Captcha Page

We apologize for the inconvenience...

To ensure we keep this website safe, please can you confirm you are a human by ticking the box below.

If you are unable to complete the above request please contact us using the below link, providing a screenshot of your experience.

https://ioppublishing.org/contacts/

A Comprehensive Study of VoIP Security

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

voip latest research paper

VoIP Technology: Applications and Challenges

  • © 2019
  • Tamal Chakraborty 0 ,
  • Iti Saha Misra 1 ,
  • Ramjee Prasad 2

Future Institute of Engineering and Management (FIEM), Kolkata, India

You can also search for this author in PubMed   Google Scholar

Jadavpur University, Kolkata, India

Future technologies for business ecosystem innovation (ft4bi), ctif global capsule (cgc), aarhus university, herning, denmark.

  • Provides a comprehensive survey of Voice over Internet Protocol (VoIP) technology and its applications
  • Includes numerous case study examples of VoIP application in real-world systems
  • Supplies state-of-the-art algorithms and protocols

Part of the book series: Springer Series in Wireless Technology (SSWT)

7939 Accesses

9 Citations

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This book offers an accessible introduction and practical guide to Voice over Internet Protocol (VoIP) technology, providing readers with the know-how to solve the problems encountered in applying VoIP technology across all types of network. It incorporates the latest research findings and brings readers up to date with the challenges that are faced by researchers developing novel applications of VoIP.

The authors discuss the general architecture of VoIP technology, along with its application and relevance in conventional and emerging wireless communication networks, including Wireless Local Area Networks (WLANs), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) and Cognitive Radio Networks. The book also includes Quality of service (QoS) studies under dynamic and unpredictable network conditions, which examine the reliability of both legacy systems And the upcoming pervasive computing systems. Further, it explains how the heuristic-based learning algorithms that are used in VoIP communications may help develop today’s technology in the area of autonomous systems.

This book is a valuable source of information for academics and researchers, as it provides state-of-theart research in VoIP technology. It is also of interest to network designers, application architects, and service providers looking for a coherent understanding of VoIP across a wide range of devices, network applications and user categories.

Similar content being viewed by others

voip latest research paper

LTE and Beyond

voip latest research paper

Emerging 5G Wireless Technologies: Overview, Evolution, and Applications

voip latest research paper

Broadband Wireless Technologies

  • VoIP in Wired/Wireless Media
  • VoIP in IEEE 802.11b Networks
  • VoIP QoS Maintenance
  • Adaptive Jitter Buffer Algorithm
  • Cognitive Radio Communication
  • VoIP communications

Table of contents (10 chapters)

Front matter, overview of voip technology.

  • Tamal Chakraborty, Iti Saha Misra, Ramjee Prasad

VoIP Protocol Fundamentals

Quality of service management—design issues, voip over wireless lans—prospects and challenges, technique for improving voip performance over wireless lans, optimizing voip in wlans using state-space search, optimization of codec parameters to reduce packet loss over wlan, qos enhancement using an adaptive jitter buffer algorithm with variable window size, adaptive packetization algorithm to support voip over congested wlans, voip over emerging networks: case study with cognitive radio networks, authors and affiliations.

Tamal Chakraborty

Iti Saha Misra

Ramjee Prasad

About the authors

Dr. Iti Saha Misra is presently holding the post of a Professor in the Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata, India. She was the immediate past Head of the same department. After the completion of PhD in Engineering in the field of Microstrip Antennas from Jadavpur University (1997), she is actively engaged in teaching since 1997. She has 25+ years of research experience in the field of Wireless/Mobile Communication, Microwaves, Microstrip Antennas, Numerical Computational Methods, and Computer Networks. She has developed the Broadband Wireless Communication Laboratory in the Department of Electronics and Telecommunication Engineering of Jadavpur University to carry out advanced research work in wireless communication domain. She is the coordinator of Communication Specialization in the Department of ETCE for post graduate course. She is the recipient of prestigious Career award for Young teachers by All India Council for TechnicalEducation (AICTE) in 2004, obtained IETE Gowri memorial award in 2007 in the best paper category for the topic of “4G networks: Migration to the Future”, co –author of several best paper awards in the wireless communication domain. She has supervised 20 doctoral research students and 50 theses at master’s level in the field of Mobile Communication and Antennas. Under her supervision, two PhD students received the Young Scientist Award from IEEE URSI

International Radio Conference in the year 2014 and 2015 consecutively. Her current research interests are in the areas of Cognitive Radio Networks, VoIP and video Communication over Cognitive platform, Wireless Body Area Networks (WBAN), Low Cost and Energy Efficient IoT Solutions, Call admission control and packet scheduling for wireless and BWA Networks, Radio Resource Management for 5G networks, Channel allocation in Macro/Femto Networks, Mobility Management, Network Architecture and Protocols etc. She has authored more than 210 research papers in refereed Journals and International Conferences and has filed several patents. She is the author of widely acclaimed text book on “Wireless Communication and Networks: 3G and Beyond” published by McGraw Hill. She has supervised several projects from Govt. of India like, DST FIST, DST PURSE, UGC-UPE, AICTE etc. She has visited NTRC Laboratory at Nanyang Technological University, Singapore, Jan 2006 for one month under TEQIP program of Jadavpur University. She is the Senior Member of IEEE, Present ComSoc Chairperson, Kolkata Chapter, the founder Chair of Women in Engineering Affinity Group, IEEE Kolkata Section. Under her leadership, WIE Affinity Group won the WIE Year of the Award in 2007 and IEEE ComSoc Kolkata Chapter won the 2015 and 2017 Chapter Achievement Award. She has served as the Reviewer of several SCI Indexed Journals such as IEEE Transactions on Wireless Communication, IEEE Transaction of Antenna and Propagation, Journal of Wireless Networks, Springer, European Transaction on Telecommunications, Wiley, IEEE Journal APWL, International Journal of RF and Microwave Computer-Aided Engineering etc. along with several IEEE International conference papers.

Dr. Tamal Chakraborty is currently an Assistant Professor in the Department of Computer Science and Engineering, FIEM, Garia, Kolkata. Prior to this he was the assistant Prof. of BITS Pilani Campus. He has received his Ph.D. (Engg.) degree as DST INSPIRE Fellow from the Department of Electronics and Telecommunication Engineering, Jadavpur University, India. He was awarded the University Medal for his M.Tech. degree from Jadavpur University and has received his B.Tech. degree in Computer Science and Engineering from West Bengal University of Technology, Kolkata. He is the recipient of the IEEE Young Scientist Award (1st Prize) 2015 and also the Best Paper Award in ACM International Conference 2012. He has also received the Best Volunteer Award 2017 from IEEEComSoc Society, Kolkata Chapter, India. He has published several SCI and SCI-E Indexed Journal papers (IEEE, Elsevier, Academy Publishers), 16 conference proceeding papers (IEEE, Springer, ACM) and 2 book chapters (Springer). He has attended and delivered several presentations in International Conferences (India, China, Mauritius, Bangladesh), Forums and Invited Talks on upcoming research prospects and applications. His research interests include Wireless Communication and Networking, Voice over IP, Quality of Service studies, Cognitive Radio Networks, Test-bed Prototype Design and Implementation, Intelligent Transportation Systems, Pervasive Computing and related emerging areas in Computing and Communication, where he has filed several patents. He is an IEEE Member and has served as the Reviewer of several SCI Indexed Journals (including the IEEE Transactions on Wireless Communication, Journal on Selected Areas in Communication, IEEE Systems Journal, Computer and Electrical Engineering Journal Elsevier, etc.). As part of his cocurricular activities, he is a literary enthusiast with publications in International Literary Magazines and also an active quizzard holding the 2nd rank in the National Quiz Competition held by Petroleum Conservation Research Association, Government of India.

Dr. Ramjee Prasad, Fellow IEEE, IET, IETE, and WWRF, is a Professor of Future Technologies for Business Ecosystem Innovation (FT4BI) in the Department of Business Development and Technology, Aarhus University, Herning, Denmark. He is the Founder President of the CTIF Global Capsule (CGC). He is also the Founder Chairman of the Global ICT Standardisation Forum for India, established in 2009. GISFI has the purpose of increasing of the collaboration between European, Indian, Japanese, North-American and other worldwide standardization activities in the area of Information and Communication Technology (ICT) and related application areas.

He has been honored by the University of Rome “Tor Vergata”, Italy as a Distinguished Professor of the Department of Clinical Sciences and Translational Medicine on March 15, 2016. He is Honorary Professor of University of Cape Town, South Africa, and University of KwaZulu-Natal, South Africa.

He has received Ridderkorset af Dannebrogordenen (Knight of the Dannebrog) in 2010 from the Danish Queen for the internationalization of top-class telecommunication research and education.

He has been Project Coordinator of several EC projects namely, MAGNET, MAGNET Beyond, eWALL and so on.

He has published more than 40 books, 1000 plus journal and conference publications, more than 15 patents, over 100 PhD Graduates and larger number of Masters (over 250). Several of his students are today worldwide telecommunication leaders themselves.

Bibliographic Information

Book Title : VoIP Technology: Applications and Challenges

Authors : Tamal Chakraborty, Iti Saha Misra, Ramjee Prasad

Series Title : Springer Series in Wireless Technology

DOI : https://doi.org/10.1007/978-3-319-95594-0

Publisher : Springer Cham

eBook Packages : Engineering , Engineering (R0)

Copyright Information : Springer International Publishing AG, part of Springer Nature 2019

Hardcover ISBN : 978-3-319-95593-3 Published: 13 August 2018

Softcover ISBN : 978-3-030-07065-6 Published: 28 December 2018

eBook ISBN : 978-3-319-95594-0 Published: 03 August 2018

Series ISSN : 2365-4139

Series E-ISSN : 2365-4147

Edition Number : 1

Number of Pages : XXXVI, 239

Number of Illustrations : 51 b/w illustrations, 89 illustrations in colour

Topics : Communications Engineering, Networks , Computer Systems Organization and Communication Networks , Information Systems and Communication Service , Wireless and Mobile Communication

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Voice Over Internet Protocol (VoIP) Research Paper

Voice over Internet Protocol (VoIP) refers to the use of packet-switched internet protocol (IP) networks to relay a voice message. VoIP is among the latest modes of communication. As with a majority of the novel technologies, VoIP comes with both opportunities and security challenges. It has a unique architecture compared to the conventional circuit-based telephony. As a result, VoIP is susceptible to numerous security risks.

The benefits of a VoIP system to an enterprise include flexibility and low operation cost. There are different forms of Voice over Internet Protocol systems.

They include mobile units, conferencing units, and the ordinary telephone handsets. For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. A VoIP system has little tolerance for interruptions. There is no single solution to security challenges that face data transmitted over VoIP. Thus, organizations should ensure that they acquire the appropriate network infrastructure.

Introduction

Voice over Internet Protocol refers to a collection of technologies and methods that facilitate the transfer of voice messages over IP networks. Other terms that are used to refer to VoIP networks include Internet telephony, IP telephony, and broadband phone service among others. VoIP systems can run on any form of computer. Additionally, the conventional telephone handsets can be modified to handle VoIP services.

Other equipment that can provide VoIP services includes mobile units, conferencing units, and “softphone”. Cheng and Lai (2010) argue, “Quality of service (QoS) is fundamental to the operation of a VoIP network” (p. 82). Thus, it is imperative to guarantee security measures when operating a Voice over Internet Protocol network.

Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard to guarantee the quality of service. Among the challenges that affect a VoIP network include firewall delays, jitter, encryption-produced latency and blockage of call setups (Cheng & Lai, 2010). One of the benefits of VoIP over other communication networks is that it is cost-effective. The VoIP system compresses the electronic traffic of an organization into a single physical network.

Thus, it saves an institution from the cost of procuring a private branch exchange (PBX). To explore the challenges that affect VoIP networks, this paper will give an overview of the system. It will discuss the equipment, data handling, cost, speed, and security issues that affect a VoIP network. Additionally, the paper will discuss the quality of service issues..

Overview of VoIP

Many people who have the knowledge of data communication might have “little background in transmitting voice or real-time imaging in a packet-switched environment” (Cheng & Lai, 2010, p. 86).

VoIP technology is a novel concept to many people. Most people assume that it is possible to transmit voice messages over the normal network infrastructures without changing them. The reality is that installation a VoIP system results in numerous complications to the ordinary network. A majority of these challenges are made severe by security considerations.

VoIP Equipment

There are different types of Voice over Internet Protocol systems. Almost every computer can support VoIP services. Apple Macintosh iChat, Microsoft NetMeeting, and Linux platforms provide some VoIP services (Chong & Matthews, 2004). Voice over Internet Protocol is the infrastructure that helps to “dial telephone numbers and communicate with people on the other end of a connection who have a VoIP system” (Chong & Matthews, 2004, p. 109).

The increase in demand for VoIP services has led to the development of multiple products. The conventional telephone handsets are developed with additional features to support VoIP services. Some handsets are equipped with a small liquid-crystal display (screen), which helps to configure their advanced functionalities like call-park and conference calls.

Apart from modification of the conventional telephone handsets, VoIP technology has led to the invention of conferencing units. The groups offer services akin to those of the ordinary conference calling phone systems. The only difference is that conferencing units enable users to synchronize data communication services.

The invention of VoIP network has led to an adjustment of the average personal computer (PC) to create a “softphone”. A “softphone” is a collection of a headset, personal computer, software and a cheap connection service (Endler & Collier, 2006). The primary disadvantage of a “softphone” system is that it is prone to privacy and security issues. Personal computers that are connected to the internet get infested with viruses, worms and a multitude of malicious software.

Therefore, it is hard to guarantee the security of a voice message transmitted through a “softphone” system (Endler & Collier, 2006). Besides, personal computers are mostly connected to data networks. Hence, the use of “softphone” system makes it impractical to split data and voice networks. Voice over Internet Protocol system comprises numerous apparatus like routers, call processors, protocols, gateways, and firewalls.

Data handling

Endler and Collier (2006) assert, “Before any voice can be sent, a call must be placed” (p. 24). For a conventional phone system, call placement entails dialing the number of the intended recipient. The telephone company’s system processes the dialed number and connects the caller to the consignee.

Voice over Internet Protocol system operates differently. Once the user dials a number, a composite sequence of packet exchanges ensues in line with a VoIP signaling protocol. The challenge is that while computer systems are distinguished by their Internet Protocol (IP) address, the user dials a regular telephone number to initiate a call. For the call to be completed, the phone number has to be connected to the IP address of the called party.

A set of rules is used to identify the IP address that matches with the recipient’s phone number. Once the recipient answers a call, the voice is changed into a digital signal and split into a series of packets. The entire process begins by changing analog voice pointers to digital. Because digitized voice demands a vast number of bits, “a compression algorithm is used to reduce the volume of data to be transmitted” (Endler & Collier, 2006, p. 31).

The compressed information is entered into data packets for secure transmission. The voice packets use the Real-time Transport Protocol (RTP). Each packet has a unique header field that contains the information used to reconstruct the packets to obtain the voice signal.

One reason many institutions opt to use the VoIP system is that it is cheap compared to other modes of communication. The VoIP system does not use the switched telephone networks. Consequently, it is cheap to transmit voice messages over long distances. The VoIP system does not send voice traffic over the ordinary telecommunication line configurations (Jiang & Henning, 2000). Instead, the traffic travels over private data network lines or the internet.

Voice over Internet Protocol is also cheap since it consolidates all of an institution’s electronic traffic. An institution does not require procuring distinct private branch exchange tile lines for each type of traffic. Even though installing the VoIP system is expensive, a company enjoys noteworthy savings by managing a single network (Jiang & Henning, 2000).

An institution does not incur the cost of maintaining a telephony system. Moreover, the work of the system administrator becomes less tasking. The administrator manages a single instead of multiple networks. A company does not require hiring different workers to manage voice and data networks.

Speed and Quality

Theoretically, Voice over Internet Protocol can minimize the usage of bandwidth and enhance the quality of communication compared to the traditional public switched telephone network. Jiang and Henning (2000) posit, “The use of high bandwidth media, combined with high quality of digitized voice, makes VoIP a flexible alternative for speech transmission” (p. 84). However, the circumstances are quite intricate. System administrators encounter challenges in the effort to channel all the traffic of an organization through a single network.

The network becomes overcrowded leading to delays. The bandwidth usage depends on the digitization of voice by circuits, codecs or software procedures that encrypt and decrypt data for communication.

Therefore, minimizing the usage of the bandwidth may result in sluggish encryption and transmission processes (Jiang & Henning, 2000). Technologists are in the process of enhancing the quality and speed of transmitting voice messages through VoIP systems. Indeed, a majority of the organizations that uses VoIP systems do not detect momentous dilapidation in quality or speed.

Security Issues

The introduction of Voice over Internet Protocol system increases the demand for security measures within a company. A business requires guaranteeing the safety of both its data and voice. The federal government agencies have the duty to safeguard a lot of classified and unclassified data.

The agencies need to protect both the financial and sensitive information. On the other hand, public and private corporations require safeguarding their communications. Bradbury (2007) argues that in an ordinary office telephone system, “security is a more valid assumption” (p. 484).

One can hardly intercept communications. To block the communication, one needs to tamper with the private branch exchange of an institution or access the telephone line. Only institutions that transmit sensitive and classified information opt to encrypt voice traffic. The same does not happen for the Internet-related connections. Information sent via the internet is prone to interceptions. Thus, it is imperative to encrypt it to ensure that it is safe.

Bradbury (2007) alleges that the packets mailed via the internet go through systems that not under the control of both the sender and the recipient. If a hacker accesses one of the systems, they can install programs and screen packets for sensitive information. It underlines the reason people use encryption software to transmit data over the VoIP systems.

The existing internet structural design does not offer the security measures analogous to those of the traditional phone lines. The only way to secure the Voice over Internet Protocol system is to apply security techniques like the ones used to protect data networks. Currently, institutions use firewalls and encryption to secure the VoIP systems.

Quality of Service Issues

According to Bai and Ito (2006), quality of service is paramount to the functionality and effectiveness of a VoIP system. In spite of the installation cost, a VoIP system enhances communication within an organization. However, the discharge of varied security procedures affects the quality of service. For instance, the use of firewalls affects the speed of call setups. Moreover, it results in call delays, jitters, and encryption-produced latency.

Bai and Ito (2006) argue “Quality of service issues is central to VoIP security” (p. 801). If organizations were able to guarantee the quality of service, they would have been in a position to use the security measures used to safeguard data networks.

Nevertheless, it is hard to use most security measures used to secure data networks due to the time-critical state of the Voice over Internet Protocol networks. Also, VoIP systems do not tolerate packet loss and disruptions. The primary quality of service issues related to VoIP includes latency, packet loss, and jitter among others.

According to Kumar (2006), latency in Voice over Internet Protocol refers to the duration that it takes a voice data to travel from the sender to the receiver.

Preferably, institutions would like to use a network that has as low latency as possible. Nevertheless, there are realistic lower limits on the holdup of VoIP. For one-way traffic, the upper bound is 150 milliseconds (ms) (Kumar, 2006). The 150 ms limit corresponds to the present latency limit witnessed in local calls across the public switched telephone network lines in the United States.

The latency bound for international calls is 400 milliseconds. Calls made via the Voice over Internet Protocol network must satisfy the 150 ms limit to imitate the quality of service that the present phones offer. The time constraint experienced in VoIP systems leaves diminutive room for mistakes in packet delivery (Kumar, 2006). Further, it makes it difficult for institutions to implement many security techniques.

The process of data encryption and shipment across the United States may take up to 130 milliseconds. The time taken to transmit voice data across the North American continent may be less than 100 milliseconds. Security discharge and queuing take between 20 and 50 milliseconds.

Kumar (2006) maintains that delay does not only arise at the terminals of the system. Every leap along the system results in a fresh queuing delay and probably a processing latency for the case of a safety checkpoint. Also, transmission of big packets may lead to bandwidth jamming and increased latency. Therefore, Voice over Internet Protocol networks work well with small packages.

Toral, Torres, Hernandez, and Estrada (2008) define jitter as the inconsistent packet delays. It results from limited bandwidth conditions in VoIP networks and may have severe effects on the overall quality of service. Toral et al. (2008) claim, “Variations in delays can be more detrimental to the quality of service than the actual delays” (p. 14).

Jitter may lead to erroneous reassembling of packets. Real-time Transport Protocol (RTP) depends on User Datagram Protocol (UDP). As a result, jumbled packets are not reconstructed at the protocol level. Nonetheless, RTP enables programs to reorganize the packets using the timestamp and sequence number fields. The cost of rearranging the packets is intractable when dealing with the stretched time limits of voice over Internet Protocol.

An increase in jitter results in the packets arriving at the terminal in bursts. Therefore, to manage jitter at the terminals, it is imperative to use a buffer. Toral et al. (2008) allege that for a buffer to be effective, it has to release the packets after every 150 milliseconds to minimize variations in delays.

Toral et al. (2008) maintain that the buffer implementation gets complicated when it is hard to tell if a missing packet is lost or delayed. If a latency is principally unreliable, the system cannot rely on historical delay times to determine the condition of a missing packet. Apart from the buffer, individuals can use firewalls and routers to manage jitter.

They can also use network elements that process data based on its urgency. Another way that an institution might mitigate jitter in its VoIP system is by enhancing the usage of the bandwidth. Nevertheless, it is hard to improve bandwidth usage without compromising the security of the data.

Packet Loss

Melvin and Murphy (2007) maintain that Voice over Internet Protocol is extremely intolerant of packet loss. Packet loss may arise as a result of excess latency. Some packets fail to reach the destination on time leading to them being cast off to accommodate the newer ones. Packet loss may also arise due to jitter. The primary reason VoIP is prone to packet loss is because it relies on the Real-time Transport Protocol.

A packet may reach the destination after its adjacent packets have been removed from the buffer, thus rendering it redundant (Melvin & Murphy, 2007). VoIP packets are normally minuscule and carry little information. Hence, it might be hard for a person to detect the missing words in case of packet loss. The only disadvantage is that packets are not lost separately. Bandwidth overcrowding and other sources of packet loss interfere with all the packages that are in transit.

The loss of a single packet might not affect the meaning of the intended message. Nevertheless, probabilistically “the loss of one packet means the loss of several packets” (Tadeus, 2004, p. 179). In other words, the loss of a single packet may result in the loss of numerous packets, thus degrading the quality of service.

Although it is hard to use an efficient delivery protocol like Transmission Control Protocol to enhance the quality of service, one can still minimize the challenge of packet loss. Tadeus (2004) argues that one cannot ensure that all the packets reach the intended destination. If one has an adequate bandwidth, they can send redundant information to cancel the prospect of loss. The problem is that it is hard to get such bandwidth.

The introduction of redundant information results in latency and, at times, aggravates packet loss. Steps are underway to develop novel codecs like internet Low Bit-rate Codec that tolerate packet loss. The codecs will guarantee that the meaning of a message does not change despite the loss of some packets.

The development of Voice over Internet Protocol network is a complex process that must be handled with great care. The network managers can hardly detect the numerous challenges that affect data packets. The incorporation of a VoIP system into an already overworked network may be detrimental to an organization. There is no approved solution to the challenges, which affect voice data that is in transit via a VoIP network.

Organizations must use different solutions selectively according to the nature of VoIP system that they use. Institutions can run secure VoIP systems; however, they have to incur a high cost with respect to installing security measures. Until the experts come up with a reliable and efficient method of running a VoIP network, organizations should operate their systems cautiously. They should ensure that they acquire the correct software and establish the appropriate network infrastructure.

Bai, Y., & Ito, M. (2006). A study for providing better quality of service to VoIP users. Advanced Information Networking and Applications, 1 (2), 799-804.

Bradbury, D. (2007). The security challenges inherent in VoIP. Computers & Security, 26 (7), 485-487.

Cheng, F., & Lai, W. (2010). An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan. Digital Investigation, 7 (2), 81-89.

Chong, H., & Matthews, H. (2004). Comparative analysis of traditional telephone and voice-over-internet protocol (VoIP) systems. Electronics and the Environment, 3 (1), 106-111.

Endler, D., & Collier, M. (2006). Hacking exposed VoIP: Voice over IP security secrets & solutions , New York: McGraw-Hill.

Jiang, W., & Henning, S. (2000). Analysis of on-off patterns in VoIP and their effect on voice traffic aggregation. Computer Communications and Networks, 4 (1), 82-87.

Kumar, A. (2006). An overview of voice over internet protocol (VoIP). Rivier College Online Academic Journal, 2 (1), 1-13.

Melvin, H., & Murphy, L. (2007). Time synchronization for VoIP quality of service. Internet Computing, 6 (3), 57-63.

Tadeus, U. (2004). Quality of service in VoIP communication. International Journal of Electronics and Communications, 58 (3), 178-182.

Toral, H., Torres, D., Hernandez, C., & Estrada, L. (2008). Self-similarity, packet loss, jitter, and packet size: Empirical relationships for VoIP. Electronics, Communications and Computer, 5 (3), 11-16.

  • The Global Revolution in Mobile
  • Ephone v900 Mobile Telephone Advert
  • Analogue to Digital Sound Effect Processor
  • Steganography in Current Digital Media
  • LAN Design for Return2Fender Company
  • Twitter Discussion Application Programming Interface
  • You Cannot Live Without Mobile Phones
  • My Favourite Mobile Apps
  • Value of Smartphone Security
  • Monopolistic Competition of Smart Phones
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2019, June 3). Voice Over Internet Protocol (VoIP). https://ivypanda.com/essays/voice-over-internet-protocol-voip/

"Voice Over Internet Protocol (VoIP)." IvyPanda , 3 June 2019, ivypanda.com/essays/voice-over-internet-protocol-voip/.

IvyPanda . (2019) 'Voice Over Internet Protocol (VoIP)'. 3 June.

IvyPanda . 2019. "Voice Over Internet Protocol (VoIP)." June 3, 2019. https://ivypanda.com/essays/voice-over-internet-protocol-voip/.

1. IvyPanda . "Voice Over Internet Protocol (VoIP)." June 3, 2019. https://ivypanda.com/essays/voice-over-internet-protocol-voip/.

Bibliography

IvyPanda . "Voice Over Internet Protocol (VoIP)." June 3, 2019. https://ivypanda.com/essays/voice-over-internet-protocol-voip/.

  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

COMMENTS

  1. A study of Voice-over-Internet Protocol quality metrics

    This study offers an insight of the most preferred metrics to be used to measure VoIP quality. The question we try to answer in this study is: What are the most preferred metrics used to measure VoIP quality? 2. Research methodology This study has reviewed 38 papers relevant to VoIP quality metrics.

  2. 41079 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on VOIP. Find methods information, sources, references or conduct a literature review on VOIP

  3. Voice Over Internet Protocol: Vulnerabilities and Assessments

    Voice Over Internet Protocol (VoIP) is an important technology in a network Communication system. In the Communication System, security is an important factor. Nowadays, session initial protocol is mostly used in VoIP Services. Session Initiation Protocol is used for many security risks, as well as for flooding and developed in an inclusive environment. Flooding is an attack called Denial of ...

  4. Voice over Internet protocol (VoIP)

    During the Internet stock bubble, articles in the trade press frequently said that, in the near future, telephone traffic would be just another application running over the Internet. Such statements gloss over many engineering details that preclude voice from being just another Internet application. This paper deals with the technical aspects of implementing voice over Internet protocol (VoIP ...

  5. Full article: Design and implementation of a VoIP PBX integrated

    The main contribution of this paper is to design and implement a VoIP PBX (Asterisk)-integrated VVA built on the Google Cloud platform (https: ... Tamkang University, New Taipei, Taiwan. His research interests include Artificial Intelligence, Autonomous Robot (UAV, AGV), Decision and Control, Optimization Algorithms, Big Data and Internet of ...

  6. (PDF) A Closer Look on Challenges and Security Risks of Voice Over

    This paper aims to direct future research efforts and to offer helpful guidelines for practitioners. Keywords-Network security, Speaker Detection, attack on VoIP, Tracing a VoIP call, voice over ...

  7. A Survey on Voice over Internet Protocol (VoIP) Reliability Research

    [3] Sinaeepourfard A and Hussain H M 2011 Comparison of VoIP and PSTN services by statistical analysis IEEE Student Conference on Research and Development 459-461. Google Scholar [4] Raj R, Gagneja A and Singal R 2012 Voice over Internet Protocol-The Technology and Its Application International Journal of Scientific and Engineering Research 3 1-6

  8. A Comprehensive Study of VoIP Security

    Voice over Internet Protocol (VoIP) Service has been the implementation over the past few years. Most of the Organizations which have implemented VoIP Services over there are either unaware or ignoring the security and Vulnerabilities issues with VoIP. a VoIP network is also susceptible to abuse and easy to exploit. Here, I would like to discuss various Exploitation techniques followed by ...

  9. VoIP Technology: Applications and Challenges

    This book is a valuable source of information for academics and researchers, as it provides state-of-theart research in VoIP technology. It is also of interest to network designers, application architects, and service providers looking for a coherent understanding of VoIP across a wide range of devices, network applications and user categories.

  10. Voice Over Internet Protocol (VoIP) Research Paper

    VoIP is among the latest modes of communication. As with a majority of the novel technologies, VoIP comes with both opportunities and security challenges. It has a unique architecture compared to the conventional circuit-based telephony. As a result, VoIP is susceptible to numerous security risks.