This pdf tutorial discusses the advantages and disadvantages of using VoIP services, focusing primarily on security issues that may affect those who are new to VoIP.
Voice over IP (Voice over IP) is an emerging voice communication technology. It is part of a turning point in the world of communication. Indeed, the convergence of triple play (voice, data and video) is one of the main challenges for telecommunication players today.
More recently the Internet has expanded partially in the Intranet of each organization, seeing the total traffic based on an IP packet network transport surpassing the traditional voice network (circuit switched network) traffic.
It became clear that in the wake of this technological advance, operators, companies or organizations and suppliers had to introduce new voice and video services in order to benefit from the advantage of single IP transport. It was in 1996 the birth of the first VoIP version called H323.
Originating from the European standardization organization ITU-T based on ISDN voice signaling (Q931), this standard has now followed many developments, some new standards taking other technological orientations.
Table of contents
Extrait de cours
Voice over Internet Protocol (VoIP) is a form of communication that allows you to make phone calls over a broadband internet connection instead of typical analog telephone lines. Basic VoIP access usually allows you to call others who are also receiving calls over the internet.
Interconnected VoIP services also allow you to make and receive calls to and from traditional landline numbers, usually for a service fee. Some VoIP services require a computer or a dedicated VoIP phone, while others allow you to use your landline phone to place VoIP calls through a special adapter
Size : | 82.35 Kb |
File type : | |
Downloads: | 499 |
Created: | 2016-12-25 |
Download free course Security Infrastructure Technology for Integrated Utilization of Big Data, pdf file on 171 pages by Atsuko Miyaji, Tomoaki Mimoto....
Introduction to Network securityDownload a free Network security training course material ,a PDF file unde 16 pages by Matt Curtin....
Secrets of Network Cartography: A Comprehensive Guide to NmapEver wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...
Rational Cybersecurity for BusinessDownload free course Rational Cybersecurity for Business, pdf file on 349 pages by Dan Blum....
Creating a Production Launch PlanDownload free course Creating a Production Launch Plan, pdf file on 45 pages by Alec Warner, Vitaliy Shipitsyn, Carmela Quinito....
An Introduction to Computer NetworksAn Introduction to Computer Networks, a free and open general-purpose computer-networking ..., download free Computer Networks tutorial in PDF (896 pages) created by Peter L Dordal ....
Hacking PortugalDownload free course Hacking Portugal, pdf file on 67 pages by Dinis Cruz....
Network TopologiesDownload free network topologies tutorial course material and training in PDF file under 4 pages by Maninder Kaur....
Introduction to Ethical HackingDownload Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....
Networking TechnologiesDownload free Netwoking technologies tutorial , course tutorial training on pdf under 222 pages by Raleigh Center....