Running Head: VoIP VoIP VoIP Over the past two decades, technology has revolutionized rapidly more than any other facet in this competitive world and thus, has left an indelible imprint on the entire planet. With the passage of time, technology is incessantly offering with a wide range of innovative, over-whelming products that have reformed human life…
“IP telephony, Internet telephony, Voice over Broadband (VoBB), broadband telephony, and broadband phone are few other terms that can be used as an alternative of VoIP” (Davidson, 2007). Communication services such as SMS, voice messaging, facsimile etc. are the few examples of VoIP that uses the internet as a mode of transmission instead of PSTN (public switched telephone network) nowadays. According to an analysis made by analysts in the past few years, it has come into limelight that a proportion of 20 % of businesses in U.S. have brought VoIP into practice and this fraction is likely to accelerate in the upcoming years (Wallingford, 2005). In this modern era of breakthroughs, where VoIP has experienced a boom in the field of commerce, one of its prime examples includes ANSR, Inc. A small company, located in Midwestern U.S. that initiated its business as e-Marketing and real estate across the country with a wide spread employment network. Due to fast-moving business, soon it necessitated system, which could address to its increasing communication requirements for its strewn workforce. However, ANSR also needed complete packaged phone related software that could integrate the two diverse branches of its business working in correlation at one place. ...
Cite this document
(“VoIP Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.net/other/31601-voip
(VoIP Essay Example | Topics and Well Written Essays - 500 Words)
“VoIP Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.net/other/31601-voip.
Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat.
“Assignment” “Multimedia Networking – VoIP” Since the birth of man, he has been moving from one age to the other, climbing up the ladder of success rung by rung. Man has started his life by hunting for everything. In his pursuits, the flame of knowledge began to quiver and thus burst into the most violent volcano.
In addition, IP-PBX is particularly useful for carrying out various business activities or enterprises that require upholding continuous communication link with business associates as well as customers that are remotely connected to the business. Thus, IP-PBX is a system to supervise and manage a corporation all through the globe.
The Federal Communications Commission (2010) for instance posits that “some VoIP services may only allow you to call other people using the same service. Also, some VoIP services only work over your computer or a special VoIP phone.” These are in doubt, great portability limitations to the use of VoIP.
13 Intrusion-prevention systems (IPS) 14 Software Systems 15 Multilayer Security 15 Conclusion 15 16 16 VoIP Security Problem and Solution Voice over Internet Protocol (VoIP) is a famous buzzword these days. It is a modern technology based communication or way of data transmission over the phone just around the corner.
In the present age of information technology it has become a need of the day to integrate data and voice. Major companies having very large networks want to reduce the running cost of their networks. Instead of having two networks, one for data and one for voice, they want to carry voice over their data networks thus enjoying both facilities while running a single network.
As the report Illegal use of VOIP states the number of VoIP service providers is increasing day by day. NIP telephony services require interoperation of IP networks and this open nature of the IP networks open niche for its illegal uses. Nowadays these services are provided by unlicensed VoIP providers.
These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.The paper will involve an understanding of the current security implications of VoIP, and to run VoIP in a safe, secure manner.
The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack.
VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of