SlideShare a Scribd company logo
1 of 21
Download to read offline
VOIPTHE ULTIMATE GUIDE
VERSION 1.0
9/23/2014
onevoiceinc.com
WHAT IS VOIP
REQUIREMENTS OF A VOIP SYSTEM
IMPLEMENTING A VOIP SYSTEM
METHODS OF VOIP
BENEFITS OF VOIP
PROBLEMS OF VOIP
VOIP SECURITY
VOIP PURCHASING GUIDE
WHAT’S IN THIS GUIDE?
WHAT IS THIS GUIDE?
This guide will be a continuous and ongoing project from OneVoice to create an all
encompassing guide to VoIP Communications. The world of VoIP can often be a
confusing area to understand - and we hope that this guide will provide some high
level understanding, with supplementary technical information for those that want to
understand more detail.
WHAT DOES IT COVER?
This guide is initially intended to cover the business application of Hosted VoIP.
We hope to eventually turn this into an all encmopassing guide to all types of VoIP
Communications, but that’s going to take quite a while to accomplish.
While the primary focus of this guide will be on Hosted VoIP - we will try to cover as
much of its counterparts as possible. As you read this guide, many of the concepts
of Hosted VoIP can be applied to On Premise solutions. As we discuss, the only real
difference is where the “brains” of the system are housed.
With that said, we will be releasing an ultimate guide to SIP, which will primarily focus
on non-hosted solutions.
WHO SHOULD READ IT?
This guide is intended for anyone in a small to medium sized business who is involved
with the purchase or use of a VoIP platform.
In this guide, we’re going to address the concept of VoIP as a means for placing and receiving phone
calls that are to and from the PSTN (Public Switched Telephone Network) or at least seem as if they
are. Since two end users may be on the same Hosted VoIP Network, the call may technically never
leave the Hosted VoIP provider’s network – but as far as the end user is concerned the call did.
There are different protocols that could be used to transmit VoIP – we’re going to focus on one of the
dominant protocols - SIP.
Don’t worry - if none of this makes sense right now, it will by the time you’re done with this guide!
INTRODUCTION
WHAT IS VOIP1
VV VOICE
OO OVER
II INTERNET
PP PROTOCOL
VoIP, in its very basic sense, is
the transmission of any voice
across any communication
method that uses the
Internet Protocol.
The Internet that we use every day uses
the Internet Protocol to connect all of
our computers and devices together.
So most people associate VoIP with
placing a phone call over the internet.
Although most people associate VoIP with placing phone calls over the internet, VoIP calls can be placed
across private networks as well. As long as the voice is being transmitted as packets using the Internet
Protocol, it is considered VoIP.
For the purposes of this guide we will be primarily talking about calls made using the public internet as the
means of transportation. It’s also fair to note that most of this guide will try to focus on cloud based VoIP
services; also known as Hosted PBX or Hosted VoIP.
IMPORTANT: For the remainder of this guide we will be using the term IP Network; or rather any
network that uses the IP Technology. This term includes the Internet as a whole. If for some
reason we need to refer to something specific about the public internet, we will directly refer to it.
Otherwise, IP Network will include all networks (Including private networks and the public internet)
that uses the IP.
This is the foundation of the VoIP process at a very basic level.
00101001
11001001
11010110
11001001
00101001
11010110 PACKET
OUT TO THE INTERNET
Your voice enters a device as
a sound wave
The device samples parts of
the wave, turning the sample
into bits (computer code)
The device takes these bits
and puts them into packets to
send across to the internet
This procedure is then reversed on the receiving end.
That is how VoIP works
NEXT: What a Typical VoIP Setup Requires in Order to Work
CONVERTER COMMUNICATION
CONNECTION
Any VoIP system requires three basic components: a device to turn your voice into digital packets
(converter), a device that controls what to do with those packets (communication), and a digital
path (connection) to send the packets along.
In a typical business VoIP setup these devices are the IP Phones, IP PBX, and Internet Data
Connections, respectively.
The IP Phones are what handle the conversion of your Voice into Data Packets. The IP PBX is
the “brains” of your phone system, handling what actually happens with those data packets and
your phone system as a whole (including features like voicemail). The Data Connections are what
allows you to send your Voice Packets from your IP Phone to the IP PBX and out to the internet.
NEXT: The Main Types of VoIP
REQUIREMENTS OF
A VOIP SYSTEM2
NEXT: The Main Methods of VoIP
IMPLEMENTING A
VOIP SYSTEM3
ON PREMISE HOSTED
The main difference between an On Premise solution and a
Hosted solution is where the IP-PBX is located.
PHONES AND IP PBX
ARE LOCATED IN
YOUR OFFICE
PHONES ARE LOCATED IN
THE OFFICE WHILE THE
IP PBX IS LOCATED
IN THE CLOUD
The Hosted Solution is much like any other Hosted Service provider out there. For example,
traditionally, a company had to keep all of their files on a server that was managed and maintained
in the company’s building. Employees would use their computers to access the data on the
company server.
Today, many companies are moving to cloud file storage. While they’re still able to access their
files from their same computer, the files are now physically stored on the service providers servers.
Hosted VoIP and On Premise VoIP work the same way.
There are three main methods of implementing VoIP. In all three cases the goal of the device is to
convert the sound waves of your voice (analog sound) into digital packets to be sent across an IP
Network.
In all three scenarios the three main components of a VoIP System are covered.
NEXT: The Benefits of VoIP
METHODS OF VOIP4
PC to PC
One of the most commonly used methods
of VoIP today. Google Talk, Skype and
Teamspeak are all PC to PC Methods.
ATA Device
Analog Telephone Adapter (ATA) allows you
to connect an old fashion telephone to a VoIP
platform.
IP Phones
These phones have the VoIP technology built
into them and are most commonly used in
business settings.
COST MOBILITY GROWTH
While there are many benefits that VoIP Solutions can offer businesses, VoIP Solutions offer three
main benefits for businesses across the board.
BENEFITS OF VOIP5
There are some additional costs to each of the options listed above. A regular pots line requires the
purchase of any regular phone that will receive a regular dial tone.
A VoIP system requires that you have IP based Phones or an ATA device. IP phones are usually more
expensive than a regular telephone. Many hosted providers can sell you phones upfront, or you can
rent phones from them for an additional monthly cost.
A PRI circuit, although the cheapest per call option, requires an expensive upfront investment in a
PBX. There are some free open source PBXs on the market, however it would still require some sort
of investment in a staff member or outside IT Consultation service to implement and maintain the
PBX.
Comparative Alternatives
POTS LINE
1 Call Per Line
Per Line Cost
$20 - $50 / Line
No Extra Features
PRI
23 Calls Per Circuit
Per Circuit Cost
$300+ / Circuit
Connection Only
VOIP
1 Call Per Seat
Per Seat Cost
$20 - $30 / Seat
Connection + Features
Remember that VoIP systems only require 3 things
1) A Device to Convert your Voice
2) A Device to Handle the Calls
3) A Data Connection between the two devices
Because of that - as long as your IP Phone can communicate with a PBX (Hosted Provider) you can
use your phone anywhere that you have an internet connection.
With an on premise PBX system, the ability for remote users across the Internet will need to be
configured. With Hosted PBX solutions, this is a native feature.
You are able to take your IP Phone home, allowing you to make calls as if you were sitting at your
desk.
Since Hosted VoIP is usually sold on a Per User basis, the ability to scale the system can be as
simple as adding another user and phone.
In Theory - there isn’t a limit to the number of users that you can put onto a VoIP System. The
practical limitation is the amount of bandwidth required for each concurrent phone call. There are
also some hardware limitations that could come into effect with some extremely high call volume.
The best way to think about it is like using the internet at home, the more people that are using it, the
slower it gets.
As long as you are aware of the hardware requirements and data connection requirements, your VoIP
System can grow with your company.
NEXT: The Problems of VoIP
GROWTH WITH VOIP
QUALITY OF SERVICE IS ONE OF THE BIGGEST OBSTACLES TO
OVERCOME WITH VOIP SOLUTIONS
Latency is the overall time it takes for a single packet to go from the speaker to the listener. In
the VoIP world the recommended maximum latency is 150ms. Anything above 150ms and you begin
to have quality issues with the call.
Jitter is the change in the latency during a given call. While your overall call may have a latency
of 50ms, any spikes in latency would be the Jitter on the call. If Jitter is high, it can cause packets to
arrive out of sequence and be discarded. This discarding of packets can lead to...
Packet Loss is anytime a packet doesn’t make it to the reciever or doesn’t make it in time.
Since VoIP is a Real Time communication protocol, if a packet is lost then a small piece of the
conversation is lost. While generally a few packets here and there won’t be a problem, large packet
losses can sound like the person is “breaking up” on the other end.
NEXT: VoIP Security
PROBLEMS OF VOIP6
LATENCY JITTER LOSS
ISSUES ENCRYPTION
PROCEDURES
Know the
threats that your
system can be
vulnerrable to
Encryption is
available, but you
have to weigh the
costs
Every security
system has the
same weakest
link
VoIP solutions are wonderful, cost effective options that can provide
your company with communication options to help run your business.
However, since VoIP is over an IP Network, some of the same Data Security concerns now also
apply to Voice traffic.
In this section we go over some of the issues specific to VoIP, some popular Encryption options,
Procedures and Policies that can help your VoIP solution stay secure and the Hardware most likely
involved in all of these areas of security.
VOIP SECURITY7
TOLL
FRAUD
DOS
ATTACK
MITM
ATTACK
Toll Fraud happens when an unauthorized user makes long distance phone calls from your
system, causing you to be billed for the charges.
DoS Attack, Denial of Service Attack, is when an outside user floods your system with so many
packets that it causes a network traffic jam. In many cases this can lead to a complete loss of service
until the DoS attack is finished.
MITM Attack, Man it the Middle Attack, happens when an unauthorized user is able to intercept
voice packets. If these packets are not encrypted the unauthorized user can use programs to decode
the packets and listen in on the conversation.
COMMON VOIP
SECURITY ISSUES
Quality of VoIP is already susceptable to latency
issues. Adding Encryption will increase the
latency in the system - as each packet will need
to be encrypted and decrypted.
Transport Layer Security (TLS) helps to encrypt the SIP messaging, but does not
actually encrypt the voice packets. TLS is still beneficial because it will make it harder for someone
to know the two endpoints of the VoIP call.
Secure Real-time Transport Protocol (SRTP), is a protocol that actually encrypts
the voice packets themselves. Since there are millions of voice packets, and each one needs to be
encrypted, this can compound other latency issues that may exist.
Virtual Private Network (VPN), VPN creates a secure “tunnel” through the internet. While
this remains to be a possible solution, it’s not viable for large call volumes.
Multiprotocol Label Switching (MPLS), is another type of private network. This is
more commonly used for VoIP calls between multiple business locations.
Ask your hosted VoIP provider for what encryption
methods they offer.
VOIP
ENCRYPTION
NUMBER 1 SECURITY PROBLEM?
THE HUMAN!
You can have the strongest and most secure system - but if you leave
the keys on the dashboard, then it won’t matter.
Procedures, it’s vitally important that your company has procedures in place that limit the
number of people who have administrative access to your system.
Passwords, Ensure that all default passwords are changed immediately! This includes
passwords on routers, switches, firewalls, phones, online portals and voicemail accounts. Choose
something that’s hard to guess, with a mix of uppercase, lowercase, numbers and special characters.
The longer and more random the password, the more secure the system is.
Policy, Sometimes things go wrong - have a policy in place to minimize the damages that could
occur if your system is compromised.
NEXT: VoIP Purchasing Guide
SECURITY VOIP
PROCEDURES
33 VENDOR
11 ASSESSMENT
22 EQUIPMENT
This final section is broken up into 3 subsections.
Each sub-section of this part of the guide will contain a one page checklist that you can print out and
use for yourself.
Assessment- It’s important to take note of your current setup as it works today. Your new VoIP
system should do everything that you can do today.
Equipment- Once you know what you want to do, you need the Equipment that will do the job.
Vendor- Choosing the right vendor that covers everything you need is Crucial!
VOIP PURCHASING
GUIDE7
Inbound Call Flow
Outbound Call Flow
ASSESSMENT CHECK LIST
VOIP PURCHASING GUIDE
onevoiceinc.com
On Site Employees
Number of Employees requiring
individual phone use on site
Remote Employees
Number of Employees requiring
remote phone use
(print and fill out)
Single Company
Sometimes multiple companies may share the
same phone system.
This can alter the type of system you need.
Multiple Companies
Employees Can Be Reached
Directly
Through Receptionist
Through an IVR
Voicemail
Company
Individual
Call Routing by Schedule
Non-Business Hours
Holidays
Other Inbound Requirements
Ring / Hunt Groups
Music On Hold
Find Me / Follow Me
Call Types
Long Distance
International
Outbound Caller ID
Special Call Routing/Handling
Fax Numbers
On Premise Specific
Extra Items
EQUIPMENT CHECK LIST
VOIP PURCHASING GUIDE
onevoiceinc.com
Desk Phones
(print and fill out)
On Premise
Depending on whether you want an On Premise
or Hosted solution will determine how much
equipment will be on site.
Hosted
IP-PBX
Session Border Control
Headsets
Receptionist Phones
Conference Phones
Connection Devices
Sidecar Add-Ons
Cables Power Supplies
This checklist should be used to help you map out what equipment
you already have, and what you might need. Not everything listed is
required - this is just to give you something to check.
Connection
Public Internet
Private Network
Router
Managed Switch
Firewall
PoE
802.11q (VLAN)
802.11p (QoS)
Features
VENDOR CHECK LIST
VOIP PURCHASING GUIDE
onevoiceinc.com
(print and fill out)
Phone Types
Routers
Voicemail
Encoding
IVR Find Me / Follow Me
Use this checklist to make sure that the vendor you’re considering
covers everything you need.
Minutes
Pay Per Minute
Minutes Packages
Call Schedules Call Recording Softphone
Equipment Compatability
List Of...
Unlimited Minutes
Acceptable Use Policy
Prices & Contracts
Month to Month
Annual Contract
Encryption
TLS IPSec SRTP
G.711
G.729

More Related Content

What's hot (20)

Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
Voip
Voip Voip
Voip
 
Voip phone system
Voip phone systemVoip phone system
Voip phone system
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 
Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
VoIP Phones - Future of VoIP Telephone Systems
VoIP Phones - Future of VoIP Telephone SystemsVoIP Phones - Future of VoIP Telephone Systems
VoIP Phones - Future of VoIP Telephone Systems
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overview
 
PBX.NET Hosted PBX | Business VOIP Sales Presentation
PBX.NET Hosted PBX | Business VOIP Sales PresentationPBX.NET Hosted PBX | Business VOIP Sales Presentation
PBX.NET Hosted PBX | Business VOIP Sales Presentation
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP Presentation
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
VOIP
VOIPVOIP
VOIP
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Voip
VoipVoip
Voip
 
What is SIP Trunking?
What is SIP Trunking?What is SIP Trunking?
What is SIP Trunking?
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP
 

Similar to Ultimate guide to voIP

introduction to voip
introduction to voipintroduction to voip
introduction to voipdeeq maxamed
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsAshik Jibon
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfOkan YILDIZ
 
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paperVoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paperALTANAI BISHT
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation tofael1
 
VoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showVoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showmarilynjolly
 
A study on voice over internet protocol
A study on voice over internet protocolA study on voice over internet protocol
A study on voice over internet protocolNeelesh verma
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056mashiur
 
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?XO Communications
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applicationsirjes
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptNasir152222
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptAlKir1
 

Similar to Ultimate guide to voIP (20)

VoIP
VoIPVoIP
VoIP
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
introduction to voip
introduction to voipintroduction to voip
introduction to voip
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling Environments
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdf
 
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paperVoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation
 
VOIP Presentation
VOIP PresentationVOIP Presentation
VOIP Presentation
 
Questions for VoIP Installers.docx
Questions for VoIP Installers.docxQuestions for VoIP Installers.docx
Questions for VoIP Installers.docx
 
VoIP for Dummies
VoIP for DummiesVoIP for Dummies
VoIP for Dummies
 
VoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showVoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 show
 
A study on voice over internet protocol
A study on voice over internet protocolA study on voice over internet protocol
A study on voice over internet protocol
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056
 
Sip trunking-requirements
Sip trunking-requirementsSip trunking-requirements
Sip trunking-requirements
 
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
 
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.pptSATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
SATRC-WG-PR01-10_Afghanistan-Introduction_to_Voice_over_Internet_Protocol.ppt
 
Voip
VoipVoip
Voip
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Ultimate guide to voIP

  • 1. VOIPTHE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com
  • 2. WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP VOIP SECURITY VOIP PURCHASING GUIDE WHAT’S IN THIS GUIDE?
  • 3. WHAT IS THIS GUIDE? This guide will be a continuous and ongoing project from OneVoice to create an all encompassing guide to VoIP Communications. The world of VoIP can often be a confusing area to understand - and we hope that this guide will provide some high level understanding, with supplementary technical information for those that want to understand more detail. WHAT DOES IT COVER? This guide is initially intended to cover the business application of Hosted VoIP. We hope to eventually turn this into an all encmopassing guide to all types of VoIP Communications, but that’s going to take quite a while to accomplish. While the primary focus of this guide will be on Hosted VoIP - we will try to cover as much of its counterparts as possible. As you read this guide, many of the concepts of Hosted VoIP can be applied to On Premise solutions. As we discuss, the only real difference is where the “brains” of the system are housed. With that said, we will be releasing an ultimate guide to SIP, which will primarily focus on non-hosted solutions. WHO SHOULD READ IT? This guide is intended for anyone in a small to medium sized business who is involved with the purchase or use of a VoIP platform. In this guide, we’re going to address the concept of VoIP as a means for placing and receiving phone calls that are to and from the PSTN (Public Switched Telephone Network) or at least seem as if they are. Since two end users may be on the same Hosted VoIP Network, the call may technically never leave the Hosted VoIP provider’s network – but as far as the end user is concerned the call did. There are different protocols that could be used to transmit VoIP – we’re going to focus on one of the dominant protocols - SIP. Don’t worry - if none of this makes sense right now, it will by the time you’re done with this guide! INTRODUCTION
  • 4. WHAT IS VOIP1 VV VOICE OO OVER II INTERNET PP PROTOCOL VoIP, in its very basic sense, is the transmission of any voice across any communication method that uses the Internet Protocol. The Internet that we use every day uses the Internet Protocol to connect all of our computers and devices together. So most people associate VoIP with placing a phone call over the internet. Although most people associate VoIP with placing phone calls over the internet, VoIP calls can be placed across private networks as well. As long as the voice is being transmitted as packets using the Internet Protocol, it is considered VoIP. For the purposes of this guide we will be primarily talking about calls made using the public internet as the means of transportation. It’s also fair to note that most of this guide will try to focus on cloud based VoIP services; also known as Hosted PBX or Hosted VoIP. IMPORTANT: For the remainder of this guide we will be using the term IP Network; or rather any network that uses the IP Technology. This term includes the Internet as a whole. If for some reason we need to refer to something specific about the public internet, we will directly refer to it. Otherwise, IP Network will include all networks (Including private networks and the public internet) that uses the IP.
  • 5. This is the foundation of the VoIP process at a very basic level. 00101001 11001001 11010110 11001001 00101001 11010110 PACKET OUT TO THE INTERNET Your voice enters a device as a sound wave The device samples parts of the wave, turning the sample into bits (computer code) The device takes these bits and puts them into packets to send across to the internet This procedure is then reversed on the receiving end. That is how VoIP works NEXT: What a Typical VoIP Setup Requires in Order to Work
  • 6. CONVERTER COMMUNICATION CONNECTION Any VoIP system requires three basic components: a device to turn your voice into digital packets (converter), a device that controls what to do with those packets (communication), and a digital path (connection) to send the packets along. In a typical business VoIP setup these devices are the IP Phones, IP PBX, and Internet Data Connections, respectively. The IP Phones are what handle the conversion of your Voice into Data Packets. The IP PBX is the “brains” of your phone system, handling what actually happens with those data packets and your phone system as a whole (including features like voicemail). The Data Connections are what allows you to send your Voice Packets from your IP Phone to the IP PBX and out to the internet. NEXT: The Main Types of VoIP REQUIREMENTS OF A VOIP SYSTEM2
  • 7. NEXT: The Main Methods of VoIP IMPLEMENTING A VOIP SYSTEM3 ON PREMISE HOSTED The main difference between an On Premise solution and a Hosted solution is where the IP-PBX is located. PHONES AND IP PBX ARE LOCATED IN YOUR OFFICE PHONES ARE LOCATED IN THE OFFICE WHILE THE IP PBX IS LOCATED IN THE CLOUD The Hosted Solution is much like any other Hosted Service provider out there. For example, traditionally, a company had to keep all of their files on a server that was managed and maintained in the company’s building. Employees would use their computers to access the data on the company server. Today, many companies are moving to cloud file storage. While they’re still able to access their files from their same computer, the files are now physically stored on the service providers servers. Hosted VoIP and On Premise VoIP work the same way.
  • 8. There are three main methods of implementing VoIP. In all three cases the goal of the device is to convert the sound waves of your voice (analog sound) into digital packets to be sent across an IP Network. In all three scenarios the three main components of a VoIP System are covered. NEXT: The Benefits of VoIP METHODS OF VOIP4 PC to PC One of the most commonly used methods of VoIP today. Google Talk, Skype and Teamspeak are all PC to PC Methods. ATA Device Analog Telephone Adapter (ATA) allows you to connect an old fashion telephone to a VoIP platform. IP Phones These phones have the VoIP technology built into them and are most commonly used in business settings.
  • 9. COST MOBILITY GROWTH While there are many benefits that VoIP Solutions can offer businesses, VoIP Solutions offer three main benefits for businesses across the board. BENEFITS OF VOIP5
  • 10. There are some additional costs to each of the options listed above. A regular pots line requires the purchase of any regular phone that will receive a regular dial tone. A VoIP system requires that you have IP based Phones or an ATA device. IP phones are usually more expensive than a regular telephone. Many hosted providers can sell you phones upfront, or you can rent phones from them for an additional monthly cost. A PRI circuit, although the cheapest per call option, requires an expensive upfront investment in a PBX. There are some free open source PBXs on the market, however it would still require some sort of investment in a staff member or outside IT Consultation service to implement and maintain the PBX. Comparative Alternatives POTS LINE 1 Call Per Line Per Line Cost $20 - $50 / Line No Extra Features PRI 23 Calls Per Circuit Per Circuit Cost $300+ / Circuit Connection Only VOIP 1 Call Per Seat Per Seat Cost $20 - $30 / Seat Connection + Features
  • 11. Remember that VoIP systems only require 3 things 1) A Device to Convert your Voice 2) A Device to Handle the Calls 3) A Data Connection between the two devices Because of that - as long as your IP Phone can communicate with a PBX (Hosted Provider) you can use your phone anywhere that you have an internet connection. With an on premise PBX system, the ability for remote users across the Internet will need to be configured. With Hosted PBX solutions, this is a native feature. You are able to take your IP Phone home, allowing you to make calls as if you were sitting at your desk.
  • 12. Since Hosted VoIP is usually sold on a Per User basis, the ability to scale the system can be as simple as adding another user and phone. In Theory - there isn’t a limit to the number of users that you can put onto a VoIP System. The practical limitation is the amount of bandwidth required for each concurrent phone call. There are also some hardware limitations that could come into effect with some extremely high call volume. The best way to think about it is like using the internet at home, the more people that are using it, the slower it gets. As long as you are aware of the hardware requirements and data connection requirements, your VoIP System can grow with your company. NEXT: The Problems of VoIP GROWTH WITH VOIP
  • 13. QUALITY OF SERVICE IS ONE OF THE BIGGEST OBSTACLES TO OVERCOME WITH VOIP SOLUTIONS Latency is the overall time it takes for a single packet to go from the speaker to the listener. In the VoIP world the recommended maximum latency is 150ms. Anything above 150ms and you begin to have quality issues with the call. Jitter is the change in the latency during a given call. While your overall call may have a latency of 50ms, any spikes in latency would be the Jitter on the call. If Jitter is high, it can cause packets to arrive out of sequence and be discarded. This discarding of packets can lead to... Packet Loss is anytime a packet doesn’t make it to the reciever or doesn’t make it in time. Since VoIP is a Real Time communication protocol, if a packet is lost then a small piece of the conversation is lost. While generally a few packets here and there won’t be a problem, large packet losses can sound like the person is “breaking up” on the other end. NEXT: VoIP Security PROBLEMS OF VOIP6 LATENCY JITTER LOSS
  • 14. ISSUES ENCRYPTION PROCEDURES Know the threats that your system can be vulnerrable to Encryption is available, but you have to weigh the costs Every security system has the same weakest link VoIP solutions are wonderful, cost effective options that can provide your company with communication options to help run your business. However, since VoIP is over an IP Network, some of the same Data Security concerns now also apply to Voice traffic. In this section we go over some of the issues specific to VoIP, some popular Encryption options, Procedures and Policies that can help your VoIP solution stay secure and the Hardware most likely involved in all of these areas of security. VOIP SECURITY7
  • 15. TOLL FRAUD DOS ATTACK MITM ATTACK Toll Fraud happens when an unauthorized user makes long distance phone calls from your system, causing you to be billed for the charges. DoS Attack, Denial of Service Attack, is when an outside user floods your system with so many packets that it causes a network traffic jam. In many cases this can lead to a complete loss of service until the DoS attack is finished. MITM Attack, Man it the Middle Attack, happens when an unauthorized user is able to intercept voice packets. If these packets are not encrypted the unauthorized user can use programs to decode the packets and listen in on the conversation. COMMON VOIP SECURITY ISSUES
  • 16. Quality of VoIP is already susceptable to latency issues. Adding Encryption will increase the latency in the system - as each packet will need to be encrypted and decrypted. Transport Layer Security (TLS) helps to encrypt the SIP messaging, but does not actually encrypt the voice packets. TLS is still beneficial because it will make it harder for someone to know the two endpoints of the VoIP call. Secure Real-time Transport Protocol (SRTP), is a protocol that actually encrypts the voice packets themselves. Since there are millions of voice packets, and each one needs to be encrypted, this can compound other latency issues that may exist. Virtual Private Network (VPN), VPN creates a secure “tunnel” through the internet. While this remains to be a possible solution, it’s not viable for large call volumes. Multiprotocol Label Switching (MPLS), is another type of private network. This is more commonly used for VoIP calls between multiple business locations. Ask your hosted VoIP provider for what encryption methods they offer. VOIP ENCRYPTION
  • 17. NUMBER 1 SECURITY PROBLEM? THE HUMAN! You can have the strongest and most secure system - but if you leave the keys on the dashboard, then it won’t matter. Procedures, it’s vitally important that your company has procedures in place that limit the number of people who have administrative access to your system. Passwords, Ensure that all default passwords are changed immediately! This includes passwords on routers, switches, firewalls, phones, online portals and voicemail accounts. Choose something that’s hard to guess, with a mix of uppercase, lowercase, numbers and special characters. The longer and more random the password, the more secure the system is. Policy, Sometimes things go wrong - have a policy in place to minimize the damages that could occur if your system is compromised. NEXT: VoIP Purchasing Guide SECURITY VOIP PROCEDURES
  • 18. 33 VENDOR 11 ASSESSMENT 22 EQUIPMENT This final section is broken up into 3 subsections. Each sub-section of this part of the guide will contain a one page checklist that you can print out and use for yourself. Assessment- It’s important to take note of your current setup as it works today. Your new VoIP system should do everything that you can do today. Equipment- Once you know what you want to do, you need the Equipment that will do the job. Vendor- Choosing the right vendor that covers everything you need is Crucial! VOIP PURCHASING GUIDE7
  • 19. Inbound Call Flow Outbound Call Flow ASSESSMENT CHECK LIST VOIP PURCHASING GUIDE onevoiceinc.com On Site Employees Number of Employees requiring individual phone use on site Remote Employees Number of Employees requiring remote phone use (print and fill out) Single Company Sometimes multiple companies may share the same phone system. This can alter the type of system you need. Multiple Companies Employees Can Be Reached Directly Through Receptionist Through an IVR Voicemail Company Individual Call Routing by Schedule Non-Business Hours Holidays Other Inbound Requirements Ring / Hunt Groups Music On Hold Find Me / Follow Me Call Types Long Distance International Outbound Caller ID Special Call Routing/Handling Fax Numbers
  • 20. On Premise Specific Extra Items EQUIPMENT CHECK LIST VOIP PURCHASING GUIDE onevoiceinc.com Desk Phones (print and fill out) On Premise Depending on whether you want an On Premise or Hosted solution will determine how much equipment will be on site. Hosted IP-PBX Session Border Control Headsets Receptionist Phones Conference Phones Connection Devices Sidecar Add-Ons Cables Power Supplies This checklist should be used to help you map out what equipment you already have, and what you might need. Not everything listed is required - this is just to give you something to check. Connection Public Internet Private Network Router Managed Switch Firewall PoE 802.11q (VLAN) 802.11p (QoS)
  • 21. Features VENDOR CHECK LIST VOIP PURCHASING GUIDE onevoiceinc.com (print and fill out) Phone Types Routers Voicemail Encoding IVR Find Me / Follow Me Use this checklist to make sure that the vendor you’re considering covers everything you need. Minutes Pay Per Minute Minutes Packages Call Schedules Call Recording Softphone Equipment Compatability List Of... Unlimited Minutes Acceptable Use Policy Prices & Contracts Month to Month Annual Contract Encryption TLS IPSec SRTP G.711 G.729