Thursday, March 30, 2017

VOIP - Voice-Over-Internet Protocol

1. VOIP Introduction and Overview\nVoice everyplace IP (VOIP) is arguably i of the most important developments in the field of telecommunication and entanglementing. VOIP allows us to transmit forebode conversations or juncture as selective information packets over the lucre communications protocol (IP); as a impression VOIP can be implemented of any data networks that would usance IP. Before transmitting the vocalize over IP network it is digitized and converted to IP packets. Since the net income is freely available end-to-end the world now it is manageable to practice session VOIP in a higher degree. Lets discuss in point what VOIP actually is and how it works. We depart as well as discuss the different protocols use to implement VOIP and finally we will discuss the benefits and disadvantage of VOIP.\n\nWhat is VOIP?\nVoIP is also known as Internet Telephony or IP Telephony, VOIP allows us to groom border calls over the Internet use a broadband mesh connection instead of the unwavering analog forebode lines. VOIP converts the voice signal from our tele forebodes into digital signals which propel over the Internet. We can use either a telephone or a PC as a drug user terminal while placing calls with VOIP. and so we can make either PC to PC call, PC to telephone calls or telephone to telephone calls with VOIP via the internet. (Voice over IP By Mark Lepp채nen)\n nonp beil of the main reasons why VOIP has wrench so popular with private consumers is that one can make long distance phone calls over the internet thereby bypassing the toll charges they would have ordinarily paid over handed-down telephone networks. Since VOIP allows us to mix voice and data; organizations are heavily inclined to lease their voice applications over the already existing data networks thereby reducing the overall nutriment cost and saving a lot of money. However, as the workout of VOIP increases we need to be alive(predicate) of the threats and vu lnerabilities associated with using VOIP; these threats are alike to what a user would experien...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.