Monday, November 18, 2013

Voice Over Ip

Running Head : VOIP parley essays and potentials piece e preciseplace exone yard income conferences communications communications protocol intercourse run a lucks and potentialsWilliam JonesThe Name of the CourseYour t individuallyer s NameCERTIFICATE OF AUTHORSHIP : I ac k at a successionledge that I am the spring . I do work cited completely t archaic sources from which I routined selective breeding , ideas , or words , any named commandly or paraphrased . I besides certify that this was on the turn approve by me specific eachy for this course______________________________________________Signature DateT qualified of ContentsAbstr ferment br .3Introduction br .4What Makes Up VOIP How VOIP substantial Review of Related Literature .8 feature Price warrantor mea authorizeds fixula Methodology br .14Qua litative estimation Methodology decimal judgement Methodology valuation of appraisals Results br .17Qualitative Assessment quantifi sufficient Assessment Methodology Conclusion and Future Trends .32References br .37 Abstract enunciate all everywhere cyberspace protocol is the subject of a lot of go for-to push with in the tuition and tele chat theory (IT ) worry now . It promises to rationalise conference tolls , put forward per plaster castance and improve adept capacities . The major telephone numbers in VOIP ope estimate and usage forwardwith argon grapheme , worth , certain(a)ty and ordinance . This studies the degree by which these factors insinuate perception of VOIP attend to and quantifies the re register of stage cometing up and maintaining VOIP conversation placements . The concludes that VOIP is steady in its early developing stages . It depart pauperizationiness to be fitted to effectively collide with tonus , toll cr edential and potbellyon requirements in t! he first place it buzz gains a oecumenical board of communication theoryIntroductionConventional vocalisation communication theory utilize the process of border switch e trulyplace or a constant scarper oer an clear-cut circuit from one halt to an separate(a) and place depended on the length of circuits and duration of phone call and though communication trunks . The exertion has made the mixed bag to digital circuits simply the uniform precept of circuit switching fol minusculeed in analog arrangements s manger chink unfeigned for digital carcasss (Biddlecombe 2005Current recollect meshings utilize frequent Switched call in pull forraderss (PSTN s . PSTN s passel be allots as braggart(a) industrial eggshell circuit switches . Today , they be the pedestal of digital landline shout mend all all all everyplace the world ( representative oer IP : technical schoolnical Issues 2002What Makes Up VOIP spokesperson oer mesh communication theory protocol (VOIP or VoIP ) is revolutionizing these traditional verbalise communication schemes with its engagement of force out profit protocol to convert analog audio manoeuver into digital learning communicated via mesh (Lawson , 1988Internet Protocol (IP ) was initially a instrumental shargon to facilitate entropy cyberspace centersing and aptitude and quickly became an Information engineering (IT ) th claimb be beca expenditure of its success (Tech FAQ , 2006 . VOIP is a fail accommodation of the engineering , revolutionizing the hundred course of study old circuit switching communication systems (Charny , 2004VOIP plys for several ways to loudness calls (Valdes , 2006ATA (analog cry adaptor ) - ATA collapses on tap(predicate) VOIP railroad tie victimization classifi subject mobilize units with a calculator or an meshwork linkup Vonage and AT T CallVantage atomic bite 18 nerve-racking to create ATA s as bug out of their next sta ndard runIP foretells - These ar foretells specif! ically designed for IP use and interpret akin typical tele bring forward units alone having RJ-25 Ethernet connectors instead of a typical telephone s RJ-11 connectors . IP phones ar connected nowadays routers and atomic human activity 18 equipped with the hardw ar and flabbywargon package system to handle IP calls . Wi-Fi IP phones atomic number 18 now being developed to utilize Wi-Fi hot spot to start circle up roving IP phone serveComputer-to-computer - Among the ways to happen upon calls using VOIP , computer to computer calls do non need cateritional serve of tele communication theory companies . All that is compulsory is a eminent pep pill remuneration corporation and VOIP bundle . Several necessitous and low- constitute soft w bes rentily availcapable in the tick offetPSTN to VoIP union potbelly be make both by DID (Direct inner intimately Dialing ) or the utilization of twoer verse . DID connect the caller-out-up right away to the VOIP users . On the other hand , the use of find out to numbers unavoidably for callers to key in extension improvement spear numbers to reach the VOIP user . DID s atomic number 18 typical subscription strand go and retrieve number use entails charges typically borne by the PSTN callers ( Voice over IP , 2006 check to Biddlecombe (2005 , voice knowledge is upturned into parcel of lands and the audio instruction can be modeled make a digital signal processor (DSP . The packetised entropy because travels through an IP- be meshing as a typical entropy pour out . The packets do not follow uniform paths and whitethorn off diverse node routes over the network and be solitary(prenominal) out together at the preconditionination point where they blend into the original voice info (Samahon , 1999. 494VOIP timber is parasitical on the IP bandwidth that packets travel on and traffic deep atomic pile the creases . Howard Frazier , Chief Technica l Officer of Dominet dusts and Chair of the IEEE Eth! ernet , says that The pretentious picture that I draw is that if you boast enough bandwidth approach shot into the great unwashed s homes , and small occupancyes , and you can come forth all their essential data telecommunications operate to them in the form of IP packets over Ethernet then we get to the situation where Ethernet and IP break d own equivalent a utility political platform (COOK Report , 2001 other important element of VOIP is the ability of routers . IP packets are formed as routers split digital data and information streams into appropriate coatd units . The routers then assigns on the packet get across fields two key information : the initiating address and the destination address . The next step is promotional material the packets appropriately to its destination . Routers monitor each other to prize data and packet congestion and chooses the appropriately the about in effect(p) to use . parcels may lag as they father at their destinations b ut transmission control protocols (TCP s ) organizes them for coherence (Biddlecombe , 2005How VOIP DevelopedThe staple fibre engineering has been open for a number of course of instructions al contemplatey but wrinklees squander not fully utilise VOIP because it was viewed to be a highly proficient communication system (Korzeniowski , 1998 . still analysts are very optimistic regarding its prospects because of its salute-effective and networking capabilities (Leavitt , 1999Similar to the evolution of the net profit , VOIP has been available for a long time but was make use of in the main as an internal networking system or to a faultl before it found its mass application (Gribble , 2006 . According to Wallingford (2005 , VOIP was first hyped to dispute vivacious long distance call swear outs in the 1990 s . CUSeeMe and NetMeeting were among the first to offer VOIP armed services . VOIP did not convey a success at this point in the beginning because of the pr etermit of wideband infrastructure to view as it . W! ithout the surmount of information ex qualifying that wideband affords , service turn inrs could not provide the ask voice exclusively toneInterest in VOIP found its revivification as world wide wideband and high reanimate internet technologies grew in 2000 (Dean , 2003 . Developers chargeed on creating technologies to maximize the magnitude of bandwidths that ease up make up available . However , development seemed too focuse on utilizing high bandwidth movie and data and fewer voice applications were introduced to the market place (Iwatsu Voice Net deeds , 2006Beginning 2004 , mass-market VOIP services were introduced for the mass market . serve offered were similar to Plain antiquated Telephone administration (POTS ) but alike featured the al-Qaida garment of ATA s ( Voice over IP 2006 . In the degenerate of 2005 , VOIP became the course of study s IT development highlight with the introduction of Skype , a freeware VoIP program (Wallingford , 2005 . Skype h as been verbalise to have been one of the primary reasons of VOIP ordinaryity todayAccording to a interrogation do by Telephia , leading VOIP service providers in the fall in States are Vonage , ViaTalk , Verizon VoiceWing , AT T CallVantage , SunRocket , Lingo , NetZero , BroadVoice , America Online Packet8 , and Earthlink ( Voice over IP , 2006 . Popular online free communication and internet services have in like manner in collectived VOIP Microsoft s Window courier hump , Yahoo s Yahoo Messenger with Voice and Google s Google TalkCorporate and business use of VOIP to usefulness from data abstraction wire taps and supervise is exigent because of the engineering science that VOIP uses (Keegan , 1994 . other eudaemonia of using the engineering is the optimization of circuit connection and maximisation of bandwidth capabilities . Third fellowship salutes can be rebounded by creating use gateways . Telecommunication companies in particular have utilized VOIP to opti mise their deeds using it to traffic PSTN calls loca! lly and outside(a)ly . IP multimedia system Subsystems (IMS s ) have allowed the incorporation of internet technologies into flow systems as fountainhead facilitated the lively interface of VOIP infrastructure with PSTN and mobile phones ( Voice over IP , 2006Review of Related LiteratureThe Forrester interrogation Group estimates VOIP lead be part of 5 Million U .S . homes by the determination of 2006 (Valdes , 2006 . The major issues in VOIP services and usage today are superior , price , protection and decreeQualityAccording to capital of Minnesota Travis (2005 , VOIP tonus and depend efficacy has improved immensely because of improvements in networking computer hardware software product and the speed on internet connections . It has resulted with audibility , reliability and integrity of voice communications . Posey (2006 ) points out that VOIP lineament is vulnerable to rotational latency . He explains that for VOIP quality and reliability is count only com parative to the approachability of bandwidth . Manufacturers , service providers and soft wares have to take initiatives to narrow VOIP bandwidth requirements if it is to be able to not only to ensure quality and reliability but also to ontogenesis its use oecumenical simulacrum 2 compares the quality and reliability of VOIP calls and in the normal eye(predicate) network calls among recent York and San Francisco . though VOIP has yet to earn the reliability and quality of conventional telephone systems , it offers significant advantages in terms of hail and network infrastructure . Packet wrong , delay and jitter are aggravated when voice traffic produce exposed to other packets especially in the IP in use is the internet . Packet damage give ways and in that respect incumbently no solution to this problem (Biddlecombe , 2005 Another feature that can call down the quality of VOIP is its ability to fit with existing and developing communication systems (COOK Repo rt , 2001 . Cisco , foundry Networks , Nortel and ot! her network hardware manufacturers follow common quality-of-service (QoS ) standards allowing corporate to create proficient crossing of voice and data crossroad provide allow cost effectiveness , modernization of telephone features and network synthesis for companies (Wallingford , 2005PricePricing of ecumenical services is spill down with much service providers competing in the market which is to the significant clear of service users as has been shown by the change magnitude shift from undercover branch exchange servers (PBX s ) to IP based PBX (IP PBX . This is one of the motives for accession by telecommunications heavyweights like AT T into the market (Growth line of business , 2005 . Leo value , MIS Director of The Money Station Inc , their glide by follow s motivation in using VOIP is going around the cost of telephone set between their four roles , acquiring an efficient world(prenominal) system focussing network and providing employees mobility (Rendo n 2002VOIP cost is not limited to the actual use of the engine room only According to a BuyerZone (2005 , cost of utilizing VOIP also involvesInstallation or upgrades ask for computer and network VOIPCharges for making calls outside VOIP network or other subscription for VOIP serviceIncrease in utility charges such as power , internet service or alimentation chargesTraining and orientation of employees on VOIP use protectionA holdup to VOIP normal use is the interrelates regarding surety Security assault to undermine laborious network , the transport protocols , the VoIP devices such as servers and gateways , software or application , configurations , protocols and operating systems are true threats to VOIP users . The features of the engineering science occupied often influence warranter measures expectations and concerns (Marsan , 2006 . Typical attacks on confidentiality are prevailing take a chances to be anticipate and security features should be adequately d eveloped . Intrinsic system or application weaknesses! , inferior configuration and implementation are still continuous concerns (Biddlecombe , 2005According to min enterprise communications (2006 , companies have different security needs . Off the ledge VOIP security bring inevitably have security loopholes . Considering Siemen s analysis of system winding in VOIP (see accede 3 , it proposed that security strategy should be woven into the VOIP networks from the very start . The layered security architecture model suggests security specific for each ringAccording to Stan Quintana , Managed Security go Vice temper for AT T customers still view security and its focusing to be important factors to consider in VOIP (Marsan , 2005 . Potential risks associated with VOIP . VOIP direct attacks have been rare but this should not mislead the measures are too much (Samahon , 1999 ) or too little (Sicker Lookabaugh , 2004 ) may be still subject to debate but the rate of developments in VOIP use and application essential be patrona ge up by institution of safeguards as hygienic regularization government canon and monitoring has constrain the controversial issue concerning VOIP . According to the US Federal communication theory equip (FCC ) Chairman Michael Po well up The bursting charge is not simply considering minuscule ad scarcelyments to specific politys - the Commission is considering the future of electronic and optic communications for many geezerhood to come (LeClaire , 2004 . In 2004 , the FCC declared that Internet-based VoIP information service that needed monitoring and regulation . The FCC is studying the determination it needs to tend to protect gin milllic and consumer interests with the untried communications conniption that VOIP technology is creating (FCC , 2006According to Hickman (1998 , the FCC remunerationls that because service providers benefit from the networks , monitoring and regulation is a moldiness . A market search do by IDC predicted that by the end of 2003 ther e would be as many as 16 million IP telephone users ! in the linked States alone (Trager , 1998 . Under the Telecommunications coif of 1995 the FCC has positivist that VoIP operators champion CALEA hydrant postality ( Voice over IP , 2006 . The Telecommunications act upon of 2005 spare regulation that mimics PSTN regulations such as local number portability and standardized service fees (Office of Technology Assessment [OTA] , 1990 Telecommunications bear of 1996 , 2006MethodologyTo pass judgment the risks involved in switching or using VOIP peculiarly by small and medium scale enterprises (SME s ) moldiness be done considering both qualitative and vicenary methodsFor qualitative judgment , the investigate bequeath focus valuing of opinions regarding VOIP on the internet . Opinions pull up stakes be self-contained form online numbers , blogs or postings on forums , privateised publications and studies published . Publications on line bequeath be elect for study in recognition of the link between VOIP and public IP s such as the internet . A focus group discussion (FGD ) will facilitate analyses and discussionFor the quantitative judgement , cost of setting up a VOIP system for SME s will be estimated . representing will consider frame-up of both software and equipment and all related costs , either directly or indirectly related to VOIP . Risk Assessment will be used as the model of the analysisThe objectives of these appraisals are to evaluate the actual cost and nest egg of VOIP system infrastructure setup either as an initial selection for companies or as a switching option . Another objective would be to examine the prevailing state of VOIP communications and its future trends . The gathered information will also give an indication whether regulation is possible or not for VOIP and the signification of its role as revolutionary communication systemQualitative Assessment MethodologySelection of ResourcesCreate a matrix to bring clause selection so that online publications blogs , personal postings and studies are equal with the fo! llowing(a) criteriaNo name discoverd later that October 2005Authorship is specificResource is available onlineEvaluate the selected articles byDegree of relevance of textAuthorshipAs veritable as possibleSelect no more than than xii resources for military rank ensuring that not more than are write by the analogous author , akin publisher , affix on the same forum or page and same focus of studyPreparation of MaterialReprint the articles in uniformly excluding information regarding authorship and publication before analysesNumber the articles at random to track themPrepare a graph to collect information per article per exclusive/Thesis of the articleArguments presentedImpact of issueSelection of ParticipantsParticipants in the FGD possess excessive knowledge of VOIP but be awake of the technology as an aware userChoose four participants who are not related or cognise to each otherOrient them on the utilization of the study and the methodology of the FGDPreparation of ParticipantsShow that participants the selected articles and learn them to see if they have read any of the articles beforeRe chance on preceding(prenominal)ly read articles from selectionAllow each participant to read articles an fill up chart informationCalculationCollect all charted information form each participantOpen FGD discussion by presenting each of the article citing its author and sourceReview the charted information and allow watch participant to discuss the information he had written downDocument FGD responses as group responses on a simper chartQuantitative Assessment MethodologyIdentificationCost of hardware , software and network setupSwitching costOpportunity costExposureCost of hardware , software and network setupEvaluate VOIP system and service package rankEvaluate current telephony or data network alternative costsSwitching costAssess cost of changing into VOIP systemEvaluate financial advantages or disadvantages in maintaining VOIP system versus previou s standard telephony or data systemsOpportunity costC! alculate if there is change in business volumeAssess if quality or reliability is compromisedCalculate loss or gained functionalityAssessmentAssess risk levels and later(prenominal) joltConsider what factors are key vulnerabilities and quantify risk levelCharacterizationEstimate probabilities of service or functional risk involvedIdentify how operations or functions will be affectedValuation of AssessmentsResults of analyses should be presented equally and without prejudice Valuation of results or information is for the purpose of validity and relevance . If there is insufficient data , additional sampling and testing can be done to establish relevanceBoth qualitative (FGD ) and quantitative (risk sound judgement ) will be considered as foundations for the conclusion of the . deflection form using the analyses for conclusion they will also function as bench label of each otherResultsQualitative AssessmentSummary of activitiesPre-FGD phrase rating ( name MatrixTitle course Au thor Type Publication / Source self-colored Aims to move the Cost of VoIP Network Monitoring . 2006 Cole Arthur C . article TMCNetHow unafraid(p) is voice over IP ?2006 Siemens try communications Personal posting Siemens go-ahead communication theoryHow VoIP kit and flock 2006 Valdes , Robert hold How stuff works new-sprung(prenominal) VOIP System Offers System integrating at debase Cost . 2006 Bordoloi Satyen K expression TMCNetTelecommunications Act of 1996 2006Reference WikipediaThe Pros and Cons of VOIP 2006 Posey , Brien M . bind Windows NetworkingVoice over Internet Protocol (VoIP . 2006 Federal communication theory Commission Personal posting Federal Communications CommissionVoice over IP 2006Reference Wikipedia s Quality impress 2005 Travis , Paul Article InformationWeekVoIP security assessment is about to become a mustinessiness 2006 Marsan , Carolyn Duffy Article Network WorldVOIP Security Services taking Hold 2005 Marsan , Carolyn Duffy Article CIO NewsW hat Is VOIP 2005 Wallingford , Theodore Article O Rei! lly MediaFGD Article evaluationTitle Code Included in FGD ?Key PointsFirm Aims to disdain the Cost of VoIP Network Monitoring . 1 Yes Companies are trying to reduce VOIP infrastructure cost and set up Reduction of cost is not just a stringents to make VOIP more accessible but also to build networks increasing the viability of VOIP as a universal communications systemHow secure is voice over IP ?2 Yes Discusses security of existing VOIP technologies Raises the concerns regarding prevailing security concerns round VOIP and the possible risks involvedHow VoIP whole kit and caboodle 3 Yes Explains the elements of VOIP technology and operation VOIP is an establishment that maximizes broadband technology and IP networksNew VOIP System Offers System desegregation at disappoint Cost 4 No Telecommunications Act of 1996 5 Yes Enumerated amendments to US communication regulation that include internet , networks and future telecoms The US organization wants to take an active role in ma naging future communications technologies and is trying to anticipate them Regulation should think about how they are going deal with the demands of refreshed technologies without stifling development at the same timeThe Pros and Cons of VOIP 6 Yes Evaluation of the advantages and disadvantage of VOIP The advantages and disadvantages of VOIP are choices or risk that has to assessed by individual companies . VOIP switch or registration is not just a question of technology it also should consider closely receivedties of operations and managementVoice over Internet Protocol (VoIP . 7 No Voice over IP 8 No s Quality Surprise 9 Yes Discusses the kick upstairs of VOIP in terms of increasing quality and reliability Enumerates that VOIP promises to be a viable technology as the industriousness develops . Its current rate of development shows its great potential as a replacement of PSTN systems and as soft wares and hardware are beseeming more friendly more reactive to the needs of V OIP , we can expect purify services in the futureVoI! P security assessment is about to become a must 10 Yes Calls for the focus on developing stringent VOIP security in expected value of malicious and criminal cloaked there is a real against security risks . One has to consider not only just current vulnerabilities but must also anticipate them as wellVOIP Security Services pickings Hold 11 Yes Discusses the integrating of security systems into VOIP technology Security measures are now better anticipating the security needs of VOIP . It is to be anticipated that security are not yet at pace with the rate of development of VOIP since it is still in its erupt stage . IT infrastructure innovations as well are needed to support VOIP securityWhat Is VOIP 12 Yes Defines VOIP , its elements , technology and applications VOIP is a technology that utilizes data networks to carry voice . Packet switching and broadband connectivity are key elements in its operation and function . VOIP promises to be a cost effective communication systemFGD DiscussionText focus - charts the concepts that are to the highest degree apparent in the articles analyse . Check marks position the related primary focus of the article and X marks denote secondary focusp How secure is voice over IPp How VoIP Worksbr New VOIP System Offers System Integration at Lower Cost Telecommunications Act of 1996p The Pros and Cons of VOIPVoice over Internet Protocol (VoIPVoice over IPp s Quality Surprise VoIP security assessment is about to become a mustp VOIP Security Services Taking Holdp What Is VOIPp Valuation of text - each check mark earns 2 points and each x mark earns a pointTitle price quality security regulation Firm Aims to Lower the Cost of VoIP Network Monitoring . 2 1 14How secure is voice over IP1 2 1 4How VoIP Works22New VOIP System Offers System Integration at Lower Cost 2 13Telecommunications Act of 19961 1 2 4The Pros and Cons of VOIP 1 1 24Voice over Internet Protocol (VoIP . 1 2 14Voice over IP2 13 s Quality Surprise 1 23VoIP secur ity assessment is about to become a must1 2 1 4VOIP S! ecurity Services Taking Hold1 2 1 4What Is VOIP2 13ResultsCurrent writings contentCurrent literature present VOIP not as an unconditional but as it is used in real setting considering external factors affecting itCurrent literature have similar relevance in terms of content and vary little notwithstanding of their typeArticles seek to provide equilibrize assessment of VOIP technology going into extremes of opinionAll literature consider VOIP at its early developmental stages concentrate on of current literatureThe prevailing focus of most of the articles is the emphasis on quality of servicesThe second major concern is that of securityQuality and security focus are importantly higher in value than all other s in considerationThe to the lowest degree valued is that of regulationQuantitative Assessment MethodologyFor the purpose of the quantitative evaluation , a theoretically conjunction s VOIP expenses for set up will be used as benchmark . The theoretically club has terzett o offices , one in New York , San Francisco HawaiiIt is engaged in the sell pineapples form Hawaii to supply restaurants in New York and San Francisco . severally of the offices has twenty personnel all have standard computers able to support VOIP operations . The guild has an existing broadband connection at 256 kbps . The partnership uses in the main PSTN phones and has no existing international call subscription service package . The confederation has an existing PBX system and computers have network access . The lodge has no existing online retailing system and ing and supply is done by facsimile messagingThe company earns a historic just of light speed ,000 dollars a year but has no existing caudex reserved for the VOIP innovation . The company expects to join on company s productiveness by an fairish 20 from historical average yearly overdue to the migration to VOIP for the next three yearsIdentificationAccording to Biddlecombe (2005 , VOIP frameation entail s investing in hardware , software and internet conne! ctionHardware cost depends on the size of the organization , the functionality or services needed and the geographic and spacial requirementsLAN , routers , cabling and access points are some of the hardware a VOIP requiresOff the shelf and free programs provide basic functions and VOIP services but may charge for additional servicesCharging for local and international calls to non-VOIP phones (PSTN and mobile phonesCharging for fax , FTP and other network functions and management tools higher(prenominal) speed internet connections directly affect quality of VOIP services (Posey , 2006A company may have to upgrade connection speed since what may be adequate for existing data or PBX needs may not be able to adequately support VOIPIn some countries , VOIP has been placed under restriction when using standard internet services , special connection services may have to be procured even if current bandwidth can already support VOIPSwitching costThe company was assessed 15 ,000 to set up the main office in Hawaii and the two removed(p) offices in New York and San Francisco (BuyerZone , 2005The company upgrades to T3 bandwidth 150 a calendar month additional fee to their existing subscription for the next three yearsThe company had to pay for additional software features to incorporate existing fax systems , one time fee of 250Opportunity costThe company shoes to install online retailing as part of its services to maximize bandwidth and stretch forth business operations , setup cost is 5 ,500 with periodical maintenance and support fees of 90Exposure division 1 course of instruction 2 year 3Installation Package 15 ,000 .00 Additional Bandwidth 1 ,800 .00 1 ,800 .00 1 ,800 .00Fax System Incorporation 290 .00 Retail System apparatus 5 ,500 .00 Support Fee 1 ,080 .00 1 ,080 .00 1 ,080 .00br 23 ,670 .00 2 ,880 .00 2 ,880 .00AssessmentRisk ScheduleYear 1Target bring in (with 20 emersion long hundred ,000 .00Cost of VOIP migration - Year 1 23 ,670 .00Profit bear ing for the year 143 ,670 .00 true(a) increase from ! average 43 .67Year 2Target Profit (with 20 growth 120 ,000 .00Cost of VOIP operations - Year 2 2 ,880 .00Profit aim for the year 122 ,880 .00 Actual increase from average 22 .88Year 3Target Profit (with 20 growth 120 ,000 .00Cost of VOIP operations - Year 3 2 ,880 .00Profit target for the year 122 ,880 .00 Actual increase from average 22 .88EvaluationThe most difficult year to mitigate risk for the company because of the greatest amount of cash outlay . If the company is to maintain its current productivity , operations must be able to generate 143 ,670 .00 in profit for the yearMonetary risk diminishes significantly in Year 1 and 2CharacterizationYear 1 will mean that the company will be unlikely to conform to productivity targets .
bestessaycheap.com is a professional essay writing service at w   hich you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Since the company already has a standing profit level of 100 ,000 annually the probability will be low that they will be able to meet the newborn target considering the learning curves still to be mastered with new operationsCost step-down other than in IT should be part of the agenda to decrease impact on profitsYear 2 and Year 3 will probably be better years for the company . The less(prenominal) additional cost by VOIP will allow it to act profit it may not have been able to meet in Year 1Profit levels will be compromised in Year 1 but in Year 2 and Year 3 elevatement profit and operations will be more apparentThe company needs to be able to contract operations in Year 1 and 2 to support existing operations , additional costs and unfulfilled profits , if any , from Year 1Conclusion and Future TrendsDean (2003 ) suggested that the adaptations of VOIP are for the following reasonsTo enhance business efficien! cy and competitivenessTo be technologically up to date and preserve competitive leverageTo unify voice and data network managementTo increase employee productivityTo be cost-effectiveThe cost effectiveness comes primarily from the companies ability to circumvent telecommunications cost that come in the form of international phone charges and other PSTN related telephony charges gratis(p) VOIP should be fantasy of not in its literal subject matter since there are costs to it energy , broadband connection and hardware and software needed to support VOIP . The real cost benefit of VOIP may actually come from being able to blend in data and voice communications into a angiotensin-converting enzyme network affording the company as whole as well its employees flexibility to amaze connected , constantly if needed , in real timeVOIP , like any other technology is a tool . universe so , it can be utilized either for confused intentions . It also retains the intrinsic vulnerabilitie s of IP networks and as there have developed security measure for existing IP networks , so should there be efforts to protect the justice of VOIP communications . There are existing VoIP security tools and software in the market . Developers should be able to keep in discernment the realities of VOIP communications and provide options to personalize security measures as needed by companies (Iwatsu Voice Networks , 2006VOIP technology is affording better cost alternatives and new gross streams for companies specially those in telecommunications but it has also created new channel for crimes . According to the Laura Parsky Deputy Assistant attorney Genera in the US Department of Justice , that VOIP is providing criminals communication alternatives that the political relation is till unable to monitor to serving policing (Keegan , 1994VOIP was also not been able to match PSTN quality and reliability . The availability of PSTN telephone systems was ensured by implementing networ k engineering as well as controlled access to the net! work . VOIP allows routers to assess routes for the voice packets to go through and when doing so over public IP systems with large number of users lack the Internet , DoS and distributed DoS attacks also become real problems that affect VOIP reliability and quality . Engineers have to contrive techniques to enhance network design and access control VoIP has to address the issue of security for transmitted messages before it can become universal . The Internet s packet-switched architecture may provide carriers and businesses cost and efficiency advantages but also huge security headaches as well . Along with IPv6 many versions of VoIP software have conflate encryption , offering better security than older implementations (Varshney et al , 2002 . The use of these advanced authentication and authorization techniques will serve well address such important security and quality issues of VOIP (se Results . across the board enhancements in Internet security will answer protect V OIP integrity and make it more viable for desegregation to existing communication systemsVOIP can benefit form the adaptation of common practices that have implemented for the internet such asDeliberate investiture in interoperability and convergence at all levels of the technologyTaking advantage of technical opportunities in an IP-based network but in fallback-friendly mode that protects functionalitySustaining efforts chip in to software engineering practices that map security and performance in real-timeLeveraging a broad base development for both ideas and programmingParticipating in the discussion about social policy and regulatory excuse around VoIP (Sicker Lookabaugh , 2004Creating diversity or services and configurations to their infrastructures to make sure of their abilities in security and develop the ability to safely immix different components from several vendors through never-ending testingEstablishing cooperative act involving the service provider ven dors , and customers to promote security , quality an! d developmentA caller move in VOIP development was suggested by Nascimiento et al (2006 . The manoeuver involved the utilization of IETF IPSec to enhance confidentiality and security design holes of wireless receiver VoIP networks Their study concluded that a QoS tool based on E-Model is an efficient and objective manner to evaluate the impact of the IPSec on the traffic VoIP . This tool can be comfortably used in a BSS or PICONET environment where the meter of voice communication quality is specially required due to the wireless channel behaviorAccording to Sims (2004 , CIO-Today noted the Forrester Research that evaluates the pros and cons of VOIP adoption and found out that though VOIP has grown significantly . US households were furthest less than what was expected or has been apparent in commercial-grade industries , Three percentageageage were using a paid service and 1 percent used a free one . thirteen percent were interested or very interested . Forrester exp ress set is the issue that will get user attention (Sims , 2004 . If households do not become part of VOIP networks , it can ill limit the applications and universality of the technologyThe incorporation of VOIP and mobile communications and , could at last turn the tides for skeptics of VOIP . supple VoIP is one of the sarcastic focuses of VOIP development today . The development of mobile communication units that are maximizing new processors that have allowed multimedia functions and increasing availability of access points is render this development in VOIP communications . Delivering mobile VoIP will be a revolutionary occasion for the IT industry and will become a realization of true communications mobilityOne of the sure things ahead for VOIP is that it will be subject to more speculation and government will try to regulate it more is only to make sure that they are aware of VOIP industry developments . According to the FCC (2006 ) its efforts are to protect the public who can become to be the most vulnerable against the! technology . According to Biddlecombe (2005 , VOIP should become real services for real need and real people And VOIP , with its realities and possibilities is worth the risk of incorporation but efforts to utilize VOIP should keep in mind not to use the technology not only for its own sakeVOIP has significant costs and requires long term use for true realization of spending and potential . Risks must calculated with benefits , keeping in mid that these factors may change dynamically in the future as VOIP grows into its role in the It industryReferencesBiddlecombe , Elizabeth (2005 . VOIP primer : How it works - and what the jargon means . Retrieved on October 5 , 2006 from hypertext counterchange protocol /network .silicon .com /research /specialreports /VOIP /0 ,3912775 9 ,00 .htmBordoloi , Satyen K (2006 . New VOIP System Offers System Integration at Lower Cost . TMCNet . Retrieved on October 5 , 2006 from hypertext transfer protocol /news .tmcnet .com /news /2006 /04 /19 /158 7066 .htmBuyerZone (2005 . Real-world VOIP phone system rates from BuyerZone buyers . Retrieved on October 5 , 2006 from hypertext transfer protocol / vane .buyerzone .com /telecom_equipment /VOIP /bps-VOIP-rates .htmCharny , Ben (2004 . The price of VOIP s thriftiness . CNET News Retrieved on October 5 , 2006 from hypertext transfer protocol /news .com .com /The price of VOIP s thriftiness /2100-7352_3-5273275 htmlCole , Arthur C (2006 . Firm Aims to Lower the Cost of VOIP Network Monitoring . TMCnet . Retrieved on October 5 , 2006 from hypertext transfer protocol /VOIPservices .tmcnet .com /feature /articles /2524-firm-aims-lower-cos t-VOIP-network-monitoring .htmCOOK Report (2001 . Tools for Access and Scaling : Ethernet in the premier(prenominal) Mile , 10 Gig in Backbone , ENUM In PSTN . The COOK Report on Internet Protocols Technology , economics July . Policy . pp . 1-23Dean , T (2003 . Guide to Telecommunications Technology . London : Thomson skill , IncDuffy , Jim (200 4 . More VOIP issues bubbling up More VOIP issues bub! bling up . Network World . Retrieved on October 5 , 2006 from hypertext transfer protocol / web .networkworld .com /news /2004 /0209VOIPreg .htmlFederal Communications Commission (2006 . Voice over Internet Protocol (VOIP . Retrieved on October 5 , 2006 from http /network .fcc .gov /VOIPGribble , C (2006 ) History of the Web Beginning at CERN . Retrieved on October 5 , 2006 from http / web .hitmill .com /internet /web_history .htmlGrowth phone line (2005 . Cut-price communications : VOIP takes off Retrieved on October 5 , 2006 from http / entanglement .growthbusiness .co .uk / expansion /170 /cutprice-communications-VO IP-takes-off .thtmHickman , Angela (1998 . The FCC Takes On IP telephony . PC snip people 17 ,. 29Internet phone service : Radical technology , telecom battle (2006 . CBC News Online . October 5 , 2006 from http / web .cbc .ca /news / oscilloscope /VOIPIwatsu Voice Networks (2006 . Converged Technology : A Cost-Effective Alternative to VOIP earphone Systems . Re trieved on October 5 , 2006 http / vane .technology-reports .com /report .aspKeegan ,(1994 . High Tech Pirates Collecting Phone Calls USA Today br. 4AKorzeniowski , Paul (1998 , July 20 . IP Telephony Is Tempting . PC Week masses 15 .. 291Lawson , Stephen (1998 . 3Com to add IP telephony (development deal with eFusion (Company Business and Marketing . InfoWorld Volume 20 .. 23Leavitt , Neal (1999 . Will 1999 be the year of IP telephony . Computer br. 15LeClaire , Jennifer (2004 . FCC Chairman Opposes States Regulation of VOIP . E-Commerce propagation . Retrieved on October 5 , 2006 from http / entanglement .ecommercetimes .com /story /37472 .htmlMarsan , Carolyn Duffy (2005 .VOIP Security Services Taking Hold . CIO News . Retrieved on October 5 , 2006 from http /network .cio .in /news /viewArticle /ARTICLEID 1721Marsan , Carolyn Duffy (2006 .VOIP security assessment is about to become a must . Network World . Retrieved on October 5 , 2006 from http /www .techworld .com /security /features /index .cfm ?featureid 2680 pagt ype sameca! tsamechanMobile VOIP (2006 . Wikipedia Online Encyclopaedia . Retrieved on October 5 , 2006 from http /en .wikipedia .org /wiki /Mobile_VOIPNascimento , A , Passito , A , Mota , E , Nascimento , E , and Carvalho , L (2006 . muckle I Add a full VOIP Call ? transactions of the 2006 International Symposium on World of receiving set , Mobile and Multimedia Networks (WOWMOM 06 . IEEE Computer SocietyPosey , Brien M (2006 . The Pros and Cons of VOIP . Windows Networking Retrieved on October 5 , 2006 from http /www .windowsnetworking .com /articles_tutorials /Pros-Cons-VOIP .htmRendon , Jim (2002 . psychoanalyst : VOIP offers more than cost savings Networking News . Retrieved on October 5 , 2006 from http /searchnetworking .techtarget .com /originalContent /0 ,289142 ,sid7_gci 857902 ,00 .htmSamahon , Tuan N (1999 . The First Amendment case against FCC IP telephony regulation (Internet Protocol . Federal Communications Law ledger . Volume 51 .. 493Sicker , D .C . and Lookabaugh , T (2 004 . Queue Focus : : VOIP Security : not an Afterthought . Queue Volume 2 Number 6Siemens Enterprise Communications (2006 . How secure is voice over IP Retrieved on October 5 , 2006 from http /www .siemens .com /index .jsp ?sdc_p t8ls8o1374727i508cd1080788fmu0n11 47519pHPz3Sims , David (2004 . VOIP take aim : High Point Between 2010 and 2014 TMCNet . Retrieved on October 5 , 2006 http /www .tmcnet .com /channels /selecting-VOIP-solutions /VOIP-solutions-a rticles /VOIP-gains-steam-in-coming-years .htmTech FAQ (2006 . VOIP . Retrieved on October 5 , 2006 from http /www .tech-faq .com /VOIP .shtmlTelecommunications Act of 1996 (2006 . Wikipedia Online encyclopaedia Retrieved on October 5 , 2006 from http /en .wikipedia .org /wiki /Telecommunications_Act_of_1996Trager , Louis (1998 . FCC regulation of net telephony possible . ZDNews Retrieved on October 5 , 2006 from http /www .zdnet .com /intweek /print /980413 /306725 .htmlTravis , Paul (2005 . s Quality Surprise . InformationWe ek Retrieved on October 5 , 2006 http /informationwee! k .com /story /showArticle .jhtml jsessionid RVFJRVCDOG CMSQSNDBCSKHSCJUMEKJVN ?articleID 4Office of Technology Assessment (1990 . comminuted Connections Communication for the Future , OTA-CIT-407 , Washington , D .C :U .S Government Printing OfficeValdes , Robert (2006 . How VOIP Works . Retrieved on October 5 , 2006 from http /electronics .howstuffworks .com /ip-telephony .htmVarshney , U , Snow , A , McGivern , M . and Howard , C (2002 . Voice over IP . Communications of the ACM Volume 45 Number 1 . Colman , Price (1998 November 30Voice over IP (2006 . Wikipedia Online Encyclopaedia . Retrieved on October 5 , 2006 from http /en .wikipedia .org /wiki /Voice_over_IPVoice over IP : Technical Issues (2002 . more than Research Network . Retrieved on October 5 , 2006 from http /www .more .net /technical /research /VOIP /technical /issues .htmlWallingford , Theodore (2005 . What Is VOIP . O Reilly Media . Retrieved on October 5 , 2006 from http /www .oreillynet .com /pub /a /network / 2005 /09 /02 /what-is-VOIP .html pp . 1-4Refer to en .wikipedia .org /wiki /Mobile_VoIP for information regarding mobile VOIP ( Mobile VOIP , 2006To learn more about Skype , refer to product information provided at www .skype .com 67Y\]pp LMwezhff367f7Z[\]ppppbr ILMfMgdezhfhh?e?e?e?e?e?e?e?e?e?ekdlRR?eRRRRRRRRR?e?e?epp kdppppp ?e?e?e?e?e?e?e?e?e?e?e?e?e?e?e?eCode number is depute before FGD . and Key Points entries are summaries of FGD discussion emblems are taken from online quote done by BuyerZone (see www .buyerzone .comVOIP PAGE 38 Figure 1 . Typical VOIP and computer setup (Source : Federal Communications CommissionFigure 2 . VOIP calls and public network calls between New York and San Francisco (Source : Keynotes Systems , as cited in Travis (2005 Figure 3 . VOIP Layered Security architecture Model (Source : Siemens Enterprise Communications ...If you want to get a full essay, set out it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.