Posts

Showing posts from September, 2024

Linux Considerations

  Linux Considerations If you ask anyone at the Free Software Foundation, they will tell you that what we know as Linux is in fact GNU/Linux . All etymological arguments aside, there is some valuable truth to this statement. While the kernel of the operating system is indeed Linux, the vast majority of the utilities installed on a Linux system and used regularly are in fact GNU utilities. " Linux " is probably only 5% Linux, possibly 75% GNU, and perhaps 20% everything else. Why does this matter? Well, the flexibility of Linux is both a blessing and a curse. It is a blessing because with Linux you can truly craft your very own operating system from scratch. Since very few people ever do this, the curse is in large part due to the responsibility you must bear in determining which of the GNU utilities to install, and how to configure the system. If this seems overwhelming, do not fear. In the next chapter, we will discuss the selection, installation, and configuration of

Configuring Inbound IAX Connections

  www.chinaroby.com Configuring Inbound IAX Connections The Inter-Asterisk eXchange (IAX) protocol is usually used for server-to-server communication; more hard phones are available that talk SIP. However, there are several soft phones that support the IAX protocol, and work is progressing on several fronts for hard phone support in firmware. The primary difference between the IAX and SIP protocols is the way media (your voice) is passed between endpoints. With SIP, the RTP (media) traffic is passed using different ports than those used by the signaling methods. For example, Asterisk receives the signaling of SIP on port 5060 and the RTP (media) traffic on ports 10,000 through 20,000, by default. The IAX protocol differs in that both the signaling and media traffic are passed via a single port: 4569. An advantage to this approach is that the IAX protocol tends to be better suited to topologies involving NAT. An IAX user is used to authenticate and handle calls coming i

Asterisk: The Professional's PBX from https://www.chinaroby.com

  Asterisk: The Professional's PBX Never in the history of telecommunications has a system so suited to the needs of business been available, at any price. Asterisk is an enabling technology, and, as with Linux, it will become increasingly rare to find an enterprise that is not running some version of Asterisk, in some capacity, somewhere in the network, solving a problem as only Asterisk can. Asterisk - a Professional PBX   This acceptance is likely to happen much faster than it did with Linux, though, for several reasons: Linux has already blazed the trail that led to open source acceptance, so Asterisk can follow that lead. The telecom industry is crippled, with no leadership being provided by the giant industry players. Asterisk has a compelling, realistic, and exciting vision. End users are fed up with incompatible, limited functionality, and horrible support. Asterisk solves the first two problems; the community has shown a passion for the latter.

About VoIP --17 Technical details

  www.chinaroby.com   About VoIP Technical details The two major competing standards for VoIP are the IETF standard SIP and the ITU standard H.323. Initially H.323 was the most popular protocol, though in the "local loop" it has since been surpassed by SIP. This was primarily due to the latter's better traversal of NAT and firewalls, although recent changes introduced for H.323 have removed this advantage. However, in backbone voice networks where everything is under the control of the network operator or telco, H.323 is the protocol of choice. Many of the largest carriers use H.323 in their core backbones, and the vast majority of callers have little or no idea that their POTS calls are being carried over VoIP. Where VoIP travels through multiple providers' softswitches the concepts of Full Media Proxy and Signalling Proxy are important. In H.323, the data is made up of 3 streams of data: 1) H.225.0 Call Signaling; 2) H.245; 3) Media. So if you are in London, your pr

About VoIP -16 Legal issues in different countries

 About VoIP Legal issues in different countries As the popularity of VoIP grows, and PSTN users switch to VoIP in increasing numbers, governments are becoming more interested in regulating VoIP VoIP in a manner similar to legacy PSTN services, especially with the encouragement of the state-mandated telephone monopolies/oligopolies in a given country, who see this as a way to stifle the new competition. In the European Union, the treatment of VoIP service providers is a decision for each Member State's national telecoms regulator, which must use competition law to define relevant national markets and then determine whether any service provider on those national markets has "significant market power" (and so should be subject to certain obligations). A general distinction is usually made between VoIP services that function over managed networks (via broadband connections) and VoIP services that function over unmanaged networks (essentially, the Internet). VoIP services tha

About VoIP --15 Mobile phones & Handheld Devices

  About VoIP Mobile phones & Handheld Devices Telcos and consumers have invested billions of dollars in mobile phone equipment. In developed countries, mobile phones have achieved nearly complete market penetration, and many people are giving up landlines and using mobiles exclusively. Given this situation, it is not entirely clear whether there would be a significant higher demand for VoIP among consumers until either public or community wireless networks have similar geographical coverage to cellular networks (thereby enabling mobile VoIP phones, so called WiFi phones or VoWLAN) or VoIP is implemented over legacy 3G networks. However, "dual mode" telephone sets, which allow for the seamless handover between a cellular network and a WiFi

About VoIP -14 Mass-market telephony -- https://www.chinaroby.com

  About VoIP Mass-market telephony ( https://www.chinaroby.com ) A major development starting in 2004 has been the introduction of mass-market VoIP services over broadband Internet access services, in which subscribers make and receive calls as they would over the PSTN. Full phone service VoIP phone companies provide inbound and outbound calling with Direct Inbound Dialing. Many offer unlimited calling to the U.S., and some to Canada or selected countries in Europe or Asia as well, for a flat monthly fee. These services take a wide variety of forms which can be more or less similar to traditional POTS. At one extreme, an analog telephone adapter (ATA) may be connected to the broadband Internet connection and an existing telephone jack in order to provide service nearl

About VoIP -13 Pre-Paid Phone Cards

 About VoIP Pre-Paid Phone Cards VoIP has become an important technology for phone services to travelers, migrant workers and ex-pats, who either, due to not having a fixed or mobile phone or high overseas roaming charges, choose instead to use placa VoIP services to make their phone calls. Pre-paid phone cards can be used either from a normal phone or from Internet cafes that have phone services. Developing countries and areas with high tourist or immigrant communities generally have a higher uptake. VoIM Voice over Instant Messenger, like popular Skype, Voice over MSN, Yahoo, QQ in China and Google Talk. VoIM is one kind of general VoIP that was based on an IM. VoIP , specifically, usually is referred as traditional SIP or H.323 IP phone, as opposed to VoIM as newly emerged Skype-like services/phones.

About VoIP -12 Security -- https://www.chinaroby.com

  About VoIP Security The many consumer VoIP solutions do not support encryption yet, although having a secure phone is much easier to implement with VoIP than traditional phone lines. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content. There are several open source solutions that facilitate sniffing of VoIP conversations. A modicum of security is afforded due to patented audio codecs that are not easily available for open source applications, however such security through obscurity has not proven effective in the long run in other fields. Some vendors also use compression to make eavesdropping more difficult. However, real security requires encryption and cryptographic authentication which are not widely available at a consum

About VoIP -11 Single point of calling

  About VoIP Single point of calling With hardware VoIP solutions it is possible to connect the VoIP router into the existing central phone box in the house and have VoIP at every phone already connected. Software based VoIP services require the use of a computer, so they are limited to single point of calling, though telephone sets are now available, allowing them to be used without a PC. Some services provide the ability to connect WiFi SIP phones so that service can be extended throughout the premises, and off-site to any location with an open hotspot.However, note that many hotspots require browser-based authentication, which most SIP phones do not support

About VoIP -9 Integration into global telephone number system

  About VoIP Integration into global telephone number system While the traditional Plain Old Telephone System (POTS) and mobile phone networks share a common global standard (E.164) which allocates and identifies any specific telephone line, there is no widely adopted similar standard for VoIP networks. Some allocate an E.164 number which can be used for VoIP as well as incoming/external calls. However, there are often different, incompatible schemes when calling between VoIP providers which use provider specific short codes.

About VoIP -10 Caller ID

  About VoIP Caller ID Caller ID support among VoIP providers varies, although the majority of VoIP providers now offer full Caller ID with name on outgoing calls. When calling a traditional PSTN number from some VoIP providers , Caller ID is not supported. In a few cases, VoIP providers may allow a caller to spoof the Caller ID information, making it appear as though they are calling from a different number. Business grade VoIP equipment and software often makes it easy to modify caller ID information. Although this can provide many businesses great flexibility, it is also open to abuse.

About VoIP -8 Reliability

  About VoIP Reliability Conventional phones are connected directly to telephone company phone lines, which in the event of a power failure are kept functioning by back-up generators or batteries located at the telephone exchange. However, household VoIP hardware uses broadband modems and other equipment powered by household electricity, which may be subject to outages dictating the use of an uninterruptible power supply or generator to ensure availability during power outages. Early adopters of VoIP may also be users of other phone equipment, such as PBX and cordless phone bases, that rely on power not provided by the telephone company. Even with local power still available, the broadband carrier itself may experience outages as well. While the PSTN has been matured o

About VoIP -7 Emergency calls

  About VoIP Emergency calls The nature of IP makes it difficult to locate network users geographically. Emergency calls, therefore, cannot easily be routed to a nearby call center, and are impossible on some VoIP systems . Sometimes, VoIP systems may route emergency calls to a non-emergency phone line at the intended department. In the US, at least one major police department has strongly objected to this practice as potentially endangering the public. Moreover, in the event that the caller is unable to give an address, emergency services may be unable to locate them in any other way. Following the lead of mobile phone operators, several VoIP carriers are already implementing a technical work-around.For instance, one large VoIP carrier requires the regist

About VoIP - 6 Difficulty with sending faxes

  About VoIP Difficulty with sending faxes The support of sending faxes over VoIP is still limited. The existing voice codecs are not designed for fax transmission. An effort is underway to remedy this by defining an alternate IP-based solution for delivering Fax-over-IP, namely the T.38 protocol. Another possible solution to overcome the drawback is to treat the fax system as a message switching system which does not need real time data transmission - such as sending a fax as an email attachment (see Fax) or remote printout (see Internet Printing Protocol). The end system can completely buffer the incoming fax data before displaying or printing the fax image.

About VoIP -5 Quality of Service

  Some broadband connections may have less than desirable quality. Where IP packets are lost or delayed at any point in the network between VoIP users, there will be a momentary drop-out of voice. This is more noticeable in highly congested networks and/or where there is long distances and/or interworking between end points. Technology has improved the reliability and voice quality over time and will continue to improve VoIP performance as time goes on. It has been suggested to rely on the packetized nature of media in VoIP communications and transmit the stream of packets from the source phone to the destination phone simultaneously across different routes (multi-path routing). In such a way, the temporary failures have less impact on the communication quality. In capillary routing it has been suggested to use at the packet level Fountain codes or particularly raptor codes for transmitting extra redundant packets making the communication more reliable. A number of protocols have been