• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  • Level: GCSE
  • Subject: ICT
  • Word count: 1976

The future technologies and management of voice over IP

Extracts from this document...

Introduction

BADM530 - USDSU Jason Shea Abstract The big buzzword in Telecommunications for the past three years has been VoIP, or voice over Internet Protocol. This technology allows users to connect VoIP telephones to a home or business network, bypassing the original telephone connection. There are several new software companies that have introduced desktop applications that allow users to easily use their computers to conduct telephone calls. For long distance purposes, it can be cheaper to use VoIP technologies instead of the standard telephone lines. There are several pitfalls to VoIP, such as a slow connection speed, which can cause poor audio quality or dropped calls, similar to a cell phone. This presents several obstacles for management in deciding if VoIP would be cost-effective. It also presents obstacles for the technology specialists to understand the pitfalls and develop more effective technologies. Improved connection speeds and emerging advanced technologies, could lead to an increase in VoIP usage. The Future Technologies and Management of Voice Over Internet Protocol Telecommunications managers should be continually searching and monitoring the market for emerging technologies. One such technology that managers should be aware of is voice over Internet Protocol, otherwise known as VoIP. VoIP allows for the combining of voice and data applications onto a single platform, which is known as "convergence." A converged network offers businesses numerous advantages over the older, two-network voice and data system, including lower costs, simpler network management, and the ability to deploy new applications that heighten both productivity and customer service. ...read more.

Middle

Most of these lines are not encrypted; therefore, all of the lines can be monitored by hackers. Locations where hackers could potentially tap into the network should be secured. If a VoIP session is going to be initiated over the Internet, a VPN tunnel is required. IPSec and Secure Socket Layer VPN vendors are adding VoIP support to their products. It is important for telecommunications managers to run their VoIP server separate from the rest of the network. The utilization of a firewall that is VoIP "aware" is essential if there are voice-mail options. It is important to keep voice-mail completely secure since company secrets may be discussed. Redundancies across the entire system are necessary for a stable VoIP environment. These redundancies include backup power and backup circuits. Some other options available to telecommunications managers in securing their VoIP system include, network security and health monitoring technologies, access controls at connection points to data network segments, and scalability of design relative to current and projected requirements. There are several factors that a telecommunications manager must take into account when developing a well thought out security plan for VoIP. There are three main threats to VoIP security: authentication failures, integrity failures, and privacy failures. Telecommunications managers should consider all three at each layer of VoIP implementation. The application layer is the most difficult in securing. Most VoIP networks run on phones, which have limited hardening and poor security. ...read more.

Conclusion

(Beardsley et al.) Another factor that could influence the growth of voice over Internet Protocol is the Federal Communications Commission's regulations. Presently, they have been pressured into stepping in to make regulatory decisions concerning the governance of VoIP. This was sparked by several states exploring their ability to regulate intrastate VoIP calls. The state and federal government will be battling the industry over how or even if VoIP should be regulated. A major part of the debate comes down to monetary issues. Sates and incumbent telephone providers want a piece of the VoIP pie. Their focus centers on three primary areas, state telecommunications tax revenues, monetary contributions to the federal state universal service fund supporting rural services, and intercarrier compensation for calls traveling the public switched telephone network. The regulations that were set forth for the monopoly circuit-switch phone systems are ill-suited to be translated to the VoIP systems. But it is important to understand the regulatory backdrop to participate in the current regulatory debate of VoIP. (Blosser and Kunin) Conclusion While VoIP could be an emerging standard in communications, it is important for telecommunications managers to consistently analyze their internal environment to decide if implementing a VoIP system would be economical. As broadband becomes more readily available and increased bandwidth speeds are utilized, companies will be more willing to adopt VoIP systems without worrying about a loss in the Quality of Service. While it will be a gradual process of transferring circuit-switch phone systems to voice over Internet Protocol systems, it is a technology that telecommunications managers must be aware of and constantly analyze the benefits for their business. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. OCR GCSE Business & Communication Task 7 Report

    This may cause a few problems for clients as it may be difficult to fill in this code, but overall it Is a secure, methodical and fuss-free way. If I was to leak information or mislead clients data, I am not only risking trust and an overall impression upon my company, but I can also lose money (profit)

  2. ICT Systems in Everyday Life: Your Local Community

    There are yet a number of problems and obstacles to overcome and solve. "Skill shortage", the lack of skilled professionals in the sector, represents, in my opinion, one of the obstacles for the development of digital cinema. Today professional figures are continuously evolving and their evolution is strictly related to the advancement of technology.

  1. Free essay

    Impact of ICT in Community

    write whatever she wants to her friends and family, she can even send emails, so she will also be able to type faster, Mary won't have problems finding the alphabet she is looking for that would also increase her typing speed and she will also be able to use any other symbols such as: � or $ and etc.

  2. Full Course howard health centre

    computer hard drives this data will be kept in different locations in the case of a fire or from water damage. Data collection & input: The input stage is where all data is entered into the CPU so t can be processed and be output to the user.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    6.1.1 To keep the best customers, SK-II management should concentrate on these strategies * Quickly and efficiently creating new delivery channel * Capturing massive amounts of customer data * Tying it all together to create an unique experience 6.1.2 The three phases of CRM that SK-II should adopt * Acquiring

  2. Bookshop Manager

    More space inside the computer's box prevents overheating 2. Space for more memory and for hard drives 3. Can be on most hours 4. Much more easy to replace/add components than on a laptop 5. Easier to use It would be advisable to get a computer with a Pentium 4 or an AMD Athlon processor, because they are more powerful and reliable than others.

  1. Unit 23: Investigating Communications and Networks

    * Terminators are required at both ends of the backbone cable. * Difficult to identify the problem if the entire network shuts down. * Not meant to be used as a stand-alone solution in a large building. * More users mean that the network is slower Ring - This topology

  2. Report on technologies relating to businesses and organizations

    Networks are separated into two main categories, Local Area Networks and Wide Area Networks. LAN Local Area Network - A computer communications system limited to no more than a few miles and using high-speed connections (2 to 100 megabits per second).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work