StudentShare solutions
Triangle menu

Voip - Research Proposal Example

Nobody downloaded yet

Extract of sample

It is used for call initiation, call teardown and other call related data sent during a VoIP conversation.
SIP is a text based application level protocol. It depends majorly on other protocols such as IP and UDP for transport. VoIP implementations with SIP mostly use a SIP proxy server to which the login credentials of users are authenticated. The proxy server also routes call and signaling data. Clients can establish a communication link between each and forward SIP messages via the proxy. Communications using SIP are also used for changing call parameters or other features such as integrating more callers into a conference session. SIP registrars are used as additional servers to locate other users.
VoIP technology is likely to be misused by criminals as it often does not require verification of any details to start using the service. The security of making such calls may also attract criminals, as many implementations use strong encryption to secure both the voice payload and control messages. Skype uses 256 bit AES encryption while Google Talk does not encrypt its payload (but will support encryption in the future).
As an example, an organized crime ring may decide to use Skype software that allows ring members to communicate anonymously. Criminals could use laptops running Skype, create profiles like a regular user and communicate when necessary. ...Show more


VoIP is telephony which uses a packet switched network as against circuit switched networks. VoIP transmits packets of data between smart devices (e.g. computers) over a relatively unintelligent network, whereas traditional telephony sends voice data between dumb devices (telephones) through a super smart central network.
Author : bbernhard
Voip essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the research proposal on your topic
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

How will a governmental shutdown affect the American people
The research involves a combination of quantitative and qualitative methodologies so that the direct economic and social impacts can be studied from a variety of perspectives. As a result it can determine which groups are more likely to be impacted directly by a U.S. government shutdown, and which sectors are more likely to experience peripheral or indirect effects of the problem.
15 pages (3750 words) Research Proposal
E-commerce: VOIP Security
Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat.
18 pages (4500 words) Essay
Internet, one of the marvels of technology, alters the voice signals into digital signals and then transmits them via IP-based networks or data network. This unprecedented advancement in telecommunication has come to known as VoIP (Voice over Internet Protocol).
2 pages (500 words) Essay
Comcast voip telecommunications
The majority of VoIP service suppliers make use of public internet to convey our communication and calls; however Comcast technology makes use of corporate private advanced broadband communication network to broadcast our voice calls. Additionally, through this broadband technology based framework, Comcast Digital Voice service is capable to offer us countless improved innovations, with high quality of phone calls and clarity we expect (ComcastOffers, 2011).
6 pages (1500 words) Research Paper
Current Attitudes Concerning Media Literacy
Participants will be teachers, students and ordinary people. Some data will be collected via the Internet, and some via phone or VoIP. Participating teachers who volunteer to conduct this survey with their students will be emailed the forms and surveys or given links to the surveys.
6 pages (1500 words) Research Proposal
Report on VoIP
13 Intrusion-prevention systems (IPS) 14 Software Systems 15 Multilayer Security 15 Conclusion 15 16 16 VoIP Security Problem and Solution Voice over Internet Protocol (VoIP) is a famous buzzword these days. It is a modern technology based communication or way of data transmission over the phone just around the corner.
5 pages (1250 words) Essay
VoIP Call Analysis
Technology, led by the advent of the Internet has brought about several forms of advanced communication with Voice over Internet Protocols (VoIP) acting as the bedrock of this modern advent. A challenge that has however remained with the use of VoIP for the years however has to do with the subject of quality of service delivery to users.
4 pages (1000 words) Research Proposal
Optimisation of Web Protocols and Services
A carbon footprint can be defined as "the amount of greenhouse gases (GHG) that is released from an organization, at a particular event or from a product or an individual". There are various tests that can be used to calculate Carbon footprint of an ICT (Information and Communication Technology) comapny.
8 pages (2000 words) Research Proposal
VOIP security (information technology)
The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack. VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of
3 pages (750 words) Essay
Additionally, VoIP and IP telephony are turning out to be more and more well-known in corporations and consumers alike. In addition, many people use Internet Protocol (or
2 pages (500 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us