SlideShare uma empresa Scribd logo
1 de 2
Literature Review – Voice Over Internet Protocol<br />What is VoIP?<br />Voice over Internet Protocol (VoIP) is a term that encompasses the principles and technology of transmission of voice communications and multimedia session over IP networks, e.g. a LAN or the Internet, rather than through the traditional telephone system, which is the Public Switched Telephone Network (PSTN).  <br />It uses a few underlying protocols (H.263, SIP, and RTP) to convert the media signal (voice, video) to a digital signaling format or codec, compresses the signal and converts it to IP packets. These packets are then transmitted over the existing IP network to the end user. The packet, upon reaching the end user, are reassembled and converted from its digital format to analog. This is the format that is recognizable by the end device and transmitted to the user as voice or video. <br />The three different types of VoIP services are:<br />,[object Object]
PC to Phone: installed VoIP client to traditional/IP telephone or vice versa

Mais conteúdo relacionado

Mais procurados

Gi fi seminar Report
Gi fi seminar ReportGi fi seminar Report
Gi fi seminar ReportShivam Joshi
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptxahmad661583
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesBisrat Girma
 
Gi Fi technology
Gi Fi  technologyGi Fi  technology
Gi Fi technologyGopika S S
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP) Namra Afzal
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecturebdemchak
 

Mais procurados (20)

Voip
VoipVoip
Voip
 
Gi fi seminar Report
Gi fi seminar ReportGi fi seminar Report
Gi fi seminar Report
 
WiFi 101
WiFi 101WiFi 101
WiFi 101
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Internet of Things presentation
Internet of Things presentationInternet of Things presentation
Internet of Things presentation
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptx
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Firewalls
FirewallsFirewalls
Firewalls
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Datacenter
DatacenterDatacenter
Datacenter
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
GiFi
GiFi GiFi
GiFi
 
Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN Technologies
 
Gi Fi technology
Gi Fi  technologyGi Fi  technology
Gi Fi technology
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
Gifi ppt
Gifi pptGifi ppt
Gifi ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
5g technology
5g technology5g technology
5g technology
 

Destaque

Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
Voip powerpoint
Voip powerpointVoip powerpoint
Voip powerpointGW1992
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeDan York
 
Wimax and VoIP Presentation
Wimax and VoIP PresentationWimax and VoIP Presentation
Wimax and VoIP PresentationMario B.
 
Der Kolner Dom (The Dom of Cologne/ Koln )
Der Kolner Dom (The Dom of Cologne/ Koln )Der Kolner Dom (The Dom of Cologne/ Koln )
Der Kolner Dom (The Dom of Cologne/ Koln )Nazmul Hossain Rakib
 
Security Challenges In VoIP
Security Challenges In VoIPSecurity Challenges In VoIP
Security Challenges In VoIPTomGilis
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Thomas Siegers
 
Setup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkSetup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkNazmul Hossain Rakib
 
Using Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitchUsing Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitchMonica McArthur
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIPKundan Singh
 
5 signs you need VoIP
5 signs you need VoIP5 signs you need VoIP
5 signs you need VoIPEntanet
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskSameer Verma
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?broadconnect
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
 

Destaque (20)

Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
Voip powerpoint
Voip powerpointVoip powerpoint
Voip powerpoint
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
 
Wimax and VoIP Presentation
Wimax and VoIP PresentationWimax and VoIP Presentation
Wimax and VoIP Presentation
 
Der Kolner Dom (The Dom of Cologne/ Koln )
Der Kolner Dom (The Dom of Cologne/ Koln )Der Kolner Dom (The Dom of Cologne/ Koln )
Der Kolner Dom (The Dom of Cologne/ Koln )
 
Security Challenges In VoIP
Security Challenges In VoIPSecurity Challenges In VoIP
Security Challenges In VoIP
 
Voip Ppt
Voip PptVoip Ppt
Voip Ppt
 
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
Efficient Telecommunication Infrastructure with Internet Telephony (VoIP)
 
Setup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE networkSetup VoIP System and Interconnection with LTE network
Setup VoIP System and Interconnection with LTE network
 
SIP Beyond VoIP
SIP Beyond VoIPSIP Beyond VoIP
SIP Beyond VoIP
 
VoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacksVoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacks
 
Using Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitchUsing Asterisk in a SIP softswitch
Using Asterisk in a SIP softswitch
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
 
5 signs you need VoIP
5 signs you need VoIP5 signs you need VoIP
5 signs you need VoIP
 
voip gateway
 voip gateway voip gateway
voip gateway
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using Asterisk
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
VoIP Seminar
VoIP SeminarVoIP Seminar
VoIP Seminar
 

Semelhante a VoIP Literature review

VoIP: Consumer Market Trends
VoIP: Consumer Market TrendsVoIP: Consumer Market Trends
VoIP: Consumer Market TrendsAlex Gault
 
Paul final voip
Paul final voipPaul final voip
Paul final voipPaul Fares
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsAshik Jibon
 
8841 w 4 final storyboard multimedia presentation
8841 w 4  final storyboard multimedia presentation8841 w 4  final storyboard multimedia presentation
8841 w 4 final storyboard multimedia presentationjasperthompson02
 
The Convergence of Communication.pdf
The Convergence of Communication.pdfThe Convergence of Communication.pdf
The Convergence of Communication.pdfMadarauchiha25451
 
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paperVoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paperALTANAI BISHT
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056mashiur
 
385 voice over ip
385 voice over ip385 voice over ip
385 voice over ipjacinthsara
 
12 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb201112 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb2011Alaa Al-saggaf
 
COLT Telecom - VoIP For Enterprise Customers, a COLT Business Briefing
COLT Telecom - VoIP For Enterprise Customers, a COLT Business BriefingCOLT Telecom - VoIP For Enterprise Customers, a COLT Business Briefing
COLT Telecom - VoIP For Enterprise Customers, a COLT Business BriefingAlessandro Vigilante
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfOkan YILDIZ
 

Semelhante a VoIP Literature review (20)

How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
VOIP Presentation
VOIP PresentationVOIP Presentation
VOIP Presentation
 
ccna project
ccna projectccna project
ccna project
 
VoIP: Consumer Market Trends
VoIP: Consumer Market TrendsVoIP: Consumer Market Trends
VoIP: Consumer Market Trends
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
Paul final voip
Paul final voipPaul final voip
Paul final voip
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling Environments
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
8841 w 4 final storyboard multimedia presentation
8841 w 4  final storyboard multimedia presentation8841 w 4  final storyboard multimedia presentation
8841 w 4 final storyboard multimedia presentation
 
VoIP
VoIPVoIP
VoIP
 
Voip
VoipVoip
Voip
 
The Convergence of Communication.pdf
The Convergence of Communication.pdfThe Convergence of Communication.pdf
The Convergence of Communication.pdf
 
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paperVoIP   altanai bisht , 1st sem _ Anna University , Symposium presentation paper
VoIP altanai bisht , 1st sem _ Anna University , Symposium presentation paper
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056
 
385 voice over ip
385 voice over ip385 voice over ip
385 voice over ip
 
VOIP Technology
VOIP TechnologyVOIP Technology
VOIP Technology
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 
12 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb201112 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb2011
 
COLT Telecom - VoIP For Enterprise Customers, a COLT Business Briefing
COLT Telecom - VoIP For Enterprise Customers, a COLT Business BriefingCOLT Telecom - VoIP For Enterprise Customers, a COLT Business Briefing
COLT Telecom - VoIP For Enterprise Customers, a COLT Business Briefing
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdf
 

VoIP Literature review

  • 1.
  • 2. PC to Phone: installed VoIP client to traditional/IP telephone or vice versa
  • 3.
  • 6. Support for digital features such as IVR, call transfers, conferencing, forwarding, etc.
  • 7.
  • 9. Lack of support for emergency services
  • 11. Bandwidth dependencyBackground Research<br />For the purpose of this project, the issue of cost effectiveness during deployment in a corporate setting will be looked at in greater details. <br />InformationWeek Research carried out a recent study on 280 companies currently with deployed VoIP services or plan to deploy. This research came up with the fact that most companies want to adopt VoIP in order to have lower communication costs. This factor ranked the highest among several others, including ease of management, scalability, and the desire to merge voice and data networks, among others. <br />Further research into this subject matter has defined that cost factor is the most compelling reason most companies switch to using VoIP services CITATION Placeholder1 1033 (Ezilon.com, 2010) . The Internet is the driving force behind the cost reduction capability because it is becoming the backbone of day to day communication in our world today. Also due to competition in the market, a lot of VoIP vendors and telecommunication giants continuously have to reduce costs for customer services, thus making VoIP services even more readily available for corporate bodies as an alternative to traditional telephony. It is envisaged that VoIP will become the dominant phone service, since it incorporates Internet and TV services on the same network. <br />VoIP is still a relatively new technology, but has very huge potential for growth in the near future.<br />