StudentShare solutions
Triangle menu

Evaluate research methodologies used in VoIP research - Essay Example

Not dowloaded yet

Extract of sample
Evaluate research methodologies used in VoIP research

A thorough security analysis is done at every stage of the protocol for understanding the risks and ways to combat it. The third stage is the key derivation process in protocols like Mickey which is thoroughly analyzed and done.
The article “Quantifying Skype User Satisfaction” is based on the various peer-to-peer protocols and thoroughly analysis of the model which is developed to measure the user satisfaction index. A detailed analysis of the communication and the various VoIP sessions that are responsible for making it happen. The Cox model is developed and analyzed for making the User satisfaction index interpretation quite strong with detailed analysis.
Most of the data is from journals and web related material which makes it quite usable to use the information for analysis and design. The variety of suggestions would make sure that all the analysis is well supported and framed for getting the right decision for the paper and its objectives. Pervez & Kjell (2005) defines as: “we must ourselves collect the data that are relevant to our particular study and research problem.”
The large academic text and journals which are required for making the right judgment for illustrating the theory and explanation of the various protocols are of good. The renowned nature of books and journals make sure that all the information is taken to its full extent.
The research method used is quite susceptible to various faults as security is not discussed in detail and more emphasis is given to VoIP protocols for their illustration. The in-depth discussion on the various VoIP protocols would make sure that all the various aspects are touched upon and illustrated in detail. The detailed discussion of the various VoIP protocols is an advantage of the paper and make sure that all the various scenarios are taken care to its maximum in deriving the gross attitude for fetching the objectives of the paper. The various ...Show more

Summary

The article “Security Analysis of Voice-over-IP Protocols” discusses the security problems and the primary focus is on discussing the various attacks possible for the VoIP. It further discusses the various implications that are required for strengthening the VoIP protocol at…
Author : rstokes
Evaluate research methodologies used in VoIP research essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Evaluate research methodologies used in VoIP research"
with a personal 20% discount.
Grab the best paper

Related Essays

E-commerce: VOIP Security
Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat.
18 pages (4500 words) Essay
Business Research Methodologies Resit
2. To investigate the extent to which the above factors influence international students’ choice of mobile phones in London along with the relative importance of each 3. To make a comparison between local UK students and foreign students to assess the different consumer behaviour of the two groups.
6 pages (1500 words) Essay
Research Methodologies
This has been making the restaurants struggle for their profitability and for their survival. The industry has become more competitive and they need to evolve methods that will help them become more profitable. This research was undertaken to identify whether any of the new media for advertising that has been identified will help the restaurants to reap a better result.
27 pages (6750 words) Essay
Research Methodologies Paper
ired to address such issues, to designs the methodology for collecting data, analyzing it and communicates its findings and their implications (Lee, A. 2004). In order to introduce new products and services to the market, marketing managers need information so as to create
4 pages (1000 words) Essay
Critical thinking on research methodologies and methods used in the paper
The focus should be explain the relationships between methodology and methods in the paper The term methodology when used in relation to research refers to the way in which the research is
8 pages (2000 words) Essay
Computing Research Methodologies
Safety is a serious element while working in a science laboratory. Since the science laboratories are to train the trainees about different chemicals and dangerous biological substances so it is very
8 pages (2000 words) Essay
Research methodologies and personality
nsistency has also been discussed as a potential characteristic of personality (Ryckman, 2013), but it is often demonstrated that apparent personality does not always accurately predict behaviors or other related factors. This variability is due to the role of both biological
1 pages (250 words) Essay
Research Methodologies
This research will include an application of dominant research concepts and theories that can be used in the study. This will provide a commentary and apply important concepts and important standards that are important and vital
8 pages (2000 words) Essay
Evaluation of research methodologies
This paper develops a broader construct of integration in supply chain and sketches the advantages of a multi-case approach as an alternative methodology to survey
6 pages (1500 words) Essay
Business Research Methodologies
This is followed by a discussion of the research methodology, the data analysis approach and the ethical issues associated with the study. In the current business world,
12 pages (3000 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation