Goantifraud
STUN Protocol in VoIP Telephony
STUN Protocol in VoIP Telephony
28-Sep-2016 13:54

STUN Protocol in VoIP Telephony

Current routers with voip have built-in STUN. Because of this they can effectively bypass the NAT mechanisms. STUN abbreviation can be deciphered as Simple Traversal of UDP through NATs, which means "easy circumvention of UDP through NAT".

This protocol helps to route packets of devices that are outside the NAT. This is a very useful thing, but at the same time, it is not a panacea for all the problems that are related to NAT firewalls.

Operating principle

Many protocols use UDP-packages when sending voice traffic and text or graphical content over IP-networks. However, when the two devices involved in the transmission of data do not fall into the action zone of NAT, it is impossible to establish a connection between them in a standard way. These are situations when STUN is of help.

It is a client-server Internet Protocol. It works based on the interaction of STUN-client (the object that generates requests) and a STUN-server (the object that receives requests and sends responses). The client sends a request to the STUN-server. The latter sends information on the NAT firewall address, as well as on which port is currently open for requests in the IP- network. In addition, data on the type of broadcast address are sent.

Are you interested in VoIP technology? Are you looking for a reliable start-up in the telecommunications sector? You will be interested in the opportunity to start a GSM termination business. You can get the maximum profit making the minimal investment! We offer a turnkey GoAntiFraud
solution for beginners , which includes opportunities for efficient VoIP termination, as well as a set of equipment by GoIP, EjoinTech & China Skyline at low cost.

Different firewalls/routers process UDP packages in various ways. The STUN protocol usually works with four types of NAT:

  • Full Cone;
  • Symmetric;
  • Adress Restricted;
  • Port Restricted.

How the connection is established

The client and the server are connected via TCP / UDP of the port 3478. At the same time, the STUN proposes that the client check another address and port number (as STUN is tied directly to the two IP-addresses). Usually, selection of ports and addresses occur in any mode. The protocol often uses DNS SRV records to locate STUN servers connected to the domain.

Currently, VoIP devices have no universal support by the STUN protocol. Since 2015, it is provided by default, but it is not available in the outdated devices.

This VoIP protocol has some disadvantages. For example, ite cannot properly work in IP- networks, which use Symmetric NAT, since the latter is constantly creating new addresses and ports when an internal host is trying to connect to an external voip gateway.

GoAntiFraud offers you to start a profitable GSM termination business ! If you are interested in VoIP technology, we will help you start your own business, yielding a stable income. By purchasing our comprehensive New Business package, you will start making money immediately! We will give you full technical support at all stages of business.
Start UP - $2000
If you purchase the START UP package, you can get equipment at wholesale prices. Read more...
DeLuxe - $4260
By purchasing the DELUXE package, you get equipment at wholesale prices. Read more...
DeLuxe Plus - $6280
By purchasing the DELUXE package, you get equipment at wholesale prices. Read more...
Ultimate - $7920
You are welcome to buy the ULTIMA package and get your equipment at wholesale prices. Read more...

Get free business advice

Get Consultation

Related Articles

GoAntiFraud

Topex SIM-boxes: Difficulty of Settings

26 Aug 2016 14:49
The equipment from the Romanian manufacturer Topex gained popularity almost on par with GoIP products. The devices of this brand are widely used for GSM voice traffic termination; the only limiting factor for some businesses is the higher cost of Topex equipment, compared with that of GOIP. The mode...
GoAntiFraud

Software and Hardware for GSM Termination. Important Tips

17 Jun 2016 08:41
The productivity of your VoIP-system depends on the choice of hardware and software, which means - the volume of spent traffic. Terminator must understand that the hardware and software for GSM termination are closely interlinked, and it is important to take into account this relationship for a prof...
GoAntiFraud

Repeaters to Amplify GSM Signals

02 Aug 2016 13:42
It is known that the terminator should provide a high quality of the route to sell it profitably. The route will be in demand among the originators only if the ACD and ASR performance are up to par. These figures describe the number of successful calls, that is, those that last for more than 0 secon...
GoAntiFraud

Substitution of IMEI in Dinstar GSM Gateways

26 Sep 2016 08:49
Substitution of IMEI (unique identification number of the device) allows the terminator to successfully get past AntiFraud systems. If the GSM gateway does not perform this function, your service provider ill suspect the use of numerous SIM-cards under the same IMEI. After all, the real user cann...
GoAntiFraud

Setting up Remote IP-phones, Softphones for 3CX

21 Sep 2016 13:39
The need to remotely set up routers, ip telephones and softphones arises when you have to connect remote users to an IP PBX 3CX. Thus, it is possible to combine multiple company branch offices in a single corporate VoIP network, and also to provide communication with freelancers working at home. ...
GoAntiFraud

China Skyline Equipment for Efficient VoIP-termination

27 May 2016 11:24
To start a new business project and make it profitable is not that difficult task if you understand what the industry is the most resistant to economic crisis. To date, the telecommunications market is this area. Mobile GSM communication and VoIP are one of the most profitable and fastest growing bu...
GoAntiFraud

The Use of SIM-banks in the VoIP GSM Termination

07 Jun 2016 09:22
The GSM termination of voice traffic is difficult to carry out without the appropriate equipment. In addition to VoIP gateways, so-called SIM-banks or SIM-boxes intended for the storage of large quantities of SIM-cards are used. Their use is especially important to those terminators, who provide lar...

GoAntiFraud

GoAntiFraud
GoAntiFraud
GoAntiFraud
GoAntiFraud
GoAntiFraud
GoAntiFraud
GoAntiFraud
GoAntiFraud
GoAntiFraud
GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud