without having to lay new cables. Whether or not this is a good idea depends on a large number of factors. When designing a VoIP infrastructure, it is therefore important to understand the requirements and mitigate depending on the case. For example, a hotel VoIP network will have different require­ments than a corporate IP phone net­work, and therefore a systems designer can apply different security precautions during the planning stage. Some other suggestions and observations: &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa6&quot; style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 14.0pt; margin-right: 0in; margin-top: 9.0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;• It is of course good to make use of encryption mechanisms such as TLS and SRTP. Unfortunately, the encryption for SIP and RTP is not yet widely supported. Zfone by the creator of PGP is particularly interesting. We shall not be going through this subject in depth since it is not within the scope of the attacks described within this article, but it definitely deserves a mention. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa7&quot; style=&quot;margin-left: 14.0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;• The importance of good pass­words for IP Phones should not be underestimated. If the system does not require that end users set their own pass­word, then do not allow this functionality. Instead, make use of some kind of password man­agement and set their password to one that is unique and hard to guess. Applications such as KeePass, which is open-source and free, allow you to generate strong random passwords for you, as well as manage such passwords in a relatively secure manner. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa7&quot; style=&quot;margin-left: 14.0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;• OpenSER, which is an open-source SIP server, has a module named &lt;i&gt;pike&lt;/i&gt;. This module is able to block requests that exceed a given limit. This can allow for blocking of both extension guessing and password cracking. However one has to be cautious with such solutions. Attackers can make use of IP spoofing to intentionally block legitimate traf­fic. It might also unintentionally block legitimate traffic if its not properly conFigured. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa7&quot; style=&quot;margin-left: 14.0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;• SIP allows extension lines which do not require authentica­tion. If there is no justification for unauthenticated extensions, then make sure NOT to use this feature. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa7&quot; style=&quot;margin-left: 14.0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;• Hardphones will get security fixes in the form of a firmware update, while softphones will get a new software release. Keeping up to date with the latest versions can be a pain, but it is certainly one way of making sure your system does not fall victim to attackers exploiting a security vulnerability in your SIP phone.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Pa19&quot; style=&quot;margin-top: 5.0pt;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black; font-size: 12.5pt;&quot;&gt;You Are Under Attack &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: black; font-size: 12.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa4&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;Detection is a very important step in a security solution. A network IDS such as Snort, when placed at the right location, can be of great help when trying to detect that an attack is underway. Snocer, which describes themselves as providing &lt;i&gt;Low Cost Tools for Secure and Highly Available VoIP Communication Services&lt;/i&gt;, has previously published some Snort rules for public consumption. These rules are also available in the latest Snort community rules. In this section we will describe some of them and explain how they can be effective in catching the attacks mentioned previously. We will also provide some new Snort rules which can also detect activity de­scribed in this article and not caught by the current Snort community rules. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;The Snort rules by Snocer are quite easy to understand, and are able to provide generic detection. Each of the rules looks out for an excessive number of SIP messages coming from a single IP address over a short period of time. The different SIP messages are &lt;/span&gt;&lt;span class=&quot;A9&quot;&gt;&lt;span style=&quot;font-size: 7pt;&quot;&gt;INVITE &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;and &lt;/span&gt;&lt;span class=&quot;A9&quot;&gt;&lt;span style=&quot;font-size: 7pt;&quot;&gt;REGISTER &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;requests, and &lt;i&gt;401 Unauthorized &lt;/i&gt;mes­sages.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa5&quot; style=&quot;text-align: justify; text-indent: 14.0pt;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Pa5&quot; style=&quot;text-align: justify; text-indent: 14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;The &lt;/span&gt;&lt;span class=&quot;A9&quot;&gt;&lt;span style=&quot;font-size: 7pt;&quot;&gt;INVITE &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;and &lt;/span&gt;&lt;span class=&quot;A9&quot;&gt;&lt;span style=&quot;font-size: 7pt;&quot;&gt;REGISTER &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;flood attacks catch svwar and svcrack be­ing run with default options against a SIP proxy. To be able to catch a default svmap scan, we need to be looking out for SIP messages with an OPTIONS request, spanned over different hosts in a short time. Listing 20 shows one such rule that triggers an alert if the rule is infringed 30 times in 3 seconds. One should probably adjust this rule depending on the ad­dress space being watched by Snort. If Snort is watching a /29 mask, i.e. only 6 hosts, then one should change the count to 6 and number of seconds to 1 or less. On larger networks, in­crease the count number to decrease the chance of a false positive. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa5&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;The rule on &lt;i&gt;excessive number of SIP 4xx Responses &lt;/i&gt;attempts to catch the majority of attacks outlined in this article. What it effectively does is match responses which contain a client error. This may be a 404 not found response like the one given by an Asterisk box when running svwar to identify SIP extensions or users. It will also match a password crack­ing attempt on an Axon PBX, or an extension enumerating attack on&lt;/span&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;a Brekeke PBX when using svwar with the &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;A9&quot;&gt;&lt;span style=&quot;font-size: 7pt;&quot;&gt;OPTIONS &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;method. Of course, it will not catch a network scan for SIP devices on one which does not have a lot of devices, simply because the number of responses would be low. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa5&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;The &lt;i&gt;ghost phone call &lt;/i&gt;can also be easily detected since it generates a large number of ringing messages. Of course a payload of this attack is audible, and therefore the benefits of adding this rule might not be immedi­ately apparent since it makes itself so obvious. However, a Snort rule at this stage might be very useful during in­cident response, when trying to deter­mine things such as the source of the attack. The rule should be modified depending on the network. For exam­ple, it does not make sense to deploy this Snort rule on a calling center that takes 50 calls every minute. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa5&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: black; font-size: 9pt;&quot;&gt;Snort is not the only tool to monitor your VoIP infrastructure for attacks. In fact, Snort would very likely NOT detect any attacks passing through encrypted traffic. On the other hand, monitoring the logs on your IP PBX might be a good way of detecting some attacks destined to the SIP gateway. J. Oquendo posted a BASH script called astrap which monitors the Asterisk log entries for exces­sive number of failed authentication attempts. This small tool will list the offender&#39;s IP address, the number of password failures, and the extensions that were targeted on the Asterisk. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot;&gt;&lt;span style=&quot;font-size: 9pt;&quot;&gt;A&lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt; host intrusion detection system&lt;/a&gt; such as OSSEC can be equally useful in detecting and automatically mitigat­ing attacks. At the time of writing, OS­SEC does not come preconFigured to support Asterisk log files, but this functionality can be easily added. Listing 21 includes a sample rule file for OSSEC to show how it can be conFigured to detect username enu­meration and password attacks on an Asterisk system such as Trixbox. List­ing 22 shows the changes required to enable this new Asterisk rule. We in­clude a decoder entry so that OSSEC will be able to extract the attacker&#39;s IP address and then use that to au­tomatically block the attack by adding the appropriate firewall rule.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Pa2&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black; font-size: 11.5pt;&quot;&gt;References &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: black; font-size: 11.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa11&quot; style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 14.0pt; margin-right: 0in; margin-top: 9.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.ietf.org/rfc/rfc3261.txt &lt;/i&gt;– RFC 3261 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.iptel.org/sip/intro/purpose &lt;/i&gt;– Purpose of SIP &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.wormulon.net/ &lt;/i&gt;– smap &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://sipvicious.org/ &lt;/i&gt;– SIPVicious tool suite &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://tinyurl.com/rtjl8 &lt;/i&gt;– SIP peers external authentication in Asterisk/OpenPBX &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.hackingvoip.com/ &lt;/i&gt;– SIPSCAN &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.oxid.it &lt;/i&gt;– Cain and Abel &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://tinyurl.com/yph6jy &lt;/i&gt;– Interview with Robert Moore &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://tinyurl.com/56bwd &lt;/i&gt;– VLAN Security White Paper &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.snocer.org/Paper/sip-rules.zip &lt;/i&gt;– Snocer, snort rules &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.infiltrated.net/scripts/astrap &lt;/i&gt;– astrap &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Pa12&quot; style=&quot;margin-left: 14.0pt; text-align: justify; text-indent: -14.0pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.ossec.org/ &lt;/i&gt;– OSSEC &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;• &lt;i&gt;http://www.trixbox.org/ &lt;/i&gt;– Trixbox&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot;&gt;&lt;span style=&quot;font-size: 8pt;&quot;&gt;Hat Tip -&amp;nbsp;Sandro Gauci&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/5883265548393934354/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/storming-sip-voip-systems-are-new.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5883265548393934354'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/5883265548393934354'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/storming-sip-voip-systems-are-new.html' title='Storming SIP - VoIP Systems Are The New Target'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-6337475513101262384</id><published>2011-10-05T20:47:00.000-07:00</published><updated>2011-12-11T14:34:11.745-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="wireshark"/><title type='text'>SIP Peering KPI’s - How to Measure Answer Seize Ratio</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5urDtoiyf-lKFWXURYFZNI8pI-raCxzloMCUk0aCLQ6G_e2JSaUb-rwErhCQSHXqFmpKlty_6YiSYG70yD-8SVm4XwOfbuTELGQlem67BAYzcRsJYX7LnFjOI6Hf7BAorhKGT5TKRXQtS/s1600/net_pic.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5urDtoiyf-lKFWXURYFZNI8pI-raCxzloMCUk0aCLQ6G_e2JSaUb-rwErhCQSHXqFmpKlty_6YiSYG70yD-8SVm4XwOfbuTELGQlem67BAYzcRsJYX7LnFjOI6Hf7BAorhKGT5TKRXQtS/s320/net_pic.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Service providers have for many&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;decades measured key performance indicators for their SS7 interconnects with long-distance or international operators or peering partners. Such measurements are defined in ITU-T Recommendation E.411 &quot;International Network Management – Operational Guidance&quot; and E.422 &quot;Quality of Service for Outgoing International Calls&quot; and include Answer Seize Ratio [ASR], Post Dial Delay [PDD] and Network Efficiency Ratio [NER].&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184;&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;   &lt;td style=&quot;background: silver; border: solid black 1.0pt; height: 5.75pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; valign=&quot;top&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Name&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;background: silver; border-left: none; border: solid black 1.0pt; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; valign=&quot;top&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Description&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 1;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Counted&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Number of   calls&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 2;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;ASR&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Answered   calls (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 3;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;SSB&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Subscriber   busy (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 4;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;CGC&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Circuit   Group Congestion (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 5;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;SEC&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Switching   Equipment Congestion (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 6;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;CFL&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Call   Failure (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 7;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;RSC&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Reset   Circuit Signal (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 8;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;UNN&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Unallocated   Number (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 9;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;ADI&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Address   Incomplete (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 10;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;CLF&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Clear   Forward (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 11;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;LOS&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Line Out   of Service (percent)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 12;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;rt&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Response   time (average)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 13;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;wt&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Wait time   with answer (average)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 14;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;wna&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Wait time   with no answer (average)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 15;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;ct&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Call time   (average)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 16;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;ht&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Hold time   (average)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;height: 5.75pt; mso-yfti-irow: 17; mso-yfti-lastrow: yes;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid black 1.0pt; height: 5.75pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 73.9pt;&quot; width=&quot;99&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Minutes&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: solid black 1.0pt; border-top: none; height: 5.75pt; mso-border-left-alt: solid black 1.0pt; mso-border-top-alt: solid black 1.0pt; padding: .6pt 1.9pt 0in 1.9pt; width: 261.0pt;&quot; width=&quot;348&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Total   Call time in minutes&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Table 1&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Answer Seize Ratio [ASR] is used as a measure of network quality although the measurement also includes user behavior. In other words, if the call was not answered, the network could not be faulted, although the ASR measurement would be reduced by the uncompleted call, indicating lower quality. However, because for a given hour within a day, unanswered calls would always represent the same percentage, from day-to-day, this offset would be normalized out and carriers are able to monitor the trend of ASR and treat it as a relative measurement&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Network Efficiency Ratio was &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;designed to eliminate user behavior as a factor and better represent pure network performance.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Network Efficiency Ratio [NER] is defined as:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;User &lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Answers or Normal call clearing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cause code: 16&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1.0in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;+ User Busy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cause code: 17&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1.0in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;+ Ring No Answer &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; -&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cause code: 18 &amp;amp; 19&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1.0in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;+ Terminal Rejects) &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cause code: 21&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 45.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;NER = -------------------------------------------------------x 100&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 45.8pt; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Total # of Call Attempts i.e. IAM’s)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;SIP is a more flexible protocol and has wider uses than simple call control. Therefore, use cases differ widely and systems such as voicemail and call forwarding skew expected behavior for answered calls&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Furthermore, SIP is a more flexible protocol and has wider &lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;range of response messages which can be used to specifically indicate certain types of failures from either servers, network devices or the movement or absence or other behavior of users. Accordingly, IETF has defined KPI&#39;s equivalent to Answer Seize Ratio and Network Efficiency Ratio. These are described under SIP End-to-End Performance Metrics &lt;i&gt;draft ietf-pmol-sip-perf-metrics-04&lt;/i&gt;. For example, the equivalent of ASR is Session Establishment Ratio (SER)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;Session Establishment Ratio (SER) is defined as follows, to quote the IETF&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp; “&lt;i&gt;This metric is used to detect the ability of a terminating UA or&lt;o:p&gt;&lt;/o:p&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp; downstream proxy to successfully establish sessions per new session&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp; INVITE requests.&amp;nbsp; SER is defined as the number of new session INVITE&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp; requests resulting in a 200 OK response, to the total number of&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp; attempted INVITE requests less INVITE requests resulting in a 3XX&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp; response.&amp;nbsp; This metric is similar to Answer Seizure Ratio (ASR)”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The SER is calculated using the following formula:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 45.8pt; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 45.8pt; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;# of INVITE Requests w/ associated 200 OK&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 45.8pt; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp; SER = --------------------------------------------------------- x 100&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 45.8pt; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt; (Total # of INVITE Requests)-(# of INVITE Requests w/ 3XX Response)&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Here is the message flow which defines the basic SER. if the session &lt;i&gt;INVITE&lt;/i&gt; request results in an interim response, such as a 302 Redirect response, this should be subtracted from the denominator.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UA1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UA2&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |INVITE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +-----------&amp;gt;|------------------&amp;gt;|&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 180|&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;lt;------------------|&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session Established&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200|&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +-----------&amp;gt;|&amp;lt;------------------|&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;In SS7, the fate of the call is determined by the RELEASE message which ends the call. The fate of a SIP call is determined by the Response to each Request for each transaction within the SIP call. For example as above, session establishment is determined by a successful outcome from the call session establishment phase&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The &lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;SIP Peering KPI’s &lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;RFC 6076 &lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;also defines Session Establishment Effectiveness Ratio (SEER)&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt; which is similar to Network Efficiency Ratio [NER] in the SS7 ISUP circuit switched world.&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;This metric is complimentary to SER, but excludes the effects of the terminating UAS or endpoint i.e. it excludes user behavior from the metric and therefore more closely reflects the performance of the network.&amp;nbsp; SEER is defined as the number of INVITE requests resulting in a 200 OK response and INVITE requests resulting in a 480, 486 (Busy Here i.e. that endpoint is busy), or 600 (Busy Everywhere; i.e. the interconnecting network is busy or congested or down) to the total number of INVITE attempts less the 3xx, interim responses.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;In order to simplify the formula, the following variable ‘a’ is used to summarize multiple SIP responses:&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp; a = 3XX, 401, 402, and 407&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The SEER is calculated using the following formula:&lt;/div&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;# of INVITE Requests w/ associated 200 OK, 480, 486, or 600&lt;/span&gt;&lt;br /&gt;
SEER   = --------------------------------------------------------     x 100&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt; (Total # of INVITE Requests)-(# of INVITE Requests w/ &#39;a&#39; Response)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;SIP response codes&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;2xx—Successful Responses&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/li&gt;
&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Eg 200 OK &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;4xx—Client Failure Responses &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/li&gt;
&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;401 Unauthorized (Used only by       registrars or &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/User_agent&quot; title=&quot;User agent&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;user       agents&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;.       Proxies should use proxy authorization 407)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;402 Payment Required (Reserved       for future use)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;480 Temporarily Unavailable&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;486 Busy Here&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;li class=&quot;MsoNormal&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;6xx—Global Failure Responses &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/li&gt;
&lt;ul type=&quot;circle&quot;&gt;&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;600 Busy Everywhere&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;603 ADD&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Another very useful measurement defined by the IETF here is Session Defects Ratio (SDR), also graphed by Palladion by checking a box. ‘503’ SIP Response messages commonly indicate a route to one of your peering partners is failing due to congestion of the Gateway or SoftSwitch.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Session Defects Ratio (SDR) is the percentage of call attempts receiving the following responses, in relation to total call attempts or INVITES:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;margin-bottom: 10.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;o&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;500 Server Internal Error&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-bottom: 10.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;o&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;503 Service Unavailable&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin-bottom: 10.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;o&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;504 Server Timeout&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The SDR is calculated using the following formula:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 1.0in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;# of INVITE Requests w/ associated 500, 503, or 504&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;SDR = ----------------------------------------------------- x 100&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Total # of INVITE Requests&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;In addition to this, some carriers like to plot Post Dial Delay, [PDD] and to generate an alert when this measurement exceeds a certain time threshold. PDD is defined as the time interval between transmission of the INVITE and reception of the ‘180 Ringing’ response message. The RFC prefers to define Successful Session Setup [SRD], the SIP equivalent of Post-Selection Delay (defined in E.721). This is an early indication of congestion soon to or about to occur on a given route and is a very useful KPI. Palladion can be configured to provide an SNMP trap or other notification to the Network Operations Center [NOC] of this imminent congestion so preemptive action can be taken.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Here is a table listing all the new RFC 6076 KPI’s with their SS7 or circuit switched equivalent:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoTableGrid&quot; style=&quot;border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-yfti-tbllook: 1184; width: 100.0%;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;SIP Peering KPI’s&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;RFC 6076&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;SIP Definition&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;ISUP Equivalent&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;ISUP Definition&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Registration Request Delay (RRD)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Time of final response – time of REG attempt&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;N/A&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Note *&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Ineffective Registration Attempts&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;# IRA/total REG attempts&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;N/A&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Session Request Delay (SRD)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Time of response – Time of INVITE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Successful   Session Setup [SRD]&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Time of response – Time of INVITE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eg&amp;nbsp; INVITE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 180&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Post-Selection Delay (defined in E.721)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;IAM to ACM (or ALERTING)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Failed   Session Setup&amp;nbsp; [SRD] and&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;INVITE to response indicating failure eg 4XX   (excluding 401, 402, and 407 non-failure challenge response codes), 5XX, or   6XX message.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;N/A&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;IAM to REL with a cause code indicating a   failure&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Successful Session Disconnect Delay [SDD]&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;BYE, to 2XX Ack&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Time to Clear a good Call or CIC&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;REL to RLC&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Failed Session Disconnect Delay [SDD]&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;BYE, to Timer F Expires&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;essage&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Missing RLC i.e. expiry of ISUP T1 timer&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Session Duration Time [SDT]&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Time of BYE or time out – Time of 200 OK&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Time of REL - Time of ANS &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Average Call Hold Time (ACHT)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Successful   Session Duration Time&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;200 OK response to an INVITE to BYE&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;See note below *&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Failed   session duration SDT&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;200 OK response to an INVITE, and the   resulting Timer F expiration.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;“awaiting Answer timer”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;SS7 ISUP timer T9 (no response to ACM)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Session Establishment [SER ] Ratio&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;&amp;nbsp;   # of “good call” INVITEs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;---------------------------------- X   %&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Total INVITEs – interim 3xx   Responses&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div style=&quot;border-bottom: solid windowtext 1.0pt; border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-element: para-border-div; padding: 0in 0in 1.0pt 0in;&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0in 0in 1.0pt 0in; padding: 0in;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Calls   which connect&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Calls which fail&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Answer Seize Ratio (ASR)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Session Establishment Effectiveness Ratio   (SEER)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;(# of INVITE Requests w/ associated   200 OK, 480, 486, or 600)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;------------------------------ X %&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;(Total # of INVITE Requests)-(# of   INVITE Requests w/ &#39;a&#39; Response)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;NER = Answers (cc 16)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;+UserBusy-cc 17&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;+ Ring No Answer (cc 18, 19 &amp;amp; 21)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;+ Terminal Rejects)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;_____________&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Total call attempts&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Network Efficiency Ratio (NER) &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;ITU E.411.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Ineffective Session Attempts (ISA)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;pre style=&quot;page-break-before: always;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Invites resulting in:-&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/pre&gt;&lt;pre style=&quot;page-break-before: always;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;o&amp;nbsp; 408 Request Timeout&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/pre&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;o&amp;nbsp;   500 Server Internal Error&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;o&amp;nbsp;   503 Service Unavailable&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;o&amp;nbsp;   504 Server Timeout&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;# of ISA x 100&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;-----------------------------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total # of Session Requests&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 3.85pt; page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;pre style=&quot;page-break-before: always;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Ineffective Machine Attempts (IMA) in telephony&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/pre&gt;&lt;pre style=&quot;page-break-before: always;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;&amp;nbsp;&amp;nbsp; applications of SIP, and was adopted from Telcordia GR-512-CORE&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/pre&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp; [&lt;/span&gt;&lt;span style=&quot;font-family: Calibri, sans-serif;&quot;&gt;&lt;a href=&quot;http://tools.ietf.org/html/draft-ietf-pmol-sip-perf-metrics-04#ref-GR-512&quot; title=&quot;&amp;quot;LSSGR: Reliability, &amp;lt;a href=&amp;quot;#section-12&amp;quot;&amp;gt;Section 12&amp;lt;/a&amp;gt;&amp;quot;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;GR-512&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;].&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.06%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Session Completion Ratio (SCR)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;(a Session Completion is any SIP dialog that   receives a valid response)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 37.4%;&quot; valign=&quot;top&quot; width=&quot;37%&quot;&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;# of Successfully Completed Sessions   x 100&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;------------------------------------------&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Total # of Session Requests&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;page-break-before: always; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 23.72%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;Call Completion Ratio (CCR)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 15.82%;&quot; valign=&quot;top&quot; width=&quot;15%&quot;&gt;&lt;pre style=&quot;page-break-before: always;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Notes:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;line-height: 115%; margin-bottom: 10.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;* &lt;i&gt;REGISTRATION&lt;/i&gt;s are rare across SIP peering points as these interconnects are typically between two trusted environments. In addition SBC’s are used to protect the sanctity of each network. Similarly an interconnect between two SS7 networks is a trusted and secure interface, so accordingly, no equivalent of &lt;i&gt;REGISTRATION&lt;/i&gt;s exists in SS7, although the MTP3 protocol is used to establish routing between Signaling Point Codes and ISUP control messages to set up voice trunks &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;line-height: 115%; margin-bottom: 10.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;** &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;Monitoring for short duration&lt;/a&gt; Successful calls in a circuit switched network has not been as important and for a VoIP network as speech quality is not so much of an issue in circuit switched networks. In a VoIP network, short calls are important to monitor because if speech quality is so bad, the callers hang up immediately and call back, ….hopefully.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=124133521939044276&amp;amp;postID=6337475513101262384&amp;amp;from=pencil&quot; name=&quot;_GoBack&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;References&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l1 level1 lfo2; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Basic Telephony SIP End-to-End Performance Metrics Request for Comments: 6076&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo2; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;ITU-T Recommendation E.411 : International network management - Operational guidance&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo2; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;ITU-T Recommendation E.422 : Observations on international outgoing telephone calls for quality of service&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l1 level1 lfo2; text-indent: -.25in;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Telcordia GR-512-CORE&amp;nbsp; - LSSGR: Reliability, Section 12&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul type=&quot;circle&quot;&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;/ul&gt;&lt;ul type=&quot;circle&quot;&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;v:shape alt=&quot;Description: Narrow horizontal&quot; fillcolor=&quot;#e6eed5 [822]&quot; id=&quot;Text_x0020_Box_x0020_2&quot; o:allowincell=&quot;f&quot; o:gfxdata=&quot;UEsDBBQABgAIAAAAIQC2gziS/gAAAOEBAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbJSRQU7DMBBF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&quot; o:spid=&quot;_x0000_s1026&quot; strokecolor=&quot;#622423 [1605]&quot; stroked=&quot;f&quot; strokeweight=&quot;6pt&quot; style=&quot;height: 234.4pt; margin-left: 100.4pt; margin-top: 88pt; mso-position-horizontal-relative: page; mso-position-vertical-relative: page; position: absolute; visibility: visible; width: 449.55pt; z-index: 1;&quot; type=&quot;#_x0000_t202&quot;&gt;&lt;v:fill o:title=&quot;&quot; src=&quot;file:///C:\DOCUME~1\Eldo\LOCALS~1\Temp\msohtmlclip1\01\clip_image002.gif&quot; type=&quot;pattern&quot;&gt;&lt;v:stroke linestyle=&quot;thickThin&quot;&gt;&lt;v:textbox inset=&quot;18pt,18pt,18pt,18pt&quot;&gt;&lt;/v:textbox&gt;&lt;/v:stroke&gt;&lt;/v:fill&gt;&lt;/v:shape&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/6337475513101262384/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/sip-peering-kpis-how-to-measure-answer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/6337475513101262384'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/6337475513101262384'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/sip-peering-kpis-how-to-measure-answer.html' title='SIP Peering KPI’s - How to Measure Answer Seize Ratio'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5urDtoiyf-lKFWXURYFZNI8pI-raCxzloMCUk0aCLQ6G_e2JSaUb-rwErhCQSHXqFmpKlty_6YiSYG70yD-8SVm4XwOfbuTELGQlem67BAYzcRsJYX7LnFjOI6Hf7BAorhKGT5TKRXQtS/s72-c/net_pic.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-124133521939044276.post-798090012386127638</id><published>2011-10-01T13:57:00.000-07:00</published><updated>2011-12-11T14:30:55.209-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ladder diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="post dial delay"/><category scheme="http://www.blogger.com/atom/ns#" term="quality managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="VoIP network management"/><category scheme="http://www.blogger.com/atom/ns#" term="wireshark"/><title type='text'>Double Your Profits from VoIP Network Operations</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;To run large VoIP Ops, you need switches; routers; SBC’s and App Servers to switch or route calls, billing systems, of course – these are the basic building blocks. But why should we spend money on tools &amp;amp; monitoring systems when some&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;a href=&quot;http://www.webshark.org/&quot;&gt; tools are free&lt;/a&gt;&lt;/span&gt;? &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Assume for a minute, as a VoIP service provider you allocate expenses as follows:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;25% Admin &amp;amp; Regulation&lt;/li&gt;
&lt;li&gt;25% Sales &amp;amp; marketing&lt;/li&gt;
&lt;li&gt;25% Engineering expenses &amp;amp; 1 yrs. Depreciation of CAPEX&lt;/li&gt;
&lt;li&gt;25% cost of Network Operations&lt;/li&gt;
&lt;li&gt;Say for sake of argument your EBITDA is 10% of revenue&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;If you were to reduce cost of Network Operations by 37%, you would double your profits from &lt;a href=&quot;http://www.teraquant.com/iptego/&quot;&gt;VoIP Network Operations&lt;/a&gt;:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Cambria, serif; font-size: 14pt; line-height: 150%;&quot;&gt;37% x 25% = 9.25% x 100% of total costs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Cambria, serif; font-size: 14pt; line-height: 150%;&quot;&gt;37% of Net Ops is 9.25% of total costs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Cambria, serif; font-size: 14pt; line-height: 150%;&quot;&gt;9.25% + 10% (current EBITDA)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Cambria, serif; font-size: 14pt; line-height: 150%;&quot;&gt;You just ~ doubled your profits&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;As a VoIP Ops Director or Engineer, Which one of these is you?&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You wish you could clone yourself. There is enough work for two of you to do.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; text-indent: -.5in;&quot;&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You are constantly distracted with operational problems. You are not able to complete the many engineering projects you need to?&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You would like to double your company’s profits&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; you would like to solve problems in the network and make sure they never happen again&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; text-indent: -.5in;&quot;&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; you would like to solve your customer problems proactively, without them needing to call to complain&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in; text-indent: -.5in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If&amp;nbsp;you are using one of the following methods to troubleshoot VoIP Network problems:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; syslogs and on board server or switch diagnostics&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Wireshark&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Old legacy network monitoring systems&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A tool that only provides a Ladder Diagram&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Then you have the opportunity to automate Voice Network Operations, eliminating huge amounts of time and saving costs. Automation is key to maximizing profits from VoIP Net Ops. VoIP signaling is complicated and every equipment vendor implements differently. You need specialists to make it work but everyone has finite bandwidth. So give them the tools to succeed. Get VoIP Net Ops under control and their skills will go further. Streamline VoIP Net Ops and your bottom line will benefit. If there is a solution out there for the taking, then take it.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Some network operations teams have quantitatively measured the improvements and efficiencies that &lt;a href=&quot;http://www.teraquant.com/iptego/&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;VoIP Service Assurance&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt; &lt;/span&gt;has delivered to them. Do the calculation. Apply these cost improvements to your business. Those operations teams have:&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l0 level1 lfo3; text-indent: -.25in;&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Reduced operations support costs by 37%&lt;/li&gt;
&lt;li&gt;Reduced the number of Trouble Tickets by 60%&lt;/li&gt;
&lt;li&gt;Resolved Trouble Tickets in 14% of the time previously taken&lt;/li&gt;
&lt;li&gt;Empowered Tier 1 staff &amp;amp; CSR to solve issues independently, freeing up their time&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Apply these calculations to your VoIP Network Operation. You could at a minimum double your net profit&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;All you need is the visibility to immediately see:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;when a problem has occurred or is about to&lt;/li&gt;
&lt;li&gt;which of your customers are involved&lt;/li&gt;
&lt;li&gt;which parts of your network are affected (network devices; VoIP phones; trunks; SBC’s etc)&lt;/li&gt;
&lt;li&gt;the root cause&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If you can solve in 1-2 minutes what currently takes you 1-2 hours. If it currently takes you 60 minutes to find the bad call but you were to reduce that to 3 minutes, you are on the way to a competitive advantage from VoIP operations.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Root Cause Analysis is key to VoIP Net Ops efficiency. If your competitors solve 100 Trouble Tickets in 5 man x hrs. and you take 80 man x hrs., who will survive? You &lt;b&gt;or your competitor&lt;/b&gt;?&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If you can integrate the remedial action with your service infrastructure and OSS/BSS, then you can really move ahead of the pack.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://codec-translator.blogspot.com/feeds/798090012386127638/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://codec-translator.blogspot.com/2011/10/double-your-profiles-from-voip-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/798090012386127638'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/124133521939044276/posts/default/798090012386127638'/><link rel='alternate' type='text/html' href='http://codec-translator.blogspot.com/2011/10/double-your-profiles-from-voip-network.html' title='Double Your Profits from VoIP Network Operations'/><author><name>g.711.blogger</name><uri>http://www.blogger.com/profile/17851280263456734032</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikVF4pC_klu7M5vx9Nkw57FMNK08kIKRFf_GwXxzAAkRaRIkRM7h48K9UFAl1gRRTIkChq_txM3Jy0Ft9HHaIpcEQ4fnW5856fKfm6IvRcel1NONdKCuQRlatp6smh8g/s220/speech_sample.jpg'/></author><thr:total>0</thr:total></entry></feed>