Cisco Cisco Customer Response Solution Downloads Guía De Instalación Rápida
Accessing Audio Streams
November 2013
13
Accessing Audio Streams
Accessing the streams of audio data is where things start to get complex. This is
because network hardware and software and IP protocols themselves are created
with an eye toward security. When packets of data are to be sent from endpoint A to
endpoint B, we don't want other endpoints to see that data because it is considered
private. We can’t just plug a computer into a network and tell it we want to see all the
data being sent to and received from another computer.
because network hardware and software and IP protocols themselves are created
with an eye toward security. When packets of data are to be sent from endpoint A to
endpoint B, we don't want other endpoints to see that data because it is considered
private. We can’t just plug a computer into a network and tell it we want to see all the
data being sent to and received from another computer.
In the case of IP phone calls, all we know is that there are two endpoints (in this case,
IP phones) that are exchanging packets containing audio data (
IP phones) that are exchanging packets containing audio data (
The phones are sending packets into and receiving packets from the network cloud.
This cloud hides a lot of complexity (
This cloud hides a lot of complexity (
). In a packet-switched network, packets
can be routed almost anywhere. They will not always follow the same path through the
network cloud. There can be delays or outages that require resending or rerouting
data.
network cloud. There can be delays or outages that require resending or rerouting
data.
Figure 4.
An IP call traversing the network
Figure 5.
The network cloud revealed