Categories
Engineer fun stuff travel

Rosetta project uses components manufactured in Lincoln UK

Rosetta spacecraft parts manufactured in Lincoln

Just had a quick phone call from my mate Terry that almost gave me a mild orgasm. Years ago we worked at a company called Marconi Electronic Devices (MEDL) in Lincoln. I ran the radiation hard components product line and Terry was the chief designer. Terry reminded me of the Rosetta spacecraft parts manufactured in Lincoln.

We used a technology called Silicon on Sapphire (SOS). This was manufactured just like a normal silicon chip/semiconductor except that the substrate was Sapphire, an insulation material. SOS was extremely resistant to the effects of the radiation that satellites encounter in space and was therefore in great demand for many projects.

They were halcyon days. I’d get trips to glamorous locations all over the world working on exciting projects. These projects still come back to roost from time to time as they are all long term missions – Space is a very big place.

The last one to surface was the Cassini mission which landed a probe on Titan, one of Saturn’s moons. We made the spacecraft processor for the Titan lander. It was a 3 MIP 32 bit processor called the MA31750 – used the old Mil Std 1750A software instruction set.

Although the company is now long gone and wasn’t really a great employer the people were terrific. I still have some SOS wafers containing 31750 die at home. If I remember I’ll take some photos. They’re in the attic somewhere.

We also made memory chips (64KB) and other peripherals – the idea being that you could design the whole processor board using our parts.

It opened doors all over the world. I met astronaut Buzz Aldrin and even went along to Moscow by invitation of the VP of the Russian Space Agency to give a talk – in front of Russia’s top space scientist. Also did a talk at CERN for scientists working on the Large Hadron Collider (LHC) project which has been in the news of late.

Now we have Rosetta. It’s hugely funky to be able to say I was part of that project. I have loads of stories from that time but I feel as if you’ve indulged me enough.

If I can dig out more on the Rosetta electronics I’ll share it.

Purely coincidentally Terry and I went to see the Rosetta Stone in the British Museum on Tuesday morning after the Albert Hall Pylons Gig. Cool stuff 🙂

Categories
End User security

Potential TalkTalk Router Security Flaw?

Interesting tweet describing a potential TalkTalk router security flaw

Picked this one up on Twitter. It describes a potential TalkTalk router security flaw. I can’t for the life of me think how this scenario happens unless somehow TalkTalk are using the same IP address for more than one router – I guess with Dynamic IP addresses it will happen.

If that was the case then he certainly shouldn’t be able to access the router. Suggests there is a default username and password in play. Maybe the routers are only locked down from people outside the TalkTalk network. Seems strange to me.


Should really be locked down for everything. Bit of a worry really especially when you consider that most people will have no idea what is going on. Someone could be browsing your unsecured laptop or phone. Most will be unsecured. Laptops at least. People tend to have a pin number on their phone to stop Fraping.

Anyway though this one was worth sharing. If anyone from TalkTalk engineering would care to comment that would be great. Suspect they will keep stum though and get on sorting it out.

The whole subject of personal security where the internet is concerned is a difficult one. It’s hard for most people to get their brains past anything other than just installing anti virus software and even then it is rarely maintained. ISPs need to take responsibility as far as they can for their customers safety.

It’s in their interest really. The last thing they want is for a customer’s PC to be compromised and to be spamming the world. Gets the ISP blacklisted.

As far as the TalkTalk router security flaw goes I’m sure there must be a simple and innocent explanation. Hope so anyway.

That’s all folks. Ciao bella.

Categories
Apps Engineer peering

Slack Instant Messaging

Using Slack Instant Messaging for our LONAP communications

Just trying out Slack Instant Messaging for now. My first reaction when one of the boys suggested it was “oh no, not another IM system. Why can’t we just use hangouts, or messenger, or anything we already have.”

I’ve changed my mind. Having a system that is essentially private for one company is great. I get notifications on my Android when a Slack IM comes in. Normally I check my mail for LONAP messages but only do it periodically. We don’t use gmail which is my normal platform for everything else.

Slack UII also have slack for my Chromebook. It’s a web based service so no plugin. At least not one that I am using. I  can enable desktop notifications but have happily left this switched off as I prefer the notifications to come in on my phone. I do like the fact that you can choose keywords for alerts.

It’s generally early days for us with Slack but the omens are good. We are expecting it to turn us into a more responsive organisation. It’s all about serving our members 🙂 We are a very distributed team all working remotely so good comms are essential.

If you don’t know or haven’t been following recent posts, LONAP is an Internet Exchange Point that connects eyeball networks with content providers. We have some major global names as members: Twitter, Google, Netflix etc.

There is a good chance that if you are using social media in the UK you are reaching it via LONAP which has a great reputation as being a network run by engineers for engineers.

As far as Slack goes I have been a user of Instant Messaging almost from the start and have grown sceptical as to whether anyone needs a new service. There seem to be loads of them all over the place.

My mind has been changed, by Slack. I’ll still use Facebook to chat to the kids and Hangouts for the trefor.net businesses but where LONAP is concerned, Slack Instant Messaging it is.

Categories
Business internet

Plusnet website down

Plusnet website down – not great for an ISP

Saw on Twitter that the plus.net website is down. Somewhat of a faux pas for an ISP. We’ve probably all suffered from such situations but it is usually extremely embarrassing for the team responsible.

I daresay we will find out what happened in due course. This is a fairly major event because one assumes that plus.net will have a high availability platform for their site – load balancers, multple ip addresses and servers etc etc. All the usual good stuff. They will also have multiple DNS and multiple connections into the platform.

What it says is that nothing can be guaranteed to have 100% uptime. In many industries these days downtime of such a service will be measured in lost cash. The likes of Amazon, eBay etc.

The industry traditionally most sensitive to such scenarios is finance. I recall years ago a pal telling me he’d been to a data centre in the USA where a major bank had a cage. Inside the cage sat three engineers playing cards. They were there in case there was a network problem. Expensive but just part of the cost of insurance.

This isn’t practical for most businesses so they have to rely on a good partner. I don’t think plus.net do any hosting but this would probably harm that side of their business if they have one.

Having been in the situation of running a network which also had data centre resources  I can tell tell you that the only way to ensure a good night sleep is to invest in resources. Qualified staff and quality network design and equipment.

Plusnet will certainly have done this and still have a problem. Hey.

All I can say is that with the plusnet website down the alarm bells will have been ringing at the ISP and a team of guys will be rushing around like blue arsed flies looking to see what is wrong. The best way to get it sorted is to leave them to it.

Categories
End User fun stuff

Hitler, he only had one ball…

The Pylons at the Royal Albert Hall

Having spent all last week in Hammersmith at RIPE69 the start of this week saw another two days in London. This time the visit was to see The Pylons at the Royal Albert Hall at the Music For Youth Festival – the Schools Proms.

MFY Schools Proms at Royal Albert HallI’m very proud to tell you all that my son Joe is a member of The Pylons. Keyboards, trumpet and vocals. The Schools proms are billed as three days of music from the best youth talent in the uk. Ordinarily I wouldn’t blow trumpets like this but last night was a seriously top class evening of musical entertainment and with a totally vested interest I’m doing it anyway.

There were groups there who you could consider to be world class. If we consider The Pylons, each band member is a multi-instrumentalist to a high level. They have all already played the Albert Hall on a number of occasions as members of different youth orchestras and big bands. This showed in the composure and professionalism with which they appeared on stage.

I have no photos of the actual set. I was too busy watching and enjoying the show. The Pylons were accompanied by a cameraman for the whole trip so we will have a professionally done video to show as a souvenir of the day.

Safe to say the show was fantastic. I’m still emotionally exhausted from the evening. I’m sure The Pylons will go on to great things. The lads are still only aged between 16 and 18 and they should see the Albert Hall as just a stepping stone.

Although most of the family headed back to Lincoln and the mundanity of school the next day although Joe was playing the Last Post in the local village remembrance ceremony. I fortunately was able to stay in town to celebrate. We ended up with a 1am finish at The Phoenix Artist Club, venue of the forthcoming trefor.net Xmas Bash. No doubt this has contributed to my exhaustion.

zzz…

Categories
End User security

Virgin Media net nanny parental controls make internet unusable

Virgin Media net nanny parental controls cockup

On Saturday Twitter was awash with complaints from Virgin Media customers unable to surf their weekend entertainments. Apparently the Virgin Media net nanny parental control system had gone tits up. Presumably during some maintenance.

Some Tweets for your info – then scroll down for some thoughts on the subject.


The danger with this kind of technology is that it will break the internet. Normally the issue is accidental blocking of legit sites who carry on innocently with their business not knowing that a chunk of their target market has been denied access to them.

Last weekend this was taken to the extreme as most websites were blocked. I don’t really have a problem with parents being able to opt in to parental controls (ie have to switch them on as opposed to others having to switch them off) although it is worth pointing out that any kid with a soupcon of street wisdom will know how to circumvent the system.

At my kids’ school it is a daily battle between teachers and taught to limit access to proscribed sites. More on this kind of subject here and ‘ere.

Also quite a few Twitter fuelled posts that you might find an interesting read over at broadbandrating.

So long…

Categories
internet

RIPE69 wrap up – Karaoke BoF

RIPE69 karaoke – excruciating 🙂

T’was a week of excess. Excess conference sessions, excess coffee and excess alcohol. It would be difficult for an outsider to understand that the internet is actually fuelled by coffee and beer. That’s what makes those packets move. No sleep is involved. There is also whisky.

On Thursday night, deep in the bowels of the Novotel, far below anywhere you might see a member of staff at night, unless in pairs, the Karaoke BoF was in full fling. Excruciating, gruesome noises emanated. Wild men sprang from their laptop cocoons. Cockroaches scuttled for the safety of the air-conditioning ducts. Loud music thundered. Lights flashed and dazzled.

Men and women danced in their free conference t shirts. Beer, whisky, whisky, beer. Lights, music, whisky beer. As the night drew on more people arrived to press the momentum of the Karaoke. Microphone fodder.

That night the internet was invented, disassembled and reinvented. DNS, BGP, dark fibre, SDN, IPv6.

5am came. Then breakfast, for the few. There is a rule. Work hard, play hard, and work begins at 9am no matter how hard the play. So the internet keeps working, for the people. Breakfast is optional. The @lonap sponsored coffee station worked overtime.

Then came the wrap-up plenary. After that the doors were closed, 750Mbps of internet pipe shut off and the meeting went into its final session1.

Afterwards we hailed an Uber and made our way to KIngs Cross Station. Preparation for the journey North. Fish and chips accompanied by pints of London Pride. Then we went our separate ways, back to our homes and loved ones and an early night.

What do I remember most about the week. The excellent WiFi access. It is as you would expect from an internet conference.  Next time it is in Amsterdam and they will have 10Gbps of connectivity. That’s a proper broadband connection.

Have a good day now…

1Nod’s as good as a wink to a blind ‘orse.

Categories
Engineer engineering internet

Prince Harry special guest appearance at #ripe69 social

RIPE69 social sponsored by LINX on their 20th birthday

Whoever said the conference game is a nice little cushy few days out of the office has clearly never been to one. RIPE69 is in London this week and has an action packed schedule. There is very little downtime.

This is partly because as soon as the day’s official business is over the official unofficial business begins, in the bar. These events are big budget gigs and most evenings there is a social of some kind. A social for the 600 people attending RIPE69 is no small organisational challenge and comes with no small price tag.

Last night’s social was at the Jewel Bar in Picadilly Circus. Jewel directly opposite the tube entrance and was a very easy hop from the conference venue at the Novotel in Hammersmith. RIPE69 also coincides with LINX’s 20th birthday and LINX last night were very generous sponsoring the evening. The internet runs on beer and LINX have done a very good job in organising a number of parties during the year to demonstrate leadership in this space.

Last night was such a big event in the London party calendar that it attracted a number of A-listers. The featured image shows me with Prince Harry. You can see he was surprisingly bashful about having his photo taken with me. Don’t worry. I was able to keep the conversation going.

Being a quiet living type I left before the end to make sure I caught the last tube home. Not everyone was as sensible. A number of walking dead have been seen around the @lonap sponsored coffee station injecting espresso directly into their veins.

I don’t recommend this method of revival. Far better to make yourself get up early and go for a 5 mile run. Clears the head in no time. Never done it meself but I do hear it works wonders:).

Today is only Wednesday. There are three more days of RIPE69 to go!!!

As we are talking about working hard and playing hard I’ll take this opportunity to remind readers that they are invited to #trefbash2014.  Link here password is “friendoftref”.

Categories
Engineer internet Net

RIPE69 wireless LAN

RIPE69 wireless LAN is terrific

You have to hand it to our industry. Whenever I go to a conference the WiFi internet access is usually terrific. On this occasion at the Novotel in Hammersmith we have 600 or so engineers crammed into a meeting room. That’s a lot of folk using the internet whilst listening to the talks – most people have their laptops open, just like I have when typing this post.

600 people needs quite a hefty network. In this case you only have to look under the tables to find out how they do it (see featured image).

I’m currently getting 50Megs down and 62 Megs up. Happy days. RIPE69 is my first RIPE meeting. I can’t see it being my last!

 

Categories
fun stuff

RIPE69 coffee breaks are sponsored by @lonap

RIPE69 is in town this week – look me up

Am at RIPE69 all this week. Working hard on behalf of LONAP who are sponsoring the coffee breaks.

If you don’t already know, LONAP is a not for profit Internet eXchange Point (IXP) where members connect with each other to share their internet traffic, a process known as peering.

Peering is what makes your internet experience a good one. Good in terms of low cost. Peering is the cheapest way for an Internet Service Provider to connect to the internet because they have only to provide a single connection into a communal hub.

Good also in terms of user experience because peering effectively provides a direct connection between ISPs with far fewer router “hops” in between. In this way latency, or speed of connection is optimised.

Uhuh you say. Well a fast speed of connection is important for a number of reasons. It isn’t just about bandwidth which is a representation of how much data you can shovel down a given connection in a given amount of time. It’s also about how quickly that data packet gets to your laptop/tab/phone.

The model is similar to to that used in financial exchanges in the city. Dealers are desperate to get financial data as quickly as possible becasue improvements measured in terms of milliseconds can result in millions of pounds of profit (don’t ask me how exactly).

In the internet world there are statistics that support why a faster connection makes more money for websites. Amazon claim that a 100 milliseconds improvement in page access time results in a 1% revenue improvment. Yahoo increased traffic by 9% with a 400 milliseconds improvement and Google say that slowing down the search results page by 100 to 400 milliseconds has a measurable impact on the number of searches per user of -0.2% to -0.6%.

That’s why ISPs peer. LONAP, with around 150 members, is one of the worlds biggest IXPs, ranking in the top 20 out of 450 or more around the globe. LONAP are based in London which ranks as the most connected city in the world hosting the most AS numbers. An AS number is a number assigned to a network operator that allows it to host IP addresses. The explanations go on. I stop here.

LONAP, as I said, are sponsoring the coffee breaks. When you get  coffee the mugs have tearaway sections that tell you whether you have won a prize or not. We are giving away some terrific prizes including the one in the featured image of this post. If you want a LONAP branded phone charger get drinking coffee. You’ll need to search out someone wearing a LONAP shirt to get your prize.

If you are at RIPE69 look me up. Also check out more connectivity related posts here.

Categories
Engineer peering

Euro-IX 25 Bucharest live commentary Day 2 pm

Euro-IX 25 Bucharest live commentary Day 2 pm

Was too busy doing stuff this morning and much of it was tutorial, AGM, elections so didn’t do any live blogging. This afternoon am back on the case. Yesterday’s coverage of day 1 here.

Categories
Apps Business Cloud End User storage backup & dr

office 365 unlimited storage

Microsoft announce office 365 unlimited storage

I’m not a big fan of Microsoft but in fairness to the company they are working hard on making their cloud products competitive. The latest  is their announcement of  free office 365 unlimited storage. Course it isn’t free. It costs. £5.99 a month for a single user or £7.99 a month for a household of up to 5 persons. This sounds like a very good deal to me considering a single copy of Microsoft Office can cost over a hundred quid (or it was when I last bought one).

Apart from being an aggressive move in a market that they absolutely have to succeed at, and which indications suggest they are not doing badly, the great thing for me is what this is likely to do for the competition. A Google account is free for personal users and it gives you most of the functionality of Microsoft Office, although I accept that the equivalent Google features may not be as mature and functional.

With Google though you only get 15GB free storage. I worked out earlier this year that the free Google account with a Terabyte of storage is around £70 a year. Whilst a Terabyte isn’t unlimited it’s not far off at the moment, to all intents and purposes.

Maybe £70 is the base market price for this kind of cloud service. Most people won’t need a Terabyte, or an unlimited amount of storage, at the moment. I use around 400MB on my NAS box and that is mostly photos. If I had unlimited storage I might start to push the boundaries on what I choose to store.

I’ve no idea what that is at the moment. It might, for example, mean I get a CCTV app that keeps all the video footage 1 ever recorded by the camera/s. A bit of a waste but why not. It’s free.  Add to that the fact that unlimited usage broadband packages have become the norm and hey presto, all barriers removed.

In one sense Microsoft might be making a rod for their own backs here but I think it is great. It can only be of benefit to us all.  Where does this all go? What happens when everyone’s product looks the same and costs the same? I suspect that we will start to see differentiated cloud services, speed of access, mining tools maybe. But that is all in the future. For the moment it’s well done Microsoft. Competition is good.

They still have a lot of work to do on their mobile strategy though…

1 use of the word footage seems somewhat anachronistic

Categories
peering

Euro-IX 25 Bucharest live commentary – Day 1

Euro-IX 25 Bucharest live commentary – Day 1.

 

Categories
Business fun stuff

Announcing #trefbash2014

welcome to the Phoenix Artist clubHere it is kids – trefbash is back with #trefbash2014 11th Dec.

The UK internet industry’s biggest bash of the year is back. Now in its 5th year, the trefor.net Xmas bash is again at Soho’s exclusive Phoenix Artist Club.  #trefbash2014 is a beach party – the full coconut with straw hats, garlands and a mandatory Hawaiian shirt dress code (or coconuts – you choose). A good time is absolutely guaranteed for this, the culmination of the internet tech industry’s party year.

Music is provided by the high class sounds of the Jeff Brown quartet supported by international jazz pianist and Ronnie Scotts regular Colin Dudman. This year also, as an added bonus we have a special feature that includes a celebrity inflatable palm tree. You’ll have to be there to find out more!

One of the features of a trefbash is the terrific food and chef Ian is providing us with a fantastic bbq spread to suit all palates. And then there’s the champagne… Check out this video from a previous trefbash. Link to eventbrite page here or sign up below the list of sponsors. This is by invite only to readers of trefor.net – password is “friendoftref”.

trefbash2014 has been made possible by the generosity of the following sponsors – top notch folk one and all 🙂

Magrathea-Logo-CMYK provu-onwhite yealink-logo-hi-res-green-on-white-background GradwellLogo_WithStrap_CMYK_AW ipcortex Flexoptix Cumulus Networks Timico Snom Adforesight Voxygen Imtech ICT Allegro Networks Siphon Networks Sangomaaql_50 GENBAND_Logo_2012_50

 

Categories
broadband Engineer engineering net neutrality

ISP traffic management policies

An overview of consumer ISP traffic management policies

ISP traffic management in which some types of traffic may be prioritised over others has been the subject of an ongoing debate. This is particularly the case amongst the Internet Telephony Service Provider (ITSP) communities but also elsewhere. NetNeutrality is the issue (look it up) and is extensively covered on this blog.

This post is a simple one. It takes a look at the biggest six ISPs, tells you if they traffic manage and provides a link to the ISP’s own pages on the subject.

ISP Do they traffic manage? Comments
BT No Fair play to them
EE Yes Lots of contractual stuff
Plusnet Yes Looks complicated to me
Sky Yes and No Sky Connect only – Unlimited and Lite packages are free of Traffic Management
TalkTalk No Except to prioritise TV packets which is fair enough
Virgin Media Yes Also looks complicated

It is generally the case that if an ISP does traffic manage they generally prioritise time sensitive packets such as VoIP and gaming. Traditionally this has been done to save bandwidth costs at peak times. However I will say that if TalkTalk who are traditionally seen as a pile it high sell it cheap ISP who you might think would need to conserve bandwidth costs,  can manage without traffic management, so to speak then there should no reason why all the others can’t follow suit. BT and Sky (mostly) do.

It could be down to their having older core networks that require investment but I can’t say for sure. Whatever the reason, bandwidth is cheap and ISP traffic management needs to be seen only in the rear view mirror. It is outdated.

This does to a certain extent come down to scale. The bigger your network the cheaper the bandwidth on a per unit basis. 1Gig connectivity is more expensive per gig that 10Gig etc etc etc

If you need more details on ISP traffic management click on the links in the table. Lots more stuff also on this blog here.

Ciao amigos.

Categories
broadband Business

Plusnet music on hold = “Don’t you want me baby”

Plusnet music on hold = “Don’t you want me baby”

In the big consumer ISP world I would think people expect to have to listen to music on hold whilst waiting for their ISP support line to answer.  Usually it’s why a business will pay that little more for a broadband line – just to make sure of the better level of support.

I’ve been quite surprised however at the range of telephone response times when calling consumer ISPs. ISPs with pile it high sell it cheap reputations don’t necessarily live up to the poor support reputation of such an ISP. At least when it comes to how long you have to wait before answering the phone. TalkTalk for example normally answer in less than a minute whilst BT can take anything between 10 and 20 minutes. Both use Indian based call centres.

The mere fact that the call centre is in India would stop me using the services for business. One wonders perhaps whether business customers get onshore customer care. However if I was considering having a second broadband line in as a backup to my main business one then using a low cost consumer service seems a no brainer to me.  Consumer broadband is ridiculously cheap and there are even offers around a the moment that give you free Fibre Broadband for one year as an incentive to sign up (eg Sky).

And not all the consumer players use Indian call centres. Both Sky and Plusnet are UK based. Plusnet seem to have a reputation for great music on hold. The problem is that you have to spend time on hold to them (seems to be the norm)  in order to find out. I’ve seen more than one Tweet that mentions the fact that they have heard “Don’t You Want Me Baby” as  music on hold whilst waiting for Plusnet. Their customer services director must have a sense of humour 🙂

If I was a business I’d definitely consider getting a low cost consumer broadband line in as an insurance policy for when my main one fails, which it inevitably will at some stage. Internet access is mission critical these days.

Categories
End User phones

A week with Oneplus One CyanogenMod in the UK

After I got my Samsung Galaxy S4 back from the menders, again, the screen was fixed but the microphone seems to have been totally jiggered. At least broken enough to not be able to rely on it for phone calls. A little research and the Oneplus One CyanogenMod jumped out of the web page at me.

I was thinking Google Nexus 5 but that handset had been around a while and we were waiting for the Nexus 6 to be launched. The Oneplus One CyanogenMod had great reviews, better than the Nexus 5 due to being newer, and I could get a 64GB version for £270! Nobrainer I thought.

Oneplus One had different ideas. You can’t buy a Oneplus On CyanogenMod UK without being sent an invite by someone who already has one. Doh! I decided not to. What a terrific marketing ploy!

A week later and I gave up on my SGS4. I found that I did actually need to talk to people every now and again. Even if I used VoIP over WiFi I still needed the microphone to work. Twitter found me someone with a Oneplus One invite and I ordered.

I paid for express delivery  but this still took a few days. It came from the good ole US of A. When it did arrive the packaging was great – fair play. Setup time was short though I did find that not all the apps I had previously installed on my Galaxy S4 automatically ported to the Oneplus One. With hindsight this was a good thing as I probably had too many apps I didn’t use on the old phone.

The biggest complaint about the Samsung is the bloatware. You don’t get this with the Oneplus One CyanogenMod. Whizzing through the gallery is v quick. There are a few things I think are greats and others not so.

Great is the fact that I can turn on the camera from the lock screen by just swiping the icon. You can also do this from standby mode by drawing a circle on the screen. The camera comes on. Yay. V handy for taking snaps of something you need to be able to respond quickly to and far better than having to enter a pin number.

You can also turn the torch on and off by drawing a V on the phone in standby mode. A sideways V or arrow switches on the music player. This can be a bad thing as I have occasionally found the torch on in my pocket and likewise the music.

The fact that the lock screen has options also sometimes makes it difficulet to enter a pin number – you only have to catch the edge of the screen with your palm and it thinks you are after the camera instead.

Another negative is that fact that the Oneplus One doesn’t support O2 4G bands in the UK.  Seeing as I can’t get 4G in my home town Lincoln this seems to be a relatively small price to pay. It would work if I was on EE.

Doesn’t really matter though. This phone cost £270, it has the spec of a high end job and feels great in the hand. I do sometimes find I have it the wrong way round but hey. It doesn’t matter. Power consumption seems good – not a particularly scientific test but at least a whole day in my experience so far.

The Nexus 6 has now been announced. I may also buy one of those and use the Oneplus One as a backup. Having had to be without a handset (I don’t call the Samsung Galaxy Mini a handset!) for periods of up to ten days whilst getting my own fixed it is clear that I can’t function without one. This isn’t an admission of weakness. It’s life Jim.

Stay tuned…

Categories
fun stuff

trefor.net pissup in a brewery video

The trefor.net pissup in a brewery video is released simultaneously in all global markets.

It’s been months in the making. Each week I get thousands of emails asking me when it is due to be released.  Now the wait is over. I am pleased to be able to announce, for your delight and delectation, the trefor.net pissup in a brewery video.

Those of you lucky enough to be there should look out for glimpses of you in the crowd.  For those who couldn’t make it the video will at least go some way towards letting you know what you missed. It’s not as if you weren’t invited.

Enough of this preamble. Bring on the dancing girls pissup in a brewery video.

Video camera and production courtesy of the very fine and talented Tom Davies.

The pissup in a brewery video was recorded at the Fourpure brewery in South Bermondsey.

PS cracking trefor.net logo giff at the end of the video. Expect to see more of that:)

Categories
Business security voip

SBCs – Maintaining Your Network’s VoIP Security

Session Border Controllers (SBCs) can greatly enhance VoIP security, all but eliminating toll fraud while also maintaining voice connectivity.

Trefor.net welcomes VoIP Week contributor Simon Horton, the Director of Sales, EU for Sangoma.

The term SBC (short for Session Border Controller) is liberally used in the VoIP industry today, but from my travels around the telecom channel it’s clear that there is significant misunderstanding and distrust on the role played by SBCs and when they are required.

The uptake of Enterprise Session Border Controllers or E-SBCs is being driven by the rise of SIP trunking in the UK. The number of ISDN channels (the traditional way of connecting enterprise to the telephone network, using dedicated copper wire) is shrinking at about the same rate as SIP trunking is growing, so assuming that the market size is static my conclusion is that all of the folks leaving ISDN are going to SIP trunking. In addition to the cost benefit, flexibility, and disaster recovery capabilities of SIP trunking, the proliferation of good quality and value connectivity (e.g., leased lines, EFM) is enabling the market growth.

Why SIP is more inherently risky

In the days of legacy TDM connections (Time Division Multiplexing, or the copper wire) phone calls took place on approved equipment connected to private networks run by the telco. Nothing else was connected or could be connected. Contrast this situation with SIP, where the connection could be across a public network or a network shared with data derived from multiple devices. In addition, calls can be placed and terminated across a wide range of devices such as IP-phones, smart phones, desktops, etc.

SIP deconstructed

Before examining how SBCs can help a typical enterprise it’s worth explaining that SIP consists of two main parts. First, there is the SIP protocol that sets up the call and conveys information about that call. Second, there is the media that carries the voice in RTP packets. Both of these streams need to be considered in order to maintain security.

Attacking the SIP protocol could allow a hacker to gain access to passwords and allow an unwanted intruder to spoof calls and allow toll fraud, a hot topic in our industry today. There are other ways that SIP can be disrupted as well. Denial of Service (DoS) attacks can cause packet overload situations where the legitimate SIP messages cannot be processed and hence calls will not progress.

Media can often be tapped into and heard using tools that are readily available on the internet. The media ports can also be subjected to DoS attacks that can disrupt the audio.

The role of the SBC

The E-SBC sits at the edge of the enterprise network and manages all the voice connections made with SIP. SBCs are very feature rich and there is a lot of information out there discussing the many roles and functions that these flexible devices can perform. The SBC will be able to deal with disruptive DoS attacks by dropping packets at the network level before they become a problem. Encryption is also possible so that media and the call setup messages cannot be tracked. In addition, toll fraud is made much harder with the addition of policy control that allows only certain patterns of traffic to proceed as well as only allowing known users and IP addresses to make and receive calls.

Why not a firewall?

Traditional firewalls are great for protecting data networks, but typically they provide inadequate protection for SIP. Firewalls cannot prevent some of the threats identified here as they are not constructed with an intimate knowledge of SIP. Remember those two parts of SIP we discussed earlier? Well, the average firewall cannot tie the two of those together; this is a key component of the SBC so that only the necessary connections are allowed through the edge of the network. A typical firewall also cannot delve deep within the SIP message, ensure its legitimacy, and if necessary drop it quickly before it gets to the IP-PBX and cause damage.

Summary

The recommended best practice is to install an SBC wherever there is a change in SIP network or wherever the WAN connections join the SIP network. A correctly configured SBC can provide piece of mind in that the possibility for toll fraud is eliminated and that voice connectivity will be maintained regardless of whatever else may be happening.

Categories
Business Mobile mobile connectivity phones security voip

VOIP BYOD

Those who build or sell VoIP systems need to begin coping with BYOD, because soon enough it will inevitably be on your system’s spec sheet.

Trefor.net welcomes VoIP Week contributor Paul Hayes, ProVu Communications Ltd.’s Product Development Director

Whether you’re a developer of IP PBX or a provider of hosted VoIP telephony services, you need to be doing something about mobile BYOD. BYOD (aka Bring Your Own Device) is the concept of company employees using their own hardware in addition to, or instead of, the hardware provided by and owned by the company itself. I use the term mobile because increasingly people want to use mobile phones and not desk phones. It may be a slightly foreign concept to a lot of readers, but there is a whole generation of future business people just around the corner who will have grown up with a mobile phone in their hand at all times.

It’s a simple idea on the surface, you have an iPhone because you like it and find it easy to use, right?

It might seem like this is all about greedy employers wanting their staff to buy their own kit, but not so. It stands to reason that allowing staff to use devices that they know, trust, and perhaps even enjoy should result in good productivity.

Enough has already been written on the advantages of BYOD, so what I want to talk about instead is how you as someone who builds or sells VoIP systems copes with BYOD, because if it’s not on your system’s spec sheet in the near future you’re going to seem rather old fashioned.

In my eyes there are two main issues the VoIP platform must overcome: maintaining professionalism and management of the devices.

First is the issue of maintaining professionalism. In the early days of VoIP there was a sense of triumph whenever pressing that tick button on your shiny new VoIP phone resulted in a working call with good audio quality. Thankfully, things have moved on, but the last thing you want is for your BYOD solution to represent a step back. It has to work reliably and it has to sound good, too, just like your VoIP desk phone does. At the same time, businesses need to look professional and maintain their own presence. For instance, most businesses don’t want the outbound phone calls they place to be seen as coming from different mobile numbers.

The second issue is device management. How do you know what people are using their mobiles for? How do you control which application they are using? How do you even change a setting on the device when it’s not owned by the business? How do you do all that without crippling the device?

The key to resolving these two issues is centralised management. We’ve been doing this with desktop VoIP phones for over ten years now, the same techniques must now be applied to mobile devices as well.

A company in Sweden called Opticaller Software has an interesting take on it all, offering a solution that involves an application for mobile devices (the usual suspects: iPhone, Android, Blackberry) and a server part that (for now) runs alongside an Asterisk IP PBX. That’s fairly interesting, of course, but what really makes it relevant here is that they also have a hosted management engine, a system that allows you to push the app out to mobile devices and that manages all settings related to the operation of the app. This is absolutely essential, and it seems to make the Opticaller solution fairly unique for the moment. Thus, no matter where the mobile devices are, provided they have just a tiny bit of a data connection, it is possible to control mobile telecommunications much like you can with desktop phones. All phone calls go through the VoIP PBX where they are recorded and accounted for and, crucially, you can control the outbound caller identification used for each call.

The mobile application itself does something that is both clever and yet simple. It uses the mobile voice network for the actual phone call. Maybe one day Wifi will be good enough to be used for mobile voice whilst out and about, but today that simply is not the case.

I used the Opticaller system myself on a recent business trip to Prague and found it very handy for calling people in the office using nothing more than their internal extension numbers. Also, it was very handy in reducing costs as I only suffered roaming charges for inbound calls and not outbound one. Please don’t make the mistake of thinking this is all about saving money, though, as the real problem being solved is how to integrate mobile BYOD into a VoIP phone system.

Categories
Business security voip voip hardware

VoIP Security and Your IP Phone

Concerns about massive growth of telephone tapping incidents has led to a growing demand for IP telephone handsets that provide VoIP security.

Trefor.net welcomes VoIP Week contributor David Kirsopp, Technical Director snom UK Ltd

An IP-PBX can be reached from potentially anywhere in the world, and your communications network is vulnerable if not properly secured. As such, making sure you enhance security through your choice and implementation of your IP handsets is one of the security measures you should be considering when introducing VoIP into the organization’s network infrastructure.

Concerns about massive growth of telephone tapping incidents has led to a growing demand for secure telephone handsets. The practical availability of secure telephones is restricted by such factors as politics, export issues, incompatibility between different products, and high prices.

When the VoIP traffic over the Internet is unencrypted, anyone with network access can listen in on conversations. Unauthorized interception of audio streams and decoding of signaling messages can enable an eavesdropper to tap audio conversations in an unsecured VoIP environment, a common threat. And eavesdropping is how most hackers steal credentials and other information; for example, customers reciting their credit card numbers to an airline booking attendant. All that’s needed is a packet capturing tool, freely available on the Internet, or switch port mirroring, and hackers can save the files, take them home, and cause disaster with the stolen information.

Equally or more dangerous than the hacking of the phone calls themselves is that the phone system may enable entry into the company network, and thus the phone connection becomes as portal to all data within the company.

Of course, there are solutions and safeguards that can reduce or even eliminate security weaknesses within VoIP systems.

Authentication-Based IP Addresses

Static configuration of your IP phones to your extensions will prevent easy access by intruders into a conversation. Specifically, you can specify at the IP-PBX which IP address can use a particular extension as a trusted address.

Confidentiality

Unlike PSTN calls which traverse dedicated circuits, VoIP calls are really just data going across the Internet…data that must be protected. By using encryption techniques like TLS and SRTP, you can protect both the signaling and the media stream, preventing others from listening in on the conversation using simple tools such as port mirroring and an RTP trace.

SIP packets contain private information: the IP address of the phone, the SIP server, the signaling and media ports that it’s expecting to listen on, the MAC address of the phone, and in some cases even the management port of the phone. This information should be sent over a TLS tunnel to hide it from snoopers, who though they will be able to see TLS packets will have no idea what’s in them.

Well-designed IP phones provide secure SIP signaling via TLS and audio stream encryption by incorporating SRTP (Secure Real-time Transport Protocol), a security profile that adds confidentiality, message authentication, and replay protection to the RTP protocol. SRTP is ideal for protecting Voice over IP traffic because it can be used in conjunction with header compression and has no effect on IP Quality of Service. These factors provide significant advantages, especially for voice traffic using low-bit rate voice codecs such as G.729. Ensure your phones provide TLS-based SIP signaling (SIPS) with a SIP proxy server and audio stream encryption using secure RTP based on 128-bit AES. SIPS not only prevents message manipulation and eavesdropping, but it also assures the proxy server of the identity of the client phone; hence, identity spoofing threats are also subdued by this mechanism. Some phones, including those produced by snom, also use AES in counter mode (AES-CM) for secure RTP, which creates a unique key stream for each RTP packet and thus makes it almost impossible for eavesdroppers to retrieve the original RTP stream from the encrypted SRTP stream.

Secure Media (over UDP)

If you want to increase security further, then purchase a certificate from a Certificate Authority (CA) like VeriSign, which is equivalent to having your documents signed by a Notary Public who is a trusted third party, verifying that you are who you say you are.   Getting the certificate into the IP phones is currently the tricky part, as some phone vendors are not burning them in at the factory using the MAC address as part of the key.

Plug and Play and Certificates

Plug and play of phones on the wide area network is nothing new. The phone presents a MAC address, and based upon that MAC address the IP-PBX automatically provisions the phone so that it can make calls. The IP-PBX, however, is not able to verify the MAC address of the phone since it came from the WAN. In this case, the MAC address reflects that of the router as that is where it came into the LAN. This is a security risk, however some handsets have certificates burnt in at the factory, so after a key exchange the IP-PBX can be assured that the phone is who it says it is and that a certain MAC address belongs to a particular phone.

Centralised Security

Alternatively, security can be guaranteed from a central point independently from the individual applications and end devices. The advantages of this centralized approach is that it will be a one-off implementation with low maintenance costs and the possibility to secure communications from multiple manufacturers. One option for centrally provided security is a Virtual Private Network (VPN), which are typically used for connections with field bases employees in which a company network connects the branch offices to the computer centre or connects geographically separate servers or computer centers.

Categories
End User H/W phones voip voip hardware Weekend

VoIP Hardware: Giving a British Icon a 21st Century Makeover

Repurposing a 20th Century British classic for the new millennium.

Trefor.net is pleased to welcome “VoIP Week” contributor Mark Williams, Director of Sales at Obihai Technology.

The GPO746 is loved by many – it’s hard to ignore the classic look and high quality construction of the original — but with most of us now using VoIP it is often left to sit there as an ornament and gather dust.  But we can give it a 21st century upgrade!

The GPO poses a few challenges for VoIP hardware enthusiasts. First, it requires a ring capacitor to drive the bells when it rings. Also, the GPO is a rotary dialer, which most modern ATAs don’t support. But where there is a will there is a way, and here I will offer detail on two approaches that can be taken to ready this classic for the world of IP.

The Easy Approach

The easiest way to get your classic phone to work with VoIP is to plug all the adapters inline, external to the phone. To convert the rotary dial clicks into DTMF you can use a Dialgizmo, a device that sits inline between the ATA and the phone. It works well, though it will occasionally detect the hook flash as a “1” and send the DTMF so you need to be careful when taking the handset off hook.

Along with the Dialgizmo you’ll need to find a ring capacitor. You can either purchase an inline ring capacitor from an online store, or you can repurpose a master socket if you have one lying around.

Finally you’ll need an ATA.

mw1-GPO746 plugged into a re-used master socket
The GPO746 plugged into a re-used master socket, which in turn in plugged into the Dialgizmo, which is plugged into an Obihai OBi202 ATA.

Using this simple conversion approach you can get your classic phone working over VoIP.  But you want a more elegant solution, I hear you say?

The Advanced Approach

You say you don’t fancy having a string of adapters connected to your classic phone? Well, if you are handy with a soldering iron, the Rotatone offers another method, an integrated solution, installed inside your GPO746.  And if you’re not handy with a soldering iron, don’t worry – they also have a service where you can send in your classic phone to have the Rotatone and a ring capacitor installed (after making a ham-fisted attempt at soldering — It’s been many years — I chose the send-in option).

The Rotatone is the black box on the left.  It is wired between the rotary dialer and the control board of the GPO746.
The Rotatone is the black box on the left. It is wired between the rotary dialer and the control board of the GPO746.

The Rotatone has the advantage of not suffering from hook switch triggering DTMF tones, and having the ring capacitor installed in the device also removes another item from the daisy chain between the phone and the ATA.

So how about we go a step further an install the ATA within our classic phone as well!

The OBi200 (and OBi300) ATA both fit perfectly between the hook switch of the GPO746.  If we remove the line cable from our phone we can wire this plug internally straight into the back of the ATA and route the power for the OBi via the line cable’s port.  Rather than drill into the case to create a hole for an Ethernet cable we can instead plug an OBiWiFi adapter into the back of the ATA to allow it to operate wirelessly.

Everything installed inside the GPO746.
Everything installed inside the GPO746.

We now have our WiFi-enabled GPO746 IP Phone, repurposed and ready for the 21st century.  And you can even take it a step further by installing an OBiBT USB adapter into the USB port.  To do this you’ll need to use a USB hub to allow plugging the OBiWiFi and OBiBT adaptors into the one port. If you can find a place to squeeze that in you will have a GPO746 that’s not only wireless but that can also pair with your mobile phone via Bluetooth.

So what are you waiting for?  Winter is just around the corner, and there are few better excuses for spending an afternoon converting your phone in a small room filled with solder fumes.  Best of luck!

Conversion Complete 1     Conversion Complete 2

Categories
Business security surveillance & privacy voip

Why are the Major Telcos Afraid of encrypted voip?

A significant disconnect exists between the reality of today’s IP communications and the security concerns and needs of the customer (read encrypted voip).

Trefor.net welcomes VoIP Week guest contributor Peter Cox, UM Labs Ltd. Founder and CEO.

One of UM Labs’ long-standing customers is using our product to provide encrypted VoIP connections from remote users (mostly home workers) and to encrypt calls they make and receive on their SIP trunk. Their motivation is simple: They are in the USA and their business makes it necessary for them to work closely with federal government, a connection that subjects them to security and compliance requirements. This customer’s view is that applying encryption to all VoIP calls — including those made and received on their SIP trunk — is an essential step towards meeting these requirements. Even if some SIP trunk calls are then relayed in clear text, as is the case for PSTN calls, the encryption applied on the connection to their trunk provider protects their network and ensures the confidentiality of SIP trunk calls on the connection between the service provider and their office. This effort demonstrates that they are taking all reasonable steps to secure the network connections under their own control and is thus a significant step towards meeting the compliance requirements.

Recently, our customer’s existing service provider announced that they were considering discontinuing encrypted SIP trunk connections, and being unable to find an alternative they asked me for some alternative service provider recommendations. I posted the question to the SIP Trunking & Enterprise VoIP LinkedIn group and received a number of helpful replies. My question also sparked some interesting discussion. A number of the participants gave spurious reasons why encryption was too difficult or not needed on a SIP trunk. What surprised me most was that representatives of two very large and well known telcos weighed in against encryption. One claimed that providing an encrypted SIP trunk connection was incompatible with legal intercept requirements, while the other tried to claim that since enterprises trust their data on “private” networks shouldn’t they trust their voice as well?

Addressing the claim that SIP trunk connections are not compatible with legal intercept requirements, I submit that when properly implemented and with the appropriate systems encrypted VoIP does not prevent legal intercept or call recording for compliance purposes. What it does stop is unauthorised call monitoring. The risk of unauthorised call monitoring is not confined to VoIP, as there is a significant risk to calls on cellular networks (see my recent blog at http://tinyurl.com/k38suu3). Encryption also has a role to play in controlling other threats, including call fraud.

Regarding the comment about enterprises trusting their data on private network connections to service providers, this I found even more surprising. I have spent many years in network security and this is the first time I have heard a connection to a 3rd party service provider classified as sufficiently private to trust for data transmission without some form or additional security. While connection to service providers may be more controlled than the open Internet, they are not private. Most enterprises will naturally want to protect their data with a VPN, so it makes sense to do the same for voice.

Part of the problem is that part of the telecoms industry is stuck in the past, back in the days when the phone companies owned and operated the networks. Things have moved on, and a significant proportion of all communications now runs on IP networks, much of it on the Internet. The move to IP has spawned new applications such as presence and IM and is the driving force behind convergence. The use of IP networks, and specifically the Internet for voice and UC, is a big step forward, but we must recognise that a different set of security rules apply. We have the knowledge and technology to address the security issues. Rather than finding reasons to avoid implementing VoIP and UC security technologies, the industry needs to embrace them and promote their implementation.

I won’t name the two telcos, but if you are interested in seeing them incriminate themselves you can follow the full LinkedIn discussion at http://tinyurl.com/ofdqgjy.

This is a VoIP week post on trefor.net. Check out other VoIP themed posts this week:

Why are major telcos afraid of encrypted VoIP? by Peter Cox
Emergency calls and VoIP by Peter Farmer
VoIP, the Bible and own brand chips by Simon Woodhead
Why the desktop VoIP telephone isn’t going away by Jeff Rodman
Small business VoIP setup by Trefor Davies
VoIP fraud-technological-conventionality-achieved  by Colin Duffy

Categories
Legal ofcom Regs voip

Emergency Calls and VoIP

Emergency Calls and VoIP have always been a contentious issue, but the need for ever increasingly innovative and cheaper ways of communicating means the tensions are getting worse than ever.

Despite what many of you may think, Regulatory Affairs is fun. Bear with me for a second. This isn’t quite like a train spotter defending a book of carriage numbers as fun (though for them I am sure it is). Regulatory Affairs is a truly multi-disciplinary job. Each day, I have to be a little bit telecoms engineer, lawyer, accountant, economist, lobbyist, salesman, compliance officer, and more. My work this year has taken me to documents in the British Library regarding the 1984 privatisation of BT that were pertinent in a dispute being argued at Ofcom, and I am currently working and planning on charge control periods for 2016-2019 and beyond. Every day you get to be at the leading edge of technological environments, helping businesses understand the regulatory environment and coming across some wonderful problems and innovations.

That fun gets drained, though, when it comes to 999 (or 112 for our European brethren…and I think we can all safely say we know 911 is America). Lives are at stake, and it is rightly a very important topic, however much I despise having to deal with issues arising from it.

There are two pieces of history that tie on to why we have the 999 environment we have today. The first one, serious and sombre, is that the foundations of the regime today came about following the 1986 Hungerford Massacre where the local exchange couldn’t handle the volume of calls as Michael Ryan perpetrated his horrific crimes. There were only two lines into the 1986 equivalent of a call handling authority for Newbury at the time. The second is more interesting than serious, that being that the design of pay phones in 1925 was such that the dial was fixed but the number 9 and 0 could be used — the former thrice for emergency services and the latter for the operator — without having to put money in to release the dial. The urban myth is that it was chosen in the pulse dialing days because overhead wires could touch in high wind and send a 1 pulse … if done three times in a certain period would make a false call. The avoidance of this was simply a fortunate consequence of the pay phones.

More recently, in the late nineties, we have had significant improvements to location information databases, we’ve had the rise of mobile phones and the location information therein, and we’ve also had the ability to text 999 (pre registered users with special needs as I recall). In amongst all of this we have VoIP, one of the most important innovations in telephony for a generation. Today I can sit in a hotel in Brazil and make calls presenting my UK 0208 number. More importantly, I can make such calls from an app via a smartphone connected to a switch/PBX/platform in the UK that doesn’t even know I am abroad.

So what on earth happens when I dial 999?

That instance is simple; apps should probably just let the handset deal with it natively so as to pass on all the relevant information….. but what if I sign into a hosted PBX in my colleague’s home office and something goes wrong? I’ve been a good boy as a homeworker and the call handling authority would see the address of where I am most often – my own home office. Thankfully, Emergency Calls are presented to the call handler in two ways, based on a prefix the originating network places on the call — there’s one for old school legacy TDM fixed network that says “reliable address” and there’s a second one that says “unreliable address” used for roaming VoIP. Cutting a very complex story short, that triggers a different script for the operator to follow. The mobile world is somewhat different and their location information plans regarding GPS chips etc. will undoubtedly save lives. We’ve managed like this for coming up to a decade, since Ofcom made its last pronouncements on VoIP and Emergency Calls. All well and good.

The legacy broadband superimposed over narrowband copper voice world has a short shelf life now, though. Various government bodies and Ofcom are consulting and whatnot on how to deal with Emergency Calls when we can’t rely on the BT Exchange to power the line (the narrowband voice at least) should the wider electricity supply be compromised. Right now if there’s a power cut at home I will lose broadband and my phone. I can, however, go to the garage, dig out an old phone and plug it into the master socket and knock myself out. The current regulatory/government consensus is that data-only/wires-only/naked services should have at least one hour battery backup to remove this potential problem.

Wow. 1 hour.

Essentially then, in a VoIP only world (or strictly VoIP or other technology over naked DSL or somesuch), if someone wants to axe-murder me during a power cut I am in deep trouble if nPower cannot get their ducks back in a row within 59 minutes and 59 seconds.

According to Ofcom’s own research, 26% of socio-economic group DE households are now mobile only (16% in other groups if you are interested). They are relying today purely on whether they’ve remembered to charge their phone and/or Apple have invented a hydrogen cell, as opposed to the usual offering making you reminisce for an old Nokia and that the local masts have sufficient backup power in a prolonged outage too. I suppose, in my alluded to axe-murdering power-cutting thunderstorm I would also have my mobile, but everyone knows I have to carry around a 14000mAH battery pack because I always forget to charge my phone! This situation in itself is why I am surprised that the fixed requirement is just one hour…… after all, we are familiar with the snowmageddonwe endure each winter, with communities sometimes cut off for days.

At times I get the impression (and I have some sympathy with this position) that some VoIP companies would like to be able to just have a disclaimer that says “This device/service cannot be guaranteed to be able to make Emergency Calls” or somesuch. With the growth of VoIP and our need to have this technology widely accepted and embraced by the populace — and our desire to not pay for the line card and metallic path to the voice processor in the exchange — I don’t think that just making it someone else’s problem will wash….. you can just see the Daily Mail headlines now.

That all said, the solution isn’t a room UPS for every household, nor is it a hot-standby generator for every street. We also cannot avoid much longer the roaming VoIP location information issue; a return to the pre 1998(ish) situation of the caller having to give their address would be retrograde. That will make it interesting, and for once, I may not actually hate dealing with Emergency Calls in Regulatory Affairs either.

This is a VoIP week post on trefor.net. Check out other VoIP themed posts this week:

Why are major telcos afraid of encrypted VoIP? by Peter Cox
Emergency calls and VoIP by Peter Farmer
VoIP, the Bible and own brand chips by Simon Woodhead
Why the desktop VoIP telephone isn’t going away by Jeff Rodman
Small business VoIP setup by Trefor Davies
VoIP fraud-technological-conventionality-achieved  by Colin Duffy

Categories
Business voip

VoIP, the bible and own brand chips!

Cheap voip? Get what you pay for says Simon Woodhead.

It has been many years since I had to persuade someone that you got what you paid for with VoIP and that cheap voip routes were not the same as quality voip routes into bona fide networks, even though the transport may be the same. That cost obsessed underbelly of the industry still exists, but the vast majority of buyers of wholesale services now seek quality and have learned from mistakes of the past.

Along the way, those of us who started as pure-VoIP wholesalers have now grown into bona fide PSTN operators with SS7 interconnects into key trading partners. VoIP is the transport, not the product, and the product has improved drastically over the years.

Concurrently, previously pure-play TDM operators have discovered VoIP. Many now use VoIP for the exchange of international minutes, some even insist on it for domestic inter-carrier interconnects. Others have embraced it as an edge interface to an unchanged TDM core. Again, VoIP is the transport, not the product.

However, we’re now embarking on a new phase and I’m finding myself again echoing words of the past when speaking to potential customers. Those pure-play TDM operators who have relatively recently discovered this new VoIP toy are seeing the temptation of it not just as a transport but as a product, i.e. they can sell VoIP but rather than that being an interface to a stable core network and established interconnects, they can buy VoIP routes on the back-end and make extra margin. It is horrific from our position to test routes from global network operators and find them in some cases utterly unusable because they’ve tasted the forbidden fruit, and unlike the rest of us haven’t yet learned what a short-term game that is.

Others are pushing VoIP “interconnects” as an alternative to a regulated interconnect – a managed service outside of OFCOM’s scrutiny – at prices they dictate. Buyers of those products are seduced by the brand, the relative ease of set-up and have comfort that VoIP is the transport to a stable proven network and quality routes. In our experience they quickly learn that this is not the case.

We’ve even heard of established TDM operators dismantling their established TDM interconnects in favour of said VoIP-based managed services. Russian Roulette in many respects, especially with those customers paying for the established quality of a TDM core.

In short, having come from a time of VoIP being the product, learning and evolving to it simply being the transport, we’re sadly back there. Bigger, later, prestigious travellers are now seeing VoIP as a product on both the buy and sell side of their business. Rather like in the bible, it is the serpent urging them to taste the forbidden fruit and some are.

For practitioners this makes “caveat emptor” more applicable than ever. There’s no certainty that brand X represents a single level of service with multiple transports, but rather multiple levels of service at multiple price points. To put it in food terms, Sainsbury’s own brand chips range from premium to economy – you’re not getting premium at economy pricing just because it has their name on. Further, I’m reliably informed that Waitrose actually own their own farms, despite being a fraction of the size.

I have no doubt VoIP will continue to surplant TDM as a core transport for voice. In the interim, while it is luring the naive, be careful out there! Unforgiving consumers expect you to make the right choice. Cheap voip doesn’t necessarily mean good voip.

Previous post by Simon Woodhead on VoIP fraud. Simon is CEO of Simwood and is a respected comms industry veteran.

This is a VoIP week post on trefor.net. Check out other VoIP themed posts this week:

Why are major telcos afraid of encrypted VoIP? by Peter Cox
Emergency calls and VoIP by Peter Farmer
VoIP, the Bible and own brand chips by Simon Woodhead
Why the desktop VoIP telephone isn’t going away by Jeff Rodman
Small business VoIP setup by Trefor Davies
VoIP fraud-technological-conventionality-achieved  by Colin Duffy

Categories
broadband Business H/W UC voip voip hardware

Why the Desktop VoIP Telephone isn’t Going Away

Major leaps in technology allow business phones — the desktop VoIP telephone — to serve a rapidly growing range of needs.

Trefor.net welcomes “VoIP Week” contributor Jeff Rodman, Polycom‘s Chief Technology Evangelist. Since co-founding the company in 1990 Jeff has been instrumental in the realization of Polycom’s iconic products for voice, video, network communications, and other media.

The death of the desktop telephone has been predicted for decades. Technology has steadily advanced, business processes and communications needs have grown, and it’s actually rather surprising how that stodgy old friend the “desktop phone” has prospered. Look at its challenges: the PalmPilot, mobile phones and the Blackberry first, then on to Skype and other soft clients, unified information systems, mobile iOS, Windows and Android devices, teleworking, personal video calling, open-air workspaces, multiple Unified Communications and Control (UC&C) platforms, and the internet itself. And, of course, an always-growing need for specialised applications and consistent, efficient globalisation.

The desktop device remains firmly in place, though. What has actually happened is something that many didn’t see coming, yet is obvious in hindsight. The question was never really about when the desktop telephone would disappear, but rather how changing work needs and new technologies would shape its evolution.

“Personal transportation” did not disappear when Karl Benz introduced the Motorwagen in 1885, it evolved as technology moved beyond the horse. A broad range of personal transportation solutions emerged, from the motorbike to the motorhome, addressing such specific needs as the sedan, snowmobile, and all-terrain vehicle along the way. Similarly, the phone (which we might describe as a personal desktop live communications device) is not vanishing. It is, rather, becoming even more critical to business success, as it has advanced from its roots. Once merely the “black phone on a desk,” there is now a range of devices to cover an assortment of user needs from a basic desktop VOIP telephone to the rich integration of essential capabilities known as the Business Media Phone.

What is a phone today?

Modern business phones exist in many forms, but the most basic requirements they all share are durability and reliability. They are always on and ready for use, unlike cell phones, which require charged batteries and wireless connectivity. Similarly, soft clients or UC clients running on PCs must be running to accept calls or place calls. A phone is one thing we expect to always work, which is why they have traditionally been built like “brick houses,” never knowing who might slam down the handset, douse them with tea or drop them off of a tall table. Any phone is designed for a tightly defined set of uses, which it flawlessly performs. Whether a particular phone today supports only voice or a full bouquet of functions and applications, it is expected to do those jobs with unblinking confidence. As we will see, any device that might hope to take its place must be measured against this simple but essential standard of absolute reliability and responsiveness, one which we might call the “phone’s prime directive.”

Beyond this, major leaps in technology allow business phones to serve a rapidly growing range of needs. The adaptations to serve these can be broadly categorised in three directions— extensibility, unification, and media. Manageability and reliability, looking at the centralized support model removes the hassles from the end-user who can simply use it and doesn’t have to worry about software updates or configurations.

Extensibility

Whether PSTN, SIP, or some proprietary network, the most basic analogue phone needs only a handset and a phone cable. The underlying vision usually supports a much larger assortment of abilities, though, and different models within the same family will express different combinations. These can take the form of additional interfaces to support Bluetooth, wired, and DECT headsets, memory stick hosting to preserve conference audio, additional Ethernet jacks, “sidecar” accessories to provide one-touch selection of additional lines, and even add-on interactive HD video. Each of these extends the usefulness of a phone, by enabling future enhancement without burdening the initial purchase. The extent to which a phone can support this kind of evolution is one measure of its suitability for an organisation.

Unification

Although the range of abilities, environments, and platforms that might be supported by contemporary phones is much broader than it was just a few years ago, the user still expects them to work together simply and reliably. This means that functions must tie together transparently, and any complexity has to be neatly and efficiently concealed. The functions performed by the desktop phone must be able to connect to a wider set of networks; but more than that, the user’s experience has to remain consistent—a user cannot be confronted with wildly different behaviour just because, for example, SIP dialling and the Microsoft Lync platform are both in use within the organisation. For this reason, one essential requirement of a properly-implemented phone is that it retains compatibility with existing infrastructure. This means that interoperability among different UC and UC&C host platforms and simple, predictable behaviour is essential for a successful phone, whether it is a basic voice phone with enterprise directory access, or a full-fledged Business Media Phone, such as the Polycom range of VVX Business Media Phones.

Media

Today, conversations can take place among almost any combination of styles and environments (i.e., HD or narrowband voice, accompanying charts and presentations, HD video, small-screen video from a handheld device, or even Immersive Telepresence rooms). They can be between two people in only two places, or among a gathering of groups and individuals everywhere (i.e., at airports, desks, homes, workspaces and conference rooms).

Although there is today a growing expectation that participants will join meetings with video, a phone must give its user a clear perception of the meeting and also present its user as a competent, efficient participant in that meeting, whether the user has joined with video or only audio. This means that whether sitting in open spaces or quiet offices, phones must reject surrounding noise while allowing their users to speak clearly. Further, if video capable, they must send a clear, high-fidelity image even if their display is compact. Just as a user does not want to sound like they’re on a muffled Smartphone, they also want to look as if they’re working from a professional HD video system, not shaking and blurry with a precariously- mounted camera.

Conclusion

The desk phone has changed and today it does enormously more than it did in the past, yet it remains a keystone of effective business operation. By providing consistency, reliability, comfort, and an easily managed connection, there are few tools in business that prove their continuing worth as well, or as quickly, as well-built table-top voice or Business Media Phones.

Over the past three years, the tables have turned. Savings that some organisations had expected to gain by leveraging employee BYOD’s have evaporated as enterprises are often now the ones who buy those smartphones for employees, often at considerably higher life-cycle cost than a well-built desk phone. This is one reason that we’re really not entering a “smartphone world,” and why the market for real desktop phones of all descriptions continues to grow. Organisations that experiment with smartphones discover that they’re no panacea, and they return to the purpose-built and IT-friendly desktop phone — and especially to its powerful newer sibling the Business Media Phone — as the tool for doing what they do best, communications without compromise…

The bottom line is that regardless of what the final decision for each employee turns out to be, the first step toward making correct choices is to carefully investigate, taking care to understand what is important to the organisation and to each user, and get the facts about the options available when making a long-term investment such as a phone system.

This is a VoIP week post on trefor.net. Check out other VoIP themed posts this week:

Why are major telcos afraid of encrypted VoIP? by Peter Cox
Emergency calls and VoIP by Peter Farmer
VoIP, the Bible and own brand chips by Simon Woodhead
Why the desktop VoIP telephone isn’t going away by Jeff Rodman
Small business VoIP setup by Trefor Davies
VoIP fraud-technological-conventionality-achieved  by Colin Duffy

Categories
Business voip

Small business VoIP setup.

In which trefor.net looks at a small business VoIP setup.

Last week I took delivery of a new IP phone. Twas a Yealink T46G. I’ve been using my SGS4 with a skype client to make outbound calls to the pstn.   The droid has got an intermittent problem with the audio and whilst I’m waiting for my new Oneplus One to arrive (tomorrow if the gods of the East Midlands transport system are in a benevolent mood – it has arrived as I write yay) I figured it would do no harm to look at a small business VoIP setup and sign up with a number of VoIP service providers to compare their services.  The Yealink allows me to have 6 ITSP accounts.

It’s years since I’ve done any hands on phone testing. At Timico it got to the point where it was all done for me whilst I strummed the NetOps guitar and wrote blog posts. Back in the day the setting up of a new SIP phone was never straightforward. Every manufacturer had different ways of doing things, as did every service provider. Trying to match up which element of credentials went into which field on the phone could take days.

The Yealink was a breath of fresh air – v easy to set up. Having got the phone I then needed a service to use. There was no point in using Timico. I wouldn’t learn anything new there. A roll of the dice brought up Voipfone. Voipfone CEO Colin Duffy regularly contributes guest posts to this blog so it seemed a reasonable thing to do.

Voiphone have an automated front end. I created a new account and stuck a tenner’s worth of credit in. They gave me a password and I was off. However the service didn’t work straight away. I could get a dial tone and in fact was able to call Voipfone but no outbound. The guy at Voiphone sorted it in no time. Although they don’t sell Yealink phones they must have experience in dealing with most vendors’ kit.

I found the phone’s IP address – easily done from the menu – and stuck it in my browser address bar which took me to the phone’s web page. Username and password entered and we were able to check the settings. I’d missed a field for the outbound proxy server address. Doh!

Both phone and service worked beautifully. This is my experience of VoIP services generally, provided you have good enough connectivity. In my case I was on the ja.net network. In theory as good as it gets. I’ve also tried it at home from the office/conservatory and also no problem.

Now there’s a few things to note about this experience. Firstly it was very quick to get up and running. If I was a new business (which coincidentally I am) I could have my comms up and working in minutes.

Secondly If I had more than one business (which coincidentally I do) I could very easily set them both up with diffrerent numbers operating from the one handset. Your phone answering spiel wouild be driven by which line rings.

The Yealink feels good on the desk and in my hand. You might easily say a phone’s a phone and in one sense you would be right. The User Interface is important in a phone. It’s just little things like the rubber feet. They just feel right. Just the right amount of give when you touch the phone.

This isn’t really an advert for either Voipfone or Yealink. I just happened to use them though for a small business VoIP setup they are perfect. I could have used Timico or any other number of ITSPs. This is an advert for hosted VoIP telephony in general. I brought the phone home from the office today. Everyone else was out so I figured I might as well work from home. It’s comfortable, though I wouldn’t want to do it all the time.

Over the next chunk of time I’m going to take a look at various VoIP services and let you have my observations. In an ideal world I’d also have my Skype and Google accounts registered on the phone. Not there yet.

That’s all for now. It’s VoIP week on trefor.net. Y’all come back now.

PS I named the Voipfone line Colin. If I sign up with more ITSPs I’ll use their CEO’s names too:)

colin Voipfone

This is a VoIP week post on trefor.net. Check out other VoIP themed posts this week:

VoIP fraud-technological-conventionality-achieved  by Colin Duffy

Categories
Bad Stuff Business ofcom scams security voip

VoIP Fraud — Technological Conventionality Achieved

VoIP has reached the mainstream. We know because the fraudsters are coming after us.

Trefor.net welcomes VoIP Week guest contributor Colin Duffy, CEO of Voipfone and ITSPA Council member.

VoIP merges two of the largest industries in the world: Telecommunications ($5.0 trillion) and the Internet ($4.2 trillion). It is big business.

Estimates of VoIP market size vary, though they are universally large. For instance, Infotenetics Research estimates the global residential and business VoIP market to be worth $64bn in 2014, growing to $88bn in 2018. Visiongain, on another hand, puts the 2018 value at $76bn. WhichVoIP (Bragg) has it as $82.7bn by 2017, and also claims that VoIP calls account for 34% of global voice traffic – 172bn call minutes. And then there is the United States Federal Communications Commission, which estimates that “In December 2011, there were 107 million end-user switched access lines in service [..in the USA and..] 37 million interconnected VoIP subscriptions.

And with opportunity comes the thief:

ICT Recent Scenarios: VoIP Week: Colin Duffy
(Corporate ICT)

 

(You have to love that New Scotland Yard hack…..)

But it’s not confined to big organisations; perhaps a little closer to home:

“A family-run business says it has ‘nowhere left to turn’ after hackers rigged its telephone system to call premium rate phone numbers — racking up a bill of nearly £6,000. ‘We reported it to the police, but we were told there was very little likelihood of them catching anyone so they wouldn’t be able to investigate’, she added.”                               

— Lancashire Telegraph

The Communications Fraud Control Association publishes a global fraud loss survey, and in 2013 they estimated that the global telecommunication industry loss to fraud was an enormous $46.3bn, which included:

  • VoIP hacking ($3.6bn),
  • PBX hacking ($4.4bn),
  • Premium Rate Services Fraud ($4.7bn),
  • Subscription Fraud ($5.2bn)
  • International Revenue Share Fraud ($1.8).

Over 90% of the telephone companies included in the CFCA’s survey reported that fraud within their company had increased or stayed the same since the last report.

Globally, the top emerging fraud type was identified as Internet Revenue Sharing Fraud, with Premium Rate Service Fraud (both international and domestic) also in the top five. Of the top five emerging fraud methods, PBX Hacking was the most important with VoIP Hacking at number three.

Who’s doing all this is a big and interesting topic, but here’s a starter:

Top Ten Countries where fraud
TERMINATES

Top Ten Countries where fraud
ORIGINATES

*Latvia
Gambia
*Somalia
Guinea
Cuba
East Timor
Lithuania
Taiwan
*UK
USA
India
*UK
Brazil
Philippines
*Latvia
Pakistan
*Somalia
Spain
Bulgaria

CFCA, Global Fraud Loss Survey, 2013

What can be done?

Earlier this year a customer of Voiceflex was hacked to the tune of £35,000 when over 10,000 calls were sent to a Polish Premium Service number over a period of 36 hours. The customer refused to pay, which resulted in a court case that the telco lost. Now the industry is looking to its terms and conditions for protection, but it’s clear that this isn’t enough – the cause needs addressing.

The best approach would be to cut off the money supply – if Telcos could withhold payments for known fraudulent calls, the activity would end. But this solution requires changes to inter-operator agreements and cross-jurisdiction interventions.

“We are currently in discussions with our fellow EU regulators about steps that may be taken to address cross-border [Dial Through] fraud and misuse. It is important that companies using VoIP systems take steps to ensure both the physical and technical security of their equipment in order to avoid becoming an ‘easy target’ for this type of criminal activity […..] We are approaching the NICC and relevant trade associations to ensure their advice is updated to help businesses better protect themselves against newer types of dial-through fraud that have emerged as technology has developed.”

— Ofcom 2013

For once I agree with Ofcom. The industry needs to work harder at target-hardening. We need to be making this industry safer for our customers.

There’s a lot to be done but a good start is to read and apply the guidance issued by ITSPA – the UK trade organisation for Internet Telcos.

I’m taking a close personal interest in VoIP fraud and security, and I invite anyone who has more information or who wishes to discuss this in more detail to contact me at colin@voipfone.co.uk email

A naive user asked me, ‘why can’t you just make safe telephones?’ Well, why can’t we?

Categories
broadband End User

BROADBANDRating soft launch – feedback welcomed

The BROADBANDRating soft launch happens today folks.

Today is the BROADBANDRating soft launch. BROADBANDRating is a new trefor.net property that seeks to help consumers with their choice of broadband provider. Rather than being  site that just compares broadband deals we want to help people decide which ISP to go for.

This is actually quite a difficult task after all there are basically only two flavours of networks in the UK: Virgin Media and BT and most products are the same.  For the purposes of this activity we aren’t including the small emerging players who have a limited geographic coverage. All the big ISPs offer highly competitive packages, eg free Fibrebroadband for 12 months (!!!), and occasionally they chuck in amazing sign up deals. For example at the moment TalkTalk are offering £100 worth of Love2shop vouchers to go with an already cheap deal whether you choose regular broadband or Fibre broadband (sorry to lapse into non ADSL2+ and FTTC speak – this consumer game is affecting me :)).

The site is probably only 30% finished but it is good enough to get us started kicking a few tyres. The idea is that we have different metrics that we use to judge an ISP’s service. Initially these include “Phone Answer”, plainly speaking how long it takes a helpdesk to answer the phone, and “Social Media Rating”.

Working on “Phone Answer” has been quite interesting not all providers work the same way. Some ask for a minimal amount of information before sticking you in the call queue. On the other hand others, and Virgin Media specifically spring to mind here, take you through an IVR tree that includes some diagnostics. When emerging from the IVR queue the phone is answered immediately. This has to go down as a highly responsive service on the part of Virgin but is still involves queuing time. We just record the time it takes to get to a human because I think that is what most people will want. All ISPs are called at roughly the same time of day which may differ each day. The response times are converted into star ratings based on a formula that takes into consideration recent historical data.

The Social Media Rating is essentially Twitter Sentiment Analysis. This has been an eye opener. We use a tool to do a first pass Sentiment Analysis and then run a human check. You certainly couldn’t give the checking job to a minor. The language used can be seriously juicy. It also shows how much people have come to rely on their broadband connection and the emotions brought out when the B*&^%y thing doesn’t work. Some ISPs definitely seem to come out worse than others on Twitter. We expect that we will be able to show who gets more outages over a period of time than others because when this happens Twitter gets flooded with complaints. A week or so later and people may have calmed down. We rate a few thousand tweets a week. We must bear in mind that the ISPs listed have millions of subscribers so the complaining tweets represent only a tiny proportion of their customers. One has to consider how many people just put up with problems without complaint.

Social Media Rating currently attracts a higher weighting than Telephone Answer although we will be monitoring this and perhaps tweaking as we add more metrics. How we specifically rate for each category is listed here on the BROADBANDRating site. Some metrics will change more regularly than others based on the type of data being measured. The site should change most days.

BROADBANDRating is up and running but not yet being shouted about. We would be happy to receive feedback, positive or otherwise about any aspect of the site. The links should all work. Maybe you have some observations about the User Interface. It is still very much work in progress and as already mentioned we are only around 30% of the way through.

Please feel free to click on one and if you like what you see buy the service. There are some amazing deals, and that’s not just me saying. Affiliate Marketing commissions are the name of the game.

PS a few related posts here and here.

Categories
Cloud Engineer

WHD local London invite to LONAP members and prospects

LONAP members and prospective members are invited to a LONAP lunch at WHD local London in the Strand on Friday 10th October.

This is a rescheduling of one I wrote earlier. Following on from LONAP director Will Hargrave’s  talk at last year’s WHD local London I am heading there myself (fwiw) on Friday October 10th to do a talk entitled “Under the hood of the internet – how peering helps with your end user experience”. I’m on at 11.35.

Tickets for the show are free and there is what could be quite an interesting line up (see below – some are salesey but there is enough interest there I think).

This is a bit of free publicity for LONAP but if we can get some members there I’m proposing to have a LONAP lunch (after all I’ll have finished my talk !:) and invite one or two of the speakers talking about cloud services to join us for a round table discussion. If you don’t want to come for the whole day one option is to just come for the morning and leave after the lunch. It is on a Friday after all.

I think this could be a worthwhile use of time. If anyone fancies coming along use this sign up linkhttp://www.worldhostingdays.com/de/whd-local-registration.php?code=MLOLMKLX (code is MLOLMKLX).

Also let me know if you are coming as I will make arrangements to book a table for lunch – it’s at the Melia Hotel on the Strand (Conde Nast Traveller Hotlist) so there should be something appropriately nice on offer.

WGH local Londonschedule
Admittance and Registration
9:30 am
Welcoming speech
9:40 am

“Digital disruption: 5 steps to accelerating customer adoption of your cloud services”
David Ednie, President and CEO, SalesChannel Europe
10:25 am

“Don’t lose customers to public cloud providers”
Markus Galler, VP of Sales, RushFiles
10:40 am

“Do you want a Mobile with that?”
Ivo Meekel, Business Development Director, dotMobi
10:50 am
Coffee-Break
11:20 am

“Email Security 2.0. Integration and Automation ”
Sam Renkema, CEO, SpamExperts
11:35 am

“Under the hood of the internet – how peering helps with your end user experience”
Trefor Davies, Director Lonap & trefor.net, LONAP
12:10 pm
“Putting the cloud to work for real businesses. Proven models for success in a true multi-service world.”
John Burke, Account Manager Mid-Market, CEE, Parallels
12:40 pm
Lunch
1:40 pm

“Global Trends in SSL Protection and Future Challenges”
Arkadiusz Szczurowski, CEO, SSLGuru
1:55 pm

“Any Data, Any Where? Localizing the Cloud”
Christian Diderich, VP Cloud Service Providers, Acronis
2:10 pm

“The new chapter of EU e-Commerce Qualified Trusted Services in the Cloud”
Marcin Szulga, Head of Research and Development, Unizeto
2:25 pm

“Simplifying server memory and SSD storage ”
Miriam Brown, Business Development Manager, Kingston
2:40 pm

“Black Lotus Communications DDoS Protection Services”
Frank Ip, VP of Marketing and Business Development, Black Lotus
2:50 pm
Coffee-Break
3:20 pm
“Securing uptime while maintaining network neutrality”
Johan Schuijt, CTO TransIP, TransIP; NSFOCUS
3:35 pm

“Hosting companies are dying. Is yours next?”
Nikolay Nedev, Senior Account Manager, reseller.plusserver
3:50 pm

“DDoS mitigation – Effective strategy for Hosters”
Duncan Hume, Senior Vice President, RioRey
4:05 pm

“Panel Discussion: The DOVECOT Story – how a one man open-source IMAP Server project is now powering most ISPs of the world and serving Emails to over 2 billion people.”
Mikko Linnamäki, Co-Founder, Dovecot OY
Soeren von Varchmin, General Manager, WorldHostingDays