SlideShare a Scribd company logo
1 of 16
A  PRESENTATION  ON
CONTENTS :
INTRODUCTION :
WHAT  IS VOIP ?
GATE WAY: ,[object Object],[object Object],[object Object],[object Object],[object Object],The   gateway allows the calls to transfer from one network to the other
REQUIREMENTS OF VOIP :
HOW  VOIP  WORKS : part 1
IP PBX
PART  2 : PROTOCOLS H.323 Call Sequence
PART  3: ENCODING ,[object Object],[object Object],PART 4: QUALITY ,[object Object],[object Object],For Documentation and Downloads Visit
Some Applications of VoIP ,[object Object],[object Object],[object Object],[object Object],For Documentation and Downloads Visit
PROS : ,[object Object],[object Object],[object Object],[object Object],CONS : ,[object Object],[object Object],[object Object],For Documentation and Downloads Visit
Without a doubt, the data revolution will only gain momentum in the coming years, with more and more voice traffic moving onto data networks. Vendors of voice equipment will continue to develop integrated voice and data devices based on packetized technology. Users with ubiquitous voice and data service integrated over one universal infrastructure will benefit from true, seamless, transparent interworking between voice and all types of data.  CONCLUSION : For Documentation and Downloads Visit
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],For Documentation and Downloads Visit
THANK YOU For Documentation and Downloads Visit
ANY QUERIES

More Related Content

What's hot

ZIP-and-IoT-Whitepaper[1]
ZIP-and-IoT-Whitepaper[1]ZIP-and-IoT-Whitepaper[1]
ZIP-and-IoT-Whitepaper[1]
Sasi Nair
 
Group slide presentation_forum-_week_11
Group slide presentation_forum-_week_11Group slide presentation_forum-_week_11
Group slide presentation_forum-_week_11
s1180075
 
Group slide presentation forum week 11
Group slide presentation forum  week 11Group slide presentation forum  week 11
Group slide presentation forum week 11
Yohei Hino
 

What's hot (19)

WiFi & Bluetooth by TAS
WiFi & Bluetooth by TASWiFi & Bluetooth by TAS
WiFi & Bluetooth by TAS
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionWhat is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
ZIP-and-IoT-Whitepaper[1]
ZIP-and-IoT-Whitepaper[1]ZIP-and-IoT-Whitepaper[1]
ZIP-and-IoT-Whitepaper[1]
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Group slide presentation_forum-_week_11
Group slide presentation_forum-_week_11Group slide presentation_forum-_week_11
Group slide presentation_forum-_week_11
 
Group slide presentation forum week 11
Group slide presentation forum  week 11Group slide presentation forum  week 11
Group slide presentation forum week 11
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Telephony
TelephonyTelephony
Telephony
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 

Similar to VOIP

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
irjes
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
Videoguy
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
jomin mathew
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing Technology
Videoguy
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IP
Videoguy
 

Similar to VOIP (20)

VOIP Technology
VOIP TechnologyVOIP Technology
VOIP Technology
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
VoIP
VoIPVoIP
VoIP
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
Aculab HD voice whitepaper
Aculab HD voice whitepaperAculab HD voice whitepaper
Aculab HD voice whitepaper
 
Voip
VoipVoip
Voip
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing Technology
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IP
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
ccna project
ccna projectccna project
ccna project
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
 
3g 4g ppt
3g 4g ppt3g 4g ppt
3g 4g ppt
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Report
ReportReport
Report
 
Ip
IpIp
Ip
 

More from Presentaionslive.blogspot.com

A multimodal interaction framework for pervasive game applications
A   multimodal   interaction   framework   for pervasive   game   applicationsA   multimodal   interaction   framework   for pervasive   game   applications
A multimodal interaction framework for pervasive game applications
Presentaionslive.blogspot.com
 

More from Presentaionslive.blogspot.com (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Phis
PhisPhis
Phis
 
Network security
Network securityNetwork security
Network security
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Grid computing
Grid computingGrid computing
Grid computing
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Information Security
Information SecurityInformation Security
Information Security
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 
Steganography
Steganography Steganography
Steganography
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
Novel architecture
Novel architectureNovel architecture
Novel architecture
 
Neural networks
Neural networksNeural networks
Neural networks
 
Multimedia and gaming
Multimedia and gamingMultimedia and gaming
Multimedia and gaming
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A multimodal interaction framework for pervasive game applications
A   multimodal   interaction   framework   for pervasive   game   applicationsA   multimodal   interaction   framework   for pervasive   game   applications
A multimodal interaction framework for pervasive game applications
 
1 spattern matching using biometric techniques
1 spattern matching using biometric techniques1 spattern matching using biometric techniques
1 spattern matching using biometric techniques
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Unique p mail-addressing 97-03
Unique p mail-addressing 97-03Unique p mail-addressing 97-03
Unique p mail-addressing 97-03
 

Recently uploaded

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

VOIP

  • 4. WHAT IS VOIP ?
  • 5.
  • 7. HOW VOIP WORKS : part 1
  • 9. PART 2 : PROTOCOLS H.323 Call Sequence
  • 10.
  • 11.
  • 12.
  • 13. Without a doubt, the data revolution will only gain momentum in the coming years, with more and more voice traffic moving onto data networks. Vendors of voice equipment will continue to develop integrated voice and data devices based on packetized technology. Users with ubiquitous voice and data service integrated over one universal infrastructure will benefit from true, seamless, transparent interworking between voice and all types of data. CONCLUSION : For Documentation and Downloads Visit
  • 14.
  • 15. THANK YOU For Documentation and Downloads Visit