Voice Over IP Technology. Zlatko Jovanovic. International Academy of Design and Technology



Similar documents
Multi-layered Security Solutions for VoIP Protection

Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud Supervisor: Prof.Dr. Shawkat K.Guirguis

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

Promoting Network Security (A Service Provider Perspective)

Security and Risk Analysis of VoIP Networks

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

Is Skype Safe for Judges?

Threat Mitigation for VoIP

Iowa Wireless Services, LLC. Open Internet Rules. Network Practices, Performance Characteristics, and Commercial Terms. For Mobile Services

INTERBEL TELEPHONE COOPERATIVE. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Open Internet Policy

Implementation Guide. Simplify, Save, Scale VoIP: The Next Generation Phone Service. A single source for quality voice and data services.

Best Practices for Securing IP Telephony

VoIP / SIP Planning and Disclosure

Colt Smart Office. Flexible network services for the smaller business. / Next

FAQ: Introduction to VoIP for Small Businesses/SOHO

VOIP Security Essentials. Jeff Waldron

Security - A Holistic Approach to SMBs

Voice Over IP and Firewalls

These practices, characteristics, terms and conditions are effective as of November 20, 2011.

VoIP Resilience and Security Jim Credland

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Recommendations for secure deployment of an IP-PBX

Hosted Voice. Best Practice Recommendations for VoIP Deployments

Voice over IP Communications

NETWORK NEUTRALITY NETWORK MANAGEMENT POLICY WEBSITE TEXT

Internet access for home and business. home business internet

Is Skype Safe for Judges?

PBX Fraud Educational Information for PBX Customers

How To Get A Phone Service For Free

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

Northwest Community Communications, Inc. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

VoIP and Beyond. Alex Gatiragas Product Manager Enterprise Convergence NEC Business Solutions Limited

Countdown to Satisfaction: Top Considerations in Choosing a Hosted VoIP Provider. Practical Guidance for Purchasing Hosted Voice Solutions

HOSTED VOICE Bring Your Own Bandwidth & Remote Worker. Install and Best Practices Guide

How Small and Medium-Size Firms Migrating to VoIP Technology Can Create Significant Value with UNIVERGE 360

PETER CUTLER SCOTT PAGE. November 15, 2011

How To Use A Phone Line With A Broadband Internet Connection (Voip)

Ingate Firewall/SIParator SIP Security for the Enterprise

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.

Frequently Asked Questions

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

South Dakota Network, LLC (dba SDN Communications) Open Network Policies

1 Introduction to the Axxess Server

Internet access for home and business. home business internet

8335 Guilford Road Suite H Columbia MD

Glossary of Telco Terms

3 Reasons Businesses Use VoIP

I. Network Management Practices

A New Look at VoIP. Smarter Phone Systems Choices for Small and Medium Businesses

GIVING YOUR BUSINESS THE HIGH-SPEED ADVANTAGE

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

IP TELEPHONY TAKE YOUR BUSINESS COMMUNICATIONS TO THE NEXT LEVEL

VoIP Security, an overview of the Threat Landscape

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

Edgewater Routers User Guide

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

The Regulatory framework and VoIP. Merijn Schik, DG INFOSOC

Mitigating the Security Risks of Unified Communications

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Voice over IP is Transforming Business Communications

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Telephone Services and

Hosted Business Class VoIP Features

Firewall and UTM Solutions Guide

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

VIII. Deployment Schedule

Pocket E-Guide. Sponsored By:

How To Prevent Hacker Attacks With Network Behavior Analysis

ITSPA. Recommendations for secure deployment of an IP-PBX. Public. Node4 Limited Richard Buxton 31/05/2011

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

Is Hosted VoIP Right For You?

Top tips for improved network security

The RC Family of Companies Network Management Practices Policy Disclosure

Software Engineering 4C03 SPAM

Telephone Services and Systems 01. Telephone Services and

Today's security needs in networking

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

MANAGED TELEPHONE AND INTERNET SERVICES

Appendix A: Customer Preparation and Considerations

Chapter 1 - Introduction

Anti-SPAM Solutions as a Component of Digital Communications Management

Transitioning Business Telephony from Legacy to VoIP: A Brief Introduction by: Mark Wiles / VP of Engineering

Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

Broadband Business Survey

VoIP Security regarding the Open Source Software Asterisk

Buying a VoIP Business Phone System

The #1 Issue on VoIP, Fraud!

esoft Technical White Paper: Who Needs Firewall Protection?

CE Advanced Network Security VoIP Security

Security & Reliability in VoIP Solution

Edgewater Routers User Guide

The All-In-One Solution for Your Business Needs. Avaya TM. IP Office Solution

Transcription:

Voice Over IP Technology Zlatko Jovanovic International Academy of Design and Technology

Abstract New technologies often give us new, different way of doing things, than we are used to. One of the new technologies that are changing our common way of making voice calls is VoIP Voice over Internet Protocol. In the text we will see its definition, purpose, advantages and disadvantages, and the issues that it brings with its implementation. Keywords: VoIP, voice call, internet protocol, providers, spit, fraud, denial of service.

Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. (FCC, 2010) VoIP service can be utilized through a computer or through a special VoIP phone, the Broadband Phone. Service purchase is needed from a service provider. There are hundreds of VoIP service providers, who also sell equipment and perform the installation. Some providers are offering service with the ability to call numbers with the same service only, and some are giving the opportunity to call any phone number, sometimes including even international calls. One of many advantages of VoIP service is lower price than the regular phone service, comparing the quality and variety of services provided. But VoIP service needs internet connection to operate, so price paid for internet service must be included in total VoIP service price, in order to calculate its profitability. Reason for low prices is that providers do not have to maintain the network. It uses the same, existing infrastructure, which is used for the internet. Another advantage is ability to leave a voice mail to e-mail, which is a great way of notifying the person. The businesses usually need more than one line, one number. Solution is PBX - Private Branch Exchange. It gives the opportunity for extensions instead of separate phone lines. (VoIP Review, 2010) Security is of the essence when using VoIP service, and almost all disadvantages are connected to the security. That is the issue service providers, equipment makers, and software writers have to focus on, because hackers are a step ahead so far. Another disadvantage is the fact that voice quality is very low with the internet connections with lower bandwidths and speeds. This was tested with Magic Jack. On dial-up connection, it did not work, and on ADSL

(Asymmetric Digital Subscriber Line) call took so much of bandwidth, that any other internet activity on the host PC, disrupted the call and made it unclear. Also drop calls are possible with heavy data traffic. Quality depends on total use of internet connection (data transfers, web surfing, streaming medias, etc) and not only voice calls. Some VoIP services don't work during power outages and the service provider may not offer backup power. Not all VoIP services connect directly to emergency services through 9-1-1. (FCC, 2010) VoIP providers may, or may not, offer directory assistance or white page listings. Fortunately, those things will probably be fixed in a near future as the VoIP gets more popular. According to Plewes (2007), three most dangerous threats are: denial of service, spit (spam over internet telephony), and fraud. Denial of service treat requests installation of firewall, updated antivirus software, and if possible, separate VLAN for telephony and other network traffic. The potential threat posed by spit is driving vendors to develop alternative anti-spam solutions. NEC has announced a modular tool called VoIP Seal that uses a combination of methods to identify spit. When a call comes in, the system checks to see if the call is potentially a spam call by checking whether it comes from a suspect source. (Plewes, 2007). Third treat is fraud. The biggest concern for business is probably going to be premium-rate fraud, where a criminal hacks into the VoIP system and makes calls to a premium rate number. (Plewes, 2007). Solution for this treat could be accounting software, which will recognize anomalies in billing and give a warning. Security issues for VoIP are real, but with good precaution they can be minimized if not completely removed. After all, companies can improve their business, and save money with implementing the VoIP service.

References Federal Communications Commission (February 01, 2010). Voice over Internet Protocol. Frequently Asked Questions. Retrieved from http://www.fcc.gov/voip/ VoipReview.org (2004-2010). PBX Phone Systems. Compare Business PBX Telephone Solutions IP PBX. Retrieved from http://www.voipreview.org/business_telephone_systems/digital_pbx Plewes, A. (2007). The biggest VoIP security threats - and how to stop them. Analysis: Forewarned is forearmed.retrieved from http://www.silicon.com/legacy/research/specialreports/voipsecurity/