Essential Guide

Get started Bring yourself up to speed with our introductory content.

The basics of SIP trunking explained

Learn the SIP trunking basics, from its advantages over PRI to building a SIP security checklist.

Introduction

As enterprises move on from legacy voice communications systems like the public-switched telephone network (PSTN), Session Initiation Protocol (SIP) trunking has emerged as a popular method of facilitating voice communications over the Internet. SIP trunking offers enterprises many advantages over legacy systems, including reduced costs, scalable architecture and enhanced reliability. But SIP trunking also creates new security challenges for enterprises, like SIP floods and toll fraud.

This essential guide covers the SIP trunking basics to ensure your enterprise is prepared to successfully deploy SIP trunks in your network. Read on for more of SIP trunking explained.

1 Defining-

Defining SIP trunking

For many enterprises, SIP trunking has become the preferred method for voice communications because of its cost savings, simplified architecture and the ability to branch into video and data communications. Learn more about the advantages of SIP trunking and how it can support both IP and legacy voice communications.

Tip

The advantages of deploying SIP trunks

SIP trunking has many advantages, ranging from reduced installation costs to easy upgrades. Learn the SIP trunking benefits that make it the preferred method of VoIP communications. Continue Reading

Tip

Choosing between SIP and PRI

Learn the difference between SIP and Primary Rate Interface (PRI) when it comes to voice communications and why SIP may be the preferable choice for enterprises. Continue Reading

Answer

The difference between SIP and VoIP

In this Ask the Expert response, telephony expert Jon Arnold explains how SIP and VoIP differ and how SIP trunking can help enterprises take full advantage of VoIP's capabilities. Continue Reading

Answer

How a SIP trunking service supports a VoIP network

Expert Michael Brandenburg explains the function of a SIP trunking service and how SIP trunking can support both IP and legacy-based voice communications. Continue Reading

Answer

Calculating SIP trunking costs

Expert Zeus Kerravala says SIP trunking's biggest advantage is cost savings. Learn how enterprises can take advantage of SIP trunking's cost benefits. Continue Reading

2Deploying-

Deploying SIP trunking

Before deploying SIP trunking, enterprises must understand the impact it will have on network bandwidth and be prepared for any challenges that may arise during deployment. Learn how to prepare for deployment, find the right SIP trunking provider for a smooth transition from the PSTN, and reap SIP trunking's benefits.

Tip

Calculating SIP's bandwidth needs

Learn how to determine the amount of VoIP bandwidth required to avoid latency for SIP trunk services, whether the trunks are deployed through a dedicated line or the Internet. Continue Reading

Tip

Finding the right SIP trunking provider

Not all SIP trunking providers are the same. In this tip, learn how to find the SIP trunking provider that meets your needs and how to enable SIP trunking in your legacy equipment. Continue Reading

Tutorial

Migrating from PSTN to SIP trunking

In this tutorial, learn the basics of migrating to SIP trunking, from finding a provider to building a networking team to ensure a smooth transition. Continue Reading

Tip

SIP trunking's mobility benefits

SIP trunking doesn't just support voice communication without the PSTN. It can also support fixed-mobile convergence. Continue Reading

Tip

Challenges of SIP trunking for network administrators

Migrating to SIP trunking isn't always easy. Network admins face many challenges, from interoperability issues to service availability. Continue Reading

3Securing-

Securing SIP trunking

Migrating from the PSTN to SIP trunking creates new security vulnerabilities for enterprises, from SIP floods to toll fraud. Enterprises must make sure the proper measures are in place to keep SIP trunks secure. Learn the security issues that impact SIP trunking and how to build a security checklist to mitigate security breaches.

Tip

Lock down your SIP trunks with a security checklist

The biggest security risk facing SIP trunking is toll fraud. Learn how to build a security checklist to keep your SIP trunks secure. Continue Reading

Answer

The difference between a SIP flood and a TDoS attack

SIP flood and telephony denial-of-service (TDoS) attacks have the same goal, but go about it in different ways. Learn how in this Ask the Expert response. Continue Reading

Feature

SIP management security

In this excerpt from Session Initiation Protocol (SIP): Controlling Convergent Networks, learn the steps network administrators can take to protect their networks from SIP-based attacks. Continue Reading

Feature

Ramp up SIP trunk security to protect your network

Learn how to mitigate attacks on your enterprise through a multi-tiered approach to SIP trunk security in this chapter excerpt. Continue Reading

Tip

Manage SIP trunking security to protect UC platforms

Deploying SIP trunking opens up new security vulnerabilities that didn't exist on the PSTN. Learn how to secure SIP trunks through methods like deploying session border controllers. Continue Reading

4Glossary-

SIP trunking terms to know

Deploying SIP trunking means enterprises and network administrations should know important communications terms. Learn the SIP trunking terms you need to know in our glossary.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCRM

SearchNetworking

SearchTelecom

SearchITChannel

Close