StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Study of protocols in a VoIP network - Essay Example

Comments (0) Cite this document
Summary
Voice over Internet Protocol (VoIP) refers to the transmission technology used in delivering voice communications over IP networks such as the Internet or other IP-based networks. Using IP for voice conversations is just one of the communication modes that migrated from their traditional forms to the Internet…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Study of protocols in a VoIP network
Read TextPreview

Extract of sample "Study of protocols in a VoIP network"

Download file to see previous pages These applications later came out with voice conversation features in which users utilize computer headsets or IP telephone handsets in communicating with one another. Services like call forwarding, conference calling, voicemail, contact management and directory assistance were later added and paved the way for the creation of a new revolutionary technology - Voice over Internet Protocol or VoIP. This development has captured the attention of telecom regulators and operators who have now started to embrace the technology as one of their mainstream services. The two most popular protocols, H.323 and SIP will be discussed in this report.
H.323 is a standard for the transmission of real-time audio, video, and data information over IP-based networks. The standard contains specifications on the components, protocols, and procedures required in providing multimedia communication over local-area networks (LANs), metropolitan-area networks (MANs), wide-area networks (WANs) and even enterprise networks (ENs). Applications of H.323 may include IP telephony (audio only), videotelephony (audio and video), audio+ data and audio+video+data. H.323 can also be used for point-to-point or point-to-multipoint-multimedia communications like videoconferencing. Based on these applications, it can be seen that the standard can be utilized in a wide market segment - from consumer to enterprise to telco services.
The H.3
Versions
The H.323 standard is specified by the ITU-T Study Group 16. Version 1 was formulated in 1996 and refers to visual telephone systems and equipment for LANs that provide a nonguaranteed quality of service (QoS). It is geared more for consumer applications via LANs and the Internet.
Version 2 of the standard was formulated in 1998 to accommodate the introduction of new voice-over-IP (VoIP) applications and IP telephony. The absence of a governing standard for these applications resulted to incompatibility of PC-based equipment and PBX or PSTN-based peripherals, so the new H.323 version was defined.
At present, there are moves to add new specifications to the standard for new applications like fax-over-IP networks, gatekeeper-to-gatekeeper communications, and fast-connection mechanisms. This will pave the way for Version 3 of the standard.
Components
The H.323 standard specifies four kinds of components:
1. Terminals. An H.323 terminal can either be a personal computer (PC) or a stand-alone device, running the multimedia applications. It primarily supports audio communications but can optionally support video or data communications. The primary goal of H.323 is to interface standard-defined equipment with other multimedia terminals.
2. Gateways. A gateway refers to the equipment used to provide connectivity between an H.323 network and a non-H.323 network. The H.323 network can consist of PCs and PC-based peripherals while a non-H.323 network can refer to a PBX or PSTN network. In order to achieve connectivity between these two dissimilar networks, translating protocols were developed for traditional telephony features like call setup and release. It should be noted that a gateway is not required for communication between two H.323 terminals within an H.323 network.
3. Gatekeepers. A gatekeeper is necessary if an H.323 network will be implemented with services such as billing, addressing, call-routing, bandwidth management and authorization and ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Study of protocols in a VoIP network Essay Example | Topics and Well Written Essays - 4000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1500855-study-of-protocols-in-a-voip-network
(Study of Protocols in a VoIP Network Essay Example | Topics and Well Written Essays - 4000 Words)
https://studentshare.org/miscellaneous/1500855-study-of-protocols-in-a-voip-network.
“Study of Protocols in a VoIP Network Essay Example | Topics and Well Written Essays - 4000 Words”, n.d. https://studentshare.org/miscellaneous/1500855-study-of-protocols-in-a-voip-network.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Study of protocols in a VoIP network

Routing Protocols for Ad-hoc Wireless Network

... the performance calculation of the protocols, above. In fact, the parameters are used to evaluate the mobility model and its changes in the optimum velocity and pause-time. In this case, different scenarios are chosen that spare large set of mobility functions. However, different mobility models like the Random Waypoint, Reference Point Group Mobility (RPGM), Freeway and Manhattan are used in order to evaluate the efficiency of the protocols. 4.1 Proposal for Implementation of Wireless Ad-Hoc Network for the First Responders in Kazakhstan The basic study of currently used communication technologies by first responders in Kazakhstan have shown that unfortunately communication technology used by first responders today does not scale well...
20 Pages(5000 words)Dissertation

VoIP

...?Running Head: VoIP VoIP [Institute’s VoIP Over the past two decades, technology has revolutionized rapidly more than any otherfacet in this competitive world and thus, has left an indelible imprint on the entire planet. With the passage of time, technology is incessantly offering with a wide range of innovative, over-whelming products that have reformed human life. Internet, one of the marvels of technology, alters the voice signals into digital signals and then transmits them via IP-based networks or data network. This unprecedented advancement in telecommunication has come to known as VoIP (Voice over Internet Protocol). “IP telephony, Internet telephony, Voice over Broadband (VoBB), broadband telephony, and broadband phone are few...
2 Pages(500 words)Essay

Basic Network Technology, Structure, and Protocols

... globally. A dot-company could save a lot of investment e.g. building charges, travelling costs, communication and availability issues, etc. Having a high level technical knowledge of how information travels within a client server arrangement of a network, knowing the protocols and various network jargons e.g. topology, routers, switches, etc., a better understanding of the solution designs presented by developers can be achieved. Understanding the basic working of Internet would inspire possibilities of networking existing businesses locally or remotely, increasing the business productivity and support. Understanding about the flow of traffics, optimization strategies can be devised, etc. Both the tutorials were animations so the teaching...
2 Pages(500 words)Research Paper

Basic Network Technology, Structure, and Protocols

...?BASIC NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Affiliation Networking is the way of linking two or more computer systems, devices or even networks jointly with the intention of distributing and sharing useful information and data. Additionally, networks are created using a combination of computer software and hardware. In addition, there are diverse kinds of computer networks. One technique is to define the kind of network according to the massive area it covers. For instance, LANs (Local area networks) normally cover the area over a single home, on the other hand WANs (wide area networks), have access to countries, continents, cities, or even across the globe. Moreover, the Internet...
3 Pages(750 words)Research Paper

Basic Network Technology, Structure, and Protocols

...? Basic Network Technology, Structure, and Protocols Introduction The importance of computer technology in this age cannot be gainsaid. In essence, computers have been incorporated in almost every part of the society in such a way that living without them seems to be a mirage. However, while computers have been used for almost two decades, it is appalling that very few people have a complete knowledge as to the operation of computer networks. Many are times when people will make pretty dumb statements not because they would like to do that but rather because, they do not know much about computer networks. This is not excusable in the 21st century hence looking at the basic or fundamental things that an individual should know is imperative...
3 Pages(750 words)Essay

Network Organization, Addressing, and Routing Protocols

... of the of the 10 February Network Organization, Addressing, and Routing Protocols The best routing protocol for this scenario is Open shortest Path First OSPF routing protocol. This protocol defines a methodology for transporting information. Likewise, the interior gateway protocol that is utilized between routers represents a part of a single (AS) Autonomous System. OSPF also has a functionality of link state technology that exchange router information associated with routing information. Moreover, a database demonstrating the Autonomous system’s topology is maintained in each OSPF router ("Open Shortest Path First." 353-353). The database maintaining a routing table develops a shortest path tree. The routes are than calculated...
3 Pages(750 words)Research Paper

Voip

...Forensics in VoIP Services April 9, 2009 An introduction to VOIP and SIP VoIP is telephony which uses a packet switched network as against circuit switched networks. VoIP transmits packets of data between smart devices (e.g. computers) over a relatively unintelligent network, whereas traditional telephony sends voice data between dumb devices (telephones) through a super smart central network. The Session Initiation Protocol (SIP) is commonly used in VoIP implementations. It provides the ability to integrate traditional voice services with web-based data services, which include self-based provisioning, instant messaging, presence, and mobility services. It is used for call initiation, call teardown and other call related data sent during...
2 Pages(500 words)Research Proposal

Network Management and Protocols

...Network Management and Protocols We also involve our users as much as we can. If the users can be somewhat independent in their own network management functions, the whole system is more effective. If the user can determine whether the LAN segment, the entire network, or the ISP is down, then the number of calls to the technicians can be decreased. The users are also very good at keeping track of consistent problems. They can help determine patterns that result in low response times or complete outages. The fundamental service for network management is SNMP, which stands for "simple network management protocol." It is a component of TCP/IP, which is itself the foundation of the Internet. SNMP is used to provide information about...
2 Pages(500 words)Essay

Basic Network Technology, Structure, and Protocols

...BASIC NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Introductory and General ials RAD University Tutorials The RAD University tutorials available from the RAD University tutorials page is tutorials for Data Communications, telecommunications and computer networking. The tutorials available on the site page also include projects done by students and some by the dean. Anyone can submit a tutorial on any topic to be added to the online directory of tutorials provided by RAD University. The tutorials are meant for computer scientists and engineers of the future. The introductory and general tutorials are categorized into: client-server interactive animation, internet protocol model, internet...
2 Pages(500 words)Essay

Network Protocols

... Network Protocols Rules and procedures used in communicating are referred to as protocols. However, protocol can get used invarious perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer environment, rules of protocol apply in the same manner. Following the networking of computers, the technical procedures and rules that regulate their communication are referred to as protocols (Dong 45). There are various types of protocols; in the lowest stage protocols are used to define the type of the electrical signal gets to represent one and the signal that represents zero. At the highest stage protocols enable users to communicate...
1 Pages(250 words)Case Study

The Use of Scientific Methods to Study the Law

...Is it useful to use scientific methods to study the law? In answering the question “What is law?” Saint Augustine d: “Lex iniustanon est lex” (Unjust law is not law). This attributes a moral dimension to the law, which is disputed in the positivist approach that postulates legal validity as being conditioned by social facts rather than moral content. When applying a scientific approach to a study of law, the basic premise that holds good is the existence of certain immutable principles that condition our understanding of reality. According to Hans Kelson, the “law functions as a scheme of interpretation”1 and it is that system or set of rules that orders the manner in which we view the world. Hence the study of law, when applied...
9 Pages(2250 words)Coursework

Welfare to Work and Social Policy: Comparative Study of Various Nations' Approaches

The social policy varies differently by the needs of individual nations and can include assistance to youth unemployment in an attempt to provide temporary aid until an individual is able to sustain a regular income through work incentives. One of the main theories regarding welfare to work programs is that working parents contribute to the economy and are less likely to rely solely on the state for their welfare (Walling, 2005). With this concept being one of the primary motivators for welfare to work policies, different nations adopt a policy to provide an allotment of skills training, aid with transportation issues, financial support, and even child care as an incentive to drive the welfare recipient back into full-time work. T...
9 Pages(2250 words)Report

Quality Systems in the Public Sector: A Study of Quality Initiatives in the NHS, Scotland

The disintegration of some service provisions covered by the public sector is the cause of concern. In some cases where services, earlier provided by public sector organizations, were privatized led to the dramatic change in the quality and cost of service. This makes a study of concepts of quality management in the context of the public sector necessary to understand the reasons behind the ‘market failure’ of public sector service providers.

The problems that assail these services are inherent in any government enterprise such as lack of coordination, slow decision making, inflexibility, lack of incentive to perform and so on. Consider the following observation of Joseph Stiglitz (1998).

"Making...
55 Pages(13750 words)Dissertation

A Comprehensive Network Infrastructure

All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company’s data. Both headquarters have an urge in establishing reliable and cost-effective printing solutions.
The purpose of the needs analysis is to analyze the business objectives and produce requirements for a network infrastructure to be used in the proposed network infrastructure solution. The proposed network infrastructure solution follows in Section 3.
The best type of connection between offices and points of sales for a geographically spread retail company is by using a broadband internet connection technology and implementing an outsourced virtual priv...
12 Pages(3000 words)Assignment

Country Study: Mali

The territory of Mali has had a great history. We have been centers of the Ghana Empire, the Mali Empire, and the Songhai Empire for about six centuries. Thereafter, during the 17th and 18th centuries, several small states developed along the Niger basin, but they fell during the holy war waged by Muslim leader Al-Hajj Umar, whose kingdom extended from Timbuktu to headwaters of Niger and Senegal. His successor, Ahmadu was defeated by the French in 1860. (http://us-africa.tripod.com /mali.html)

As is well-known, we have had a turbulent past. We were a French colony for 80 years until we achieved independence. Now we are a multi-party democracy with Presidential form of Government. While the executive power rests with the...
6 Pages(1500 words)Case Study

A Comparative Study of the Origins of Ethical Thoughts

Do you know what they dug out? -- Wires! It proves that two thousand five hundred years ago, in the age of Pericles, the Greeks had telephones”. The Jew laughingly retorted: “Recently they were digging in Jerusalem. They dug out nothing. This proves that three thousand years ago when Solomon was the king of Judea, the Jews had the principle of wireless!”

ETHICS AND DIVERSE DEFENITIONS: One of the Dilemmas of the civilized human society was the fight between the soul and the flesh or rather the body and desires. The question is how to divert human energy in an intelligent, controlled way? Searching answers to this question one lands in the premise of ethics, personal as well as social. Ethics (English)...
11 Pages(2750 words)Case Study

Conflict Between Researh and Ethics on the Tuskegee Syphilis Study

... before the study is initiated. The IRB also had a moral responsibility to ensure that the welfare of human subjects would be the first priority of any clinical research and hence all the regulatory procedures pertaining to human subjects in the study was adhered to and that an informed consent explaining the protocol in a language understood by the participant was obtained prior to the start of any study. And after obtaining an informed consent investigator should ensure that no deviation occurs in the study and the participant is treated according to what he has consented (The Ethics of Social Research, n.d). Additionally the participants should also be made aware of any risks involved, additional costs, circumstance under...
7 Pages(1750 words)Essay

Does Political Theory Have Any Importance for the Study of Politics

The system has evolved significantly and whether directly or indirectly every citizen is affected and influenced by the political happenings. Moreover, citizens also affect political events in one way or the other, either directly or indirectly. Therefore, we all live in a society where most of us are passive political actors or audience, in either case, closely connected to the system (Hoffman & Graham, pp. 403-408, 2006). Over the past centuries, experts and authorities have developed a theoretical framework to help us understand political behavior and events. However, the fundamental question that arises here is that how this political theory or political philosophy helps us to understand political behavior or facilitates o...
6 Pages(1500 words)Term Paper

The Impact of Social Network in Tourism

...Table of Content 2 2. Introduction 3 2.1 Background of the study 3 2.2 Research aims and Objectives 5 3. Review of Literatures 5 3.1 ICT and Tourism 6 3.2 Information Search , Social networking and Tourism 8 3.3 What is social media and how it is implemented in the field of tourism...
41 Pages(10250 words)Thesis

The Epistemological Assumptions Schommer-Aikins and Hutters Study

The authors, however, have made several philosophical assumptions even before the actual study began. These assumptions have bearing on the entire research because they guided the studies thesis, the method of investigation and the way the researchers interpreted the collected data.
Referring to previous works, Schommer-Aikins and Hutter embarked on several bouts of theorizing regarding the nature of knowledge and how people learn about issues that they face every day. Citing the body of literature, for example, on epistemological beliefs, the authors assumed that "individuals’ beliefs about the nature of knowledge and learning are linked to their comprehension, metal comprehension, interpretation of information, and pe...
6 Pages(1500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Study of protocols in a VoIP network for FREE!

Contact Us