Jump to content

Voice over IP

From Wikipedia, the free encyclopedia
(Redirected fromVOIP)

Voice over Internet Protocol(VoIP[a]), also calledIP telephony,is a method and group of technologies forvoice callsfor the delivery ofvoice communicationsessions overInternet Protocol(IP) networks,[2]such as theInternet.

The broader termsInternet telephony,broadband telephony,andbroadband phone servicespecifically refer to the provisioning of voice and other communications services (fax,SMS,voice messaging) over the Internet, rather than via thepublic switched telephone network(PSTN), also known asplain old telephone service(POTS).

Overview[edit]

The steps and principles involved in originating VoIP telephone calls are similar to traditional digitaltelephonyand involve signaling, channel setup, digitization of the analog voice signals, and encoding. Instead of being transmitted over acircuit-switched network,the digital information is packetized and transmission occurs as IP packets over apacket-switched network.They transport media streams using special media delivery protocols that encode audio and video withaudio codecsandvideo codecs.Various codecs exist that optimize the media stream based on application requirements and network bandwidth; some implementations rely onnarrowbandandcompressed speech,while others supporthigh-fidelitystereo codecs.

The most widely usedspeech codingstandards in VoIP are based on thelinear predictive coding(LPC) andmodified discrete cosine transform(MDCT) compression methods. Popular codecs include the MDCT-basedAAC-LD(used inFaceTime), the LPC/MDCT-basedOpus(used inWhatsApp), the LPC-basedSILK(used inSkype),μ-lawandA-lawversions ofG.711,G.722,and anopen sourcevoice codec known asiLBC,a codec that uses only 8 kbit/s each way calledG.729.

Early providers of voice-over-IP services used business models and offered technical solutions that mirrored the architecture of the legacy telephone network. Second-generation providers, such asSkype,built closed networks for private user bases, offering the benefit of free calls and convenience while potentially charging for access to other communication networks, such as the PSTN. This limited the freedom of users to mix-and-match third-party hardware and software. Third-generation providers, such asGoogle Talk,adopted the concept offederated VoIP.[3]These solutions typically allow dynamic interconnection between users in any two domains of the Internet, when a user wishes to place a call.

In addition toVoIP phones,VoIP is also available on many personal computers and other Internet access devices. Calls and SMS text messages may be sent viaWi-Fior the carrier'smobile datanetwork.[4]VoIP provides a framework for consolidation of all modern communications technologies using a singleunified communicationssystem.

Protocols[edit]

Voice over IP has been implemented withproprietary protocolsand protocols based onopen standardsin applications such as VoIP phones, mobile applications, andweb-based communications.

A variety of functions are needed to implement VoIP communication. Some protocols perform multiple functions, while others perform only a few and must be used in concert. These functions include:

  • Networkandtransport– Creating reliable transmission over unreliable protocols, which may involve acknowledging receipt of data and retransmitting data that wasn't received.
  • Session management– Creating and managing asession(sometimes glossed as simply a "call" ), which is a connection between two or more peers that provides a context for further communication.
  • Signaling– Performing registration (advertising one's presence and contact information) and discovery (locating someone and obtaining their contact information), dialing (including reportingcall progress), negotiating capabilities, and call control (such as hold, mute, transfer/forwarding, dialing DTMF keys during a call [e.g. to interact with anautomated attendantorIVR], etc.).
  • Media description– Determining what type of media to send (audio, video, etc.), how to encode/decode it, and how to send/receive it (IP addresses, ports, etc.).
  • Media– Transferring the actual media in the call, such as audio, video, text messages, files, etc.
  • Quality of service– Providing out-of-band content or feedback about the media such assynchronization,statistics, etc.
  • Security– Implementing access control, verifying the identity of other participants (computers or people), and encrypting data to protect the privacy and integrity of the media contents and/or the control messages.

VoIP protocols include:

Adoption[edit]

Consumer market[edit]

Example of residential network including VoIP

Mass-market VoIP services use existingbroadband Internet access,by which subscribers place and receive telephone calls in much the same manner as they would via the PSTN. Full-service VoIP phone companies provide inbound and outbound service withdirect inbound dialing.Many offer unlimited domestic calling and sometimes international calls for a flat monthly subscription fee. Phone calls between subscribers of the same provider are usually free when flat-fee service is not available.[8]

A VoIP phone is necessary to connect to a VoIP service provider. This can be implemented in several ways:

  • Dedicated VoIP phones connect directly to the IP network using technologies such as wiredEthernetorWi-Fi.These are typically designed in the style of traditional digital business telephones.
  • Ananalog telephone adapterconnects to the network and implements the electronics and firmware to operate a conventional analog telephone attached through a modular phone jack. Some residential Internet gateways andcable modemshave this function built in.
  • Softphoneapplication software installed on a networked computer that is equipped with a microphone and speaker, or headset. The application typically presents a dial pad and display field to the user to operate the application by mouse clicks or keyboard input.[9]

PSTN and mobile network providers[edit]

It is increasingly common for telecommunications providers to use VoIP telephony over dedicated and public IP networks as abackhaulto connect switching centers and to interconnect with other telephony network providers; this is often referred to asIP backhaul.[10][11]

Smartphonesmay have SIP clients built into the firmware or available as an application download.[12][13]

Corporate use[edit]

Because of the bandwidth efficiency and low costs that VoIP technology can provide, businesses are migrating from traditional copper-wire telephone systems to VoIP systems to reduce their monthly phone costs. In 2008, 80% of all newPrivate branch exchange(PBX) lines installed internationally were VoIP.[14]For example, in the United States, theSocial Security Administrationis converting its field offices of 63,000 workers from traditional phone installations to a VoIP infrastructure carried over its existing data network.[15][16]

VoIP allows both voice and data communications to be run over a single network, which can significantly reduce infrastructure costs. The prices of extensions on VoIP are lower than for PBX and key systems. VoIP switches may run on commodity hardware, such aspersonal computers.Rather than closed architectures, these devices rely on standard interfaces.[17]VoIP devices have simple, intuitive user interfaces, so users can often make simple system configuration changes. Dual-mode phones enable users to continue their conversations as they move between an outside cellular service and an internalWi-Finetwork, so that it is no longer necessary to carry both a desktop phone and a cell phone. Maintenance becomes simpler as there are fewer devices to oversee.[17]

VoIP solutions aimed at businesses have evolved intounified communicationsservices that treat all communications—phone calls, faxes, voice mail, e-mail, web conferences, and more—as discrete units that can all be delivered via any means and to any handset, including cellphones. Two kinds of service providers are operating in this space: one set is focused on VoIP for medium to large enterprises, while another is targeting the small-to-medium business (SMB) market.[18]

Skype,which originally marketed itself as a service among friends, has begun to cater to businesses, providing free-of-charge connections between any users on the Skype network and connecting to and from ordinary PSTN telephones for a charge.[19]

Delivery mechanisms[edit]

In general, the provision of VoIP telephony systems to organizational or individual users can be divided into two primary delivery methods: private or on-premises solutions, or externally hosted solutions delivered by third-party providers. On-premises delivery methods are more akin to the classic PBX deployment model for connecting an office to local PSTN networks.

While many use cases still remain for private or on-premises VoIP systems, the wider market has been gradually shifting towardCloudorHostedVoIP solutions. Hosted systems are also generally better suited to smaller or personal use VoIP deployments, where a private system may not be viable for these scenarios.

Hosted VoIP systems[edit]

HostedorCloudVoIP solutions involve a service provider or telecommunications carrier hosting the telephone system as a software solution within their own infrastructure.

Typically this will be one or more datacentres, with geographic relevance to the end-user(s) of the system. This infrastructure is external to the user of the system and is deployed and maintained by the service provider.

Endpoints, such as VoIP telephones or softphone applications (apps running on a computer or mobile device), will connect to the VoIP service remotely. These connections typically take place over public internet links, such as local fixed WAN breakout or mobile carrier service.

Private VoIP systems[edit]

Asterisk-based PBX for small business

In the case of a private VoIP system, the primary telephony system itself is located within the private infrastructure of the end-user organization. Usually, the system will be deployed on-premises at a site within the direct control of the organization. This can provide numerous benefits in terms of QoS control (seebelow), cost scalability, and ensuring privacy and security of communications traffic. However, the responsibility for ensuring that the VoIP system remains performant and resilient is predominantly vested in the end-user organization. This is not the case with a Hosted VoIP solution.

Private VoIP systems can be physical hardware PBX appliances, converged with other infrastructure, or they can be deployed as software applications. Generally, the latter two options will be in the form of a separate virtualized appliance. However, in some scenarios, these systems are deployed on bare metal infrastructure or IoT devices. With some solutions, such as 3CX, companies can attempt to blend the benefits of hosted and private on-premises systems by implementing their own private solution but within an external environment. Examples can includedatacentrecollocation services, public cloud, or private cloud locations.

For on-premises systems, local endpoints within the same location typically connect directly over theLAN.For remote and external endpoints, available connectivity options mirror those of Hosted or Cloud VoIP solutions.

However, VoIP traffic to and from the on-premises systems can often also be sent over secure private links. Examples include personal VPN,site-to-site VPN,private networks such as MPLS and SD-WAN, or via private SBCs (Session Border Controllers). While exceptions and private peering options do exist, it is generally uncommon for those private connectivity methods to be provided by Hosted or Cloud VoIP providers.

Quality of service[edit]

Communication on the IP network is perceived as less reliable in contrast to the circuit-switched public telephone network because it does not provide a network-based mechanism to ensure that data packets are not lost, and are delivered in sequential order. It is a best-effort network without fundamentalquality of service(QoS) guarantees. Voice, and all other data, travels in packets over IP networks with fixed maximum capacity. This system may be more prone to data loss in the presence of congestion[b]than traditionalcircuit switchedsystems; a circuit switched system of insufficient capacity will refuse new connections while carrying the remainder without impairment, while the quality of real-time data such as telephone conversations on packet-switched networks degrades dramatically.[21]Therefore, VoIP implementations may face problems withlatency,packet loss, andjitter.[21][22]

By default, network routers handle traffic on a first-come, first-served basis. Fixed delays cannot be controlled as they are caused by the physical distance the packets travel. They are especially problematic when satellite circuits are involved because of the long distance to ageostationary satelliteand back; delays of 400–600 ms are typical. Latency can be minimized by marking voice packets as being delay-sensitive with QoS methods such asDiffServ.[21]

Network routers on high volume traffic links may introduce latency that exceeds permissible thresholds for VoIP. Excessive load on a link can cause congestion and associatedqueueing delaysandpacket loss.This signals a transport protocol likeTCPto reduce its transmission rate to alleviate the congestion. But VoIP usually usesUDPnot TCP because recovering from congestion through retransmission usually entails too much latency.[21]So QoS mechanisms can avoid the undesirable loss of VoIP packets by immediately transmitting them ahead of any queued bulk traffic on the same link, even when the link is congested by bulk traffic.

VoIP endpoints usually have to wait for the completion of transmission of previous packets before new data may be sent. Although it is possible to preempt (abort) a less important packet in mid-transmission, this is not commonly done, especially on high-speed links where transmission times are short even for maximum-sized packets.[23]An alternative to preemption on slower links, such as dialup anddigital subscriber line(DSL), is to reduce the maximum transmission time by reducing themaximum transmission unit.But since every packet must contain protocol headers, this increases relative header overhead on every link traversed.[23]

The receiver must resequence IP packets that arrive out of order and recover gracefully when packets arrive too late or not at all.Packet delay variationresults from changes inqueuing delayalong a given network path due to competition from other users for the same transmission links. VoIP receivers accommodate this variation by storing incoming packets briefly in aplayout buffer,deliberately increasing latency to improve the chance that each packet will be on hand when it is time for thevoice engineto play it. The added delay is thus a compromise between excessive latency and excessivedropout,i.e. momentary audio interruptions.

Although jitter is a random variable, it is the sum of several other random variables that are at least somewhat independent: the individual queuing delays of the routers along the Internet path in question. Motivated by thecentral limit theorem,jitter can be modeled as aGaussian random variable.This suggests continually estimating the mean delay and its standard deviation and setting the playout delay so that only packets delayed more than several standard deviations above the mean will arrive too late to be useful. In practice, the variance in latency of many Internet paths is dominated by a small number (often one) of relatively slow and congestedbottleneck links.Most Internet backbone links are now so fast (e.g. 10 Gbit/s) that their delays are dominated by thetransmissionmedium (e.g. optical fiber) and the routers driving them do not have enough buffering for queuing delays to be significant.[24]

A number of protocols have been defined to support the reporting ofquality of service(QoS) andquality of experience(QoE) for VoIP calls. These includeRTP Control Protocol(RTCP) extended reports,[25]SIP RTCP summary reports, H.460.9 Annex B (forH.323),H.248.30 and MGCP extensions.

The RTCP extended report VoIP metrics block specified byRFC3611is generated by an VoIP phone or gateway during a live call and contains information on packet loss rate, packet discard rate (because of jitter), packet loss/discard burst metrics (burst length/density, gap length/density), network delay, end system delay, signal/noise/echo level,mean opinion scores(MOS) and R factors and configuration information related to the jitter buffer. VoIP metrics reports are exchanged between IP endpoints on an occasional basis during a call, and an end of call message sent via SIP RTCP summary report or one of the other signaling protocol extensions. VoIP metrics reports are intended to support real-time feedback related to QoS problems, the exchange of information between the endpoints for improved call quality calculation and a variety of other applications.

DSL and ATM[edit]

DSL modems typically provide Ethernet connections to local equipment, but inside they may actually beAsynchronous Transfer Mode(ATM) modems.[c]They useATM Adaptation Layer 5(AAL5) to segment each Ethernet packet into a series of 53-byte ATM cells for transmission, reassembling them back into Ethernet frames at the receiving end.

Using a separatevirtual circuit identifier(VCI) for voice over IP has the potential to reduce latency on shared connections. ATM's potential for latency reduction is greatest on slow links because worst-case latency decreases with increasing link speed. A full-size (1500 byte) Ethernet frame takes 94 ms to transmit at 128 kbit/s but only 8 ms at 1.5 Mbit/s. If this is the bottleneck link, this latency is probably small enough to ensure good VoIP performance without MTU reductions or multiple ATM VCs. The latest generations of DSL,VDSLandVDSL2,carry Ethernet without intermediate ATM/AAL5 layers, and they generally supportIEEE 802.1ppriority tagging so that VoIP can be queued ahead of less time-critical traffic.[21]

ATM has substantial header overhead: 5/53 = 9.4%, roughly twice the total header overhead of a 1500 byte Ethernet frame. This "ATM tax" is incurred by every DSL user whether or not they take advantage of multiple virtual circuits – and few can.[21]

Layer 2[edit]

Several protocols are used in thedata link layerandphysical layerfor quality-of-service mechanisms that help VoIP applications work well even in the presence ofnetwork congestion.Some examples include:

  • IEEE 802.11eis an approved amendment to theIEEE 802.11standard that defines a set of quality-of-service enhancements for wireless LAN applications through modifications to themedia access control(MAC) layer. The standard is considered of critical importance for delay-sensitive applications, such as voice over wireless IP.
  • IEEE 802.1pdefines 8 different classes of service (including one dedicated to voice) for traffic on layer-2 wiredEthernet.
  • TheITU-TG.hnstandard, which provides a way to create a high-speed (up to 1 gigabit per second)Local area network(LAN) using existing home wiring (power lines,phone lines andcoaxial cables). G.hn provides QoS by means of Contention-Free Transmission Opportunities (CFTXOPs) which are allocated to flows (such as a VoIP call) that require QoS and which have negotiated acontractwith the network controllers.

Performance metrics[edit]

The quality of voice transmission is characterized by several metrics that may be monitored by network elements and by the user agent hardware or software. Such metrics include networkpacket loss,packetjitter,packetlatency(delay), post-dial delay, and echo. The metrics are determined by VoIP performance testing and monitoring.[26][27][28][29][30][31]

PSTN integration[edit]

A VoIP media gateway controller (akaClass 5Softswitch) works in cooperation with a media gateway (aka IP Business Gateway) and connects the digital media stream, so as to complete the path for voice and data. Gateways include interfaces for connecting to standard PSTN networks. Ethernet interfaces are also included in the modern systems which are specially designed to link calls that are passed via VoIP.[32]

E.164is a global numbering standard for both the PSTN andpublic land mobile network(PLMN). Most VoIP implementations supportE.164to allow calls to be routed to and from VoIP subscribers and the PSTN/PLMN.[33]VoIP implementations can also allow other identification techniques to be used. For example,Skypeallows subscribers to chooseSkype names(usernames)[34]whereas SIP implementations can useUniform Resource Identifier(URIs) similar toemail addresses.[35]Often VoIP implementations employ methods of translating non-E.164 identifiers to E.164 numbers and vice versa, such as the Skype-In service provided by Skype[36]and theE.164 number to URI mapping(ENUM) service in IMS and SIP.[37]

Echo can also be an issue for PSTN integration.[38]Common causes of echo includeimpedance mismatchesin analog circuitry and an acoustic path from the receive to transmit signal at the receiving end.

Number portability[edit]

Local number portability(LNP) andmobile number portability(MNP) also impact VoIP business. Number portability is a service that allows a subscriber to select a new telephone carrier without requiring a new number to be issued. Typically, it is the responsibility of the former carrier to "map" the old number to the undisclosed number assigned by the new carrier. This is achieved by maintaining a database of numbers. A dialed number is initially received by the original carrier and quickly rerouted to the new carrier. Multiple porting references must be maintained even if the subscriber returns to the original carrier. TheFederal Communications Commission(FCC) mandates carrier compliance with these consumer-protection stipulations. In November 2007, the FCC in the United States released an order extending number portability obligations to interconnected VoIP providers and carriers that support VoIP providers.[39]

A voice call originating in the VoIP environment also facesleast-cost routing(LCR) challenges to reach its destination if the number is routed to a mobile phone number on a traditional mobile carrier. LCR is based on checking the destination of each telephone call as it is made, and then sending the call via the network that will cost the customer the least. This rating is subject to some debate given the complexity of call routing created by number portability. With MNP in place, LCR providers can no longer rely on using the network root prefix to determine how to route a call. Instead, they must now determine the actual network of every number before routing the call.[40]

Therefore, VoIP solutions also need to handle MNP when routing a voice call. In countries without a central database, like the UK, it may be necessary to query the mobile network about which home network a mobile phone number belongs to. As the popularity of VoIP increases in the enterprise markets because of LCR options, VoIP needs to provide a certain level of reliability when handling calls.

Emergency calls[edit]

A telephone connected to aland linehas a direct relationship between a telephone number and a physical location, which is maintained by the telephone company and available to emergency responders via the national emergency response service centers in form of emergency subscriber lists. When an emergency call is received by a center the location is automatically determined from its databases and displayed on the operator console.

In IP telephony, no such direct link between location and communications end point exists. Even a provider having wired infrastructure, such as a DSL provider, may know only the approximate location of the device, based on theIP addressallocated to the network router and the known service address. Some ISPs do not track the automatic assignment of IP addresses to customer equipment.[41]

IP communication provides for device mobility. For example, a residential broadband connection may be used as a link to avirtual private networkof a corporate entity, in which case the IP address being used for customer communications may belong to the enterprise, not the residential ISP. Suchoff-premises extensionsmay appear as part of an upstream IP PBX. On mobile devices, e.g., a 3G handset or USB wireless broadband adapter, the IP address has no relationship with any physical location known to the telephony service provider, since a mobile user could be anywhere in a region with network coverage, even roaming via another cellular company.

At the VoIP level, a phone or gateway may identify itself by its account credentials with aSession Initiation Protocol(SIP) registrar. In such cases, theInternet telephony service provider(ITSP) knows only that a particular user's equipment is active. Service providers often provide emergency response services by agreement with the user who registers a physical location and agrees that, if an emergency number is called from the IP device, emergency services are provided to that address only.

Such emergency services are provided by VoIP vendors in the United States by a system calledEnhanced 911(E911), based on theWireless Communications and Public Safety Act.The VoIP E911 emergency-calling system associates a physical address with the calling party's telephone number. All VoIP providers that provide access to the public switched telephone network are required to implement E911, a service for which the subscriber may be charged. "VoIP providers may not allow customers to opt-out of 911 service."[41]TheVoIP E911system is based on a static table lookup. Unlike in cellular phones, where the location of an E911 call can be traced usingassisted GPSor other methods, the VoIP E911 information is accurate only if subscribers keep their emergency address information current.[42]

Fax support[edit]

Sendingfaxesover VoIP networks is sometimes referred to as Fax over IP (FoIP). Transmission of fax documents was problematic in early VoIP implementations, as most voice digitization and compressioncodecsare optimized for the representation of the human voice and the proper timing of the modem signals cannot be guaranteed in a packet-based, connectionless network.

A standards-based solution for reliably delivering fax-over-IP is theT.38protocol. The T.38 protocol is designed to compensate for the differences between traditional packet-less communications over analog lines and packet-based transmissions which are the basis for IP communications. The fax machine may be a standard device connected to ananalog telephone adapter(ATA), or it may be a software application or dedicated network device operating via an Ethernet interface.[43]Originally, T.38 was designed to use UDP or TCP transmission methods across an IP network.

Some newer high-end fax machines have built-in T.38 capabilities which are connected directly to a network switch or router. In T.38 each packet contains a portion of the data stream sent in the previous packet. Two successive packets have to be lost to actually losedata integrity.

Power requirements[edit]

Telephones for traditional residential analog service are usually connected directly to telephone companyphone lineswhich provide direct current to power most basic analog handsets independently of locally available electrical power. The susceptibility of phone service to power failures is a common problem even with traditional analog service where customers purchase telephone units that operate with wireless handsets to a base station, or that have other modern phone features, such as built-in voicemail or phone book features.

VoIP phones and VoIP telephone adapters connect toroutersorcable modemswhich typically depend on the availability ofmains electricityor locally generated power.[44]Some VoIP service providers use customer premises equipment (e.g., cable modems) with battery-backed power supplies to assure uninterrupted service for up to several hours in case of local power failures. Such battery-backed devices typically are designed for use with analog handsets. Some VoIP service providers implement services to route calls to other telephone services of the subscriber, such a cellular phone, in the event that the customer's network device is inaccessible to terminate the call.

Security[edit]

Secure calls are possible using standardized protocols such asSecure Real-time Transport Protocol.Most of the facilities of creating asecure telephoneconnection over traditional phone lines, such as digitizing and digital transmission, are already in place with VoIP. It is necessary only toencryptandauthenticatethe existing data stream. Automated software, such as avirtual PBX,may eliminate the need for personnel to greet and switch incoming calls.

The security concerns for VoIP telephone systems are similar to those of other Internet-connected devices. This means thathackerswith knowledge ofVoIP vulnerabilitiescan performdenial-of-serviceattacks, harvest customer data, record conversations, and compromise voicemail messages. Compromised VoIP user account or session credentials may enable an attacker to incur substantial charges from third-party services, such as long-distance or international calling.

The technical details of many VoIP protocols create challenges in routing VoIP traffic throughfirewallsandnetwork address translators,used to interconnect to transit networks or the Internet. Privatesession border controllersare often employed to enable VoIP calls to and from protected networks. Other methods totraverse NATdevices involve assistive protocols such asSTUNandInteractive Connectivity Establishment(ICE).

Standards for securing VoIP are available in theSecure Real-time Transport Protocol(SRTP) and theZRTPprotocol foranalog telephony adapters,as well as for somesoftphones.IPsecis available to securepoint-to-pointVoIP at the transport level by usingopportunistic encryption.Though many consumer VoIP solutions do not support encryption of the signaling path or the media, securing a VoIP phone is conceptually easier to implement using VoIP than on traditional telephone circuits. A result of the lack of widespread support for encryption is that it is relatively easy to eavesdrop on VoIP calls when access to the data network is possible.[45]Free open-source solutions, such asWireshark,facilitate capturing VoIP conversations.

Government and military organizations use various security measures to protect VoIP traffic, such as voice over secure IP (VoSIP), secure voice over IP (SVoIP), and secure voice over secure IP (SVoSIP).[46]The distinction lies in whether encryption is applied in the telephone endpoint or in the network.[47]Secure voice over secure IP may be implemented by encrypting the media with protocols such asSRTPandZRTP.Secure voice over IP usesType 1 encryptionon a classified network, such asSIPRNet.[48][49][50][51]Public Secure VoIP is also available with free GNU software and in many popular commercial VoIP programs via libraries, such as ZRTP.[52]

In June 2021, theNational Security Agency(NSA) released comprehensive documents describing the four attack planes of a communications system – the network, perimeter, session controllers andendpoints– and explaining security risks and mitigation techniques for each of them.[53][54]

Caller ID[edit]

Voice over IP protocols and equipment providecaller IDsupport that is compatible with the PSTN. Many VoIP service providers also allow callers to configure custom caller ID information.[55]

Hearing aid compatibility[edit]

Wireline telephones which are manufactured in, imported to, or intended to be used in the US with Voice over IP service, on or after February 28, 2020, are required to meet thehearing aidcompatibility requirements set forth by theFederal Communications Commission.[56]

Operational cost[edit]

VoIP has drastically reduced the cost of communication by sharing network infrastructure between data and voice.[57][58]A single broadband connection has the ability to transmit multiple telephone calls.

Regulatory and legal issues[edit]

As the popularity of VoIP grows, governments are becoming more interested in regulating VoIP in a manner similar to PSTN services.[59]

Throughout the developing world, particularly in countries where regulation is weak orcapturedby the dominant operator, restrictions on the use of VoIP are often imposed, including inPanamawhere VoIP is taxed, Guyana where VoIP is prohibited.[60]InEthiopia,where the government is nationalizing telecommunication service, it is a criminal offense to offer services using VoIP. The country has installed firewalls to prevent international calls from being made using VoIP. These measures were taken after the popularity of VoIP reduced the income generated by the state-ownedtelecommunicationcompany.[citation needed][61]

Canada[edit]

InCanada,theCanadian Radio-television and Telecommunications Commissionregulates telephone service, including VoIP telephony service. VoIP services operating in Canada are required to provide9-1-1emergency service.[62]

European Union[edit]

In theEuropean Union,the treatment of VoIP service providers is a decision for each national telecommunications regulator, which must use competition law to define relevant national markets and then determine whether any service provider on those national markets has "significant market power" (and so should be subject to certain obligations). A general distinction is usually made between VoIP services that function over managed networks (via broadband connections) and VoIP services that function over unmanaged networks (essentially, the Internet).[citation needed]

The relevant EU Directive is not clearly drafted concerning obligations that can exist independently of market power (e.g., the obligation to offer access to emergency calls), and it is impossible to say definitively whether VoIP service providers of either type are bound by them.[citation needed][63]

Arab states of theGCC[edit]

Oman[edit]

InOman,it is illegal to provide or use unauthorized VoIP services, to the extent that web sites of unlicensed VoIP providers have been blocked.[citation needed]Violations may be punished with fines of 50,000 Omani Rial (about 130,317 US dollars), a two-year prison sentence or both. In 2009, police raided 121 Internet cafes throughout the country and arrested 212 people for using or providing VoIP services.[64]

Saudi Arabia[edit]

In September 2017,Saudi Arabialifted the ban on VoIPs, in an attempt to reduce operational costs and spur digital entrepreneurship.[65][66]

United Arab Emirates[edit]

In theUnited Arab Emirates(UAE), it is illegal to provide or use unauthorized VoIP services. Web sites of unlicensed VoIP providers have been blocked. Some VoIP services such asSkypewere allowed.[67]In January 2018, internet service providers in UAE blocked all VoIP apps, including Skype, but permitting only 2 government-approved VoIP apps (C’ME and BOTIM).[68][69]In opposition, a petition onChange.orggarnered over 5000 signatures, in response to which the website was blocked in UAE.[70]

On March 24, 2020, the United Arab Emirates loosened restriction on VoIP services earlier prohibited in the country, to ease communication during theCOVID-19 pandemic.However, popular instant messaging applications likeWhatsApp,Skype,andFaceTimeremained blocked from being used for voice and video calls, constricting residents to use paid services from the country's state-owned telecom providers.[71]

India[edit]

InIndia,it is legal to use VoIP, but it is illegal to haveVoIP gatewaysinside India.[72]This effectively means that people who have PCs can use them to make a VoIP call to other computers but not to a normal phone number. Foreign-based VoIP server services are illegal to use in India.[72]

Internet telephony is permitted to the ISP with restrictions. The following services are permitted:[73]

  1. PC to PC; within or outside India
  2. PC / a device / Adapter conforming to the standard of any international agencies like- ITU or IETF etc. in India to PSTN/PLMN abroad.
  3. Any device / Adapter conforming to standards of International agencies like ITU, IETF etc. connected to ISP node with static IP address to similar device / Adapter; within or outside India.
  4. Except whatever is described incondition (ii) above[clarification needed],no other form of Internet Telephony is permitted.
  5. In India no Separate Numbering Scheme is provided to the Internet Telephony. Presently the 10 digit Numbering allocation based on E.164 is permitted to the Fixed Telephony, GSM, CDMA wireless service. For Internet Telephony, the numbering scheme shall only conform to IP addressing Scheme ofInternet Assigned Numbers Authority(IANA). Translation of E.164 number / private number to IP address allotted to any device and vice versa, by ISP to show compliance with IANA numbering scheme is not permitted.
  6. The Internet Service Licensee is not permitted to have PSTN/PLMN connectivity. Voice communication to and from a telephone connected to PSTN/PLMN and following E.164 numbering is prohibited in India.

South Korea[edit]

InSouth Korea,only providers registered with the government are authorized to offer VoIP services. Unlike many VoIP providers, most of whom offer flat rates, Korean VoIP services are generally metered and charged at rates similar to terrestrial calling. Foreign VoIP providers encounter high barriers to government registration. This issue came to a head in 2006 whenInternet service providersproviding personal Internet services by contract toUnited States Forces Korea(USFK) members residing on USFK bases threatened to block off access to VoIP services used by USFK members as an economical way to keep in contact with their families in the United States, on the grounds that the service members' VoIP providers were not registered. A compromise was reached between USFK and Korean telecommunications officials in January 2007, wherein USFK service members arriving in Korea before June 1, 2007, and subscribing to the ISP services provided on base could continue to use their US-based VoIP subscription, but later arrivals are required to use a Korean-based VoIP provider, which by contract will offer pricing similar to the flat rates offered by US VoIP providers.[74]

United States[edit]

In the United States, the FCC requires all interconnected VoIP service providers to comply with requirements comparable to those for traditional telecommunications service providers.[75]VoIP operators in the US are required to supportlocal number portability;make service accessible to people with disabilities; pay regulatory fees,universal servicecontributions, and other mandated payments; and enable law enforcement authorities to conduct surveillance pursuant to theCommunications Assistance for Law Enforcement Act(CALEA).

Operators ofInterconnectedVoIP (fully connected to the PSTN) are mandated to provideEnhanced 911service without special request, provide for customer location updates, clearly disclose any limitations on their E-911 functionality to their consumers, obtain affirmative acknowledgements of these disclosures from all consumers,[76]and may not allow their customers to opt-out of 911 service.[77]VoIP operators also receive the benefit of certain US telecommunications regulations, including an entitlement tointerconnectionand exchange of traffic withincumbent local exchange carriersvia wholesale carriers. Providers ofnomadicVoIP service—those who are unable to determine the location of their users—are exempt from state telecommunications regulation.[78]

Another legal issue that theUS Congressis debating concerns changes to theForeign Intelligence Surveillance Act.The issue in question is calls between Americans and foreigners. The NSA is not authorized to tap Americans' conversations without a warrant—but the Internet, and specifically VoIP does not draw as clear a line to the location of a caller or a call's recipient as the traditional phone system does. As VoIP's low cost and flexibility convinces more and more organizations to adopt the technology, surveillance for law enforcement agencies becomes more difficult. VoIP technology has also increased federal security concerns because VoIP and similar technologies have made it more difficult for the government to determine where a target is physically located when communications are being intercepted, and that creates a whole set of new legal challenges.[79]

History[edit]

The early developments ofpacket networkdesigns byPaul Baranand other researchers were motivated by a desire for a higher degree of circuit redundancy and network availability in the face of infrastructure failures than was possible in the circuit-switched networks intelecommunicationsof the mid-twentieth century.Danny Cohenfirst demonstrated a form ofpacket voicein 1973 which was developed intoNetwork Voice Protocolwhich operated across the earlyARPANET.[80][81]

On the early ARPANET, real-time voice communication was not possible with uncompressedpulse-code modulation(PCM)digital speechpackets, which had abit rateof 64kbps, much greater than the 2.4kbpsbandwidthof earlymodems.The solution to this problem waslinear predictive coding(LPC), aspeech codingdata compressionalgorithm that was first proposed byFumitada ItakuraofNagoya Universityand Shuzo Saito ofNippon Telegraph and Telephone(NTT) in 1966. LPC was capable of speech compression down to 2.4kbps, leading to the first successful real-time conversation over ARPANET in 1974, between Culler-Harrison Incorporated inGoleta, California,andMIT Lincoln LaboratoryinLexington, Massachusetts.[82]LPC has since been the most widely used speech coding method.[83]Code-excited linear prediction(CELP), a type of LPC algorithm, was developed byManfred R. SchroederandBishnu S. Atalin 1985.[84]LPC algorithms remain anaudio coding standardin modern VoIP technology.[82]

In the two decades following the 1974 demo, various forms of packet telephony were developed and industry interest groups formed to support the new technologies. Following the termination of the ARPANET project, and expansion of theInternetfor commercial traffic, IP telephony was tested and deemed infeasible for commercial use until the introduction of VocalChat in the early 1990s and then in Feb 1995 the official release of Internet Phone (or iPhone for short) commercial software byVocalTec,based on a patent byLior HaramatyandAlon Cohen,[85]and followed by other VoIP infrastructure components such as telephony gateways and switching servers. Soon after it became an established area of interest in commercial labs of the major IT concerns, notably at AT&T, whereMarian Croakand her team filed many patents related to the technology.[citation needed]By the late 1990s, the firstsoftswitchesbecame available, and new protocols, such asH.323,MGCP andSession Initiation Protocol(SIP) gained widespread attention. In the early 2000s, the proliferation of high-bandwidth always-on Internet connections to residential dwellings and businesses, spawned an industry of Internet telephony service providers (ITSPs). The development of open-source telephony software, such asAsterisk PBX,fueled widespread interest and entrepreneurship in voice-over-IP services, applying new Internet technology paradigms, such ascloud servicesto telephony.

Milestones[edit]

See also[edit]

Notes[edit]

  1. ^Variously pronounced as individual letters,V-O-I-P,or as a word,/vɔɪp/(VOYP)[1]
  2. ^IP networks may also be more prone toDoS attacksthat cause congestion.[20]
  3. ^Technologies such as802.3ahcan be used for DSL connectivity without using ATM.

References[edit]

  1. ^"VoIP".Cambridge Dictionaries Online.
  2. ^Arora, Rakesh (November 23, 1999)."Voice Over IP: Protocols and Standards".cse.wustl.edu.Archived fromthe originalon January 19, 2024.RetrievedMarch 19,2024.Voice over IP (VOIP) uses the Internet Protocol (IP) to transmit voice as packets over an IP network....in the Internet, anyone can capture the packets meant for someone else. Some security can be provided by using encryption and tunneling. The common tunneling protocol used isLayer 2 Tunneling Protocoland the common encryption mechanism used isSecure Sockets Layer(SSL).
  3. ^"XMPP Federation".Google Talkabout. 2006.RetrievedMay 11,2012.
  4. ^Booth, C (2010). "Chapter 2: IP Phones, Software VoIP, and Integrated and Mobile VoIP".Library Technology Reports.46(5): 11–19.
  5. ^Montazerolghaem, Ahmadreza; Moghaddam, Mohammad Hossein Yaghmaee; Leon-Garcia, Alberto (March 2018)."OpenSIP: Toward Software-Defined SIP Networking".IEEE Transactions on Network and Service Management.15(1): 184–199.arXiv:1709.01320.doi:10.1109/TNSM.2017.2741258.ISSN1932-4537.S2CID3873601.
  6. ^"H.323 and SIP Integration".RetrievedJanuary 24,2020.
  7. ^Omar, Ahmed."Voice OVER IP (VOIP)".
  8. ^"Voice Over Internet Protocol (VoIP)".Federal Communications Commission.November 18, 2010.RetrievedJuly 19,2022.
  9. ^"VoIP (v77)"(PDF).
  10. ^"WIRELESS: Carriers look to IP for backhaul".www.eetimes.com.EE Times. Archived from the original on August 9, 2011.RetrievedApril 8,2015.{{cite web}}:CS1 maint: unfit URL (link)
  11. ^"Mobile's IP challenge".www.totaltele.com.Total Telecom Online. Archived from the original on February 17, 2006.RetrievedApril 8,2015.{{cite web}}:CS1 maint: unfit URL (link)
  12. ^"Android SIP Client".RetrievedJanuary 30,2018.
  13. ^"Learn to Make Free or Inexpensive Calls Using SIP on Android".RetrievedJanuary 30,2018.
  14. ^Michael Dosch and Steve Church."VoIP in the Broadcast Studio".Axia Audio. Archived fromthe originalon October 7, 2011.RetrievedJune 21,2011.
  15. ^Jackson, William (May 27, 2009)."SSA goes big on VOIP".Government Computer News. Archived fromthe originalon July 28, 2011.RetrievedMay 28,2009.
  16. ^"Social Security to Build" World's Largest VOIP "".Government Technology.Archivedfrom the original on June 2, 2009.RetrievedMay 29,2009.
  17. ^abKorzeniowski, Peter (January 8, 2009)."Three Technologies You Need In 2009".Forbes.RetrievedMarch 2,2009.
  18. ^Callahan, Renee (December 9, 2008)."Businesses Move To Voice-Over-IP".Forbes.RetrievedMarch 3,2009.
  19. ^"Skype For Business".skype.com.RetrievedMarch 16,2009.
  20. ^"VoIP - Vulnerability over Internet Protocol?".www.continuitycentral.com.
  21. ^abcdef"Quality of Service for Voice over IP".RetrievedMay 3,2011.
  22. ^Prabhakar, G.; Rastogi, R.; Thotton, M (2005). "OSS Architecture & Requirements for VoIP Networks".Bell Labs Technical Journal.10(1): 31–45.doi:10.1002/bltj.20077.S2CID12336090.
  23. ^ab"Quality of Service for Voice over IP".RetrievedMay 3,2011.
  24. ^"Optical Packet Buffers for Backbone Internet Routers | Request PDF".
  25. ^Caceres, Ramon.RTP Control Protocol Extended Reports (RTCP XR).doi:10.17487/RFC3611.RFC3611.
  26. ^CableLabs,PacketCable Residential SIP Telephony Feature Definition,Technical Report, PKT-TR-RST-V03-071106 (2007)
  27. ^"VoIP performance measurement using QoS parameters"(PDF).A.H.Muhamad Amin. August 14, 2016.
  28. ^"Methodology for SIP Infrastructure Performance Testing"(PDF).Miroslav Voznak, Jan Rozhon. August 14, 2016.
  29. ^"Voice over IP (VoIP) Performance Evaluation on VMware vSphere® 5"(PDF).VMware. August 14, 2016.
  30. ^"Performance and Stress Testing of SIP Servers, Clients and IP Networks".StarTrinity. August 13, 2016.
  31. ^"Testing Voice over IP (VolP) Networks"(PDF).IXIA. August 14, 2016.
  32. ^"Importance of Softswitch VoIP Technology".ixc.ua. May 20, 2011. Archived from the original on November 11, 2012.RetrievedOctober 4,2012.{{cite web}}:CS1 maint: bot: original URL status unknown (link)
  33. ^"RFC 3824– Using E.164 numbers with the Session Initiation Protocol (SIP)".The Internet Society. June 1, 2004.RetrievedJanuary 21,2009.
  34. ^"Create a Skype Name".Skype.RetrievedJanuary 21,2009.
  35. ^"RFC 3969– The Internet Assigned Number Authority (IANA) Uniform Resource Identifier (URI) Parameter Registry for the Session Initiation Protocol (SIP)".The Internet Society. December 1, 2004.RetrievedJanuary 21,2009.
  36. ^"Your personal online number".Skype.RetrievedJanuary 21,2009.
  37. ^"Application-level Network Interoperability and the Evolution of IMS".TMCnet.com. May 24, 2006.RetrievedJanuary 21,2009.
  38. ^Jeff Riddel (2007).Packetcable Implementation.Cisco Press. p. 557.ISBN978-1-58705-181-4.
  39. ^"Keeping your telephone number when you change your service provider".FCC.Archived fromthe originalon December 12, 2009.RetrievedJanuary 20,2009.
  40. ^"TelePassport takes the sting out of MNP".ITWeb.November 13, 2006.Archivedfrom the original on July 19, 2022.RetrievedJuly 19,2022.
  41. ^ab"FCC Consumer Advisory VoIP and 911 Service"(PDF).FCC.Archived fromthe original(PDF)on August 10, 2010.RetrievedMay 2,2011.
  42. ^Noworatzky, Daniel (February 6, 2019)."Keep your VoIP E911 service in compliance with this checklist".TeleDynamics.RetrievedJuly 19,2022.
  43. ^"Faxing over IP networks".Soft-Switch.org.Archived fromthe originalon December 18, 2023.
  44. ^"4.4 VOIP – Regulatory Issues – Universal Service".ICT Regulation Tool Kit.Archived fromthe originalon June 4, 2009.RetrievedSeptember 21,2017.
  45. ^Thermos, Peter (April 5, 2006)."Examining Two Well-Known Attacks on VoIP".CircleID.RetrievedApril 5,2006.
  46. ^"Internet Protocol Telephony & Voice over Internet Protocol Security Technical Implementation Guide Version 2, Release 2"(PDF).DISA. April 21, 2006. Archived fromthe original(PDF)on August 25, 2009.
  47. ^"Secure Voice over IP (SVoIP) vs. Voice over Secure IP (VoSIP) Installations"(PDF).General Dynamics C4 Systems.Archived fromthe original(PDF)on September 24, 2015.
  48. ^Dunte, Markus; Ruland, Christoph (June 2007)."Secure Voice-over-IP"(PDF).International Journal of Computer Science and Network Security.7(6): 63–68.Archived(PDF)from the original on April 19, 2023.
  49. ^Stringfellow, Brian (August 15, 2001)."Secure Voice Over IP".SANS Institute.Archivedfrom the original on June 1, 2023.
  50. ^White, C.M.; Teague, K.A.; Daniel, E.J. (November 7–10, 2004)."Packet loss concealment in a secure voice over IP environment"(PDF).Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004.Vol. 1. pp. 415–419.CiteSeerX10.1.1.219.633.doi:10.1109/ACSSC.2004.1399165.ISBN978-0-7803-8622-8.S2CID402760.Archived fromthe original(PDF)on May 17, 2006.RetrievedJune 12,2009.
  51. ^"Cellcrypt secure VOIP heading to BlackBerry".Networkworld.com.Archived fromthe originalon April 24, 2009.RetrievedJune 12,2009.
  52. ^"Secure VOIP calling, free software, and the right to privacy".Free Software Magazine.
  53. ^"NSA Releases Guidance on Securing Unified Communications and Voice and Video over IP Systems".National Security Agency/Central Security Service.RetrievedSeptember 26,2022.
  54. ^"Deploying Secure Unified Communications/Voice and Video over IP Systems"(PDF).media.defense.gov.RetrievedSeptember 27,2023.
  55. ^VOIPSA.org,Blog: "Hello Mom, I'm a Fake!" (Telespoof and Fakecaller).
  56. ^"Hearing Aid Compatibility for Wireline and Wireless Telephones".Federal Communications Commission.October 30, 2014.RetrievedJuly 9,2019.
  57. ^FCC.gov,What are some advantages of VoIP?
  58. ^"network infrastructure: getting started with VoIP"(PDF).Archived fromthe original(PDF)on September 17, 2011.
  59. ^"Global VOIP Policy Status Matrix".Global IP Alliance. 2005.RetrievedNovember 23,2006.
  60. ^Proenza, Francisco J."The Road to Broadband Development in Developing Countries is through Competition Driven by Wireless and VOIP"(PDF).Archived fromthe original(PDF)on June 2, 2012.RetrievedApril 7,2008.
  61. ^"VOICE OVER INTERNET PROTOCOL".
  62. ^"Telecom Decision CRTC 2005-21".Canadian Radio-television and Telecommunications Commission.Government of Canada. April 4, 2005.RetrievedApril 29,2017.
  63. ^"Voice over IP".
  64. ^Metz, Cade."Oman cuffs 212 for selling VoIP calls".The Register.RetrievedSeptember 20,2016.
  65. ^"Saudi Arabia to lift ban on internet calls".BBC News.September 20, 2017.RetrievedJanuary 10,2018.
  66. ^"Saudi Arabia to lift ban on internet calls".Reuters.September 20, 2017.RetrievedJanuary 10,2018.
  67. ^"Don't worry, Skype is working in UAE".Khaleejtimes.June 26, 2017.RetrievedJanuary 11,2018.
  68. ^Debusmann, Bernd Jr. (January 9, 2018)."Etisalat launches new unlimited calling plan with VoIP apps".Arabian Business.RetrievedJanuary 9,2018.
  69. ^Maceda, Cleofe (January 8, 2018)."No Skype? Pay Dh50 monthly for video calls".Gulf News.RetrievedJanuary 9,2018.
  70. ^Zacharias, Anna \ (January 8, 2018)."Etisalat launches new calling app plan days after Skype disruptions".The National.RetrievedJanuary 9,2018.
  71. ^"UAE loosens some VoIP restrictions as residents in lockdown call for end to WhatsApp and Skype ban".CNBC.March 26, 2020.RetrievedMarch 26,2020.
  72. ^abMahanagar Doorsanchar Bhawan and Jawahar Lal Nehru Marg (May 2008)."Telecom Regulatory Authority of India (TRAI) Consultation paper on Issues related to Internet Telephony. Consultation Paper No. 11/2008"(PDF).New Delhi India: Telecom Regulatory Authority of India (TRAI). p. 16 (Section 2.2.1.2 PC–to–Phone Internet telephony). Archived fromthe original(PDF)on October 6, 2014.RetrievedSeptember 19,2012.An end-user is allowed to make PC–to-Phone Internet Telephony calls only on PSTN/PLMN abroad.
  73. ^Harish Kumar GangwarTechnical Note on Illegal International Long Distance telephone Exchange in India
  74. ^Stars and Stripes: USFK deal keeps VoIP access for troops,archived fromthe originalon January 13, 2010
  75. ^Pershing, Genny."Cybertelecom:: VoIP:: FCC".www.cybertelecom.org.RetrievedSeptember 21,2017.
  76. ^GPO.govArchivedJune 8, 2010, at theWayback Machine,47 C.F.R. pt. 9 (2007)
  77. ^"VoIP and 911 Service".FCC. May 26, 2011.RetrievedAugust 16,2014.
  78. ^"Voice Over Internet Protocol (VoIP)".November 18, 2010.RetrievedSeptember 21,2017.
  79. ^Greenberg, Andy (May 15, 2008)."The State Of Cybersecurity Wiretapping's Fuzzy Future".Forbes.RetrievedMarch 2,2009.
  80. ^"Danny Cohen".INTERNET HALL of FAME.RetrievedDecember 6,2014.
  81. ^Advanced Content Delivery, Streaming, and Cloud Services (Pg 34).Willey. September 19, 2014.ISBN9781118909706.RetrievedDecember 6,2014.
  82. ^abcdeGray, Robert M. (2010)."A History of Realtime Digital Speech on Packet Networks: Part II of Linear Predictive Coding and the Internet Protocol"(PDF).Found. Trends Signal Process.3(4): 203–303.doi:10.1561/2000000036.ISSN1932-8346.
  83. ^Gupta, Shipra (May 2016)."Application of MFCC in Text Independent Speaker Recognition"(PDF).International Journal of Advanced Research in Computer Science and Software Engineering.6(5): 805–810 (806).ISSN2277-128X.S2CID212485331.Archived fromthe original(PDF)on October 18, 2019.RetrievedOctober 18,2019.
  84. ^abM. R. Schroeder and B. S. Atal, "Code-excited linear prediction (CELP): high-quality speech at very low bit rates," inProceedings of the IEEEInternational Conference on Acoustics, Speech, and Signal Processing(ICASSP), vol. 10, pp. 937–940, 1985.
  85. ^Audio Transceiver
  86. ^Cerf, V.; Kahn, R. (May 1974)."A Protocol for Packet Network Intercommunication"(PDF).IEEE Transactions on Communications.22(5): 637–648.doi:10.1109/TCOM.1974.1092259.
  87. ^"The Launch of NSFNET".The National Science Foundation. Archived fromthe originalon May 7, 2006.RetrievedJanuary 21,2009.
  88. ^abDua, Amit (July 29, 2021)."VoIP Basics: Everything Beginners Should Know!".business2community.com.Business 2 Community.RetrievedSeptember 14,2021.
  89. ^McCraw, Corey (October 12, 2022)."The History of VoIP Over the Last 55 Years (1966 to 2021)".fitsmallbusiness.com.Fits Small Business.
  90. ^IDG Network World Inc; Eckerson, Wayne (September 21, 1992)."Network World - Startup targets desktop Videoconferencing arena".Network World.IDG Network World Inc: 39–.ISSN0887-7661.RetrievedFebruary 10,2012.
  91. ^"MTALK-Readme"(TXT).Sunsite.edu.RetrievedApril 29,2012.
  92. ^Keating, Tom."Internet Phone Release 4"(PDF).Computer Telephony Interaction Magazine.RetrievedNovember 7,2007.
  93. ^"The 10 that Established VOIP (Part 1: VocalTec)".iLocus.RetrievedJanuary 21,2009.
  94. ^The free LibraryRADVision and Intel Target Compatibility Between RADVision's H.323/320 Videoconferencing Gateway And Intel's Business Video Conferencing And TeamStation Products.ArchivedOctober 30, 2013, at theWayback MachineJune 2, 1997VoiP Developer SolutionsArchivedJune 16, 2011, at theWayback Machine
  95. ^"H.323 Visual telephone systems and equipment for local area networks which provide a non-guaranteed quality of service".ITU-T.RetrievedJanuary 21,2009.
  96. ^"RFC 2235".R. Zakon.RetrievedJanuary 21,2009.
  97. ^International Telecommunication Union, Standardization Sector (ITU-T), Study Group 15 (1993-1996),Recommendation G.729,March 1996.
  98. ^"The 10 that Established VOIP (Part 2: Level 3)".iLocus. July 13, 2007.RetrievedNovember 7,2007.
  99. ^"RFC 2543, SIP: Session Initiation Protocol".Handley, Schulzrinne, Schooler, Rosenberg.RetrievedJanuary 21,2009.
  100. ^"What is Asterisk".Asterisk.org. Archived fromthe originalon January 23, 2009.RetrievedJanuary 21,2009.
  101. ^Hersent, Olivier; Petit, Jean-Pierre; Gurle, David (2005).Beyond VoIP Protocols: Understanding Voice Technology and Networking Techniques for IP Telephony.John Wiley & Sons.p. 55.ISBN9780470023631.
  102. ^Lutzky, Manfred; Schuller, Gerald; Gayer, Marc; Krämer, Ulrich; Wabnik, Stefan (May 2004).A guideline to audio codec delay(PDF).116th AES Convention.Fraunhofer IIS.Audio Engineering Society.RetrievedOctober 24,2019.
  103. ^Schnell, Markus; Schmidt, Markus; Jander, Manuel; Albert, Tobias; Geiger, Ralf; Ruoppila, Vesa; Ekstrand, Per; Bernhard, Grill (October 2008).MPEG-4 Enhanced Low Delay AAC - A New Standard for High Quality Communication(PDF).125th AES Convention.Fraunhofer IIS.Audio Engineering Society.RetrievedOctober 20,2019.
  104. ^Stapleton-Gray, Ross (2009).Inter-Network Operations Center Dial-by-ASN (INOC-DBA), a Resource for the Network Operator Community.Los Alamitos: IEEE Computer Society Press.ISBN978-0-7695-3568-5.
  105. ^Pogue, David (August 2, 2007)."State of the Art: Get Your Free Net Phone Calls Here".The New York Times.RetrievedJanuary 20,2009.
  106. ^Nagireddi, Sivannarayana (2008).VoIP Voice and Fax Signal Processing.John Wiley & Sons.p. 69.ISBN9780470377864.
  107. ^Remo, Michelle V. (August 27, 2007)."Prospects bright for voice calls over internet".Philippine Daily Inquirer.RetrievedJanuary 1,2015.
  108. ^Audio-MitschnittArchivedFebruary 10, 2013, at theWayback Machinevom Treffen der IETF-Codec-Arbeitsgruppe auf der Konferenz IETF79 in Peking, China mit einer Darstellung der grundlegenden Funktionsprinzipien durch Koen Vos (MP3, ~70 MiB)
  109. ^"Skype's new super wideband codec".Wirevolution.com. January 13, 2009.RetrievedMarch 31,2009.
  110. ^Daniel Eran Dilger (June 8, 2010)."Inside iPhone 4: FaceTime video calling".AppleInsider.RetrievedJune 9,2010.
  111. ^Presentation of the CELT codecArchivedAugust 7, 2011, at theWayback Machineby Timothy B. Terriberry (65 minutes of video, see alsopresentation slidesArchivedAugust 10, 2011, at theWayback Machinein PDF)
  112. ^Valin, Jean-Marc; Maxwell, Gregory; Terriberry, Timothy B.; Vos, Koen (October 2013).High-Quality, Low-Delay Music Coding in the Opus Codec.135th AES Convention.Audio Engineering Society.arXiv:1602.04845.

External links[edit]