Explore chapters and articles related to this topic
Internet Applications
Published in Akshi Kumar, Web Technology, 2018
Internet Telephony is the service provided by the Internet that uses the Voice over Internet Protocol (VoIP) application layer protocol in the TCP/IP protocol stack to offer this service. It is the technology that is used to transmit voice over the Internet. The voice is first converted into digital data, which is then organized into small packets. These packets are stamped with the destination IP address and routed over the Internet. At the receiving end, the digital data is reconverted into voice and fed into the user’s phone. VoIP is a form of communication that allows you to make phone calls over a broadband Internet connection instead of typical analog telephone lines. Basic VoIP access usually allows you to call others who are also receiving calls over the Internet. Some VoIP services require a computer or a dedicated VoIP phone, while others allow you to use your landline phone to place VoIP calls through a special adapter. Thus, for VoIP, you need a broadband Internet connection, plus a traditional phone and an adapter; a VoIP-enabled phone; or VoIP software on your computer. VoIP examples include Xbox Voice, Windows messenger, AOL Instant Messenger, Motorola Phone Adapter (Vonage), Cisco Phone, and Skype (Figure 2.5).
The Strange Death of Broadband ISDN
Published in Nigel Seel, Business Strategies for the Next-Generation Network, 2006
After establishing a high-quality multimedia session, the next issue of concern is how secure that call is likely to be. By default, phone calls have never been intrinsically secure as the ease of wiretaps (legal interception) demonstrates. Most people’s lack of concern about this is based upon the physical security of the phone company’s equipment, and the difficulties of hacking into it from dumb or closed end-systems like phones. One of the most striking characteristics of the Internet is that it permits open access in principle from any host to any other host. This means that security has to be explicitly layered onto a service. Most people are familiar with secure browser access to Web sites (HTTPS) using an embedded protocol in the browser and the Web server (SSL—Secure Sockets Layer) which happens entirely automatically from the point of view of a user. Deploying a symmetric security protocol (e.g., IPsec) between IP-phones for interactive multimedia has been more challenging, and arguably we are not quite there yet. IMS implements hop-by-hop encryption, partially to allow for lawful interception. Most VoIP today is not encrypted—again, Skype is a notable exception. As I observe in chapter 9, Skype looked for a while to be proof against third-party eavesdropping, but following the eBay acquisition, I would not bet on it now.
Legacy to Current-Day Telephone Networks
Published in Stephan S. Jones, Ronald J. Kovac, Frank M. Groom, Introduction to COMMUNICATIONS TECHNOLOGIES, 2015
Stephan S. Jones, Ronald J. Kovac, Frank M. Groom
VoIP utilizes packet switching, which means it uses data networks to transmit the voice data packets. With packet switching, the connection is open only for the duration of the packet’s transmission. This is an important concept because it is a way to transmit data without tying up the network with a single transmission’s data. There are, however, a few issues that accompany VoIP and packet-switched environments. VoIP is latency driven, which means that it cannot tolerate any delay in the packet delivery in the transmission, so the network infrastructure must be able to provide uninterrupted delivery of the voice data, similar to that which is accomplished in a circuit-switched environment, with a similar high level of QoS.
Studying the Impact of SIP Message Differentiation on the Quality of VoIP Session Control Procedures
Published in IETE Technical Review, 2021
Jasmina Baraković Husić, Sabina Baraković, Seudin Kasumović
Voice over Internet Protocol (VoIP) is a technology used to transmit real-time voice over Internet Protocol (IP) based networks. Since its invention, VoIP has the exponential growth becoming an important tool used for business, social, and family communications [1]. The important component of VoIP infrastructure is the session control. It may be achieved through Session Initiation Protocol (SIP). SIP session control infrastructure has to support session setup and teardown procedures for telephony services, process SIP messages carrying Instant Messaging (IM) payload and supporting presence, handle user mobility, and exchange routing information with other session control servers in order to route session setup messages appropriately. Using SIP for these purposes may cause a significant load on the SIP session control infrastructure. Thus, a key requirement for a robust VoIP session control infrastructure is overload control [2].
Design and implementation of a VoIP PBX integrated Vietnamese virtual assistant: a case study
Published in Journal of Information and Telecommunication, 2023
Hai Son Hoang, Anh Khoa Tran, Thanh Phong Doan, Huu Khoa Tran, Ngoc Minh Duc Dang, Hoang Nam Nguyen
Most traditional media, including telephones, music, movies, and television, have in recent years been digitized for transmission over the Internet. VoIP refers to a group of technologies, communication protocols, and transport techniques for delivering voice and multimedia over an Internet protocol network. Since Skype was released, many people have come to realize the convenience of voice and data transfer over the network. Indeed, since the mid-1990s, telephone equipment manufacturers have been adding IP capabilities to their existing PBX telephone switches. VoIP phones now offer an alternative to traditional telephony. As VoIP technology matures, achieving better quality of service (QoS) with VoIP has been increasingly studied (Chakraborty et al., 2019).
Security challenges in the transition to 4G mobile systems in developing countries
Published in Cogent Engineering, 2023
Fanuel Melak Asmare, Lijaddis Getnet Ayalew
There are thousands of known attacks against VOIP protocols, ranging from capturing administrative privileges to denial-of-service attacks. The impact on consumer and business voice services and emergency services that support police, fire, and medical resources can be highly disruptive and dangerous, resulting in regulatory issues. Because VOLTE traffic is contained mainly within the wireless APN, carriers require specialized monitoring equipment to detect attacks as they move from the 4 G infrastructure to the VOLTE service infrastructure (Li et al., 2015; Macaulay, 2013).