<div dir="ltr">That's pretty cool. Have a feeling that given the logo not cheap though.</div><div class="gmail_extra"><br clear="all"><div><div><b><br></b></div><b>Max Clark</b><br>Managing Director | Phyber Communications<br>
+1 (213) 929 1700 | <a href="mailto:mclark@phyber.com" target="_blank">mclark@phyber.com</a><br><br>Visit us at <a href="http://www.phyber.com" target="_blank">www.phyber.com</a><br><br>Hosting | Network | Voice</div>
<br><br><div class="gmail_quote">On Wed, Feb 12, 2014 at 1:10 PM, Matthew Crocker <span dir="ltr"><<a href="mailto:matthew@corp.crocker.com" target="_blank">matthew@corp.crocker.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div style="word-wrap:break-word"><div><br></div>Broadsoft PacketSmart<div><br></div><div><a href="http://www.broadsoft.com/products/packetsmart/voippro/" target="_blank">http://www.broadsoft.com/products/packetsmart/voippro/</a></div>
<div><div class=""><br><div>
<div>--<br>Matthew S. Crocker<br>President<br>Crocker Communications, Inc.<br>PO BOX 710<br>Greenfield, MA 01302-0710<br><br>E: <a href="mailto:matthew@crocker.com" target="_blank">matthew@crocker.com</a><br>P: <a href="tel:%28413%29%20746-2760" value="+14137462760" target="_blank">(413) 746-2760</a><br>
F: <a href="tel:%28413%29%20746-3704" value="+14137463704" target="_blank">(413) 746-3704</a><br>W: <a href="http://www.crocker.com" target="_blank">http://www.crocker.com</a></div><div><br></div><br>
</div>
<br></div><div><div class="h5"><div><div>On Feb 12, 2014, at 4:03 PM, Max Clark <<a href="mailto:mclark@phyber.com" target="_blank">mclark@phyber.com</a>> wrote:</div><br><blockquote type="cite"><div dir="ltr">Along this thought we've been looking for an appliance/probe that can be easily installed behind the firewall at a customer location. Simply put something simpler/cheaper than an Edgewater EdgeMarc.<div>
<br></div><div>Max</div></div><div class="gmail_extra"><br clear="all"><div><div><b><br></b></div><b>Max Clark</b><br>Managing Director | Phyber Communications<br><a href="tel:%2B1%20%28213%29%20929%201700" value="+12139291700" target="_blank">+1 (213) 929 1700</a> | <a href="mailto:mclark@phyber.com" target="_blank">mclark@phyber.com</a><br>
<br>Visit us at <a href="http://www.phyber.com/" target="_blank">www.phyber.com</a><br><br>Hosting | Network | Voice</div>
<br><br><div class="gmail_quote">On Wed, Feb 12, 2014 at 12:15 PM, Brian Knight <span dir="ltr"><<a href="mailto:ml@knight-networks.com" target="_blank">ml@knight-networks.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div dir="ltr"><div>$DAY_JOB is at a national ISP/NSP where we resell VoIP services. We do peering with the VoIP carrier at one of our remote POP's. We are looking for a better way to be able to monitor the handoff of those calls to our carrier over that peering link.</div>
<div><br></div><div>We have quite a bit of instrumentation within our walled garden to tell us about call quality. We can monitor our QOS policies to ensure packets aren't being dropped by intermediate routers. If the customer uses our routers to terminate their SIP session, we can pull call quality stats from those routers as well. We can also use our own office telephones to make and receive test telephone calls, and we can of course run Wireshark captures from the switches to which those phones are connected.<br>
</div><div><br></div><div>However, we can't say for certain that the customer's RTP traffic actually made it on the wire connecting us to the VoIP provider, nor can we say that the traffic is being transmitted and received properly. The peering link is connected to a Cisco 12k router on our side, so there is no way (afaik) to mirror the port, as on a switch.</div>
<div><br></div><div>For the moment, I am envisioning that we'll need to deploy a server running Wireshark to the remote POP. It will need two network interfaces; one connected to a management network, the other a capture interface. The capture interface will connect to a network tap, and the network tap connected in-line between our router and the patch panel.</div>
<div><br></div><div>Wireshark is probably adequate for what we need. But I'm wondering if there is any software or an appliance that would do the job better. Given the usual details - calling number, called number, date and time - we want to be able to quickly inspect traffic and dig into the details of the stream. Do we see any missing packets from the media stream? What is the MOS score of a particular call? Do we see any missing packets coming from us? Any missing packets from the provider?</div>
<div><br></div><div>Alerting on bad call quality would be a nice-to-have addition.</div><div><br></div><div>Any recommendation would be appreciated. Thanks in advance.</div><span><font color="#888888"><div>
<br></div><div>-Brian Knight</div></font></span></div>
<br>_______________________________________________<br>
VoiceOps mailing list<br>
<a href="mailto:VoiceOps@voiceops.org" target="_blank">VoiceOps@voiceops.org</a><br>
<a href="https://puck.nether.net/mailman/listinfo/voiceops" target="_blank">https://puck.nether.net/mailman/listinfo/voiceops</a><br>
<br></blockquote></div><br></div>
_______________________________________________<br>VoiceOps mailing list<br><a href="mailto:VoiceOps@voiceops.org" target="_blank">VoiceOps@voiceops.org</a><br><a href="https://puck.nether.net/mailman/listinfo/voiceops" target="_blank">https://puck.nether.net/mailman/listinfo/voiceops</a><br>
</blockquote></div><br></div></div></div></div></blockquote></div><br></div>