Voice over Internet Protocol (Voice over IP, VoIP) is a family of technologies, methodologies, communication protocols, and transmission techniques for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIP are ''IP telephony'', ''Internet telephony'', ''voice over broadband'' (VoBB), ''broadband telephony'', and ''broadband phone''.
''Internet telephony'' refers to communications services—Voice, fax, SMS, and/or voice-messaging applications—that are transported via the Internet, rather than the public switched telephone network (PSTN). The steps involved in originating a VoIP telephone call are signaling and media channel setup, digitization of the analog voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog conversion reproduce the original voice stream. Even though IP Telephony and VoIP are terms that are used interchangeably, they are actually different; IP telephony has to do with digital telephony systems that use IP protocols for voice communication while VoIP is actually a subset of IP Telephony. VoIP is a technology used by IP telephony as a means of transporting phone calls.
VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. The codec used is varied between different implementations of VoIP (and often a range of codecs are used); some implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs.
There are three types of VoIP tools that are commonly used; IP Phones, Software VoIP and Mobile and Integrated VoIP. The IP Phones are the most institutionally established but still the least obvious of the VoIP tools. The use of software VoIP has increased during the global recession of 2008-2010, as many persons, looking for ways to cut costs have turned to these tools for free or inexpensive calling or video conferencing applications. Software VoIP can be further broken down into three classes or subcategories; Web Calling, Voice and Video Instant Messaging and Web Conferencing. Mobile and Integrated VoIP is just another example of the adaptability of VoIP. VoIP is available on many smartphones and internet devices so even the users of portable devices that are not phones can still make calls or send SMS text messages over 3G or WIFI.
The H.323 protocol was one of the first VoIP protocols that found widespread implementation for long-distance traffic, as well as local area network services. However, since the development of newer, less complex protocols, such as MGCP and SIP, H.323 deployments are increasingly limited to carrying existing long-haul network traffic. In particular, the Session Initiation Protocol (SIP) has gained widespread VoIP market penetration.
A notable proprietary implementation is the Skype protocol, which is in part based on the principles of Peer-to-Peer (P2P) networking.
A VoIP phone is necessary to connect to a VoIP service provider. This can be implemented in several ways:
Smartphones and Wi-Fi enabled mobile phones may have SIP clients built into the firmware or available as an application download.
VoIP solutions aimed at businesses have evolved into "unified communications" services that treat all communications—phone calls, faxes, voice mail, e-mail, Web conferences and more—as discrete units that can all be delivered via any means and to any handset, including cellphones. Two kinds of competitors are competing in this space: one set is focused on VoIP for medium to large enterprises, while another is targeting the small-to-medium business (SMB) market.
VoIP allows both voice and data communications to be run over a single network, which can significantly reduce infrastructure costs.
The prices of extensions on VoIP are lower than for PBX and key systems. VoIP switches may run on commodity hardware, such as PCs or Linux systems. Rather than closed architectures, these devices rely on standard interfaces.
VoIP devices have simple, intuitive user interfaces, so users can often make simple system configuration changes. Dual-mode cellphones enable users to continue their conversations as they move between an outside cellular service and an internal Wi-Fi network, so that it is no longer necessary to carry both a desktop phone and a cellphone. Maintenance becomes simpler as there are fewer devices to oversee.
Skype, which originally marketed itself as a service among friends, has begun to cater to businesses, providing free-of-charge connections between any users on the Skype network and connecting to and from ordinary PSTN telephones for a charge.
In the United States the Social Security Administration (SSA) is converting its field offices of 63,000 workers from traditional phone installations to a VoIP infrastructure carried over its existing data network.
By default, network routers handle traffic on a first-come, first-served basis. Network routers on high volume traffic links may introduce latency that exceeds permissible thresholds for VoIP. Fixed delays cannot be controlled, as they are caused by the physical distance the packets travel; however, latency can be minimized by marking voice packets as being delay-sensitive with methods such as DiffServ.
A VoIP packet usually has to wait for the current packet to finish transmission, although it is possible to preempt (abort) a less important packet in mid-transmission, although this is not commonly done, especially on high-speed links where transmission times are short even for maximum-sized packets. An alternative to preemption on slower links, such as dialup and DSL, is to reduce the maximum transmission time by reducing the maximum transmission unit. But every packet must contain protocol headers, so this increases relative header overhead on every link along the user's Internet paths, not just the bottleneck (usually Internet access) link.
ADSL modems provide Ethernet (or Ethernet over USB) connections to local equipment, but inside they are actually Asynchronous Transfer Mode (ATM) modems. They use ATM Adaptation Layer 5 (AAL5) to segment each Ethernet packet into a series of 53-byte ATM cells for transmission and reassemble them back into Ethernet packets at the receiver. A virtual circuit identifier (VCI) is part of the 5-byte header on every ATM cell, so the transmitter can multiplex the active virtual circuits (VCs) in any arbitrary order. Cells from the ''same'' VC are always sent sequentially.
However, the great majority of DSL providers use only one VC for each customer, even those with bundled VoIP service. Every Ethernet packet must be completely transmitted before another can begin. If a second PVC were established, given high priority and reserved for VoIP, then a low priority data packet could be suspended in mid-transmission and a VoIP packet sent right away on the high priority VC. Then the link would pick up the low priority VC where it left off. Because ATM links are multiplexed on a cell-by-cell basis, a high priority packet would have to wait at most 53 byte times to begin transmission. There would be no need to reduce the interface MTU and accept the resulting increase in higher layer protocol overhead, and no need to abort a low priority packet and resend it later.
ATM has substantial header overhead: 5/53 = 9.4%, roughly twice the total header overhead of a 1500 byte TCP/IP Ethernet packet (with TCP timestamps). This "ATM tax" is incurred by every DSL user whether or not he takes advantage of multiple virtual circuits - and few can.
ATM's potential for latency reduction is greatest on slow links, because worst-case latency decreases with increasing link speed. A full-size (1500 byte) Ethernet frame takes 94 ms to transmit at 128 kb/s but only 8 ms at 1.5 Mb/s. If this is the bottleneck link, this latency is probably small enough to ensure good VoIP performance without MTU reductions or multiple ATM PVCs. The latest generations of DSL, VDSL and VDSL2, carry Ethernet without intermediate ATM/AAL5 layers, and they generally support IEEE 802.1p priority tagging so that VoIP can be queued ahead of less time-critical traffic.
Voice, and all other data, travels in packets over IP networks with fixed maximum capacity. This system may be more prone to congestion and DoS attacks than traditional circuit switched systems; a circuit switched system of insufficient capacity will refuse new connections while carrying the remainder without impairment, while the quality of real-time data such as telephone conversations on packet-switched networks degrades dramatically.
Fixed delays cannot be controlled as they are caused by the physical distance the packets travel. They are especially problematic when satellite circuits are involved because of the long distance to a geostationary satellite and back; delays of 400–600 ms are typical.
When the load on a link grows so quickly that its switches experience queue overflows, congestion results and data packets are lost. This signals a transport protocol like TCP to reduce its transmission rate to alleviate the congestion. But VoIP usually uses UDP not TCP because recovering from congestion through retransmission usually entails too much latency. So QoS mechanisms can avoid the undesirable loss of VoIP packets by immediately transmitting them ahead of any queued bulk traffic on the same link, even when that bulk traffic queue is overflowing.
The receiver must resequence IP packets that arrive out of order and recover gracefully when packets arrive too late or not at all. Jitter results from the rapid and random (i.e., unpredictable) changes in queue lengths along a given Internet path due to competition from other users for the same transmission links. VoIP receivers counter jitter by storing incoming packets briefly in a "de-jitter" or "playout" buffer, deliberately increasing latency to improve the chance that each packet will be on hand when it is time for the voice engine to play it. The added delay is thus a compromise between excessive latency and excessive dropout, i.e., momentary audio interruptions.
Although jitter is a random variable, it is the sum of several other random variables that are at least somewhat independent: the individual queuing delays of the routers along the Internet path in question. Thus according to the central limit theorem, we can model jitter as a gaussian random variable. This suggests continually estimating the mean delay and its standard deviation and setting the playout delay so that only packets delayed more than several standard deviations above the mean will arrive too late to be useful. In practice, however, the variance in latency of many Internet paths is dominated by a small number (often one) of relatively slow and congested "bottleneck" links. Most Internet backbone links are now so fast (e.g. 10 Gb/s) that their delays are dominated by the transmission medium (e.g. optical fiber) and the routers driving them do not have enough buffering for queuing delays to be significant.
It has been suggested to rely on the packetized nature of media in VoIP communications and transmit the stream of packets from the source phone to the destination phone simultaneously across different routes (multi-path routing). In such a way, temporary failures have less impact on the communication quality. In capillary routing it has been suggested to use at the packet level Fountain codes or particularly raptor codes for transmitting extra redundant packets making the communication more reliable.
A number of protocols have been defined to support the reporting of QoS/QoE for VoIP calls. These include RTCP Extended Report (RFC 3611), SIP RTCP Summary Reports, H.460.9 Annex B (for H.323), H.248.30 and MGCP extensions. The RFC 3611 VoIP Metrics block is generated by an IP phone or gateway during a live call and contains information on packet loss rate, packet discard rate (because of jitter), packet loss/discard burst metrics (burst length/density, gap length/density), network delay, end system delay, signal / noise / echo level, Mean Opinion Scores (MOS) and R factors and configuration information related to the jitter buffer.
RFC 3611 VoIP metrics reports are exchanged between IP endpoints on an occasional basis during a call, and an end of call message sent via SIP RTCP Summary Report or one of the other signaling protocol extensions. RFC 3611 VoIP metrics reports are intended to support real time feedback related to QoS problems, the exchange of information between the endpoints for improved call quality calculation and a variety of other applications.
IP Phones and VoIP telephone adapters connect to routers or cable modems which typically depend on the availability of mains electricity or locally generated power. Some VoIP service providers use customer premise equipment (e.g., cablemodems) with battery-backed power supplies to assure uninterrupted service for up to several hours in case of local power failures. Such battery-backed devices typically are designed for use with analog handsets.
Some VoIP service providers implement services to route calls to other telephone services of the subscriber, such a cellular phone, in the event that the customer's network device is inaccessible to terminate the call.
The susceptibility of phone service to power failures is a common problem even with traditional analog service in areas where many customers purchase modern telephone units that operate with wireless handsets to a base station, or that have other modern phone features, such as built-in voicemail or phone book features.
A fixed line phone has a direct relationship between a telephone number and a physical location. If an emergency call comes from that number, then the physical location is known.
In the IP world, it is not so simple. A broadband provider may know the location where the wires terminate, but this does not necessarily allow the mapping of an IP address to that location. IP addresses are often dynamically assigned, so the ISP may allocate an address for online access, or at the time a broadband router is engaged. The ISP recognizes individual IP addresses, but does not necessarily know to which physical location it corresponds. The broadband service provider knows the physical location, but is not necessarily tracking the IP addresses in use.
There are more complications since IP allows a great deal of mobility. For example, a broadband connection can be used to dial a virtual private network that is employer-owned. When this is done, the IP address being used will belong to the range of the employer, rather than the address of the ISP, so this could be many kilometres away or even in another country. To provide another example: if mobile data is used, e.g., a 3G mobile handset or USB wireless broadband adapter, then the IP address has no relationship with any physical location, since a mobile user could be anywhere that there is network coverage, even roaming via another cellular company.
In short, there is no relationship between IP address and physical location, so the address itself reveals no useful information for the emergency services.
At the VoIP level, a phone or gateway may identify itself with a SIP registrar by using a username and password. So in this case, the Internet Telephony Service Provider (ITSP) knows that a particular user is online, and can relate a specific telephone number to the user. However, it does not recognize how that IP traffic was engaged. Since the IP address itself does not necessarily provide location information presently, today a "best efforts" approach is to use an available database to find that user and the physical address the user chose to associate with that telephone number—clearly an imperfect solution.
VoIP Enhanced 911 (E911) is a method by which VoIP providers in the United States support emergency services. The VoIP E911 emergency-calling system associates a physical address with the calling party's telephone number as required by the Wireless Communications and Public Safety Act of 1999. All VoIP providers that provide access to the public switched telephone network are required to implement E911, a service for which the subscriber may be charged. Participation in E911 is not required and customers may opt-out of E911 service.
One shortcoming of VoIP E911 is that the emergency system is based on a static table lookup. Unlike in cellular phones, where the location of an E911 call can be traced using Assisted GPS or other methods, the VoIP E911 information is only accurate so long as subscribers are diligent in keeping their emergency address information up-to-date. In the United States, the Wireless Communications and Public Safety Act of 1999 leaves the burden of responsibility upon the subscribers and not the service providers to keep their emergency information up to date.
A voice call originating in the VoIP environment also faces challenges to reach its destination if the number is routed to a mobile phone number on a traditional mobile carrier. VoIP has been identified in the past as a Least Cost Routing (LCR) system, which is based on checking the destination of each telephone call as it is made, and then sending the call via the network that will cost the customer the least. This rating is subject to some debate given the complexity of call routing created by number portability. With GSM number portability now in place, LCR providers can no longer rely on using the network root prefix to determine how to route a call. Instead, they must now determine the actual network of every number before routing the call.
Therefore, VoIP solutions also need to handle MNP when routing a voice call. In countries without a central database, like the UK, it might be necessary to query the GSM network about which home network a mobile phone number belongs to. As the popularity of VoIP increases in the enterprise markets because of least cost routing options, it needs to provide a certain level of reliability when handling calls.
MNP checks are important to assure that this quality of service is met. By handling MNP lookups before routing a call and by assuring that the voice call will actually work, VoIP service providers are able to offer business subscribers the level of reliability they require.
Echo can also be an issue for PSTN integration. Common causes of echo include impedance mismatches in analog circuitry and acoustic coupling of the transmit and receive signal at the receiving end.
Another challenge is routing VoIP traffic through firewalls and network address translators. Private Session Border Controllers are used along with firewalls to enable VoIP calls to and from protected networks. For example, Skype uses a proprietary protocol to route calls through other Skype peers on the network, allowing it to traverse symmetric NATs and firewalls. Other methods to traverse NATs involve using protocols such as STUN or Interactive Connectivity Establishment (ICE).
Many consumer VoIP solutions do not support encryption, although having a secure phone is much easier to implement with VoIP than traditional phone lines. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content. An attacker with a packet sniffer could intercept your VoIP calls if you are not on a secure VLAN. However, physical security of the switches within an enterprise and the facility security provided by ISPs make packet capture less of a problem than originally foreseen. Further research has shown that tapping into a fiber optic network without detection is difficult if not impossible. This means that once a voice packet is within the internet backbone it is relatively safe from interception.
There are open source solutions, such as Wireshark, that facilitate sniffing of VoIP conversations. A modicum of security is afforded by patented audio codecs in proprietary implementations that are not easily available for open source applications; however, such security through obscurity has not proven effective in other fields. Some vendors also use compression, which may make eavesdropping more difficult. However, real security requires encryption and cryptographic authentication which are not widely supported at a consumer level. The existing security standard Secure Real-time Transport Protocol (SRTP) and the new ZRTP protocol are available on Analog Telephone Adapters (ATAs) as well as various softphones. It is possible to use IPsec to secure P2P VoIP by using opportunistic encryption. Skype does not use SRTP, but uses encryption which is transparent to the Skype provider. In 2005, Skype invited a researcher, Dr Tom Berson, to assess the security of the Skype software, and his conclusions are available in a published report.
Many VoIP carriers allow callers to configure arbitrary Caller ID information, thus permitting spoofing attacks. Business grade VoIP equipment and software often makes it easy to modify caller ID information, providing many businesses great flexibility.
The Truth in Caller ID Act has been in preparation in the US Congress since 2006, but as of January 2009 still has not been enacted. This bill proposes to make it a crime in the United States to "''knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value ...''"
The T.38 protocol is designed to compensate for the differences between traditional packet-less communications over analog lines and packet based transmissions which are the basis for IP communications. The fax machine could be a traditional fax machine connected to the PSTN, or an ATA box (or similar). It could be a fax machine with an RJ-45 connector plugged straight into an IP network, or it could be a computer pretending to be a fax machine. Originally, T.38 was designed to use UDP and TCP transmission methods across an IP network. TCP is better suited for use between two IP devices. However, older fax machines, connected to an analog system, benefit from UDP near real-time characteristics due to the "no recovery rule" when a UDP packet is lost or an error occurs during transmission. UDP transmissions are preferred as they do not require testing for dropped packets and as such since each T.38 packet transmission includes a majority of the data sent in the prior packet, a T.38 termination point has a higher degree of success in re-assembling the fax transmission back into its original form for interpretation by the end device. This in an attempt to overcome the obstacles of simulating real time transmissions using packet based protocol.
There have been updated versions of T.30 to resolve the fax over IP issues, which is the core fax protocol. Some newer high end fax machines have T.38 built-in capabilities which allow the user to plug right into the network and transmit/receive faxes in native T.38 like the Ricoh 4410NF Fax Machine. A unique feature of T.38 is that each packet contains a portion of the main data sent in the previous packet. With T.38, two successive lost packets are needed to actually lose any data. The data you lose will only be a small piece, but with the right settings and error correction mode, there is an increased likelihood that you will receive enough of the transmission to satisfy the requirements of the fax machine for output of the sent document.
These types of calls sometimes complete without any problems, but in other cases they fail. If VoIP and cellular substitution becomes very popular, some ancillary equipment makers may be forced to redesign equipment, because it would no longer be possible to assume a conventional PSTN telephone line would be available in consumer's homes.
Another legal issue that the US Congress is debating concerns changes to the Foreign Intelligence Surveillance Act. The issue in question is calls between Americans and foreigners. The National Security Agency (NSA) is not authorized to tap Americans' conversations without a warrant—but the Internet, and specifically VoIP does not draw as clear a line to the location of a caller or a call's recipient as the traditional phone system does. As VoIP's low cost and flexibility convinces more and more organizations to adopt the technology, the surveillance for law enforcement agencies becomes more difficult. VoIP technology has also increased security concerns because VoIP and similar technologies have made it more difficult for the government to determine where a target is physically located when communications are being intercepted, and that creates a whole set of new legal challenges.
In the US, the Federal Communications Commission now requires all interconnected VoIP service providers to comply with requirements comparable to those for traditional telecommunications service providers. VoIP operators in the US are required to support local number portability; make service accessible to people with disabilities; pay regulatory fees, universal service contributions, and other mandated payments; and enable law enforcement authorities to conduct surveillance pursuant to the Communications Assistance for Law Enforcement Act (CALEA). "Interconnected" VoIP operators also must provide Enhanced 911 service, disclose any limitations on their E-911 functionality to their consumers, and obtain affirmative acknowledgements of these disclosures from all consumers. VoIP operators also receive the benefit of certain US telecommunications regulations, including an entitlement to interconnection and exchange of traffic with incumbent local exchange carriers via wholesale carriers. Providers of "nomadic" VoIP service—those who are unable to determine the location of their users—are exempt from state telecommunications regulation.
Throughout the developing world, countries where regulation is weak or captured by the dominant operator, restrictions on the use of VoIP are imposed, including in Panama where VoIP is taxed, Guyana where VoIP is prohibited and India where its retail commercial sales is allowed but only for long distance service. In Ethiopia, where the government is monopolizing telecommunication service, it is a criminal offense to offer services using VoIP. The country has installed firewalls to prevent international calls being made using VoIP. These measures were taken after the popularity of VoIP reduced the income generated by the state owned telecommunication company.
In the European Union, the treatment of VoIP service providers is a decision for each Member State's national telecoms regulator, which must use competition law to define relevant national markets and then determine whether any service provider on those national markets has "significant market power" (and so should be subject to certain obligations). A general distinction is usually made between VoIP services that function over managed networks (via broadband connections) and VoIP services that function over unmanaged networks (essentially, the Internet).
VoIP services that function over managed networks are often considered to be a viable substitute for PSTN telephone services (despite the problems of power outages and lack of geographical information); as a result, major operators that provide these services (in practice, incumbent operators) may find themselves bound by obligations of price control or accounting separation.
VoIP services that function over unmanaged networks are often considered to be too poor in quality to be a viable substitute for PSTN services; as a result, they may be provided without any specific obligations, even if a service provider has "significant market power".
The relevant EU Directive is not clearly drafted concerning obligations which can exist independently of market power (e.g., the obligation to offer access to emergency calls), and it is impossible to say definitively whether VoIP service providers of either type are bound by them. A review of the EU Directive is under way and should be complete by 2007.
In India, it is legal to use VoIP, but it is illegal to have VoIP gateways inside India. This effectively means that people who have PCs can use them to make a VoIP call to any number, but if the remote side is a normal phone, the gateway that converts the VoIP call to a POTS call should not be inside India.
In the UAE and Oman it is illegal to use any form of VoIP, to the extent that Web sites of Skype and Gizmo5 are blocked. Providing or using VoIP services is illegal in Oman. Those who violate the law stand to be fined 50,000 Omani Rial (about 130,317 US dollars) or spend two years in jail or both. In 2009, police in Oman have raided 121 internet cafes throughout the country and arrested 212 people for using/providing VoIP services.
In the Republic of Korea, only providers registered with the government are authorized to offer VoIP services. Unlike many VoIP providers, most of whom offer flat rates, Korean VoIP services are generally metered and charged at rates similar to terrestrial calling. Foreign VoIP providers encounter high barriers to government registration. This issue came to a head in 2006 when Internet service providers providing personal Internet services by contract to United States Forces Korea members residing on USFK bases threatened to block off access to VoIP services used by USFK members as an economical way to keep in contact with their families in the United States, on the grounds that the service members' VoIP providers were not registered. A compromise was reached between USFK and Korean telecommunications officials in January 2007, wherein USFK service members arriving in Korea before June 1, 2007, and subscribing to the ISP services provided on base may continue to use their US-based VoIP subscription, but later arrivals must use a Korean-based VoIP provider, which by contract will offer pricing similar to the flat rates offered by US VoIP providers.
Category:Broadband Category:Voice over IP Category:Telecommunications terms Category:Videotelephony Category:Audio network protocols
af:Stem oor IP ar:الصوت عبر الإنترنت az:İP telefoniya bs:Voice over Internet Protocol bg:Интернет телефония ca:Veu sobre IP cs:Voice over Internet Protocol da:VoIP de:IP-Telefonie et:Internetitelefon es:Voz sobre Protocolo de Internet eo:Interreta telefono eu:VoIP fa:صدا روی پروتکل اینترنت fr:Voix sur IP ga:VoIP gl:VoIP ko:음성 인터넷 프로토콜 hi:वॉइस ओवर इण्टरनेट प्रोटोकॉल hr:VoIP id:Voice over IP it:Voice over IP he:VoIP kn:ಅಂತರ್ಜಾಲ ಆಧಾರಿತ ಕರೆ ಪ್ರೋಟೋಕಾಲ್ kk:IP-телефония lo:VoIP lv:IP balss pārraide lt:IP telefonija lmo:Vus sura IP hu:Voice over IP mk:Voice over IP ml:വോയിസ് ഓവർ ഇന്റർനെറ്റ് പ്രോട്ടോക്കോൾ ms:Suara melalui Protokol Internet my:ဗွီအိုအိုင်ပီ nl:IP-telefonie ja:VoIP no:Voice over IP pms:Telefonìa IP pl:Voice over Internet Protocol pt:Voz sobre IP ro:Voce peste IP ru:VoIP sq:VoIP simple:Voice over Internet Protocol si:අන්තර්ජාල ප්රොටෝකෝලය හරහා කටහඬ sk:Voice over Internet Protocol sl:VoIP telefonija so:VOIP sr:ВоИП fi:VoIP sv:IP-telefoni ta:இணையவழி ஒலி பரிமாற்றம் th:วีโอไอพี tr:VoIP uk:VoIP ur:آواز بدوش جالبینی دستور vec:Telefono VoIP vi:VoIP yi:VoIP zh:IP电话This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
name | Don LaFontaine |
---|---|
birth name | Donald Leroy LaFontaine |
birth date | August 26, 1940 |
birth place | Duluth, Minnesota, U.S. |
death date | September 01, 2008 |
death place | Los Angeles, California, U.S. |
death cause | Pneumothorax |
nationality | American |
occupation | Voice actor |
years active | 1962–2008 |
spouse | Joan Studva (1967–1988)Nita Whitaker (1989–2008) |
children | Christine LaFontaine (age 40)Skye LaFontaine (age 20)Elyse LaFontaine (age 16) |
website | http://www.donlafontaine.com/ }} |
Donald Leroy "Don" LaFontaine (August 26, 1940 – September 1, 2008) was an American voiceover artist famous for recording more than 5,000 film trailers and hundreds of thousands of television advertisements, network promotions, and video game trailers. His nicknames included "Thunder Throat" and "The Voice of God". He became identified with the phrase "In a world…", which has been used in movie trailers so frequently that it has become a cliché. He parodied his career several times, most recently in commercials for GEICO insurance and the Mega Millions lottery game.
While working on the 1964 western ''Gunfighters of Casa Grande'', LaFontaine had to fill in for an unavailable voice actor in order to have something to present to MGM. After MGM bought the spots, LaFontaine began a career as a voiceover artist.
He became the head of Kaleidoscope Films Ltd., a major movie trailer producer before starting his own company, Don LaFontaine Associates, in 1976. Shortly thereafter, he was hired by Paramount to do their trailers, and was eventually promoted to a vice president. However, he decided to get back into trailer work and left Paramount, moving to Los Angeles in 1981. LaFontaine was contacted by an agent who wanted to promote him for voiceover work. Thereafter, LaFontaine worked in voiceovers. At his peak, he voiced about 60 promotions a week, and sometimes as many as 35 in a single day. Once he established himself, most studios were willing to pay a high fee for his service. His income was reportedly in the millions.
LaFontaine often had jobs at a number of different studios each day, and famously hired a driver to take him from studio to studio in order to save time finding parking. With the advent of ISDN technology, LaFontaine built a recording studio in his Hollywood Hills home and began doing his work from home.
LaFontaine lent his very distinctive voice to thousands of movie trailers during his career, spanning every genre from every major film studio, including The Cannon Group, for which he voiced one of their logos. For a time, LaFontaine had a near-monopoly on movie trailer voiceovers. Some notable trailers which LaFontaine highlighted in the intro on his official website include: ''Terminator 2: Judgment Day'', ''Shrek'', ''Friday the 13th'', ''Law & Order'' and ''Batman Returns''. LaFontaine stated in 2007 that his favorite work in a movie trailer was for the hit biographical film ''The Elephant Man'', though according to a response to the question on his website, he had several trailers which stood out in his mind, and he didn't like to choose one.
Lafontaine also did announcing for a few WWE Pay Per View events, as well as the "Don't Try This at Home" bumper.
In a 2007 interview, LaFontaine explained the strategy behind his signature catch phrase, "in a world where...":
We have to very rapidly establish the world we are transporting them to. That's very easily done by saying, "In a world where... violence rules." "In a world where... men are slaves and women are the conquerors." You very rapidly set the scene.
LaFontaine also did other voice work, including as the announcer for the newscasts on WCBS-TV New York, from 2000 to 2001. LaFontaine was a recurring guest narrator for clues on the game show ''Jeopardy!'' and appeared on NPR's ''Wait Wait... Don't Tell Me!'' on May 14, 2005, where he played "Not My Job" (a game in which famous people have to accurately answer questions totally unrelated to their chosen professions). The prize (for a listener, not the contestant) is "Carl Kassell's voice on your home answering machine". LaFontaine did not win the game, and offered to record the listener's answering machine message himself. LaFontaine once claimed that he enjoyed recording messages like these because it allowed him to be creative in writing unique messages, and said that he would do so for anyone who contacted him if he had the time. However, by 2007, he found the requests to be too numerous for him to take on, and stopped providing the service.
In 2006, GEICO began airing an ad campaign in which actual customers told their own stories of GEICO experiences, accompanied by a celebrity who helped them make the story interesting. LaFontaine was featured as the celebrity in one of these ads which began airing in August 2006. In the commercial, he was introduced as "that announcer guy from the movies", with his name printed on-screen to identify him. He began his telling of the customer's story with his trademark "In a world...". LaFontaine credited the spot as life-changing for having exposed his name and face to a significant audience, noting, "There goes any anonymity I might have had..."
On the evening of September 7, 2008, ''Adult Swim'' had a bumper that said: Don LaFontaine [1940-2008].
At the end of the credit sequence in the ''Phineas and Ferb'' episode "Chronicles of Meap" there is a message on screen saying "In Memoriam... Don LaFontaine 08/26/40 - 09/01/08. One man, in a land, in a time, in a world... All his own." The credit sequence had been designed as a trailer for the "next" Meap episode, or as LaFontaine put it, "Episode 40 -- Meapless in Seattle". As the Disney Channel Original vanity card appears, you hear him say, "In a world...there, I said it. Happy?"
"The Apprentice Scout", an episode of ''Chowder'', is dedicated to LaFontaine. The episode dedicated his memory and said "To Don LaFontaine 1940-2008"
One trailer for ''The Hitchhiker's Guide to the Galaxy'' not only spoofs the "In a World Where" theme, but also includes LaFontaine parodying himself when the narrator defines what a trailer is, saying "Trailers also normally employ (enter Don's voice) 'A deep voice, that sounds like a seven-foot-tall man, who has been smoking cigarettes since childhood'.” The trailer is voiced by fellow voiceover artist Stephen Fry.
LaFontaine's voice was used in ''Family Guy'' episodes "North by North Quahog", and "Brian Sings and Swings", and ''The Untold Story'' version of "Stewie B. Goode", and has been featured in musical tracks.
On April 12, 2007, LaFontaine appeared on an episode of ''The Tonight Show with Jay Leno'' with ousted American Idol finalist Haley Scarnato to provide humorous "movie trailer"-esque commentary, as a spoof of his Geico commercial.
This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
name | David Kaye |
---|---|
birth name | David V. Hope |
birth date | October 14, 1964 |
birth place | Peterborough, Ontario, Canada |
occupation | Voice actor/Announcer |
years active | 1986–present |
spouse | Maria Hope |
website | http://www.davidkaye.com/ }} |
David V. Hope (born October 14, 1964), known professionally as David Kaye, is a Canadian American actor who is better recognized for his work as a voice actor. His most recognized roles include Sesshomaru in the shōnen anime ''InuYasha'', Treize Khushrenada in ''Mobile Suit Gundam Wing'', Megatron in five of the ''Transformers'' series (''Beast Wars, Beast Machines, Transformers: Armada, Transformers: Energon, and Transformers: Cybertron''), Cronus in ''Class of the Titans'' and Clank in the ''Ratchet And Clank'' series of video games.
His acting studies include film and television, cold reading, classical theater acting and character voice study.
His big break in animation came in 1989, when he was cast as the voice of General Hawk in ''G.I. Joe''. Consequently, Kaye lost interest in radio, an integral reason behind his departure from LG73. Since then, he has voiced hundreds of characters, his excellent range allowing a wide variety of ages, accents and dialects. For many, his most notable role is of Megatron in ''Beast Wars'' and the related ''Beast Machines''. Kaye continued to voice the subsequent incarnations of Megatron in ''Transformers: Armada'', ''Transformers: Energon'', and ''Transformers: Cybertron'' series. Kaye was not asked to voice Megatron for the ''Transformers: Robots in Disguise'' series. He originally was not going to play the character in ''Transformers: Cybertron'', however, Kaye was later asked to reprise his role after a handful of episodes were recorded with a different actor. This gap was the reason the initial three episodes of the series did not air in the United States until later (and even then, the first two were compressed into a single episode.) He has played Megatron for the longest duration when compared with other voice actors of the character. Kaye provided the voice of Megatron's antithesis Optimus Prime in 2007-2009's ''Transformers Animated'', which makes him the first actor who has voiced both Megatron and Optimus Prime on a regular basis.
He is also well versed in automated dialogue replacement (ADR, commonly known as dubbing) in anime, playing Sesshomaru in the popular ''InuYasha'' and Soun Tendo in ''Ranma ½''.
His voice has also carried him into audiobooks, video games and commercial radio and television announcing and advertising. He is the current voice over for the Fox Sports Network and can be heard on radio stations worldwide.
Kaye's live action roles consist of a large majority from the Sci-fi genre, such as ''Battlestar Galactica'', ''The X Files'', and ''The Twilight Zone''. He is often typecast as a television reporter or anchor. Kaye has stated that he often becomes more interested with the technical aspects of live action acting rather than preparing for the roles themselves. Consequently, his on-camera roles have waned. Besides there is little time, as 12 hour days in studio recording tend to cut into his time to seriously pursue on-camera roles. He's been asked on several occasions to 'jump back in'. "When the time is right and I can devote more time to the craft, you bet." Additionally, his theatre work has included the popular plays ''A Streetcar Named Desire'' and ''Of Mice and Men''.
Currently, Kaye has chosen to dedicate his working hours to voice work, placing his theatre and live action roles on the sidelines.
Category:1964 births Category:American voice actors Category:Audio book narrators Category:Canadian film actors Category:Canadian television actors Category:Canadian voice actors Category:Living people Category:People from Peterborough, Ontario
ar:ديفيد كاي fr:David Kaye ja:デビッド・ケイ fi:David KayeThis text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.