Free Essay

Voip and Unified Communications Via Wi-Fi Handset

In: Other Topics

Submitted By sudheeranne1253
Words 10967
Pages 44
Title
Advancement of VOIP and Unified Communications via Wi-Fi Handset
“The technology involved in VoIP software and VoIP information is forever changing and updating”(VoIP Telephony Updates… 2008 -5).

Abstract
This paper gives the information on the VOIP-voice over internet protocol which is the technology that is been used for the voice communications by using the different types of the IP based networks in order to deploy the devices of the VOIP users. The VOIP technology is having different types of the security issues in the VOIP and Wi-Fi along with the security measures. This paper will deal with the VOIP technology, unified communications and Wi-Fi handset.

Table of contents
Chapter 1
Introduction to the research………………………………………………………………6
1.1 Aim
1.2 Objectives
1.3 Introduction
1.4 VOIP deployment
1.5 The threats and attacks in the VoIP System
1.5.1 Spoofing
1.5.2 The interception or eavesdropping
1.5.3 The denial of service
1.5.4 The spam over VoIP

Chapter 2
Literature review……………………………………………………………………………10 2.1 The security methods 2.2 Call Setup and VoIP Registration 2.3 The Protocol selection 2.4 The Mobile VOIP 2.5 The VOIP handset 2.6 The IP telephony 2.7 The Protocols of VOIP
Chapter 3
Research Methodology……………………………………………………………………….15
3.1 Introduction
3.2 Research methodology chosen
3.3 Qualitative research methodology
3.4 Quantitative research methodology
3.5 Research design: Case study approach
3.6 Case study approach
3.7 Data collection methods
3.8 Primary source of data
3.9 Secondary source of Information
3.10 Ethical issues in the research process
3.11 Methodology selected
Chapter 4
Data and Research Analysis………………………………………………………………23 4.1 VOIP technology 4.1.1 MSN Messenger
4.1.2 Google Talk
4.1.3 Skype
4.1.4 Ring Central Online
4.2 Unified Communications
4.3 The necessity of the Unified Communications
4.4 VOIP mobile telephony
4.5 VOIP and WI-FI
4.6 The different types of the challenges for implementing the VoIP over the Wi-Fi networks
4.7 In a VoIP/Wi-Fi Network Security
4.8 VoIP, Wi-Fi, and Cellular Networks
4.9 VoIP Over Wi-Fi
4.10 Mobile VoIP Works and How it Will Change Communication
4.11 VOIP communications
Chapter 5
Results and Implementation………………………………………………………………..31
Chapter 6
Conclusion, future work and limitations……………………………………………………45
6.1 Conclusion 6.2 Future Work
6.3 Limitations
Chapter 7
References………………………………………………………………………………………47
Chapter 1
Introduction to the research
1.1 Aim
The main aim of this project is to design the interactive system for the advancement of the VoIP and unified communications via Wi-Fi on handset
1.2 Objectives
The main objectives of this project is * To analyse the information regarding the VOIP(Voice over internet protocol) * To evaluate the information regarding VOIP and unified communications via handset * To study the advanced features of VOIP in mobile via Wi-Fi technology * To develop an application in .net which is having advanced features of VOIP
1.3 Introduction
The VoIP- Voice over Internet Protocol is the type of the technology which is been utilized for the purpose of the transmission of the voice conversations by making use of the IP-Internet Protocol above the network by making use of the different types of the packets of data. In some situations the data may be the intranet or else the internet which has changed the strategy that is approved through the managers of the telecommunications. Because of the association of the communications technologies into the IP, most of the companies and organizations are wasting their money in investing for researching the technologies. Charles Jackson1,(2000).
VoIP stands for Voice over Internet Protocol. Prior to the existence of the VoIP the telecommunications happened above the PSTN- public switched telephone network which are the connections of the voice data traversed circuit switched connections. The cost of the VoIP in the dollars as well as the bandwidth is low when compared with the actual CSN-circuit switched networks and for this reason most of the companies are showing interest towards the VoIP. The exploitation of the VoIP have lead to many security issues which is moving for the requirement of the security solutions in order to deal with different types of the security issues. Matthew Desantis, (2008).
1.4 VOIP deployment
VoIP deployment has brought with it many security concerns, motivating the need for security solutions to deal with the many issues. The security of the VoIP is totally complex with the necessity of the multiple components and in most of the situations the mechanisms are more habitual than the circuit switched networks as well as the fact is that it is generally organized upon the existing data networks. The VoIP is considered as the telephone communication. This device will appear as the telephone as well as it will accept the telephone number as well as some of the individuals will speak inside the handset from one side with the other individual on the other side. Anshul Kundaje, (2001).
The actual aim of the transfer is to decrease the process to the users of the houses as well as the business through the regularity of the network infrastructure. Now a day’s the Internet is playing the vital role within the human life and it is one of the significant one among all the other existing technologies. Most of the people are making use of the internet as well as they are having the enough bandwidth through the broadband services in order to make the voice call process more reliable. Because of the low costs for call all over the world the VoIP is gaining more and more important. Skype is considered as one of the best example for this. (Charles Jackson1, 2000).
The dedicated end to end circuit is been implemented among the caller as well as the receiver to make the calls as well this circuit will happen to be dedicated until the entire conversation process is completed. Within the process of call, the other network traffic could not be utilize the switch channels which are already been allotted. The voice information is been tested as well as it is changed into the digital form before it is accumulated into the different types of packets that are broadcasted above the IP network. Each and every data packet is having the source as well as the destination IP address and it is been routed towards the network. Jonathan Davidson. (2000).
1.5 The threats and attacks in the VoIP System
The threats and attacks in the VoIP system are as follows: 1.5.1 Spoofing
According to Porter & Gough, (2007) the spoofing is the type of the attack which is known as the man in the middle attack. The uncertified users such as the hackers will come under this category and will spoof and gain the access towards the messages as well as they will gather the secured and useful information like the banks details as well as the PIN numbers and many more. The call forwarding is one of the important aspect which will forward the incoming calls from one phone and then it could be embattled and attacked by the various numbers of the attackers. The VoIP service elements such as the SIP proxy could be accessed as well as the configuration to identify and direct the calls at the different numbers which are changes within the attempt which commits the toll frauds.
1.5.2 The interception or eavesdropping
According to Gold, (2009) though the VoIP networks are capable of transmitting the voice packets without the problems of encryption it is not such easy to listen or hear the conversations which are carried out in the telephone. In this type of the attacks the uncertified user should be among the tow different types of the end users if not there is no possibility to the hacker to obtain and capture the traffic. The uncertified person or the individual within the packet sniffer will be able to obtain the VoIP packets since they will not contain the captured data, so it is not such easy to understand and gather the data.
In general there is a necessity to chose the exact packets and then connect them with packets which are moving within the opposite side that would take the other route. Because of the existence of the compression techniques which are utilized the data should be played with the exact codec which is to be clear. The main task of this is to achieve the identity of the user as well as the SIP phone numbers along with the pin numbers. Gold, (2009).
1.5.3 The denial of service
According to Chen, (2006) the DoS stands for denial of service and it will make use of the two different types of the attacks in order to collapse and spoil the entire VoIP system. The first step is that forwarding the indistinct as well as the damaged packets in order to collapse the entire VoIP system. The second step is forwarding the flood of the well created packets to weaken the total resources. The DoS attacks will takes place within the two different layers of the OSI model either at the application layer or else the transport layer. Within the application layer the DoS attacks through sending the flood of the invitations of the calls or else by sending the authentication requests upon the signaling channel. If at all these particular attacks are on the media cannel the DoS attack floods will consume the large volume of the data as well as it will consume the large quantity of the bandwidth. Within the both kind of situations the users will not be able to do the calls.
1.5.4 The spam over VoIP
According to Ahson & Ilyas, (2009) the VoIP is been exposed to the spam which is also known as the SPIT- spam over internet telephony. These types of the spam attacks are even capable of disabling the entire VoIP system. Because of this types of attacks the VoIP user will not only get the more number of the calls which are unwanted but even the VoIP spam could attack the gateway as well as it may even corrupt the total quality of the voice.

Chapter 2
Literature review 2.1 The security methods
According to Dantu et al., (2009) there are several numbers of the existing techniques which could be applied to identify the different types of the attacks. For the post the methods which are approved needs the accumulation of the tools such as the firewalls as well as the secure terminal tools that are some what costly. On the other hand the major solution for the VoIP is the process of reconfiguration of the tools which are been utilized to secure the entire data network or else to utilization of the different types of the protocols as well as the application that are of low cost and perform well. 2.2 Call Setup and VoIP Registration The concerns or issues of security are connected through the set up of call are dual with the aim of gain the calls which are free as well as the whole system is blocked with aim of to guard the other various users who are using the networks. These are also considered as reasons for the breakdown of calls which are as hang up even called. In 2004, according to views of Rescorla, just before VoIP implementation call there is a registering necessity with the PBX which is specified to as the process of registration that will promise that with network user is connected and linked and user is allowed to receive and make calls. Normally, security is provided with process using passwords which are provided as well as with the specific address it could be controlled for example the IP address or else the MAC address. In VoIP networks, the protocol which is named as dominant protocol is used in order to place the calls using the “SIP- session initiation” protocol and it is established and improved using the “IEFT - internet engineering task force”. With HTTP protocol, this protocol has similarities which is widely been used within the services of web. 2.3 The Protocol selection In 2004 according to views of Johnston, many numbers of protocols are applied in order to provide the privacy, the secrecy and reliability as well as the signaling messages registration of the SIP. The significant protocols with have employment of the IPSec, S/MIME, DTLS and the TLS as well as the registration of the HTTP digest. The approval as well as selection of the protocols which provide security is totally depended on scalability as well as simplicity of the establishment. In 2010, according to views of Tina L Douglas, VoIP is determined as internet voice over protocol and in these audio signals which are processed are changed to data which is digital and data that is converted is transmitted over internet. Users are internet are permitted in this process and they can communicate with persons who are in long distance at lower rate when with other values of rating which are provided by companies which are involved in telecommunications compare. Presently, they have the capability to avoid companies which are presented in telecommunication and in their people communication which is made around the world VoIP is used. Mobile VoIP has modified its emergence when VoIP is concentrated by the people. Restrictions are allowed when VoIP are used by user in personal computer of user. With the internet computer has connection and inside office or the user home restricted VoIP is presented. But now, if mobile phone which has “General Packet Radio Service” or internet connection or has 3G or Wi-Fi connection available to user then the VoIP can be used by it. It is described as mobile VoIP. In addition to this, user can make communication with other ones who has mobile or traditional VoIP. So mobile VoIP working way has many things and user must concentrate one needed things in mobile VoIP working process. Recklessly, the mobile phone is needed by user that supports GPRS or Wi-Fi system or 3G. User also needs handset which has compatibility with other mobile VoIP systems like Skype and Google Talk. Users can check user mobile phone local company and conclusion can be made by user which mobile has compatibility with mobile VoIP and this statement was specified by Tina L Douglas in 2010. 2.4 The Mobile VOIP Many reasons are presented beyond mobile VoIP popularity and when comparison is made with communication of general mobile, efficiency of this mobile VoIP is high. Cost of VoIP is low then the offered cost by other organizations which are involved in telecommunications. Outside country call cost is cheaper ten to twelve costs. So user can save lot of money if international business is maintained by user to process which is needed by user to perform calls to persons who are in long distance almost every day. With internet while connection is maintained by user, only charges of net are paid by normal users and calls can also be made by him at several time and calls which are long distance can be ready if connection of internet is existed. So user number changes are not required like other mobile phone companies do and it is also specified by Tina L Douglas. Companies provided features are enjoyed by users with less cost. Provided features have log of call, forwarding of call and waiting of call among others. In considered things best one in these offered features with zero cost. By making use of VoIP user can call to any location at any time when he want. Businessmen can face some difficulties because they don’t have laptops which are owned by them at any time with partners of them who are presented in business. This is specified as main reason beyond the mobile convenience as that phone has connection with internet. Call chargers per minute are applied in some countries however by using VoIP of mobile phones, user give liberty to talk persons who are needed because no limitations are existed about time of talking because fee which has large value is not paid by making call which is single by user. In 2011, according to views of Scott Mackenzie, the VoIP “Voice over Internet Protocol” also proposed as “Internet Protocol telephony (IP telephony)” is a form of telephone communication using the internet. Various businesses these days are using VoIP wireless communication and it is considered as an alternative to cost saving to the original copper wire of wire telephone line, or landline or telephone system. 2.5 The VOIP handset Using VoIP, user can use particular VoIP handset which has appearance similarities with normal telephone, presently these things expensive cost is high quite and they absolutely are not needed for access of IP telephony systems. With the software of application, personnel computers can have ability to fit and called as soft phone, which is basically transmitted into phones, and has displayed keypad on the monitor which is numbered; using dialing clicks of mouse is performed. Some mobiles, or phones, or cells which have access option of internet and significant features can also present in data communication and voice transmission. The technology of Wi-Fi, or Fidelity which is presented in wireless provided computer connection using local area networks and LANs means intranet connection using cables is not necessary and it is specified by Scott Mackenzie in 2011 year. 2.6 The IP telephony However similar to possibly more advantageous when with other traditional telephones comparison made, if communication which is verbal is permitted by systems of IP telephony between parties, such as documents transmission as well as conversation of simple phone, faxes, excel files and videos. While the mobiles/cells are providing facilities to talk, too, using them cost of the internet accessing can be differenced on the terms of the service plan. And every cell phone is not provided with the required technologies of protocols to execute as IP telephony devices. If user owns cell phone properly which is equipped, still purchase plan of data is required by it from cell phone service providers of cell if it is intended and used by users as mobile IP telephony service devices. Unlimited prices of data plans will differ by cell providers. At a halt, money should be required to for VoIP services. In countries around the world, it is feasible to locate to providers of service of IP telephony. Basic features have fax, ID of caller, voicemail, last number re-dial, three-way calling, blocking of call, with name ID of caller, forwarding of call, waiting of call, portability of local number, service of 911 and directory of information. Advanced features are also existed and they involve enhanced 911 or E911, phone number is changed and calls which are anonymous are blocked and it is specified by Scott Mackenzie in 2011 year. As services of VOIP wireless apply and the evolved technologies becomes more smart, growth will be existed in features which are demand and users which are new will be created. People ability of speaking with other persons using the internet services, using their laptops only with the microphones and the cameras; at cost with zero value as spread of people its availability. In near future may be, in this way communication may be probable, at little or no cost in mobile with many number of ways. Hand held devices while won’t require cell phone service plans, instead of personal computers or laptops may be provided. 2.7 The Protocols of VOIP Commonly some protocols used to make easy IP telephony systems are “Media Gateway Control Protocol (MGCP)”, “IP Multimedia Subsystem (IMS)”, “Real-time Transport Protocol (RTP)”, Session Initiation Protocol (SIP), and H. 323 and Session Description Protocol (SDP). Presently through not having knowledge of technologies or known commonly as with wireless VoIP communication increase in popularity and availability, these protocols are specified as every day people vocabulary part.

Chapter 3
Research Methodology
3.1 Introduction
According to Jennifer Rowley (2002) the comprehensive analysis based on the research methodology is been accepted with in this project and it is described in detail in this thesis. The authentic methodology which is been taken in to consideration from the qualitative as well as the quantitative methods with in this research process and even the specific factors which lead to select this methodology is been explained in detail with in this research. The research oriented research approach which is been considered for the primary source of the data as well as the secondary source of the data is been described in detail. The interviews which are semi organized are been conducted in order to gather the primary source of the information as well as this information is been utilized to develop the search regarding the research and the equivalent research analysis conducted to certify the value of the research which is been conducted to recognize the actual result from the literature.
3.2 Research methodology chosen
The research methodology is the process in which the actual methodology is been considered to progress the research as well as the tools that are been used in order to collect the information that are necessary to support the research. Generally there are two kinds of the research methodologies which are been used in order to rectify the problems happened with in the research such as Qualitative research methodology as well as the Quantitative research methodology. The research methodology types which are considered are based on the different aspects such as the type of problems which are taken in to consideration with in the research process as well as the appropriate and significant data which is to be collected and even the total analysis of the research methodology types are illustrated in detail.
3.3 Qualitative research methodology
According to Trochim (2000) the qualitative research methodology is totally based on the human behavior or actions as the major causes which are after this actions are been included with in this process. The problems which are taken in to consideration with in the process of the research towards the human behavior or actions are specified with in this qualitative research methodology as well as these kind of methodology is been utilized towards the educational discipline, social studies as well as the common problems which are happened with in the market. The process of decision making will include several steps as well as the critical aspects such as the way of reacting towards the problems which have taken pace with in the research. For the purpose of the qualitative research methodology it is better to choose the small volume rather than choosing the huge volume which is been used to collect the data from the individuals who are included with in the process of research. The critical non- numerical data excluding the main issues such as graphs, charts as well as the statistical methods are taken in to consideration in order to finish the research analysis of the data which is base on the genuine emotional observations as well as the conclusions than that of the basic conclusions.
3.4 Quantitative research methodology
Generally the quantitative research methodology is based on the models which are related to the mathematical as well as the theories based on the social sciences. This quantitative research methodology will even include the statistical analysis as well as the experimental examination of the properties and the internal relationship among the quantitative aspects.
The significant aspects which will make the quantitative research methodology are the measurement as well as the evaluation by the regular values as well as the resulting observations are been used with in the quantitative research methodology. By making use of these research methodology the questions such as what, why and where are been answered and in this quantitative research methodology as the major research methodology will include the major social sciences such as political science, economics, anthropology as well as the psychology.
With in this quantitative research methodology the specific case study is been utilized as the information resource as well as the number of general conclusions and even the hypothesis are been resulted by making use of the quantitative research methodology.
As the list of hypothesis are been made with in the research process, then this quantitative research methodology could be utilized in order to confirm the true hypothesis from the list which is taken in to consideration in order to rectify the problem happened with in the research. The numerical measurements such as graphs, charts as well as the statistical analysis are been used basically with in the quantitative research methodology and this kind of methodology could be taken from the huge problem in which the huge or large sample size is needed as well as the data which is been collected from this type of sample should be analyzed in the way of experimental examination as well as the equivalent results are been calculated by means of the empirical analysis. For example the survey which is conducted which may result in completion of the total research process then the best methodology which could be utilized with in this level is the quantitative research methodology.
3.5 Research design: Case study approach
According to D Vermeulen (2009) the research design is the process is which the general research questions are been recognized and then after they are transformed in to the testing process as well as there are several types of the research designs which could be established depending on the research problem which is taken in to consideration. Generally there are two significant research design types such as the fixed research design as well as the flexible research design. Before fixing he actual data collection method the fixed research design method is been set. Generally this fixed research design is the theory based method, as a result it not such easy to calculate the mathematical variables as well as the aspects that are resulted in future. The data which is been collected is been fixed as well as the actual methods which are used in the data collection are been established with in this kind of research design. The certain level of the sufficient choice is been available with in the process of the collection of the data on the flexible research design method as well as the design of the research and the actual search might differ with in this kind of research. The variable which is recognized with in this flexible research process might differ with the actual statement, as a result there is a necessity of the flexibility while selecting the research variables and generally the investigational result depends on the approach which is been established diagonally towards these kind of the flexible research design. Generally the research design is been distinguished in to experimental as well as the non- experimental types and the type which is necessary to select it is based on the type of the research with in the process. The experimental research design is the best process for the type of projects that include the number of statistical analysis as well as the research sample size is more, where as the sample size for the non- experimental research design is less as well as the common and general observations as well as the individual behavior is been used to obtain the inputs. For the purpose of quantitative research methodology the experimental research design is one of the best method, where as the non experimental research design model is the best method for qualitative research methodology. The general case study is one of the best example for the non- experimental research design in which the data needed is been collected by making use of the single source as well as the needed conclusions are completed by means of the general observations and the vision and outlook of the individual is been included with in the case study.
3.6 Case study approach
According to Jennifer Rowley (2002) one of the best method to gather the required information or data is the case study approach diagonally towards the qualitative research methodology by the time only when the sample size is less. The solution which is required for the research problem could be recognized in the great approach which is towards the case study and the individuals who are included with in the process of the research and are investigated by the main aim to gather the direct data and the questions asked by those individuals are been answered in an efficient manner to gather the information which is required from them. There are several number of benefits form this specific case study approach and the most significant one among these benefits is that the source of the data which is collected is direct as well as the information collected will be more and more perfect and trustworthy while compared with the other resources. In order to gather the information which is required to solve the research problem is the simple or general case study which could be used as the best approach and the result or clarification of the problem is been connected with the case study. In order to conduct a research work on the particular topic the individual who acts as a research should be capable of having the required knowledge on the case studies of the research as well these case studies should be in a way that they should effort little hard work and it should be capable of solving the problems with in the process of research then only this specific study could be referred as the best source for the primary information which is related to the qualitative research methodology. Generally the case studies could be of different types such as the individual, organization, the in particular situations which are related to collect the data by approaching the equivalent case could be referred as the best with in the quality because there is a direct contact with the case and the answer to the problem which happened with in the process of research could be identified through the actual observations as well as the significant reasons towards the case studies considered.
3.7 Data collection methods
According to Sasha Hurrell (2004) the main important aspect with in the process of research methodology is the data collection which plays a significant role in evaluating the key search towards the research as well as it will authenticate the data which is been gathered as well as the equivalent analysis by means of the actual search towards the literature. Generally there are two kinds of data collection methods with in the research process such as the primary source of data as well as the secondary source of data.
3.8 Primary source of data
The primary source of the data is the significant method of the data collection which is been established towards the research methodology. When compared with the other resource types the primary source of data information is the perfect as well as the trust worthy one which is been gathered directly from the actual source of the problem. In the previous section it is been considered that the primary source of the information is the actual case study approach as well as the equivalent data which is been collected from the major individuals are been included towards the case studies which are taken in to consideration. Generally the primary information is been collected from the interviews, normal discussions, the team meetings as well as the semi structured interviews. With in this research process the semi structured interviews are been utilized and the questioners which are needed are well organized and are forwarded to the major individuals who are included with in the research process. The views and ideas of the individuals who have participated in the research process of the semi structured interview is been utilized as the major primary data sources as well as the additional search from this interview process is been utilized in order to analyze the strength of the research which is been finished. The answers which are given by the individual will be more and more perfect and trustworthy then the primary source of the information could be referred to as the perfect way to collect the data which is required.
3.9 Secondary source of Information
All the time the secondary source of the information is necessary to continue the research as well as to compare the actual search which is from the primary source of information by means of the present secondary source of information. Generally the secondary source of the data is been collected from the articles which are published, journals as well as the websites. The information or the data which is been collected from the secondary sources is been compared by the actual search by taking the views of the individuals who are included in the primary source of the information as well as the actual importance of the data is been evaluated.
3.10 Ethical issues in the research process
Within the entire research process in order to gather the required information from the different types of the data sources if there is any necessity of getting registered to download the articles, case studies or any other data sources I will follow that rules and regulations and will get registered with them. I will follow all the ethical rules in the research process and will analyze the information without violating the scholar’s information and will complete my research process in a reliable and honest way.

Research Methodology

Qualitative Research Methodology
Quantitative Research Methodology

Interviews and Surveys
Questionnaires& statistical reports
Articles and journals
Case studies
Book reviews and web documents

This figure will specify the different types of the research methods involved within this research process.
3.11 Methodology selected
The quantitative research method will include the different types of the data collection methods such as the articles, the case studies, journals, book reviews, scholar reviews as well as the web documents on the similar topic which are already been reviewed by the previous scholars on the similar topic by making use of the internet. The information which is required for complete the research process will be gathered from these sources and will be analyzed according to the research requirements.
The qualitative research method will include the different types of the data collection sources and the required information for the research process will be gathered by conducting the surveys and interviews by including the individuals as the participants in the research and the actual research purpose and the research questions will be explained to the respondents in the form of questionnaire and the answers from the respondents is considered as the major source of the data and it is been used for the research process.
In order to fulfill this research process I will use the quantitative research method and will gather the required information to my research from the different types of the data sources involved in it and I will analyze the information from that sources according to my research requirements and will find the appropriate solution to the research problem and will provide my valuable views and ideas for the future aspects.

Chapter 4
Data and Research Analysis 4.1 VOIP technology In 2009 according to views of Peter Garant, the “Voice over Internet Protocol” is specified as technology which is used in transmission with main aim of communicating delivering of voice using Internet protocols and networks, such as network and network case of various packet-switched. Other names are existed to this like telephony of IP, voice over broadband and Internet telephony. In other cases, they are also considered as broadband phone and broadband telephony. Some communications of voice really which has quality with high value are experienced with the help of any top VoIP free services. 4.1.1 MSN Messenger With high quality free VoIP offering is new; Microsoft Windows MSN messenger has been initiated by it. Verizon of services of the mobile telecommunications are offered to call of Windows Live. This service definitely is easiest and cheapest service. So many features although are not included by it when comparison is made with the other service providers, free software is offered by it and its using way is easy. Adding up to this, people can enjoy modem convenience of PC-to-PC calls whenever they are located. Option of PC-to-phone which is considered as Verizon-hosted is have high rate when comparison is made with other available services. Calls which are international are permitted by it as parts of residential plans importantly which are have high affords.
4.1.2 Google Talk Another impressive provider and free VoIP is Google Talk, which provides so called systems integration by special Google chat function and Gmail email. Comparison is performed with other examines, for connection signing which is new in Google is a very easy way and hassle-free experience. As parts of residential plans, calling which is international is permitted by it to all parts of the globe almost. Apart from this, its working way is well with Google advanced systems of instant messaging. Transferring of file is provided by it to other from one PC and reliable PC-to-PC and high quality calls are offered with impressive way which is quite way. One major goal is chatting in internet a more fun and more convenient for experience of everyone.
4.1.3 Skype
Skype is specified as provider of free voice transmission over services of broadband and it gives outstanding performance. With the support of person online number, easily calls can be received from other cell phones or mobile devices by the people. Individuals of non-Skype are permitted by it to perform direct communication using user SkypeIn online number. Calls of free voices are existed as part of superior subscription services of it monthly. Calls which are limitless can be done by users to various landlines which are existed over the world. These online work special numbers on the phones which are cordless, other Wi-Fi phones as well as PSPs among people.
4.1.4 Ring Central Online
This is specified as a provider of telephone service which is depended on dependable fax service and the web. A number which is toll free or particular local number is provided to users together with services of other which are advanced such as call logs, music hold on and integration of outlook. Members similarly can use real time call control directory of dial-by-name and features of -to-call. Other features of business which is imposing have fax messaging, call forwarding and voicemail.
4.2 Unified Communications In 2011, according to Nadeem Unuth views, Unified communications (UC) is considered as technological architecture which is new whereby integration of tools of communication is performed so that both individuals and business can control all communications in one whole separately instead. The gap is bridged by unified communications between other computers which have communication technologies and VoIP.
4.3 The necessity of the Unified Communications
In puzzle of communication only voice is considered as one piece. Deal must be maintained by user with a client or a partner, however still user require to send or receive a quotation on fax or email; or communication of voice being high cost, on chat a lengthier dialog carrying might be decided by user, still or it might be needed to a product prototype discussion on video conferencing with business partners.
On the other hand communication tools are not used by user only in at home or in office, while in the park, in the car user can do, in a restaurant having launch and in bed also he can do his work. Fact is presented in this and it is important and virtual, means its workers and business are not require confined to address or one physical office; with various elements which are decentralized running might be performed in business, most of which present only online.
Due to integration lack of all services, different technologies usage is not optimized. As output, while effective communication is presented, from being efficient it is far, both economically and technically. Compare, such as, having separate hardware and services for video conferencing, phone, fax, instant messaging etc., and all these are integrated into services which are same and hardware which is minimum is presented.
4.4 VOIP mobile telephony
The telephony of mobile has played vital role in the world which is modern. Failure of VoIP is exited if it wired stayed. Most users of VoIP are scrutinizing now for services the pipeline that will permit them to opportunely make cheap or free calls using phones which are presented anywhere. VoIP services of few mobile have pioneering emerged into a industry which is promising.
Mobile telephony works on networks which are presented GSM, in way which cover total world. IP networks are used by VoIP like WiMax, GPRS, Wi-Fi, 3G, EDGE etc. This is obstacle barring main way to free VoIP telephony which is seamless. If user wants to make calls which are free using mobile of him, he requires determining a wireless connecting way to the internet. A plan of data for mobile is needed often, if user is presented under hotspot of a WiFI. Still way is presented in service use of VoIP through networks of GSM, however part of GSM remains at the rate of local mobile charged.

4.5 VOIP and WI-FI
The association of the data as well as the different types of the voice networks within the circumstances related to the business will totally wireless networks. The different types of the mobility services are been offered along with the voice communications and the users will be able to make use of this technology in an efficient manner. Even though the VOIP over Wi-Fi technology has existed earlier there are some challenges for the establishing the VOIP over the Wi-Fi networks.
4.6 The different types of the challenges for implementing the VoIP over the Wi-Fi networks
Because of the technology emergence there are different numbers of the challenges within the process of implementing the VOIP over the Wi-Fi. The VOIP is considered as the typical and perceptive technology. The calls should be fixed as well as registered and then the different types of the voice packets will takes place within the target without the stoppage. And for this reason there is a necessity of the ongoing network stream which is not been stopped by the different types of the data transmissions which are more sensitive. And for the process of assuring the significance of the voice packets the establishment of the QoS-quality of service techniques upon the wired LANs will be more useful as well as the different types of the challenges like the latency, the jitter as well as packer losses will be identified. If the standard wireless networks will takes place then the technology which is initially developed will face more number of the challenges. But in general now a day’s most of the wired networks will offer the wide range of the bandwidth for the voice as well as the data and the WLANs will offer the less bandwidth as well as the challenges or the issues related to the QoS quality of service will take place again. For all these reasons there is a necessity of providing the different types of the
Security measures such as authentication and encryption must be implemented and can add to the problem by increasing the size of the voice packet. Additionally, users on the move will traverse wireless access points where handoffs must be quick and smooth.

The standards of IEEE 802 directing wireless technology are rapidly evolving as well as assure to deal with Wi-Fi broad spectrum issues. Available bandwidth increasing, prioritizing the packets of voice for QoS, encryption and authentication protocols for security, as well as roaming techniques enhancements are all being talked to.
And also the wireless technology development commonly called as WiMax, offering for high bandwidth implementation of wireless communications enveloping expanses of up to value of 30 miles. The Wi-Max evaluation could confirm of vast end result to improving countries, as well as Metropolitan LANs.
4.7 In a VoIP/Wi-Fi Network Security
Organizations desiring to realize VoIP could take issues of security into taken from the start. Since in any network of IP, the hacker’s dangers, high jacking, denial of service as well as spam, all wait in the shadows. Because radio frequencies are used in a wireless network as its media which is used in transmission, normally security offered in a wired network by a firewall is not enough, generally physics is beyond this. But to smash into a wired LAN needs hackers to either to hack in during the internet or physically be within the network, in the WLAN network transmissions can be grabbed by them from the air even as across the street parked. The issues of security that manager of the network must reflect in a VoWLAN are the conversations privacy as well as the network infrastructure protection.
For networks of WiFi, security has had unstable establish with the WEP implementation as security mechanism of it. WEP offers for encryption as well as authentication between the access point and the user, as well as easily was found to be hacked. The standard of 802.11i, adopted as “Wireless Protected Access”, given for more security which is robust by wanting authentication which has two ways between the network and the user, and Advanced Encryption Standard is used as encryption engine of it.
As manager of network plan the wireless VoIP network rollout, the greatest threat of security they appearance is implementation which is improper. Building security into the initial deployment design can, as well as should affect the topology of network, and material costs. Breakdown to do so, could guide to additional expenses in services loss as well as designers of network in the compromise event.
4.8 VoIP, Wi-Fi, and Cellular Networks
Cellular devices manufacturers are integrating the radios of Wi-Fi into handsets of user at ever rate which is increased. Mobile operating system new versions are coming out whole with VoIP stack building features, inviting manufacturers and carriers to add functionalities of VoIP to their devices. Quad and Dual band cell phones can select between the available network which is the strongest, WiFi or cellular, and call will be placed accordingly.
As cell phones turn into more like offices of mobile, the mobile work benefits force turn into apparent. In the road warrior case, the communication ability through text messaging, email, voice or video, permits them to continue on the longer of road without touch losing. In the instant information age, files downloading is allowed by mobile office applications, those files are uploaded and edited, the traveler productivity is developed to the point somewhere about just anything that can be performed in office can be performed on the road.
The mobile phone that can control between WiFi and cellular networks can reduce telecommunications costs significantly at the corporate office. With hotspots of WiFi popping up at cafes, hotels as well as corporate LANs diagonally the globe, the workers of mobile can continue touch with family and office both off and on the job. With VoIP service provider addition, cheaper calls of VoIP can be performed from any network of WiFi at the push button.
Assume, if user will, a future with one phone number, where one phone, seamlessly can traverse cellular networks, networks of WiFi, PSTN and cable landlines. Where switching and roaming between disparate networks happen without interruption or call quality loss. Fixed Mobile Convergence is considered as the decade buzzword, as well as the architecture of the IP Multimedia Subsystem (IMS) is considered as the standard that assures to gain us there.
The aim of IMS is to offer all applications and services that the Internet offers, both present, as well as yet unimagined. Services which are based on IP for example Push to talk cellular, VoIP, text messaging, videoconferencing, presence information, community services as well as file sharing, are some possibilities. Created to work with any wireless or mobile packets switched network, fixed, backwards compatibility for phone system which is the legacy circuit switched is offered via gateway usage.
Still even though in infancy of it, already IMS is being as the platform which is implemented by AT&T in newly gained Cingular cellular network of it. Interest in a new infrastructure in investing by fixed and mobile operators has been down and up, as the new technology the costs and benefits are weighed by them.
As the VoIP technology over networks of WiFi continues to improve, all sizes business can reap the advantages of developed productivity, mobility, as well as cost savings which are significant. Constantly Standards committees are working on paths to develop quality and security of service, as well as convergence of fixed mobile offers acceptance in the industry which is included in telecommunications, more selection in the services provided and the applications of IP available to businesses ensure follow. What will have importance to observe is how these applications which have very bandwidth intensive will be priced by networks which are involved in carrying, as well as how it will affect internet neutrality.
4.9 VoIP Over Wi-Fi
Also VoIP is called as voice over Internet protocol which is a method wherein signals of audio are exchanged to digital data as well as is passed over the internet. Internet users are allowed by the process to communicate as well as perform long distance calls at lower rate than those being provided by companies which is involved in telecommunication. Now they are able to bypass telecommunications companies as well as can begin employing VoIP to communicate through people constant around world.
4.10 Mobile VoIP Works and How it Will Change Communication
VoIP of mobile has changed the path people have glanced at VoIP. Limitations are presented in VoIP to user who has personal computer that includes VoIP. Connection is presented between the computer and internet as well as the VoIP restrictions inside the user home confines or in office of user. However now, if user has mobile phone which is accessed by the Internet or known also as General Packet Radio Service or GPRS or involve 3G as well as connection of WiFi can apply VoIP. This is called as VoIP of mobile. This process, mobile phone of user can be used by user to call anybody that has traditional or mobile VoIP.
So, mobile VoIP works, but user requires work of mobile VoIP. Obviously user would require a mobile phone that helps 3G, Wi-fi system or GPRS. A handset also is required by user that has compatibility with system of the mobile VoIP like Google Talk and Skype. User can verify local mobile phone company of user as well as verify which mobile phone has compatibility to mobile VoIP.
4.11 VOIP communications
Consequently, mobile VoIP popularity reason and has more effective when communication is performed by it that general communication of mobile. VoIP is low priced than offered value of telecommunication companies. It is ten to twenty times cheaper when you call someone outside the country. You are able to save a lot of money if you have international business to run and that you would need to make long distance calls almost every day.
These features include call waiting, call forwarding, and call log among others. And the best thing about this is that they come for free. With VoIP the use can call at any place where you want to. Some businessmen find it hard to communicate with their business partners because they do not have their laptops all the time. This is why mobile phones are much convenient as long as there is internet connection within the area. In some countries, calls are being charged per minute but with the use of mobile VoIP, you are given the liberty to talk all you want because there is no restriction to the time of talking because you are not worried if you are going to pay a large fee for a single call. With advances in technology, telephones have truly come a long way from traditional landlines which started with the first hand cranked wall telephones to digital telephony using Voice Over Internet Protocol (VoIP) services, also known as IP telephone or an online telephone service. Instead of using traditional landline technology, people can talk over the phone with LAN or WiFi internet connections. Since 2006, many companies have VoIP services for both homes and businesses due to the belief that VoIP is cheaper than other types of telephone services

Chapter 5
Results and Implementation

The first login page contains the different types of the options that are available in order to make the voice calls from the internet by making use of the VOIP voice over internet protocol. The options are the service plans, the features, installation, join now, FAQS and the HOME and to get started with this the user should subscribe and must login into the page by entering the username and the password to go to the next page press enter.

The second login page consists of the different types of the area codes in order to make the calls the user should select specific country and the code and can start dialing with the code and to go the next page press enter.

The third login page consists of support option along with the different types of the FAQ categories if he user wants to know any information he can go for search options by clicking on the keyword search and then write the questions by using the different words and if he click on the submit button he can get answer to his question and to go to the next page press enter.

The fourth login page consists of different types of the Hitech Phone options and the cost programs and the customer service programs to select the specific one click on the particular option so that the user can communicate via calls and to go to the next page press enter.

The fifth login page consists of the login policy and if the user forgets their password then can type their email id and then click on the submit button in the next page the user will receive his password and to go to the next page press enter.

After selecting the password reset option in the fifth login page and then in this sixth login page the user id and the password of the sender will be sent to his email id and to go to the previous page click on the back to home button and to go to the next page press enter.

The seventh login page will contain the installation procedure of the Hitech phone device and the user need to read all the instructions properly and then finally to install it click on the accept and install button to install it and to go to the next page press enter.

After installing the device in the seventh login page then in this eight login page there are many communication options like the call details, the activity log, personal info, recharging the code, details of call forward, the register tel number ok button and the logout button, the user can select the particular option according to his requirement by clicking on it and if he want to continue click on the ok button and if the user want to logout he can click on the log out button and to go to the next page click enter.

In this ninth login page the call detail records are mentioned and if the user want to know th details he can click on the call detail record button and if he want to go to the previous page click on the back to summary option and the entire communication process is been carried out by the VOIP and to go to the next page click enter button.

In the tenth login page there are many options like the call forwarding set up in order to use it the user should click on the set up button and he will get the options like receive call number and forward the call option and if the user want to receive the call numbers he can click on the receive call option and if the user want to select the forward call option he can click on the forward call option and if he wants to go to the previous page click on the back to summary option and if the user want to go to the next page press enter.

In the eleventh login page there are options like the web call back and there are three steps such as the typing the number, typing the destination number and delaying the call. The user can select the appropriate option by clicking on the specific option and to connect the call click on the call button, to disconnect the call click on the disconnect button and to cancel the call click on the cancel call button and to go to the next page press enter.

In the twelfth login page there are the payment options for the calling to the destination and the user needs to fill the details with the entire details by selecting the specific options and finally of the user click on the agree button and makes the payment he can make calls through the site and the communication process is been carried out by the voice over internet protocol.

In the thirteen login page to select the call rates the user should click on the click here button and to again know the service plans he can click on the service plan button and finally to know the international calling rates click on the third option and to go to the next page click enter.

In the last login page the user can click on the call type option and can make the calls and can even communicate with the other user by using the VOIP and communication facilities by the mobile handset or else the telephone and the major task will be completed.

Chapter 6
Conclusion, future work and limitations
6.1 Conclusion This study will provide detailed information on the VOIP-voice over internet protocol, and it will clearly explain each and every concept involved in the VOIP and the detailed overview on the other aspects like unified communications, Wi-Fi and handset. This study states that the VOIP is the technology which will transmit the voice conversations by making use of the IP-Internet Protocol above the network by making use of the different types of the packets of data. Because of the association of the communications technologies into the IP, most of the companies and organizations are wasting their money in investing for researching the technologies. VoIP deployment has brought with it many security concerns, motivating the need for security solutions to deal with the many issues. The security of the VoIP is totally complex with the necessity of the multiple components and in most of the situations the mechanisms are more habitual than the circuit switched networks as well as the fact is that it is generally organized upon the existing data networks. Even though the VOIP technology is more useful it is having many security issues. This study will give the detailed information on the mobile VOIP, VOIP handset and telephony. If mobile phone which has “General Packet Radio Service” or internet connection or has 3G or Wi-Fi connection available to user then the VoIP can be used by it. It is described as mobile VoIP. In addition to this, user can make communication with other ones who has mobile or traditional VoIP. 6.2 Future Work After completing this research work it is been proved that the VOIP technology and the Wi-Fi are having many issues and challenges. Even though there are many existing solutions to solve these problems they are not been used in a proper way. And for these specific reasons if the security issues and the other different types of the challenges are rectified then these particular VOIP, unified communications and the Wi-Fi then they can be more useful to the users.

6.3 Limitations
This research has given the detailed information on the VOIP- voice over internet protocol, the unified communications and the Wi-Fi. The information specified in this research are the significant aspects within them and the total concepts involved in those technologies are not been considered and if I have any chance in future I will try to gather more information about them and will get more information on these technologies.

Chapter 7
References
1. MATTHEW DESANTIS. (2008). Understanding Voice over Internet Protocol (VoIP). Available: http://www.us-cert.gov/reading_room/understanding_voip.pdf. Last accessed 14th Sep 2011. 2. Charles Jackson1. (2000). A Quick Introduction to Voice over Internet Protocol (VoIP). Available: http://www.jacksons.net/A%20Quick%20Introduction%20to%20Voice%20over%20Internet%20Protocol.pdf. Last accessed 14th Sep 2011. 3. D. Richard Kuhn. (2005). Security Considerations for Voice Over IP Systems. Available: http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf. Last accessed 14th Sep 2011. 4. ANSHUL KUNDAJE. (2001). Voice over Internet Protocol (VoIP). Available: http://www1.cs.columbia.edu/~abk2001/voip.pdf. Last accessed 14th Sep 2011. 5. Jonathan Davidson. (2000). Voice over IP Fundamentals. Available: http://searchunifiedcommunications.techtarget.com/searchVoIP/downloads/Chapter_9.pdf. Last accessed 14th Sep 2011. 6. Karie Gonia. (2004). Latency and QoS for Voice over IP. Available: http://www.sans.org/reading_room/whitepapers/voip/latency-qos-voice-ip_1349. Last accessed 14th Sep 2011. 7. R.Kravets and P.Krishnan, “Application-driven power management for mobile communication”, ACM Wireless Networks 6, 4 (2000), 263--277, 2000. 8. V. Raghunathan, T. Pering, R. Want, A. Nguyen and P. Jensen, “Experience with a Low Power Wireless Mobile Computing Platform”, In ISLPED, August 2004. 9. X. Perez-Costa, D. Camps-Mur and T. Sashihara, “Analysis of the Integration of IEEE 802.11e capabilities in battery limited mobile devices”, In IEEE Wireless Communications, December 2005. 10. “WMM Power Save for Mobile and Portable WiFi CERTIFIED Devices”. WiFi Alliance, December 2005. Available: http://www.wi-fi.org. 11. Ye Chan, Natt Smavatkul and Steve Emeott, “Power Management for VoIP over IEEE 802.11 WLAN”, Wireless Communications and Networking Conference, IEEE WCNC, March 2004 12. R. Chandra, V. Padmanabhan, and M. Zhang. WiFiProfiler: Cooperative Fault Diagnosis in WLANs. In Proceedings of the Annual ACM/USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), 2006 13. COUNTERPATH. X-Lite 3.0 telephony client. http://www.xten.com/ 14. D Vermeulen. (2009). Research Design and Method. Available: http://upetd.up.ac.za/thesis/available/etd-10172009-121302/unrestricted/02chapters3-4.pdf. Last accessed 14th Sep 2011. 15. Trochim. (2000). Qualitative Measures. Available: http://ifmr.ac.in/cmf/mrap/wp- content/uploads/2009/04/qualitative-measures.pdf. Last accessed 14th Sep 2011. 16. Sasha Hurrell. (2004). DATA COLLECTION CHALLENGES. Available: http://thepartneringinitiative.org/docs/tpi/DataCollectionChallenges.pdf. Last accessed 14th Sep 201. 17. Jennifer Rowley. (2002). Using Case Studies in Research. Available: http://www.arf-asia.org/research_methodology/qualitative_research/case_study_research/using_case_study_in_research.pdf. Last accessed 14th Sep 2011. 18. R. Kravets and P. Krishnan. Application-driven Powe Management for Mobile Communication. Wireless Networks, 6(4):263–277, 2000 19. M. Machowinski, “VoIP services and subscribers: Annual market share and forecasts,” Infonetics Research, Inc., Aug. 4, 2008. 20. R. Cole and J. Rosenbluth, “Voice over IP peformance monitoring,” ACM SIGCOMM Comput. Commun. Rev., vol. 31, no. 2, Apr. 2001. 21. J. Bolot, S. Parisis, and D. Towsley, “Adaptive FEC-based error control for Internet telephony,” in IEEE INFOCOM, 1999. 22. C. Huang, S. Sukittanon, J. Ritcey, A. Chindapo, and J. Hwang, “An embedded packet train and adaptive FEC scheme for VoIP over wired/wireless IP networks,” in IEEE ICASSP, 2006. 23. Y. Amir, C. Danilov, S. Goose, D. Hedqvist, and A. Terzis, “An overlay architecture for high-quality VoIP streams,” IEEE Trans. on Multimedia, vol. 8, no. 6, Dec. 2006. 24. R. K. Rajendran, S. Ganguly, R. Izmailov, and D. Rubenstein, “Performance optimization of VoIP using an overlay network,” in IEEE INFOCOM, 2006 25. Tracey, M. 2008. Voip Voice Over IP 100 Success Secrets - 100 Most Asked Questions on Voip Phones, Providers and Services. Raleigh, NC: Lulu.com. 26. Shehan Perera, B.E. 2008. VoIP and best effort service enhancement on fixed WiMax, University of Canterbury. 27. Ooi, C.Y. 2005. The Emergence of the Wireless VoIP Phone. Intel Microelectronics Malaysia. Available at: http://www.iec.org/newsletter/jan07_2/analyst_corner.pdf [Accessed 01 March 2010]. 28. Murty, R., Wolman, A., Padhye, J. and Welsh, M. 2008. An Architecture for Extensible Wireless LANs. Harvard University. Available from: <http:// www.eecs.harvard.edu/~mdw/papers/trantor-hotnets08.pdf> [Accessed 03 March 2010]. 29. Javaid, U., Meddour, D.E., Rasheed, T. and Ahmed, T. 2008. Mobility Management 30. Heer, T., G¨otz, S., Weing¨artner, E. and Wehrle, K. 2008. Secure Wi-Fi Sharing at Global Scales. IEEE.

Similar Documents

Free Essay

Future of Voip

...Future of VoIP Introduction If we are to considered ourselves as the business aiming at profit increase and progressing growth , thus delivering better quality services to our customers, we have to think about our operational cost and the ways of reducing it. One such way is the implementation of Voice over Internet Protocol ( VOIP ), also known as the internet telephony. VOIP has become more popular in recent years as companies need to cut costs and improve communication between increasingly mobile employees and increasingly global customers. The first Voice over Internet Protocol (VoIP) call was made back in 1995 between two PCs. Initially, this was just a technological novelty. However, by 1998, VoIP had already begun establishing itself as a low cost means of providing calls over long distances. It was estimated to carry about one percent of the US phone traffic. Thirteen years later, VoIP has managed to revolutionize the manner in which business and residential communications take place. Infonetics estimates that about 25 percent of the total international phone traffic is handled as VoIP. So what exactly is VoIP and how does it work? Let me give a few basics about VoIP. Many people have used a computer and a microphone to record a human voice or other sounds. The process involves sampling the sound that is heard by the computer at a very high rate (at least 8,000 times per second or more) and storing those "samples" in memory or in a file on the computer. Each...

Words: 3294 - Pages: 14

Free Essay

Kamote Kayo

...Project in Data Communication Helen Grace A. Fernandez 201011542 February 9, 2011 Contents 1 Reaction to the Game 2 Description of Hardware 2.1 First Generation . . . . . . . . . 2.1.1 1G Base Station . . . . . 2.1.2 Copper Node . . . . . . . 2.1.3 Coax Node . . . . . . . . 2.1.4 Optical Node . . . . . . . 2.1.5 20 RAS 5850s . . . . . . . 2.1.6 WAN Switch IGX MGX 2.1.7 WAN Switch BPX . . . . 2.1.8 Router 7200 . . . . . . . . 2.1.9 Router 7500 . . . . . . . . 2.1.10 ONS 15454 . . . . . . . . 2.1.11 Mobile Switch MSC . . . 2.1.12 Cable Headend Analog . 2.1.13 Cable Headend Digital . 2.1.14 Telephone Switch . . . . 2.1.15 Second Generation . . . . 2.1.16 50 WiFi Base Stations . 2.1.17 25 MSPPs . . . . . . . . . 2.1.18 10 CMTS UBRs . . . . . 2.1.19 50 DSLAMs . . . . . . . . 2.1.20 25 MWRs . . . . . . . . . 2.1.21 20 Cat2000 Switches . . 2.1.22 Router 7600 . . . . . . . . 2.1.23 Router 10000 . . . . . . . 2.1.24 Router 12000 . . . . . . . 1 8 10 10 10 12 13 14 15 16 17 18 20 22 23 24 25 26 27 28 29 30 31 32 33 34 36 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 35981 - Pages: 144

Free Essay

Cisco Webex Meetings

...Whether you're holding a brainstorming session or making a presentation, turning your online meeting into a virtual video conference helps everyone focus on every word. The two-way streaming video on iPad and iPhone delivers an unparalleled visual experience on the go. Getting face-to-face has never been easier! Features: Mobile video conferencing (requires Wi-Fi) with: •High-quality, multipoint video •2-way video with camera switcher •Voice-activated video switching •Full-screen video •View content and video simultaneously (iPad only) •Cisco TelePresence WebEx OneTouch support Host account capabilities, including: •Schedule, start, and cancel a meeting •Invite others to a meeting •Pass presenter capabilities to another participant Meeting Capabilities: •Join via WebEx meeting email invite, meeting number, WebEx site URL, or My Meetings List •Integrated VoIP audio and web conferencing on Wi-Fi and 3G •Full-screen meeting view •View attendee list •View shared content with annotations •Pinch to zoom and scan •Private or group chat Global and Enterprise Ready: •You can now sign in to WebEx via your corporate account (for sites with Single Sign-On, or SSO, enabled) •Enable users to join a meeting from behind the...

Words: 3188 - Pages: 13

Free Essay

Capstone Final Documentation

...By Instructor – Roman Danyew Table of Contents Introduction to Cornerstone Communications………………………….................. 3 STAR MEDICAL’s Proposal Overview ……………………………….................. 4 Executive Summary………………………………………………………………... 6 Assumptions and Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications solutions for various companies since 2005. Cornerstone Communications has throughout the years stayed on top of current networking trends and technologies to ensure reliability and extensive network...

Words: 7795 - Pages: 32

Free Essay

Voip

...VoIP Voice over IP Hani Aladmaai Prof. Ali Bicak IT-520: Enterprise Infra and Networks Introduction VoIP or Voice over Internet Protocol is an IP based approach to transmitting voice over a computer network. It allows a person to make voice calls using an Internet connection instead of using a phone line. The user can make phone calls free (in certain circumstances), or they may get a service provider and pay a very low rate. How VoIP works is, it converts your voice into a digital signal that will travel over the Internet. First to send voice over a digital network, it must first be converted to digital and converted back to analog at the receiving end. VoIP may allow you to make a call directly from a computer, via VoIP programs such as Skype, a special VoIP phone, or your traditional phone connected to a special adapter. The research paper will begin with an introduction as to what VoIP is, what it accomplishes, what purpose it serves and how it works; also how it is configured. Next it will discuss some of advantages and disadvantages. Legal issues will also present on the usage of the VoIP. What is VoIP? VoIP or Voice over Internet Protocol is an IP based approach to transmitting voice over a computer network. It allows a person to make voice calls using an Internet connection instead of using a phone line. The user can make phone calls free (in certain circumstances), or they may get a service provider and pay a very low rate. How does VoIP...

Words: 3847 - Pages: 16

Premium Essay

Broadband Industry

...especially designed for business needs. Executive Summary: WiMAX is a Worldwide Interoperability of Microwave Access. WiMAX is described in IEEE 802.16e Wireless Metropolitan Area Network (MAN) standard which has recently been introduced in Bangladesh by AD consortium Qubee. It is expected that WiMAX compliant systems will provide fixed wireless alternative to conventional DSL and Cable Internet. Qubee Wimax is using Motorola's WiMAX technology to provide wireless fixed broadband data services for residential and corporate use. The company is using WIMAX as a cost effective and fast-to-deploy broadband solution, as part of its strategy to create a world-class communications network in Bangladesh. It brings you the ability to communicate and connect via voice with your family, clients and business partners seamlessly. But Qubee Wimax faced criticism by the customers due to some flaws in their technology and services. They couldn’t get that much appreciation in the market as the company was expecting. People were unaware of the technology...

Words: 5308 - Pages: 22

Free Essay

Android Based Webstatic Server

...Transactions………………………………………………………….. 4.1.2 DESIGN………………..…………………………….……… 5 UML Diagrams………………………………………………………… 5.1 Class Diagram………………………………………………………… 5.1.1 Usecase Diagram….……………………………………………….. 5.1.2 Sequence Diagram….……………………………………………….. 5.1.3 RESULT FOR IMPLEMENTATION…………………… 6 Output Screens………………………………………………………. 6.1 SYSTEM TESTING………………………………………….7 Types of Testing………………………………………………………. 7.1 TESTCASES…………………………………………………..8 CONCLUSION………………………………………………..9 ANDROID BASED STATIC WEBSERVER ABSTRACT Android is software platform and operating system for mobile devices. Being an open-source, it is based on the Linux kernel. It was developed by Google and later the Open Handset Alliance (OHA). It allows writing managed code in the Java language. Due to Android here is the possibility to write applications in other languages and compiling it to ARM native code. This project is a mobile-based web server for serving static HTML/JavaScript pages to the client systems (the systems could be PCs or Mobiles) for access by these client systems. A static website will be designed to serve from the mobile(web server). The Mobile Web server is based on Android OS. The...

Words: 9090 - Pages: 37

Premium Essay

Smartphones Operating Systems

...Operating system : An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS. All these, except Windows, Windows Phone and z/OS, share roots in UNIX. Smartphone A Smartphone, or smart phone, is a mobile phone built on a mobile operating system, with more advanced computing capability and connectivity than a feature phone. The first smartphones combined the functions of a personal digital assistant (PDA), including email...

Words: 15551 - Pages: 63

Premium Essay

Broadband Network

...COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY DSTI/ICCP/TISP(2005)12/FINAL Unclassified Working Party on Telecommunication and Information Services Policies MULTIPLE PLAY: PRICING AND POLICY TRENDS English - Or. English JT03207142 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP/TISP(2005)12/FINAL FOREWORD This report was presented to the Working Party on Telecommunication and Information Services Policies in December 2005 and was declassified by the Committee for Information, Computer and Communications Policy in March 2006. The report was prepared by Mr. Yoshikazu Okamoto and Mr. Taylor Reynolds of the OECD’s Directorate for Science, Technology and Industry. It is published under the responsibility of the SecretaryGeneral of the OECD. © OECD/OCDE 2006 2 DSTI/ICCP/TISP(2005)12/FINAL TABLE OF CONTENTS MAIN POINTS.............................................................................................................................................. 6 Regulatory issues........................................................................................................................................ 7 INTRODUCTION ......................................................................................................................................... 8 First consolidation: Multiple services via one provider...

Words: 33525 - Pages: 135

Free Essay

Radio Frequency (Rf) Interference Analysis and Optimization

...Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul Haque Assistant Professor Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Internal) Dr. Subrata Kumer Aditya Professor Department of Applied Physics, Electronics and Communication Engineering University of Dhaka ---------------------(External) ii ABSTRACT Wireless Local Area Network (WLAN) applications are new, fast...

Words: 18928 - Pages: 76

Premium Essay

Future of Technology

...THE FUTURE OF TECHNOLOGY OTHER ECONOMIST BOOKS Guide to Analysing Companies Guide to Business Modelling Guide to Business Planning Guide to Economic Indicators Guide to the European Union Guide to Financial Markets Guide to Management Ideas Numbers Guide Style Guide Dictionary of Business Dictionary of Economics International Dictionary of Finance Brands and Branding Business Consulting Business Ethics Business Strategy China’s Stockmarket Globalisation Headhunters and How to Use Them Successful Mergers Wall Street Essential Director Essential Economics Essential Finance Essential Internet Essential Investment Essential Negotiation Pocket World in Figures THE FUTURE OF TECHNOLOGY THE ECONOMIST IN ASSOCIATION WITH PROFILE BOOKS LTD Published by Profile Books Ltd 3a Exmouth House, Pine Street, London ec1r 0jh Copyright © The Economist Newspaper Ltd 2005 All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. The greatest care has been taken in compiling this book. However, no responsibility can be accepted by the publishers or compilers for the accuracy of the information presented. Where opinion is expressed it is that of the author and does not necessarily...

Words: 128899 - Pages: 516

Free Essay

Lte Complete Tutorial

...technology, but with further additions the technology can be migrated to a full 4G standard and here it is known as LTE Advanced. There has been a rapid increase in the use of data carried by cellular services, and this increase will only become larger in what has been termed the "data explosion". To cater for this and the increased demands for increased data transmission speeds and lower latency, further development of cellular technology have been required. The UMTS cellular technology upgrade has been dubbed LTE - Long Term Evolution. The idea is that 3G LTE will enable much higher speeds to be achieved along with much lower packet latency (a growing requirement for many services these days), and that 3GPP LTE will enable cellular communications services to move forward to meet the needs for cellular technology to 2017 and well beyond. Many operators have not yet upgraded their basic 3G networks, and 3GPP LTE is seen as the next logical step for many operators, who will leapfrog straight from basic 3G straight to LTE as this will avoid providing several stages of upgrade. The use of LTE will also provide the data capabilities that will be required for many years and until the full launch of the full 4G standards known as LTE Advanced. 3G LTE evolution Although there are major step changes between LTE and its 3G predecessors, it is nevertheless...

Words: 18462 - Pages: 74

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502

Free Essay

Telecommunication

...TELECOMMUNICATIONS Telecommunication is communication at a distance by technological means, particularly through electrical signals or electromagnetic waves. Due to the many different technologies involved, the word is often used in a plural form, as telecommunications. Early telecommunication technologies included visual signals, such as beacons, smoke signals, semaphore telegraphs, signal flags, and optical heliographs. Other examples of pre-modern telecommunications include audio messages such as coded drumbeats, lung-blown horns, and loud whistles. Electrical and electromagnetic telecommunication technologies include telegraph, telephone, and teleprinter, networks, radio, microwave transmission, fiber optics, communications satellites and the Internet. A revolution in wireless telecommunications began in the 1900s with pioneering developments in radio communications by Guglielmo Marconi. Marconi won the Nobel Prize in Physics in 1909 for his efforts. Other highly notable pioneering inventors and developers in the field of electrical and electronic telecommunications include Charles Wheatstone and Samuel Morse (telegraph), Alexander Graham Bell (telephone), Edwin Armstrong, and Lee de Forest (radio), as well as John Logie Baird and Philo Farnsworth (television). The world's effective capacity to exchange information through two-way telecommunication networks grew from 281 petabytes of (optimally compressed) information in 1986, to 471 petabytes in 1993, to 2.2 (optimally...

Words: 7569 - Pages: 31

Free Essay

Telco Regulation

...Tenth Anniversary Edition Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK TELECOMMUNICATIONS REGULATION HANDBOOK The Telecommunications Regulation Handbook is essential reading for anyone involved or concerned by the regulation of information and communications markets. In 2010 the Handbook was fully revised and updated to mark its tenth anniversary, in response to the considerable change in technologies and markets over the past 10 years, including the mobile revolution and web 2.0. The Handbook reflects modern developments in the information and communications technology sector and analyzes the regulatory challenges ahead. Designed to be pragmatic, the Handbook provides a clear analysis of the issues and identifies the best regulatory implementation strategies based on global experience. February 2011 – SKU 32489 Edited by Colin Blackman and Lara Srivastava Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK Edited by Colin Blackman and Lara Srivastava Telecommunications Regulation Handbook Tenth Anniversary Edition Edited by Colin Blackman and Lara Srivastava ©2011 The International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication Union All rights reserved 1 2 3 4 14 13 12 11 This volume is a product of the staff of the International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication...

Words: 132084 - Pages: 529