After the invention of the telephone, the infrastructure expanded. Several key court actions opened the network and allowed independents to join and manufacture their own equipment and disrupt the long-held Bell monopoly.
- [Narrator] After the creation of the telegraph,…inventors sought to improve the functionality,…which led to the telephone.…The standard phone system existed for about a century,…until improvements in the infrastructure…evolved into our modern-day voice over IP technology.…In the 1880s, communities built a central office…that provided local telephone service…that were part of, owned by, or licensed…by the Bell Telephone Company.…
During that time, only Bell licensees could own…and operate telephone systems in the US.…When Bell's patent expired in 1894,…we began to see the creation of a number…of independent phone companies.…Between 1894 and 1904, over 6,000 independents…went into business,…increasing the number of telephones…to over three million.…
However, because the local independent companies…were not part of the Bell system,…there was no interconnection between them.…In this graphic on the left-hand side,…we see independents.…Because they were not part of the Bell system,…they couldn't talk with one another.…
Lisa Bock compares the traditional Public Switched Telephone Network (PSTN) to VoIP, and discusses the framework and components necessary for VoIP to be possible. She reviews codecs, including characteristics such as bitrate and voice quality; protocols for setup, communication control, and data transport; and media gateways, signaling protocols, and intermediary systems such as translators and mixers. Lisa then reviews business integration and the importance of conducting a needs analysis and network assessment prior to implementation. Learn about the many value-added services UC can provide, such as integrating VoIP with email, billing, management software, and other customer management systems. Lisa wraps up with a discussion on how ensuring quality of service (QoS) in a VoIP network minimizes latency and jitter and the importance of VoIP security to prevent malware, impersonation, hijacking, and denial of service attacks.
- History and evolution of PSTN
- UC overview and components
- Gateways, including signaling gateways, translators, and mixers
- Integrating VoIP and UC into your business network