SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
VoIP
Mostafa Hussien
W will talk about:
 e
• Telephone.
• Internet Protocol.
• Voice over Internet Protocol.
 1. Its uses.
 2. Its benefits.
 3. Challenges.
Agenda
Telephone
• Telephone is a telecommunications device
  that transmits and receives sound.

• It converts the sound waves to electrical signals, which
  are sent through the transferring medium to the other
  phone, where they are converted back to sound waves.

• Telephones are a duplex communications medium,
  meaning they allow the people on both ends to talk
  simultaneously.
Internet Protocol
• Protocol is how some thing is done in given steps.
• Internet Protocol is how data is transmitted through the
  internet.
• Each computer has it’s own IP address so data is sent
  directly to it’s address.
• Packets is how data is transferred through the internet.
• Each part is sent through the internet as one packet.
• Packet is a data with some other headers like source IP
  address , destination IP address & packet size.
VoIP
• Is one of a family of internet technologies and
  transmission technologies for delivery of voice
  communications and multimedia sessions over Internet
  Protocol (IP) networks.

• Is a technology that allows you to make voice calls
  using an Internet connection instead of a regular
  phone line.

• VoIP is the technology in which the analogue voice
  signal is digitized and becomes binary numbers in order
  to be transferred by the IP protocol.
VoIP can be
implemented in several
       ways:
1. Dedicated VoIP phones connect directly to
the IP network using technologies such as
wired Ethernet or wireless Wi-Fi..
2. An analog telephone adapter is a device
used to connect one or more standard analog
telephones to a digital telephone system.
• A softphone (Skype) is application software
  installed on a networked computer that is
  equipped with a microphone and speaker.
Why we use
  VoIP?!
• Because of the bandwidth efficiency and low costs
  that VoIP technology can provide.

• VoIP allows both voice and data communications to
  be run over a single network, which can significantly
  reduce infrastructure costs.

• VoIP devices have simple user interfaces, so users
  can often make simple system configuration changes.
Benefits of VoIP
1. Operational Cost
• VoIP can be a benefit for reducing
  communication and infrastructure costs.
  Examples include:
• Routing phone calls over existing data networks to avoid the
  need for separate voice and data networks.

• Conference calling, IVR, call forwarding, automatic redial,
  and caller ID features that traditional telecommunication
  companies normally charge extra for, are available free of
  charge in VoIP.
2. Flexibility
• The ability to transmit more than one telephone call over
  a single broadband connection.

• Location independence. Only a sufficiently fast and stable
  Internet connection is needed to get a connection from
  anywhere to a VoIP provider.

• Integration with other services available over the Internet,
  including video conversation, message or data file
  exchange during the conversation.
Challenges of
   V  oIP
1.Quality of service
• It does not provide a network-based
  mechanism to ensure that data packets are not
  lost, or delivered in sequential order.

• A VoIP packet usually has to wait for the
  current packet to finish transmission, although
  it is possible to abort a less important packet in
  mid-transmission.
2. Power Failure
• Telephones for traditional analog service are usually
  connected directly to telephone company which
  provide direct current to power independently of
  locally available power.

• IP Phones and VoIP telephone adapters connect
  to routers or cable modems which typically depend
  on the availability of mains electricity or locally
  generated power.
3. Emergency calls
• The nature of IP makes it difficult to locate network
  users geographically.

• Emergency calls, therefore, cannot easily be routed to
  a nearby call center.

• Sometimes, VoIP systems may route emergency calls
  to a non-emergency phone line at the intended
  department.
4. Security
• VoIP telephone systems are susceptible to attacks as are any
  internet-connected devices. This means that hackers who
  know about these vulnerabilities can institute attacks, harvest
  customer data, record conversations.

• To prevent the above security concerns government and
  military organizations are using Voice over Secure IP
  (VoSIP), Secure Voice over IP (SVoIP), and Secure Voice
  over Secure IP (SVoSIP) to protect confidential and
  classified VoIP communications.
Voice over Internet Protocol

Mais conteúdo relacionado

Mais procurados

Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Aakura Pyakura
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol jomin mathew
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Fringe Division
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?broadconnect
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
Concept Of VOIP in deatils
Concept Of VOIP in deatilsConcept Of VOIP in deatils
Concept Of VOIP in deatilsMostain Billah
 
Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014kwader Saudi
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLRajan Kumar
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained Vikas Shokeen
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021nicklacey
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation tofael1
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?mahipal9
 
Telecommunication network architecture
Telecommunication network architectureTelecommunication network architecture
Telecommunication network architectureTapio Meskanen
 

Mais procurados (20)

Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)
 
Voip
VoipVoip
Voip
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
Concept Of VOIP in deatils
Concept Of VOIP in deatilsConcept Of VOIP in deatils
Concept Of VOIP in deatils
 
Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Voip Ppt
Voip PptVoip Ppt
Voip Ppt
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
 
IP Telephony
IP TelephonyIP Telephony
IP Telephony
 
Voip
VoipVoip
Voip
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Telecommunication network architecture
Telecommunication network architectureTelecommunication network architecture
Telecommunication network architecture
 
Voip
VoipVoip
Voip
 

Destaque

Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolYrasumalli Reddy
 
VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)tech4101
 
Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol) Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol) Ankit Gupta
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3Vishnu M Dinesan
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskSameer Verma
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP PresentationRMMcPherson
 

Destaque (6)

Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)
 
Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol) Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol)
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using Asterisk
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP Presentation
 

Semelhante a Voice over Internet Protocol

Semelhante a Voice over Internet Protocol (20)

Vo ip presentation
Vo ip presentationVo ip presentation
Vo ip presentation
 
Vo ip
Vo ipVo ip
Vo ip
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
VoIP
VoIPVoIP
VoIP
 
VOIP
VOIPVOIP
VOIP
 
Phone System Roadmap
Phone System RoadmapPhone System Roadmap
Phone System Roadmap
 
Future of voip- karan singh cypher
Future of voip- karan singh cypherFuture of voip- karan singh cypher
Future of voip- karan singh cypher
 
Voice over ip
Voice over ipVoice over ip
Voice over ip
 
Voice over ip
Voice over ipVoice over ip
Voice over ip
 
VoIP
VoIPVoIP
VoIP
 
DEEPANSHU_PPT.pptx
DEEPANSHU_PPT.pptxDEEPANSHU_PPT.pptx
DEEPANSHU_PPT.pptx
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
 
VOIP Technology
VOIP TechnologyVOIP Technology
VOIP Technology
 
Voip
Voip Voip
Voip
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 

Mais de Course Hero

Online Marketing (Social Media)
Online Marketing (Social Media)Online Marketing (Social Media)
Online Marketing (Social Media)Course Hero
 
Interviewing Skills
Interviewing  Skills Interviewing  Skills
Interviewing Skills Course Hero
 
Social Media & Online Marketing
Social Media & Online Marketing Social Media & Online Marketing
Social Media & Online Marketing Course Hero
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]Course Hero
 
Childhood dreams
Childhood dreamsChildhood dreams
Childhood dreamsCourse Hero
 
How to deal with negative criticism
How to deal with negative criticismHow to deal with negative criticism
How to deal with negative criticismCourse Hero
 

Mais de Course Hero (10)

Online Marketing (Social Media)
Online Marketing (Social Media)Online Marketing (Social Media)
Online Marketing (Social Media)
 
Interviewing Skills
Interviewing  Skills Interviewing  Skills
Interviewing Skills
 
Social Media & Online Marketing
Social Media & Online Marketing Social Media & Online Marketing
Social Media & Online Marketing
 
Networks 2
Networks 2Networks 2
Networks 2
 
Inspiring story
Inspiring storyInspiring story
Inspiring story
 
Networks
Networks Networks
Networks
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]
 
Childhood dreams
Childhood dreamsChildhood dreams
Childhood dreams
 
How to deal with negative criticism
How to deal with negative criticismHow to deal with negative criticism
How to deal with negative criticism
 
Driverless cars
Driverless carsDriverless cars
Driverless cars
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Voice over Internet Protocol

  • 2. W will talk about: e • Telephone. • Internet Protocol. • Voice over Internet Protocol. 1. Its uses. 2. Its benefits. 3. Challenges.
  • 5. • Telephone is a telecommunications device that transmits and receives sound. • It converts the sound waves to electrical signals, which are sent through the transferring medium to the other phone, where they are converted back to sound waves. • Telephones are a duplex communications medium, meaning they allow the people on both ends to talk simultaneously.
  • 7. • Protocol is how some thing is done in given steps. • Internet Protocol is how data is transmitted through the internet. • Each computer has it’s own IP address so data is sent directly to it’s address. • Packets is how data is transferred through the internet. • Each part is sent through the internet as one packet. • Packet is a data with some other headers like source IP address , destination IP address & packet size.
  • 9. • Is one of a family of internet technologies and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. • Is a technology that allows you to make voice calls using an Internet connection instead of a regular phone line. • VoIP is the technology in which the analogue voice signal is digitized and becomes binary numbers in order to be transferred by the IP protocol.
  • 10. VoIP can be implemented in several ways:
  • 11. 1. Dedicated VoIP phones connect directly to the IP network using technologies such as wired Ethernet or wireless Wi-Fi..
  • 12. 2. An analog telephone adapter is a device used to connect one or more standard analog telephones to a digital telephone system.
  • 13. • A softphone (Skype) is application software installed on a networked computer that is equipped with a microphone and speaker.
  • 14. Why we use VoIP?!
  • 15. • Because of the bandwidth efficiency and low costs that VoIP technology can provide. • VoIP allows both voice and data communications to be run over a single network, which can significantly reduce infrastructure costs. • VoIP devices have simple user interfaces, so users can often make simple system configuration changes.
  • 17. 1. Operational Cost • VoIP can be a benefit for reducing communication and infrastructure costs. Examples include: • Routing phone calls over existing data networks to avoid the need for separate voice and data networks. • Conference calling, IVR, call forwarding, automatic redial, and caller ID features that traditional telecommunication companies normally charge extra for, are available free of charge in VoIP.
  • 18. 2. Flexibility • The ability to transmit more than one telephone call over a single broadband connection. • Location independence. Only a sufficiently fast and stable Internet connection is needed to get a connection from anywhere to a VoIP provider. • Integration with other services available over the Internet, including video conversation, message or data file exchange during the conversation.
  • 19. Challenges of V oIP
  • 20. 1.Quality of service • It does not provide a network-based mechanism to ensure that data packets are not lost, or delivered in sequential order. • A VoIP packet usually has to wait for the current packet to finish transmission, although it is possible to abort a less important packet in mid-transmission.
  • 21. 2. Power Failure • Telephones for traditional analog service are usually connected directly to telephone company which provide direct current to power independently of locally available power. • IP Phones and VoIP telephone adapters connect to routers or cable modems which typically depend on the availability of mains electricity or locally generated power.
  • 22. 3. Emergency calls • The nature of IP makes it difficult to locate network users geographically. • Emergency calls, therefore, cannot easily be routed to a nearby call center. • Sometimes, VoIP systems may route emergency calls to a non-emergency phone line at the intended department.
  • 23. 4. Security • VoIP telephone systems are susceptible to attacks as are any internet-connected devices. This means that hackers who know about these vulnerabilities can institute attacks, harvest customer data, record conversations. • To prevent the above security concerns government and military organizations are using Voice over Secure IP (VoSIP), Secure Voice over IP (SVoIP), and Secure Voice over Secure IP (SVoSIP) to protect confidential and classified VoIP communications.