• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  • Level: GCSE
  • Subject: ICT
  • Word count: 1976

The future technologies and management of voice over IP

Extracts from this document...

Introduction

BADM530 - USDSU Jason Shea Abstract The big buzzword in Telecommunications for the past three years has been VoIP, or voice over Internet Protocol. This technology allows users to connect VoIP telephones to a home or business network, bypassing the original telephone connection. There are several new software companies that have introduced desktop applications that allow users to easily use their computers to conduct telephone calls. For long distance purposes, it can be cheaper to use VoIP technologies instead of the standard telephone lines. There are several pitfalls to VoIP, such as a slow connection speed, which can cause poor audio quality or dropped calls, similar to a cell phone. This presents several obstacles for management in deciding if VoIP would be cost-effective. It also presents obstacles for the technology specialists to understand the pitfalls and develop more effective technologies. Improved connection speeds and emerging advanced technologies, could lead to an increase in VoIP usage. The Future Technologies and Management of Voice Over Internet Protocol Telecommunications managers should be continually searching and monitoring the market for emerging technologies. One such technology that managers should be aware of is voice over Internet Protocol, otherwise known as VoIP. VoIP allows for the combining of voice and data applications onto a single platform, which is known as "convergence." A converged network offers businesses numerous advantages over the older, two-network voice and data system, including lower costs, simpler network management, and the ability to deploy new applications that heighten both productivity and customer service. ...read more.

Middle

Most of these lines are not encrypted; therefore, all of the lines can be monitored by hackers. Locations where hackers could potentially tap into the network should be secured. If a VoIP session is going to be initiated over the Internet, a VPN tunnel is required. IPSec and Secure Socket Layer VPN vendors are adding VoIP support to their products. It is important for telecommunications managers to run their VoIP server separate from the rest of the network. The utilization of a firewall that is VoIP "aware" is essential if there are voice-mail options. It is important to keep voice-mail completely secure since company secrets may be discussed. Redundancies across the entire system are necessary for a stable VoIP environment. These redundancies include backup power and backup circuits. Some other options available to telecommunications managers in securing their VoIP system include, network security and health monitoring technologies, access controls at connection points to data network segments, and scalability of design relative to current and projected requirements. There are several factors that a telecommunications manager must take into account when developing a well thought out security plan for VoIP. There are three main threats to VoIP security: authentication failures, integrity failures, and privacy failures. Telecommunications managers should consider all three at each layer of VoIP implementation. The application layer is the most difficult in securing. Most VoIP networks run on phones, which have limited hardening and poor security. ...read more.

Conclusion

(Beardsley et al.) Another factor that could influence the growth of voice over Internet Protocol is the Federal Communications Commission's regulations. Presently, they have been pressured into stepping in to make regulatory decisions concerning the governance of VoIP. This was sparked by several states exploring their ability to regulate intrastate VoIP calls. The state and federal government will be battling the industry over how or even if VoIP should be regulated. A major part of the debate comes down to monetary issues. Sates and incumbent telephone providers want a piece of the VoIP pie. Their focus centers on three primary areas, state telecommunications tax revenues, monetary contributions to the federal state universal service fund supporting rural services, and intercarrier compensation for calls traveling the public switched telephone network. The regulations that were set forth for the monopoly circuit-switch phone systems are ill-suited to be translated to the VoIP systems. But it is important to understand the regulatory backdrop to participate in the current regulatory debate of VoIP. (Blosser and Kunin) Conclusion While VoIP could be an emerging standard in communications, it is important for telecommunications managers to consistently analyze their internal environment to decide if implementing a VoIP system would be economical. As broadband becomes more readily available and increased bandwidth speeds are utilized, companies will be more willing to adopt VoIP systems without worrying about a loss in the Quality of Service. While it will be a gradual process of transferring circuit-switch phone systems to voice over Internet Protocol systems, it is a technology that telecommunications managers must be aware of and constantly analyze the benefits for their business. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. OCR GCSE Business & Communication Task 7 Report

    This therefore means I must be able to offer a secure and reliable security system that can then mean I am able to have customer's trust, and attract a wider audience. When completing my website I also incorporated a registration page.

  2. Critical Path Analysis

    Once a person has completed a given non-critical event within the float, they can continue to work on another non-critical event. This saves on people required to do the same number of tasks (see diagram), shifting the event along the float to the end of another.

  1. Strategic Management of Innovation.

    One of the key issues in the global wireless market is the adoption of uniform standards that will enable a consumer Internet access anywhere on the globe at anytime. Currently, Europe uses a standard known as the Global System for Mobile Communications (GSM), while Japan established the Personal Digital Cellular, or PDC, standard.

  2. ICT Systems in Everyday Life: Your Local Community

    the all-digital distribution and projection of movies has only recently arrived to complete the chain. A digitally produced or digitally converted movie can be distributed to theatres via satellite, optical discs, or fibre optic networks. The digitized movie is stored by a computer/server which "serves" it to a digital projector for each screening of the movie.

  1. Full Course howard health centre

    I am using the internet which means I am exposed to, unauthorised programs so I will use a firewall to prevent this from affecting me. Also the many millions of viruses that are usually contained in unsuspicious files which can be downloaded where the viruses then attach to your computer

  2. Bookshop Manager

    More space inside the computer's box prevents overheating 2. Space for more memory and for hard drives 3. Can be on most hours 4. Much more easy to replace/add components than on a laptop 5. Easier to use It would be advisable to get a computer with a Pentium 4 or an AMD Athlon processor, because they are more powerful and reliable than others.

  1. Unit 23: Investigating Communications and Networks

    * Fast data transfer as each user has an independent link to the server. Disadvantages of a Star Topology * Requires more cable length than a linear topology. * If the hub or concentrator fails, nodes attached are disabled. * More expensive than linear bus topologies because of the cost of the concentrators.

  2. Report on technologies relating to businesses and organizations

    Networks are separated into two main categories, Local Area Networks and Wide Area Networks. LAN Local Area Network - A computer communications system limited to no more than a few miles and using high-speed connections (2 to 100 megabits per second).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work