You are on page 1of 6

VoIP : a Survey

by Modupe Yusuff 1313775

Abstract - Voice over internet protocol (VoIP) has phone (softphones). VoIP calls can be placed with
become a very popular alternative as it has taken the use of a dedicated router connected to a
over the use of traditional telephone to make voice traditional phone. Without the use of any software
calls. VoIP is described as the conveying of voice or interaction with a computer, all that is required
over IP based network. With the convergence of to make VoIP call is a service plan and an
voice and data into a single technology, VoIP is a appropriate VoIP provider. A hardware VoIP
cheaper and more convenient method for phone is similar to a traditional telephone while a
communication.Many businesses and organisations softphone is usually in a computer device. Each
are adopting this technology due to usability and user agent has a client (UAC) and a server (UAS) ,
scalability. For the realization of VoIP there are the auk sets up and creates requests for endpoints,
protocols, components and security to consider, while the uas responds to those requests. In
which will be discussed in this paper. addition, the user agent server is responsible for
finding the destination uac [1].

I. Introduction Gateways : VoIP uses the media gateways for


analog to digital conversion of packets which then
Voice over IP (voice over internet protocol) is a provides the interface for transporting voice content
technology that involves making calls over the IP over the IP network. Furthermore, the conversation
based networks to other users or landlines using is then transported by RTP (real time protocol) and
broadband connection. The use of VoIP has run over UDP (User Datagram Protocol). It can
increased over the years as people find it cost also act as a link between VoIP and PSTN (Public
effective to be able to communicate with friends Switched Telephone Network) [2].
from all over the world at a low price or no charge.
This technology can be used on any platform such Proxy server : The features of the client and a
as computer, mobile device or home phone. server are included in the proxy server. Calls are
routed within a VoIP network through the proxy
This aim of this paper is to give a general server in the sense that it receives requests and
understanding of the various aspects of voice over response messages. Furthermore, before the request
internet protocol by first discussing the data is sent to the next proxy server, it has the ability to
processes involved in the use of VoIP, its adjust the header information [2].
architecture and configuration, and further explain
how the protocols are implemented in the system, VoIP data processes [3]
security issues that arise with the use of a VoIP
system and finally some of the applications that Signalling : This stage involves initiating a call that
currently provide VoIP services. This paper will is; creating and managing the connections between
include at the end a summary of the areas that have telephones. The protocol used here is SIP (session
been discussed . initiation protocol) and H.323.

Encoding and Transport : This is the next stage


after the call has been setup, the signals need to be
II. VoIP architecture
sent as packets ; the signals are converted to digital
signals using a codec. The voice packets are then
transported to the internet using a protocol known
The components that make up the VoIP network as RTP (real time protocol). Data that requires
architecture are user agent, gateways and proxy rearranging on the receiver's end stays in the RTPS
servers. header field, the voice packets are then transported
using the UDP (user datagram protocol). However,
User agent : These are devices from which end on the other side the packets are taken apart in the
users initiate and receive VoIP calls . A user agent proper order and the digital signals are converted to
can be a hardware based or software based VoIP
analog signals so that it can be received on the communicate and what end system is going to be
receiver's handset speaker. used for the communication [6].

Gateway control : When data is been transmitted, The SIP uses messages such as "Cancel" -
the order and time at which the packets arrive is terminates the process of reaching a user,
important to satisfy Quality of Service. The "Register" - sends the location of the user to the
network should ensure that real time conversation registration server, "bye" - ends connection
is conveyed through the appropriate gateway and between two users .
converted to the right format [1].
Location server
T1 connection
to PSTN
2 3

Gateway 1 Invite 4 Invite


O O
client kproxyk uas
server
6 Ok 5 Ok
IP Network

7 Ack 8 Ack

Proxy Figure 2 : A SIP Operation [6]


IP Phone
server
The figure above shows a simple SIP operation
where a client invites an individual for a call, this
Figure 1 : VoIP Architecture [2] request is sent to the proxy server which then gets
the ip address of the server that is in charge of this
domain. The location server gets the ip address of
III. Protocols the next hop server and passes the Invite to it, on
getting to the UAS server, a response is sent back
to the proxy server and this sends a response to the
In VoIP, the order in which audio stream (packets) client. The clients responds by sending an Ack
are transmitted is important to avoid delay of message [6].
signals. Protocols handle the series of signalling
transactions between the endpoints and media Here are some advantages and disadvantages of
streams that hold the conversation [4]. This survey using the Session Initiation Protocol [7]
will discuss SIP, MCGP, H.323 and briefly IAX.
 It is a lightweight protocol
A. SIP (Session initiation protocol)  It enables users to multitask whilst on a
Sip is a signalling protocol that initiates, modifies call e.g. play games, send pictures and
and terminates communication between two end share media files.
points (users). SIP comprises of two components -  It is a peer to peer protocol where each
user agents and network servers. User agent acts on party can in turn be both client and server
behalf of a user and this includes a server and a
client ; user agent client starts a sip request while a Drawback
user agent server takes delivery of the request and
sends back a response on behalf of a user [5].  With SIP, firewalls can prevent the
endpoints from receiving incoming RTP
The network server consists of three servers - a (real time protocol) traffic
registration server has information about the  For secure connection most SIP user
location of a user, a proxy server sends requests to agents do not support cryptography as
another server which has more up to date much
information about a users location and a redirect
server determines the next hop server and sends its B. H.323
information to the client. Furthermore, this protocol H.323 is the first multimedia protocol that was
provides services such as determining the media to published by ITU (International Communication
be used, finding out if the called user wants to Union) for voice, video and data on the internet. It
can be used with TCP/UDP to provide real-time
multimedia communication. H.323 architecture C. Media Gateway Control Protocol (MGCP)
consists of gateways, terminals and multipoint This protocol is implemented in voice over ip
control unit. The terminals are endpoints such as architecture and mainly called a call control
telephones and soft phones. The gateways are used protocol. It controls the media gateway by setting
for address resolution and also a means to setting up, managing, and terminating multimedia
up calls between two endpoints. In addition, all communications in a system. With this protocol,
endpoints are registered with the gateway as it the endpoints manages and controls its own
provides control services [8] communication . MGCP works between a media
gateway and media gateway controller, the
The multipoint control unit is responsible for controller handles all the media gateway processes.
conference calls between two or more users. Asides A media gateway is a device that converts media
H.323 protocol, there are other standards that are streams into data packets and vice versa. Examples
involved in the call implementation such as H.245 of gateway are trunking, residential, and access
and Q.931. Q.931 is responsible for call setup gateways. Furthermore, in VoIP the media
while the messages are transmitted between the two gateway controller is the centre of the
endpoints using H.245 over TCP (Transport communication system that provides call control
Control Protocol) [9]. and signals.

H.225 tcp connection In an MGCP call setup, when user 1 starts the call,
H.323 gatekeeper a notify message is sent from the residential
H.323 gateway Capabilities exchange gateway to the call agent. The call agent proceeds
to ask the gateway to provide a connection to user 2
Rtcp address then an acknowledgement is sent and a session is
connect created. The gateway also assigns resources to both
endpoints. To terminate the session, the call agent
Rtcp address (media gateway controller) sends a delete
Rtcp&&Rtp address connection command to the gateway [11]. Some of
the benefits that are associated with using the
Rtp Stream Media Gateway Control Protocol are as follows ;

H.323 gateway Rtp Stream  It supports encryption in voice traffic


IP Phone
 It is simple and reliable
 Messages are transmitted via a reliable
Figure 3: An H.323 Call Flow [10] transport mechanism
 Communication is secure between the
The figure above shows a call setup using H.323 media gateway and gateway controller
protocol. Asides H.323 there are other protocols [12].
such as H.225 and H.245 involved in the call setup.
The major responsibility for the H.225 protocol is D. IAX
to set up the call over a TCP connection and route One other alternative protocol is IAX (Inter
the appropriate destination. As shown in the Asterisk Exchange Protocol) which controls and
diagram at the setup stage , the H.323 device transmits data between servers. It uses binary-only
receives a message indicating that a connection is data for its communication whereby the data is
to be setup with the called device. Next, the called divided into frames ; mini and full frames. The
device sends an acknowledgement that it is ready to mini frames hold the media stream data while the
receive, the H.323 gateway sends a message to full frames carry the signalling data . This protocol
show the progress of the communication. makes use of single User Datagram (UDP) port for
Furthermore a ''connect'' message is sent to the signalling and receiving media [13]. Some of its
calling device indicating that the call has been advantages are ;
''answered''.
Following the receipt of the IP address by the  Bandwidth efficiency
H.323 device, another TCP connection occurs  Ability to trunk multiple call Sessions into
which is responsible for the exchange of a single dataflow
capabilities and audio streams involved. The idea
 It performs authentication using plain
behind using a TCP connection is to deal with
text, which makes it safer
situations where the two endpoints need to access a
 Passes through firewalls and uses much
resource at the same time or the closing of logical
less overhead than RTP
channels during a call [10].
 Its communication method uses binary-
only data
 The IAX protocol responses are sent back to the packet in the stream which can change the
to wherever they came from rather than meaning of the message being transmitted. The use
having to negotiate a foreign IP address of a secure rtp can prevent this by encrypting the
message from the sender and decrypted by the
However, one of its drawback is that the server receiver [14].
loses track of call during transfer from centralized
server to media gateway [13]. Dynamic Host Configuration Protocol (DHCP):
An attacker can reduce the number of available IP
addresses in the DCHP server by sending
IV. VOIP Security unnecessary requests for randomly generated mac
addresses. This attack prevents the server from
responding to the next genuine requests and also
The convergence of voice and data networks comes getting new requests. In addition, a malicious VoIP
with some security issues such as ; application can also respond to dchp requests by
sending wrong information. To avoid this, IEEE
Denial of service (DoS) : This happens when an 802.1x specification provides a method where the
adversary attempts to prevent the service from attached node requires authentication of its MAC
working within its specifications. DoS can include address and dhcp requests before transmitting on
preventing calls to a particular address (es) or the network [15].
preventing the ability to make or receive calls in
general. The motive can be to disrupt businesses in
the sense that it prevents the system from being V. VoIP Applications
available at a particular time [14].
Skype : This is one of the most popular software
SIP registration attacking : The sip protocol deals based VoIP applications in the world with a big
with initiating, modifying and ending user sessions user base and VoIP features. Skype is a softphone
in VoIP. The user agent registers itself with the that works on many devices such as mobile,
proxy server, the security issue arises when the user computer and TV. A Skype call requires an internet
agent is being compromised by impersonating it to connection and a computer or mobile device. It has
a registrar hence, all the calls are forwarded to a features such as voice and video calls to other
different address. This results in the loss of calls to Skype, calls to mobiles at low rates, file sharing
the appropriate user agent. The use of transport and instant messaging [16].
layer security can help to prevent insecure
authentication connection [14]. Icall : A software based application that uses
mobile and desktop platform founded in 2005. It
Caller Identification Impersonation: A VoIP has an advantage over traditional telephony
phone has a unique identity that is associated with services as it has features such as free calls to
it however, it can be impersonated and used to numbers in US and Canada, free video calling, file
make calls with the adversary's identity. According and desktop sharing. In addition, this application is
to [14] an attacker can register his device with a particularly good as it does not limit you to just
victim's phone system thereby receiving calls icall users in the sense that you can communicate
intended for the victim. Furthermore, the receiver with anyone no matter the service they are using.
would believe that it is the victim calling since the Also all communications are encrypted using ZRTP
device has been spoofed. voice encryption technology [17].
Also, the use of a VoIP phone is susceptible to
unwanted calls and messages. Telemarketers are Vonage : This is one of the most popular hardware
more likely to send bulk voice solicitations to based VoIP application which also includes a
VoIP phones. The adversary gets a lists of VoIP softphone that can be used on computer. It works
phone numbers, with the use of servers to connect by connecting a Vonage Box to your broadband
the numbers, it sends unwanted messages at a high router and plug into a home phone. It has features
volume which can be listened to via the victim's such as free unlimited calls to international mobiles
mailbox [14]. and calls to emergency services for a small monthly
cost [18].
RTP payload : Real time protocol (RTP) is the
protocol that carries the voice message that's Below are some of the benefits associated with
already encoded between two endpoints. An using VoIP technology [13] ;
adversary can gain access to the rtp media stream
which results in modifying the payload of the  A single network can be used for transfer
message. Furthermore, an attacker can modify the voice and data
payload of a message by adding their own message
 At peak times, the normal capacity used to internet protocol. These protocols have various
control voice can be increased to manage functions that range from signalling techniques
the amount of data being transferred. such as initiating, terminating a call to managing
 For efficient usage and lowering of call media streams. Protocols are very important in the
costs, voice data can be compressed deployment of VoIP to provide standards that are to
during silent periods. be followed in order to have a efficient and
 Conference call can be set up in real time effective system.
with VoIP
This paper also looked at the components of a
Drawback network and how they are linked together to form a
VoIP system. Furthermore, the security of the VoIP
 The management of network bandwidth is have been discussed because every system is
important to avoid voice quality issues vulnerable to attacks. In addition, suggestions were
 There may be delay in sending voice data made to how these attacks can be avoided or
through the network reduced. Finally, it discussed some VoIP service
 VoIP depends on broadband connection, providers such as Skype and Icall including how
in the event of connection going down the the service is being used and the benefits they
communication goes down as well. provide over traditional telephony system.

In this survey, the requirements to provide high


quality voice communication over IP based
VI. Conclusion
networks have been discussed as they are the
This paper has discussed the data processes factors that determine the effectiveness of the VoIP
involved in the use of VoIP which includes system. The application of this technology has
signalling, encoding and transport of the data proven to be reliable, cheap and convenient and has
packets and the gateway control. It also discussed numerous advantages which have been discussed in
four protocols SIP, H.323, IAX and MGCP that this paper.
are involved in the implementation of Voice over

Applications, 2005. DFMA '05. First International


VII. REFERENCES Conference on , vol., no., pp.39,44, 6-9 Feb. 2005
[1] IBM, 2013 Voice Over IP Using Session [Accessed 10 November 2013]
Initiation Protocol. [pdf] IBM Corp: Available at:
<http://pic.dhe.ibm.com/infocenter/wvraix/v6r1m0/ [5] Abbasi, T.; Prasad, S.; Seddigh, N.;
index.jsp?topic=%2Fcom.ibm.wvraix.voip.doc%2F Lambadaris, I., "A comparative study of the SIP
compofvoip.html> [accessed 19 November 2013] and IAX VoIP protocols," Electrical and Computer
Engineering, 2005. Canadian Conference on , vol.,
[2] Butcher, D.; Xiangyang Li; Jinhua Guo, no., pp.179,183, 1-4 May 2005 [Accessed 10
"Security Challenge and Defense in VoIP November 2013]
Infrastructures," Systems, Man, and Cybernetics,
Part C: Applications and Reviews, IEEE [6] Arora, R., 2000. Voice over IP : Protocols and
Transactions on , vol.37, no.6, pp.1152,1162, Nov. Standards [pdf] Ohio Available at :
2007 [accessed 19 November 2013] <http://www.cse.wustl.edu/~jain/cis788-
99/ftp/voip_protocols.pdf> [Accessed 11
[3] Butcher, D.; Xiangyang Li; Jinhua Guo, November 2013]
"Security Challenge and Defense in VoIP
Infrastructures," Systems, Man, and Cybernetics, [7] Camarillo, G., Rosenberg, J., 2001. SIP
Part C: Applications and Reviews, IEEE demystified. McGraw-Hill Professional [Accessed
Transactions on , vol.37, no.6, pp.1152,1162, Nov. 18 November 2013
2007 [Accessed 10 November 2013]
[8] Soares, V.N.G.J.; Neves, P.A.C.S.; Rodrigues,
[4] Ge Zhang; Hillenbrand, M.; Muller, P., J.J.P.C., "Past, Present and Future of IP
"Facilitating the interoperability among different Telephony," Communication Theory, Reliability,
VoIP protocols with VoIP Web and Quality of Service, 2008. CTRQ '08.
services," Distributed Frameworks for Multimedia International Conference on , vol., no., pp.19,24,
June 29 2008-July 5 2008 [Accessed 19 November
2013]
[9] Mehta, P.; Udani, S., "Voice over
IP," Potentials, IEEE , vol.20, no.4, pp.36,40,
Oct/Nov 2001 [Accessed 30 November 2013]

[10] Cisco Systems, 2007. Troubleshooting H.323


Interfaces to the IP [pdf] Available at:
<http://www.cisco.com/en/US/docs/ios/voice/monit
or/configuration/guide/vt_h323_trouble.pdf>
[Accessed 30 November 2013]

[11] Xi Lina; Tian Xiuhua; Miao Changyun; Wu


Zhigang, "The design of enterprise VoIP MGC
based on MGCP protocol," Networking and Digital
Society (ICNDS), 2010 2nd International
Conference on , vol.1, no., pp.526,529, 30-31 May
2010 [Accessed 17 November 2013]

[12] Ixia Media Gateway Control Protocol (MGCP)


Technology 2004 [pdf] Available at :
<http://web.uct.ac.za/depts/commnetwork/eee5026/
note/eee5026-06-620mgcp.pdf> [Accessed 17
November 2013]

[13] Capouch, B., Shumard, K., Guy, E., Spencer,


M., & Miller, F., 2010. IAX: Inter-Asterisk
eXchange Version 2 [pdf] Available at:
<http://tools.ietf.org/pdf/rfc5456.pdf> [Accessed
11 November 2013]

[14] Butcher, D.; Xiangyang Li; Jinhua Guo,


"Security Challenge and Defense in VoIP
Infrastructures," Systems, Man, and Cybernetics,
Part C: Applications and Reviews, IEEE
Transactions on , vol.37, no.6, pp.1152,1162, Nov.
2007 [accessed 19 November 2013]

[15] Hung, P. C K; Martin, M.V., "Security Issues


in VOIP Applications," Electrical and Computer
Engineering, 2006. CCECE '06. Canadian
Conference on , vol., no., pp.2361,2364, May 2006
[accessed 19 November 2013]

[16] Skype, 2013. What is Skype? [online]


Available at: < http://www.skype.com/en/what-is-
skype/> [Accessed 5 November]

[17] Icall, 2005 The who, what and where - all


about iCall [online] Available at :
<http://www.icall.com/about> [Accessed 5
November]

[18] Vonage, 2011 Vonage Extensions. [Online]


Available at: <
http://www.vonage.co.uk/extensions/ > [Accessed
5 November]

You might also like