StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Benefits and the Drawbacks of Voice Over Internet Protocol Telephony - Research Paper Example

Cite this document
Summary
This paper 'The Benefits and the Drawbacks of Voice Over Internet Protocol Telephony' will comprise of various studies relating to the Voice over Internet Protocol (VOIP) technology. It is regarded as one of the rapidly growing technologies that are gaining popularity in a very significant pace. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
The Benefits and the Drawbacks of Voice Over Internet Protocol Telephony
Read Text Preview

Extract of sample "The Benefits and the Drawbacks of Voice Over Internet Protocol Telephony"

?The Benefits and the Drawbacks of Voice over Internet Protocol (VoIP) Telephony INTRODUCTION This project will comprise of various studies relating to the Voice over Internet Protocol (VOIP) technology. It is regarded as one of the rapidly growing technologies that are gaining popularity in a very significant pace. It is basically a concept that serves the main purpose of providing an effective means of communication in which multiple users are able to communicate with each other with the help of internet. It also helps in communicating with people located at different parts of the world effectively and efficiently. In simple terms, VoIP can be considered to have similar function like that of telephone but this process has many extended features. The project will broadly analyze the importance of this technology and all those areas where it can be widely implemented and applied. The study will also comprise of the scope of development of this particular technology and the extent to which this technology can be made popular and relied upon. Furthermore, all those broad measures will also be highlighted that can be implemented for making widespread application of the technology. Beside the importance, the problems that will be faced while identifying the measures along with the drawbacks associated with this technology will also be listed and discussed upon. The study will also encompass the various issues related with the security and privacy concern associated with the use of VoIP. Additionally, it will also highlight the other essential features of VoIP reflecting its efficiency in terms of cost of the technology, accuracy, quality, and timely delivery of services among other factors. THESIS STATEMENT The main aim of the study would be to analyze all those broad factors that can prove to provide opportunities of growth for Voice over Internet Protocol (VOIP) technology. This project would broadly emphasize on analysis of the overall benefits and limitations of the technology. For analyzing the broad benefits of this technology there are many factors that are needed to be looked upon. Accordingly, the factors such as cost, quality, security and speed will be duly taken into concern for evaluating its benefits and limitations. LITERATURE REVIEW Identifying the Network System Used In the VoIP Telephony According to Hiwasaki, Ohmuro, Mori, Kurihara and Kataoka (2006), a very high tech networking process is followed in the process of VoIP. The networking system allows uninterrupted communication process both in audio and video modes. The network codifies the signals in such a way that all round clarity is maintained in the overall communication process (Hiwasaki, Ohmuro, Mori, Kurihara and Kataoka 1-7). Defining the Importance of VoIP Telephony for the Business World As per Garrie and Wong (2007), there are various factors that can be considered for determining the importance of VoIP telephony for the business world. Accordingly, if the voice that transmits through the networks is regulated properly over the internet protocols then it would be able to create a positive impact in the overall voice process. Furthermore, if the voice is processed and transmitted from one channel to another in a more precise form then it would provide great benefits and this efficiency can also be utilized in a business and can prove to derive much better results. It can be strongly admitted that applicability of VoIP telephony is widely gaining popularity in the business segment as an effective modes of communication. It has been ascertained that VoIP telephony offers quick dissemination audio-visual messages relatively at lower costs and at higher speed (Garrie and Wong 550-574). Evaluating the Benefits of VoIP Telephony in the Global Communication Kerner (2005) suggested that the use of VoIP is becoming widespread and is continuously being utilized in the overall market. It has been argued that the application of VoIP can be made even more efficient if more stress is laid upon providing end to end results. It has been further stressed that technological innovation processes would facilitate in attaining quick time solution. Regarding VoIP, it has been asserted that efforts are needed to be made for ensuring even better services so that that communication process is followed in an efficient manner and also in a global scale (Kerner, “VoIP Networking Performance Tools: Awareness is critical”). Identifying the Network System Used In the VoIP Telephony Butcher, Li and Guo (2005) identified that there is a wide networking process that is followed in the process of VoIP. The process travels in a much systematized manner which helps in delivering reliable end to end results. The networking system used in the VoIP telephony mainly deals with sending the information to the clients who deliver and receive the information through verbal and video graphic communication. The network system of VoIP telephony is shown below with the help of a diagram (Butcher, Li and Guo 1152-1162). Source: (Butcher, Li and Guo 1152-1162). Critically Analyzing the Limitations of VoIP Telephony Keromytis (2011) classified the various threats of VoIP into six major categories. The first threat has been related with social aspect which directly deals with the human factor. Accordingly, it was postulated that misconfiguration and bugs interaction in VoIP system may facilitate in attacks wherein malicious parties may take the advantage of misrepresenting their identity to users. Such act may further contribute towards theft of service and malicious act like phishing. Secondly, the threat of VoIP has been related with modification and interception. Accordingly, this threat has been related with unauthorized listening to the content of VoIP. Thirdly, Keromytis associated the threat with denial of service. In this context, it has been ascertained that during the emergencies the DoS attack may potentially affect the user or the organization’s communication abilities. Correspondingly, on such circumstances the potential user may experience the denial of user access to VoIP services. Similarly, another threat has been associated with service abuse threat. Notably, such threat has been primarily related with commercial service wherein the user may practice billing avoidance and toll fraud. In the similar manner, the fifth threat according to Keromytis is concerned with physical access threat. This threat deals with unauthorized access to VoIP devise layer of network. Last threat has been related with interruption of service threats. This threat usually entails unintentional issues or problems that may get erupted causing VoIP service inaccessible. Such threat may arise due to over-subscription leading towards poor call quality (Keromytis 1-16). Hiwasaki, Ohmuro, Mori, Kurihara and Kataoka (2006), regarded VoIP as the one of the most modernized innovations in the technological front. Accordingly, this system has proved to deliver wideband scalability which can cater to the needs of individuals along with business entities. The system aims at providing all round clarity in the overall communication process over the internet. However, it has been argued that this technology is not largely reliable, as there are many risks issues related with VoIP technology (Hiwasaki, Ohmuro, Mori, Kurihara and Kataoka 1-7). According to June Jamrich Parsons, Dan Oja (2008), VoIP can be considered as the latest example of efficient telecommunication technology. Similarly, this technology is very much appraised and is known for its integrated services. Furthermore, it has been admitted that this system effectively utilizes the internet and builds a network in which communication takes place in the verbal and video graphic forms which as largely attracted the different individual users along with the business units. Nonetheless, it has been argued that along this with beneficial factors, this technology also owes some drawbacks that hamper its overall efficiency and productivity such as vulnerability of technology to attack by malicious parties, risk of security and denial of access among others (Parsons and Oja 1-50). Angoar (n.d.) stated that there persists a numerous advantages of VoIP technology but this technology also owes certain limitations. Accordingly, it has been ascertained one of the major limitations of this technology primarily deals with the need of electricity. In this regard, it was asserted that in certain circumstances wherein there result in the loss in electricity supply, VoIP service may get terminated owing to failure to establish connection to internet. Correspondingly, this may prevent the ability to receive calls. Another major limitations as propagated by Angoar, includes the inability of VoIP technology to use white page directory (Angoar 1-50) Santi, Ram and Enkh-Amgalan (2008) admitted that VoIP has emerged has emerged as potential multimedia communication technology on the IP network. At the same time, it has been argued that due to the use of IP network by VoIP technology, this technology also inherits several vulnerabilities. Accordingly, DoS attack is considered to be the greatest risk factor for the user of VoIP system. Adversely, this risk has the potential to disrupt the entire functionality of the user devises, signaling, security system and management system. It has been also advocated that VoIP routers are also vulnerable to malicious traffic (Santi, Ram and Enkh-Amgalan 114-123). Heravi and Mubarak (2011) argued that Public Switched Telephone Network (PSTN) is relatively secured than the VoIP system. It has been postulated that user may witness privacy breaches while using VoIP technology. It has been further admitted that VoIP security do not relies on the wire security. Consequently, it is quite easy to gain access to traffic on network of VoIP with poor security. Furthermore, such unauthorized access may result in the captured of VoIP packet data and modification of information (Heravi and Mubarak 94-100). DISCUSSION In this part of the study, the main focus will be laid upon the broad benefits that can be derived with the use of VoIP telephony. At the same time, the drawbacks of using this technology will be critically analyzed. Benefits VoIP is considered to be as one of the most innovative technologies in the modern technological era. It has proved to provide radical changes in the overall telecommunication industry due its numerous attractive and efficient features that can be widely utilized. The major benefit of this technology can be considered to be the fact that its cost is quite low and is very affordable. Furthermore, this technology provides great benefit in establishing audio and video graphic communication over long distances from any part of the world. This technology provides its user with an effective communication tool to communicate with anyone who may be miles away. The technology has been introduced in such a way that it can largely benefit its users in different ways and prove to provide them with modern and innovative technological experiences. With the use of this technology, the users also get the option of high quality services with proper connectivity. The device also has the option getting itself placed in those specific areas as per the requirements of the clients. In other words this devise owes the characteristics of portability. In addition, the technology is very easy to use which makes it possible for each and every user to utilize this technology in a large scale. This technology is highly appraised in the market and is widely getting popular in the market. And most importantly, VoIP caters to the individual users to a very large extent along with the local market. The innovative features of this technology are seen to be providing effective benefits to the technological and telecommunications market as well. As this technology is considered to be quite new, it is gradually gaining significant popularity every day (Tracey 1-60). VoIP has been seen to benefit the common man to a very large extent as it gives the opportunity for communication between multiple users from different locations. Also, it has similar functions like that of a telephone or cell phone that give the opportunity to for every user to utilize its functions. (Lindsay 1-50). Drawbacks Along with the benefits offered by VoIP technology, it is ascertained that this technology also possesses certain limitations and drawbacks. Several weaknesses of the VoIP have been revealed in the recent times. Accordingly, the VoIP system is prone to numerous threats. The VoIP system is vulnerable to threats such as DoS attacks, toll fraud, eavesdropping and masquerading. It has also been identified that over subscription to this system often prove to create a breakdown in the overall process and functioning of VoIP. At the same time, the system works on the IP network thus inherit risks of security. The VoIP routers are also largely vulnerable to malicious traffic. In certain circumstances user may also witness access denial issues related with the VoIP technology. Also, one of the most critical drawbacks that was recorded to be as one of the most alarming factors as this technology gave rise to the extent of criminals getting involved and utilizing this technology. As the technology is readily available in the market, it is giving favorable opportunities for various malicious users to get access to this technology and is also giving them opportunities to misuse this technology to a very large extent leading towards establishing fake contact and stealing of information. Furthermore, the price of this technology is not very high and this factor also makes it easy for the criminals to use this technology without much hurdles. Other drawbacks of this technology include additional charges that are associated with the use of this technology. There are features such as call forwarding, call waiting and voice mail among others which create dissatisfaction from the part of consumers as these services requires them to bear extra costs. Also, in order to properly utilize this technology one needs to have an appropriate broadband connection to support error free connectivity otherwise the technology cannot be utilized to the optimum level. Thus, these factors prove that that there are still various corrective measures that are needed to be taken place in order to improve this technology and meeting all the broad standards (Lowe 1-50). CONCLUSION From the above study it was observed that VoIP is one of the fastest growing technologies that are widely gaining popularity in both social and business environments. This technology is largely catering to the market needs and has proven to be providing with lots of efficiency to improve the communication network between various businesses. This technology is also seen to gain importance in a continuous manner and it is also getting positive responses from the market. The services and features of this technology are identified to be very unique and simple. This project provided great aid in determining the broad benefits of this technology and the extent to which the technology can be relied upon. In addition, based on the analysis of the above factors, it was realized that the technology has flourishing future scopes and the technology is proving to meet the needs of wide customer group including both individual user and business entities. However, there are few drawbacks and limitations of this technology that was identified. It was realized that that the limitations are needed to worked upon and strong measures are required to be taken as the identified limitations could prove to provide hindrance to the widespread application of this technology. Works Cited Angoar, Michael. The Definitive Guide to VoIP: Everything You Ever Wanted to Know About VoIP Technology. Canada: Mikel Angoar, n.d. Print. Butcher, D., Xiangyang Li and Jinhua Guo. “Security Challenge and Defense in VoIP Infrastructures.” IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 37 (2007): 1152–1162. Print. Garrie, Daniel and Rebecca Wong. “Regulating Voice over Internet Protocol: An E.U./U.S. Comparative Approach.” American University International Law Review 22.4 (2007): 550-574. Print. Heravi, Alireza and Sameera, Mubarak. “Evaluation of users’ perspective on VOIP’s security Vulnerabilities.” Australian Information Security Management (2011): 94-100. Print. Hiwasaki, Yusuke, Hitoshi Ohmuro, Takeshi Mori, Sachiko Kurihara and Akitoshi Kataoka. “G.711.1: A Wideband Extension to ITU-T G.711.” 16th European Signal Processing Conference (2008): 1-7. Print. Kerner, M. Sean. “VoIP Networking Performance Tools: Awareness Is Critical.” Enterprise Networking Planet, 2005. Web. 22 Jul 2013. . Keromytis, D. Angelos. “A Survey of Voice over IP Security Research.” Symantec Research Labs Europe (2011): 1-16. Print. Lindsay Stephen. The Definitive Guide to VoIP: 1 Everything You Ever Wanted To Know About VoIP. United Kingdom: Digital Kindle (n.d.): 1-50 Print. Lowe Doug. Networking All-in-One Desk Reference for Dummies. New York: John Wiley & Sons, 2008. Print. Parsons, J. Jamrich and Dan Oja. New Perspectives on Computer Concepts 2010, Comprehensive. India: Cengage Learning, 2008. Print. Santi, Phithakkitnukoon, Dantu, Ram and Baatarjava, Enkh-Amgalan. “VoIP Security - Attacks and Solutions.” Information Security Journal: A Global Perspective 1.3 (2008): 114-123. Print. Tracey Marion. VoIP Voice over IP 100 Success Secrets: 100 Most Asked Questions on VoIP Phones, Providers and Services. North Carolina: Lulu.com, 2008. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Benefits and the Drawbacks of Voice over Internet Protocol (VoIP) Research Paper”, n.d.)
The Benefits and the Drawbacks of Voice over Internet Protocol (VoIP) Research Paper. Retrieved from https://studentshare.org/information-technology/1483239-the-benefits-and-the-drawbacks-of-voice-over
(The Benefits and the Drawbacks of Voice over Internet Protocol (VoIP) Research Paper)
The Benefits and the Drawbacks of Voice over Internet Protocol (VoIP) Research Paper. https://studentshare.org/information-technology/1483239-the-benefits-and-the-drawbacks-of-voice-over.
“The Benefits and the Drawbacks of Voice over Internet Protocol (VoIP) Research Paper”, n.d. https://studentshare.org/information-technology/1483239-the-benefits-and-the-drawbacks-of-voice-over.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Benefits and the Drawbacks of Voice Over Internet Protocol Telephony

Harnessing the Power of VOIP in the Educational Sector

Before the onset of voice over internet protocol (VOIP) technologies, distance learning and instruction are tied primarily through the use of text-based modules and earlier technologies like chat, forums/threads and file sharing.... To illustrate, a usual call rate ranges from 30 to 45 cents a minute as compared to 2 cents charged by Skype for every minute of voice call usage.... Voice technologies were introduced before but have failed due to complex system setups and obscure methodologies (Pan and Sullivan, 2005). … With the use of VOIP/telephony softwares like Skype, VOIP technology is on the threshold of conquering these initial obstacles to make distance learning an interactive experience for learners....
8 Pages (2000 words) Essay

How Bluetooth Works

It is an open protocol that established connectivity over short distances.... Getting connected to the internet via a computing device meant you could get connected to each and every other person who was connected to the internet around the world.... The devices get connected at usually lesser than 1Mbps over short distances around 30 feet in length at most....
14 Pages (3500 words) Research Paper

IT Problems Faced by Zulekha in Delivering Services to Its Patients

integrated voice over IP communication system).... However, the system has been associated with some drawbacks.... The paper "IT Problems Faced by Zulekha in Delivering Services to Its Patients"  highlights how the problems have affected the company financially and its reputation, steps taken by Zulekha in solving the problems (deploying a new infrastructure i....
11 Pages (2750 words) Case Study

Opportunities, Quality of Service and Risks/Threats of VoIP

This research proposal aims to study the significance of the quality of service, opportunities and benefits and various types of risks and threats that are concerns for VoIP.... (2006), VoIP technology enables traditional telephony services to operate over computer networks using packet-switched protocols.... But all the above cases can be considered too for VoIP, as it uses the same protocol as used by the internet.... Although these are the cases related to data network or it can be said to relate to internet....
16 Pages (4000 words) Research Proposal

Digital Communication System

This set of rules is known as Transmission Control Protocol/internet protocol (TCP/IP).... An assignment is about internet/web covering the topic with respect to its introduction, explanation, benefits, limitations, recommendations to improve.... For all of us who stick to internet daily and can't move ahead without its extended support, it becomes necessary to know the intricacies of the internet.... Today the world has come much closer with the advent of the internet and cellular communication systems....
10 Pages (2500 words) Assignment

Etisalat IT Infrastructure

The paper "Etisalat IT Infrastructure " states that Etisalat has the aptitude to benefit from voice over internet protocol since is its low down cost.... nbsp;Etisalat has better efficiency since voice over internet protocol treats voice similar to any other type of data, so consumers can affix documents to actual voice messages or take part in virtual conventions using shared information and videoconferencing.... Within the conformist telephony globe, numerous phone lines, forum calling features, as well as long-distance fees create many additional charges....
6 Pages (1500 words) Case Study

Session Initiation Protocol

hellip; The author of the following paper states that SIP trunking means that streams from an IP media that are broadcasted from within an enterprise remains a stream from an IP Media and passes somewhere else within the enterprise or across the enterprise's boundary to a different enterprise through the internet protocol.... It facilitates an enterprise to extend VoIP (voice over IP) telephony beyond an enterprise's firewall without necessarily using an IP-PSTN gateway....
12 Pages (3000 words) Essay

Investigation of the Network Related Issues with VoIP Implementation

The author of the paper titled the "Investigation of the Network Related Issues with VoIP Implementation" presents a comprehensive overview of some of the main areas of the voice over internet protocol implementation options offered by vendors and ISPs.... VoIP (voice over internet protocol) is a new emerging technology for the internet and web-based communication.... oice over internet protocol is a comparatively novel technology as well as it has previously attained broad acceptance as an application....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us