StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users - Dissertation Example

Cite this document
Summary
This dissertation "Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users"  surveys the literature on VoIP or voice over internet protocol telephony application. Since the inception of VoIP, it is possible to transfer voice, fax, and video information for long distances over the internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users
Read Text Preview

Extract of sample "Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users"

Download file to see previous pages

Technology is advancing every day; included in that technological advancement is the improvement of telephone capabilities. While most are familiar with modern cell phone and smartphone technology, voice over internet protocol, or VoIP, is also a technological improvement, with regards to telephoning that should be considered. Traditional telephony, or telephone technology, according to Meggelen, Smith, and Madsen is the technology associated with the transmission of voice, fax, video, or another form of information, electronically (2009).

Such transfer involves parties located long distances apart and who are using systems originally linked with telephone. A telephone device is characterized by a transmitter or speaker on one side and a receiver on the other. Telephone science involves the translation of sound or voice signals into electrical signals then transmitting them and translating them into the sound signal at the destination. In the modern world, Meggelen, Smith, and Madsen, point out that computer hardware and software assume the roles that telephones used to (2009).

Commendable changes in telephony were achieved by the arrival of computers, the transmission of digital information over telephone systems, and the utilization of radio for the transmission of telephone signals. Internet telephony is the utilization of internet infrastructure and related technology instead of traditional telephone infrastructure to exchange voice, sound, or other information transferable through telephone (MacKnight, Lehr & Clark, 2001). With internet telephony, telephone access is affordable at local connection rates.

As a result, any long-distance or international calls are much less expensive compared to the traditional call set up (Rouse, 2008).The inception of the internet has led to the development of several new services, three of which are the most relevant. The first new internet service has the capacity to put together ordinary voice phone calls through the internet at a price similar to that of a local call (MacKnight, Lehr and Clark, 2001).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Telephony Application and VoIP (voice over Internet Protocol Dissertation”, n.d.)
Telephony Application and VoIP (voice over Internet Protocol Dissertation. Retrieved from https://studentshare.org/information-technology/1482193-telephony-application-and-voip-voice-over-internet
(Telephony Application and VoIP (voice over Internet Protocol Dissertation)
Telephony Application and VoIP (voice over Internet Protocol Dissertation. https://studentshare.org/information-technology/1482193-telephony-application-and-voip-voice-over-internet.
“Telephony Application and VoIP (voice over Internet Protocol Dissertation”, n.d. https://studentshare.org/information-technology/1482193-telephony-application-and-voip-voice-over-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users

Electronic-Commerce Security: Voice Over Internet Protocol

E-commerce: VOIP Security Introduction VoIP refers to the abbreviation of voice over internet protocol.... A research conducted in South Africa showed that self provided VoIP has proven to be the most successful of all kinds of voice over internet protocol (Uys 2005).... hellip; Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval.... With the cyber world having so many criminals, transmitting sensitive information through the internet has raised questions about the security implications of the system....
19 Pages (4750 words) Essay

Service and the Security Implication Voice over Ip

This dissertation also provided a technical strategy on how to remediate the security vulnerabilities.... TITLE PAGE Service and Security Implication of VoIP by Dissertation submitted to the University of Derby in partial fulfilment of the requirements for the award of Master of Science in add name of programme here Abstract This dissertation is about the practical use of voice over IP.... voice over IP Implementation and Threats and Vulnerabilities Demonstration 30 5....
60 Pages (15000 words) Dissertation

Network Security of LAN used in Small Office and Home Office

Managers of these small businesses are unsurprisingly unable to fully comprehend yet the information and business implications of the security threats and risks.... With each passing day, interconnectivity in today's marketplace develops and numerous businesses are putting their trust on the internet and other network technologies for the smooth functioning of their businesses.... Even small businesses now have the capability to compete with effectiveness compared with larger companies as the internet offers the ability for them to expand the geographical scope of their market....
60 Pages (15000 words) Essay

Wireless Technology Used in Business Applications

IT managers must carefully appraise the security risks involved with wireless applications and try to maintain proper security for the networks as is needed.... (Kurose, 2004) By the appearance of Cellular Digital Packet Data (CDPD) which provided 128-bit encryption for security purposes and Global System for Mobile communications (GSM) provided encryption and the implementation of user authentication techniques as part of the wireless standard, security flaws also appeared and IT managers faced with unlawful use of communications by un-authorized users, so new standards were defined....
9 Pages (2250 words) Case Study

Installing and Administering IPSec

The fundamental idea behind the specification of IPSec is to provide security utilities, authentication of the source, content integrity, and confidentiality, at the IP (internet protocol) level that exists on the network layer.... hellip; Each protocol plays its part in improving the security, integrity, and confidentiality of communication by using different algorithms for encryption and authentication.... IPSec is usually implemented by maintaining security associations which are stored in a security association database and are retrieved according to the actions specified in the security policies....
9 Pages (2250 words) Term Paper

Designing Networks in Waxlow Private School

This paper, Designing Networks in Waxlow Private School, declares that the internet is the fastest rising technology and has produced endless opportunities.... The inbound communication of staff for the Waxlow Private Schools (WPS) will be conducted by the school's internet.... The VLE will provide virtual learning features along with video and voice communication features within the school branches as well as from the IP telephony....
28 Pages (7000 words) Research Paper

Technology and Foundations into the Wireless Network

he wireless environment makes use of the Simple Network Management protocol (SNMP).... hellip; The following paper presents wireless problems of connectivity, security, authentication, and slow performance.... The Observer will provide functions such as the management of configuration, performance, accounting, fault, and security.... The resolution, detection, and management of architectural problems with the IEEE 802....
18 Pages (4500 words) Term Paper

MPLS Network Project for the Waljat College Faculties

over the years, the country had developed an insatiable need for tech-savvy professionals who could compete favorably in the modern job market with graduates of colleges from developed nations.... … The paper "MPLS Network Project for the Waljat College Faculties" is a wonderful example of a case study on information technology....
23 Pages (5750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us