SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
VoIP
Mostafa Hussien
W will talk about:
 e
• Telephone.
• Internet Protocol.
• Voice over Internet Protocol.
 1. Its uses.
 2. Its benefits.
 3. Challenges.
Agenda
Telephone
• Telephone is a telecommunications device
  that transmits and receives sound.

• It converts the sound waves to electrical signals, which
  are sent through the transferring medium to the other
  phone, where they are converted back to sound waves.

• Telephones are a duplex communications medium,
  meaning they allow the people on both ends to talk
  simultaneously.
Internet Protocol
• Protocol is how some thing is done in given steps.
• Internet Protocol is how data is transmitted through the
  internet.
• Each computer has it’s own IP address so data is sent
  directly to it’s address.
• Packets is how data is transferred through the internet.
• Each part is sent through the internet as one packet.
• Packet is a data with some other headers like source IP
  address , destination IP address & packet size.
VoIP
• Is one of a family of internet technologies and
  transmission technologies for delivery of voice
  communications and multimedia sessions over Internet
  Protocol (IP) networks.

• Is a technology that allows you to make voice calls
  using an Internet connection instead of a regular
  phone line.

• VoIP is the technology in which the analogue voice
  signal is digitized and becomes binary numbers in order
  to be transferred by the IP protocol.
VoIP can be
implemented in several
       ways:
1. Dedicated VoIP phones connect directly to
the IP network using technologies such as
wired Ethernet or wireless Wi-Fi..
2. An analog telephone adapter is a device
used to connect one or more standard analog
telephones to a digital telephone system.
• A softphone (Skype) is application software
  installed on a networked computer that is
  equipped with a microphone and speaker.
Why we use
  VoIP?!
• Because of the bandwidth efficiency and low costs
  that VoIP technology can provide.

• VoIP allows both voice and data communications to
  be run over a single network, which can significantly
  reduce infrastructure costs.

• VoIP devices have simple user interfaces, so users
  can often make simple system configuration changes.
Benefits of VoIP
1. Operational Cost
• VoIP can be a benefit for reducing
  communication and infrastructure costs.
  Examples include:
• Routing phone calls over existing data networks to avoid the
  need for separate voice and data networks.

• Conference calling, IVR, call forwarding, automatic redial,
  and caller ID features that traditional telecommunication
  companies normally charge extra for, are available free of
  charge in VoIP.
2. Flexibility
• The ability to transmit more than one telephone call over
  a single broadband connection.

• Location independence. Only a sufficiently fast and stable
  Internet connection is needed to get a connection from
  anywhere to a VoIP provider.

• Integration with other services available over the Internet,
  including video conversation, message or data file
  exchange during the conversation.
Challenges of
   V  oIP
1.Quality of service
• It does not provide a network-based
  mechanism to ensure that data packets are not
  lost, or delivered in sequential order.

• A VoIP packet usually has to wait for the
  current packet to finish transmission, although
  it is possible to abort a less important packet in
  mid-transmission.
2. Power Failure
• Telephones for traditional analog service are usually
  connected directly to telephone company which
  provide direct current to power independently of
  locally available power.

• IP Phones and VoIP telephone adapters connect
  to routers or cable modems which typically depend
  on the availability of mains electricity or locally
  generated power.
3. Emergency calls
• The nature of IP makes it difficult to locate network
  users geographically.

• Emergency calls, therefore, cannot easily be routed to
  a nearby call center.

• Sometimes, VoIP systems may route emergency calls
  to a non-emergency phone line at the intended
  department.
4. Security
• VoIP telephone systems are susceptible to attacks as are any
  internet-connected devices. This means that hackers who
  know about these vulnerabilities can institute attacks, harvest
  customer data, record conversations.

• To prevent the above security concerns government and
  military organizations are using Voice over Secure IP
  (VoSIP), Secure Voice over IP (SVoIP), and Secure Voice
  over Secure IP (SVoSIP) to protect confidential and
  classified VoIP communications.
Voice over Internet Protocol

Mais conteúdo relacionado

Mais procurados (20)

IP and VoIP Fundamentals
IP and VoIP FundamentalsIP and VoIP Fundamentals
IP and VoIP Fundamentals
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 
Voip powerpoint
Voip powerpointVoip powerpoint
Voip powerpoint
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
 
VOIP security
VOIP securityVOIP security
VOIP security
 
IP Telephony
IP TelephonyIP Telephony
IP Telephony
 
Voip
VoipVoip
Voip
 
VOIP
VOIPVOIP
VOIP
 
Concept Of VOIP in deatils
Concept Of VOIP in deatilsConcept Of VOIP in deatils
Concept Of VOIP in deatils
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
IP PBX
IP PBXIP PBX
IP PBX
 
Voip
VoipVoip
Voip
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
SIP vs PRI
SIP vs PRISIP vs PRI
SIP vs PRI
 
IP PBX
IP PBXIP PBX
IP PBX
 
Pstn internet connectivity.56
Pstn internet connectivity.56Pstn internet connectivity.56
Pstn internet connectivity.56
 

Destaque

Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolYrasumalli Reddy
 
VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)tech4101
 
Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol) Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol) Ankit Gupta
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3Vishnu M Dinesan
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskSameer Verma
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP PresentationRMMcPherson
 

Destaque (6)

Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)VOIP(Voice Over Internet Protocol)
VOIP(Voice Over Internet Protocol)
 
Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol) Voip(Voice over internet Protocol)
Voip(Voice over internet Protocol)
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using Asterisk
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP Presentation
 

Semelhante a Voice over Internet Protocol

Vo ip presentation
Vo ip presentationVo ip presentation
Vo ip presentationLuis Flores
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056mashiur
 
Future of voip- karan singh cypher
Future of voip- karan singh cypherFuture of voip- karan singh cypher
Future of voip- karan singh cypherKaran Maker
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptAbyThomas54
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptAbyThomas54
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applicationsirjes
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocolJames Watt
 

Semelhante a Voice over Internet Protocol (20)

Vo ip presentation
Vo ip presentationVo ip presentation
Vo ip presentation
 
Vo ip
Vo ipVo ip
Vo ip
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
VoIP
VoIPVoIP
VoIP
 
VOIP
VOIPVOIP
VOIP
 
Phone System Roadmap
Phone System RoadmapPhone System Roadmap
Phone System Roadmap
 
Future of voip- karan singh cypher
Future of voip- karan singh cypherFuture of voip- karan singh cypher
Future of voip- karan singh cypher
 
Voice over ip
Voice over ipVoice over ip
Voice over ip
 
Voice over ip
Voice over ipVoice over ip
Voice over ip
 
VoIP
VoIPVoIP
VoIP
 
DEEPANSHU_PPT.pptx
DEEPANSHU_PPT.pptxDEEPANSHU_PPT.pptx
DEEPANSHU_PPT.pptx
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
 
VOIP Technology
VOIP TechnologyVOIP Technology
VOIP Technology
 
Voip
Voip Voip
Voip
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 

Mais de Course Hero

Online Marketing (Social Media)
Online Marketing (Social Media)Online Marketing (Social Media)
Online Marketing (Social Media)Course Hero
 
Interviewing Skills
Interviewing  Skills Interviewing  Skills
Interviewing Skills Course Hero
 
Social Media & Online Marketing
Social Media & Online Marketing Social Media & Online Marketing
Social Media & Online Marketing Course Hero
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]Course Hero
 
Childhood dreams
Childhood dreamsChildhood dreams
Childhood dreamsCourse Hero
 
How to deal with negative criticism
How to deal with negative criticismHow to deal with negative criticism
How to deal with negative criticismCourse Hero
 

Mais de Course Hero (10)

Online Marketing (Social Media)
Online Marketing (Social Media)Online Marketing (Social Media)
Online Marketing (Social Media)
 
Interviewing Skills
Interviewing  Skills Interviewing  Skills
Interviewing Skills
 
Social Media & Online Marketing
Social Media & Online Marketing Social Media & Online Marketing
Social Media & Online Marketing
 
Networks 2
Networks 2Networks 2
Networks 2
 
Inspiring story
Inspiring storyInspiring story
Inspiring story
 
Networks
Networks Networks
Networks
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]
 
Childhood dreams
Childhood dreamsChildhood dreams
Childhood dreams
 
How to deal with negative criticism
How to deal with negative criticismHow to deal with negative criticism
How to deal with negative criticism
 
Driverless cars
Driverless carsDriverless cars
Driverless cars
 

Último

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Voice over Internet Protocol

  • 2. W will talk about: e • Telephone. • Internet Protocol. • Voice over Internet Protocol. 1. Its uses. 2. Its benefits. 3. Challenges.
  • 5. • Telephone is a telecommunications device that transmits and receives sound. • It converts the sound waves to electrical signals, which are sent through the transferring medium to the other phone, where they are converted back to sound waves. • Telephones are a duplex communications medium, meaning they allow the people on both ends to talk simultaneously.
  • 7. • Protocol is how some thing is done in given steps. • Internet Protocol is how data is transmitted through the internet. • Each computer has it’s own IP address so data is sent directly to it’s address. • Packets is how data is transferred through the internet. • Each part is sent through the internet as one packet. • Packet is a data with some other headers like source IP address , destination IP address & packet size.
  • 9. • Is one of a family of internet technologies and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. • Is a technology that allows you to make voice calls using an Internet connection instead of a regular phone line. • VoIP is the technology in which the analogue voice signal is digitized and becomes binary numbers in order to be transferred by the IP protocol.
  • 10. VoIP can be implemented in several ways:
  • 11. 1. Dedicated VoIP phones connect directly to the IP network using technologies such as wired Ethernet or wireless Wi-Fi..
  • 12. 2. An analog telephone adapter is a device used to connect one or more standard analog telephones to a digital telephone system.
  • 13. • A softphone (Skype) is application software installed on a networked computer that is equipped with a microphone and speaker.
  • 14. Why we use VoIP?!
  • 15. • Because of the bandwidth efficiency and low costs that VoIP technology can provide. • VoIP allows both voice and data communications to be run over a single network, which can significantly reduce infrastructure costs. • VoIP devices have simple user interfaces, so users can often make simple system configuration changes.
  • 17. 1. Operational Cost • VoIP can be a benefit for reducing communication and infrastructure costs. Examples include: • Routing phone calls over existing data networks to avoid the need for separate voice and data networks. • Conference calling, IVR, call forwarding, automatic redial, and caller ID features that traditional telecommunication companies normally charge extra for, are available free of charge in VoIP.
  • 18. 2. Flexibility • The ability to transmit more than one telephone call over a single broadband connection. • Location independence. Only a sufficiently fast and stable Internet connection is needed to get a connection from anywhere to a VoIP provider. • Integration with other services available over the Internet, including video conversation, message or data file exchange during the conversation.
  • 19. Challenges of V oIP
  • 20. 1.Quality of service • It does not provide a network-based mechanism to ensure that data packets are not lost, or delivered in sequential order. • A VoIP packet usually has to wait for the current packet to finish transmission, although it is possible to abort a less important packet in mid-transmission.
  • 21. 2. Power Failure • Telephones for traditional analog service are usually connected directly to telephone company which provide direct current to power independently of locally available power. • IP Phones and VoIP telephone adapters connect to routers or cable modems which typically depend on the availability of mains electricity or locally generated power.
  • 22. 3. Emergency calls • The nature of IP makes it difficult to locate network users geographically. • Emergency calls, therefore, cannot easily be routed to a nearby call center. • Sometimes, VoIP systems may route emergency calls to a non-emergency phone line at the intended department.
  • 23. 4. Security • VoIP telephone systems are susceptible to attacks as are any internet-connected devices. This means that hackers who know about these vulnerabilities can institute attacks, harvest customer data, record conversations. • To prevent the above security concerns government and military organizations are using Voice over Secure IP (VoSIP), Secure Voice over IP (SVoIP), and Secure Voice over Secure IP (SVoSIP) to protect confidential and classified VoIP communications.