Upload
slinca82
View
220
Download
0
Embed Size (px)
Citation preview
8/13/2019 VoIP Business
1/16
129
9
BUSINESSACTORS
ANDRELATIONSHIPS
9.1 Panorama of Main VoIP Service Providers
Voice over IP (VoIP) should not be considered as a disruptive ser-
vice1since it fundamentally does not offer the user any difference inservice than before; in particular, compared to the old PSTN (PublicSwitched Telephony Network), for instance. IP networks, however,
have the advantage of making it easier to combine basic voice serviceswith advanced features, such as Instant Messaging (IM), file sharing,video communications, and more. is generates a major opportu-
nity for competitors to enter the market with relatively little cost and
minimal risk involved.By taking a holistic view of the VoIP business we can identify thefollowing three main types of actors.2
Incumbent Service Providers Virtual VoIP Service Providers Proprietary ird-Party VoIP Service Providers
In Figure 9.1, different operators and VoIP solutions are mapped in
relation to how standardized technologies are used and on what level theyare implemented with reference to the infrastructure that they require.
e incumbent operators own their entire infrastructure and usestandardized protocols (e.g., SIP (Session Initiation Protocol,3), RTP(Real-Time Transport Protocol,4), etc.), whereas the proprietary cli-
ents (see Figure 9.1) focus only on the highest OSI (Open SystemsInterconnection) layers with a pure application solution and they ownnone of the service and network infrastructures.
Virtual VoIP Service Providers resemble MVNOs (Mobile Virtual
Network Operators) that we have already seen in the mobile world.Virtual VoIP Service Providers, for example, only implement some
8/13/2019 VoIP Business
2/16
130 IP TELEPHONY INTERCONNECTION REFERENCE
billing and charging mechanisms, but do not own any of the network
or service infrastructures themselves. erefore, these functions haveto be achieved owing to appropriate cooperation agreements with one
or several underlying Network Providers (see Section 9.3.4).
9.1.1 Incumbent Operators
Telephone Service Providers or telephone operators have for manyyears delivered exactly the core service that is most crucial for mostcustomersvoice. erefore, for most users, the means of transport isnot as important as many other things, e.g., the perceived quality of
the connection, user reachability, seamless mobility, and many others.Most telephony operators own the network and service infrastruc-
tures and, therefore, are in an ideal situation to offer this kind of service
and to widen their product selection.
Incumbent Operators Virtual VoIP Operators
Standardized
Proprietary
British Telecom
Telia Sonera
AOL
Parla US
Fring
Gizmo 5
Yahoo
Amivox
MSN
Nimbuzz
SkypeGoogle Talk
3rd Party Proprietary Clients
Nuvio
1Touch ToneFrance Telecom
T-mobileSiminn Enterprise Virtual
VoIP Servicesetc.
Owns Network Infrastructure No Network Infrastructure
Co-operational arrangementbetween incumbent and
3rd party clients
Hutchison
Skype
Figure 9.1 Classification of different VoIP actors. (Inspired by Verkasalo, H. 2006. Emerging
Trends in the Mobile VoIP Business. Helsinki, Finland: Helsinki University of Technology. Online at
http://www.netlab.tkk.fi/opetus/s383042/2006/papers_pdf/C3.pdf 5)
Download
edby[GeorgeMasonUniversity]at02:3201December2013
http://www.netlab.tkk.fi/http://www.netlab.tkk.fi/http://www.netlab.tkk.fi/8/13/2019 VoIP Business
3/16
BUSINESS ACTORS AND RELATIONSHIPS 131
Earlier on, telecom operators looked at new radio technologies as athreat to their current services and took a slightly defensive approach,
but nowadays operators, like for example Hutchison 3G, have real-
ized that these solutions bring them new exciting opportunities thatgive their customers more freedom and support the horizontal growthof the incumbent operator.
e main advantage that incumbent operators have is that, firstly,they already have the network in place, not to mention a huge cus-tomer base enabling them to make the paradigm shift toward VoIP.
Secondly, they have experience in roaming and interoperabilityarrangements which is extremely valuable for this type of business.
If operators are already offering a mobile telephone service, theyhave yet another advantage that the third-party proprietary Service
Providers and the Virtual VoIP Operators will not be able to offerarealistic approach toward Fixed Mobile Convergence (FMC). Oneof the important aspects of FMC is that it can be seen as a catalyst
to deploy services that are not bound to a given access technology. Aservice then can be engineered without assumption on the networkaccess used to reach the service (e.g., some implicit authenticationschemes will be abandoned in favor of service-centric schemes).
In order to a make seamless handover from a cellular network to,for instance, a WLAN (Wireless Local Area Network) network insidean office building or at home, the Service Provider would have to have
full control of both service sides. is means that without some sortof cooperation and coordination with the mobile Service Providersneither the virtual VoIP Operators nor the third-party proprietary
Service Providers will be able to offer this type of service.
9.1.2 Virtual VoIP Operators
Virtual VoIP Operators are similar to MVNOs, which are knownfrom the mobile cellular business. Virtual VoIP Operators own nophysical infrastructure, but offer services through cooperationalarrangements over the network and service infrastructures of another
operator. Virtual Operators possibly implement billing, charging,and some interface to sell the service to new customers. Some vir-tual Operators even function almost entirely through a Web site and,
therefore, need only a minimal staff.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
4/16
132 IP TELEPHONY INTERCONNECTION REFERENCE
e main advantage for Virtual Operators is that they canstart operation very quickly with minimal cost and thereby min-
imize any business risk strategically. us, they leverage on the
Internet business model and established standards such as IMS(IP Multimedia Subsystem) or SIP and available hardware2 andcan maintain lean growth in proportion to the number of new
customers.e downside is, of course, their dependency on the network oper-
ator, which inhibits the virtual operator from growing vertically with
new services and customer products. e fact that they do not haveany control of the network and service infrastructure also gives them
very little negotiation power when it comes to roaming and interoper-ability with other Service Providers, which is very important in the
long run.
9.1.3 Proprietary Tird-Party VoIP Service Providers
As previously mentioned, VoIP is not a new technology and has
existed for many years. From Chapter 10, it can be seen that differentusers have different demands based on how they use the service, forexample, when it comes to cost versus quality, usability, reachability,
standards, integration with enterprise systems, etc.ird-party proprietary Service Providers focus only on the high-
est layer in the OSI model by providing a pure application solutionto establish client-to-client communications through the Internet.
Skype is probably the best known example of this type of service andthe one that has gained the most popularity. Other players in this cat-egory may include some of the Internet giants like Microsoft MSN,
Google talk, Yahoo Voice!, and others. For these Service Providers,the business model is very different and is based generally on gettingthe biggest user domain. eir income is then mainly based on adver-tisements or on value-adding services, such as PC-to-mobile transaction
services (e.g., SkypeOut service offering), voicemails, file sharing,
video communication, and others.is type of operator shares most of the same advantages and dis-
advantages as the Virtual Operators even though their way of operationis very different.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
5/16
BUSINESS ACTORS AND RELATIONSHIPS 133
e proprietary Service Providers usually offer voice services, which,in many cases, would be considered unacceptable for the enterprise
market in relation to security, quality, special enterprise services, tech-
nical support, and interoperability issues with other Internet servicesand PSTN/cellular networks, etc., and which are, therefore, morelikely to gain added success in the private market.
Note that some services belonging to this category are forbiddenin some enterprise networks and administrations. e main reason issecurity threats and avoiding channels such as entertainment varieties
that are not work related.
9.2 Cooperation Agreements between DifferentTypes of VoIP Service Providers
While the threat from the free-offering proprietary clients still remains,some Operators look at this inevitable development as an opportunity
to take an active part in the development instead of trying to fight it.Hutchison 3G is one of the best examples of this approach. ey havemade cooperational agreements with Skype to begin selling Skype-
enabled mobile phones to their customers. is, of course, will meanthat their business focus shifts more in the direction of value-addingservices, such as SkypeOut, file sharing, and more.5
Instant Messaging clients for mobile phones is another service that
is rapidly gaining popularity and some have already begun to offervoice telephony services from client-to-client, run on a mobile device,or even client-to-mobile by using a SkypeOut or similar solutions.
Some examples of these clients are Nimbuzz (nimbuzz.com), Fring
(fring.com), and Gizmo5 (giz5.com).e following section provides more details about the identified
business actors and relationships when deploying interprovider tele-phony services.
9.3 Business Actors Involved in VoIP Interconnection
Four business actors have been identified as main actors involved in
the delivery of interprovider VoIP services. Dedicated business rela-tionships are used to allow interaction between involved business
actors. More details about these actors and business relationships aredescribed in the following.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
6/16
134 IP TELEPHONY INTERCONNECTION REFERENCE
9.3.1 Customer
e Customer role denotes the business entity that subscribes to
the service offering delivered by a given Service Provider. A service
offering includes several features, such as: (1) unlimited VoIP calls tolocal destinations, (2) unlimited VoIP calls to international destina-
tions, (3) free roaming, (4) ability to filter incoming calls, (5) supportof CLID (Calling Line Identification Display), (6) CLIR (CallingLine Identification Restriction), etc.
e subscription to the service is implemented via a dedicated con-
tract denoted as a Service Level Agreement (SLA) (Figure 9.2). issubscription is for the right to use the service.
An SLA is a document that specifies the technical clauses related
to the delivery of the subscribed service.e SLA is translated by a given Service Provider to a Service
Level Specification (SLS). Particularly, an SLA contract is trans-lated to access control rules and policies, enforced within service
nodes attached to the service domain managed by a given ServiceProvider. is action is required to allow the subscribed Customers
to access the offered services when invoking their SLAs. Specifically,the device used by the Customer is appropriately configured toaccess the service. e reachability information (e.g., FQDN (FullyQualified Domain Name) or an IP address) of the outbound proxy
to use when placing calls is to be configured. e configuration ofthe outbound proxy reachability information can be achieved usingDHCP (Dynamic Host Configuration Protocol,6,7) for instance, orany alternative means.
In addition, means to invoke the service (or the SLA) are alsospecified by the Service Provider during the SLA negotiationphase. ese means may be implicit or explicit (e.g., issuing dedicated
Service Level Agreement
Customer
Service Provider
Figure 9.2 Customer to Service Provider relationship.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
7/16
BUSINESS ACTORS AND RELATIONSHIPS 135
RSVP (Reservation Protocol) requests or logging into a Web page,etc.). Implicit means are reduced to access control policies enforced
in the service nodes to which the Customer device is connected.
ese rules may be coupled with other authentication procedures. Forinstance, authentication procedures can be enabled to check whetheror not a user is allowed to access the service.
e delivered service should fulfill the clauses detailed in theSLA. A Service Provider should implement service fulfillment andassurance functions that are responsible for checking if the services
delivered to the subscribed Customers are consistent with whathas been subscribed by them in the SLA. e Service Provider
should be able to continuously and, preferably in real-time, con-trol the level of its offered services and avoid receiving calls to its
hotline (which induces extra costs from an OPEX (OperationalExpenditure) perspective).
Service and network failures, such as service nodes outage, link
failures, degradation of the QoS (Quality of Service) of voice streams,and routing disruption, should be reported to the appropriate desksand action should be undertaken to solve the encountered problem.e problem should be solved (or at least detected and handled) before
receiving the complaints from the Customers.
9.3.2 End User
End User denotes the entity that actually invokes the service, owingto a prenegotiated SLA owned by a Customer (Figure 9.3).
Generally, End User and Customer entities are used inter-changeably. In this book, it is assumed that a Customer is the entitythat subscribes to a service offering, which is managed and offered bya Service Provider. End Users are all persons who use the service
End User
Customer
Delegates
Figure 9.3 Relationship between the End User and the Customer business actors.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
8/16
136 IP TELEPHONY INTERCONNECTION REFERENCE
(e.g., members of a family use the services subscribed to by one mem-ber of the family).
A Customer has the right to invoke the subscribe service to one
or several End Users.e identity of End User is not meaningful from a service per-spective; only the one of Customer is required. In particular, for
legal intercept and data retention purposes, only the identity ofthe Customer is used. For abuse claims, only the identity of theCustomer will be provided to the authorities because the Customer
is the entity who is legally responsible of the use of a link or a service.It is up to the Customer to check whether or not End Users are
misbehaving. ese means are not specified by Service Providersand are left to the judgment of each Customer.
For enterprises or universities, a means to log the connected users(e.g., employees, students) may be put in place to identify, in a non-ambiguous manner, the suspected user, who may be subject to an
abuse claim.
9.3.3 Service Provider
As mentioned above, Service Providers put at the disposal ofCustomers a service portfolio. is portfolio is a packaging ofcapabilities resulting from the engineering of a set of resources and
equipments.Service Providers administer a set of equipment and service-
specific resources, such as billing means, authentication procedures,
and customer profiles databases, which interact for the delivery ofvalue-added services. ese equipments and resources belong to theService Provider domain.
In the context of IP telephony, a service domain is referred to as an
ITAD (IP Telephony Administrative Domain).Service nodes belonging to a Service Provider are interconnected
owing to the invocation of connectivity services offered by a NetworkProvider, as shown in Figure 9.4. Note that the access segment is
particularly critical and sensitive since, for instance, the loss of a fewATM frames may induce a failure of an ongoing H.323 call: only 3frames to 1000 (i.e., 3/1000) may be sufficient to avert the establish-
ment of an ongoing H.323 call.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
9/16
BUSINESS ACTORS AND RELATIONSHIPS 137
Service Provider and Network Provider may be managed bythe same administrative entity. is mode is denoted as a vertical
model because no separation may be enforced between the networkand service layer. In a vertical model, a Service Provider may enforcenetwork-related policies to prioritize some of its services.
From a service perspective, all VoIP actors identified in Section 9.1are considered as Service Providers. e way the service is engineeredis an internal issue.
It is worth mentioning that Customers have dedicated require-
ments with regards to the delivered services, especially in terms ofQoS and/or QoE (Quality of Experience) and availability. Pertinent
indicators to let the customer assess the level of its subscribed/deliv-ered services should be provided by the Service Provider owingto the implementation of suitable service assurance functions whereindicators, such as MTBF (Mean Time Between Failures), MTBR
(Mean Time Between Repairs), MTTR (Mean Time To Restore),and one-way delays are put at the disposal of Customers. In orderto meet these objectives (i.e., technical clauses included in SLAs),numerous engineering tuning operations are enforced and associated
means (e.g., tools, protocols, architectures, etc.) deployed to monitorand measure the outcome of engineered services. In addition, a NOC(Network Operations Center) can be designated to intervene and to
solve the experienced degradation or the unavailability of a service.
ITAD
AS
Figure 9.4 Service Provider to Network Provider relationship.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
10/16
138 IP TELEPHONY INTERCONNECTION REFERENCE
Supervision is a critical component in the service managementenvironment and, therefore, in the value creation chain. Supervision
aims at providing inputs to operational entities that are in charge of
operating and maintaining services. Dedicated organizational andfunctional structures are to be implemented to efficiently monitorand assess the grade of deployed services and also the grade of
perceived delivered services by End Users. Appropriate actionsare consequently enforced so as to solve encountered problems andthen put an altered service back to its normal state. Various tools
(e.g., probes, reporting tools, etc.) are to be deployed to providefeedback on the status of running services and potential opera-
tional issues.In order to assess the level of operated services to Customers,
valid indicators must be defined and their values evaluated. eseindicators may be computed in real time or based on recorded data,such as CDRs (Call Data Records). Below is listed a set of valid
indicators:
Availability of the service.
NER (Network Efficiency Ratio) and ASR (Answer EfficiencyRatio) that are used to compute the ratio of efficient calls.
ALOC (Average Length of Call) is used to compute the aver-age duration of calls.
PRR (Premature Release Ratio) is used to compute the ratioof sessions that have been prematurely torn down.
SCRn (Short Communication Ratio less than n seconds) isused to evaluate the number of calls whose duration is lessthan n seconds.
However, considering the aforementioned issues, and the complex-
ity of deployed networks and services, additional indicators would beuseful to assess the overall level of delivered service:8
Session Request Delay (SRD): Defined as the time inter-val from the first call setup request containing the necessary
information sent by the calling party to the intended media-tion or called party until the last bit of the first provisionalresponse is received indicating an audible or visual status ofthe initial session setup request.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
11/16
BUSINESS ACTORS AND RELATIONSHIPS 139
Session Disconnect Delay (SDD): Defined as the intervalbetween the first bit of the sent session completion message and
the last bit of the subsequently received successful response.
Session Duration Time (SDT). Ineffective Session Attempts (ISA): Occur when a proxy oragent internally releases a setup request with a failed or over-
loaded condition. e output value of this metric is numericaland should be adjusted to indicate a percentage of ineffectivesession attempts.
Session Establishment Ratio (SER): is metric is numericaland is adjusted to indicate a percentage of successfully estab-
lished sessions. Registration Request Delay (RRD): A measurement of the
delay in responding to a user agent registration request. RRDis measured and reported only for successful registrationrequests. RRD is stated in units of milliseconds.
Ineffective Registration Attempts (IRA) are utilized to detectfailures causing an inability for a registration server to receivea registration request. is metric is measured at the origi-nating UA. IRA is reported as a percentage of registration
attempts.
Some of these indicators do not reflect the QoS, but the cred-ibility of reported data. Consequently, these ratios assess the QoS
of the overall service from the perspective of those communicationsfrom which a CDR has been recorded. is subtlety should be takeninto account in order not to reproduce the same practices as for a
PSTN.
9.3.4 Network Provider
Network Provider denotes the entity that is responsible for man-aging and administering a set of resources and capabilities for thedelivery of connectivity services. ese connectivity services may be
IP ones or Layer 2 ones (e.g., ATM (Asynchronous Transfer Mode),GE (Gigabit Ethernet), etc.).
For the delivery of added value services, Service Providers use thecapabilities of underlying Network Providers. e engineering and
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
12/16
140 IP TELEPHONY INTERCONNECTION REFERENCE
maintenance of these capabilities belong to the Network Provider.Only service-specific engineering is managed by Service Providers.
Furthermore, in order to deliver its services, a given Service
Provider may rely on one or several Network Providers capabilities.is relationship is implemented via a dedicated agreement called aConnectivity Provisioning Agreement (CPA).
A Network Provider may provide capabilities in distinct seg-ments, such as access, access aggregation, and/or core segments.
9.4 Business Relationships
e delivery of interprovider IP telephony services relies on theimplementation of various agreements between involved actors. ese
agreements are explained in detail below.
9.4.1 SLA (Service Level Agreement)
As mentioned above, an SLA is the contract agreed between aCustomer and a Service Provider. is agreement is a right toinvoke the service. Both administrative and technical clauses are
detailed in such a document. An SLA may be negotiated betweeninvolved parties. Dedicated means to negotiate an SLA may beput at the disposal of Customers. In current practices, mainly for
Residential Customers, SLAs are not negotiated, but are frozenby Service Providers.
An SLA may define the scope of delivered services and associ-
ated guarantees.
9.4.2 CPA (Connectivity Provisioning Agreement)
To deploy their services, Service Providers rely on underlyingcapabilities managed by Network Providers. ese capabilities areinvoked owing to the subscription to dedicated agreements calledConnectivity Provisioning Agreements (Figure 9.5). Connectivity
means the reachability and transfer capabilities resulting from theinterconnection of nodes and activation of resources.
A Connectivity Provisioning Agreement defines the scope
of the connectivity services and associated guarantees. Moreover,
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
13/16
BUSINESS ACTORS AND RELATIONSHIPS 141
QoS and resilience clauses are defined in a given ConnectivityProvisioning Agreement.
A given Service Provider may be located in several countries,therefore, CPA agreements with several Network Providers arerequired to be under contract. Figure 9.6 provides an overview ofthe business roles and the interactions, while Figure 9.7 sketches
an example of the network configuration where one single ITAD isdeployed over three Autonomous Systems (ASs). An AS is typicallya BGP (Border Gateway Protocol) domain. More information aboutthis is provided in Chapter 8.
When both Service Provider and Network Provider refer to thesame administrative entity, the CPA interface is not explicit. But, thispractice may evolve in Europe if Functional Separation promoted by
the European Commission is imposed.
Service Provider
Network Provider
Connectivity Provisioning Agreement
Figure 9.5 Service Provider to Network Provider relationship.
1,*
Service Provider
CPA CPA
Network ProviderNetwork ProviderNetwork Provider
CPA
Figure 9.6 Multiple CPAs.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
14/16
142 IP TELEPHONY INTERCONNECTION REFERENCE
9.4.3 NIA (Network Interconnection Agreement)
In order to extend the scope of their connectivity services beyondtheir administrative boundaries, Network Providers activate appro-
priate means to exchange reachability information and also to providetransfer capabilities to each other. Prior to the exchange of informa-
tion, a dedicated agreement is negotiated between involved parties.is agreement is called the Network Interconnection Agreement.is agreement may involve Network Providers that act in distinct
segments, such as access and core networks or between two NetworkProviders, which provide transit services (Figure 9.8). Examples ofIP NIAs are peering or transit agreements.
9.4.4 SIA (Service Interconnection Agreement)
Similar to NIA, Service Interconnection Agreements may benegotiated between two Service Providers. ese agreementsare put in place to extend the service scope and deliver the ser-
vice beyond the single administrative domain of one single ServiceProvider (Figure 9.9).
An SIA should describe the scope of the interconnection ser-vice, QoS, resilience, and additional administrative and technicalclauses. e format of the SIA is not standardized. Adjacent Service
ITAD
ASb AScASa
Figure 9.7 Example of an ITAD deployed over several AS domains.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
15/16
BUSINESS ACTORS AND RELATIONSHIPS 143
Providers are free to enclose in an SIA the clauses they believe to be
pertinent to each other. A cost is usually associated with an SIA andshould include indicators, such as MTBF, MTBR, MTTR, and one-way delay.
In the context of Interprovider IP telephony, the SIA should
include the scope of the interconnection: in particular, whetherreachable telephony prefixes are wildcard or restricted to a set of
well-defined prefixes, the amount of traffic allowed to be exchanged,the ratio of incoming to outgoing traffic, the signaling protocol to beused, accepted CODECs, etc.
9.4.5 Conclusion
Figure 9.10 summarizes these business actors and required businessrelationships, which are involved for the delivery of interprovider IP
telephony services. Service Providers need to cooperate in order tobe able to provide global reachability. is global reachability is pro-vided over the interconnection of various Network Providers.
Service Interconnection AgreementService Provider Service Provider
Figure 9.8 Network Interconnection Agreement.
Network Interconnection AgreementNetwork Provider Network Provider
Figure 9.9 Service Interconnection Agreement.
Network Interconnection Agreement
Connectivity Provisioning Agreement Connectivity Provisioning Agreement
Service Interconnection Agreement
Service Level AgreementService Level Agreement
Service Provider
Network Provider Network Provider
Service Provider
CustomerCustomer
End UserEnd User
Figure 9.10 Overview of Business Actors and Relationships.
Download
edby[GeorgeMasonUniversity]at02:3201December2013
8/13/2019 VoIP Business
16/16
144 IP TELEPHONY INTERCONNECTION REFERENCE
References
1. Barsi, T. 2002. Disruptive technology vs. disruptive applications.Telephony online, at http://telephonyonline.com/news/telecom_disrup-
tive_technology_vs/index.html(accessed July, 2011). 2. Malas, D. and A. Morton. 2010. Basic Telephony SIP End-to-EndPerformance Metrics. draft-ietf-pmol-sip-perf-metrics (work in prog-ress), September.
3. Rosenberg, J., H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,R. Sparks, M. Handley, and E. Schooler. 2002. SIP: Session InitiationProtocol. RFC 3261, June.
4. Schulzrinne, H., S. Casner, R. Frederick, and V. Jacobson. 2003. RTP: ATransport Protocol for Real-Time Applications. STD 64, RFC 3550, July.
5. Verkasalo, H. 2006. Emerging Trends in the Mobile VoIP Business.Helsinki, Finland: Helsinki University of Technology. Online athttp://www.netlab.tkk.fi/opetus/s383042/2006/papers_pdf/C3.pdf(accessed October, 2011)
6. Droms, R. 1997. Dynamic Host Configuration Protocol. RFC 2131,March.
7. Droms, R., J. Bound, B. Volz, T. Lemon, C. Perkins, and M. Carney.2003. Dynamic Host Configuration Protocol for IPv6 (DHCPv6).RFC 3315, July.
8. Blau, J. 2006. 3GSM: Skype, Hutchison 3G partner on VoIP. InfoWorld.
com. Online at http://www.infoworld.com/archives/emailPrint.jsp?R=printis&A=/article/06/02/14/75370_HN3gvoip_1.html (accessedJuly, 2011).
Download
edby[GeorgeMasonUniversity]at02:3201December2013
http://telephonyonline.com/http://telephonyonline.com/http://www.netlab.tkk.fi/http://www.infoworld.com/http://www.infoworld.com/http://www.netlab.tkk.fi/http://telephonyonline.com/http://telephonyonline.com/