{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T13:22:59Z","timestamp":1648732979717},"reference-count":56,"publisher":"Elsevier","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1016\/b978-0-12-385514-5.00002-1","type":"book-chapter","created":{"date-parts":[[2011,3,4]],"date-time":"2011-03-04T09:32:37Z","timestamp":1299231157000},"page":"51-102","source":"Crossref","is-referenced-by-count":0,"title":["Phone-to-Phone Configuration for Internet Telephony"],"prefix":"10.1016","author":[{"given":"Yiu-Wing","family":"Leung","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"12","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0005","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1016\/j.comnet.2009.03.010","article-title":"VoIP: a comprehensive survey on a promising technology","volume":"53","author":"Karapantazis","year":"2009","journal-title":"Comput. Netw."},{"issue":"9","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0010","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1109\/JPROC.2004.832950","article-title":"Internet protocol support for telephony","volume":"92","author":"Maresca","year":"2004","journal-title":"Proc. IEEE"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0015","first-page":"106","article-title":"Comparative analysis of traditional telephone and voice-over-Internet protocol (VoIP) Systems","author":"Chong","year":"2004"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0020","unstructured":"IEEE Internet Computing, Special Issue on Internet Telephony 6(3) (May\/June 2002)"},{"issue":"9","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0025","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/JPROC.2002.802005","article-title":"Voice over Internet protocol (VoIP)","volume":"90","author":"Goode","year":"2002","journal-title":"Proc. IEEE"},{"issue":"4","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0030","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/TSMCC.2003.818499","article-title":"Creating value added services in Internet telephony: an overview and a case study on a high-level service creation environment","volume":"33","author":"Glitho","year":"2003","journal-title":"IEEE Trans. Syst. Man Cybern. C"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0035","unstructured":"Residential voice over IP subscribers to grow 7-fold to 267 million by 2012. Metrics 2.0\u2014Business and Market Intelligence, February 2007. Available from: http:\/\/www.metrics2.com\/blog\/2007\/02\/02\/residential_voice_over_ip_subscribers_to_grow_7fol.html"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0040","unstructured":"The mobile Internet report. Morgan Stanley Research Report, December 2009. Available from: http:\/\/www.morganstanley.com\/institutional\/techresearch\/mobile_internet_report122009.html"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0045","unstructured":"Enterprise VoIP market trend 2009\u20132012. Osterman Research Report (2009). Available from: http:\/\/www.ostermanresearch.com\/execsum\/or_voip2009execsum.pdf"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0050","unstructured":"Skype. Available from: http:\/\/www.skype.com"},{"issue":"2","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0055","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MNET.2010.5430143","article-title":"Could Skype be more satisfying? A QoE-centric study of the FEC mechanism in an Internet-scale VoIP system","volume":"24","author":"Huang","year":"2010","journal-title":"IEEE Netw."},{"issue":"2","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0060","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.comnet.2008.10.013","article-title":"Understanding Skype signaling","volume":"53","author":"Rossi","year":"2009","journal-title":"Comput. Netw."},{"issue":"3","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0065","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1109\/TAC.2010.2040502","article-title":"A mathematical model of the Skype VoIP congestion control algorithm","volume":"55","author":"Cicco","year":"2010","journal-title":"IEEE Trans. Automatic Control"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0070","series-title":"An analysis of the Skype peer-to-peer Internet telephony protocol","author":"Baset","year":"2006"},{"issue":"1","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0075","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/TMM.2008.2008927","article-title":"Detailed analysis of Skype traffic","volume":"11","author":"Bonfiglio","year":"2009","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0080","series-title":"Tracking Skype VoIP calls over the Internet","author":"Sengar","year":"2010"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0085","series-title":"Analysis and evaluation of the Skype and Google-Talk VoIP systems","first-page":"2153","author":"Sat","year":"2006"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0090","unstructured":"Internet usage statistics: the Internet big picture. Available from: http:\/\/www.internetworldstats.com\/stats.htm, 2003 (accessed 30-06-2010)"},{"issue":"1","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0095","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/LCOMM.2005.1375250","article-title":"Shared packet loss recovery for Internet telephony","volume":"9","author":"Leung","year":"2005","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0100","first-page":"1809","article-title":"Lightweight piggybacking for packet loss recovery in Internet telephony","author":"Chow","year":"2007"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0105","series-title":"Architecture and design of an enhanced H.323 VoIP gateway","author":"Dagiuklas","year":"2002"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0110","series-title":"Scalable VoIP gateway","first-page":"1606","author":"Amin","year":"2007"},{"issue":"1","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0115","first-page":"173","article-title":"The methods and the feasibility of frame grouping in Internet telephony","volume":"85","author":"Kim","year":"2002","journal-title":"IEICE Trans. Commun."},{"issue":"5","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0120","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/4234.1001663","article-title":"Measurement-based multi-call voice frame grouping in Internet telephony","volume":"6","author":"Kim","year":"2002","journal-title":"IEEE Commun. Lett."},{"issue":"7","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0125","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1109\/JSAC.2002.802064","article-title":"A multiplexing scheme for H.323 voice-over-IP applications","volume":"20","author":"Sze","year":"2002","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0130","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.1093\/ietcom\/e91-b.5.1370","article-title":"An efficient shared adaptive packet loss concealment scheme through 1-port gateway system for Internet telephony service","volume":"91","author":"Kim","year":"2008","journal-title":"IEICE Trans. Commun."},{"issue":"18","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0135","doi-asserted-by":"crossref","first-page":"3710","DOI":"10.1016\/j.comcom.2006.06.019","article-title":"Dynamic bandwidth allocation for Internet telephony","volume":"29","author":"Leung","year":"2006","journal-title":"Comput. Commun."},{"issue":"12","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0140","doi-asserted-by":"crossref","first-page":"2432","DOI":"10.1016\/j.comnet.2008.05.001","article-title":"Assessing the risk of intercepting VoIP calls","volume":"52","author":"Benini","year":"2008","journal-title":"Comput. Netw."},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0145","first-page":"200","article-title":"Securing voice over Internet protocol","volume":"2","author":"Ghafarian","year":"2007","journal-title":"J. Inf. Assur. Secur."},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0150","unstructured":"D.H. Lee, J.G. Kim, Voice over Internet protocol gateway and a method for controlling the same, U.S. Patent, Patent No: US 7, 376, 124 B2, 20 May 2008"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0155","unstructured":"H. Hagirahim, F. Waldman, Method and apparatus for providing efficient VoIP gateway-to-gateway communication, U.S. Patent, Patent No.: US 7, 330, 460 B1, 12 February 2008"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0160","series-title":"Traffic control mechanism for VoIP gateway","first-page":"1235","author":"Amin","year":"2007"},{"issue":"2","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0165","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1093\/ietcom\/E88-B.2.766","article-title":"An adaptive routing method for VoIP gateways based on packet delay information","volume":"E88-B","author":"Jo","year":"2005","journal-title":"IEICE Trans. Commun."},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0170","unstructured":"Gizmo5. Available from: http:\/\/gizmo5.com"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0175","series-title":"Signaling protocols for Internet telephony","author":"Beijar","year":"1998"},{"issue":"2","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0180","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/COMST.2003.5341337","article-title":"Service architectures in H.323 and SIP: a comparison","volume":"5","author":"Glasmann","year":"2003","journal-title":"IEEE Commun. Surv."},{"issue":"5","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0185","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/65.730750","article-title":"A survey of packet loss recovery techniques for streaming audio","volume":"12","author":"Perkins","year":"1998","journal-title":"IEEE Netw."},{"issue":"1","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0190","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.comnet.2009.09.007","article-title":"Sparse telephone gateway for Internet telephony","volume":"54","author":"Leung","year":"2010","journal-title":"Comput. Netw."},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0195","series-title":"Computer Networking: A Top-Down Approach","author":"Kurose","year":"2008"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0200","series-title":"Reliable audio for use over the Internet","author":"Hardman","year":"1995"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0205","series-title":"Facility Location: Applications and Theory","year":"2002"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0210","series-title":"Introduction to Operations Research","author":"Hillier","year":"2005"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0215","series-title":"A gateway placement algorithm in wireless mesh networks","author":"Zhou","year":"2007"},{"issue":"6","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0220","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1023\/A:1019263308849","article-title":"Optimum positioning of base stations for cellular radio networks","volume":"6","author":"Mathar","year":"2000","journal-title":"Wireless Netw."},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0225","series-title":"Video-on-demand server selection and placement","first-page":"18","author":"Thouin","year":"2007"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0230","series-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0235","unstructured":"Free Phone. Available from: http:\/\/www-sop.inria.fr\/rodeo\/fphone\/"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0240","unstructured":"Robust Audio Tools. Available from: http:\/\/www-mice.cs.ucl.ac.uk\/multimedia\/software\/rat"},{"issue":"2","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0245","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/263876.263881","article-title":"Effective erasure codes for reliable computer communication protocols","volume":"27","author":"Rizzo","year":"1997","journal-title":"ACM Comput. Commun. Rev."},{"issue":"3","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0250","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/6046.944479","article-title":"An adaptive redundancy control method for erasure-code based real-time data transmission over the Internet","volume":"3","author":"Yuk","year":"2001","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0255","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/TIP.2005.860353","article-title":"Rate-distortion optimized hybrid error control for packetized video communications","volume":"15","author":"Zhai","year":"2006","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0260","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TMM.2005.864340","article-title":"Video loss recovery with FEC and stream replication","volume":"8","author":"Chan","year":"2006","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/B978-0-12-385514-5.00002-1_bb0265","unstructured":"G. M. Schuster, J. Mahler, I. Sidhu, M. Borella, Forward error correction system for packet based real time media, United States Patent, Patent No. 6, 145, 109, 7 November 2000"},{"issue":"4","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0270","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1109\/TMM.2005.846782","article-title":"An unequal packet loss resilience scheme for video over the Internet","volume":"7","author":"Yang","year":"2005","journal-title":"IEEE Trans. Multimedia"},{"issue":"10","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0275","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1109\/TMC.2008.42","article-title":"Adaptive FEC-based packet loss resilience scheme for supporting voice communication over ad hoc wireless networks","volume":"7","author":"Gandikota","year":"2008","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"3","key":"10.1016\/B978-0-12-385514-5.00002-1_bb0280","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/4234.913158","article-title":"A packet-loss-recovery scheme for continuous-media streaming over the Internet","volume":"5","author":"Sze","year":"2001","journal-title":"IEEE Commun. Lett."}],"container-title":["Advances in Computers"],"original-title":[],"deposited":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T12:21:24Z","timestamp":1543926084000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780123855145000021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-385514-5.00002-1","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]}}}