SlideShare a Scribd company logo
1 of 21
Download to read offline
VOIPTHE ULTIMATE GUIDE
VERSION 1.0
9/23/2014
onevoiceinc.com
WHAT IS VOIP
REQUIREMENTS OF A VOIP SYSTEM
IMPLEMENTING A VOIP SYSTEM
METHODS OF VOIP
BENEFITS OF VOIP
PROBLEMS OF VOIP
VOIP SECURITY
VOIP PURCHASING GUIDE
WHAT’S IN THIS GUIDE?
WHAT IS THIS GUIDE?
This guide will be a continuous and ongoing project from OneVoice to create an all
encompassing guide to VoIP Communications. The world of VoIP can often be a
confusing area to understand - and we hope that this guide will provide some high
level understanding, with supplementary technical information for those that want to
understand more detail.
WHAT DOES IT COVER?
This guide is initially intended to cover the business application of Hosted VoIP.
We hope to eventually turn this into an all encmopassing guide to all types of VoIP
Communications, but that’s going to take quite a while to accomplish.
While the primary focus of this guide will be on Hosted VoIP - we will try to cover as
much of its counterparts as possible. As you read this guide, many of the concepts
of Hosted VoIP can be applied to On Premise solutions. As we discuss, the only real
difference is where the “brains” of the system are housed.
With that said, we will be releasing an ultimate guide to SIP, which will primarily focus
on non-hosted solutions.
WHO SHOULD READ IT?
This guide is intended for anyone in a small to medium sized business who is involved
with the purchase or use of a VoIP platform.
In this guide, we’re going to address the concept of VoIP as a means for placing and receiving phone
calls that are to and from the PSTN (Public Switched Telephone Network) or at least seem as if they
are. Since two end users may be on the same Hosted VoIP Network, the call may technically never
leave the Hosted VoIP provider’s network – but as far as the end user is concerned the call did.
There are different protocols that could be used to transmit VoIP – we’re going to focus on one of the
dominant protocols - SIP.
Don’t worry - if none of this makes sense right now, it will by the time you’re done with this guide!
INTRODUCTION
WHAT IS VOIP1
VV VOICE
OO OVER
II INTERNET
PP PROTOCOL
VoIP, in its very basic sense, is
the transmission of any voice
across any communication
method that uses the
Internet Protocol.
The Internet that we use every day uses
the Internet Protocol to connect all of
our computers and devices together.
So most people associate VoIP with
placing a phone call over the internet.
Although most people associate VoIP with placing phone calls over the internet, VoIP calls can be placed
across private networks as well. As long as the voice is being transmitted as packets using the Internet
Protocol, it is considered VoIP.
For the purposes of this guide we will be primarily talking about calls made using the public internet as the
means of transportation. It’s also fair to note that most of this guide will try to focus on cloud based VoIP
services; also known as Hosted PBX or Hosted VoIP.
IMPORTANT: For the remainder of this guide we will be using the term IP Network; or rather any
network that uses the IP Technology. This term includes the Internet as a whole. If for some
reason we need to refer to something specific about the public internet, we will directly refer to it.
Otherwise, IP Network will include all networks (Including private networks and the public internet)
that uses the IP.
This is the foundation of the VoIP process at a very basic level.
00101001
11001001
11010110
11001001
00101001
11010110 PACKET
OUT TO THE INTERNET
Your voice enters a device as
a sound wave
The device samples parts of
the wave, turning the sample
into bits (computer code)
The device takes these bits
and puts them into packets to
send across to the internet
This procedure is then reversed on the receiving end.
That is how VoIP works
NEXT: What a Typical VoIP Setup Requires in Order to Work
CONVERTER COMMUNICATION
CONNECTION
Any VoIP system requires three basic components: a device to turn your voice into digital packets
(converter), a device that controls what to do with those packets (communication), and a digital
path (connection) to send the packets along.
In a typical business VoIP setup these devices are the IP Phones, IP PBX, and Internet Data
Connections, respectively.
The IP Phones are what handle the conversion of your Voice into Data Packets. The IP PBX is
the “brains” of your phone system, handling what actually happens with those data packets and
your phone system as a whole (including features like voicemail). The Data Connections are what
allows you to send your Voice Packets from your IP Phone to the IP PBX and out to the internet.
NEXT: The Main Types of VoIP
REQUIREMENTS OF
A VOIP SYSTEM2
NEXT: The Main Methods of VoIP
IMPLEMENTING A
VOIP SYSTEM3
ON PREMISE HOSTED
The main difference between an On Premise solution and a
Hosted solution is where the IP-PBX is located.
PHONES AND IP PBX
ARE LOCATED IN
YOUR OFFICE
PHONES ARE LOCATED IN
THE OFFICE WHILE THE
IP PBX IS LOCATED
IN THE CLOUD
The Hosted Solution is much like any other Hosted Service provider out there. For example,
traditionally, a company had to keep all of their files on a server that was managed and maintained
in the company’s building. Employees would use their computers to access the data on the
company server.
Today, many companies are moving to cloud file storage. While they’re still able to access their
files from their same computer, the files are now physically stored on the service providers servers.
Hosted VoIP and On Premise VoIP work the same way.
There are three main methods of implementing VoIP. In all three cases the goal of the device is to
convert the sound waves of your voice (analog sound) into digital packets to be sent across an IP
Network.
In all three scenarios the three main components of a VoIP System are covered.
NEXT: The Benefits of VoIP
METHODS OF VOIP4
PC to PC
One of the most commonly used methods
of VoIP today. Google Talk, Skype and
Teamspeak are all PC to PC Methods.
ATA Device
Analog Telephone Adapter (ATA) allows you
to connect an old fashion telephone to a VoIP
platform.
IP Phones
These phones have the VoIP technology built
into them and are most commonly used in
business settings.
COST MOBILITY GROWTH
While there are many benefits that VoIP Solutions can offer businesses, VoIP Solutions offer three
main benefits for businesses across the board.
BENEFITS OF VOIP5
There are some additional costs to each of the options listed above. A regular pots line requires the
purchase of any regular phone that will receive a regular dial tone.
A VoIP system requires that you have IP based Phones or an ATA device. IP phones are usually more
expensive than a regular telephone. Many hosted providers can sell you phones upfront, or you can
rent phones from them for an additional monthly cost.
A PRI circuit, although the cheapest per call option, requires an expensive upfront investment in a
PBX. There are some free open source PBXs on the market, however it would still require some sort
of investment in a staff member or outside IT Consultation service to implement and maintain the
PBX.
Comparative Alternatives
POTS LINE
1 Call Per Line
Per Line Cost
$20 - $50 / Line
No Extra Features
PRI
23 Calls Per Circuit
Per Circuit Cost
$300+ / Circuit
Connection Only
VOIP
1 Call Per Seat
Per Seat Cost
$20 - $30 / Seat
Connection + Features
Remember that VoIP systems only require 3 things
1) A Device to Convert your Voice
2) A Device to Handle the Calls
3) A Data Connection between the two devices
Because of that - as long as your IP Phone can communicate with a PBX (Hosted Provider) you can
use your phone anywhere that you have an internet connection.
With an on premise PBX system, the ability for remote users across the Internet will need to be
configured. With Hosted PBX solutions, this is a native feature.
You are able to take your IP Phone home, allowing you to make calls as if you were sitting at your
desk.
Since Hosted VoIP is usually sold on a Per User basis, the ability to scale the system can be as
simple as adding another user and phone.
In Theory - there isn’t a limit to the number of users that you can put onto a VoIP System. The
practical limitation is the amount of bandwidth required for each concurrent phone call. There are
also some hardware limitations that could come into effect with some extremely high call volume.
The best way to think about it is like using the internet at home, the more people that are using it, the
slower it gets.
As long as you are aware of the hardware requirements and data connection requirements, your VoIP
System can grow with your company.
NEXT: The Problems of VoIP
GROWTH WITH VOIP
QUALITY OF SERVICE IS ONE OF THE BIGGEST OBSTACLES TO
OVERCOME WITH VOIP SOLUTIONS
Latency is the overall time it takes for a single packet to go from the speaker to the listener. In
the VoIP world the recommended maximum latency is 150ms. Anything above 150ms and you begin
to have quality issues with the call.
Jitter is the change in the latency during a given call. While your overall call may have a latency
of 50ms, any spikes in latency would be the Jitter on the call. If Jitter is high, it can cause packets to
arrive out of sequence and be discarded. This discarding of packets can lead to...
Packet Loss is anytime a packet doesn’t make it to the reciever or doesn’t make it in time.
Since VoIP is a Real Time communication protocol, if a packet is lost then a small piece of the
conversation is lost. While generally a few packets here and there won’t be a problem, large packet
losses can sound like the person is “breaking up” on the other end.
NEXT: VoIP Security
PROBLEMS OF VOIP6
LATENCY JITTER LOSS
ISSUES ENCRYPTION
PROCEDURES
Know the
threats that your
system can be
vulnerrable to
Encryption is
available, but you
have to weigh the
costs
Every security
system has the
same weakest
link
VoIP solutions are wonderful, cost effective options that can provide
your company with communication options to help run your business.
However, since VoIP is over an IP Network, some of the same Data Security concerns now also
apply to Voice traffic.
In this section we go over some of the issues specific to VoIP, some popular Encryption options,
Procedures and Policies that can help your VoIP solution stay secure and the Hardware most likely
involved in all of these areas of security.
VOIP SECURITY7
TOLL
FRAUD
DOS
ATTACK
MITM
ATTACK
Toll Fraud happens when an unauthorized user makes long distance phone calls from your
system, causing you to be billed for the charges.
DoS Attack, Denial of Service Attack, is when an outside user floods your system with so many
packets that it causes a network traffic jam. In many cases this can lead to a complete loss of service
until the DoS attack is finished.
MITM Attack, Man it the Middle Attack, happens when an unauthorized user is able to intercept
voice packets. If these packets are not encrypted the unauthorized user can use programs to decode
the packets and listen in on the conversation.
COMMON VOIP
SECURITY ISSUES
Quality of VoIP is already susceptable to latency
issues. Adding Encryption will increase the
latency in the system - as each packet will need
to be encrypted and decrypted.
Transport Layer Security (TLS) helps to encrypt the SIP messaging, but does not
actually encrypt the voice packets. TLS is still beneficial because it will make it harder for someone
to know the two endpoints of the VoIP call.
Secure Real-time Transport Protocol (SRTP), is a protocol that actually encrypts
the voice packets themselves. Since there are millions of voice packets, and each one needs to be
encrypted, this can compound other latency issues that may exist.
Virtual Private Network (VPN), VPN creates a secure “tunnel” through the internet. While
this remains to be a possible solution, it’s not viable for large call volumes.
Multiprotocol Label Switching (MPLS), is another type of private network. This is
more commonly used for VoIP calls between multiple business locations.
Ask your hosted VoIP provider for what encryption
methods they offer.
VOIP
ENCRYPTION
NUMBER 1 SECURITY PROBLEM?
THE HUMAN!
You can have the strongest and most secure system - but if you leave
the keys on the dashboard, then it won’t matter.
Procedures, it’s vitally important that your company has procedures in place that limit the
number of people who have administrative access to your system.
Passwords, Ensure that all default passwords are changed immediately! This includes
passwords on routers, switches, firewalls, phones, online portals and voicemail accounts. Choose
something that’s hard to guess, with a mix of uppercase, lowercase, numbers and special characters.
The longer and more random the password, the more secure the system is.
Policy, Sometimes things go wrong - have a policy in place to minimize the damages that could
occur if your system is compromised.
NEXT: VoIP Purchasing Guide
SECURITY VOIP
PROCEDURES
33 VENDOR
11 ASSESSMENT
22 EQUIPMENT
This final section is broken up into 3 subsections.
Each sub-section of this part of the guide will contain a one page checklist that you can print out and
use for yourself.
Assessment- It’s important to take note of your current setup as it works today. Your new VoIP
system should do everything that you can do today.
Equipment- Once you know what you want to do, you need the Equipment that will do the job.
Vendor- Choosing the right vendor that covers everything you need is Crucial!
VOIP PURCHASING
GUIDE7
Inbound Call Flow
Outbound Call Flow
ASSESSMENT CHECK LIST
VOIP PURCHASING GUIDE
onevoiceinc.com
On Site Employees
Number of Employees requiring
individual phone use on site
Remote Employees
Number of Employees requiring
remote phone use
(print and fill out)
Single Company
Sometimes multiple companies may share the
same phone system.
This can alter the type of system you need.
Multiple Companies
Employees Can Be Reached
Directly
Through Receptionist
Through an IVR
Voicemail
Company
Individual
Call Routing by Schedule
Non-Business Hours
Holidays
Other Inbound Requirements
Ring / Hunt Groups
Music On Hold
Find Me / Follow Me
Call Types
Long Distance
International
Outbound Caller ID
Special Call Routing/Handling
Fax Numbers
On Premise Specific
Extra Items
EQUIPMENT CHECK LIST
VOIP PURCHASING GUIDE
onevoiceinc.com
Desk Phones
(print and fill out)
On Premise
Depending on whether you want an On Premise
or Hosted solution will determine how much
equipment will be on site.
Hosted
IP-PBX
Session Border Control
Headsets
Receptionist Phones
Conference Phones
Connection Devices
Sidecar Add-Ons
Cables Power Supplies
This checklist should be used to help you map out what equipment
you already have, and what you might need. Not everything listed is
required - this is just to give you something to check.
Connection
Public Internet
Private Network
Router
Managed Switch
Firewall
PoE
802.11q (VLAN)
802.11p (QoS)
Features
VENDOR CHECK LIST
VOIP PURCHASING GUIDE
onevoiceinc.com
(print and fill out)
Phone Types
Routers
Voicemail
Encoding
IVR Find Me / Follow Me
Use this checklist to make sure that the vendor you’re considering
covers everything you need.
Minutes
Pay Per Minute
Minutes Packages
Call Schedules Call Recording Softphone
Equipment Compatability
List Of...
Unlimited Minutes
Acceptable Use Policy
Prices & Contracts
Month to Month
Annual Contract
Encryption
TLS IPSec SRTP
G.711
G.729

More Related Content

What's hot (20)

Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
Voip
Voip Voip
Voip
 
Voip phone system
Voip phone systemVoip phone system
Voip phone system
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 
Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
VoIP Phones - Future of VoIP Telephone Systems
VoIP Phones - Future of VoIP Telephone SystemsVoIP Phones - Future of VoIP Telephone Systems
VoIP Phones - Future of VoIP Telephone Systems
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overview
 
PBX.NET Hosted PBX | Business VOIP Sales Presentation
PBX.NET Hosted PBX | Business VOIP Sales PresentationPBX.NET Hosted PBX | Business VOIP Sales Presentation
PBX.NET Hosted PBX | Business VOIP Sales Presentation
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP Presentation
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
VOIP
VOIPVOIP
VOIP
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Voip
VoipVoip
Voip
 
What is SIP Trunking?
What is SIP Trunking?What is SIP Trunking?
What is SIP Trunking?
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP
 

Similar to Ultimate guide to voIP

introduction to voip
introduction to voipintroduction to voip
introduction to voipdeeq maxamed
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsAshik Jibon
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfOkan YILDIZ
 
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paperVoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paperALTANAI BISHT
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation tofael1
 
VoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showVoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showmarilynjolly
 
A study on voice over internet protocol
A study on voice over internet protocolA study on voice over internet protocol
A study on voice over internet protocolNeelesh verma
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056mashiur
 
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?XO Communications
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applicationsirjes
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptNasir152222
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptAlKir1
 

Similar to Ultimate guide to voIP (20)

VoIP
VoIPVoIP
VoIP
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
introduction to voip
introduction to voipintroduction to voip
introduction to voip
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling Environments
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdf
 
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paperVoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation
 
VOIP Presentation
VOIP PresentationVOIP Presentation
VOIP Presentation
 
Questions for VoIP Installers.docx
Questions for VoIP Installers.docxQuestions for VoIP Installers.docx
Questions for VoIP Installers.docx
 
VoIP for Dummies
VoIP for DummiesVoIP for Dummies
VoIP for Dummies
 
VoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showVoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 show
 
A study on voice over internet protocol
A study on voice over internet protocolA study on voice over internet protocol
A study on voice over internet protocol
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056
 
Sip trunking-requirements
Sip trunking-requirementsSip trunking-requirements
Sip trunking-requirements
 
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
 
Voip
VoipVoip
Voip
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Ultimate guide to voIP

  • 1. VOIPTHE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com
  • 2. WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP VOIP SECURITY VOIP PURCHASING GUIDE WHAT’S IN THIS GUIDE?
  • 3. WHAT IS THIS GUIDE? This guide will be a continuous and ongoing project from OneVoice to create an all encompassing guide to VoIP Communications. The world of VoIP can often be a confusing area to understand - and we hope that this guide will provide some high level understanding, with supplementary technical information for those that want to understand more detail. WHAT DOES IT COVER? This guide is initially intended to cover the business application of Hosted VoIP. We hope to eventually turn this into an all encmopassing guide to all types of VoIP Communications, but that’s going to take quite a while to accomplish. While the primary focus of this guide will be on Hosted VoIP - we will try to cover as much of its counterparts as possible. As you read this guide, many of the concepts of Hosted VoIP can be applied to On Premise solutions. As we discuss, the only real difference is where the “brains” of the system are housed. With that said, we will be releasing an ultimate guide to SIP, which will primarily focus on non-hosted solutions. WHO SHOULD READ IT? This guide is intended for anyone in a small to medium sized business who is involved with the purchase or use of a VoIP platform. In this guide, we’re going to address the concept of VoIP as a means for placing and receiving phone calls that are to and from the PSTN (Public Switched Telephone Network) or at least seem as if they are. Since two end users may be on the same Hosted VoIP Network, the call may technically never leave the Hosted VoIP provider’s network – but as far as the end user is concerned the call did. There are different protocols that could be used to transmit VoIP – we’re going to focus on one of the dominant protocols - SIP. Don’t worry - if none of this makes sense right now, it will by the time you’re done with this guide! INTRODUCTION
  • 4. WHAT IS VOIP1 VV VOICE OO OVER II INTERNET PP PROTOCOL VoIP, in its very basic sense, is the transmission of any voice across any communication method that uses the Internet Protocol. The Internet that we use every day uses the Internet Protocol to connect all of our computers and devices together. So most people associate VoIP with placing a phone call over the internet. Although most people associate VoIP with placing phone calls over the internet, VoIP calls can be placed across private networks as well. As long as the voice is being transmitted as packets using the Internet Protocol, it is considered VoIP. For the purposes of this guide we will be primarily talking about calls made using the public internet as the means of transportation. It’s also fair to note that most of this guide will try to focus on cloud based VoIP services; also known as Hosted PBX or Hosted VoIP. IMPORTANT: For the remainder of this guide we will be using the term IP Network; or rather any network that uses the IP Technology. This term includes the Internet as a whole. If for some reason we need to refer to something specific about the public internet, we will directly refer to it. Otherwise, IP Network will include all networks (Including private networks and the public internet) that uses the IP.
  • 5. This is the foundation of the VoIP process at a very basic level. 00101001 11001001 11010110 11001001 00101001 11010110 PACKET OUT TO THE INTERNET Your voice enters a device as a sound wave The device samples parts of the wave, turning the sample into bits (computer code) The device takes these bits and puts them into packets to send across to the internet This procedure is then reversed on the receiving end. That is how VoIP works NEXT: What a Typical VoIP Setup Requires in Order to Work
  • 6. CONVERTER COMMUNICATION CONNECTION Any VoIP system requires three basic components: a device to turn your voice into digital packets (converter), a device that controls what to do with those packets (communication), and a digital path (connection) to send the packets along. In a typical business VoIP setup these devices are the IP Phones, IP PBX, and Internet Data Connections, respectively. The IP Phones are what handle the conversion of your Voice into Data Packets. The IP PBX is the “brains” of your phone system, handling what actually happens with those data packets and your phone system as a whole (including features like voicemail). The Data Connections are what allows you to send your Voice Packets from your IP Phone to the IP PBX and out to the internet. NEXT: The Main Types of VoIP REQUIREMENTS OF A VOIP SYSTEM2
  • 7. NEXT: The Main Methods of VoIP IMPLEMENTING A VOIP SYSTEM3 ON PREMISE HOSTED The main difference between an On Premise solution and a Hosted solution is where the IP-PBX is located. PHONES AND IP PBX ARE LOCATED IN YOUR OFFICE PHONES ARE LOCATED IN THE OFFICE WHILE THE IP PBX IS LOCATED IN THE CLOUD The Hosted Solution is much like any other Hosted Service provider out there. For example, traditionally, a company had to keep all of their files on a server that was managed and maintained in the company’s building. Employees would use their computers to access the data on the company server. Today, many companies are moving to cloud file storage. While they’re still able to access their files from their same computer, the files are now physically stored on the service providers servers. Hosted VoIP and On Premise VoIP work the same way.
  • 8. There are three main methods of implementing VoIP. In all three cases the goal of the device is to convert the sound waves of your voice (analog sound) into digital packets to be sent across an IP Network. In all three scenarios the three main components of a VoIP System are covered. NEXT: The Benefits of VoIP METHODS OF VOIP4 PC to PC One of the most commonly used methods of VoIP today. Google Talk, Skype and Teamspeak are all PC to PC Methods. ATA Device Analog Telephone Adapter (ATA) allows you to connect an old fashion telephone to a VoIP platform. IP Phones These phones have the VoIP technology built into them and are most commonly used in business settings.
  • 9. COST MOBILITY GROWTH While there are many benefits that VoIP Solutions can offer businesses, VoIP Solutions offer three main benefits for businesses across the board. BENEFITS OF VOIP5
  • 10. There are some additional costs to each of the options listed above. A regular pots line requires the purchase of any regular phone that will receive a regular dial tone. A VoIP system requires that you have IP based Phones or an ATA device. IP phones are usually more expensive than a regular telephone. Many hosted providers can sell you phones upfront, or you can rent phones from them for an additional monthly cost. A PRI circuit, although the cheapest per call option, requires an expensive upfront investment in a PBX. There are some free open source PBXs on the market, however it would still require some sort of investment in a staff member or outside IT Consultation service to implement and maintain the PBX. Comparative Alternatives POTS LINE 1 Call Per Line Per Line Cost $20 - $50 / Line No Extra Features PRI 23 Calls Per Circuit Per Circuit Cost $300+ / Circuit Connection Only VOIP 1 Call Per Seat Per Seat Cost $20 - $30 / Seat Connection + Features
  • 11. Remember that VoIP systems only require 3 things 1) A Device to Convert your Voice 2) A Device to Handle the Calls 3) A Data Connection between the two devices Because of that - as long as your IP Phone can communicate with a PBX (Hosted Provider) you can use your phone anywhere that you have an internet connection. With an on premise PBX system, the ability for remote users across the Internet will need to be configured. With Hosted PBX solutions, this is a native feature. You are able to take your IP Phone home, allowing you to make calls as if you were sitting at your desk.
  • 12. Since Hosted VoIP is usually sold on a Per User basis, the ability to scale the system can be as simple as adding another user and phone. In Theory - there isn’t a limit to the number of users that you can put onto a VoIP System. The practical limitation is the amount of bandwidth required for each concurrent phone call. There are also some hardware limitations that could come into effect with some extremely high call volume. The best way to think about it is like using the internet at home, the more people that are using it, the slower it gets. As long as you are aware of the hardware requirements and data connection requirements, your VoIP System can grow with your company. NEXT: The Problems of VoIP GROWTH WITH VOIP
  • 13. QUALITY OF SERVICE IS ONE OF THE BIGGEST OBSTACLES TO OVERCOME WITH VOIP SOLUTIONS Latency is the overall time it takes for a single packet to go from the speaker to the listener. In the VoIP world the recommended maximum latency is 150ms. Anything above 150ms and you begin to have quality issues with the call. Jitter is the change in the latency during a given call. While your overall call may have a latency of 50ms, any spikes in latency would be the Jitter on the call. If Jitter is high, it can cause packets to arrive out of sequence and be discarded. This discarding of packets can lead to... Packet Loss is anytime a packet doesn’t make it to the reciever or doesn’t make it in time. Since VoIP is a Real Time communication protocol, if a packet is lost then a small piece of the conversation is lost. While generally a few packets here and there won’t be a problem, large packet losses can sound like the person is “breaking up” on the other end. NEXT: VoIP Security PROBLEMS OF VOIP6 LATENCY JITTER LOSS
  • 14. ISSUES ENCRYPTION PROCEDURES Know the threats that your system can be vulnerrable to Encryption is available, but you have to weigh the costs Every security system has the same weakest link VoIP solutions are wonderful, cost effective options that can provide your company with communication options to help run your business. However, since VoIP is over an IP Network, some of the same Data Security concerns now also apply to Voice traffic. In this section we go over some of the issues specific to VoIP, some popular Encryption options, Procedures and Policies that can help your VoIP solution stay secure and the Hardware most likely involved in all of these areas of security. VOIP SECURITY7
  • 15. TOLL FRAUD DOS ATTACK MITM ATTACK Toll Fraud happens when an unauthorized user makes long distance phone calls from your system, causing you to be billed for the charges. DoS Attack, Denial of Service Attack, is when an outside user floods your system with so many packets that it causes a network traffic jam. In many cases this can lead to a complete loss of service until the DoS attack is finished. MITM Attack, Man it the Middle Attack, happens when an unauthorized user is able to intercept voice packets. If these packets are not encrypted the unauthorized user can use programs to decode the packets and listen in on the conversation. COMMON VOIP SECURITY ISSUES
  • 16. Quality of VoIP is already susceptable to latency issues. Adding Encryption will increase the latency in the system - as each packet will need to be encrypted and decrypted. Transport Layer Security (TLS) helps to encrypt the SIP messaging, but does not actually encrypt the voice packets. TLS is still beneficial because it will make it harder for someone to know the two endpoints of the VoIP call. Secure Real-time Transport Protocol (SRTP), is a protocol that actually encrypts the voice packets themselves. Since there are millions of voice packets, and each one needs to be encrypted, this can compound other latency issues that may exist. Virtual Private Network (VPN), VPN creates a secure “tunnel” through the internet. While this remains to be a possible solution, it’s not viable for large call volumes. Multiprotocol Label Switching (MPLS), is another type of private network. This is more commonly used for VoIP calls between multiple business locations. Ask your hosted VoIP provider for what encryption methods they offer. VOIP ENCRYPTION
  • 17. NUMBER 1 SECURITY PROBLEM? THE HUMAN! You can have the strongest and most secure system - but if you leave the keys on the dashboard, then it won’t matter. Procedures, it’s vitally important that your company has procedures in place that limit the number of people who have administrative access to your system. Passwords, Ensure that all default passwords are changed immediately! This includes passwords on routers, switches, firewalls, phones, online portals and voicemail accounts. Choose something that’s hard to guess, with a mix of uppercase, lowercase, numbers and special characters. The longer and more random the password, the more secure the system is. Policy, Sometimes things go wrong - have a policy in place to minimize the damages that could occur if your system is compromised. NEXT: VoIP Purchasing Guide SECURITY VOIP PROCEDURES
  • 18. 33 VENDOR 11 ASSESSMENT 22 EQUIPMENT This final section is broken up into 3 subsections. Each sub-section of this part of the guide will contain a one page checklist that you can print out and use for yourself. Assessment- It’s important to take note of your current setup as it works today. Your new VoIP system should do everything that you can do today. Equipment- Once you know what you want to do, you need the Equipment that will do the job. Vendor- Choosing the right vendor that covers everything you need is Crucial! VOIP PURCHASING GUIDE7
  • 19. Inbound Call Flow Outbound Call Flow ASSESSMENT CHECK LIST VOIP PURCHASING GUIDE onevoiceinc.com On Site Employees Number of Employees requiring individual phone use on site Remote Employees Number of Employees requiring remote phone use (print and fill out) Single Company Sometimes multiple companies may share the same phone system. This can alter the type of system you need. Multiple Companies Employees Can Be Reached Directly Through Receptionist Through an IVR Voicemail Company Individual Call Routing by Schedule Non-Business Hours Holidays Other Inbound Requirements Ring / Hunt Groups Music On Hold Find Me / Follow Me Call Types Long Distance International Outbound Caller ID Special Call Routing/Handling Fax Numbers
  • 20. On Premise Specific Extra Items EQUIPMENT CHECK LIST VOIP PURCHASING GUIDE onevoiceinc.com Desk Phones (print and fill out) On Premise Depending on whether you want an On Premise or Hosted solution will determine how much equipment will be on site. Hosted IP-PBX Session Border Control Headsets Receptionist Phones Conference Phones Connection Devices Sidecar Add-Ons Cables Power Supplies This checklist should be used to help you map out what equipment you already have, and what you might need. Not everything listed is required - this is just to give you something to check. Connection Public Internet Private Network Router Managed Switch Firewall PoE 802.11q (VLAN) 802.11p (QoS)
  • 21. Features VENDOR CHECK LIST VOIP PURCHASING GUIDE onevoiceinc.com (print and fill out) Phone Types Routers Voicemail Encoding IVR Find Me / Follow Me Use this checklist to make sure that the vendor you’re considering covers everything you need. Minutes Pay Per Minute Minutes Packages Call Schedules Call Recording Softphone Equipment Compatability List Of... Unlimited Minutes Acceptable Use Policy Prices & Contracts Month to Month Annual Contract Encryption TLS IPSec SRTP G.711 G.729