How does VoIP work-Brief Overview

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

How does VoIP work-Brief Overview


How does VoIP work-Brief Overview

Posted: 19 Oct 2010 10:08 PM PDT


Just as in classical telephony, the voice signal is sent to the phone microphone handset in the form of an analog signal. An analog to digital converter transforms this signal into a digital one which is then encoded according to an audio format. There are different encoders for compression of a conversation with varying degrees of quality. Depending on the type of compression, some loss of voice signal information occurs, which, however, is mostly subjective and irrelevant.

Voice Data, after the compression, is transferred via the network. For this continuous data stream of compressed voice signal, the conversation is divided into small data packets, before they are sent to the network. Then, these packets arrive at the specific destination network "nodes", so-called routers, which direct the IP-packets to their final point, maybe via different paths.

The voice packets, before they are sent to the network line, they are first temporarily stored in a memory location called the buffer. At the destination end, voice packets pass through a digital to analog converter so that to be transformed back to human speech. For example, the voice packets delivery can be compared with normal mailing post, which addresses, mails and delivers individual packets of data.

To transfer data using VoIP we currently use the so-called Internet protocol version 4 (IPv4). The next version – IPv6 – was specified in the mid 90-ies, but the need to expand its use has not been taken seriously until the last few years. Unfortunately, the IP protocol works on the principle of "Best Effort" and thus it does not guarantee 100% packet delivery. This is the main reason that we do not always have good quality in VoIP. The newest IP Protocol version 6 offers the so-called "quality of service" under which the voice data transmission will have better quality.

In order to establish a connection between a VoIP telephone system and the traditional PSTN telephone network, we need to use the so-called Gateways. These Gateways are connected to the IP Data network as well as with the PSTN telephone network and transmit requests in both directions. In this case, IP-packets from one side are converted into digital voice stream on the PSTN side.

Since everything now runs over IP (our computer data, voice, video etc) we can have the integration of different types of data on to a single IP network. This concept is usually called "network convergence". The meaning of convergence is that we have one common network (the IP Network) which transmits all kinds of information – voice, data, video, text and images.

DHS simulates terror attack in subway systems

Posted: 19 Oct 2010 09:00 AM PDT


In 1995, the subway system in Tokyo was the target of a domestic terrorism attack involving a potent gas called sarin, a chemical weapon that can cause neurological damage and even death. In five coordinated incidents, members of a radical-religious group known as Aum Shinrikyo released the sarin gas on five trains in the Tokyo subway system. The attack killed 12 commuters, seriously injured 54 and affected 980 more who experienced some health effect. The lesson learned in the tragedy was that chemical agents have the potential do widespread damage -- and a subway system provides an ideal environment for dangerous gas to travel fast.

IT industry says improving cyber security will be tough

Posted: 19 Oct 2010 09:00 AM PDT


Huge improvements are needed in the government's approach to cyber security, the IT security industry has warned ahead of today's Strategic Defence and Security Review.

Privacy? Run a background check on yourself

Posted: 19 Oct 2010 09:00 AM PDT


My company hired a new employee recently and as part of my responsibilities, I ran a basic background check for our new hire. If you've never seen a professional background check, you will most likely be shocked by the level of detail that can be gleaned from public records.

Facebook needs to be more like Apple: Sophos

Posted: 19 Oct 2010 09:00 AM PDT


Sophos claims that 95.51 per cent of the 1,025 people it surveyed thought that Apple should have a "walled garden" approach to verifying apps. Apple vets every app that it allows into its App Store.

Lawmakers hit Facebook CEO with privacy questions

Posted: 19 Oct 2010 09:00 AM PDT


The co-chairman of the U.S. House Bi-Partisan Privacy Caucus are seeking information on the latest report of Facebook privacy problems from CEO Mark Zuckerberg.

72% of parents monitor their kid's facebook page

Posted: 19 Oct 2010 09:00 AM PDT


Nearly three quarters of parents monitor their child's social networking account, says TRUSTe.

Second Wave of Adware Pounds Web Surfers

Posted: 19 Oct 2010 09:00 AM PDT


New adware companies are increasingly targeting Facebook, Twitter, and other popular social networking sites as a means of distribution. The share-friendly environment of such sites is ideal for spreading adware and trackware through third-party applications, which often hide their true intent.

Cameron: £650m for cybersecurity over four years

Posted: 19 Oct 2010 09:00 AM PDT


David Cameron today confirmed that £650 million will be allocated over a four-year period to the fight against cyberattacks.

Facebook battles another privacy firestorm

Posted: 19 Oct 2010 09:00 AM PDT


Facebook contended that reports that the private data of users has been revealed to third part firms have been 'exaggerated.'

New Rules for Employees' Mobile Device Privacy

Posted: 19 Oct 2010 09:00 AM PDT


How CIOs should adjust their privacy policies to conform to the Supreme Court's decision on monitoring employees' text messages.

0 comments:

Post a Comment