Beruflich Dokumente
Kultur Dokumente
-
And all the other stu you need to know!
for Doozing
Contents
3 Anonymity 4
3.1 Pseudonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.2 Psychological eects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.3 Anonymity, commerce, and crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.4 Anonymity in charity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.5 Issues facing the anonymous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.6 Referring to the anonymous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.7 Anonymity and the press . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.8 Anonymity on the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.9 Legal protection of anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.9.1 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.9.2 European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.9.3 International legislation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.10 Anonymity and politics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.11 Anonymity and pseudonymity in art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.12 Mathematics of anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.13 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.14 Notes and references . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4 AskoziaPBX 12
4.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 Major Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.3 Internationalization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.4 Moving from FreeBSD to Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
i
ii CONTENTS
4.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5 Asterisk (PBX) 14
5.1 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.2 Internationalization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.3 Derived products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.6 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
9.4.2 IP-PBX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
9.5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
9.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
9.7 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
10 Call capture 28
10.1 Sample service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
10.2 Levels of service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
11 Call waiting 29
11.1 Star codes*43# . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
11.2 Line sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
11.3 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
11.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
11.5 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
12 Called party 31
12.1 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
12.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
13 Caller ID 32
13.1 Calling-line identication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
13.2 CLI localisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
13.3 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
13.4 Type II Caller ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
13.5 Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
13.6 Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.6.1 Telemarketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.6.2 ISPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.6.3 Mobile providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.7 Regional dierences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.7.1 UK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.8 Legal issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.8.1 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
13.9 Getting around caller ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
13.9.1 Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
13.9.2 Spoong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
13.9.3 Disabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
13.9.4 Enabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
13.10Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
13.11References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
13.12External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
iv CONTENTS
14 Caller ID spoong 39
14.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
14.2 Technology and methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
14.2.1 Voice over IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
14.2.2 Service providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
14.2.3 Orange box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
14.3 Caller name display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
14.4 Legal considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
14.4.1 Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
14.4.2 India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
14.4.3 United Kingdom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
14.4.4 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
14.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
14.6 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
15 Cellular frequencies 43
15.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
15.2 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
15.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
16 Cellular network 45
16.1 Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
16.2 Cell signal encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
16.3 Frequency reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
16.4 Directional antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
16.5 Broadcast messages and paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
16.6 Movement from cell to cell and handing over . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
16.7 Mobile phone network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
16.7.1 Structure of the mobile phone cellular network . . . . . . . . . . . . . . . . . . . . . . . 48
16.7.2 Small cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
16.7.3 Cellular handover in mobile phone networks . . . . . . . . . . . . . . . . . . . . . . . . . 49
16.7.4 Cellular frequency choice in mobile phone networks . . . . . . . . . . . . . . . . . . . . . 49
16.7.5 Coverage comparison of dierent frequencies . . . . . . . . . . . . . . . . . . . . . . . . 49
16.8 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
16.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
16.10External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
16.11Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
17 Circuit switching 51
17.1 The call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
17.2 Compared with datagram packet switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
17.3 Examples of circuit-switched networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
CONTENTS v
19 Conference call 59
19.1 Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
19.1.1 Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
19.1.2 Flat-rate conferencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
19.1.3 Prepaid conference calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
19.1.4 Free conference calling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
19.1.5 Premium conferencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
19.2 Conferencing in IMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
19.3 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
19.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
20 Digital AMPS 63
20.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
20.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
20.3 Technology specications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
20.4 Call processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
20.5 System example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
20.6 Successor technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
20.6.1 IS-136 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
20.7 Sunset for D-AMPS in the US and Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
20.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
20.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
22 Disruptive innovation 69
22.1 History and usage of the term . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
22.2 Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
22.3 Disruptive technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
22.4 High-technology eects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
22.5 Practical example of disruption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
22.6 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
22.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
22.8 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
22.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
22.10Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
22.11External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
23 E.164 76
23.1 Telephone number categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.1.1 Number structure for geographic area . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.1.2 Number structure for global services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.1.3 Number structure for networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.1.4 Number structure for groups of countries . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.2 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.2.1 E.163 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.2.2 E.164.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
23.2.3 E.164.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
23.2.4 E.164.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
23.3 DNS mapping of E.164 numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
23.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
23.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
23.6 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
24 Elastix 78
24.1 Support for telephony hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
24.2 Call center module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
24.3 History of the project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
24.4 Similar software distributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
24.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
CONTENTS vii
25 Emergency service 80
25.1 Main emergency service functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
25.2 Other emergency services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
25.3 Civil emergency services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
25.4 Location-specic emergency services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
25.5 Cooperation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
25.5.1 Disaster response technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
25.6 Response time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
25.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
25.8 Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
26 Federated VoIP 83
26.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
26.2 Federation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
26.3 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
26.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
26.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
27 FreePBX 85
27.1 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
27.2 Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
27.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
27.4 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
28 FreeSWITCH 87
28.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
28.2 Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
28.3 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
28.4 Codec Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
28.5 Operating and build system support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
28.6 Comparison with other telephony software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
28.7 Derived products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
28.8 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
28.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
28.10External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
29 GSM 90
29.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
29.2 Technical details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
29.2.1 Network structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
29.2.2 Base station subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
viii CONTENTS
32 LinuxMCE 108
32.1 Levels of implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
32.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
32.3 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
32.4 Software components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
32.5 User interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
32.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
32.7 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
32.8 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
40 Modem 135
40.1 Dialup modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
40.1.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
40.1.2 Popularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
40.2 Broadband . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
40.3 Radio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
40.3.1 WiFi and WiMax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
40.3.2 Mobile broadband . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
40.3.3 Residential gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
40.4 Optical modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
40.4.1 QAM16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
40.4.2 QAM64 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
40.5 Home networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
40.6 Voice modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
40.7 Brands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
40.8 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
40.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
40.10External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
62 Skype 229
62.1 Etymology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
62.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
62.2.1 Microsoft acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
62.3 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
62.4 Usage and trac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
62.5 System and software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
62.5.1 Client applications and devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
62.5.2 Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
62.5.3 Protocol detection and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
62.5.4 Audio codecs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
62.5.5 Video codecs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
62.5.6 Skype Qik . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
62.6 Security and privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
62.6.1 Service in the Peoples Republic of China . . . . . . . . . . . . . . . . . . . . . . . . . . 234
62.6.2 No Skype calls to India landline and mobile . . . . . . . . . . . . . . . . . . . . . . . . . 235
62.7 Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
62.8 URIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
62.9 Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
62.10Educational use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
62.11See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
62.12References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
62.13Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
62.14External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
64 Softphone 248
64.1 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
64.2 Communication protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
64.3 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
64.4 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
64.5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
64.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
65 Softswitch 249
65.1 Feature server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
65.2 Class 4 and Class 5 softswitches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
65.3 Hosted switch services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
65.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
65.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
66 Telephone 251
66.1 Basic principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
66.2 Details of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
CONTENTS xix
78 Voicemail 311
78.1 History of voicemail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
78.2 Voicemail features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
78.3 Message centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
78.4 Voicemail invention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
78.5 Invention of voicemail controversy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
78.6 Pioneering applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
78.6.1 IBM Audio Distribution System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
78.6.2 Delta 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
78.6.3 VMX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
78.6.4 IVR Voice Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
78.7 International Voicemail Association . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
78.8 Corporate voicemail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
78.9 Public telephone services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
78.10Unied messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
78.11Virtual telephony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
78.12Instant messaging in voice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
78.13Unied messaging with VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
78.14Voicemail benets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
78.15How voicemail works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
78.16See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
78.17References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
78.18Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
80 X.25 326
80.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
80.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
80.2.1 Relation to the OSI Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
80.2.2 User device support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
80.2.3 Error control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
80.3 Addressing and virtual circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
80.4 Billing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
80.5 X.25 packet types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
80.6 X.25 details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
80.6.1 X.25 facilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
80.6.2 X.25 protocol versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
80.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
80.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
80.9 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
80.10External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
80.11Text and image sources, contributors, and licenses . . . . . . . . . . . . . . . . . . . . . . . . . . 332
80.11.1 Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
80.11.2 Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
80.11.3 Content license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Chapter 1
1
2 CHAPTER 1. ANALOG DISPLAY SERVICES INTERFACE
2.1 Purpose
An ATA is connected between an IP network (such as
a broadband connection) and an existing telephone jack
in order to provide service nearly indistinguishable from
public switched telephone network (PSTN) providers on
all the other telephone jacks in the residence. ATAs are
used by many VoIP companies selling a telco-alternative
VoIP service, where the device is used to replace a users
connection to a traditional telephone company. When
A typical analog telephone adapter for connecting an analog
phone to a VoIP provider sold in connection with a VoIP service, the ATA is of-
ten locked so it cannot be used with a competing ser-
vice, and the user can only partly change its conguration.
An analog telephone adapter (ATA) is a device for con- Some providers do sell devices that are not locked and can
necting traditional analog telephones, fax machines, and be used with any compatible provider. This type of ser-
similar customer-premises devices to a digital telephone vice, which is xed to one location, is generally oered
system or a voice over IP telephony network. by broadband Internet providers such as cable companies
and telephone companies as a cheaper at-rate traditional
An ATA is often built into a small enclosure with an in-
phone service.
ternal or external power adapter, an Ethernet port, one
or more foreign exchange station (FXS) telephone ports.
Such devices may also have a foreign exchange oce
(FXO) interface for providing alternative access to tra- 2.2 References
ditional land line telephone service.
The ATA provides dial tone, ringing generator, DC
power, caller ID data and other standard telephone
line signaling (known collectively as BORSCHT) to the
telephone connected to a modular jack.
The digital interface of the ATA typically consists of an
Ethernet port to connect to an Internet Protocol (IP) net-
work, but may also be a USB port for connecting the de-
vice to a personal computer.
Using such an ATA, it is possible to connect a conven-
tional telephone to a remote VoIP server. The ATA com-
municates with the server using a protocol such as H.323,
SIP, MGCP, SCCP or IAX, and encodes and decodes the
voice signal using a voice codec such as G.711, G.729,
GSM, iLBC or others. Since the ATA communicates di-
rectly with the VoIP server, it does not require a personal
3
Chapter 3
Anonymity
This article is about identication. For anonymity In mathematics, in reference to an arbitrary element (e.g.,
in Wikipedia, see Wikipedia:Anonymity. For other a human, an object, a computer), within a well-dened set
uses, see Anonymous (disambiguation) and Anonymus (called the anonymity set), anonymity of that element
(disambiguation). refers to the property of that element of not being iden-
tiable within this set. If it is not identiable, then the
element is said to be anonymous.
Anonymity, adjective anonymous, is derived from the
Greek word , anonymia, meaning without a
name" or namelessness. In colloquial use, anony-
mous is used to describe situations where the acting 3.1 Pseudonymity
persons name is unknown. Some writers have argued
that namelessness, though technically correct, does not Sometimes it is desired that a person can establish a long-
capture what is more centrally at stake in contexts of term relationship (such as a reputation) with some other
anonymity. The important idea here is that a per- entity, without necessarily disclosing personally identi-
son be non-identiable, unreachable, or untrackable.[1] fying information to that entity. In this case, it may
Anonymity is seen as a technique, or a way of realizing, be useful for the person to establish a unique identier,
certain other values, such as privacy, or liberty. called a pseudonym, with the other entity. Examples
An important example for anonymity being not only pro- of pseudonyms are pen names, nicknames, credit card
tected, but enforced by law is probably the vote in free numbers, student numbers, bank account numbers, etc.
elections. In many other situations (like conversation A pseudonym enables the other entity to link dierent
between strangers, buying some product or service in messages from the same person and, thereby, to estab-
a shop), anonymity is traditionally accepted as natural. lish a long-term relationship. Pseudonyms are widely
There are also various situations in which a person might used in social networks and other virtual communication,
choose to withhold their identity. Acts of charity have although recently some important service providers like
been performed anonymously when benefactors do not Google try to discourage pseudonymity.
wish to be acknowledged. A person who feels threatened Someone using a pseudonym would be strictly considered
might attempt to mitigate that threat through anonymity. to be using pseudonymity not anonymity, but some-
A witness to a crime might seek to avoid retribution, for times the latter is used to refer to both (in general, a situ-
example, by anonymously calling a crime tipline. Crimi- ation where the legal identity of the person is disguised)
nals might proceed anonymously to conceal their partic-
ipation in a crime. Anonymity may also be created un-
intentionally, through the loss of identifying information
due to the passage of time or a destructive event. 3.2 Psychological eects
In certain situations, however, it may be illegal to remain
anonymous. In the United States, 24 states have stop andAnonymity may reduce the accountability one perceives
to have for their actions, and removes the impact these
identify statutes that requires persons detained to self-
identify when requested by a law enforcement ocer. In actions might otherwise have on their reputation. This can
Germany, people have to indicate their names at the door have dramatic eects, both useful and harmful to various
of their homes. parties and/or entities involved, relatively. Thus, it may
be used for psychological tactics involving any respective
The term anonymous message typically refers to a mes- party to purport and/or support and/or discredit any sort
sage that does not reveal its sender. In many countries, of activity or belief.
anonymous letters are protected by law and must be de-
livered as regular letters. In conversational settings, anonymity may allow people
to reveal personal history and feelings without fear of
later embarrassment. Electronic conversational media
4
3.3. ANONYMITY, COMMERCE, AND CRIME 5
can provide physical isolation, in addition to anonymity. 3.3 Anonymity, commerce, and
This prevents physical retaliation for remarks, and pre-
vents negative or taboo behavior or discussion from tar-
crime
nishing the reputation of the speaker. This can be bene-
cial when discussing very private matters, or taboo sub-
Anonymous commercial transactions can protect the pri-
jects or expressing views or revealing facts that may put
vacy of consumers. Some consumers prefer to use cash
someone in physical, nancial, or legal danger (such as
when buying everyday goods (like groceries or tools), to
illegal activity, or unpopular, or outlawed political views).
prevent sellers from aggregating information or soliciting
In work settings, the three most common forms of anony- them in the future. Credit cards are linked to a persons
mous communication are traditional suggestion boxes, name, and can be used to discover other information, such
written feedback, and Caller ID blocking. Additionally, as postal address, phone number, etc. The ecash sys-
the appropriateness of anonymous organizational com- tem was developed to allow secure anonymous transac-
munication varies depending on the use, with organiza- tions. Another example would be Enymity, which actu-
tional surveys and/or assessments typically perceived as ally makes a purchase on a customers behalf. When pur-
highly appropriate and ring perceived as highly inap- chasing taboo goods and services, anonymity makes many
propriate. Anonymity use and appropriateness have also potential consumers more comfortable with or more will-
been found to be signicantly related to the quality of ing to engage in the transaction. Many loyalty programs
relationships with key others at work.[2] use cards that personally identify the consumer engaging
in each transaction (possibly for later solicitation, or for
redemption or security purposes), or that act as a numer-
ical pseudonym, for use in data mining.
Anonymity can also be used as a protection against le-
gal prosecution. For example, when committing unlaw-
ful actions, many criminals attempt to avoid identica-
tion by the means of obscuring/covering their faces with
scarves or masks, and wear gloves or other hand coverings
in order to not leave any ngerprints. In organized crime,
groups of criminals may collaborate on a certain project
without revealing to each other their names or other per-
sonally identiable information. The movie The Thomas
Crown Aair depicted a ctional collaboration by peo-
ple who had never previously met and did not know who
had recruited them. The anonymous purchase of a gun
or knife to be used in a crime helps prevent linking an
abandoned weapon to the identity of the perpetrator.
Protesters outside a Scientology center on February 10, 2008,
donning masks, scarves, hoods, and sunglasses to obscure their
faces, and gloves and long sleeves to protect them from leaving
ngerprints.
as the origin and the immediate next router as the des- People dependent on an organization, or afraid of
tination. Thus, no router ever knows both the true ori- revenge, may divulge serious misuse, which should
gin and destination of the packet. This makes these ser- be revealed. Anonymous tips can be used as an in-
vices more secure than centralized anonymizing services formation source by newspapers, as well as by po-
(where a central point of knowledge exists).[10] lice departments, soliciting tips aimed at catching
Sites such as Chatroulette, Omegle, and Tinder (which criminals. Everyone will not regard such anony-
pair up random users for a conversation) capitalized on a mous communication as good. For example, mes-
fascination with anonymity. Apps like Yik Yak, Secret sage boards established outside companies, but for
employees of such companies to vent their opin-
and Whisper let people share things anonymously or
quasi-anonymously whereas Random lets the user to ex- ions on their employer, have sometimes been used
in ways that at least the companies themselves were
plore the web anonymously. Other sites, however, includ-
ing Facebook and Google+, ask users to sign in with their not happy about [Abelson 2001].[19] Police use of
anonymity is a complex issue, since the police often
legal names. In the case of Google+, this requirement led
to a controversy known as the nymwars.[11] will want to know the identity of the tipper in order
to get more information, evaluate the reliability or
The prevalence of cyberbullying is often attributed to get the tipper as a witness. Is it ethical for police to
relative Internet anonymity, due to the fact that poten- identify the tipper if it has opened up an anonymous
tial oenders are able to mask their identities and pre- tipping hotline?
vent themselves from being caught. A principal in a
high school stated that comments made on these anony- People in a country with a repressive political regime
mous site are especially vicious and hurtful since there may use anonymity (for example Internet-based
is no way to trace their source and it can be disseminated anonymity servers in other countries) to avoid per-
widely.[12] Cyberbullying, as opposed to general bully- secution for their political opinions. Note that even
ing, is still a widely-debated area of Internet freedom in in democratic countries, some people claim, rightly
several states.[13] or wrongly, that certain political opinions are perse-
cuted. [Wallace 1999][20][21] gives an overview of
As A. Michael Froomkin says: "The regulation of anony-
uses of anonymity to protect political speech. Ev-
mous and pseudonymous communications promises to be
ery country has a limit on which political opinions
one of the most important and contentious Internet-related
are allowed, and there are always people who want
issues of the next decade.[14][15]
to express forbidden opinions, like racial agitation in
David Chaum is called the Godfathers of anonymity and most democratic countries.
he has a claim to be one of the great visionaries of con-
temporary science. In the early 1980s, while a com- People may openly discuss personal stu which
puter scientist at Berkeley, Chaum predicted the world in would be embarrassing to tell many people about,
which computer networks would make mass surveillance such as sexual problems. Research shows that
a possibility. As Dr Wright explains: David Chaum was anonymous participants disclose signicantly more
very ahead of his time. He predicted in the early 1980s information about themselves [Joinson 2001].[22]
concerns that would arise on the internet 15 or 20 years People may get more objective evaluation of their
later..[16] There are some people though that consider messages, by not showing their real name.
anonymity in internet being a danger for our society as
a whole. David Davenport, an assistant professor in the People are more equal in anonymous discussions,
Computer Engineering Department of Bilkent University factors like status, gender, etc., will not inuence the
in Ankara, Turkey, considers that by allowing anonymous evaluation of what they say.
Net communication, the fabric of our society is at risk.[17]
Accountability requires those responsible for any miscon- Pseudonymity can be used to experiment with role
duct be identied and brought to justice. However, if peo- playing, for example a man posing as a woman in or-
ple remain anonymous, by denition, they cannot be iden- der to understand the feelings of people of dierent
tied, making it impossible to hold them accountable." he gender.
says. Pseudonymity can be a tool for timid people to dare
Is Anonymity Good or Bad?[18] establish contacts which can be of value for them
and others, e.g. through contact advertisements.
Anonymity and pseudonymity can be used for good and
bad purposes. And anonymity can in many cases be desir-
able for one person and not desirable for another person. There has always, however, also been a dark side of
A company may, for example, not like an employee to anonymity:
divulge information about improper practices within the
company, but society as a whole may nd it important Anonymity can be used to protect a criminal per-
that such improper practices are publicly exposed. Good forming many dierent crimes, for example slander,
purposes of anonymity and pseudonymity: distribution of child pornography, illegal threats,
8 CHAPTER 3. ANONYMITY
racial agitation, fraud, intentional damage such as the Bill of Rights, and of the First Amendment in
distribution of computer viruses, etc. The exact set particular: to protect unpopular individuals from
of illegal acts varies from country to country, but retaliationand their ideas from suppressionat
most countries have many laws forbidding certain the hand of an intolerant society.[30] The Supreme
informational acts, everything from high treason court explained that protecting anonymous political
to instigation of rebellion, etc., to swindling. speech receives the highest protection however, this
priority takes on new dimensions in the digital age.
Anonymity can be used to seek contacts for per-
forming illegal acts, like a pedophile searching for
children to abuse or a swindler searching for people
The right of individuals for anonymous commu-
to rip o.
nication was established by the decision in case
Even when the act is not illegal, anonymity can be Columbia Insurance Company v. Seescandy.com, et
used for oensive or disruptive communication. For al. (1999) of the United States District Court for
example, some people use anonymity in order to say the Northern District of California: People are per-
nasty things about other people. mitted to interact pseudonymously and anonymously
with each other so long as those acts are not in vio-
lation of the law.[31]
The border between illegal and legal but oensive use is
not very sharp, and varies depending on the law in each
country.[23]
The right of individuals for anonymous reading
Anonymous (group).[24] was established in the U.S. Supreme Court decision
Anonymous (used as a mass noun) is a loosely associated in United States v. Rumely (1953): Once the gov-
international network of activist and hacktivist entities. A ernment can demand of a publisher the names of the
website nominally associated with the group describes it purchasers of his publications, the free press as we
as an internet gathering with a very loose and decen- know it disappears. Then the spectre of a govern-
tralized command structure that operates on ideas rather ment agent will look over the shoulder of everyone
than directives.[25] The group became known for a series who reads.[32]
of well-publicized publicity stunts and distributed denial-
of-service (DDoS) attacks on government, religious, and
corporate websites. An image commonly associated with
The pressure on anonymous communication has grown
Anonymous is the man without a head represents lead-
substantially after the 2001 terrorist attack on the World
erless organization and anonymity.[26]
Trade Center and the subsequent new political climate.
Although it is still dicult to oversee their exact implica-
tions, measures such as the US Patriot Act, the European
3.9 Legal protection of anonymity Cybercrime Convention and the European Union rules on
data retention are only few of the signs that the exercise
Anonymity is perceived as a right by many, especially the of the right to the anonymous exchange of information is
[33]
anonymity in the internet communications. The partial under substantial pressure.
right for anonymity is legally protected to various degrees A above-mentioned 1995 Supreme Court ruling in McIn-
in dierent jurisdictions. tyre v. Ohio Elections Commission reads:[34] "(...) rotec-
tions for anonymous speech are vital to democratic dis-
course. Allowing dissenters to shield their identities frees
3.9.1 United States them to express critical minority views . . . Anonymity is
a shield from the tyranny of the majority. . . . It thus
The tradition of anonymous speech is older than the exemplies the purpose behind the Bill of Rights and of
United States. Founders Alexander Hamilton, James the First Amendment in particular: to protect unpopular
Madison, and John Jay wrote The Federalist Papers un- individuals from retaliation . . . at the hand of an intol-
der the pseudonym Publius " and the Federal Farmer erant society. However, anonymous online speech is not
spoke up in rebuttal. The US Supreme Court has without limits. It is clearly demonstrated in a case from
repeatedly[27][28][29] recognized rights to speak anony- 2008, one in which the defendant stated on a law-school
mously derived from the First Amendment. discussion board that two women should be raped, an
anonymous posters comments may extend beyond free
The right for anonymous political campaigning was speech protections.[35] In the case, a Connecticut federal
established in the U.S. Supreme Court decision in court must apply a standard to decide whether the posters
McIntyre v. Ohio Elections Commission (1995) case: identity should be revealed. There are several tests, how-
Anonymity is a shield from the tyranny of the ever, that the court could apply when considering this
majority...It thus exemplies the purpose behind issue.[36][37]
3.11. ANONYMITY AND PSEUDONYMITY IN ART 9
One of the most controversial international legal acts, re- 3.11 Anonymity and pseudonymity
garding this subject is Anti-Counterfeiting Trade Agree-
ment (ACTA). As of February 2015, the treaty was in art
signed -but not all ratied- by 31 states as well as the Eu-
ropean Union. Japan was on 4 October 2012 the rst to Anonymity is directly related to the concept of
ratify the treaty. It creates an international regime for obscurantism or pseudonymity, where an artist or group
imposing civil and criminal penalties on Internet coun- attempts to remain anonymous, for various reasons, not
terfeiting and copyright infringement. Although ACTA limited to: adding an element of mystique to themselves
is intentionally vague, leaving signatories to draw precise and/or their work, attempting to avoid what is known
rules themselves, critics say it could mean innocent trav- as the "cult of personality" or hero worship, where the
ellers having their laptops searched for unlicensed mu- charisma, good looks, wealth and/or other unrelated or
sic, or being jailed for carrying a generic drug. Infringers mildly related aspects of the person(s) is the main rea-
could be liable for the total loss of potential sales (imply- son for interest in their work, rather than the work itself;
ing that everyone who buys a counterfeit product would also the ability to break into a eld or area of interest nor-
have bought the real thing). It applies to unintentional use mally dominated by males, such as James Tiptree, Jr, the
of copyright material. It puts the onus on website owners famous science ction author who was actually a woman
to ensure they comply with laws across several territories. named Alice Bradley Sheldon, as seems to also be the
It has been negotiated secretively and outside established case with JT LeRoy. The reasons for choosing this ap-
international trade bodies, despite EU criticisms.[40] proach vary. Some, such as Thomas Pynchon, and J. D.
Salinger who seem to want to avoid the limelight of
popularity, simply want to live private lives. Some others
3.10 Anonymity and politics include avant-garde ensemble The Residents, costumed
comedy rock band The Radioactive Chicken Heads, and
until 2004, musician Jandek.
This is frequently applied in ction, from The Lone
Ranger, Superman, and Batman, where a hidden identity
is assumed.
time of perpetration, then we may deduce that it must 3.14 Notes and references
have been either Alice or Bob who emptied the safe. That
is, perpetrator probabilities for {Alice, Bob, Carol} now [1] Wallace, Kathleen A. 1999. Anonymity, Ethics and
are , , and 0, respectively. Therefore, anonymity is Information Technology 1, 23-35; Nissenbaum, Helen.
reduced: we still do not know who did it (for us, real 1999. The Meaning of Anonymity in an Information
perpetrator remains anonymous), but our suspicions for Age, The Information Society, 15, 141-144; Matthews,
Alice and Bob increase (<). Also, at this particular Steve, 2010, Anonymity and the Social Self, American
case, the perpetrator is not completely anonymous any- Philosophical Quarterly, 47, 351-363.
more, as both Alice and Bob now know who did it. [2] Scott, Craig R. (2005). Anonymous Communication
in Organizations: Assessing Use and Appropriateness.
Management Communication Quarterly. 19 (2): 157.
3.13 See also doi:10.1177/0893318905279191.
Internet privacy [10] Ohm, Paul (13 August 2009). Broken Promises
of Privacy: Responding to the Surprising Failure of
John Doe Anonymization. UCLA Law Review. 57: 1701, 2010.
Online disinhibition eect Retrieved 12 February 2013.
Greater Internet Fuckwad Theory [11] Tynan, Dan. "Real names, real problems: Pseudonymity
under siege. ITWorld. September 17, 2013. Retrieved
Personally identiable information on September 22, 2013.
Politics [12] Armerding, Taylor. Teen cyberbullying grows with
'anonymous social chat apps. Retrieved 13 June 2016.
Crypto-anarchism
Privacy software and Privacy-enhancing technolo- [13] King, Alison (April 2010). Constitutionality of Cyber-
bullying Laws: Keeping the Online Playground Safe for
gies
Both Teens and Free Speech. Vanderbilt Law Review.
FLAIM 63 (3): 845884. Retrieved 11 February 2013.
I2P [14] The Information Society: An International Journal, Vol-
I2P-Bote ume 15, Issue 2, 1999, Legal Issues in Anonymity and
Java Anon Proxy Pseudonymity, by A. Michael Froomkin, pages 113-127
Onion routing [15] Privacy protection and anonymity services for the World
Tor (anonymity network) Wide Web (WWW), by Rolf Oppliger, Original Research
Private P2P Article, Future Generation Computer Systems Volume
16, Issue 4, (February 2000), pages 379-391
Pseudonymity, Pseudonymization
[16] Horizon: The defenders of anonymity on the internet, by
Top-coded data (in statistics) Mike Radford, Director, Horizon: Inside the Dark Web
3.14. NOTES AND REFERENCES 11
[17] Anonymity on the Internet: Why the Price May Be Too [37] Kristina Ringland, Internet User Anonymity, First
High, by David Davenport, COMMUNICATIONS OF Amendment Protections and Mobilisa: Changing The
THE ACM April 2002/Vol. 45, No. 4 Cahill Test, 5 SHIDLER J. L. COM. & TECH. 16 (2009),
available at <Archived copy. Archived from the original
[18] Anonymity on the Internet. Retrieved 13 June 2016. on 2010-06-22. Retrieved 2015-02-08.>
[19] By the Water Cooler in Cyberspace, the Talk Turns Ugly, [38] Serge Gutwirth; Ronald Leenes; Paul de Hert Springer
by Reed Abelson, New York times, 29 April 2001 (September 11, 2014). Reforming European Data Pro-
tection Law. Springer, 2014. p. 406. ISBN
[20] Nameless in Cyberspace, anonymity on the Internet, by
9789401793858.
Jonathan D. Wallace, CATO Institute Brieng Papers,
December 8, 1999. [39] EUR-Lex - 12012P/TXT - EN - EUR-Lex. Retrieved
13 June 2016.
[21] Nameless in Cyberspace: Anonymity on the Internet.
Retrieved 13 June 2016. [40] ACTA up. Retrieved 13 June 2016 via The
Economist.
[22] Joinson, A. N. (2001). Self-disclosure in computer-
mediated communication: The role of self-awareness and [41] The Infrastructure of Democracy. Web.archive.org.
visual anonymity. European Journal of Social Psychol- 2006-05-11. Archived from the original on May 11, 2006.
ogy, 31, 177-192. Retrieved 2012-11-22.
[23] Anonymity on the Internet, by Jacob Palme, using much
material from the paper Usenet news and anon.penet.
by Mikael Berglund
[34] http://www.law.cornell.edu/supct/html/93-986.ZO.html
AskoziaPBX
4.1 History
4.3 Internationalization
AskoziaPBX was started as a proof-of-concept project by
Michael Iedema at the Ostfalia - School of Applied Sci- Created in Germany and initially only available in the
ences in Wolfenbttel Germany in January 2007.[4][5] The English language, the rmware and project have now
project focus was to demonstrate the feasibility of build- been internationalized. The conguration interface, voice
ing an embedded telephone system rmware upon Open prompts and notication messages have all been trans-
Source software while providing a consumer usability lated into many languages. German, Italian, Spanish,
experience.[6][7] French and Dutch are the most complete with less com-
After six months of private development, the rmware plete translations including [15]
Chinese, Japanese, Polish,
[8]
was released to the public on the 1 June 2007. During Danish and Swedish.
the next 14 months after the initial release, 24 public beta AskoziaPBX is in use in over 175 countries.[15]
versions were released. At the end of this cycle, version
1.0 was published in September 2008.[9] Minor xes and
language updates continued on the 1.0 branch until 1.0.3
was released in May 2009.[10] At this point, work had al- 4.4 Moving from FreeBSD to
ready begun on what was to become the 2.0 branch of the Linux
rmware, the current development series.[11]
Since 2011, AskoziaPBX is developed by Benjamin- From late 2008 until mid 2009 the rmware was
Nicola Lken and Sebastian Kaiser. changed to use Linux as its operating system, re-
12
4.6. REFERENCES 13
placing FreeBSD.[11][16] This process was contracted [9] Site News 1.0 Release Announcement, Site News (news
by Auerswald, a German telecommunications hardware entry), 12 September 2008. Retrieved on 2010-07-28.
manufacturer and was done for several reasons: Aster-
[10] Site News 1.0.3 Release Announcement, Site News
isk was, at the time, only ocially supported on Linux. (news entry), 29 May 2009. Retrieved on 2010-07-28.
Also, FreeBSD does not support the Blackn CPU ar-
chitecture, the architecture used in Auerswalds target [11] Site News Upcoming Linux Port, Site News (news en-
platform.[17] try), 14 October 2008. Retrieved on 2010-07-28.
Another Open Source project was forked and incorpo- [12] Open Source Meets Business Presentation AskoziaPBX
rated into the project to accomplish the dicult task - Compact, Easily Congurable Open Source Hybrid Soft
of compiling, patching and assembling rmware im- PBX for VoIP, Open Source Meets Business (conference
ages across multiple CPU architectures and target plat- presentation), Nuremberg Germany, 27 January 2009.
forms. The T2 SDE project was stripped down to only Retrieved on 2010-07-28.
include the software packages used in AskoziaPBX and [13] Site Documentation AskoziaPBX Call Flow Editor,Site
then merged into the project as the new ocial build Documentation (cfe). Retrieved on 2012-07-05.
system.[18]
[14] AMOOCON Presentation Trunk Groups are not Lug-
In July 2009, an alpha level release running on Linux gage Collections Archived July 1, 2010, at the Wayback
was published. This was further stabilized into a beta re- Machine., AMOOCON (conference presentation), Ros-
lease on 13 February 2010. The nal production ready tock Germany, 4 June 2010. Retrieved on 2010-07-28.
rmware was released as version 2.0 on 4 May 2010.[19]
[15] VoIP Users Conference Interview AskoziaPBX, VoIP
Users Conference (audio interview), 15 May 2009. Re-
trieved on 2010-07-28.
4.5 See also
[16] Site News First Developer Snapshot on Linux, Site News
List of SIP software other SIP related programs (news entry), 8 July 2009. Retrieved on 2010-07-28.
Asterisk (PBX)
Asterisk is a software implementation of a telephone gateway between IP phones and the public switched tele-
private branch exchange (PBX); it allows attached phone network (PSTN) via T- or E-carrier interfaces or
telephones to make calls to one another, and to connect analog FXO cards. The Inter-Asterisk eXchange (IAX)
to other telephone services, such as the public switched protocol, RFC 5456, native to Asterisk, provides ecient
telephone network (PSTN) and Voice over Internet Pro- trunking of calls among Asterisk PBXes, in addition to
tocol (VoIP) services. Its name comes from the asterisk distributing some conguration logic. Many VoIP service
symbol, *. providers support it for call completion into the PSTN,
Asterisk is released with a dual license model, using often because they themselves have deployed Asterisk or
the GNU General Public License (GPL) as a free soft- oer it as a hosted application. Some telephones also sup-
ware license and a proprietary software license to per- port the IAX protocol.
mit licensees to distribute proprietary, unpublished sys- By supporting a variety of traditional and VoIP tele-
tem components. phony services, Asterisk allows deployers to build tele-
phone systems, or migrate existing systems to new tech-
Asterisk was created in 1999 by Mark Spencer of
Digium. [1][2]
Originally designed for Linux, Asterisk runs nologies. Some sites are using Asterisk to replace propri-
on a variety of operating systems, including NetBSD, etary PBXes, others provide additional features, such as
OpenBSD, FreeBSD, Mac OS X, and Solaris. Aster- voice mail or voice response menus, or virtual call shops,
isk is small enough to run in an embedded environment or to reduce cost by carrying long-distance calls over the
such as Customer-premises equipment-hardware running Internet (toll bypass).
OpenWrt.[3] There are complete self-contained versions In addition to VoIP protocols, Asterisk supports tradi-
that can boot from a storage device such as a ash drive tional circuit-switching protocols such as ISDN and SS7.
or external disk drive (preferably IDE/PATA, SATA or This requires appropriate hardware interface cards, mar-
mSATA; a USB-connected device can be used, but is of- keted by third-party vendors. Each protocol requires the
ten not recommended).[4] A live CD or virtual machine installation of software modules. In Asterisk release 14
can also be used. the Opus audio codec is supported.
14
5.5. REFERENCES 15
Sippy B2BUA
5.3 Derived products
Asterisk is a core component in many commercial prod- 5.5 References
ucts and open-source projects. Some of the commercial
products are hardware and software bundles, for which [1] Olejniczak, Stephen P.; Kirby, Brady (2007). Asterisk For
the manufacturer supports and releases the software with Dummies. John Wiley & Sons. ISBN 9780470098547.
an open-source distribution model.
[2] Van Meggelen, Jim; Smith, Jared; Madsen, Leif (2007).
Asterisk: The Future of Telephony. O'Reilly Media, Inc.
AskoziaPBX, a fork of the m0n0wall project, uses ISBN 9780596510480.
Asterisk PBX software to realize all telephony func-
tions. [3] Asterisk on OpenWrt. Retrieved 2011-10-09.
Elastix uses Asterisk, HylaFAX, Openre and [4] AstLinux: Boot via USB Flash Storage. For production
Postx to oer PBX, fax, instant messaging and AstLinux installations, it is recommended to use ash stor-
email functions, respectively. age connected o IDE, SATA or mSATA controllers ... it
takes longer for USB storage devices to be recognized ...
FreePBX, an open-source graphical user interface, AstLinux may fail ... followed by the USB drive mounting
bundles Asterisk as the core of its FreePBX Distro[8] a few seconds later.
LinuxMCE bundles Asterisk to provide telephony; [5] You are not the next caller in line, parody on-hold mes-
there is also an embedded version of Asterisk for sage where a pre-recorded Allison Smith sheepishly con-
OpenWrt routers. fesses (at 0:00:45) that the caller is actually *not* next in
queue and would be lucky to get a response at 11:30pm
PBX in a Flash/Incredible PBX and trixbox are soft- from the cleaning lady after other workers had left for the
ware PBXes based on Asterisk. day.
List of SIP software [12] The 5-Minute PBX: Incredible PBX 11 and Incredible
Fax Get a Facelift. Nerd Vittles. 2013-06-18. Retrieved
OpenBTS 2016-01-04.
16 CHAPTER 5. ASTERISK (PBX)
1. phpagi
3. CAGI
4. NanoAGI
5. PyST
17
Chapter 7
In telephony, an automatic call distributor (ACD) or contact center. All real-time and historical statistical in-
automated call distribution system, is a device or sys- formation can then be shared amongst call center sites.
tem that distributes incoming calls to a specic group
One of the rst large and separate ACDs was a modied
of terminals or agents based on the customers selection, 5XB switch used by New York Telephone in the early
customers telephone number, selected incoming line to 1970s to distribute calls among hundreds of 4-1-1 infor-
the system, or time of day the call was processed. It is mation operators.
often part of a computer telephony integration (CTI) sys-
tem.
Routing incoming calls is the task of the ACD system. 7.1 Distribution methods
ACD systems are often found in oces that handle large
volumes of incoming phone calls from callers who have
There are multiple choices for distributing incoming calls
no need to talk to a specic person but who require assis-
from a queue.
tance from any of multiple persons (e.g., customer service
representatives) at the earliest opportunity.
Linear Call Distribution Calls are distributed in
The routing strategy is a rule-based set of instructions that order, starting at the beginning each time.
tells the ACD how calls are handled inside the system.
Typically this is an algorithm that determines the best Circular/Rotary Call Distribution Calls are dis-
available employee or employees to respond to a given tributed in order, starting with the next in order.
incoming call. To help make this match, additional data
are solicited and reviewed to nd out why the customer is Uniform Call Distribution Calls are distributed
calling. Sometimes the callers caller ID or ANI is used; uniformly, starting with the person who has handled
more often a simple IVR is used to ascertain the reason the fewest calls.
for the call. Simultaneous Call Distribution Calls are presented
Originally, the ACD function was internal to the Private to all available extensions simultaneously.
Branch Exchange of the company. However, the closed
nature of these systems limited their exibility. A system Weighted Call Distribution Calls are distributed
was then designed to enable common computing devices, according to a congurable weighting, such as dif-
such as server PCs, to make routing decisions. For this, fering skill sets within customer service representa-
generally the PBX would issue information about incom- tives.
ing calls to this external system and receive a direction of
the call in response.
An additional function for these external routing appli-
7.2 See also
cations is to enable CTI. This allows improved eciency
for call center agents by matching incoming phone calls Communications system, voice communication
with relevant data on their PC via screen pop. control system
18
Chapter 8
Automatic number identication (ANI) is a feature of ANI is generally not transmitted when a call is operator
a telecommunications network for automatically deter- assisted; only the area code of the last switch to route the
mining the origination telephone number on toll calls for call is sent.
billing purposes. Placing a call through an outbound-only VoIP service or
In telephony, ANI service was originally created by some calling cards will cause a non-working number to
AT&T Corporation for internal long distance charging be sent as the ANI. ANI is also not supported properly
purposes,[1][2] eliminating the need for telephone oper- for calls originated from four-party lines.
ators to manually request the number of the calling party
for a toll call.
Modern ANI has two components: information digits,
which identify the class of service,[3] and the calling party
billing telephone number.
8.3 Automatic number announce-
ANI is not related to newer caller ID services such as call
ment
display.
Automatic number identication is also used to describe Main article: automatic number announcement circuit
the functions of two-way radio selective calling that iden-
tify the transmitting user. ANI is used to provide automatic number announcement,
an internal test facility for telephone maintenance work-
ers. The service, which is not advertised to the public,
8.1 Toll-free numbers allows an installer to identify an individual line by using
it to dial a special unpublished number in a range reserved
Modern toll-free telephone numbers, which generate for testing purposes (such as 958-xxxx in much of North
itemized billing of all calls received instead of relying on America).
the special xed-rate trunks of the Bell System's original
Inward WATS service, depend on ANI to track inbound
calls to numbers in special area codes such as +1-800,
888, 877, 866, 855 and 844 (United States and Canada),
1800 (Australia) or 0800 and 0808 (United Kingdom).
8.4 DNIS
ANI is dierent, conceptually and technically, from A related service feature available to private branch ex-
caller ID service. A callers telephone number and line change subscribers is the Dialed Number Identication
type are captured by ANI service even if caller ID block- Service (DNIS), a code indicating the number requested
ing is activated. The destination telephone company by the caller. With the information, a service provider
switching oce can relay the originating telephone num- can have several toll-free numbers directed to the same
ber to ANI delivery services subscribers. Toll-free sub- call center and provide unique service based on the num-
scribers and large companies normally have access to ber dialed. DNIS can also be used to identify other call
ANI, either instantly via installed equipment, or from a routing information. For example, toll-free service can
monthly billing statement. Residential subscribers can be congured to send a specic DNIS number that is as-
obtain access to ANI information through third party signed to callers from geographic regions based on city,
companies that charge for the service.[4] area code, state, or country.
19
20 CHAPTER 8. AUTOMATIC NUMBER IDENTIFICATION
8.6 References
[1] US Patent 2,265,844: Calling Line Identication Circuit
21
22 CHAPTER 9. BUSINESS TELEPHONE SYSTEM
less common, as hybrid systems and private branch ex- Automatic Electric Company also produced a family of
changes of comparable size have similar cost and greater key telephone equipment, some of it compatible with
functionality. Western Electric equipment, but it did not gain the
widespread use enjoyed by Western Electric equipment.
Before the advent of large-scale integrated circuits, key Automatic call accounting
systems were typically composed of electromechanical
Call Forward
components (relays) as were larger telephone switching
systems. Call Transfer
The systems marketed in North America as the 1A, 6A,
1A1 and the 1A2 Key System are typical examples and Remote supervision of the entire system
sold for many decades. The 1A family of Western Elec-
Selection of signaling sounds
tric Company (WECo) key telephone units (KTUs) were
introduced in the late 1930s and remained in use to the Speed dialing
1950s. 1A equipment was primitive and required at least
two KTUs per line; one for line termination and one Station-specic limitations (such as no long distance
for station (telephone instrument) termination. The tele- access or no paging)
phone instrument commonly used by 1A systems was the
WECo 300-series telephone. Introduced in 1953, 1A1 Features could be added or modied simply using soft-
key systems simplied wiring with a single KTU for both ware, allowing easy customization of these systems. The
line and station termination, and increased the features stations were easier to maintain than the previous elec-
available. As the 1A1 systems became commonplace, re- tromechanical key systems, as they used ecient LEDs
quirements for intercom features grew. The original in- instead of incandescent light bulbs for line status indica-
tercom KTUs, WECo Model 207, were wired for a single tion.
talk link, that is, a single conversation on the intercom at a
time. The WECo 6A dial intercom system provided two LSI also allowed smaller systems to distribute the control
talk links and was often installed as the dial intercom in a (and features) into individual telephone sets that don't re-
1A1 or 1A2 key system. The 6A systems were complex, quire any single shared control unit. Generally, these sys-
troublesome and expensive, and never became popular. tems are used with a relatively few telephone sets and it is
The advent of 1A2 technology in the 1964 simplied key often more dicult to keep the feature set (such as speed-
system set up and maintenance. These continued to be dialing numbers) in synchrony between the various sets.
used throughout the 1980s, when the arrival of electronic
key systems with their easier installation and greater fea-
tures signaled the end of electromechanical key systems. 9.2 Hybrid key telephone system
Two lesser-known key systems were used at airports for
air trac control communications, the 102 and 302 key Into the 21st century, the distinction between key systems
systems. These were uniquely designed for communica- and PBX systems has become increasingly blurred. Early
tions between the air trac control tower and radar ap- electronic key systems used dedicated handsets which
proach control (RAPCON) or ground control approach displayed and allowed access to all connected PSTN lines
(GCA), and included radio line connections. and stations.
9.3. PRIVATE BRANCH EXCHANGE 23
Nortel T Series Key System Telephone An Avaya G3si PBX with front cover removed (view from the
top).
Cabinets, closets, vaults and other housings. PBX (private and circuit-switched)
9.3.6 Interface standards Interfaces for collecting data from the PBX:
Interfaces for connecting extensions to a PBX include: File the PBX generates a le containing the call
records from the PBX.
DECT a standard for connecting cordless phones. Network port (listen mode) an external application
Internet Protocol For example, H.323 and SIP. connects to the TCP or UDP port. The PBX streams
information to the application.
POTS (plain old telephone service) the common
two-wire interface used in most homes. This is Network port (server mode) the PBX connects to
cheap and eective, and allows almost any standard another application or buer.
phone to be used as an extension. Serial interface historically used to print every
proprietary the manufacturer has dened a proto- call record to a serial printer. In modern systems a
col. One can only connect the manufacturers sets to software application connects via serial cable to this
their PBX, but the benet is more visible informa- port.
tion displayed and/or specic function buttons.
A data record from a PBX or other telecommunication
system that provides the statistics for a telephone call is
Interfaces for connecting PBXs to each other include:
usually termed a call detail record (CDR) or a Station
Messaging Detail Record (SMDR).
DPNSS for connecting PBXs to trunk lines. Stan-
dardized by British Telecom, this usually runs over
E1 (E-carrier) physical circuits. 9.3.7 Hosted PBX systems
Internet Protocol H.323 and the Session Initiation
Virtual PBX systems or hosted PBX systems deliver
Protocol (SIP) are IP based solutions for multimedia
PBX functionality as a service, available over the pub-
sessions.
lic switched telephone network (PSTN) or the Internet.
Primary rate interface (ISDN) Provided over T1 Hosted PBXs are typically provided by a telephone com-
(23 bearer channels and 1 signaling channel) or E1 pany or service provider, using equipment located in the
carriers. premises of a telephone exchange or the providers data
center.[11] This means the customer does not need to buy
Proprietary protocols if equipment from several or install PBX equipment. Generally the service is pro-
manufacturers is on site, the use of a standard pro- vided by a lease agreement and the provider can, in some
tocol is required. congurations, use the same switching equipment to ser-
QSIG for connecting PBXs to each other, usually vice multiple hosted PBX customers.
runs over T1 (T-carrier) or E1 (E-carrier) physical The rst hosted PBX services were feature-rich com-
circuits. pared to most premises-based systems of the time. Some
PBX functions, such as follow-me calling, appeared in a
Interfaces for connecting PBXs to trunk lines include: hosted service before they became available in hardware
PBX equipment. Since introduction, updates and new of-
Internet Protocol H.323, SIP, MGCP, and Inter- ferings have moved feature sets in both directions. It is
Asterisk eXchange protocols operate over IP and are possible to get hosted PBX services that include feature
supported by some network providers. sets from minimal functionality to advanced feature com-
binations.
ISDN the most common digital standard for xed
telephony devices. This can be supplied in either Ba- In addition to the features available from premises-based
sic (2 circuit capacity) or Primary (24 or 30 circuit PBX systems, hosted-PBX:
capacity) versions. Most medium to large compa-
nies would use Primary ISDN circuits carried on T1 allows a single number to be presented for the en-
or E1 physical connections. tire company, despite its being geographically dis-
tributed. A company could even choose to have no
RBS (robbed bit signaling) delivers 24 digital cir- premises, with workers connected from home us-
cuits over a four-wire (T1) interface ing their domestic telephones but receiving the same
features as any PBX user.
standard POTS (plain old telephone service) lines
the common two-wire interface used in most do- allows multimodal access, where employees access
mestic homes. This is adequate only for smaller sys- the network via a variety of telecommunications sys-
tems, and can suer from not being able to detect tems, including POTS, ISDN, cellular phones, and
incoming calls when trying to make an outbound call VOIP. This allows one extension to ring in multiple
(commonly called glare). locations (either concurrently or sequentially).
9.5. SEE ALSO 27
A mobile PBX is a hosted PBX service that extends [4] AT&T, Notes on the Network (1980) p.3
xed-line PBX functionality to mobile devices such as
[5] Big Changes Coming for SMBs in 2014 (Infographic)".
cellular handsets, smartphones and PDA phones by pro- eFax. 17 December 2013. Retrieved 23 February 2014.
visioning them as extensions. Mobile PBX services also
can include xed-line phones. Mobile PBX systems are [6] BT Prepare to Switch to an All IP Network by 2025.
dierent from other hosted PBX systems that simply for- Yoozoom Telecommunications. Yoozoom Telecommuni-
ward data or calls to mobile phones by allowing the mo- cations. Retrieved 8 October 2015.
bile phone itself, through the use of buttons, keys and [7] Sullivan, Mark. The Big Guide To VOIP For Small Busi-
other input devices, to control PBX phone functions and ness. Forbes.com. Retrieved 23 April 2014.
to manage communications without having to call into the
[8] Unuth, Nadeem. The Functions of a PBX. About.com.
system rst.
Retrieved 23 February 2014.
A mobile PBX may exploit the functionality available in
[9] Wright, Ian. Features of a Business Phone System. Ex-
smartphones to run custom applications to implement the
pert Market. Retrieved 23 April 2014.
PBX specic functionality.
[10] Why Hosted PBX is the Better Choice For Small Busi-
In addition, a mobile PBX may create extension identi-
nesses. Unity Connected Solutions. Unity Connected.
ers for each handset that allow to dial other cell phones
in the PBX via their extension shortcut, instead of a PSTN [11] On-Premise [sic] vs Hosted PBX: Blockbuster or Net-
number. ix? - Blog - 1stel. Blog - 1stel. 2016-03-01. Retrieved
2016-05-02.
9.4.2 IP-PBX
9.7 External links
An IP PBX handles voice signals under Internet proto-
col, bringing benets for computer telephony integration Telecommunications Equipment at DMOZ
(CTI). An IP-PBX can exist as physical hardware, or Business Phone Systems at Nexcom Digital
can carry out its functions virtually, performing the call-
routing activities of the traditional PBX or key system as EPABX Business Telephone System at Jkay Tech-
a software system. The virtual version is also called a " nology
-Soft PBX -".
Chapter 10
Call capture
Call capture is a telephone-based technology that cap- nology, and is usually impossible to block by prexing a
tures personal data from persons who call a properly pro- call with *67.
visioned number. After the call is placed, the system no- ANI was originally developed by telecommunications
ties a client of the name, phone number and address of
companies for billing purposes and is one of the core
the person calling. The system was designed as a device technologies behind 911 emergency services. Its also
for real estate agents and allows one to legally bypass do
available for commercial purposes for customers who
not call laws. may benet from knowing who is calling them. The Fed-
eral Communications Commission allows anyone who is
paying for a phone call (800 numbers are free to the caller,
10.1 Sample service not the owner of the 800 number) to know who is calling
them.
Real estate agents for example might display their 800 A personal computer can be used for detecting Caller ID.
call capture phone number on a signrider (small, some- In addition, sales leads and their contact information can
times 12 30 sign that sits on top of the For Sale sign be sent to an email inbox by companies. For instance, a
in a house owners yard), with a call to action like Free real estate agent could print out his/her list of leads from
Recorded InformationCall 24 hours. When someone the previous day every morning and start to call them
drives by, notices the sign, writes the phone number down back.
and calls on his cell phone or land line, they are greeted by
the real estate agents personal greeting, directed to dial As far as alternative lead generation systems, call capture
in the 4-digit extension for the home they are interested has several advantages.
in. Then, they listen to a 4560 second audio tour of
the home. Leads are transmitted directly to the client without
a middle man. This should reduce costs.
At the end of the message, the caller can either leave a
voice mail, transfer directly to the agent, request an auto- Call capture is a potent substitute for cold calling,
matic fax of specs for the home, enter another extension especially in light of the new Do Not Call laws.
to listen about another home, or simply hang up. Anyone who calls a call capture 800 line falls under
Regardless of what they do, the agent who owns that 800 the 90 day business inquiry rule of the Do Not Call
call capture phone number will be notied within 30 sec- laws. This means that the end user can call anyone
onds of the callers phone number. If the caller is calling who has called their call capture 800 number in the
from a home-based phone, then the real estate agent will past 90 days.
also receive a notication with the callers phone number,
name and address.
28
Chapter 11
Call waiting
Call waiting is a telecommunication service oered by R0 Reject call waiting This will send the call to
a telephony service provider to a subscriber by which voice mail or a busy tone.
the subscriber may suspend a telephone call already in
progress to accept a second call. The subscriber may
switch between calls, typically by using the hook ash sig- Type II Caller ID also works with call waiting.
nal.
Call waiting alleviates the need to have more than one
telephone line for voice communications. 11.2 Line sharing
Since the waiting call creates an audible signal (for exam-
11.1 Star codes*43# ple, a 440 Hz beep every ten seconds in North America),
call waiting can cause dial-up Internet access connections
For more details on this topic, see Vertical service code. to terminate, unless the modem supports the most recent
V.92 modem standard. For this reason, call waiting is of-
ten disabled on shared voice lines used for dial-up modem
In North America, the NANP uses the *70 star code pre- or fax purposes. However, Call Waiting has no impact on
x to suspend call waiting for a dialed call. A stutter dial DSL connections.
tone conrms the de-activation.
On most European telephone networks, and GSM or
UMTS mobile phones, call waiting is activated by dial-
ing the following codes:
11.3 History
29
30 CHAPTER 11. CALL WAITING
Called party
12.2 References
31
Chapter 13
Caller ID
Caller ID (caller identication, CID), also called call- telephone number placing a call, in a non-electronic cen-
ing line identication (CLID), calling number deliv- tral oce switch. Previous to this, the calling number
ery (CND), calling number identication (CNID) or could not be identied electronically. Caller ID is made
calling line identication presentation (CLIP), is a up of two separate pieces of information: the calling
telephone service, available in analog and digital phone number and the billing (or subscriber) name where avail-
systems and most voice over Internet Protocol (VoIP) ap- able. When a call is made from a given name, this name
plications, that transmits a caller's number to the called can be passed on through a number of dierent meth-
party's telephone equipment during the ringing signal, ods. For example, the callers name may be datalled in
or when the call is being set up but before the call is the originating switch, in which case it is sent along with
answered. Caller ID may be used by the recipient to the number. More commonly, a database is accessed by
avoid answering unwanted incoming calls by the concept the receiving switch, in order to match the number to a
of informed consent. However, it also poses problems name. If the name does not exist, then the city, State,
for personal privacy. Usually, the caller can disable or Province, or other designation may be sent. Some of
block the Caller ID facility, but some call capture tech- these databases may be shared among several companies,
nology can bypass a caller block. On the other hand, the each paying every time a name is extracted. It is for
possibility of caller ID spoong may render received in- this reason that mobile phone callers appear as WIRE-
formation unreliable. LESS CALLER, or the location where the phone number
With appropriate hardware, networking and software, is registered (these vary based on which company owns
Caller ID can also be associated with a name of the call- the block of numbers, not the provider to which a num-
ing telephone number. This service is called CNAM. The ber may have been ported). Additionally, nothing ensures
information made available to the called party may be dis- that the number sent by a switch is the actual number
played on a telephones display, on a separately attached where the call originated; the telephone switch initiating
device, or personal computer. A modem can pass Caller the call may send any digit string desired as caller ID. As
ID information to a computer for purposes of call log- such, the telephone switch, and therefore the operating
ging or blocking, but this can be problematic as modems entity, must also be trusted to provide secure authentica-
in dierent countries have dierent systems, which may tion.
cause hardware or software incompatibilities. However, The displayed caller ID also depends on the equipment
many modems are designed and programmed to handle originating the call.
multiple signalling methods, and can be congured to use
If the call originates on a POTS line (a standard loop start
the local standard. line), then caller ID is provided by the service providers
local switch. Since the network does not connect the
caller to the callee until the phone is answered, generally
13.1 Calling-line identication the caller ID signal cannot be altered by the caller. Most
service providers however, allow the caller to block caller
In some countries, the terms caller display, calling line ID presentation through the vertical service code *67.
identication presentation (CLIP), call capture, or just A call placed behind a private branch exchange (PBX)
calling line identity are used; call display is the predomi- has more options. In the typical telephony environment,
nant marketing name used in Canada (although some cus- a PBX connects to the local service provider through
tomers use the phrase caller ID). The idea of CNID as a Primary Rate Interface (PRI) trunks. Generally, although
service for POTS subscribers originated from automatic not absolutely, the service provider simply passes what-
number identication (ANI) as a part of toll free number ever calling line ID appears on those PRI access trunks
service in the United States. transparently across the Public Switched Telephone Net-
However, CNID and ANI are not the same thing. ANI work (PSTN). This opens up the opportunity for the PBX
was originally a term given to a system that identied the administrator to program whatever number they choose
32
13.3. HISTORY 33
nas invention, thus lacking novelty. In 1981 another ap- Hang-up: Disconnect the current call and take the
plication for a caller ID equipment was led at the INPI. second call (not a new feature)
The inventors were Mr. Jos Daniel Martin Catoira and
Mr. Afonso Feij da Costa Ribeiro Neto. This appli- Please Hold: Send the caller either a custom or
cation was granted and the patent was issued as patent telephone-company-generated voice message asking
PI8106464. the caller to hold
The rst market trial for Caller ID and other Custom Lo-
Forward to Voice Mail: Send the incoming caller
cal Area Signaling Services was conducted by BellSouth
to the recipients voice mail service.
as one of the TouchStar services on July 7, 1984 in
Orlando, Florida. The Lines of Business (marketing) de- Join: Add the incoming caller to the existing con-
partment in BellSouth Services named the service Caller versation.
ID. The other Regional Bell Operating Companies later
adopted the name and eventually became the generally
accepted name in the US. Planning for the trial was initi-
ated by a team in Bell Laboratories, AT&T, and Western 13.5 Operation
Electric before the Bell System divestiture, with the par-
ticipation of Southern Bell. The purpose of these trials In the United States, caller ID information is sent to the
was to assess the revenue potential of services that depend called party by the telephone switch as an analogue data
on deployment of the common channel signaling network stream (similar to data passed between two modems), us-
needed to transmit the calling number between originat- ing Bell 202 modulation between the rst and second
ing and terminating central oces. Trial results were an- rings, while the telephone unit is still on hook. If the
alyzed by Bellcore members of the original team. telephone call is answered too quickly after the rst ring,
In 1987, Bell Atlantic (now Verizon Communications) caller ID information will not be transmitted to the re-
conducted another market trial in Hudson County, New cipient. There are two types of caller ID, number only
Jersey, which was followed by limited deployment.[9] and name+number. Number-only caller ID is called Sin-
BellSouth was the rst company to deploy caller ID in De- gle Data Message Format (SDMF), which provides the
cember 1988 in Memphis, Tennessee, with a full deploy- callers telephone number, the date and time of the call.
ment to its nine-state region over the next four years. Bell Name+number caller ID is called Multiple Data Mes-
Atlantic was the second local telephone company to de- sage Format (MDMF), which in addition to the infor-
ploy Caller ID in New Jerseys Hudson County. US West mation provided by SDMF format, can also provide the
Communications (now CenturyLink) was the third local directory listed name for the particular number. Caller
telephone company to oer caller ID service in 1989. ID readers which are compatible with MDMF can also
read the simpler SDMF format, but an SDMF caller ID
reader will not recognize an MDMF data stream, and will
act as if there is no caller ID information present, e.g. as
13.4 Type II Caller ID if the line is not equipped for caller ID.
Instead of sending the caller ID in between the rst and
In 1995, Bellcore released another type of modulation,
second ring, some systems use a "line reversal" to an-
similar to Bell 202, in which it became possible to
nounce the caller ID, or caller ID signals are simply sent
transmit caller ID information and even provide call-
without any announcement. Instead of Bell 202, the Eu-
disposition options while the user was already on the tele-
ropean alternative V.23 is sometimes used, (without the
phone. This service became known in some markets as
75-baud reverse channel) or the data is sent using DTMF
call waiting ID, or (when it was combined with call-
signalling.
disposition options), Call Waiting Deluxe; it is techni-
cally referred to as Analog Display Services Interface. In general, CID as transmitted from the origin of the
Call Waiting Deluxe is the Bellcore (now Telcordia call is only the calling partys full phone number (includ-
Technologies) term for Type II caller ID with Disposi- ing area code, and including international access code
tion Options. and country code if its an international call). The call-
ing party name is added by the consumers terminating
This CLASS-based POTS-telephone calling feature
central oce if the consumer has subscribed to that ser-
works by combining the services of call waiting with
vice. Calling name delivery is not automatic. A SS7 (or
caller ID but also introduces an options feature that,
Signalling System 7) TCAP query may be launched by the
in conjunction with certain screen-based telephones, or
called partys central oce, in order to retrieve the infor-
other capable equipment, gives a telephone user the op-
mation for Calling Name delivery to the caller ID equip-
tion to
ment at the consumers location, if the callers name has
not already been associated with the calling partys line
Switch: Place the current call on hold to take the at the originating central oce. Canadian systems using
second call (not a new feature) CCS7 automatically (but not in all cases) send the calling
13.7. REGIONAL DIFFERENCES 35
name with the call set-up and routing information at the 13.7 Regional dierences
time of the call.
To look up the name associated with a phone number, the
carrier in some instances has to access that information
from a third-party database, and some database providers
charge a small fee for each access to such databases. To
avoid such charges, some carriers will report the name as
unavailable, or will report the name as "(city), (state)"
based on the phone number, particularly for wireless
callers. For toll-free numbers, they may report a string
such as TOLLFREE NUMBER if the name is not avail-
able in a database.
13.6 Uses
Converter that converts from DTMF to FSK format
13.6.1 Telemarketing
Dierent countries often use dierent standards for trans-
Telemarketing organisations often spoof caller ID. In mitting caller ID information. As a result, phones pur-
some instances, this is done to provide a central num- chased in one country may not be compatible with the lo-
ber for consumers to call back, such as a toll-free num- cal caller ID standard when the phone is used in a dier-
ber, rather than having consumers call back the outbound ent country.[11] For example, the US uses Bellcore FSK,
call centre where the call actually originated. However, whereas Taiwan uses ETSI FSK, so a phone purchased in
some telemarketers block or fraudulently spoof caller ID the US will not understand Taiwans caller ID standard.
to prevent being traced. It is against United States fed- There are even cases where individual state/provinces will
eral law for telemarketers to block or to send false caller use dierent protocols within a country. Caller ID con-
ID.[10] Individuals can bring civil suits and the Federal verters can be used to translate from one standard to an-
Communications Commission (FCC) can ne companies other.
or individuals that are illegally spoong or blocking their Below is a list of countries and the caller ID standard used:
caller ID.
Some telemarketers have used caller ID itself for mar-
keting, such as by using a toll-free number and register- 13.7.1 UK
ing the text string FREE MONEY or FREE PLANE
TICKETS as the name to be displayed on the caller ID. Telephone equipment usually displays CLID information
with no diculty. Modems are notoriously problematic;
very few modems support the British Telecom standard
in hardware; drivers for those that do often have errors
13.6.2 ISPs that prevent CLID information from being recognised.[13]
Other UK telephone companies use slight variations on
Some Internet service providers (ISPs) providing dial-up the Bellcore standard, and CLID support is hit and
access require the customer to use CNID to prevent abuse miss.[14]
of the account by unauthorised callers. Some systems
with dial-up access can be programmed only to accept
calls with specic caller ID strings. 13.8 Legal issues
13.9 Getting around caller ID automatically, it can only be released on a call-by-call ba-
sis by dialing a special code (*82 in North America; 1470
in the UK). See Enabling, below.
13.9.1 Blocking
Similarly, some countries oer anonymous caller rejec-
tion, which rejects all calls when the subscribers name,
number (or both) is blocked. Some telephone compa-
nies protect their clients from receiving blocked infor-
mation by routing anonymous calls to a service (such as
AT&T Privacy Manager), where the caller is required to
announce himself or herself. The service then asks the
called party if they want to accept or reject the call. Other
telephone companies play a recording to the caller ad-
vising them of the called partys rejection conguration,
and often oer advice (such as prexing their dialing with
*82) on how to get their call to the intended called party.
Blocking the number is referred to as calling line identi-
cation restriction (CLIR). Emergency services will most
likely be able to show the restricted number using a ser-
vice called calling line identication restriction override
(CLIRO), or by using general ANI services.
The caller ID information is masked when a SkypeOut call is These features create a cat-and-mouse game type of situ-
placed. ation, whereby subscribers must purchase additional ser-
vices in order to cancel out other services.
Blocking is the common term for preventing the display
of a calling number.
13.9.2 Spoong
Telecommunications regulators vary in their require-
ments for the use and eectiveness of assorted technolo- Caller ID spoong is the practice of causing the telephone
gies to prevent numbers from being displayed. Generally, network to display a number on the recipients Caller ID
unlisted numbers are always blocked. Non-published and display that is not that of the actual originating station.
regular listed numbers are not usually blocked. But there Many telephone services, such as ISDN PRI based PBX
is varying treatment for the determination of call display installations, and voice over IP services, permit the caller
blocking because of many factors. If desired, customers to congure customized caller ID information. In cor-
should inquire carefully to make sure their number will porate settings this permits the announcement of switch-
not be displayed. The telephone service provider may board number or customer service numbers. Caller ID
also have vertical service codes which can be dialed to spoong may be illegal in some countries or situations.
congure blocking as active for all calls or on a call-by-
call basis.
In some locations in the United States, regulations allow 13.9.3 Disabling
(or require) blocking to be automatic and transparent to
the caller. Prexing a telephone number with the following codes
disables Caller ID on a per-call basis:
Where blocking is applied on a call-by-call basis (that is,
at the time a call is made), subscribers can block their
caller ID by dialing a special code (a vertical service Albania: #31# (cell phones)
code, or VSC) before making a call. In North Amer- Argentina: *31# (landlines) or #31# (most cell
ica and some other regions, the code is *67, while in phone companies)
the United Kingdom and Ireland, it is 141. This special
code does not block the information from companies us- Australia: 1831 (landline and mobile phones)[18]
ing call capture technology. This means that equipment
with caller ID will simply display the word PRIVATE Bulgaria: #31# (mobile phones)
or WITHHELD. When CNID is blocked at the callers Denmark: #31#
request, the number is actually transmitted through the
entire telephone network, with the presentation with- Canada: #31# (mobile phones) or *67 (landlines)
held ag set; the destination CO is expected to honor
this ag, but sometimes does notespecially when the France: #31# (cell phones) or 3651 (landlines)
destination phone number is served by an ISDN PRI. Germany: On most landlines and mobiles, *31#,
Alternatively, in cases where caller ID is being blocked however some mobile providers use #31#.
13.10. NOTES 37
Israel: *43 (landlines) or #31# (most cell phone Germany: *31# (Some mobile providers)
companies) India: *31#
Italy: *67# (landlines) or #31# (most cell phone Ireland: 142 (Landlines)
companies)
Japan: 186
Japan: 184 Hong Kong: uses 1357.
New Zealand: 0196 (Telecom/Spark)
New Zealand: 0197 (Telecom/Spark) or *67
(Vodafone) North America: *82 (*UB, UnBlock), 1182 (ro-
tary phone).
NEPAL: *9# (NTC)
Switzerland: #31#
North America: *67, 1167 (rotary phone), #31# United Kingdom: 1470.
(AT&T Wireless)
On GSM mobile networks, callers may dial *31#[19] be-
Netherlands: *31*, #31# (KPN) fore the number they wish to call to enable caller ID.
Romania: *31*
13.10 Notes
South Africa *31* (Telkom) Calling ID (vs. Caller ID) is the identication of
whom you are calling, or connecting to, as opposed
South Africa #31#(Cell Phones) to caller ID identifying who calls you. Some Centrex
telephone systems oer this feature. Similarly, when
South Korea: *23 or *23# (most cell phone com- one Skype user calls another Skype user, the caller
panies) can see the other partys details and even an image
or photograph they have chosen to represent their
Spain: #31#(Cell Phones); 067 (landlines) identity.
The inverse feature, giving the number originally di-
Sweden #31# aled, is known as direct inward dialing, direct di-
aling inward, or Dialed Number Identication Ser-
Switzerland Landline:*31# (or *31+Targetnum- vice. This tells the PBX where to route an incoming
ber -> Call-by-Call disable) call, when there are more internal lines with external
phone numbers than there are actual incoming lines
Switzerland Mobile:#31# (or #31+Targetnumber in a large company or other organisation.
-> Call-by-Call disable)
Not all types of caller identication use 202-type
United Kingdom: 141 modulation, nor do all systems send the informa-
tion between the rst and second ring, e.g., British
Telecom sends the signal before the rst ring, after
Other countries and networks vary, however on GSM mo- a polarity reversal in the line. (Because of this most
bile networks, callers may dial #31#[19] before the num- caller ID software is not compatible with BT even
ber they wish to call to disable it. if the modem is) As a result, not all caller ID de-
Some countries and network providers do not allow Caller vices are compatible from country to country or in
ID blocking based on the domestic telecommunications the same country, even though the basic phone sys-
regulations, or CLIR is only available as a paid or value- tem is the same. Some providers use FSK, others
added service.[20] use the DTMF protocol.
38 CHAPTER 13. CALLER ID
13.11 References
[1] http://nexbridge.co.uk/
cli-localisation-under-the-microscope/
[13] talkingcallerid.com
[18] http://exchange.telstra.com.au/2012/06/19/
how-to-block-your-number-when-calling-someone/
[20] http://www.nosapps.com/index.php/en/support/faqs?
view=category&id=18
Chapter 14
Caller ID spoong
39
40 CHAPTER 14. CALLER ID SPOOFING
box store), in apparent violation of FCC rules. Compa- strictive. Providers which market wholesale VoIP are
nies such as these lease out thousands of phone numbers typically intended to allow any displayed number to be
to anonymous voice-mail providers who, in combination sent, as resellers will want their end users numbers to ap-
with dubious companies like Phone Broadcast Club pear.
(who do the actual spoong), allow phone spam to be- In a rare few cases, a destination number served by voice-
come an increasingly widespread and pervasive problem. over-IP is reachable directly at a known SIP address
In 2013, the misleading caller name Teachers Phone (which may be published through ENUM telephone num-
was reported on a large quantity of robocalls advertising ber mapping, a .tel DNS record or located using an inter-
credit card services as a ruse to trick students families
mediary such as SIP Broker). Some Google Voice users
into answering the unwanted calls in the mistaken belief are directly reachable by SIP, as are all iNum Initiative
they were from local schools.[9]
numbers in country codes +883 5100 and +888. As a
On January 7, 2013, the Internet Crime Complaint Cen- Federated VoIP scheme provides a direct Internet con-
ter issued a Scam Alert for various telephony denial of nection which does not pass through a signaling gateway
service attacks by which fraudsters were using spoofed to the public switched telephone network, it shares the
caller ID to impersonate police in an attempt to collect advantages (nearly free unlimited access worldwide) and
bogus payday loans, then placing repeated harassing calls disadvantages (ernet applications.)
to police with the victims number displayed.[10] While
impersonation of police is common,[11][12] other scams
involved impersonating utility companies to threaten 14.2.2 Service providers
businesses or householders with disconnection[13] as a
means to extort money,[14] impersonating immigration Some spoong services work similarly to a prepaid
ocials[15] or impersonating medical insurers to obtain calling card. Customers pay in advance for a personal
personal data for use in theft of identity.[16] Bogus caller identication number (PIN). Customers dial the number
ID has also been used in grandparent scams which tar- given to them by the company, their PIN, the destination
get the elderly by impersonating family members and re- number and the number they wish to appear as the Caller
questing wire transfer of money.[17] ID. The call is bridged or transferred and arrives with the
spoofed number chosen by the callerthus tricking the
called party.
14.2 Technology and methods Many providers also provide a Web-based interface or a
mobile application where a user creates an account, logs
in and supplies a source number, destination number and
Caller ID is spoofed through a variety of methods and
the bogus caller ID information to be displayed. The
dierent technology. The most popular ways of spoong
server then places a call to each of the two endpoint num-
Caller ID are through the use of VoIP or PRI lines.
bers and bridges the calls together.
Some providers oer the ability to record calls, change
14.2.1 Voice over IP the voice and send text messages.[18]
This results in multiple possible outcomes: International Long Distance Operators (ILDOs),
National Long Distance Operators(NLDOs) and
Access Service Providers have been alerted to the
The name provided by the caller (in the analog tele- existence of such spoong services, and shall collec-
phone adapter conguration screen for voice-over- tively be prepared to take action to investigate cases
IP users or on the web interface on a spoong of caller-ID spoong as they are reported.[25]
provider) is blindly passed verbatim to the called
party and may be spoofed at will
As per DOT, Using spoofed call service is illegal as per
Indian Telegraph Act, Sec 25(c), Using such service may
The name is generated from a telephone company lead to ne or 3 years imprisonment or both.
database using the spoofed Caller ID number.
wrongfully obtain anything of value.... Forfeiture penal- [16] Scammers busy under guise of Obamacare. CBS News.
ties or criminal nes of up to $10,000 per violation (not to
[17] Fort Stockton resident latest victim of Grandparent
exceed $1,000,000) could be imposed.[18] The law main-
Scam. The Fort Stockton Pioneer. Retrieved 14 June
tains an exemption for blocking ones own outgoing caller 2015.
ID information, and law enforcement isn't aected.[27][28]
[18] http://www.nysba.org/AM/Template.cfm?Section=
The New York Times sent the number 111-111-1111 for Home&CONTENTID=46713&TEMPLATE=/CM/
all calls made from its oces until August 15, 2011. The HTMLDisplay.cfm#_ftn2 Don't Believe Your Eyes:
fake number was intended to prevent the extensions of Spoong
its reporters appearing in call logs, and thus protect re-
porters from having to divulge calls made to anonymous [19] http://wiki.voip.ms/article/Phone_book
sources. The Times abandoned this practice because [20] Cummings, Madeleine. (12 Aug 2015). The call is com-
of the proposed changes to the caller ID law, and be- ing from inside your house: Caller ID spoong becoming
cause many companies were blocking calls from the well- more frequent for frustrated Canadians. National Post.
known number.[29] Retrieved 25 Jan 2016.
[8] Payton, Laura (February 28, 2012). Robocalls phone [27] Congress outlaws all Caller ID spoong (VoIP too)". Ars
number registered to 'Pierre Poutine'". CBC News. Re- Technica. Retrieved 14 June 2015.
trieved March 11, 2012.
[28] Caller ID and Spoong. Retrieved 14 June 2015.
[9] Robocallers Impersonate Teachers On Caller ID, Scare
[29] Peters, Jeremy W. (12 August 2011). At The Times, Era
Parents. Consumerist. Retrieved 14 June 2015.
of '111-111-1111' Nears Its End. The New York Times
[10] http://www.ic3.gov/media/2013/130107.aspx (Media Decoder blog). Retrieved August 12, 2011.
[13] FTC asked to probe fraudulent calls to restaurants. October 29, 2004 Washington Post article
[14] Nick Sloan. Kansas City Kansan: BPU warns customers Wired news report of FCC investigation
of phone-scam. Retrieved 14 June 2015.
Arstechnica: Congress outlaws all Caller ID spoof-
[15] Beware: widespread immigration-related fraud schemes ing (VoIP too)
currently on the rise!". Retrieved 14 June 2015.
Chapter 15
Cellular frequencies
Cellular frequencies are the sets of frequency ranges And, some NMT-450 analog networks have been re-
within the ultra high frequency band that have been placed with digital networks using the same frequency. In
assigned for cellular phone use.[1] Most cellular phone Russia and some other countries, local carriers received
networks worldwide use portions of the radio frequency licenses for 450 MHz frequency to provide CDMA mo-
spectrum, allocated to the mobile service, for the trans- bile coverage area.
mission and reception of their signals. The particular
Many GSM phones support three bands
bands may also be shared with other radiocommunication (900/1,800/1,900 MHz or 850/1,800/1,900 MHz)
services, e.g. broadcasting service, and xed service op-
or four bands (850/900/1,800/1,900 MHz), and are
eration. usually referred to as tri-band and quad-band phones, or
world phones; with such a phone one can travel inter-
nationally and use the same handset. This portability is
15.1 Overview not as extensive with IS-95 phones, however, as IS-95
networks do not exist in most of Europe.
Radio frequencies used for cellular networks dier in Mobile networks based on dierent standards may use the
ITU Regions (Americas, Europe, Africa and Asia). The same frequency range; for example, AMPS, D-AMPS,
rst commercial standard for mobile connection in the N-AMPS and IS-95 all use the 800 MHz frequency band.
United States was AMPS, which was in the 800 MHz Moreover, one can nd both AMPS and IS-95 networks
frequency band. In Nordic countries of Europe, the rst in use on the same frequency in the same area that do
widespread automatic mobile network was based on the not interfere with each other. This is achieved by the use
NMT-450 standard, which was in the 450 MHz band. of dierent channels to carry data. The actual frequency
As mobile phones became more popular and aordable, used by a particular phone can vary from place to place,
mobile providers encountered a problem because they depending on the settings of the carriers base station.
couldn't provide service to the increasing number of cus-
tomers. They had to develop their existing networks
and eventually introduce new standards, often based on 15.2 See also
other frequencies. Some European countries (and Japan)
adopted TACS operating in 900 MHz. The GSM stan-
Bands by technology:
dard, which appeared in Europe to replace NMT-450
and other standards, initially used the 900 MHz band GSM frequency bands
too. As demand grew, carriers acquired licenses in the
UMTS frequency bands
1,800 MHz band. (Generally speaking, lower frequen-
cies allow carriers to provide coverage over a larger area, LTE frequency bands
while higher frequencies allow carriers to provide service
Deployed networks by technology
to more customers in a smaller area.)
In the U.S., the analog AMPS standard that used the cel- List of LTE networks
lular band (800 MHz) was replaced by a number of digital List of UMTS networks
systems. Initially, systems based upon the AMPS mo- List of WiMAX networks
bile phone model were popular, including IS-95 (often
known as "CDMA", the air interface technology it uses) List of mobile network operators (summary)
and IS-136 (often known as D-AMPS, Digital AMPS, or
"TDMA", the air interface technology it uses). Eventu- Mobile country code - code, frequency, and technol-
ally, IS-136 on these frequencies was replaced by most ogy for each operator in each country
operators with GSM. GSM had already been running for
some time on US PCS (1,900 MHz) frequencies. Other articles:
43
44 CHAPTER 15. CELLULAR FREQUENCIES
Roaming
Dual-band
Tri-band
Quad-band
Microwave
15.3 References
[1] Guowang Miao, Jens Zander, Ki Won Sung, and Ben
Slimane, Fundamentals of Mobile Data Networks, Cam-
bridge University Press, ISBN 1107143217, 2016.
Chapter 16
Cellular network
For history of mobile phones, including the history of cel- long as they are in dierent cells
lular networks, see History of mobile phones.
A cellular network or mobile network is a communica- Mobile devices use less power than with a single
transmitter or satellite since the cell towers are closer
16.1 Concept
45
46 CHAPTER 16. CELLULAR NETWORK
group of frequencies can be reused in other cells, pro- make signal separation practically impossible. Time
vided that the same frequencies are not reused in adjacent division multiple access is used in combination with
neighboring cells as that would cause co-channel interfer- either FDMA or CDMA in a number of systems to give
ence. multiple channels within the coverage area of a single
The increased capacity in a cellular network, compared cell.
with a network with a single transmitter, comes from the
mobile communication switching system developed by
Amos Joel of Bell Labs[4] that permitted multiple callers 16.3 Frequency reuse
in the same area to use the same frequency by switching
calls made using the same frequency to the nearest avail-
able cellular tower having that frequency available and The key characteristic of a cellular network is the abil-
from the fact that the same radio frequency can be reused ity to re-use frequencies to increase both coverage and
in a dierent area for a completely dierent transmission. capacity. As described above, adjacent cells must use
If there is a single plain transmitter, only one transmission dierent frequencies, however there is no problem with
can be used on any given frequency. Unfortunately, there two cells suciently far apart operating on the same fre-
is inevitably some level of interference from the signal quency, provided the masts and cellular network[1]users
from the other cells which use the same frequency. This equipment do not transmit with too much power.
means that, in a standard FDMA system, there must be The elements that determine frequency reuse are the
at least a one cell gap between cells which reuse the same reuse distance and the reuse factor. The reuse distance,
frequency. D is calculated as
In the simple case of the taxi company, each radio had a
manually operated channel selector knob to tune to dif-
ferent frequencies. As the drivers moved around, they D = R 3N
would change from channel to channel. The drivers knew
which frequency covered approximately what area. When where R is the cell radius and N is the number of cells per
they did not receive a signal from the transmitter, they cluster. Cells may vary in radius from 1 to 30 kilometres
would try other channels until they found one that worked. (0.62 to 18.64 mi). The boundaries of the cells can also
The taxi drivers would only speak one at a time, when in- overlap between adjacent cells and large cells can be di-
vited by the base station operator (this is, in a sense, time vided into smaller cells.[5]
division multiple access (TDMA)).
The frequency reuse factor is the rate at which the same
frequency can be used in the network. It is 1/K (or K
according to some books) where K is the number of cells
16.2 Cell signal encoding which cannot use the same frequencies for transmission.
Common values for the frequency reuse factor are 1/3,
1/4, 1/7, 1/9 and 1/12 (or 3, 4, 7, 9 and 12 depending on
To distinguish signals from several dierent transmitters, notation).[6]
time division multiple access (TDMA), frequency divi-
sion multiple access (FDMA), code division multiple ac- In case of N sector antennas on the same base station
cess (CDMA), and orthogonal frequency division multi- site, each with dierent direction, the base station site
ple access (OFDMA) were developed.[1] can serve N dierent sectors. N is typically 3. A reuse
pattern of N/K denotes a further division in frequency
With TDMA, the transmitting and receiving time slots among N sector antennas per site. Some current and his-
used by dierent users in each cell are dierent from each torical reuse patterns are 3/7 (North American AMPS),
other. 6/4 (Motorola NAMPS), and 3/4 (GSM).
With FDMA, the transmitting and receiving frequencies If the total available bandwidth is B, each cell can only
used by dierent users in each cell are dierent from each use a number of frequency channels corresponding to a
other. In a simple taxi system, the taxi driver manually bandwidth of B/K, and each sector can use a bandwidth
tuned to a frequency of a chosen cell to obtain a strong of B/NK.
signal and to avoid interference from signals from other
cells. Code division multiple access-based systems use a wider
frequency band to achieve the same rate of transmission
The principle of CDMA is more complex, but achieves as FDMA, but this is compensated for by the ability to
the same result; the distributed transceivers can select one use a frequency reuse factor of 1, for example using a
cell and listen to it. reuse pattern of 1/1. In other words, adjacent base sta-
Other available methods of multiplexing such as tion sites use the same frequencies, and the dierent base
polarization division multiple access (PDMA) cannot be stations and users are separated by codes rather than fre-
used to separate signals from one cell to the next since quencies. While N is shown as 1 in this example, that
the eects of both vary with position and this would does not mean the CDMA cell has only one sector, but
16.5. BROADCAST MESSAGES AND PAGING 47
rather that the entire cell bandwidth is also available to stadiums and arenas.[8] As a result, a cell phone user may
each sector individually. be standing in sight of a cell tower, but still have trou-
Depending on the size of the city, a taxi system may not ble getting a good signal because
[8]
the directional antennas
have any frequency-reuse in its own city, but certainly in point in a dierent direction.
other nearby cities, the same frequency can be used. In a Although the original cell towers created an even, om-
large city, on the other hand, frequency-reuse could cer- nidirectional signal, were at the centers of the cells and
tainly be in use. were omnidirectional, a cellular map can be redrawn with
Recently also orthogonal frequency-division multiple ac- the cellular telephone towers located at[9]the corners of the
cess based systems such as LTE are being deployed with hexagons where three cells converge. Each tower has
a frequency reuse of 1. Since such systems do not three sets of directional antennas aimed in three dierent
spread the signal across the frequency band, inter-cell ra- directions with 120 degrees for each cell (totaling 360 de-
dio resource management is important to coordinate re- grees) and receiving/transmitting into three dierent cells
source allocation between dierent cell sites and to limit at dierent frequencies. This provides a minimum of
the inter-cell interference. There are various means of three channels, and three towers for each cell and greatly
Inter-Cell Interference Coordination (ICIC) already de- increases the chances of receiving a usable signal from at
ned in the standard.[7] Coordinated scheduling, multi- least one direction.
site MIMO or multi-site beam forming are other exam- The numbers in the illustration are channel numbers,
ples for inter-cell radio resource management that might which repeat every 3 cells. Large cells can be subdivided
be standardized in the future. into smaller cells for high volume areas.[10]
Cell towers frequently use a directional signal to improve 16.6 Movement from cell to cell and
reception in higher-trac areas. In the United States, the handing over
FCC limits omnidirectional cell tower signals to 100 watts
of power. If the tower has directional antennas, the FCC In a primitive taxi system, when the taxi moved away
allows the cell operator to broadcast up to 500 watts of from a rst tower and closer to a second tower, the taxi
eective radiated power (ERP).[8] driver manually switched from one frequency to another
Cell phone companies use this directional signal to im- as needed. If a communication was interrupted due to
prove reception along highways and inside buildings like a loss of a signal, the taxi driver asked the base station
48 CHAPTER 16. CELLULAR NETWORK
operator to repeat the message on a dierent frequency. in clear open areas, a user may receive signals from a cell
In a cellular system, as the distributed mobile transceivers site 25 miles (40 km) away.
move from cell to cell during an ongoing continuous com- Since almost all mobile phones use cellular technology,
munication, switching from one cell frequency to a dier- including GSM, CDMA, and AMPS (analog), the term
ent cell frequency is done electronically without interrup- cell phone is in some regions, notably the US, used in-
tion and without a base station operator or manual switch- terchangeably with mobile phone. However, satellite
ing. This is called the handover or hando. Typically, a phones are mobile phones that do not communicate di-
new channel is automatically selected for the mobile unit rectly with a ground-based cellular tower, but may do so
on the new base station which will serve it. The mobile indirectly by way of a satellite.
unit then automatically switches from the current channel There are a number of dierent digital cellular tech-
to the new channel and communication continues. nologies, including: Global System for Mobile Com-
The exact details of the mobile systems move from one munications (GSM), General Packet Radio Service
base station to the other varies considerably from system (GPRS), cdmaOne, CDMA2000, Evolution-Data Opti-
to system (see the example below for how a mobile phone mized (EV-DO), Enhanced Data Rates for GSM Evo-
network manages handover). lution (EDGE), Universal Mobile Telecommunications
System (UMTS), Digital Enhanced Cordless Telecom-
munications (DECT), Digital AMPS (IS-136/TDMA),
16.7 Mobile phone network and Integrated Digital Enhanced Network (iDEN). The
transition from existing analog to the digital standard fol-
lowed a very dierent path in Europe and the US.[11] As
SMSC
a consequence, multiple digital standards surfaced in the
SDP SCP
BSC
US, while Europe and many countries converged towards
VLR
The most common example of a cellular network is a The core circuit switched network for handling voice
mobile phone (cell phone) network. A mobile phone is a calls and text
portable telephone which receives or makes calls through A packet switched network for handling mobile data
a cell site (base station), or transmitting tower. Radio
waves are used to transfer signals to and from the cell The public switched telephone network to connect
phone. subscribers to the wider telephony network
Modern mobile phone networks use cells because radio
frequencies are a limited, shared resource. Cell-sites and This network is the foundation of the GSM system net-
handsets change frequency under computer control and work. There are many functions that are performed by
use low power transmitters so that the usually limited this network in order to make sure customers get the de-
number of radio frequencies can be simultaneously used sired service including mobility management, registra-
by many callers with less interference. tion, call set-up, and handover.
A cellular network is used by the mobile phone opera- Any phone connects to the network via an RBS (Radio
tor to achieve both coverage and capacity for their sub- Base Station) at a corner of the corresponding cell which
scribers. Large geographic areas are split into smaller in turn connects to the Mobile switching center (MSC).
cells to avoid line-of-sight signal loss and to support a The MSC provides a connection to the public switched
large number of active phones in that area. All of the cell telephone network (PSTN). The link from a phone to the
sites are connected to telephone exchanges (or switches), RBS is called an uplink while the other way is termed
which in turn connect to the public telephone network. downlink.
In cities, each cell site may have a range of up to approxi- Radio channels eectively use the transmission medium
mately 1 2 mile (0.80 km), while in rural areas, the range through the use of the following multiplexing and access
could be as much as 5 miles (8.0 km). It is possible that schemes: frequency division multiple access (FDMA),
16.8. SEE ALSO 49
time division multiple access (TDMA), code division The eect of frequency on cell coverage means that dif-
multiple access (CDMA), and space division multiple ac- ferent frequencies serve better for dierent uses. Low
cess (SDMA). frequencies, such as 450 MHz NMT, serve very well for
countryside coverage. GSM 900 (900 MHz) is a suitable
solution for light urban coverage. GSM 1800 (1.8 GHz)
16.7.2 Small cells starts to be limited by structural walls. UMTS, at 2.1 GHz
is quite similar in coverage to GSM 1800.
Main article: Small cell
Higher frequencies are a disadvantage when it comes to
coverage, but it is a decided advantage when it comes to
Small cells, which have a smaller coverage area than base capacity. Pico cells, covering e.g. one oor of a building,
stations, are categorised as follows: become possible, and the same frequency can be used for
cells which are practically neighbours.
Microcell, less than 2 kilometres
Cell service area may also vary due to interference from
Picocell, less than 200 metres transmitting systems, both within and around that cell.
Femtocell, around 10 metres This is true especially in CDMA based systems. The
receiver requires a certain signal-to-noise ratio, and the
transmitter should not send with too high transmission
16.7.3 Cellular handover in mobile phone power in view to not cause interference with other trans-
networks mitters. As the receiver moves away from the transmitter,
the power received decreases, so the power control algo-
Main article: Handover rithm of the transmitter increases the power it transmits
to restore the level of received power. As the interference
(noise) rises above the received power from the transmit-
As the phone user moves from one cell area to another cell
ter, and the power of the transmitter cannot be increased
while a call is in progress, the mobile station will search
any more, the signal becomes corrupted and eventually
for a new channel to attach to in order not to drop the call.
unusable. In CDMA-based systems, the eect of inter-
Once a new channel is found, the network will command
ference from other mobile transmitters in the same cell
the mobile unit to switch to the new channel and at the
on coverage area is very marked and has a special name,
same time switch the call onto the new channel.
cell breathing.
With CDMA, multiple CDMA handsets share a spe-
One can see examples of cell coverage by studying some
cic radio channel. The signals are separated by using
of the coverage maps provided by real operators on their
a pseudonoise code (PN code) specic to each phone. As
web sites or by looking at independently crowdsourced
the user moves from one cell to another, the handset sets
maps such as OpenSignal. In certain cases they may mark
up radio links with multiple cell sites (or sectors of the
the site of the transmitter, in others it can be calculated
same site) simultaneously. This is known as soft hand-
by working out the point of strongest coverage.
o because, unlike with traditional cellular technology,
there is no one dened point where the phone switches to A cellular repeater is used to extend cell coverage into
the new cell. larger areas. They range from wideband repeaters for
consumer use in homes and oces to smart or digital re-
In IS-95 inter-frequency handovers and older analog sys-
peaters for industrial needs.
tems such as NMT it will typically be impossible to test
the target channel directly while communicating. In this
case other techniques have to be used such as pilot bea- 16.7.5 Coverage comparison of dierent
cons in IS-95. This means that there is almost always a frequencies
brief break in the communication while searching for the
new channel followed by the risk of an unexpected return The following table shows the dependency of the cover-
to the old channel. age area of one cell on the frequency of a CDMA2000
If there is no ongoing communication or the communica- network:[12]
tion can be interrupted, it is possible for the mobile unit
to spontaneously move from one cell to another and then
notify the base station with the strongest signal. 16.8 See also
List of UMTS networks [2] Tom Simonite January 24, 2013 (2013-01-24). Googles
Private Cell Phone Network Could Be a Threat to Cellu-
List of HSDPA networks lar Carriers | MIT Technology Review. Technologyre-
List of HSUPA networks view.com. Retrieved 2013-11-23.
List of HSPA+ networks [3] Be Mobile, Stay Connected | PMN. Privatemobilenet-
List of TD-SCDMA networks works.com. Retrieved 2013-11-23.
List of CDMA2000 networks [4] U.S. Patent 3,663,762, issued May 16, 1972.
List of LTE networks
[5] J. E. Flood. Telecommunication Networks. Institution of
List of deployed WiMAX networks Electrical Engineers, London, UK, 1997. chapter 12.
Deployed networks by country (including technol- [6] Phone Networks. The Reverse Phone. 8 June 2011.
ogy and frequencies) Retrieved 2 April 2012.
List of mobile network operators of Europe [7] Pauli, Volker; Naranjo, Juan Diego; Seidel, Eiko (Decem-
ber 2010). Heterogeneous LTE Networks and Inter-Cell
List of mobile network operators of the Amer-
Interference Coordination (PDF). Nomor Research. Re-
icas
trieved 2 April 2012.
List of mobile network operators of the Asia
Pacic region [8] Drucker, Elliott, The Myth of Cellular Tower Health Haz-
ards, retrieved 2013-11-19
List of mobile network operators of the Mid-
dle East and Africa [9] Cellular Telephone Basics. Privateline.com. 1 January
2006. p. 2. Retrieved 2 April 2012.
List of mobile network operators (summary)
[10] U.S. Patent 4,144,411 Cellular Radiotelephone System
Mobile country code - code, frequency, and technol-
for Dierent Cell Sizes Richard H. Frenkiel (Bell Labs),
ogy for each operator in each country led Sep 22, 1976, issued March 13, 1979
Comparison of mobile phone standards [11] Paetsch, Michael (1993): The evolution of mobile com-
munications in the US and Europe. Regulation, technol-
Equipment: ogy, and markets. Boston, London: Artech House (The
Artech House mobile communications library).
Cellular repeater
[12] page 17
Cellular router
Professional mobile radio (PMR)
16.10 External links
OpenBTS
Raciti, Robert C. (July 1995). CELLULAR
Other: TECHNOLOGY. Nova Southeastern University.
Retrieved 2 April 2012.
Cellular trac
MIMO (multiple-input and multiple-output)
16.11 Further reading
Mobile edge computing
P. Key, D. Smith. Teletrac Engineering in a com-
Mobile phone radiation and health petitive world. Elsevier Science B.V., Amsterdam
Network simulation Netherlands, 1999. Chapter 1 (Plenary) and 3 (mo-
bile).
Radio resource management (RRM)
William C. Y. Lee, Mobile Cellular Telecommunica-
Routing in cellular networks tions Systems (1989), McGraw-Hill.
Signal strength
Title 47 of the Code of Federal Regulations
Chapter 17
Circuit switching
Circuit switching is a method of implementing a used capacity guaranteed to a connection cannot be used
telecommunications network in which two network nodes by other connections on the same network.
establish a dedicated communications channel (circuit)
through the network before the nodes may communi-
cate. The circuit guarantees the full bandwidth of the
channel and remains connected for the duration of the
17.1 The call
communication session. The circuit functions as if the
nodes were physically connected as with an electrical cir- For call setup and control (and other administrative pur-
cuit. poses), it is possible to use a separate dedicated signalling
channel from the end node to the network. ISDN is one
The dening example of a circuit-switched network is such service that uses a separate signalling channel while
the early analog telephone network. When a call is plain old telephone service (POTS) does not.
made from one telephone to another, switches within the
telephone exchanges create a continuous wire circuit be- The method of establishing the connection and moni-
tween the two telephones, for as long as the call lasts. toring its progress and termination through the network
may also utilize a separate control channel as in the case
Circuit switching contrasts with packet switching which of links between telephone exchanges which use CCS7
divides the data to be transmitted into packets transmitted packet-switched signalling protocol to communicate the
through the network independently. In packet switching, call setup and control information and use TDM to trans-
instead of being dedicated to one communication session port the actual circuit data.
at a time, network links are shared by packets from mul-
tiple competing communication sessions, resulting in the Early telephone exchanges are a suitable example of cir-
loss of the quality of service guarantees that are provided cuit switching. The subscriber would ask the operator to
by circuit switching. connect to another subscriber, whether on the same ex-
change or via an inter-exchange link and another opera-
In circuit switching, the bit delay is constant during a con- tor. In any case, the end result was a physical electrical
nection, as opposed to packet switching, where packet connection between the two subscribers telephones for
queues may cause varying and potentially indenitely the duration of the call. The copper wire used for the
long packet transfer delays. No circuit can be degraded connection could not be used to carry other calls at the
by competing users because it is protected from use by same time, even if the subscribers were in fact not talk-
other callers until the circuit is released and a new con- ing and the line was silent.
nection is set up. Even if no actual communication is
taking place, the channel remains reserved and protected
from competing users.
17.2 Compared with datagram
Virtual circuit switching is a packet switching technology
that emulates circuit switching, in the sense that the con- packet switching
nection is established before any packets are transferred,
and packets are delivered in order. Circuit switching contrasts with packet switching which
While circuit switching is commonly used for connect- divides the data to be transmitted into small units, called
ing voice circuits, the concept of a dedicated path per- packets, transmitted through the network independently.
sisting between two communicating parties or nodes can Packet switching shares available network bandwidth be-
be extended to signal content other than voice. Its advan- tween multiple communication sessions.
tage is that it provides for continuous transfer without the Multiplexing multiple telecommunications connections
overhead associated with packets making maximal use of over the same physical conductor has been possible for
available bandwidth for that communication. Its disad- a long time, but nonetheless each channel on the multi-
vantage is that it can be relatively inecient because un- plexed link was either dedicated to one call at a time, or
51
52 CHAPTER 17. CIRCUIT SWITCHING
This article is about a channel access method. For the In 1958, the USSR also started the development of the
mobile phone technology referred to as CDMA, see "Altai" national civil mobile phone service for cars, based
IS-95 and CDMA2000. on the Soviet MRT-1327 standard. The phone system
weighed 11 kg (24 lb). It was placed in the trunk of
Code division multiple access (CDMA) is a channel the vehicles of high-ranking ocials and used a standard
handset in the passenger compartment. The main devel-
access method used by various radio communication
technologies. [1] opers of the Altai system were VNIIS (Voronezh Sci-
ence Research Institute of Communications) and GSPI
CDMA is an example of multiple access, where several (State Specialized Project Institute). In 1963 this service
transmitters can send information simultaneously over a started in Moscow and in 1970 Altai service was used in
single communication channel. This allows several users 30 USSR cities.[7]
to share a band of frequencies (see bandwidth). To per-
mit this without undue interference between the users,
CDMA employs spread-spectrum technology and a spe- 18.2 Uses
cial coding scheme (where each transmitter is assigned a
code).[1]
CDMA is used as the access method in many mobile
phone standards. IS-95, also called cdmaOne, and its
3G evolution CDMA2000, are often simply referred to
as CDMA"', but UMTS, the 3G standard used by GSM
carriers, also uses wideband CDMA, or W-CDMA, as
well as TD-CDMA and TD-SCDMA, as its radio tech-
nologies.
18.1 History
The technology of code division multiple access chan-
nels has long been known. In the Soviet Union (USSR),
the rst work devoted to this subject was published in
1935 by professor Dmitriy V. Ageev.[2] It was shown that
through the use of linear methods, there are three types
of signal separation: frequency, time and compensatory.
The technology of CDMA was used in 1957, when the
young military radio engineer Leonid Kupriyanovich in
Moscow, made an experimental model of a wearable au-
tomatic mobile phone, called LK-1 by him, with a base
station. LK-1 has a weight of 3 kg, 2030 km operating
distance, and 2030 hours of battery life.[3][4] The base
station, as described by the author, could serve several A CDMA2000 mobile phone
customers. In 1958, Kupriyanovich made the new ex-
perimental pocket model of mobile phone. This phone
weighed 0.5 kg. To serve more customers, Kupriyanovich One of the early applications for code division mul-
proposed the device, named by him as correllator.[5][6] tiplexing is in the Global Positioning System (GPS).
53
54 CHAPTER 18. CODE DIVISION MULTIPLE ACCESS
This predates and is distinct from its use in mobile matches the desired users code then the correlation func-
phones. tion will be high and the system can extract that signal.
If the desired users code has nothing in common with
The Qualcomm standard IS-95, marketed as cd- the signal the correlation should be as close to zero as
maOne. possible (thus eliminating the signal); this is referred to
as cross-correlation. If the code is correlated with the
The Qualcomm standard IS-2000, known as
signal at any time oset other than zero, the correlation
CDMA2000, is used by several mobile phone com-
should be as close to zero as possible. This is referred
panies, including the Globalstarnetwork.
to as auto-correlation and is used to reject multi-path
[10]
The UMTS 3G mobile phone standard, which uses interference.
W-CDMA. An analogy to the problem of multiple access is a room
(channel) in which people wish to talk to each other si-
CDMA has been used in the OmniTRACS satellite multaneously. To avoid confusion, people could take
system for transportation logistics. turns speaking (time division), speak at dierent pitches
(frequency division), or speak in dierent languages
(code division). CDMA is analogous to the last example
18.3 Steps in CDMA modulation where people speaking the same language can understand
each other, but other languages are perceived as noise and
CDMA is a spread-spectrum multiple access tech- rejected. Similarly, in radio CDMA, each group of users
[8]
nique. A spread spectrum technique spreads the band- is given a shared code. Many codes occupy the same
width of the data uniformly for the same transmitted channel, but only users associated with a particular code
power. A spreading code is a pseudo-random code that can communicate.
has a narrow ambiguity function, unlike other narrow In general, CDMA belongs to two basic categories: syn-
pulse codes. In CDMA a locally generated code runs chronous (orthogonal codes) and asynchronous (pseudo-
at a much higher rate than the data to be transmitted. random codes).
Data for transmission is combined via bitwise XOR (ex-
clusive OR) with the faster code. The gure shows how
a spread spectrum signal is generated. The data signal
with pulse duration of Tb (symbol period) is XOR'ed with
18.4 Code division multiplexing
the code signal with pulse duration of Tc (chip period). (synchronous CDMA)
(Note: bandwidth is proportional to 1/T , where T = bit
time.) Therefore, the bandwidth of the data signal is 1/Tb The digital modulation method is analogous to those used
and the bandwidth of the spread spectrum signal is 1/Tc in simple radio transceivers. In the analog case, a low
. Since Tc is much smaller than Tb , the bandwidth of frequency data signal is time multiplied with a high fre-
the spread spectrum signal is much larger than the band- quency pure sine wave carrier, and transmitted. This
width of the original signal. The ratio Tb /Tc is called the is eectively a frequency convolution (WienerKhinchin
spreading factor or processing gain and determines to a theorem) of the two signals, resulting in a carrier with
certain extent the upper limit of the total number of users narrow sidebands. In the digital case, the sinusoidal car-
supported simultaneously by a base station.[9] rier is replaced by Walsh functions. These are binary
bT
square waves that form a complete orthonormal set. The
data signal is also binary and the time multiplication is
Data Signal achieved with a simple XOR function. This is usually a
Gilbert cell mixer in the circuitry.
Pseudorandom Code
a(a+b) = a2 since aa+ab = a2 +0 on the right. These vectors will be assigned to individ-
ual users and are called the code, chip code, or chipping
b (a + b) = b2 since b a + b b = 0 + b2 code. In the interest of brevity, the rest of this example
uses codes, v, with only two bits.
b (a b) = b2 since b a b b = 0 b2
Each user is associated with a dierent code, say v. A 1
Each user in synchronous CDMA uses a code orthogonal bit is represented by transmitting a positive code, v, and a
to the others codes to modulate their signal. An example 0 bit is represented by a negative code, v. For example,
of four mutually orthogonal digital signals is shown in the if v = (v0 , v1 ) = (1, 1) and the data that the user wishes
gure. Orthogonal codes have a cross-correlation equal to transmit is (1, 0, 1, 1), then the transmitted symbols
to zero; in other words, they do not interfere with each would be
other. In the case of IS-95 64 bit Walsh codes are used to (v, v, v, v) = (v0 , v1 , v0 , v1 , v0 , v1 , v0 , v1 ) = (1, 1,
encode the signal to separate dierent users. Since each 1, 1, 1, 1, 1, 1). For the purposes of this article, we
of the 64 Walsh codes are orthogonal to one another, the call this constructed vector the transmitted vector.
signals are channelized into 64 orthogonal signals. The
following example demonstrates how each users signal Each sender has a dierent, unique vector v chosen from
can be encoded and decoded. that set, but the construction method of the transmitted
vector is identical.
Now, due to physical properties of interference, if two
18.4.1 Example signals at a point are in phase, they add to give twice the
amplitude of each signal, but if they are out of phase,
they subtract and give a signal that is the dierence of the
amplitudes. Digitally, this behaviour can be modelled by
the addition of the transmission vectors, component by
component.
If sender0 has code (1, 1) and data (1, 0, 1, 1), and
sender1 has code (1, 1) and data (0, 0, 1, 1), and both
senders transmit simultaneously, then this table describes
the coding steps:
Because signal0 and signal1 are transmitted at the same
time into the air, they add to produce the raw signal:
(1, 1, 1, 1, 1, 1, 1, 1) + (1, 1, 1, 1,
1, 1, 1, 1) = (0, 2, 2, 0, 2, 0, 2, 0)
that can be assigned to individual transmitters. For in- intended signal, and it is thus ignored.
stance, if there are N time slots in a TDMA system and Some CDMA devices use a rake receiver, which exploits
2N users that talk half of the time, then half of the time multipath delay components to improve the performance
there will be more than N users needing to use more than of the system. A rake receiver combines the informa-
N time slots. Furthermore, it would require signicant tion from several correlators, each one tuned to a dier-
overhead to continually allocate and deallocate the or- ent path delay, producing a stronger version of the signal
thogonal code, time slot or frequency channel resources. than a simple receiver with a single correlation tuned to
By comparison, asynchronous CDMA transmitters sim- the path delay of the strongest signal.[12]
ply send when they have something to say, and go o the
air when they don't, keeping the same PN signature se- Frequency reuse is the ability to reuse the same radio
quence as long as they are connected to the system. channel frequency at other cell sites within a cellular sys-
tem. In the FDMA and TDMA systems frequency plan-
ning is an important consideration. The frequencies used
in dierent cells must be planned carefully to ensure
18.5.2 Spread-spectrum characteristics of signals from dierent cells do not interfere with each
CDMA other. In a CDMA system, the same frequency can be
used in every cell, because channelization is done using
Most modulation schemes try to minimize the band- the pseudo-random codes. Reusing the same frequency
width of this signal since bandwidth is a limited resource. in every cell eliminates the need for frequency planning
However, spread spectrum techniques use a transmission in a CDMA system; however, planning of the dierent
bandwidth that is several orders of magnitude greater pseudo-random sequences must be done to ensure that
than the minimum required signal bandwidth. One of the received signal from one cell does not correlate with
the initial reasons for doing this was military applications the signal from a nearby cell.[13]
including guidance and communication systems. These
Since adjacent cells use the same frequencies, CDMA
systems were designed using spread spectrum because of
systems have the ability to perform soft hand os. Soft
its security and resistance to jamming. Asynchronous
hand os allow the mobile telephone to communicate si-
CDMA has some level of privacy built in because the
multaneously with two or more cells. The best signal qual-
signal is spread using a pseudo-random code; this code
ity is selected until the hand o is complete. This is dif-
makes the spread spectrum signals appear random or have
ferent from hard hand os utilized in other cellular sys-
noise-like properties. A receiver cannot demodulate this
tems. In a hard hand o situation, as the mobile telephone
transmission without knowledge of the pseudo-random
approaches a hand o, signal strength may vary abruptly.
sequence used to encode the data. CDMA is also resistant
In contrast, CDMA systems use the soft hand o, which
to jamming. A jamming signal only has a nite amount
is undetectable and provides a more reliable and higher
of power available to jam the signal. The jammer can
quality signal.[13]
either spread its energy over the entire bandwidth of the
signal or jam only part of the entire signal.[11]
CDMA can also eectively reject narrow band interfer-
ence. Since narrow band interference aects only a small 18.6 Collaborative CDMA
portion of the spread spectrum signal, it can easily be re-
moved through notch ltering without much loss of in- In a recent study, a novel collaborative multi-user
formation. Convolution encoding and interleaving can be transmission and detection scheme called Collaborative
used to assist in recovering this lost data. CDMA signals CDMA[14] has been investigated for the uplink that ex-
are also resistant to multipath fading. Since the spread ploits the dierences between users fading channel sig-
spectrum signal occupies a large bandwidth only a small natures to increase the user capacity well beyond the
portion of this will undergo fading due to multipath at any spreading length in multiple access interference (MAI)
given time. Like the narrow band interference this will limited environment. The authors show that it is possi-
result in only a small loss of data and can be overcome. ble to achieve this increase at a low complexity and high
Another reason CDMA is resistant to multipath inter- bit error rate performance in at fading channels, which
ference is because the delayed versions of the transmit- is a major research challenge for overloaded CDMA sys-
ted pseudo-random codes will have poor correlation with tems. In this approach, instead of using one sequence per
the original pseudo-random code, and will thus appear as user as in conventional CDMA, the authors group a small
another user, which is ignored at the receiver. In other number of users to share the same spreading sequence
words, as long as the multipath channel induces at least and enable group spreading and despreading operations.
one chip of delay, the multipath signals will arrive at the The new collaborative multi-user receiver consists of two
receiver such that they are shifted in time by at least one stages: group multi-user detection (MUD) stage to sup-
chip from the intended signal. The correlation properties press the MAI between the groups and a low complex-
of the pseudo-random codes are such that this slight de- ity maximum-likelihood detection stage to recover jointly
lay causes the multipath to appear uncorrelated with the the co-spread users data using minimum Euclidean dis-
58 CHAPTER 18. CODE DIVISION MULTIPLE ACCESS
tance measure and users channel gain coefcients. In [12] Rapporteur, Theodore S. (2002). Wireless Communica-
CDMA, signal security is high. tions, Principles and Practice. Prentice-Hall, Inc.
18.9 References
[1] Guowang Miao; Jens Zander; Ki Won Sung; Ben Sli-
mane (2016). Fundamentals of Mobile Data Networks.
Cambridge University Press. ISBN 1107143217.
Conference call
19.1.1 Business
59
60 CHAPTER 19. CONFERENCE CALL
ence access to the call without dialing in to a bridge. In services are usually compensated through a revenue shar-
addition, organizers of conference calls can publish a dial- ing arrangement with the local phone company, sharing
in number alongside the audio stream, creating potential the terminating access charge for all incoming calls to a
for audience members to dial in and interact. phone carrier.
The UK government has changed exible working rights Some background on the terminating access charge: On
since 2014 so that employees who have been working full- every long distance call in the United States including toll
time for a company or organisation can lawfully request conference calls, the consumer is paying for origination
exible working. In recent years, there has been a number (dial tone), transport, and termination (connecting the
of dierent types of exible working options as a result call).[7] Each of these phone companies share a piece of
of conference calling technology enabling employees to the cost of the call. If it is the same phone company per-
work remotely.[4] forming all three tasks (most likely the two largest phone
companies AT&T and Verizon), they keep all of the
charge. This is known as intercarrier compensation (ICC)
19.1.2 Flat-rate conferencing and is intended to keep the telecommunications system
functioning by having every phone company receive com-
Flat-rate conferencing[5] services are being oered which pensation for using their network.
give unlimited access to a conference bridge at a xed
monthly cost. Because telecommunication carriers oer In the case of free conference calling, the conferencing
free long-distance bundled with local service, this alterna- company strikes an agreement with the local phone com-
tive is gaining widespread popularity for budget conscious pany that hosts the conferencing bridge to receive a share
businesses and non-prots. of the terminating access charge received for connecting
the call. At large carriers such as AT&T and Verizon,
In the UK, there are conference services oered on a pay- they keep these access charges for their own conferenc-
as-you-go basis where the cost of the phone calls (using ing services in addition to charging the customer for the
0843/0844, or 0871/0872 non-geographic revenue shar- conference service. With free conference calling, as men-
ing numbers) from each of the participants covers the cost tioned above, there are no organizer fees so these services
of the conference service. With this service type there is do not double-dip: the consumer pays for a regular call
no monthly charge and usually no contracts to sign. with the same three components origination, transport,
and termination of any call. In other words, the call
costs the same as any other call under the customers call-
19.1.3 Prepaid conference calls ing plan, but the conferencing is included for free to the
host and participants of the conference call.
Prepaid conference call services allow businesses and in-
dividuals to purchase conferencing services online,[6] and This added competition in the conferencing market has
conduct conference calls on a pay-as-you-go basis. Typ- brought average rates down from over 20 cents per minute
ically, a conference call PIN and its associated calling to under 10 cents per minute. In addition, it is more e-
instructions are displayed immediately online after be- cient and less expensive to speak to many people on one
ing purchased and/or sent via email. Generally, prepaid call (a conference call) than on multiple person-to-person
conference call services are used with a landline tele- calls.
phone, mobile phone, or computer, and there is no need to In November 2011, the Federal Communications Com-
buy additional expensive telecommunications hardware mission (FCC) published a 732-page Order on Inter-
or add/switch long distance service. Some services allow Carrier Compensation (ICC),[8] including rules govern-
one to start or join a conference call from virtually any ing revenue sharing. Citing Section 251(b)(5) of the
country worldwidewith appropriate telephone access. Telecommunications Act of 1996, the FCC mandated
Large telecommunications providers such as AT&T, that terminating access rates for all calls (not just con-
Embarq (formerly Sprint), Verizon and other large to ference calls) be leveled in 2012 and 2013, then reduced
medium conferencing service providers maintain a dom- in three increments over the subsequent three years until
inant position in the conferencing niche; servicing many they reach $0 in 2017.[9] These mostly sub-1 cent charges
of the worlds biggest brands. However, the Internet and are replaced with an access recovery charge (ARC) that is
improved global VoIP networks have helped to signi- added onto every customers bill by their phone carriers.
cantly reduce the barrier of entry into this niche. In other words, every phone company will get to keep the
terminating access charges they had to pay out to connect
each call while charging consumers more whether they
19.1.4 Free conference calling make calls or not. This order has been challenged at the
Federal Appeals Court by several parties.[10]
Free conferencing is dierent from traditional confer-
As for revenue sharing, the order adds a measure for high
ence calling in that it has no organizer fees and allows for
volume call trac which triggers an immediate terminat-
multiple people to meet for the price of their long distance
ing access charge reduction to the lowest rate of any car-
connections. Companies that provide free conference call
19.2. CONFERENCING IN IMS 61
Group call
19.1.5 Premium conferencing Conference operation
Here participants dial in on a premium-rate number such
as a toll free number in the US. The conference is typically
hosted by the party that perceives value in the call in order 19.4 References
to justify the cost: this could be a business owner, a non-
prot board member, an educator, lawyer, or expert in [1] The biggest problem with video conferencing.
any given eld. That person then usually pays for the cost
[2] Conference Call Etiquettes. No Cost Conference
of the call. Premium conferencing can also be used for Global. Retrieved 2013-04-30.
charitable fundraisers.
[3] Top tips for conference call etiquette. Conference-
Premium Conferencing Feature Sets[15] [14]
Call.co.uk. Retrieved 2013-09-10.
Reservationless or operator assisted conferencing [4] Powwownow. Flexible Working Guide for Employers
(PDF).
Host PINs
[5] Business Conference Call Retrieved 2011-01-14.
Name announce
[6] Conference Call IT Support
Roll-call (unique and superior)
[7] Diane S. Katz (2004-08-14). 12. What are access
Moderator/participant codes charges?". Retrieved 2013-02-01.
Live web-based call management with [8] John J. Heitmann (2011-11-29). FCC ICC/USF Reform
mute/unmute, drop one/all, and dial out Order Published in Federal Register. Retrieved 2013-
02-01.
Recording with .wav le access through an online
account [9] FCC Releases Connect America Fund Order, Reforms
USF/ICC for Broadband, pg 215
High-quality on-demand transcriptions (with 4-hour
turnaround on request) [10] Let the Challenges Begin! USF/ICC Order under Attack
as Parties Turn to Courts. 2011-12-11. Retrieved 2013-
Customizable, branded greetings(unique) 02-01.
62 CHAPTER 19. CONFERENCE CALL
[12] http://ask.ofcom.org.uk/help/telephone/03number
[13] http://whypay.net
Digital AMPS
IS-54 and IS-136 are second-generation (2G) mobile Alltel, who primarily uses CDMA2000 technology but
phone systems, known as Digital AMPS (D-AMPS), acquired a TDMA network from Western Wireless, shut
and a further development of the north-American 1G down its TDMA and AMPS networks in September
mobile system AMPS. It was once prevalent through- 2008. US Cellular, which now also primarily uses
out the Americas, particularly in the United States and CDMA2000 technology, shut down its TDMA network
Canada since the rst commercial network was deployed in February 2009.
in 1993.[1] D-AMPS is considered end-of-life, and exist-
IS-54 is the rst mobile communication system which
ing networks have mostly been replaced by GSM/GPRS had provision for security, and the rst to employ TDMA
or CDMA2000 technologies.
technology.[3]
This system is most often referred to as TDMA. That
name is based on the abbreviation for time division mul-
tiple access, a common multiple access technique which 20.1 Introduction
is used in most 2G standards, including GSM, as well
as in IS-54 and IS-136. However, D-AMPS has been
IS-54 stands for Interim Standard-54, which is a mo-
competing against GSM and systems based on code di-
bile communication standard employing digital technol-
vision multiple access (CDMA) for adoption by the net-
ogy. It was standardized by Electronic Industries Al-
work carriers, although it is now being phased out in favor
liance (EIA) and Telecommunications Industry Associ-
of GSM/GPRS and CDMA2000 technology.
ation (TIA) together. It later became an American Na-
D-AMPS uses existing AMPS channels and allows for tional Standard when it got approved by the American
smooth transition between digital and analog systems in National Standards Institute (ANSI). When an interim
the same area. Capacity was increased over the preced- standard becomes an American National Standard, the
ing analog design by dividing each 30 kHz channel pair IS designator is dropped. The ANSI designation of IS-54
into three time slots (hence time division) and digitally is ANSI/TIA/EIA-627, but this standard is still popularly
compressing the voice data, yielding three times the call referred to as IS-54.
capacity in a single cell. A digital system also made calls
IS-54 maintains compatibility with Advanced Mobile
more secure in the beginning, as analogue scanners could
Phone System (AMPS) in many ways. It is a digital ex-
not access digital signals. Calls were encrypted, using
tension of AMPS and so it is also quite widely known
(CMEA), which was later found to be weak.[2]
as Digital AMPS (D-AMPS). Another name for IS-54
IS-136 added a number of features to the original IS-54 is United States Digital Cellular (USDC). But sometimes
specication, including; text messaging, circuit switched D-AMPS and USDC also refers to the other prominent
data (CSD), and an improved compression protocol. interim standard IS-136.
SMS and CSD were both available as part of the GSM
protocol, and IS-136 implemented them in a nearly iden-
tical fashion. 20.2 History
Former large IS-136 networks, including AT&T in the
United States, and Rogers Wireless in Canada, have up- The evolution of mobile communication began in 3 dif-
graded their existing IS-136 networks to GSM/GPRS. ferent geographic regions; North America, Europe and
Rogers Wireless removed all 1900 MHz IS-136 in 2003, Japan. The standards used in these regions were quite
and has done the same with its 800 MHz spectrum as the independent of each other.
equipment failed. Rogers deactivated its IS-136 network
(along with AMPS) on May 31, 2007. AT&T soon fol- The earliest mobile or wireless technologies implemented
lowed in February 2008, shutting down both TDMA and were wholly analogue, and are collectively known as 1st
AMPS. Generation (1G) technologies. In Japan, the 1G stan-
dards were; Nippon Telegraph and Telephone (NTT) and
63
64 CHAPTER 20. DIGITAL AMPS
the high capacity version of it (Hicap). The early sys- uses digital channels where available, and defaults to reg-
tems used throughout Europe were not compatible to ular AMPS where they are not. IS-54 was, backward
each other, meaning the later idea of a common 'Euro- compatible with analogue cellular and indeed co-exists
pean Union' viewpoint/technological standard was absent on the same radio channels as AMPS. No analogue cus-
at this yime. tomers were left behind; they simply could not access IS-
Amongst the various 1G standards in use in Europe, in- 54s new features. IS-54 also supported authentication, a
cluded; C-Netz (in Germany and Austria), Comviq (in help in preventing fraud.
Sweden), Nordic Mobile Telephones/450 (NMT450) and
NMT900 (both in Nordic countries), NMT-F (French
version of NMT900), Radiocom 2000 (RC2000) (in 20.3 Technology specications
France), and TACS(Total Access Communication Sys-
tem) (in the United Kingdom, Italy and Ireland). North
IS-54 employs the same 30 kHz channel spacing and fre-
American standards were Advanced Mobile Phone Sys-
quency bands (824-849 and 869-894 MHz) as AMPS.
tem (AMPS) and Narrow-band AMPS (N-AMPS).
Capacity was increased over the preceding analog design
Out of the 1G standards, the most successful was the by dividing each 30 kHz channel pair into three time slots
AMPS system. Despite the Nordic countries' coopera- and digitally compressing the voice data, yielding three
tion, European engineering eorts were divided among times the call capacity in a single cell. A digital sys-
the various standards, and the Japanese standards did not tem also made calls more secure because analog scanners
get much attention. Developed by Bell Labs in the 1970s could not access digital signals.
and rst used commercially in the United States in 1983,
The IS-54 standard species 84 control channels, 42
AMPS operates in the 800 MHz band in the United States
of which are shared with AMPS. To maintain compat-
and is the most widely distributed analog cellular stan-
ibility with the existing AMPS cellular telephone sys-
dard. (The 1900 MHz PCS band, established in 1994, is
tem, the primary forward and reverse control channels
for digital operation only.) The success of AMPS kick-
in IS-54 cellular systems use the same signaling tech-
started the mobile age in the North America.
niques and modulation scheme (binary FSK) as AMPS.
The market showed an increasing demand because it had An AMPS/IS-54 infrastructure can support use of either
higher capacity and mobility than the then-existing mo- analog AMPS phones or D-AMPS phones.
bile communication standards were calable of handling.
The access method used for IS-54 is Time Division Mul-
For example, the Bell Labs system in the 1970s could
tiple Access (TDMA), which was the rst U.S. digital
carry only 12 calls at a time throughout all of New York
standard to be developed. It was adopted by the TIA
City. AMPS used Frequency Division Multiple Access
in 1992. TDMA subdivides each of the 30 kHz AMPS
FDMA which enabled each cell site to transmit on dier-
channels into 3 full-rate TDMA channels, each of which
ent frequencies, allowing many cell sites to be built near
is capable of supporting a single voice call. Later, each
each other.
of these full-rate channels was further sub-divided into
AMPS also had many disadvantages, as well. Primarily, two half-rate channels, each of which, with the necessary
it did not have the ability to support the ever-increasing coding and compression, could also support a voice call.
demand for mobile communication usage. Each cell site Thus, TDMA could provide 3 to 6 times the capacity of
did not have much capacity for carrying higher numbers AMPS trac channels. Time Division Multiple Access
of calls. AMPS also had a poor security system which or TDMA was initially dened by the IS-54 standard and
allowed people to steal a phones serial code to use for is now specied in the IS-13x series of specications of
making illegal calls. All of these triggered the search for the EIA/TIA.
a more capable system.
The channel transmission bit rate for digitally modulating
The quest resulted in IS-54, the rst American 2G stan- the carrier is 48.6 kbit/s. Each frame has six time slots of
dard. In March 1990, the North American cellular net- 6.67-ms duration. Each time slot carries 324 bits of in-
work incorporated the IS-54B standard, the rst North formation, of which 260 bits are for the 13-kbit/s full-rate
American dual mode digital cellular standard. This stan- trac data. The other 64 bits are overhead; 28 of these
dard won over Motorola's Narrowband AMPS or N- are for synchronization, and they contain a specic bit
AMPS, an analog scheme which increased capacity, by sequence known by all receivers to establish frame align-
cutting down voice channels from 30 kHz to 10 kHz. ment. Also, as with GSM, the known sequence acts as a
IS-54, on the other hand, increased capacity by digital training pattern to initialize an adaptive equalizer.
means using TDMA protocols. This method separates
The IS-54 system has dierent synchronization se-
calls by time, placing parts of individual conversations
quences for each of the six time slots making up the
on the same frequency, one after the next. TDMA tripled
frame, thereby allowing each receiver to synchronize to
call capacity.
its own preassigned time slots. An additional 12 bits in
Using IS-54, a cellular carrier could convert any of its sys- every time slot are for the SACCH (i.e., system control
tems analog voice channels to digital. A dual mode phone information). The digital verication color code (DVCC)
20.5. SYSTEM EXAMPLE 65
is the equivalent of the supervisory audio tone used in the associated control channel or SACCH does not perform
AMPS system. There are 256 dierent 8-bit color codes, handos but conveys things like signal strength informa-
which are protected by a (12, 8, 3) Hamming code. Each tion to the base station.
base station has its own preassigned color code, so any The IS-54 speech coder uses the technique called vector
incoming interfering signals from distant cells can be ig- sum excited linear prediction (VSELP) coding. This is a
nored. special type of speech coder within a large class known
The modulation scheme for IS-54 is 7C/4 dieren- as code-excited linear prediction (CELP) coders. The
tial quaternary phase shift keying (DQPSK), otherwise speech coding rate of 7.95 kbit/s achieves a reconstructed
known as dierential 7t/4 4-PSK or /4 DQPSK. This speech quality similar to that of the analog AMPS sys-
technique allows a bit rate of 48.6 kbit/s with 30 kHz tem using frequency modulation. The 7.95-kbit/s signal
channel spacing, to give a bandwidth eciency of 1.62 is then passed through a channel coder that loads the bit
bit/s/Hz. This value is 20% better than GSM. The major rate up to 13 kbit/s. The new half-rate coding standard
disadvantage with this type of linear modulation method reduces the overall bit rate for each call to 6.5 kbit/s, and
is the power ineciency, which translates into a heav- should provide comparable quality to the 13-kbit/s rate.
ier hand-held portable and, even more inconvenient, a This half-rate gives a channel capacity six times that of
shorter time between battery recharges. analog AMPS.
IS-54 security features is also a matter of interest as it was
the rst standard to specify some security measures. IS-
54 uses the CAVE (Cellular Authentication, Voice Pri- 20.5 System example
vacy and Encryption) algorithm for authentication and the
CMEA (Cellular Message Encryption Algorithm) for en- The discussion of a communication system will not be
cryption. complete without the explanation of a system example. A
The technical specications can be summarized as below: dual-mode cellular phone as specied by the IS-54 stan-
dard is explained. A dual-mode phone is capable of oper-
ating in an analog-only cell or a dual-mode cell. Both the
transmitter and the receiver support both analog FM and
20.4 Call processing digital time division multiple access (TDMA) schemes.
Digital transmission is preferred, so when a cellular sys-
A conversations data bits makes up the DATA eld. Six tem has digital capability, the mobile unit is assigned a
slots make up a complete IS-54 frame. DATA in slots digital channel rst. If no digital channels are available,
1 and 4, 2 and 5, and 3 and 6 make up a voice circuit. the cellular system will assign an analog channel. The
DVCC stands for digital verication color code, arcane transmitter converts the audio signal to a radio frequency
terminology for a unique 8-bit code value assigned to each (RF), and the receiver converts an RF signal to an audio
cell. G means guard time, the period between each time signal. The antenna focuses and converts RF energy for
slot. RSVD stands for reserved. SYNC represents syn- reception and transmission into free space. The control
chronization, a critical TDMA data eld. Each slot in panel serves as an input/output mechanism for the end
every frame must be synchronized against all others and user; it supports a keypad, a display, a microphone, and a
a master clock for everything to work. speaker. The coordinator synchronizes the transmission
Time slots for the mobile-to-base direction are con- and receives functions of the mobile unit. A dual-mode
structed dierently from the base-to-mobile direction. cellular phone consists of the following:
They essentially carry the same information but are ar-
ranged dierently. Notice that the mobile-to-base direc- Transmitter
tion has a 6-bit ramp time to enable its transmitter time
to get up to full power, and a 6-bit guard band during Antenna assembly
which nothing is transmitted. These 12 extra bits in the
Receiver
base-to-mobile direction are reserved for future use.
Once a call comes in the mobile switches to a dierent Control panel
pair of frequencies; a voice radio channel which the sys-
Coordinator
tem carrier has made analog or digital. This pair carries
the call. If an IS-54 signal is detected it gets assigned a
digital trac channel if one is available. The fast asso-
ciated channel or FACCH performs handos during the 20.6 Successor technologies
call, with no need for the mobile to go back to the con-
trol channel. In case of high noise FACCH, embedded By 1993 American cellular was again running out of ca-
within the digital trac channel overrides the voice pay- pacity, despite a wide movement to IS-54. The American
load, degrading speech quality to convey control informa- cellular business continued booming. Subscribers grew
tion. The purpose is to maintain connectivity. The slow from one and a half million customers in 1988 to more
66 CHAPTER 20. DIGITAL AMPS
[2]
[3]
20.6.1 IS-136
History of mobile communication:1990{}s
A pragmatic eort was launched to improve IS-54 that
eventually added an extra channel to the IS-54 hybrid de- Paper on CMEA
sign. Unlike IS-54, IS-136 utilizes time division mul-
Cingular Wireless: TDMA Service Sunset
tiplexing for both voice and control channel transmis-
sions. Digital control channel allows residential and in- Edge Wireless: TDMA Network Changing to
building coverage, dramatically increased battery standby GSM/GPRS
time, several messaging applications, over the air acti-
vation and expanded data applications. IS-136 systems
needed to support millions of AMPS phones, most of 20.9 External links
which were designed and manufactured before IS-54 and
IS-136 were considered. IS-136 added a number of fea-
Timeslot structure for IS-136 and IS-54
tures to the original IS-54 specication, including text
messaging, circuit switched data (CSD), and an improved
compression protocol. IS-136 TDMA trac channels
use /4-DQPSK modulation at a 24.3-kilobaud channel
rate and gives an eective 48.6 kbit/s data rate across the
six time slots comprising one frame in the 30 kHz chan-
nel.
Direct inward dialing (DID), also called direct dial-in cation of their DID telephone number.
(DDI) in Europe and Oceania, is a telecommunication
service oered by telephone companies to sub-
scribers who operate a private branch exchange (PBX)
system.[1][2] The feature provides service for multiple
telephone numbers over one or more analog or digital 21.2 Use in fax services
physical circuits to the PBX, and transmits the dialed
telephone number to the PBX so that a PBX extension
is directly accessible for an outside caller, possibly DID service is also used by fax servers. A telephone line
by-passing an auto-attendant. is terminated at a telephone interface (fax modem) of a
computer that runs fax server software. A set of digits
of the assigned phone numbers are used to identify the
recipient of the fax. This allows many recipients to have
21.1 Plain old telephone service an individual fax number, even though there is only one
fax machine available.
For direct inward dialing service, the telephone company Some voice over IP (VoIP) vendors have used one cen-
provides one or more trunk lines to the customer for con- tral, remotely located fax server as a means of oer-
nection to the customers PBX, and allocates a range of ing Internet fax service to their clients. In theory, stan-
telephone numbers to the customer. Calls to such num- dards such as T.38 should have allowed VoIP subscribers
bers are forwarded via the trunks. As calls are pre- to keep their existing fax equipment working locally; in
sented to the PBX, the dialed telephone number (DNIS) practice, T.38 at the subscribers site oers no benet if
the upstream provider is least-cost routing to gateways
is transmitted, usually partially, e.g., the last four digits,
so that the PBX can route the call directly to the desiredthat don't support T.38 and cannot reliably send or receive
telephone extension within the organization without the fax/modem trac. A fax server at a central location,
need for an operator or attendant. The service provides connected directly to public switched telephone network
automatic direct inward call routing while maintaining (PSTN) T-carrier primary rate interface lines and using
only a limited number of subscriber lines to satisfy the direct inward dial to identify the intended addressee can
average concurrent usage of the customer. convert an incoming fax to an electronic document (such
as .tif or .pdf) for web or e-mail delivery. The fax trac
Traditionally, DID circuits were analog. These types of never passes through the VoIP infrastructure as a dial-up
DID trunks had to be powered by the customer premises modem call and therefore arrives reliably even if T.38 is
equipment. The central oce equipment detects the not properly supported at some points in the network.
power state of the line and disables service if the cir-
cuit is not powered. This is the reverse arrangement from
standard plain old telephone service (POTS) lines which
are powered by the central oce. Nowadays, it is far
more common to deliver DIDs on a primary rate inter- 21.3 Voice over IP
face (PRI) circuit.
In the United States the feature was developed by AT&T DID service has similar relevance for Voice over Inter-
in the 1960s, patterned upon the earlier IKZ service of net Protocol (VoIP) communications.[3] To allow public
the Deutsche Bundespost. switched telephone network (PSTN) users to directly
The trunks for DID service are unidirectional, inbound reach users with VoIP phones, DID numbers are assigned
to the customer PBX. However, the service may be com- to a communications gateway. The gateway connects the
bined with direct outward dialing (DOD) allowing PBX PSTN to the VoIP network, routing and translating calls
extensions direct outbound calling capability with identi- between the two networks.
67
68 CHAPTER 21. DIRECT INWARD DIAL
[3] http://www.commpeak.com/wholesale-services/
In countries with multiple competing local providers, voice-origination/
DID services can be purchased in bulk from a
Competitive Local Exchange Carrier (CLEC).
For voice over IP resellers, some specialized CLECs (for
local numbers) or interexchange carriers (for toll-free
numbers) will deliver blocks of direct inward dial calls
already converted to Session Initiation Protocol (SIP) or
common VoIP formats. The individual VoIP provider
need only obtain an inventory of local or freephone num-
bers from VoIP-aware carriers in various regions, import
them in bulk to a VoIP PBX (such as Asterisk) and is-
sue them individually to end users. International DID
numbers can be purchased in bulk from international
providers.
UK geographic DID numbers can often be obtained for
free and can be terminated over SIP. A few US DIDs
are available without monthly charges from vendors like
Ipkall, but at the expense of the caller paying for a call to
some expensive, rural location.
The majority of vendors charge a nominal amount per
number per month (as little as $1/month in small quanti-
ties) and then bill per-minute or per number of channels
which can be simultaneously in use. For the caller, these
numbers can be assigned to locations which are a local
call.
Dial plan
Voice over IP
21.7 References
[1] http://www.cisco.com/c/en/us/support/docs/voice/
digital-ccs/14072-direct-inward-dial.html
Chapter 22
Disruptive innovation
69
70 CHAPTER 22. DISRUPTIVE INNOVATION
novation in the 2008 Harvard Business Review article forward-thinking innovation could improve the economic
Reinventing Your Business Model.[10] The concept of benets of these same well-managed companies, once
disruptive technology continues a long tradition of iden- decision-making management understood the systemic
tifying radical technical change in the study of innovation benets as a whole.
by economists, and the development of tools for its man-
agement at a rm or policy level.
In the late 1990s, the automotive sector began to embrace
a perspective of constructive disruptive technology by
working with the consultant David E. O'Ryan, whereby
the use of current o-the-shelf technology was integrated
with newer innovation to create what he called an unfair
advantage. The process or technology change as a whole
had to be constructive in improving the current method
of manufacturing, yet disruptively impact the whole of the
business case model, resulting in a signicant reduction of
waste, energy, materials, labor, or legacy costs to the user.
In keeping with the insight that what matters economi-
cally is the business model, not the technological sophis-
tication itself, Christensens theory explains why many
disruptive innovations are not advanced technologies, How low-end disruption occurs over time.
which the technology mudslide hypothesis would lead one
to expect. Rather, they are often novel combinations of
Christensen distinguishes between low-end disruption,
existing o-the-shelf components, applied cleverly to a
which targets customers who do not need the full perfor-
small, edgling value network.
mance valued by customers at the high end of the market,
and new-market disruption, which targets customers
who have needs that were previously unserved by existing
22.2 Theory incumbents.[13]
Low-end disruption occurs when the rate at which
Christensen denes a disruptive innovation as a product
products improve exceeds the rate at which customers can
or service designed for a new set of customers.
adopt the new performance. Therefore, at some point the
performance of the product overshoots the needs of cer-
Generally, disruptive innovations were
tain customer segments. At this point, a disruptive tech-
technologically straightforward, consisting of
nology may enter the market and provide a product that
o-the-shelf components put together in a
has lower performance than the incumbent but that ex-
product architecture that was often simpler
ceeds the requirements of certain segments, thereby gain-
than prior approaches. They oered less of
ing a foothold in the market.
what customers in established markets wanted
and so could rarely be initially employed there. In low-end disruption, the disruptor is focused initially on
They oered a dierent package of attributes serving the least protable customer, who is happy with a
valued only in emerging markets remote from, good enough product. This type of customer is not willing
and unimportant to, the mainstream.[11] to pay premium for enhancements in product functional-
ity. Once the disruptor has gained a foothold in this cus-
Christensen argues that disruptive innovations can hurt tomer segment, it seeks to improve its prot margin. To
successful, well-managed companies that are responsive get higher prot margins, the disruptor needs to enter the
to their customers and have excellent research and de- segment where the customer is willing to pay a little more
velopment. These companies tend to ignore the markets for higher quality. To ensure this quality in its product,
most susceptible to disruptive innovations, because the the disruptor needs to innovate. The incumbent will not
markets have very tight prot margins and are too small do much to retain its share in a not-so-protable segment,
to provide a good growth rate to an established (sizable) and will move up-market and focus on its more attrac-
rm.[12] Thus, disruptive technology provides an example tive customers. After a number of such encounters, the
of an instance when the common business-world advice to incumbent is squeezed into smaller markets than it was
"focus on the customer" (or stay close to the customer, previously serving. And then, nally, the disruptive tech-
or listen to the customer) can be strategically counter- nology meets the demands of the most protable segment
productive. and drives the established company out of the market.
While Christensen argued that disruptive innovations can New market disruption occurs when a product ts a new
hurt successful, well-managed companies, O'Ryan coun- or emerging market segment that is not being served by
tered that constructive integration of existing, new, and existing incumbents in the industry.
22.4. HIGH-TECHNOLOGY EFFECTS 71
The extrapolation of the theory to all aspects of life has value improve at such a rapid rate that the new
been challenged,[14][15] as has the methodology of re- technology can later invade those established
lying on selected case studies as the principal form of markets.[18]
[14]
evidence. Jill Lepore points out that some companies
identied by the theory as victims of disruption a decade Joseph Bower[19] explained the process of how disruptive
or more ago, rather than being defunct, remain domi- technology, through its requisite support net, dramatically
nant in their industries today (including Seagate Tech- transforms a certain industry.
nology, U.S. Steel, and Bucyrus).[14] Lepore questions
whether the theory has been oversold and misapplied, as When the technology that has the poten-
if it were able to explain everything in every sphere of tial for revolutionizing an industry emerges,
life, including not just business but education and public established companies typically see it as
institutions. [14] unattractive: its not something their main-
stream customers want, and its projected prot
margins arent sucient to cover big-company
22.3 Disruptive technology cost structure. As a result, the new technol-
ogy tends to get ignored in favor of whats cur-
rently popular with the best customers. But
In 2009, Milan Zeleny described high technology as dis- then another company steps in to bring the in-
ruptive technology and raised the question of what is be- novation to a new market. Once the disruptive
ing disrupted. The answer, according to Zeleny, is the technology becomes established there, smaller-
support network of high technology.[16] For example, in- scale innovation rapidly raise the technologys
troducing electric cars disrupts the support network for performance on attributes that mainstream cus-
gasoline cars (network of gas and service stations). Such tomers value.[20]
disruption is fully expected and therefore eectively re-
sisted by support net owners. In the long run, high (dis- The automobile was high technology with respect to the
ruptive) technology bypasses, upgrades, or replaces the horse carriage; however, it evolved into technology and -
outdated support network. nally into appropriate technology with a stable, unchang-
Technology, being a form of social relationship, always ing TSN. The main high-technology advance in the ong
evolves. No technology remains xed. Technology starts, is some form of electric carwhether the energy source
develops, persists, mutates, stagnates, and declines, just is the sun, hydrogen, water, air pressure, or traditional
like living organisms.[17] The evolutionary life cycle oc- charging outlet. Electric cars preceded the gasoline auto-
curs in the use and development of any technology. A mobile by many decades and are now returning to replace
new high-technology core emerges and challenges ex- the traditional gasoline automobile.
isting technology support nets (TSNs), which are thus Milan Zeleny described the above phenomenon.[21] He
forced to coevolve with it. New versions of the core are also wrote that:
designed and tted into an increasingly appropriate TSN,
with smaller and smaller high-technology eects. High Implementing high technology is often re-
technology becomes regular technology, with more e- sisted. This resistance is well understood on
cient versions tting the same support net. Finally, even the part of active participants in the requisite
the eciency gains diminish, emphasis shifts to prod- TSN. The electric car will be resisted by gas-
uct tertiary attributes (appearance, style), and technology station operators in the same way automated
becomes TSN-preserving appropriate technology. This teller machines (ATMs) were resisted by bank
technological equilibrium state becomes established and tellers and automobiles by horsewhip makers.
xated, resisting being interrupted by a technological mu- Technology does not qualitatively restructure
tation; then new high technology appears and the cycle is the TSN and therefore will not be resisted and
repeated. never has been resisted. Middle management
Regarding this evolving process of technology, resists business process reengineering because
Christensen said: BPR represents a direct assault on the sup-
port net (coordinative hierarchy) they thrive
on. Teamwork and multi-functionality is re-
The technological changes that damage
sisted by those whose TSN provides the com-
established companies are usually not radically
fort of narrow specialization and command-
new or dicult from a technological point of
driven work.[22]
view. They do, however, have two important
characteristics: First, they typically present a
dierent package of performance attributes
ones that, at least at the outset, are not val- 22.4 High-technology eects
ued by existing customers. Second, the per-
formance attributes that existing customers do High technology is a technology core that changes the
72 CHAPTER 22. DISRUPTIVE INNOVATION
[16] Zeleny, Milan. High Technology and Barriers to Innova- 22.9 References
tion: From Globalization to Localization. International
Journal of Information Technology & Decision Making.
Anthony, Scott D.; Johnson, Mark W.; Sineld,
World Scientic. 11: P 441.
Joseph V.; Altman, Elizabeth J. (2008). Innovators
[17] Oliver, Gassmann (May 2006). Opening up the innova- Guide to Growth - Putting Disruptive Innovation to
tion process: towards an agenda. R&D Management. 36 Work. Harvard Business School Press. ISBN 978-
(03): P 223366. doi:10.1111/j.1467-9310.2006.00437. 1-59139-846-2.
74 CHAPTER 22. DISRUPTIVE INNOVATION
E.164
E.164 is an ITU-T recommendation, titled The inter- 23.1.1 Number structure for geographic
national public telecommunication numbering plan, that area
denes a numbering plan for the world-wide public
switched telephone network (PSTN) and some other data
networks.
23.1.2 Number structure for global ser-
vices
E.164 denes a general format for international telephone
numbers. Plan-conforming numbers are limited to a [2]
Figure 2
maximum of 15 digits, excluding the international call
prex.[1] The presentation of a number is usually prexed
with the plus sign (+), indicating that the number includes
the country calling code. When dialing, the number must 23.1.3 Number structure for networks
typically be prexed with the appropriate international
call prex (in place of the plus sign), which is a trunk code
to reach an international circuit from within the country 23.1.4 Number structure for groups of
of call origination. countries
The title of the original version and rst revision of the
E.164 standard was Numbering Plan for the ISDN Era. 23.2 Recommendations
23.2.1 E.163
76
23.4. SEE ALSO 77
Elastix
Elastix is an unied communications server software that 24.2 Call center module
brings together IP PBX, email, IM, faxing and collabora-
tion functionality. It has a Web interface and includes Elastix 2.5 was the rst distribution that included a call
capabilities such as a call center software with predictive center module with a predictive dialer, released entirely
dialing. as free software. This module can be installed from
The Elastix 2.5 functionality is based on open source the same web-based Elastix interface through a module
projects including Asterisk, FreePBX, HylaFAX, loader. The call center module can handle incoming and
Openre and Postx. Those packages oer the PBX, outgoing campaigns. It can also optionally be made more
fax, instant messaging and email functions, respectively. powerful by adding common third party modules like
QueueMetrics [4] and WombatDialer.[5]
As of Elastix 5.0 all functionality is provided through
3CX, a software based private branch exchange (PBX)
based on the SIP (Session Initiation Protocol) standard.
It enables extensions to make calls via the public switched 24.3 History of the project
telephone network (PSTN) or via Voice over Internet Pro-
tocol (VoIP) services. Elastix 5.0 is an IP business phone Elastix was created and maintained by PaloSanto So-
system that supports standard SIP soft/hard phones, VoIP lutions, an Open Source support company based in
services and traditional PSTN phone lines. Ecuador. Elastix was released to the public for the rst
Elastix 2.5 is free software, released under the GNU Gen- time in March 2006. It was not a complete distribution
eral Public License. Elastix 5.0 is Proprietary released but a Web interface for CDR (Call Detail Records) re-
under the terms of the 3CX license porting. It was not until late December 2006 that Elastix
was released as a Linux distribution with asterisk, zaptel
and a number of other packages which were easily ad-
ministrated via a user friendly Web interface that caught
the communitys attention.
The Elastix 2.5 Linux distribution is based on CentOS,
which has binary compatibility with Red Hat Enterprise
24.1 Support for telephony hard- Linux.
ware From its initial release until now the Elastix distro has
grown in popularity. The project was nominated for
two straight years (2007[6] and 2008[7] ) as nalist in the
SourceForge Community Choice Awards.
Elastix 2.5 has a good support for telephony hardware.[2]
It includes drivers for the major manufacturers like In 2016 the Elastix project was acquired by 3CX. With
Dinstar, OpenVox, Digium, Khomp,[3] Sangoma Tech- this acquisition the Elastix Distro versioned at 5.0 was
nologies Corporation, Rhino Equipment, Xorcom, and switched to a branded Debian install with the 3CX plat-
Yeastar. The most of these drivers are supported through form [8]
the zaptel project or modied versions of it. Other drivers
are supported by the mISDN project and other projects.
Elastix 2.5 also supports other phone brands thanks to the 24.4 Similar software distributions
SIP and IAX protocols that Asterisk implements. These
protocols are based on public available standards. For this AsteriskNOW Uses FreePBX GUI Maintained by
reason any manufacturer can build a product that supports Digium
them. Some certied manufacturers are Ascom, Snom
and Yealink. FreePBX Distro Ocial Distro of the FreePBX
78
24.6. EXTERNAL LINKS 79
24.5 References
[1] Elastix.org. Elastix.org. Retrieved June 21, 2016.
[8] http://www.elastix.org/blog/elastix-5-powered-by-3cx/.
Retrieved 7 December 2016. Missing or empty |title=
(help)
Emergency service
80
25.4. LOCATION-SPECIFIC EMERGENCY SERVICES 81
services, usually at sea (such as by the RNLI in the Emergency social services
United Kingdom).
Community emergency response teams help or-
Mountain rescue to provide search and rescue in ganize facilities such as rest centers during large
mountainous areas, and sometimes in other wilder- emergencies
ness environments.
Disaster relief such as services provided by the
Cave rescue to rescue people injured, trapped, or Red Cross and Salvation Army
lost during caving explorations.
Famine relief teams
Mine rescue specially trained and equipped to
rescue miners trapped by res, explosions, cave-ins, Amateur radio communications groups provide
toxic gas, ooding, etc. communications support during emergencies
Technical rescue other types of technical or Poison Control providing specialist support for
heavy rescue, but usually specic to a discipline poisoning
(such as swift water).
Animal control can assist or lead response to
Search and rescue can be discipline-specic, such emergencies involving animals
as urban, wildland, maritime, etc.
Forest Service
Wildland reghting to size-up, contain, extin-
guish, and mop-up wildres. St. John Ambulance / Red Cross / Order of Malta
Ambulance Corps Medical & First Aid Support
Bomb disposal to render safe hazardous explo-
sive ordnance, such as terrorist devices, unexploded
wartime bombs and other, explosive materials. 25.4 Location-specic emergency
Blood/organ transplant supply to provide organs services
or blood on an emergency basis, such as the National
Blood Service of the United Kingdom.
Some locations have emergency services dedicated to
Emergency management to provide and co- them, and whilst this does not necessarily preclude em-
ordinate resources during large-scale emergencies. ployees using their skills outside this area (or be used to
support other emergency services outside their area), they
Amateur radio emergency communications to are primarily focused on the safety or security of a given
provide communications support to other emer- geographical place.
gency services, such as RAYNET in the UK.
HAZ-MAT removal of hazardous materials. Park rangers looking after many emergencies
within their given area, including re, medical and
Air search providing aerial spotting for the emer- security issues
gency services, such as conducted by the Civil Air
Patrol in the US, or Sky Watch in the UK. Lifeguards charged with reacting to emergencies
within their own given remit area, usually a pool,
beach or open water area
25.3 Civil emergency services
These groups and organizations respond to emergencies 25.5 Cooperation
and provide other safety-related services either as a part
of their on-the-job duties, as part of the main mission of Eective emergency service management requires agen-
their business or concern, or as part of their hobbies. cies from many dierent services to work closely together
and to have open lines of communication. Most services
Public utilities safeguarding gas, electricity and do, or should, have procedures and liaisons in place to en-
water, which are all potentially hazardous if infras- sure this, although absence of these can be severely detri-
tructure fails mental to good working. There can sometimes be tension
between services for a number of other reasons, including
Emergency road service provide repair or recov- professional versus voluntary crew members, or simply
ery for disabled or crashed vehicles based on area or division.
Civilian Trac Ocers such as operated by the To aid eective communications, dierent services may
Highways Agency in the UK to facilitate clearup and share common practices and protocol for certain large-
trac ow at road trac collisions scale emergencies. In the UK, commonly used shared
82 CHAPTER 25. EMERGENCY SERVICE
protocols include CHALET and ETHANE while in the Emergency service response codes
US, the Department of Homeland Security has called
for nationwide implementation of the National Incident Emergency telephone number
Management System (NIMS),[2] of which the Incident Incident response team
Command System (ICS) is a part.[3]
Public safety
Civil defense
Disaster relief
Emergency management
Chapter 26
Federated VoIP
Federated VoIP is a form of packetized voice telephony is specied in Domain Certicates in the Session Ini-
that uses voice over IP between autonomous domains in tiation Protocol and the Extensible Messaging and
the public Internet without the deployment of central vir- Presence Protocol (XMPP): Core (s13.7)
tual exchange points or switching centers for trac rout-
ing. Federated VoIP uses decentralized addressing sys- the Debian project describes federated VoIP as part
tems, such as ENUM, for location and identity informa- of their Unied communications initiative
tion of participants and implements secure, trusted com-
the OpenTelecoms project describes federated VoIP
munications (TLS) for identify verication.
and gives various implementation examples
83
84 CHAPTER 26. FEDERATED VOIP
SIP Broker
iNum Initiative
26.5 References
[1] Using reSIProcate for Federated VoIP. reSIProcate.
2012. Retrieved 2012-05-11.
FreePBX
FreePBX is a web-based open source graphical user in- Module Admin Security Auditing, Chan Motif
terface (GUI) that manages Asterisk, a voice over IP and Module, WebRTC User Control Panel[5]
telephony server.[1]
FreePBX 12 STABLE Release 2014-06-23-
FreePBX is licensed under the GNU General Public Li- Adds support for Asterisk 12&13, New User Con-
cense version 3.[2] It is a component of the FreePBX Dis- trol Panel, Module Admin version control, PJSIP
tro, which is an independently maintained Linux system Support
derived from the source code of the CentOS distribution,
having Asterisk pre-installed. It is also included in vari- FreePBX 13 - Stable - adds responsive GUI, sup-
ous third-party distributions such as The FreePBX Distro port for Asterisk 13, Call Event Logging CEL and
and AsteriskNow. reporting, fwconsole CLI system management, En-
hanced Bulk User Management, expanded localiza-
FreePBX was acquired by Schmooze.com in early
tion support for audio and sound les, and a new
2013;[3] that rm was in turn taken over by Sangoma
global search option.
Technologies Corporation on Jan 2, 2015.
FREEPBX 14 - Beta, in development
85
86 CHAPTER 27. FREEPBX
Documentation
Community Forum
Chapter 28
FreeSWITCH
FreeSWITCH is a free and open source communica- Apache Portable Runtime (APR and APR-Util)
tions software for the creation of voice and messaging
SQLite a lightweight implementation of a SQL en-
products. It is licensed under the Mozilla Public Li-
gine
cense (MPL), a free software license. Its core library,
libfreeswitch, is capable of being embedded into other PCRE Perl Compatible Regular Expressions
projects, as well as being used as a stand-alone applica-
tion. Soa-SIP an open-source SIP user agent library
libspeex Speex DSP library (replaced libresample
as of version 1.0.3)
28.1 History mod_spandsp for T.38 fax gateway or passthrough
are supported.
The FreeSWITCH project was rst announced in January libSRTP an open-source implementation of the
2006 at O'Reilly Media's ETEL Conference.[1] In June Secure Real-time Transport Protocol
2007, FreeSWITCH was selected by Truphone for use,[2]
and in August 2007, Gaboogie announced that it selected Not all of these software dependencies are required to
FreeSWITCH as its conferencing platform.[3] build the core freeswitch application, but are depen-
FreeSWITCHs rst ocial 1.0.0 release (Phoenix) was dencies of various external modules, such as codecs.
on May 26, 2008.[4] A minor 1.0.1 patch release came FreeSWITCH is a modular application, in which mod-
out on July 24, 2008.[5] At ClueCon 2012 Anthony Mi- ules can extend the functionality but the abstraction layer
nessale announced[6] the release of FreeSWITCH version prevents inter-module dependency. The goal is to ensure
[12]
[7]
1.2.0 and that the FreeSWITCH development team had that one module is not required to load another.
adopted separate stable (version 1.2) and development
(version 1.3) branches.
FreeSWITCH 1.4, released at early 2014, is the rst ver-
28.3 Features
sion support SIP over Websocket and WebRTC.
FreeSWITCH includes many modules that provide many
Also in 2014, Tuenti announced that it selected telephony applications, such as conferencing, XML-RPC
FreeSWITCH as a main component for its platform.[8] control of live calls, interactive voice response (IVR),
FreeSWITCH 1.6 is the rst version that supports video speech synthesis and speech recognition, public switched
transcoding and video conferencing. telephone network (PSTN) interfaces for analogue and
digital circuits, voice over IP protocols including Session
Initiation Protocol (SIP), Verto, Skinny Client Control
Protocol (SCCP), H.323, Extensible Messaging and Pres-
28.2 Design ence Protocol (XMPP), GoogleTalk, T.38 and others.[13]
FreeSWITCH provides an application programming in-
According to the lead designer, Anthony Minessale,[9] terface that exposes primitives for call control and IVR
FreeSWITCH is intended to be a softswitch that is built functionality. Applications may be written in the C lan-
on top of a solid core, driven by a state machine.[10] The guage, C++, Python, Perl, Lua, JavaScript, Java and Mi-
stated goals of the project include stability, scalability, crosoft .NET via Microsofts CLR or via Mono.[14]
and abstraction. Call control applications can use the Event Socket,
To reduce complexity, FreeSWITCH uses freely avail- which is an Internet socket-based communications fa-
able software libraries that perform needed functions. cility within FreeSWITCH providing a language inde-
Some dependencies are:[11] pendent interface. The Event Socket Library (ESL)
87
88 CHAPTER 28. FREESWITCH
GSM
90
29.2. TECHNICAL DETAILS 91
PSTN
4 5 6
7 8 9
PSTN
VLR
year, Telecom Australia became the rst network opera- ME: Mobile
Equipment
MT/TE
CS: Circuit
Switched
4
#
1 2
0
3
G
GMSC
B
tor to deploy a GSM network outside Europe and the rst MSC: Mobile
Switching Centre
D
HSS
Um Nc
practical hand-held GSM mobile phone became avail- Abis Nb 4
#
1 2
0
3
*
E 4
#
1 2
0
3
*
C
H
A
able. BSC:
CS-MGW
Mc
MSC server
HLR
F
AuC
SIM-ME
BTS: Base Base Station
the 850 MHz and 1900 MHz bands were used instead
(for example in Canada and the United States). In rare
cases the 400 and 450 MHz frequency bands are assigned
in some countries because they were previously used for
rst-generation systems.
Most 3G networks in Europe operate in the 2100 MHz
frequency band. For more information on worldwide
GSM frequency usage, see GSM frequency bands.
Regardless of the frequency selected by an operator, it is
divided into timeslots for individual phones. This allows
eight full-rate or sixteen half-rate speech channels per
radio frequency. These eight radio timeslots (or burst pe-
riods) are grouped into a TDMA frame. Half-rate chan-
nels use alternate frames in the same timeslot. The chan-
nel data rate for all 8 channels is 270.833 kbit/s, and the
frame duration is 4.615 ms.
The transmission power in the handset is limited to a max-
imum of 2 watts in GSM 850/900 and 1 watt in GSM
1800/1900.
Voice codecs
other free software distributor to guarantee immunity RRLP Radio Resource Location Protocol
from all lawsuits by the patent holders against the users.
GSM 03.48 Security mechanisms for the
Furthermore, new features are being added to the stan-
SIM application toolkit
dard all the time which means they have patent protection
for a number of years. RTP audio video prole
The original GSM implementations from 1991 may now
be entirely free of patent encumbrances, however patent Enhanced Network Selection (ENS)
freedom is not certain due to the United States rst to
invent system that was in place until 2012. The rst to GSM frequency bands
invent system, coupled with patent term adjustment
can extend the life of a U.S. patent far beyond 20 years GSM USSD codes Unstructured Supplementary
from its priority date. It is unclear at this time whether Service Data: list of all standard GSM codes for net-
OpenBTS will be able to implement features of that initial work and SIM related functions
specication without limit. As patents subsequently ex-
pire, however, those features can be added into the open- GSM forwarding standard features codes list of
source version. As of 2011, there have been no lawsuits call forward codes working with all operators and
against users of OpenBTS over GSM use. phones
[8] Cellular History. etsi.org. European Telecommunica- [23] cPanel. Infosecurityguard.com. Retrieved 30 August
tions Standards Institute. 2011. Archived from the origi- 2010.
nal on 5 May 2011. Retrieved 5 May 2011. The task was
entrusted to a committee known as Groupe Spcial Mo- [24] Codebreaker Karsten Nohl: Why Your Phone Is Insecure
bile (GSMTM), aided by a permanent nucleus of tech- By Design. Forbes.com. 12 August 2011. Retrieved 13
nical support personnel, based in Paris. August 2011.
[9] Who created GSM?". Stephen Temple. Retrieved 7 [25] GSM UMTS 3GPP Numbering Cross Reference.
April 2013. Before GSM, Europe had a disastrous mish- ETSI. Retrieved 30 December 2009.
mash of national analogue standards in phones and TV,
[26] Gsmd Openmoko. Wiki.openmoko.org. 8 February
designed to protect national industries but instead creating
2010. Retrieved 22 April 2010.
fragmented markets vulnerable to big guns from abroad.
[10] Maailman ensimminen GSM-puhelu [Worlds rst [27] The Hackers Choice Wiki. Retrieved 30 August 2010.
GSM call]. yle.. Yelisradio OY. 22 February 2008. [28] OsmocomBB. Bb.osmocom.org. Retrieved 22 April
Archived from the original on 5 May 2011. Retrieved 5 2010.
May 2011. Harri Holkeri made the rst call on the Ra-
diolinja (Elisas subsidiary) network, at the opening cere- [29] YateBTS. Legba Inc. Retrieved 30 October 2014.
mony in Helsinki on 07.01.1991.
[11] GSM World statistics. gsmworld.com. GSM Associa-
tion. 2010. Archived from the original on 21 May 2010. 29.8 Further reading
Retrieved 8 June 2010.
[12] Mobile technologies GSM. Retrieved 7 November Redl, Siegmund M.; Weber, Matthias K.; Oliphant,
2013. Malcolm W (February 1995). An Introduction to
GSM. Artech House. ISBN 978-0-89006-785-7.
[13] Telstra switches o GSM network. TeleGeography.
2016-12-02. Retrieved 2016-12-02. Redl, Siegmund M.; Weber, Matthias K.; Oliphant,
[14] 2G Sunset (PDF). ATT Mobility. Retrieved 10 August Malcolm W (April 1998). GSM and Personal
2016. Communications Handbook. Artech House Mobile
Communications Library. Artech House. ISBN
[15] Motorola Demonstrates Long Range GSM Capability 978-0-89006-957-8.
300% More Coverage With New Extended Cell.
Archived 19 February 2012 at the Wayback Machine. Hillebrand, Friedhelm, ed. (December 2001). GSM
and UMTS, The Creation of Global Mobile Commu-
[16] GSM 06.51 version 4.0.1 (ZIP). ETSI. December 1997.
Retrieved 5 September 2007. nications. John Wiley & Sons. ISBN 978-0-470-
84322-2.
[17] Victoria Shannon (2007). iPhone Must Be Oered
Without Contract Restrictions, German Court Rules. Mouly, Michel; Pautet, Marie-Bernardette (June
The New York Times. Retrieved 2 February 2011. 2002). The GSM System for Mobile Communica-
tions. Telecom Publishing. ISBN 978-0-945592-
[18] Solutions to the GSM Security Weaknesses, Proceedings
of the 2nd IEEE International Conference on Next Gen-
15-0.
eration Mobile Applications, Services, and Technologies Salgues, Salgues B. (April 1997). Les tlcoms mo-
(NGMAST2008), pp.576581, Cardi, UK, September
biles GSM DCS. Hermes (2nd ed.). Hermes Sciences
2008, arXiv:1002.3175
Publications. ISBN 2866016068.
[19] The A5/1 Cracking Project. http://www.scribd.com.
Retrieved 3 Nov 2011. |rst1= missing |last1= in Authors
list (help); External link in |publisher= (help)
29.9 External links
[20] Kevin J. O'Brien (28 December 2009). Cellphone En-
cryption Code Is Divulged. New York Times. GSM AssociationOcial industry trade group
[21] A5/1 Cracking Project. Archived from the original on representing GSM network operators worldwide
25 December 2009. Retrieved 30 December 2009.
3GPP3G GSM standards development group
[22] Owano, Nancy (27 Dec 2011). GSM phones -- call them
unsafe, says security expert. Archived from the original
on 27 Dec 2011. Retrieved 27 Dec 2011. Nohl said that
he was able to intercept voice and text conversations by
impersonating another user to listen to their voice mails
or make calls or send text messages. Even more troubling
was that he was able to pull this o using a seven-year-
old Motorola cellphone and decryption software available
free o the Internet.
Chapter 30
ISDN redirects here. For other uses, see ISDN (disam- data), in increments of 64 kilobit/s. In some countries,
biguation). ISDN found major market application for Internet ac-
Not to be confused with SDN (Software-dened network- cess, in which ISDN typically provides a maximum of
ing). 128 kbit/s bandwidth in both upstream and downstream
Integrated Services Digital Network (ISDN) is a directions. Channel bonding can achieve a greater data
rate; typically the ISDN B-channels of three or four BRIs
(six to eight 64 kbit/s channels) are bonded.
ISDN is employed as the network, data-link and physical
layers in the context of the OSI model, or could be consid-
ered a suite of digital services existing on layers 1, 2, and 3
of the OSI model. In common use, ISDN is often limited
to usage to Q.931 and related protocols, which are a set
of signaling protocols establishing and breaking circuit-
switched connections, and for advanced calling features
for the user. They were introduced in 1986.[2]
In a videoconference, ISDN provides simultaneous voice,
video, and text transmission between individual desktop
videoconferencing systems and group (room) videocon-
ferencing systems.
96
30.4. BEARER CHANNELS 97
face (BRI), a 128 kbit/s service delivered over a pair of n*24B. D-channel backup allows for a second D chan-
standard telephone copper wires.[4] The 144 kbit/s pay- nel in case the primary fails. NFAS is commonly used on
load rate is broken down into two 64 kbit/s bearer chan- a T3.
nels ('B' channels) and one 16 kbit/s signaling channel ('D' PRI-ISDN is popular throughout the world, especially for
channel or data channel). This is sometimes referred to connecting private branch exchanges to the public net-
as 2B+D.[5] work.
The interface species the following network interfaces:
Even though many network professionals use the term
ISDN to refer to the lower-bandwidth BRI circuit, in
The U interface is a two-wire interface between the North America BRI is relatively uncommon whilst PRI
exchange and a network terminating unit, which is circuits serving PBXs are commonplace.
usually the demarcation point in non-North Ameri-
can networks.
India France
Bharat Sanchar Nigam Limited, Reliance Communica- France Telecom oers ISDN services under their prod-
tions and Bharti Airtel are the largest communication uct name Numeris (2 B+D), of which a professional Duo
service providers, and oer both ISDN BRI and PRI and home Itoo version is available. ISDN is generally
services across the country. Reliance Communications known as RNIS in France and has widespread availability.
and Bharti Airtel uses the DLC technology for provid- The introduction of ADSL is reducing ISDN use for data
ing these services. With the introduction of broadband transfer and Internet access, although it is still common in
technology, the load on bandwidth is being absorbed by more rural and outlying areas, and for applications such
ADSL. ISDN continues to be an important backup net- as business voice and point-of-sale terminals.
work for point-to-point leased line customers such as
banks, Eseva Centers,[18] Life Insurance Corporation of
Germany
India, and SBI ATMs.
Japan
fers ISDN BRI (BRA) services in Greece. Following the Another alternative ISDN conguration can be used in
launch of ADSL in 2003, the importance of ISDN for which the B channels of an ISDN BRI line are bonded
data transfer began to decrease and is today limited to to provide a total duplex bandwidth of 128 kbit/s. This
niche business applications with point-to-point require- precludes use of the line for voice calls while the inter-
ments. net connection is in use. The B channels of several BRIs
can be bonded, a typical use is a 384K videoconferencing
channel.
30.8.3 International deployment
Using bipolar with eight-zero substitution encoding tech-
A study of the German Department of Science shows nique, call data is transmitted over the data (B) channels,
[25]
the following spread of ISDN-channels per 1,000 inhab- with the signaling (D) channels used for call setup and
itants in the year 2005: management. Once a call is set up, there is a simple
64 kbit/s synchronous bidirectional data channel (actu-
ally implemented as two simplex channels, one in each
Norway 401 direction) between the end parties, lasting until the call is
Denmark 339 terminated. There can be as many calls as there are bearer
channels, to the same or dierent end-points. Bearer
Germany 333 channels may also be multiplexed into what may be con-
sidered single, higher-bandwidth channels via a process
Switzerland 331 called B channel BONDING, or via use of Multi-Link
Japan 240 PPP bundling or by using an H0, H11, or H12 channel
on a PRI.
UK 160 The D channel can also be used for sending and receiving
Finland 160 X.25 data packets, and connection to X.25 packet net-
work, this is specied in X.31. In practice, X.31 was
Sweden 135 only commercially implemented in UK, France, Japan
and Germany.
Italy 105
France 85
30.10 Reference points
Spain 58
United States 47 A set of reference points are dened in the ISDN standard
to refer to certain points between the telco and the end
user ISDN equipment.
30.9 Congurations
R denes the point between a non-ISDN terminal
equipment 2 (TE2) device and a terminal adapter
In ISDN, there are two types of channels, B (for bearer)
(TA) which provides translation to and from such a
and D (for data). B channels are used for data (which
device
may include voice), and D channels are intended for sig-
naling and control (but can also be used for data). S denes the point between the ISDN terminal
There are two ISDN implementations. Basic Rate Inter- equipment 1 (TE1) or TA and a Network Termina-
face (BRI), also called basic rate access (BRA) con- tion Type 2 (NT2) device
sists of two B channels, each with bandwidth of 64 kbit/s, T denes the point between the NT2 and network
and one D channel with a bandwidth of 16 kbit/s. To- termination 1 (NT1) devices.
gether these three channels can be designated as 2B+D.
Primary Rate Interface (PRI), also called primary rate ac-
cess (PRA) in Europe contains a greater number of B Most NT-1 devices can perform the functions of the NT2
channels and a D channel with a bandwidth of 64 kbit/s. as well, and so the S and T reference points are generally
The number of B channels for PRI varies according to the collapsed into the S/T reference point.
nation: in North America and Japan it is 23B+1D, with In North America, the NT1 device is considered
an aggregate bit rate of 1.544 Mbit/s (T1); in Europe, In- customer premises equipment (CPE) and must be main-
dia and Australia it is 30B+1D, with an aggregate bit rate tained by the customer, thus, the U interface is provided
of 2.048 Mbit/s (E1). Broadband Integrated Services to the customer. In other locations, the NT1 device is
Digital Network (BISDN) is another ISDN implementa- maintained by the telco, and the S/T interface is provided
tion and it is able to manage dierent types of services at to the customer. In India, service providers provide U in-
the same time. It is primarily used within network back- terface and an NT1 may be supplied by Service provider
bones and employs ATM. as part of service oering.
30.13. SEE ALSO 101
ADSL
DSS1 (ETSI "Euro-ISDN, also used in many non-
European countries) ATM
IpDTL
NI-1 (US National ISDN Phase 1)
H.320
NI-2 (US National ISDN Phase 2) ETSI
Specications dening the physical layer and part of the [2] Aaron, R; Wyndrum, R (March 1986). Future
data link layers of ISDN: trends (PDF). IEEE Communications Maga-
zine. AT&T Bell Laboratories. 24 (3): 3843.
doi:10.1109/MCOM.1986.1093028. Retrieved 2
ISDN BRI: ITU-T I.430. September 2007.
ISDN PRI: ITU-T I.431. [3] Robin, G; Treves, S (July 1979). Pragmatic Introduction
of Digital Switching and Transmission in Existing Net-
works. IEEE Transactions on Communications. 27 (7):
From the point of view of the OSI architecture, an ISDN 1071. doi:10.1109/TCOM.1979.1094494.
line has a stack of three protocols
[4] Verizon: No Longer Taking Orders for ISDN Service in
Northeast Starting May 18. Talkers. March 28, 2013.
physical layer Retrieved April 6, 2013.
network layer (the ISDN protocol, properly) [6] What Is Basic Rate Interface?". Retrieved April 6, 2013.
30.16. EXTERNAL LINKS 103
[11] Green, James Harry (26 October 2005). The Irwin Hand-
book of Telecommunications (5 ed.). McGraw-Hill Pro-
fessional. p. 770. ISBN 978-0-07-145222-9. Retrieved
12 May 2012.
IVR redirects here. For other uses, see IVR (disam- integration (CTI) with IVR systems. IVR became vi-
biguation). tal for call centers deploying universal queuing and rout-
ing solutions and acted as an agent which collected cus-
tomer data to enable intelligent routing decisions. With
Interactive voice response (IVR) is a technology that
allows a computer to interact with humans through the improvements in technology, systems could use speaker-
independent voice recognition of a limited vocabulary in-
use of voice and DTMF tones input via keypad. In
telecommunications, IVR allows customers to interact stead of requiring the person to use DTMF signaling.
with a companys host system via a telephone keypad or Starting in the 2000s, voice response became more com-
by speech recognition, after which services can be in- mon and cheaper to deploy. This was due to increased
quired about through the IVR dialogue. IVR systems can CPU power and the migration of speech applications
respond with prerecorded or dynamically generated au- from proprietary code to the VXML standard.
dio to further direct users on how to proceed. IVR sys-
tems deployed in the network are sized to handle large
call volumes and also used for outbound calling, as IVR 31.2 Technology
systems are more intelligent than many predictive dialer
systems.[1]
DTMF decoding and speech recognition are used to inter-
IVR systems can be used for mobile purchases, bank- pret the callers response to voice prompts. DTMF tones
ing payments and services, retail orders, utilities, travel are entered via the telephone keypad.
information and weather conditions. A common mis-
Other technologies include using text-to-speech (TTS) to
conception refers to an automated attendant as an IVR.
speak complex and dynamic information, such as e-mails,
The terms are distinct and mean dierent things to tradi-
news reports or weather information. IVR technology is
tional telecommunications professionalsthe purpose of
also being introduced into automobile systems for hands-
an IVR is to take input, process it, and return a result,
free operation. TTS is computer generated synthesized
whereas the job of an automated attendant is to route
speech that is no longer the robotic voice traditionally as-
calls. The term voice response unit (VRU), is some-
sociated with computers. Real voices create the speech
times used as well.[2]
in fragments that are spliced together (concatenated) and
smoothed before being played to the caller.
An IVR can be deployed in several ways:
31.1 History
1. Equipment installed on the customer premises
Despite the increase in IVR technology during the 1970s,
the technology was considered complex and expensive 2. Equipment installed in the PSTN (public switched
for automating tasks in call centers.[3] Early voice re- telephone network)
sponse systems were DSP technology based and limited 3. Application service provider (ASP) / hosted IVR
to small vocabularies. In the early 1980s, Leon Ferbers
Perception Technology became the rst mainstream mar- An automatic call distributor (ACD) is often the rst
ket competitor, after hard drive technology (read/write point of contact when calling many larger businesses.
random-access to digitized voice data) had reached a cost An ACD uses digital storage devices to play greetings
eective price point. At that time, a system could store or announcements, but typically routes a caller without
digitized speech on disk, play the appropriate spoken prompting for input. An IVR can play announcements
message, and process the humans DTMF response. and request an input from the caller. This information
As call centers began to migrate to multimedia in the late can be used to prole the caller and route the call to an
1990s, companies started to invest in computer telephony agent with a particular skill set. (A skill set is a function
104
31.3. USAGE 105
applied to a group of call-center agents with a particular sentation layer (typically VoiceXML) can be automati-
skill.) cally generated. In addition, these tools normally provide
Interactive voice response can be used to front-end a call extension mechanisms for software integration, such as
center operation by identifying the needs of the caller. an HTTP interface to a web site and a Java interface for
Information can be obtained from the caller such as an connecting to a database.
account number. Answers to simple questions such as ac- In telecommunications, an audio response unit (ARU)
count balances or pre-recorded information can be pro- is a device that provides synthesized voice responses to
vided without operator intervention. Account numbers DTMF keypresses by processing calls based on (a) the
from the IVR are often compared to caller ID data for se- call-originator input, (b) information received from a
curity reasons and additional IVR responses are required database, and (c) information in the incoming call, such
if the caller ID does not match the account record.[4][5][6]as the time of day. ARUs increase the number of in-
IVR call ows are created in a variety of ways. A tra- formation calls handled and provide consistent quality in
ditional IVR depended upon proprietary programming information retrieval.
or scripting languages, whereas modern IVR applications
are generated in a similar way to Web pages, using stan-
dards such as VoiceXML,[7] CCXML,[8] SRGS[9] and
SSML.[10] The ability to use XML-driven applications al-
31.3 Usage
lows a web server to act as the application server, freeing
the IVR developer to focus on the call ow. IVR systems are used to service high call volumes, re-
duce cost and improve the customer experience. The use
IVR speech recognition interactions (call ows) are de-
of IVR and voice automation allows callers queries to be
signed using 3 approaches to prompt for - and recognize
resolved without the need for queueing and incurring the
- user input: directed dialogue, open-ended, and mixed
cost of a live agent. If callers do not nd the informa-
dialogue.[11][12][13]
tion they need or require further assistance, the calls are
A directed dialogue prompt communicates a set of valid often transferred to an agent. This produces an ecient
responses to the user (e.g. How can I help you? ... Say system, which allows agents have more time to deal with
something like, account balance, order status, or more op- complex interactions. When an IVR system answers mul-
tions"). An open-ended prompt does not communicate a tiple phone numbers, the use of DNIS ensures that the
set of valid responses (e.g. How can I help you?"). In correct application and language is executed. A single
both cases, the goal is to glean a valid spoken response large IVR system can handle calls for thousands of appli-
from the user. The key dierence is that with directed cations, each with its own phone numbers and script.
dialogue, the user is more likely to speak an option ex-
Call centers use IVR systems to identify and segment
actly as was communicated by the prompt (e.g. ac-
callers. The ability to identify customers allows services
count balance). With an open-ended prompt however,
to be tailored according to the customer prole. The
the user is likely to include extraneous words or phrases
caller can be given the option to wait in the queue, choose
(e.g. I was just looking at my bill and saw that my bal-
an automated service, or request a callback. The system
ance was wrong.). The open-ended prompt requires a
may obtain caller line identication (CLI) data from the
greater degree of natural language processing to extract
network to help identify or authenticate the caller. Ad-
the relevant information from the phrase (i.e. balance).
ditional caller authentication data could include account
Open-ended recognition also requires a larger grammar
number, personal information, password and biometrics
set, which accounts for a wider array of permutations of
(such as voice print). IVR also enables customer priori-
a given response (e.g. balance was wrong, wrong bal-
tization. In a system wherein individual customers may
ance, balance is high, high balance). Despite the
have a dierent status, the service will automatically pri-
greater amount of data and processing required for open-
oritize the individuals call and move customers to the
ended prompts, they are more interactively ecient, as
front of a specic queue.
the prompts themselves are typically much shorter.[11]
IVRs will also log call detail information into its own
A mixed dialogue approach involves shifting from open-
database for auditing, performance report, and future
ended to directed dialogue or vice-versa within the same
IVR system enhancements. CTI allows a contact cen-
interaction, as one type of prompt may be more eec-
ter or organization to gather information about the caller
tive in a given situation. Mixed dialog prompts must also
as a means of directing the inquiry to the appropriate
be able to recognize responses that are not relevant to
agent. CTI can transfer relevant information about the
the immediate prompt, for instance in the case of a user
individual customer and the IVR dialog from the IVR
deciding to shift to a function dierent from the current
to the agent desktop using a screen-pop, making for a
one.[13][12]
more eective and ecient service. Voice-activated di-
Higher level IVR development tools are available to fur- aling (VAD) IVR systems are used to automate routine
ther simplify the application development process. A call enquiries to switchboard or PABX (Private Automatic
ow diagram can be drawn with a GUI tool and the pre- Branch eXchange) operators, and are used in many hos-
106 CHAPTER 31. INTERACTIVE VOICE RESPONSE
pitals and large businesses to reduce the caller waiting 31.4.1 Video
time. An additional function is the ability to allow ex-
ternal callers to page sta and transfer the inbound call The introduction of Session Initiation Protocol (SIP)
to the paged person. IVR can be used to provide a more means that point-to-point communications are no longer
sophisticated voice mail experience to the caller. restricted to voice calls but can now be extended to mul-
timedia technologies such as video. IVR manufacturers
have extended their systems into IVVR (interactive voice
31.3.1 Banking and video response), especially for the mobile phone net-
works. The use of video gives IVR systems the ability to
Banking institutions are reliant on IVR systems for cus- implement multimodal interaction with the caller.
tomer engagement and to extend business hours to a 24/7 The introduction of full-duplex video IVR in the future
operation. Telephone banking allows customers to check will allow systems the ability to read emotions and facial
balances and transaction histories as well as to make pay- expressions. It may also be used to identify the caller, us-
ments and transfers. As online channels have emerged, ing technology such as Iris scan or other biometric means.
banking customer satisfaction has decreased.[14] Recordings of the caller may be stored to monitor certain
transactions, and can be used to reduce identity fraud.[16]
31.3.2 Medical
31.4.2 SIP contact center
IVR systems are used by pharmaceutical companies and
contract research organizations to conduct clinical trials With the introduction of SIP contact centers, call control
and manage the large volumes of data generated. The in a SIP contact center can be implemented by CCXML
caller will respond to questions in their preferred languagescripting, which is an adjunct to the VXML language
and their responses will be logged into a database and pos- used to generate modern IVR dialogues. As calls are
sibly recorded at the same time to conrm authenticity. queued in the SIP contact center, the IVR system can pro-
Applications include patient randomization and drug sup- vide treatment or automation, wait for a xed period, or
ply management. They are also used in recording patient play music. Inbound calls to a SIP contact center must be
diaries and questionnaires.[15] queued or terminated against a SIP end point; SIP IVR
systems can be used to replace agents directly by the use
IVR systems allow callers to obtain data relatively anony-
of applications deployed using BBUA (back-to-back user
mously. Hospitals and clinics have used IVR systems to
agents).
allow callers to receive anonymous access to test results.
This is information that could easily be handled by a per-
son but the IVR system is used to preserve privacy and
avoid potential embarrassment of sensitive information 31.4.3 Interactive messaging response
or test results. Users are given a passcode to access their (IMR)
results.
Due to the introduction of instant messaging (IM) in con-
tact centers, agents can handle up to 6 dierent IM con-
31.3.3 Surveying versations at the same time, which increases agent pro-
ductivity. IVR technology is being used to automate IM
Some of the largest installed IVR platforms are used for conversations using existing natural language processing
televoting on television game shows, such as Pop Idol and software. This diers from email handling as email au-
Big Brother, which can generate enormous call spikes. tomated response is based on key word spotting and IM
The network provider will often deploy call gapping in conversations are conversational. The use of text messag-
the PSTN to prevent network overload. IVR may also be ing abbreviations and smilies requires dierent grammars
used by survey organizations to ask more sensitive ques- to those currently used for speech recognition. IM is also
tions where the investigators are concerned that a respon- starting to replace text messaging on multimedia mobile
dent might feel less comfortable providing these answers handsets.
to a human interlocutor (such as questions about drug use
or sexual behavior). In some cases, an IVR system can
be used in the same survey in conjunction with a human 31.4.4 Hosted vs. on-premises IVR
interviewer.
With the introduction of web services into the contact
center, host integration has been simplied, allowing IVR
applications to be hosted remotely from the contact cen-
31.4 Developments ter. This has meant hosted IVR applications using speech
are now available to smaller contact centers across the
31.7. REFERENCES 107
Dialog system [14] Comes, Sherry. Interactive Voice Response (IVR): The
missing link. IT Pro Protal.
DNIS
[15] Lam MY, Lee H, Bright R, Korzenik JR, Sands BE
Dual-tone multi-frequency (DTMF) (2009). Validation of interactive voice response system
administration of the Short Inammatory Bowel Disease
Questionnaire. Inamm.Bowel.Dis. 15 (4): 599607.
Electronic patient-reported outcome
doi:10.1002/ibd.20803. PMID 19023897.
Natural language [16] Goodbye IVR... Hello Visual IVR. No Jitter.
Speech recognition [17] Chat Bots Are Cool, But Will They Replace Humans?".
CMS Wire.
Speech synthesis
LinuxMCE
32.2 History
LinuxMCE was begun by Paul Webber as a fork of the 32.4 Software components
PlutoHome home automation software project. It was
adapted to run on top of a standard Linux distribution, The LinuxMCE package is installed on the Kubuntu
Kubuntu, as its base OS, rather than to exist as a custom OS, and utilizes open source applications such as
Linux distribution. Asterisk, Xine, MythTV, VDR, Firefox, VideoLAN and
Most of the core components, including the Orbiter (re- SlimServer. 64-bit versions of the LinuxMCE package
mote control) user interface, have undergone signicant are no longer under active development after 7.10.
improvements, and are licensed under the GPL. These programs have been given wrappers which allow
108
32.8. EXTERNAL LINKS 109
them to communicate with each other, and with the Ruby 25 minute demo video of LinuxMCE 0704
scripts that control the home automation components.
This communication is co-ordinated using a DCE (Data,
Commands, Events) protocol through a program called
the DCE Router. This added communications layer al-
lows trigger-command features such as pausing media
playback when an important phone call arrives, dimming
the lights while playing a movie, and allowing media play-
back to follow from computer to computer whenever a
Bluetooth enabled remote is carried between rooms.
The DCE communications protocol allows a single pro-
gram to present a standardized user interface, the Orbiter
UI, to the various devices and applications used within
the LinuxMCE system.
Currently, LinuxMCE uses the SVN system for col-
laborative updates. An active development community
for LinuxMCE has provided continuous developments in
2008, which has allowed the addition of a wide range of
devices to the current LinuxMCE version.
32.7 References
Not to be confused with H.248/Megaco, a similar The media gateway control protocol architecture and its
protocol. methodologies and programming interfaces are described
in RFC 2805.[3]
The Media Gateway Control Protocol (MGCP) is a MGCP is a master/slave protocol that allows a call con-
signaling and call control communications protocol used trol device such as a Call Agent to take control of a spe-
in voice over IP (VoIP) telecommunication systems. It cic port on a media gateway. In MGCP context media
implements the media gateway control protocol architec- gateway controller is referred to as call agent. This has
ture for controlling media gateways on Internet Protocol the advantage of centralized gateway administration and
(IP) networks connected to the public switched telephone provides for largely scalable IP Telephony solutions. The
network (PSTN).[1] The protocol is a successor to the distributed system is composed of a call agent, at least
Simple Gateway Control Protocol (SGCP), which was one media gateway (MG) that performs the conversion
developed by Bellcore and Cisco, and the Internet Pro- of media signals between circuits and packets switched
tocol Device Control (IPDC).[2] networks, and at least one signaling gateway (SG) when
The methodology of MGCP reects the structure of the connected to the PSTN.
PSTN with the power of the network residing in a call MGCP assumes a call control architecture where there
control center softswitch which is analogous to the central is limited intelligence at the edge (endpoints, media gate-
oce in the telephone network. The endpoints are low- ways) and intelligence at the core Call Agent. The MGCP
intelligence devices, mostly executing control commands assumes that Call Agents, will synchronize with each
and providing result indications in response. The protocol other to send coherent commands and responses to the
represents a decomposition of other VoIP models, such as gateways under their control.
H.323, in which the H.323 Gatekeeper, have higher levels
The Call Agent uses MGCP to tell the media gateway
of signaling intelligence. which events should be reported to the Call Agent, how
MGCP is a text-based protocol consisting of commands endpoints should be inter-connected, and which signals
and responses. It uses the Session Description Protocol should be activated on the endpoints.
(SDP) for specifying and negotiating the media streams to MGCP also allows the Call Agent to audit the current
be transmitted in a call session and the Real-time Trans- state of endpoints on a media gateway.
port Protocol (RTP) for framing the media streams.
The media gateway uses MGCP to report events, such as
o-hook or dialed digits, to the Call Agent.
33.1 Architecture While any signaling gateway is usually on the same phys-
ical switch as a media gateway, there is no such need.
The Call Agent does not use MGCP to control the Sig-
naling Gateway; rather, SIGTRAN protocols are used to
backhaul signaling between the Signaling Gateway and
Call Agent.
110
33.3. STANDARDS DOCUMENTS 111
Call Agents for each endpoint on the gateway (as pro- Three verbs are used by a call agent to manage the con-
grammed by the Call Agents, by setting the NotiedEn- nection between a media gateway.
tity parameter). In practice, however, it is usually desir-
able that at any given moment all endpoints on a gateway CRCX: Create Connection
should be controlled by the same Call Agent; other Call
Agents are available only to provide redundancy in the DLCX: Delete Connection. An endpoint may also
event that the primary Call Agent fails, or loses contact terminate a connection with this command.
with the media gateway. In the event of such a failure
MDCX: Modify Connection
it is the backup Call Agents responsibility to reprogram
the MG so that the gateway comes under the control of
the backup Call Agent. Care is needed in such cases; two One verb is used by a call agent to request notication of
Call Agents may know that they have lost contact with events on the endpoint, and to apply signals:
one another, but this does not guarantee that they are not
both attempting to control the same gateway. The abil- RQNT: Request for Notication
ity to audit the gateway to determine which Call Agent is
currently controlling can be used to resolve such conicts.One verb is used by a call agent to modify coding char-
MGCP assumes that the multiple Call Agents will main- acteristics expected by the line side of the endpoint:
tain knowledge of device state among themselves (pre-
sumably with an unspecied protocol) or rebuild it if nec- EPCF: Endpoint Conguration
essary (in the face of catastrophic failure). Its failover
features take into account both planned and unplanned One verb is used by an endpoint to indicate to the call
outages. agent that it has detected an event for which the call agent
had previously requested notication with the RQNT
command:
33.2 Protocol overview
NTFY: Notify
MGCP recognizes three essential elements of commu-
nication, the media gateway controller (call agent), the One verb is used by an endpoint to indicate to the call
media gateway endpoint, and connections between these agent that it is in the process of restarting:
entities. A media gateway may host multiple endpoints
and each endpoint should be able to engage in multiple RSIP: Restart In Progress
connections. Multiple connections on the endpoints sup-
port calling features such as call waiting and three-way
calling. 33.3 Standards documents
MGCP is a text-based protocol using a command and re-
sponse model. Commands and responses are encoded RFC 3435 - Media Gateway Control Protocol
in messages that are structured and formatted with the (MGCP) Version 1.0 (this supersedes RFC 2705)
whitespace characters space, horizontal tab, carriage re-
turn, and linefeed, and the colon and the full stop. Mes- RFC 3660 - Basic Media Gateway Control Protocol
sages are transmitted using the User Datagram Protocol (MGCP) Packages (informational)
(UDP). Media gateways use the port number 2427, and RFC 3661 - Media Gateway Control Protocol
call agents use 2727 by default. (MGCP) Return Code Usage
The message sequence of command (or request) and its
response is known as a transaction, which is identied by RFC 3064 - MGCP CAS Packages
the numerical Transaction Identier exchanged in each RFC 3149 - MGCP Business Phone Packages
transaction. The protocol specication denes nine stan-
dard commands that are distinguished by a four-letter RFC 3991 - Media Gateway Control Protocol
command verb: AUEP, AUCX, CRCX, DLCX, EPCF, (MGCP) Redirect and Reset Package
MDCX, NTFY, RQNT, and RSIP. Responses begin with
RFC 3992 - Media Gateway Control Protocol
a three-digit numerical response code that identies the
(MGCP) Lockstep State Reporting Mechanism (in-
outcome or result of the transaction.
formational)
Two verbs are used by a call agent to query the state of
an endpoint: RFC 2805 - Media Gateway Control Protocol Ar-
chitecture and Requirements
AUEP: Audit Endpoint
RFC 2897 - Proposal for an MGCP Advanced Au-
AUCX: Audit Connection dio Package
112 CHAPTER 33. MEDIA GATEWAY CONTROL PROTOCOL
33.4 Megaco
Another implementation of the media gateway control
protocol architecture is the H.248/Megaco protocol, a
collaboration of the Internet Engineering Task Force
(RFC 3525) and the International Telecommunication
Union (Recommendation H.248.1). Both protocols fol-
low the guidelines of the overlying media gateway control
protocol architecture, as described in RFC 2805. How-
ever, the protocols are incompatible due to dierences in
protocol syntax and underlying connection model.
33.6 References
[1] RFC 2805, Media Gateway Control Protocol Architecture
and Requirements, N. Greene, M. Ramalho, B. Rosen,
IETF, April 2000
113
114 CHAPTER 34. MEDIA GATEWAY CONTROL PROTOCOL ARCHITECTURE
H.248 (H.248.1 Gateway Control Protocol version 3) [6] title=Use of MEGACO vis--vis MGCP to build a Gate-
is published by International Telecommunication Union way Solution
Telecommunication (ITU-T) as a protocol standard. The
[7] SIP core working group charter h2.48 history. packe-
ITU-T has published three versions of H.248.1. The tizer.comg. Retrieved 2012-06-07.
IETF published it as Gateway Control Protocol Version
1 in informational RFC 3525. [8] Simple Gateway Control Protocol (SGCP. IETF. 30
July 1998. Retrieved 8 June 2012.
Both H.248 and MGCP are protocol for controlling me-
dia gateways using a media gateway controller or call [9] IPDC - Connection Control Protocol. IETF. August
agent. In a VoIP system, H.248 and MGCP are used with 1998. Retrieved 8 June 2012.
SIP or H.323. SIP or H.323 provide intercommunication
[10] Level 3 Communications, Bellcore Announce Merger
between gateway controllers and MGCP is used to man-
[15] of Protocol Specications for Voice Over IPe. Level 3
age media establishment in the media gateways. Communications. Retrieved 8 June 2012.
to do an attachment le transfer
35.1 Protocol design
to do some photo sharing (e.g., Image Share) based
on prior exchange of capabilities between the user
MSRP has similar syntax as other IETF text based proto- endpoints
col such as SIP, HTTP and RTSP. Each message is either
a request or a response, uses URIs, a message contains
headers and a body that can carry any type of data, in- MSRP session is set up through SIPs oer-answer[3]
cluding binary information. Unlike SIP, MSRP is much model. The SDP m-line media type is message and the
simpler. The rst 2 headers must be To-Path and From- protocol is either TCP/MSRP for MSRP over TCP and
Path and the last must be Content-Type, this signicantly TCP/TLS/MSRP for MSRP over secure TLS. Further-
reduces the complexity of parsers. Messages must also more, the MSRP URI is specied in a path attribute.
end with 7 dash ('-') characters, followed by a transac- A full SDP example, as provided by the RFC:
tion identier which appears in the rst line, these are fol-
v=0 o=alice 2890844526 2890844527 IN IP4 al-
lowed by a continuation ag, which is a single character
ice.example.com s= - c=IN IP4 alice.example.com t=0
and end of line (CRLF). This last line at the end of mes-
0 m=message 7394 TCP/MSRP * a=accept-types:
sages makes it rather simple to nd and detect the mes-
text/plain a=path:msrp://alice.example.com:
sage boundaries. MSRP is not dened for connection-
7394/2s93i9ek2a;tcp
less protocols, such as UDP, thus one be certain that a re-
sponse to a request would arrive on the same connection. The fact that MSRP contains the address and port and
MSRP also relies on a reliable transport layer, that is, at the same time the c-line holds the address and m-
guarantees delivery and maintains the order of the mes- line contain the port is a cause for ambiguity. Gener-
sages, which further simplies the protocol design. ally, other media types use the c-line and m-line to de-
scribe the address, but the MSRP RFC 4975 states this
An MSRP URI has a scheme (which is msrp or
information is actually specied by the MSRP path. This
msrps), authority, as dened by RFC 3986, which holds
may cause some devices to improperly set up the ses-
the IP/domain name and possibly the port, an optional
sion, in particular, a B2BUA may require to alter the path
session identier, the transport and additional optional
per each MSRP message between the dierent devices.
parameters. For example:
To overcome this, RFC 6714 CEMA for MSRP [4]
msrp://atlanta.example.com:7654/jshA7weztas;tcp changes the way CEMA-aware devices use SDP, which
makes CEMA-aware MSRP B2BUA implementations
msrp is the scheme much simpler and more ecient.
116
35.5. SEE ALSO 117
C#/.Net version
Java ME
Python MSRPlib
35.3.2 Clients
35.3.3 Servers
35.4 References
[2] RFC 4976, Relay Extensions for the Message Session Relay
Protocol (MSRP), C. Jennings (Ed.), R. Mahy (Ed.), A. B.
Roach (Ed.), The Internet Society (September 2007)
Telephone company
List of telephone operating companies
118
Chapter 37
A mobile phone operator or wireless provider is a In 1958 development began on a similar service in the
telephone company that provides services for mobile USSR, the Altay system for motorists.[6] In 1963 the ser-
phone users. The operator gives a SIM card to the cus- vice started in Moscow, and by 1970 was deployed in 30
tomer who inserts it into the mobile phone to gain access cities across the USSR. Versions of the Altay system are
to the service. still in use today as a trunking system in some parts of
Russia.
There are two types of mobile operator:
In 1959 a private telephone company located in Brew-
a mobile network operator (9563620759) which ster, Kansas, USA, the S&T Telephone Company, (still
owns the underlying network and spectrum assets in business today) with the use of Motorola radio tele-
required to run the service. phone equipment and a private tower facility, oered to
the public mobile telephone services in that local area of
a mobile virtual network operator (MVNO) which NW Kansas.
buys wholesale service from an MNO and sells on In 1966, Bulgaria presented the pocket mobile automatic
to its own customers. phone RAT-0,5 combined with a base station RATZ-10
(RATC-10) on Interorgtechnika-66 international exhibi-
The worlds largest individual mobile operator by sub- tion. One base station, connected to one telephone wire
scribers is China Mobile with over 500 million mobile line, could serve up to six customers.
phone subscribers.[1] Over 50 mobile operators have over One of the rst successful public commercial mo-
10 million subscribers each, and over 150 mobile oper- bile phone networks was the ARP network in Finland,
ators had at least one million subscribers by the end of launched in 1971.
2009.[2] In February 2010, there were 4.6 billion mo-
bile phone subscribers, a number that is estimated to On April 3, 1973, Martin Cooper, a Motorola researcher
grow.Total mobilecellular subscriptions reached almost and executive, made the rst analog mobile phone call
6 billion by end 2011, corresponding to a global penetra- using a heavy prototype
[7]
model. He called Dr. Joel S.
tion of 86%. Engel of Bell Labs.
The rst commercially automated cellular network (the
1G generation) was launched in Japan by NTT in 1979.
The initial launch network covered the full metropolitan
37.1 History area of Tokyos over 20 million inhabitants with a cellular
network of 23 base stations. Within ve years, the NTT
Main article: History of mobile phones network had been expanded to cover the whole population
of Japan and became the rst nationwide 1G network.
Prior to 1973, cellular mobile phone technology was lim- Several other countries also launched 1G networks in the
ited to phones installed in cars and other vehicles.[3] The early 1980s including the UK, Mexico and Canada.
rst fully automated mobile phone system for vehicles In the 1990s, the 'second generation' (2G) mobile phone
was launched in Sweden in 1960 called MTA (mobile systems emerged, primarily using the GSM standard. In
telephone system A). Calls from the car were direct dial, 1991 the rst GSM network (Radiolinja) launched in
whereas incoming calls required an operator to determine Finland.
which base station the phone was currently at. In 1962, an
upgraded version called Mobile System B (MTB) was in- American and Canadian wireless providers tend to subsi-
troduced. In 1971 the MTD version was launched, open- dize phones for consumers but tend to require 2 or 3 year
ing for several dierent brands of equipment and gaining contracts, while Asians and Europeans sell the phone [8]
at
commercial success. [4][5]
The network remained open un- full cost while the monthly fees charged are lower.
til 1983 and still had 600 customers when it closed.
119
120 CHAPTER 37. MOBILE PHONE OPERATOR
37.3 References
[1] Tania Branigan (January 11, 2010). State owned
China Mobile is worlds biggest mobile phone operator.
Guardian News and Media Limited. Retrieved December
17, 2011.
[8]
Chapter 38
Mobile telephony
38.1 History
121
122 CHAPTER 38. MOBILE TELEPHONY
ber of callers to use the comparatively few available fre- wireless email, the Nokia Communicator, was released in
quencies simultaneously and allowing users to seamlessly 1996, creating a new category of multi-use devices called
move from one area to another without having their calls smartphones. In 1999 the rst mobile internet service was
dropped. Both problems were solved by Bell Labs em- launched by NTT DoCoMo in Japan under the i-Mode
ployee Amos Joel who, in 1970 applied for a patent for service. By 2007 over 798 million people around the
a mobile communications system.[4] However, a business world accessed the internet or equivalent mobile internet
consulting rm calculated the entire U.S. market for mo- services such as WAP and i-Mode at least occasionally
bile telephones at 100,000 units and the entire world- using a mobile phone rather than a personal computer.
wide market at no more than 200,000 units based on the
ready availability of pay telephones and the high cost of
constructing cell towers. As a consequence, Bell Labs 38.2 Cellular systems
concluded that the invention was of little or no conse-
quence, leading it not to attempt to commercialize the
Main articles: Cellular networks and Cellular frequencies
invention. The invention earned Joel induction into the
Mobile phones send and receive radio signals with any
National Inventors Hall of Fame in 2008.[5] The rst call
on a handheld mobile phone was made on April 3, 1973
by Martin Cooper, then of Motorola[6] to his opposite
number in Bell Labs who were also racing to be rst.
Bell Labs went on to install the rst trial cellular net-
work in Chicago in 1978. This trial system was licensed
by the FCC to ATT for commercial use in 1982 and, as
part of the divestiture arrangements for the breakup of
ATT, the AMPS technology was distributed to local tel-
cos. The rst commercial system opened in Chicago in
October 1983.[7][8] A system designed by Motorola also
operated in the Washington D.C./Baltimore area from
summer 1982 and became a full public service later the
following year.[9] Japans rst commercial radiotelephony
service was launched by NTT in 1978.
The rst fully automatic rst generation cellular system
was the Nordic Mobile Telephone (NMT) system, simul-
taneously launched in 1981 in Denmark, Finland, Nor-
Mobile phone subscriptions, not subscribers, per 100 inhabitants
way and Sweden.[10] NMT was the rst mobile phone net-
1997-2007
work featuring international roaming. The Swedish elec-
trical engineer sten Mkitalo started to work on this vi- number of cell site base stations tted with microwave
sion in 1966, and is considered as the father of the NMT antennas. These sites are usually mounted on a tower,
system and some consider him also the father of the cel- pole or building, located throughout populated areas,
lular phone.[11][12] then connected to a cabled communication network
The advent of cellular technology encouraged European and switching system. The phones have a low-power
countries to co-operate in the development of a pan- transceiver that transmits voice and data to the nearest cell
European cellular technology to rival those of the US and sites, normally not more than 8 to 13 km (approximately
Japan. This resulted in the GSM system, the initials orig- 5 to 8 miles) away. In areas of low coverage, a cellular re-
inally from the Groupe Spcial Mobile that was charged peater may be used, which uses a long distance high-gain
with the specication and development tasks but latterly dish antenna or yagi antenna to communicate with a cell
as the 'Global System for Mobile Communications. The tower far outside of normal range, and a repeater to re-
GSM standard eventually spread outside Europe and is broadcast on a small short-range local antenna that allows
now the most widely used cellular technology in the world any cellphone within a few meters to function properly.
and the de facto standard. The industry association, the When the mobile phone or data device is turned on, it reg-
GSMA, now represents 219 countries and nearly 800 mo- isters with the mobile telephone exchange, or switch, with
bile network operators.[13] There are now estimated to its unique identiers, and can then be alerted by the mo-
be over 5 billion phone subscriptions according to the bile switch when there is an incoming telephone call. The
"List of countries by number of mobile phones in use" handset constantly listens for the strongest signal being
(although some users have multiple subscriptions, or in- received from the surrounding base stations, and is able
active subscriptions), which also makes the mobile phone to switch seamlessly between sites. As the user moves
the most widely spread technology and the most common around the network, the "handos" are performed to al-
electronic device in the world.[14] low the device to switch sites without interrupting the call.
The rst mobile phone to enable internet connectivity and Cell sites have relatively low-power (often only one or two
38.3. USAGE 123
tructure to having satellite based communications sys- tracked from south of the Irish border to Omagh and
tems. At present, Africa has the largest growth rate of back on the day of the bombing, were considered of vital
cellular subscribers in the world,[21] its markets expand- importance.[28]
ing nearly twice as fast as Asian markets.[22] The avail- Further example of criminal investigations using mobile
ability of prepaid or 'pay-as-you-go' services, where the phones is the initial location and ultimate identication
subscriber is not committed to a long term contract, has of the terrorists of the 2004 Madrid train bombings. In
helped fuel this growth in Africa as well as in other con-the attacks, mobile phones had been used to detonate the
tinents. bombs. However, one of the bombs failed to detonate,
On a numerical basis, India is the largest growth market, and the SIM card in the corresponding mobile phone gave
adding about 6 million mobile phones every month.[23] It the rst serious lead about the terrorists to investigators.
currently has a mobile subscriber base of 937.06 million By tracking the whereabouts of the SIM card and cor-
mobile phones.[24] relating other mobile phones that had been registered in
those areas, police were able to locate the terrorists.[29]
38.3.2 Trac
Disaster response
Since the world is operating quickly to 3G and 4G net-
works, mobile trac through video is heading high. It is The Finnish government decided in 2005 that the fastest
expected that by end of 2018, the global trac will reach way to warn citizens of disasters was the mobile phone
an annual rate of 190 exabytes/year. This is the result network. In Japan, mobile phone companies provide
of people shifting to smart phones now-a-days. It is pre- immediate notication of earthquakes and other natural
dicted by 2018, mobile trac will reach by 10 billion con- disasters to their customers free of charge.[30] In the
nections with 94% trac comes from Smartphones, lap- event of an emergency, disaster response crews can locate
tops and tablets. Also 69% of mobile trac from Videos trapped or injured people using the signals from their mo-
since we have high denition screens available in smart bile phones. An interactive menu accessible through the
phones and 176.9 wearable devices to be at use. Appar- phones Internet browser noties the company if the user
ently, 4G will be dominating the trac by 51% of total is safe or in distress. In Finland rescue services suggest
mobile data by 2018.[25] hikers carry mobile phones in case of emergency even
when deep in the forests beyond cellular coverage, as the
radio signal of a cellphone attempting to connect to a base
38.3.3 By government agencies station can be detected by overying rescue aircraft with
special detection gear. Also, users in the United States
Law enforcement can sign up through their provider for free text messages
when an AMBER Alert goes out for a missing person in
Main article: Lawful interception their area.
However, most mobile phone networks operate close to
Law enforcement have used mobile phone evidence in a capacity during normal times, and spikes in call volumes
number of dierent ways. Evidence about the physical caused by widespread emergencies often overload the sys-
location of an individual at a given time can be obtained tem just when it is needed the most. Examples reported in
by triangulating the individuals cellphone between sev- the media where this has occurred include the September
eral cellphone towers. This triangulation technique can 11, 2001 attacks, the 2003 Northeast blackouts, the 2005
be used to show that an individuals cellphone was at a London Tube bombings, Hurricane Katrina, the 2006
certain location at a certain time. The concerns over ter- Hawaii earthquake, and the 2007 Minnesota bridge col-
rorism and terrorist use of technology prompted an in- lapse.
quiry by the British House of Commons Home Aairs Under FCC regulations, all mobile telephones must be
Select Committee into the use of evidence from mo- capable of dialing emergency telephone numbers, regard-
bile phone devices, prompting leading mobile telephone less of the presence of a SIM card or the payment status
forensic specialists to identify forensic techniques avail- of the account.
able in this area.[26] NIST have published guidelines and
procedures for the preservation, acquisition, examina-
tion, analysis, and reporting of digital information present
on mobile phones can be found under the NIST Publica- 38.4 Impact on Society
tion SP800-101.[27]
In the UK in 2000 it was claimed that recordings of mo- 38.4.1 Human health
bile phone conversations made on the day of the Omagh
bombing were crucial to the police investigation. In par- Main article: Mobile phone radiation and health
ticular, calls made on two mobile phones which were
38.4. IMPACT ON SOCIETY 125
still claim in their in-plane announcements that this pro- Labrador as well as the United Kingdom, consisting of
hibition is due to possible interference with aircraft radio a zero-tolerance system operated in Scotland and a warn-
communications. Shut-o mobile phones do not interfere ing system operated in England, Wales, and Northern Ire-
with aircraft avionics. The recommendation why phones land. Ocials from these jurisdictions argue that using a
should not be used during take-o and landing, even on mobile phone while driving is an impediment to vehicle
planes that allow calls or messaging, is so that passengers operation that can increase the risk of road trac acci-
pay attention to the crew for any possible accident situa- dents.
tions, as most aircraft accidents happen on take-o and Studies have found vastly dierent relative risks (RR).
landing.
Two separate studies using case-crossover analysis each
calculated RR at 4,[43][44] while an epidemiological
cohort study found RR, when adjusted for crash-risk ex-
Etiquette
posure, of 1.11 for men and 1.21 for women.[45]
Main article: Cell Phone Etiquette A simulation study from the University of Utah Profes-
sor David Strayer compared drivers with a blood alcohol
content of 0.08% to those conversing on a cell phone,
Mobile phone use can be an important matter of social
and after controlling for driving diculty and time on
discourtesy: phones ringing during funerals or weddings;
task, the study concluded that cell phone drivers exhibited
in toilets, cinemas and theatres. Some book shops, li-
greater impairment than intoxicated drivers.[46] Meta-
braries, bathrooms, cinemas, doctors oces and places
analysis by The Canadian Automobile Association[47] and
of worship prohibit their use, so that other patrons will
The University of Illinois[48] found that response time
not be disturbed by conversations. Some facilities install
while using both hands-free and hand-held phones was
signal-jamming equipment to prevent their use, although
approximately 0.5 standard deviations higher than nor-
in many countries, including the US, such equipment is
mal driving (i.e., an average driver, while talking on a
illegal.
cell phone, has response times of a driver in roughly the
Many US cities with subway transit systems underground 40th percentile).
are studying or have implemented mobile phone recep-
Driving while using a hands-free device is not safer than
tion in their underground tunnels for their riders, and
driving while using a hand-held phone, as concluded by
trains, particularly those involving long-distance services,
case-crossover studies.[44][43] epidemiological studies,[45]
often oer a quiet carriage where phone use is prohib-
simulation studies,[46] and meta-analysis.[47][48] Even
ited, much like the designated non-smoking carriage of
with this information, California initiated new Wireless
the past. Most schools in the United States and Europe
Communications Device Law (eective January 1, 2009)
and Canada have prohibited mobile phones in the class-
makes it an infraction to write, send, or read text-based
room, or in school in an eort to limit class disruptions.
communication on an electronic wireless communica-
A working group made up of Finnish telephone com- tions device, such as a cell phone, while driving a mo-
panies, public transport operators and communications tor vehicle. Two additional laws dealing with the use of
authorities has launched a campaign to remind mobile wireless telephones while driving went into eect July
phone users of courtesy, especially when using mass 1, 2008. The rst law prohibits all drivers from us-
transitwhat to talk about on the phone, and how to. ing a handheld wireless telephone while operating a mo-
In particular, the campaign wants to impact loud mo- tor vehicle. The law allows a driver to use a wireless
bile phone usage as well as calls regarding sensitive telephone to make emergency calls to a law enforce-
matters.[42] ment agency, a medical provider, the re department, or
other emergency services agency. The base ne for the
FIRST oense is $20 and $50 for subsequent convic-
Use by drivers tions. With penalty assessments, the ne can be more
than triple the base ne amount.[49] videos about Cali-
Main articles: Mobile phones and driving safety and fornia cellular phone laws; with captions (California Ve-
Handsfree hicle Code [VC] 23123). Motorists 18 and over may
use a hands-free device. The second law eective July
The use of mobile phones by people who are driving 1, 2008, prohibits drivers under the age of 18 from us-
has become increasingly common, for example as part ing a wireless telephone or hands-free device while op-
of their job, as in the case of delivery drivers who are erating a motor vehicle (VC 23124)The consistency of
calling a client, or socially as for commuters who are chat- increased crash risk between hands-free and hand-held
ting with a friend. While many drivers have embraced the phone use is at odds with legislation in over 30 countries
convenience of using their cellphone while driving, some that prohibit hand-held phone use but allow hands-free.
jurisdictions have made the practice against the law, such Scientic literature is mixed on the dangers of talking on
as Australia, the Canadian provinces of British Columbia, a phone versus those of talking with a passenger, with
Quebec, Ontario, Nova Scotia, and Newfoundland and the Accident Research Unit at the University of Notting-
38.4. IMPACT ON SOCIETY 127
ham nding that the number of utterances was usually hibiting the use of mobile phones, due to possible safety
higher for mobile calls when compared to blindfolded issues. However, it is unlikely that mobile phone use can
and non-blindfolded passengers,[50] but the University of cause any problems,[53] and in fact petrol station employ-
Illinois meta-analysis concluding that passenger conver- ees have themselves spread the rumour about alleged in-
sations were just as costly to driving performance as cell cidents.
phone ones.[48]
There are more than 500 million used mobile phones in 38.5.2 Incoming call charges
the US sitting on shelves or in landlls,[58] and it is esti-
mated that over 125 million will be discarded this year In the early days of mobile telephony, the operators (car-
alone. The problem is growing at a rate of more than two riers) charged for all air time consumed by the mobile
million phones per week, putting tons of toxic waste into phone user, which included both outbound and inbound
landlls daily. Several companies oer to buy back and telephone calls. As mobile phone adoption rates in-
recycle mobile phones from users. In the United States creased, competition between operators meant that some
many unwanted but working mobile phones are donated decided not to charge for incoming calls in some markets
to womens shelters to allow emergency communication. (also called calling party pays).
The European market adopted a calling party pays model
throughout the GSM environment and soon various other
38.5 Tari models GSM markets also started to emulate this model.
In Hong Kong, Singapore, Canada, and the United States,
See also: GSM services Voice charges, Mobile Internet, it is common for the party receiving the call to be charged
and at rate per minute, although a few carriers are beginning to oer
unlimited received phone calls. This is called the Re-
ceiving Party Pays model. In China, it was reported that
both of its two operators will adopt the caller-pays ap-
proach as early as January 2007.[59]
One disadvantage of the receiving party pays systems is
that phone owners keep their phones turned o to avoid
receiving unwanted calls, which results in the total voice
usage rates (and prots) in Calling Party Pays countries
outperform those in Receiving Party Pays countries.[60]
To avoid the problem of users keeping their phone turned
o, most Receiving Party Pays countries have either
switched to Calling Party Pays, or their carriers oer ad-
ditional incentives such as a large number of monthly
minutes at a suciently discounted rate to compensate
for the inconvenience.
Note that when a user roaming in another country,
international roaming taris apply to all calls received,
regardless of the model adopted in the home country.[61]
[5] List of National Inventors Hall of Fame inductees [28] Mobile phones key to Omagh probe. BBC News. 2000-
10-10. Retrieved 2011-07-11.
[6] 30th Anniversary of First Wireless Cell Phone Call.
3g.co.uk. Retrieved 2011-07-11. [29] Communication safety. Nokia-n98.org. Retrieved
2011-07-11.
[7] Article by Larry Kahaner and Alan Green in the Chicago
Tribune of December 22, 1983 Reach out and touch [30] New Japanese phones oer Earthquake early warning
someone--by land, sea or air alerts. Retrieved 2008-01-08.
[8] Phil Ament. Mobile Phone History - Invention of the
[31] Campbell, Jonathan. Cellular Phones and Cancer. Re-
Mobile Phone. Ideander.com. Retrieved 2011-07-11.
trieved 2007-03-02.
[9] Visited and evaluated by a group of (soon-to-be) British
Telecoms sta (including writer) in September 1982. [32] Steinhauser, Jennifer & Holson, Laura M. (2008-09-19).
Text Messages Seen as Dangerously Distracting. New
[10] Swedish National Museum of Science and Technology. York Times. Retrieved 2008-09-19.
Tekniskamuseet.se. Retrieved 2009-07-29.
[33] Hamilton, Tyler. "Listening to Cell Phone Warnings: Re-
[11] Mobile and technology: The Basics of Mobile Phones. searchers Working Overtime to Find Out If the Greatest
Sharelie-download.com. Retrieved 2011-07-11. Tool of Business is Causing Brian Cancer in Those Who
Use it Constantly" Toronto Star. May 31, 2008. Retrieved
[12] Facts about the Mobile (PDF). Archived from the orig-
November 20, 2008.
inal (PDF) on August 13, 2010. Retrieved 2011-07-11.
[13] Full Members ~ GSM World. Gsmworld.com. Re- [34] The BBC. US Cancer Boss in Mobiles Warning. BBC
trieved 2011-07-11. News 24 July 2008. Retrieved November 20, 2008. BBC
News. 2008-07-24. Retrieved 2011-07-11.
[14] global cellphone penetration reaches 50 percent
[35] Rachel Lieberman, Brandel France de Bravo, MPH, and
[15] Europeans hang up on xed lines. BBC News. 2007- Diana Zuckerman, Ph.D. "Can Cell Phones Harm Our
11-28. Retrieved 2011-07-11. Health?" National Research Center for Women and Fam-
ilies. August 2008. Retrieved August 13, 2013. /
[16] Oce of the Telecommunications Authority in Hong
Kong Archived March 9, 2009, at the Wayback Machine.. [36] Doctors warn of rash from mobile phone use Reuters.com.
[17] 500 mln cell phone accounts in China. ITFacts Mobile Retrieved October 17, 2008.
usage. Retrieved 2007-09-05.
[37] Mobile Phones for Kids Under 15: a Responsible Ques-
[18] Total mobile subscribers top 1.8 billion. tion. Point.com. 2006-04-13. Retrieved 2011-07-11.
[19] Up to 90 percent of globe to have mobile coverage. Tex- [38] Rise in executions for mobile use. ITV News. 2007-06-
tually.org. 2006-10-17. Retrieved 2011-07-11. 15. Retrieved 2007-06-23.
[20] Cell phone use booming worldwide. 2007-09-15. [39] Reaching the Mobile Respondent: Determinants of
Archived from the original on 2007-10-12. Retrieved High-Level Mobile Phone Use Among a High-Coverage
2007-09-15. Group (PDF). Social Science Computer Review.
[21] Mobile growth fastest in Africa. BBC News. 2005-03-
[40] Aquino, Grace (2006-04-28). Cell Phone Fashion
09.
Show. PC World. Retrieved 2011-07-11.
[22] Rice, Xan (2006-03-04). Phone revolution makes Africa
upwardly mobile. The Times. UK. Retrieved 2010-05- [41] Gundersen, Edna, Mastertones ring up prots, USA To-
12. day, 11/29/2006
[23] The Telecom Regulatory Authority of India (PDF). [42] campaign to promote cell phone manners (in nish)
(444 KB)
[43] Redelmeier, Donald; Tibshirani, Robert (1997-02-
[24] The Telecom Regulatory Authority of India (PDF). 13). Association Between Cellular-Telephone Calls
And Motor Vehicle Collisions (PDF). The New Eng-
[25] Mobile Network 2018. www.Phoneam.com. Retrieved land Journal of Medicine. 336 (7): 453458.
8 September 2015. doi:10.1056/NEJM199702133360701. PMID 9017937.
Archived from the original (PDF) on January 18, 2009.
[26] The Committee Oce, House of Commons.
Supplementary memorandum submitted by Gre-
[44] McEvoy, Suzanne; Stevenson, MR; McCartt, AT; Wood-
gory Smith. Publications.parliament.uk. Retrieved
ward, M; Haworth, C; Palamara, P; Cercarelli, R (2005).
2011-07-11.
Role of mobile phones in motor vehicle crashes resulting
[27] Guidelines on Cell Phone Forensics (PDF). (1.44 MB), in hospital attendance: a case-crossover study. BMJ. 331
Recommendations of the National Institute of Standards (7514): 428. doi:10.1136/bmj.38537.397512.55. PMC
and Technology, May 2007. 1188107 . PMID 16012176.
130 CHAPTER 38. MOBILE TELEPHONY
[60] OECD.org
Mobile VoIP
Mobile VoIP or simply mVoIP is an extension of mobil- (albeit at low rates) and allowing a user to watch TV.
ity to a Voice over IP network. Two types of communi- Mobile VoIP users were predicted to exceed 100 million
cation are generally supported: cordless/DECT/PCS pro- by 2012 and InStat projects 288 million subscribers by
tocols for short range or campus communications where 2013.[1][2]
all base stations are linked into the same LAN, and wider
The mobile operator industry business model conicts
area communications using 3G/4G protocols. with the expectations of Internet users that access is free
There are several methodologies that allow a mobile and fast without extra charges for visiting specic sites,
handset to be integrated into a VoIP network. One im- however far away they may be hosted. Because of this,
plementation turns the mobile device into a standard SIP most innovations in mobile VoIP will likely come from
client, which then uses a data network to send and receive campus and corporate networks, open source projects like
SIP messaging, and to send and receive RTP for the voice Asterisk, and applications where the benets are high
path. This methodology of turning a mobile handset into enough to justify expensive experiments (medical, mil-
a standard SIP client requires that the mobile handset sup- itary, etc.).
port, at minimum, high speed IP communications. In
this application, standard VoIP protocols (typically SIP)
are used over any broadband IP-capable wireless network 39.1 Technologies
connection such as EVDO rev A (which is symmetrical
high speed both high speed up and down), HSPA, Wi-
Mobile VoIP, like all VoIP, relies on SIP the standard
Fi or WiMAX.
used by most VoIP services, and now being implemented
Another implementation of mobile integration uses a on mobile handsets and smartphones and an increasing
soft-switch like gateway to bridge SIP and RTP into the number of cordless phones.
mobile networks SS7 infrastructure. In this implementa-
UMA the Unlicensed Mobile Access Generic Access
tion, the mobile handset continues to operate as it always
Network allows VoIP to run over the GSM cellular back-
has (as a GSM or CDMA based device), but now it can
bone.
be controlled by a SIP application server which can now
provide advanced SIP-based services to it. Several ven- When moving between IP-based networks, as is typically
dors oer this kind of capability today. the case for outdoor applications, two other protocols are
required:
Mobile VoIP will require a compromise between econ-
omy and mobility. For example, voice over Wi-Fi oers
potentially free service but is only available within the IEEE 802.21 hando, permitting one network to do
coverage area of a single Wi-Fi access point. Cordless call setup and initial trac, handing o to another
protocols oer excellent voice support and even support when the rst is about to fall out of range - the un-
base station hando, but require all base stations to com- derlying network need not be IP-based, but typically
municate on one LAN as the hando protocol is generally the IP stream is guaranteed a certain Quality of Ser-
not supported by carriers or most devices. vice (QoS) during the hando process
High speed services from mobile operators using EVDO IEEE 802.11u call initiation when the initial contact
rev A or HSPA may have better audio quality and ca- with a network is not one that the user has subscribed
pabilities for metropolitan-wide coverage including fast to or been in contact with before.
handos among mobile base stations, yet may cost more
than Wi-Fi-based VoIP services. For indoor or campus (cordless phone equivalent) use,
the IEEE P1905 protocol establishes QoS guarantees
As device manufacturers exploited more powerful pro-
for home area networks: Wi-Fi, Bluetooth, 3G, 4G
cessors and less costly memory, smartphones became ca-
and wired backbones using AC powerline network-
pable of sending and receiving email, browsing the web
ing/HomePlug/IEEE P1901, Ethernet and Power over
131
132 CHAPTER 39. MOBILE VOIP
In second half of 2010 Nokia introduced three new As of late 2011, most cellular data networks were still
dualmode WiFi capable Series40 handsets (Nokia X3- extremely high latency and eectively useless for VoIP.
02, Nokia C3-01 and, Nokia C3-01 Gold Edition) with IP-only providers such as Voipstream had begun to serve
integrated SIP VoIP that supports HD voice (AMR-WB). urban areas, and alternative approaches such as OpenBTS
(open source GSM) were competing with mobile VoIP.
In November 2011, Nokia introduced Nokia Asha 303
39.2.6 2011
with integrated SIP VoIP client that can operate both over
WiFi and 3G networks.
The mainstreaming of VoIP in the small business market
led to the introduction of more devices extending VoIP to
business cordless users. 39.2.7 2012
Panasonic introduced the KX-TGP base station support-
ing up to 6 cordless handsets , essentially a VoIP comple- In February 2012, Nokia introduced Nokia Asha 302 and
ment to its popular KX-TGA analog phones which like- in June Nokia Asha 311 both with integrated SIP VoIP
wise support up to 4 cordless handsets. However, un- client that can operate both over WiFi and 3G networks.
like the analog system which supports only four handsets
in one conference on one line, the TGP supports 3 si-
multaneous network conversations and up to 8 SIP reg- 39.2.8 2014
istrations (e.g. up to 8 DID lines or extensions), as well
as an Ethernet pass-through port to hook up computers By September 2014, mobile-enabled VoIP (VoLTE) had
on the same drop. In its publicity Panasonic specically been launched by T-Mobile US across its national net-
[6]
mentions Digium (founded by the creator of Asterisk), its work and by AT&T Mobility in a few markets. Ver-
product Switchvox and Asterisk itself. izon plans to launch its VoLTE service in the coming
weeks, according to media reports in August, 2014.[7] It
Several router manufacturers including TRENDnet and provides HD Voice, which increases mobile voice qual-
Netgear released sub-$300 Power over Ethernet switches ity, and permits optional use of video calling and front
aimed at the VoIP market. Unlike industry standard and rear-facing cameras. In the future, Verizons VoLTE
switches that provided the full 30 watts of power per is expected to also permit video sharing, chat functional-
port, these allowed under 50 watts of power to all four ity, and le transfers.
PoE ports combined. This made them entirely suitable
for VoIP and other low-power use (Motorola Canopy or
security camera or Wi-Fi APs) typical of a SOHO appli-
cation, or supporting an 8-line PBX, especially in com- 39.3 See also
bination with a multi-line handset such as the Panasonic
KX-TGP (which does not require a powered port). IP Multimedia Subsystem (IMS), a set of specica-
tions from 3GPP for delivering VoIP and other IP
Accordingly, by the end of 2011, for under US$3000 it
multimedia to cellular users
was possible to build an oce VoIP system based entirely
on cordless technology capable of several hundred me- Fixed mobile convergence
ters reach and on Power over Ethernet dedicated wired
phones, with up to 8 DID lines and 3 simultaneous con- MoIP
versations per base station, with 24 handsets each capable
of communicating on any subset of the 8 lines, plus an un- Voice over IP
limited number of softphones running on computers and Vowlan VoIP over a Wi-Fi network
laptops and smartphones. This compared favourably to
proprietary PBX technology especially as VoIP cordless VoLGA Forum Voice over LTE via Generic Ac-
was far cheaper than PBX cordless. cess
Cisco also released the SPA112, an Analog Telephone List of SIP software
Adapter (ATA) to connect one or two standard RJ-11
telephones to an Ethernet, in November 2011, retailing List of VoIP companies
for under US$50. This was a competitive response to
major cordless vendors such as Panasonic moving into the
business VoIP cordless market Cisco had long dominated, 39.4 References
as it suppressed the market for the cordless makers native
VoIP phones and permitted Cisco to argue the business
[1] Mobile VoIP From Minute Stealing to Wheeling and
case to spend more on switches and less on terminal de-
Dealing (PDF). Global Vision. 2010-08-11. Retrieved
vices. However, this solution would not permit the analog 2010-09-09.
phones to access every line of a multi-line PBX, only one
hardwired line per phone. [2] VoIP user gures. Retrieved October 9, 2012.
134 CHAPTER 39. MOBILE VOIP
Modem
This article is about network hardware. For the political using phase shift keying.
party, see MoDem.
A modem (modulator-demodulator) is a network hard-
40.1.1 History
135
136 CHAPTER 40. MODEM
The 201A and 201B Data-Phones were synchronous even lower-cost option was the Pennywhistle modem, de-
modems using two-bit-per-baud phase-shift keying signed to be built using parts from electronics scrap and
(PSK). The 201A operated half-duplex at 2,000 bit/s surplus stores.
over normal phone lines, while the 201B provided full In December 1972, Vadic introduced the VA3400, no-
duplex 2,400 bit/s service on four-wire leased lines, the table for full-duplex operation at 1,200 bit/s over the
send and receive channels each running on their own set phone network. Like the 103A, it used dierent fre-
of two wires. quency bands for transmit and receive. In November
The famous Bell 103A dataset standard was also intro- 1976, AT&T introduced the 212A modem to compete
duced by AT&T in 1962. It provided full-duplex ser- with Vadic. It was similar in design, but used the lower
vice at 300 bit/s over normal phone lines. Frequency-shift frequency set for transmission. One could also use the
keying was used, with the call originator transmitting at 212A with a 103A modem at 300 bit/s. According to
1,070 or 1,270 Hz and the answering modem transmit- Vadic, the change in frequency assignments made the
ting at 2,025 or 2,225 Hz. The readily available 103A2 212 intentionally incompatible with acoustic coupling,
gave an important boost to the use of remote low-speed thereby locking out many potential modem manufactur-
terminals such as the Teletype Model 33 ASR and KSR, ers. In 1977, Vadic responded with the VA3467 triple
and the IBM 2741. AT&T reduced modem costs by in- modem, an answer-only modem sold to computer cen-
troducing the originate-only 113D and the answer-only ter operators that supported Vadics 1,200-bit/s mode,
113B/C modems. AT&Ts 212A mode, and 103A operation.
Acoustic couplers
Carterfone and direct connection
See also: Acoustic coupler
For many years, the Bell System (AT&T) maintained a The Hush-a-Phone decision applied only to mechanical
connections, but the Carterfone decision of 1968, led
to the FCC introducing a rule setting stringent AT&T-
designed tests for electronically coupling a device to the
phone lines. This opened the door to direct-connect
modems that plugged directly into the phone line rather
than via a handset. However, the cost of passing the tests
was considerable, and acoustically coupled modems re-
mained common into the early 1980s.
The rapidly falling prices of electronics in the late 1970s
led to an increasing number of direct-connect models
around 1980. In spite of being directly connected, these
modems were generally operated like their earlier acous-
tic versions dialling and other phone-control operations
were completed by hand, using an attached handset. A
small number of modems added the ability to automat-
The Novation CAT acoustically coupled modem ically answer incoming calls, or automatically place an
outgoing call to a single number, but even these limited
monopoly on the use of its phone lines and what devices features were relatively rare or limited to special models
could be connected to them. However, the seminal Hush- in a lineup. When more exible solutions were needed,
a-Phone v. FCC case of 1956 concluded it was within the 3rd party "dialers" were used to automate calling, nor-
FCCs jurisdiction to regulate the operation of the Bell mally using a separate serial port to communicate with
System. The FCC found that as long as a device was not the dialler, which would then control the modem through
electronically attached to the system, it would not threaten a private electrical connection.
its integrity. This led to a number of devices that mechan- The introduction of microcomputer systems with inter-
ically connected to the phone through a standard handset. nal expansion slots made the rst software-controllable
Since most handsets were supplied by Western Electric modems common. Slot connections gave the computer
and thus of a standard design, acoustic couplers were rel- complete access to the modems memory or I/O chan-
atively easy to build. This type of connection was used nels, which allowed software to send commands to the
for many devices, such as answering machines. modem, not just data. This led to a series of popular
Acoustically coupled Bell 103A-compatible 300 bit/s modems for the S-100 bus and Apple II computers that
modems were common during the 1970s. Well-known could directly dial the phone, answer incoming calls, and
models included the Novation CAT and the Anderson- hang up the phone, the basic requirements of a bulletin
Jacobson, the latter spun o from an in-house project at board system (BBS). The seminal CBBS was created on
Stanford Research Institute (now SRI International). An an S-100 machine with a Hayes internal modem, and a
40.1. DIALUP MODEM 137
number of similar systems followed. was used. In this system the two tones for any one side
of the connection are sent at similar frequencies as in the
300 bit/s systems, but slightly out of phase. Voiceband
The Smartmodem and the rise of BBSs modems generally remained at 300 and 1,200 bit/s (V.21
and V.22) into the mid-1980s. A V.22bis 2,400-bit/s sys-
tem similar in concept to the 1,200-bit/s Bell 212 signal-
ing was introduced in the U.S., and a slightly dierent one
in Europe. The limited available frequency range meant
the symbol rate of 1,200 bit/s modems was still only 600
baud (symbols per second). The bit rate increases were
achieved by dening four or eight distinct symbols, which
allowed the encoding of two or three bits per symbol in-
stead of only 1. The use of smaller shifts had the draw-
The original model 300-baud Smartmodem back of making each symbol more vulnerable to interfer-
ence, but improvements in phone line quality at the same
The next major advance in modems was the Hayes Smart- time helped compensate for this. By the late 1980s, most
modem, introduced in 1981. The Smartmodem was an modems could support all of these standards and 2,400-
otherwise standard 103A 300-bit/s direct-connect mo- bit/s operation was becoming common.
dem, but it was attached to a small microcontroller that
watched the data stream for certain character strings rep-
resenting commands. This allowed both data and com- Proprietary standards
mands to be sent through a single serial port. The now-
standard Hayes command set included instructions for Many other standards were also introduced for special
picking up and hanging up the phone, dialing numbers, purposes, commonly using a high-speed channel for re-
and answering calls, among others. This was similar to ceiving, and a lower-speed channel for sending. One typ-
the commands oered by the internal modems, but un- ical example was used in the French Minitel system, in
like them, the Smartmodem could be connected to any which the users terminals spent the majority of their time
computer with an RS-232 port, which was practically ev- receiving information. The modem in the Minitel termi-
ery microcomputer built. nal thus operated at 1,200 bit/s for reception, and 75 bit/s
The introduction of the Smartmodem made communica- for sending commands back to the servers.
tions much simpler and more easily accessed. This pro- Three U.S. companies became famous for high-speed
vided a growing market for other vendors, who licensed versions of the same concept. Telebit introduced its Trail-
the Hayes patents and competed on price or by adding blazer modem in 1984, which used a large number of
features. Through the 1980s, a number of new higher- 36 bit/s channels to send data one-way at rates up to
speed modems, rst 1,200 and then 2,400 bit/s, greatly 18,432 bit/s. A single additional channel in the reverse
improved the responsiveness of the online systems, and direction allowed the two modems to communicate how
made le transfer practical. This led to rapid growth of much data was waiting at either end of the link, and the
online services with their large le libraries, which in turn modems could change direction on the y. The Trail-
gave more reason to own a modem. The rapid update of blazer modems also supported a feature that allowed them
modems led to a similar rapid increase in BBS use, which to spoof the UUCP g protocol, commonly used on Unix
was helped by the fact that BBSs could control the modem systems to send e-mail, and thereby speed UUCP up by a
simply by sending strings, rather than talking to a device tremendous amount. Trailblazers thus became extremely
driver that was dierent for every direct-connect modem. common on Unix systems, and maintained their domi-
nance in this market well into the 1990s.
1200 and 2400 bit/s USRobotics (USR) introduced a similar system, known
as HST, although this supplied only 9,600 bit/s (in early
The 300 bit/s modems used audio frequency-shift keying versions at least) and provided for a larger backchannel.
to send data. In this system the stream of 1s and 0s in Rather than oer spoong, USR instead created a large
computer data is translated into sounds which can be eas- market among Fidonet users by oering its modems to
ily sent on the phone lines. In the Bell 103 system, the BBS sysops at a much lower price, resulting in sales to end
originating modem sends 0s by playing a 1,070 Hz tone, users who wanted faster le transfers. Hayes was forced
and 1s at 1,270 Hz, with the answering modem transmit- to compete, and introduced its own 9,600-bit/s standard,
ting its 0s on 2,025 Hz and 1s on 2,225 Hz. These fre- Express 96 (also known as Ping-Pong), which was gener-
quencies were chosen carefully; they are in the range that ally similar to Telebits PEP. Hayes, however, oered nei-
suers minimum distortion on the phone system and are ther protocol spoong nor sysop discounts, and its high-
not harmonics of each other. speed modems remained rare.
In the 1,200 bit/s and faster systems, phase-shift keying A common feature of these high-speed modems was the
138 CHAPTER 40. MODEM
concept of fallback, or speed hunting, allowing them to into the phone lines as normal, but also into the delay,
communicate with less-capable modems. During the call which is inverted. The signal returning through the echo
initiation, the modem would transmit a series of signals meets the inverted version coming from the delay line,
and wait for the remote modem to respond. They would and cancels out the echo. This allowed both modems to
start at high speeds and get progressively slower until use the full spectrum available, doubling the speed.
there was a response. Thus, two USR modems would be Additional improvements were introduced via the
able to connect at 9,600 bit/s, but, when a user with a Quadrature Amplitude Modulation (QAM) encoding
2,400 bit/s modem called in, the USR would fall back to system. Previous systems using phase shift keying (PSK)
the common 2,400 bit/s speed. This would also happen if
encoded two bits (or sometimes three) per symbol by
a V.32 modem and a HST modem were connected. Be- slightly delaying or advancing the signals phase relative
cause they used a dierent standard at 9,600 bit/s, they
to a set carrier tone. QAM used a combination of phase
would fall back to their highest commonly supported stan- shift and amplitude to encode four bits per symbol.
dard at 2,400 bit/s. The same applies to V.32bis and
Transmitting at 1,200 baud produced the 4,800 bit/s
14,400 bit/s HST modem, which would still be able to V.27ter standard, the same working at a base rate of
communicate with each other at 2,400 bit/s.
2,400 baud produced the 9,600 bit/s V.32. The carrier
frequency was 1,650 Hz in both systems. For many
years, most engineers considered this rate to be the limit
Echo cancellation, 9600 and 14,400
of data communications over telephone networks.
The introduction of these higher-speed systems also led
to the digital fax machine during the 1980s. Digital faxes
are simply an image format sent over a high-speed (com-
monly 14.4 kbit/s) modem. Software running on the host
computer can convert any image into fax format, which
can then be sent using the modem. Such software was at
one time an add-on, but has since become largely univer-
sal.
half the price of the slower V.32 modems already on the V.34/28.8 kbit/s and 33.6 kbit/s
market. This led to a price war, and by the end of the year
V.32 was dead, never having been really established, and
V.32bis modems were widely available for $250.
V.32bis was so successful that the older high-speed stan-
dards had little to recommend them. USR fought back
with a 16,800 bit/s version of HST, while AT&T intro- External
duced a one-o 19,200 bit/s method they referred to as V.34 modem with RS-232 serial port
V.32ter, but neither non-standard modem sold well.
Any interest in these proprietary improvements was de-
stroyed during the lengthy introduction of the 28,800 bit/s
V.34 standard. While waiting, several companies de-
cided to release hardware and introduced modems they
referred to as V.FAST. In order to guarantee compati-
bility with V.34 modems once the standard was ratied
(1994), the manufacturers were forced to use more ex-
ible parts, generally a DSP and microcontroller, as op-
posed to purpose-designed ASIC modem chips.
The ITU standard V.34 represents the culmination of
the joint eorts. It employs the most powerful coding
techniques including channel encoding and shape encod-
ing. From the mere four bits per symbol (9.6 kbit/s), the
new standards used the functional equivalent of 6 to 10
bits per symbol, plus increasing baud rates from 2,400
to 3,429, to create 14.4, 28.8, and 33.6 kbit/s modems.
This rate is near the theoretical Shannon limit. When
calculated, the Shannon capacity of a narrowband line is
bandwidth log2 (1 + Pu /Pn ) , with Pu /Pn the (lin-
ear) signal-to-noise ratio. Narrowband phone lines have
a bandwidth of 3,000 Hz so using Pu /Pn = 1000 (SNR
= 30 dB), the capacity is approximately 30 kbit/s.[3]
Without the discovery and eventual application of trellis
modulation, maximum telephone rates using voice-
bandwidth channels would have been limited to 3,429
baud 4 bit/symbol = approximately 14 kbit/s using tra-
V.34 modem in the shape of an internal ISA card
ditional QAM.
pression operates much more eciently than the on-the- 40.1.2 Popularity
y compression done by modems due to the fact these
compression techniques are application-specic (JPEG, A CEA study in 2006, found that dial-up Internet access
text, EXE, etc.). The website text, images, and Flash ex- is declining in the U.S. In 2000, dial-up Internet connec-
ecutables are compacted to approximately 4%, 12%, and tions accounted for 74% of all U.S. residential Internet
30%, respectively. The drawback of this approach is a connections. The US demographic pattern for dial-up
loss in quality, which causes image content to become modem users per capita has been more or less mirrored
pixelated and smeared. ISPs employing this approach of- in Canada and Australia for the past 20 years.
ten advertise it as accelerated dial-up. Dial-up modem use in the US had dropped to 60% by
These accelerated downloads are now integrated into the 2003, and in 2006, stood at 36%. Voiceband modems
Opera and Amazon Silk web browsers, using their own were once the most popular means of Internet access in
server-side text and image compression. the U.S., but with the advent of new ways of accessing
the Internet, the traditional 56K modem is losing pop-
ularity. The dial-up modem is still widely used by cus-
Softmodem tomers in rural areas, where DSL, cable, satellite, or ber
optic service is not available, or they are unwilling to pay
what these companies charge.[14] In its 2012 annual re-
port, AOL showed it still collects around US$700 million
in fees from dial-up users: about three million people.
40.2 Broadband
broadband internet service without interference. Newer Smart modems come with media access controllers in-
types of broadband modems are also available, including side, which prevents random data from colliding and
satellite and power line modems. resends data that is not correctly received. Smart
Most consumers did not know about networking and modems typically require more bandwidth than transpar-
routers when broadband became available. However, ent modems, and typically achieve higher data rates. The
many people knew that a modem connected a computer IEEE 802.11 standard denes a short range modulation
to the Internet over a telephone line. To take advantage scheme that is used on a large scale throughout the world.
of consumers familiarity with modems, companies called
these devices broadband modems rather than using less
40.3.1 WiFi and WiMax
familiar terms such as adapter, interface, transceiver, or
bridge. In fact, broadband modems t the denition of The WiFi and WiMax standards use wireless mobile
modem because they use complex waveforms to carry dig- broadband modems operating at microwave frequencies.
ital data. They use more advanced technology than dial-
up modems: typically they can modulate and demodulate
hundreds of channels simultaneously or use much wider 40.3.2 Mobile broadband
channels than dial-up modems.
See also: Mobile broadband and Mobile broadband mo-
dem
40.3 Radio Modems which use a mobile telephone system (GPRS,
Conexant
40.4 Optical modems Creative Labs
Hayes
Fiber optic systems can be upgraded by the use of
Quadrature amplitude modulation. The modulator and Multitech
demodulator are separate components rather than a sin-
gle assembly as with most modems. [19] Netcomm
144 CHAPTER 40. MODEM
Router (computing) [18] Lawson, Stephen (May 2, 2011). Laptop Users Still Pre-
fer USB Modems. PCWorld. IDG Consumer & SMB.
Wake-on-ring Retrieved 2016-08-13.
Rockwell (Chipset) [19] Michel, Stephanie (September 19, 2013). Which optical
modulation scheme best ts my application?". LIGHT-
X2 (Chipset) WAVE.
Multi-frequency signaling
In telephony, multi-frequency signaling (MF) is a voice, modem or fax data across that same 64-kbit chan-
signaling system that was introduced by the Bell System nel previously used for the in-band MF signaling.
after World War II. It uses a combination of tones for ad-
dress (phone number) and supervision signaling. The sig-
naling is sent in-band over the same channel as the bearer
channel used for voice trac.
41.2 Demise
Multi-frequency signaling is a precursor of modern
In-band signalling began to disappear as electronic
DTMF signaling (TouchTone), now used for subscriber
switching systems displaced mechanical switchgear.
signalling. DTMF uses eight frequencies.
Out-of-band Common Channel Signaling (CCS) became
nearly universal at the end of the 20th century in the
United States. Benets include higher connection estab-
41.1 Operation lishment rate, better fraud security and features such as
Caller ID
Digits are represented by two simultaneous tones selected Some 911 Public Safety Answering Points (PSAPs) still
from a set of ve (MF 2/5), six (MF 2/6), or eight (MF use the MF format to identify the calling party to the
2/8) frequencies. The frequency combinations are played, PSAP when processing calls from Mobile Telephone
one at a time for each digit, to the remote multi-frequency Switching Oces (MTSOs) and land telephone oces.[1]
receiver in a distant telephone exchange. MF was used for This is based on an earlier system which used MF to iden-
signaling in trunking applications. tify the calling party to a feature group 'D' (101xxxx) al-
Using MF signaling, the originating telephone switching ternate long distance provider.
oce sends a starting signal such as a seizure (o-hook) Other countries may still use a version of in-band signal-
by toggling the AB bits. After the initial seizure, the ter- ing.
minating oce acknowledges a ready state by responding [2]
with a wink (short duration seizure) and then goes back MF signaling includes R2 signaling, R1 (in North
on-hook (wink start). The originating oce sends the America), and Signaling System No. 5.
destination digits to the terminating switch.
The R2 signalling suite, in use in the middle to late 20th
century, included a compelled signalling version of mul- 41.3 See also
tifrequency register signalling
MF signalling tones were vulnerable to being spoofed us- two-out-of-ve code
ing blue boxes which generated a 2600 hertz tone to dis-
connect a toll call in progress and provided an operator- blue box
style MF keypad to dial another call using the same trunk.
Dual-tone multi-frequency signaling
MF and other in-band signaling systems dier from
Signaling System 7 (SS7) in that the routing digits are
out-pulsed in MF format in the same voiceband channel
used for voice. The dialing user cannot detect these dig- 41.4 References
its being out-pulsed because the audio connection is not
established all the way to the users handset or device un- [1] http://www.nena.org/?page=EnhanceMF_Signaling
til after the connection is established with the terminating
switch. Following a full connection, the same audio chan- [2] ITU-T Recommendation Q.310-Q.332 - Specication of
nel is connected to the user in order to communicate the Signalling System R1
146
41.5. EXTERNAL LINKS 147
Orange box
This article is about the tool used to spoof caller ID. For
the video game compilation, see The Orange Box.
42.2 References
148
Chapter 43
Packet switching
149
150 CHAPTER 43. PACKET SWITCHING
packets may be delivered according to a multiple access of 1024 bits. In 1966, Davies proposed that a network
scheme. should be built at the laboratory to serve the needs of NPL
and prove the feasibility of packet switching. The NPL
Data Communications Network entered service in 1970.
43.2 History The rst computer network and packet switching network
deployed for computer resource sharing was the Octopus
Network at the Lawrence Livermore National Laboratory
In the late 1950s, the US Air Force established a wide that began connecting four Control Data 6600 computers
area network for the Semi-Automatic Ground Environ- to several shared storage devices (including an IBM 2321
ment (SAGE) radar defense system. They sought a sys- Data Cell[10] in 1968 and an IBM Photostore[11] in 1970)
tem that might survive a nuclear attack to enable a re- and to several hundred Teletype Model 33 ASR terminals
sponse, thus diminishing the attractiveness of the rst for time sharing use starting in 1968.[12]
strike advantage by enemies.[5]
In 1973, Vint Cerf and Bob Kahn wrote the specica-
Leonard Kleinrock conducted early research in queueing tions for Transmission Control Protocol (TCP), an inter-
theory which proved important in packet switching, and networking protocol for sharing resources using packet-
published a book in the related eld of digital message switching among the nodes.
switching (without the packets) in 1961; he also later
played a leading role in building and management of the
worlds rst packet-switched network, the ARPANET.
The concept of switching small blocks of data was rst
43.3 Connectionless and
explored independently by Paul Baran at the RAND Cor- connection-oriented modes
poration in the US and Donald Davies at the National
Physical Laboratory (NPL) in the UK in the early to mid-
Packet switching may be classied into connectionless
1960s.Abbate 2000 packet switching, also known as datagram switching,
Baran developed the concept of distributed adaptive mes- and connection-oriented packet switching, also known as
sage block switching during his research at the RAND virtual circuit switching.
Corporation for the US Air Force into communications Examples of connectionless protocols are Ethernet,
networks, that could survive nuclear wars,[6] rst pre- Internet Protocol (IP), and the User Datagram Proto-
sented to the Air Force in the summer of 1961 as brief- col (UDP). Connection-oriented protocols include X.25,
ing B-265,[5] later published as RAND report P-2626 in Frame Relay, Multiprotocol Label Switching (MPLS),
1962,[7] and nally in report RM 3420 in 1964.[8] Report and the Transmission Control Protocol (TCP).
P-2626 described a general architecture for a large-scale,
distributed, survivable communications network. The In connectionless mode each packet includes complete
work focuses on three key ideas: use of a decentralized addressing information. The packets are routed individ-
network with multiple paths between any two points, di- ually, sometimes resulting in dierent paths and out-of-
viding user messages into message blocks, later called order delivery. Each packet is labeled with a destina-
packets, and delivery of these messages by store and for- tion address, source address, and port numbers. It may
ward switching. also be labeled with the sequence number of the packet.
This precludes the need for a dedicated path to help the
Barans work was known to Robert Taylor and J.C.R. packet nd its way to its destination, but means that much
Licklider at the Information Processing Technology Of-
more information is needed in the packet header, which is
ce, who advocated wide area networks, and it inuenced therefore larger, and this information needs to be looked
Lawrence Roberts to adopt the technology in the devel-
up in power-hungry content-addressable memory. Each
opment of the ARPANET. packet is dispatched and may go via dierent routes; po-
Starting in 1965, Donald Davies at the National Physi- tentially, the system has to do as much work for every
cal Laboratory, UK, independently developed the same packet as the connection-oriented system has to do in con-
message routing methodology as developed by Baran. He nection set-up, but with less information as to the applica-
called it packet switching, a more accessible name than tions requirements. At the destination, the original mes-
Barans, and proposed to build a nationwide network in sage/data is reassembled in the correct order, based on
the UK.[9] He gave a talk on the proposal in 1966, af- the packet sequence number. Thus a virtual connection,
ter which a person from the Ministry of Defence (MoD) also known as a virtual circuit or byte stream is provided
told him about Barans work. A member of Davies team to the end-user by a transport layer protocol, although in-
(Roger Scantlebury) met Lawrence Roberts at the 1967 termediate network nodes only provides a connectionless
ACM Symposium on Operating System Principles and network layer service.
suggested it for use in the ARPANET. Connection-oriented transmission requires a setup phase
Davies had chosen some of the same parameters for his in each involved node before any packet is transferred to
original network design as did Baran, such as a packet size establish the parameters of communication. The packets
43.5. X.25 VS. FRAME RELAY 151
include a connection identier rather than address infor- 43.5 X.25 vs. Frame Relay
mation and are negotiated between endpoints so that they
are delivered in order and with error checking. Address
Both X.25 and Frame Relay provide connection-oriented
information is only transferred to each node during the
operations. X.25 provides it via the network layer of
connection set-up phase, when the route to the destina-
the OSI Model, whereas Frame Relay provides it via
tion is discovered and an entry is added to the switching
level two, the data link layer. Another major dier-
table in each network node through which the connection
ence between X.25 and Frame Relay is that X.25 re-
passes. The signaling protocols used allow the application
quires a handshake between the communicating parties
to specify its requirements and discover link parameters.
before any user packets are transmitted. Frame Relay
Acceptable values for service parameters may be negoti-
does not dene any such handshakes. X.25 does not de-
ated. Routing a packet requires the node to look up the
ne any operations inside the packet network. It only
connection id in a table. The packet header can be small,
operates at the user-network-interface (UNI). Thus, the
as it only needs to contain this code and any information,
network provider is free to use any procedure it wishes
such as length, timestamp, or sequence number, which is
inside the network. X.25 does specify some limited re-
dierent for dierent packets.
transmission procedures at the UNI, and its link layer
protocol (LAPB) provides conventional HDLC-type link
management procedures. Frame Relay is a modied ver-
sion of ISDNs layer two protocol, LAPD and LAPB. As
such, its integrity operations pertain only between nodes
43.4 Packet switching in networks on a link, not end-to-end. Any retransmissions must be
carried out by higher layer protocols. The X.25 UNI
Packet switching is used to optimize the use of the protocol is part of the X.25 protocol suite, which con-
channel capacity available in digital telecommunication sists of the lower three layers of the OSI Model. It was
networks such as computer networks, to minimize the widely used at the UNI for packet switching networks
transmission latency (the time it takes for data to pass during the 1980s and early 1990s, to provide a standard-
across the network), and to increase robustness of com- ized interface into and out of packet networks. Some
munication. implementations used X.25 within the network as well,
but its connection-oriented features made this setup cum-
The best-known use of packet switching is the Internet bersome and inecient. Frame relay operates princi-
and most local area networks. The Internet is imple- pally at layer two of the OSI Model. However, its ad-
mented by the Internet Protocol Suite using a variety dress eld (the Data Link Connection ID, or DLCI) can
of Link Layer technologies. For example, Ethernet and be used at the OSI network layer, with a minimum set
Frame Relay are common. Newer mobile phone tech- of procedures. Thus, it rids itself of many X.25 layer 3
nologies (e.g., GPRS, i-mode) also use packet switching. encumbrances, but still has the DLCI as an ID beyond
X.25 is a notable use of packet switching in that, de- a node-to-node layer two link protocol. The simplicity
spite being based on packet switching methods, it pro- of Frame Relay makes it faster and more ecient than
vided virtual circuits to the user. These virtual circuits X.25. Because Frame relay is a data link layer proto-
carry variable-length packets. In 1978, X.25 provided the col, like X.25 it does not dene internal network rout-
rst international and commercial packet switching net- ing operations. For X.25 its packet IDs---the virtual cir-
work, the International Packet Switched Service (IPSS). cuit and virtual channel numbers have to be correlated to
Asynchronous Transfer Mode (ATM) also is a virtual cir- network addresses. The same is true for Frame Relays
cuit technology, which uses xed-length cell relay con- DLCI. How this is done is up to the network provider.
nection oriented packet switching. Frame Relay, by virtue of having no network layer pro-
cedures is connection-oriented at layer two, by using the
Datagram packet switching is also called connection- HDLC/LAPD/LAPB Set Asynchronous Balanced Mode
less networking because no connections are established. (SABM). X.25 connections are typically established for
Technologies such as Multiprotocol Label Switching each communication session, but it does have a feature
(MPLS) and the Resource Reservation Protocol (RSVP) allowing a limited amount of trac to be passed across
create virtual circuits on top of datagram networks. the UNI without the connection-oriented handshake. For
Virtual circuits are especially useful in building robust a while, Frame Relay was used to interconnect LANs
failover mechanisms and allocating bandwidth for delay- across wide area networks. However, X.25 and well as
sensitive applications. Frame Relay have been supplanted by the Internet Pro-
MPLS and its predecessors, as well as ATM, have been tocol (IP) at the network layer, and the Asynchronous
called fast packet technologies. MPLS, indeed, has Transfer Mode (ATM) and or versions of Multi-Protocol
been called ATM without cells.[13] Modern routers, Label Switching (MPLS) at layer two. A typical cong-
however, do not require these technologies to be able uration is to run IP over ATM or a version of MPLS.
to forward variable-length packets at multigigabit speeds <Uyless Black, X.25 and Related Protocols, IEEE Com-
across the network. puter Society, 1991> <Uyless Black, Frame Relay Net-
152 CHAPTER 43. PACKET SWITCHING
ConnNet JANET
ConnNet was a packet-switched data network operated by JANET was the UK academic and research network,
the Southern New England Telephone Company serving linking all universities, higher education establishments,
the state of Connecticut. publicly funded research laboratories. The X.25 network
was based mainly on GEC 4000 series switches, and run
X.25 links at up to 8 Mbit/s in its nal phase before being
Datanet 1 converted to an IP based network. The JANET network
grew out of the 1970s SRCnet (later called SERCnet) net-
Datanet 1 was the public switched data network operated work.
by the Dutch PTT Telecom (now known as KPN). Strictly
speaking Datanet 1 only referred to the network and the
connected users via leased lines (using the X.121 DNIC PSS
2041), the name also referred to the public PAD service
Telepad (using the DNIC 2049). And because the main Packet Switch Stream (PSS) was the UK Post Oce
Videotex service used the network and modied PAD de- (later to become British Telecom) national X.25 network
vices as infrastructure the name Datanet 1 was used for with a DNIC of 2342. British Telecom renamed PSS un-
these services as well. Although this use of the name was der its GNS (Global Network Service) name, but the PSS
incorrect all these services were managed by the same name has remained better known. PSS also included pub-
people within one department of KPN contributed to the lic dial-up PAD access, and various InterStream gateways
confusion.[52] to other services such as Telex.
Datapac Transpac
DATAPAC was the rst operational X.25 network Transpac was the national X.25 network in France. It was
(1976). It covered major Canadian cities and was even- developed locally at about the same time as DATAPAC in
tually extended to smaller centres. Canada. The development was done by the French PTT
and inuenced by the experimental RCP network. It be-
gan operation in 1978.[54]
Datex-P
tions between national networks blurred. The user no Main article: NSFNET
longer saw network identiers such as the DNIC. Some
older technologies such as circuit switching have resur- The National Science Foundation Network (NSFNET)
faced with new names such as fast packet switching. Re- was a program of coordinated, evolving projects spon-
searchers have created some experimental networks to sored by the National Science Foundation (NSF) begin-
complement the existing Internet. ning in 1985 to promote advanced research and education
networking in the United States.[61] NSFNET was also the
name given to several nationwide backbone networks op-
CSNET
erating at speeds of 56 kbit/s, 1.5 Mbit/s (T1), and 45
Mbit/s (T3) that were constructed to support NSFs net-
The Computer Science Network (CSNET) was a com-
working initiatives from 1985-1995. Initially created to
puter network funded by the U.S. National Science Foun-
link researchers to the nations NSF-funded supercom-
dation (NSF) that began operation in 1981. Its purpose
puting centers, through further public funding and private
was to extend networking benets, for computer science
industry partnerships it developed into a major part of the
departments at academic and research institutions that
Internet backbone.
could not be directly connected to ARPANET, due to
funding or authorization limitations. It played a signif-
icant role in spreading awareness of, and access to, na- NSFNET regional networks
tional networking and was a major milestone on the path
to development of the global Internet.[56][57] In addition to the ve NSF supercomputer centers,
NSFNET provided connectivity to eleven regional net-
works and through these networks to many smaller re-
Internet2 gional and campus networks in the United States. The
NSFNET regional networks were:[62][63]
Internet2 is a not-for-prot United States computer
networking consortium led by members from the BARRNet, the Bay Area Regional Research Net-
research and education communities, industry, and work in Palo Alto, California;
government.[58] The Internet2 community, in partner-
ship with Qwest, built the rst Internet2 Network, called CERFNET, California Education and Research
Abilene, in 1998 and was a prime investor in the National Federation Network in San Diego, California, serv-
LambdaRail (NLR) project.[59] In 2006, Internet2 an- ing California and Nevada;
nounced a partnership with Level 3 Communications to
launch a brand new nationwide network, boosting its ca- CICNet, the Committee on Institutional Coopera-
[60]
pacity from 10 Gbit/s to 100 Gbit/s. In October, 2007, tion Network via the Merit Network in Ann Arbor,
Internet2 ocially retired Abilene and now refers to its Michigan and later as part of the T3 upgrade via
new, higher capacity network as the Internet2 Network. Argonne National Laboratory outside of Chicago,
serving the Big Ten Universities and the University
of Chicago in Illinois, Indiana, Michigan, Min-
NSFNET nesota, Ohio, and Wisconsin;
NYSERNet, New York State Education and Re- one of the rst ever production OC-48c (2.5 Gbit/s) IP
search Network in Ithaca, New York; links in February 1999 and went on to upgrade the entire
backbone to OC-48c.[73]
JVNCNet, the John von Neumann National Super-
computer Center Network in Princeton, New Jersey, In June 1999 MCI WorldCom introduced vBNS+ which
serving Delaware and New Jersey; allowed attachments to the vBNS network by organiza-
tions that were not approved by or receiving support from
SESQUINET, the Sesquicentennial Network in NSF.[74] After the expiration of the NSF agreement, the
Houston, Texas, founded during the 150th anniver- vBNS largely transitioned to providing service to the gov-
sary of the State of Texas; ernment. Most universities and research centers migrated
to the Internet2 educational backbone. In January 2006,
SURAnet, the Southeastern Universities Research when MCI and Verizon merged,[75] vBNS+ became a ser-
Association network in College Park, Maryland and vice of Verizon Business.[76]
later as part of the T3 upgrade in Atlanta, Geor-
gia serving Alabama, Florida, Georgia, Kentucky,
Louisiana, Maryland, Mississippi, North Carolina,
South Carolina, Tennessee, Virginia, and West Vir- 43.7 See also
ginia, sold to BBN in 1994; and
Circuit switching
Westnet in Salt Lake City, Utah and Boulder, Col-
orado, serving Arizona, Colorado, New Mexico, CompuServe
Utah, and Wyoming.
Message switching
Virtual circuit
TransPAC2 and TransPAC3, continuations of the
TransPAC project, a high-speed international Internet Virtual private network
service connecting research and education networks
in the Asia-Pacic region to those in the US.[69][70]
TransPAC is part of the NSFs International Research
Network Connections (IRNC) program.[71]
43.8 References
[1] Paul Baran, On Distributed Communications, Volume I
Very high-speed Backbone Network Service (vBNS) XI, Rand Corporation Research Report, August 1964
The Very high-speed Backbone Network Service (vBNS) [2] Larry Roberts, The Evolution of Packet Switching, Invited
paper, IEEE, November 1978.
came on line in April 1995 as part of a National
Science Foundation (NSF) sponsored project to pro- [3] Martin Weik - Fiber Optics Standard Dictionary Springer
vide high-speed interconnection between NSF-sponsored Science & Business Media 6 Dec 2012, 1219 pages, ISBN
supercomputing centers and select access points in the 1461560233 [Retrieved 2015-08-04]
United States.[72] The network was engineered and op-
erated by MCI Telecommunications under a cooperative [4] National Telecommunication Information Administration
agreement with the NSF. By 1998, the vBNS had grown - Telecommunications: Glossary of Telecommunications
Terms published by Government Institutes 1 Apr 1997,
to connect more than 100 universities and research and
480 pages, ISBN 1461732328, Volume 1037, Part 3 of
engineering institutions via 12 national points of presence
Federal Standard [Retrieved 2015-08-04]
with DS-3 (45 Mbit/s), OC-3c (155 Mbit/s), and OC-12c
(622 Mbit/s) links on an all OC-12c backbone, a substan- [5] Stewart, Bill (2000-01-07). Paul Baran Invents Packet
tial engineering feat for that time. The vBNS installed Switching. Living Internet. Retrieved 2008-05-08.
158 CHAPTER 43. PACKET SWITCHING
[6] Baran, Paul (May 27, 1960). Reliable Digital Com- [23] Pearson, DJ; Wilkin, D (1974). Some Design Aspects
munications Using Unreliable Network Repeater Nodes of a public packet switching network. Proceedings of the
(PDF). The RAND Corporation: 1. Retrieved July 7, 2nd ICCC 74. pp. 199213.
2016.
[24] Kirstein, Peter T. (1973). A SURVEY OF PRESENT
[7] Baran, Paul (1962). RAND Paper P-2626. AND PLANNED GENERAL PURPOSE EUROPEAN
DATA AND COMPUTER NETWORKS. Proceedings
[8] On Distributed Communications of the NATO Advanced Study Institute on Computer Com-
munication Networks. Sussex, United Kingdom: Noord-
[9] Davies, D. W. (17 March 1986), Oral History 189: D. ho International Publishing.
W. Davies interviewed by Martin Campbell-Kelly at the
National Physical Laboratory, Charles Babbage Institute [25] Schwartz, Mischa; Boorstyn, Rober R.; Pick-
University of Minnesota, Minneapolis, retrieved 21 July holtz, Raymond L. (November 1972). Terminal-
2014 Oriented Computer-Communication Networks.
Proceedings of the IEEE. 60 (11): 140823.
[10] The IBM 2321 Data Cell Drive, Columbia University doi:10.1109/proc.1972.8912.
Computing History
[26] Maintaining IPX Compatibility During a Migration to
[11] The IBM 1360 Photostore, Lawrence Livermore Labora- TCP/IP on a NetWare Network, Rich Lee, Novell, 1
tory Computing History March 1998. Retrieved 3 September 2013.
[12] Mendicino, Samuel (1970-11-30). Octopus: The [27] Merit receives administrative services under an agreement
Lawrence Radiation Laboratory Network. Retrieved with the University of Michigan.
2009-05-06.
[28] A Chronicle of Merits Early History, John Mulcahy, 1989,
[13] Interview with the author (of an MPLS-based VPN arti- Merit Network, Ann Arbor, Michigan
cle), G. Pildush
[29] Merit Network Timeline: 19701979, Merit Network,
[14] Taylor, Steve; Jim Metzler (2008). Vint Cerf on why Ann Arbor, Michigan
TCP/IP was so long in coming.
[30] Merit Network Timeline: 19801989, Merit Network,
[15] A History of Macintosh Networking, Alan Oppen- Ann Arbor, Michigan
heimer, MacWorld Expo, January 2004
[31] Scantlebury, R. A.; Wilkinson, P.T. (1974). The Na-
[16] Inside AppleTalk, Second Edition, Gursharan Sidhu, tional Physical Laboratory Data Communications Net-
Richard Andrews and Alan Oppenheiner, Addison- work. Proceedings of the 2nd ICCC 74. pp. 223228.
Wesley, 1989, ISBN 0-201-55021-0
[32] Mendicino, Samuel F. (1972). 1970 OCTOPUS: THE
[17] Martel, C. C.; J. M. Cunningham; M. S. Grush- LAWRENCE RADIATION LABORATORY NET-
cow. THE BNR NETWORK: A CANADIAN EXPE- WORK. COMPUTER NETWORKS. Englewood Clis,
RIENCE WITH PACKET SWITCHING TECHNOL- N.J.: Prentice-Hall Inc.: 95100.
OGY. IFIP Congress 1974. pp. 1014. [33] Pehrson, David L. (1970). AN ENGINEERING VIEW
OF THE LRL OCTOPUS COMPUTER NETWORK.
[18] A Technical History of CYCLADES. Technical Histo-
ries of the Internet & other Network Protocols. Computer [34] Fletcher, John G. (1975). Principles of Design in the
Science Department, University of Texas Austin. Octopus Computer network.
[19] The Cyclades Experience: Results and Impacts, Zim- [35] Burnett, D.J.; Sethi, H.R. Packet Switching at
mermann, H., Proc. IFIP'77 Congress, Toronto, August Philips Research Laboratories. Computer Networks.
1977, pp. 465469 North-Holland Publishing Company. 1: 341348.
doi:10.1016/0376-5075(77)90010-1.
[20] Digital Equipment Corporation, Nineteen Fifty-Seven to
the Present, Digital Equipment Corporation, 1978, page [36] David R. Boggs; John F. Shoch; Edward A. Taft; Robert
53. Retrieved 3 September 2013. M. Metcalfe (April 1980). Pup: An Internetwork Archi-
tecture. IEEE Transactions on Communications. 28 (4):
[21] Wood, David C. (1975). A SURVEY OF THE CAPA- 612624. doi:10.1109/TCOM.1980.1094684.
BILITIES OF 8 PACKET SWITCHING NETWORKS.
Proceedings of Symposium on Computer Networks. pp. 1 [37] Desprs, R. (1974). RCP, THE EXPERIMENTAL
7. PACKET-SWITCHED DATA TRANSMISSION SER-
VICE OF THE FRENCH PTT. Proceedings of ICCC
[22] Bright, Roy D.; Smith, Michael A. (1973). 74. pp. 17185.
EXPERIMENTAL PACKET SWITCHING PROJECT
OF THE UK POST OFFICE. Proceedings of the [38] Bache, A.; Matras, Y. (1976). Fundamental Choices
NATO Advanced Study Institute on Computer Communi- in the Development of RCP, the Experimental Packet-
cation Networks. Sussex, United Kingdom: Noordho Switching Data Transmission Service of the French PTT.
International Publishing. pp. 43544. Proceedings of ICCC 76. pp. 31116.
43.8. REFERENCES 159
[39] Bache, A.; L. Guillou; H. Layec; B. Long; Y. Matras [56] The InternetFrom Modest Beginnings. NSF website.
(1976). RCP, the Experimental Packet-Switched Data Retrieved September 30, 2011.
Transmission Service of the French PTT: History, Con-
nections, Control. Proceedings of ICCC 76. [57] Douglas Comer (October 1983). History and overview
of CSNET. Communications. Association for Comput-
[40] Alarcia, G.; Herrera, S. (1974). C.T.N.E.'s PACKET ing Machinery. 26 (10). doi:10.1145/358413.358423.
SWITCHING NETWORK. ITS APPLICATIONS.
Proceedings of 2nd ICCC 74. pp. 163170. [58] About Internet2, Retrieved on 2009-06-26
[41] Cuenca, L. (1980). A PUBLIC PACKET SWITCHING [59] Optical networking: The next generation, Marguerite
DATA COMMUNICATIONS NETWORK: EIGHT Reardon, CNET News, October 11, 2004
YEARS OF OPERATING EXPERIENCE. Conference
Record of ICC 80. IEEE. pp. 39.3.139.3.5. [60] Speedy Internet2 gets 10x boost, Anick Jesdanun (AP),
USAToday.com, October 11, 2007, Retrieved 26 June
[42] Lavandera, Luis (1980). ARCHITECTURE, PROTO- 2009.
COLS AND PERFORMANCE OF RETD. Conference
Record of ICC 80. IEEE. pp. 28.4.128.4.5. [61] NSFNET: The Partnership That Changed The World,
Web site for an event held to celebrate the NSFNET,
[43] Haarala, Arja-Riitta. Libraries as key players at the local November 2007
level.
[62] Retiring the NSFNET Backbone Service: Chronicling
[44] Chretien, G.J.; Konig, W.M.; Rech, J.H. (1973). The the End of an Era, Susan R. Harris and Elise Gerich,
SITA Network. Proceedings of the NATO Advanced ConneXions, Vol. 10, No. 4, April 1996
Study Institute on Computer Communication Networks.
Sussex, United Kingdom: Noordho International Pub- [63] NSFNET: The Community, panel presentation slides,
lishing. pp. 373396. Doug Gale moderator, NSFNET: The Partnership That
Changed The World, 29 November 2007
[45] Sundstrom, R.J.; G.D. Schultz (1980). 1980 SNA'S First
Six Years: 1974-1980. Proceedings of 5th ICCC 80. pp. [64] MeritWho, What, and Why, Part One: The Early Years,
578585. 1964-1983, Eric M. Aupperle, Merit Network, Inc., in
Library Hi Tech, vol. 16, No. 1 (1998)
[46] Electronic post for switching data. Timothy Johnson.
New Scientist. May 13, 1976 [65] BBN to operate NEARnet, MIT News, 14 July 1993
[47] Mathison, S.L. Roberts, L.G.; Walker, P.M., The history [66] About NorthWestNet, NorthWestNet User Services In-
of telenet and the commercialization of packet switching ternet Resource Guide, NorthWestNet Academic Comput-
in the U.S., Communications Magazine, IEEE, May 2012 ing Consortium, Inc., 24 March 1992 accessed 3 July
[48] TYMES, LA ROY W. TYMNET A terminal oriented 2012
communication network. Proceedings of the SJCC 1971. [67] Michael Feldman (October 28, 2008). National Lamb-
38. pp. 21116. daRail Opens for Business. HPCwire. Retrieved June 6,
[49] TYMES, LA ROY W. (April 1981). Routing and Flow 2013.
Control in TYMNET. IEEE Transactions on Communi-
[68] About NLR, National LambdaRail, 3 September 2013.
cations. COM-29 (4): 39298.
[69] International TransPAC2 Inaugurated, HPC Wire, 8
[50] Xerox System Integration Standard - Internet Transport
April 2005.
Protocols, Xerox, Stamford, 1981.
[51] Chapter 12: Xerox Network Systems, AIX Version [70] TransPAC website. Retrieved 3 September 2013.
4.3 Communications Programming Concepts, International [71] TransPAC3 - Asia-US High Performance International
Business Machines, October 1997. Networking, International Research Network Connec-
[52] H.J. Steneker: Graduation Report on X.25 data services tions Program (IRNC), U.S. National Science Founda-
in GSM network Electrical Engineering - TUE, 16 May tion, October 2011. Retrieved 3 September 2013.
1991. Chapter 3: page 20 and further, Retrieved 15 June
[72] NSF Solicitation 93-52 - Network Access Point Man-
2011
ager, Routing Arbiter, Regional Network Providers, and
[53] Tomaru, K.; T. Kato; S.I. Yamaguchi (1980). A Private Very High Speed Backbone Network Services Provider
Packet Network and Its Application in A Worldwide In- for NSFNET and the NREN(SM) Program, May 6, 1993
tegrated Communication Network. Proceedings of ICCC
[73] vBNS: not your fathers Internet, John Jamison, Randy
'80. pp. 51722.
Nicklas, Greg Miller, Kevin Thompson, Rick Wilder,
[54] X.25 Virtual Circuits - Transpac in France - Pre-Internet Laura Cunningham and Chuck Song, IEEE Spectrun, Vol-
Data Networking. ume 35 Issue 7 (July 1998), pp. 38-46.
[55] KDDI to Close VENUS-P International Public Data [74] MCI WorldCom Introduces Next Generation vBNS+ For
Communications Service, KDDI, 9 November 2005. All Higher Education And Research Organizations, Ver-
Retrieved 3 September 2013. izon Business News, June 23, 1999
160 CHAPTER 43. PACKET SWITCHING
[75] Verizon and MCI Close Merger, Creating a Stronger Norberg, Arthur; O'Neill, Judy E. Transforming
Competitor for Advanced Communications Services, Computer Technology: Information Processing for
Verizon Business News, January 6, 2006 the Pentagon, 1962-1982 (Johns Hopkins Univer-
sity, 1996)
[76] vBNS+, at http://www.verizonbusiness.com Home > So-
lutions > Government > Federal Government > Contract
Vehicles > FTS2001 Bridge > Products
43.10 External links
43.8.1 Bibliography Oral history interview with Paul Baran. Charles
Babbage Institute University of Minnesota, Min-
Leonard Kleinrock, Information Flow in Large neapolis. Baran describes his working environment
Communication Nets, (MIT, Cambridge, May 31, at RAND, as well as his initial interest in surviv-
1961) Proposal for a Ph.D. Thesis able communications, and the evolution, writing and
distribution of his eleven-volume work, On Dis-
Leonard Kleinrock. Information Flow in Large
tributed Communications. Baran discusses his in-
Communication Nets (RLE Quarterly Progress Re- teraction with the group at ARPA who were respon-
port, July 1961)
sible for the later development of the ARPANET.
Leonard Kleinrock. Communication Nets: Stochastic Packet Switching History and Design, site reviewed
Message Flow and Delay (McGraw-Hill, New York, by Baran, Roberts, and Kleinrock
1964)
Paul Baran and the Origins of the Internet
Paul Baran et al., On Distributed Communications,
Volumes I-XI (RAND Corporation Research Docu- A Brief History of the Internet
ments, August, 1964)
Hobbes Internet Timeline v8.1, Robert H'obbes
Paul Baran, On Distributed Communications: Zakon, Zakon Group LLC
I Introduction to Distributed Communications
20+ articles on packet switching in the 70s
Network (RAND Memorandum RM-3420-
PR. August 1964) An Introduction to Packet Switched Networks,
Phrack, 05/3/88
Paul Baran, On Distributed Communications Net-
works, (IEEE Transactions on Communications
Systems, Vol. CS-12 No. 1, pp. 19, March 1964) This article is based on material taken from the Free On-
line Dictionary of Computing prior to 1 November 2008
D. W. Davies, K. A. Bartlett, R. A. Scantlebury, and and incorporated under the relicensing terms of the
P. T. Wilkinson, A digital communications network GFDL, version 1.3 or later.
for computers giving rapid response at remote termi-
nals (ACM Symposium on Operating Systems Prin-
ciples. October 1967)
Peer-to-peer SIP
In another approach, SIP over P2P, the SIP location ser- [3] RFC 3261, SIP: Session Initiation Protocol, J. Rosenberg,
vice is replaced by conventional P2P overlay network- H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,
ing approach, such as the OverSim framework.[5] In this R. Sparks, M. Handley, E. Schooler, The Internet Society
model, the overlay network is used for service or node dis- (June 2002)
covery and rendezvous. The search key in such a mecha- [4] Rdiger Schollmeier, Gero Schollmeier (September 5
nism is the Uniform Resource Identier (URI) of a user 7, 2002), Why Peer-to-Peer (P2P) Does Scale: An Anal-
agent. This URI requires resolution to a particular device ysis of P2P Trac Patterns, Proceedings of the IEEE
or Uniform Resource Locator (URL) that must be per- 2002 International Conference on Peer-to-Peer Comput-
formed in real time. P2P-SIP systems may employ struc- ing (P2P2002), Linkping, Sweden
161
162 CHAPTER 44. PEER-TO-PEER SIP
pin"; often redundantly PIN number) is a numeric The international standard for nancial services PIN
password used to authenticate a user to a system. management, ISO 95641, allows for PINs from four up
to twelve digits, but recommends that for usability reasons
PINs may be used with banking systems to authenticate
the card issuer not assign a PIN longer than six digits.[7]
the identity of the cardholder, but are also used in other,
The inventor of the ATM, John Shepherd-Barron, had
non-nancial systems.
at rst envisioned a six-digit numeric code, but his wife
Usually, both a private PIN and public user identier is could only remember four digits, and that has become the
required to authenticate a user to the system. In these most commonly used length in many places,[3] although
situations, typically the user is required to provide a non- banks in Switzerland and many other countries require a
condential user identier or token (the user ID) and a six-digit PIN .
condential PIN to gain access to the system. Upon re-
ceiving the user ID and PIN, the system looks up the
PIN based upon the user ID and compares the looked- 45.3 PIN validation
up PIN with the received PIN. The user is granted access
only when the number entered matches with the number
stored in the system. Hence, despite the name, a PIN does There are several main methods of validating PINs. The
not personally identify the user.[1] The PIN is not printed operations discussed below are usually performed within
or embedded on the card but is manually entered by the a hardware security module (HSM).
cardholder during automated teller machine (ATM) and
point of sale (POS) transactions (such as those that com-
45.3.1 IBM 3624 method
ply with EMV), and in card not present transactions, such
as over the Internet or for phone banking. One of the earliest ATM models was the IBM 3624,
PINs may also be used in contexts other than ATM or which used the IBM method to generate what is termed a
POS transactions, such as door access, Internet transac- natural PIN. The natural PIN is generated by encrypting
tions, or to log in to a restricted website. In such cases, the primary account number (PAN), using an encryption
the PIN may simply be a password, and not necessarily key generated specically for the purpose.[8] This key is
associated with a specic card. sometimes referred to as the PIN generation key (PGK).
163
164 CHAPTER 45. PERSONAL IDENTIFICATION NUMBER
This PIN is directly related to the primary account num- index (PVKI, chosen from one to six) and the required
ber. To validate the PIN, the issuing bank regenerates the PIN value to make a 64 bit number, the PVKI selects a
PIN using the above method, and compares this with the validation key (PVK, of 128 bits) to encrypt this number.
entered PIN. From this encrypted value, the PVV is found.[11]
Natural PINs can not be user selectable because they are To validate the PIN, the issuing bank calculates a PVV
derived from the PAN. If the card is reissued with a new value from the entered PIN and PAN and compares this
PAN, a new PIN must be generated. value to the reference PVV. If the reference PVV and the
Natural PINs allow banks to issue PIN reminder letters calculated PVV match, the correct PIN was entered.
as the PIN can be generated. Unlike the IBM method, the VISA method doesn't derive
a PIN. The PVV value is used to conrm the PIN entered
at the terminal, was also used to generate the reference
45.3.2 IBM 3624 + oset method PVV. The PIN used to generate a PVV can be randomly
generated or user selected or even derived using the IBM
To allow user selectable PINs it is possible to store a PIN method.
oset value. The oset is found by subtracting natural
PIN from the customer selected PIN using modulo 10.[9]
For example, if the natural PIN is 1234, and the user 45.4 PIN security
wishes to have a PIN of 2345, the oset is 1111.
The oset can be stored either on the card track data,[10] Financial PINs are often four-digit numbers in the
or in a database at the card issuer. range 0000-9999, resulting in 10,000 possible numbers.
To validate the PIN, the issuing bank calculates the natu- Switzerland issues six-digit PINs by default.
ral PIN as in the above method, then adds the oset and Some systems set up default PINs and most allow the cus-
compares this value to the entered PIN. tomer to set up a PIN or to change the default one, and on
some a change of PIN on rst access is mandatory. Cus-
tomers are usually advised not to set up a PIN based on
45.3.3 VISA method their or their spouses birthdays, on driver license num-
bers, consecutive or repetitive numbers, or some other
schemes. Some nancial institutions do not give out or
permit PINs where all digits are identical (such as 1111,
2222, ...), consecutive (1234, 2345, ), numbers that
start with one or more zeroes, or the last four digits of the
cardholders social security number or birth date.
Many PIN verication systems allow three attempts,
thereby giving a card thief a putative 0.03% probability of
guessing the correct PIN before the card is blocked. This
holds only if all PINs are equally likely and the attacker
has no further information available, which has not been
the case with some of the many PIN generation and ver-
ication algorithms that nancial institutions and ATM
manufacturers have used in the past.[12]
Research has been done on commonly used PINs.[13] The
result is that without forethought, a sizable portion of
users may nd their PIN vulnerable. Armed with only
four possibilities, hackers can crack 20% of all PINs. Al-
low them no more than fteen numbers, and they can tap
When using this credit card terminal, a VISA cardholder swipes the accounts of more than a quarter of card-holders.[14]
or inserts their credit card, and enters their PIN on the keypad Breakable PINs can worsen with length, to wit:
The VISA method is used by many card schemes and is The problem with guessable PINs surpris-
not VISA-specic. The VISA method generates a PIN ingly worsens when customers are forced to
verication value (PVV). Similar to the oset value, it use additional digits, moving from about a 25%
can be stored on the cards track data, or in a database at probability with fteen numbers to more than
the card issuer. This is called the reference PVV. 30% (not counting 7-digits with all those phone
The VISA method takes the rightmost eleven digits of the numbers). In fact, about half of all 9-digit
PAN excluding the checksum value, a PIN validation key PINs can be reduced to two dozen possibili-
45.8. REFERENCES 165
ties, largely because more than 35% of all peo- 45.8 References
ple use the all too tempting 123456789. As
for the remaining 64%, theres a good chance [1] Your ID number is not a password, Webb-site.com, 8
they're using their Social Security Number, November 2010
which makes them vulnerable. (Social Secu-
[2] Jarunee Wonglimpiyara, Strategies of Competition in the
rity Numbers contain their own well-known
Bank Card Business (2005), p. 1-3.
patterns.)[14]
[3] The man who invented the cash machine. BBC. 2007-
06-25. Retrieved 2014-06-15.
45.4.1 Implementation aws [4] ATM inventor John Shepherd-Barron dies at 84. Los
Angeles Times. 19 May 2010 via Associated Press.
In 2002 two PhD students at Cambridge University, Pi-
otr Zieliski and Mike Bond, discovered a security aw [5] Jarunee Wonglimpiyara, Strategies of Competition in the
in the PIN generation system of the IBM 3624, which Bank Card Business (2005), p. 5.
was duplicated in most later hardware. Known as the [6] Royal honour for inventor of Pin. BBC. 2006-06-16.
decimalization table attack, the aw would allow some- Retrieved 2007-11-05.
one who has access to a banks computer system to de-
termine the PIN for an ATM card in an average of 15 [7] ISO 9564-1:2011 Financial services Personal Identi-
guesses.[15][16] cation Number (PIN) management and security Part 1:
Basic principles and requirements for PINs in card-based
systems, clause 8.1 PIN length
45.5 Reverse PIN hoax [8] 3624 PIN Generation Algorithm. IBM.
Rumours have been in e-mail circulation claiming that in [11] PVV Generation Algorithm. IBM.
the event of entering a PIN into an ATM backwards, po- [12] Kuhn, Markus (July 1997). Probability theory for pick-
lice will be instantly alerted as well as money being ordi- pockets ec-PIN guessing (PDF). Retrieved 2006-11-
narily issued as if the PIN had been entered correctly.[17] 24.
The intention of this scheme would be to protect victims
of muggings; however, despite the system being proposed [13] Nick Berry (28 September 2012). The most common pin
numbers: is your bank account vulnerable?". Guardian
for use in some US states,[18][19] there are no ATMs cur-
newspaper website. Retrieved 2013-02-25.
rently in existence that employ this software.
[14] Lundin, Leigh (2013-08-04). PINs and Passwords, Part
1. Passwords. Orlando: SleuthSayers. Armed with only
four possibilities, hackers can crack 20% of all PINs.
45.6 Mobile phone passcodes
[15] Zieliski, P & Bond, M (February 2003). Decimalisation
table attacks for PIN cracking (PDF). University of Cam-
A mobile phone may be PIN protected. If enabled, the bridge Computer Laboratory. Retrieved 2006-11-24.
PIN (also called a passcode) for GSM mobile phones can
be between four and eight digits[20] and is recorded in [16] Media coverage. University of Cambridge Computer
the SIM card. If such a PIN is entered incorrectly three Laboratory. Retrieved 2006-11-24.
times, the SIM card is blocked until a personal unblocking [17] Reverse PIN Panic Code. Retrieved 2007-03-02.
code (PUC or PUK), provided by the service operator, is
entered. If the PUC is entered incorrectly ten times, the [18] Full Text of SB0562 Illinois General Assembly, accessed
SIM card is permanently blocked, requiring a new SIM 2011-07-20
card from the mobile carrier service.
[19] sb379_SB_379_PF_2.html Senate Bill 379 Georgia Gen-
eral Assembly, published 2006, accessed 2011-07-20
The Primary Rate Interface (PRI) is a Each B-channel carries data, voice, and other services.
telecommunications interface standard used on an The D-channel carries control and signaling information.
Integrated Services Digital Network (ISDN) for carrying Larger connections are possible using PRI pairing. A
multiple DS0 voice and data transmissions between the dual T1-PRI could have 24 + 23 = 47 B-channels and
network and a user. 1 D-channel (often called 47B + D), but more com-
monly has 46 B-channels and 2 D-channels thus providing
PRI is the standard for providing telecommunication ser-
vices to oces. It is based on the T-carrier (T1) line in a backup signaling channel. The concept applies to E1s
as well and both can include more than 2 PRIs. When
the US and Canada, and the E-carrier (E1) line in Europe.
The T1 line consists of 24 channels, while an E1 has 32. conguring multiple T1s as ISDN-PRIs, its possible to
use NFAS (non-facility associated signalling) to enable
PRI provides a varying number of channels depending one or two D-channels to support additional B-channels
on the standards in the country of implementation. In on separate T1 circuits.
North America and Japan it consists of 23xB (B chan-
nels (bearer channels)) and 1xD (D channel (data[1] chan-
nel)) (23 64-kbit/s digital channels + 1 64-kbit/s signal-
ing/control channel) on a T1 (1.544 Mbit/s). In Europe 46.3 Application
and Australia it is 30B + D[2] on an E1 2.048 Mbit/s. One
timeslot(0) on the E1 is used for synchronization purposes The Primary Rate Interface channels are typically used
and is not considered to be a B or D channel. The D- by medium to large enterprises with digital PBXs to pro-
channel typically uses timeslot 16 on an E1, vs timeslot vide them digital access to the Public Switched Telephone
24 for a T1. Network (PSTN). The 23 (or 30) B-channels can be used
exibly and reassigned when necessary to meet special
needs such as video conferences. The Primary Rate user
46.1 Fractional T1 is hooked up directly to the telephone company central
oce.
Fewer active B channels (also called bearer channels) can PRI channels and direct inward dialing are also common
be used for a fractional T1. Bearer channels may also be as a means of delivering inbound calls to voice over IP
known as user channels. More channels can be used with gateways from the PSTN.
more T1s, within certain design limits.[3]
D channel
BRI, the Basic Rate Interface: two 64-kbit/s B
channels and one 16-kbit/s D channel, intended for B channel
homes and small enterprises
Caller ID spoong
PRI, the Primary Rate Interface for large organiza-
tions, with one 64-kbit/s D channel and 23 (1.536 DHEC
Mbit/s T1, a.k.a. 23B + D) or 30, 64-kbit/s B
channels (2.048 Mbit/s E1, a.k.a. 30B + D).
166
46.5. REFERENCES 167
46.5 References
[1] https://books.google.com/books?id=
0LyDQgAACAAJ&dq=newton%27s+telecom+
dictionary+16th+edition
[2] https://www.itu.int/rec/T-REC-I.412-198811-I/en
The public switched telephone network (PSTN) is frequency, culminating in the SS7 network that connected
the aggregate of the worlds circuit-switched telephone most exchanges by the end of the 20th century.
networks that are operated by national, regional, or lo- The growth of the PSTN meant that teletrac engineer-
cal telephony operators, providing infrastructure and ser-
ing techniques needed to be deployed to deliver quality
vices for public telecommunication. The PSTN consists of service (QoS) guarantees for the users. The work of
of telephone lines, ber optic cables, microwave trans-
A. K. Erlang established the mathematical foundations of
mission links, cellular networks, communications satel- methods required to determine the capacity requirements
lites, and undersea telephone cables, all interconnected by
and conguration of equipment and the number of per-
switching centers, thus allowing most telephones to com- sonnel required to deliver a specic level of service.
municate with each other. Originally a network of xed-
line analog telephone systems, the PSTN is now almost In the 1970s the telecommunications industry began im-
entirely digital in its core network and includes mobile plementing packet switched network data services using
and other networks, as well as xed telephones.[1] the X.25 protocol transported over much of the end-to-
end equipment as was already in use in the PSTN.
The technical operation of the PSTN adheres to the stan-
dards created by the ITU-T. These standards allow dier- In the 1980s the industry began planning for digital ser-
ent networks in dierent countries to interconnect seam- vices assuming they would follow much the same pattern
lessly. The E.163 and E.164 standards provide a single as voice services, and conceived a vision of end-to-end
global address space for telephone numbers. The com- circuit switched services, known as the Broadband Inte-
bination of the interconnected networks and the single grated Services Digital Network (B-ISDN). The B-ISDN
numbering plan allow telephones around the world to dial vision has been overtaken by the disruptive technology of
each other. the Internet.
At the turn of the 21st century, the oldest parts of the
telephone network still use analog technology for the last
47.1 History (USA) mile loop to the end user. However, digital technologies
such as DSL, ISDN, FTTx, and cable modems have be-
come more common in this portion of the network.
The rst telephones had no network but were in private
use, wired together in pairs. Users who wanted to talk to Several large private telephone networks are not linked
dierent people had as many telephones as necessary for to the PSTN, usually for military purposes. There are
the purpose. A user who wished to speak whistled loudly also private networks run by large companies which are
into the transmitter until the other party heard. linked to the PSTN only through limited gateways, such
as a large private branch exchange (PBX).
However, a bell was added soon for signaling, so an at-
tendant no longer need wait for the whistle, and then a
switch hook. Later telephones took advantage of the ex-
change principle already employed in telegraph networks. 47.2 Operators
Each telephone was wired to a local telephone exchange,
and the exchanges were wired together with trunks. Net- The task of building the networks and selling services to
works were connected in a hierarchical manner until they customers fell to the network operators. The rst com-
spanned cities, countries, continents and oceans. This pany to be incorporated to provide PSTN services was
was the beginning of the PSTN, though the term was not the Bell Telephone Company in the United States.
used for many decades. In some countries, however, the job of providing tele-
Automation introduced pulse dialing between the phone phone networks fell to government as the investment re-
and the exchange, and then among exchanges, followed quired was very large and the provision of telephone ser-
by more sophisticated address signaling including multi- vice was increasingly becoming an essential public utility.
168
47.5. SEE ALSO 169
For example, the General Post Oce in the United King- one end to another via telephone exchanges. The call is
dom brought together a number of private companies to switched using a call set up protocol (usually ISUP) be-
form a single nationalized company. In recent decades tween the telephone exchanges under an overall routing
however, these state monopolies were broken up or sold strategy.
o through privatization. The call is carried over the PSTN using a 64 kbit/s chan-
nel, originally designed by Bell Labs. The name given
to this channel is Digital Signal 0 (DS0). The DS0 cir-
47.3 Regulation cuit is the basic granularity of circuit switching in a tele-
phone exchange. A DS0 is also known as a timeslot be-
In most countries, the central has a regulator dedicated to cause DS0s are aggregated in time-division multiplexing
monitoring the provision of PSTN services in that coun- (TDM) equipment to form higher capacity communica-
try. Their tasks may be for example to ensure that end tion links.
customers are not over-charged for services where mo- A Digital Signal 1 (DS1) circuit carries 24 DS0s on a
nopolies may exist. They may also regulate the prices North American or Japanese T-carrier (T1) line, or 32
charged between the operators to carry each others traf- DS0s (30 for calls plus two for framing and signaling) on
c. an E-carrier (E1) line used in most other countries. In
modern networks, the multiplexing function is moved as
close to the end user as possible, usually into cabinets at
47.4 Technology the roadside in residential areas, or into large business
premises.
47.4.1 Network topology These aggregated circuits are conveyed from the initial
multiplexer to the exchange over a set of equipment col-
Main article: PSTN network topology lectively known as the access network. The access net-
work and inter-exchange transport use synchronous opti-
The PSTN network architecture had to evolve over the cal transmission, for example, SONET and Synchronous
years to support increasing numbers of subscribers, calls, Digital Hierarchy (SDH) technologies, although some
connections to other countries, direct dialing and so on. parts still use the older PDH technology.
The model developed by the United States and Canada Within the access network, there are a number of refer-
was adopted by other nations, with adaptations for local ence points dened. Most of these are of interest mainly
markets. to ISDN but one the V reference point is of more
The original concept was that the telephone exchanges general interest. This is the reference point between a
are arranged into hierarchies, so that if a call cannot be primary multiplexer and an exchange. The protocols at
handled in a local cluster, it is passed to one higher up this reference point were standardized in ETSI areas as
for onward routing. This reduced the number of connect- the V5 interface.
ing trunks required between operators over long distances
and also kept local trac separate.
47.4.3 Impact on IP standards
However, in modern networks the cost of transmission
and equipment is lower and, although hierarchies still ex-
Voice quality over PSTN networks was used as the bench-
ist, they are much atter, with perhaps only two layers.
mark for the development of the Telecommunications
Industry Association's TIA-TSB-116 standard on voice-
47.4.2 Digital channels quality recommendations for IP telephony, to determine
acceptable levels of audio delay and echo.[2]
Main article: Telephone exchange
47.6 References
[1] Kushnick, Bruce (7 January 2013). What Are the Pub-
lic Switched Telephone Networks, 'PSTN' and Why You
Should Care?". Hungton Post Blog. Retrieved 11 April
2014.
171
172 CHAPTER 48. PUBLIC-SAFETY ANSWERING POINT
functionality over time, legacy PSAPs must continue to North American Numbering Plan
be supported as originating networks and the Emergency
Services infrastructure migrate toward IP. Next Generation 9-1-1
Public safety department
48.1.1 Legacy PSAP Gateway
The Legacy PSAP Gateway is a functional element of the 48.3 References
i3 Solution architecture that supports the interconnection
of the i3 ESInet with legacy PSAPs. The Legacy PSAP [1] NENA Fast Facts
Gateway is expected to provide interworking and other
[2] GR-3166, Legacy Public Safety Answering Point (PSAP)
functionality necessary for emergency calls routed via an Gateway Generic Requirements
i3 Emergency Services IP Network (ESInet) to be de-
livered to and handled by legacy PSAPs without requir-
ing changes to legacy PSAP Customer Premises Equip-
ment (CPE). Calls routed via an i3 ESInet and delivered
48.4 External links
to a legacy PSAP must undergo signaling interworking
(i.e., at the Legacy PSAP Gateway) to convert the in- MapInfo PSAP Pro
coming IP-based (i.e., Session Initiation Protocol [SIP])
The Development of 9-1-1 and Wireless 9-1-1
signaling supported by the ESInet to the traditional Multi-
Overview, from NENAs website
Frequency (MF) or Enhanced Multi-Frequency (E-MF)
signaling supported by the legacy PSAP. Functionality Enhanced 911 PSAP Registry from the Federal
must also be applied by the Legacy PSAP Gateway to Communications Commission website
emergency call originations to allow the legacy PSAP to
experience call delivery, Automatic Location Identica- NAED website
tion (ALI) data retrieval, and feature activation the same
way as they do today.
The Legacy PSAP Gateway must also support an ALI
interface over which it can receive and respond to ALI
queries from legacy PSAPs. Interfaces to a Location
Information Server (LIS) and a Legacy Network Gate-
way must also be supported by the Legacy PSAP Gate-
way so that it can perform a de-referencing operation if
the SIP signaling from the ESInet includes a location-by-
reference. In addition, the Legacy PSAP Gateway must
support an interface to an Emergency Call Routing Func-
tion (ECRF) in the i3 ESInet to support certain emer-
gency call transfer scenarios. The Legacy PSAP Gateway
may also support interfaces to Call Information Databases
(CIDBs) to support access to additional non-location data
associated with the emergency call, if a reference to such
data is provided in incoming SIP signaling.
Telcordia GR-3166, Legacy Public Safety Answering
Point (PSAP) Gateway Generic Requirements,[2] addresses
the external signaling interfaces that must be supported
by the Legacy PSAP Gateway, including a SIP interface
over which emergency calls will be delivered to it via the
i3 ESInet, and traditional MF and/or E-MF interfaces to
legacy PSAPs for call delivery.
Enhanced 911
Chapter 49
Pulse dialing
173
174 CHAPTER 49. PULSE DIALING
the central oce. The mechanical nature of these relays As pulse dialing is achieved by interruption of the local
and the loop capacitance, aecting pulse shape, gener- loop, it was in principle possible to dial a telephone num-
ally limited the speed of operation, the pulsing rate, to ber by rapidly tapping, i.e. depressing, the switch hook
ten pulses per second. the corresponding number of times for each digit at ap-
The specications of the Bell System in the US required proximately ten taps per second. However, many tele-
service personnel to adjust dials in customer stations to phone makers implemented a slow switch hook release
a precision of 9.5 to 10.5 pulses per second (pps), but to prevent rapid switching.
the tolerance of the switching equipment was generally In the United Kingdom, it used to be possible to make
between 8 and 11 pps.[2] The British (BPO, later Post calls from coin-box phones (payphones) by tapping the
Oce Telecommunications) standard for Strowger ex- switch hook without depositing coins. A person caught
changes was 10 impulses per second (allowable range 7 tapping could be charged with 'abstracting electricity'
to 12) and a 66% break ratio (allowable range 63% to from the General Post Oce and several cases were pros-
72%)[3] ecuted under this oence.
In most countries one pulse is used for the digit 1, two In popular culture, tapping was used in the lm Red
pulses for 2, and so on, with ten pulses for the digit 0; this Dragon as a way for prisoner Hannibal Lecter to dial out
makes the code unary, excepting the digit 0. Exceptions on a phone with no dialing mechanism.
to this are: Sweden (example dial), with one click for 0,
two clicks for 1, and so on; and New Zealand with ten
clicks for 0, nine clicks for 1, etc. Oslo, the capital city of 49.5 Successors
Norway, used the New Zealand system, but the rest of the
country did not. Systems that used this encoding of the
It was recognized as early as the 1940s that faster, more
10 digits in a sequence of up to 10 pulses, are sometimes
accurate dialing could be done with push buttons, but
known as decadic dialing systems.
this was too unreliable in customer trials until transis-
Some later switching systems used digit registers which tors transformed the industry. In 1963, the Bell Sys-
doubled the allowable pulse rate to 20 pulses per second, tem introduced to the public its dual-tone multi-frequency
and the inter-digital pause could be reduced as the switch (DTMF) technology under the name Touch-Tone, which
selection did not have to be completed during the pause. was a trademark in the U.S. until 1984.[4] The Touch-
These included some Crossbar systems, the later version Tone system used push-button telephones. In the decades
(7A2) of the Rotary system, and the earlier 1970s stored after 1963, pulse dialing was gradually phased out as the
program control exchanges. primary dialing method to the central oce, but many
In some telephones, the pulses may be heard in the re- systems still support rotary telephones today. Some key-
ceiver as clicking sounds. However, in general, such pad telephones have a switch for the selection of tone or
eects were undesirable and telephone designers sup- pulse dialing.
pressed them by mechanical means with o-normal Mobile telephones and most voice-over-IP systems use
switches on the dial, or greatly attenuated them by elec- out-of-band signaling and do not send any digits until the
trical means with a varistor connected across the receiver. entire number has been keyed by the user. Many VoIP
systems are based on the Session Initiation Protocol (SIP),
which uses a form of Uniform Resource Identiers (URI)
49.4 Switch-hook dialing for addressing, instead of digits alone.
49.7 References
[1] Isa Carrington Cabell (1900). "Roosevelt, Nicholas I.".
Appletons Cyclopdia of American Biography.
Pulse-code modulation
PCM redirects here. For other uses, see PCM (disam- characters punched in paper tape to send samples of im-
biguation). ages quantized to 5 levels; whether this is considered
PCM or not depends on how one interprets pulse code,
Pulse-code modulation (PCM) is a method used to but it involved transmission of quantized samples.
digitally represent sampled analog signals. It is the stan- In 1926, Paul M. Rainey of Western Electric patented a
dard form of digital audio in computers, compact discs, facsimile machine which transmitted its signal using 5-bit
digital telephony and other digital audio applications. In PCM, encoded by an opto-mechanical analog-to-digital
a PCM stream, the amplitude of the analog signal is sam- converter.[7] The machine did not go into production.[8]
pled regularly at uniform intervals, and each sample is British engineer Alec Reeves, unaware of previous work,
quantized to the nearest value within a range of digital conceived the use of PCM for voice communication in
steps. 1937 while working for International Telephone and Tele-
Linear pulse-code modulation (LPCM) is a specic graph in France. He described the theory and advantages,
type of PCM where the quantization levels are lin- but no practical application resulted. Reeves led for a
early uniform.[5] This is in contrast to PCM encodings French patent in 1938, and his US patent was granted in
where quantization levels vary as a function of ampli- 1943.[9] By this time Reeves had started working at the
tude (as with the A-law algorithm or the -law algorithm). Telecommunications Research Establishment (TRE).[8]
Though PCM is a more general term, it is often used to The rst transmission of speech by digital techniques, the
describe data encoded as LPCM.
SIGSALY encryption equipment, conveyed high-level
A PCM stream has two basic properties that determine Allied communications during World War II. In 1943 the
the streams delity to the original analog signal: the Bell Labs researchers who designed the SIGSALY system
sampling rate, which is the number of times per second became aware of the use of PCM binary coding as al-
that samples are taken; and the bit depth, which deter- ready proposed by Alec Reeves. In 1949 for the Canadian
mines the number of possible digital values that can be Navys DATAR system, Ferranti Canada built a work-
used to represent each sample. ing PCM radio system that was able to transmit digitized
radar data over long distances.[10]
PCM in the late 1940s and early 1950s used a cathode-
50.1 History ray coding tube with a plate electrode having encoding
perforations.[11][12] As in an oscilloscope, the beam was
swept horizontally at the sample rate while the vertical de-
Early electrical communications started to sample signals
ection was controlled by the input analog signal, causing
in order to interlace samples from multiple telegraphy
the beam to pass through higher or lower portions of the
sources and to convey them over a single telegraph ca-
perforated plate. The plate collected or passed the beam,
ble. The American inventor Moses G. Farmer conveyed
producing current variations in binary code, one bit at a
telegraph time-division multiplexing (TDM) as early as
time. Rather than natural binary, the grid of Goodalls
1853. Electrical engineer W. M. Miner, in 1903, used
later tube was perforated to produce a glitch-free Gray
an electro-mechanical commutator for time-division mul-
code, and produced all bits simultaneously by using a fan
tiplexing multiple telegraph signals; he also applied this
beam instead of a scanning beam.
technology to telephony. He obtained intelligible speech
from channels sampled at a rate above 35004300 Hz; In the United States, the National Inventors Hall of Fame
[13]
lower rates proved unsatisfactory. This was TDM, but has honored Bernard M. Oliver and Claude Shan-
[14] [15]
pulse-amplitude modulation (PAM) rather than PCM. non as the inventors of PCM, as described in
Communication System Employing Pulse Code Mod-
In 1920 the Bartlane cable picture transmission system,
ulation, U.S. Patent 2,801,281 led in 1946 and 1952,
named after its inventors Harry G. Bartholomew and
granted in 1956. Another patent by the same title was
Maynard D. McFarlane,[6] used telegraph signaling of
176
50.4. DEMODULATION 177
LPCM is used for the lossless encoding of audio data 11, 13, 14, 15, 15, 15, 14, etc. Encoding these values
in the Compact disc Red Book standard (informally as binary numbers would result in the following set of
also known as Audio CD), introduced in 1982. nibbles: 1000 (23 1+22 0+21 0+20 0=8+0+0+0=8),
AES3 (specied in 1985, upon which S/PDIF is 1000, 1001, 1011, 1101, 1110, 1111, 1111, 1111, 1110,
based) is a particular format using LPCM. etc. These digital values could then be further processed
or analyzed by a digital signal processor. Several PCM
On PCs, PCM and LPCM often refer to the format streams could also be multiplexed into a larger aggre-
used in WAV (dened in 1991) and AIFF audio con- gate data stream, generally for transmission of multiple
tainer formats (dened in 1988). LPCM data may streams over a single physical link. One technique is
also be stored in other formats such as AU, raw au- called time-division multiplexing (TDM) and is widely
dio format (header-less le) and various multimedia used, notably in the modern public telephone system.
container formats. The PCM process is commonly implemented on a single
LPCM has been dened as a part of the DVD (since integrated circuit generally referred to as an analog-to-
1995) and Blu-ray (since 2006) standards.[18][19][20] digital converter (ADC).
It is also dened as a part of various digital video
and audio storage formats (e.g. DV since 1995,[21]
AVCHD since 2006[22] ). 50.4 Demodulation
LPCM is used by HDMI (dened in 2002), a single-
cable digital audio/video connector interface for To recover the original signal from the sampled data, a
transmitting uncompressed digital data. demodulator can apply the procedure of modulation
in reverse. After each sampling period, the demodula-
RF64 container format (dened in 2007) uses tor reads the next value and shifts the output signal to
LPCM and also allows non-PCM bitstream stor- the new value. As a result of these transitions, the sig-
age: various compression formats contained in the nal has a signicant amount of high-frequency energy
RF64 le as data bursts (Dolby E, Dolby AC3, DTS, caused by aliasing. To remove these undesirable fre-
MPEG-1/MPEG-2 Audio) can be disguised as quencies and leave the original signal, the demodulator
PCM linear.[23] passes the signal through analog lters that suppress en-
ergy outside the expected frequency range (greater than
the Nyquist frequency fs /2 ).[note 1] The sampling theo-
50.3 Modulation rem shows PCM devices can operate without introduc-
ing distortions within their designed frequency bands if
In the diagram, a sine wave (red curve) is sampled and they provide a sampling frequency twice that of the input
quantized for PCM. The sine wave is sampled at regu- signal. For example, in telephony, the usable voice fre-
lar intervals, shown as vertical lines. For each sample, quency band ranges from approximately 300 Hz to 3400
one of the available values (on the y-axis) is chosen by Hz. Therefore, per the NyquistShannon sampling the-
some algorithm. This produces a fully discrete represen- orem, the sampling frequency (8 kHz) must be at least
tation of the input signal (blue points) that can be eas- twice the voice frequency (4 kHz) for eective recon-
ily encoded as digital data for storage or manipulation. struction of the voice signal.
For the sine wave example at right, we can verify that The electronics involved in producing an accurate analog
the quantized values at the sampling moments are 8, 9, signal from the discrete data are similar to those used for
178 CHAPTER 50. PULSE-CODE MODULATION
generating the digital signal. These devices are Digital- 50.7 Digitization as part of the
to-analog converters (DACs). They produce a voltage or
current (depending on type) that represents the value pre-
PCM process
sented on their digital inputs. This output would then gen-
erally be ltered and amplied for use. In conventional PCM, the analog signal may be processed
(e.g., by amplitude compression) before being digitized.
Once the signal is digitized, the PCM signal is usually sub-
jected to further processing (e.g., digital data compres-
50.5 Standard sampling precision sion).
and rates PCM with linear quantization is known as Linear PCM
(LPCM).[28]
Common sample depths for LPCM are 8, 16, 20 or 24 Some forms of PCM combine signal processing with cod-
bits per sample.[1][2][3][24] ing. Older versions of these systems applied the process-
ing in the analog domain as part of the analog-to-digital
LPCM encodes a single sound channel. Support for mul- process; newer implementations do so in the digital do-
tichannel audio depends on le format and relies on in- main. These simple techniques have been largely ren-
terweaving or synchronization of LPCM streams.[5][25] dered obsolete by modern transform-based audio com-
While two channels (stereo) is the most common for- pression techniques.
mat, some can support up to 8 audio channels (7.1
surround).[2][3] DPCM encodes the PCM values as dierences be-
Common sampling frequencies are 48 kHz as used with tween the current and the predicted value. An algo-
DVD format videos, or 44.1 kHz as used in Compact rithm predicts the next sample based on the previous
discs. Sampling frequencies of 96 kHz or 192 kHz can samples, and the encoder stores only the dierence
be used on some newer equipment, with the higher value between this prediction and the actual value. If the
equating to 6.144 megabit per second for two channels prediction is reasonable, fewer bits can be used to
at 16-bit per sample value, but the benets have been represent the same information. For audio, this type
debated.[26] The bitrate limit for LPCM audio on DVD- of encoding reduces the number of bits required per
Video is also 6.144 Mbit/s, allowing 8 channels (7.1 sur- sample by about 25% compared to PCM.
round) 48 kHz 16-bit per sample = 6,144 kbit/s.
Adaptive DPCM (ADPCM) is a variant of DPCM
There is a L32 bit PCM,[27] and there are many sound that varies the size of the quantization step, to al-
cards that support it. low further reduction of the required bandwidth for
a given signal-to-noise ratio.
Delta modulation is a form of DPCM which uses
50.6 Limitations one bit per sample.
50.12 References [20] Jim Taylor. DVD Frequently Asked Questions (and An-
swers) Audio details of DVD-Video. Retrieved 2010-
[1] Alvestrand, Harald Tveit; Salsman, James (May 1999). 03-20.
RFC 2586 The Audio/L16 MIME content type. The
Internet Society. Retrieved 2010-03-16. [21] How DV works. Archived from the original on 2007-
12-06. Retrieved 2010-03-21.
[2] Casner, S. (March 2007). RFC 4856 Media Type Reg-
istration of Payload Formats in the RTP Prole for Audio [22] AVCHD Information Website AVCHD format speci-
and Video Conferences Registration of Media Type au- cation overview. Retrieved 2010-03-21.
dio/L8. The IETF Trust. Retrieved 2010-03-16.
[23] EBU (July 2009), EBU Tech 3306 MBWF / RF64: An
[3] Bormann, C.; Casner, S.; Kobayashi, K.; Ogawa, A. (Jan- Extended File Format for Audio (PDF), retrieved 2010-
uary 2002). RFC 3190 RTP Payload Format for 12-bit 01-19
DAT Audio and 20- and 24-bit Linear Sampled Audio.
The Internet Society. Retrieved 2010-03-16. [24] RFC 3108 Conventions for the use of the Session De-
scription Protocol (SDP) for ATM Bearer Connections.
[4] Audio Media Types. Internet Assigned Numbers Au- May 2001. Retrieved 2010-03-16.
thority. Retrieved 2010-03-16.
[25] PCM, Pulse Code Modulated Audio. Library of
[5] Linear Pulse Code Modulated Audio (LPCM)". Library
Congress. Retrieved 2009-07-18.
of Congress. Retrieved 2010-03-21.
[6] The Bartlane Transmission System. DigicamHis- [26] 24/192 Music Downloads, and why they do not make
tory.com. Archived from the original on February 10, sense. Chris Monty Montgomery. Retrieved 2013-03-
2010. Retrieved 7 January 2010. 16.
[7] U.S. patent number 1,608,527; also see p. 8, Data conver- [27] http://www.ypass.net/blog/2010/01/
sion handbook, Walter Allan Kester, ed., Newnes, 2005, pcm-audio-part-1-what-is-pcm/. Missing or empty
ISBN 0-7506-7841-0. |title= (help)
[8] John Vardalas (June 2013), Pulse Code Modulation: It all [28] Linear Pulse Code Modulated Audio (LPCM)". The Li-
Started 75 Years Ago with Alec Reeves, IEEE brary of Congress. Retrieved March 21, 2010.
[9] US 2272070 [29] Stallings, William, Digital Signaling Techniques, Decem-
[10] Porter, Arthur. So Many Hills to Climb (2004) Beckham ber 1984, Vol. 22, No. 12, IEEE Communications Mag-
Publications Group azine
[15] National Inventors Hall of Fame announces 2004 class of Ken C. Pohlmann (1985). Principles of Digital Au-
inventors. Science Blog. February 11, 2004. Retrieved dio (2nd ed.). Carmel, Indiana: Sams/Prentice-Hall
February 6, 2011. Computer Publishing. ISBN 0-672-22634-0.
[16] B. M. Oliver; J. R. Pierce & C. E. Shannon (Nov 1948). D. H. Whalen, E. R. Wiley, Philip E. Rubin, and
The Philosophy of PCM. Proceeding of the IRE. 36
Franklin S. Cooper (1990). The Haskins Laborato-
(11): 13241331. doi:10.1109/JRPROC.1948.231941.
ries pulse code modulation (PCM) system. Behav-
ISSN 0096-8390.
ior Research Methods, Instruments, and Computers.
[17] Cambron, G. Keith, Global Networks: Engineering, Op- 22 (6): 550559. doi:10.3758/BF03204440.
erations and Design, Page 345, John Wiley & Sons, Oct
17, 2012. Bill Waggener (1995). Pulse Code Modulation Tech-
niques (1st ed.). New York, NY: Van Nostrand
[18] Blu-ray Disc Association (March 2005), White paper Blu-
Reinhold. ISBN 0-442-01436-8.
ray Disc Format 2.B Audio Visual Application Format
Specications for BD-ROM (PDF), retrieved 2009-07-26
Bill Waggener (1999). Pulse Code Modulation Sys-
[19] DVD Technical Notes (DVD Video Book B) Audio tems Design (1st ed.). Boston, MA: Artech House.
data specications. 1996-07-21. Retrieved 2010-03-16. ISBN 0-89006-776-7.
50.14. EXTERNAL LINKS 181
Quality of service
Quality of service (QoS) is the overall performance of of service guarantees are important if the network capac-
a telephony or computer network, particularly the per- ity is insucient, especially for real-time streaming mul-
formance seen by the users of the network. To quan- timedia applications such as voice over IP, multiplayer
titatively measure quality of service, several related as- online games and IPTV, since these often require xed
pects of the network service are often considered, such bit rate and are delay sensitive, and in networks where
as error rates, bit rate, throughput, transmission delay, the capacity is a limited resource, for example in cellular
availability, jitter, etc. data communication.
In the eld of computer networking and other packet- A network or protocol that supports QoS may agree on a
switched telecommunication networks, quality of service trac contract with the application software and reserve
refers to trac prioritization and resource reservation capacity in the network nodes, for example during a ses-
control mechanisms rather than the achieved service qual- sion establishment phase. During the session it may mon-
ity. Quality of service is the ability to provide dierent itor the achieved level of performance, for example the
priority to dierent applications, users, or data ows, or data rate and delay, and dynamically control scheduling
to guarantee a certain level of performance to a data ow. priorities in the network nodes. It may release the re-
Quality of service is particularly important for the trans- served capacity during a tear down phase.
port of trac with special requirements. In particular, A best-eort network or service does not support quality
developers have introduced technology to allow computer of service. An alternative to complex QoS control mech-
networks to become as useful as telephone networks for anisms is to provide high quality communication over a
audio conversations, as well as supporting new applica- best-eort network by over-provisioning the capacity so
tions with even stricter service demands. that it is sucient for the expected peak trac load. The
resulting absence of network congestion reduces or elim-
inates the need for QoS mechanisms.
51.1 Denitions QoS is sometimes used as a quality measure, with many
alternative denitions, rather than referring to the abil-
ity to reserve resources. Quality of service sometimes
In the eld of telephony, quality of service was dened by refers to the level of quality of service, i.e. the guaran-
the ITU in 1994.[1] Quality of service comprises require- teed service quality.[3] High QoS is often confused with
ments on all the aspects of a connection, such as service a high level of performance or achieved service quality,
response time, loss, signal-to-noise ratio, crosstalk, echo, for example high bit rate, low latency and low bit error
interrupts, frequency response, loudness levels, and so on. probability.
A subset of telephony QoS is grade of service (GoS) re-
quirements, which comprises aspects of a connection re- An alternative and disputable denition of QoS, used es-
lating to capacity and coverage of a network, for exam- pecially in application layer services such as telephony
ple guaranteed maximum blocking probability and out- and streaming video, is requirements on a metric that
age probability.[2] reects or predicts the subjectively experienced quality.
In this context, QoS is the acceptable cumulative ef-
In the eld of computer networking and other packet- fect on subscriber satisfaction of all imperfections aect-
switched telecommunication networks, teletrac engi- ing the service. Other terms with similar meaning are
neering refers to trac prioritization and resource reser- the quality of experience (QoE) subjective business con-
vation control mechanisms rather than the achieved ser- cept, the required user perceived performance,[4] the
vice quality. Quality of service is the ability to provide required degree of satisfaction of the user or the tar-
dierent priority to dierent applications, users, or data geted number of happy customers. Examples of mea-
ows, or to guarantee a certain level of performance to a sures and measurement methods are mean opinion score
data ow. For example, a required bit rate, delay, jitter, (MOS), perceptual speech quality measure (PSQM) and
packet loss or bit error rates may be guaranteed. Quality
182
51.4. APPLICATIONS 183
perceptual evaluation of video quality (PEVQ). See also Errors Sometimes packets are corrupted due to bit er-
Subjective video quality. rors caused by noise and interference, especially
in wireless communications and long copper wires.
The receiver has to detect this and, just as if the
packet was dropped, may ask for this information
51.2 History to be retransmitted.
Conventional Internet routers and LAN switches oper- Latency It might take a long time for each packet to
ate on a best eort basis. This equipment is less ex- reach its destination, because it gets held up in long
pensive, less complex and faster and thus more popu- queues, or it takes a less direct route to avoid conges-
lar than competing more complex technologies that pro- tion. This is dierent from throughput, as the delay
vided QoS mechanisms. There were four Type of ser- can build up over time, even if the throughput is al-
vice bits and three Precedence bits provided in each most normal. In some cases, excessive latency can
IP packet header, but they were not generally respected. render an application such as VoIP or online gaming
These bits were later re-dened as Dierentiated services unusable.
code points (DSCP).
Jitter Packets from the source will reach the destination
With the advent of IPTV and IP telephony, QoS mecha- with dierent delays. A packets delay varies with
nisms are increasingly available to the end user. its position in the queues of the routers along the
A number of attempts for layer 2 technologies that add path between source and destination and this posi-
QoS tags to the data have gained popularity in the past. tion can vary unpredictably. This variation in delay
Examples are frame relay, asynchronous transfer mode is known as jitter and can seriously aect the quality
(ATM) and multiprotocol label switching (MPLS) (a of streaming audio and/or video.
technique between layer 2 and 3). Despite these network Out-of-order delivery When a collection of related
technologies remaining in use today, this kind of network packets is routed through a network, dierent pack-
lost attention after the advent of Ethernet networks. To- ets may take dierent routes, each resulting in a dif-
day Ethernet is, by far, the most popular layer 2 tech- ferent delay. The result is that the packets arrive in
nology. Ethernet uses 802.1p to signal the priority of a a dierent order than they were sent. This problem
frame. requires special additional protocols responsible for
rearranging out-of-order packets to an isochronous
state once they reach their destination. This is espe-
51.3 Qualities of trac cially important for video and VoIP streams where
quality is dramatically aected by both latency and
lack of sequence.
In packet-switched networks, quality of service is af-
fected by various factors, which can be divided into hu-
man and technical factors. Human factors include:
stability of service, availability of service, delays, user 51.4 Applications
information. Technical factors include: reliability, scal-
ability, eectiveness, maintainability, grade of service, A dened quality of service may be desired or required
etc.[5] for certain types of network trac, for example:
Many things can happen to packets as they travel from
origin to destination, resulting in the following problems Streaming media specically
as seen from the point of view of the sender and receiver:
Internet protocol television (IPTV)
Audio over Ethernet
Low throughput Due to varying load from disparate
users sharing the same network resources, the bit Audio over IP
rate (the maximum throughput) that can be provided
IP telephony also known as Voice over IP (VoIP)
to a certain data stream may be too low for realtime
multimedia services if all data streams get the same Videoconferencing
scheduling priority.
Telepresence
Dropped packets The routers might fail to deliver
(drop) some packets if their data loads are cor- Storage applications such as iSCSI and FCoE
rupted, or the packets arrive when the router buers Circuit Emulation Service
are already full. The receiving application may ask
for this information to be retransmitted, possibly Safety-critical applications such as remote surgery
causing severe delays in the overall transmission. where availability issues can be hazardous
184 CHAPTER 51. QUALITY OF SERVICE
Network operations support systems either for the connection to a dierent ISP. Under high load condi-
network itself, or for customers business critical tions, however, VoIP may degrade to cell-phone quality
needs or worse. The mathematics of packet trac indicate that
network requires just 60% more raw capacity under con-
Online games where real-time lag can be a factor servative assumptions.[6]
Industrial control systems protocols such as The amount of over-provisioning in interior links re-
Ethernet/IP which are used for real-time control of quired to replace QoS depends on the number of users
machinery and their trac demands. This limits usability of over-
provisioning. Newer more bandwidth intensive applica-
These types of service are called inelastic, meaning that tions and the addition of more users results in the loss of
they require a certain minimum bit rate and a certain over-provisioned networks. This then requires a physical
maximum latency to function. By contrast, elastic ap- update of the relevant network links which is an expen-
plications can take advantage of however much or little sive process. Thus over-provisioning cannot be blindly
bandwidth is available. Bulk le transfer applications that assumed on the Internet.
rely on TCP are generally elastic.
for European funding circa 2005.[21] A broader Euro- Bachulas testimony has been cited by proponents of a law
pean project called Architecture and design for the fu- banning quality of service as proof that no legitimate pur-
ture Internet known as 4WARD had a budgest estimated pose is served by such an oering. This argument is de-
at 23.4 million Euro and was funded from January 2008 pendent on the assumption that over-provisioning isn't a
through June 2010.[22] It included a Quality of Service form of QoS and that it is always possible. Cost and other
Theme and published a book.[23][24] Another European factors aect the ability of carriers to build and maintain
project, called WIDENS (Wireless Deployable Network permanently over-provisioned networks.
System) [25] proposed a bandwidth reservation approach
for mobile wireless multirate adhoc networks.[26]
In the services domain, end-to-end Quality of Service 51.9 Mobile (cellular) QoS
has also been discussed in the case of composite services
(consisting of atomic services) or applications (consist-
Main article: Mobile QoS
ing of application components).[27][28] Moreover, in cloud
computing end-to-end QoS has been the focus of various
research eorts aiming at the provision of QoS guaran- Mobile cellular service providers may oer mobile
tees across the cloud service models.[29] QoS to customers just as the xed line PSTN services
providers and Internet Service Providers (ISP) may of-
fer QoS. QoS mechanisms are always provided for circuit
switched services, and are essential for non-elastic ser-
51.7 Circumvention vices, for example streaming multimedia.
Mobility adds complication to the QoS mechanisms, for
Strong cryptography network protocols such as Secure several reasons:
Sockets Layer, I2P, and virtual private networks obscure
the data transferred using them. As all electronic com- A phone call or other session may be interrupted af-
merce on the Internet requires the use of such strong cryp- ter a handover, if the new base station is overloaded.
tography protocols, unilaterally downgrading the perfor- Unpredictable handovers make it impossible to give
mance of encrypted trac creates an unacceptable haz- an absolute QoS guarantee during a session initia-
ard for customers. Yet, encrypted trac is otherwise un- tion phase.
able to undergo deep packet inspection for QoS.
The pricing structure is often based on per-minute
Protocols like ICA and RDP may encapsulate other traf- or per-megabyte fee rather than at rate, and may be
c (e.g. printing, video streaming) with varying require- dierent for dierent content services.
ments that can make optimization dicult.
A crucial part of QoS in mobile communications is
Grade of Service, involving outage probability (the
probability that the mobile station is outside the ser-
51.8 Doubts about quality of ser- vice coverage area, or aected by co-channel in-
terference, i.e. crosstalk), blocking probability (the
vice over IP probability that the required level of QoS can not be
oered) and scheduling starvation. These perfor-
The Internet2 project found, in 2001, that the QoS proto- mance measures are aected by mechanisms such
cols were probably not deployable inside its Abilene Net- as mobility management, radio resource manage-
work with equipment available at that time.[30] Equip- ment, admission control, fair scheduling, channel-
ment available at the time relied on software to imple- dependent scheduling etc.
ment QoS. The group also predicted that logistical, -
nancial, and organizational barriers will block the way
toward any bandwidth guarantees by protocol modica- 51.10 Standards
tions aimed at QoS.[31] They believed that the economics
would encourage network providers to deliberately erode Quality of service in the eld of telephony, was rst
the quality of best eort trac as a way to push customers dened in 1994 in the ITU-T Recommendation E.800.
to higher priced QoS services. Instead they proposed This denition is very broad, listing 6 primary compo-
over-provisioning of capacity as more cost-eective at the nents: Support, Operability, Accessibility, Retainability,
time.[30][31] Integrity and Security.[1] A 1995 recommendation X.902
The Abilene network study was the basis for the testi- included a denition is the OSI reference model.[33] In
mony of Gary Bachula to the US Senate Commerce Com- 1998 the ITU published a document discussing QoS in
mittee's hearing on Network Neutrality in early 2006. He the eld of data networking. X.641 oers a means of de-
expressed the opinion that adding more bandwidth was veloping or enhancing standards related to QoS and pro-
more eective than any of the various schemes for ac- vide concepts and terminology that will assist in main-
complishing QoS they examined.[32] taining the consistency of related standards.[34]
51.13. REFERENCES 187
Some QoS-related IETF Request For Comments (RFC)s Quality of experience (QoE)
are Denition of the Dierentiated services Field (DS
Series of tubes
Field) in the IPv4 and IPv6 Headers, RFC 2474 , and
Resource ReSerVation Protocol (RSVP), RFC 2205 ; both Streaming media
these are discussed above. The IETF has also published
two RFCs giving background on QoS: Next Steps for the Subjective video quality
IP QoS Architecture, RFC 2990 , and IAB Concerns Re- Tiered Internet
garding Congestion Control for Voice Trac in the Inter-
net, RFC 3714 . Trac classication
The IETF has also published Conguration Guidelines for Trac shaping
DiServ Service Classes, RFC 4594 as an informative or
best practices document about the practical aspects of
designing a QoS solution for a DiServ network. They 51.13 References
try to identify which types of applications are commonly
run over an IP network to group them into trac classes,
[1] E.800: Terms and denitions related to quality of service
study what treatment do each of these classes need from and network performance including dependability. ITU-
the network, and suggest which of the QoS mechanisms T Recommendation. August 1994. Retrieved October 14,
commonly available in routers can be used to implement 2011. Updated September 2008 as Denitions of terms
those treatments. related to quality of service
Low Latency Queuing (LLQ) [9] Shi, Zhefu; Beard, Cory; Mitchell, Ken (2009).
Analytical Models for Understanding Misbe-
Mean opinion score (MOS) havior and MAC Friendliness in CSMA Net-
works. Performance Evaluation. 66 (910): 469.
Micro Transport Protocol doi:10.1016/j.peva.2009.02.002.
Network neutrality [10] Ben Erwin (December 16, 2008). How To Manage QoS
In Your Environment, Part 1 of 3. Network Performance
QPPB Daily video. NetQoS. Retrieved October 15, 2011.
188 CHAPTER 51. QUALITY OF SERVICE
[11] VoIP on MPLS. Search Unied Communications. Re- [28] Q. Sun, S. Wang, H. Zou, F. Yang, QSSA: A QoS-aware
trieved 12 March 2012. Service Selection Approach, International Journal of Web
and Grid Services, pp.147 - 169, 2011
[12] Bob Braden ed. L. Zhang, S. Berson, S. Herzog, S.
Jamin (September 1997), Resource ReSerVation Protocol [29] D Kyriazis, A Menychtas, G Kousiouris, K Oberle, T
(RSVP), IETF, RFC 2205 Voith, M Boniface, E Oliveros, T Cucinotta, S Berger,
A Real-time Service Oriented Infrastructure, International
[13] Next Steps in Signaling Charter Conference on Real-Time and Embedded Systems (RTES
2010), Singapore, November 2010
[14] EuQoS - End-to-end Quality of Service support over
heterogeneous networks. Project website. 20042006. [30] Benjamin Teitelbaum, Stanislav Shalunov (May 3, 2002).
Archived from the original on April 30, 2007. Retrieved Why Premium IP Service Has Not Deployed (and Prob-
October 12, 2011. ably Never Will)". Draft Informational Document. Inter-
net2 QoS Working Group. Archived from the original on
[15] IPSphere: Enabling Advanced Service Delivery Archived
September 12, 2010. Retrieved October 15, 2011.
January 13, 2011, at the Wayback Machine.
[31] Andy Oram (June 11, 2002). A Nice Way to Get Net-
[16] End-to-end quality of service support over heterogeneous
work Quality of Service?". Platform Independent column.
networks. Project description. European Community Re-
O'Reilly. Archived from the original on September 12,
search and Development Information Service. Retrieved
2010. Retrieved October 15, 2011.
October 12, 2011.
[17] Torsten Braun; Thomas Staub (2008). End-to-end quality [32] Gary Bachula (February 7, 2006). Testimony of Gary
of service over heterogeneous networks. Springer. ISBN R. Bachula, Vice President, Internet2 (PDF). pp. 23.
978-3-540-79119-5. Retrieved October 15, 2011.
[18] Multi Service Access Everywhere (MUSE)". Project [33] X.902:Information technology Open Distributed Pro-
website. Retrieved October 12, 2011. cessing Reference model: Foundations. ITU-T Rec-
ommendation. November 1995. Retrieved October 14,
[19] Multi Service Access Everywhere. Project description. 2011. Updated October 2009.
European Community Research and Development Infor-
mation Service. Retrieved October 12, 2011. [34] X.641: Information technology - Quality of service:
framework. ITU-T Recommendation. December 1997.
[20] Multi Service Access Everywhere. Project description.
European Community Research and Development Infor- [35] Advanced Routing & Trac Control HOWTO. August
mation Service. Retrieved October 12, 2011. 21, 2005. Retrieved October 14, 2011.
[21] PlaNetS QoS Solution. Project website. Archived from [36] Linux Bandwidth Arbitrator. APConnections. Re-
the original on November 12, 2009. Retrieved October trieved October 14, 2011.
12, 2011.
[37] Fulvio Ricciardi. QoS and Trac Shaping in Transpar-
[22] 4WARD: Architecture and design for the future Inter- ent Bridge mode. Router/Bridge Linux Firewall website.
net. Project description. European Community Research ZeroShell Net Services. Retrieved October 15, 2011.
and Development Information Service. Retrieved Octo-
ber 15, 2011.
[23] Going 4WARD (PDF). Project newsletter. June 2010. 51.14 Further reading
Retrieved October 15, 2011.
Deploying IP and MPLS QoS for Multiservice Net-
[24] Lus M. Correia; Joao Schwarz (FRW) da Silva (January
30, 2011). Architecture and Design for the Future Internet: works: Theory and Practice by John Evans, Clarence
4WARD EU Project. Springer. ISBN 978-90-481-9345- Filsls (Morgan Kaufmann, 2007, ISBN 0-12-
5. 370549-5)
[25] Wireless Deployable Network System. Project descrip- Lelli, F. Maron, G. Orlando, S. Client Side Estima-
tion. European Union. Retrieved May 23, 2012. tion of a Remote Service Execution. 15th Interna-
tional Symposium on Modeling, Analysis, and Sim-
[26] R. Guimaraes; L. Cerd; J. M. Barcelo-Ordinas; J. Garcia-
ulation of Computer and Telecommunication Sys-
Vidal; M. Voorhaen; C. Blondia (March 2009). Quality
of Service through Bandwidth Reservation on Multirate tems, 2007. MASCOTS '07.
Ad-doc Wireless Networks. Ad Hoc Networks. 7 (2):
QoS Over Heterogeneous Networks by Mario March-
388400. doi:10.1016/j.adhoc.2008.04.002.
ese (Wiley, 2007, ISBN 978-0-470-01752-4)
[27] D. Kyriazis, K. Tserpes, A. Menychtas, A. Litke, T. Var-
varigou, An innovative Workow Mapping Mechanism for XiPeng Xiao (September 8, 2008). Technical, Com-
Grids in the frame of Quality of Service, Elsevier Future mercial and Regulatory Challenges of QoS: An Inter-
Generation Computer Systems, Vol. 24, Iss. 6, pp. 498- net Service Model Perspective. Morgan Kaufmann.
511, 2008 ISBN 978-0-12-373693-2.
51.15. EXTERNAL LINKS 189
The Real-time Transport Protocol (RTP) is a network are built on the User Datagram Protocol (UDP).[3] Other
protocol for delivering audio and video over IP networks. transport protocols specically designed for multimedia
RTP is used extensively in communication and enter- sessions are SCTP[5] and DCCP,[6] although, as of 2010,
tainment systems that involve streaming media, such as they are not in widespread use.
telephony, video teleconference applications, television RTP was developed by the Audio/Video Transport work-
services and web-based push-to-talk features.
ing group of the IETF standards organization. RTP is
RTP typically runs over User Datagram Protocol (UDP). used in conjunction with other protocols such as H.323
RTP is used in conjunction with the RTP Control Proto- and RTSP.[2] The RTP standard denes a pair of proto-
col (RTCP). While RTP carries the media streams (e.g., cols: RTP and RTCP. RTP is used for transfer of mul-
audio and video), RTCP is used to monitor transmission timedia data, and the RTCP is used to periodically send
statistics and quality of service (QoS) and aids synchro- control information and QoS parameters.[7]
nization of multiple streams. RTP is one of the technical RTP is also used in the transport layer of WebRTC.
foundations of Voice over IP and in this context is often
used in conjunction with a signaling protocol such as the
Session Initiation Protocol (SIP) which establishes con-
52.1.1 Protocol components
nections across the network.
RTP was developed by the Audio-Video Transport The RTP specication describes two sub-protocols, RTP
Working Group of the Internet Engineering Task Force and RTCP.
(IETF) and rst published in 1996 as RFC 1889, super-
The data transfer protocol, RTP, facilitates the transfer
seded by RFC 3550 in 2003.
of real-time data. Information provided by this proto-
col include timestamps (for synchronization), sequence
numbers (for packet loss and reordering detection) and
52.1 Overview the payload format which indicates the encoded format
of the data.[8]
RTP is designed for end-to-end, real-time, transfer of The control protocol RTCP is used to specify quality of
streaming media. The protocol provides facilities for service (QoS) feedback and synchronization between the
jitter compensation and detection of out of sequence ar- media streams. The bandwidth of RTCP trac compared
rival in data, which are common during transmissions to RTP is small, typically around 5%.[8][9]
on an IP network. RTP allows data transfer to multiple RTP sessions are typically initiated between communi-
destinations through IP multicast.[1] RTP is regarded as cating peers using a signaling protocol, such as H.323,
the primary standard for audio/video transport in IP net- the Session Initiation Protocol (SIP), or Jingle (XMPP).
works and is used with an associated prole and payload These protocols may use the Session Description Proto-
format.[2] col to negotiate the parameters for the sessions.
Real-time multimedia streaming applications require
timely delivery of information and often can tolerate
some packet loss to achieve this goal. For example, loss 52.1.2 Sessions
of a packet in audio application may result in loss of a
fraction of a second of audio data, which can be made un- An RTP session is established for each multimedia
noticeable with suitable error concealment algorithms.[3] stream. A session consists of an IP address with a pair of
The Transmission Control Protocol (TCP), although stan- ports for RTP and RTCP. For example, audio and video
dardized for RTP use,[4] is not normally used in RTP streams use separate RTP sessions, enabling a receiver to
applications because TCP favors reliability over timeli- deselect a particular stream.[10] The ports which form a
ness. Instead the majority of the RTP implementations session are negotiated using other protocols such as RTSP
190
52.3. PACKET HEADER 191
(using SDP in the setup method)[11] and SIP. 52.3 Packet header
The specication recommends that RTP port numbers
are chosen to be even and that each associated RTCP port The RTP header has a minimum size of 12 bytes. After
be the next higher odd number.[12]:68 However, a single the header, optional header extensions may be present.
port is chosen for RTP and RTCP in applications that This is followed by the RTP payload, the format of which
multiplex the protocols.[13] RTP and RTCP typically use is determined by the particular class of application.[19]
unprivileged UDP ports (1024 to 65535),[14] but may also The elds in the header are as follows:
use other transport protocols, most notably, SCTP and
DCCP, as the protocol design is transport independent. Version: (2 bits) Indicates the version of the proto-
col. Current version is 2.[20]
The granularity of the timing is application spe- RFC 4103, RTP Payload Format for Text Conversa-
cic. For example, an audio application that sam- tion
ples data once every 125 s (8 kHz, a common sam-
ple rate in digital telephony) would use that value as RFC 3640, RTP Payload Format for Transport of
its clock resolution. The clock granularity is one of MPEG-4 Elementary Streams
the details that is specied in the RTP prole for an RFC 6416, RTP Payload Format for MPEG-4 Au-
application.[22] dio/Visual Streams
SSRC: (32 bits) Synchronization source identier RFC 2250, RTP Payload Format for
uniquely identies the source of a stream. The syn- MPEG1/MPEG2 Video
chronization sources within the same RTP session
will be unique.[12]:15 RFC 4175, RTP Payload Format for Uncompressed
Video
CSRC: (32 bits each) Contributing source IDs enu-
merate contributing sources to a stream which has RFC 6295, RTP Payload Format for MIDI
been generated from multiple sources.[12]:15
RFC 4696, An Implementation Guide for RTP MIDI
Header extension: (optional) The rst 32-bit word
RFC 7587, RTP Payload Format for the Opus Speech
contains a prole-specic identier (16 bits) and a
and Audio Codec
length specier (16 bits) that indicates the length of
the extension (EHL = extension header length) in RFC 7656, A Taxonomy of Semantics and Mech-
32-bit units, excluding the 32 bits of the extension anisms for Real-Time Transport Protocol (RTP)
header.[12]:17 Sources
RFC 3551, Standard 65, RTP Prole for Audio and [4] RFC 4571
Video Conferences with Minimal Control [5] Farrel, Adrian (2004). The Internet and its protocols.
Morgan Kaufmann. p. 363. ISBN 978-1-55860-913-6.
RFC 3190, RTP Payload Format for 12-bit DAT Au-
dio and 20- and 24-bit Linear Sampled Audio [6] Ozaktas, Haldun M.; Levent Onural (2007). THREE-
DIMENSIONAL TELEVISION. Springer. p. 356. ISBN
RFC 6184, RTP Payload Format for H.264 Video 978-3-540-72531-2.
52.9. EXTERNAL LINKS 193
[7] Larry L. Peterson (2007). Computer Networks. Morgan JRTPLIB, a C++ RTP library
Kaufmann. p. 430. ISBN 1-55860-832-X.
Managed Media Aggregation: .NET C# RFC com-
[8] Perkins 2003, p. 56 pliant implementation of RTP / RTCP written in
completely managed code.
[9] Peterson 2007, p. 435
[10] Zurawski, Richard (2004). RTP, RTCP and RTSP pro- LScube project, providing a full streaming suite in-
tocols. The industrial information technology handbook. cluding experimental SCTP capability
CRC Press. pp. 287. ISBN 978-0-8493-1985-3.
[15] Chou, Philip A.; Mihaela van der Schaar (2007). Multi-
media over IP and wireless networks. Academic Press. pp.
514. ISBN 0-12-088480-1.
GNU ccRTP
Chapter 53
194
53.3. APPLICATIONS 195
have no frequency content above the Nyquist fre- While modern systems can be quite subtle in their meth-
quency. Aliasing can be made arbitrarily small by ods, the primary usefulness of a digital system is the abil-
using a suciently large order of the anti-aliasing ity to store, retrieve and transmit signals without any loss
lter. of quality.
Aperture error results from the fact that the sample
is obtained as a time average within a sampling re- Sampling rate
gion, rather than just being equal to the signal value
at the sampling instant. In a capacitor-based sample A commonly seen measure of sampling is S/s, which
and hold circuit, aperture error is introduced be- stands for Samples per second. As an example, 1 MS/s
cause the capacitor cannot instantly change voltage is one million samples per second.
thus requiring the sample to have non-zero width.
When it is necessary to capture audio covering the entire
Jitter or deviation from the precise sample timing 2020,000 Hz range of human hearing,[4] such as when
intervals. recording music or many types of acoustic events, audio
waveforms are typically sampled at 44.1 kHz (CD), 48
Noise, including thermal sensor noise, analog circuit kHz, 88.2 kHz, or 96 kHz.[5] The approximately double-
noise, etc. rate requirement is a consequence of the Nyquist theo-
Slew rate limit error, caused by the inability of the rem. Sampling rates higher than about 50 kHz to 60 kHz
ADC input value to change suciently rapidly. cannot supply more usable information for human listen-
ers. Early professional audio equipment manufacturers
Quantization as a consequence of the nite precision chose sampling rates in the region of 50 kHz for this rea-
of words that represent the converted values. son.
Error due to other non-linear eects of the mapping There has been an industry trend towards sampling rates
of input voltage to converted output value (in addi- well beyond the basic requirements: such as 96 kHz and
tion to the eects of quantization). even 192 kHz[6] This is in contrast with laboratory experi-
ments, which have failed to show that ultrasonic frequen-
Although the use of oversampling can completely elim- cies are audible to human observers; however in some
inate aperture error and aliasing by shifting them out of cases ultrasonic sounds do interact with and modulate the
the pass band, this technique cannot be practically used audible part of the frequency spectrum (intermodulation
above a few GHz, and may be prohibitively expensive at distortion).[7] It is noteworthy that intermodulation dis-
much lower frequencies. Furthermore, while oversam- tortion is not present in the live audio and so it represents
pling can reduce quantization error and non-linearity, it an articial coloration to the live sound.[8] One advantage
cannot eliminate these entirely. Consequently, practical of higher sampling rates is that they can relax the low-pass
ADCs at audio frequencies typically do not exhibit alias- lter design requirements for ADCs and DACs, but with
ing, aperture error, and are not limited by quantization modern oversampling sigma-delta converters this advan-
error. Instead, analog noise dominates. At RF and mi- tage is less important.
crowave frequencies where oversampling is impractical
The Audio Engineering Society recommends 48 kHz
and lters are expensive, aperture error, quantization er-
sampling rate for most applications but gives recognition
ror and aliasing can be signicant limitations.
to 44.1 kHz for Compact Disc and other consumer uses,
Jitter, noise, and quantization are often analyzed by mod- 32 kHz for transmission-related applications, and 96 kHz
eling them as random errors added to the sample values. for higher bandwidth or relaxed anti-aliasing ltering.[9]
Integration and zero-order hold eects can be analyzed as
A more complete list of common audio sample rates is:
a form of low-pass ltering. The non-linearities of either
ADC or DAC are analyzed by replacing the ideal linear
function mapping with a proposed nonlinear function. Bit depth
consequently it is common to perform mixing and mas- data. The 3D grid is assumed to represent a continuous
tering operations at 32-bit precision and then convert to region of 3D space. Volume rendering is common in me-
16 or 24 bit for distribution. dial imaging, X-ray computed tomography (CT/CAT),
Magnetic resonance imaging (MRI), Positron Emission
Tomography (PET) are some examples. It is also used
Speech sampling
for Seismic tomography and other applications.
Speech signals, i.e., signals intended to carry only hu-
man speech, can usually be sampled at a much lower
rate. For most phonemes, almost all of the energy is con-
tained in the 100 Hz4 kHz range, allowing a sampling
rate of 8 kHz. This is the sampling rate used by nearly
all telephony systems, which use the G.711 sampling and
quantization specications.
53.6 Complex sampling [2] When the complex sample-rate is B, a frequency com-
ponent at 0.6 B, for instance, will have an alias at
0.4 B, which is unambiguous because of the constraint
Complex sampling (I/Q sampling) is the simultaneous that the pre-sampled signal was analytic. Also see
sampling of two dierent, but related, waveforms, re- Aliasing#Complex sinusoids
sulting in pairs of samples that are subsequently treated
as complex numbers.[note 1] When one waveform , s(t), [3] When s(t) is sampled at the Nyquist frequency (1/T = 2B),
is the Hilbert transform of the other waveform , s(t), the product sequence simplies to [s(nT ) (j)n ] .
def
the complex-valued function, sa (t) = s(t) + j s(t), [4] The sequence of complex numbers is convolved with the
is called an analytic signal, whose Fourier transform is impulse response of a lter with real-valued coecients.
zero for all negative values of frequency. In that case, the That is equivalent to separately ltering the sequences of
Nyquist rate for a waveform with no frequencies B can real parts and imaginary parts and reforming complex
be reduced to just B (complex samples/sec), instead of 2B pairs at the outputs.
(real samples/sec).[note 2] More apparently, the equivalent
baseband waveform, sa (t) ej2 2 t , also has a Nyquist
B
53.7 See also [7] Colletti, Justin (February 4, 2013). The Science of Sam-
ple Rates (When Higher Is BetterAnd When It Isn't)".
Trust Me I'm A Scientist. Retrieved February 6, 2013.
Downsampling
[8] David Griesinger. Perception of mid frequency and high
Upsampling frequency intermodulation distortion in loudspeakers, and
its relationship to high-denition audio. Archived from
Multidimensional sampling the original (Powerpoint presentation) on 2008-05-01.
Sample rate conversion [9] AES5-2008: AES recommended practice for professional
digital audio - Preferred sampling frequencies for applica-
Digitizing tions employing pulse-code modulation, Audio Engineer-
ing Society, 2008, retrieved 2010-01-18
Sample and hold [10] http://www.voipsupply.com/cisco-hd-voice[]
Satellite phone
199
200 CHAPTER 54. SATELLITE PHONE
being so low on the horizon increasing the chances of ter- Two such systems, both based in the United States,
restrial and other interference from sources in the same started in the late 1990s, but soon went into bankruptcy
frequency bands. after failing to gain enough subscribers to fund launch
Another disadvantage of geostationary satellite systems is costs. They are now operated by new owners who bought
that in many areaseven where a large amount of open the assets for a fraction of their original cost and are now
sky is presentthe line-of-sight between the phone and both planning to launch replacement constellations sup-
the satellite is broken by obstacles such as steep hills and porting higher bandwidth. Data speeds for current net-
forest. The user will need to nd an area with line-of-sight works are between 2200 bit/s and 9600 bit/s using a satel-
lite handset.
before using the phone. This is not the case with LEO ser-
vices: even if the signal is blocked by an obstacle, one can
wait a few minutes until another satellite passes overhead, Globalstar: A network covering most of the worlds
but a moving LEO satellite may drop a call when line of landmass using 44 active satellites. However, many
sight is lost. areas are left without coverage since a satellite must
be in range of an Earth station. Satellites y in an
ACeS: This small regional operator provides voice inclined orbit of 52 degrees, so polar regions cannot
and data services in East Asia, South Asia, and be covered. The network went into limited commer-
Southeast Asia using a single satellite. cial service at the end of 1999
Inmarsat: The oldest satellite phone operator, Iridium: A network operating 66 satellites in a polar
founded in 1979. It originally provided large xed orbit that claims coverage everywhere on Earth.
installations for ships, but has recently entered the Commercial service started in November 1998 and
market of hand-held phones in a joint venture with fell into Chapter 11 bankruptcy in August 1999.[4]
ACeS. The company operates eleven satellites. Cov- In 2001, service was re-established by Iridium Satel-
erage is available on most of the Earth, except polar lite LLC. Radio cross-links are used between satel-
regions. lites to relay data to the nearest satellite with a con-
nection to an Earth station.
Thuraya: Established in 1997, Thurayas satellites
provide coverage across Europe, Africa, the Middle
East, Asia and Australia. Tracking
MSAT / SkyTerra: An American satellite phone LEO systems have the ability to track a mobile units loca-
company that uses equipment similar to Inmarsat, tion using Doppler shift calculations from the satellite.[5]
but plans to launch a service using hand-held devices
However, this method can be inaccurate by tens of kilo-
in the Americas similar to Thuraya's. meters. On some Iridium hardware the coordinates can
be extracted using AT commands, while recent Global-
Terrestar: Satellite phone system for North America star handsets will display them on the screen.[6]
ICO Global Communications: A satellite phone Most VSAT terminals can be reprogrammed in-eld us-
company which has launched a single geosyn- ing AT-commands to bypass automatic acquisition of
chronous satellite which is not yet active. GPS coordinates and instead accept manually injected
GPS coordinates.
54.1.2 Low Earth orbit
LEO telephones utilize LEO (low Earth orbit) satellite 54.2 Countries with restrictions on
technology. The advantages include providing worldwide use of satellite phones
wireless coverage with no gaps. LEO satellites orbit the
Earth in high speed, low altitude orbits with an orbital In some countries, possession of a satellite phone is
time of 70100 minutes, an altitude of 640 to 1120 kilo- illegal.[7] Their signals will usually bypass local telecoms
meters (400 to 700 miles), and provide coverage cells systems, hindering censorship and wiretapping attempts.
of about (at a 100-minute orbital period) 2800 km in These countries tend to score low on the Democracy in-
radius (about 1740 mi). Since the satellites are not dex, with the exception of India, so a ban can be the result
geostationary, they move with respect to the ground. At of the states desire for mass surveillance or that it lacks
least one satellite must have line-of-sight to every cover- the technology to intercept satellite phone trac.
age area at all times to guarantee coverage. Depending on
the positions of both the satellite and terminal, a usable
pass of an individual LEO satellite will typically last 415 Burma[8]
minutes on average;[3] thus, a constellation of satellites is China
required to maintain coverage (as is done with Iridium,
Globalstar, and others). Cuba[9][10]
54.5. COST OF A SATELLITE PHONE 201
India only Inmarsat-based satellite services are 54.5 Cost of a satellite phone
permitted within territories and areas under Indian
jurisdiction. Import and operation of all other
satellite services, including Thuraya and Iridium,
is illegal.[11] International shipping is obligated to
comply with Indian Directorate-General of Ship-
ping (DGS) Order No. 02 of 2012 which makes
the unauthorised import and operation of Thuraya,
Iridium and other such satellite phones illegal in wa-
ters which are within Indian jurisdiction. The leg-
islation to this eect is Section 6 of Indian Wire-
less Act and Section 20 of Indian Telegraph Act.
International Long Distance(ILD) licence and No
Objection Certicate (NOC) issued by Indian De-
partment of Telecommunications (DOT) is manda-
tory for satellite communication services on Indian
territory.[12][13][14][15]
Satphones on display
North Korea
While it is possible to obtain used handsets for the Thu-
Russia in 2012, new regulations governing the use raya, Iridium, and Globalstar networks for approximately
of satellite phones inside Russia or its territories US$200, the newest handsets are quite expensive. The
were developed to ght terrorism by enabling the Iridium 9505A, released in 2001, sold in March 2010 for
Russian government to intercept calls.[16] These reg- over US$1,000.[18] Satellite phones are purpose-built for
ulations allow non-Russian visitors to register their one particular network and cannot be switched to other
SIM cards for use within Russian territory for up to networks, the price of handsets varies with network per-
six months. formance. If a satellite phone provider encounters trou-
ble with its network, handset prices will fall, then in-
crease once new satellites are launched. Similarly, hand-
set prices will increase when calling rates are reduced.
54.3 Security concerns Among the most expensive satellite phones are
BGAN terminals, often costing several thousand
All modern satellite phone networks encrypt voice trac US dollars.[19][20] These phones provide broadband
to prevent eavesdropping. In 2012, a team of academic Internet and voice communications. Satellite phones
security researchers reverse-engineered the two major are sometimes subsidised by the provider if one signs a
proprietary encryption algorithms in use.[17] One algo- post-paid contract, but subsidies are usually only a few
rithm (used in GMR-1 phones) is a variant of the A5/2 al- hundred US dollars or less.
gorithm used in GSM (used in common mobile phones),
Since most satellite phones are built under license or the
and both are vulnerable to cipher-text only attacks. The
manufacturing of handsets is contracted out to OEMs,
GMR-2 standard introduced a new encryption algorithm
operators have a large inuence over the selling price.
which the same research team also cryptanalysed suc-
Satellite networks operate under proprietary protocols,
cessfully. Thus satellite phones are not recommended for
making it dicult for manufacturers to independently
high-security applications.
make handsets.
same country code, regardless of which satellite their ter- Terrestrial cell antennas and networks can be damaged by
minal is registered with.[21] natural disasters. Satellite telephony can avoid this prob-
Low Earth orbit systems including some of the de- lem and be useful during natural disasters. Satellite phone
funct ones have been allocated number ranges in the networks themselves are prone to congestion as satellites
International Telecommunications Union's Global Mo- and spot beams cover a large area with relatively few voice
bile Satellite System virtual country code +881. Iridium channels.
satellite phones are issued with codes +881 6 and +881
7. Globalstar, although allocated +881 8 and +881 9 use
U.S. telephone numbers except for service resellers lo- 54.9 See also
cated in Brazil, which use the +881 range.
Small regional satellite phone networks are allocated Broadband Global Area Network (BGAN)
numbers in the +882 code designated for "international Satellite internet
networks" which is not used exclusively for satellite phone
networks. Telecommunications
Globalstar
54.7 Calling cost Thuraya
Inmarsat
The cost of making voice calls from a satellite phone
varies from around $0.15 to $2 per minute, while calling Iridium Communications
them from landlines and regular mobile phones is more
expensive. Costs for data transmissions (particularly
broadband data) can be much higher. Rates from land- 54.10 References
lines and mobile phones range from $3 to $14 per minute
with Iridium, Thuraya[22] and Inmarsat being some of the
most expensive networks to call. The receiver of the call Notes
pays nothing, unless they are being called via a special
reverse-charge service. [1] New Satellite Phone Runs Windows Mobile. Gearlog.
Making calls between dierent satellite phone networks is [2] CTIA 2008: MSV Makes Lost Satellite Phone Real.
often similarly expensive, with calling rates of up to $15 Gearlog.
per minute.
[3] Delay/Disruption-Tolerant Network Testing Using a
Calls from satellite phones to landlines are usually around LEO Satellite (PDF). NASA.
$0.80 to $1.50 per minute unless special oers are used.
[4] Jaejoo Lim; Richard Klein; Jason Thatcher (2005).
Such promotions are usually bound to a particular geo-
Good technology, bad management: A case study of the
graphic area where trac is low. satellite phone industry (PDF). Journal of Information
Most satellite phone networks have pre-paid plans, with Technology Management. Association of Management.
vouchers ranging from $100 to $5,000. XVI (2). ISSN 1042-1319.
[5]
54.8 Use in disaster response [6] Globalstar GSP-1700 manual (PDF). Retrieved August
1, 2009.
See also: Cascading failure [7] Hossain, Moazzem (September 24, 2002). Bangladesh
jails Indian rebel chief. BBC. Retrieved January 4, 2010.
Most mobile telephone networks operate close to capac- [8] Dobie, Michael (September 28, 2007). Junta tightens
ity during normal times, and large spikes in call vol- media screw. BBC. Retrieved January 4, 2010.
umes caused by widespread emergencies often overload
[9] Administrator. SHIPMENTS SHALL NOT CON-
the systems when they are needed most. Examples re-
TAIN. co.cu.
ported in the media where this has occurred include the
1999 zmit earthquake, the September 11 attacks, the [10] Alan Gross
2006 Hawaii earthquake, the 2003 Northeast blackouts,
Hurricane Katrina,[23] the 2007 Minnesota bridge col- [11] Subject: Illegal use of Satellite Phones in India regard-
ing. Archived from the original on February 8, 2014.
lapse, the 2010 Chile earthquake, and the 2010 Haiti
Retrieved January 28, 2015.
earthquake. Reporters and journalists have also been us-
ing satellite phones to communicate and report on events [12] Recommendation : Telecom Regulatory Authority of In-
in war zones such as Iraq. dia. trai.gov.in.
54.11. EXTERNAL LINKS 203
[15] http://www.intmsearch.gov.in/bimonthly/2015/01%
20of%202015.pdf
204
55.3. NETWORK ELEMENTS 205
ing down voice or video calls. It also allows modication 55.3 Network elements
of existing calls. The modication can involve chang-
ing addresses or ports, inviting more participants, and SIP denes user agents as well as several types of server
adding or deleting media streams. SIP has also found ap- network elements. Two SIP endpoints can communicate
plications in messaging applications, such as instant mes- without any intervening SIP infrastructure. However, this
saging, and event subscription and notication. A suite approach is often impractical for public services, which
of SIP-related Internet Engineering Task Force (IETF) need directory services to locate available nodes in the
rules dene behavior for such applications. The voice network.
and video stream communications in SIP applications
are carried over another application protocol, the Real-
time Transport Protocol (RTP). Parameters (port num-
55.3.1 User agent
bers, protocols, codecs) for these media streams are de-
ned and negotiated using the Session Description Proto-
A SIP user agent (UA) is a logical network end-point used
col (SDP), which is transported in the SIP packet body.
to create or receive SIP messages and thereby manage a
A motivating goal for SIP was to provide a signaling SIP session. A SIP UA can perform the role of a user
and call setup protocol for IP-based communications that agent client (UAC), which sends SIP requests, and the
can support a superset of the call processing functions user agent server (UAS), which receives the requests and
and features present in the public switched telephone net- returns a SIP response. Unlike other network protocols
work (PSTN). SIP by itself does not dene these features; where the roles of client and server are xed (e.g., a web
rather, its focus is call setup and signaling. The features browser only acts as an HTTP client, and never acts as
that permit familiar telephone-like operations (i.e. dial- an HTTP server), in SIP requests can go in either direc-
ing a number, causing a phone to ring, hearing ringback tion, so in almost all cases, a SIP UA must be capable of
tones or a busy signal) are performed by proxy servers and performing both roles. (If a SIP UA could only perform
user agents. Implementation and terminology are dier- one role, it could only receive calls and have calls hung
ent in the SIP world compared to the PSTN but, to the up by the peer, but not make calls or hang them up itself,
end-user, the behavior is similar. or vice versa.) These roles of UAC and UAS only last for
SIP-enabled telephony networks often implement many the duration of a SIP transaction.[5]
of the call processing features of Signaling System 7 A SIP phone is an IP phone that implements client and
(SS7), although the two protocols themselves are very dif- server functions of a SIP user agent and provides the tra-
ferent. SS7 is a centralized protocol, characterized by ditional call functions of a telephone, such as dial, answer,
a complex central network architecture and dumb end- reject, call hold, and call transfer.[13][14] SIP phones may
points (traditional telephone handsets). SIP is a client- be implemented as a hardware device or as a softphone.
server protocol, however most SIP-enabled devices may As vendors increasingly implement SIP as a standard tele-
perform both the client and the server role. In general, phony platform, the distinction between hardware-based
the session initiator is a client, and the call recipient is the and software-based SIP phones is blurred and SIP ele-
server. SIP features are implemented in the communicat- ments are implemented in the basic rmware functions
ing endpoints, contrary to traditional SS7 architecture, in of many IP-capable devices. Examples are devices from
which features are implemented in the network core. Nokia and BlackBerry.[15]
Because SIP devices must perform both client and server In SIP, as in HTTP, the user agent may identify itself
roles, network communication can be dicult with mod- using a message header eld User-Agent, containing a
ern network topologies. When using a connection- text description of the software, hardware, or the prod-
oriented protocol like TCP, SIP nominally expects that uct name. The user agent eld is sent in request mes-
separate connections will be opened for requests from A sages, which means that the receiving SIP server can see
to B and requests from B to A. The use of rewalls and this information. SIP network elements sometimes store
network address translation (NAT) interferes with this, as this information,[16] and it can be useful in diagnosing SIP
it may not be possible for B to initiate a connection to A, compatibility problems.
if A is behind a rewall or NAT. SIP allows the original
connection from A to B to be used for requests from B
to A, but the requests must correctly distinguish between 55.3.2 Proxy server
As private and public addresses and ports; this is also
true of requests on connectionless protocols like UDP. The proxy server is an intermediary entity that acts as
To accomplish this, SIP uses extensions like received and both a server and a client for the purpose of making re-
rport,[12] and can be paired with other protocols for dis- quests on behalf of other clients. A proxy server primar-
covering network topology such as TURN, STUN, and ily plays the role of routing, meaning that its job is to
ICE. ensure that a request is sent to another entity closer to the
targeted user. Proxies are also useful for enforcing policy,
such as for determining whether a user is allowed to make
206 CHAPTER 55. SESSION INITIATION PROTOCOL
a call. A proxy interprets, and, if necessary, rewrites spe- 55.3.4 Redirect server
cic parts of a request message before forwarding it.
A redirect server is a user agent server that generates 3xx
(redirection) responses to requests it receives, directing
55.3.3 Registrar the client to contact an alternate set of URIs. A redirect
server allows proxy servers to direct SIP session invita-
tions to external domains.
55.3.6 Gateway
Gateways can be used to interconnect a SIP network to
other networks, such as the public switched telephone net-
work, which use dierent protocols or technologies.
55.4.1 Requests
Main article: List of SIP request methods
are recognized, determined by the numerical range of re- Transactions are further categorized as either type Invite
sult codes:[18] or type Non-Invite. Invite transactions dier in that they
can establish a long-running conversation, referred to as a
1xx: Provisional responses to requests indicate the dialog in SIP, and so include an acknowledgment (ACK)
request was valid and is being processed. of any non-failing nal response, e.g., 200 OK.
Because of these transactional mechanisms, unreliable
2xx: 200-level responses indicate a successful com- transport protocols, such as the User Datagram Protocol
pletion of the request. As a response to an INVITE, (UDP), are sucient for SIP operation.
it indicates a call is established.
the cost for Basic Rate Interface (BRI) or Primary Rate If secure transmission is required, the sips URI scheme
Interface (PRI) telephone circuits. is used and mandates that each hop over which the re-
Many VoIP phone companies allow customers to use their quest is forwarded up to the target domain must be se-
own SIP devices, such as SIP-capable telephone sets, or cured with Transport Layer Security (TLS). The last hop
softphones. from the proxy of the target domain to the user agent has
to be secured according to local policies. TLS protects
SIP-enabled video surveillance cameras can make calls to against attackers who try to listen on the signaling link
alert the owner or operator that an event has occurred; for but it does not provide real end-to-end security to pre-
example, to notify that motion has been detected out-of- vent espionage and law enforcement interception, as the
hours in a protected area. encryption is only hop-by-hop and every single interme-
SIP is used in audio over IP for broadcasting applications diate proxy has to be trusted.
where it provides an interoperable means for audio inter- Because VPN is not an option for most service providers,
faces from dierent manufacturers to make connections most service providers that oer secure SIP (SIPS) con-
with one another.[22] nections use TLS for securing signaling. The relationship
between SIP (port 5060) and SIPS (port 5061), is sim-
ilar to that as for HTTP and HTTPS, and uses URIs in
the form "sips:user@example.com". The media streams,
55.10 Implementations which occur on dierent connections to the signaling
stream, can be encrypted with SRTP. The key exchange
The U.S. National Institute of Standards and Technol- for SRTP is performed with SDES (RFC 4568), or the
ogy (NIST), Advanced Networking Technologies Divi- newer and often more user friendly ZRTP (RFC 6189),
sion provides a public-domain Java implementation[23] which can automatically upgrade RTP to SRTP using dy-
that serves as a reference implementation for the stan- namic key exchange (and a verication phrase). One can
dard. The implementation can work in proxy server or also add a MIKEY (RFC 3830) exchange to SIP and in
user agent scenarios and has been used in numerous com- that way determine session keys for use with SRTP.
mercial and research projects. It supports RFC 3261 in
full and a number of extension RFCs including RFC 6665
(event notication) and RFC 3262 (reliable provisional
responses).
55.13 See also
Numerous other commercial and open-source SIP imple- Voice over IP
mentations exist. See List of SIP software.
Rendezvous protocol
Peer-to-peer SIP
55.11 SIP-ISUP interworking
Computer telephony integration (CTI)
SIP-I, or the Session Initiation Protocol with encapsu- Computer-supported telecommunications applica-
lated ISUP, is a protocol used to create, modify, and tions (CSTA)
terminate communication sessions based on ISUP using
SIP and IP networks. Services using SIP-I include voice, H.323 protocols H.225.0 and H.245
video telephony, fax and data. SIP-I and SIP-T[24] are
two protocols with similar features, notably to allow ISUP IP Multimedia Subsystem (IMS)
messages to be transported over SIP networks. This pre- Extensions to the Session Initiation Protocol for the
serves all of the detail available in the ISUP header, which IP Multimedia Subsystem
is important as there are many country-specic variants
of ISUP that have been implemented over the last 30 Media Gateway Control Protocol (MGCP)
years, and it is not always possible to express all of the
same detail using a native SIP message. SIP-I was de- Message Session Relay Protocol (MSRP)
ned by the ITU-T, whereas SIP-T was dened via the
Mobile VoIP
IETF RFC route.[25]
MSCML (Media Server Control Markup Language)
Network convergence
55.12 Encryption
RTP audio video prole
The increasing concerns about the security of calls that SIGTRAN (Signaling Transport)
run over the public Internet has made SIP encryption
more popular and, in fact more desired. SIP trunking
55.15. BIBLIOGRAPHY 209
SIP provider [21] Performance and Stress Testing of SIP Servers, Clients
and IP Networks. StarTrinity. 2016-08-13.
Skinny Client Control Protocol (SCCP)
[22] Jonsson, Lars; Mathias Coinchon (2008). Streaming au-
XIMSS (XML Interface to Messaging, Scheduling, dio contributions over IP (PDF). EBU Technical Review.
and Signaling) Retrieved 2010-12-27.
[5] RFC 3261 SIP: Session Initiation Protocol. IETF. Miikka Poikselk; Georg Mayer; Hisham Kharta-
2002. bil; Aki Niemi (19 November 2004), The IMS: IP
Multimedia Concepts and Services in the Mobile Do-
[6] Margaret Rouse. Session Initiation Protocol (SIP)". main, John Wiley & Sons, p. 268, ISBN 978-0-47-
TechTarget.
087114-0
[7] RFC 4168, The Stream Control Transmission Protocol
(SCTP) as a Transport for the Session Initiation Protocol
(SIP), IETF, The Internet Society (2005) 55.16 External links
[8] William Stallings, p.209
Computers/Internet/Protocols/SIP/ at DMOZ
[9] RFC 3986, Uniform Resource Identiers (URI): Generic
Syntax, IETF, The Internet Society (2005) IANA: SIP Parameters
[10] Miikka Poikselk et al. 2004. IANA: SIP Event Types Namespace
[11] Brian Reid & Steve Goodman 2015.
SMS redirects here. For other uses, see SMS (disam- series of standards.[3] The protocols allowed users to send
biguation). and receive messages of up to 160 alpha-numeric charac-
This article is about the communication protocol tech- ters to and from GSM mobile handsets. Though most
nology. For information about text messaging, see Text SMS messages are mobile-to-mobile text messages, sup-
messaging. port for the service has expanded to include other mobile
Short Message Service (SMS) is a text messaging ser- technologies, such as ANSI CDMA networks and Digital
AMPS, as well as satellite and landline networks.
SMS is also employed in mobile marketing, a type of
direct marketing.[4] According to one market research re-
1 ABC DEF port, as of 2014, the global SMS messaging business was
2 3 estimated to be worth over $100 billion, accounting for
almost 50 percent of all the revenue generated by mobile
messaging.[5]
7 8 9 70
60
50
40
0 30
20
10
vice component of most telephone, World Wide Web, SMS messages sent monthly in USA (billion)
and mobile telephony systems[1][1] . It uses standardized
communication protocols to enable xedline/landline or Adding text messaging functionality to mobile devices
mobile phone devices to exchange short text messages.[2] began in the early 1980s. The rst action plan of the
SMS was the most widely used data application, with an CEPT Group GSM was approved in December 1982, re-
estimated 3.5 billion active users, or about 80% of all mo- questing that, The services and facilities oered in the
bile phone subscribers, at the end of 2010.[1] public switched telephone networks and public data net-
SMS, as used on modern handsets, originated from radio works ... should be available in the mobile system.[6]
telegraphy in radio memo pagers that used standardized This plan included the exchange of text messages either
phone protocols. These were dened in 1985 as part of directly between mobile stations, or transmitted via mes-
the Global System for Mobile Communications (GSM) sage handling systems in use at that time.[7]
210
56.1. HISTORY 211
no changes to the Short Message operation packages in Over time, this issue was eliminated by switch billing in-
MAP, although other operation packages have been en- stead of billing at the SMSC and by new features within
hanced to support CAMEL SMS control. SMSCs to allow blocking of foreign mobile users send-
From 3GPP Releases 99 and 4 onwards, CAMEL Phase ing messages through it. By the end of 2000, the average [28]
3 introduced the ability for the Intelligent Network (IN) to number of messages reached 35 per user per month,
control aspects of the Mobile Originated Short Message and on Christmas Day 2006, [29]
over 205 million messages
[21]
Service, while CAMEL Phase 4, as part of 3GPP Re- were sent in the UK alone.
lease 5 and onwards, provides the IN with the ability to
control the Mobile Terminated service.[22] CAMEL al-
lows the gsmSCP to block the submission (MO) or deliv- 56.1.5 Text messaging outside GSM
ery (MT) of Short Messages, route messages to destina-
tions other than that specied by the user, and perform SMS was originally designed as part of GSM, but is now
real-time billing for the use of the service. Prior to stan- available on a wide range of networks, including 3G net-
dardized CAMEL control of the Short Message Service, works. However, not all text messaging systems use SMS,
IN control relied on switch vendor specic extensions to and some notable alternative implementations of the con-
the Intelligent Network Application Part (INAP) of SS7. cept include J-Phone's SkyMail and NTT Docomo's Short
Mail, both in Japan. Email messaging from phones,
as popularized by NTT Docomos i-mode and the RIM
BlackBerry, also typically uses standard mail protocols
56.1.4 Early implementations such as SMTP over TCP/IP.
users are delivered a one-time passcode over SMS and whose payload length is limited by the constraints of the
then are asked to enter that passcode online in order to signaling protocol to precisely 140 bytes (140 bytes * 8
verify their identity.[36] bits / byte = 1120 bits). Short messages can be encoded
using a variety of alphabets: the default GSM 7-bit al-
phabet, the 8-bit data alphabet, and the 16-bit UCS-2
alphabet.[44] Depending on which alphabet the subscriber
56.2 Technical details has congured in the handset, this leads to the maximum
individual short message sizes of 160 7-bit characters,
56.2.1 GSM 140 8-bit characters, or 70 16-bit characters. GSM 7-
bit alphabet support is mandatory for GSM handsets and
[44]
Main article: Short message service technical realisation network elements, but characters in languages such as
(GSM) Arabic, Chinese, Korean, Japanese, or Cyrillic alphabet
languages (e.g., Russian, Ukrainian, Serbian, Bulgarian,
etc.) must be encoded using the 16-bit UCS-2 character
The Short Message ServicePoint to Point (SMS-PP)
encoding (see Unicode). Routing data and other metadata
was originally dened in GSM recommendation 03.40,
is additional to the payload size.
which is now maintained in 3GPP as TS 23.040.[37][38]
GSM 03.41 (now 3GPP TS 23.041) denes the Short Larger content (concatenated SMS, multipart or seg-
Message ServiceCell Broadcast (SMS-CB), which allows mented SMS, or long SMS) can be sent using multi-
messages (advertising, public information, etc.) to be ple messages, in which case each message will start with
broadcast to all mobile users in a specied geographical a User Data Header (UDH) containing segmentation in-
area.[39][40] formation. Since UDH is part of the payload, the number
of available characters per segment is lower: 153 for 7-
Messages are sent to a short message service center
bit encoding, 134 for 8-bit encoding and 67 for 16-bit
(SMSC), which provides a "store and forward" mecha-
encoding. The receiving handset is then responsible for
nism. It attempts to send messages to the SMSCs recip-
reassembling the message and presenting it to the user
ients. If a recipient is not reachable, the SMSC queues
as one long message. While the standard theoretically
the message for later retry.[41] Some SMSCs also provide
permits up to 255 segments,[45] 6 to 8 segment messages
a forward and forget option where transmission is tried
are the practical maximum, and long messages are of-
only once. Both mobile terminated (MT, for messages
ten billed as equivalent to multiple SMS messages. Some
sent to a mobile handset) and mobile originating (MO,
providers have oered length-oriented pricing schemes
for those sent from the mobile handset) operations are
for messages, however, the phenomenon is disappearing.
supported. Message delivery is "best eort, so there are
no guarantees that a message will actually be delivered
to its recipient, but delay or complete loss of a message
is uncommon, typically aecting less than 5 percent of 56.2.3 Gateway providers
messages.[42] Some providers allow users to request deliv-
ery reports, either via the SMS settings of most modern SMS gateway providers facilitate SMS trac between
phones, or by prexing each message with *0# or *N#. businesses and mobile subscribers, including SMS for en-
However, the exact meaning of conrmations varies from terprises, content delivery, and entertainment services in-
reaching the network, to being queued for sending, to be- volving SMS, e.g. TV voting. Considering SMS messag-
ing sent, to receiving a conrmation of receipt from the ing performance and cost, as well as the level of messag-
target device, and users are often not informed of the spe- ing services, SMS gateway providers can be classied as
cic type of success being reported. aggregators or SS7 providers.
SMS is a stateless communication protocol in which ev- The aggregator model is based on multiple agreements
ery SMS message is considered entirely independent of with mobile carriers to exchange two-way SMS trac
other messages. Enterprise applications using SMS as a into and out of the operators SMSC, also known as local
communication channel for stateful dialogue (where an termination model. Aggregators lack direct access into
MO reply message is paired to a specic MT message) the SS7 protocol, which is the protocol where the SMS
requires that session management be maintained external messages are exchanged. SMS messages are delivered
to the protocol. to the operators SMSC, but not the subscribers handset;
the SMSC takes care of further handling of the message
through the SS7 network.
56.2.2 Message size Another type of SMS gateway provider is based on SS7
connectivity to route SMS messages, also known as in-
Transmission of short messages between the SMSC and ternational termination model. The advantage of this
the handset is done whenever using the Mobile Applica- model is the ability to route data directly through SS7,
tion Part (MAP) of the SS7 protocol.[43] Messages are which gives the provider total control and visibility of the
sent with the MAP MO- and MT-ForwardSM operations, complete path during SMS routing. This means SMS
214 CHAPTER 56. SHORT MESSAGE SERVICE
messages can be sent directly to and from recipients controlled by SMS, and some vehicle tracking companies
without having to go through the SMSCs of other mo- use SMS for their data transport or telemetry needs. SMS
bile operators. Therefore, it is possible to avoid delays usage for these purposes is slowly being superseded by
and message losses, oering full delivery guarantees of GPRS services owing to their lower overall cost. GPRS is
messages and optimized routing. This model is partic- oered by smaller telco players as a route of sending SMS
ularly ecient when used in mission-critical messaging text to reduce the cost of SMS texting internationally.[50]
and SMS used in corporate communications. Moreover,
these SMS gateway providers are providing branded SMS
services with masking but after misuse of these gateways 56.2.5 AT commands
most countriess Governments have taken serious steps to
block these gateways. Many mobile and satellite transceiver units support the
sending and receiving of SMS using an extended ver-
sion of the Hayes command set, a specic command lan-
56.2.4 Interconnectivity with other net- guage originally developed for the Hayes Smartmodem
works 300-baud modem in 1977.
The connection between the terminal equipment and the
Message Service Centers communicate with the Public transceiver can be realized with a serial cable (e.g., USB),
Land Mobile Network (PLMN) or PSTN via Interwork- a Bluetooth link, an infrared link, etc. Common AT com-
ing and Gateway MSCs. mands include AT+CMGS (send message), AT+CMSS
Subscriber-originated messages are transported from (send message from storage), AT+CMGL
[51]
(list messages)
a handset to a service center, and may be destined and AT+CMGR (read message).
for mobile users, subscribers on a xed network, or However, not all modern devices support receiving of
Value-Added Service Providers (VASPs), also known as messages if the message storage (for instance the devices
application-terminated. Subscriber-terminated messages internal memory) is not accessible using AT commands.
are transported from the service center to the destina-
tion handset, and may originate from mobile users, from
xed network subscribers, or from other sources such as 56.2.6 Premium-rated short messages
VASPs.
See also: Reverse SMS billing, Mobile search, and Short
On some carriers nonsubscribers can send messages to a
code
subscribers phone using an Email-to-SMS gateway. Ad-
ditionally, many carriers, including AT&T Mobility, T-
Mobile USA,[46] Sprint,[47] and Verizon Wireless,[48] of- Short messages may be used normally to provide
fer the ability to do this through their respective websites. premium rate services to subscribers of a telephone net-
work.
For example, an AT&T subscriber whose phone num-
ber was 555-555-5555 would receive e-mails addressed Mobile-terminated short messages can be used to de-
to 5555555555@txt.att.net as text messages. Subscribers liver digital content such as news alerts, nancial infor-
can easily reply to these SMS messages, and the SMS re- mation, logos, and ring tones. The rst premium-rate me-
ply is sent back to the original email address. Sending dia content delivered via the SMS system was the worlds
email to SMS is free for the sender, but the recipient is rst paid downloadable ringing tones, as commercially
subject to the standard delivery charges. Only the rst launched by Saunalahti (later Jippii Group, now part of
160 characters of an email message can be delivered to a Elisa Grous), in 1998. Initially only Nokia branded
phone, and only 160 characters can be sent from a phone. phones could handle them. By 2002 the ringtone busi-
ness globally had exceeded $1 billion of service revenues,
Text-enabled xed-line handsets are required to receive and nearly $5 billion by 2008. Today, they are also used
messages in text format. However, messages can be de- to pay smaller payments onlinefor example, for le-
livered to nonenabled phones using text-to-speech con- sharing services, in mobile application stores, or VIP sec-
version.[49] tion entrance. Outside the online world, one can buy a bus
Short messages can send binary content such as ringtones ticket or beverages from ATM, pay a parking ticket, or-
or logos, as well as Over-the-air programming (OTA) or der a store catalog or some goods (e.g., discount movie
conguration data. Such uses are a vendor-specic ex- DVDs), make a donation to charity, and much more.
tension of the GSM specication and there are multiple Premium-rated messages are also used in Donors Mes-
competing standards, although Nokia's Smart Messaging sage Service to collect money for charities and founda-
is common. An alternative way for sending such binary tions. DMS was rst launched at April 1, 2004, and
content is EMS messaging, which is standardized and not is very popular in the Czech Republic. For example,
dependent on vendors. the Czech people sent over 1.5 million messages to help
SMS is used for M2M (Machine to Machine) commu- South Asia recover from the 2004 Indian Ocean earth-
nication. For instance, there is an LED display machine quake and tsunami.
56.2. TECHNICAL DETAILS 215
The Value-added service provider (VASP) providing the forth between sent and received messages in the header
content submits the message to the mobile operators data (as specied by SMS protocol) from which the client
SMSC(s) using an TCP/IP protocol such as the short mes- device can properly thread an incoming message to a
sage peer-to-peer protocol (SMPP) or the External Ma- specic dialogue, or even to a specic message within a
chine Interface (EMI). The SMSC delivers the text us- dialogue. Most smart phone text-messaging-clients are
ing the normal Mobile Terminated delivery procedure. able to create some contextual threading of group mes-
The subscribers are charged extra for receiving this pre- sages which narrows the context of the thread around
mium content; the revenue is typically divided between the common interests shared by group members. On the
the mobile network operator and the VASP either through other hand, advanced enterprise messaging applications
revenue share or a xed transport fee. Submission to the which push messages from a remote server often display
SMSC is usually handled by a third party. a dynamically changing reply number (multiple numbers
Mobile-originated short messages may also be used in a used by the same sender), which is used along with the
senders phone number to create session-tracking capa-
premium-rated manner for services such as televoting.
In this case, the VASP providing the service obtains a bilities analogous to the functionality that cookies pro-
short code from the telephone network operator, and sub- vide for web-browsing. As one pervasive example, this
scribers send texts to that number. The payouts to the technique is used to extend the functionality of many In-
carriers vary by carrier; percentages paid are greatest on stant Messenger (IM) applications such that they are able
the lowest-priced premium SMS services. Most infor- to communicate over two-way dialogues with the much
mation providers should expect to pay about 45 percent larger SMS user-base.[54] In cases where multiple reply
of the cost of the premium SMS up front to the carrier. numbers are used by the enterprise server to maintain the
The submission of the text to the SMSC is identical to dialogue, the visual conversation threading on the client
a standard MO Short Message submission, but once the may be separated into multiple threads.
text is at the SMSC, the Service Center (SC) identies
the Short Code as a premium service. The SC will then
56.2.8 Application-to-person (A2P) SMS
direct the content of the text message to the VASP, typ-
ically using an IP protocol such as SMPP or EMI. Sub-
While SMS reached its popularity as a person-to-
scribers are charged a premium for the sending of such
person messaging, another type of SMS is growing fast:
messages, with the revenue typically shared between the
application-to-person (A2P) messaging. A2P is a type
network operator and the VASP. Short codes only work
of SMS sent from a subscriber to an application or sent
within one country, they are not international.
from an application to a subscriber. It is commonly used
An alternative to inbound SMS is based on long numbers by nancial institutions, airlines, hotel booking sites, so-
(international number format, e.g. +44 762 480 5000), cial networks, and other organizations sending SMS from
which can be used in place of short codes for SMS recep- their systems to their customers.
tion in several applications, such as TV voting, product
In the USA, A2P messages must be sent using a short
promotions and campaigns. Long numbers work interna-
code rather than a standard long code.[55]
tionally, allow businesses to use their own numbers, rather
than short codes, which are usually shared across many
brands. Additionally, long numbers are nonpremium in- 56.2.9 Satellite phone networks
bound numbers.
All commercial satellite phone networks except ACeS
56.2.7 Threaded SMS and OptusSat support SMS. While early Iridium handsets
only support incoming SMS, later models can also send
Threaded SMS is a visual styling orientation of SMS mes- messages. The price per message varies for dierent net-
sage history that arranges messages to and from a con- works. Unlike some mobile phone networks, there is no
tact in chronological order on a single screen. It was rst extra charge for sending international SMS or to send one
invented by a developer working to implement the SMS to a dierent satellite phone network. SMS can some-
client for the BlackBerry, who was looking to make use of times be sent from areas where the signal is too poor to
the blank screen left below the message on a device with make a voice call.
a larger screen capable of displaying far more than the Satellite phone networks usually have web-based or
usual 160 characters, and was inspired by threaded Reply email-based SMS portals where one can send free SMS
conversations in email.[52] Visually, this style of repre- to phones on that particular network.
sentation provides a back-and-forth chat-like history for
each individual contact.[53] Hierarchical-threading at the
conversation-level (as typical in blogs and on-line mes- 56.2.10 Unreliability
saging boards)is not widely supported by SMS messag-
ing clients. This limitation is due to the fact that there Unlike dedicated texting systems like the Simple
is no session identier or subject-line passed back and Network Paging Protocol and Motorolas ReFLEX
216 CHAPTER 56. SHORT MESSAGE SERVICE
protocol,[56] SMS message delivery is not guaran- home networkwith the home SMSC essentially being
teed, and many implementations provide no mechanism hijacked to send messages into other networks.
through which a sender can determine whether an SMS The only sure way of detecting and blocking spoofed mes-
message has been delivered in a timely manner.[57] SMS sages is to screen incoming mobile-originated messages
messages are generally treated as lower-priority trac to verify that the sender is a valid subscriber and that
than voice, and various studies have shown that around the message is coming from a valid and correct location.
1% to 5% of messages are lost entirely, even during nor- This can be implemented by adding an intelligent rout-
mal operation conditions,[58] and others may not be de- ing function to the network that can query originating
livered until long after their relevance has passed.[59] The
subscriber details from the HLR before the message is
use of SMS as an emergency notication service in par- submitted for delivery. This kind of intelligent routing
ticular has been questioned.[60]
function is beyond the capabilities of legacy messaging
infrastructure.[64]
56.2.11 Vulnerabilities
56.3 See also [10] See GSM document 28/85rev.2 June 85 and GSM WP1
document 66/86 available in the ETSI archive
Process Driven Messaging Service [11] See also Friedhelm Hillebrand GSM and UMTS, the cre-
ation of Global Mobile Communication, Wiley 2002,
Comparison of mobile phone standards
chapters 10 and 16, ISBN 0-470-84322-5
iMessage [12] GSM document 19/85, available in the ETSI archive
SMS language [13] GSM document 28/85r2, available in the ETSI archive
Telegram [14] So who really did create SMS?". Stephen Temple. Re-
trieved 6 April 2013.
Text messaging
[15] GSM TS 02.03, Teleservices Supported by a GSM Public
Social messaging Land Mobile Network (PLMN).
Short message service technical realisation (GSM) [18] Finn Trosby, the strange duckling of GSM SMS, Telek-
tronikk Vol.3 2004.
SMS gateway (sending text to or from devices other
than phones) [19] MAP phase 1 specication, available from the 3GPP web
site.
SMS hubbing
[20] MAP phase 2 specication, available from the 3GPP web
SMS home routing site.
Multimedia Messaging Service (MMS) [21] CAMEL Phase 3 specication, available from the 3GPP
web site.
Extended Messaging Service
[22] CAMEL Phase 4 specication, also available from the
Enhanced Messaging Service (EMS) 3GPP specication page.
56.4 References [24] UK hails 10th birthday of SMS, December 2002, The
Times of India.
[1] Ahonen, Tomi T. (January 13, 2011). Time to Conrm [25] First commercial deployment of Text Messaging (SMS)
Some Mobile User Numbers: SMS, MMS, Mobile Inter- at the Wayback Machine (archived March 16, 2008)
net, M-News. Communities Dominate Brands. Retrieved
September 27, 2016. [26] US Department of Homeland Security. Cellular Tech-
nologies (PDF). Electronic Frontier Foundation).
[2] Kelly, Heather (December 3, 2012). OMG, The Text
Message Turns 20. But has SMS peaked?". CNN. [27] Nael, Merili (2015-06-30). Suri tekstisnumite looja
Matti Makkonen [Creator of text messages Matti
[3] GSM Doc 28/85 Services and Facilities to be provided Makkonen died]. uudised.err.ee (in Estonian). Eesti
in the GSM System rev2, June 1985 Rahvusringhling. Retrieved 2015-07-27. External link
in |work= (help)
[4] Black, Ken (September 13, 2016). What is SMS Mar-
keting?". wiseGEEK. Retrieved September 28, 2016. [28] GSM World press release
[5] Portio Research. Mobile Messaging Futures 2014- [29] Crystal, David (2008-07-05). 2b or not 2b?". Guardian
2018. Archived from the original on December 8, 2015. Unlimited. London, UK. Retrieved 2008-07-08.
Retrieved September 28, 2016.
[30] THE WORLD IN 2010 - The rise of 3G
[6] see GSM document 02/82 available the ETSI archive
[31] Silver, Katie (December 7, 2011). OMG: Text messag-
[7] These Message Handling Systems had been standardized ing turns 19 this week ... and this is the Brit we have to
in the ITU, see specications X.400 series thank for our sore thumbs. Daily Mail. London.
[8] See the book Hillebrand, Trosby, Holley, Harris: SMS the [32]
creation of Personal Global Text Messaging, Wiley 2010
[33] Libyas Election Ushers in New Voter Tech - World Pol-
[9] Technology. Retrieved 14 June 2015. icy Institute. Retrieved 14 June 2015.
218 CHAPTER 56. SHORT MESSAGE SERVICE
[34] The death of SMS is exaggerated. [58] Download Limit Exceeded. Retrieved 14 June 2015.
[35] Paul W. (9 February 2016). Messaging Apps and SMS [59] Monitoring SMS Delivery Reliability
Marketing Trends. JookSMS. Retrieved 7 October 2016.
[60] Report Says That SMS is Not Ideal for Emergency Com-
[36] A2P SMS Market Expected to Reach USD 70.32 Billion, munications. cellular-news. Retrieved 14 June 2015.
in 2020. Transparency Market Research. Retrieved 28
May 2015. [61] Solutions to the GSM Security Weaknesses, Proceedings
of the 2nd IEEE International Conference on Next Gen-
[37] GSM 03.40 Technical realization of the Short Message eration Mobile Applications, Services, and Technologies
Service (SMS). (NGMAST2008), pp.576581, Cardi, UK, September
2008, arXiv:1002.3175
[38] 3GPP specication: 23.040. Retrieved 14 June 2015.
[62] SSMS A Secure SMS Messaging Protocol for the M-
[39] GSM 03.41, Technical Realization of Short Message Ser- Payment Systems, Proceedings of the 13th IEEE Sympo-
vice Cell Broadcast (SMSCB). sium on Computers and Communications (ISCC'08), pp.
700705, July 2008 arXiv:1002.3171
[40] 3GPP specication: 23.041. Retrieved 14 June 2015.
[63] An Analysis of Vulnerabilities in SMS-Capable Cellu-
[41] Gil Held: Data over Wireless Networks. pages 10511,
lar Networks: Exploiting Open Functionality in SMS-
13738. Wiley, 2001.
Capable Cellular Networks (Website)
[42] https://cs.uwaterloo.ca/research/tr/2007/CS-2007-42.
[64] An overview on how to stop SMS Spoong in mobile op-
pdf
erator networks (September 9, 2008) at the Wayback Ma-
[43] Amri, Kuross. Communication Networks. chine (archived September 26, 2008)
[44] 3GPP TS 23.038, Alphabets and language-specic infor- [65] Nirmala Ganapathy (September 27, 2011). 3,000 SMS
mation. a Month Limit in India From Today. Straits Times In-
donesia. Retrieved November 10, 2011.
[45] Ian Groves: Mobile Systems, page 70, 79, 16366.
Chapman & Hall, 1998. [66] TRAI extends the 100 SMS per day per SIM limit to 200
SMS per day per SIM at the Wayback Machine (archived
[46] t-zones text messaging: send and receive messages with November 11, 2011)
mobile text messaging. T-mobile.com. Retrieved 2008-
09-18. [67] Special Correspondent (2012-01-26). News / National :
TRAI cap on SMS goes. The Hindu. Retrieved 2013-
[47] Support How do I compose and send a text mes- 02-24.
sage to a Sprint or Nextel customer from email?". Sup-
port.sprintpcs.com. Retrieved 2008-09-18. [68] SMS types on routomessaging.com. Archived from the
original on 5 May 2013. Retrieved 20 Feb 2016.
[48] Answers to FAQs Verizon Wireless Support. Sup-
port.vzw.com. Retrieved 2008-09-18. [69] Flash SMS. Retrieved 14 June 2015.
[49] BT trials mobile SMS to voice landline, January 2004, The [70] Zoll, BKA und Verfassungsschutz verschickten 2010
Register. ber 440.000 stille SMS | heise online. Heise.de. Re-
trieved 2013-02-24.
[50] , September 2006, SMStextnews
[53] From Phone Scoop denitions - Threaded Messaging def- ISO Standards (In Zip le format)
inition (Phone Scoop) - Retrieved December 29, 2012
GSM 03.38 to Unicode the ocial GSM
[54] Whitepaper: Market Opportunities for Text and MMS
Messaging ABI Research, 2011 BSG The worldwide organization that maintains
the SMS specication.
[55] Long Code Vs Short Code Whats The Dierence?".
Retrieved 23 September 2015.
[57] Report Says That SMS is Not Ideal for Emergency Com-
munications. cellular-news. Retrieved 14 June 2015.
Chapter 57
Signaling gateway
219
Chapter 58
Signalling System No. 7 (SS7) is a set of telephony munication Union Telecommunication Standardization
signaling protocols developed in 1975, which is used to Sector (ITU-T); in 1977 the ITU-T dened the rst in-
set up and tear down most of the worlds public switched ternational CCS protocol as Signalling System No. 6
telephone network (PSTN) telephone calls. It also per- (SS6).[2]:145 In its 1980 Yellow Book Q.7XX-series rec-
forms number translation, local number portability, pre- ommendations ITU-T dened the Signalling System No.
paid billing, Short Message Service (SMS), and other 7 as an international standard.[1] SS7 replaced SS6 with
mass market services. its restricted 28-bit signal unit that was both limited in
[2]:145
In North America it is often referred to as CCSS7, abbre- function and not amenable to digital systems. SS7
also replaced Signalling System No. 5 (SS5), while R1
viated for Common Channel Signalling System 7. In the
United Kingdom, it is called C7 (CCITT number 7), num- and R2 variants are still used in numerous countries.
ber 7 and CCIS7 (Common Channel Interoce Signaling The Internet Engineering Task Force (IETF) dened
7). In Germany, it is often called N7 (Signalisierungssys- SIGTRAN protocols so the common channel signaling
tem Nummer 7). paradigm could be translated to IP Message Transfer Part
The only international SS7 protocol is dened by ITU-T's (MTP) level 2 (M2UA and M2PA), Message Transfer
Q.700-series recommendations in 1988.[1] Of the many Part (MTP) level 3 (M3UA) and Signalling Connection
national variants of the SS7 protocols, most are based Control Part (SCCP) (SUA). While running on a trans-
on variants of the international protocol as standardized port based upon IP, the SIGTRAN protocols are not an
by ANSI and ETSI. National variants with striking char- SS7 variant, but simply transport[3]
existing national and in-
acteristics are the Chinese and Japanese (TTC) national ternational variants of SS7.
variants.
The Internet Engineering Task Force (IETF) has dened
level 2, 3, and 4 protocols compatible with SS7 which
58.2 Functionality
use the Stream Control Transmission Protocol (SCTP)
transport mechanism. This suite of protocols is called Signaling in telephony is the exchange of control informa-
SIGTRAN. tion associated with the setup and release of a telephone
call on a telecommunications circuit.[4]:318 Examples of
control information are the digits dialed by the caller and
the callers billing number.
58.1 History
When signaling is performed on the same circuit as the
SS5 and earlier systems used in-band signaling, in which conversation of the call, it is termed channel-associated
the call-setup information was sent by playing special signaling (CAS). This is the case for earlier analogue
multi-frequency tones into the telephone lines, known as trunks, multi-frequency (MF) and R2 digital trunks, and
bearer channels. As the bearer channel was directly ac- DSS1/DASS PBX trunks.
cessible by users, it was exploited with devices such as In contrast, SS7 uses common channel signaling, in which
the blue box, which played the tones required for call the path and facility used by the signaling is separate and
control and routing. As a remedy, SS6 and SS7 imple- distinct from the telecommunications channels that carry
mented out-of-band signaling, carried in a separate sig- the telephone conversation. With CCS, it becomes pos-
naling channel,[2]:141 thus keeping the speech path sep- sible to exchange signaling without rst seizing a voice
arate. SS6 and SS7 are referred to as common-channel channel, leading to signicant savings and performance
signaling (CCS) protocols, or Common Channel Interof- increases in both signaling and channel usage.
ce Signalling (CCIS) systems. Because of the mechanisms used by signaling meth-
Since 1975, CCS protocols have been developed by ma- ods prior to SS7 (battery reversal, multi-frequency digit
jor telephone companies and the International Telecom- outpulsing, A- and B-bit signaling), these older meth-
220
58.3. PHYSICAL NETWORK 221
ods could not communicate much signaling information. 58.2.1 Signaling modes
Usually only the dialed digits were signaled, and merely
during call setup. For charged calls, dialed digits and Apart from signaling with these various degrees of as-
charge number digits were outpulsed. SS7, being a high- sociation with call set-up and the facilities used to carry
speed and high-performance packet-based communica- calls, SS7 is designed to operate in two modes: associated
tions protocol, can communicate signicant amounts of mode and quasi-associated mode.[6]
information when setting up a call, during the call, and at When operating in the associated mode, SS7 signal-
the end of the call. This permits rich call-related services ing progresses from switch to switch through the Public
to be developed. Some of the rst such services were Switched Telephone Network following the same path as
call management related, call forwarding (busy and no an- the associated facilities that carry the telephone call. This
swer), voice mail, call waiting, conference calling, calling mode is more economical for small networks. The asso-
name and number display, call screening, malicious caller ciated mode of signaling is not the predominant choice of
identication, busy callback.[4]:Introduction xx modes in North America.[7]
The earliest deployed upper layer protocols in the SS7 When operating in the quasi-associated mode, SS7 signal-
suite were dedicated to the setup, maintenance, and ing progresses from the originating switch to the terminat-
release of telephone calls.[5] The Telephone User Part ing switch, following a path through a separate SS7 sig-
(TUP) was adopted in Europe and the Integrated Ser- naling network composed of signal transfer points. This
vices Digital Network (ISDN) User Part (ISUP) adapted mode is more economical for large networks with lightly
for public switched telephone network (PSTN) calls was loaded signaling links. The quasi-associated mode of
adopted in North America. ISUP was later used in Eu- signaling is the predominant choice of modes in North
rope when the European networks upgraded to the ISDN. America.[8]
As of 2015 North America has not accomplished full up-
grade to the ISDN, and the predominant telephone ser-
vice is still the older Plain Old Telephone Service. Due
to its richness and the need for an out-of-band channel 58.3 Physical network
for its operation, SS7 is mostly used for signaling between
telephone switches and not for signaling between local ex- SS7 separates signalling from the voice circuits. An SS7
changes and customer-premises equipment. network must be made up of SS7-capable equipment
from end to end in order to provide its full functional-
Because SS7 signaling does not require seizure of a chan-
ity. The network can be made up of several link types
nel for a conversation prior to the exchange of control in-
(A, B, C, D, E, and F) and three signaling nodes - Service
formation, non-facility associated signalling (NFAS) be-
Switching Points (SSPs), Signal Transfer Points (STPs),
came possible. NFAS is signaling that is not directly asso-
and Service Control Points (SCPs). Each node is identi-
ciated with the path that a conversation will traverse and
ed on the network by a number, a signalling point code.
may concern other information located at a centralized
Extended services are provided by a database interface at
database such as service subscription, feature activation,
the SCP level using the SS7 network.
and service logic. This makes possible a set of network-
based services that do not rely upon the call being routed The links between nodes are full-duplex 56, 64, 1,536,
to a particular subscription switch at which service logic or 1,984 kbit/s graded communications channels. In Eu-
would be executed, but permits service logic to be dis- rope they are usually one (64 kbit/s) or all (1,984 kbit/s)
tributed throughout the telephone network and executed timeslots (DS0s) within an E1 facility; in North Amer-
more expediently at originating switches far in advance of ica one (56 or 64 kbit/s) or all (1,536 kbit/s) timeslots
call routing. It also permits the subscriber increased mo- (DS0As or DS0s) within a T1 facility. One or more sig-
bility due to the decoupling of service logic from the sub- naling links can be connected to the same two endpoints
scription switch. Another ISUP characteristic SS7 with that together form a signaling link set. Signaling links are
NFAS enables is the exchange of signaling information added to link sets to increase the signaling capacity of the
during the middle of a call.[4]:318 link set.
SS7 also enables Non-Call-Associated Signaling, which is In Europe, SS7 links normally are directly connected
signaling not directly related to establishing a telephone between switching exchanges using F-links. This di-
call.[4]:319 This includes the exchange of registration in- rect connection is called associated signaling. In North
formation used between a mobile telephone and a home America, SS7 links are normally indirectly connected
location register database, which tracks the location of between switching exchanges using an intervening net-
the mobile. Other examples include Intelligent Network work of STPs. This indirect connection is called quasi-
and local number portability databases.[4]:433 associated signaling, which reduces the number of SS7
links necessary to interconnect all switching exchanges
and SCPs in an SS7 signaling network.[9]
SS7 links at higher signaling capacity (1.536 and 1.984
Mbit/s, simply referred to as the 1.5 Mbit/s and 2.0 Mbit/s
222 CHAPTER 58. SIGNALLING SYSTEM NO. 7
rates) are called high speed links (HSL) in contrast to the 58.5 Protocol security vulnerabili-
low speed (56 and 64 kbit/s) links. High speed links are
specied in ITU-T Recommendation Q.703 for the 1.5
ties
Mbit/s and 2.0 Mbit/s rates, and ANSI Standard T1.111.3
for the 1.536 Mbit/s rate.[10] There are dierences be- Several SS7 vulnerabilities that allow cell phone users to
tween the specications for the 1.5 Mbit/s rate. High be secretly tracked were publicized in 2008.[13] In 2014,
speed links utilize the entire bandwidth of a T1 (1.536 the media reported a protocol vulnerability of SS7 by
Mbit/s) or E1 (1.984 Mbit/s) transmission facility for the which both government agencies and non-state actors can
transport of SS7 signaling messages.[10] track the movements of cell phone users from virtually
anywhere in the world with a success rate of approxi-
SIGTRAN provides signaling using SCTP associa- mately 70%.[14] In addition, eavesdropping is possible by
tions over the Internet Protocol.[4]:456 The protocols for using the protocol to forward calls and also facilitate de-
SIGTRAN are M2PA, M2UA, M3UA and SUA.[11] cryption by requesting that each callers carrier release a
temporary encryption key to unlock the communication
after it has been recorded.[15] Karsten Nohl created a tool
(SnoopSnitch) which can warn when certain SS7 attacks
occur against a phone and detect IMSI-catchers.[16][17]
In February 2016, 30% of the network to the largest
58.4 SS7 protocol suite mobile operator in Norway, Telenor, became unstable
due to Unusual SS7 signalling from another European
operator[18][19]
The SS7 protocol stack may be partially mapped to the
In April 2016, US congressman Ted Lieu called for an
OSI Model of a packetized digital protocol stack. OSI
oversight committee investigation, saying:
layers 1 to 3 are provided by the Message Transfer
Part (MTP) and the Signalling Connection Control Part
(SCCP) of the SS7 protocol (together referred to as the The applications for this vulnerability are
Network Service Part (NSP)); for circuit related signal- seemingly limitless, from criminals monitoring
ing, such as the BT IUP, Telephone User Part (TUP), individual targets to foreign entities conducting
or the ISDN User Part (ISUP), the User Part provides economic espionage on American companies
layer 7. Currently there are no protocol components that to nation states monitoring US government of-
provide OSI layers 4 through 6.[1] The Transaction Ca- cials. ... The vulnerability has serious ram-
pabilities Application Part (TCAP) is the primary SCCP ications not only for individual privacy, but
User in the Core Network, using SCCP in connection- also for American innovation, competitiveness
less mode. SCCP in connection oriented mode provides and national security. Many innovations in dig-
transport layer for air interface protocols such as BSSAP ital security such as multi-factor authentica-
and RANAP. TCAP provides transaction capabilities to tion using text messages may be rendered
its Users (TC-Users), such as the Mobile Application useless.[20]
Part, the Intelligent Network Application Part and the
CAMEL Application Part.
The Message Transfer Part (MTP) covers a portion of 58.6 See also
the functions of the OSI network layer including: net-
work interface, information transfer, message handling SS7 probe
and routing to the higher levels. Signalling Connection
Control Part (SCCP) is at functional Level 4. Together
with MTP Level 3 it is called the Network Service Part
(NSP). SCCP completes the functions of the OSI net- 58.7 References
work layer: end-to-end addressing and routing, connec-
tionless messages (UDTs), and management services for [1] ITU-T Recommendation Q.700
users of the Network Service Part (NSP).[12] Telephone
User Part (TUP) is a link-by-link signaling system used [2] Ronayne, John P (1986). The Digital Network Introduc-
to connect calls. ISUP is the key user part, providing a tion to Digital Communications Switching (1 ed.). Indi-
circuit-based protocol to establish, maintain, and end the anapolis: Howard W. Sams & Co., Inc. ISBN 0-672-
22498-4.
connections for calls. Transaction Capabilities Applica-
tion Part (TCAP) is used to create database queries and [3] RFC 2719 - Framework Architecture for Signaling Trans-
invoke advanced network functionality, or links to Intel- port
ligent Network Application Part (INAP) for intelligent
networks, or Mobile Application Part (MAP) for mobile [4] Russell, Travis (2002). Signaling System #7 (4 ed.). New
services. York: McGraw-Hill. ISBN 978-0-07-138772-9.
58.9. EXTERNAL LINKS 223
SIP provider
59.1 References
224
Chapter 60
SIP trunking
SIP trunking is Voice over Internet Protocol (VoIP) and The private domain instead, by nature, is not subject to
streaming media service based on the Session Initia- particular constraints of law, and may be either the re-
tion Protocol (SIP)[1] by which Internet telephony service sponsibility of the ITSP, the end user (enterprise), or of
providers (ITSPs) deliver telephone services and unied a third party who provides the voice services to the com-
communications to customers equipped with SIP-based pany.
private branch exchange (IP-PBX) and Unied Com-
munications facilities.[2] Most Unied Communications
software applications provide voice, video, and other 60.2 Architecture
streaming media applications such as desktop sharing,
web conferencing, and shared whiteboard.[3]
In each domain there are elements that perform the char-
acteristic features requested to that domain, in particular
the result (as part of any front-end network to the cus-
60.1 Domains tomer) is logically divided into two levels:
The architecture of SIP trunking provides a partitioning The control of access (Class 5 softswitch);
of the Unied Communications network into two dier-
ent domains of expertise:[4] Network-border elements[7][8][9] that separate the
Public Domain from the Private Domain, imple-
Private Domain: refers to a part of the network menting all the appropriate ITSP phone security
connected to your PBX or unied communications policies.
server (typically everything you are responsible for).
The private domain consists of three levels:
Public Domain: refers to the part of the network
which allows access into the PSTN (Public Switched Corporate-Border Elements that separate the Public
Telephone Network) or PLMN (Public Land Mobile Domain from the Private Domain, implementing all
Network). This is usually the responsibility of your the appropriate company security policies.
internet telephone service provider (ITSP).
Central Corporate Switching Node;
The interconnection between the two domains must occur
IP-PBXs.
through a SIP trunk.
The interconnection between the two domains, created
by transport via the Internet Protocol (IP), involves set- 60.3 See also
ting specic rules and regulations as well as the ability
to handle some services and protocols that fall under the
Session border controller (SBC)
name of SIP trunking.[5]
The ITSP is completely responsible to the applicable reg-
ulatory authority regarding all the following law obliga- 60.4 References
tions of the Public Domain:[6]
[1] http://www.ietf.org/rfc/rfc3261.txt
Tracking trac;
[2] SIP trunking migration: Enterprise opportunities and
Identication of users; challenges.
Implementation of the lawful interception mecha- [3] SIP Trunking Explained. Technology Convergence
nisms. Group. Retrieved 8 September 2015.
225
226 CHAPTER 60. SIP TRUNKING
Not to be confused with Signalling Connection Control dress. Cisco also has marketed a Skinny-based softphone
Part. called Cisco IP Communicator.
Some Cisco analog media gateways, such as the VG248 [2] Call states sent to SCCP endpoints by Cisco CallManager
gateway, register and communicate with Cisco Unied
Communications Manager using SCCP. [3] Cisco Systems acquisition of Selsius Systems (archive.org)
[4] http://wiki.freeswitch.org/wiki/Mod_skinny
227
228 CHAPTER 61. SKINNY CALL CONTROL PROTOCOL
Skype
This article is about the software. For the company that usage of resources, excessive bandwidth usage and secu-
develops it, see Skype Technologies. rity concerns.[23]
Skype originally featured a hybrid peer-to-peer and
Skype (/skap/) is an application that provides video chat clientserver system.[24] Skype has been powered entirely
and voice call services. Users may exchange such digi- by Microsoft-operated supernodes since May 2012.[25]
tal documents as images, text, video and any others, and The 2013 mass surveillance disclosures revealed that Mi-
may transmit both text and video messages. Skype allows crosoft had granted intelligence agencies unfettered ac-
the creation of video conference calls. Skype is available cess to supernodes and Skype communication content.[26]
for Microsoft Windows, Macintosh, or Linux, as well as
Android, Blackberry, Apple and Windows smartphones
and tablets.[13]
Skype is based on a freemium model. Much of the ser- 62.1 Etymology
vice is free, but Skype Credit or a subscription is required
to call a landline or a mobile phone number. At the end of The name for the software is derived from Sky peer-to-
2010, there were over 660 million worldwide users, with peer, which was then abbreviated to Skyper. However,
over 300 million estimated active each month as of Au- some of the domain names associated with Skyper were
gust 2015.[14] At one point in February 2012, there were already taken.[27] Dropping the nal r left the current
thirty four million users concurrently online on Skype.[15] title Skype, for which domain names were available.[28]
First released in August 2003, Skype was created by
the Swede Niklas Zennstrm and the Dane Janus Friis,
in cooperation with Ahti Heinla, Priit Kasesalu, and
Jaan Tallinn, Estonians who developed the backend that 62.2 History
was also used in the music-sharing application Kazaa.[16]
In September 2005, eBay acquired Skype for $2.6
billion.[17] Main article: Skype Technologies
In September 2009,[18] Silver Lake, Andreessen
Horowitz and the Canada Pension Plan Investment Skype was founded in 2003 by Niklas Zennstrm, from
Board announced the acquisition of 65% of Skype for Sweden, and Janus Friis, from Denmark.[29] The Skype
$1.9 billion from eBay, which attributed to the enterprise software was created by Estonians Ahti Heinla, Priit Kas-
a market value of $2.92 billion. Microsoft bought Skype esalu, and Jaan Tallinn.[30] The rst public beta version
in May 2011 for $8.5 billion. Skype division headquar- was released on 29 August 2003.[31]
ters are in Luxembourg but most of the development In June 2005, Skype entered into an agreement with
team and 44% of all the divisions employees are still the Polish web portal Onet.pl for an integrated oering
situated in Tallinn and Tartu, Estonia.[19][20][21] on the Polish market.[32] On 12 September 2005, eBay
Skype allows users to communicate over the Internet by Inc. agreed to acquire Luxembourg-based Skype Tech-
voice using a microphone, by video using a webcam, nologies SA for approximately US$2.5 billion in up-front
and by instant messaging. Skype-to-Skype calls to other cash and eBay stock, plus potential performance-based
users are free of charge, while calls to landline tele- consideration.[33]
phones and mobile phones (over traditional telephone net- On 1 September 2009, it was announced that eBay
works) are charged via a debit-based user account system was selling 65% of Skype to Silver Lake, Andreessen
called Skype Credit. Some network administrators have Horowitz, and the Canada Pension Plan Investment
banned Skype on corporate, government, home, and ed- Board for US$1.9 billion, valuing Skype at US$2.75 bil-
ucation networks,[22] citing such reasons as inappropriate lion.
229
230 CHAPTER 62. SKYPE
62.2.1 Microsoft acquisition but removed after a few weeks without notication. The
usual features familiar to instant messaging usersuser
On 10 May 2011, Microsoft Corporation acquired Skype proles, online status indicators, and so onare also in-
Communications, S. r.l for US$8.5 billion.[34] The com- cluded.
pany was incorporated as a division of Microsoft, which
The Online Number, a.k.a. SkypeIn, service allows Skype
acquired all Its technologies with the purchase. This was
users to receive calls on their computers dialed by con-
completed on 13 October 2011.[34][35]
ventional phone subscribers to a local Skype phone num-
Shortly after its acquisition, Microsoft began integrating ber; local numbers are available for Australia, Belgium,
the Skype service with its own products: Brazil, Chile, Colombia, Denmark, the Dominican Re-
public, Estonia, Finland, France, Germany, Hong Kong,
Along with taking over development of existing Hungary, India, Ireland, Japan, Mexico, Nepal, New
Skype desktop and mobile apps, the company de- Zealand, Poland, Romania, South Africa, South Ko-
veloped a dedicated client app, called Skype for rea, Sweden, Switzerland, Turkey, the Netherlands, the
[40][41]
Modern Windows, for its newly released, touch- United Kingdom, and the United States. A Skype
focused Windows 8 and Windows RT operating sys- user can have local numbers in any of these countries,
tems. This app became downloadable from the with calls to the number charged at the same rate as calls
Windows Store when the new OS launched on 26 to xed lines in the country. The countries on this grow-
October 2012. The following year, Skype for Mod- ing list are referred to collectively as the SkypeIn Coun-
ern Windows became the default messaging app for tries.
Windows 8.1, replacing the Windows 8 Messaging Skype supports conference calls, video chats, and screen
app at the time, and became pre-installed software sharing between 25 people at a time for free.[42][43]
on every device that came with or upgraded to 8.1.
Skype does not provide the ability to call emergency
When the company introduced Oce 2013 on 27 numbers, such as 112 in Europe, 911 in North Amer-
February 2013, it was announced that 60 Skype ica, or 100 in India and Nepal.[44] However, as of De-
world minutes per month would be included in cember 2012, there is limited support for emergency
Oce 365 consumer plans (Home and Personal, and calls in the United Kingdom, Australia, Denmark, and
University). Finland.[45] The U.S. Federal Communications Commis-
sion (FCC) has ruled that, for the purposes of section
In a month-long transition period from 8 to 30 April 255 of the Telecommunications Act, Skype is not an in-
2013, it phased out its long-standing Windows Live terconnected VoIP provider.[46] As a result, the U.S.
Messenger instant messaging service in favour of National Emergency Number Association recommends
Skype, although Messenger continued in mainland that all VoIP users have an analog line available as a
China.[36][37] backup.[47]
On 11 November 2014, Microsoft announced that On 14 July 2011, Skype partnered with Comcast to bring
in 2015 Lync would be replaced by Skype for Busi- its video chat service to Comcast subscribers via their
ness. The latest version of the communication soft- HDTV sets.[48]
ware combines features of Lync and the consumer
On 17 June 2013, Skype released a free video messaging
Skype software. There are two user interfaces or-
service, which can be operated on Windows, Mac OS,
ganizations can switch their users from the default
iOS, Android and BlackBerry.[49]
Skype for Business interface to the Skype for Busi-
ness (Lync) interface.[38] On 12 August 2013, Skype released the 4.10 update to
the app for Apple iPhone and iPad that allows HD quality
video for iPhone 5 and fourth-generation iPads.[50]
62.3 Features On 20 November 2014, Microsoft Oces team an-
nounced that a new chat powered by Skype is going to
Main article: Features of Skype be implemented in their software, giving tools to be able
to chat with co-workers in the same document.[51]
Registered users of Skype are identied by a unique On 15 September 2015, Skype announced the release of
Skype Name and may be listed in the Skype directory.[39] Mojis, a brand new way to express yourself on Skype.
Skype allows these registered users to communicate Mojis are short clips/gifs featuring characters from lms
through both instant messaging and voice chat. Voice and TV shows to be entered into conversations with the
chat allows telephone calls between pairs of users and same ease as emoticons. They are working with Universal
conference calling and uses a proprietary audio codec. Studios, Disney Muppets, BBC and other studios to add
Skypes text chat client allows group chats, emoticons, to the available collection of Mojis.[52]
storing chat history, and editing of previous messages. On 21 December 2015, Gurdeep Singh Pall, Corporate
Oine messages were implemented in a beta of version 5
62.5. SYSTEM AND SOFTWARE 231
Vice President of Skype, announced that Microsoft ac- Skype introduced a new version for Windows 8 simi-
quired the technology from Talko, maker of an innova- lar to the Windows Phone version that ran in the Metro
tive mobile app for on-the-go business communications interface.[85] On 7 July 2015 Skype modied the app to
(...) Together, the new technology and talent will help us direct Windows users to download the desktop version of
deliver great new features and capabilities in both Skype the app, but it was set to continue working on Windows
and Skype for Business.[53] RT until October 2016.[86] In November 2015, Skype in-
In January 2016, Skype announced it would roll out free troduced three new apps, called Messaging, Skype Video,
group video calling to users on mobile devices, includ- and Phone, intended to provide an integrated Skype expe-
rience in Windows 10.[87][88] On 24 March 2016, Skype
ing iOS and Android. In February 2016, Microsoft an-
nounced that it had started to introduce group calling on announced the integrated apps did not satisfy most users
needs and announced that they and the desktop app would
smartphones and tablets in North America and Western
Europe.[54] eventually be replaced with a new UWP app.[89]
In July 2016, Skype introduced an early Alpha version Currently, Skype oers a Win32 desktop-only app and
of a new Skype for Linux client, built with WebRTC Skype Preview app that is the default Skype app in
technology, after several petitions had asked Microsoft Windows 10 Mobile and included as an option in the lat-
to continue development for Linux.[55][56] est update to Windows 10.
62.5 System and software Skype also oers a Skype Wi-Fi Phone, which is a wire-
less mobile phone that allows users to make Skype calls,
using a wireless Internet connection. The Skype Wi-Fi
62.5.1 Client applications and devices Phone has an on-screen menu that lets Skype users see
who is online and available to talk, similar to what is seen
Windows applications on a PC. It can also be used to talk with non-Skype users.
SkypeOut minutes can be used to call any phone for a low
Skype has changed many times on Windows. It has price and no monthly fee. The Skype Wi-Fi phone does
oered a desktop-only app since 2003. Later, a mo- not contain a web browser and so can not access hotspots
bile version was created for Windows Phones. In 2012, that require web-based login or authentication.[92]
232 CHAPTER 62. SKYPE
Third party licensing Many networking and security companies claim to detect
and control Skypes protocol for enterprise and carrier ap-
Third-party developers, such as Truphone, Nimbuzz, and plications. While the specic detection methods used by
Fring, previously allowed Skype to run in parallel with these companies are often private, Pearsons chi-squared
several other competing VoIP/IM networks (Truphone test and naive Bayes classication are two approaches that
and Nimbuzz provide TruphoneOut and NimbuzzOut as were published in 2008.[102] Combining statistical mea-
a competing paid service) in any Symbian or Java envi- surements of payload properties (such as byte frequen-
ronment. Nimbuzz made Skype available to BlackBerry cies and initial byte sequences) as well as ow properties
users and Fring provided mobile video calling over Skype (like packet sizes and packet directions) has also shown
as well as support for the Android platform. Skype dis- to be an eective method for identifying Skypes TCP-
abled Fring users from accessing Skype in July 2010.[97] and UDP-based protocols.[103]
Nimbuzz discontinued support on request of Skype in
October 2010.[98]
62.5.4 Audio codecs
Before and during the Microsoft acquisition, Skype with-
drew licensing from several third parties producing soft- G.729 and SVOPC. Skype added a Skype-created codec
ware and hardware compatible with Skype. The Skype called SILK to Skype 4.0 for Windows and other
62.6. SECURITY AND PRIVACY 233
telephone company owning phone lines, it is exempt from via a Skype instant messaging session was usurped by
CALEA and similar laws, which regulate US phone com- the Skype service and subsequently used in a HTTP
panies, and in fact, it is not clear whether Skype could HEAD query originating from an IP address registered
support wiretapping even if it wanted to.[125] Accord- to Microsoft in Redmond (the IP address used was
ing to the ACLU, the Act is inconsistent with the orig- 65.52.100.214). The Microsoft query used the full URL
inal intent of the Fourth Amendment to the U.S. Con- supplied in the IM conversation and was generated by a
stitution;[126] more recently, the ACLU has expressed previously undocumented security service.[141] Security
the concern that the FCC interpretation of the Act is experts speculate the action was triggered by a technol-
incorrect.[127][128] It has been suggested that Microsoft ogy similar to Microsofts SmartScreen Filter used in its
made changes to Skypes infrastructure to ease various browsers.[142]
wiretapping requirements;[129] however, Skype denies the
The 2013 mass surveillance disclosures revealed that
claims.[130] agencies such as the NSA and the FBI have the ability to
Some time before Skype was sold in 2009, the company eavesdrop on Skype, including the monitoring and stor-
had started its own app, called Project Chess, to explore age of text and video calls and le transfers.[26][143][144]
legal and technical ways to easily share calls with intelli- The PRISM surveillance program, which requires FISA
gence agencies and law enforcement.[131] court authorization, reportedly has allowed the NSA un-
On 20 February 2009, the European Unions Eurojust fettered access to its data center supernodes. Accord-
agency announced that the Italian Desk at Eurojust would ing to the leaked documents, integration work began in
play a key role in the coordination and cooperation of November 2010, but it was not until February 2011 that
the investigations on the use of internet telephony sys- the company was served with a directive to comply signed
tems (VoIP), such as 'Skype'. ... The purpose of Euro- by the attorney general,[26] with NSA documents showing
justs coordination role is to overcome the technical and that collection began on 31 March 2011.[145]
judicial obstacles to the interception of internet telephony On 10 November 2014, Skype scored 1 out of 7 points
systems, taking into account the various data protection on the Electronic Frontier Foundation's secure messaging
rules and civil rights[132] scorecard. Skype received a point for encryption during
transit but lost points because communications are not en-
In November 2010, a aw was disclosed to Skype that
showed how hackers could secretly track any users IP crypted with a key the provider doesn't have access to (i.e.
the communications are not end-to-end encrypted), users
address.[133] As of 2015, this has still not been xed.[134]
can't verify contacts identities, past messages are not se-
In 2012, Skype introduced automatic updates to better cure if the encryption keys are stolen (i.e. the service does
protect users from security risks but received some chal- not provide forward secrecy), the code is not open to in-
lenge from users of the Mac product, as the updates can- dependent review (i.e. the code is not open-source), the
not be disabled from version 5.6 on,[135] both on Mac OS security design is not properly documented, and there has
and Windows versions, although in the latter, and only not been a recent independent security audit.[146][147][148]
from version 5.9 on, automatic updating can be turned AIM, BlackBerry Messenger, Ebuddy XMS, Hushmail,
o in certain cases.[136] Kik Messenger, Viber and Yahoo Messenger also scored
[146]
According to a 2012 Washington Post article, Skype has 1 out of 7 points.
expanded its cooperation with law enforcement authori-
ties to make online chats and other user information avail-
able to police"; the article additionally mentions Skype 62.6.1 Service in the Peoples Republic of
made changes to allow authorities access to addresses and China
credit card numbers.[137]
In November 2012, Skype was reported to have handed Since September 2007, users in China trying to down-
over user data of a pro-Wikileaks activist to Dallas, load the Skype software client have been redirected to
Texas-based private security company iSIGHT Partners the site of TOM Online, a joint venture between a Chi-
without a warrant or court order. The alleged handover nese wireless operator and Skype, from which a modi-
would be a breach of Skypes privacy policy. Skype re- ed Chinese version can be downloaded.[149] The TOM
sponded with a statement that it launched an internal in- client participates in Chinas system of Internet censor-
vestigation to probe the breach of user data privacy.[138] ship, monitoring text messages between Skype users in
13 November 2012, a Russian user published a aw in China as well as messages exchanged with users outside
Skypes security, which allowed any person to take over the country.[150][151] Niklas Zennstrm, then chief execu-
a Skype account knowing only the victims email by fol- tive of Skype, told reporters that TOM had implemented
lowing 7 steps.[139][140] This vulnerability was claimed to a text lter, which is what everyone else in that mar-
exist for months and existed for more than 12 hours since ket is doing. Those are the regulations. He also stated,
published widely. One thing thats certain is that those things are in no
way jeopardising the privacy or the security of any of the
14 May 2013, it was documented that a URL sent users.[152]
62.8. URIS 235
In October 2008, it was reported that TOM had been sav- languages.[158]
ing the full message contents of some Skype text con-
versations on its servers, apparently focusing on conver-
sations containing political issues such as Tibet, Falun
Gong, Taiwan independence, and the Chinese Commu-
62.8 URIs
nist Party. The saved messages contain personally iden-
tiable information about the message senders and recip- Skype uses URIs as skype:USER?call for a call.
ients, including IP addresses, usernames, landline phone
numbers, and the entire content of the text messages, in-
cluding the time and date of each message. Information 62.9 Customer service
about Skype users outside China who were communicat-
ing with a TOM-Skype user was also saved. A server mis-
conguration made these log les accessible to the public As of February 2012, Skype provides support through
for a time.[151][153][154] their web support portal, support community, @skype-
support on Twitter, and Skype Facebook page. Direct
Research on the TOM-Skype venture has revealed infor- contact via email and live chat is available through their
mation about blacklisted keyword checks, allowing cen- web support portal. Chat Support is a premium feature
sorship and surveillance of its users. The partnership has available to Skype Premium and some other paid users.
received much criticism for the latter. Microsoft remains
unavailable for comment on the issue.[155] In January 2010, Skype rescinded their policy of seizing
funds in Skype accounts that have been inactive (no paid
According to reports from the advocacy group Great call) for 180 days. This was in settlement of a class-action
Fire, Microsoft has modied censorship restrictions and lawsuit.[159] Skype also paid up to US$4 to persons who
ensured encryption of all user information.[155] Fur- opted into the action.
thermore, Microsoft is now partnered with Guangming
Founder (GMF) in China.[156] Skypes refund policy states that they will provide refunds
in full if customers have used less than 1 euro of their
All attempts to visit the ocial Skype web page from Skype Credit. Upon a duly submitted request, Skype
mainland China redirects to skype.gmw.cn. The Linux will refund you on a pro rata basis for the unused period
version of Skype is unavailable. of a Product.
Skype has come under some criticism from users for the
62.6.2 No Skype calls to India landline and inability to completely close accounts. Users not want-
ing to continue using Skype can make their account in-
mobile active by deleting all personal information, except for the
username.[160]
As of 10 November 2014, Skype will end support for
calling within India meaning calls to mobiles and land- Due to an outage happened on 21 September 2015, that
lines from Skype within India will no longer be available, aected several users in New Zealand, Australia and
Skypes parent company Microsoft said in a statement on other countries, Skype decided to compensate their cus-
8 October 2014. Microsoft said, Users in India can still tomers with 20 minutes of free calls to over 60 landline
make free Skype-to-Skype calls worldwide, international and 8 mobile phone numbers.[161]
calls to mobiles and landlines and users outside the coun-
try can call mobiles and landlines in India.[157]
62.10 Educational use
62.7 Localization Although Skype is a commercial product, its free version
is used with increasing frequency among teachers and
Skype comes bundled with the following locales and schools interested in global education projects.[162] For
languages: Arabic, Bulgarian, Catalan, Chinese (Tradi- example, Skype is being used to facilitate language ex-
tional and Simplied), Croatian, Czech, Danish, Dutch, change: Students in dierent parts of the world are paired
English, Estonian, Finnish, French, German, Greek, o, and each is a native speaker of the language that the
Hebrew, Hungarian, Indonesian, Italian, Japanese, Ko- other wishes to learn. In conversations over Skype, they
rean, Latvian, Lithuanian, Nepali, Norwegian, Polish, alternate between the two languages.[163][164][165][166]
Portuguese (Brazilian and European), Romanian, Rus- Teachers are using Skype in unique ways to full ed-
sian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, ucational goals. The video conferencing aspect of the
Turkish, Ukrainian, and Vietnamese. software is valuable in that it provides a way to con-
As the Windows desktop app oers users the option nect students who speak dierent languages, hold vir-
of creating new language les, at least 80 other (full tual eld trips, and reach out to experts in varying elds
or partial) localizations are also available for many of study. These experiences allow students a chance to
236 CHAPTER 62. SKYPE
apply what they are learning in the classroom to real- [6] The Skype Team (16 February 2016). Whats new in
life experiences, and it also achieves further learning Skype for Mac?". Skype Support. Microsoft. Retrieved
opportunities.[167][168] 18 February 2016.
Skype in the classroom is another free tool that Skype [7] Cimmino, Marco (18 June 2014). Skype 4.3 for Linux.
has set up on its website. It provides teachers with a way Skype Blogs. Microsoft. Retrieved 10 October 2014.
to make their classrooms more interactive and interest-
[8] The Skype Team (5 December 2016). Skype - free IM
ing. Skype in the classroom is a service that teachers can & video calls - Android Apps on Google Play. Google
sign up for that will allow students to meet other students, Play Store. Microsoft. Retrieved 6 December 2016.
talk to experts, and share ideas. Teachers can collaborate
with other teachers around the world and design dierent [9] Skype for iOS. iTunes Preview. Apple Inc. Retrieved
learning experiences for their students. There are various 10 October 2016.
Skype lessons, in which students can participate. Teach- [10] What programming language was Skype originally writ-
ers can also use Skypes search tool and nd experts in the ten in?". Quora. Quora. Retrieved 15 November 2014.
eld of their choice.[169] Most of the schools in the United
States and Europe often block Skype from the school net- [11] https://www.microsoft.com/en-us/store/p/
work for students and hence students have left no option skype-preview/9wzdncrfj364
but to unblock it through various VPNs and proxy. [12] Skype.com Site Info. Alexa Internet. Retrieved 13
November 2016.
List of virtual communities with more than 100 mil- [14] Global social networks by users 2015 | Statistic. Statista.
lion active users Retrieved 4 November 2015.
[28] Origin of the name/word Skype. Archived from the [50] Skype app for iPhone/iPad updated to HD. 12 August
original on 4 November 2005. Retrieved 13 August 2010. 2013.
[29] About Skype: What is Skype?". Retrieved 28 July 2010. [51] Nadier Lopez (20 November 2014). Microsoft taps
Skype to bring real-time chats to Oce Online. The
[30] Skype A Baltic Success Story. credit-suisse.com. Re- Next Web. Retrieved 24 November 2014.
trieved 24 February 2008.
[52] Mojis: Express Yourself on Skype-Like Never Before.
[31] Happy Birthday Skype: Even monkeys use it now. Skype Blogs. Retrieved 16 September 2015.
Emirates 24/7. 28 August 2013. Retrieved 28 August
2013. [53] Talko comes to Skype. 21 December 2015.
[32] Onet and Skype join forces. PMR. Retrieved 1 October [54] Sarah Perez, TechCrunch. Group Video Calling Arrives
2014. In Skypes Mobile Apps. 18 February 2016. 18 February
2016.
[33] eBay Completes Acquisition of Skype. eBay. 14 Octo-
ber 2005. Retrieved 8 April 2013. [55] Skype for Linux Alpha and calling on Chrome and
Chromebooks. Skype Blogs. 13 July 2016. Retrieved
[34] Microsoft to acquire Skype. 10 May 2011. Retrieved 14 July 2016.
10 May 2011.
[56] Jones, Luke (13 July 2016). Microsoft Debuts Skype for
[35] Toor, Amar. Microsoft nalizes acquisition of Skype, Linux Alpha. WinBuzzer. Retrieved 14 July 2016.
Tony Bates shares his thoughts (video)". Engadget. Re-
[57] Skype for iOS 10 lets you use Siri to make a call and an-
trieved 14 October 2011.
swer calls from your lock screen. VentureBeat. Retrieved
[36] Microsoft: Windows Live Messenger Retiring, Users 30 September 2016.
Moving to Skype on March 15. Retrieved 6 February [58] Paul, Sawers (27 October 2016). Skype for Business
2013. launches on Mac, mobile version now lets you give Pow-
[37] Kniskern, Kip (15 February 2013). Skype news: Mes- erPoint presentations remotely. VentureBeat. Retrieved
senger shutting down, new Video Messages, and lots of 29 October 2016.
growth. Liveside. Retrieved 17 February 2013. [59] eBay Inc. reports third quarter 2006 results (PDF).
[38] Switching between the Skype for Business and the Lync [60] eBay Inc. reports rst quarter 2007 results (PDF).
client user interfaces. Oce Support / Oce 365 Admin.
Retrieved 21 February 2016. [61] eBay Inc. reports rst quarter 2008 results (PDF).
[39] Usernames, aliases and nicknames your Skype pass- [62] Skype is the limit thanks to recession. Retrieved 6 Jan-
port. Skype.com. Retrieved 27 August 2009. uary 2009.
[40] Villu Arak. Four new SkypeIn countries. Skype Blogs. [63] Skype facts Q1 2011.
Retrieved 13 August 2007. [64] Skype fast facts Q4 2008 (PDF).
[41] Skype.com. Skype.com. Retrieved 10 October 2010. [65] Skype S. r.l. SEC ling. 4 March 2011. Retrieved 26
May 2011.
[42] Snalune, Phillip (28 April 2014). Skype Loves Bring-
ing Groups Together With FREE Group Video Calling. [66] Skype users online now.
Skype Blogs. Microsoft. Retrieved 12 May 2014.
[67] WSJ: Microsoft to buy Skype for $7bn. Rest of world:
[43] Group video calls. Microsoft. Retrieved 12 May 2014. for real?". ArsTechnica. 10 May 2011. Retrieved 10 May
2011.
[44] Skype and Emergency Services.
[68] Skypes changing trac growth. Financial Times. 10
[45] Skype Emergency Calling. May 2011. Retrieved 10 May 2011.
[46] Draft Report from TEITAC Task Force on 255/508 dif- [69] Skype by the Numbers: Its really Big. Retrieved 1 July
ferences, with proposals for TEITAC discussion. Re- 2011.
trieved 13 July 2010.
[70] Rickns, Mikael (25 March 2009). Skype is largest inter-
[47] Frequently Asked Questions. 911VoIP.org. Retrieved national voice carrier, says study. Network World. IDG
31 March 2009. News Service.
[48] Ryan Lawler, GigaOm. "Comcast bringing Skype video [71] International carriers trac grows despite Skype popu-
chat into the living room. 13 June 2011. Retrieved 13 larity. TeleGeography Report and Database. Retrieved
June 2011. 7 December 2006.
[49] Skype video messaging ocially launches on Windows, [72] Skype Commands 13 Percent of International Phone
Mac, iOS, Android but not Windows Phone. 17 June Calls. The Inquisitr. 3 May 2010. Retrieved 4 May
2013. 2010.
238 CHAPTER 62. SKYPE
[73] Skype now accounts for a third of international calls. [95] Skype for Samsung Smart TV. Retrieved 12 February
Phonearena. 16 February 2013. Retrieved 28 September 2013.
2014.
[96] Skype camera accessory for Samsung Smart TV. Re-
[74] Skype trac continues to thrive. TeleGeography. 15 trieved 12 February 2013.
January 2014. Retrieved 28 September 2014.
[97] Skype The Big Blog Frings misuse of Skype software
[75] Skype Is Now 40% Of The Entire International Tele- was damaging to our brand and reputation. Retrieved 3
phone Market. Anorak. 17 January 2014. Retrieved August 2010.
28 September 2014.
[98] What the Skype/Nimbuzz Breakup Means To You. Re-
[76] Skype Hits New Record of 27 Million Simultaneous trieved 25 October 2010.
Users. Retrieved 11 January 2011.
[99] Phone Systems to Power Your Business Sfa_faq
[77] 29 million people online on Skype. Retrieved 23 Febru- Digium The Asterisk Company. Digium.com. Retrieved
ary 2011. 4 December 2011.
[78] 30 million people online on Skype. Retrieved 28 March [100] StreamCast sues Kazaa, Skype: heres my take.
2011. Blogs.zdnet.com. 27 March 2006. Retrieved 31 March
[79] Skype reaches new milestone with 32 million users. Re- 2009.
trieved 26 February 2012.
[101] Skype does not support IPv6.. Skype ocial Twitter
[80] 35 Million People Concurrently Online on Skype. Re- account. 1 November 2012. Retrieved 4 November 2012.
trieved 8 March 2012.
[102] Dario Bonglio et al. Revealing Skype Trac: When
[81] 50 million concurrent users online. Retrieved 25 March Randomness Plays with You, ACM SIGCOMM Com-
2013. puter Communication Review, Volume 37:4 (SIGCOMM
2007), p. 37-48. Dpacket.org. 30 May 2008. Retrieved
[82] More than 70 Million downloads on an Android device. 31 March 2009.
Retrieved 26 June 2012.
[103] Hjelmvik, Erik; John, Wolfgang (27 July 2010).
[83] Hows Skype Doing at MSFT? Usage Jumps 50%, Users Breaking and Improving Protocol Obfuscation (PDF).
Logged 115B Minutes of Calls Last Quarter. Retrieved ISSN 1652-926X.
21 July 2012.
[104] Skypes new super wideband codec. Wirevolution.com.
[84] Skype trac continues to thrive. Retrieved 3 September 13 January 2009. Retrieved 31 March 2009.
2014.
[105] Skype and a New Audio Codec. Skype. 12 September
[85] Skype. Microsoft Store. Microsoft. Retrieved 4 April 2012. Retrieved 3 May 2014.
2016.
[106] OpusFAQ. Xiph.org Foundation. 22 April 2014. Re-
[86] A More Ecient Skype Experience for Your PC. Skype. trieved 3 May 2014.
Skype. Retrieved 4 April 2016.
[107] On2 Technologies Codec Oers High Quality Video to
[87] Messaging + Skype. Microsoft Store. Microsoft. Re- Skype. Archived from the original on 4 December 2007.
trieved 4 April 2016.
[108] Skype adds On2 Technologies TrueMotion VP7. 16
[88] The Consumer Preview of Skype Integration for Win- November 2007. Retrieved 9 August 2011.
dows 10 is here Tell us what you want to see next.
Skype. Skype. Retrieved 4 April 2016. [109] Skype goes VP8, embraces open video codec. 3 August
2011. Retrieved 9 August 2011.
[89] http://blogs.skype.com/2016/03/24/
skype-universal-windows-platform-app-preview-for-windows-10-is-coming-to-windows-insiders/
[110] One-to-One VP8 Video Calling Now Supported in
Skype. 3 August 2011. Retrieved 9 August 2011.
[90] https://support.skype.com/en/faq/FA34643/
skype-universal-windows-platform-app-preview-your-most-asked-questions
[111] Skype moves to VP8 for all video calls. The H. 4 Au-
[91] 3 Skypephone Delivers Free Skype to Skype Mobile gust 2011. Archived from the original on 23 May 2012.
Calls and Instant Messages at the Touch of a Button. 29 Retrieved 9 August 2011.
October 2007.
[112] Jodi Mau (9 January 2012). See and Talk to Your
[92] NETGEAR Skype WiFi Phone. voipyeah.com. Friends on Skype in Full-HD 1080p with the New Log-
itech HD Pro Webcam C920. Blogs.skype.com. Re-
[93] Skype Expands Mobile Strategy at 2008 International trieved 24 February 2012.
CES. Retrieved 7 January 2008.
[113] Reveal the real you with the Logitech HD Pro Webcam
[94] Playstationlifestyle.net. Playstationlifestyle.net. Re- C920. Blog.Logitech. 5 January 2012. Retrieved 24
trieved 10 October 2010. February 2012.
62.12. REFERENCES 239
[114] Olivarez-Giles, Nathan (14 October 2014). Skype Re- [134] Privacy 101: Skype Leaks Your Location.
launches Qik as Social Video Messaging App. Wall Street
Journal. Retrieved 14 October 2014. [135] Skype 5.6 for Mac.
[115] Skype (Wayback Machine Archive)". Archived from the [136] Skype 5.9 for Windows.
original on 1 July 2004. Retrieved 20 May 2013.
[137] Craig Timberg (25 July 2012). Skype makes chats and
[116] Skype Privacy FAQ. Skype. Retrieved 5 December user data more available to police. Washington Post. Re-
2006. trieved 9 March 2016.
[117] Philippe Biondi and Fabrice Desclaux. Silver Needle in [138] Gallagher, Ryan (9 November 2012). Did Skype Give
the Skype (PDF). blackhat. Retrieved 2 March 2006. a Private Company Data on Teen WikiLeaks Supporter
Without a Warrant?". Slate. Retrieved 11 November
[118] Greenwald, Glenn; MacAskill, Ewen (June 7, 2013). 2012.
NSA Prism program taps in to user data of Apple,
Google and others. The Guardian. Guardian News and [139] Skype accounts can be hacked with an email address.
Media Limited.
[140] " skype,
[119] George Mason University (PDF). Retrieved 10 October ".
2010.
[141] Skype with Care Microsoft is Reading Everything You
[120] ZDNet.de. Telefonieren bers Internet: Wie sicher ist Write. Heise Security. 14 May 2013. Archived from the
Skype wirklich? Telekommunikation | Mobile Busi- original on 26 December 2013. Retrieved 20 May 2013.
ness. ZDNet.de. Retrieved 31 March 2009.
[142] Adam Back (16 May 2013). "[Cryptography] Skype
[121] "FSF High Priority Projects", Free Software Foundation. backdoor conrmation. Retrieved 20 May 2013.
Retrieved 26 January 2009.
[143] Leo Laporte, Steve Gibson (17 July 2013). Security
[122] Biondi P., Desclaux F (23 March 2006). Silver Needle Now (Podcast). This Week in Tech. Retrieved 17 July
in the Skype (PDF). EADS Corporate Research Center. 2013.
Retrieved 26 January 2009.
[144] McCarthy, Tom (7 June 2013). Obama defends se-
[123] Sokolov, David AJ (24 July 2008). Speculation over back cret NSA surveillance programs as it happened. The
door in Skype. Heise Security UK. Archived from the Guardian. London. Retrieved 9 June 2013.
original on 13 July 2010. Retrieved 26 January 2009.
[145] National Security Agency (7 June 2013). Prism slide
[124] Leyde, John (24 July 2008). Austrian ocial fuels Skype 5.jpg. Wikimedia Commons. Retrieved 1 June 2014.
backdoor rumours. The Register UK. Retrieved 29 Jan- Sourced from:
uary 2009.
NSA slides explain the PRISM data-
[125] Skype Secrecy Under Attack Again. VoIP News. 24 collection program. The Washington Post. 6
February 2009. Retrieved 10 October 2010. June 2013.
[126] Big Brother in the Wires: Wiretapping in the Digital [146] Secure Messaging Scorecard. Which apps and tools actu-
Age. ACLU. Retrieved 23 March 2009. ally keep your messages safe?". Electronic Frontier Foun-
dation. 4 November 2014. Retrieved 1 June 2015.
[127] CALEA feature page. ACLU. Retrieved 23 March
2009. [147] Scorecard Update: We Cannot Credit Skype For End-
to-end Encryption. Electronic Frontier Foundation. 10
[128] German Authorities Raiding Homes To Find Skype Tap- November 2014.
ping Whistleblower. Techdirt. 18 September 2008. Re-
trieved 31 March 2009. [148] Only 6 Messaging Apps Are Truly Secure. PC Maga-
zine. 5 November 2014. Retrieved 8 January 2015.
[129] James E. Gaskin (18 July 2012). Was Skype reworked
by Microsoft to make it easier to wiretap?". ITworld. [149] Dynamic Internet Technology Inc. Alleges Skype Redi-
rects Users in China to Censorware Version Ten
[130] What Does Skypes Architecture Do?". 26 July 2012. Days After Users Are Able To Download Freegate Soft-
Retrieved 20 May 2013. ware Through Skype. TMCnet. 24 September 2007.
Archived from the original on 15 January 2008.
[131] Risen, James; Nick Wingeld (19 June 2013). Webs
Reach Binds N.S.A. and Silicon Valley Leaders. The [150] Surveillance of Skype messages found in China.
New York Times. Retrieved 29 October 2013. International Herald Tribune. 2 October 2008.
[132] Press release: Eurojust coordinates internet telephony. [151] Claburn, Thomas (2 October 2008). Skype Defends
Eurojust.europa.EU. 20 February 2009. Retrieved 10 Oc- VoIP IM Monitoring in China. InformationWeek.
tober 2010.
[152] Skype says texts are censored by China. Financial
[133] Skype Knew of Security Flaw Since November 2010, Times. 18 April 2006. Archived from the original on 23
Researchers say. The Wall Street Journal. 1 May 2012. March 2009.
240 CHAPTER 62. SKYPE
[153] Fowler, Georey A.; Jason Dean (3 October 2008). 62.14 External links
Skypes China Practices Draw Ire: Joint Ventures Track-
ing of Text Messages Adds Impetus to Web Code of Con- Ocial website
duct. The Wall Street Journal.
Skype version numbering: The 3rd number meaning
[154] Marko, John (1 October 2008). Huge System for Web How to know what is latest skype version number?,
Surveillance Discovered in China. The New York Times. Skype community website, 1 March 2013
[155] Microsoft blocks censorship of Skype in China: advo- Running multiple skype accounts at the same time
cacy group. Reuters. 27 November 2013. How can I run multiple Skype accounts at the same
time?, Skype website > support > FAQ (See also:
[156] A new relationship for a better experience in China.
How to Sign Into Two or More Skype Accounts at
Skype. Skype Blogs. 25 November 2013.
Once, How-To-Geek website, 7 November 2015)
[157] Prasad, Kodavati. No Skype calls within India from
November 10. Kodavatisai.
[159] Ali, Sarmad (14 January 2010). WSJ. The Wall Street
Journal.
This article is about the information security concept. For IDs thereby gaining the ability to access the companys
inuencing society on a large scale, see Social engineer- private information. Another example of social engineer-
ing (political science). ing would be that the hacker contacts the target on a social
Social engineering, in the context of information secu- networking site and starts a conversation with the target.
Slowly and gradually, the hacker gains trust of the target
and then uses it to get access to sensitive information like
password or bank account details.[3]
63.1.1 Pretexting
Pretexting (adj. pretextual), also known in the UK
OPSEC alert as blagging or bohoing, is the act of creating and using
an invented scenario (the pretext) to engage a targeted
rity, refers to psychological manipulation of people into victim in a manner that increases the chance the victim
performing actions or divulging condential information. will divulge information or perform actions that would
A type of condence trick for the purpose of information be unlikely in ordinary circumstances.[4] An elaborate
gathering, fraud, or system access, it diers from a tradi- lie, it most often involves some prior research or setup
tional con in that it is often one of many steps in a more and the use of this information for impersonation (e.g.,
complex fraud scheme. date of birth, Social Security number, last bill amount) to
establish legitimacy in the mind of the target.[5]
The term social engineering as an act of psychological
manipulation is also associated with the social sciences, This technique can be used to fool a business into disclos-
but its usage has caught on among computer and infor- ing customer information as well as by private investiga-
mation security professionals.[1] tors to obtain telephone records, utility records, banking
records and other information directly from company ser-
vice representatives.[6] The information can then be used
to establish even greater legitimacy under tougher ques-
63.1 Techniques and terms tioning with a manager, e.g., to make account changes,
get specic balances, etc.
All social engineering techniques are based on specic
attributes of human decision-making known as cognitive Pretexting can also be used to impersonate co-
biases.[2] These biases, sometimes called bugs in the hu- workers, police, bank, tax authorities, clergy, insurance
man hardware, are exploited in various combinations to investigatorsor any other individual who could have
create attack techniques, some of which are listed. The perceived authority or right-to-know in the mind of
attacks used in social engineering can be used to steal the targeted victim. The pretexter must simply prepare
employees condential information. The most common answers to questions that might be asked by the victim.
type of social engineering happens over the phone. Other In some cases, all that is needed is a voice that sounds
examples of social engineering attacks are criminals pos- authoritative, an earnest tone, and an ability to think on
ing as exterminators, re marshals and technicians to go ones feet to create a pretextual scenario.
unnoticed as they steal company secrets.
One example of social engineering is an individual who 63.1.2 Diversion theft
walks into a building and posts an ocial-looking an-
nouncement to the company bulletin that says the number Diversion theft, also known as the Corner Game[7] or
for the help desk has changed. So, when employees call Round the Corner Game, originated in the East End of
for help the individual asks them for their passwords and London.
241
242 CHAPTER 63. SOCIAL ENGINEERING (SECURITY)
In summary, diversion theft is a con exercised by pro- Although similar to phishing, spear phishing is a tech-
fessional thieves, normally against a transport or courier nique that fraudulently obtains private information by
company. The objective is to persuade the persons re- sending highly customized emails to few end users. It
sponsible for a legitimate delivery that the consignment is the main dierence between phishing attacks because
is requested elsewherehence, round the corner. phishing campaigns focus on sending out high volumes of
generalized emails with the expectation that only a few
people will respond. On the other hand, spear phishing
63.1.3 Phishing emails require the attacker to perform additional research
on their targets in order to trick end users into per-
Main article: Phishing forming requested activities. The success rate of spear-
phishing attacks is considerable higher than phishing at-
Phishing is a technique of fraudulently obtaining private tacks with people opening roughly 3% of phishing emails
information. Typically, the phisher sends an e-mail that when compared to roughly 70% of potential attempts.
appears to come from a legitimate businessa bank, or However, when users actually open the emails phishing
credit card companyrequesting verication of infor- emails have a relatively modest 5% success rate to have
mation and warning of some dire consequence if it is not the link or attachment clicked when compared to a spear-
provided. The e-mail usually contains a link to a fraud- phishing attacks 50% success rate.[8]
ulent web page that seems legitimatewith company lo-
gos and contentand has a form requesting everything
from a home address to an ATM card's PIN or a credit 63.1.5 Baiting
card number. For example, in 2003, there was a phish-
ing scam in which users received e-mails supposedly from Baiting is like the real-world Trojan horse that uses phys-
eBay claiming that the users account was about to be ical media and relies on the curiosity or greed of the
suspended unless a link provided was clicked to update victim.[9] In this attack, attackers leave malware-infected
a credit card (information that the genuine eBay already oppy disks, CD-ROMs, or USB ash drives in locations
had). Because it is relatively simple to make a Web site re- people will nd them (bathrooms, elevators, sidewalks,
semble a legitimate organizations site by mimicking the parking lots, etc.), give them legitimate and curiosity-
HTML code and logos the scam counted on people being piquing labels, and waits for victims. For example, an
tricked into thinking they were being contacted by eBay attacker may create a disk featuring a corporate logo,
and subsequently, were going to eBays site to update their available from the targets website, and label it Execu-
account information. By spamming large groups of peo- tive Salary Summary Q2 2012. The attacker then leaves
ple, the phisher counted on the e-mail being read by a the disk on the oor of an elevator or somewhere in the
percentage of people who already had listed credit card lobby of the target company. An unknowing employee
numbers with eBay legitimately, who might respond. may nd it and insert the disk into a computer to satisfy
his or her curiosity, or a good Samaritan may nd it and
return it to the company. In any case, just inserting the
IVR or phone phishing disk into a computer installs malware, giving attackers ac-
cess to the victims PC and, perhaps, the target companys
Main article: Vishing internal computer network.
Unless computer controls block infections, insertion
Phone phishing (or "vishing") uses a rogue interactive compromises PCs auto-running media. Hostile devices
voice response (IVR) system to recreate a legitimate- can also be used.[10] For instance, a lucky winner is
sounding copy of a bank or other institutions IVR sys- sent a free digital audio player compromising any com-
tem. The victim is prompted (typically via a phishing e- puter it is plugged to. A road apple (the colloquial
mail) to call in to the bank via a (ideally toll free) num- term for horse manure, suggesting the devices undesir-
ber provided in order to verify information. A typical able nature) is any removable media with malicious soft-
vishing system will reject log-ins continually, ensuring ware left in opportunistic or conspicuous places. It may
the victim enters PINs or passwords multiple times, often be a CD, DVD, or USB ash drive, among other media.
disclosing several dierent passwords. More advanced Curious people take it and plug it into a computer, in-
systems transfer the victim to the attacker/defrauder, who fecting the host and any attached networks. Hackers may
poses as a customer service agent or security expert for give them enticing labels, such as Employee Salaries or
further questioning of the victim. Condential.[11]
63.2.3 Mike Ridpath and if it shall appear to the Commission that a proceed-
ing by it in respect thereof would be to the interest of the
Mike Ridpath Security consultant, published author, public, it shall issue and serve upon such person, partner-
and speaker. Emphasizes techniques and tactics for ship, or corporation a complaint stating its charges in that
social engineering cold calling. Became notable af- respect.
ter his talks where he would play recorded calls The statute states that when someone obtains any per-
and explain his thought process on what he was do- sonal, non-public information from a nancial institution
ing to get passwords through the phone and his live or the consumer, their action is subject to the statute. It
demonstrations.[19][20][21][22][23] As a child Ridpath was relates to the consumers relationship with the nancial
connected with Badir Brothers and was widely known institution. For example, a pretexter using false pretenses
within the phreaking and hacking community for his ar- either to get a consumers address from the consumers
ticles with popular underground ezines, such as, Phrack, bank, or to get a consumer to disclose the name of his or
B4B0 and 9x on modifying Oki 900s, blueboxing, her bank, would be covered. The determining principle is
satellite hacking and RCMAC.[24][17] that pretexting only occurs when information is obtained
through false pretenses.
63.2.4 Badir Brothers While the sale of cell telephone records has gained sig-
nicant media attention, and telecommunications records
Brothers Ramy, Muzher, and Shadde Badirall of whom are the focus of the two bills currently before the United
were blind from birthmanaged to set up an exten- States Senate, many other types of private records are be-
sive phone and computer fraud scheme in Israel in the ing bought and sold in the public market. Alongside many
1990s using social engineering, voice impersonation, and advertisements for cell phone records, wireline records
Braille-display computers.[25][17] and the records associated with calling cards are adver-
tised. As individuals shift to VoIP telephones, it is safe to
assume that those records will be oered for sale as well.
Currently, it is legal to sell telephone records, but illegal
63.3 Law to obtain them.[28]
In Jerey Deavers book The Blue Nowhere, social In French novels from Maxime Frantini [Journal
engineering to obtain condential information is one d'un hacker, L'ombre et la lumire, la Cavale, La
of the methods used by the killer, Phate, to get close dtermination du fennec], hacker hero Ylian Estevez
to his victims. mainly uses social engineering for its attacks.[31]
Physical information security [15] Allsopp, William. Unauthorised access: Physical pene-
tration testing for it security teams. Hoboken, NJ: Wiley,
Piggybacking (security) 2009. 240-241.
Softphone
248
Chapter 65
Softswitch
A softswitch (software switch) is a central device in a terfaces. This procedure is utilized to keep the interfaces
telecommunications network which connects telephone clear as crystal for receiving calls from any phone lines.[2]
calls from one phone line to another, across a telecom- The media gateway connects dierent types of digital
munication network or the public Internet, entirely by
media stream together to create an end-to-end path for
means of software running on a general-purpose com- the media (voice and data) in the call. It may have in-
puter system. Most landline calls are routed by purpose-
terfaces to connect to traditional PSTN networks, such
built electronic hardware; however, soft switches using as DS1 or DS3 ports (E1 or STM1 in the case of non-
general purpose servers and VoIP technology are becom-
US networks). It may also have interfaces to connect to
ing more popular.[1] ATM and IP networks, and the most modern systems will
Many telecommunications networks now make use have Ethernet interfaces to connect VoIP calls. The call
of combinations of softswitches and more traditional agent will instruct the media gateway to connect media
purpose-built hardware. streams between these interfaces to connect the call - all
Although the term softswitch technically refers to any transparently to the end-users.
such device, it is more conventionally applied to a de- The softswitch generally resides in a building owned
vice that handles IP-to-IP phone calls, while the phrase by the telephone company called a telephone exchange
"access server" or media gateway is used to refer to de- (UK/IRL/AUS/NZ) or central oce (US/CAN). The
vices that either originate or terminate traditional "land central oce or telephone exchange has high capacity
line" (hard wired) phone calls. In practice, such devices connections to carry calls to other oces owned by the
can often do both. As a practical distinction, a Skype- telecommunication company and to other telecommuni-
to-Skype phone call is entirely IP (internet) based, and cation companies via the PSTN.
so uses a softswitch somewhere in the middle connecting
Looking towards the end users from the switch, the
the calling party with the called party. In contrast, ac- softswitch may be connected to several access devices via
cess servers might take a mobile call or a call originating
TCP/IP network. These access devices can range from
from a traditional phone line, convert it to IP trac, then small Analog Telephone Adaptors (ATA) which provide
send it over the internet to another such device, which just one RJ11 telephone jack to an Integrated Access De-
terminates the call by reversing the process and convert- vice (IAD), eMTA s (embedded Multimedia Terminal
ing the Voice over IP call back to older circuit switched Adapters) using MGCP/NCS protocol over cable (Vo-
digital systems using traditional digital ISDN / PSTN pro- Cable) or PBX which may provide several hundred tele-
tocols that transmit voice trac using non-IP systems. phone connections
A softswitch is typically used to control connections at Note here that Analogue (ATA), PSTN telephone de-
the junction point between circuit-switched and packet- vices can only be reached by a softswitch that has em-
switched networks. A single device containing both the bedded SS7 or SIGTRAN cards, software in terms
switching logic and the switched fabric can be used for of signalling AND Trunking Gateway for Voice trac
this purpose; however, modern technology has led to a IP/TDM, TDM/IP, TDM/TDM functions.
preference for decomposing this device into a Call Agent
and a Media Gateway. Typically the larger access devices will be located in a
building owned by the telecommunication company near
The Call Agent takes care of functions such as billing, to the customers they serve. Each end user can be con-
call routing, signaling, call services and the like, supplying
nected to the IAD by a simple pair of copper wires.
the functional logic to accomplish these telephony meta-
tasks. A call agent may control several dierent media The medium-sized devices and PBXs are most commonly
gateways in geographically dispersed areas via a TCP/IP used by business that locate them on their own premises,
link. It is also used to control the functions of media gate- and single-line devices are mostly found at private resi-
way, in order to connect with media as well as other in- dences.
249
250 CHAPTER 65. SOFTSWITCH
At the turn of the 21st century with IP Multimedia Sub- 65.4 See also
system (or IMS), the Softswitch element is represented
by the Media Gateway Controller (MGC) element, and Telephone switch
the term Softswitch is rarely used in the IMS context.
Rather, it is called an AGCF (Access Gateway Control IP Multimedia Subsystem
Function).
Software dened mobile network
Telephone
For other uses, see Telephone (disambiguation). In 1876, Scottish emigrant Alexander Graham Bell was
Phone redirects here. For other uses, see Phone the rst to be granted a United States patent for a de-
(disambiguation). vice that produced clearly intelligible replication of the
human voice. This instrument was further developed by
many others. The telephone was the rst device in his-
tory that enabled people to talk directly with each other
across large distances. Telephones rapidly became indis-
pensable to businesses, government, and households, and
are today some of the most widely used small appliances.
The essential elements of a telephone are a microphone
(transmitter) to speak into and an earphone (receiver)
which reproduces the voice in a distant location. In addi-
tion, most telephones contain a ringer which produces a
sound to announce an incoming telephone call, and a dial
or keypad used to enter a telephone number when initiat-
ing a call to another telephone. Until approximately the
1970s most telephones used a rotary dial, which was su-
perseded by the modern DTMF push-button dial, rst in-
troduced to the public by AT&T in 1963.[1] The receiver
and transmitter are usually built into a handset which is
held up to the ear and mouth during conversation. The
A rotary dial telephone, c.1940s dial may be located either on the handset, or on a base unit
to which the handset is connected. The transmitter con-
verts the sound waves to electrical signals which are sent
through the telephone network to the receiving phone.
The receiving telephone converts the signals into audi-
ble sound in the receiver, or sometimes a loudspeaker.
Telephones permit duplex communication, meaning they
allow the people on both ends to talk simultaneously.
The rst telephones were directly connected to each other
from one customers oce or residence to another cus-
tomers location. Being impractical beyond just a few
customers, these systems were quickly replaced by man-
ually operated centrally located switchboards. This gave
Modern telephones use push buttons rise to landline telephone service in which each telephone
is connected by a pair of dedicated wires to a local cen-
tral oce switching system, which developed into fully
A telephone, or phone, is a telecommunications de-
automated systems starting in the early 1900s. As greater
vice that permits two or more users to conduct a con-
mobility was desired for commerce and convenience, var-
versation when they are too far apart to be heard di-
ious radio systems were developed for transmission be-
rectly. A telephone converts sound, typically and most ef-
tween mobile customer stations on ships and automobiles
ciently the human voice, into electronic signals suitable
from the 1930s by the mid-1900s. Radio systems evolved
for transmission via cables or other transmission media
into various cellular topologies until the rst hand-held
over long distances, and replays such signals simultane-
mobile phone was introduced for personal service start-
ously in audible form to its user.
251
252 CHAPTER 66. TELEPHONE
ing in 1973 by Motorola. By the late 1970s several mo- with pushbutton telephones (A4).
bile telephone networks operated around the world. In A major expense of wire-line telephone service is the
1983, the Advanced Mobile Phone System (AMPS) was outside wire plant. Telephones transmit both the incom-
launched in the U.S. and in other countries soon after, ing and outgoing speech signals on a single pair of wires.
and oered a standardized technology providing porta- A twisted pair line rejects electromagnetic interference
bility for users within a region far beyond the personal (EMI) and crosstalk better than a single wire or an un-
residence or oce location. These analog cellular system twisted pair. The strong outgoing speech signal from the
evolved into digital networks with better security, greatermicrophone (transmitter) does not overpower the weaker
capacity, better regional coverage, and lower cost. The
incoming speaker (receiver) signal with sidetone because
public switched telephone network, with its hierarchi- a hybrid coil (A3) and other components compensate the
cal system of many switching centers, interconnects tele-
imbalance. The junction box (B) arrests lightning (B2)
phones around the world for communication with each and adjusts the lines resistance (B1) to maximize the sig-
other. With the standardized international numbering
nal power for the line length. Telephones have similar
system, E.164, each telephone line has an identifying adjustments for inside line lengths (A8). The line volt-
telephone number, that may be called from any autho-
ages are negative compared to earth, to reduce galvanic
rized telephone on the network. corrosion. Negative voltage attracts positive metal ions
Although originally designed for simple voice commu- toward the wires.
nications, convergence has enabled most modern cell
phones to have many additional capabilities. They may
be able to record spoken messages, send and receive text
messages, take and display photographs or video, play 66.2 Details of operation
music or games, surf the Internet, do road navigation or
immerse the user in virtual reality. Since 1999, the trend Further information: Telephone call
for mobile phones is smartphones that integrate all mobile
communication and computing needs.
The landline telephone contains a switchhook (A4) and
an alerting device, usually a ringer (A7), that remains
connected to the phone line whenever the phone is "on
66.1 Basic principles hook" (i.e. the switch (A4) is open), and other compo-
nents which are connected when the phone is "o hook".
The o-hook components include a transmitter (micro-
phone, A2), a receiver (speaker, A1), and other circuits
for dialing, ltering (A3), and amplication.
A calling party wishing to speak to another party will
pick up the telephones handset, thereby operating a lever
which closes the switchhook (A4), which powers the tele-
phone by connecting the transmitter (microphone), re-
ceiver (speaker), and related audio components to the
line. The o-hook circuitry has a low resistance (less
than 300 ohms) which causes a direct current (DC), which
comes down the line (C) from the telephone exchange.
Schematic of a landline telephone installation. The exchange detects this current, attaches a digit re-
ceiver circuit to the line, and sends a dial tone to indi-
cate readiness. On a modern push-button telephone, the
A traditional landline telephone system, also known as caller then presses the number keys to send the telephone
plain old telephone service (POTS), commonly carries number of the called party. The keys control a tone gen-
both control and audio signals on the same twisted pair erator circuit (not shown) that makes DTMF tones that
(C in diagram) of insulated wires, the telephone line. The the exchange receives. A rotary-dial telephone uses pulse
control and signaling equipment consists of three compo- dialing, sending electrical pulses, that the exchange can
nents, the ringer, the hookswitch, and a dial. The ringer, count to get the telephone number (as of 2010 many ex-
or beeper, light or other device (A7), alerts the user to in- changes were still equipped to handle pulse dialing). If
coming calls. The hookswitch signals to the central oce the called partys line is available, the exchange sends an
that the user has picked up the handset to either answer intermittent ringing signal (about 75 volts alternating cur-
a call or initiate a call. A dial, if present, is used by the rent (AC) in North America and UK and 60 volts in Ger-
subscriber to transmit a telephone number to the central many) to alert the called party to an incoming call. If the
oce when initiating a call. Until the 1960s dials used called partys line is in use, the exchange returns a busy
almost exclusively the rotary technology, which was re- signal to the calling party. However, if the called partys
placed by dual-tone multi-frequency signaling (DTMF) line is in use but has call waiting installed, the exchange
66.3. HISTORY 253
sends an intermittent audible tone to the called party to the microphone (A2), virtually all of the incoming sig-
indicate an incoming call. nal passes through it and bypasses the microphone.
The ringer of a telephone (A7) is connected to the line At the same time the DC voltage across the line causes a
through a capacitor (A6), which blocks direct current but DC current which is split between the resistor-coil (A8-
passes the alternating current of the ringing signal. The A3) branch and the microphone-coil (A2-A3) branch.
telephone draws no current when it is on hook, while a The DC current through the resistor-coil branch has no
DC voltage is continually applied to the line. Exchange eect on the incoming audio signal. But the DC current
circuitry (D2) can send an AC current down the line to passing through the microphone is turned into AC current
activate the ringer and announce an incoming call. When (in response to voice sounds) which then passes through
there is no automatic exchange, telephones have hand- only the upper branch of the coils (A3) primary winding,
cranked magnetos to generate a ringing voltage back to which has far fewer turns than the lower primary winding.
the exchange or any other telephone on the same line. This causes a small portion of the microphone output to
When a landline telephone is inactive (on hook), the cir- be fed back to the speaker, while the rest of the AC cur-
cuitry at the telephone exchange detects the absence of rent goes out through the phone line.
direct current to indicate that the line is not in use. When A linemans handset is a telephone designed for testing
a party initiates a call to this line, the exchange sends the the telephone network, and may be attached directly to
ringing signal. When the called party picks up the hand- aerial lines and other infrastructure components.
set, they actuate a double-circuit switchhook (not shown)
which may simultaneously disconnects the alerting device
and connects the audio circuitry to the line. This, in turn,
draws direct current through the line, conrming that the 66.3 History
called phone is now active. The exchange circuitry turns
o the ring signal, and both telephones are now active and Main articles: History of the telephone and Timeline of
connected through the exchange. The parties may now the telephone
converse as long as both phones remain o hook. When Further information: Invention of the telephone, Elisha
a party hangs up, placing the handset back on the cradle Gray and Alexander Bell telephone controversy, and
or hook, direct current ceases in that line, signaling the Canadian Parliamentary Motion on Alexander Graham
exchange to disconnect the call. Bell
Calls to parties beyond the local exchange are carried
over trunk lines which establish connections between ex- Before the development of the electric telephone, the
changes. In modern telephone networks, ber-optic cable term telephone was applied to other inventions, and not
and digital technology are often employed in such con- all early researchers of the electrical device called it tele-
nections. Satellite technology may be used for communi- phone. A communication device for sailing vessels The
cation over very long distances. Telephone was the invention of a captain John Taylor in
1844. This instrument used four air horns to commu-
In most landline telephones, the transmitter and receiver
nicate with vessels in foggy weather.[2] Later, c. 1860,
(microphone and speaker) are located in the handset, al-
Johann Philipp Reis used the term in reference to his Reis
though in a speakerphone these components may be lo-
telephone, his device appears to be the rst such device
cated in the base or in a separate enclosure. Powered
based on conversion of sound into electrical impulses,
by the line, the microphone (A2) produces a modulated
the term telephone was adopted into the vocabulary of
electric current which varies its frequency and amplitude
many languages. It is derived from the Greek: , tle,
in response to the sound waves arriving at its diaphragm.
far and , phn, voice, together meaning dis-
The resulting current is transmitted along the telephone
tant voice.
line to the local exchange then on to the other phone
(via the local exchange or via a larger network), where it Credit for the invention of the electric telephone is fre-
passes through the coil of the receiver (A3). The varying quently disputed. As with other inuential inventions
current in the coil produces a corresponding movement of such as radio, television, the light bulb, and the computer,
the receivers diaphragm, reproducing the original sound several inventors pioneered experimental work on voice
waves present at the transmitter. transmission over a wire and improved on each others
ideas. New controversies over the issue still arise from
Along with the microphone and speaker, additional cir-
time to time. Charles Bourseul, Antonio Meucci, Johann
cuitry is incorporated to prevent the incoming speaker
Philipp Reis, Alexander Graham Bell, and Elisha Gray,
signal and the outgoing microphone signal from inter-
amongst others, have all been credited with the invention
fering with each other. This is accomplished through
of the telephone.[3]
a hybrid coil (A3). The incoming audio signal passes
through a resistor (A8) and the primary winding of the Alexander Graham Bell was the rst to be awarded a
coil (A3) which passes it to the speaker (A1). Since the patent for the electric telephone by the United States
[4]
current path A8 A3 has a far lower impedance than Patent and Trademark Oce (USPTO) in March 1876.
The Bell patents were forensically victorious and com-
254 CHAPTER 66. TELEPHONE
Bell placing the rst New York to Chicago telephone call in 1892
14 February 1876 Elisha Gray les a patent a local battery. One of the jobs of outside plant person-
caveat for transmitting the human voice through a nel was to visit each telephone periodically to inspect the
telegraphic circuit. battery. During the 20th century, common battery op-
eration came to dominate, powered by talk battery from
14 February 1876 Alexander Bell applies for the the telephone exchange over the same wires that carried
patent Improvements in Telegraphy, for electro- the voice signals.
magnetic telephones using what is now called am-
plitude modulation (oscillating current and voltage) Early telephones used a single wire for the subscribers
but which he referred to as undulating current. line, with ground return used to complete the circuit (as
used in telegraphs). The earliest dynamic telephones also
19 February 1876 Gray is notied by the U.S. had only one port opening for sound, with the user alter-
Patent Oce of an interference between his caveat nately listening and speaking (or rather, shouting) into the
and Bells patent application. Gray decides to aban- same hole. Sometimes the instruments were operated in
don his caveat. pairs at each end, making conversation more convenient
but also more expensive.
7 March 1876 Bells U.S. patent 174,465 Im-
provement in Telegraphy is granted, covering the
method of, and apparatus for, transmitting vocal or
other sounds telegraphically ... by causing electrical
undulations, similar in form to the vibrations of the
air accompanying the said vocal or other sound.
Ericsson DBH 1001 (ca. 1931), the rst combined telephone Disadvantages of single wire operation such as crosstalk
made with a Bakelite housing and handset. and hum from nearby AC power wires had already led to
the use of twisted pairs and, for long distance telephones,
258 CHAPTER 66. TELEPHONE
four-wire circuits. Users at the beginning of the 20th cen- reects the methodology memorably. VoIP has proven
tury did not place long distance calls from their own tele- to be a disruptive technology that is rapidly replacing
phones but made an appointment to use a special sound- traditional telephone network infrastructure.
proofed long distance telephone booth furnished with the As of January 2005, up to 10% of telephone subscribers
latest technology. in Japan and South Korea have switched to this digital
What turned out to be the most popular and longest last- telephone service. A January 2005 Newsweek article
ing physical style of telephone was introduced in the suggested that Internet telephony may be the next big
early 20th century, including Bells 202-type desk set. A thing.[9] As of 2006 many VoIP companies oer service
carbon granule transmitter and electromagnetic receiver to consumers and businesses.
were united in a single molded plastic handle, which when
not in use sat in a cradle in the base unit. The circuit di-
agram of the model 202 shows the direct connection of
the transmitter to the line, while the receiver was induc-
tion coupled. In local battery congurations, when the
local loop was too long to provide sucient current from
the exchange, the transmitter was powered by a local bat-
tery and inductively coupled, while the receiver was in-
cluded in the local loop.[8] The coupling transformer and
the ringer were mounted in a separate enclosure, called
the subscriber set. The dial switch in the base interrupted
the line current by repeatedly but very briey disconnect-
ing the line 1 to 10 times for each digit, and the hook
switch (in the center of the circuit diagram) disconnected An IP desktop telephone attached to a computer network, with
the line and the transmitter battery while the handset was touch-tone dialing
on the cradle.
In the 1930s, telephone sets were developed that com- From a customer perspective, IP telephony uses a high-
bined the bell and induction coil with the desk set, obviat- bandwidth Internet connection and specialized customer
ing a separate ringer box. The rotary dial becoming com- premises equipment to transmit telephone calls via the In-
monplace in the 1930s in many areas enabled customer- ternet, or any modern private data network. The customer
dialed service, but some magneto systems remained even equipment may be an analog telephone adapter (ATA)
into the 1960s. After World-War II, the telephone net- which interfaces a conventional analog telephone to the
works saw rapid expansion and more ecient telephone IP networking equipment, or it may be an IP Phone that
sets, such as the model 500 telephone in the United States, has the networking and interface technology built into the
were developed that permitted larger local networks cen- desk-top set and provides the traditional, familiar parts of
tered around central oces. A breakthrough new tech- a telephone, the handset, the dial or keypad, and a ringer
nology was the introduction of Touch-Tone signaling us- in a package that usually resembles a standard telephone
ing push-button telephones by American Telephone & set.
Telegraph Company (AT&T) in 1963. In addition, many computer software vendors and tele-
phony operators provide softphone application software
that emulates a telephone by use of an attached micro-
66.4 Digital telephones and voice phone and audio headset, or loud speaker.
tion after moving to a new residence, emergency services US 3,449,750 -- Duplex Radio Communication and
can be, and have been, dispatched to the wrong location. Signalling AppartusG. H. Sweigert
Cordless telephone
Harvard sentences
Fixed telephone lines per 100 inhabitants 19972007 Index of telephone-related articles
Spamming
Graphic symbols used to designate telephone service or
phone-related information in print, signage, and other Telephone keypad
media include (U+2121), (U+260E), (U+260F),
Telephone plug
(U+2706), and (U+2315).
Telephone switchboard
Telephone card
261
262 CHAPTER 67. TELEPHONE CARD
2006 when optical phonecards were still in use in few countered by fears of vandalism of the machines.
countries like Austria, Israel and Egypt. The rst public prepaid remote memory phonecard was
The third system of stored-value phonecards is chip cards, issued in the United States in December 1980 by Phone
rst launched on a large scale in 1986 in Germany by Line. As telecom industries around the world became
Deutsche Bundespost after three years of testing, and in deregulated, remote memory cards were issued in various
France by France Tlcom. Many other countries fol- countries. Remote memory phonecards can be used from
lowed suit, including Ireland in 1990 and the UK circa any tone-mode phone and do not require special card
1994-1995, which phased out the old green Landis+Gyr readers. Since remote memory cards are more accessi-
cards in favor of the chip (smart) cards. The initial mi- ble and have lower costs, remote memory phone cards
crochips were easy to hack, typically by scratching o have proliferated. However, the utility of these cards is
the programming-voltage contact on the card, which ren- reduced by the large number of digits that need to be en-
dered the phone unable to reduce the cards value after a tered during usage. To call a long distance number, the
call. But by the mid-to-late 1990s, highly secure technol- user rst dials the local access number, then keys in the
ogy aided the spread of chip phonecards worldwide. secret code, followed by the actual long distance number.
Making a prepaid or calling card call requires the user to Based on the long distance number entered, the time re-
make two calls. Regardless of the type of card it is neces- maining on the card is announced, and the call is nally
sary to dial an access telephone number to connect to the processed through.
calling card system. There are several methods. One is Remote memory phonecards are in essence text; requir-
via a toll-free number, with larger companies oering this ing an access number, a unique PIN and instructions.
internationally. Access through a local number has be- Therefore, the instructions can be printed on virtually
come increasingly popular in recent years. Toll-free calls anything, or can be delivered via e-mail or the Internet.
are paid for by the recipient (the calling card company), Currently many websites post phone card details through
which passes on the cost through higher call charges; to- e-mail.
tal cost of a call to the user is often lower using a local
Phone cards are available in most countries in retail
number. When travelling through several local areas a stores, retail chains and commonly post oces or corner
toll-free service may be preferable.
stores. In general, remote memory phonecards can be
Once connected to the access number, the account is issued by any company and come in countless varieties.
identied by keying in a PIN (the most popular method) They can focus on calling to certain countries or regions
or by swiping a card with embedded chip or magnetic and have specic features such as rechargeability, pinless
stripe. After validation the balance remaining on the card dial, speed dial and more. Phone cards may have connec-
may be announced, and the desired number may be keyed tion fees, taxes and maintenance fees, all inuencing the
in. The available minutes may be announced, and the call rates.
is connected. Many cards make a verbal announcement
if credit is running out.
Prepaid or calling cards are usually much cheaper than 67.2.2 Accounts without a card (Virtual
other telephone services, particularly for travelers who phonecards)
do not have easy access to other services. Hotel tele-
phones can be very expensive, particularly for long- Since the early 2000s calling card service providers have
distance calls. Cellular services are exible, but may at- introduced calling accounts not associated with a physical
tract high roaming charges away from the home area. card. Calling accounts can be purchased over the Inter-
net using credit cards and are instantly delivered to the
customer via e-mail. This e-mail contains the PIN and
67.2 Remote memory systems instructions for using the service. The service may be pre-
paid, or may take payment from a credit card or by direct
debit. Some prepaid card companies allow accounts to be
67.2.1 Telephone accounts symbolized by a recharged online manually or automatically via a method
card called auto-top-up.
The second main technology of phonecards is remote Some virtual cards oer PINless Dialing, either by di-
memory, which uses a toll or toll-free access number to alling a number unique to the customer, or by recognising
reach the database and check for balance on product. As the telephone number which originated the call by Caller
the United States never had a single nationalized tele- ID and relating it to the appropriate account. Some vir-
phone service (or even the same rm for every part of tual phone cards allow customers to view their call detail
a state), and with the deregulation of its major telecom- reports (CDRs) online by logging into their account.
munications providers, there was no incentive to be con- The virtual phonecard has become a multi-billion US
sistent with the rest of the world. The ease of use of slid- dollar industry as of 2009, with a number of large cor-
ing a card into a machine just as in a teller machine was porations and smaller Dot Com companies.[2] While
67.6. SEE ALSO 263
long-distance inland calls have been oered by calling 67.6 See also
cards, by the mid-2000s conventional carriers reduced
their rates to be competitive; however in many countries Telephone token
calling-card type indirect services can be much cheaper
than normal calls. Prepaid mobile phone
SIM card
67.3 Phonecard as an artifact or
collectible
Telecom companies have placed advertising on
phonecards, or featured celebrity portraits, artwork,
or attractive photography. As the supply of any one
design is limited, this has led some people to collect
disposable phonecards.
The hobby is sometimes called fusilately in the UK and
a collector is known as a fusilatelist";[3] In the USA it is
called telegery. Phonecards have been collected world-
wide since the mid-1970s and peaked in the mid-1990s,
when over 2 million people collected phonecards.
There are many web sites dedicated to this hobby, some
of which oer catalogs and show the stories behind the
cards. Colnect is a site providing the worlds most exten-
sive online phonecards catalog.[4]
Telephone company
264
68.4. EXTERNAL LINKS 265
Service provider
68.3 References
Citations
Bibliography
Telephone exchange
266
69.1. HISTORY 267
Tivadar Pusks
1903 manual crosspoint switch
circuit to ask, Number, please?" For a local call, the op- other tone signaling systems.
erator inserted the front cord of the pair (ringing cord) A transitional technology (from pulse to DTMF) had
into the called partys local jack and started the ringing converters to convert DTMF to pulse, to feed to older
cycle. For a long distance call, she plugged into a trunk Strowger, panel, or crossbar switches. This technology
circuit to connect to another operator in another bank of was used as late as mid-2002.
boards or at a remote central oce. In 1918, the average
time to complete the connection for a long-distance call
was 15 minutes.[14]
Early manual switchboards required the operator to oper-
ate listening keys and ringing keys, but by the late 1910s
and 1920s, advances in switchboard technology led to
features which allowed the call to be automatically an-
swered immediately as the operator inserted the answer-
ing cord, and ringing would automatically begin as soon
as the operator inserted the ringing cord into the called
partys jack. The operator would be disconnected from
the circuit, allowing her to handle another call, while the
caller heard an audible ringback signal, so that that op-
erator would not have to periodically report that she was
continuing to ring the line.[15] Exchange building in Miskolc, Hungary
In the ringdown method, the originating operator called
another intermediate operator who would call the called
subscriber, or passed it on to another intermediate
operator.[16] This chain of intermediate operators could 69.2 Technologies
complete the call only if intermediate trunk lines were
available between all the centers at the same time. In
1943 when military calls had priority, a cross-country US
call might take as long as 2 hours to request and schedule
in cities that used manual switchboards for toll calls.
On March 10, 1891, Almon Brown Strowger, an under-
taker in Kansas City, Missouri, patented the stepping
switch, a device which led to the automation of tele-
phone circuit switching. While there were many exten-
sions and adaptations of this initial patent, the one best
known consists of 10 levels or banks, each having 10 con-
tacts arranged in a semicircle. When used with a rotary
telephone dial, each pair of digits caused the shaft of the
central contact hand of the stepping switch to rst step
(ratchet) up one level for each pulse in the rst digit and
then to swing horizontally in a contact row with one small
rotation for each pulse in the next digit.
Later stepping switches were arranged in banks, the rst
stage of which was a linender. If one of up to a hun-
dred subscriber lines had the receiver lifted o hook, a
linender connected the subscribers line to a free rst se-
lector, which returned the subscriber a dial tone to show
that it was ready to receive dialed digits. The subscribers
dial pulsed at about 10 pulses per second, although the
speed depended on the standard of the particular tele-
phone administration.
Exchanges based on the Strowger switch were eventu-
ally challenged by other exchange types and later by
crossbar technology. These exchange designs promised
faster switching and would accept pulses faster than the
Strowgers typical 10 ppstypically about 20 pps. At a
later date many also accepted DTMF touch tones or An old telephone system used in Colombia ETB Phones
69.2. TECHNOLOGIES 269
change.
manual switchboard. Probably the most common form A second common form of signaling for supervision was
of communicating dialed digits between electromechan- called single-frequency or SF signaling. The most com-
ical switches was sending dial pulses, equivalent to a mon form of this used a steady 2,600 Hz tone to identify
rotary dial's pulsing, but sent over trunk circuits between
a trunk as idle. Trunk circuitry hearing a 2,600 Hz tone
switches. for a certain duration would go idle. (The duration re-
In Bell System trunks, it was common to use 20 pulse-per- quirement reduced falsing.) Some systems used tone fre-
second between crossbar switches and crossbar tandems. quencies over 3,000 Hz, particularly on SSB frequency
This was twice the rate of Western Electric/Bell System division multiplex microwave radio relays.
telephone dials. Using the faster pulsing rate made trunk On T-carrier digital transmission systems, bits within
utilization more ecient because the switch spent half as the T-1 data stream were used to transmit supervision.
long listening to digits. DTMF was not used for trunk By careful design, the appropriated bits did not change
signaling. voice quality appreciably. Robbed bits were translated
Multi-frequency (MF) was the last of the pre-digital to changes in contact states (opens and closures) by elec-
methods. It used a dierent set of tones sent in pairs tronics in the channel bank hardware. This allowed di-
like DTMF. Dialing was preceded by a special keypulse rect current E and M signaling, or dial pulses, to be sent
(KP) signal and followed by a start (ST). Variations of between electromechanical switches over a digital carrier
the Bell System MF tone scheme became a CCITT stan- which did not have DC continuity.
dard. Similar schemes were used in the Americas and in
some European countries including Spain. Digit strings
between switches were often abbreviated to further im-
prove utilization.
For example, one switch might send only the last four or Sounds
ve digits of a telephone number. In one case, seven digit
numbers were preceded by a digit 1 or 2 to dierentiate
between two area codes or oce codes, (a two-digit-per- A characteristic of electromechanical switching equip-
call savings). This improved revenue per trunk and re- ment is that the maintenance sta could hear the mechan-
duced the number of digit receivers needed in a switch. ical clattering of Strowgers, panel switches or crossbar
Every task in electromechanical switches was done in big relays. Most Bell System central oces were housed in
metallic pieces of hardware. Every fractional second cut reinforced concrete buildings with concrete ceilings and
o of call set up time meant fewer racks of equipment to oors.
handle call trac. In rural areas some smaller switching facilities, such as
Examples of signals communicating supervision or call community dial oces (CDOs), were housed in prefabri-
progress include E and M signaling, SF signaling, and cated metal buildings. These facilities almost always had
robbed-bit signaling. In physical (not carrier) E and M concrete oors. The hard surfaces reected sounds.
trunk circuits, trunks were four wire. Fifty trunks would During heavy use periods, it could be dicult to con-
require a hundred pair cable between switches, for ex- verse in a central oce switch room due to the clatter of
ample. Conductors in one common circuit conguration calls being processed in a large switch. For example, on
were named tip, ring, ear (E) and mouth (M). Tip and Mothers Day in the US, or on a Friday evening around
ring were the voice-carrying pair, and named after the 5pm, the metallic rattling could make raised voices nec-
tip and ring on the three conductor cords on the manual essary. For wire spring relay markers these noises resem-
operators console. bled hail falling on a metallic roof.
In two-way trunks with E and M signaling, a handshake On a pre-dawn Sunday morning, call processing might
took place to prevent both switches from colliding by di- slow to the extent that one might be able to hear individ-
aling calls on the same trunk at the same time. By chang- ual calls being dialed and set up. There were also noises
ing the state of these leads from ground to 48 volts, the from whining power inverters and whirring ringing gen-
switches stepped through a handshake protocol. Using erators. Some systems had a continual, rhythmic clack-
DC voltage changes, the local switch would send a signal clack-clack from wire spring relays that made reorder
to get ready for a call and the remote switch would reply (120 ipm) and busy (60 ipm) signals.
with an acknowledgment to go ahead with dial pulsing.
Bell System installations typically had alarm bells, gongs,
This was done with relay logic and discrete electronics.
or chimes to announce alarms calling attention to a failed
These voltage changes on the trunk circuit would cause switch element. A trouble reporting card system was con-
pops or clicks that were audible to the subscriber as nected to switch common control elements. These trou-
the electrical handshaking stepped through its protocol. ble reporting systems punctured cardboard cards with a
Another handshake, to start timing for billing purposes, code that logged the nature of a failure. Reed relay tech-
caused a second set of clunks when the called party an- nology in stored program control exchange nally quieted
swered. the environment.
272 CHAPTER 69. TELEPHONE EXCHANGE
Maintenance tasks tem and provided a wide range of advanced services. Lo-
cal versions were called ARE11 while tandem versions
Electromechanical switching systems required sources of were known as ARE13. They were used in Scandinavia,
electricity in form of direct current (DC), as well as al- Australia, Ireland and many other countries in the late
ternating ring current (AC), which were generated on- 1970s and into the 1980s when they were replaced with
site with mechanical generators. In addition, telephone digital technology.
switches required adjustment of many mechanical parts. These systems could use the old electromechanical sig-
Unlike modern switches, a circuit connecting a dialed call naling methods inherited from crossbar and step-by-step
through an electromechanical switch had DC continuity switches. They also introduced a new form of data
within the local exchange area via metallic conductors. communications: two 1ESS exchanges could communi-
The design and maintenance procedures of all systems cate with one another using a data link called Common
involved methods to avoid that subscribers experienced Channel Interoce Signaling, (CCIS). This data link was
undue changes in the quality of the service or that they based on CCITT 6, a predecessor to SS7. In European
noticed failures. A variety of tools referred to as make- systems R2 signalling was normally used.
busys were plugged into electromechanical switch ele-
ments upon failure and during repairs. A make-busy
identied the part being worked on as in-use, causing the 69.2.3 Digital switches
switching logic to route around it. A similar tool was
called a TD tool. Delinquent subscribers had their ser-
vice temporarily denied (TDed). This was eected by
plugging a tool into the subscribers oce equipment on
Crossbar systems or line group in step-by-step switches.
The subscriber could receive calls but could not dial out.
Strowger-based, step-by-step oces in the Bell System
required continuous maintenance, such as cleaning. Indi-
cator lights on equipment bays in step oces alerted sta
to conditions such as blown fuses (usually white lamps)
or a permanent signal (stuck o-hook condition, usually
green indicators). Step oces were more susceptible to
single-point failures than newer technologies.
Crossbar oces used more shared, common control cir-
cuits. For example, a digit receiver (part of an element
called an Originating Register) would be connected to a A typical satellite PBX with front cover removed.
call just long enough to collect the subscribers dialed dig-
its. Crossbar architecture was more exible than step of- Digital switches work by connecting two or more digital
ces. Later crossbar systems had punch-card-based trou- circuits, according to a dialed telephone number or other
ble reporting systems. By the 1970s, automatic number instruction. Calls are set up between switches. In modern
identication had been retrotted to nearly all step-by- networks, this is usually controlled using the Signalling
step and crossbar switches in the Bell System. System 7 (SS7) protocol, or one of its variants. Many
networks around the world are now transitioning to voice
over IP technologies which use Internet-based protocols
Electronic switches such as the Session Initiation Protocol (SIP). These may
have superseded TDM and SS7 based technologies in
Electronic switching systems gradually evolved in stages some networks.
from electromechanical hybrids with stored program con- The concepts of digital switching were developed by var-
trol to the fully digital systems. Early systems used ious labs in the United States and in Europe from the
reed relay-switched metallic paths under digital control. 1930s onwards. The rst prototype digital switch was de-
Equipment testing, phone numbers reassignments, circuit veloped by Bell Labs as part of the ESSEX project while
lockouts and similar tasks were accomplished by data en- the rst true digital exchange to be combined with digital
try on a terminal. transmission systems was designed by LCT (Laboratoire
Examples of these systems included the Western Elec- Central de Telecommunications) in Paris. The rst digi-
tric 1ESS switch, Northern Telecom SP1, Ericsson AKE, tal switch to be placed into a public network was the Em-
Philips PRX/A, ITT Metaconta, British GPO/BT TXE press Exchange in London, England which was designed
series and several other designs were similar. Ericsson by the General Post Oce research labs. This was a tan-
also developed a fully computerized version of their ARF dem switch that connected three Strowger exchanges in
crossbar exchange called ARE. These used a crossbar the London area. The rst commercial roll-out of a fully
switching matrix with a fully computerized control sys- digital local switching system was Alcatel's E10 system
69.2. TECHNOLOGIES 273
NEC NEAX used in Japan, New Zealand and many Telephone switches are usually owned and operated by a
other countries. telephone service provider or carrier and located in their
premises, but sometimes individual businesses or private
Marconi System X originally developed by GPT and commercial buildings will house their own switch, called
Plessey is a type of digital exchange used by BT a PBX, or Private branch exchange.
Group in the UK public telephone network.
Digital switches encode the speech going on, in 8,000 69.2.4 The switchs place in the system
time slices per second. At each time slice, a digital PCM
representation of the tone is made. The digits are then Telephone switches are a small component of a large net-
sent to the receiving end of the line, where the reverse work. A major part, in terms of expense, maintenance,
274 CHAPTER 69. TELEPHONE EXCHANGE
The structure of a switch is an odd number of layers nections between layers in the switch are allocated using
of smaller, simpler subswitches. Each layer is intercon- rst-in-rst-out lists (queues). As a result, if a connec-
nected by a web of wires that goes from each subswitch, tion is faulty or noisy and the customer hangs up and re-
to a set of the next layer of subswitches. In most designs, dials, they will get a dierent set of connections and sub-
a physical (space) switching layer alternates with a time switches. A last-in-rst-out (stack) allocation of connec-
switching layer. The layers are symmetric, because in a tions might cause a continuing string of very frustrating
telephone system callers can also be callees. failures.
A time-division subswitch reads a complete cycle of time
slots into a memory, and then writes it out in a dierent
order, also under control of a cyclic computer memory. 69.6 Fire and disaster recovery
This causes some delay in the signal.
A space-division subswitch switches electrical paths, of-
ten using some variant of a nonblocking minimal span-
ning switch, or a crossover switch.
In May 1988, a central oce re in the Chicago sub- [2] Private Telegraphs, The Sydney Morning Herald, credited
urb of Hinsdale, Illinois knocked out 35,000 local sub- to The Times, April 19, 1878, p. 6.
scribers, broke the link between the FAA and air traf-
[3] Bo Leuf (2002). Peer to Peer: Collaboration and Shar-
c control at Chicago O'Hare International Airport (then
ing Over the Internet. Addison-Wesley. p. 15. ISBN
the worlds busiest) and disrupted the Midwests ability to 9780201767322.
communicate with the rest of the country. The oce had
a re alarm but no automatic re suppression equipment. [4] Alvin K. Benson (2010). Inventors and inventions Great
The facility was unattended and monitored remotely by an lives from history Volume 4 of Great Lives from History:
Illinois Bell technician in Springeld; it took an hour to Inventors & Inventions. Salem Press. p. 1298. ISBN
notify reghters of the blaze as the distant technicians 9781587655227.
attempts to call the re department in Hinsdale did not [5] TIVADAR PUSKS (1844 - 1893)
get through. The re had already knocked out the phone
lines.[22] [6] SZTNH. Mszh.hu. Retrieved 2012-07-01.
In 1991, all twenty-eight exchanges serving Kuwait were [7] Pusks, Tivadar. Omikk.bme.hu. Retrieved 2012-07-
out of service in the wake of a 1990 invasion by Iraq; 01.
equipment had been looted and central oces destroyed.
Service was initially restored via satellite.[23] [8] Welcome hunreal.com - BlueHost.com. Hunreal.com.
Archived from the original on 2012-03-16. Retrieved
On September 11, 2001 a terrorist attack destroyed a cen- 2012-07-01.
tral oce in the World Trade Center in New York City
and heavily damaged an adjacent exchange. The Verizon [9] Frank Lewis Dyer: Edison His Life And Inventions.
(page: 71)
Building at 140 West Street was restored by 3500 work-
[24]
ers at a cost of $1.2 billion, after 200,000 voice lines [10] 120 Year Telephone anniversary
and three million data circuits had been knocked out of
operation.[25] [11] See National Park Service rst switchboard page.
The central exchange, due to the systems design, is al- [12] Early Manchester telephone exchanges (PDF).
most always a single point of failure for local calls. As mosi.org.uk. Retrieved 2013-07-30.
the capacity of individual switches and the optical bre
[13] Francis S. Wagner: Hungarian Contributions to World
which interconnects them increases, potential disruption Civilization - Page 68
caused by destruction of one local oce will only be mag-
nied. Multiple bre connections can be used to pro- [14] Calvert, J. B. (2003-09-07). Basic Telephones. Re-
vide redundancy to voice and data connections between trieved 2007-09-13.
switching centres, but careful network design is required
[15] http://www.strombergcarlsontelephone.com/kellogg/
to avoid situations where a main bre and its backup both
PDF/1921%20SW%20BD%20INSERT.pdf
go through the same damaged central oce as a potential
common mode failure.[22] [16] Calvert, J. B. (2003-09-07). Basic Telephones, The
Switchboard (ringdown is near bottom)". Retrieved 2006-
09-13.
69.7 See also [17] Source: from Federal Standard 1037C.
Telephone exchange names [21] AT&T Tech Channel (2012-07-13). AT&T Archives :
The Town That Lost Its Voice. AT&T. Retrieved 2013-
Faraday Building - First telephone exchange in UK 07-30.
[1] General Denitions. Verizon service. Verizon Enter- [23] Operation Desert Switch (archive video, 0:17:04).
prise Solutions. AT&T. 1991.
69.9. EXTERNAL LINKS 277
Telephone hook
278
Chapter 71
279
280 CHAPTER 71. TELEPHONE NUMBER MAPPING
side, the User Agent (UA) piece of software of the di- ENUM domain 1.2.3.4.5.6.7.8.9.4.3.e164.arpa.
aller will allow to dial a E.164 number, but the dialler
UA will convert it into a URI, to be used for looking- A request is sent to the DNS for the
up at the ENUM gateway DNS and fetch the NAPTR NAPTR record of the domain name
record obtaining the called party wishes about how the 1.2.3.4.5.6.7.8.9.4.3.e164.arpa.
call should be forwarded or terminated (again, either on The query returns a result set of NAPTR records, as
IP or on PSTN terminations). per RFC 3403. In the example above, the response
Calling by using a new personal E.164 number (the is an address that can be reached in the Internet using
ENUM number) to look-up at a database is therefore an the VoIP protocol SIP per RFC 3261.
indirect calling support service.
The terminal application now sets up a communica-
The ITU ENUM allocates a specic zone, namely tion link, and the call is routed via the Internet.
e164.arpa for use with ENUM E.164 numbers on the
IP side of the network. RFC 6116 denes how any The ENUM user does not notice anything of this rever-
E.164 number, such as +1 555 42 42 can be trans- sal and the DNS database look-up, as this is done auto-
formed into a URI, by reversing the numbers, separat- matically behind the scenes using a user agent software
ing them with dots and adding the e164.arpa sux thus: in his PC or terminal, or at the PABX or Gateway. For
2.4.2.4.5.5.5.1.e164.arpa instance, when the user types the telephone number in
The URI can then be used for obtaining the Internet Pro- his web browser ENUM enabled agent and indicates what
tocol addresses for services such as the Session Initiation item of information he is looking for (email address, tele-
Protocol (SIP) VoIP telephony. In the DNS, NAPTR phone number, web address, etc.) in the PC or termi-
records are used for setting the subscriber call forward- nal the number is converted to a domain name. This is
ing/termination preferences. Therefore, the whole sys- sent to ENUM servers on the Internet, which send back
tem can 'translate' E.164 addresses to SIP addresses. An the NAPTR records associated with the name. The ac-
example NAPTR record is: cess information and any priority indicated for them are
stored in these. The user gets the requested address back
$ORIGIN 2.4.2.4.5.5.5.1.e164.arpa. IN NAPTR 100 on his PC or terminal. ENUM therefore in fact functions
10 u E2U+sip "!^.*$!sip:phoneme@example.net!" as a mechanism for translating a telephone number into a
. IN NAPTR 102 10 u E2U+mailto "!^.*$!mailto: domain name with the requested address or number as-
myemail@example.com!" . sociated with it, but without the user viewing how this is
This example species that if you want to use the done, just as he is currently unaware that he is using the
E2U+sip service, you should use sip:phoneme@ DNS when he makes a connection with the Internet or
example.net as the address. The regular expression can what is going on at the telephone switch when he makes
be used by a telephone company to easily assign ad- a call.
dresses to all of its clients. For example, if your number
is +15554242, your SIP address is sip:4242@555telco.
example.net; if your number is +15551234, your SIP ad- 71.3 Uses
dress is sip:1234@555telco.example.net.
The following Figure illustrates how ENUM works by 71.3.1 Call forwarding
giving an example: Subscriber A sets out to call Sub-
scriber B.
The user agent of an ENUM-enabled subscriber ter- Call forwarding with ENUM
minal device, or a PBX, or a gateway, translates the
request for the number +34 98 765 4321 in accor- One way of doing call forwarding with ENUM is illus-
dance with the rule described in RFC 6116 into the trated in the next gure. The caller uses the telephone
71.4. ENUM VARIETIES 281
to dial the number of another subscriber, which leads have published the ENUM number and have entered (via
to an ENUM lookup (such as is provided by SIP Bro- ENUM NAPTR) his/her wishes for how the call should
ker). The DNS responds to the caller by returning a be terminated. This might be a single VoIP identier,
list with NAPTR records for VoIP communication, tele- but most likely it will be a list of how the call should be
phone numbers and email addresses. Next, an attempt forwarded to various xed-line, cellphones, secretarial or
will be made, using the VoIP record from this list, to es- voice mail services, either at the IP or at the PSTN side of
tablish a connection with the subscriber. If the subscriber the network. It is the called party choice to opt-in ENUM
is not online, the next record selected will be that for a and also to decide to let the calling party know her/his
connection to a PSTN or mobile telephone. If this at- wishes.
tempt fails too, a voice message will be sent to the sub- Today when a user places a regular phone call, he has to
scriber via a listed email address.
begin deciding how to establish the call with the other
Subdomains of e164.arpa are delegated on a country- party: via VoIP, Fixed-line PSTN, cellphone, entering a
code basis by the ITU. Each delegation is normally made URI or dialling a number. With ENUM indirect dialling
to a regulatory body designated by the national gov- it is the called party wishes that matter and solve that de-
ernment for the country code concerned. What hap- cision. Another benet of indirect dialling is to free the
pens at a country level is a National Matter. In gen- user to change his phone telco, webpage, IMS, email or
eral the conventional DNS registry-registrar model is whatever telecom service he uses without having to tell
used. The national ENUM registry manages and operates all his contacts about that.
the DNS infrastructure and related systems for country- A presence enhanced ENUM facility having various pro-
code.e164.arpa. It takes registration requests from regis- les could automatically change the called party wishes
trars who are agents of the end users, the registrants. Reg- as a function of where he/she is available. This could be
istrars are typically VoIP providers and telcos who bundle a mechanism to automatically switch between cellphone
an ENUM registration as part of a VoIP service package. and VoIP to the most convenient (or the less costing) ter-
People using an ENUM-enabled VoIP service can dial the mination.
registrants existing number and be connected to the reg-
istrants VoIP telephone over the Internet instead of us-
ing the PSTN. When they call someone who does not use
ENUM, calls complete over the Public Switched Tele- 71.4 ENUM varieties
phone Network or PSTN in the usual manner. Support
for .e164.arpa varies widely between countries; many do One potential source of confusion, when talking about
not support it at all. ENUM, is the variety of ENUM implementations in place
Alternative ENUM-like registries such as E164.org have today. Quite often, people speaking of ENUM are really
also emerged. These services verify PSTN numbers referring to only one of the following:
and can be used in addition to or as an alternative to
e164.arpa. However, if the registry in which a callees Public ENUM: The original vision of ENUM as
number is not known by the caller, the choice between a global, public directory-like database, with sub-
registries can create confusion and complexity. Multiple scriber opt-in capabilities and delegation at the
DNS lookups may be needed and it is far from simple country code level in the e164.arpa domain. This
to know which E.164 numbers are registered in which of is also referred to as user ENUM.
these alternate ENUM-like trees. It is also possible that
if an E.164 number is registered in several of these trees, Open Enum: An eort of mobile carriers and
there can be inconsistencies in the information that is re- other parties involved in mobile numbering plans
turned. Furthermore, the subscriber owning a particu- to generate complete, public database of all inter-
lar E.164 number may not be aware that their number has national numbering plan, available via public dns
been entered into one or more of these alternate ENUM- (e164num.eu)
like trees or what information these alternate trees are re-
turning for their E.164 number. Private ENUM: A carrier, VoIP operator or ISP may
use ENUM techniques within its own networks, in
the same way DNS is used internally to networks.
71.3.2 Called party facility Carrier ENUM: Groups of carriers or communica-
tion service providers agree to share subscriber in-
ENUM can also be viewed as a called party facility. Ba- formation via ENUM in private peering relation-
sically, it is an indirect dialling service designed to work ships. The carriers themselves control subscriber
seamlessly on PSTN and VoIP that builds on the great information, not the individuals. Carrier ENUM is
value of the E.164 numbers: billions of people knowing also referred to as infrastructure ENUM, and is being
how to dial using numbers. the subject of new IETF recommendations to sup-
If the called person has opted to use ENUM she/he will port VoIP peering.....
282 CHAPTER 71. TELEPHONE NUMBER MAPPING
71.5 Parties having a direct inter- Hence, if the registrant wishes to change his initial num-
ber holder operator (that might also coincide being
est in ENUM his gateway operator) there have to be provisions for
the ENUM number to be ported from the initial op-
Various parties are involved with ENUM. These include: erator to other number holder operators.
The registrant or subscriber The registrant is the per- You can nd more information and further parties in-
son or subscriber that makes his access information volved in the ENUM ecosystem in RFC 4725.
available to others through ENUM. The registrant
or subscriber is thus the person whose information
has been included in ENUM and must not be con- 71.6 See also
fused with the person who uses the Internet to nd
an address through ENUM.
Carrier of Record
The registrar The registrar is the party who manages DNS mapping of E.164 numbers
the registrants access information and ensures that
it is publicly available on the Internet.
71.7 References
The registry The registry is the manager of a national
ENUM zone. The registry forms, as it were, the top RFC 6116 - The E.164 to Uniform Resource Identi-
of the national ENUM hierarchy and ensures that ers (URI) Dynamic Delegation Discovery System
reference is made to the registrars servers on which (DDDS) Application (ENUM)
the access information is located.
RFC 6117 - IANA Registration of Enumservices:
Because of the hierarchical structure of the DNS, there Guide, Template, and IANA Considerations
can only be one registry for every national ENUM
zone. To prevent abuse of this position, require- RFC 4725 - ENUM Validation Architecture
ments are strict with respect to the impartiality of RFC 3403 - Dynamic Delegation Discovery System
the registry and the costs and quality of the service. (DDDS) Part Three: The Domain Name System
In addition every registrant must receive equal and (DNS) Database
open access.
ENUM - The bridge between telephony and internet
The government or the regulator Usually a govern- ENUM - Its All in the Numbers
mental entity or a regulatory authority has control
over the National zone of ENUM and will play a http://www.itu.int/osg/spu/enum/
role in the appointment of the registry.
areacode redirects here. It is not to be confused with a country calling code (country code) for each state or
Areekode. region which is prexed to each national numbering plan
telephone number for international destination routing.
A telephone numbering plan is a type of numbering Private numbering plans exist in telephone networks that
scheme used in telecommunication to assign telephone are privately operated in an enterprise or organizational
numbers to subscriber telephones or other telephony end- campus. Such systems may be supported by a private
points. Telephone numbers are the addresses of partici- branch exchange (PBX) which controls internal commu-
pants in a telephone network, reachable by a system of nications between telephone extensions.
destination code routing. Telephone numbering plans are In contrast to numbering plans, which determine tele-
dened in each of administrative regions of the public phone numbers assigned to subscriber stations, a dial plan
switched telephone network (PSTN) and they are also establishes the customer dialing procedures, i.e. the se-
present in private telephone networks. quence of digits users are required to dial to reach a des-
Numbering plans may follow a variety of design strate- tination. Even in closed numbering plans, it is not always
gies which have often arisen from the historical evolution necessary to dial all digits of a number. For example, an
of individual telephone networks and local requirements. area code may often be omitted when the destination is
A broad division is commonly recognized, distinguishing in the same area as the calling station.
open numbering plans and closed numbering plans. A
closed numbering plan imposes a xed number of dig-
its to every telephone number, while an open numbering
plan allows variance in the numbers of digits. Many num- 72.1 North American Numbering
bering plans subdivide their territory of service into ge-
ographic regions designated by an area code, which is a
Plan
xed-length or variable-length set of digits forming the
most-signicant part of the dialing sequence to reach a Main article: North American Numbering Plan
telephone subscriber.
The North American Numbering Plan is a closed num- In early telephone systems, connections were made in the
bering plan[1][2] which prescribes ten digits for each com- central oce by switchboard operators using patch cords
plete destination routing code that is divided into three to connect one party to another. To make a telephone
parts. The most signicant part is a three-digit Number- call, a person would wind a crank to generate a ring sig-
ing Plan Area (NPA) code (area code). Within each plan nal to the central oce operator, either before or after the
area central oces are numbered with a three-digit cen- user took the telephone handset o-hook. At the central
tral oce (CO) code, the second part. The remaining oce a gong or later an electric light indicated the need
four digits number the specic line assigned to each tele- to respond to the customer, upon which the operator in-
phone. Other countries with open numbering plans may serted a patch cord into a socket and assisted the customer
use variable-length numbers; in some, such as Finland, with the call by voice. Another patch cord connected the
subscriber numbers may vary in length even within a lo- caller to the destination telephone line. If the destination
cal exchange. party belonged to another exchange, the operator used a
The International Telecommunication Union (ITU) has patch cord to connect to that exchange where an operator
established a comprehensive numbering plan, designated would complete the call setup. As technology advanced,
E.164, for uniform interoperability of the networks of its automatic electro-mechanical switches were introduced
member state or regional administrations. It is an open and telephones were equipped initially with rotary dials
numbering plan, however, imposing a maximum length for pulse-dialing and then Touch-Tone key pads in the
of 15 digits to telephone numbers. The standard denes 1960s, which increased the speed of dialing and enabled
other vertical telephone features.
283
284 CHAPTER 72. TELEPHONE NUMBERING PLAN
In the United States and Canada, area codes were rst example, 305 was split in 1995, and had served both the
allocated in 1947 and some large cities used soon after Miami and Fort Lauderdale area. Dade County (Miami-
as operator routing codes for connecting long-distance Dade) kept 305 and Broward County (Fort Lauderdale
telephone calls between toll switching centers.[3] The rst area) had to change to 954. Another method was us-
customer-dialed long-distance calls were possible in En- ing area code overlays, which avoided renumbering ex-
glewood, NJ in 1951. By 1966, the system was imple- isting stations. An overlay is a new area code that covers
mented fully in both countries.[4] the same geographical area as an existing code. Over 75
[7]
The Bell System organized the numbering plan to min- overlays have been introduced since 1995.
imize the cost of providing automatic dialing to large Area code overlays invariably require ten-digit dialing of
population centers, as calls crossing numbering plan area telephone numbers in the numbering plan area. Internet
boundaries were required to be switched by special toll telephony services are not tied to physical locations and
switching systems. Thus, it was avoided to cut heav- area codes often no longer correspond to the physical lo-
ily used toll routes by area boundaries. Tributary routes cation of the provider, nor the subscriber.[8]
were placed into the same area as the major toll center.[5]
States that foreseeably required more than ca. 500 central
oces, a technical limitation of the number plan, were 72.2 Number structure
split into multiple areas, receiving a code with the mid-
dle digit being 1, while area codes that covered an entire
state, had the digit 0 in the middle. In contrast to the Most national telephone administrations issue telephone
area code, the second digit of the three-digit exchange numbers that conform to the E.164 numbering plan.
code was never 0 or 1, thus aording a simple rule for E.164 conformant telephone numbers consist of a
recognition of whether a user was dialing a full ten-digit country calling code and a national telephone number.
telephone number or merely dialing within the local area National telephone numbers are dened by national or
code using seven-digit dialing. Toll operators were able regionalo numbering plans, such as the European Tele-
to dierentiate between the two types of areas from the phony Numbering Space, the North American Number-
middle digit of the area code when a routing operator had ing Plan (NANP), or the UK number plan.
to be consulted.[6] Numbering plans also decide on the routing of Signaling
By the 1990s, the electromechanical central oce System 7 (SS7) signaling messages as part of the Global
switches were replaced with electronic switching system Title. In public land mobile networks, the E.212 num-
(ESS) equipment and the previous area code logic was bering plan is used for subscriber identities, e.g., stored
no longer necessary. The demand for telephone numbers in the GSM SIM, while E.214 is used for routing database
was increasing rapidly, and the remaining n0n and n1n queries across PSTN networks.
combinations were insucient to sustain growth. This In general, the structure of telephone numbers issues
area code scheme was abandoned, with the result that area within a national telephone numbering plan follow both
codes and central oce codes could not necessarily be the international formats and the national standards. With
automatically distinguished by the switching equipment. in the international system administered by the ITU, each
The solution was to require the dialing of a preceding 1 national plan has a unique country code.
for calls across area codes, in which case the equipment
Within the national numbering plan, a complete destina-
expected 10 more digits. If the rst digit dialed was not
tion telephone number is composed of an area code and
a 1, only 7 digits were expected and the area code was
a subscriber telephone number.
inferred from the originating subscribers area code. For
a short while, in some area codes, one could enter the full The subscriber number is the number assigned to a line
11 digits for a call within their own neighborhood or just connected to customer equipment. It must always be di-
enter the last 7 digits, and the call would be routed and aled in its entirety. The rst few digits of the subscriber
billed identically. number typically indicate smaller geographical areas or
individual telephone exchanges. In mobile networks they
The rising popularity of fax machines and pagers required
may indicate the network provider. Callers in a given
far more telephone numbers than were anticipated in the
area or country usually do not need to include the par-
design of the numbering system. As a remedy, the re-
ticular area prexes when dialing within the same area.
strictions on the format of area codes were eased. Since
Devices that dial telephone numbers automatically may
1995, over 380 new area codes were added to the North
include the full number with area and access codes.
American Numbering Plan. Some areas used area code
splits, by which an existing numbering plan area (NPA)
was split into multiple divisions each assigned a new area
code. Thus, many businesses were required to reprint 72.3 Country code
business stationery, catalogs, and directories. Area code
splits were often contested as to which area could keep the Country codes are necessary only when dialing telephone
existing code, which usually fell to the largest city. For numbers in other countries than the originating telephone.
72.5. CALL PRICING BASED ON AREA CODES 285
These are dialed before the national telephone number. outside the code area, from mobile phones, and, espe-
By convention, international telephone numbers are indi- cially within North America, within overlay plans. Area
cated by prexing the country code with a plus sign (+), codes historically designated geographical areas served
which is meant to indicate that the subscriber must dial by perhaps hundreds of telephone exchanges, although
the international dialing prex in the country from which the strict correlation to a geographical area has been bro-
the call is placed. For example, the international dialing ken by technical advances.[9]
prex or access code in all NANP countries is 011, while The area code is usually preceded in the dialing sequence
it is 00 in most European countries. On GSM networks, + by either the national access code (0 for many countries,
is an actual keypad code that may be recognized automat-
1 in USA and Canada) or the international access code
ically by the network carrier in place of the international and country code. However, this is not always the case,
access code.
especially when 10-digit dialing is used. For example, in
Montreal, where area codes 514, 438, 450 and 579 are
in use, users dial 10-digit numbers (e.g., 514 555 1234),
72.4 Area code dialing a 1 before this results in a recording advising not
to dial a 1 as it is a local call. For non-geographic num-
Many numbering plans are structured based on divisions bers, as well as mobile telephones outside of the North
into geographic areas of the service territory. Each plan American Numbering Plan area, the area code does not
area is assigned a numeric routing code. This concept was correlate to a particular geographic area. However, until
rst developed in the North American Numbering Plan the 1990s, some areas in the United States and Canada
in 1947, which divided the North American service ter- required the use of a 1 before dialing a 7-digit number
ritories into numbering plan areas (NPAs) and called the within the same area code if the call was beyond the local
numerical prex the numbering plan area code, which be- toll-free area, indicating that the caller wished to make
came known in a short-form as area code. This area code what was referred to as a toll call.
was prexed to each telephone number assigned within Area codes are often quoted by including the national ac-
each area. cess code. For example, a number in London should be
National telecommunication authorities use various for- listed as 020 7946 0321. Users must correctly interpret
mats for area codes. When the Bell System designed the 020 as the code for London. If they call from another
the area codes concept, the three-digit format was NBX, station within London, they may merely dial 7946 0321,
where N could be any digit from 2 through 9, B either 0 or if dialing from another country, the initial 0 should be
or 1, and X any digit, although no area code ended in 0 omitted after the country code: +44 20 7946 0321.
until the toll-free code 800 was introduced. The pattern
of assignment to geographical areas avoided nearby areas
having similar area codes, to avoid confusion and mis-
dialed numbers. In 1995, during the expansion of area 72.5 Call pricing based on area
codes the center-digit rule was relaxed, dening it as any codes
digit except 9. 9 as the middle digit of an NPA is reserved
in case the three-digit area code pool is exhausted and has
In countries other than the United States and Canada, the
to be augmented to four digits.
area codes generally determine the cost of a call, and calls
Common format are: within an area code and often a small group of adjacent
or overlapping area codes are normally charged at a lower
A xed length, e.g., three digits in the United States rate than outside the area code. This is not necessarily the
and Canada as dened in the NANP; two digits in case in the United States or Canada, where area codes
Brazil; one digit in Australia and New Zealand, cover a suciently large territory that dierent rates will
apply within the same area code and toll rates may be
A variable length, e.g., between 2 and 5 in Germany, determined by the distance between rate centers. The
Argentina, and in the United Kingdom; between 1 area code and central oce prex (NPA-NXX) dene
and 5 in Japan and between 1 to 4 in Austria; 1 or 2 the rate center, which is assigned geographic coordinates
in Syria and Peru. V&H. Each rate center has a local calling plan that deter-
mines which other rate centers are a local call, regardless
of distance, and other tolls are based on the tari dis-
Area codes may also be included in the subscriber num-
tance between the two rate centers, using this formula:
ber, as is the case in many countries, such as Spain,
(V 1V 2)2 +(H1H2)2
Norway or Uruguay. These systems use a closed tele- 10 .
phone numbering plan. Therefore, calls between nearby rate centers in dierent
In the UK, area codes were rst known as subscriber area codes may be cheaper than calls to more distant rate
trunk dialling (STD) codes. Depending on local dial centers in the same area code. Rates are set in zones of
plans, they are often necessary only when dialed from 0-6 mi, 6-12 mi, and so on, with these bands determined
286 CHAPTER 72. TELEPHONE NUMBERING PLAN
on a state-by-state basis for intrastate calls (calls within for local calls within the area code, as well as alternate,
the same state) and determined by federal regulation for optional sequences, such as adding the trunk code 1 be-
interstate calls (calls which cross a state line). As a spe- fore the telephone number.
cic example, callers in the Falls Church, Virginia, rate
center, which is ocially named Washington Zone 17,
VAexample numbers begin with 703-534, V=5636, 72.6.1 Variable-length dialing
H=1600, may make unmetered local calls to 31 other
nearby rate centers in Virginia, Maryland, and the Dis- Despite a closed numbering plan, dierent dialing pro-
trict of Columbia in area codes 703, 571, 202, 301, and cedures exist in many of the territories for local and long
240, while calls to distant locations in 703, such as Man- distance telephone calls. This means that to call another
assas and Haymarket, VA, are charged as long distance. number within the same city or area, callers need to dial
only a subset of the full telephone number. For exam-
Calls within a state [regulated by that states public util- ple, in the NANP, only the 7-digit number may need to
ities commission] are often higher than rates to call be dialed, but for calls outside the area, the full number
more distant locations in some other state [regulated by including the area code is required. In these situations,
the Federal Communications Commission]. The partial the ITU-T Recommendation E.123 suggests to list the
deregulation and introduction of competition for long- area code in parentheses, signifying that in some cases
distance phone services has established other methods of the area code is optional or is not required. Typically
determining call pricing that do not necessarily follow the the area code is prexed by a domestic trunk access code
traditional model. Each year, more customers switch to a (usually 0) when dialing from inside a country, but is not
xed rate, all-you-can-dial plan covering the state, the necessary when calling from other countries, but there are
United States, or all North America generally (as of May exceptions, such as for Italian land lines.
2008 and exclusive of taxes) for approximately $30 per
month. Competition with cable telephony and Voice over To call a number in Sydney, Australia, for example:
Internet Protocol services has helped drive the cost of ser-
vice down for residential and business customers. xxxx xxxx (within Sydney and other locations within
New South Wales and the Australian Capital Terri-
Special area codes are generally used for free, premium-
tory - no area code required)
rate, mobile phone systems (in countries where the mo-
bile phone system is caller pays) and other special-rate (02) xxxx xxxx (outside New South Wales and the
numbers. There are, however, some exceptions: in some Australian Capital Territory, but still within Aus-
countries, such as Egypt, calls are charged at the same tralia - the area code is required)
rate regardless of area and in others, such as the UK, an
area code is occasionally treated as two areas with dier- +61 2 xxxx xxxx (outside Australia)
ent rates.
The plus character (+) in the markup signies that the fol-
Landline telephony operators in United States maintain
lowing digits are the country code, in this case 61. Some
a separate pricing structure for IntraLATA phone calls,
phones, especially mobile telephones, allow the + to be
also known as local long distance. The tari rate for
entered directly. For other devices the user must replace
these calls to nearby areas may greatly exceed the rates
the + with the international access code for their current
for long distance dometic calls that are on the other side
[10] location.
of the continent.
New Zealand has a special case dial plan. While most
nations require the area code to be dialed only if it is dif-
72.6 Subscriber dialing procedures ferent, in New Zealand, one needs to dial the area code if
the phone is outside the local calling area. For example,
the town of Waikouaiti is in the Dunedin City Council ju-
A dial plan establishes the expected sequence of digits risdiction, and has phone numbers (03) 465 7xxx. To call
dialed on subscriber premises equipment, such as tele- the city council in central Dunedin (03) 477 4000, resi-
phones, in private branch exchange (PBX) systems, or in dents must dial the number in full including the area code
other telephone switches to eect access to the telephone even though the area code is the same, as Waikouaiti and
networks for the routing of telephone calls, or to eect Dunedin lie in dierent local calling areas (Palmerston
or activate specic service features by the local telephone and Dunedin respectively)[11]
company, such as 311 or 411 service.
In the United States, Canada, and other countries or
A variety of dial plans may exist within a numbering plan territories using the North American Numbering Plan
and these often depend on the network architecture of the (NANP), the international trunk access code is 1, which
local telephone operating company. is also the country calling code. The same rule also ap-
Within the North American Numbering Plan, the admin- plies in many parts of the NANP, including all areas of
istration denes standard and permissive dialing plans, Canada that still have variable-length dial plan. This is not
specifying the number of mandatory digits to be dialed universal, as there are locations within the United States
72.6. SUBSCRIBER DIALING PROCEDURES 287
that allow long distance calls within the same area code to 1 610 xxx xxxx (calls from numbers outside the
be dialed as seven digits. In Canada, the domestic trunk 610/484 and 215/267 area codes; second of two
code (long distance access code) must also be dialed along completion options for mobile phones within the
with the area code for long distance calls even within the U.S.)
same area code. For example, to call a number in Regina
in area code 306 (Regina and the rest of the province of +1 610 xxx xxxx (outside the NANP)
Saskatchewan are also served by the overlay code 639):
In California & New York, because of the existence of
306 xxx xxxx (within Regina, Lumsden and other both overlay area codes (where an area code must be di-
local areas) aled for every call) and non-overlay area codes (where an
area code is dialed only for calls outside the subscribers
1 306 xxx xxxx (within Saskatchewan, but home area code), permissive home area code dialing
not within the Regina local calling areae.g., of 1 + the area code within the same area code, even if
Saskatoon) no area code is required, has been permitted since the
mid-2000s (decade). For example, in the 213 area code
1 306 xxx xxxx (anywhere within the NANP outside (a non-overlay area code), calls may be dialed as 7 digits
Saskatchewan) (XXX-XXXX) or 1-213 + 7 digits. The manner in which
a call is dialed does not aect the billing of the call. This
+1 306 xxx xxxx (outside NANP) permissive home area code dialing helps maintain uni-
formity and eliminates confusion given the dierent types
To call a number in Oakland, California, which has only of area code relief that has made California the nations
one area code, the dialing procedure varies: most area code intensive State. Unlike other states with
overlay area codes (Texas, Maryland, Florida and Penn-
sylvania and others), the California Public Utilities Com-
xxx xxxx (local or long-distance within area code
mission and the New York State Public Service Commis-
510, no area code required)
sion maintains two dierent dial plans: Landlines must
1 510 xxx xxxx (local or long-distance outside of dial 1 + area code whenever an Area Code is part of the
510 but within the U.S., Canada, and other countries dialed digits while cellphone users can omit the 1 and
in the NANP) just dial 10 digits.
Many organizations have private branch exchange sys-
+1 510 xxx xxxx (outside the NANP - 1 is the coun- tems which permit dialing the access digit(s) for an out-
try code for the U.S.) side line (usually 9 or 8), a 1 and nally the local area
code and xxx xxxx in areas without overlays. This aspect
However, in parts of North America, especially where a is unintentionally helpful for employees who reside in one
new area code overlays an older area code, dialing the area code and work in an area code with one, two, or three
area code, or 1 and the area code, is required even for adjacent area codes. 1+ dialing to any area code by an
local calls. Dialing from mobile phones is dierent in the employee can be done quickly, with all exceptions pro-
U.S., as the trunk code is not necessary, although it is cessed by the private branch exchange and passed onto
still necessary for calling all long distance numbers from the public switched telephone network.
a mobile phone in Canada. Most mobile phones can be
congured to automatically add a frequently-called area
code as a prex, allowing calls within the desired area to 72.6.2 Full-number dialing
be dialed by the user as seven-digit numbers, though sent
by the phone as 10-digit numbers. In small countries or areas, the full telephone number is
used for all calls, even in the same area. This has tra-
In some parts of the United States, especially northeast- ditionally been the case in small countries and territories
ern states such as Pennsylvania served by Verizon Com- where area codes have not been required. However, there
munications, the full 10-digit number must be dialed. If has been a trend in many countries towards making all
the call is not local, the call will not complete unless the numbers a standard length, and incorporating the area
dialed number is preceded by digit 1. In this situation, code into the subscribers number. This usually makes
where the area code is not optional, the area code is not the use of a trunk code obsolete. For example, to call
enclosed in parentheses. Thus: Oslo in Norway before 1992, one would dial:
610 xxx xxxx (local calls within the 610 area code xxx xxx (within Oslo - no area code required)
and its overlay, 484, as well as calls to or from
the neighboring 215 area code and its overlay, 267. (02) xxx xxx (within Norway - outside Oslo)
Area code required; one of two completion options
for mobile phones within the U.S.) +47 2 xxx xxx (outside Norway)
288 CHAPTER 72. TELEPHONE NUMBERING PLAN
After 1992, this changed to a closed eight-digit number- Some countries already switched, but trunk prex re-
ing plan, e.g.: added with the closed dialing plan, for example in
Bangkok, Thailand before 1997:
22xx xxxx (within Norway - including Oslo)
xxx-xxxx (inside Bangkok)
+47 22xx xxxx (outside Norway)
02-xxx-xxxx (inside Thailand)
Therefore, in other countries, such as France, Belgium, +66 2-xxx-xxxx (outside Thailand)
Japan, Switzerland, South Africa and some parts of North
America where the numbering plan is closed, the trunk has been switched in 1997:
code is retained for domestic calls, whether local or na-
tional, e.g., 2-xxx-xxxx (inside Thailand)
+66 2-xxx-xxxx (outside Thailand)
Paris 01 xx xx xx xx (outside France +33 1 xxxx
xxxx)
Trunk prex has re-added in 2001
Brussels 02 xxx xxxx (outside Belgium +32 2 xxx
xxxx) 02-xxx-xxxx (inside Thailand)
Geneva 022 xxx xxxx (outside Switzerland +41 22 +66 2-xxx-xxxx (outside Thailand)
xxx xxxx)
Cape Town 021 xxx xxxx (outside South Africa +27 72.7 International numbering plan
21 xxx xxxx)
New York 1 212 xxx xxxx (outside the North Amer- The E.164 standard of the International Telecommuni-
ican Numbering Plan +1 212 xxx xxxx) cations Union is an international numbering plan and es-
tablishes a country calling code (country code) for each
Fukuoka 092 xxx xxxx (outside the Japanese Num- member organization. Country codes are prexes to na-
bering Plan +81 92 xxx xxxx) tional telephone numbers that denote call routing to the
network of a subordinate number plan administration,
while some, like Italy, require the initial zero to be dialed, typically a country, or group of countries with a uni-
even for calls from outside the country, e.g., form numbering plan, such as the NANP. E.164 permits
a maximum length of 30 digits for the complete inter-
Rome 06 xxxxxxxx (outside Italy +39 06 xxxxxxxx) national phone number. E.164 does not dene regional
numbering plans, however, it does provide recommenda-
tions for new implementations and uniform representa-
Further, there are locations with closed dialing plans in tion of all telephone numbers.
the NANP that require the full phone number including
area code to be dialed for all calls, but the trunk code is Within the system of country calling codes, the ITU has
required for only long distance calls, even in the same area dened certain prexes for special services and assigns
code. such codes for independent international networks, such
as satellite systems, spanning beyond the scope of re-
While the use of full national dialing is less user-friendly gional authorities.
than using only a local number without the area code, the
increased use of mobile phones, which can store numbers,
means that this is of decreasing importance. It also makes 72.7.1 Satellite telephone systems
easier to display numbers in the international format, as
no trunk code is requiredhence a number in Prague, Satellite phones are usually issued with numbers with
Czech Republic, can now be displayed as: a special country calling code. For example, Inmarsat
satellite phones are issued with code +870, while Global
2xx xxx xxx (inside Czech Republic) Mobile Satellite System providers, such as Iridium, issue
numbers in country code +881 (Global Mobile Satel-
+420 2xx xxx xxx (outside Czech Republic) lite System) or +882 (International Networks). Some
satellite phones are issued with ordinary phone numbers,
as opposed to before September 21, 2002:[12] such as Globalstar satellite phones issued with NANP
telephone numbers.
02 / xx xx xx xx (inside Czech Republic)
Inmarsat: +870: SNAC (Single Network Access
+420 2 / xx xx xx xx (outside Czech Republic) Code)
72.9. PRIVATE NUMBERING PLAN 289
72.11 References
[1] AT&T. Notes on the Network, Section 10, p.3 (1980).
[10] https://www.verizon.com/support/residential/phone/
homephone/billing/charges+and+taxes/explanation+of+
billing+terms/98783.htm
[11] 2010 Otago White Pages. Yellow Pages Group. pp. 8, 80,
177.
Teletrac engineering
Telecommunications trac engineering, teletrac operators should use the Erlang formulas or the Engset
engineering, or trac engineering is the application of calculation.
trac engineering theory to telecommunications. Tele-
Exchanges in the PSTN make use of trunking concepts to
trac engineers use their knowledge of statistics includ- help minimize the cost of the equipment to the operator.
ing queuing theory, the nature of trac, their practical
Modern switches generally have full availability and do
models, their measurements and simulations to make pre- not make use of grading concepts.
dictions and to plan telecommunication networks such
as a telephone network or the Internet. These tools and Overow systems make use of alternative routing circuit
knowledge help provide reliable service at lower cost. groups or paths to transfer excess trac and thereby re-
duce the possibility of congestion.
The eld was created by the work of A. K. Erlang for
circuit-switched networks but is applicable to packet- A very important component in PSTNs is the SS7 net-
switched networks, as they both exhibit Markovian prop- work used to route signalling trac. As a supporting
erties, and can hence be modeled by e.g. a Poisson arrivalnetwork, it carries all the signalling messages necessary
process. to set up, break down or provide extra services. The sig-
nalling enables the PSTN to control the manner in which
The crucial observation in trac engineering is that in trac is routed from one location to another.
large systems the law of large numbers can be used to
make the aggregate properties of a system over a long pe- Transmission and switching of calls is performed using
riod of time much more predictable than the behaviour the principle of time-division multiplexing (TDM). TDM
of individual parts of the system. allows multiple calls to be transmitted along the same
physical path, reducing the cost of infrastructure.
291
292 CHAPTER 73. TELETRAFFIC ENGINEERING
amounts of detailed historical data are available for anal- Trac mix
ysis. However, in modern broadband networks, the tele-
trac engineering methodologies used for voice net- Trac generation model
works are inappropriate.[1] Trac contract
Trac shaping
73.4 Long-tail trac
Of great importance is the possibility that extremely in- 73.7 References
frequent occurrences are more likely than anticipated.
This situation is known as long-tail trac. In some de- [1] What is the role of teletrac engineering in broadband
signs, the network might be required to withstand the networks? by Jones Kalunga cnx.org
unanticipated trac.
Deploying IP and MPLS QoS for Multiservice
Networks: Theory and Practice by John Evans,
73.5 Teletrac economics and Clarence Filsls (Morgan Kaufmann, 2007, ISBN
0-12-370549-5)
forecasting
V. B. Iversen, Teletrac Engineering handbook, ()
As mentioned in the introduction, the purpose of tele- M. Zukerman, Introduction to Queueing Theory and
trac theory is to reduce cost in telecommunications Stochastic Teletrac Models, PDF)
networks. An important tool in achieving this goal is
forecasting. Forecasting allows network operators to cal-
culate the potential cost of a new network / service for a
given QoS during the planning and design stage, thereby
ensuring that costs are kept to a minimum.
An important method used in forecasting is simulation,
which is described as the most common quantitative mod-
elling technique in use today. An important reason for
this is that computing power has become far more acces-
sible, making simulation the preferred analytical method
for problems that are not easily solved mathematically.
As in any business environment, network operators must
charge taris for their services. These charges must be
balanced with the supplied QoS. When operators supply
services internationally, this is described as trade in ser-
vices and is governed by the General Agreement on Trade
in Services (GATS).
Cellular trac
Erlang unit
Long-tail trac
Mobile QoS
Routing
RSVP-TE
Chapter 74
Time-division multiplexing
293
294 CHAPTER 74. TIME-DIVISION MULTIPLEXING
The GSM telephone system about exchanges in between, where the bandwidth
can be reserved at a xed level for a xed period of
The Tactical Data Links Link 16 and Link 22
time.
74.6 Statistical time-division mul- [1] US 2919308 Time Division Multiplex System for Signals
of Dierent Bandwidth
tiplexing
[2] Mara Isabel Ganda Carriedo (31 August 1998). ATM:
Statistical time division multiplexing (STDM) is an ad- Origins and State of the Art. Universidad Politcnica de
Madrid. Archived from the original on 23 June 2006. Re-
vanced version of TDM in which both the address of the
trieved 2009-09-23.
terminal and the data itself are transmitted together for
better routing. Using STDM allows bandwidth to be split [3] Hanrahan, H.E. (2005). Integrated Digital Communica-
over one line. Many college and corporate campuses use tions. Johannesburg, South Africa: School of Electrical
this type of TDM to distribute bandwidth. and Information Engineering, University of the Witwa-
tersrand.
On a 10-Mbit line entering a network, STDM can be used
to provide 178 terminals with a dedicated 56k connection [4] Ericsson Ltd, Understanding Telecommunications,
(178 * 56k = 9.96Mb). A more common use however is http://web.archive.org/web/20040413074912/www.
to only grant the bandwidth when that much is needed. ericsson.com/support/telecom/index.shtml, last accessed
STDM does not reserve a time slot for each terminal, April 11, 2006.
rather it assigns a slot when the terminal is requiring data [5] White, Curt (2007). Data Communications and Computer
to be sent or received. Networks. Boston, MA: Thomson Course Technology.
In its primary form, TDM is used for circuit mode com- pp. 143152. ISBN 1-4188-3610-9.
munication with a xed number of channels and constant [6] Guowang Miao; Jens Zander; Ki Won Sung; Ben Sli-
bandwidth per channel. Bandwidth reservation distin- mane (2016). Fundamentals of Mobile Data Networks.
guishes time-division multiplexing from statistical mul- Cambridge University Press. ISBN 1107143217.
tiplexing such as statistical time division multiplexing. In
pure TDM, the time slots are recurrent in a xed order
and pre-allocated to the channels, rather than scheduled
on a packet-by-packet basis.
In dynamic TDMA, a scheduling algorithm dynamically
reserves a variable number of time slots in each frame to
variable bit-rate data streams, based on the trac demand
of each data stream.[6] Dynamic TDMA is used in:
HIPERLAN/2
IEEE 802.16a
McASP
Time-division duplex
74.8 References
This article incorporates public domain material
from the General Services Administration document
Federal Standard 1037C (in support of MIL-STD-
188).
Chapter 75
Unlisted number
75.1 References
[1] http://www.telstra.com.au/aboutus/
community-environment/community-programs/
access-for-everyone/products-solutions/
296
Chapter 76
76.1 List of vertical service codes [9] When using an OBi Analog telephone adapter in conjunc-
tion with a supported service such as Google Voice dialing
*98 followed by the telephone number will transfer the
76.1.1 North America call in an unsupervised mode i.e. the transferring party
will hear three short tone bursts and then be automatically
The following are the VSCs generally used in the North disconnected from the call. This VSC is not supported by
American Numbering Plan. Not all of these services Google Voice on its Web site or app.
are available in all areas, and some are only available to
landline or cellular telephones. Some require additional
services be purchased from the telephone company to use 76.2 See also
them.
Local Area Signalling Services (LASS) and Custom Call- Mobile dial code
ing Feature Control Codes:[2][1][3]
Pat Fleet Prompt voice for most U.S. AT&T im-
plementations of VSC features
297
298 CHAPTER 76. VERTICAL SERVICE CODE
76.3 References
[1] Vertical Service Codes Code Denitions.
NANPA.com. Neustar. Retrieved 2013-03-18.
Voice over IP
Voice over Internet Protocol (Voice over IP, VoIP devices. Calls and SMS text messages may be sent over
and IP telephony) is a methodology and group of tech- 3G/4G or Wi-Fi.[2]
nologies for the delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks,
such as the Internet. The terms Internet telephony, 77.1 Pronunciation
broadband telephony, and broadband phone service
specically refer to the provisioning of communications
VoIP is variously pronounced as initials, V-O-I-P, or as
services (voice, fax, SMS, voice-messaging) over the pub-
an acronym, usually /vjp/ (voyp), as in voice,[3] but pro-
lic Internet, rather than via the public switched telephone
nunciation in full words, voice over Internet Protocol, and
network (PSTN).
voice over IP, are common.
The steps and principles involved in originating VoIP tele-
phone calls are similar to traditional digital telephony and
involve signaling, channel setup, digitization of the ana- 77.2 Protocols
log voice signals, and encoding. Instead of being trans-
mitted over a circuit-switched network; however, the dig-
ital information is packetized, and transmission occurs as Voice over IP has been implemented in various ways us-
IP packets over a packet-switched network. They trans- ing both proprietary protocols and protocols based on
port audio streams using special media delivery protocols open standards. VoIP protocols include:
that encode audio and video with audio codecs, and video
codecs. Various codecs exist that optimize the media Session Initiation Protocol (SIP)
stream based on application requirements and network
bandwidth; some implementations rely on narrowband H.323
and compressed speech, while others support high delity Media Gateway Control Protocol (MGCP)
stereo codecs. Some popular codecs include -law and
a-law versions of G.711, G.722, a popular open source Gateway Control Protocol (Megaco, H.248)
voice codec known as iLBC, a codec that only uses 8
kbit/s each way called G.729, and many others. Real-time Transport Protocol (RTP)
Early providers of voice-over-IP services oered busi- Real-time Transport Control Protocol (RTCP)
ness models and technical solutions that mirrored the
architecture of the legacy telephone network. Second- Secure Real-time Transport Protocol (SRTP)
generation providers, such as Skype, have built closed
Session Description Protocol (SDP)
networks for private user bases, oering the benet of
free calls and convenience while potentially charging for Inter-Asterisk eXchange (IAX)
access to other communication networks, such as the
PSTN. This has limited the freedom of users to mix- Jingle XMPP VoIP extensions
and-match third-party hardware and software. Third-
Skype protocol
generation providers, such as Google Talk, have adopted
the concept of federated VoIPwhich is a departure
The H.323 protocol was one of the rst VoIP protocols
from the architecture of the legacy networks.[1] These so-
lutions typically allow dynamic interconnection between that found widespread implementation for long-distance
users on any two domains on the Internet when a user trac, as well as local area network services. However,
wishes to place a call. since the development of newer, less complex protocols
such as MGCP and SIP, H.323 deployments are increas-
In addition to VoIP phones, VoIP is available on many ingly limited to carrying existing long-haul network traf-
smartphones, personal computers, and on Internet access c.
299
300 CHAPTER 77. VOICE OVER IP
These protocols can be used by special-purpose software, phone and speaker, or headset. The application typi-
such as Jitsi, or integrated into a web page or a mobile cally presents a dial pad and display eld to the user
application (web-based VoIP), like Google Talk. to operate the application by mouse clicks or key-
board input.
77.3 Adoption
77.3.2 PSTN and mobile network
providers
77.3.1 Consumer market
It is becoming increasingly common for telecommunica-
tions providers to use VoIP telephony over dedicated and
public IP networks to connect switching centers and to in-
terconnect with other telephony network providers; this is
often referred to as IP backhaul".[4][5]
Smartphones and Wi-Fi-enabled mobile phones may
have SIP clients built into the rmware or available as an
application download.
PSTN telephones for a charge.[9] mum transmission time by reducing the maximum trans-
In the United States the Social Security Administration mission unit. But every packet must contain protocol
(SSA) is converting its eld oces of 63,000 workers headers, so this increases relative header overhead on ev-
from traditional phone installations to a VoIP infrastruc- ery link traversed,
[15]
not just the bottleneck (usually Internet
ture carried over its existing data network.[10][11] access) link.
The receiver must resequence IP packets that arrive out
of order and recover gracefully when packets arrive too
late or not at all. Jitter results from the rapid and ran-
77.4 Quality of service dom (i.e. unpredictable) changes in queue lengths along
a given Internet path due to competition from other users
Communication on the IP network is perceived as less for the same transmission links. VoIP receivers counter
reliable in contrast to the circuit-switched public tele- jitter by storing incoming packets briey in a de-jitter
phone network because it does not provide a network- or playout buer, deliberately increasing latency to im-
based mechanism to ensure that data packets are not prove the chance that each packet will be on hand when
lost, and are delivered in sequential order. It is a best- it is time for the voice engine to play it. The added de-
eort network without fundamental Quality of Service lay is thus a compromise between excessive latency and
(QoS) guarantees. Voice, and all other data, travels excessive dropout, i.e. momentary audio interruptions.
in packets over IP networks with xed maximum ca-
Although jitter is a random variable, it is the sum of sev-
pacity. This system may be more prone to congestion
eral other random variables that are at least somewhat in-
and DoS attacks[12] than traditional circuit switched sys-
dependent: the individual queuing delays of the routers
tems; a circuit switched system of insucient capacity
along the Internet path in question. Thus according to the
will refuse new connections while carrying the remainder
central limit theorem, we can model jitter as a gaussian
without impairment, while the quality of real-time data
random variable. This suggests continually estimating
such as telephone conversations on packet-switched net-
the mean delay and its standard deviation and setting the
works degrades dramatically.[13] Therefore, VoIP imple-
playout delay so that only packets delayed more than sev-
mentations may face problems with latency, packet loss,
eral standard deviations above the mean will arrive too
and jitter.[13][14]
late to be useful. In practice, however, the variance in
By default, network routers handle trac on a rst-come, latency of many Internet paths is dominated by a small
rst-served basis. Fixed delays cannot be controlled number (often one) of relatively slow and congested bot-
as they are caused by the physical distance the packets tleneck links. Most Internet backbone links are now so
travel. They are especially problematic when satellite fast (e.g. 10 Gbit/s) that their delays are dominated by the
circuits are involved because of the long distance to a transmission medium (e.g. optical ber) and the routers
geostationary satellite and back; delays of 400600 ms driving them do not have enough buering for queuing
are typical. Latency can be minimized by marking voice delays to be signicant.
packets as being delay-sensitive with QoS methods such
It has been suggested to rely on the packetized na-
as DiServ.[13]
ture of media in VoIP communications and transmit the
Network routers on high volume trac links may in- stream of packets from the source phone to the destina-
troduce latency that exceeds permissible thresholds for tion phone simultaneously across dierent routes (multi-
VoIP. When the load on a link grows so quickly that its path routing).[16] In such a way, temporary failures have
switches experience queue overows, congestion results less impact on the communication quality. In capillary
and data packets are lost. This signals a transport proto- routing it has been suggested to use at the packet level
col like TCP to reduce its transmission rate to alleviate Fountain codes or particularly raptor codes for transmit-
the congestion. But VoIP usually uses UDP not TCP be- ting extra redundant packets making the communication
cause recovering from congestion through retransmission more reliable.
usually entails too much latency.[13] So QoS mechanisms
A number of protocols have been dened to support the
can avoid the undesirable loss of VoIP packets by imme-
reporting of quality of service (QoS) and quality of ex-
diately transmitting them ahead of any queued bulk traf-
perience (QoE) for VoIP calls. These include RTCP
c on the same link, even when that bulk trac queue is
Extended Report (RFC 3611), SIP RTCP Summary
overowing.
Reports, H.460.9 Annex B (for H.323), H.248.30 and
VoIP endpoints usually have to wait for completion of MGCP extensions. The RFC 3611 VoIP Metrics block is
transmission of previous packets before new data may be generated by an IP phone or gateway during a live call and
sent. Although it is possible to preempt (abort) a less im- contains information on packet loss rate, packet discard
portant packet in mid-transmission, this is not commonly rate (because of jitter), packet loss/discard burst metrics
done, especially on high-speed links where transmission (burst length/density, gap length/density), network delay,
times are short even for maximum-sized packets.[15] An end system delay, signal / noise / echo level, Mean Opin-
alternative to preemption on slower links, such as dialup ion Scores (MOS) and R factors and conguration infor-
and digital subscriber line (DSL), is to reduce the maxi-
302 CHAPTER 77. VOICE OVER IP
mation related to the jitter buer. ing link speed. A full-size (1500 byte) Ethernet frame
RFC 3611 VoIP metrics reports are exchanged between takes 94 ms to transmit at 128 kbit/s but only 8 ms at 1.5
IP endpoints on an occasional basis during a call, and an Mbit/s. If this is the bottleneck link, this latency is proba-
end of call message sent via SIP RTCP Summary Report bly small enough to ensure good VoIP performance with-
or one of the other signaling protocol extensions. RFC out MTU reductions or multiple ATM VCs. The latest
3611 VoIP metrics reports are intended to support real generations of DSL, VDSL and VDSL2, carry Ethernet
time feedback related to QoS problems, the exchange without intermediate ATM/AAL5 layers, and they gen-
of information between the endpoints for improved call erally support IEEE 802.1p priority tagging so that VoIP
can be queued ahead of less time-critical trac.[13]
quality calculation and a variety of other applications.
Rural areas in particular are greatly hindered in their abil-
ity to choose a VoIP system over PBX. This is generally 77.4.2 Layer 2
down to the poor access to superfast broadband in rural
country areas. With the release of 4G data, there is a po- A number of protocols that deal with the data link layer
tential for corporate users based outside of populated ar- and physical layer include quality-of-service mechanisms
eas to switch their internet connection to 4G data, which that can be used to ensure that applications like VoIP
is comparatively as fast as a regular superfast broadband work well even in congested scenarios. Some examples
connection. This greatly enhances the overall quality and include:
user experience of a VoIP system in these areas. This
method was already trialled in rural Germany, surpassing
IEEE 802.11e is an approved amendment to the
all expectations.[17]
IEEE 802.11 standard that denes a set of quality-
of-service enhancements for wireless LAN appli-
cations through modications to the Media Access
77.4.1 DSL and ATM Control (MAC) layer. The standard is considered of
critical importance for delay-sensitive applications,
DSL modems provide Ethernet (or Ethernet over USB) such as voice over wireless IP.
connections to local equipment, but inside they are ac-
tually Asynchronous Transfer Mode (ATM) modems. IEEE 802.1p denes 8 dierent classes of service
They use ATM Adaptation Layer 5 (AAL5) to segment (including one dedicated to voice) for trac on
each Ethernet packet into a series of 53-byte ATM cells layer-2 wired Ethernet.
for transmission, reassembling them back into Ethernet
frames at the receiving end. A virtual circuit identier The ITU-T G.hn standard, which provides a way
(VCI) is part of the 5-byte header on every ATM cell, to create a high-speed (up to 1 gigabit per sec-
so the transmitter can multiplex the active virtual circuits ond) Local area network (LAN) using existing home
(VCs) in any arbitrary order. Cells from the same VC are wiring (power lines, phone lines and coaxial cables).
always sent sequentially. G.hn provides QoS by means of Contention-Free
Transmission Opportunities (CFTXOPs) which
However, a majority of DSL providers use only one VC are allocated to ows (such as a VoIP call) which
for each customer, even those with bundled VoIP service. require QoS and which have negotiated a contract
Every Ethernet frame must be completely transmitted be- with the network controllers.
fore another can begin. If a second VC were established,
given high priority and reserved for VoIP, then a low pri-
ority data packet could be suspended in mid-transmission
and a VoIP packet sent right away on the high priority VC. 77.5 VoIP performance metrics
Then the link would pick up the low priority VC where
it left o. Because ATM links are multiplexed on a cell-The quality of voice transmission is characterized by
by-cell basis, a high priority packet would have to wait at
several metrics that may be monitored by network el-
most 53 byte times to begin transmission. There would ements, by the user agent hardware or software. Such
be no need to reduce the interface MTU and accept the metrics include network packet loss, packet jitter, packet
resulting increase in higher layer protocol overhead, and
latency (delay), post-dial delay, and echo. The met-
no need to abort a low priority packet and resend it later.
rics are determined by VoIP performance testing and
[18][19][20][21][22][23]
ATM has substantial header overhead: 5/53 = 9.4%, monitoring.
roughly twice the total header overhead of a 1500 byte
Ethernet frame. This ATM tax is incurred by every
DSL user whether or not they take advantage of multiple 77.6 PSTN integration
virtual circuits - and few can.[13]
ATMs potential for latency reduction is greatest on slow The Media VoIP Gateway connects the digital media
links, because worst-case latency decreases with increas- stream, so as to complete creating the path for voice as
77.6. PSTN INTEGRATION 303
well as data media. It includes the interface for connect- when routing a voice call. In countries without a central
ing the standard PSTN networks with the ATM and In- database, like the UK, it might be necessary to query the
ter Protocol networks. The Ethernet interfaces are also GSM network about which home network a mobile phone
included in the modern systems, which are specially de- number belongs to. As the popularity of VoIP increases
signed to link calls that are passed via the VoIP.[24] in the enterprise markets because of least cost routing op-
E.164 is a global FGFnumbering standard for both the tions, it needs to provide a certain level of reliability when
PSTN and PLMN. Most VoIP implementations support handling calls.
E.164 to allow calls to be routed to and from VoIP MNP checks are important to assure that this quality of
subscribers and the PSTN/PLMN.[25] VoIP implementa- service is met. Handling MNP lookups before routing a
tions can also allow other identication techniques to be call provides some assurance that the voice call will actu-
used. For example, Skype allows subscribers to choose ally work.
Skype names[26] (usernames) whereas SIP implemen-
tations can use URIs[27] similar to email addresses. Of-
ten VoIP implementations employ methods of translating 77.6.2 Emergency calls
non-E.164 identiers to E.164 numbers and vice versa,
such as the Skype-In service provided by Skype[28] and
A telephone connected to a land line has a direct relation-
the ENUM service in IMS and SIP.[29]
ship between a telephone number and a physical location,
Echo can also be an issue for PSTN integration.[30] Com- which is maintained by the telephone company and avail-
mon causes of echo include impedance mismatches in able to emergency responders via the national emergency
analog circuitry and acoustic coupling of the transmit and response service centers in form of emergency subscriber
receive signal at the receiving end. lists. When an emergency call is received by a center the
location is automatically determined from its databases
and displayed on the operator console.
77.6.1 Number portability
In IP telephony, no such direct link between location and
Local number portability (LNP) and Mobile number communications end point exists. Even a provider hav-
portability (MNP) also impact VoIP business. In Novem- ing hardware infrastructure, such as a DSL provider, may
ber 2007, the Federal Communications Commission in only know the approximate location of the device, based
the United States released an order extending number on the IP address allocated to the network router and the
portability obligations to interconnected VoIP providers known service address. However, some ISPs do not track
and carriers that support VoIP providers.[31] Number the automatic assignment of IP addresses to customer
portability is a service that allows a subscriber to select equipment.[32]
a new telephone carrier without requiring a new number IP communication provides for device mobility. For ex-
to be issued. Typically, it is the responsibility of the for-
ample, a residential broadband connection may be used as
mer carrier to map the old number to the undisclosed a link to a virtual private network of a corporate entity, in
number assigned by the new carrier. This is achieved which case the IP address being used for customer com-
by maintaining a database of numbers. A dialed num- munications may belong to the enterprise, not being the
ber is initially received by the original carrier and quickly
network address of the residential ISP. Such o-premises
rerouted to the new carrier. Multiple porting references extensions may appear as part of an upstream IP PBX.
must be maintained even if the subscriber returns to the On mobile devices, e.g., a 3G handset or USB wireless
original carrier. The FCC mandates carrier compliance broadband adapter, the IP address has no relationship
with these consumer-protection stipulations. with any physical location known to the telephony ser-
vice provider, since a mobile user could be anywhere in a
A voice call originating in the VoIP environment also
faces challenges to reach its destination if the number is region with network coverage, even roaming via another
routed to a mobile phone number on a traditional mobile cellular company.
carrier. VoIP has been identied in the past as a Least At the VoIP level, a phone or gateway may identify it-
Cost Routing (LCR) system, which is based on checking self with a Session Initiation Protocol (SIP) registrar by
the destination of each telephone call as it is made, and its account credentials. In such cases, the Internet tele-
then sending the call via the network that will cost the phony service provider (ITSP) only knows that a partic-
customer the least. This rating is subject to some debate ular users equipment is active. Service providers often
given the complexity of call routing created by number provide emergency response services by agreement with
portability. With GSM number portability now in place, the user who registers a physical location and agrees that
LCR providers can no longer rely on using the network emergency services are only provided to that address if
root prex to determine how to route a call. Instead, they an emergency number is called from the IP device.
must now determine the actual network of every number Such emergency services are provided by VoIP vendors
before routing the call. in the United States by a system called Enhanced 911
Therefore, VoIP solutions also need to handle MNP (E911), based on the Wireless Communications and Pub-
304 CHAPTER 77. VOICE OVER IP
lic Safety Act of 1999. The VoIP E911 emergency- power.[35] Some VoIP service providers use customer
calling system associates a physical address with the call- premises equipment (e.g., cablemodems) with battery-
ing partys telephone number. All VoIP providers that backed power supplies to assure uninterrupted service for
provide access to the public switched telephone network up to several hours in case of local power failures. Such
are required to implement E911,[32] a service for which battery-backed devices typically are designed for use with
the subscriber may be charged. However, end-customer analog handsets.
participation in E911 is not mandatory and customers Some VoIP service providers implement services to route
may opt out of the service.[32] calls to other telephone services of the subscriber, such a
The VoIP E911 system is based on a static table lookup. cellular phone, in the event that the customers network
Unlike in cellular phones, where the location of an E911 device is inaccessible to terminate the call.
call can be traced using assisted GPS or other methods, The susceptibility of phone service to power failures is a
the VoIP E911 information is only accurate so long as common problem even with traditional analog service in
subscribers, who have the legal responsibility, are diligent areas where many customers purchase modern telephone
in keeping their emergency address information current. units that operate with wireless handsets to a base station,
or that have other modern phone features, such as built-in
voicemail or phone book features.
77.7 Fax support
Sending faxes over VoIP networks is sometimes referred 77.9 Security
to as Fax over IP (FoIP). Transmission of fax documents
was problematic in early VoIP implementations, as most
The security concerns of VoIP telephone systems are
voice digitization and compression codecs are optimized
similar to those of any Internet-connected device. This
for the representation of the human voice and the proper
means that hackers who know about these vulnerabili-
timing of the modem signals cannot be guaranteed in a
ties can institute denial-of-service attacks, harvest cus-
packet-based, connection-less network. An standards-
tomer data, record conversations and compromise voice-
based solution for reliably delivering fax-over-IP is the
mail messages. The quality of internet connection deter-
T.38 protocol.
mines the quality of the calls. VoIP phone service also
The T.38 protocol is designed to compensate for the dif- will not work if there is power outage and when the in-
ferences between traditional packet-less communications ternet connection is down. The 9-1-1 or 112 service pro-
over analog lines and packet-based transmissions which vided by VoIP phone service is also dierent from analog
are the basis for IP communications. The fax machine phone which is associated with a xed address. The emer-
may be a standard device connected to an analog tele- gency center may not be able to determine your location
phone adapter (ATA), or it may be a software application based on your virtual phone number.[36][37][38] Compro-
or dedicated network device operating via an Ethernet mised VoIP user account or session credentials may en-
interface.[33] Originally, T.38 was designed to use UDP able an attacker to incur substantial charges from third-
or TCP transmission methods across an IP network. UDP party services, such as long-distance or international tele-
provides near real-time characteristics due to the no re- phone calling.
covery rule when a UDP packet is lost or an error occurs
The technical details of many VoIP protocols create
during transmission.[34]
challenges in routing VoIP trac through rewalls and
Some newer high end fax machines have built-in T.38 network address translators, used to interconnect to tran-
capabilities which are connected directly to a network sit networks or the Internet. Private session border con-
switch or router. In T.38 each packet contains a portion of trollers are often employed to enable VoIP calls to and
the data stream sent in the previous packet. Two succes- from protected networks. Other methods to traverse
sive packets have to be lost to actually lose data integrity. NAT devices involve assistive protocols such as STUN
and Interactive Connectivity Establishment (ICE).
Many consumer VoIP solutions do not support encryp-
77.8 Power requirements tion of the signaling path or the media, however secur-
ing a VoIP phone is conceptually easier to implement
Telephones for traditional residential analog service are than on traditional telephone circuits. A result of the
usually connected directly to telephone company phone lack of encryption is a relative easy to eavesdrop on VoIP
lines which provide direct current to power most basic calls when access to the data network is possible.[39] Free
analog handsets independently of locally available elec- open-source solutions, such as Wireshark, facilitate cap-
trical power. turing VoIP conversations.
IP Phones and VoIP telephone adapters connect to Standards for securing VoIP are available in the Secure
routers or cable modems which typically depend on Real-time Transport Protocol (SRTP) and the ZRTP pro-
the availability of mains electricity or locally generated tocol for analog telephony adapters as well as for some
77.14. REGULATORY AND LEGAL ISSUES 305
softphones. IPsec is available to secure point-to-point such as digitizing and digital transmission, are already
VoIP at the transport level by using opportunistic encryp- in place with VoIP. It is only necessary to encrypt and
tion. authenticate the existing data stream. Automated soft-
Government and military organizations use various secu- ware, such as a virtual PBX, may eliminate the need of
rity measures to protect VoIP trac, such as voice over personnel to greet and switch incoming calls.
secure IP (VoSIP), secure voice over IP (SVoIP), and
secure voice over secure IP (SVoSIP).[40] The distinc-
tion lies in whether encryption is applied in the telephone 77.14 Regulatory and legal issues
or in the network[41] or both. Secure voice over secure
IP is accomplished by encrypting VoIP with protocols As the popularity of VoIP grows, governments are be-
such as SRTP or ZRTP. Secure voice over IP is accom- coming more interested in regulating VoIP in a manner
plished by using Type 1 encryption on a classied net- similar to PSTN services.[51]
work, like SIPRNet.[42][43][44][45][46] Public Secure VoIP
is also available with free GNU programs and in many Throughout the developing world, countries where regu-
popular commercial VoIP programs via libraries such as lation is weak or captured by the dominant operator, re-
ZRTP.[47] strictions on the use of VoIP are imposed, including in
Panama where VoIP is taxed, Guyana where VoIP is pro-
hibited and India where its retail commercial sales is al-
lowed but only for long distance service.[52] In Ethiopia,
77.10 Caller ID where the government is nationalising telecommunica-
tion service, it is a criminal oence to oer services using
Voice over IP protocols and equipment provide caller ID VoIP. The country has installed rewalls to prevent in-
support that is compatible with the facility provided in the ternational calls being made using VoIP. These measures
public switched telephone network (PSTN). Many VoIP were taken after the popularity of VoIP reduced the in-
service providers also allow callers to congure arbitrary come generated by the state owned telecommunication
caller ID information.[48] company.
VoIP has drastically reduced the cost of communica- In the UAE and Oman it is illegal to use any form of VoIP,
tion by sharing network infrastructure between data and to the extent that Web sites of Gizmo5 are blocked. Pro-
voice.[49][50] A single broad-band connection has the abil- viding or using VoIP services is illegal in Oman. Those
ity to transmit more than one telephone call. Secure calls who violate the law stand to be ned 50,000 Omani Rial
using standardized protocols, such as Secure Real-time (about 130,317 US dollars) or spend two years in jail or
Transport Protocol, as most of the facilities of creating a both. In 2009, police in Oman have raided 121 Internet
secure telephone connection over traditional phone lines, cafes throughout the country and arrested 212 people for
306 CHAPTER 77. VOICE OVER IP
using/providing VoIP services.[53] rates similar to terrestrial calling. Foreign VoIP providers
encounter high barriers to government registration. This
issue came to a head in 2006 when Internet service
77.14.3 India providers providing personal Internet services by con-
tract to United States Forces Korea members residing on
In India, it is legal to use VoIP, but it is illegal to have USFK bases threatened to block o access to VoIP ser-
VoIP gateways inside India.[54] This eectively means that vices used by USFK members as an economical way to
people who have PCs can use them to make a VoIP call keep in contact with their families in the United States,
to any number, but if the remote side is a normal phone, on the grounds that the service members VoIP providers
the gateway that converts the VoIP call to a POTS call is were not registered. A compromise was reached between
not permitted by law to be inside India. Foreign based USFK and Korean telecommunications ocials in Jan-
Voip server services are illegal to use in India.[54] uary 2007, wherein USFK service members arriving in
In the interest of the Access Service Providers and Inter- Korea before June 1, 2007, and subscribing to the ISP
national Long Distance Operators the Internet telephony services provided on base may continue to use their US-
was permitted to the ISP with restrictions. Internet Tele- based VoIP subscription, but later arrivals must use a
phony is considered to be dierent service in its scope, Korean-based VoIP provider, which by contract will of-
nature and kind from real time voice as oered by other fer pricing similar to the at rates oered by US VoIP
Access Service Providers and Long Distance Carriers. providers.[56]
Hence the following type of Internet Telephony are per-
mitted in India:[55] 77.14.5 United States
(a) PC to PC; within or outside India In the United States, the Federal Communications
(b) PC / a device / Adapter conforming to stan- Commission requires all interconnected VoIP service
dard of any international agencies like- ITU or providers to comply with requirements comparable
IETF etc. in India to PSTN/PLMN abroad. to those for traditional telecommunications service
(c) Any device / Adapter conforming to stan- providers.[57] VoIP operators in the US are required to
dards of International agencies like ITU, IETF support local number portability; make service accessible
etc. connected to ISP node with static IP ad- to people with disabilities; pay regulatory fees, universal
dress to similar device / Adapter; within or out- service contributions, and other mandated payments; and
side India. enable law enforcement authorities to conduct surveil-
(d) Except whatever is described in condition lance pursuant to the Communications Assistance for
(ii) above, no other form of Internet Telephony Law Enforcement Act (CALEA).
is permitted.
Operators of Interconnected VoIP (fully connected to
(e) In India no Separate Numbering Scheme is
the PSTN) are mandated to provide Enhanced 911 ser-
provided to the Internet Telephony. Presently
vice without special request, provide for customer lo-
the 10 digit Numbering allocation based on
cation updates, clearly disclose any limitations on their
E.164 is permitted to the Fixed Telephony,
E-911 functionality to their consumers, obtain ar-
GSM, CDMA wireless service. For Internet
mative acknowledgements of these disclosures from all
Telephony the numbering scheme shall only
consumers,[58] and 'may not allow their customers to
conform to IP addressing Scheme of Internet
opt-out of 911 service.'[59] VoIP operators also re-
Assigned Numbers Authority (IANA). Trans-
ceive the benet of certain US telecommunications reg-
lation of E.164 number / private number to IP
ulations, including an entitlement to interconnection and
address allotted to any device and vice versa,
exchange of trac with incumbent local exchange carri-
by ISP to show compliance with IANA num-
ers via wholesale carriers. Providers of nomadic VoIP
bering scheme is not permitted.
servicethose who are unable to determine the location
(f) The Internet Service Licensee is not permit-
of their usersare exempt from state telecommunica-
ted to have PSTN/PLMN connectivity. Voice
tions regulation.[60]
communication to and from a telephone con-
nected to PSTN/PLMN and following E.164 Another legal issue that the US Congress is debating con-
numbering is prohibited in India. cerns changes to the Foreign Intelligence Surveillance
Act. The issue in question is calls between Americans
and foreigners. The National Security Agency (NSA)
77.14.4 South Korea is not authorized to tap Americans conversations with-
out a warrantbut the Internet, and specically VoIP
In South Korea, only providers registered with the gov- does not draw as clear a line to the location of a caller
ernment are authorized to oer VoIP services. Unlike or a calls recipient as the traditional phone system does.
many VoIP providers, most of whom oer at rates, Ko- As VoIPs low cost and exibility convinces more and
rean VoIP services are generally metered and charged at more organizations to adopt the technology, the surveil-
77.15. HISTORY 307
lance for law enforcement agencies becomes more di- 1981: IPv4 is described in RFC 791.
cult. VoIP technology has also increased security con-
cerns because VoIP and similar technologies have made 1985: The National Science Foundation commis-
it more dicult for the government to determine where a sions the creation of NSFNET.[65]
target is physically located when communications are be- 1986: Proposals from various standards organiza-
ing intercepted, and that creates a whole set of new legal tions for Voice over ATM, in addition to commer-
challenges.[61] cial packet voice products from companies such as
StrataCom
77.16 See also [9] Skype For Business. skype.com. Retrieved 2009-03-
16.
Audio over IP [10] Jackson, William (May 27, 2009). SSA goes big on
VOIP. Government Computer News. Retrieved 2009-
Communications Assistance For Law Enforcement
05-28.
Act
[11] Social Security to Build Worlds Largest VOIP"". Gov-
Comparison of audio network protocols ernment Technology. Retrieved 2009-05-29.
Comparison of VoIP software [12] VOIP Vulnerability over Internet Protocol?".
Dierentiated services [13] Quality of Service for Voice over IP. Retrieved May 3,
2011.
High bit rate audio video over Internet Protocol
[14] Prabhakar, G.; Rastogi, R.; Thotton, M (2005).
Integrated services OSS Architecture & Requirements for VoIP Net-
works. Bell Labs Technical Journal. 10 (1): 3145.
Internet fax
doi:10.1002/bltj.20077.
IP Multimedia Subsystem
[15] Quality of Service for Voice over IP. Retrieved May 3,
List of VoIP companies 2011.
SIP Trunking [17] New 4G technology set to bring benets of VoIP to rural
areas.
UNIStim
[18] CableLabs, PacketCable Residential SIP Telephony Feature
Voice VPN Denition, Technical Report, PKT-TR-RST-V03-071106
(2007)
VoiceXML
[19] VoIP performance measurement using QoS parameters
VoIP recording (PDF). A.H.Muhamad Amin. 2016-08-14.
[6] Michael Dosch and Steve Church. VoIP in the Broadcast [27] RFC 3969 The Internet Assigned Number Authority
Studio. Axia Audio. Retrieved 2011-06-21. (IANA) Uniform Resource Identier (URI) Parameter
Registry for the Session Initiation Protocol (SIP)". The
[7] Callahan, Renee (December 9, 2008). Businesses Move Internet Society. December 1, 2004. Retrieved 2009-01-
To Voice-Over-IP. Forbes. Retrieved 2009-03-03. 21.
[8] Korzeniowski, Peter (January 8, 2009). Three Technolo- [28] Your personal online number. Skype. Retrieved 2009-
gies You Need In 2009. Forbes. Retrieved 2009-03-02. 01-21.
77.17. REFERENCES 309
[29] Application-level Network Interoperability and the Evo- [51] Global VOIP Policy Status Matrix. Global IP Alliance.
lution of IMS. TMCnet.com. May 24, 2006. Retrieved Retrieved 2006-11-23.
2009-01-21.
[52] Proenza, Francisco J. The Road to Broadband Devel-
[30] Je Riddel (2007). Packetcable Implementation. Cisco opment in Developing Countries is through Competition
Press. p. 557. ISBN 978-1-58705-181-4. Driven by Wireless and VOIP (PDF). Retrieved 2008-
04-07.
[31] Keeping your telephone number when you change your
service provider. FCC. [53] Metz, Cade. Oman cus 212 for selling VoIP calls. The
[32] FCC Consumer Advisory VoIP and 911 Service (PDF). Register. Retrieved 20 September 2016.
Retrieved May 2, 2011.
[54] Mahanagar Doorsanchar Bhawan and Jawahar Lal Nehru
[33] Soft-Switch.org, Faxing over IP networks Marg (May 2008). Telecom Regulatory Authority of In-
dia (TRAI) Consultation paper on Issues related to Inter-
[34] UMass Discussion on UDP transmission Characteris- net Telephony. Consultation Paper No. 11/2008. (PDF).
tics. New Delhi India: Telecom Regulatory Authority of In-
dia (TRAI). p. 16 (Section 2.2.1.2 PC-to-Phone Internet
[35] ICT Regulation Tool Kit 4.4 VOIP Regulatory Issues telephony). Archived from the original (PDF) on 2014-
Universal Service 10-06. Retrieved September 19, 2012. An end user is al-
[36] Taub, Eric (April 2, 2008). VOIP System Security: Time lowed to make PCto-Phone Internet Telephony calls only
to Worry, or Maybe Not. New York Times. Retrieved on PSTN/PLMN abroad.
2009-03-02.
[55] Harish Kumar Gangwar Technical Note on Illegal Inter-
[37] Stanton, Ray (2006). Secure VoIP an achievable national Long Distance telephone Exchange in India
goal. Computer Fraud & Security. 4 (4): 1114.
doi:10.1016/S1361-3723(06)70333-5. [56] Stripes.com, Stars and Stripes: USFK deal keeps VoIP
access for troops
[38] Stanton, R. (2006). Secure VoIP- an achievable
goal. Computer Fraud & Security. 4 (4): 1114. [57] Cybertelecom :: VoIP :: Federal Activity
doi:10.1016/S1361-3723(06)70333-5.
[58] GPO.gov, 47 C.F.R. pt. 9 (2007)
[39] Examining Two Well-Known Attacks on VOIP. Cir-
cleID. Retrieved 2006-04-05. [59] VoIP and 911 Service. FCC. Retrieved 16 August 2014.
[40] Disa.mil, Internet Protocol Telephony & Voice over Inter- [60] FCC.gov
net Protocol Security Technical Implementation Guide
[61] Greenberg, Andy (May 15, 2008). The State Of Cyber-
[41] Secure Voice over IP (SVoIP) vs. Voice over Secure IP security Wiretappings Fuzzy Future. Forbes. Retrieved
(VoSIP) Installations General Dynamics C4 Systems 2009-03-02.
[42] Dunte, Markus; Ruland, Christoph (June 2007). Secure
[62] Danny Cohen. INTERNET HALL of FAME. Re-
Voice-over-IP (PDF). International Journal of Computer
trieved 2014-12-06.
Science and Network Security. 7 (6): 6368.
[43] Sans.org, SANS Institute InfoSec Reading Room [63] Advanced Content Delivery, Streaming, and Cloud Services
(Pg 34). Willey. Retrieved 2014-12-06.
[44] White, C.M.; Teague, K.A.; Daniel, E.J. (710 Nov
2004). Browse Conference Publications > Signals, Sys- [64] Cerf, V.; Kahn, R. (May 1974). A Protocol for
tems and Computer ... Help Working with Abstracts Packet Network Intercommunication. IEEE Trans-
Packet loss concealment in a secure voice over IP environ- actions on Communications. 22 (5): 637648.
ment (PDF). Signals, Systems and Computers, 2004. Con- doi:10.1109/TCOM.1974.1092259.
ference Record of the Thirty-Eighth Asilomar Conference
on. 1: 415419. doi:10.1109/ACSSC.2004.1399165. [65] The Launch of NSFNET. The National Science Foun-
dation. Retrieved 2009-01-21.
[45] GDC4S.com, State-of-the-art voice over IP encryptor
[66] Speak Freely History. Brian C. Wiles. April 18, 1999.
[46] Cellcrypt secure VOIP heading to BlackBerry. Net- Retrieved 2013-03-19.
workworld.com.
[67] MTALK-Readme (TXT). Sunsite.edu. Retrieved
[47] Secure VOIP calling, free software, and the right to pri- 2012-04-29.
vacy. Free Software Magazine.
[68] Keating, Tom. Internet Phone Release 4 (PDF). Com-
[48] VOIPSA.org, Blog: Hello Mom, I'm a Fake!" (Telespoof
puter Telephony Interaction Magazine. Retrieved 2007-
and Fakecaller).
11-07.
[49] FCC.gov, What are some advantages of VOIP?
[69] The 10 that Established VOIP (Part 1: VocalTec)". iLo-
[50] Voip Infrastructure (PDF). cus. Retrieved 2009-01-21.
310 CHAPTER 77. VOICE OVER IP
Voicemail
For other uses, see Voicemail (disambiguation). tain a user interface to select, play, and manage messages;
a delivery method to either play or otherwise deliver the
message; and a notication ability to inform the user of a
Voice Mail System (also known as voice mail, voice
message or voice bank) is a computer-based system waiting message. Most systems use phone networks, ei-
ther cellular- or landline-based, as the conduit for all of
that allows users and subscribers to exchange personal
voice messages; to select and deliver voice information; these functions. Some systems may use multiple telecom-
munications methods, permitting recipients and callers to
and to process transactions relating to individuals, orga-
nizations, products and services, using an ordinary tele- retrieve or leave messages through multiple methods such
as PCs, PDA, Cellphones or Smartphones.
phone. The term is also used more broadly to denote any
system of conveying a stored telecommunications voice Simple voicemail systems function as a remote answering
messages, including using an answering machine. Most machine using touch-tones as the user interface. More
cell phone services oer voice-mail as a basic feature, complicated systems may use other input devices such
many corporate PBXs include versatile internal voice- as voice or a computer interface. Simpler voice-mail
messaging services and *98 Vertical service code sub- systems may play the audio message through the phone,
scription is available to most individual and small busi- while more advanced systems may have alternative deliv-
ness land line subscribers. ery methods, including email or text message delivery,
message transfer and forwarding options, and multiple
mailboxes.
78.1 History of voicemail Almost all modern voicemail systems use digital storage
and are typically stored on computer data storage. Noti-
cation methods also vary based on the voice-mail system.
The term Voicemail was coined by Televoice Interna-
Simple systems may not provide active notication at all,
tional (later became Voicemail International) for intro-
instead requiring the recipient to check with the system,
duction of the rst US wide Voicemail service in 1980.
while others may provide an indication that messages are
Although VMI trademarked the term, it eventually be-
waiting.
came a generic term used for referring to virtually all
automated voice services employing a telephone. Voice- More advanced systems may be integrated with a com-
mail popularity continues today with Internet telephone panys PABX, with a call center ACD for automatic call
services such as Skype, Google Voice and ATT that in- distribution; with mobile or paging terminals for mes-
sage alert; and computer systems/data bases for delivering
tegrate voice, voicemail and text services for tablets and
smartphones information or processing orders. Interactive Voice Re-
sponse (IVR) systems may use digital information stored
Voicemail systems were developed in the late 70s by
in a corporate data base to select pre-recorded words and
Voice Message Exchange (VMX). They became popular
phrases stored in a voice-mail vocabulary to form sen-
in the early 80s when they were made available on PC-
[1] tences that are delivered to the caller.
based boards. In September 2012 a report from USA
Today and Vonage claimed that Voice mail was in de-
cline. The report said that the number of voicemail mes-
sages declined 8 percent compared to 2011.[2][3]
78.3 Message centers
311
312 CHAPTER 78. VOICEMAIL
phone calls. Extensions that were busy or rang no an- 78.4 Voicemail invention
swer would forward to the message center using a device
called a call director. The call director had a button for The rst public records describing voice recording were
each extension in the company which would ash when reported in a New York newspaper and the Scientic
that persons extension forwarded to the message center. American in November, 1877. Thomas A. Edison had
A little label next to the button told the operator the per- announced the invention of his phonograph saying the
son being called. object was to record telephone messages and transmit
While it was an improvement over basic multi-line sys- them again by telephone. Edison applied for a U. S.
tems, the message center had many disadvantages. Many patent on December 1877 and shortly thereafter demon-
calls would come in simultaneously at peak periods, such strated the machine to publishers, the U.S. congress and
as lunch time, and operators were often busy. This left President Hayes, recording and playing Mary had a lit-
message attendants with little time to take each message tle lamb... " and there was a little girl who had a lit-
accurately. Often, they were not familiar with employees tle curl... " and other ditties popular at the time. In an
names and buzzwords and how to spell or pronounce article outlining his own ideas of the future usefulness
them. Messages were scribbled on pink slips and dis- of his machine Edisons list began with Letter writing,
tributed by the internal mail system and messages, often and all kinds of dictation without the aid of a stenogra-
arrived at peoples desks after lengthy delays, contained pher. In other words, voice messages or Voice-mail.
little content other than the callers name and number, and By 1914, Edisons phonograph business included a dic-
were often inaccurate, with misspelled names and wrong tating machine (the Ediphone) and the Telescribe, a
phone numbers. machine combining the phonograph and the telephone,
which recorded both sides of telephone conversations.[4]
Tape-based telephone answering machines had come into
the residential telephone market, but they weren't used For nearly one hundred years, there were few innovations
much in the corporate environment due to physical lim- or advances in telephone services. Voicemail was the
itations of the technology. One answering machine result of innovations in telephone products and services
was needed for each telephone; messages couldn't be made possible by developments in computer technology
recorded if the user was using the phone; messages had during the 1970s. These innovations began with the
to be retrieved in sequential order; and messages couldn't Motorola Pageboy, a simple pager or beeper intro-
be retrieved remotely, selectively discarded, saved, or duced in 1974 that was generally oered in conjunction
forwarded to others. Further, the manufacturers of with answering services that handled busy / no-answer
PBXs (private branch exchangesthe name for corpo- overloads and after hours calls for businesses and profes-
rate phone systems) used proprietary digital phone sets in sionals. Operators wrote down a callers message, sent a
order to increase the functionality and value of the PBX. page alert or beep and when the party called back, an
These phone sets were, by design, incompatible with an- operator dictated the message.
swering machines. With the introduction of voice pagers, like the
In the 1970s and early 1980s, the cost of long dis- Motorola Pageboy II operators could transmit a voice
tance calling decreased and more business communica- message directly to the pager and the user could hear the
tions were conducted by telephone. As corporations grew message. However, messages arrival was often untimely
and labor rates increased, the ratio of secretaries to em- and privacy issues as well as the high cost eventually
ployees decreased. With multiple time zones, fewer sec- caused the demise of these services. By the mid 1970s
retaries and more communication by phone, real-time digital storage and analog to digital conversion devises
phone communications were hampered by callers being had emerged and paging companies began handling client
unable to reach people. Some early studies showed that messages electronically. Operators recorded a short mes-
only 1 in 4 phone calls resulted in a completed call and sage (56 seconds, e.g. please call Mr. Smith) and the
half the calls were one-way in nature (that is, they did not messages were delivered automatically when the client
require a conversation). This happened because people called the answering service. It would only take a short
were either not at work (due to time zone dierences, be- step for the rst voicemail application to be born.
ing away on business, etc.), or if they were at work, they Computer manufacturers, telephone equipment manu-
were on the phone, away from their desks in meetings, on facturers and software rms began developing more so-
breaks, etc. This bottleneck hindered the eectiveness phisticated solutions as more powerful and less expen-
of business activities and decreased both individual and sive computer processors and storage devices became
group productivity. It also wasted the callers time and available. This set the stage for a creation of a broad
created delays in resolving time-critical issues. spectrum of computer based Central Oce and Cus-
tomer Premises Equipment that would eventually sup-
port enhanced voice solutions such as voicemail, audio-
tex, interactive voice response (IVR) and speech recog-
nition solutions that began emerging in the 1980s. How-
ever, broad adoption of these products and services would
78.6. PIONEERING APPLICATIONS 313
depend on the global proliferation of touch tone phones ADS used the human voice and the xed-line touch-tone
and mobile phone services which would not occur until telephones that predated computer screens and mobile
the late 1980s. phones. The rst operational prototypes were used by
750 IBM executives mainly in the USA for their daily
work. Those prototypes ran on an IBM System/7 com-
78.5 Invention of voicemail contro- puter attached to an IBM VM370 for additional storage.
versy In 1978 the prototype was converted to run on an IBM
Series/1 computer. In September 1981 IBM started mar-
keting ADS in America and Europe: the rst customer
Many contributed to the creation of the modern-day installation was completed in February 1982.
voice-mail. Legal battles ensued for decades.[5] The
[10]
true rst inventor of voicemail, patent number 4,124,773 ADS, marketed by IBM and briey by AT&T Corpo-
(Audio Storage and Distribution System), is Elkins.[6] ration, was well featured for voice messaging, the result
Though Elkins received a patent in 1978, telecommu- of IBMs considerable human-factors research plus ob-
nications giants began oering voicemail without paying servation of operational use. Using a 1980s computer re-
Elkins a penny in royalties. [7] Elkins never expected quiring air conditioning, it was expensive and physically
to spend 10 years of his life battling some of the worlds large. With further development it grew to handle up to
largest corporations, either. But once he patented his sys- 3000 users, 100 hours of messages, multiple languages,
tem, he gured he should protect it.[8] Later, Elkins suc- message notication to a host computer, and 16 simulta-
[11]
cessfully licensed his patented technology to IBM, DEC, neous users.
WANG, among many others. Unfortunately, his patent ADS could be connected to exchange lines and private
did not address simultaniety of voice message access and exchanges including the IBM 2750 and 3750 Switching
storage and the application for patent was led after the Systems available in Germany, France, Italy, Belgium,
patent application of the system patented by Kolodny and and the UK.
Hughes. as described below.
IBM sold many systems.[10] Installations[11] included:
up incoming calls directly from the telephone company. then Wang, but all three companies reportedly would
Stoer presented the Delphi concept publicly to the as- have been able to invalidate the patent on the basis of
sociation of Telephone Answering Services around 1973 prior art and their licenses from Sudbury Systems Inc, for
and the prototype system was launched in San Francisco their Kolodny and Hughes patent (see above). VMX clev-
in 1976 by a Delphi company called VoiceBank. Delphi erly achieved a settlement where the patent was let stand,
developed Delta 1 as a purely service-oriented voice mes- not challenged in court and IBM, Wang and AT&T (in
saging system to answer subscriber telephones for busi- separate settlements) received royalty-free licenses to all
nesses and professionals. Delta 1 required human in- VMX patents. Wang, the last of the majors to get such
tervention for message deposit. While three machines a license for itself and Voice-mail International, essen-
were built, only one machine was put into operational tially paid $20,000 and cross licensed a few patent appli-
service. The completely automated voice messaging sys- cations (not issued patents). IBM and AT&T also cross-
tem (Delta 2) was developed for initial operational use licensed a number of patents to VMX, most of which
in Los Angeles in 1981. Apparently Delta 2 was built, were obsolete or outdated. VMX could claim that sev-
installed and operational for a short while, but unfortu- eral major companies licensed the patent (even though
nately Delphis major early investor, Exxon Enterprises, they paid almost nothing to VMX for the rights), but that
abruptly shut down Delphi in July, 1982. Nothing further part wasn't disclosed. The patent was never challenged in
was done with Delphis technology. A patent was applied court and VMX then continued to assert (incorrectly) that
for and issued for Delphis Automated Telephone Voice it had invented voice-mail and that Matthews was the fa-
Service System. The patent, U.S. Patent No. 4,625,081, ther of voice-mail. Following the settlement with Wang,
was issued after Delphis closure, but Delphis assets (and VMX settled with Octel Communications in exchange for
the patent) were transferred to another Exxon company, a small payment and Octels agreeing not to litigate any
Gilbarco, which made equipment for gas pumps at lling VMX patent, Octel received a paid-up, royalty-free li-
stations. Gilbarco is now owned by GEC in the United cense on all existing and future VMX patents.
Kingdom.
78.6.3 VMX
78.7 International Voicemail Asso- nancial disaster for the protable ROLM, as IBM clearly
could not grasp the laid back, "think outside the box" at-
ciation titude of ROLM, which was the #2 PBX supplier in the
US from the mid 70s to late 80s), then sold half interest
In 1987, Voice-mail service providers in the U.S. and Eu- to the German company Siemens.[15] In 1992, Siemens
rope joined together to form the Voice Mail Association bought ROLM entirely from IBM and the original ROLM
of Europe (VMA) with Ren Beusch, Radio-Suisse and product line was done for, except for PhoneMail (the only
Paul Finnigan, Finnigan USA[13] serving as VMA Chair- product Siemens did not destroy). VMX suered from
man and President respectively. The VMA invited ser- poor product and ineective management and was about
vice providers, vendors and consultants to attend semi- to fold when Opcom merged with it. The surviving com-
annual conferences that included presentations, discus- pany was called VMX, but VMX was all but erased by
sions and reporting of experiences. VMA membership Opcom except for its name and patent portfolio.
was eventually expanded to include representatives from
Opcom, a company founded by David Ladd, developed
telecommunication organizations worldwide and became
a voicemail system primarily marketed to smaller en-
The International Voice-mail Association. By the late
terprises. Opcom pioneered and patented the feature
1980s, the Bell Operating companies, Tigon and other in-
of automated attendant (U.S. Patent numbers 4,747,124
dependent service providers in the U.S. had joined the
and 4,783,796 both issued in 1988), an integral part of
VMA. In 1992, VMA members conducted an Infor-
any voicemail systems. The automated attendant enables
mation Week Tour of the U.S., sharing ideas with ma-
callers to direct calls by pressing single digit keys, e.g.
jor telecom operators. VMA working groups promoted
If you are making domestic reservations, press 1; for in-
collaboration and adoption of industry standards to the
ternational reservations, press 2'; etc. Opcom later pio-
ITU and CCITT and at the 1999 CCITT conference in
neered the concept of Unied Messaging (to be discussed
Geneva, Switzerland, demonstrated worldwide exchange
later in this article). Opcom eventually acquired VMX
of messages between the major voice-mail vendors plat-
through a reverse merger, (Opcom was private and VMX
forms using the VPIM networking standard. Beusch and
was public) and the surviving company VMX was even-
Finnigan led the VMA until 1998 and 1999 respectively
tually acquired by Octel.
and the organization continues to serve the voice services
industry today.[14] Octel Communications, founded in 1982 by Bob Cohn
and Peter Olson, broadly commercialized the corporate
voice messaging market. While Octel beneted from the
work and experiments of others it was the rst stand-
78.8 Corporate voicemail alone voicemail company to build a strong business and
strategy to win in this dicult market. In addition, Oc-
In the early 1980s there were over 30 companies vy- tel innovated substantially new technology which con-
ing for the corporate voicemail market. Among the tributed heavily to its success including a system archi-
many contenders were IBM, VMX, Wang, Octel, ROLM, tecture that was physically smaller, faster, more reliable,
AT&T, Northern Telecom, Delphi Communications, and much less costly than other corporate vendors. Oc-
Voice and Data Systems, Opcom, Commterm, Gene- tels voicemail system, was introduced in 1984, included
sis, Brook Trout, Innovative Technology (ITI), Glenayre, unique system features, many of which were patented,
BBL, AVT, AVST, Digital Sound, Centigram, Voice- which gave Octel market leadership. In 1990 Octel was
mail International and Active Voice. Only a few of these one of the rst companies to introduce the concept of
companies were successful in capturing a signicant mar- Unied Messaging.
ket share and remain in the voice-mail business today. AT&T/Lucent created its version of voicemail in the
ROLM Corporation, founded in 1969 by Gene Richeson, early 1990s (called Audix) but it would only work on
Ken Oshman, Walter Loewenstern and Robert Maxeld, AT&T/Lucent PBXs. Northern Telecom|Nortel devel-
was the rst PBX manufacturer to oer integrated voice- oped Meridian Mail and followed the same strategy as
mail with its PhoneMail system, its registered trade- AT&T in that Meridian Mail only worked with Northern
mark. PhoneMail oered impressive recording quality Telecom PBXs. As a result, neither company achieved
of its digitized messages. ROLMs digital PBX (called much market share with large national or multi-national
a CBX, for Computerized Branch eXchange) was the accounts. AT&T spun o its equipment business into a
rst to enable PhoneMail to illuminate a message wait- company called Lucent Technologies, and Northern Tele-
ing light on ROLM phones equipped with message wait- com changed its name to Nortel.
ing lights (also a stutter dialtone is used with analog and By the mid-1990s, Octel had become the number one
digital phones). Rolm was sold to IBM, who later sold supplier of voicemail both to corporations and to carri-
it to Siemens who oer PhoneMail in various congura- ers. Octel had about a 60% market share in the U.S.,
tions/sizes (including a micro-sized version) and its uni- Canada, Europe and Japan (for large corporations) and
ed messaging successor, Xpressions 470. ROLM was between a 30% and 100% of the carrier market, depend-
purchased by IBM in the mid 1980s (which was a -
316 CHAPTER 78. VOICEMAIL
ing on the country. By 1997 Octels biggest competitors mail platforms for virtually all of the major US wireless
were Audix, made by Lucent, and Meridian Mail, made carriers (including the seven RBOCs, AT&T Wireless
by Nortel. In July 1997, Octel was purchased by Lucent and McCaw), Canadian cellular carriers and a large per-
Technology. Lucents AUDIX division was merged into cent of the GSM carriers around the world.
Octel to form the Octel Messaging Division. By 2000, However it didn't take long for Comverse to become the
some estimate that there were over 150,000,000 active largest supplier to the BOCs and PTTs with Lucent/Octel
users of corporate and carrier voicemail made by the Oc- holding its leadership in the corporate market and second
tel Messaging Division. Shortly thereafter, Lucent spun place with carriers. Boston was eventually acquired by
o its corporate business, including the Octel Messaging
Comverse making it the second largest supplier to carriers
Division, into a company known as Avaya.[16] after Octel.
Boston Technology, uReach Technologies and Comverse
Technology all entered the carrier market in the early
1990s. Boston was eventually acquired by Comverse, 78.10 Unied messaging
making it the second largest supplier to carriers after Oc-
tel. However, in a few years Comverse became the largest
supplier to carriers with Lucent/Octel holding its leader- Unied Messaging integrated voice-mail into Microsoft
ship in the corporate market and second place with car- Exchange, the corporate email system made by
riers. Comverse today retains its leadership of legacy Microsoft. Unied Messaging had been invented by
voicemail systems sold to carriers around the world. For Roberta Cohen, Kenneth Huber and Deborah Mill at
IP-based voicemail systems, Ericsson claims market lead- AT&T Bell Labs. The patent for Unied Messaging was
ership with its Ericsson Messaging-over-IP (MoIP) so- received in June, 1989 (Patent number 4,837,798).
lution. uReach provides VoiceMail services for Verizon Unied Messaging allowed users to access voicemail and
and a host of other Tier 1 and Tier 2 carriers and is the email messages using either the graphical user interface
voice-mail system used by Verizon FIOS. uReach Tech- (GUI) on their PC, or using the telephone user interface
nologies was acquired by GENBAND in 2014.[17] (TUI). Using a PC, users could see voice-mails and emails
mixed together in their email inbox. Voice mails had a
little telephone icon next to them and emails had a little
envelope icon next to them (see gure below). For voice-
78.9 Public telephone services mail, they'd see the header information (sender, date
sent, size, and subject). Users could double-click a voice-
In the U.S., the Bell Operating Companies and their cel- mail from their email inbox and hear the message through
lular divisions had been prohibited by the FCC from of- their PC or a phone next to their desk.
fering voicemail and other enhanced services such as pag- Using any phone in the world, users could listen to voice
ing and telephone answering services (no such prohibition messages like they normally did, plus have emails read
existed in foreign countries). A ruling by Judge Harold to them (in synthesized voice). Voice messages could be
H. Greene on March 7, 1988 removed this barrier and sent using email or telephone addressing schemes, and
allowed the BOCs to oer voice-mail service, however the data networking infrastructure was used to send mes-
they were not allowed to design or manufacture equip- sages between locations rather than the public switched
ment used to provide voice-mail services. telephone network. It wasn't until the early 2000s and the
The opportunity created by the Greene decision, plus availability of reliable, high capacity email servers, high
Voicemail Internationals abandonment of its market lead speed internet connections and PCs with speakers or mi-
for carrier grade systems, created a new opportunity for crophones that Unied Messaging achieved commercial
competing manufacturers and those who had been focus- success.
ing on the corporate market. Unisys, Boston Technol-
ogy, and Comverse Technology were quick to address the
BOC and PTT marketplace. Octel, who had high capac- 78.11 Virtual telephony
ity systems in use interally by all seven Regional Bell Op-
erating companies, launched a new generation of its large Other interesting markets developed from the carrier
system specically designed for carriers and was compli- market including a concept called "virtual telephony.
ant with "NEBS standards, the tight standard required Virtual Telephony, developed by Octel, used voice-mail
by phone companies for any equipment located in their to provide phone service rapidly in emerging countries
central oces. without wiring for telephones. The problem this solved
While Unisys eventually secured PacBells residential was that emerging countries did not have many tele-
voice-mail services, Boston Technology became the phones. Wiring for telephones was very expensive, and
mainstay of Bell Atlantics residential voicemail oering many poorer citizens didn't have homes to wire. The
and Comverse Technology enjoyed some success in the economies of emerging countries were held back partly
European market; Octel became the provider of voice- because people could not communicate beyond the area
78.13. UNIFIED MESSAGING WITH VOIP 317
where they could walk or ride a bicycle. Giving them initiate a real-time text messaging exchange with you.
phones was one way to help their economies, but there Presence and Instant Messaging has since evolved into
was not a practical way to do it. In some countries, the more than short text messages, but now can include the
wait for a phone was several years and the cost was in exchange of data les (documents, pictures) and the es-
the thousands of dollars. Cellular phones were not an op- calation of the contact into a voice conversational con-
tion at the time because they were extremely expensive nection.
(thousands of dollars per handset) and the infrastructure
to install cell sites was also costly.
With virtual telephony, each person could be given a 78.13 Unied messaging with VoIP
phone number (just the number, not the phone) and a
voice mailbox. The citizen would also be given a pager. If
Corporate voice-mail did not change much until the ad-
someone called the phone number, it never rang on an ac-
vent of Voice over IP (VoIPvoice being transmitted
tual phone, but would be routed immediately to a central
over the internet) and the development of IP telephony
voice-mail system. The voice-mail system answered the
applications to replace legacy PBX telephony (called
call and the caller could leave a long, detailed message.
TDM technologies). IP (Internet Protocol) telephony
As soon as the message was received, the voice-mail sys-
changed the style and technology of PBXs and the way
tem would trigger the citizens pager. When the page was
voice-mail systems integrated with them. This, in turn,
received, the citizen would nd a pay phone and call in to
facilitated a new generation of Unied Messaging, which
pick up the message. This concept was used successfully
is now likely to catch on widely. The exibility, man-
in South America and South Africa.
ageability, lower costs, reliability, speed, and user conve-
nience for messaging convergence is now possible where
it wasn't before. This might include intra- and inter-
enterprise contacts, mobile contacts, proactive applica-
78.12 Instant messaging in voice tion information delivery, and customer contact applica-
tions.
By the year 2000, voicemail had become a ubiquitous fea-
The corporate IP telephony-based voice-mail CPEmarket
ture on phone systems serving companies, cellular and
is served by several vendors including Avaya, Cisco sys-
residential subscribers. Cellular and residential voice-
tems, Adomo, Interactive Intelligence, Nortel, Mitel,
mail continue today in their previous form, primarily
3Com, and AVST.[18] Their marketing strategy will have
simple telephone answering. Email became the preva-
to address the need to support a variety of legacy PBXs
lent messaging system, email servers and software be-
as well as new Voice over IP as enterprises migrate to-
came quite reliable, and virtually all oce workers were
wards converging IP-based telecommunications. A sim-
equipped with multimedia desktop PCs.
ilar situation exists for the carrier market for voice-mail
The increase in wireless mobility, originally through cel- servers, currently dominated by Comverse Technology,
lular services and today through IP-based Wi-Fi, was with some share still held by Lucent Technologies.
also a driver for messaging convergence with mobile tele-
VoIP telephony enables centralized, shared servers, with
phony. Today it is not only fostering the use of speech
remote administration and usage management for cor-
user interfaces for message management, but increasing
porate (enterprise) customers. In the past, carriers lost
the demand for retrieval of voice messages integrated
this business because it was far too expensive and inexi-
with email. It also enables people to reply to both voice
ble to have remote managed facilities by the phone com-
and email messages in voice rather than text. New ser-
pany. With VoIP, remote administration is far more eco-
vices, such as GotVoice, SpinVox and YouMail, are help-
nomical. This technology has re-opened opportunities for
ing to blur the boundaries between voice-mail and text by
carriers to oer hosted, shared services for all forms of
delivering voice-mails to mobile phones as SMS text mes-
converged IP telecommunications, including IP-PBX and
sages.
voice-mail services. Because of the convergence of wired
Instant messaging in voice: The next development in mes- and wireless communications, such services may also in-
saging was in making text messaging real-time, rather clude support of a variety of multi-modal handheld and
than just asynchronous store-and-forward delivery into a desktop end user devices. This service, when oered for
mailbox. It started with Internet service provider Amer- multiple extensions or phone numbers is sometimes also
ica Online (AOL) as a public Internet-based free text called Unied Voice-mail.
chat service for consumers, but soon was being used
by business people as well. It introduced the concept of
Internet Protocol presence management or being able
to detect device connectivity to the Internet and contact 78.14 Voicemail benets
recipient availability status to exchange real-time mes-
sages, as well as personalized Buddy list directories to Voice mails introduction enabled people to leave lengthy,
allow only people you knew to nd out your status and secure and detailed messages in natural voice, working
318 CHAPTER 78. VOICEMAIL
hand-in-hand with corporate phone systems. The adop- ringing Freds extension and forwards the call to an exten-
tion of voice-mail in corporations improved the ow of sion connected to the voicemail system (C). It does this
communications and saved huge amounts of money. GE, because PBXs are generally programmed to forward busy
one of the pioneer adopters of voice-mail in all of its of- or unanswered calls to another extension. Simultaneously
ces around the world, claimed that voice-mail saved, on the PBX tells the voicemail system (through signaling link
average, over US$1,100 per year per employee. Need- D) that the call it is forwarding to voice-mail is for Fred
less to say, the ability to tell someone something with- at extension 2345. In this way, the voicemail system can
out talking to them, can be a powerful reason to choose answer the call with Freds greeting.
Voice-mail for delivery of a particular message.
Voicemail has two main modes of operation: telephone
answering and voice messaging. Telephone answering
mode answers outside calls and takes a message from any
outside caller (either because the extension was busy or
rang no-answer). Voice messaging enables any subscriber
(someone with a mailbox number) to send messages di-
rectly to any or many subscribers mailboxes without rst
calling them. Both of these modes are described below.
When Fred comes back to his desk and sees the light on 78.16 See also
his phone, he calls a designated extension number for the
voicemail system (an actual extension number assigned to Vertical service code
the lines in C in the gure above).
Again the Telephone Interface alerts the CPU that a call Visual voicemail
is coming in on a particular line, but this time the signal-
ing from the PBX-Voicemail Data Link (D) indicates that
Fred is calling directly, not being forwarded. The CPU 78.17 References
directs the Telephone Interface to answer the call.
Since the CPU knows it is Fred (from the signaling on [1] The History of Voicemail. Everyvoicemail.com. 2002-
the Data Link D), it looks up Freds information on the 02-23. Retrieved 2013-04-30.
System Disk, specically his password. The CPU then
[2]
directs Disk Controller to play a log-on prompt to the
user: Please enter your password. Once the password [3] Moscaritolo, Angela (2012-09-04). Poll: Is Voicemail
is entered (via Touch-tones), the CPU compares it to the Dead? Weigh In | News & Opinion. PCMag.com. Re-
correct one and, if entered correctly, allows Fred to con- trieved 2013-04-30.
tinue.
[4] Edison A Biography, Mathew Josephson Chapter 9 http:
The CPU then determines (from Freds directory entry) //memory.loc.gov/ammem/edhtml/edcyldr.html
that Fred has a new message. The CPU then presents
Fred his options (e.g., You have a new message. To listen [5] Dexter Hutchins (October 28, 1985). The Legal Battles
to your new message, press 1; to record a message, press Over Voice Messaging: A young inventor from Florida
2 etc.) The options are presented by the CPU directing says the technology is his. So does a small company in
the Disk Controller to play prompts, and the CPU listens Texas. Both have sued to protect it.. FORTUNE.
for Touch-tones from Fred. This interaction of playing
[6] United States Patent: 4124773. United States Patent
prompts and responding with Touch-tones enables Fred
and Trademark Oce.
to interact with the voicemail system easily.
If Fred presses 1 to listen to his message, the CPU looks [7] Mimi Whiteeld (February 5, 1996). How to Survive the
up the location of Freds new message in his mailbox di- Road from Invention to Marketplace. The Miami Herald.
rectory (on the System Disk), and directs the Disk Con-
[8] Viki McCash (August 7, 1995). Inventor Battles to Pro-
troller to play that message. The Disk Controller nds the tect Patents. Sun Sentinel.
message on the Message Disks, and sends the data stream
directly to the Telephone Interface. The Telephone Inter- [9] J. D. Gould, S. J. Boies (1984). Speech ling - an oce
face then converts the data stream to sound and plays it system for principals. 23. IBM Systems Journal: 65.
to Fred through the Line Interface Card which Fred is
connected to. [10] Eight editions of IBM UKs Talking lines magazine with
a print run of over 10,000
Playback controls (like rewind, pause, fast forward,
changing volume, etc.) are all input via Touch-tones, are [11] IBM UK 1980s publicity material researched and written
read by the CPU, and the appropriate actions are taken by Duncan Ogilvie
based on the stored program in the system. For example,
if Fred wants to pause message playback, he might press [12] History of Lee Enterprises Inc. FundingUniverse.
Fundinguniverse.com. Retrieved 2013-04-30.
2. Since the CPU is constantly listening for Touch-tones
from Fred, his command causes the CPU to direct the [13] Finnegan USA LLC
Disk Controller to stop playing the message. A variety of
playback controls and options are available on most so- [14] VMA home page
phisticated voice-mail systems so that users can control
message playback, store messages in archives, send mes- [15] COMPANY NEWS; Rolm Sale By I.B.M. To Siemens.
sages to groups, change their preferences, etc. New York Times. May 8, 1992. Retrieved 2011-03-29.
The better designed voicemail systems have a user- [16] Avaya Octel. Voice Main, Inc. 2008. Retrieved 2008-
friendly interface with clear and meaningful prompts so 01-09.
the interaction with the voicemail system is quick and
easy. [17] Reedy, Sarah (February 18, 2014). Genband Extends
UC Reach With uReach Buy. Light Reading. Retrieved
2014-03-23.
78.18 Further reading had denitely been thinking about a voice-mail sys-
tem prior to this visit but he had denitely not es-
A Reactive Telephone Message Network for the tablished his company or raised the capital to do so.
Oce of the Future, Business Communications Furthermore, his product plan was still very much in
Review, July-Aug 1980; Voice Mail Arrives in the the formative stage and never reached the sophisti-
Oce, Business Week, June 9, 1980, p. 81. cation of the Delphi oering. Needless to say, there
was no employment oer made to Matthews by Del-
The Case for Voice Mail: Conrmed. GE Corpo- phi.
rate Telecommunications publication, May, 1989,
Transcriptions of various seminars sponsored by
Constance C. Kelly, editor.
Probe Research, Inc., September, 1982:
IBM Audio Distribution System, IBM publication Voice Message Service, Proceedings of
GX60-0075-0 Voice Processing Seminar, September 15,
Toward Competitive Provision of Public Record 1982;
Message Services, Experimental Technology In- BBL Industries, Inc., Proceedings of Voice
centives Program, National Bureau of Standards, Processing Seminar, September 15, 1982;
Washington, DC. Publication NBX-GCR-ETIP-81- Wang Laboratories, Proceedings of Voice
97 October, 1991. Processing Seminar, September 16, 1982;
Speech Filing System Reference Manual, 1975, American Telephone and Telegraph, Inc.,
by J. W. Schoonard and S. J. Boies, IBM Research Proceedings of Voice Processing Seminar,
Center, Yorktown Heights, NY, 10598. September 16, 1982;
Commterm, Inc., Proceedings of Voice Pro-
How to Shoulder Aside the Titans, Gene Bylin- cessing Seminar, Sep. 16, 1982.
sky, Fortune, May 18, 1992; Octel Keeps Bringing
You Voice Mail, Global Telecoms Business (UK), Voice Store and Forward for the Automated Of-
February/March 1996, pp. 2224 ce, a presentation by Lawrence E. Bergeron, Den-
nis B. Howell and Dean Osborne, Wang Labora-
Human Factors Challenges In Creating A Principal tories, Inc., Lowell, Mass., transcribed in Com-
Support Oce System: The Speech Filing System puter Controlled Voice Message Systems and the
Approach, by John D. Gould and Stephen J. Boies, Oce of the Future, Professional Program Session
IBM Tomas J. Watson Research Center, as quoted Record (10), Wescon/81, Electronic Show and Con-
in a paper presented to the Association for Com- vention, September 1517 September 1981, section
puter Machinery. See ACM Transactions on Oce 2, pp. 18.
Information Systems, Vol. 1, No. 4, October 1983,
pp. 273298. The PhoneMail System for the ROLM CBX, pub-
lication by ROLM Corporation.
Speech Filing: An Oce System For Principals,
by J.D. Gould and S.J. Boies, IBM Systems Journal, Octel Emerges as Rising Star in Voice Messaging
Volume 23, Number 1, 1984, p. 65. Systems, Peninsula Times Tribune, November 7,
1988, page C-1; Investors Waking Up to Octels
IBM Audio Distribution System Subscribers Leadership, Investors Daily, February 17, 1989;
Guide and IBM Audio Distribution System, Ad- Octels Stock Gamble Has Paid O, USA Today,
ministrators Guide. IBM Publications SC34- Friday, February 24, 1989, page 3B.
0400-3 and SC34-0400-1
Octel Communications Corporation, lings with
Correspondence with Jay Stoer, March 26, 2006: the Securities and Exchange Commission for its
" As to Gordon Matthews, I was introduced to prospectus for secondary public oering, August
him by a Venture Capitalist that later invested in 15, 1989; Various internal manuals and publications
Delphi. I met with Gordon and his wife at their from Octel Communications Corporation.
home in Dallas with the objective of ascertaining All Your Messages in One Place, Michael H. Mar-
if he could contribute to our product planning pro- tin, Fortune, May 12, 1997, p. 172.
cess. I concluded that he would not be likely to add
value in that activity but that my colleagues should Toward Competitive Provision of Public Record
evaluate his potential contribution to Engineering. Message Services, ETIP (Experimental Technol-
To that end, we ew Gordon back to LA where he ogy Incentives Program), National Bureau of Stan-
was interviewed by members of our technical team. dards, Washington, D.C., October, 1981; do-
It was at this time (1973/1974) that he would have mestic Public Message Services, FCC publication
seen a demonstration of the voice application. He 71FCC 2d 471; Telecommunications Competition
78.18. FURTHER READING 321
VoIP phone
322
79.3. HARDWARE 323
follow those of Skype, Google Voice and other PC-based quired when the two SIP phones connecting are routable
phone services, which have richer feature sets but (be- from each other and no rewall exists in between.
cause they rely on mainstream operating systems IP sup-
port) latency-related audio problems.
A competing view is that as mainstream operating sys- 79.2.2 DHCP client
tems become better at voice applications with appropri-
ate Quality of Service (QoS) guarantees and 5G hand- A DHCP client may be used to congure the TCP/IP pa-
o (IEEE 802.21 etc.) becomes available from outdoor rameters and server details if a network segment uses
wireless carriers, netbooks and smartphones will simply dynamic IP address conguration. The DHCP client
become the dominant interfaces. iPhone, Android and then provides central and automatic management of VoIP
the QNX OS used in 2012-and-later BlackBerry phones phones conguration.
are generally capable of VoIP performance even on small
battery-charged devices. They also typically support the
USB but not Ethernet or Power over Ethernet interfaces, 79.3 Hardware
at least as of late 2011. According to this view, the
smartphone becomes the dominant VoIP phone because
it works both indoors and outdoors and shifts base sta-
tions/protocols easily to trade o access costs and call
clarity and other factors personal to the user, and the
PoE/USB VoIP phone is thus the transitional device.
A voice engine or a digital signal processor (DSP) Conference and multiparty call
to process RTP messages. Some IC manufacturers
provides GPP and DSP in single chip. Call park
AD and DA converters: To convert voice to digital Multiple VOIP accounts. The phone may register
data and vice versa. with more than one VOIP server/provider.
Ethernet or wireless network hardware to send and Accounts are usually set and memorized on
receive messages on data network. the phone itself. A more sophisticated feature
is dynamic download of account settings, also
Most IP phones have an Ethernet port for a PC. known as extension mobility. This feature
This allows your computer and phone to share one allows settings stored on a server to be down-
data connection, routed through the phone and to the loaded to the phone, based on user login. The
computer. user logs into the phone and that phone be-
comes the users extension. This feature re-
Power source might be a battery or AC source. quires both a client (phone) and a server, usu-
Some VoIP phones receive electricity from Power ally in the context of unied communications
over Ethernet. systems.
Some VoIP phones include an RJ-11 port to connect Encrypted communications
the phone to the PSTN.
Applications like weather report, Attendance in
For wireless VoIP phones school and oces, Live news etc.
Media phone
Mobile VoIP
79.7 References
[1] Voip Providers.
X.25
DTE
DCE worked into the standard, eventually recorded in the ITU
DCE DTE series of technical books describing the telecommunica-
tion systems. These books were published every fourth
year with dierent-colored covers. The X.25 specica-
tion is only part of the larger set of X-Series[9] specica-
DCE PSE PSE
DCE
tions on public data networks.[10]
DTE
The public data network was the common name given to
PAD
the international collection of X.25 providers. Their com-
DTE bined network had large global coverage during the 1980s
and into the 1990s.[11]
Publicly accessible X.25 networks (Compuserve,
X.25 network diagram
Tymnet, Euronet, PSS, Datapac, Datanet 1 and Telenet)
were set up in most countries during the 1970s and
X.25 is an ITU-T standard protocol suite for packet
1980s, to lower the cost of accessing various online
switched wide area network (WAN) communication. An
services.
X.25 WAN consists of packet-switching exchange (PSE)
nodes as the networking hardware, and leased lines, plain Beginning in the early 1990s, in North America, use of
old telephone service connections, or ISDN connections X.25 networks (predominated by Telenet and Tymnet)[11]
as physical links. X.25 is a family of protocols that started to be replaced by Frame Relay, service oered
was popular during the 1980s with telecommunications by national telephone companies.[12] Most systems that
companies and in nancial transaction systems such as required X.25 now use TCP/IP, however it is possible to
automated teller machines. X.25 was originally dened transport X.25 over TCP/IP when necessary.[13]
by the International Telegraph and Telephone Consul- X.25 networks are still in use throughout the world. A
tative Committee (CCITT, now ITU-T) in a series of variant called AX.25 is also used widely by amateur
drafts[1] and nalized in a publication known as The Or- packet radio. Racal Paknet, now known as Widanet, is
ange Book in 1976.[2] still in operation in many regions of the world, running
While X.25 has, to a large extent, been replaced by on an X.25 protocol base. In some countries, like the
less complex protocols, especially the Internet protocol Netherlands or Germany, it is possible to use a stripped
(IP), the service is still used (e.g. as of 2012 in credit version of X.25 via the D-channel of an ISDN2 (or
card payment industry) and available in niche and legacy ISDN BRI) connection for low volume applications such
applications.[3] as point-of-sale terminals; but, the future of this service
in the Netherlands is uncertain.
Additionally X.25 is still under heavy use in the aeronau-
80.1 History tical business (especially in the Asian region) even though
a transition to modern protocols like X.400 is without
X.25 is one of the oldest packet-switched services avail- option as X.25 hardware becomes increasingly rare and
able. It was developed before the OSI Reference costly. As recently as March 2006, the United States Na-
Model.[4] The protocol suite is designed as three concep- tional Airspace Data Interchange Network has used X.25
tual layers, which correspond closely to the lower three to interconnect remote airelds with Air Route Trac
layers of the seven-layer OSI model.[5] It also supports Control Centers.
functionality not found in the OSI network layer.[6][7] France was one of the last remaining countries where
X.25 was developed in the ITU-T (formerly CCITT) commercial end-user service based on X.25 operated.
326
80.2. ARCHITECTURE 327
Known as Minitel it was based on Videotex, itself run- The X.25 model was based on the traditional telephony
ning on X.25. In 2002, Minitel had about 9 million users, concept of establishing reliable circuits through a shared
and in 2011, it still accounted for about 2 million users in network, but using software to create "virtual calls"
France when France Tlcom announced it would com- through the network. These calls interconnect data ter-
pletely shut down the service by 30 June 2012.[14] As minal equipment (DTE) providing endpoints to users,
planned, service was terminated 30 June 2012. There which looked like point-to-point connections. Each end-
were 800 000 terminals still in operation at the time.[15] point can establish many separate virtual calls to dierent
endpoints.
For a brief period, the specication also included a con-
80.2 Architecture nectionless datagram service, but this was dropped in the
next revision. The fast select with restricted response
The general concept of X.25 was to create a universal facility is intermediate between full call establishment
and global packet-switched network. Much of the X.25 and connectionless communication. It is widely used in
system is a description of the rigorous error correction query-response transaction applications involving a single
needed to achieve this, as well as more ecient sharing request and response limited to 128 bytes of data carried
of capital-intensive physical resources. each way. The data is carried in an extended call request
packet and the response is carried in an extended eld of
The X.25 specication denes only the interface between
the call reject packet, with a connection never being fully
a subscriber (DTE) and an X.25 network (DCE). X.75,
established.
a very similar protocol to X.25, denes the interface be-
tween two X.25 networks to allow connections to traverse Closely related to the X.25 protocol are the protocols to
two or more networks. X.25 does not specify how the connect asynchronous devices (such as dumb terminals
network operates internally many X.25 network imple- and printers) to an X.25 network: X.3, X.28 and X.29.
mentations used something very similar to X.25 or X.75 This functionality was performed using a Packet Assem-
internally, but others used quite dierent protocols inter- bler/Disassembler or PAD (also known as a Triple-X de-
nally. The ISO equivalent protocol to X.25, ISO 8208, is vice, referring to the three protocols used).
compatible with X.25, but additionally includes provision
for two X.25 DTEs to be directly connected to each other
with no network in between. By separating the Packet- 80.2.1 Relation to the OSI Reference
Layer Protocol, ISO 8208 permits operation over addi- Model
tional networks such as ISO 8802 LLC2 (ISO LAN) and
the OSI data link layer.[16] Although X.25 predates the OSI Reference Model
(OSIRM), the physical Layer of the OSI model corre-
X.25 originally dened three basic protocol levels or ar-
sponds to the X.25 physical layer, the data link layer to
chitectural layers. In the original specications these
the X.25 data link layer, and the network layer to the
were referred to as levels and also had a level number,
X.25 packet layer.[10] The X.25 data link layer, LAPB,
whereas all ITU-T X.25 recommendations and ISO 8208
provides a reliable data path across a data link (or multi-
standards released after 1984 refer to them as layers.[17]
ple parallel data links, multilink) which may not be reli-
The layer numbers were dropped to avoid confusion with
able itself. The X.25 packet layer provides the virtual call
the OSI Model layers.[1]
mechanisms, running over X.25 LAPB. The packet layer
includes mechanisms to maintain virtual calls and to sig-
Physical layer: This layer species the physical, nal data errors in the event that the data link layer cannot
electrical, functional and procedural characteristics recover from data transmission errors. All but the ear-
to control the physical link between a DTE and a liest versions of X.25 include facilities[18] which provide
DCE. Common implementations use X.21, EIA- for OSI network layer Addressing (NSAP addressing, see
232, EIA-449 or other serial protocols. below).[19]
Data link layer: The data link layer consists of the
link access procedure for data interchange on the
link between a DTE and a DCE. In its implementa- 80.2.2 User device support
tion, the Link Access Procedure, Balanced (LAPB)
is a data link protocol that manages a communica- X.25 was developed in the era of computer terminals con-
necting to host computers, although it also can be used
tion session and controls the packet framing. It is a
bit-oriented protocol that provides error correctionfor communications between computers. Instead of di-
and orderly delivery. aling directly into the host computer which would
require the host to have its own pool of modems and
Packet layer: This layer dened a packet-layer pro- phone lines, and require non-local callers to make long-
tocol for exchanging control and user data packets distance calls the host could have an X.25 connection
to form a packet-switching network based on virtual to a network service provider. Now dumb-terminal users
calls, according to the Packet Layer Protocol. could dial into the networks local PAD (Packet As-
328 CHAPTER 80. X.25
Network Service (CONS).[21] Public X.25 networks were a price-per-segment on top of this.[30] Link speeds var-
not required to make use of NSAP addressing, but, to ied, typically from 2400 bit/s up to 2 Mbit/s, although
support OSI CONS, were required to carry the NSAP speeds above 64 kbit/s were uncommon in the public net-
addresses and other ITU-T specied DTE facilities trans- works. A segment was 64 bytes of data (rounded up,
parently from DTE to DTE.[22] Later revisions allowed with no carry-over between packets),[31] charged to the
multiple addresses in addition to X.121 addresses to be caller[32] (or callee in the case of reverse charged calls,
carried on the same DTE-DCE interface: Telex address- where supported).[33] Calls invoking the Fast Select facil-
ing (F.69), PSTN addressing (E.163), ISDN addressing ity (allowing 128 bytes of data in call request, call con-
(E.164), Internet Protocol addresses (IANA ICP), and lo- rmation and call clearing phases)[34] would generally at-
cal IEEE 802.2 MAC addresses.[23] tract an extra charge, as might use of some of the other
X.25 facilities. PVCs would have a monthly rental charge
PVCs are permanently established in the network and
therefore do not require the use of addresses for call and a lower price-per-segment than VCs, making them
cheaper only where large volumes of data are passed.
setup. PVCs are identied at the subscriber interface
by their logical channel identier (see below). However,
in practice not many of the national X.25 networks sup-
ported PVCs. 80.5 X.25 packet types
One DTE-DCE interface to an X.25 network has a max-
imum of 4095 logical channels on which it is allowed to 80.6 X.25 details
establish virtual calls and permanent virtual circuits,[24]
although networks are not expected to support a full 4095
The network may allow the selection of the maximal
virtual circuits.[25] For identifying the channel to which a
length in range 16 to 4096 octets (2n values only) per vir-
packet is associated, each packet contains a 12 bit logi-
tual circuit by negotiation as part of the call setup pro-
cal channel identier made up of an 8-bit logical chan-
cedure. The maximal length may be dierent at the two
nel number and a 4-bit logical channel group number.[24]
ends of the virtual circuit.
Logical channel identiers remain assigned to a virtual
circuit for the duration of the connection.[24] Logical
channel identiers identify a specic logical channel be- Data terminal equipment constructs control packets
tween the DTE (subscriber appliance) and the DCE (net- which are encapsulated into data packets. The pack-
work), and only has local signicance on the link between ets are sent to the data circuit-terminating equip-
the subscriber and the network. The other end of the con- ment, using LAPB Protocol.
nection at the remote DTE is likely to have assigned a Data circuit-terminating equipment strips the layer-
dierent logical channel identier. The range of possible 2 headers in order to encapsulate packets to the in-
logical channels is split into 4 groups: channels assigned ternal network protocol.
to permanent virtual circuits, assigned to incoming virtual
calls, two-way (incoming or outgoing) virtual calls, and
outgoing virtual calls.[26] (Directions refer to the direc- 80.6.1 X.25 facilities
tion of virtual call initiation as viewed by the DTE they
all carry data in both directions.)[27] The ranges allowed X.25 provides a set of user facilities dened and de-
a subscriber to be congured to handle signicantly dif- scribed in ITU-T Recommendation X.2.[35] The X.2 user
fering numbers of calls in each direction while reserving facilities fall into ve categories:
some channels for calls in one direction. All International
networks are required to implement support for perma- Essential facilities;
nent virtual circuits, two-way logical channels and one-
way logical channels outgoing; one-way logical channels Additional facilities;
incoming is an additional optional facility.[28] DTE-DCE
Conditional facilities;
interfaces are not required to support more than one logi-
cal channel.[26] Logical channel identier zero will not be Mandatory facilities; and,
assigned to a permanent virtual circuit or virtual call.[29]
The logical channel identier of zero is used for packets Optional facilities.
which don't relate to a specic virtual circuit (e.g. packet
layer restart, registration, and diagnostic packets). X.25 also provides X.25 and ITU-T specied DTE op-
tional user facilities dened and described in ITU-T Rec-
ommendation X.7.[36] The X.7 optional user facilities fall
into four categories of user facilities that require:
80.4 Billing
Subscription only;
In public networks, X.25 was typically billed as a at
monthly service fee depending on link speed, and then Subscription followed by dynamic invocation;
330 CHAPTER 80. X.25
X.PC
The X.25 Recommendation allows many options for each
network to choose when deciding which features to sup- packeting the Philippine X.25 network, and rst
port and how certain operations are performed. This publicly operated packet switching network
means each network needs to publish its own document
giving the specication of its X.25 implementation, and
most networks required DTE appliance manufacturers to
undertake protocol conformance testing, which included
80.8 References
testing for strict adherence and enforcement of their net-
work specic options. (Network operators were particu- [1] CCITT, Study Group VII, Draft Recommendation X-25,
March 1976
larly concerned about the possibility of a badly behaving
or miscongured DTE appliance taking out parts of the [2] History of X.25, CCITT Plenary Assemblies and Book
network and aecting other subscribers.) Therefore, sub- Colors
scribers DTE appliances have to be congured to match
the specication of the particular network to which they [3] Foregenix (February 2012). X.25 within the Payment
Card Industry (PDF). Retrieved 25 May 2016.
are connecting. Most of these were suciently dierent
to prevent interworking if the subscriber didn't congure [4] (Friend et al. 1988, p. 242)
their appliance correctly or the appliance manufacturer
didn't include specic support for that network. In spite [5] (Friend et al. 1988, p. 243)
of protocol conformance testing, this often lead to inter-
[6] ITU-T Recommendation X.28.
working problems when initially attaching an appliance
to a network. [7] ITU-T Recommendation X.3.
In addition to the CCITT/ITU-T versions of the protocol, [8] X.25 Virtual Circuits Transpac in France Pre-Internet
four editions of ISO/IEC 8208 exist:[39] Data Networking.
[18] ITU-T Recommendation X.25, G.3.2 Called address ex- Friend, George E.; Fike, John L.; Baker, H. Charles;
tension facility, pp. 141142. Bellamy, John C. (1988). Understanding Data Com-
munications (2nd ed.). Indianapolis: Howard W.
[19] ITU-T Recommendation X.223, Appendix II. Sams & Company. ISBN 0-672-27270-9.
[20] ITU-T Recommendation X.7 (04/2004), pp. 1718. Pooch, Udo W.; William H. Greene; Gary G.
Moss (1983). Telecommunications and Networking.
[21] ITU-T Recommendation X.223.
Boston: Little, Brown and Company. ISBN 0-316-
[22] ITU-T Recommendation X.25 (10/96), Annex G, p. 140. 71498-4.
[23] ITU-T Recommendation X.213, Annex A. Schatt, Stan (1991). Linking LANs: A Micro Man-
agers Guide. McGraw-Hill. ISBN 0-8306-3755-9.
[24] ITU-T Recommendation X.25 (10/96), p. 45.
Thorpe, Nicolas M.; Ross, Derek (1992). X.25
[25] ITU-T Recommendation X.283 (12/97), p. 42. Made Easy. Prentice Hall. ISBN 0-13-972183-5.
[26] ITU-T Recommendation X.25 (10/96), Annex A, pp.
119120.
80.10 External links
[27] ISO/IEC 8208:2000, Fourth Edition, p. 61.
Recommendation X.25) at ITU-T
[28] ITU-T Recommendation X.2 (03/2000), p. 4.
Cisco X.25 Reference
[29] ISO/IEC 8208:2000, Fourth Edition, 3.7.1, p. 7.
An X.25 Networking Guide with comparisons to
[30] ITU-T Recommendation D.11 (03/91), p. 2.
TCP/IP
[31] ITU-T Recommendation D.12 (11/88), p. 1.
X.25 Directory & Informational Resource
[32] ITU-T Recommendation X.7 (04/2004), p. 42.
RFCs and other resources by Open Directory
[33] ITU-T Recommendation D.11 (03/91), p. 3.
Ernestvoice, 4th-otaku, Theh1982, AnomieBOT, Indulis.b, Kerrygarrison, Techy71, Ming3379, K3lw3ll, MauritsBot, Xqbot, Sputink,
Tollsjo, GrouchoBot, FrescoBot, Mfwitten, Radha1587, Jschnur, Nityanandparab, Asterisknetru, Jjardon, Lotje, Alph Bot, DASHBot,
John of Reading, Dewritech, Wikilogin123, H3llBot, JetBlast, Theopolisme, Vardan.vardanyan, Tomsimon001, Callware, Torsti, Rancher
42, Igorportugal, K7L, Gdraque, Rio85~enwiki, Artvister company, Reconwireless, Quickthyme, Malcolmdavenport, Kyle.r.dunn, Kansi-
ime, Wandagrain, MichaelZellan, Trembluer12 and Anonymous: 260
Asterisk Gateway Interface Source: https://en.wikipedia.org/wiki/Asterisk_Gateway_Interface?oldid=745279047 Contributors: Over-
lordQ, Stephan Leeds, Gurch, Brandon, SmackBot, Kuru, TastyPoutine, Alaibot, Joey Novak, Giggy, Seanbright, Kbrose, Addbot, Leszek
Jaczuk, Darrenvoip, InternetArchiveBot and Anonymous: 5
Automatic call distributor Source: https://en.wikipedia.org/wiki/Automatic_call_distributor?oldid=722172705 Contributors: Cameron
Dewe, Pcb21, Bogdangiusca, Alexs, Radiojon, Robbot, Hadal, Delta G, Abdull, CALR, Rich Farmbrough, Gpowers, El C, Velella, Firsfron,
Whooba, Srleer, Chobot, Phantomsteve, PrologFan, Mrtea, SmackBot, Edgar181, Emj, OGlynn, Pgillman, Tasc, Larrymcp, CmdrObot,
Ville Lehtonen, DanielRigal, Harryzilber, Magioladitis, Marc.verschoor, Alleborgo, Calltech, Jim.henderson, Bonadea, TXiKiBoT, Rei-
bot, Mcsbloom, Sebum-n-soda, Aleassa, The Thing That Should Not Be, DanielDeibler, DumZiBoT, Dgtsyb, Addbot, Ginosbot, Apteva,
Ciphers, Andreaspstuber, Erik9bot, Predictive, Phonetalk, Michael.prince1990, Helseykc1975, TipRing1234, Hyavari and Anonymous:
57
Automatic number identication Source: https://en.wikipedia.org/wiki/Automatic_number_identification?oldid=748509801 Contrib-
utors: Heron, Michael Hardy, Julesd, Feedmecereal, Mbstone, Radiojon, Rfc1394, Rchandra, Solipsist, Sonett72, LDBear, Rcsheets,
O18, Gpvos, H2g2bob, Alvis, Woohookitty, Thomasmschaefer, Elvey, Coneslayer, Olessi, GabrielSjoberg, DMahalko, Sjobeck, ENeville,
Vivaldi, Voidxor, SmackBot, Bluebot, Northern Aurora, Dethme0w, JonHarder, Jeremyb, Shattered, Larrymcp, Qu4rk, Devourer09,
Guru6969, E3vil, Malvineous, Jantman, Harryzilber, Albany NY, Bellhead, Blatkinson, Magioladitis, Jim.henderson, Wandering Ghost,
Oshwah, Kbrose, Wdwd, Nnemo, Dcj21, Rockfang, Dovidb, Dgtsyb, Addbot, Sillyfolkboy, Yobot, AnomieBOT, DrilBot, DASHBot,
Geosocial, Leitz31337, Widr, K7L, GreenC bot, Kusal rasanga and Anonymous: 30
Business telephone system Source: https://en.wikipedia.org/wiki/Business_telephone_system?oldid=746553562 Contributors: Nonen-
mac, Ronz, Baylink, Radiojon, Nurg, Diderot, Smjg, Alanl, MRSC, Diagonalsh, ArnoldReinhold, JoeSmack, Triona, Cmdrjame-
son, Atlant, Danhash, Blaxthos, Feezo, Woohookitty, Graham87, Pleiotrop3, Vegaswikian, Srleer, RussBot, Madkayaker, Stephenb,
Vanished user kjdioejh329io3rksdkj, Grafen, Mgcsinc, Boogachamp, David Jordan, JLaTondre, SmackBot, Jprg1966, Reagoso, X570,
BoKu, Stevenmitchell, Ianmacm, Pgillman, Kuru, John, Robosh, Breno, JHunterJ, Kvng, Hu12, Pumbaa80, Djg2006, Richard416282,
Dawnseeker2000, Widefox, Harryzilber, Adams kevin, LorenzoB, Jim.henderson, R'n'B, CommonsDelinker, Fountains of Bryn Mawr,
KylieTastic, Tekkaman~enwiki, Vishal0soni, Coreyxbs, Retaildesigner, The Original Wildbear, Telecineguy, Kbrose, SimonTrew, Fish-
net37222, Denisarona, JL-Bot, Binksternet, R000t, Niceguyedc, Rprpr, Timmbacher, Auntof6, Jocoks, Addbot, Rikazashi, CMSgt Carl,
Download, Enduser, Dtate888, Yobot, Fraggle81, KamikazeBot, AnomieBOT, Materialscientist, Freeness, Ianjs, LilHelpa, Davidcx, Pick-
les8, Tudorgibson, Simjonathan, Mfwitten, Ahnoneemoos, BRUTE, Jandalhandler, Skakkle, Mean as custard, DASHBot, Jsung123, K6ka,
ZroBot, Orange Suede Sofa, Deancolmer, Humannetwork, Isawk2003, ClueBot NG, WikiPuppies, Helpful Pixie Bot, Pabxpromo, Batty-
Bot, David.moreno72, Guoyj2003, Marian Sobolewski, Jmediate88, Jeremy1979, Chatterboxer, K7L, Datacenterking, Suparnoc, Rybec,
Sumitra.chatterjee, Wilson.stella, BSmithTelecom, Werddemer, Azharuddinm, Scratch978, Jedsta, Muhamma Arshed, Iandharris, Tele-
phonesystems, Bart.michiels, Bawill123, Mahirgul, Clicksouth, MikeJohn17, Bhaveshrevet, Ucscanada, Jaimenicole and Anonymous: 89
Call capture Source: https://en.wikipedia.org/wiki/Call_capture?oldid=697872463 Contributors: Taral, Sole Soul, Johnteslade, Danhash,
Ketiltrout, FTIII, Aeusoes1, Dugosz, Mysid, Zzuuzz, Veinor, User24, SmackBot, Demiangie, IReceivedDeathThreats, Miselconsulting,
JodyB, Skitzzo, C4dn, Jmillersarbro, Dbcllc, Gregmyagent, Erik9bot, Lobbyroad and Anonymous: 18
Call waiting Source: https://en.wikipedia.org/wiki/Call_waiting?oldid=743880183 Contributors: Bryan Derksen, Caltrop, Dysprosia, Ra-
diojon, Denelson83, Chris Roy, CaribDigita, Mac Davis, YurikBot, Wavelength, Clib, Gcapp1959, Fender123, SmackBot, Michael-
hood, Clq, El aprendelenguas, Gogo Dodo, Jbl1975, Spacecat2, Harryzilber, Magioladitis, Jim.henderson, R'n'B, Jmrowland, MenasimBot,
Technopat, Rei-bot, EmxBot, Kbrose, BotMultichill, Jefago, Rajeshparke, Addbot, Manouska, Milepost53, Rubinbot, I dream of horses,
Imperium723, Somapsychotic, Zollerriia, , Rilnerus, Vcohen, Havrer0, Iqoo abbasi and Anonymous: 20
Called party Source: https://en.wikipedia.org/wiki/Called_party?oldid=746346077 Contributors: Dysprosia, Rfc1394, Hooperbloob, The
wub, Srleer, Misza13, Rigadoun, Robosh, Rawmustard, Alaibot, Jim.henderson, Rettetast, RSStockdale, Dawynn, Yobot, AnomieBOT,
Erik9bot, Tinton5, Muon, Dexbot, K7L and Anonymous: 12
Caller ID Source: https://en.wikipedia.org/wiki/Caller_ID?oldid=753600635 Contributors: Caltrop, Patrick, Infrogmation, Gbroiles,
Mahjongg, Pnm, Cameron Dewe, Ronz, Baylink, Radiojon, Itai, Cluth, Wanion, Owain, R3m0t, Rfc1394, Hadal, Netje, Xanzzibar,
Mattaschen, Buster2058, Dbenbenn, Smjg, DocWatson42, Abqwildcat, Rchandra, Solipsist, Tagishsimon, Gadum, Andycjp, Bob.v.R,
Sam Hocevar, Sonett72, Philip lamb, Discospinster, Rich Farmbrough, LDBear, Guanabot, Quiensabe, Martpol, Simon South, Bobo192,
Elipongo, Kappa, Homerjay, Kjkolb, Nihil~enwiki, Orangemarlin, Espoo, Guy Harris, Ynhockey, Gpvos, RainbowOfLight, Dismas, Ar-
mando, Pol098, Tabletop, Hbdragon88, SDC, LinkTiger, Rlw, Noselasd, Elvey, Josh Parris, Leeyc0, FlaBot, Ground Zero, Jdforrester-
Bot, Jordan Elder, Rupl, Micler, Srleer, Mrschimpf, Slimey.limey, ShadowHntr, Peterl, Gwernol, YurikBot, Todd Vierling, Phantom-
steve, SpuriousQ, Shaddack, Enote, Gcapp1959, Aryaniae, Dugosz, Julien Deveraux, R.a.f, Larry laptop, Vivaldi, Voidxor, Mysid, Elk-
man, Ojota, Open2universe, Ledow, Smurrayinchester, NFH, Smurfy, MacsBug, User24, SmackBot, HWSager, Demiangie, Sanjay ach,
FlashSheridan, Kintetsubualo, Unforgettableid, MPD01605, Ankurjain, Jerome Charles Potts, Omniplex, Colonies Chris, WikiPedant,
Dethme0w, JonHarder, Microfrost, Dantadd, Iridescence, Bige1977, JHunterJ, Slakr, Flaviohmg~enwiki, Beetstra, SlayerK, Optakeover,
IReceivedDeathThreats, Kvng, Teemuk, BenStrauss, Mikiemike, CmdrObot, Anakata, Harej bot, Lucky225, Smallpond, CMG, Kha-
tru2, Tawkerbot4, JacquesDemien, Thijs!bot, Hoopla-pdx, N5iln, AntiVandalBot, Tjmayerinsf, Camptown, Barek, Dmackeybog, NeF,
RastaKins, GurchBot, Bellhead, SteveSims, Magioladitis, Bongwarrior, Hasek is the best, BlakJakNZ, Froid, Cyktsui, Cisum.ili.dilm, Sty-
rofoam1994, Kgeischmann, Esanchez7587, MartinBot, Jim.henderson, Glrx, Ciotog, Hopper96, Leancode, AntiSpamBot, Je at uwo,
White 720, TomohiroYoshida~enwiki, Ss7guru, Coreyxbs, Harrisjo, TXiKiBoT, Oshwah, Tadasana, FranchisePlayer, NoBiggie, Every-
thing counts, Dorfner, RandomXYZb, BrianRecchia, Cmcnicoll, Dcarriso, Ulf Abrahamsson~enwiki, Michael Frind, Kbrose, Pinball fan,
HSeganfredo, VVVBot, FabianEng, Flyer22 Reborn, Bagatelle, Techman224, Calleridexpert, Anchor Link Bot, Mywikimoe, Poszest16,
Fishnet37222, Lewis-hamilton, Nerdygeek101, Wdwd, ClueBot, Davepusey, Drmies, Gavron, Mild Bill Hiccup, Tts7376, Thanasiskount,
Arunsingh16, Namazu-tron, Baldvinhansson, Jjtennisman, Dalionli, Darren23, DumZiBoT, XLinkBot, Dgtsyb, Good Olfactory, Osar-
ius, Addbot, SeptemberWizard, MrOllie, Sillyfolkboy, Netpi, Sjcramer, Legobot, PlankBot, Luckas-bot, Themfromspace, Ptbotgourou,
UltraMagnus, MCCSteve, Spamless, Haagenti, AnomieBOT, Galoubet, Piano non troppo, LilHelpa, PabloCastellano, Jaxyl, DataWraith,
Silicondope, Neuwelt~enwiki, Corrector63, IbraimQuixabeira, VittGam, Juliaebean, FrescoBot, Mu Mind, JMeurisse, Teuxe, Pinethicket,
334 CHAPTER 80. X.25
LittleWink, Tinton5, Kat724, Full-date unlinking bot, RussNobbs, Lotje, Sgt. R.K. Blue, Hexwarrior, BrightBlackHeaven, Mean as cus-
tard, Alph Bot, Dewritech, Anthony.selby, Freakgeek, AndyTheGrump, ClueBot NG, Widr, BG19bot, Roberticus, NutwiisystemRocks,
ChrisGualtieri, Arcandam, FoCuSandLeArN, K7L, Lugia2453, SFK2, Rogr101, AnthonyJ Lock, Brianbwa, Billpeppernyc, Telconerd,
Wikiuser13, Javimalaga, Jianhui67, Lagoset, Kirill2485, Gronk Oz, KasparBot, Kathyslice, Nextop, Danlinke, Kdh69, Itinerantmarshmal-
low, Joelamae, Shuvojit412, InternetArchiveBot, Sahu.s701, Chrissymad and Anonymous: 297
Caller ID spoong Source: https://en.wikipedia.org/wiki/Caller_ID_spoofing?oldid=749230408 Contributors: Taral, Pnm, Lquilter,
Ronz, Baylink, Julesd, Mushroom, Rpyle731, Rchandra, Bobblewik, Chowbok, Beland, CaribDigita, GaidinBDJ, Rich Farmbrough,
DGoncz, JoeSmack, Triona, Kappa, Giraedata, Wrs1864, Pearle, Ynhockey, MoraSique, Cmprince, Martian, Kay Dekker, Sburke, Ar-
mando, Ianweller, Matthew Platts, Magister Mathematicae, Elvey, HowardLeeHarkness, Micler, Peterl, Wavelength, Bobby1011, Woseph,
Chuck Carroll, SpuriousQ, Hydrargyrum, Nick, FlyingPenguins, Zzuuzz, PennaBoy, SmackBot, Yamaguchi , Jprg1966, SchftyThree,
Hgrosser, Dethme0w, Microfrost, S Roper, Shadow1, Jidanni, Beetstra, Boomshadow, Twalls, Newbi, Enkelman, JoeBot, Twisted an-
imator, Natas802, Sgould, Dr. Pizza, N5iln, Magioladitis, Jim.henderson, R'n'B, QofASpiewak, J.delanoy, Shadow604, AntiSpamBot,
Malcolmredheron, Funandtrvl, Coreyxbs, JPWhiteFitMan, Jcf129, Wykypydya, Sp07019, SQL, Michael Frind, Chuck Sirloin, Slash616,
TJRC, Swingline 2005, Ravensre, Wiki-ny-2007, Calleridexpert, Denisarona, ClueBot, Connor.carey, CiudadanoGlobal, Xitit, Vivapaco,
Mspraveen, PixelBot, SoxBot, Wikiguy83, Versus22, RockStar1985, CIDBrainiac, DumZiBoT, Winxp93, Canders123, Redbullonw1ngs,
Duncan, Rudysalas, Dovidb, Phonephreak9, Addbot, CompUSAMe, CL, Vishnava, Volanaro, Tide rolls, Lightbot, Luckas Blade, Ti-
tanhacker, Jim1138, Galoubet, Eumolpo, Retrogamer42, Tabledhote, Melanielbanks, SanFranCal, Keri, Trappist the monk, RjwilmsiBot,
Leetz1337, Tommy2010, Ponydepression, AzuaHart, Kilopi, Leitz31337, Gstr-er, ClueBot NG, Catlemur, Nephelim103, Stephanie Lahey,
Nyknights, Proxy616, Harizotoh9, BattyBot, Badonree, K7L, ZarhanFastre, Brianbwa, FockeWulf FW 190, Barlekha, InternetArchiveBot
and Anonymous: 180
Cellular frequencies Source: https://en.wikipedia.org/wiki/Cellular_frequencies?oldid=755301170 Contributors: Darker Dreams, Swis-
terTwister, Omnipaedista, ClueBot NG, BG19bot, Nightwalker-87, Dough34 and Anonymous: 4
Cellular network Source: https://en.wikipedia.org/wiki/Cellular_network?oldid=753451227 Contributors: Frecklefoot, Edward, Lexor,
Cherkash, Smack, David Shay, Robbot, Modulatum, Securiger, Hadal, Everyking, Mcapdevila, Wmahan, Xmnemonic, Beland, Mozzerati,
Sam Hocevar, Markalex, Discospinster, Cacophony, Bobo192, Longhair, Somebodympc, Ogress, Alansohn, ChrisUK, Guy Harris, An-
drewpmk, Hu, BanyanTree, *Kat*, RJFJR, Gene Nygaard, Bellenion, Armando, Julo, Gimboid13, Qwertyus, Vegaswikian, Ewlyahoocom,
Bgwhite, UkPaolo, YurikBot, Wavelength, Bhny, Sneak, Gaius Cornelius, Willpo~enwiki, Geertivp, Dbrs, Tomisti, Closedmouth,
Puru~enwiki, Petri Krohn, Ddspell, SmackBot, Elk Salmon, Unforgettableid, Gilliam, Kmarinas86, Chris the speller, J00tel, Callahad, Dy-
lanW, RJBurkhart, A5b, Kuru, Mattjm, Nbhatla, Userdce, GFellows, Blasterman 95, JohnCD, Casper2k3, Cydebot, Kozuch, SvenAERTS,
AntiVandalBot, Seaphoto, JAnDbot, Harryzilber, CosineKitty, Hut 8.5, Greensburger, PhilKnight, T-H~enwiki, KyleAndMelissa22,
SHCarter, QrczakMK, Wshallwshall, Sinigagl, MartinBot, Anaxial, Mange01, Jesant13, Bot-Schafter, McSly, Pyrospirit, Binba, Rpeh,
Idioma-bot, VolkovBot, Philip Trueman, Falcon8765, Geanixx, Biscuittin, Jamessungjin.kim, SieBot, Ori, Hertz1888, YourEyesOnly,
Caltas, Yintan, Techbiz, SimonTrew, Freude.schoner.gotterfunken, Igstarx, Elch Yenn, ClueBot, The Thing That Should Not Be, NX7U,
Gaia Octavia Agrippa, Ptcla, Excirial, Muhandes, Gregott, XLinkBot, Avoided, Hector.C.Jorge, ZooFari, MystBot, Addbot, Jncraton,
Ashton1983, Download, Chzz, Debresser, LinkFA-Bot, Money2themax, Luckas-bot, Yobot, Guy1890, AnomieBOT, Jim1138, Eikoseidel,
Materialscientist, ArthurBot, WaeMaster44, DataWraith, Shulini, Thehelpfulbot, GliderMaven, Webconnect123, kebrke, Chronula-
tor, DARTH SIDIOUS 2, EmausBot, WikitanvirBot, Timtempleton, Dewritech, Primefac, GJDR, Wikipelli, K6ka, ZroBot, Ebrambot,
Alrino, Fritz.grobbelaar, Roostercogburn9, ClueBot NG, Talha483, Pedrotairum, Volker pauli, Cntras, Ashishtayal333, Frmin, Snaevar-
bot, Mavroudisv, Millennium bug, ChrisGualtieri, FoCuSandLeArN, Webclient101, HerrB92, Phamnhatkhanh, Epicgenius, StephenTX,
Jofson Garnett, Cleis89, , Retartist, David quinto, Wyn.junior, Monkbot, Lester.Mercado, Astralbike18, Kaufmanitay, Birdday, Yolo
jacome, Tamurlang, Kaushik Dhandapani, AndreBattle, AedanMetz, Bananovaya and Anonymous: 208
Circuit switching Source: https://en.wikipedia.org/wiki/Circuit_switching?oldid=751927552 Contributors: Andre Engels, B4hand,
JohnOwens, Looxix~enwiki, Ellywa, Jpatokal, EdH, Mxn, Bevo, Secretlondon, Robbot, Danutz, Fleminra, Tagishsimon, Slowking Man,
Thparkth, R, JTN, Pearle, Water Bottle, Markrod, Wtshymanski, Cburnett, Mindmatrix, Ilario, NormanEinstein, Turnstep, FlaBot, Lmatt,
BradBeattie, Chobot, Bgwhite, Rocketgoat, Pi Delport, Dugosz, BertK, Rodran~enwiki, CockBot, SmackBot, Basil.bourque, Thunder-
boltz, Commander Keane bot, Gilliam, MK8, Onceler, Frap, Episteme-jp, JonHarder, Tompsci, Vina-iwbot~enwiki, A.Petrenko, Kvng,
Chetvorno, Eastlaw, JohnTechnologist, Eric, AntiVandalBot, JAnDbot, Harryzilber, Bellhead, VoABot II, Ee02b022, Jim.henderson, Li-
hui912, Lilac Soul, Mange01, Mojodaddy, KylieTastic, Nxavar, Biasoli, Kbrose, SieBot, Alex.muller, StaticGull, ClueBot, Lawrence
Cohen, Dthomsen8, Dgtsyb, Addbot, SpBot, Ben4mai, Foelectric, Yobot, Gobbleswoggler, Ashpilkin, AnomieBOT, ArthurBot, Almabot,
GrouchoBot, RibotBOT, Shadowjams, LucienBOT, Serols, Vajira102, A.wasylewski, , Sricciar, Horcrux92, EmausBot,
Acather96, Olof nord, Dcirovic, GZ-Bot, Orange Suede Sofa, Jabourdette, MacStep, ClueBot NG, Satellizer, BG19bot, Rijinatwiki,
IluvatarBot, Mr. Wikipediania, Assignmentlanka, Charlie Street, Horseless Headman, Lukem234, AkashValliath, KH-1, B2u9vm1ea8g,
GSS-1987 and Anonymous: 121
Code division multiple access Source: https://en.wikipedia.org/wiki/Code_division_multiple_access?oldid=755808207 Contributors:
Mav, Maury Markowitz, Edward, Michael Hardy, Goatasaur, Ahoerstemeier, Ronz, Jpatokal, Salsa Shark, Ka9q, Kaihsu, Dysprosia, An-
drewman327, Furrykef, Thue, Hemanshu, Baloo rch, Hadal, Eliashedberg, Dave6, Giftlite, BenFrantzDale, Fleminra, Goofrider, Bookcat,
Pgan002, Beland, OverlordQ, Oneiros, Yohsuke, Canterbury Tail, Mike Rosoft, Markalex, Mormegil, Rich Farmbrough, Sladen, Pak21,
Wk muriithi, Pavel Vozenilek, Gauge, Lankiveil, Art LaPella, .:Ajvol:., A-Day, Citruswinter, Sasquatch, Ascheinberg, Towel401, Van-
ished user lkjsdkf34ij48fjhk4, Apatterno, Guy Harris, Jiing, Wdfarmer, VladimirKorablin, BRW, Cburnett, Dan100, Hyfen, Tournesol,
Toyoda, Poppafuze, Eras-mus, Sega381, Graham87, Kbdank71, FreplySpang, Dananderson, Rjwilmsi, Lars T., Jake Wartenberg, Golden
Eternity, HappyCamper, Ligulem, Brighterorange, Makru, SystemBuilder, Alejo2083, FlaBot, Gurch, Fresheneesz, Pevernagie, Kbrams,
Srleer, Chobot, Bgwhite, Gridlock Joe, Sparky132, DanMS, CambridgeBayWeather, Grafen, Dugosz, MonMan, Thiseye, PrologFan,
Zwobot, BOT-Superzerocool, Asbl, Zzuuzz, Wsiegmund, Chriswaterguy, Kevin, Rdschwarz, Whaa?, Erudy, Jarrodchambers, Shepard,
PeterBrett, KnightRider~enwiki, SmackBot, Jasonuhl, Prodego, Deon Steyn, Wjmallard, ProveIt, Relaxing, Unforgettableid, Gilliam, Eug,
Desonia, Hugo-cs, Thumperward, Oli Filth, Repetition, DHN-bot~enwiki, Glloq, JonHarder, Nakon, DylanW, Kuru, Ocee, Ksn, Dick-
lyon, Mariersteve, LPH, Aditi.nsit, George100, JohnTechnologist, Errandir, Requestion, Cydebot, Mblumber, Christian75, Starionwolf,
Ameliorate!, Kozuch, Omicronpersei8, TAG.Odessa, Wernight, DmitTrix, Khottorp, Marcotulio, Qarel, Philippe, Dawnseeker2000, An-
tiVandalBot, Davido, Nisselua, EarthPerson, Isilanes, AlekseyFy, Storkk, Randy549, JAnDbot, PopsHunsinger, Tc-engineer, MER-C,
Jonashart, Methgon, RBBrittain, Fusionmix, Malcolmst, Sanoj1234, Email4mobile, Aka042, Recurring dreams, Boob, DerHexer, JaGa,
Bayboy4, MartinBot, Mschel, Smokizzy, RockMFR, Mange01, Mojodaddy, Euku, Sigmundpetersen, P0p-s3cr37, Ellisbjohns, McSly,
GS3, Subedisan, Halmstad, Plasm980, VolkovBot, TXiKiBoT, Orie0505, BotKung, Richard Kervin, Bugone, Dirkbb, SieBot, Ytoledano,
Vijrohit, Jim77742, Sara Aab, Theaveng, Galib.cse, Dlindqui, Guycalledryan, Svick, Telecomwave, Timeastor, C0nanPayne, ClueBot,
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 335
Tamelion, Scottstensland, Mild Bill Hiccup, Vidhyardhi, DragonBot, LeoFrank, Mohit677, Pearmaster, BOTarate, Jonverve, 7, Berean
Hunter, Sylvestersteele, Samdamsam~enwiki, InternetMeme, XLinkBot, Jovianeye, WikHead, Wca08, PL290, Dsimic, Addbot, Speer320,
Some jerk on the Internet, Robaston, John Chamberlain, Download, Corey21, Marcos vicente, AndersBot, Doniago, LemmeyBOT, Semi-
wiki, Tavenger5, Cjerrells, Legobot, , The.Nth, Yobot, Tohd8BohaithuGh1, Ptbotgourou, THEN WHO WAS PHONE?,
AnomieBOT, Materialscientist, Theoprakt, Xqbot, JimVC3, TechBot, Shulini, Nasa-verve, GrouchoBot, Jhbdel, Mdhivya, Karghazini,
Mathonius, Shadowjams, Frumphammer, Dave3457, RetiredWikipedian789, GliderMaven, FrescoBot, Janolabs, PorkchopLarue, Syed-
kamran1988, I dream of horses, Adlerbot, Delan006, Jschnur, Cupid1889, Aoidh, The Utahraptor, RjwilmsiBot, Mield, Bento00, Hardik-
vasa, NerdyScienceDude, Indianw200i, EmausBot, MrFawwaz, ScottyBerg, Dcirovic, Gurmeetluvteddy, Wieralee, H3llBot, Netknowle,
Learns visits aw, John Smith 104668, ChuispastonBot, Cimp3, Shi Hou, Gwen-chan, ClueBot NG, CocuBot, Cyberbisson, Michael-stanton,
Clearlyfakeusername, Snotbot, Dan.aboimov, Vendrizi, Helpful Pixie Bot, Shlyopa, Truesnder, Your Trusted Friend In Science, Ils20,
Tetrapole, Wikih101, Raphael cendrillon, Poppopsun, Marty Crabneck, Osama7ssn, Dhani.sahani, Darth Sitges, Sandip.dalvi, Cdmaware,
Brian Giiligan, BenefactorDubsta, Supdiop, TheoriginalGeorgeW, Kenitobeta and Anonymous: 458
Conference call Source: https://en.wikipedia.org/wiki/Conference_call?oldid=752099234 Contributors: MichaelJanich, Egil, Nucle-
arWinner, Haakon, Ronz, Poor Yorick, Dysprosia, Radiojon, Fredrik, Altenmann, Rfc1394, Dina, Meursault2004, Everyking, Jfd-
wol, Wmahan, Kevin B12, AAAAA, Discospinster, Pmsyyz, Andrewferrier, ArnoldReinhold, Verbalcontract, JoeSmack, Jerrysein-
feld, Atlant, Versageek, Woohookitty, Mangojuice, Kbdank71, FreplySpang, Utuado, Evanwolf, Kcarnold, Wavelength, Borgx, Pe-
ter S., Gcapp1959, Irishguy, Misza13, Elkman, Wknight94, StevenL, Zzuuzz, GraemeL, Whouk, Andrewgorry, Veinor, Zhw, Smack-
Bot, Chairman S., Thumperward, Mistnee, Blake-, Ithizar, Kuru, Robosh, Brucemacbruce, Ttishgar, Haveronjones, Hetar, Iridescent,
Zmiller923, Yourmanstan, Timtrent, Valodzka, Sweepthelegnate, GRBerry, Jonny72o, Red lobster, Kingv, Seaphoto, Harryzilber, Siob-
hanHansa, Nposs, Loonymonkey, Kgeischmann, Calltech, Jim.henderson, JMabry, Reggy73, Nono64, Adavidb, Psycho Kirby, McSly,
B64, Mufka, VolkovBot, Pbaral, Mmckibben, Jplwebdesign, Sweetness46, LeaveSleaves, Pvb90, Tgilro01, Ulf Abrahamsson~enwiki,
CarbonRod85, Sofrin, June w, Webmeetme, Elagerway, StaticGull, JJblack, Danaudersten, Nerdygeek101, ClueBot, A-conference-call,
Pacicus, NOKESS, Deanvesuvio, Paullees, Jamesedwardlong, Rx4ray, DumZiBoT, Derekleeholder, Duncan, Addbot, Hermgenes Teix-
eira Pinto Filho, Heanderson, Mac Dreamstate, Chzz, Luckas-bot, Yobot, Stefan.1972, Brookecoin, Accuruss, Aabrilru, FabulosWorld,
Pbpglobalguy, , BobFitzgerald201, Joey1978, Mishae, RestChem, Pwellner, Mean as custard, ZroBot, AvicAWB, Scott112233, Asaun-
ders.canada, Peter Karlsen, ClueBot NG, Heshamaj, DavidB96, Helpful Pixie Bot, BG19bot, Suganux, Notlivingdead, Roninstudio77,
Mills8268, ForConsumers, Johnthesmith, ChrisGualtieri, YFdyh-bot, Mogism, Killerfore, Isayoldbean, Akppandey1, Dylan Wong, Art-
peoplenz, Headtransplant, EJGlobal, Jameshillford, InternetArchiveBot, Eno Lirpa, John MUC, Nationalpresswiz and Anonymous: 150
Digital AMPS Source: https://en.wikipedia.org/wiki/Digital_AMPS?oldid=737546020 Contributors: The Anome, Jpatokal, Mxn, Timwi,
Snickerdo, Shantavira, Fredrik, Baloo rch, Hadal, Bsoft, Uzume, Bobblewik, Beland, Mozzerati, Markalex, JTN, Rich Farmbrough,
Cfailde, Andros 1337, Closeapple, Kjkolb, BD2412, Rjwilmsi, NatusRoma, FlaBot, Musser, Roboto de Ajvol, AKADriver, Gaius Cor-
nelius, Yrithinnd, Jeh, Foamy, SmackBot, ABACA, Dethme0w, Metageek, Mcoder, Anoopkn, Ksn, Kal1917, DangerousPanda, Jesse Vi-
viano, CrisKatz, Cydebot, Kozuch, Landroo, Thijs!bot, Barticus88, Daniel, EwaDuan, Zorbatron, Scepia, Davewho2, HistreBu, Tcasar,
Mange01, Mojodaddy, Adavidb, Shadowaltar, Zeno333, Tach47, Iw, Jmoz2989, Lightmouse, Alexbot, SilvonenBot, Addbot, Luckas-bot,
Yobot, Bunnyhop11, LilHelpa, The sock that should not be, Full-date unlinking bot, WikitanvirBot, Dewritech, Dcirovic, Dondervogel 2,
Makecat-bot and Anonymous: 39
Direct inward dial Source: https://en.wikipedia.org/wiki/Direct_inward_dial?oldid=731924504 Contributors: AxelBoldt, Lzur, Alf Bog-
gis, Mr Bound, Discospinster, Oliver Lineham, Wk muriithi, Polluks, Rakk~enwiki, Pearle, Nsaa, Espoo, Deathphoenix, Alex Jaspersen,
Bookandcoee, Armando, Tslocum, Ub~enwiki, Mariocki, Chills42, YurikBot, Phantomsteve, Shaddack, Dugosz, SmackBot, F, Chris
the speller, U, Rehan33, Melonite, Nakon, Supersuzanne, Lambiam, Kuru, Teemuk, Mirzaobaig, John254, Dawnseeker2000, Pilot 51, Hut
8.5, Calltech, Jim.henderson, R'n'B, Vent~enwiki, J.delanoy, Hopper96, STBotD, DorganBot, Bonadea, Elvo86, AlleborgoBot, Jimvanm,
Kbrose, Didnumbers, Jandem87, DragonBot, Didnumber, XLinkBot, Addbot, YanaShuster, Solbadguyakira, Cognatus, Tekhammer, Vlk,
Ucilia, Niazza, ClueBot NG, K7L, Hoppeduppeanut, ArnettePradier32, Vliegenderob and Anonymous: 98
Disruptive innovation Source: https://en.wikipedia.org/wiki/Disruptive_innovation?oldid=754690405 Contributors: The Anome, Freck-
lefoot, Edward, Michael Hardy, Pekkapihlajasaari, Nixdorf, Karada, (, Ahoerstemeier, Ronz, Baylink, Arteitle, Mydogategodshat, Timwi,
Dcoetzee, Radiojon, Furrykef, Grendelkhan, Topbanana, Pakaran, Ldo, Phil Boswell, R3m0t, RedWolf, Altenmann, Pengo, Alexwcoving-
ton, Sj, Wolfkeeper, HangingCurve, Zsweden, Brequinda, Niteowlneils, Leonard G., Andre Riemann, AlistairMcMillan, Khalid hassani,
Matthus Wander, Tagishsimon, Neilc, Ehusman, Toytoy, Yufu, Piotrus, Kegill, Grstain, Bishonen, Bender235, Kjoonlee, Chairboy,
Cmdrjameson, Maurreen, Fritz freiheit, Mdd, Turbotas, Mdbest, Anthony Appleyard, Keenan Pepper, Yamla, Goodoldpolonius2, Oleg
Alexandrov, DanielVonEhren, Richard Arthur Norton (1958- ), Mindmatrix, Dandv, Jersyko, Jfr26, BillC, Pol098, Dodiad, KingsleyIde-
hen, Trilussa, Mandarax, Graham87, ConradKilroy, Ilyak, Rjwilmsi, Hulagutten, ElKevbo, Dmccreary, Imperdimper, FlaBot, Ian Pitch-
ford, Kammerbulle, AndriuZ, Simonpockley, DVdm, Manscher, Wavelength, Rada, Gaius Cornelius, Welsh, Megapixie, Jorowi~enwiki,
Daniel C, Paul Magnussen, Gorgonzilla, Arthur Rubin, Loy, Spikespeigel42, Spon, DVD R W, Yvwv, SmackBot, PaulWay, Mae-
stro44, Jtneill, Anastrophe, Kintetsubualo, Yamaguchi , Brianski, Oli Filth, Egsan Bacon, Frap, Rrburke, Gavin Moodie, EVula,
Lhadnus, Ligulembot, Lunarbunny, Nakamura2828, Guyjohnston, Rexhammock, Kuru, Robosh, Blueprint18, Slakr, Sucker pvn, Kvng,
Jc37, DabMachine, PaulGS, OnBeyondZebrax, Kencf0618, Tosenton, CmdrObot, Tanthalas39, Erik Kennedy, ZsinjBot, Anil Kumar
Kartham, TheRegicider, Cydebot, JPalonus, Frzl, Pdxuser, Kozuch, UberScienceNerd, JamesBrownJr, Letranova, Thijs!bot, Rkrish67,
Electron9, AgentPeppermint, Escarbot, AntiVandalBot, Gioto, CZmarlin, Manushand, Dylan Lake, AOB, Greensburger, SteveSims, Ma-
gioladitis, Gamaro, Eltener, KConWiki, DataGazetteer, Mmoitzh, Elinruby, Gwern, CommonsDelinker, Jayantaism, Crakkpot, Iiai-
ialover, Largoplazo, Elkadi, TopGun, Sford, JDS2005, Joeinwap, Ddd1600, Malik Shabazz, VolkovBot, Seattle Skier, Oshwah, Bernium,
Lradrama, Haseo9999, Valkyryn, Feudonym, Rainier3, Logan, Stambi, Speedclimb, EverGreg, Debgall, Ravensre, Manway, Charles-
Gillingham, Nezavisim~enwiki, Mcorson, IPAddressConict, Binksternet, Rilak, Eddroid, Sbolat, OccamzRazor, Stefanbcn, BigChilli,
Oxymo, Three-quarter-ten, PixelBot, Frozen4322, Thanhbv, Fryn, Tathurst, MystBot, Addbot, Disruptivetechnologyllc, Poco a poco,
ContiAWB, Brice07~enwiki, MrOllie, Download, Guydrawers, Stidmatt, Lightbot, Zorrobot, SasiSasi, WikiDreamer Bot, Yobot, Clock-
werkMao, Bruce404, AnomieBOT, Keithbob, Two Companions, Citation bot, Marshallsumter, Mdawes2, Xqbot, Vik2, Crookesmoor,
Khajidha, Krbolen, Anna Frodesiak, Cs82, Shadowzone1001, CorporateM, Vladimir.frolov, FrescoBot, Fit, Sanpitch, Mondoblu, Khertko,
Louperibot, Citation bot 1, HRoestBot, Tom.Reding, Fadm. Notbob, Mondozilla, Trappist the monk, Kauron, RjwilmsiBot, Burntcloth,
Ultimatetime, Ripchip Bot, WikitanvirBot, GoingBatty, Andreim27, Tommy2010, Wikipelli, Midas02, Laneways, Addalittle, Doctor-
ambient, ClueBot NG, Klaakri, Helpful Pixie Bot, Bootpalish, BG19bot, Marcocapelle, FRibeiro66, FiveColourMap, EricGhent, Juli-
jlapidus, ChrisGualtieri, Brantcooper, Innovatewiki, Cwobeel, The Anonymouse, Faizan, Randykitty, Interestingcomments, Opnminded1,
Iwantfreebooks, WPGA2345, Zhuyuxiang, Fixuture, Mellon2030, Monkbot, Welcome1To1The1Jungle, Hobbitschuster, Verbal.noun, You
336 CHAPTER 80. X.25
better look out below!, NerudaPoet, InternetArchiveBot, John kidder, Woodstop45, Outaouaisregina, Bender the Bot, Epickduck15, Ed-
munds2915 and Anonymous: 275
E.164 Source: https://en.wikipedia.org/wiki/E.164?oldid=753804489 Contributors: AxelBoldt, The Anome, Ed Poor, Johan Dahlin, Si-
monP, Leandrod, Michael Hardy, Karada, Docu, Smack, Radiojon, Bloodshedder, Tagishsimon, Antandrus, Beland, AnandKumria, Dmit-
ryKo, Oskar Sigvardsson, Guanabot, Wk muriithi, Smyth, Plugwash, Barcex, Drmagic, MarkWahl, John Vandenberg, Pearle, Quantu-
mEleven, Jaroslavle, Tabor, Areia, Stephan Leeds, LFaraone, WilliamKF, Evolve75, Woohookitty, Shanedidona, Leeyc0, Vegaswikian,
Hathawayc, FlaBot, Alex Sims, Rand08, RobyWayne, Glenn L, MithrandirMage, Fabricationary, Cate, Gaius Cornelius, Nick, Smack-
Bot, Nbarth, Frap, Nakon, MichaelBillington, Wybot, Dl2000, Iridescent, Lincmad, Rud Almeida, Brad101, Luna Santin, JAnDbot,
Magioladitis, EagleFan, Bnoah, RingtailedFox, Gijs.noorlander, Kbrose, Sylware, Parhamr, Hxhbot, YSSYguy, NoGringo, Copyeditor42,
Eeekster, XLinkBot, Dgtsyb, Addbot, Fyrael, Atethnekos, Yobot, AnomieBOT, Fakedeeps, Drilnoth, Maggyero, Tahir mq, Mishae, So-
larra, F, ClueBot NG, AvocatoBot, K7L, Monkbot, Miraclewireless, Rugk, HerrFolgreich, Bender the Bot, Zcarstvnz and Anonymous:
83
Elastix Source: https://en.wikipedia.org/wiki/Elastix?oldid=753512176 Contributors: Edward, Pnm, Toreau, Robert Brockway, Stesmo,
Toytown Maa, Stuartyeates, Mandarax, Nwatson, Bgwhite, InsertNameHere, Renata3, SmackBot, Silverhand, PeterSymonds, Oscarthe-
cat, Jprg1966, Jerome Charles Potts, Frap, Natebailey, Prunk, Jvlopez, CmdrObot, Gioto, MelanieN, R'n'B, Tzafrir, Smitty, Gwen Gale,
Eworlds, Kbrose, Callidior, JL-Bot, Alexbot, UnCatBot, XLinkBot, Dthomsen8, Addbot, Bluebusy, Elandivar~enwiki, Yobot, Pocheto,
Netint, Mgmonteleone, NStorm, Quidn, Franz Winter, ZroBot, AaronFinney, Has, Wbm1058, BG19bot, Lvchangle, H8usernames, Mo-
gism, Gdraque, Reconwireless, Hatas, WCS100, Lfto89, Juri.M, Greenpleases, Leschnei, Hammertime56 and Anonymous: 33
Emergency service Source: https://en.wikipedia.org/wiki/Emergency_service?oldid=754073217 Contributors: The Anome, Stephen
Gilbert, Sjc, SimonP, Ellmist, Chris Q, Clarka, Wapcaplet, Cameron Dewe, JeremyR, Mac, Cncs wikipedia, Akadruid, Tom harri-
son, Scott Wilson, Mboverload, Sam Hocevar, Rich Farmbrough, Petersam, Stesmo, Smalljim, Numerousfalx, Espoo, Sciurin, Fire-
man1985~enwiki, BD2412, DVdm, YurikBot, Hairy Dude, Rxnd, Backburner001, Ytgy111, Gaius Cornelius, Artbotterell, GunnarRene,
Snek01, Ospalh, Intershark, Wikiwawawa, Owain.davies, Exit2DOS2000, SmackBot, Y control, Canthusus, Dihard, Deli nk, Heimstern,
Scetoaux, Ckatz, Iridescent, EPO, Gogo Dodo, Clovis Sangrail, JColgan, SimmerALPHA, Doktur, Davewho2, Onlinelocksmith, Dep.
Garcia, DXRAW, CS46, OBILI, Timothy Titus, Tntdj, TomCat4680, Bdodo1992, Richard D. LeCour, Olegwiki, Safemariner, Eric out-
doors, Robotchicken1886, David Condrey, Abuladeen, ClueBot, Kotniski, Specac, Bretonnia, FBIdude972, NellieBly, 24hourrestoration,
Addbot, JPINFV, Yobot, Eric-Wester, Bbb23, Rubinbot, Galoubet, Xqbot, Poiyiop1, GrouchoBot, AlexPlante, Wusel007, Dmartin969, HJ
Mitchell, Jonkerz, Paiamshadi, DARTH SIDIOUS 2, EmausBot, ZroBot, Keri.AWH, ClueBot NG, Wikiwonderwomanwashere, Gilde-
rien, Chester Markel, Jzander, AdventurousSquirrel, BattyBot, AK456, IjonTichyIjonTichy, FoCuSandLeArN, Duncanrit, XXzoonamiXX,
Southparkfan, Wikiuser13, Drchriswilliams, RealisticMan28, AceOnSpace, I AM WILDEDIT, Johnboy2015, CAPTAIN RAJU, Star-
boy14, Oliver Wesley Cooper and Anonymous: 98
Federated VoIP Source: https://en.wikipedia.org/wiki/Federated_VoIP?oldid=741256752 Contributors: Bearcat, Dpocock, Srleer,
Whoisjohngalt, Foregather, Kbrose, Callidior, Pmokeefe, Rocketrod1960, DBigXray, K7L, Qzd and Anonymous: 6
FreePBX Source: https://en.wikipedia.org/wiki/FreePBX?oldid=753998077 Contributors: Apalsola, Stesmo, Tm1000, Plrk, Brandon,
RG2, SmackBot, Thumperward, EdGl, Ser Amantio di Nicolao, Robosh, Larrymcp, Magioladitis, Calltech, NMaia, Tzafrir, Stswp,
Kbrose, Xrobau, WurmWoode, UnCatBot, MagnusA, MagnusA.Bot, AnomieBOT, 02walshe, Roux-HG, Jnstrom, Fernbom2, JetBlast,
Park Flier, BG19bot, K7L, Reconwireless, Monkbot and Anonymous: 20
FreeSWITCH Source: https://en.wikipedia.org/wiki/FreeSWITCH?oldid=753489648 Contributors: The Anome, Ronz, Uzume, Isidore,
EagleOne, Kmccoy, Imroy, Rich Farmbrough, Stesmo, GChriss, Andrewpmk, Ricky81682, Angr, Mindmatrix, Bluemoose, Rjwilmsi,
Boteman, A Man In Black, RussBot, Cryptic, Bovineone, Aler, Brandon, Simon80, SmackBot, Reedy, Buzzard2501, Durova, Blue-
bot, EdgeOfEpsilon, BBHoss, J.smith, ArglebargleIV, Rory096, Guyjohnston, Kuru, Soumyasch, Slakr, Beetstra, Cbrown1023, Amalas,
User6985, Future Perfect at Sunrise, Dslc, DumbBOT, Neustradamus, KLdd15, EdJohnston, Utopiah, MarshBot, Jdfmcok, Jcollie, Magi-
oladitis, Kgeischmann, Calltech, Balleyne, Mfedyk, Nik.martin, Diego.viola, Shaul.alam, Smitty, Stswp, VolkovBot, Coutcin, Trixter ie,
Y, Ulf Abrahamsson~enwiki, Jimvanm, Kbrose, Astrovega, Jerryobject, Momo san, Anthony.minessale, Cypromis~enwiki, Lightmouse,
Callidior, Masoud ata, Rkarlsba, Davehorner, HighInBC, Daveknell, Brookeld53045, Kl4m-AWB, Briankwest, Jontow, Mscollins1,
XLinkBot, Cdmat, Addbot, PlankBot, Themfromspace, Bunnyhop11, 4th-otaku, , GrouchoBot, FrescoBot, Potatis invalido, Radha1587,
Skyerise, Troy.frericks, LiberatorG, Full-date unlinking bot, Freeswitchnetru, Jjardon, SporkBot, Zanlok, SteveAyre, Thenatesher, Help-
ful Pixie Bot, Northamerica1000, Lyle Stephan, Google9999, Wintermeyer, Dujinfang, Hhm8, Italorossi, Omni Flames, Rebecamaia and
Anonymous: 63
GSM Source: https://en.wikipedia.org/wiki/GSM?oldid=755299625 Contributors: Damian Yerrick, AxelBoldt, Derek Ross, WojPob,
Bryan Derksen, The Anome, Youssefsan, Aldie, Nate Silva, Ben-Zin~enwiki, Mswake, Nealmcb, Patrick, Michael Hardy, Pnm, Zani-
mum, Seav, Oyd11, CesarB, Egil, Ams80, Mac, Ronz, Jpatokal, Yaronf, Julesd, Tristanb, Rl, Rob Hooft, Marknew, Schneelocke, Crissov,
Jukeboksi, Ralesk, Dysprosia, Fuzheado, Snickerdo, Joerg Reiher~enwiki, Wik, Tpbradbury, LMB, Mowgli~enwiki, Shizhao, Earthsound,
Rohan Jayasekera, Cluth, Rogper~enwiki, Robbot, Lambda, Owain, Ray Radlein, RedWolf, TimothyPilgrim, Clarkk, Baloo rch, Hadal,
Mushroom, DocWatson42, Marius~enwiki, Anand999, Zigger, Average Earthman, Bkonrad, Joconnor, Varlaam, Greg McFarlane, Bsoft,
Iceberg3k, Matt Crypto, Uzume, Bobblewik, Edcolins, Mobius, Goofrider, Arman~enwiki, Neilc, Vadmium, Chowbok, 159753, Pgan002,
Mfv2, Beland, OverlordQ, Mamizou, Ilkka H., Heman, Mozzerati, Sam Hocevar, JasonBurbank, Tooki, Shadypalm88, Drjt87, Mike
Rosoft, Imroy, Discospinster, Rich Farmbrough, Guanabot, Hydrox, FT2, Andros 1337, Jonnny, Andrewferrier, R6144, ArnoldReinhold,
EliasAlucard, Michael Zimmermann, Jackqu7, Bender235, Dewet, Andrejj, Gauge, Nthnl, Ht1848, Kiand, PhilHibbs, Shanes, Cacophony,
James.pole, Mike Schwartz, Shnout, Kevinh456, Kjkolb, Ghoseb, Davidgothberg, Olivier Mengu, Towel401, Sandeep warikoo, Anthony
Appleyard, ChrisUK, Walter Grlitz, Arthena, Jeltz, Riana, Velella, BBird, Rebroad, ProhibitOnions, Paul1337, Suruena, Grenavitar,
IMeowbot, Alanhwiki, Versageek, Gene Nygaard, Mjlodge, Nightstallion, Mindmatrix, RHaworth, Nirion, Endlesslove, Camw, Hunding,
Dan.glavin, Thivierr, Armando, Russil Wvong, Admrboltz, Fortythree, Zippo, Ortcutt, Kgrr, Lmendo, Owq, GregorB, Fugue~enwiki, Jdun-
levy, Matthewsoft, Palica, Allen3, Mandarax, Nollij, Graham87, MC MasterChef, Yurik, Rjwilmsi, , Josho206, Com-
mander, Moosh88, Leeyc0, Collard, SMC, Vegaswikian, Ltang, A Man In Black, N0YKG, Ian Pitchford, Ian Georey Kennedy, Crazycom-
puters, AJR, Intgr, Fresheneesz, Lmatt, Tedder, David H Braun (1964), Idaltu, Chobot, Baxrob, DVdm, Bgwhite, YurikBot, RobotE, Hairy
Dude, MMuzammils, Hede2000, Hydrargyrum, Manop, Barefootguru, CambridgeBayWeather, Yyy, Tungsten, D11~enwiki, Geertivp,
NawlinWiki, Edinborgarstefan, Jaxl, ZacBowling, Ke4djt, Bmdavll, Anetode, Rbrady, Adrian.baker, Matticus78, PhilipO, Vento~enwiki,
Tony1, Aaron Schulz, Bota47, Tonywalton, Raysacks, Sandstein, Zzuuzz, Lt-wiki-bot, Theda, Closedmouth, Arthur Rubin, Pb30, Sitenl,
Phil Holmes, Emc2, Curpsbot-unicodify, Kungfuadam, Selkem, Kingboyk, Nippoo, Hide&Reason, Tyler Oderkirk, Evdo, Jebarnett513,
SmackBot, Estoy Aqu, Hydrogen Iodide, Ccalvin, C.Fred, Nil Einne, Unforgettableid, Gilliam, Xiejianguo, Desonia, Thumperward, Morte,
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 337
Oli Filth, EncMstr, Jerome Charles Potts, Ctbolt, DHN-bot~enwiki, Jnavas, Charles Moss, Pretzels, Audriusa, Gsp8181, Can't sleep, clown
will eat me, Sahmeditor, JonHarder, UU, Khukri, Gmj, Beatriz.pedrosa, DantheCowMan, Anoopkn, DylanW, Xeno666, Andrei Stroe,
SalopianJames, SashatoBot, Notmicro, Rawmustard, Ivucica, Ckatz, Ripe, Ex nihil, Bollinger, Dicklyon, PRRfan, Doczilla, Kvng, Dl2000,
Ginkgo100, Teemuk, DouglasCalvert, Mh29255, Dctmpeg, Web nitin, Linkspamremover, Jh12, JohnTechnologist, INkubusse, JohnCD,
Jesse Viviano, ShelfSkewed, Requestion, HenkeB, Casper2k3, Phatom87, Cydebot, 206164955, Oosoom, Steel, Cvik, Chasingsol, Danc-
ter, Starionwolf, Kozuch, Landroo, Thijs!bot, Ramananrv123, Marek69, DmitTrix, Electron9, James086, Kaaveh Ahangar~enwiki, Dgies,
OrenBochman, Dawnseeker2000, AntiVandalBot, Jq4bagiq, Markrbarker, DJ Rubbie, Scepia, Tadas12, Spencer, JAnDbot, Harryzilber,
Barek, MER-C, Fetchcomms, Wser, Greensburger, Magioladitis, Jhansonxi, VoABot II, Adywicaksono, Sanoj1234, Twsx, XMog, En-
quire, Bwooce, Eskalin, .V., Sam 706, MartinBot, Carillonista, R'n'B, Shoghi, EdBever, Squiggleslash, Paranomia, J.delanoy, Mange01,
Mojodaddy, Carre, Bogey97, Jonpro, Bot-Schafter, Samtheboy, Computer5t, RenniePet, Joshua Issac, Cometstyles, Scott Illini, VolkovBot,
Mobeets, Soliloquial, Philip Trueman, TXiKiBoT, Labdude, Crohnie, Seraphim, LeaveSleaves, Malus Catulus, Maksdo, Philippe Dupuis,
The dog2, Haseo9999, Kelvin.gck1978, Typ932, Insanity Incarnate, EmxBot, Kbrose, Brendan.lawry, Antony.stubbs, Tsaitgaist, SieBot,
Nubiatech, Skipnicholson, Work permit, KGyST, Caltas, Timothy Cooper, Xelgen, Backah, Qst, Kathodonnell, Editore99, EnOreg, Oxy-
moron83, MiNombreDeGuerra, Lightmouse, Engineerism, OKBot, Telecomwave, Blacklemon67, Mr. Stradivarius, Denisarona, Irstu,
Prbrowne, Elch Yenn, ImageRemovalBot, MenoBot, Martarius, Energizer-cy, ClueBot, The Thing That Should Not Be, Jan1nad, Ndeni-
son, Iandiver, Taliska, Mild Bill Hiccup, Amirul2008, DragonBot, Excirial, Sauralf, Alexbot, Hadiyana, SpikeToronto, Rhododendrites,
Frozen4322, Dnaphd, Aitias, 7, Subash.chandran007, Mohitmehral, Berean Hunter, SoxBot III, Nafsadh, DumZiBoT, Finalnight, Internet-
Meme, Marcopolo08, XLinkBot, Ninja247, Mak618, WikHead, SilvonenBot, Dgtsyb, Ogourment, MystBot, Kbdankbot, Dave1185, Ad-
dbot, Speer320, Claytonm28, Melab-1, Guoguo12, 3dimen, Fieldday-sunday, Aggplanta, Gwaevl, AndersBot, Debresser, Favonian, SpBot,
LinkFA-Bot, Beardybloke, Tide rolls, Verbal, , Zorrobot, Wireless friend, Frehley, Legobot, Monassist, , Luckas-bot,
ClariT, Yobot, WikiDan61, RadioShack1234, Flukas, Fraggle81, PPP, Malhotradivey, KamikazeBot, , Backslash Forward-
slash, AnomieBOT, 1exec1, Efa, Jim1138, Piano non troppo, Kingpin13, Flewis, Kushagraalankar, Materialscientist, Being.literate, Nicr9,
StrontiumDogs, ArthurBot, Zukzug, LilHelpa, Xqbot, Zad68, Poiyiop1, Koektrommel, Capricorn42, DavidABurgess, Devnull420, Shulini,
Anna Frodesiak, Stonesoupma, RibotBOT, Karghazini, Kyng, Amaury, Heypiox, Shadowjams, Sesu Prime, FrescoBot, Ch Th Jo, Chock-
yboy, W Nowicki, Haeinous, Sswsonic, Momergil, Smatar, A8UDI, Impala2009, Tahir mq, Bgpaulus, Sajalkdas, Sidbgp, Felipito1.966,
Matthias Lang, Suusion of Yellow, Thomassteinke, Ceac01, Mean as custard, Markareal, Bento00, Androstachys, Ngoclong19, Emaus-
Bot, Alfaisanomega, Timtempleton, H8jellybeans, Sco2Rose, NotAnonymous0, Wikipelli, AvicBot, , Donaldm314, Cappert, Wayne
Slam, Mcmatter, Seattle, Jay-Sebastos, L Kensington, MadnessInside, Rocketrod1960, ClueBot NG, Shivajipedia, Lyla1205, JaakRab-
bit, Sachinjain0510, Mayukhkant, Aurelie Branchereau-Giles, Be..anyone, Helpful Pixie Bot, Frmin, Harkuo, Wbm1058, Nnpr1121,
Bouteloua, Tapuwiki, Jfriedly, Moueed8, Difbobatl, Moloyyy, Justincheng12345-bot, Fwori, Ryukxio, Cyberbot II, Adnan bogi, Gram-
marcheckr, JYBot, Tow, Dexbot, SantoshBot, Dhani.sahani, Webclient101, Mogism, 08AD229, Stephen2u, Lugia2453, Me, Myself, and
I are Here, Gnu2, Nightwalker-87, Shophi.philip, 2 Hertz, Etheldavis, Watchamacallhim, Vikiagrawal.23, Monkbot, SWASTIK 25, Uni-
cian, HRoestTypo, Anwarpatel4u, Dirtyharrie, Ujju.ujjwal, KH-1, ChamithN, Siamspirit, AlexNugaev367, Cstdomains, G1223, Mascard,
MBlaze Lightning, Deboarpi, Narayan.tiwari2006, GreenC bot, Gulumeemee, Sonyasifuentes12 and Anonymous: 867
Integrated Services Digital Network Source: https://en.wikipedia.org/wiki/Integrated_Services_Digital_Network?oldid=748550262
Contributors: Magnus Manske, The Anome, Andre Engels, Maury Markowitz, Heron, B4hand, Youandme, Johnot, Olrick, Michael Hardy,
EddEdmondson, Erik Zachte, Mahjongg, TakuyaMurata, Haakon, Yaronf, Julesd, Glenn, Willem, AndreaPersephone, Smack, Crissov,
Pauld, Radiojon, Jnc, Tempshill, Jimbreed, Omegatron, Thue, Topbanana, Finlay McWalter, UninvitedCompany, Jni, Robbot, Cfaerber,
Nilmerg, Rhombus, Diberri, Giftlite, DocWatson42, Yama, Inkling, Jonabbey, Rookkey, Jfdwol, Just Another Dan, Uzume, Tagishsimon,
Jrdioko, Edcolins, Utcursch, Pgan002, Beland, Mamdu, , Imroy, RedWordSmith, Rich Farmbrough, Guanabot, Slb, Techtoucian, Den-
nis Brown, Triona, Femto, Bobo192, Longhair, MarkWahl, Dreish, Viriditas, Cmdrjameson, Kjkolb, Nk, Thuktun, Eritain, Pearle, Espoo,
Schissel, Liao, Guy Harris, M7, MarkGallagher, Goldom, Hoary, Wdfarmer, Rabarberski, Cburnett, Sakus, Voxadam, Blaxthos, Forte-
blast, Kenyon, Brookie, Gmaxwell, SKopp, OwenX, Woohookitty, BillC, JeremyA, MONGO, GregorB, Gerbrant, BD2412, Yurik, Sj,
Sjakkalle, Rjwilmsi, Lockley, Rcuza, Barklund, Leeyc0, Vegaswikian, N-Man, Ttwaring, Fred Bradstadt, Dacs, Titoxd, FlaBot, EvanSeeds,
Vegardw, Intgr, Geimas5~enwiki, Lmatt, Srleer, Abackstrom, Colenso, Chobot, DVdm, Bgwhite, Burnte, The Rambling Man, YurikBot,
DMahalko, Dantheox, Stephenb, Gaius Cornelius, Akhristov, ENeville, Rygar81, Djm1279, PrologFan, Raven4x4x, Daniel C, Chase me
ladies, I'm the Cavalry, Closedmouth, Josh3580, BorgQueen, Black-Velvet, Red Jay, Anclation~enwiki, Stuhacking, Allens, Bluezy, Pe-
terH~enwiki, SmackBot, HWSager, Reedy, Mauls, Gilliam, Evilandi, Chris the speller, Bluebot, Oli Filth, Arunmehtain, Shalom Yechiel,
M at, JonHarder, Jmlk17, Blake-, JanCeuleers, Sparky-sama, Henning Makholm, Demicx, Notmicro, Jec, MarkSutton, Ehheh, Dick-
lyon, Kvng, BranStark, Cbrown1023, Beve, CapitalR, Tawkerbot2, Dlohcierekim, Heqs, Gatortpk, ThreeBlindMice, Smallpond, Reques-
tion, Phatom87, Joshnpowell, Mblumber, Goelshek, Djg2006, Nevardo, JLD, Kozuch, Mercury~enwiki, Sagaciousuk, Electron9, Dark
Enigma, CharlotteWebb, Dawnseeker2000, Fuhennori~enwiki, Escarbot, Prolog, Ultimate sh, JAnDbot, Harryzilber, MER-C, Kedi the
tramp, Bellhead, .anacondabot, Enjoi4586, Unixrab, Magioladitis, Chrisjjp, Recurring dreams, AlephGamma, LorenzoB, Tomgreeny,
NMaia, Conquerist, STBot, Sjjupadhyay~enwiki, Jim.henderson, Stuii, Anaxial, Keith D, R'n'B, J.delanoy, Mange01, Trusilver, AAA!,
NerdyNSK, Madzyzome, Andareed, Katalaveno, Mikael Hggstrm, Skier Dude, Lordubernoob, Sarahsam, KylieTastic, Sp krishna, Wil-
son256, Aaronsingh, Lights, Malik Shabazz, VolkovBot, CWii, ABF, MrSampson, Jmaslak, AlnoktaBOT, Lexein, TXiKiBoT, Lrz35,
Davehi1, Rei-bot, Qxz, Lazy Techie, Lerdthenerd, Happy B., Rkbuddiga, Djmckee1, Vitalikk, Pointy haired fellow, Kbrose, SieBot,
Nubiatech, Yintan, Infodriveway, Nobspangle, Flyer22 Reborn, Theaveng, Arbor to SJ, Faradayplank, Lightmouse, Tombomp, Fratrep,
Engineerism, Tcrow777, Simonhindle, ClueBot, The Thing That Should Not Be, Helenabella, Jeshan, EoGuy, Lunatic83, Lawrence Cohen,
DragonBot, Ykhwong, Jotterbot, Netanel h, Hank1230071224, XLinkBot, PL290, Dgtsyb, 128mem, Addbot, Some jerk on the Internet,
Blondesareeasy, Laurie141, AnnaFrance, Loco70, SamatBot, , Lightbot, Faunas, Teles, Luckas-bot, Yobot, Senator Pal-
patine, Sakthia1986, DivineBurke, AnomieBOT, Eric schreiner, Jim1138, Materialscientist, 90 Auto, Citation bot, E2eamon, LilHelpa,
Cherron1994, Xqbot, Rotellam1, DSisyphBot, Ab1, FrescoBot, W Nowicki, Scooter pt6, I dream of horses, ICEAGE, Calmer Waters,
MondalorBot, Michael Minh, Banej, SchreyP, Efmpacheco, XDnonameXD, DARTH SIDIOUS 2, Onel5969, VernoWhitney, John of
Reading, Gfoley4, PoeticVerse, Solarra, Rdf0, The.lorrr, Wikipelli, K6ka, Lucas Thoms, Ludovic.ferre, Exfenestracide, Alpha Quadrant
(alt), Girish.bhure, Sid Pillai, Rks sxn, Autoerrant, Bunyano, Raju5134, Sonicyouth86, ClueBot NG, JDKilgore, Helpful Pixie Bot, Regulov,
Jcurry2, BG19bot, Ytoworry, BattyBot, ChrisGualtieri, JBrown23, Dexbot, 331dot, Cerabot~enwiki, Lgfcd, Epicgenius, DavidLeighEllis,
Aman295, Ginsuloft, SJ Defender, Averruncus, JaconaFrere, I.moskalev, Wyn.junior, MSheshera, Monkbot, JMcCoy2014, Jinghthinish,
K scheik, WannaBeEditor, MLRM, GreenC bot, Bender the Bot and Anonymous: 508
Interactive voice response Source: https://en.wikipedia.org/wiki/Interactive_voice_response?oldid=753133106 Contributors: Aldie, Sara
Parks Ricker, Hephaestos, Michael Hardy, Cameron Dewe, Ahoerstemeier, Bogdangiusca, Radiojon, Pigsonthewing, Lzur, Wile E. Here-
siarch, GreatTurtle, Vina, Macopia, S.K., Longhair, Sam Korn, Jumbuck, Thringer, Andrewpmk, Pion, Danhash, David Knell, Nuno
Tavares, Woohookitty, Robert K S, Apokrif, Mandarax, CharlBarnard, Graham87, DaGizza, YurikBot, Wavelength, Xcrivener, Jlitt-
338 CHAPTER 80. X.25
let, Me and, Hydrargyrum, PrologFan, Velibos, LarryMac, Dbrs, Hrhsoleil, Zzuuzz, StuRat, SMcCandlish, Ajuk, Je Silvers, Smack-
Bot, McGeddon, Thunderboltz, MartynDavies, Dlohcierekims sock, Dragice, MaxSem, GuyBehindtheGuy, Darthgriz98, Madman2001,
Pgillman, Gloriamarie, Rklawton, Driver105, Kuru, John, General Ization, Konklone, Hu12, Iridescent, Frank Lofaro Jr., Tawkerbot2,
TheHorseCollector, Winston Spencer, Vijeshmehta, Ale jrb, Requestion, Ferris37, Satori Son, Thijs!bot, Epbr123, Marek69, English-
paulm, Klorpet, Lumbercutter, Llancek, Purpleboooks, MER-C, Greensburger, .anacondabot, SiobhanHansa, Magioladitis, Nyq, Allstare-
cho, BobSaccamanno, Calltech, Salsaivr, Jim.henderson, Glrx, R'n'B, Pharaoh of the Wizards, SJP, Science4sail, DUBJAY04, Flyte35,
SouthernTortoise, AlleborgoBot, Jimvanm, Chmac, Rpraturi, VVVBot, Yintan, Flyer22 Reborn, Simonhalsey, Andrew.ma.canada, Bm-
duy, Daveknell, Loren.wilton, ClueBot, PolarYukon, F-402, Simonmckenzie, Sebleouf, Eeekster, Muhandes, Lbredeso, Aleksd, Ap-
parition11, WikHead, Dustysrainbow, Addbot, David.a.gelman, Queenmomcat, Helppieb, Tide rolls, Yobot, Legobot II, AnomieBOT,
Rubinbot, Jim1138, D3innovation, WilliamWQuick, 05rani, Materialscientist, Citation bot, Obersachsebot, Xqbot, Pmlineditor, Mangst,
Jamboree135, Raj Kumar Machhan, Ja simmons1983, Kazuwiki, Fastilysock, DARTH SIDIOUS 2, Onel5969, NameIsRon, Tfadams,
Grover amit 2000, Racerx11, Jayantw, Dcirovic, Nanomega, Kiwi128, TheUberOverLord, ECTTelecoms, Kognos, Gmchun83, ClueBot
NG, Floatjon, Jsaksa, Jwsresearch, Strike Eagle, As1seen1t, Jfd34, Tampa128, Michael.prince1990, Heidimil, Asv128, YiFeiBot, Fpasko,
Sharilewis121, KH-1, Kbuchholz, JonMad, PopceeFrancyne, Bronze2018, Bender the Bot, Tbreetzke, Zcarstvnz, Jonnyglobal and Anony-
mous: 237
LinuxMCE Source: https://en.wikipedia.org/wiki/LinuxMCE?oldid=751749413 Contributors: Pnm, Liftarn, Chealer, Lurker, Rich Farm-
brough, Art LaPella, Nrbelex, Rob Russell, TreveX, Siddhant, Brucevdk, Jeremy Visser, ICberg7, SmackBot, Cutter, Thumperward, I84,
Frap, Mr.Z-man, Mion, Amanjsingh, Jacono, Mister macphisto, Cydebot, Kozuch, Electron9, Gioto, Kaobear, VoABot II, Ekki01, R'n'B,
Mattnad, Smitty, Qxz, SidRoberts, Azimout, Synthebot, Djmckee1, Fusanari Shimizu, Davo Dinkum, Perspecto, ImageRemovalBot,
Hotbott, KayakDog, Mild Bill Hiccup, Mehal88, DonovanE, SchreiberBike, Ark25, SF007, Colin a jones, Addbot, Mortense, Grand-
scribe, Yobot, Derlewis, Richard.e.morton, AnomieBOT, Equipoisenow, Rgritt, Bruceschaller, Skyerise, MastiBot, Aoidh, Palosirkka,
Northamerica1000, BattyBot, Skype565, Ninzkit, Bender the Bot and Anonymous: 62
Media Gateway Control Protocol Source: https://en.wikipedia.org/wiki/Media_Gateway_Control_Protocol?oldid=750079622 Contrib-
utors: Haakon, Angela, Yaronf, Guaka, RedWolf, Rchandra, Wpjonathan, JTN, Byrial, Kagato, Mattingly23, Cje~enwiki, Tmh, Wrs1864,
Anthony Appleyard, Voxadam, Mindmatrix, Unixer, FlaBot, MMuzammils, Bytemaster, Bluezy, Eskimbot, Chris the speller, Thumper-
ward, Tsca.bot, Wizardman, Kvng, Dl2000, Teemuk, AshokSrinath, Thijs!bot, Avi.dorfman, Dawnseeker2000, Kgeischmann, Calltech,
Abasota, Rei-bot, Anonymous Dissident, Kbrose, CultureDrone, DragonBot, Armeld, Addbot, Kjboyleii, Abhayani, MathsPoetry, Fres-
coBot, Miracle Pen, Smithag64, EmausBot, BG19bot, Archer4523, Wielkizielonymelon, Arcandam, TwoTwoHello, ArmbrustBot, YiFei-
Bot, SJ Defender and Anonymous: 69
Media gateway control protocol architecture Source: https://en.wikipedia.org/wiki/Media_gateway_control_protocol_architecture?
oldid=723666533 Contributors: Rjwilmsi, Kbrose, WereSpielChequers, Timberframe, Niceguyedc, Yobot, AnomieBOT, FrescoBot, John
of Reading, Dewritech, Archer4523, Khazar2, ArmbrustBot and Anonymous: 3
Message Session Relay Protocol Source: https://en.wikipedia.org/wiki/Message_Session_Relay_Protocol?oldid=739130684 Contribu-
tors: Frank Shearar, Netje, Uzume, Chris the speller, B timmins, Kbrose, France3470, Addbot, Letiemble, MrOllie, Yobot, FrescoBot,
Gshaham, Adigeo reloaded, Joantune, Poland B and Anonymous: 8
Mobile network operator Source: https://en.wikipedia.org/wiki/Mobile_network_operator?oldid=755126653 Contributors: Timo
Honkasalo, Ant, Kku, NuclearWinner, Jpatokal, Radiojon, Masken, Maximaximax, Neutrality, Bobo192, ChrisUK, Joolz, Versageek,
Instantnood, Wiki-vr, RichardWeiss, Graham87, Vegaswikian, RCRC, JdforresterBot, Mathiastck, CAD6DEE2E8DAD95A, YurikBot,
Bikeborg, Sharkb, Petri Krohn, Nelson50, Allens, SmackBot, Mauls, Jerome Charles Potts, ABACA, DylanW, Shyamsunder, Hu12, Cy-
debot, Kozuch, Epbr123, Nick Number, Tradlos~enwiki, Harryzilber, Barek, Kiore, SuperMarioMan, VolkovBot, Arruzzo, Abdullais4u,
Wirelessfed, SieBot, ClueBot, Samuel Grant, The Thing That Should Not Be, Texnik, Dthomsen8, Addbot, EjsBot, MrOllie, Snoopdogsl,
Yobot, Ciphers, MasterKiller, JaimeABM, HamburgerRadio, SeoMac, Bamyers99, VictorianMutant, ClueBot NG, BG19bot, Singiriyar,
EngGerm12, D7oomy0711, Hoathainguyen32, YiFeiBot, Krishnawtar, JJMC89, Requiem II, Dubbzup, Techdba and Anonymous: 63
Mobile phone operator Source: https://en.wikipedia.org/wiki/Mobile_phone_operator?oldid=754367820 Contributors: Jpatokal, Bearcat,
ChrisUK, Tony1, Shans p s, Barek, Dane, Materialscientist, Alvin Seville, Dcirovic, BG19bot, Touranushertz, Mussab elhadi, Hoathain-
guyen32, SkateTier, Ayalajaay, Clarkson65, Bender the Bot and Anonymous: 6
Mobile telephony Source: https://en.wikipedia.org/wiki/Mobile_telephony?oldid=750170861 Contributors: Andres, Radiojon, Top-
banana, SchmuckyTheCat, Cek, Qui1che, Bender235, ChrisUK, 119, Woohookitty, Rjwilmsi, Vegaswikian, Mathiastck, Srleer, An-
tiuser, Bgwhite, SmackBot, Rrburke, Ohconfucius, WilliamJE, Gogo Dodo, Christian75, Kozuch, Obiwankenobi, Lfstevens, Harryzilber,
Greensburger, PhilKnight, Swikid, Bongwarrior, Mittosi, Mange01, PCock, Insertrealname, MWJamesLDS, Crazypaco, Martinevans123,
Isaac Sanolnacov, PDFbot, Logan, Flyer22 Reborn, Nopetro, Manway, Asocall, Martarius, Unbuttered Parsnip, Muhandes, Rhododen-
drites, Addbot, Ben Ben, Yobot, Benjamin Lamowski, Bartacus1704, AnomieBOT, Materialscientist, Citation bot, Termininja, UrusHyby,
SD5, FrescoBot, HealthyFuture, Citation bot 1, Full-date unlinking bot, Gliktch, Baxtreet, Tanconsult, Mean as custard, RjwilmsiBot,
Emmalewis1, Primefac, Dcirovic, H3llBot, Sodmy, Memestreme, GermanJoe, Aseen8, Abcd888, MerlIwBot, ChristophBurger, Trepier,
BG19bot, EdwardH, Cyberbot II, Dark Silver Crow, Phamnhatkhanh, PC-XT, Tango303, Dolly123test, Eeld616, GambHerno, Monkbot,
KH-1, Rajeev Kumar Shukla, Yogito, Roni50, InternetArchiveBot, Maria1978$, GreenC bot, Davidwatson005 and Anonymous: 43
Mobile VoIP Source: https://en.wikipedia.org/wiki/Mobile_VoIP?oldid=744617331 Contributors: Splatg, Notinasnaid, Peter McGin-
ley, Danhash, Kusma, Woohookitty, Mindmatrix, Pol098, Toussaint, Rjwilmsi, Chobot, Wavelength, Hairy Dude, Brandon, Intershark,
Jesboat, Nelson50, SmackBot, Nihonjoe, Goplett, Rhanbury, Ohnoitsjamie, Bluebot, Oli Filth, MartynDavies, Krallja, Frap, Pjbrock-
mann, ManiacK, Beetstra, Kvng, Hu12, Iridescent, Tony Fox, Msh317, Eps0n, Gogo Dodo, Harryzilber, Desoda, Sebastienr~enwiki,
SHCarter, Sarahmanners, Kgeischmann, Jim.henderson, R'n'B, Kateshortforbob, Kineto ss, Mange01, Huzarus~enwiki, Trendpimp,
Toobaz, Rasmusrefer, Shara77, Danshobiz, Yesbaby~enwiki, 2Editor, IpWorld, Robo01~enwiki, Mazarin07, Tetrar, Kbrose, Imran Ali-
raza, Rajeshontheweb, Miltiades490bc, Yintan, Minojing, Callidior, Tannline, Carl2015, EoGuy, Czarko, Choice47, Sharonpngo,
Niceguyedc, Ripsss, Yusufmotiwala, Fringster, Bobchuggs, Voipmobile, YeigoMobile, Johnuniq, Apparition11, Jarvelami, Einis, Dgtsyb,
Addbot, Socheid, Lunar looney, Cst17, MrOllie, SasiSasi, Chaldor, Luckas-bot, Jecarlson12, AnomieBOT, IveFoundit, Piano non troppo,
Bossiel, Eskyjonathan, Xqbot, Sionk, FrescoBot, Kmmrahman, LucienBOT, VoIPExpert, 2goodgoods, LittleWink, Orindlincoln, FoxBot,
Nahid5692001, Dinamik-bot, Miracle Pen, VOIP-COIP, Shawn736, Smriti tripathi, Zollerriia, Kayclose, Justin.ohanessian, Vymp2010,
Jasonon, Baxide, HKMiller, Winxpcn, Ketalanka, VC2010, JuliaGolo, Nomadolive, Monu.moni, ELNO Checking, ItsMeOrYou, Nen,
MusikAnimal, Msiuda, Etayvas, Forfone, Core4voip, Huzefamansoor, Chatterboxer, Pandit126, Itsalleasy, Eno Lirpa and Anonymous: 91
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 339
Modem Source: https://en.wikipedia.org/wiki/Modem?oldid=753623652 Contributors: Magnus Manske, The Anome, Taw, Lorax, Chris-
tian List, Aldie, Ben-Zin~enwiki, Europrobe, Maury Markowitz, Waveguy, Mintguy, Dwheeler, Edward, RTC, Michael Hardy, Pit~enwiki,
Modster, Kku, SebastianHelm, Minesweeper, Ahoerstemeier, Mac, Angela, Darkwind, Andres, Smack, Mulad, Crissov, Paul Stansifer,
Evgeni Sergeev, Radiojon, LMB, Floydian, Traroth, Olathe, Guppy, Jeq, Robbot, Ktims, Tremblay, Fredrik, Boy b, Nurg, Romanm,
Naddy, Sekicho, Lord Bob, Zidane2k1, AndreasB, Patcat88, Mushroom, Mdrejhon, Dave6, Alexwcovington, Centrx, Giftlite, DocWat-
son42, Brouhaha, MaGioZal, DavidCary, Kim Bruning, Everyking, Dratman, Rookkey, Moogle10000, Rchandra, Pne, Bobblewik, Tag-
ishsimon, Stevietheman, Utcursch, CryptoDerk, PauloColacino~enwiki, Antandrus, Anduin13, Sam Hocevar, Cab88, CALR, Discospin-
ster, Rich Farmbrough, Rhobite, Jpk, Smyth, MeltBanana, R.123, Forbsey, Mani1, Bender235, ESkog, Andrejj, Kjoonlee, Plugwash,
Sietse Snel, Lunaverse, Bobo192, Longhair, Aydee, Shenme, Brim, Citruswinter, Krellis, Nsaa, Poweroid, Liao, Arthena, Somebody
in the WWW, Monty Dickerson, Super-Magician, Wtshymanski, Cburnett, Stephan Leeds, Jheald, SteinbDJ, LukeSurl, Markaci, John-
wcowan, Feezo, Dingobully, Alvis, Jerey O. Gustafson, Muftak, Woohookitty, Yansa, Ylem, Uncle G, Lupinelawyer, WadeSimMiser,
Rtdrury, SCEhardt, Eyreland, Gimboid13, Palica, Marudubshinki, The Nameless, RichardWeiss, Graham87, Cuvtixo, Monk, Kbdank71,
FreplySpang, NebY, Ketiltrout, Sjakkalle, Tizio, Koavf, Tangotango, Bruce1ee, Viktor~enwiki, Vegaswikian, Brighterorange, Double-
Blue, Dbsanfte, FlaBot, VKokielov, Chris Pressey, RobertG, Flydpnkrtn, Twipley, Nihiltres, Ewlyahoocom, Preslethe, Synchrite, Chobot,
Jared Preston, DVdm, Korg, NSR, Adoniscik, Binladen~enwiki, YurikBot, RussBot, Petiatil, DMahalko, Me and, Expertu, Markpeak,
Stephenb, Eleassar, Cryptic, Canageek, NawlinWiki, DragonHawk, Wiki alf, Bachrach44, Mortein, Reneh, Voidxor, Bkil, Mysid,
Zephalis, Fender123, Yudiweb, Rdmoore6, Ageekgal, E Wing, Nentuaby, Tdangkhoa, GraemeL, Rlove, Dutch-Bostonian, Pursin1, G-
smooth2k, AGToth, Finell, Vanka5, SmackBot, Bobet, KnowledgeOfSelf, Unyoyega, SeanCollier, Arny, ProveIt, Yamaguchi , Gilliam,
Loveable bishounen, Anastasios~enwiki, Marc Kupper, Chris the speller, Trampikey, Thumperward, Oli Filth, Warren Young, Jlpayton,
Nmajoros, Nbarth, Krallja, Jimmy116, Simpsons contributor, Newmanbe, Onceler, Johndhackensacker3d, Can't sleep, clown will eat me,
SheeEttin, Nixeagle, JonHarder, Yidisheryid, Addshore, Kcordina, Adamantios, Soosed, Ghiraddje, JanCeuleers, HarisM, Hammer1980,
DMacks, Kukini, TenPoundHammer, Kkailas, Nmnogueira, SashatoBot, Tazmaniacs, Gobonobo, CaptainVindaloo, Gregorydavid, Ckatz,
Tfmurphhk, Beetstra, Ryulong, Peyre, Kvng, DabMachine, Iridescent, JoeBot, BenStrauss, Tawkerbot2, Sakurambo, CmdrObot, Ram-
bam rashi, Raysonho, Remaker, Zarex, Scohoust, Woudloper, MicahDCochran, Nczempin, Nunquam Dormio, Jesse Viviano, Neelix,
Phatom87, HalJor, Cydebot, Swhitehead, Gogo Dodo, ST47, Monkey modem, Ctennis, The snare, Omicronpersei8, Noahsachs, Satori
Son, Malleus Fatuorum, Akb4, Kablammo, HappyInGeneral, Memty Bot, Adammosessss, Electron9, Reswobslc, Dikteren, AntiVandal-
Bot, Ais523, Yupik, Seaphoto, QuiteUnusual, Mk*, Credema, Gkhan, JAnDbot, Harryzilber, MER-C, CosineKitty, John a s, RastaKins,
Hut 8.5, Douglas Whitaker, LittleOldMe, Bongwarrior, VoABot II, RBBrittain, Xb2u7Zjzc32, Xeddy, Nikevich, Ihafez, Indon, Nposs,
Robotman1974, 28421u2232nfenfcenc, Pkrecker, Jonesl84, DerHexer, Jorbettis, Tux404, Jackson Peebles, Yobol, Conquerist, MartinBot,
Arjun01, Jim.henderson, Rettetast, CommonsDelinker, Nono64, LedgendGamer, J.delanoy, Pharaoh of the Wizards, Mange01, Trusil-
ver, Wa3frp, Silverxxx, Lhbts~enwiki, Blood reaper, U.S.A.U.S.A.U.S.A., Nagakumari, Bonadea, Ja 62, Godlvall2, Bwaav, Nyquist562,
Idioma-bot, Reelrt, Johndoe6666, Abcd4312, Deor, Nitrowolf, VolkovBot, ABF, Dogsgomoo, Beesforan, Je G., Wvereeck, Barneca,
Philip Trueman, TXiKiBoT, Maximillion Pegasus, Dwight666, Technopat, DocGratis, Qxz, Jomankeithtest, Martin451, Bored461, Man-
nafredo, Maxim, Cbreaker, Softtest123, Tikki hit, Haseo9999, Grande.rhapsody, ImaMousse, Spinningspark, WatermelonPotion, VISION-
TEKTELE, Bobo The Ninja, The Last Melon, AlleborgoBot, Thunderbird2, Logan, EmxBot, Austriacus, Kbrose, SieBot, Hertz1888,
Crazy Louco, Stanly mcknob, Radon210, Theaveng, Oda Mari, Nopetro, Oxymoron83, Kpdipen, Miniapolis, Lightmouse, Int21h, Corre-
ogsk, Anchor Link Bot, Sfan00 IMG, ClueBot, Tomtrunnel, The Thing That Should Not Be, Lawrence Cohen, Wutsje, Drmies, Mild Bill
Hiccup, Markstuart44, Pointillist, Ordinaterr, Sv1xv, DragonBot, Mumiemonstret, Excirial, Jusdafax, AndyFielding, Patrick.ivers, Aitias,
Ranjithsutari, DumZiBoT, Azam jafari~enwiki, XLinkBot, Davisremmel, Stickee, Duncan, Ost316, Chanakal, Dsimic, Addbot, Cxz111,
Willking1979, Some jerk on the Internet, Guoguo12, Fyrael, Next-Genn-Gamer, Metagraph, Shirtwaist, Download, Sanjayms, AndersBot,
Smplguy, Ehrenkater, Tide rolls, OlEnglish, Kivar2, ZX81, Yobot, Bdog9121, DJ LoPaTa, Yaroslav Kontsevoy, KamikazeBot,
, Sambrena, AnomieBOT, VanishedUser sdu9aya9fasdsopa, Jim1138, Piano non troppo, AdjustShift, Ulric1313, RandomAct, Materi-
alscientist, CoMePrAdZ, Jonathen Skews, Clark89, G0dxilla, Grey ghost, TheAMmollusc, Biology lord, Lowar, GetLinkPrimitiveParams,
Almabot, Solphusion~enwiki, Dspmandavid, ProtectionTaggingBot, Sparcloud, Shadowjams, Taka76, GliderMaven, Angelus Delapsus,
FrescoBot, Ryryrules100, 802geek, Itusg15q4user, RFtechnology, Biker Biker, Pinethicket, HRoestBot, BigDwiki, SpaceFlight89, Ran-
domStringOfCharacters, Footwarrior, Siliconboy, Cnwilliams, TobeBot, , Tbhotch, JeepdaySock, DARTH SIDIOUS 2, Slhck,
Luigiwax, Pierpao, Jfmantis, Lilly granger, Ripchip Bot, Xvolter, DASHBot, J36miles, EmausBot, Davejohnsan, Orphan Wiki, Gfo-
ley4, Super48paul, Dewritech, Racerx11, FozzTexx, L235, 8r455, Tommy2010, Thecheesykid, ZroBot, Traxs7, Dondervogel 2, Rails,
Tolly4bolly, L Kensington, Boots8181, TaxMax, Gsarwa, Peter Karlsen, Sebdog69, ResearchRave, Mikhail Ryazanov, ClueBot NG,
Louagie, TriumFant, Movses-bot, Snotbot, VanishedUser sdu8asdasd, Cntras, ScottSteiner, Asukite, Antiqueight, Wbm1058, HReuter,
Kawkab10hijazi, True Tech Talk Time, Jobin RV, Altar, Kya ross, Rynsaha, Snow Blizzard, Philpill691, NorthCoastReader, Hripsimepiso,
BattyBot, Pratyya Ghosh, Hemmy33, Cyberbot II, Dasfd, DDragon789, Khazar2, Georey H.W., Rich Cecil, Lugia2453, SFK2, The
Quirky Kitty, Sriharsh1234, The Anonymouse, Asis8000, ErinsonMan, Jesiel~enwiki, Carolina Amaral, DavidLeighEllis, Comp.arch,
Justin Urquhart Stewart, Quenhitran, JulianVilla26, Jesdsej, Wyn.junior, JohnSHicks, TuxLibNit, Joe Stitt, Porrige51122, Kinetic37,
Meeee11, Cpt Wise, Mary rose52, Thenorthernstar, DiscantX, Lxylxy123456, Equinox, Galv2015, MBlaze Lightning, NgYShung, GreenC
bot, Bender the Bot, SappyIsHere and Anonymous: 638
Multi-frequency signaling Source: https://en.wikipedia.org/wiki/Multi-frequency_signaling?oldid=752452475 Contributors: Tbackstr,
Maury Markowitz, Yaronf, Radiojon, Rchandra, Beland, Timsheridan, Mandarax, Graham87, NTBot~enwiki, Deville, DCDuring, Andy
M. Wang, Alaibot, Jim.henderson, Kbrose, Johnuniq, Dgtsyb, Yobot, AnomieBOT, Omnipaedista, Some standardized rigour, Lyla1205,
Lincoln Josh, ChrisGualtieri, K7L, DenJoker, Bender the Bot and Anonymous: 8
Orange box Source: https://en.wikipedia.org/wiki/Orange_box?oldid=744133381 Contributors: Pnm, Rl, Doradus, Toreau, Fvw, Perl,
CDN99, Sdornan, Srleer, Kiscica, Alynna Kasmira, Voidxor, Spawn Man, Dethme0w, SuperMidget, Alaibot, Fluxbot, Magioladitis,
Ariel., R'n'B, Fleebo, Philip Trueman, Ulf Abrahamsson~enwiki, Kbrose, Escape Orbit, Mrchris, SoxBot III, Dawynn, AnomieBOT,
JediMaster362, Drewwwwwww, ClueBot NG, Wbm1058, Hlo12321, K7L, JaconaFrere, CAPTAIN RAJU and Anonymous: 16
Packet switching Source: https://en.wikipedia.org/wiki/Packet_switching?oldid=754028773 Contributors: The Anome, PierreAbbat,
William Avery, Waveguy, DonDaMon, Jpatokal, Charles Matthews, Timwi, Jm34harvey, Itai, Jnc, Bevo, Toreau, GPHemsley, RedWolf,
Donreed, Chancemill, Jondel, Jy, Diberri, Giftlite, Niteowlneils, Edcolins, The Singing Badger, Lesgles, Karol Langner, Oneiros, Th-
parkth, Zondor, JTN, Rich Farmbrough, MCBastos, Foobaz, Maurreen, K12u, Giraedata, Helix84, Merope, Jhertel, Andrewpmk, Ashley
Pomeroy, Ynhockey, Rabarberski, Cburnett, Hjf, Nuno Tavares, Woohookitty, Ilario, Philbarker, GraemeLeggett, Dave Cohoe, Mendaliv,
Rjwilmsi, Vary, Teemu Maki~enwiki, Nihiltres, Ewlyahoocom, Fresheneesz, Wingsandsword, BradBeattie, Chobot, YurikBot, RobotE,
Wester, Manop, CarlHewitt, Johnbojaen~enwiki, Welsh, Barberio, Jpbowen, BertK, DeadEyeArrow, ThreePD, Rdmoore6, Closedmouth,
Dspradau, JoanneB, Kungfuadam, Timsk~enwiki, That Guy, From That Show!, Benhoyt, SmackBot, Yamaguchi , Gilliam, Chris the
340 CHAPTER 80. X.25
speller, Bluebot, Jopsen, Oli Filth, Can't sleep, clown will eat me, JonHarder, Gerfaut, LouScheer, Rspanton, Reliablesources, A.Petrenko,
Kashmiri, Kvng, Lee Carre, Wizard191, Dead3y3, Tawkerbot2, CmdrObot, Fumblebruschi, Jamesceld, Dgw, Penbat, Nmacu, Phatom87,
Cydebot, A876, Tom94022, Jedonnelley, Igby, Kablammo, Hcberkowitz, Headbomb, Wmasterj, Logicat, Seaphoto, R2jitu, Deadbeef,
JAnDbot, Harryzilber, VoABot II, JNW, Mbarbier, Ee02b022, Zsh, Jim.henderson, J.delanoy, Mange01, Mojodaddy, Wa3frp, Fishyghost,
JohnGrantNineTiles, Akld guy, Philip Trueman, The Original Wildbear, TedColes, Synthebot, Groundeyes, GoddersUK, Kbrose, SieBot,
Nubiatech, AlphaPyro, ToePeu.bot, Jauerback, PerryTachett, Mx. Granger, ClueBot, Binksternet, The Thing That Should Not Be, Mild
Bill Hiccup, Niceguyedc, Sabri76, Rob Bednark, Excirial, Anon lynx, Sun Creator, Jedi Master Brownlow, LeviathinXII, XLinkBot,
Ali Esfandiari, Dgtsyb, Noctibus, Airplaneman, Dsimic, Addbot, Synchrodyne, Torla42, , PRL42, Lightbot, Brewha-
haitsme, Foelectric, Legobot, Luckas-bot, Yobot, Fraggle81, AnomieBOT, Ciphers, Materialscientist, Neurolysis, Xqbot, Capricorn42,
Nameless23, FrescoBot, Cgdallen, W Nowicki, Alxeedo, Pinethicket, I dream of horses, LittleWink, FriedrickMILBarbarossa, RedBot,
Gentleman wiki, A.wasylewski, Freedomghter21, Trappist the monk, Cgarciap86, Vrenator, Kabdcn, Usangel1066, Sricciar, Deema Al-
Shamaa, Bp2010.hprastiawan, EmausBot, Tuankiet65, Dewritech, GoingBatty, RA0808, Ballofstring, W163, ChuispastonBot, MacStep,
28bot, ClueBot NG, Mahuzu, Delusion23, Oddbodz, HMSSolent, Sowsnek, IluvatarBot, BattyBot, Cyberbot II, NeruYume, Xmikus01,
Thom2729, TwoTwoHello, Referenceguy147, Acetotyce, Chrono85, Praemonitus, Westside oregonian, TheChipWizard, Whizz40, Ja-
conaFrere, T3chman94, Concord hioz, Monkbot, Filedelinkerbot, Eczanne, Gareld Gareld, KH-1, Uyless Black, Ayalajaay, Gsya-
dav1994, Whalestate, Tdadamemd sioz, Randyl Foster and Anonymous: 232
Peer-to-peer SIP Source: https://en.wikipedia.org/wiki/Peer-to-peer_SIP?oldid=723739878 Contributors: Stephan Leeds, Rjwilmsi,
Alynna Kasmira, SmackBot, Kvng, Alaibot, Leolaursen, Kbrose, XLinkBot, Filim 83, Addbot, Symac, AnomieBOT, Miym, Citation
bot 1, Jonesey95, Trappist the monk, Kns10, Obankston, RjwilmsiBot, Dcirovic, Chadpharris and Anonymous: 7
Personal identication number Source: https://en.wikipedia.org/wiki/Personal_identification_number?oldid=755590150 Contributors:
Imran, Heron, Michael Hardy, Ronz, Poor Yorick, IMSoP, Zoicon5, Saltine, JVittes, FrankSier, Smjg, Tsca, Finlay, Falcon Kirtaran,
OldakQuill, Mike Rosoft, ArnoldReinhold, Bobo192, Ziggurat, Ekevu, PaulHanson, Pol098, GregorB, Eras-mus, Holek, Sj, Rjwilmsi,
Gudeldar, FlaBot, Alphachimp, LeCire~enwiki, Dkam, Roboto de Ajvol, Hede2000, Fender123, CLW, Red Jay, SmackBot, McGed-
don, Grawity, Gilliam, Snori, Terraguy, Can't sleep, clown will eat me, Zaian, BIL, Burto88, GaryMorris, John M Baker, Cydebot,
CiaranG, Thijs!bot, Wikijimmy, NESFreak, JAnDbot, MER-C, Joshua, LittleOldMe, Magioladitis, Gscut, WikiXan, Seba5618, Wiki
Raja, Bdodo1992, Sebcastle, Resnitzky, Mail10, Steinberger, GrahamHardy, UnicornTapestry, VolkovBot, Epson291, Dormskirk, Mar-
tin451, Helen Hincks, Carinemily, Qaywsxedc, WereSpielChequers, RJaguar3, Yintan, Flyer22 Reborn, Jasgrider, Jojalozzo, Luciengav,
Svick, Ken123BOT, ClueBot, Enthusiast01, Mild Bill Hiccup, Niceguyedc, Deep2409, Muro Bot, BOTarate, Mitch Ames, Mm40, Ad-
dbot, LaaknorBot, H92Bot, AndersBot, Favonian, SamatBot, Lightbot, Zorrobot, Ettrig, Yobot, Ptbotgourou, Koman90, AnomieBOT,
Ciphers, Materialscientist, Jordav, Cyberssecurity, Kaisle, Harrykitten, Citation bot 1, Pinethicket, I dream of horses, Jonesey95, MastiBot,
Shanmugamp7, Bearsharexx, Saadisaadsaadi, WesUGAdawg, Throwaway85, Lotje, Ripchip Bot, WikitanvirBot, Dooley789, Wikipelli,
Dcirovic, Ronk01, QuentinUK, Stardarks, Ivolocy, ClueBot NG, MelbourneStar, Widr, Titodutta, Benzband, Nadeem8064, BattyBot,
Pharrel101, Tanderson596, GOAT Roger, Redd Foxx 1991, Malcolmmwa, John Ozyer-Key, Tropicalkitty, Olivershawn, CAPTAIN RAJU,
Daudi karimu, Kizami, Winshate2016, Bender the Bot, Masidul Sekh, Testuser213 and Anonymous: 101
Primary Rate Interface Source: https://en.wikipedia.org/wiki/Primary_Rate_Interface?oldid=748726415 Contributors: Big Bob the
Finder, Bobblewik, Tagishsimon, Wpjonathan, Icd, Amigaholic, Danhash, Sid1138, Descendall, The wub, The Rambling Man, Yurik-
Bot, Wknight94, SmackBot, Trailbum, JanCeuleers, Uweschwoebel, Majora4, Eastlaw, Jokes Free4Me, Sp!ke, Xhienne, Trickv, Bellhead,
Nevun, Tomgreeny, Calltech, Jyrejoice, Jim.henderson, Thaurisil, Meridian911, ReverseEngineered, Wykypydya, Kbrose, SieBot, Ncam-
pion, Andromeda451, Editore99, Hobartimus, Fratrep, Zil, Wysprgr2005, Coigrich, Manco Capac, Dgtsyb, Addbot, Lightbot, Fraggle81,
AnomieBOT, Materialscientist, GrouchoBot, Shadowjams, Tharaka3000, Mickeyhill, Dewritech, Slightsmile, Alpha Quadrant (alt), Rudy-
ort, ClueBot NG, Bamim2, Strike Eagle, Data5812, ~riley, K7L, Lugia2453, Frosty, Narky Blert, Crocodilaius and Anonymous: 114
Public switched telephone network Source: https://en.wikipedia.org/wiki/Public_switched_telephone_network?oldid=753258571 Con-
tributors: The Anome, Andre Engels, Gsl, Aldie, William Avery, SteveDay, MikkoM, Youandme, Steverapaport, Patrick, JohnOwens,
Michael Hardy, Darkaddress, Cameron Dewe, Looxix~enwiki, Tusixoh, Glenn, Crissov, Dysprosia, Radiojon, SEWilco, Robbot, Rfc1394,
DavidCary, Markus Kuhn, Niteowlneils, Leonard G., Rchandra, Falcon Kirtaran, Tagishsimon, Gloop, Chowbok, JeremiahOeltjen, Adrian
Sampson, Hugh Mason, JTN, Richardelainechambers, MBisanz, Fourpointsix, Bobo192, MarkWahl, Redlentil, Espoo, Disneyfreak96,
Poweroid, ChrisUK, Rohaq, Guy Harris, Wtmitchell, HenryLi, OwenX, ^demon, Ruud Koot, Graham87, BD2412, Yurik, Snaekid,
Pmj, Rjwilmsi, Makru, FlaBot, Ian Georey Kennedy, Polaralex, Chobot, YurikBot, Rsrikanth05, Cryptic, Hm2k, NickBush24, Adamn,
Jpbowen, Tony1, Nethgirb, Mysid, Elkman, Max Schwarz, Sharkb, Closedmouth, Petri Krohn, Hirudo, SmackBot, MerlinMM, JMiall,
Rick7425, Oli Filth, MalafayaBot, Duckbill, AmiDaniel, -ramz-, Nobodyinpart, Dicklyon, H, Kvng, Iridescent, BobbyLee, Joseph So-
lis in Australia, Az1568, Chetvorno, JohnTechnologist, CmdrObot, Ale jrb, BeenAroundAWhile, Yukoba~enwiki, Alaibot, Dragont,
Thijs!bot, Simeon H, Escarbot, Agnvoip, Alphachimpbot, JAnDbot, Harryzilber, Jan Friberg, Sln3412, Albany NY, Bellhead, Verkhoven-
sky, AlephGamma, Kgeischmann, Calltech, I-baLL, Zahakiel, MartinBot, DrDorkus, Jim.henderson, Nono64, J.delanoy, Peter Chas-
tain, NewEnglandYankee, Manassehkatz, Ishanbhanu, Birczanin, Netmonger, PNG crusade bot, TXiKiBoT, Vipinhari, Abtinb, Rei-bot,
Monkey Bounce, Doug, Isdnip, AlleborgoBot, Kbrose, Quietbritishjim, SieBot, Dwandelt, Gerakibot, Yunghkim, Mahehere, Jojalozzo,
Ebernat, Machina.sapiens, WordyGirl90, ClueBot, EoGuy, Taroaldo, Trivialist, Mlas, XLinkBot, Deadlyturtletank, WikHead, Silvo-
nenBot, Dgtsyb, Addbot, AkhtaBot, Download, Numbo3-bot, Lightbot, Loupeter, Zorrobot, , Luckas-bot, Bunnyhop11, Kamikaze-
Bot, Vini 17bot5, AnomieBOT, New2way, Rubinbot, Kingpin13, Abdulraheemsidz, Obersachsebot, Xqbot, Ranjandutta, Toetoetoetoe,
GrouchoBot, SimonInns, FrescoBot, Nageh, Haeinous, Austria156, Ezhuttukari, EmausBot, WikitanvirBot, Super48paul, Boundarylayer,
Rkononenko, Midas02, Anthony.selby, Miguelito2010, ClueBot NG, Widr, ZombieRamen, Bmbaker88, Voipsatellite, Rlegends, Earaps,
Rp8083, Mogism, Ptuttle123, Me, Myself, and I are Here, Slumberbus, Haminoon, Tc.guho, Spasticsociety, Anarchyte, Rajuarya125,
Dinnypaul, Zupotachyon, Jannatmouri and Anonymous: 243
Public-safety answering point Source: https://en.wikipedia.org/wiki/Public-safety_answering_point?oldid=664376428 Contributors:
Voidvector, Ronz, Radiojon, Cacophony, MarkWahl, Woohookitty, Dovid, Jeprobertson, Jake Wartenberg, Mashmore, YurikBot, Clib,
AVM, Kimchi.sg, JogCon, SmackBot, Lefteh, Badboyjamie, BeenAroundAWhile, WeggeBot, Ernstl, Jc3, Scottalter, Jim.henderson, Lan-
darski, Kris.berg, SieBot, Jdaloner, Addbot, Chzz, Yobot, NextGen911, Jodypro, The Polish, Jprovenz, Faizan, YiFeiBot and Anonymous:
15
Pulse dialing Source: https://en.wikipedia.org/wiki/Pulse_dialing?oldid=747388581 Contributors: The Anome, Aldie, Nommonomanac,
Cameron Dewe, Dysprosia, Astronautics~enwiki, Tagishsimon, Stevietheman, Mike R, JTN, Rich Farmbrough, Evice, Longhair, Armando,
Eyreland, Nick1nildram, Rjwilmsi, Preslethe, Hairy Dude, PrologFan, Fender123, Deville, LeonardoRob0t, Incnis Mrsi, Aaron of Mpls,
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 341
Evilandi, Quadm, Octahedron80, BobJones, KLLvr283, Jam01, Cornlad, Denham062, MeekMark, Djy, Rhardiii, Thijs!bot, GSTQ, Har-
ryzilber, PhilKnight, Kingpin29, Kiore, Jim.henderson, Hugo999, Emsearcy, Michael Frind, Kbrose, Dvv, Doctoruy, PipepBot, Pixel-
Bot, Johnuniq, Ost316, Sweetpoet, Addbot, AnomieBOT, An805Guy, Jkbw, Some standardized rigour, Daniel the Monk, Alcapwned86,
EdoBot, Lincoln Josh, 2001:db8, ChrisGualtieri, K7L, Vieque, Amortias, Purtil and Anonymous: 48
Pulse-code modulation Source: https://en.wikipedia.org/wiki/Pulse-code_modulation?oldid=751185170 Contributors: Damian Yerrick,
Bryan Derksen, Zundark, The Anome, Ap, Amillar, Aldie, Waveguy, Mjb, Heron, Bobdobbs1723, Michael Hardy, Chris-martin, Tannin,
Ixfd64, Karada, MichaelJanich, Ahoerstemeier, Muriel Gottrop~enwiki, CatherineMunro, Kragen, Glenn, Coren, Jdstroy, Dysprosia, Fur-
rykef, AnthonyQBachler, Lumos3, Ktims, Dittaeva, Jleedev, Giftlite, Ssd, Tom-, Matt Crypto, Adam McMaster, SWAdair, Bobblewik,
Neilc, Alexf, DRE, Mikko Paananen, Starx, Kelson, Abdull, Discospinster, Lovelac7, Khalid, Lankiveil, SickTwist, .:Ajvol:., Giraedata,
Unused0022, Mote, Gerweck, Andrewpmk, Hu, 25or6to4, MRB, Tslocum, Graham87, BD2412, SudoMonas, MordredKLB, KamasamaK,
Nneonneo, Miserlou, KirkEN, FlaBot, Margosbot~enwiki, Ewlyahoocom, Kolbasz, Sstrader, Intgr, Lmatt, GreyCat, Chobot, Bgwhite,
YurikBot, Spacepotato, Kymacpherson, RussBot, Bjoern.thalheim~enwiki, Gaius Cornelius, Retired username, Malcolma, Brandon, Shep-
azu, Mysid, Thetrilogy, ReCover, Deville, Pb30, Dan Kee, Dystopianray, Zvika, Emanuel.munteanu, Qoqnous, SmackBot, Haza-w, Jagged
85, Stuarta, Jcarroll, JorgePeixoto, Alias777, Jerome Charles Potts, Chendy, Kalatix, Chlewbot, Daniel.Cardenas, Vina-iwbot~enwiki,
L337p4wn, SashatoBot, IronGargoyle, Vanished user 8ij3r8jwe, Frango com Nata, Dicklyon, Kvng, Lee Carre, OnBeyondZebrax,
LethargicParasite, Shoaib Meenai, Emote, Lid2000, Lanma726, Sorn67, Mblumber, Qwyrxian, Phy1729, Escarbot, Barneyg, Prolog,
Davidbrucesmith, AlexOvShaolin, Oddity-, JAnDbot, Harryzilber, Dobbse, Asnac, Gloomba, Magioladitis, LorenzoB, Oicumayberight,
Ariel., Jim.henderson, Pharaoh of the Wizards, Alexwright, Acalamari, Dispenser, Skullers, Gerstman ny, Je G., TXiKiBoT, A4bot,
Broadbot, Nicodeamuz, Eubulides, The Seventh Taylor, VanishedUserABC, Abhishekdevra, EgbertE, SieBot, Bill Waggener, Callistussj,
Jmjanssen, Fishnet37222, ClueBot, Aquegg, Binksternet, Lawrence Cohen, Ndenison, Mild Bill Hiccup, Boing! said Zebedee, Rcoo-
ley~enwiki, SchreiberBike, ChrisHodgesUK, Rachelfenn, Ulyssix, The Zig, DumZiBoT, Stratsve, Addbot, Klane11, DOI bot, KitchM,
GyroMagician, OlEnglish, Matj Grabovsk, Luckas-bot, Yobot, OrgasGirl, Iranvijay, Nyat, Armchair info guy, Gtz, Jim1138, Sz-iwbot,
Materialscientist, Citation bot, Xqbot, Sirgorpster, Albert.guiteras, Nasa-verve, Shadowjams, Kernaazti, FrescoBot, Mfwitten, Citation
bot 1, Hondootedly, Jandalhandler, AXRL, Jfmantis, Salvio giuliano, EmausBot, Acather96, Wikipelli, Dcirovic, Kokken Tor, L Kens-
ington, Eigenbanana, Donner60, Gmt2001, ClueBot NG, Chester Markel, Helpful Pixie Bot, IWPAG, Pfeerz, HMSSolent, BG19bot,
Klilidiplomus, Anbu121, BattyBot, Pratyya Ghosh, TheJJJunk, Jochen Burghardt, Epicgenius, Boulbik, Babitaarora, Spyglasses, Yasi-
uMody, Monkbot, KasparBot, Eido95, GreenC bot, Elaareessex and Anonymous: 236
Quality of service Source: https://en.wikipedia.org/wiki/Quality_of_service?oldid=751914675 Contributors: The Anome, Christopher
Mahan, Rkinder, Edward, Michael Hardy, MartinHarper, Wapcaplet, Dori, Yaronf, Glenn, Kyokpae~enwiki, EdH, Wik, Echoray, Motor,
Robbot, RedWolf, DocWatson42, Dinomite, Wolfkeeper, Everyking, Rchandra, Kegill, Mozzerati, BrianWilloughby, Rich Farmbrough,
Wk muriithi, JoeSmack, Mike Schwartz, HasharBot~enwiki, V2Blast, Mc6809e, JLeland, ClockworkSoul, Mark Bergsma, Suruena, Tony
Sidaway, Voxadam, Ntavares~enwiki, Simetrical, Mindmatrix, RHaworth, Morton.lin, Pol098, Contele de Grozavesti, Vandenbr, Aarghd-
vaark, Graham87, BD2412, Jclemens, Icey, Rjwilmsi, WhiteBoy, Agou~enwiki, Ttwaring, Fred Bradstadt, FlaBot, Ian Georey Kennedy,
Margosbot~enwiki, Limeyuk, Raindeer, Kakurady, PhilipR, YurikBot, Borgx, RobotE, Eraserhead1, RussBot, Chris Capoccia, Stephenb,
Manop, Bovineone, Uetian118, Vanished user kjdioejh329io3rksdkj, ENeville, Robertvan1, Dbrs, Shotgunlee, Kyle Barbour, Bota47,
Lt-wiki-bot, Closedmouth, Roberts83, ASchmoo, SmackBot, Mark Tranchant, Azevedo wikipede, Yamaguchi , Agi896, Ohnoitsjamie,
Sceasary, Jishnua, Jbarcelo, Frap, DRahier, Adamantios, Radagast83, PPBlais, Kuru, Iliev, A.b.s, Camilo Sanchez, Soulkeeper, Mets501,
MTSbot~enwiki, H, Beck162, Kvng, Lee Carre, Osklil, Ndvornk, Salexandre~enwiki, Chetvorno, SkyWalker, Glendonowers, Sd58619,
Erencexor, Andkore, Whophd, Equendil, Phatom87, AnthonyCheng, Cydebot, Obornp, Mblumber, Djg2006, Broughturner, Skittleys,
Dancter, BCSWowbagger, Thijs!bot, Epbr123, RichardBennett, Headbomb, Mlogic, Escarbot, AntiVandalBot, Richard n, Dougher, JAnD-
bot, Barek, Raanoo, Kelcher, Rich257, SandStone, Kgeischmann, Jim.henderson, Bissinger, Cmsjustin, Keith D, Mange01, Trusilver,
Spc01, Jesant13, Benjaminzsj, Mamyles, Spainhower, VolkovBot, TXiKiBoT, Stevevogelnu, A4bot, Rei-bot, Elimerl, MichaelStanford,
Davesnmp, ^demonBot2, Mannafredo, Acprisip, Michael Frind, Kbrose, Amatriain, Adclark88, ToePeu.bot, VVVBot, MkDoyle, Mar-
tyvis, Ctxppc, Maelgwnbot, Foglar~enwiki, ClueBot, Nsk92, Muhandes, Sun Creator, Apparition11, DumZiBoT, XLinkBot, Dgtsyb,
Elizant, Zodon, Bondjb, Tclavel, Addbot, HPNAUSER, Download, AnnaFrance, MJisnotmylover, SasiSasi, Megaman en m, Legobot, Dr-
pickem, Luckas-bot, Bunnyhop11, Grebaldar, D.alotaibi, Nallimbot, Lexoyo, AnomieBOT, Lirneasia, Rubinbot, Xxp~enwiki, Xqbot, Jor-
dav, Martnym, Pythoulon, Lahnfeear, RibotBOT, Amaury, GliderMaven, FrescoBot, W Nowicki, Itusg15q4user, D'ohBot, Francesco-lelli,
Citation bot 1, RedBot, Btilm, MastiBot, Jandalhandler, Skc7, Spakin, Donalmorris, Lopifalko, Eljazzar, Skamecrazy123, EmausBot, John
of Reading, WikitanvirBot, Angrytoast, Primefac, Dcirovic, Bongoramsey, Dmatsunaga, Rewstah, Pbhurley, Karthikndr, Scott.somohano,
Mueka238, Pluggy35, Rememberway, ClueBot NG, YaseminIT, Snotbot, Dimos2k, MosesB77, BG19bot, Ireneo.heraldo, Huisman-
cljo, Ixim dschaefer, Idragan, Gburca, Haha1221, Run4health, Jamesx12345, Phamnhatkhanh, Babitaarora, Cgg1969, Samnichols, Manul,
Sdoya, Ireneshih, ScotXW, Bristot, Itsalleasy, Amenychtas, InternetArchiveBot, GreenC bot, Bender the Bot and Anonymous: 264
Real-time Transport Protocol Source: https://en.wikipedia.org/wiki/Real-time_Transport_Protocol?oldid=754095780 Contributors:
Nyco~enwiki, Tzartzam, JohnOwens, Nixdorf, Pagingmrherman, CesarB, Muriel Gottrop~enwiki, Yaronf, Glenn, Brigman, Dcoetzee,
Echoray, Itai, Tero~enwiki, Puckly, Lzur, Cedars, Alerante, Karn, Fleminra, Michael Devore, Vadmium, Mgream, Vina, Bodnotbod,
Allefant, MementoVivere, Snukin~enwiki, JTN, DrMac, Bender235, Joaopais, Bobo192, Gduy, Giraedata, Wrs1864, Kgashok, Su-
ruena, Ko-, Voxadam, Ceyockey, Kenyon, Mazevedo, Mindmatrix, Ruud Koot, Yurik, Koavf, Strait, Victor Trac, Kchoboter, FlaBot,
M7bot, FrankTobia, YurikBot, RobotE, Sceptre, Hairy Dude, MMuzammils, Tfelber, Gaius Cornelius, TheMandarin, Brandon, Bota47,
Honeyman, Attilios, KnightRider~enwiki, SmackBot, Bluebot, TheKMan, Mwtoews, Daniel.Cardenas, Vina-iwbot~enwiki, DKEdwards,
Kkailas, Chaotic Mind, Itsgeneb, Soumyasch, Kvng, Hu12, Teemuk, Dokaspar, Andy pryor, Mikewax, Thijs!bot, Avi.dorfman, Csabka,
Dawnseeker2000, Thakkar v, Dougher, JAnDbot, Doncrawley, Arvinder.virk, Enjoi4586, Malcolmst, Ling.Nut, Kgeischmann, Stan3,
Mange01, Juliancolton, VolkovBot, TXiKiBoT, Susantab, TwilligToves, Mezzaluna, YordanGeorgiev, Antoncampos, Kbrose, SieBot, Tres-
iden, VVVBot, Woolf44, Ctxppc, Cschim, Diana cionoiu, Mild Bill Hiccup, Alex.blackbit, Cory Donnelly, Sdrtirs, Evoisard, Johnuniq,
RTP123, XLinkBot, Kurienmathew, SilvonenBot, Dgtsyb, Addbot, ConCompS, RN1970, CarsracBot, SciComTech, Smartyepp, Luckas-
bot, Yobot, AnomieBOT, Citation bot, ChrisCPearson, Isheden, JirkaHnidek, FrescoBot, Josemariasaldana, E n sh, Wikisierracharlie,
BenzolBot, Rapsar, MastiBot, Dac04, DixonDBot, Prasado, John smith4092, Thelittlemouse, Mean as custard, RjwilmsiBot, EmausBot,
WikitanvirBot, FlippyFlink, Marlogger, Mikhail Ryazanov, ClueBot NG, Arunsjamwal, Keancaptinh, Satellizer, TechMaker, Helpful Pixie
Bot, Lekensteyn, Jzu, Cyberbot II, TwoTwoHello, ArmbrustBot, Someone not using his real name, Paul2520, Monkbot, VeniVidiVicipedia,
Garywe51, CabbagePotato, Tortle, Yousif-7152, Necrocirco, , Akartit and Anonymous: 179
Sampling (signal processing) Source: https://en.wikipedia.org/wiki/Sampling_(signal_processing)?oldid=752639460 Contributors:
Heron, Andres, Smack, Selket, Giftlite, DavidCary, Wolfkeeper, Ravn, Edcolins, OverlordQ, Kjoonlee, Rbj, Unused0022, LutzL, Jheald,
Gene Nygaard, Oleg Alexandrov, Joz3d, Adoniscik, YurikBot, RussBot, JulienBourdon, Kimchi.sg, Thiseye, BorgQueen, JLaTondre,
342 CHAPTER 80. X.25
Zvika, SmackBot, Gilliam, Chris the speller, Bluebot, Gutworth, Nbarth, Patriarch, Colonies Chris, Bob K, SashatoBot, Dicklyon, Kvng,
Mattbr, WeggeBot, Gionnico, Thijs!bot, Epbr123, JAnDbot, Txomin, Rami R, Email4mobile, JaGa, Pvosta, Sigmundg, Trusilver, Ste-
fanosNikolaou, Soliloquial, Philip Trueman, TXiKiBoT, VanishedUserABC, Spinningspark, Dan Polansky, Chemako0606, DaBler, OK-
Bot, ClueBot, Cosmin1595, Binksternet, Hongthay, Nanren888, Niceguyedc, DragonBot, Alexbot, Johnuniq, DumZiBoT, Dthomsen8,
MagnusA, Deineka, Addbot, Fgnievinski, Bodysurnyon, LaaknorBot, Zorrobot, Luckas-bot, Jan Arkesteijn, AnomieBOT, John Holmes
II, Barking Mad42, Jim1138, LilHelpa, Anna Frodesiak, Infvwl, Miym, RibotBOT, GliderMaven, FrescoBot, ANDROBETA, HRoestBot,
RedBot, ContinueWithCaution, Dinamik-bot, Onel5969, EmausBot, Dadr, WikitanvirBot, K6ka, Bjbarman18, ImEditingWiki, Lorem Ip,
ChuispastonBot, Intellec7, Teapeat, ClueBot NG, MelbourneStar, Gggbgggb, Shantham11, Jk2q3jrklse, Helpful Pixie Bot, Nen, Physic-
sch, Rcunderw, Kondephy, Webclient101, Sowndaryab, Mnkmnkmnk990, ScotXW, Meteor sandwich yum, KH-1, Lx knb, CaseyMiller-
Wiki, GreenC bot, AnErrorBuzzerSoundEect2016At3675And4008, Bender the Bot and Anonymous: 120
Satellite phone Source: https://en.wikipedia.org/wiki/Satellite_phone?oldid=756092352 Contributors: Robert Merkel, Michael Hardy,
Stw, Ahoerstemeier, Mac, Haabet, Andres, Tristanb, RickK, Radiojon, Saltine, Taxman, Bearcat, Fredrik, Jondel, Hcheney, DocWatson42,
Michael Devore, 159753, Sleepygreen~enwiki, Rhobite, Guanabot, Srd2005, Xcriteria, West London Dweller, Sleske, Towel401, Insom-
niacity, Alansohn, Mgaved, GNU4eva, Andrewpmk, RobertStar20, Apoc2400, Wtmitchell, Lkinkade, Toyoda, Woohookitty, Armando,
MarkPos, Graham87, Descendall, Rjwilmsi, XP1, Vegaswikian, NeonMerlin, CannotResolveSymbol, Tequendamia, Bgwhite, YurikBot,
MMuzammils, DKSalazar, CambridgeBayWeather, Grafen, Super Rad!, GraemeL, Draco avus, Shufengbai, SmackBot, Kittynboi, Red-
Spruce, Gilliam, Bluebot, Suamme1, Thumperward, Oli Filth, Kungming2, Digitrics, Can't sleep, clown will eat me, Frap, JonHarder, BIL,
Trieste, DylanW, Bengl, Parrot of Doom, WayKurat, Moniker42, Laugh~enwiki, Dasune, Euchiasmus, Jbonneau, Rsnake123, Hu12, Ivan-
Lanin, Seven of Nine, Erencexor, Gogo Dodo, Omicronpersei8, OfFire, BetacommandBot, InfernalPanda, Dawnseeker2000, AntiVandal-
Bot, Seaphoto, Jc3, Harryzilber, MER-C, Greensburger, Joshua, LittleOldMe, Magioladitis, Nyq, Swpb, HEAD ON APPLY DIRECTLY
TO THE FOREHEAD, LorenzoB, Cmpoel, Scottalter, CommonsDelinker, Lan1g1r0, Trusilver, JBFrenchhorn, 97198, Vanished user
g454XxNpUVWvxzlr, Iheartcorruption, Binba, BigHairRef, Equazcion, Intothemiddle, Mrkmrk, Kyle the bot, Ask123, Broadbot, Spi-
ral5800, Billinghurst, Burntsauce, Stojo34, Schnellundleicht, AlleborgoBot, SieBot, Krawi, Caltas, Yulu, Lisatwo, Lightmouse, Rkarlsba,
Altzinn, Escape Orbit, Into The Fray, Jite25, Martarius, ClueBot, Timeineurope, Zeerak88, The Thing That Should Not Be, Jan1nad,
Ignorance is strength, Geofone, Alejandrocaro35, Nukeless, Stojo71, Garthwimbush, Midnight Hour, XLinkBot, JSpink137, AndreNatas,
JediSaint, Addbot, Satbu, Knight of Truth, Innv, Shirtwaist, Lightbot, OlEnglish, WuBot, Yobot, Themfromspace, GavMag, AnomieBOT,
Ipatrol, Flinders Petrie, Materialscientist, ..24, Bencmq, Xqbot, Klisanor, Tiller54, Nasa-verve, GrouchoBot, Morgan Phoenix,
Shadowjams, FrescoBot, CKyle22, Jonesey95, Emyil, Forward Unto Dawn, Msileinad, TobeBot, Comet Tuttle, Gisegre, Gregoire23,
Mean as custard, RjwilmsiBot, Beyond My Ken, EmausBot, Katherine, Racerx11, Howan, Qrsdogg, Dcirovic, ZroBot, Hedonologist,
Alpha Quadrant, KazekageTR, NetworkINV, ChuispastonBot, Homer.Hapmouche, Kyle.drerup, CharlieEchoTango, Helpsome, ClueBot
NG, Gareth Grith-Jones, Jonsaad, BG19bot, Teammm, Cyberbot II, SABACC, Junkyardsparkle, El Foes, Evano1van, JimMcKinley123,
Himanshu301989, Rjemma, SamanthaPuckettIndo, Wyn.junior, Addisnog, RebeccMWind, KH-1, Robertbarlow13, TimoVink, Yuil.Tr,
Reynan suba, Emanuel del olmo, SHAIKH ABDUL GAFAR, Srpatterson, GreenC bot, Satphoneguy and Anonymous: 232
Session Initiation Protocol Source: https://en.wikipedia.org/wiki/Session_Initiation_Protocol?oldid=750079678 Contributors: Magnus
Manske, RobLa, Pinkunicorn, Ed Poor, Etu, Christopher Mahan, Maury Markowitz, PeterB, Nyco~enwiki, Leandrod, Edward, Liftarn,
Seav, Pagingmrherman, Notheruser, Yaronf, Julesd, Scott, IMSoP, Mulad, Kat, Guaka, Jharrell, Zoicon5, Judzillah, Itai, Robbot, RichiH,
MrJones, RedWolf, Chris Roy, DataSurfer, Lzur, Cyrius, Alf Boggis, ShaunMacPherson, Sim~enwiki, Lupin, MSGJ, David Johnson,
Rick Block, Rchandra, Elgaard, AlistairMcMillan, Fanf, Edcolins, Matt Darby, Carlos-alberto-teixeira, Schweini, Utcursch, Dhughes,
Bigpeteb, Biot, Tietew, Now3d, , DrMac, Pmsyyz, Wk muriithi, Smyth, Gronky, Bender235, Azurepalm, OldMan, Sietse Snel,
Mboedick, Hujaza, Luser, Franl, Matt tw, Towel401, Wrs1864, Alansohn, A.M.~enwiki, Monk127, Wensong~enwiki, SeanLegassick,
Wtshymanski, Emvee~enwiki, Cburnett, Suruena, Ringbang, Algocu, Voxadam, Rzelnik, Mindmatrix, Brazil4Linux, Armando, Isnow,
Ejabberd~enwiki, Rchamberlain, McCarthur~enwiki, Graham87, Mulligatawny, Rjwilmsi, Bubuka, SudoMonas, Koavf, Strait, Tanovic,
Jehochman, Patcito, Ttwaring, FlaBot, Ausinha, Kmorozov, Wongm, GreyCat, Ttlkr, YurikBot, Hairy Dude, Mclayto, Logixoul, MMuzam-
mils, Me and, TheMandarin, Satch69, Taed, Brandon, Jeme, Layer~enwiki, Voidxor, DeadEyeArrow, Pnetz, Thane Eichenauer, Leonar-
doRob0t, Johnpseudo, Batsonjay, Bluezy, Dewikipeder, Linkminer, Tom Morris, Edward Waverley, SmackBot, Bobet, Eric boutilier,
Pgk, Likethesky, Odd bloke, Laurie G, Master of Puppets, Morte, MartynDavies, Torzsmokus, Salmar, Faico, Can't sleep, clown will eat
me, Frap, Andyparkins, Cybercobra, Kasperd, Eewanco, Alan Smithee, Metamagician3000, Daniel.Cardenas, Ugur Basak Bot~enwiki,
Doug Bell, Microchip08, Breno, Noahspurrier, Ric, Kvng, Hu12, DabMachine, Teemuk, GDallimore, Voip81, Jfayel, Amniarix, Para-
dialEditor, Requestion, Equendil, Phatom87, UncleBubba, Miguel.lima, Gogo Dodo, Bpadinha, Neustradamus, Jay.Here, Serych, Mranga,
Jadahl, GentlemanGhost, Avi.dorfman, Cub001, AdamRoach, DavidAyers, Dawnseeker2000, AntiVandalBot, Widefox, Agnvoip, Worm-
hole80, B timmins, Altesys~enwiki, JAnDbot, Harryzilber, Eproulx, Raanoo, Enjoi4586, Blatkinson, BlueRobot~enwiki, Magioladitis,
VoABot II, Voixium, Pausch, Skowa, Donsez, Kgeischmann, Calltech, R'n'B, Verdatum, Mange01, Carre, Brest, Hopper96, Tekalpha,
Mram80, Cfeet77, Touisiau, AntiSpamBot, Amirshaheen, Malcolmredheron, Jniemi, VolkovBot, Scienceguy8m, TXiKiBoT, Seyhan
Aydin, Mvineetmenon, Rei-bot, Lradrama, Nexus501, BotKung, YordanGeorgiev, Kbrose, Nubiatech, AIMSzpc, JonTeh, France3470,
Matthi2, Antzervos, Oxymoron83, Int21h, Mpm777, Rathee, Kjtobo, Dariuspomaha, Denisarona, Bchatelet, Russellbryant, Tuxa, Clue-
Bot, Strongsauce, Jbonocore, Siipikarja, Bazza37, Excirial, Alexbot, PixelBot, Eshouthe, Sdrtirs, Yun-Yuuzhan (lost password), DumZ-
iBoT, Arlolra, XLinkBot, Tzury, SilvonenBot, Dgtsyb, Curtis Newton, Geomaster1, Addbot, Codecmdr, MrOllie, 5 albert square, Zor-
robot, Zhong.xie, James nits, Legobot, Yobot, AnomieBOT, Korolev Alexandr, Erikgje, Jpdemont, Materialscientist, Surf08008, Xqbot,
Joehamiltonjr, Kyng, Vocale, KenCFTeam, MathsPoetry, PM800, , Nageh, EagleEye96, Oneworld12, I dream of horses,
Sgodin, Justpossible, Edwilson97, Pbraneld, SpaceFlight89, Jandalhandler, Gtamas, Banej, Gshaham, MrsJonesical, Sipexpert, FuzzyBS,
Ashleyarmitt, Obankston, Dalba, RjwilmsiBot, Ripchip Bot, Silverfox196, WikitanvirBot, Pugliavi, B1ll1ngsl34, Dcirovic, Kkkdddiii,
AvicBot, Tliberty10, Fred Gandt, Lion789, I'm not human, Ennustaja, I don't remember my username, JesperANielsen, Ibc wiki, Fabi-
wanne, Ehjelmeland, Will Beback Auto, ClueBot NG, Molestash, MelbourneStar, Jdi153, Adem reid, Widr, Lincoln Josh, Helpful
Pixie Bot, Tholme, Jcgriths, Plantdrew, WR:ichibantel, Joevf, Zach Vega, Olle.johansson, Flambib, Guillaume.steinmetz, Johnthe-
smith, James.hamlin, IRedRat, BattyBot, Pratyya Ghosh, Floggerxxx, Cyberbot II, Khazar2, AspieMind, Alfyj72, Asv128, ArmbrustBot,
Starnavy, Monkbot, Andolini7110, Kansiime, Prajinjonchhe, SheriIsInTown, Saisai.msi, Jesus.munozb, Lizzard78, Tauwe1, AjayKu-
marShrestha, Hughporter89, GreenC bot, Monvoip, Bender the Bot, Fatoboist and Anonymous: 437
Short Message Service Source: https://en.wikipedia.org/wiki/Short_Message_Service?oldid=755375198 Contributors: Robert Merkel,
The Anome, Manning Bartlett, Mark, Drj, SJK, Ghakko, Mswake, Modemac, Tzartzam, AdamWill, Chuq, Edward, Michael Hardy, Will-
smith, Kwertii, Modster, Chuck SMITH, Tompagenet, Ixfd64, Zanimum, 6birc, NikkiT, Pcb21, CesarB, Ellywa, Ahoerstemeier, Haakon,
Mac, Jpatokal, Baylink, Snoyes, Angela, Darkwind, Glenn, Error, Benjaminong, Nikai, Jimregan, Jonik, Etaoin, Conti, Ronaldo Gue-
vara, Andy G, Wikiborg, Tiptyper, Bjh21, Maximus Rex, Elnoyola~enwiki, SEWilco, Omegatron, Thirdbane, Wernher, Bevo, Mtcv,
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 343
Ebricca, Nnh, Donarreiskoer, Robbot, Boy b, TMC1221, Moncrief, Jmabel, Nilmerg, Steeev, Yacht, Blainster, Baloo rch, Hadal,
Wereon, HaeB, Tea2min, Acm, Sjl, Vonkwink, DocWatson42, Mshonle~enwiki, Marnanel, Leonig Mig, Akadruid, Holizz, var Arn-
fjr Bjarmason, Meursault2004, Zigger, Orpheus, Obli, No Guru, Zora, Jfdwol, Bsoft, Mboverload, Rchandra, AlistairMcMillan,
Solipsist, Foobar, ArinArin, Matt Crypto, Pne, Bobblewik, Ragib, Celerityfm, UED77, Scurra, Prichardson, Rrw, 159753, Ljhenshall,
CryptoDerk, Fangz, Antandrus, Beland, Mikko Paananen, Sanbec, Kevin B12, Bodnotbod, Elektron, Klemen Kocjancic, Abdull, Trevor
MacInnis, Canterbury Tail, EagleOne, Davidbod, Bornintheguz, Discospinster, Rich Farmbrough, Guanabot, Rupertslander, Cdyson37,
R.123, GregoryWeir, Pavel Vozenilek, Stereotek, Pnevares, Bender235, S.K., Violetriga, Syp, Sockatume, Bennylin, Walden, Marx Gomes,
Shanes, Susvolans, Iamalegend, Xgravity23, Bastique, Reinyday, DrYak, Cmdrjameson, Johnteslade, Blenda~enwiki, Oop, Of~enwiki,
Irrawaddy, Nk, Gadrauhts~enwiki, Sleske, Towel401, Ultra megatron, Nsaa, Lycanthrope, ClementSeveillac, Anssi~enwiki, Alansohn,
Gary, ChrisUK, MrTree, Blahma, Guy Harris, Jeltz, Superabo, Zippanova, Rakerman, Kocio, Feb30th1712, Ruleke, Snowolf, Erik, Pro-
hibitOnions, Omniscientist, ReyBrujo, Sciurin, The1pato, GabrielF, Redvers, Prattora~enwiki, Djsasso, Netkinetic, Umapathy, Alex.g,
UTF-8, Stephen, Alvis, Mibus, Woohookitty, Mindmatrix, Camw, LOL, Sburke, Morton.lin, Uncle G, Phronima, Admrboltz, Qaddosh,
Pol098, Cbdorsett, Amikeco, GregorB, SDC, Rchamberlain, Plrk, Alecv, Wayward, ThomasHarte, CPES, Prashanthns, DavidFarmbrough,
Christopher Thomas, Palica, Gerbrant, Marudubshinki, Mandarax, Siqbal, RichardWeiss, Riadlem, Squallwc, Ashmoo, Graham87, Magis-
ter Mathematicae, Taestell, Elvey, FreplySpang, JIP, Josh Parris, Broccoli, Rjwilmsi, Coemgenus, Axinar, Bruce1ee, Wormeyman, Feydey,
Alban, Vegaswikian, Guinness2702, NeonMerlin, JP Godfrey, Bratch, Matt Deres, Austrian, FlaBot, Sky Harbor, SMeeds, Mathiastck,
Fragglet, DuLithgow, Alphachimp, OpenToppedBus, Kickboy, Chobot, Antilived, Mhking, Flashmorbid, Rmalcolm, Elfguy, Siddhant,
YurikBot, Wavelength, Sceptre, Hairy Dude, Kafziel, Family Guy Guy, Rygelski, Me and, Bhny, DanMS, Hydrargyrum, Oceantribe,
Devnevyn, CambridgeBayWeather, Eleassar, Bovineone, Wimt, Purodha, DragonHawk, Fredagebrink, Malcolma, Brandon, Jpbowen,
Raxraxrax, PhilipO, Ezeu, Marc44, Xiol, Dbrs, Bota47, CorbieVreccan, Jeremy Visser, Blowdart, Ms2ger, Mxcatania, TransUtopian, Dan
Harkless, Eurosong, Mtze, FF2010, LarryLACa, Sandstein, Zzuuzz, Nachoman-au, Ageekgal, Closedmouth, Abune, Canley, GraemeL,
JoanneB, TimOertel, Phil Holmes, Rextan, Kevin, Stopherchris, JLaTondre, Ilmari Karonen, NeilN, Mardus, Ynlau, Finell, Robertd,
Veinor, AtomCrusher, SmackBot, Derek Andrews, Zawthet (usurped), Salilm, Bobet, Haza-w, Tom Lougheed, Prodego, CompuHacker,
McGeddon, Textfriek123, KocjoBot~enwiki, Clpo13, Chairman S., Eskimbot, Shayanrm (usurped), Agentbla, BiT, Nil Einne, Mauls,
Gilliam, Ohnoitsjamie, Oscarthecat, Anachronist, Ayavaron, TheDarkArchon, StephenH, TimBentley, Trebor, Persian Poet Gal, Tech-
notaoist, Oli Filth, Benixau, Jerome Charles Potts, Octahedron80, DHN-bot~enwiki, Can't sleep, clown will eat me, Frap, Chlewbot,
Neo139, Sephiroth BCR, Nixeagle, Xeeron, Yidisheryid, Microfrost, Metageek, Estephan500, Jmlk17, BIL, ArashTheGreat, Buyoof,
Edwtie, Jararld, Marc-Andr Abrock, Lcarscad, DylanW, BullRangifer, DMacks, Masterdebater, Daniel.Cardenas, GSM-vet, Sashato-
Bot, Princekrish, Dane Sorensen, ArglebargleIV, BrownHairedGirl, Cat Parade, Jidanni, General Ization, Scientizzle, Calum Macisdean,
Nzgabriel, Tdc~enwiki, Jonathanbull, Perfectblue97, Ekrub-ntyh, Ckatz, Slakr, Gromreaper, Ehheh, Optakeover, Waggers, TastyPou-
tine, Goldline~enwiki, Sijo Ripa, Jvlm.123, MTSbot~enwiki, Yodaat, Kvng, Eastfrisian, Hu12, Txtlocal, Iridescent, Mario limos, Deanh,
Joseph Solis in Australia, JoeBot, Beno1000, SohanDsouza, Kamy solid, Tawkerbot2, Ltn1dr, AndyRouha, Mapsax, VoxLuna, CmdrObot,
Wafulz, Sshah254, J, BeenAroundAWhile, N2e, WeggeBot, Anklepants, Phatom87, Inzy, Cydebot, Mrrightguy10, Rob.desbois, Tkyn-
erd, B, Tawkerbot4, Starionwolf, Pasteur~enwiki, Farhan Ali, Kozuch, Notopia, , FrancoGG, Thijs!bot, Epbr123, 00tony, Ad-
min@sturatindustries, Oliver202, Headbomb, Deathbunny, Vertium, Dyslexik, Electron9, Aquilosion, Scaredpoet, Reswobslc, Gaimhread-
han, Hollingdrakepaul, Lutskovp, Dawnseeker2000, Eleuther, Porqin, RLCatalysis, AntiVandalBot, Yonatan, Gioto, Obiwankenobi, Mes-
sageVista, Genixpro, Joenixon, Etisdale, DJ Rubbie, Scepia, Azizzii, Salgueiro~enwiki, VictorAnyakin, Icezorg, EyeMD, TuvicBot,
Xhienne, Husond, Harryzilber, Davewho2, Barek, MER-C, Ms medusa, OhanaUnited, Wo.anderer, GurchBot, Soroush83, PhilKnight,
Cimke~enwiki, Gbeuk99, LittleOldMe, .anacondabot, Imoeng, Xoneca, VoABot II, Greg Ward, Wellfan, Firetext, CTF83!, Masera,
Catgut, RichardGrimes, Nposs, 28421u2232nfenfcenc, Aziz1005, JMyrleFuller, Wdake, Mofbar, Bee4bs, Calltech, MartinBot, Gashead-
steve, Jim.henderson, Naohiro19, CommonsDelinker, Libellule~enwiki, RockMFR, J.delanoy, Mange01, Mojodaddy, Trusilver, Carre,
Chrisknop, Boris Allen, Jreferee, Ayal1992, David21091962, Thomas Larsen, BaseballDetective, Jhendry24, Mozeo, Dtweney, Ball-
parkbob, Aervanath, Xorandor, Cgrnyc10, Shub iitkgp, Shoessss, Kechie, KylieTastic, Cometstyles, Jamesontai, Bonadea, WirelessGuy,
Seankreynolds, Idioma-bot, Funandtrvl, Signalhead, Jonathanlyon, Darluck, Ronniieeee, VolkovBot, TreasuryTag, Tlspiegel, JoeDeRose,
AlnoktaBOT, Sue H. Ping, ThatRandomGuy, JO753, Barneca, Philip Trueman, TXiKiBoT, Oshwah, Philipperegenass, Moogwrench,
Gregfadein, Rei-bot, Gwinkless, Bbsnetting, Qxz, Seb26, Broadbot, LeaveSleaves, PDFbot, KD-G722, FironDraak, Mironearth, Wiae,
Ale85, Aymerkez~enwiki, Ilyasozgur, Manuelamsp, Billgordon1099, Andy Dingley, Mnoreen, Koolaboola, SQL, Momoney135, Duke-
ofwulf, The.4thestate, Chenzw, Alancoughlin, Spork the Great, Timoluege, Ccummins, Thothmoomaw, Rojo727, EmxBot, Kbrose, Zokei,
SieBot, Madman, WereSpielChequers, VVVBot, Da Joe, Caltas, Hamster X, Aleia.carameve, Jaysonpablo, 0xFFFF, Smsmasters, Gleni-
baby06, Momo san, Kryptext, Allmightyduck, Audrey Janset loves DMH, Evaluist, Razalhague, Ozeki, Hello71, Miguel.mateo, Manway,
Alex.muller, Tomi T Ahonen, OKBot, Dillard421, Anislhr, Cryptext, Swhelan16, Siodhe, Mygerardromance, Kelan19, Precious Roy,
Brian Geppert, Iceonme, Bajsejohannes, Sfan00 IMG, ClueBot, Jbening, The Thing That Should Not Be, Eric Wester, Aintneo~enwiki,
Jburgman, Thonn264, Enthusiast01, Janschejbal, Mild Bill Hiccup, Niceguyedc, Trivialist, Silverbackwireless, Khanmas214, DragonBot,
Campoftheamericas, Alexbot, Mojtaba Cazi, DonovanE, Ottre, Eeekster, Sean 1996, ZHUMAS214, Isarankuramas214, Nguyenmas214,
Leemas214, Peter.C, MagdaD, The Red, Thingg, Error 128, Aitias, Dziewa, Fairyalthiny, Berean Hunter, Kewl567, Egmontaz, Ap-
parition11, GeoMacartney, Editortothemasses, UKWikiGuy, DumZiBoT, Asifkhalil, XLinkBot, Pedron 05, Wertuose, BodhisattvaBot,
Sevenfon, Wikiuser100, Dgtsyb, Gh0st twin23, Wotapalaver, Kbdankbot, War$nake, Addbot, Ghettoblaster, SpaghettiOnSnails, Mabdul,
IXavier, Crazysane, Brennanhayden, Asako Zay, Hop77, Mr. Wheely Guy, Letter Ezh, CanadianLinuxUser, Skyezx, MrOllie, Ccacsmss,
AndersBot, Chzz, Favonian, ChenzwBot, SamatBot, KaiKemmann, Joeav, PromotionalCurrency, Qwert10, Zorrobot, Quantumobserver,
Platinumpyro, Ben Ben, Luckas-bot, Yobot, 2D, Cm001, Chgocutie, Rezamalekpur, Mmxx, Nallimbot, , Bryan.burgers, Ingramhk,
AnomieBOT, Winnie007, Floquenbeam, Rubinbot, Jim1138, Eramakanth, BlazerKnight, Piano non troppo, Kingpin13, Simonlandsheer,
Crecy99, Mahmudmasri, Materialscientist, Danno uk, ArthurBot, Business Historian, Xqbot, Ivankomarov, Jerey Mall, Aqlimited, Anna
Frodesiak, Anonymous from the 21st century, GrouchoBot, RibotBOT, CHJL, Hymek, Lawaladekunle, Soandos, Raj Kumar Machhan,
Alella, Histo13, Sko1221, FrescoBot, SultrySuzie, Ch Th Jo, Krj373, W Nowicki, VS6507, Charles Edwin Shipp, D'ohBot, Farin12, Di-
vineAlpha, ClickRick, AstaBOTh15, DrilBot, Mathalus, Alan.poindexter, LittleWink, RedBot, Mdjango, Awnm, Full-date unlinking bot,
Larmeau, Turian, Lilmissbonnieh154, FoxBot, TobeBot, Retired user 0001, Nickyus, Jarmihi, Sepasdar, Wikipageperson, Peacedance,
Mean as custard, RjwilmsiBot, Alph Bot, Galloping Moses, Upanishadee, JeMorriss, Andreas Philopater, EmausBot, WikitanvirBot,
Frank2050, Iliyastefanov, Whaler227, GoingBatty, Media9, Kevinholley, FlippyFlink, Kfcpub, Dellgarni, Shuipzv3, Wackywace, Kale-
boy, Ganesh Paudel, Evan Olsen, Jigshere, Mahesh 2231, Machstef, Ke Ren Chong, NYMets2000, Gsarwa, Pheenixen, Ochado, Mentibot,
Aldnonymous, Cportermalta, Senator2029, Wipe2015, 28bot, Mjbmrbot, ClueBot NG, Ishfaq Khan8, Sachinparmar89, Catlemur, Hu-
midDrip, O.Koslowski, Heatfusion, Spdpelt, Widr, Livetalk123, Mobileready, Helpful Pixie Bot, Frmin, HMSSolent, Ss12345, Curb
Chain, Smstextmobile, Mickomoj, BG19bot, Igamenir, Dariosinicic43, MartyParis, Mark Arsten, Jrau8691, Pediazelig, Amacob, Won-
deringsoul114, Michael Thomsson, Wernerf72, BattyBot, ChrisGualtieri, Kolarp, Khazar2, Dexbot, Dzethmayr, Dhani.sahani, 2edsphere,
344 CHAPTER 80. X.25
Wikignome1213, Stephen2u, Hillaryfoss, Isarra (HG), Sanjachetan, Corn cheese, JustAMuggle, Ipodsof, BurritoBazooka, Wasim.997,
Randykitty, Aly ElSawaf, Makasala123, Wikidamo, BB609, EvergreenFir, Rushantk, Soham, Jatinnirmal, Babitaarora, Eloquent2013,
JustBerry, Dannyruthe, FockeWulf FW 190, Make equable, Amangill27, Cbarle, Djbotes, Nachoavmom23, Rod.bishti, AKiwiDeerPin,
Gingersuit, KH-1, Malik Nomi 97, Sinchdev, Wes.7700, Chabotl, Mittalsmooth, SomeJDude, Tortle, FahdRGS, Raspberry bubble, Dirac-
ter, Larimoboarta, SusanMireau, Bubblezz818, Larobal, 34523hhw, Mirobisa, Baritosalla, The Copper Miner, Marianna251, Frwaerfwe,
GreenC bot, John Hannibal Smith, Bender the Bot, -glove-, Freakthei, Abdullahdalham123 and Anonymous: 1028
Signaling gateway Source: https://en.wikipedia.org/wiki/Signaling_gateway?oldid=750079693 Contributors: Yaronf, Jeq, Jrdioko,
Allen3, Brandon, SmackBot, Bluebot, JonHarder, JanCeuleers, Alaibot, Kgeischmann, Jim.henderson, Bogdanwiki, Diana cionoiu, Jbono-
core, Dgtsyb, Dawynn, Luckas-bot, Erik9bot, Halestock, EmausBot, ChrisGualtieri, ArmbrustBot and Anonymous: 5
Signalling System No. 7 Source: https://en.wikipedia.org/wiki/Signalling_System_No._7?oldid=755761875 Contributors: Derek Ross,
The Anome, Gsl, Aldie, William Avery, SimonP, Maury Markowitz, Oystein, Karada, Yaronf, Crissov, Bradams, Joaopaulo1511,
Hoho~enwiki, Falcon Kirtaran, Khalid hassani, Just Another Dan, Bobblewik, Tagishsimon, Beland, DragonySixtyseven, Bumm13, Sam
Hocevar, Waskage, Rich Farmbrough, Pjacobi, Bender235, Jarsyl, Sietse Snel, Cacophony, Agoode, Longhair, MarkWahl, ChrisUK, Guy
Harris, CyberSkull, Kotasik, Guthrie, Cmdawson, JeremyA, Graham87, Ketiltrout, Leeyc0, Raztus, Vegaswikian, FlaBot, Ian Georey
Kennedy, YurikBot, Tyler.szabo, Epolk, DanMS, Alohawolf, Vanished user kjdioejh329io3rksdkj, CecilWard, Voidxor, Sharkb, Jon-
Roma, Fsiler, Bluezy, Katieh5584, SmackBot, Cela Etant, Joshaidan, Anastrophe, Thenickdude, ABACA, A. B., J00tel, Zazpot, Gabi
S., Ianmacm, JanCeuleers, PPBlais, ThurnerRupert, G-Bot~enwiki, Kashmiri, Beetstra, Witt04gti, Kencf0618, Highspeed, Courcelles,
VoxLuna, CmdrObot, Tonyhansen, Rafael Vargas, Glendonowers, Requestion, CmdrDan, Thijs!bot, Hollomis, Rob.au, AndreasWitten-
stein, Harryzilber, MER-C, Txomin, Bellhead, Cmihaic, Nikevich, Edwardando, Burgee, Drevil55, Calltech, Jim.henderson, IANCEE,
Austin512, AndyAicken, PhilippeAntras, Kyle the bot, TXiKiBoT, LeaveSleaves, Jamelan, Manuelamsp, Noono, Dstasiak, Ulf Abrahams-
son~enwiki, Kbrose, Leedryburgh, PipepBot, Jbonocore, DragonBot, Maruapo, Eeekster, Ludwigs2, Johnuniq, Apparition11, BruceBar-
nett, XLinkBot, Dgtsyb, Ds02006, Rahulmoksha, Addbot, Betterusername, Theleftorium, Rushikesh90, Lyndon.bye, LaaknorBot, An-
dersBot, Ginosbot, Bouvierjr, Beardybloke, Abhayani, Arbitrarily0, Luckas-bot, Yobot, Cacoethes curiositas, AnomieBOT, Chuckies-
dad, Materialscientist, ArthurBot, Obersachsebot, Xqbot, Sirgorpster, TorKr, Some standardized rigour, Djames42, FrescoBot, Galmicmi,
Teknotelecom, Jl20777, Xorsyst, Isidrov, Trac888, Dwonak, Obankston, Onel5969, RjwilmsiBot, JeMorriss, Freeaqingme, Madspi-
ral, ClueBot NG, Lincoln Josh, Helpful Pixie Bot, BG19bot, Paganinip, BattyBot, SoledadKabocha, Corn cheese, Wuerzele, ATISATIS,
Monkbot, Npriya007, Lukehinds, Thenetsec, Drain166, Frank-stallone-79 and Anonymous: 188
SIP provider Source: https://en.wikipedia.org/wiki/SIP_provider?oldid=735045029 Contributors: Pnm, Ronz, Bearcat, Alexf, The Red-
Burn, Rebroad, Dweekly, BiH, SmackBot, Vmatos, Kgeischmann, Nevit, KathrynLybarger, Callidior, Certes, OlEnglish, Yobot, Eikisb,
Alvin Seville, Lonaowna, Cnwilliams, Take your time, Makafre, Donner60, Senator2029, Dragoni, BG19bot, Joevf, Rocco69, Atsig4113,
Reggie2012, K7L, Lemnaminor, Broadvox, Jjemackay, Mikex5, JaconaFrere, Itsalleasy, Andolini7110, Emmanirajitha, Chriskallen and
Anonymous: 29
SIP trunking Source: https://en.wikipedia.org/wiki/SIP_trunking?oldid=750079707 Contributors: Ronz, Alansohn, Danhash, BDD, Sr-
leer, Tadpole256, Chris the speller, Vmatos, Visik, Spencer, Tgeairn, McSly, Billinghurst, Kbrose, Kjtobo, Addbot, Pozytyv, Mean as
custard, Pugliavi, Natttam, ClueBot NG, Widr, BG19bot, TCN7JM, Ricksantangelo, K7L, Frosty, ArmbrustBot, Elfmediainc, Monkbot,
Bart.michiels, Coryb509 and Anonymous: 32
Skinny Call Control Protocol Source: https://en.wikipedia.org/wiki/Skinny_Call_Control_Protocol?oldid=670850733 Contributors:
Mav, Maury Markowitz, Oystein, Yaronf, Guaka, Wiwaxia, Robbot, JTN, Wk muriithi, Sietse Snel, Unquietwiki, Danhash, Ibenjamin,
Theloniouszen, FlaBot, Ewlyahoocom, YurikBot, Brandon, Varano, Mellowiz, SmackBot, Addshore, Gabi S., The gorilla, DagErlingSmr-
grav, TheTito, ManosFate, JAnDbot, Xhienne, Jbond00747, Bibster, Philip Trueman, Jeheyer, Kbrose, Yintan, Niceguyedc, RocksInABox,
Infectecide, LoveMutt, Addbot, Lrm242, Alex.ryazantsev, ZroBot, Shivanarayana, ClueBot NG, Archer4523 and Anonymous: 38
Skype Source: https://en.wikipedia.org/wiki/Skype?oldid=756155562 Contributors: Css, Christian List, Deb, Shii, Heron, DonDaMon,
Olivier, Stevertigo, Edward, Ubiquity, Nealmcb, Bewildebeast, Pnm, Graue, TakuyaMurata, Delirium, Skysmith, Paul A, Greenman,
Tregoweth, Egil, Lemming, KAMiKAZOW, Haakon, Stevenj, Plop, Den fjttrade ankan~enwiki, Darkwind, DropDeadGorgias, Julesd,
Milksh, Andres, Mxn, Hashar, Guaka, Skylark of Space, Bemoeial, Molinari, Ike9898, David Latapie, Darac, Fuzheado, Andrew-
man327, Greenrd, WhisperToMe, Steinsky, Tpbradbury, Furrykef, Morwen, LMB, SEWilco, Omegatron, Samsara, Thue, Bevo, Linuk-
samiko, Nickshanks, Dbabbitt, Scott Sanchez, Qertis, Ldo, David.Monniaux, Finlay McWalter, Frazzydee, Lars A, Hajor, Aliekens, Shan-
tavira, Denelson83, Chealer, Astronautics~enwiki, Outolumo, Korath, RedWolf, ZimZalaBim, Peak, Nurg, Pingveno, Texture, Sekicho,
Harfo32, Sunray, Saforrest, Victor, GerardM, Wereon, Mushroom, Lzur, Alan Liefting, David Gerard, Smjg, DocWatson42, Dinomite, Jtg,
Sim~enwiki, WiseWoman, Brian Kendig, Bradeos Graphon, T0pem0, Erdal Ronahi, Dock, Alan Chang, Elgaard, Zeno Crivelli, Khalid
hassani, Matt Crypto, Uzume, Bobblewik, Wiki Wikardo, Gyrofrog, Wmahan, Tree, Haggis, Saxsux, 159753, Toytoy, Knutux, Slowking
Man, Gzuckier, Stephan Leclercq, Demonslave, Beland, OverlordQ, MarkSweep, Quarl, PDH, Kiteinthewind, Jossi, CaribDigita, Drag-
onySixtyseven, Patrickjollie, KVeil, Bodnotbod, TonyW, Asbestos, Jcw69, Dcandeto, Dirk Gently, Ir hop, Neschek, Corti, Grstain,
Mike Rosoft, Gest, Reinthal, Zarxos, Newkai, Felix Wiemann, RossPatterson, Discospinster, ElTyrant, Rich Farmbrough, Rhobite, FT2,
Pmsyyz, MCBastos, Spundun, Andrewferrier, Smyth, Lion, Slipstream, Quiensabe, Berkut, Ioliver, Alistair1978, Gronky, Night Gyr,
SamEV, Bender235, Kbh3rd, Kaisershatner, Jnestorius, Geoking66, Plugwash, Ktheory, Violetriga, Evice, Billlion, CanisRufus, Kiand,
Cap'n Refsmmat, Kwamikagami, Pilatus, Jarl, Richard W.M. Jones, Worldtraveller, Edward Z. Yang, RoyBoy, AJP, Orlady, JackWasey,
Causa sui, Arancaytar, Afed, Bobo192, Stesmo, Longhair, Reinyday, Swillden, John Vandenberg, Walkiped, Elipongo, BalooUrsidae, Gi-
raedata, Juzeris, Cncxbox, Jasonataylor, Feduciary, Anonymous Cow, Boredzo, Ire and curses, Kx1186, Towel401, MPerel, Sam Korn,
SPUI, Luckyluke, Espoo, Drangon, Rye1967, Jumbuck, Ice-Soft-Eng, JohnyDog, Nemalki, Macai, Mrzaius, Alansohn, Gary, Jhertel,
Gargaj, Twyford, Blahma, Wonglkd, Guy Harris, Halsteadk, Mcduarte2000, Borisblue, CyberSkull, Hadley, Verdlanco, Andrew Gray,
Yamla, Orelstrigo, Mrmiscellanious~enwiki, Tchalvak, Swift, Denniss, Malo, Hayk, Schaefer, Wtmitchell, Velella, BBird, VanillaDeath,
Fourthords, Irdepesca572, Rebroad, Peter McGinley, Quickie~enwiki, Jrleighton, Stephan Leeds, Danhash, Vcelloho, RainbowOfLight,
Randy Johnston, Mikeo, Schweden, Computerjoe, Kusma, Versageek, Zootm, Sechzehn, Instantnood, Voxadam, DSatz, Mark mclaugh-
lin, Yurivict, Euphrosyne, Umapathy, Rzelnik, Richwales, Squiquifox, Muhgcee, Floweracre, DanielVonEhren, Mullet, Ankur Banerjee,
Noz92, Nuno Tavares, Angr, Firsfron, ByeByeBaby, Mel Etitis, Mindmatrix, Th507, GVOLTT, The Belgain, Scriberius, FPAtl, Dandv,
Daniel Case, Jfr26, Francis Good, Deeahbz, KrisK, Armando, Wowa, Pol098, WadeSimMiser, JeremyA, Dbolton, 171046, Kanamekun,
Tabletop, Eatsaq, PhilHoward, Cbdorsett, Lohengrin~enwiki, Bbatsell, TreveX, GregorB, SCEhardt, Dionyziz, Gtpadmin, Rchamber-
lain, J M Rice, Waldir, Evilmoo, Jon Harald Sby, Toussaint, Gimboid13, Sam916, Palica, PhilippWeissenbacher, Rejnal, Marudub-
shinki, Raghumk, Leapfrog314, Behun, Mandarax, RichardWeiss, Steevc, Rnt20, Graham87, BD2412, Qwertyus, Galwhaa, Mloclam901,
Jclemens, Mulligatawny, Reisio, Sj, Intimidated, Sjakkalle, Rjwilmsi, Pdelong, Nightscream, Zbxgscqf, Baeksu, Indangermouse, Strait,
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 345
XP1, Amire80, Bruce1ee, Baojia, MZMcBride, HdEATH, Vegaswikian, Nneonneo, Inaxdaze, Patcito, Yahoolian, Bob Wiyadabebe-
Iytsaboi, Gcziko~enwiki, Evanwolf, FlaBot, Bmwboy, John Rotenstein, Ianthegecko, SchuminWeb, Zaurus, RobertG, Ground Zero,
Skype.nexxen.cz, Ausinha, Ysangkok, Brianreading, Gary Cziko, JYOuyang, Billso, Wctaiwan, Gurch, Vec, Nwatson, TheAnarcat, Roby-
Wayne, Ggoren, Preslethe, Melancholie, Alvin-cs, Consumed Crustacean, Srleer, King of Hearts, Jmorgan, Dtoews, Chobot, SirGrant,
DVdm, Mhking, JesseGarrett, Bgwhite, Gwernol, Jasonauk, Elfguy, ColdFeet, Siddhant, YurikBot, Wavelength, Klingoncowboy4, KKM,
Eraserhead1, I need a name, Quince, StuOfInterest, Daverocks, Phantomsteve, MMuzammils, Petiatil, Hyad, J. M., Petesmiles, John
Quincy Adding Machine, Gardar Rurak, ReubenB, SpuriousQ, Hydrargyrum, Stephenb, Manop, Gaius Cornelius, Shaddack, Sjwheel,
Blueberoptics, Whale~enwiki, Finbarr Saunders, NawlinWiki, Fabhcn, Edinborgarstefan, Toehead2001, Wiki alf, GSK, Robertvan1,
Grafen, Dforest, DaveHowe, Arichnad, NickBush24, TheLH, ONEder Boy, Gareth Jones, Dogcow, Cleared as led, Nick, Nucleusboy,
Computerdan000, Ben b, Nephron, TakingUpSpace, Brandon, Sekelsenmat, Moe Epsilon, Rudykog, Marc44, DerEikopf, Tony1, Sean Bon-
ner, Rwalker, Bota47, Jeremy Visser, Karl Andrews, Bnitin, CLW, Nicanor5, Rob evans, Slicing, Johnsemlak, Hohohob, Geopgeop, Crisco
1492, BazookaJoe, Trident~enwiki, Lt-wiki-bot, The Fish, Changomo, Stephan Mosel, Cloudbound, Rb82, Mr-Thomas, Matthewsmith,
Th1rt3en, Saizai, Yaztromo, Ryanhunt, Jamesedmo, Back ache, Naught101, Wainstead, Arislan, Rearden9, Pdraic MacUidhir, NFH,
DmitriyV, Vahid83, Smurfy, David Biddulph, Bluezy, Katieh5584, TLSuda, Ricardo630, Marra, NeilN, Slipdisk101, Paul Erik, JCheng,
Mardus, Porttikivi, BiH, NetRolller 3D, Zlogic, David Wahler, AndrewWTaylor, Luk, The Wookieepedian, Zanoni, Yvwv, A bit iy,
AtomCrusher, SmackBot, Ashenai, Will381796, CSMR, Henrikb4, M Holland, Reedy, InverseHypercube, Unyoyega, C.Fred, Tharsaile,
MeiStone, Blue520, Pokipsy76, Sunkorg, Michaelbeckham, PizzaMargherita, Matthuxtable, Delldot, Ahmadr, Strobe, Kintetsubualo,
Burbank~enwiki, Nil Einne, Niro5, Typhoonchaser, SmartGuy Old, Xaosux, Yamaguchi , Gilliam, Brianski, Gelingvistoj, Oscarthecat,
Skizzik, Chaojoker, Rmaster1200, AndrewKay, BenAveling, Chris the speller, Bluebot, Sduplessie, Agateller, DStoykov, Jprg1966, AartJ,
Thumperward, Onesimos, Morte, MartynDavies, Miquonranger03, MalafayaBot, Mdwh, SchftyThree, Jerome Charles Potts, Calebegg,
Digitalhen, Mithaca, DHN-bot~enwiki, Da Vynci, Darth Panda, Brinerustle, Yanksox, JGXenite, Pretzels, Brideshead, Elia.malmsten,
Macic7, Can't sleep, clown will eat me, TheGerm, Frap, CyberK, Jacob Poon, OrphanBot, MJBurrage, JonHarder, Gala.martin, Kr-
sont, Addshore, Kcordina, Lobner, Amazins490, Elocina, Krich, B^4, Jumping cheese, Cybercobra, Downwards, Escottf, Decltype,
EVula, Beatriz.pedrosa, Professor Chaos, Richard001, TGC55, Tompsci, Marc-Andr Abrock, Kirils, Daniel.o.jenkins, Njd27, Mazurd,
Lcarscad, Weregerbil, Soobrickay, Fitzhugh, DMacks, CantCookToast, Sturm, Kalathalan, UbZaR, A5b, Luigi.a.cruz, Leon..., Davipo,
Ardenn, Ohconfucius, TJJFV, Midkay, LN2, P2pauthor, ThurnerRupert, L337p4wn, Esrever, Heyjohngreen, Ser Amantio di Nicolao,
Mouse Nightshirt, Fanx, Hazer, Scientizzle, Arthuralee, Gobonobo, NewTestLeper79, Poige, Kashmiri, Skypefan01, Mr.K., Minna Sora
no Shita, Zyqwux, Joelo, Stefan2, IronGargoyle, Shattered, Ananth t, Aerotive, Ekrub-ntyh, Nicholas1520, Syncrotic, Boneillhawk,
16@r, Sshoberi, Beetstra, Feureau, AxG, Optakeover, Brainix, DragonWR12LB, Dekuntz, NaturalBornKiller, NJA, Sharcho, Citicat, Peter
Horn, Vanquirius, Peyre, LaMenta3, Vashtihorvat, LoZfan03, Dl2000, Amitch, Mtford, IceamePhoenix, Nathanrdotcom, Hu12, Mackan,
MikesPlant, Teemuk, Odengatan, Fredil Yupigo, Iridescent, Woodgreener, GraemeG, TwistOfCain, Obelix1, Sander Sde, NewHorizon,
GDallimore, Igoldste, Octane, Dp462090, Beno1000, Zephyr su, Happy-melon, Ralfx, Sharpyamaha, Az1568, Courcelles, GiantSnowman,
Dartelaar, Audiosmurf, AussieDingo83, Woodshed, Nerfboy, Watonga, Tawkerbot2, Vanisaac, Alecsescu, Dan1679, Desmondcsmith, His-
torySherlock, Stadtpark, JForget, Hamish2k, Sakurambo, Ivan Pozdeev, Raysonho, Unionhawk, Rawling, Hwq8, 67-21-48-122, Alexspin,
Fitzaubrey, NisseSthlm, Gressen, Dchriscoe, Ferdiaob, Lazulilasher, Pgr94, Avillia, Old Guard, TMN, NE Ent, Tim1988, Johnsrichards,
Lironl, Nauticashades, Jbossbarr, AndrewHowse, Slazenger, Engas, Compuguy1088, Cydebot, Natasha2006, L daruwala, A876, Crossmr,
Pablogrb, Gogo Dodo, TicketMan, Xxhopingtearsxx, Flowerpotman, ST47, XcepticZP, ZOverLord, Wiki-doo, SymlynX, Tawkerbot4,
Quibik, Dynaow, Clovis Sangrail, Cowpriest2, John Channing, Lenneth, A good brew, After Midnight, Anebalance, Omicronpersei8,
JodyB, Ebrahim, MayaSimFan, Dyanega, Geekosaurus, FrancoGG, Pbeesley1989, Mbelisle, RJordanC, HappyInGeneral, Ssspera, Werel-
non, Mojo Hand, JNighthawk, PaperTruths, Java13690, Chrisdab, Nimakha, Philu, Icall, Thljcl, RichardVeryard, Enk~enwiki, Alaning,
Nick Number, MichaelAaronson, Dawnseeker2000, Escarbot, Qole, Mentisto, Darkwarriorblake, Bondkaka, Cyclonenim, AntiVandal-
Bot, RobotG, Ministry of Truth, Majorly, Gioto, Jmsevits, Widefox, Ansett, Furty, Seaphoto, Centrepull, The Canuck, Ianpanderson,
ASDFGHJKL, Catfoo, Rsocol, Wizmo, Spencer, MattTS, Lbecque, Camptown, Erxnmedia, JAnDbot, Deective, Ross.west, Harryzil-
ber, Bundas, Barek, MER-C, Randal Oulton, Areaseven, QuantumEngineer, Skypie, Hello32020, Thespam, Xeno, Bigwig77, Gravitor,
PhilKnight, Steveprutz, SteveSims, Andreas Toth, Knowit, Magioladitis, Pedro, Bongwarrior, VoABot II, Rajb245, TarquinB, HHe-
imbuerger, Abushahin, DjiXas, Ff1959, Samuraispy, Wolfy0216, Bwhack, Robby, BanRay, ShaqFu, Sashilover, DizzyTech, Rich257,
Twsx, Lirane1, Dvptl, Quill E. Coyote, Theroadislong, Kiwimandy, Xscope, Tomasvilda, LorenzoB, Ged Davies, P.B. Pilhet, Kibbled
bits, Cpl Syx, Hhariri, Benjamintchip, Sardan~enwiki, Enquire, Chris G, Kgeischmann, Bobfry, Indianstar, Patstuart, Calltech, Wkuss-
maul, Qcoder, Thompson.matthew, Infectionous, Cocytus, DGG, SquidSK, Jkaki00, Gwern, Scottmacpherson, Stephenchou0722, Adri-
aan, Maumaux, Hemidemisemiquaver, AVRS, Katana314, Conquerist, Hdt83, MartinBot, Merabus, CliC, Danielshih, Sunshinetigerlily,
GimliDotNet, Sigmundg, Mark ruissel, Jaxban, Aleksander.adamowski, Rettetast, Tze liang phua, Umdterps05, Filksinger, Glrx, R'n'B,
Axelv, CommonsDelinker, Cheezmeister, Grinzello~enwiki, DBlomgren, Pomte, Ssolbergj, Manticore, Exarion, J.delanoy, Rgoodermote,
AltiusBimm, Nayan4, Huzarus~enwiki, Bogey97, Richiekim, Dukat74, Hopper96, WarthogDemon, Blue.einstein, Thaurisil, Acalamari,
Ajmint, Kingj123, Dispenser, Fgdncso, EXTREMUS, Silas S. Brown, Notreallydavid, Michaeldouglasboy, AntiSpamBot, Alais4, Bobian-
ite, Asdero, BostonRed, Shara77, Cmichael, Tambora1815, Nicks100, Sigmundur, KylieTastic, Joshua Issac, Sam5513, Josh Tumath,
Trevor-midwinterlabs, Warlordwolf, Pcordes, Xjlktqmu, DMCer, TopGun, Andy Marchbanks, Useight, WhiteOak2006, Varnent, Cein-
fosys, Davidweiner23, RJASE1, Jakkals, Funandtrvl, Horstvonludwig, Tonytypoon, RGarella, VolkovBot, CWii, Shortride, Marinangelov,
Ravnatelj, Wikiwide, Sindh, Kelapstick, Je G., Nug, Dandan666, PlaysInPeoria, TobyDZ, MatsT, Fences and windows, Veddan, Dom
Kaos, Philip Trueman, DoorsAjar, TXiKiBoT, Tyty1234, Crazysnailboy, Dennisgorelik, Tonicblue, Rei-bot, Anonymous Dissident, Co-
JaBo, ChrisWar666, Jones654, Gzdavidwong, AJ-India, Marydov, Terence7, Oxfordwang, MudkipNDS, Genium, FairyMary, Martin451,
Wordsmith, LeaveSleaves, Themcman1, Spongekindofthing, Akerbeltz, Nparlante, Wiae, Dan541, Heat fan1, WinTakeAll, Urbanre-
newal, Brdall, Billinghurst, Operating, Haseo9999, Staka, Milwaukeewobbly, Feudonym, Philmac, Df747jet, Falcon8765, Hellzlaker, Ulf
Abrahamsson~enwiki, Ethyr, Rahul4aug, Swimtwobirds, Donyaekstrand, Chenzw, LittleBenW, Jimmi Hugh, Sfmammamia, KeithTan65,
Prolixium, EmxBot, E03235, CMBJ, Kbrose, George080552, Rontrigger, Quietpanther, Nanini, SMC89, SieBot, Wikizeta, Abetasman,
Nestea Zen, Hamzaghanchi, Hertz1888, Gerakibot, Dawn Bard, Caltas, Me564, RJaguar3, Yintan, JabbaTheBot, Mothmolevna, Crash Un-
derride, LeadSongDog, Jerryobject, Barent, Fishtron, Switchbreak, D1VaKa, MF-Warburg, Bentogoa, RucasHost, Flyer22 Reborn, Oda
Mari, Dnem41, DaBler, Universalcosmos, JKofoed, RTX Telecom, Jilplo Haggins, Kryptext, Yerpo, ScAvenger lv, Prestonmag, Booticon,
Customprole, Antonio Lopez, Leedryburgh, Techman224, Ptrt, Fratrep, OKBot, GodShiru, Mr White, Svick, NiggardlyNorm, Rhy-
seh2007, Blacklemon67, Bluetictac, Dabomb87, Ibscom, Wahrmund, Michel Merlin, Didipoo079, A.C. Norman, Superush, Tuntable,
Explicit, Atif.t2, Deepen03, Martarius, ClueBot, OpenEmpty, Ve4ernik, The Thing That Should Not Be, Kafka Liz, EoGuy, Lawrence Co-
hen, Poterxu, Workerb, Jeb69, Victoria99, Iandiver, Frmorrison, MattPackwood, Lantay77, Sharonpngo, Megana8888, Iuhkjhk87y678,
Niceguyedc, Ilg-ul, LizardJr8, P. S. Burton, Eldarion, Trivialist, Rprpr, Juanmelk, Reeloo, DragonBot, Thornecombe, Diagramma Della
Verita, Ktr101, Samasamas1, Anon lynx, Viragored, Lep47, Martin heath, Keysanger, Philiprobertson, Arjayay, Vinn0r, 1manfern,
346 CHAPTER 80. X.25
Jaizovic, M.O.X, Shin-chan01, Kaiba, Razorame, Doommaster1994, Dekisugi, Hhgygy, Ark25, Nas ru, Mvrx, Tomtomf, PhillipSenn,
Elvinci, 7, JamesBullFromPerth, Versus22, Londonclanger, SoxBot III, Apparition11, Litoral511, SF007, Expertjohn, DumZiBoT, Boleyn,
Eik Corell, XLinkBot, Hpis2cool, Spitre, Wertuose, Vanished user k3rmwkdmn4tjna3d, Messiisking, Imagine Reason, Jovianeye, John
Bahrain, Ost316, LeaW, Little Mountain 5, Ilikepie2221, Tuiliq, WikHead, NellieBly, Mifter, PL290, Frood, Alexius08, MarmadukePercy,
Navy Blue, ZooFari, Slamman23, Arashtitan, Airplaneman, RyanCross, 15ParkRow, Aaytch, Amitguptaz, Addbot, Aikclaes, AVand, Some
jerk on the Internet, Ccvortex, Xiaoda, Tcncv, Jake611987, Theleftorium, Random2008Dude2008, Damaband, Kankachi1980Kan, Tyler-
rad, Ronhjones, TutterMouse, Fieldday-sunday, Laurinavicius, Robbie0630, Ccacsmss, Glane23, Alexisproof, Favonian, Meggysmile,
Jasper Deng, Vinskaka, Hapsala, Murdamw, Shzad1, Numbo3-bot, Tide rolls, Lightbot, Henrythe12th, Fiftyquid, JohnCWright, LuK3,
Bharathkumarys, Ben Ben, Legobot, JoshuaD1991, Luckas-bot, Yobot, CFeyecare, EdwardLane, 2D, Tohd8BohaithuGh1, Fraggle81,
Ojay123, Chaas, Guy1890, Pc-world, Jathinr, Worm That Turned, KamikazeBot, Ernestvoice, Chansebout, Raviaka Ruslan, Aepuppetmas-
ter, Masharabinovich, Bryan.burgers, DdDave, Tempodivalse, David.s.kats, Carol Stewart-Reid, AnomieBOT, DemocraticLuntz, Grinkod,
Mgh ca, 1exec1, Gtz, Rjanag, Jim1138, Piano non troppo, Juniorverse, Ltz Raptor, AdjustShift, Settler14, Kevintolly, Wikifranki99,
Easybullet3, Ulric1313, Josephus37, Mahmudmasri, Materialscientist, Are you ready for IPv6?, Marineforces, The High Fin Sperm
Whale, Citation bot, SJrX10, E2eamon, Neurolysis, ArthurBot, Gothmen7, KsmClass08, LilHelpa, TUFKAAP, Cameron Scott, Grille
Chompa, Xqbot, MewMeowth, Tott Doneeta, Mikethebiddles, Bihco, Whitwhit87, Nasnema, 1wolfblake, Ckojam, Grim23, Accdude92,
Onecatowner, JCrue, Sionk, Michaelaengland, Armbrust, Solphusion~enwiki, Monaarora84, John S. Peterson, Mark Schierbecker, Ribot-
BOT, Mathonius, Amaury, Karl The Estonian, Headhitter, X5dna, Darkquest21, Shadowjams, Eugene-elgato, Dje196, Erik9, Dougof-
borg, Mereost, Green Cardamom, RetiredWikipedian789, Snikerman, Snafu2k, FrescoBot, Zxb, S0me1, Anna Roy, Weglinto, Coroboy,
Tobby72, Lonaowna, WaldirBot, RicHard-59, SolanaRanger, Greywanderer13, SittingonmydrumLOLcatz, Jukka Tarvonen, Danielrais-
beck, Antone p, Mittalrajkumar, Choiboy0801, Mc778, OgreBot, Citation bot 1, Aldy, Hayden norton, Softawards, Massic80, Nokia ST,
Biker Biker, Symplectic Map, I dream of horses, Elockid, HRoestBot, LilSanta, PrincessofLlyr, Tra, Diomedea Exulans, Jonesey95,
Pelmeen10, Zabaki, Rushbugled13, 95j, Wojtek1986, Btilm, Diver495, Serols, Yutsi, ALEF7, Ivan sus77, Airmanedwards, Venvexen,
Full-date unlinking bot, Reconsider the static, Leeming101, AGiorgio08, Cnwilliams, Max Payne 2k8, Herakleitoszefesu, Gryllida, Ko-
davatisai, Cq92, Mjs1991, Lwphillips, Mercy11, PacicJuls, Jesus Presley, Owenl1998, Itu, Grapesoda22, ItsZippy, Jonkerz, Wdanbae,
Lotje, Rugebiker, Vrenator, Mestinkbad, MicahTempleOB1, Arya-hime, Captain ranga101, Suusion of Yellow, Tstormcandy, Prakat69,
Athinsz, DARTH SIDIOUS 2, Andrea105, Zecanard, Onel5969, Superyingawesomenerd, RjwilmsiBot, EvilEditor123456, TheArguer,
MMS2013, Kastchei, SnickeringBear, Amigao, Lopifalko, HeinzzzderMannn, Victor Gauntlet, Dreemteem, Salvio giuliano, Canada Hky,
LcawteHuggle, Rollins83, Sadhu44, Steve03Mills, J36miles, Cricobr, Sir Arthur Williams, John of Reading, Djpalmer93, Immunize, Gfo-
ley4, Brendanology, Arceus20, Thecrystalmaze, Nuujinn, Pugliavi, Noloader, Dewritech, Ashleybro, RA0808, Jonrichco, Xmwash88x,
Ratspeed, Ochristi, Klbrain, Dserodio, Wherethehoodat?, Ladyengland, Raiba123, Tommy2010, Winner 42, Pjhirst, Wikipelli, Dcirovic,
K6ka, Irock21, Markwpowell64, Link234, Alisha.4m, 123456pies, JuanC08, Cprzybyl, Davykamanzi, Melissakamali, MithrandirAgain,
Herebaspoon, Jhaimed, Skype israel, Squaidsisreal, Absinthesyringe, CrimsonBot, Allenandrew25, Elektrik Shoos, WiFiLeech, H3llBot,
JonSonberg, Wayne Slam, TheUberOverLord, Barek-public, Canessa~enwiki, Karthikndr, Coasterlover1994, L Kensington, Jj98, Hugonet,
Alfbar1, Mayur, Gsarwa, Donner60, Justinswrong, Carmichael, Rangoon11, Infoguy4353, Aberdeen01, DigiPen92, Fanick b11, Chuis-
pastonBot, Mariomedici707, Matthewrbowker, Timmu.india, K9fan, Senator2029, Dorsal Axe, MikeVernon, GrayFullbuster, TYelliot,
28bot, Rocketrod1960, ClueBot NG, Fluttershy~enwiki, Platinum Lucario, Gareth Grith-Jones, Boogiebare, Smarty10111, Goallover-
here, Andrei S, Schumacher800, JetBlast, This lousy T-shirt, Rtucker913, Gilderien, Bped1985, Z-1411, Floatjon, Esebi95, YuMaNuMa,
AshiieeSixx, Tabletrack, Frietjes, Cntras, Asintro, Hazhk, WPSamson, Kevin Gorman, Cyborg4, Patrias, Widr, Antiqueight, Chezza-
cherry1234, Fandelasketchup, Fouadtjuhmaster, Mickey32111, Natalie098, Helpful Pixie Bot, Zippy1avion, PyroDeath19, MrVerbatim,
, Heloise.hugo.dunlop, Electriccatsh2, Sergey 52, Curb Chain, FNCContrib, Technical 13, Keyboardpaws, FakTNeviM,
Epedestro, BG19bot, Murry1975, Makedonija, Hombredeplato, DavideZancan, Yaseenno1, Pieface00, JosefMayerhofer, TGilmour, Mar-
coMJF, Skype.accounts, Dreaton, Bil123sa, Vagobot, Grumpypierre, Dkkfkf27, Northamerica1000, Imagetours, IMoneys, ItsMeO-
rYou, Frze, Mark Arsten, Eaglebald, L33tfu51on, Hechengqin, Joydeep, Altar, Base, HermzzHD, Juliangraham2, Mathsquare, Per-
plexingana, Surtalnar, Deltaseeker, Hpg62, Intelcorei5, Qwekiop147, Pauci leones, Gwickwire, 13375up4h4x0r, Yengamaurice, Fishy
Doubt, TBrandley, BigButtery, The big wig97, 34547A, MeanMotherJr, BattyBot, Zubozrout, Mater.alma23, Therewillbefact, Mr
Sparklez, Pyroking395, LuvMissinois, Cyberbot II, Ejmread, ChrisGualtieri, HKA1998, Skype565, Olivewarbler, Creeperman100, Sil-
verFox183, Shoaib Siddqui, Khazar2, Soulparadox, Robin van der Vliet, Isaidnoway, Passwordisraptor, JakeViet, Dobie80, Cauterite,
Bcnd21, Muratjumashev, Boegvad, Pawiko, Dexbot, Gurakk, Codename Lisa, Webclient101, ThreePenceMau5, Mogism, Activati0n,
TwoTwoHello, Chronoglider, Society of Salk, SFK2, Graphium, Leozakour, Wihola, Moleman en, Trader-ilya, FelineLenny, VeenaSitara,
Faizi1997, RevMSWIE500, Google9999, Jazzee8845, Wywin, Debrell, MrHippoMan, Corn cheese, 900mill, Guram sakevarashvili, Reat-
las, 3LiTEPixelz, Jhosek111, Alagar6644, PinkAmpersand, Free ottoman, Troels.moller, FallingGravity, TehMinecraftHex, G0d0fBudder,
Melonkelon, Aholzwart, Skype999, XTheDotx, Tentinator, SkullStewCFG, TheTomThorogood, PaulRhimes, M Whyte27, Nodove, Flat
Out, The Wikimon, George Parastatidis, Ohm supen, Emakalam, Joshakjohn, Smulv74, Kulturdenkmal, Babitaarora, Crou, PvHx, Sesa-
pus, Wertywobagot100, Cyberuser98, NottNott, My name is not dave, Gomotlopgo, Randomcheese12237, George8211, The Hawk Spy,
Arsdestroyer, Sbo91919, Joaneballe, NoRoom1234321, Dvorapa, Frenzie23, Dough34, ScotXW, Sameerpp, Fixuture, Dodi 8238, Ja-
conaFrere, Unicodesnowman, ARJR134, Tomlamusga, Lagoset, Hikarou, Mela vulakoro, Aph08, Airepingshow, Letsruinarticles, Aca-
gastya, Mekaran, IzziRules, Mhameedulhaq, KDDLB, NancyJeanGF, MPFitz1968, Dbenesj, UglowT, Rane2004, Ragilnih, YouRoam,
Coolguy 96, Chinwonder, KH-1, ChamithN, DangerousJXD, Lelurmum, Agustinenobles, Softchamp, Uaepolo, Furqanrizwan, Deep2701,
David bejoy, Fayas msc, GranLeonel, Some Gadget Geek, ScrapIronIV, OtagoGlasgow, Skype96, Talkhelper, O7sumitb, Dfasdfsdf, Lol-
man8995, Rolexburke, Recalculated, Flobo09, GroB Hahn, TVShowFan122, Benakres, Haroly, ArtZ72, Jalal U B, Dannybin, My Chem-
istry romantic, Srednuas Lenoroc, Rydal2004, Oluwa2Chainz, GreenCricket, Tropicalkitty, VirtuOZ, SSTyer, World Editor1, The Pro-
fessor123, NewspaperTag, Kristina dedaj, Positronon, LuisADJr, Xandios, Writinggoddess, RudyTheBraindeer, Carlaure, Nejni marji,
DonutKing12321, Shahsgaea3423, Joedaqi, H.dryad, CrazyUnicorns, Cassini127, Maggie198303, Derank the crank, Fuortu, Jimmywellz,
RichKiddo, Marianna251, Filthyediter011111111117, Pierce bar, Undertaliaaa, FastLeaf2, Ansan990, Shanu-t-thankachan, Ansa12he,
Shaam5000, Butter Creek, BBMatBlood, DJ Lampard, Sulover1233, BuckedDruid15, Jay Walker Ninjago, Anausama, Bender the Bot,
Xavierblue27, AxeAgarr, Jur ol, Sophia Smith, Mark Wales, Hensely, SocialDanny123 and Anonymous: 2191
Social engineering (security) Source: https://en.wikipedia.org/wiki/Social_engineering_(security)?oldid=753354634 Contributors: Kp-
jas, The Anome, ChangChienFu, Frecklefoot, Olrick, SGBailey, Mdebets, Rossami, Netsnipe, Kaihsu, Uriber, Ventura, Dcoetzee, Daniel
Quinlan, WhisperToMe, Khym Chanur, Jerzy, Robbot, Academic Challenger, Jre, Alerante, Leonard G., Chinasaur, AlistairMcMil-
lan, Brockert, Matt Crypto, Mckaysalisbury, Beland, IGEL, Apotheon, Cynical, Gscshoyru, TonyW, Chmod007, D6, Jkl, Discospinster,
Rich Farmbrough, Pmsyyz, ArnoldReinhold, MeltBanana, Xezbeth, Bender235, ESkog, Fenice, EDGE, Chuayw2000, Smalljim, Brutulf,
Ddddan, Bjornar, Guy Harris, Mac Davis, NTK, Wtmitchell, Rebroad, Knowledge Seeker, Omphaloscope, WolFStaR, RainbowOfLight,
Kleinheero, Nuno Tavares, Woohookitty, Mindmatrix, Moitio, Pol098, Dionyziz, Waldir, Xiong Chiamiov, Gettingtoit, Rjwilmsi, Co-
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 347
emgenus, Chipuni, Vary, Teemu Maki~enwiki, Syced, G Clark, RobertG, Ground Zero, DuFF, DevastatorIIC, Intgr, Bmicomp, Ben-
lisquare, Lukeonia1, Roboto de Ajvol, YurikBot, Beagle2, Hydrargyrum, Gaius Cornelius, Rsrikanth05, Kimchi.sg, TheMandarin, Dialec-
tric, Thesloth, Joelr31, Dmoss, Tony1, Deku-shrub, Tomisti, Studiosonic, CWenger, LeonardoRob0t, JDspeeder1, John Broughton, Dravir,
KnightRider~enwiki, SmackBot, Elonka, McGeddon, Unyoyega, Cutter, Lord Matt, Shabda, Xaosux, Gilliam, Evilandi, Da nuke, Lexlex,
Nbarth, Abaddon314159, Midnightcomm, Aldaron, Cybercobra, EVula, Virgil Vaduva, DMacks, Pgillman, Evlekis, Ksharkawi~enwiki,
Tmchk, SashatoBot, Srikeit, Nafango2, Gizzakk, Othtim, Ehheh, Lamename3000, OnBeyondZebrax, Phoenixrod, Courcelles, J Cricket,
Chovain, Tawkerbot2, Cryptic C62, Aaa111, Lioux, Thepatriots, Cumulus Clouds, MeekMark, Penbat, Equendil, Gogo Dodo, Jlmorgan,
Dancter, Shirulashem, Doug Weller, Mhw1986, Nuwewsco, Omicronpersei8, Tunheim, PKT, Thijs!bot, Ann F, RobotII, RevolverOcelotX,
Paquitotrek, Chrisdab, TXiKi, Nick Number, Dawnseeker2000, Oreo Priest, I already forgot, AntiVandalBot, WinBot, Majorly, Seaphoto,
Gdo01, Oddity-, Alphachimpbot, Dougher, Arsenikk, MER-C, Ph.eyes, Primarscources, Jay1279, Dp76764, VoABot II, Rohasnagpal,
Starschreck, Heqwm, CliC, Jim.henderson, AlexJTaylor, R'n'B, Einsteininmyownmind, RJBurkhart3, Tgeairn, Myredroom, Javawizard,
Anton Khorev, Princess Tiswas, Liangent, Salliesatt, Sesquiped, (jarbarf), RenniePet, Adamdaley, KylieTastic, TopGun, Mzanger, Black
Walnut, Fskrc1, 28bytes, Wilku997, MenasimBot, Emergentchaos, Philip Trueman, NoticeBored, Jockpereira, JhsBot, BwDraco, Greswik,
Haseo9999, Tsnapp, Chahax, Edkollin, Sue Rangell, Michael Frind, Hmwith, Eric1608, SieBot, Trackinfo, Malcolmxl5, Sephiroth storm,
Ronald S. Davis, Bentogoa, Jojalozzo, Faradayplank, Dddenton, Lightmouse, DavidDW, Svick, HaploTR, Fishnet37222, Jumpropekids,
ClueBot, Wshepp, GBYehuda, Zarkthehackeralliance, Mild Bill Hiccup, Johnbourscheid, Takeaway, Alexbot, Socrates2008, Ngebendi,
Sjoerdat13, Corporeality, DarthTaper, DanielPharos, ChiuMan, Thingg, Versus22, Katanada, Anon126, XLinkBot, Ost316, Richard-
of-Earth, WikHead, Lobro~enwiki, Rosenny, Proevy, Thipburg, Namzie11, Addbot, Grayfell, WeatherFug, Johnisnotafreak, MrOl-
lie, Download, CarsracBot, Buster7, West.andrew.g, OlEnglish, Frehley, Luckas-bot, Quadrescence, Yobot, Fizyxnrd, Nirvana888, In-
emanja, Vanish user s8jswe823rnfscu8sejhr4, AnomieBOT, XL2D, DaedalusInnity, Tucoxn, JackieBot, Je Muscato, Materialscien-
tist, ArthurBot, Quebec99, The Firewall, JmCor, Xqbot, Crzer07, RibotBOT, Pradameinho, InfoSecPro, Thehelpfulbot, FrescoBot,
Zomgoogle, Seeoven, KuroiShiroi, Overloggingon, DivineAlpha, Pinethicket, Borninlyoko, Bmclaughlin9, RedBot, Katheder, Full-date
unlinking bot, Trappist the monk, Mns556, JMMING, Lotje, Arkelweis, Skakkle, Tbhotch, Noommos, EmausBot, John of Reading, Bbar-
mada, Mugg1991, Wikipelli, K6ka, Pro translator, Frankfusco, H I T L E R37, Donner60, ColinGreenlees, ChuispastonBot, Pastore Italy,
Usg.usss, Ebehn, Keavon, ClueBot NG, Jack Greenmaven, Beyondwithinitself, Augustalex, Widr, Oddbodz, Helpful Pixie Bot, Termi-
nated Joker, BG19bot, MusikAnimal, Faraz Davani, Thisisnotausernameyaitis, Doctorwho321, Several Pending, Pratyya Ghosh, Buped,
Jncc21, IjonTichyIjonTichy, Mogism, Frosty, UNOwenNYC, Corn cheese, Me, Myself, and I are Here, Ekips39, Yamaha5, Howicus,
Blythwood, Star767, Northwind Arrow, Iratez, FockeWulf FW 190, Wayweary, SylviaSawires, LiaJohnson, TandonAman, SEgouge, KH-
1, ChamithN, Jdiggs45, Darianpearson, Sanjeetkashyap, CAPTAIN RAJU, StarmanW, Hannahmaryfresia, Johntame, Jablestech, Seattle-
hackerspace, Ultraman87, Vamshi983, Socialwaif, Paewlostr, Darkrose24, Bender the Bot, Fearofcasanova and Anonymous: 518
Softphone Source: https://en.wikipedia.org/wiki/Softphone?oldid=750079722 Contributors: SebastianHelm, Yaronf, Guaka, Joy, Boy
b, Nurg, Alf Boggis, Khalid hassani, Kmweber, Kenj0418, Longhair, Amontero, Darwinek, Towel401, Kelly Martin, Seidenstud, Zizzy-
baluba, The wub, Patcito, MMuzammils, Brandon, Rudykog, Vlad, Gvanan, Rearden9, Guillom, KnightRider~enwiki, SmackBot, Mel-
choir, Kuzma, Bluebot, Thumperward, MartynDavies, Frap, Pgillman, Rigadoun, Beetstra, Mauro Bieg, Kvng, Neustradamus, Pronetsys,
Divyangmithaiwala, IP 84.5, John254, Seaphoto, Harryzilber, Perspectival, Dghione, Kgeischmann, Calltech, MartinBot, Commons-
Delinker, DorganBot, Bonadea, Notbyworks, Jamelan, Kbrose, Alex andreev, Adoresoftphone, Binksternet, AmishSexy, Sharonpngo,
Mikaey, Banoj, Fastily, Jcline0, Alexius08, Splines, Addbot, LaaknorBot, Jtermaat, AnomieBOT, Wizardist, Winterst, I dream of horses,
Adoreinfo, Voipguy, WikitanvirBot, Gfoley4, Startelelogic, Electriccatsh2, BG19bot, Badon, Mark Arsten, Johnthesmith, ArmbrustBot,
HMSLavender, Nishantkadian, DanielD001, Saleh alhomam, Eno Lirpa and Anonymous: 84
Softswitch Source: https://en.wikipedia.org/wiki/Softswitch?oldid=728481148 Contributors: Michael Hardy, Ed Cormany, Giftlite, Mark
Richards, Michael Birk, Bigben~enwiki, Apyule, Giraedata, Zetawoof, TheParanoidOne, Cburnett, Kusma, RHaworth, Fthiess, Edbrims,
FlaBot, RussBot, Splash, Welsh, Brandon, Coolbrother~enwiki, GraemeL, Bluezy, Tajindersingh, SmackBot, Srnelson, Gilliam, Cbh,
Beatriz.pedrosa, Markschilsky, Kuru, Khazar, AmiDaniel, Guillaume.conard, Artbeall, Ahy1, Argon233, Tawkerbot4, Gramc, Sorintopex,
Wasell, Caroldaniels, Dghione, Kgeischmann, Calltech, Kamaniskeg, DrDorkus, Jim.henderson, R'n'B, Nono64, Euku, Lunaphone, Cupis,
VolkovBot, Jamelan, Billinghurst, Bogdanwiki, Wolfgangvenkman, AlleborgoBot, Futurano, Kbrose, Dwandelt, Araignee, Radon210, Doc-
toruy, Sfan00 IMG, Dekisugi, Hifzatech, Apparition11, Softswitch, Addbot, 5 albert square, Abisys, Yobot, Vinicius.neves, FrescoBot,
Dewritech, Foaly42, Midas02, Kostya V, ClueBot NG, Monu.moni, BattyBot, Run4health, Leftimage, HostedSwitch, Amitsingh02021988,
Nnnbrewery, Lexx123, Cirpack, Tusharsrivast, Nela.strenge, Wongoman, Ipsmarx, Niravbpil, Antony.alexioy, Shariramani, Fra remmers,
Madhurimadhwani, Zddleon, Nickhilliard and Anonymous: 90
Telephone Source: https://en.wikipedia.org/wiki/Telephone?oldid=755967137 Contributors: Damian Yerrick, Vicki Rosenzweig, Mav,
Bryan Derksen, The Anome, Stephen Gilbert, Aldie, Ray Van De Walker, SimonP, Heron, Montrealais, Hephaestos, Edward, Infrogma-
tion, Smelialichu, Oliver Pereira, Dante Alighieri, Nixdorf, Pnm, Kku, Ixfd64, Tomos, Dcljr, Cameron Dewe, Dori, Gbleem, Minesweeper,
Ian Walker, Egil, ArnoLagrange, Ellywa, Mdebets, Ahoerstemeier, Cyp, Stan Shebs, Mac, Ronz, Arwel Parry, Nanshu, Rboatright, Cather-
ineMunro, Angela, Den fjttrade ankan~enwiki, Jebba, Mark Foskey, Rossami, Nikai, Netsnipe, Azazello, Andres, Jiang, Evercat, Jordi
Burguet Castell, Alex756, Marknew, Wfeidt, Arteitle, Chuljin, Ralesk, Reddi, Dysprosia, Kbk, WhisperToMe, Wik, Traal, Zoicon5,
Timc, Radiojon, Markhurd, Tpbradbury, Munford, Furrykef, Morwen, Saltine, Sabbut, Wernher, Bevo, Joy, Bloodshedder, Bcorr, Jeq,
Owen, Wst~enwiki, RadicalBender, SD6-Agent, Phil Boswell, Rogper~enwiki, Donarreiskoer, AlexPlank, Robbot, Dale Arnett, MrJones,
Sander123, AlainV, Moriori, Fredrik, TMC1221, RedWolf, ZimZalaBim, Bryce, Stewartadcock, Yosri, Rfc1394, Kneiphof, Texture,
Blainster, Timrollpickering, Hadal, Benc, Michael Snow, Mandel, Lupo, SoLando, HaeB, Xanzzibar, Cyrius, Fabiform, Giftlite, Benji
Franklyn, DavidCary, Barbara Shack, Haeleth, var Arnfjr Bjarmason, Meursault2004, Aphaia, Xerxes314, Everyking, Gamaliel,
Stern~enwiki, Rookkey, Niteowlneils, Leonard G., DO'Neil, Crag, Mboverload, Zoney, Siroxo, Matthead, Foobar, Iceberg3k, Gzor-
nenplatz, Tagishsimon, Golbez, Wmahan, Gadum, Wasabie, Mendel, Zeimusu, Antandrus, Beland, OverlordQ, JoJan, Piotrus, Stonor,
Khaosworks, ShakataGaNai, Jossi, BioPizza, Rdsmith4, Mzajac, Ruzulo, DragonySixtyseven, Wkdewey, Nick2588, Rlcantwell, Lind-
berg G Williams Jr, Jp347, Jh51681, Sonett72, Deglr6328, Zondor, Trevor MacInnis, Gcanyon, Valmi, Shotwell, Corti, Mike Rosoft,
Discospinster, Qwerty1234, NrDg, Oliver Lineham, MCBastos, Rama, Jpk, Dave souza, MeltBanana, Triskaideka, Xezbeth, Spooky-
Mulder, Bender235, ESkog, Mgedmin, Andrejj, Kbh3rd, JoeSmack, Brian0918, CanisRufus, El C, Kwamikagami, Shanes, RoyBoy,
Cacophony, Triona, Shoujun, Bobo192, Dralwik, Longhair, Apollo2011, Darrenlanning, Sanjiv swarup, Husker007, Giraedata, Nk,
Slambo, Towel401, Zygmunt lozinski, Pearle, Ranveig, DavidB~enwiki, Etxrge, Duman~enwiki, Jamyskis, Guy Harris, Interiot, Qrc,
Mu5ti, Atlant, Jeltz, Andrewpmk, Craigy144, Lectonar, Kurt Shaped Box, Water Bottle, Hohum, Wtmitchell, Velella, BBird, Wtshyman-
ski, Stephan Leeds, Docboat, DV8 2XL, Stepheno, HenryLi, Alex.g, Boothy443, Richard Arthur Norton (1958- ), Woohookitty, Henrik,
Mindmatrix, RHaworth, TigerShark, Brunnock, BillC, Madchester, Admrboltz, Pbhj, Before My Ken, JeremyA, MONGO, Lovingboth,
Miss Madeline, Mrs Trellis, Tabletop, Al E., I64s, SDC, Gimboid13, Graham87, Kbdank71, FreplySpang, Snaekid, Phoenix-forgotten,
348 CHAPTER 80. X.25
Edison, Rjwilmsi, Koavf, Strake, Hiberniantears, Tangotango, Wahkeenah, Seraphimblade, Kazrak, Jehochman, SeanMack, Plastictv,
Dar-Ape, Hermione1980, Yamamoto Ichiro, SNIyer12, Titoxd, FlaBot, Margosbot~enwiki, Nihiltres, Vandal B, MacRusgail, Hottentot,
RexNL, Gurch, Nimur, Wars, KFP, Alphachimp, Srleer, Chobot, Mhking, Bgwhite, Digitalme, Sonic Mew, YurikBot, Wavelength,
Hawaiian717, RobotE, Sceptre, Hairy Dude, Kafziel, Chavash, Ostralek, RussBot, Moronoman, Crazytales, BTLizard, Bhny, Igo4U,
Lucinos~enwiki, Hydrargyrum, Stephenb, CambridgeBayWeather, Pseudomonas, David R. Ingham, NawlinWiki, Wiki alf, -OOPSIE-
, Rjensen, Robchurch, Desolationwilliams, Dureo, Neoguy9090, Irishguy, Mshecket, Anetode, Cholmes75, Padajtsch-kall, Obey, Scs,
FatM1ke, Misza13, Killdevil, Emersoni, Bucketsofg, Dbrs, Bota47, Ingling, Alan Millar, Wknight94, Tigershrike, Emijrp, Lt-wiki-bot,
Encephalon, Bayerischermann, Assyria 90, Jlgm25, Esprit15d, JoanneB, Smurrayinchester, Kevin, Tyrenius, Easter Monkey, Bluezy, Kung-
fuadam, Junglecat, NeilN, Benandorsqueaks, Carlosguitar, Medicinematt, SkerHawx, DVD R W, Spam, Amalthea, User24, SmackBot,
Unschool, Demiangie, Pmppk, Lestrade, Person man345, Rose Garden, KnowledgeOfSelf, Gnangarra, C.Fred, Kilo-Lima, EncycloPetey,
Delldot, Docpurpleman, Veesicle, Wittylama, Godfoster, Flux.books, Rajesh J, Aksi great, Unforgettableid, Ohnoitsjamie, ERcheck,
Hraefen, Master Jay, Improbcat, Avin, Arcngl, Postoak, Stubblyhead, Oli Filth, MalafayaBot, Robocoder, Hibernian, Deli nk, Cyber-
Sach, Nbarth, DHN-bot~enwiki, Ned Scott, Colonies Chris, A. B., Jnavas, Gracenotes, Tsca.bot, Can't sleep, clown will eat me, X570,
Chlewbot, OrphanBot, JonHarder, VMS Mosaic, CorbinSimpson, Addshore, Midnightcomm, Celarnor, ChaosSorcerer91, Bolonium,
Miken2005, KansasCity, COMPFUNK2, Soosed, Krich, Flyguy649, Cybercobra, Nakon, B jonas, Jiddisch~enwiki, MichaelBillington,
Golfman, Dreadstar, Wayne Stewart, Astroview120mm, Drc79, Engleham, Jmak1949, Gcbwiki, Kukini, FlyHigh, Will Beback, Sasha-
toBot, JEM7VWH, Hollities, Inthecityof, Stewie814, Kuru, Buchanan-Hermit, Soumyasch, Spiel, The Man in Question, Randomtime,
Shamrox, Beetstra, Noah Salzman, Jimmy Pitt, Dicklyon, Superjimkie74, Soysauce, Dhp1080, Ryulong, EEPROM Eagle, Jak2~enwiki,
Kvng, Hu12, Levineps, BranStark, OnBeyondZebrax, K, HeartOfGold, Wjejskenewr, J Di, Civil Engineer III, Tawkerbot2, Jonasluc,
Daniel5127, Ouishoebean, Chetvorno, JohnTechnologist, Kendroche, JForget, Stifynsemons, Deke42, CmdrObot, Tanthalas39, Ale jrb,
Raysonho, Lavateraguy, James Nettles, Picaroon, Maester mensch, Nczempin, Ville Lehtonen, Moreschi, Ravensfan5252, Qrc2006, Se-
bastian789, Sopoforic, Joshua BishopRoby, ChristTrekker, Reywas92, Gogo Dodo, Wiknik, Travelbird, Crowish, Nmajdan, Dancter,
DavidMcCabe, Tawkerbot4, DumbBOT, Leebot, Kozuch, Gionnico, Mikewax, NMChico24, Omicronpersei8, Daniel Olsen, LukeS, Eu-
bulide, Sohaib Khan, Thijs!bot, Epbr123, TPA5, Kablammo, Sagaciousuk, West Brom 4ever, John254, Tapir Terric, Neil916, James086,
Imhungry, Tellyaddict, Dfrg.msc, Dgies, Jaxelrod, FreeKresge, Big Bird, F l a n k e r, Dzubint, Rlitwin, KrakatoaKatie, Rees11, Anti-
VandalBot, Yupik, Majorly, Sosobra, Luna Santin, Caledones, Seaphoto, Opelio, Quintote, Kidiot, Prolog, Tfj, Meskiukas, TimVickers,
Naveen Sankar, Jack69, Random user 8384993, Rico402, Storkk, Canadian-Bacon, Ingolfson, Yet-another-user, JAnDbot, Harryzilber,
MER-C, CyberAnth, Hello32020, Bahar, Andonic, Hut 8.5, Aubadaurada, Greensburger, Bzuk, Bellhead, Kerotan, Spiyspiy, Acro-
terion, BlueRobot~enwiki, , Magioladitis, Canjth, Bongwarrior, VoABot II, Areuforreal, JamesBWatson, Jay Gatsby, Kin-
ston eagle, LandonChastelhassy, Think outside the box, Starch~enwiki, Pixel ;-), WODUP, Caesarjbsquitti, DAGwyn, CS46, BrianGV,
Catgut, Panser Born, Animum, BatteryIncluded, Robotman1974, Allstarecho, LorenzoB, Ceribik, Hveziris, Canyouhearmenow, JaGa,
Joeyman365, Wi-king, TheRanger, Calltech, I-baLL, Haradona, Jenny Lewis, Erpbridge, G.A.S, Hdt83, MartinBot, Bentleywannabe,
BetBot~enwiki, Poeloq, Jim.henderson, Rettetast, Centpacrr, Kateshortforbob, CommonsDelinker, Phone-expert, LittleOldMe old, Pre-
stonH, Slash, BGOATDoughnut, J.delanoy, Pharaoh of the Wizards, Trusilver, Tullio.grassi, EscapingLife, Jesusman1992, Gregww66,
Random06, KeepItClean, Sirtrebuchet, Aphenry, Plankton5005, TriviaKing, Gzkn, Acalamari, Thegreenzebrarevolution, Jlechem, Kata-
laveno, SpigotMap, Lgb13, Jeepday, Vetsmith1, Engunneer, Gurchzilla, Bilbobee, AntiSpamBot, The black night7777, Jway069, Uturnme,
SJP, Gregtzy, Jordan0429, RB972, Ruben the bestee., DH85868993, Thesoftbulletin82, The dragon123, Thegreatmortini, Davecrosby uk,
Xiahou, Steel1943, Mlewis000, Fr33kman, Keara69, UnicornTapestry, VolkovBot, CoolChris99, Tyger7th, Yomamawazhere, Flyingid-
iot, Je G., Nburden, AlnoktaBOT, Barneca, Hello1792, Wellybob123, S vecchiato, Glamourgirl33, TXiKiBoT, Alanan3000, Dooglez,
Technopat, Miranda, Dewarw, Qxz, Piperh, Corku, Franklin BerryII, Abdullais4u, Luciano G. Cal, LeaveSleaves, Madre2958, Mez-
zaluna, Cremepu222, BotKung, Watchdogb, Professional telephone user, Xavcam, Solidtimes, Eubulides, Hellojimbo, Andy Dingley,
Sarc37, Ashleyfaireld, MonoMark, Huntrguy, Clamjuice, Enviroboy, Jewboi, Burntsauce, Lizyo, GlassFET, Gspinoza, Bporopat, In-
sanity Incarnate, Brianga, Symane, Oliefalcon, Sfmammamia, Yitzy1, Swimmerm91, Mikevaleriani, Kbrose, The Random Editor, Jelly-
belly88, EJF, Corcimiglia, Entoaggie09, Seanpaulk, SMC89, SieBot, Whiskey in the Jar, Madman, K. Annoyomous, Tiddly Tom, Euryalus,
Davesarchive, Hertz1888, Ubernoob363, WiCC1, Connormurray12, Purbo T, Loostick, Keilana, Sand pearls, Digwuren, Tiptoety, Ireas,
Momo san, Rjburridge, Prestonmag, Oxymoron83, Avnjay, Steven Crossin, Lightmouse, Hobartimus, Cebra, Feckyee, CharlesGilling-
ham, Kristine.clara, Supergeek101, Chan99, Larala, Jamieee, 1jokerman1, Nn123645, Escape Orbit, Loren.wilton, ClueBot, MythBus-
taMofo, Avenged Eightfold, UniQue tree, NoGringo, Lawrence Cohen, Phonender2007, Arakunem, Mild Bill Hiccup, Cryptographic
hash, Hafspajen, Wikihistorian, Blanchardb, Lormos, XxyourdesiresxX, William Ortiz, Puchiko, Jamescarpulla, Somno, Feltonmas214,
-Midorihana-, Melliuous123, Wajahatkhan1, Dcpc0807, Winston365, BobKawanaka, Lartoven, THEODORMAS214, Jotterbot, Larry-
MorseDCOhio, Cubic pear, Bumblebee3746~enwiki, Threlfall92, Walkranrunning, Fattyjwoods, WellsSt, Prof tpms, Aitias, Shj95, Henri
Musielak, Ubardak, TheProf07, Kiensvay, Raphel M. Markez, XLinkBot, Jcline0, Emmette Hernandez Coleman, Top2Cat1, Wikiuser100,
Cubic pear2, Tochietoch, Ost316, Ickythumperman, Farfelou, Dgtsyb, Sweetpoet, Noctibus, PinkSock69, Danhhong, Greenismahfavcolor,
Jack2144557735, Iamsam25, Lankan-boii, Shootaburger, Fyit, Addbot, Echungx15, Ddoodm, Phil11593, Mitsenf, JHouklis, Andrewoid,
Cybersam1243, Hirschtick3, I43check, Nestorius, Crasher84, Adamdonegan1, Ja2ck2ie2, CanadianLinuxUser, Leszek Jaczuk, Njardar-
Bot, Alexander94~enwiki, Skyezx, MrOllie, Lost on Belmont, Luxoran, LaaknorBot, Computermonitor, Schlerp99, Sillyfolkboy, , Ld100,
Exor674, JGKlein, Holdtheonions95, Charicters, Shninkle, Boovy1995, Letxgo x, Matthias of redwall, Legobot, Magicdudey3, Luckas-
bot, Where did all the money go?, Mattventura, KhProd1, Rogerb67, Ernestvoice, South Bay, Retro00064, AnomieBOT, Jim1138, NickK,
Jonathen Skews, Rockoprem, ArthurBot, Enok, Xqbot, Intelati, Gilo1969, The Sanest Mad Hatter, Almabot, Makeswell, Basvb, RadiX,
Kdvicious, Wizardist, ProtectionTaggingBot, Omnipaedista, Shirik, Mark Schierbecker, SassoBot, Celebration1981, Carrite, Ryanwall93,
PM800, Grinofwales, FrescoBot, Magnagr, LucienBOT, Tobby72, Hobsonlane, Sky Attacker, Endofskull, OgreBot, Wingzy, Intelligent-
sium, AstaBOTh15, JaneSprat, Elockid, HRoestBot, MJ94, Tinton5, RedBot, MastiBot, GerbilSoft, Bostonian Mike, AHeneen, Dinamik-
bot, Vrenator, Robertiki, Lyonzy90, Matrobriva, Tbhotch, Altes2009, TjBot, Bento00, Slon02, EmausBot, WikitanvirBot, Ramon FVe-
lasquez, Gwillhickers, P. S. F. Freitas, Djembayz, Kkm010, ZroBot, AvicAWB, H3llBot, Wiooiw, SporkBot, Wayne Slam, Ocaasi,
Coasterlover1994, Kaeh4, Bobbybobishere, L Kensington, Billyrednek, Jakeywakyatlass, Ian9, Gameking4000, SJH541, Yllus, Pun,
Badair123, Studmun64, Sqwertso, Kwesiidun91, ResearchRave, Heysford, W.Kaleem, BarrelProof, Chester Markel, Frietjes, Spel-
Punc-Gram, Zackaback, Helpful Pixie Bot, , ElphiBot, Jonathan Mauer, Alex.Ramek, Cadiomals, Otto Didakt, BattyBot,
Justincheng12345-bot, Cyberbot II, Dexbot, Caroline1981, Mogism, Smohammed2, Discuss-Dubious, Anonymity32, Reatlas, DerekWin-
ters, William2001, Tuckertwo, Prision, JPaestpreornJeolhlna, Provacitu74, Marigold100, Programingcraze007, Whizz40, RATMRYAN,
Barjimoa, Concord hioz, SkateTier, Filedelinkerbot, Eman235, Caidin-Johnson, Aleph500Adam, Isambard Kingdom, , Kas-
parBot, RippleSax, , Marintosalla, Maltrpa, GreenC bot and Anonymous: 1014
giri~enwiki, Michael Snow, Cution~enwiki, HangingCurve, Vina, Memm~enwiki, Cab88, Perey, Rich Farmbrough, Xezbeth, Pnevares,
Surachit, Nk, Hu, Caesura, Sobolewski, RHaworth, Dan.glavin, Pol098, Chochopk, Snaekid, TimRoe1203, Brighterorange, Klonimus,
Leithp, FlaBot, Bgwhite, YurikBot, Wavelength, Stephenb, RadioKirk, Arichnad, Nick, PhilipO, Yonidebest, Watgap, Chase me ladies, I'm
the Cavalry, GraemeL, Ajuk, SmackBot, Stepa, Beardoc, Canthusus, Unforgettableid, Armeria, Bluebot, Unint, Al Pereira, Deli nk, Neo-
Jay, A. B., Yidisheryid, Krich, Preetam.dey, Wirbelwind, Veryknowledgable, A5b, NeilFraser, Wikiaccount~enwiki, Flaviohmg~enwiki,
Hu12, NickW557, Argon233, Gogo Dodo, Red Director, Skittleys, Aosadchenko, Thijs!bot, Ejwma, Siawase, Fayenatic london, Smartse,
Courseiam, Taichiubg, TAnthony, Magioladitis, Appraiser, Fabrictramp, Somearemoreequal, Jim.henderson, R'n'B, CommonsDelinker,
Micburnet, Phonesh, J.delanoy, Trusilver, Goofy17, Adamdaley, Justpins, Jkeene, John L. Kenney, Someguy1221, FranchisePlayer,
Kaiketsu, Kjoseph7777, Figureo, Vpcheck, Biscuittin, Gerakibot, JetLover, Nuttycoconut, PipepBot, NancyHeise, Rjd0060, Enthusi-
ast01, Feras80, Bbb2007, Starphonecard, Arjayay, Wikiawe, Iohannes Animosus, Inspector 34, Thingg, Mhockey, Apparition11, Calling-
cardman, XLinkBot, Bilsonius, EastTN, Ezcall24x7, Skarebo, Addbot, Smartglobalcall, Jafeluv, Bestway1, Wikisocko, Mohitsg, Ind-
coolthings, Lightbot, Happyswan, Luckas-bot, Yobot, Ptbotgourou, Helpamit20, Editorwiki2008, Piano non troppo, GB fan, Ober-
sachsebot, Capricorn42, JoshXF, Voip Tech, RibotBOT, Skyperventilating, AwOcBot, FrescoBot, Amiga junki, Telecartophile, Opti-
cal1, Dewritech, Freenumber, Polendino, Joshuatitsworth, VictorianMutant, Alonzo9772, Chesipiero, Delusion23, Rezabot, MerlIwBot,
BG19bot, Gurt Posh, Cyberbot II, Tomfay, P2Peter, Melonkelon, Mr RD, JudyApples, Datgrrl137, GreenC bot and Anonymous: 147
Telephone company Source: https://en.wikipedia.org/wiki/Telephone_company?oldid=723086543 Contributors: The Anome, Aldie,
Mintguy, EddEdmondson, Minesweeper, Jpatokal, Yaronf, Mgsuzano, Ffransoo, Radiojon, Pedant17, Ryuch, Ann O'nyme, Joy, In-
defatigable, Alexbatko, Adam78, Evanluxzenburg, 159753, Andycjp, Beland, OwenBlacker, Oknazevad, Bender235, Stebbiv, BW,
Cmdrjameson, Travisyoung, Espoo, Aves, Lectonar, MarkGallagher, Suruena, Evolve75, Woohookitty, Kosher Fan, Sega381, Hugh-
sonj, Gerbrant, Snaekid, Josh Parris, Vegaswikian, Jehochman, Rbeas, Makru, Mathiastck, Lmatt, Josephconklin, Blob, TodorBozhi-
nov, Bovineone, Gcapp1959, Hm2k, PhilipO, Mkill, Phil Holmes, Hitchhiker89, Jmchu, SmackBot, Soms, Dingar, Bluebot, Tele-
com.portal, Cherrydude, Wiz9999, McLibra, Mwtoews, Achou79, JorisvS, Chasgee, Arjoll, Zisimos, Dkovacs, Darkcube, J Milburn,
Deljeery, NaBUru38, No1lakersfan, Luccas, Khattab01~enwiki, Kozuch, Chaleon, Smvsiyer, Chaitanya.lala, Harryzilber, Theroadislong,
Davidjcmorris, Jim.henderson, Mange01, B64, Mdumas43073, Hugo999, Gohoosiers1, VolkovBot, Virtugon, Tsystems, Rodo1~enwiki,
Mishref71, Pino100, Deletedsoul, Runewiki777, HARIKUMAR.C, Jonajosh, Nicnitro, Star Garnet, Airdis-wiki, Gegagome, Brokpik,
Cedarnetworks, Dthomsen8, SilvonenBot, Fliptopia, MystBot, Addbot, 84user, Rongavillet, AnomieBOT, Asad.mohammad, Neuroso-
journ, Bricaniwi, WikitanvirBot, Netknowle, Mseman, Davejohns5g, ClueBot NG, Helpful Pixie Bot, Compfreak7, K7L, Stephenwardtrue,
Baptiste UWT, MRD2014 and Anonymous: 60
Telephone exchange Source: https://en.wikipedia.org/wiki/Telephone_exchange?oldid=753044059 Contributors: Eloquence, Mav, The
Anome, Eclecticology, Ray Van De Walker, Heron, Ram-Man, Edward, Shyamal, Karada, Ahoerstemeier, DavidWBrooks, Ronz, Rboa-
tright, Snoyes, Darkwind, Rl, Jengod, Guaka, Radiojon, Mordomo, Jeq, Lumos3, Denelson83, Ke4roh, Chris 73, Richardpitt, Se-
curiger, Rfc1394, ZekeMacNeil, David Gerard, DocWatson42, DavidCary, Laudaka, Elf, TOttenville8, Wolfkeeper, Tom harrison, Lupin,
Hoho~enwiki, Rookkey, Tron~enwiki, Xinoph, Richard cocks, Chameleon, Tagishsimon, Quadell, WhiteDragon, RetiredUser2, Hugh
Mason, Grm wnr, Trevor MacInnis, Kate, Snukin~enwiki, Sam Etler, Poccil, Vector4F, Rich Farmbrough, Guanabot, Milkmandan,
Tim Peterson, Bender235, Cd4017, Purplefeltangel, Longhair, Jolomo, Mrbill, Nk, ChrisUK, AzaToth, GavinSharp, Velella, Wtshyman-
ski, Ron Ritzman, Gmaxwell, Woohookitty, RHaworth, Ylem, Brunnock, Splintax, Teemu Leisti, Royan, Graham87, BD2412, Yurik,
Koavf, Leithp, RobertG, Lmatt, YurikBot, Petiatil, Ironist, Alohawolf, DragonHawk, Doctor Whom, Pagrashtak, Joelr31, Reward, JulesH,
Rudykog, Zlatko, Bota47, Robot Monk, Elkman, YolanCh, David Jordan, Petri Krohn, Smurrayinchester, Phil Holmes, David Biddulph,
Reedy, TFMcQ, KelleyCook, Hmains, Chris the speller, Mark126, Seicor, Can't sleep, clown will eat me, X570, Adamantios, Rareli-
bra, Jmlk17, Pgillman, Almeo, Mattpersons, Camilo Sanchez, Arkrishna, Peter Horn, Kvng, Eastlaw, CmdrObot, Redlock, ThreeBlind-
Mice, Denham062, MeekMark, Tezza2k1, Equendil, Whamel, LGReed, Kubanczyk, Oreo Priest, Rees11, QuiteUnusual, Edokter, Co-
makut, JAnDbot, Harryzilber, Greensburger, Bellhead, Joshua, Mapmark, Tedickey, Schily, Dmine45, A32nh1fv4, LorenzoB, I-baLL,
Jim.henderson, JulianHensey, Joonipar, Deben Dave, Numbo3, Jesant13, Thaurisil, TomasBat, Fountains of Bryn Mawr, Sbierwagen,
KylieTastic, Alex:D, Hugo999, Acsint, JhsBot, Andy Dingley, Dirkbb, Vchimpanzee, Necris, Kehrbykid, Mmarci, Kbrose, SieBot, Phe-
bot, Fratrep, PassportDude, Anchor Link Bot, Rlest, Martarius, ClueBot, PipepBot, Aaa3-other, Niceguyedc, Jusdafax, Highy3442, La
Pianista, Abdi1543, DumZiBoT, Delicious carbuncle, Ost316, Dgtsyb, Noctibus, Addbot, Kman543210, Numbo3-bot, OlEnglish, Fek-
ist, Zorrobot, Adowlen, Luckas-bot, Yobot, Bunnyhop11, AnomieBOT, Crimsonmargarine, An805Guy, Zyxw4321, YBG, GrouchoBot,
RibotBOT, Celebration1981, FrescoBot, MGA73bot, Vladmirsh, Whatever2009, Jodypro, Csilllag, Tim1357, EmausBot, Peter Karlsen,
ClueBot NG, Jh-Furth, BG19bot, EdwardH, Happenstancial, BattyBot, Khazar2, K7L, Mogism, UNOwenNYC, Jodosma, Rybec, Jadck-
ers, Thoolooexpress, JulianVilla26, Lupuscheck, 4shires, Pariah24, Sro23, Mysamiamedit, Enginerfactories, Leich7shk, CorrectorHUN
and Anonymous: 171
Telephone hook Source: https://en.wikipedia.org/wiki/Telephone_hook?oldid=689298758 Contributors: Kku, Rhombus, Picapica, Night
Gyr, La goutte de pluie, Skyraider, Laurap414, Josh Parris, Rob T Firey, Hydrargyrum, Matticus78, SmackBot, Gilliam, Bluebot, Xyzzy-
plugh, Techsmith, Gogo Dodo, Wikid77, Jim.henderson, Addbot, Tassedethe, EnochBethany, O5htyk, Erik9bot, DrilBot, ClueBot NG,
Frank the Skunk and Anonymous: 5
Telephone number mapping Source: https://en.wikipedia.org/wiki/Telephone_number_mapping?oldid=755994377 Contributors: Ed
Poor, Ellmist, Frank Shearar, Ronz, Radiojon, Rogper~enwiki, RedWolf, Lzur, Josep1c, Fudoreaper, Eequor, Just Another Dan, Wma-
han, OwenBlacker, , Smyth, Kaisershatner, Marx Gomes, John Vandenberg, Tabor, Gwachob, Kusma, Saxifrage, WilliamKF, Rjwilmsi,
Hairy Dude, Gaius Cornelius, Hm2k, WirelessMike, David Kernow, Grawity, Chris the speller, Cybercobra, Qirtaiba, Petr Kopa, Lar-
rymcp, Prunk, Farrokhi, Phatom87, Kozuch, Magioladitis, Herwart.wermescher, Abasota, VolkovBot, Psheld, Jacobly, Purplepiano,
Jamelan, Acprisip, Kbrose, RSStockdale, ArchiSchmedes, NoGringo, Owl Jolson, XLinkBot, AgnosticPreachersKid, Addbot, MrOllie,
AnomieBOT, Vatsid, Newsocialmedias, Dewritech, Raybellis, Pvr12, K7L, User26954344524345, Zcarstvnz and Anonymous: 72
Telephone numbering plan Source: https://en.wikipedia.org/wiki/Telephone_numbering_plan?oldid=755401043 Contributors: Axel-
Boldt, Jagged, Dch, Michael Hardy, Axlrosen, CesarB, Ronz, Arwel Parry, Docu, Jagdeepyadav, Bshirley, Rossami, Rob Hooft, Mxn,
Vanished user 5zariu3jisj0j4irj, Vanieter, Snickerdo, Timc, Radiojon, Kaare, Morwen, LMB, Phoebe, Cluth, Denelson83, Robbot, Dale
Arnett, Tomchiukc, Benwing, Bon, Lowellian, Timrollpickering, Alba, Walloon, GreatWhiteNortherner, Jordon Kalilich, Alan Lieft-
ing, Pabouk, Hashinclude, MeirM, Lmb71, Everyking, Curps, Cantus, DO'Neil, Pne, Bobblewik, Golbez, Ben Arnold, Gazibara, Sonjaaa,
Ran, Beland, CaribDigita, OwenBlacker, Huaiwei, KeithTyler, Randwicked, DmitryKo, Poccil, EugeneZelenko, Discospinster, Rich Farm-
brough, Cfailde, Wk muriithi, Smyth, Quiensabe, Bender235, Dewet, Kbh3rd, Plugwash, Kiand, Susvolans, Sietse Snel, Cacophony, Jlin,
Longhair, Func, Reinyday, Cmdrjameson, Pokrajac, Martg76, Caeruleancentaur, Drf5n, Jigen III, Grutness, Anthony Appleyard, Mar-
nen, Cpcallen, Paashaus, Wiesecke, Tabor, Sl, Cjcollier, Binabik80, Einstein9073, Saga City, Cburnett, Gpvos, Scott Gall, Instantnood,
Vanished user j123kmqwfk56jd, Hjf, Ceyockey, Lkinkade, Woohookitty, Mindmatrix, Hunding, Tripodics, Tabletop, Shonzilla, Contele
350 CHAPTER 80. X.25
de Grozavesti, KKramer~enwiki, Doco, HiFiGuy, Palica, Obersachse, Graham87, Otherails, Mno, Pmj, Rjwilmsi, XP1, Leeyc0, Vi-
akenny, Vegaswikian, Hathawayc, Andreas S., Jrlevine, Cassowary, FlaBot, SchuminWeb, Pumeleon, McAusten, Ewlyahoocom, Glenn L,
Physchim62, WouterBot, Chobot, DVdm, Maxx.T, Hall Monitor, YurikBot, Gridlock Joe, Markhoney, Chaser, IByte, Cate, Gaius Cor-
nelius, CambridgeBayWeather, Gcapp1959, Dpakoha, Lcmortensen, Shaqspeare, Macanese , Texmandie, Cecilebrunel, Unforgiven24,
Lacrymology, Sandstein, Davidwil, Wikiwawawa, BorgQueen, Emc2, Fsiler, Kungfuadam, Netch, Ant ie, Yoshm, Neier, Cafe Nervosa,
Vvill, SmackBot, Xyeslam, Totoblue, C.Fred, Blue520, Nmulder, Stie, Grey Shadow, Wikiius, Fbax, Brossow, Cvdr, Razametal~enwiki,
Hmains, OldsVistaCruiser, TimBentley, DennisTheTiger, MalafayaBot, Pirhounix, Dejiolowe, Colonies Chris, Invenio, Aquarius Rising,
Ismail ngr, Chlewbot, Zaian, BoKu, Radagast83, MureninC, JanCeuleers, Squigley, TGC55, Dkurland, JohnDR, SashatoBot, Wutzofant,
GarethCollins, Oskilian, Normalityrelief, Capmo, Hvn0413, Androl, Twalls, EdC~enwiki, Sjsharksrs, Metb82, Iridescent, StuHarris, Ivan-
Lanin, Jrbbopp, Reddies007, Danceboy345, Lincmad, Ryt, Mapsax, Jmaynard, Kazubon~enwiki, Patrick O'Leary, Rcgy, Ianlopez1115,
Itsme2003, Thijs!bot, Biruitorul, 00tony, Shmaltz, Leedeth, ChrisEich, Headbomb, Black1Night, Horologium, Gordon Finn, Guido.scalise,
Suk, RoboServien, Escarbot, NjtoTX, Hires an editor, Chubbles, K7aay, Erukto, JasterMereel, Caper13, Kariteh, Harryzilber, MER-C,
HouAstros1989, Charles01, Mapcat, Ufbert, Greensburger, Rothorpe, Joshua, .anacondabot, Naval Scene, VoABot II, TiaF, P0ts, Catgut,
Doesnotexist, JaGa, Hbent, Vmz, JorgeBernal, BetBot~enwiki, Jim.henderson, R'n'B, Nono64, Asci080q, Numbo3, LordAnubisBOT, Leg-
endsword, STLbells, Mrdavenport, Bbourgeois, Treisijs, Funandtrvl, Hugo999, VolkovBot, Dave Andrew, PlaysInPeoria, Oshwah, A4bot,
Prince rachid, Salvar, LeaveSleaves, Wykypydya, Kirk Ouimet, Redsxfenway, Social Studiously, Kbrose, SieBot, Ori, Belle Equipe, Wht-
dlite, Marshd1000, Flyer22 Reborn, Le Pied-bot~enwiki, Robster1983, Alefu, Teambob, Mingster8888, Dtvjho, Hariva, Artisol2345,
PabloStraub, Explicit, ImageRemovalBot, ClueBot, PipepBot, Jmarquette, NoGringo, Supasaru, Piledhigheranddeeper, Copyeditor42,
Chris1193, Sd324, Alexis Wilke, JRadel, BodhisattvaBot, Ost316, Skarebo, Addbot, Jeolson11, Jim10701, Sillyfolkboy, Daicaregos, Nico-
las Love, Luckas-bot, Yobot, MacTire02, AnomieBOT, Ciphers, Codemm, Adam Anthony Watson, Xqbot, Padense, Jrcovert, J4lambert,
The Evil IP address, NOLA504ever, Bellerophon, Lladoog, Farin12, Jersey92, Citation bot 1, Jonesey95, Nbornstein, Trappist the monk,
Lotje, Wiki publishing, Onel5969, Shabidoo, Kakohats, XinaNicole, 4Petesake, Tommy2010, Pandukht, ZroBot, UrbanNerd, David J
Johnson, ACJohn47son, Arcorann, ChuispastonBot, DKH2010, 28bot, ClueBot NG, This lousy T-shirt, Widr, Tele2001, Yiguro, Cyber-
bot II, K7L, Bhbuehler, Mogism, Nowayjose1234, DataPro2013, Hssaha, Ejl389, A0404141041, Br100x, HMSLavender, FriarTuck1981,
User sometimes known as 66,87,119,, Luis150902, Omni Flames, Siyean and Anonymous: 404
Teletrac engineering Source: https://en.wikipedia.org/wiki/Teletraffic_engineering?oldid=713489674 Contributors: The Anome, Ed-
ward, Michael Hardy, Karada, Mozzerati, Suruena, 2mcm, Dominic, HenryLi, RHaworth, Vandenbr, Barry22, Caltox, Y.bata, Ian Georey
Kennedy, Srleer, Robertvan1, Doncram, Ketil3, SmackBot, Bobet, Unforgettableid, Kvng, WeggeBot, Dougher, Harryzilber, Bellhead,
Ged Davies, Kgeischmann, Jim.henderson, Mange01, LordAnubisBOT, Shoessss, Logicwiki, Piggly, Xvani, Cialo, ClueBot, LeoFrank,
Tanhabot, Hern2lk, Ptbotgourou, DSisyphBot, VadimIppolitov, RibotBOT, DrilBot, Dewritech, SoledadKabocha, , YiFeiBot and
Anonymous: 28
Time-division multiplexing Source: https://en.wikipedia.org/wiki/Time-division_multiplexing?oldid=747437539 Contributors: Marj
Tiefert, Bryan Derksen, B4hand, Bob Jonkman, Edward, Karada, Paddu, Andres, Thue, Puckly, Baloo rch, Acm, Graeme Bartlett, DocWat-
son42, Rchandra, Michael Birk, Alvestrand, Bobblewik, Gloop, Mozzerati, Discospinster, Rich Farmbrough, Uieoa, Our Phellap, Espoo,
Guy Harris, Andrew Gray, Ceyockey, Woohookitty, RHaworth, Krille, RuM, BD2412, Rjwilmsi, AdrianMastronardi, Mirror Vax, Ian Ge-
orey Kennedy, Stephenb, Gaius Cornelius, Aler, CecilWard, BertK, Elkman, Ninly, Spejledrejer, Qoqnous, SmackBot, Hmains, Bluebot,
Nbarth, DHN-bot~enwiki, Gruzd, Dreadstar, Peter Horn, Kvng, ShakingSpirit, LostTemplar, Clarityend, Tawkerbot2, Eastlaw, Thowat,
Christopher P, Enter The Crypt, Esowteric, Segfault87, Davido, WinBot, Dougher, JAnDbot, Harryzilber, Thaiber123z, Meredyth, Cat-
slash, 28421u2232nfenfcenc, Jim.henderson, R'n'B, Mange01, Trusilver, Brupat, Tcalves, Belovedfreak, Num1dgen, The enemies of god,
VolkovBot, LeaveSleaves, Tennisgirly12, Riick, Aragorn2007, AHMartin, Kbrose, Biscuittin, SieBot, NPalmius, ClueBot, PixelBot, Dgt-
syb, Addbot, Tarunsharma2006, Darhuuk, Robert The Rebuilder, OlEnglish, Yobot, Bunnyhop11, Fraggle81, KamikazeBot, AnomieBOT,
0majortom0, Materialscientist, ArthurBot, Wheller007, MARSELIMADHE, Wfplb, SpaceFlight89, Oliverlockwood, DARTH SIDIOUS
2, RjwilmsiBot, Tomwaterman, Unreal7, Vinothkanan, ClueBot NG, ChrisGualtieri, Wywin, Tarikumehdi, Murari vinay, GreenC bot and
Anonymous: 130
Unlisted number Source: https://en.wikipedia.org/wiki/Unlisted_number?oldid=717865660 Contributors: SimonP, Dysprosia, Radiojon,
Bloodshedder, Chrisbolt, Adam850, Night Gyr, Zachlipton, Srleer, Scoutersig, MacsBug, SmackBot, Stie, Hmains, Alaibot, North-
ernThunder, Jim.henderson, Ajfweb, JL-Bot, AnomieBOT, Erik9bot, John of Reading, Likri, BG19bot, ChrisGualtieri, Philippe97 and
Anonymous: 13
Vertical service code Source: https://en.wikipedia.org/wiki/Vertical_service_code?oldid=733180487 Contributors: Baylink, Radiojon,
Rfc1394, Alexwcovington, Mboverload, Rchandra, Beland, RayBirks, Nick2588, Kevin Rector, Mike Rosoft, VCA, Matteh, Renwique,
Beinsane, Justinbb, Sjakkalle, Todd Vierling, Hydrargyrum, Voidxor, Elkman, MacsBug, SmackBot, Fitch, Unforgettableid, Lexlex, Dis-
neywizard, Mike1901, MrD9, Dkovacs, Lincmad, Eastlaw, DannyKitty, Wikiwriter706, Dbrodbeck, IamAllan, MER-C, Think outside the
box, Mike Payne, Philhower, Jim.henderson, R'n'B, RoseTech, Bluhd, PlaysInPeoria, Bstpierre, Sudhir h, Moonriddengirl, ClueBot, Spark-
Nano, NoGringo, Mardetanha, Northernhenge, JBsupreme, AnomieBOT, Grolltech, FrescoBot, Whywhenwhohow, Dcirovic, LincMad,
Sonicyouth86, Marrier & Fruitful., MerlIwBot, YborCityJohn, Qxukhgiels, $upernova9000, DarkTechnican and Anonymous: 35
Voice over IP Source: https://en.wikipedia.org/wiki/Voice_over_IP?oldid=754273725 Contributors: The Anome, Tarquin, Ed Poor,
Christopher Mahan, SimonP, Shii, Europrobe, Volker, KF, Olivier, Stevertigo, DennisDaniels, Infrogmation, Michael Hardy, Voidvec-
tor, Aezram, Tenbaset, Pnm, Kku, MartinHarper, Ixfd64, Lquilter, 6birc, Karada, JeremyR, Gbleem, CesarB, Ahoerstemeier, Haakon,
Ronz, Yaronf, Jebba, Goblin, Azazello, Samw, Mxn, Novum, Charles Matthews, Guaka, Kaare, Val42, Omegatron, Bevo, Joy, Epl18,
Johnleemk, Francs2000, Jeq, Cluth, Twang, Bearcat, Robbot, Chealer, R3m0t, Kristof vt, Vespristiano, Bon, Jmabel, ZimZalaBim,
Tim Ivorson, Postdlf, Henrygb, Academic Challenger, Rasmus Faber, Hadal, JohnnyB~enwiki, ElBenevolente, Lupo, Diberri, Cyrius,
Gwicke~enwiki, Wile E. Heresiarch, Mattaschen, Tea2min, Adam78, Alan Liefting, Enochlau, Jasenlee, Connelly, Giftlite, DocWat-
son42, BenFrantzDale, Lethe, Jhknight, Fastssion, Karn, Peruvianllama, Everyking, David Johnson, Splatg, Saaga, AlistairMcMillan,
Bobblewik, Wmahan, Neilc, Rrw, Tom k&e, Gadum, Manuel Anastcio, Utcursch, 159753, Toytoy, Mendel, Beland, OverlordQ,
Scottperry, Vina, CaribDigita, Bumm13, Mysidia, Karl-Henner, Biot, Vaquerito, Tomwalden, Zondor, Trevor MacInnis, Egstcm, Mike
Rosoft, T2X, Mormegil, Yueni, DanielCD, Spiko-carpediem~enwiki, MattisManzel~enwiki, Discospinster, VCA, Rich Farmbrough, Rho-
bite, FT2, Pmsyyz, Smyth, Dobrien, Strib, Quiensabe, MAlvis, Paul August, Bender235, Nandini, S.K., Itsme~enwiki, JoeSmack, Evice,
CanisRufus, Pjrich, Lankiveil, The bellman, WibblyLeMoende, Skinkie~enwiki, Bobo192, 23skidoo, Aelman, Smalljim, John Vandenberg,
BrokenSegue, Enric Naval, Braeside, Apyule, IronHelix, ParticleMan, Towel401, Sam Korn, Hooperbloob, Phyzome, Landroni, Mote,
Poweroid, Alansohn, Cbarbry, LtNOWIS, Free Bear, Interiot, Atlant, Babajobu, Pogostokje, Abesford, InShaneee, Mysdaao, RoboAc-
tion~enwiki, NTK, Wtmitchell, Javacava, Wtshymanski, Mattsday, Quintin3265, Stephan Leeds, Docboat, Randy Johnston, Lerdsuwa,
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 351
Bsadowski1, Computerjoe, Kusma, Freyr, Versageek, Ringbang, Kazvorpal, Dan100, Pfwebadmin, Merkel, Forkqueue, Squiquifox, Fal-
corian, DanielVonEhren, Crosbiesmith, Brycen, WilliamKF, ChrisJMoor, PdDemeter, Angr, Woohookitty, Mindmatrix, Cre8d, The Bel-
gain, Camw, LOL, Francis Good, Myleslong, Deeahbz, Unixer, Peter Hitchmough, Pol098, WadeSimMiser, Tckma, Pchov, Kgrr, Pshi-
bles, Tabletop, Kglavin, Al E., Pgilman, Rchamberlain, Zzyzx11, Alecv, Bfurst, Tslocum, RichardWeiss, Graham87, Whicky1978, Yurik,
Mulligatawny, Phoenix-forgotten, Squideshi, Rjwilmsi, Tizio, Koavf, Indangermouse, Pessi~enwiki, Strait, Rillian, Hack-Man, Leeyc0,
SMC, Vegaswikian, Nneonneo, Oblivious, Bonius, WhiteBoy, Lozza~enwiki, Jehochman, Ttwaring, Yahoolian, Fred Bradstadt, Yamamoto
Ichiro, Clairecare, FayssalF, Evanwolf, Apapadop, Alejo2083, FlaBot, SchuminWeb, Depill.is, Ausinha, Margosbot~enwiki, Dbollard99,
Sylverboss, Who, Daveslomo, AJR, Dpocock, RexNL, Jrtayloriv, RasputinAXP, Wongm, Hnram96, Fresheneesz, Alphachimp, Srlef-
er, Synchrite, Windharp, King of Hearts, Daev, Chobot, DVdm, Geekking, Surge79uwf, Mysekurity, Gwernol, Zimbabweed, Mam-
boJambo, The Rambling Man, Wavelength, Luke Bales, Rapido, Matanya (renamed), Hairy Dude, Cabiria, Jimp, Kiscica, The Storm
Surfer, Expertu, Hydrargyrum, Archelon, DaMenace123, CambridgeBayWeather, Pseudomonas, Wimt, RadioKirk, Thane, Mkzz, Nawl-
inWiki, Maggu, Wiki alf, Paidup, Robertvan1, Veledan, Welsh, Mmccalpin, MacGyver07, Thiseye, Vmart, Brandon, Banes, Xdenizen,
Reneh, Ruhrsch, Jhessela, Mikeblas, Rudykog, Tony1, Dlyons493, Voicepulse, Foofy, Nethgirb, ArkansasHistory, DeadEyeArrow,
Anon2, Navstar, Thane Eichenauer, Voip-solution, Boogachamp, Zzuuzz, Spencer.fry@yale.edu, DoretelCom, Simsim4, Rafehh, Alex de
carvalho, Mehrdadd, Foodeei, VoiceNet, Josh3580, Sean Whitton, GraemeL, Acer, Fram, Rearden9, Toniher, ViperSnake151, Bluezy,
Thomas Blomberg, Leuk he, N Yo FACE, MansonP, Jroddi, Elbperle, Mike Gale, Veinor, A13ean, SmackBot, MattieTK, Fvp~enwiki,
HWSager, GregA, F, DaveSymonds, Incnis Mrsi, Reedy, Tarret, Marc Lacoste, McGeddon, Goplett, Stepa, KVDP, Spearhawk, Kelley-
Cook, Canthusus, Mcfutech, Steven312, Mauls, Yamaguchi , Key134, Gilliam, Donama, Ohnoitsjamie, Drinking.coee, AndrewKay,
Tglovoip, Chris the speller, Ben.c.roberts, Jprg1966, Rick7425, Morte, Oli Filth, MartynDavies, EncMstr, Villarinho, Jerome Charles Potts,
Telecom.portal, Sadads, Jonolumb, Epastore, Bowmanjj, Colonies Chris, Krallja, Firetrap9254, A. B., Jnavas, Marco79, ProblemAssassin,
Can't sleep, clown will eat me, Nonodename, OrphanBot, JonHarder, TheKMan, Rrburke, BoKu, Miken2005, Wholived, Oliver.Shepherd,
VegaDark, JanCeuleers, Dreadstar, Weregerbil, Hughzhu, Jone5050, Stefano85, Cliconnect~enwiki, Mingthemad, Daquell, Ged UK,
Amescreative, Ohconfucius, TJJFV, Pjbrockmann, SashatoBot, Nishkid64, Voxbone, MartrtinS, Kuru, Freshtel, Microchip08, Acid-
burn24m, Jidanni, Sosodank, Soptep, Pinnocchio, Smasafy, Knobbly, Diverman, Stuart Ward UK, Dobregon, IronGargoyle, Cielomo-
bile, Av, Ananth t, Ckatz, Efrondozo, 16@r, JHunterJ, Andypandy.UK, Slakr, Stwalkerster, YongKim, Makyen, Notwist, Beetstra, Noah
Salzman, Splendour, Jadams76, Yoshboy, Skarmachild, Dicklyon, MaxDowney, Therebelcountry, Waggers, Clq, TastyPoutine, Prunk,
Kvng, DDeckert, Hu12, Hetar, Teemuk, Doretel, Gobbagoo, Intercompages, Joseph Solis in Australia, Mclowes, Voipfone, Beno1000,
Cindyt27, CapitalR, Quodfui, Civil Engineer III, Linkspamremover, Tawkerbot2, Vmatos, Adjektiv, Timrem, SUparJErk, Nloth, Gar-
vanet, Combes, Jjspirko, J Milburn, Linuxerist, Jptdrake, CmdrObot, AVMsoftware, Ale jrb, Wafulz, Insanephantom, Tkoeppe, Imcdnzl,
Picaroon, Atlasvoice, Kushal one, Glendonowers, Kylu, Stephen Lange Ranzini, NickW557, Argon233, Rupertb, Camie333, Shandris,
Shizane, Mac100, HUnger, Thedp, Votingontheinternet, Phatom87, .::Arbitrary::., Billhunt, Mblumber, Seajay1979, Thinkingphones,
A876, Lootzy, Cyrilfr, Frizzle~enwiki, Gogo Dodo, Anthonyhcole, Colin Keigher, Seajay19791, Solidpoint, Ibanix, Lazydaisy, Biggkid5,
Naudefj, DumbBOT, Chrislk02, Ethan01, Kozuch, Hooiemajoris, Daven200520, Neustradamus, Desecrator~enwiki, Thijs!bot, Poorleno,
Epbr123, Dennis70, Qwyrxian, Makefreecalls, Richardjohnstone, Monsieur champs, Mad Carew, Ghadsall, Wikivoip, HappyInGeneral,
Avi.dorfman, Bphenix, Werelnon, Oliver202, Who123, Headbomb, Newton2, Ejwma, Marek69, Sukarn~enwiki, PaperTruths, James086,
Accountwiki2, Crutter, Wikidmoz, WhaleyTim, Dawnseeker2000, Mobutu LM2006, CTZMSC3, Thakkar v, Mentisto, KrakatoaKatie,
AntiVandalBot, Luna Santin, Funkyguy, Misterbigbrain, Agnvoip, Churb75, Jeholton, Flod logic, Macdmq, Yellowdesk, Camptown,
Altamel, Altesys~enwiki, Hope work, IMac4ME, JAnDbot, Husond, Harryzilber, Barek, MER-C, Dmar198, Scott0485, Iskitoofast4u,
Ikanreed, Brocha, Jahoe, LittleOldMe, Deserthawks, Magioladitis, Gabrielyan, VoABot II, Gutnick, Kevinmon, Manickaselvam, Voix-
ium, Ahecht, Stilldavid, Tmnmt, Double DKool, 28421u2232nfenfcenc, LorenzoB, Ged Davies, DerHexer, Kgeischmann, Wlpekar,
King adan, Calltech, Louietyj, Larry2342, Muru, S3000, GRD~enwiki, Kamaniskeg, AVRS, Conquerist, MartinBot, DrDorkus, Bet-
Bot~enwiki, By97aa, J Santoso, John Doe or Jane Doe, Poeloq, Jim.henderson, Glrx, R'n'B, Nono64, Dapps007, Jana Grare, Tgeairn,
RockMFR, Manticore, J.delanoy, Andre nsi, Kevincw01, Brest, Dask137, Jesant13, Hrbrendan, Hopper96, NerdyNSK, Alexander Straub,
Acalamari, It Is Me Here, Katalaveno, Gurchzilla, Beboy10, HockeyInJune, Bowensrun, AntiSpamBot, NewEnglandYankee, Veromark,
Fountains of Bryn Mawr, Inotbf, Hipvoice, Danr2k6, SJP, Johnnie ong, Diego.viola, Ljgua124, Shara77, Billkor, Smitty, Gimpmask,
KylieTastic, Juliancolton, Remember the dot, Vanished user 39948282, Natl1, Squids and Chips, CardinalDan, Signalhead, Wikiedi-
tor06, VolkovBot, Jeman78, Holme053, Vinnythejinny, Coreyxbs, Ccowling, Wannabav8r, Pparazorback, Philip Trueman, PNG crusade
bot, CalamityGNDM, A.Ward, TXiKiBoT, Oshwah, ZzzBrett, Stevevogelnu, Mark v1.0, Vipinhari, Janahan, Mcsbloom, Geep23, Ashu-
mit02, Interchangegroup, Symbianguru, Jackfork, LeaveSleaves, Manuelamsp, Andy Dingley, Bogdanwiki, Ulf Abrahamsson~enwiki,
Unused0030, Amalia07, Scottywong, Cyberdyme, Kbrose, Ponyo, SieBot, Coee, Miltiades490bc, Nubiatech, Adclark88, Dreamafter,
Alw75, Caltas, Matthew Yeager, JonTeh, Andromeda451, GrooveDog, Susyr, Alokagga, JetLover, Jimthing, Duckdad, Antonio Lopez,
Faradayplank, Ozeki, Tombomp, Tmaufer, Techman224, Karl2620, StaticGull, Morruga, Edtealdi, Gubbay, Dspanalyst, Zwz8406, Denis-
arona, Motoroife, Lansal, MBK004, Gopalkrishnan83, ClueBot, Adoresoftphone, LP-mn, Binksternet, JSsoftware, Stupid2, Vinogradovi-
soleksii, Abhinav, Iandiver, Ignorance is strength, David Sorf, Sharonpngo, Nikzbitz, Bensci54, Rose Booth, Joe1945-01, Miladchik,
DragonBot, Muhandes, MusicTree3, Sun Creator, Rogerbabbott, Shebazahmed, Jezaraknid, Ritterrat, Coolmac860, Thingg, CenfusRex,
Kikos, Thompsontough, Smostow, Apparition11, DumZiBoT, Shinjodenn, Jbrock11, XLinkBot, Mr.chetanladdha, Jcline0, Globaltrans-
mitter, Roxy the dog, Kw27, Sumantu.mittal, Liquid Chrome1, Rreagan007, WikHead, Dgtsyb, Sweetpoet, Dlsieradzki, Poldon, Bradley-
yard, Vy0123, Yfrwlf, Nww mag, Deineka, Addbot, David.a.gelman, Brickbeard, Jafeluv, Tcncv, Fyrael, Captain-tucker, Robertbricker,
TutterMouse, VSteiger, The Thin Man Who Never Leaves, Ashton1983, Fluernutter, Rishishringan, Cst17, Jreconomy, D.c.camero,
Jasper Deng, West.andrew.g, Twizler3, Savetheozone, Glenitec610, Murdamw, Jongrant, Tassedethe, F Notebook, Tide rolls, Mobidick0,
Gail, SasiSasi, Sharonxiv, Ochib, Snaily, , Chaldor, Yobot, Pugglewuggle, Tran Quoc123, Fraggle81, UltraMagnus,
Loganabbott, Voice99, MarcoAurelio, Mukat, Wonder, Plasticbot, Rainman74, Jalal0, Bozsingdani, Spacestationshuttle, Theh1982,
Voskypro, AnomieBOT, New2way, Daikiri, Jim1138, Galoubet, Zervaman, Piano non troppo, Fennelcm, Deeprig9, Ipatrol, Kingpin13,
Ulric1313, Ajrichens, Bluerasberry, Jignesh.4soni, Materialscientist, Whiskers9, Citation bot, Freeness, Xqbot, C172rg, Radioraiders,
Addihockey10, Capricorn42, CsamFord, Acce245, RibotBOT, Kyng, Maris Jansons, Niazza, GhalyBot, Johnan, SimonInns, Shadow-
jams, Klapouchy, Seisatsu, FrescoBot, Joe.dolivo, Nageh, Eorlov, Kryn1030, W Nowicki, Itusg15q4user, Alxeedo, Bansaribarot, Squire
of the Infernal Knight-Lord of Penguins, VoIPExpert, Matthewbulat, Vickygarg, BenzolBot, MLD7865 Auto, Wwwqq, Rubgwobouhgr-
woosf, Biker Biker, Kingkobus, Pinethicket, I dream of horses, Xcvista, BRUTE, RedBot, Noel Streateld, Saadsaleh, Meaghan, Banej,
Db11710, TobeBot, Hugh168, Lotje, UnclGhost, Baruchlanda, Vrenator, Fayedizard, Aoidh, Edgeley, Sywyk, CommEvo, Mean as cus-
tard, RjwilmsiBot, Jcyrus80, Lrlfrance, Silverfox196, Polscifreak, Slon02, Skamecrazy123, Hooman.marandi, EmausBot, Rajarshic02,
John of Reading, Orphan Wiki, Gfoley4, Pugliavi, Primefac, Ramshi1, GoingBatty, Ballofstring, Solarra, Voipphoneservice, Caliqt84,
ToP Racer, Anir1uph, 2blackdogs, Tliberty10, Fred Gandt, H3llBot, MajorVariola, Erianna, Mylivetech, MonoAV, Hgarciagg, Cor-
nell92, Intelafone, Tecpc2001, Jasonon, Asimzaidi123, Schmidtja, Senator2029, Teapeat, DASHBotAV, 123microsoft123, Jonuday, 28bot,
352 CHAPTER 80. X.25
Javamen, Petrb, ClueBot NG, Jack Greenmaven, GlobalEdge 2010, Katiker, CocuBot, Nitinkrgupta, Mohammed 77b, Tylko, Frietjes,
Tchin-NJITWILL, Zachripples, Ken Olsen, Amandavpi, Cweath7, Widr, Ahmadalweshah, Antiqueight, Box News, Voiptopia, Eliza-
bethdmy, KillerPandaRage, Helpful Pixie Bot, , Electriccatsh2, Davfox, BG19bot, Tonkie, Redini, WR:ichibantel, Roc-
coKIT, Mark Arsten, Compfreak7, MasterfulTroll, WikiBlogger61, Bigtex 1, Bprincipi, Aresnika, Bfax, Lolwarrior, GULFSIP.Engineer,
GULFSIP.voip.engineer, Voip.world, Mws1979, Akram1997, Shirudo, Secretower, Flambib, Sparklyfeet, Sandeep kumar pal, BattyBot,
SimmeD, Remobasith, Justincheng12345-bot, Miguelaustro, Cyberbot II, Respawn2003, Jmediate88, DataHead2112, Mediran, Sudha-
rana, Mikez711, Ajv39, DavidStainberg, Sangyup81, K7L, Terinavy, TwoTwoHello, Frosty, 93, Lexx123, Hawlkeye1997, Me, Myself,
and I are Here, Phamnhatkhanh, Faizan, Moony22, Artvister company, Apexace345, Omegapower, Surfer43, Broster123, Asv128, Snol-
lyPheasant, DavidLeighEllis, Locamp, Abdeaitali, Ginsuloft, FDMS4, Kwaimind, Bob Staggert, UY Scuti, Daves2013, Skr15081997,
Itsalleasy, Wyn.junior, Antrocent, MSheshera, Hoanglai6868, Mr. Smart LION, Monkbot, Vieque, Captin inpalar, Bojangel, Roshu Ban-
gal, Guevarra.jayson, Roger.bratu, The Last Arietta, Jfk84, Kellesaiconnally, Wiki Vodalink, ScrapIronIV, Sinchdev, Vivekkush1983,
Hungryce, Deborah Chiaravalloti, Anna Alexandrovna Latushkina, Jeremysimplewan, KasparBot, Putmystu, Amber Beard, Strictly-
followrulz, Kurousagi, The Editor of All Things Wikipedia, Pakelectrical, Sowmya139, Farman67, Blastofreading, Sangeethfrancis-
james, Zhuhonglin1, MLRM, Harishk.its, Eno Lirpa, Full Rune, Fjpauley33, RainFall, Rapt0r87, Monvoip, V4switch, Mamakaze1,
HONDAGUY, Akartit and Anonymous: 1658
Voicemail Source: https://en.wikipedia.org/wiki/Voicemail?oldid=748984285 Contributors: Cameron Dewe, Minesweeper, Skyfaller,
Radiojon, Jeq, Robbot, Jmabel, Altenmann, Hadal, DocWatson42, Sundar, Edcolins, Jh51681, Kate, Rich Farmbrough, Sietse
Snel, Bookofjude, Deathawk, Reinyday, Pearle, Ommnomnomgulp, Alansohn, Velella, Stephan Leeds, Anthony Ivano, Blaxthos,
Dan100, Graham87, Rjwilmsi, W3bbo, Win777, Andymadigan, Ewlyahoocom, Preslethe, RobotE, Family Guy Guy, Vanished user
jw8ej23rnalajfdoi3rfx, Rygelski, Peter S., Rsrikanth05, Gcapp1959, Wiki alf, Moe Epsilon, IceCreamAntisocial, Avalon, Closedmouth,
Ahmad510, SmackBot, Unschool, Cavenba, DCDuring, Jacek Kendysz, Edgar181, Chris the speller, Bluebot, Salvo46, Deli nk, Lexlex,
Hgrosser, Frap, BoKu, Jwy, DMacks, Pgillman, Rsc~enwiki, Disneywizard, Kuru, Khazar, Linnell, Waggers, J Di, Kulldominique,
No1lakersfan, Alton, Drewches, Thijs!bot, TuvicBot, Robina Fox, Bongwarrior, JamesBWatson, Sarahj2107, Tedickey, Calltech, Lkinzler,
Richard Odin Johnson, Casieg, R'n'B, Trusilver, Mrceleb2007, Lynseyr, Erik Swanson, KylieTastic, TobyDZ, Lvcipriani, LeaveSleaves,
BotKung, Natg 19, Wawerner~enwiki, WiccaWeb, Steven Weston, Enkyo2, SieBot, BotMultichill, RJaguar3, ElrondPA, WacoJacko,
Fratrep, Chris Newport, Sphilbrick, ClueBot, Unbuttered Parsnip, Mild Bill Hiccup, Skugell, Ottawahitech, Anon lynx, Peterparker3000,
Imcgaw, Aitias, SoxBot III, Apparition11, Avstmw, Mitch Ames, Dgtsyb, Addbot, Researchwatch, Harpervi, 53mgtd, Fieldday-sunday,
Leszek Jaczuk, Tassedethe, Jarble, Yobot, Banjohunter, Jim1138, Materialscientist, LilHelpa, MauritsBot, Kyng, Eikisb, Duncanogi,
Shadowjams, Pusa, Taka76, Klapouchy, Krinkle, DrilBot, Full-date unlinking bot, Electricmaster, DARTH SIDIOUS 2, Dewritech, Go-
ingBatty, AsceticRose, Ktopits, Dolovis, Culturalexchange, Ebrambot, Monterey Bay, RaptureBot, Telcomdata1, Donner60, Mikecynar,
ClueBot NG, MelbourneStar, Widr, Gkolodny, Jeraphine Gryphon, BG19bot, Jamesgmeade, Pnnigan, Cyberpower678, Graceindesign,
Itsjustmee, Relkins711, NancyLeonard, David.moreno72, Retanep, Cyberbot II, Khazar2, Karkettrr, Nagasaku, Bahloul, Captain Conun-
drum, YiFeiBot, UY Scuti, Justme1762, Seinbinder, Matthewfaichney, Sayeed.sprd.bd, Buntee2, Jhansiranim, Minavo, Maddycakes051
and Anonymous: 151
VoIP phone Source: https://en.wikipedia.org/wiki/VoIP_phone?oldid=746736869 Contributors: Pnm, Glenn, Robbot, Geeoharee,
Mcapdevila, Vadmium, Towel401, Ahbanks, Woohookitty, Pol098, BD2412, NeonMerlin, Summitraj, Krzysiu, Xcali, MMuzammils,
RussBot, CambridgeBayWeather, Brandon, Naasking, SmackBot, Stepa, KVDP, Oli Filth, Deli nk, Lboulton, Frap, Dicklyon, Kvng, Lee
Carre, Hu12, 345Kai, Pgr94, Phatom87, Gogo Dodo, Jay.Here, Koptor, Davidhorman, Widefox, JAnDbot, Harryzilber, Barek, JaGa,
Kgeischmann, Pitagora, Stuii, CommonsDelinker, Trusilver, McSly, Dchall1, Ziounclesi, Jamelan, Wbrenna36, Puddington, RaseaC,
Kbrose, SieBot, Freddyzdead, Flyer22 Reborn, MicoFils~enwiki, Binksternet, PixelBot, Apparition11, Bluesky7425, Jcline0, Nww
mag, Addbot, Jafeluv, Socheid, Jojhutton, Joshith, Suwa, P.matel, Mickyb1882, Yobot, TaBOT-zerem, AVB, Retro00064, AnomieBOT,
E2eamon, Nerminbarman, Eyal.zach, Eorlov, Nakakapagpabagabag, Geek2003, Freebirds, MLD7865 Auto, OgreBot, RedBot, Btilm,
Nancycil, Vrenator, Kmlacroix, EmausBot, Observer6, Dewritech, ZroBot, John Cline, Tliberty10, Cymru.lass, Rcsprinter123, Bomazi,
Rocketrod1960, ClueBot NG, Nitinkrgupta, Snotbot, Cntras, Fairlyoddparents1234, Voipsatellite, Johnthesmith, VoIP Guru 2011, Batty-
Bot, GoShow, Connor2349, K7L, Sriharsh1234, Wilson.stella, JaconaFrere, Pariah24, Jfk84, KasparBot, Joelamae, UniqueUnbique and
Anonymous: 76
X.25 Source: https://en.wikipedia.org/wiki/X.25?oldid=741479852 Contributors: Aldie, Maury Markowitz, Vaughan, Ahoerstemeier,
Ronz, Yaronf, Smack, Crissov, Itai, Finlay McWalter, Lumos3, Kizor, Stewartadcock, Hella~enwiki, Gidonb, Hadal, Xanzzibar, Vac-
uum, Itpastorn, Gzornenplatz, VampWillow, Tagishsimon, Karlward, Beland, Bumm13, Karl Dickman, MementoVivere, Abdull, Rich
Farmbrough, Guanabot, Wk muriithi, YUL89YYZ, Eric Shalov, Ray Dassen, MarkWahl, Nwsmith, Ivansanchez, Helix84, Guy Har-
ris, RoySmith, GL, Stephan Leeds, Danhash, RJII, Blaxthos, Ilario, Tabletop, Eyreland, Commking, Haikupoet, Rjwilmsi, Gary Brown,
SAK, FlaBot, Ewlyahoocom, Overand, YurikBot, NTBot~enwiki, Gaius Cornelius, Barberio, Mortein, Mikeroetto, SmackBot, Reedy,
Bernard Franois, Chris the speller, GK tramrunner, Dvermeirre, Villarinho, JonHarder, Adamantios, Kotul, HarisM, Sparky-sama, Chari-
vari, SashatoBot, Dave314159, Deceglie, Kvng, Huntscorpio, Prof 7, Caomhin, Mblumber, Gogo Dodo, Daenney, Quibik, Thijs!bot,
Hcberkowitz, Headbomb, Dawnseeker2000, Cocjh1, KMeyer, Dougher, IrishFlukey, JAnDbot, PrimroseGuy, Scostas, CommonsDelinker,
Mange01, ISC PB, Cpiral, Birczanin, VolkovBot, Vrac, SkinnyV, Kurgus, TXiKiBoT, Dermots, Gbuchana, BotKung, Kbrose, SieBot,
Dialate, LeadSongDog, Lightmouse, CharlesGillingham, Ken123BOT, EoGuy, Kanchanghavle, Alexbot, PixelBot, IlliniFlag, Dgtsyb, Ad-
dbot, Pieman196, Tonkie67, Enduser, Yobot, AnomieBOT, Citation bot, LilHelpa, Xqbot, Giddeon Fox, FrescoBot, Pepper, Merlion444,
FromOrleans, John of Reading, Orphan Wiki, RFClover, The Mysterious El Willstro, Jasonanaggie, ZroBot, Westley Turner, Jgood-
child, Ermishin, ChuispastonBot, ClueBot NG, Wdchk, Helpful Pixie Bot, BG19bot, Doodlebug777, Leikai Meetei, Cwobeel, Mogism,
Cerabot~enwiki, Comp.arch, Monkbot, KasparBot and Anonymous: 106
80.11.2 Images
File:1140E.jpg Source: https://upload.wikimedia.org/wikipedia/commons/b/bd/1140E.jpg License: CC BY-SA 3.0 Contributors: Own
work Original artist: Geek2003
File:1896_telephone.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/15/1896_telephone.jpg License: Public domain
Contributors:
Edited version of http://runeberg.org/teleapp/0004.html
Original artist: ?
80.11. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 353