T1 Lines Phone LInes

Posted on 2011-10-21
Last Modified: 2012-05-12
I work for a internet based company, We have internet and phone.  Can have my phone on just a broad band signal, and the Data going on the T1?
Question by:PRNAdmin
    LVL 60

    Accepted Solution

    I will assume you already has a IP. Capable. phone. T1 is just another more expensive broadband leased line serving greater speed and reliability compared to DSL or cable modem. You should be able to do it since the phone can work in IP data based comms.  But will need to check service provider offering of T1 as it can carry voice as well.

    Something useful from wikipedia

     When a T-1 is installed, there are a number of choices to be made: in the carrier chosen, the location of the demarcation point
    , the type of channel service unit
     (CSU) or data service unit
     (DSU) used, the WAN
     IP router
     used, the types of bandwidths chosen, etc. Specialized WAN routers are used with T-1 lines that route Internet or VPNdata onto the T-1 line from the subscriber's packet-based (TCP/IP)  network using customer premises equipment (CPE). The CPE typical consists of a CSU/DSU that converts the DS-1 data stream of the T-1 to a TCP/IP packet data stream for use in the customer's Ethernet LAN. It is noteworthy that many T-1 providers optionally maintain and/or sell the CPE as part of the service contract, which can affect the demarcation point and the ownership of the router, CSU, or DSU.
    LVL 27

    Expert Comment

    This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Enabling OSINT in Activity Based Intelligence

    Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

    Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now