Man's yearning to communicate using wires could be dated back to when Alexander Graham Bell invented the telephone. "Mr. Watson, come here, I want you" with these historic words Mr. Bell called his assistant Thomas Watson over the so-called 'telephone' and a revolution was born…
History of 'Voice over Internet Protocol' (VoIP) can be dated back to 1973, when the Advanced Research Projects Agency Network (ARPAnet), the predecessor of today's 'Global Internet', used 'Packet Switching' for voice communication. By the late 1990s it evolved into a standard telephone hooked up to an internet connection. Today, with the introduction of 'Broadband Internet' and improvement in 'Quality of Service', traditional phone lines are slowly being phased out as businesses and households around the world embrace the benefits and features that VoIP technology has to offer.
In existing telephone systems, which use 'circuit switching', when a call is made between two parties, the 'connection' between them is maintained for the duration of the call. This is the basic foundation of the Public Switched Telephone Network (PSTN). Earlier, every call had to have a dedicated wire stretching from one end to the other for the duration of the call. So, if suppose you wanted to call from Washington DC to San Francisco, you actually owned a cable that long for the duration of the call. Later, with digitalization, your voice along with thousands of others was combined onto a single fiber optic cable for most of the distance, yet there was a dedicated copper wire going through each house. "For more than a hundred years, the PSTN was the only bearer network available for telephony." (PSTN, par.5)
In VoIP, you do not maintain ...
Each 'payload' is then packed in a 'packet' with an address on each one telling the network devices where to send them. The 'packet' is then 'routed' through the internet to the receiving computer, which retrieves the 'payload' and reassembles the 'data' in its original state, which is, in the last networking stage, converted back to 'voice'. Each 'packet' may follow an entirely different path to the destination computer. This makes VoIP very efficient since it lets the network route the packet along the least congested lines. Also, since there is no need for any continuous connection, "it minimizes the time that a connection is maintained between two systems, which reduces the load on the network." (HPSW, par.3) So, if given the liberty to define, we could call VoIP as the 'process of converting voice into data and then sending it via a network'.
The things you would need to get started are:
A 'High Speed' Internet Connection: Depending upon availability, your budget and the amount of telephone traffic, you can choose between many different products.
A VoIP Box: An adaptor that lets you connect your phone to the network.
An Account with a VoIP Provider: That provides real-time two-way voice communication using the Internet Protocol.
An Audio I/O Device OR A Stunning Gizmo: Although to use some of the basic services, you could just get away with your PC with a Speaker and a Microphone, most users are accustomed to a soft phone loaded on a laptop. Wi-Fi enabled mobile phones today provide additional features like multi-call conferencing, video conferencing, internet faxing, web browsing, etc.
Advantages of Using VoIP:
One major advantage of the 'Packet Switching' technology used in VoIP is that it allows multiple phone ...
Cite this document
(“Internet Telephony Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/283682-internet-telephony
(Internet Telephony Essay Example | Topics and Well Written Essays - 1250 Words)
“Internet Telephony Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.net/miscellaneous/283682-internet-telephony.
In the modern world, there is too much of dependence on the use of technology that can be seen in every field of work that an individual is involved in. The effects of technology and technological systems can be reflected from the changes taking place globally trying to make the world a better place to live in.
The Federal Communications Commission (2010) for instance posits that “some VoIP services may only allow you to call other people using the same service. Also, some VoIP services only work over your computer or a special VoIP phone.” These are in doubt, great portability limitations to the use of VoIP.
Internet, one of the marvels of technology, alters the voice signals into digital signals and then transmits them via IP-based networks or data network. This unprecedented advancement in telecommunication has come to known as VoIP (Voice over Internet Protocol).
The central office route calls to and from your phone known as the trunk, for all incoming and external calls.1 However Huffman Trucking subscribed only for the normal phone features in absence of a call waiting, voice mail, and incoming call detection. An internal call on PBX usually called as local number consists of 3 to 4 numbers.
The application of the services in information sensitive industries like trade, customer service and education indicates that it has achieved a degree of success in terms of its major issues. The paper concludes that the establishment of minimum standards of performance and to ensure the productivity of VoIP services in the industry is essential to make advance its position.
These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.The paper will involve an understanding of the current security implications of VoIP, and to run VoIP in a safe, secure manner.
The digital revolution starting off from analog to digital conversion has provided plenty of opportunities to the communication and broadcasting industry with the development of Internet Protocol (IP). Services like
The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack.
VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of
e of distance learning for the purposes of employee training and save on travel and accommodation fees and the time that the employees would have lost while travelling and during training. My organisation can still make use of the cheap telecommunication available over the
1 Pages(250 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Internet Telephony for FREE!