This website uses cookies to ensure you have the best experience. Learn more

Voice Over Internet Protocol Attacks Essay

1082 words - 4 pages

Definition:
VoIP or Voice over Internet Protocol, is a type of transmissions medium that is responsible for the delivery of real-time voice and data communication. Unlike its analog predecessor in which the transport functionality was routed via the public switched telephone network (PSTN), calls are now converted from an analog signal to a digital format, which is what the Internet Protocol (IP) uses for transmission and delivery, making VoIP possible. Several other key processes, such as signaling, authentication, security, call control, and voice compression, are established by VoIP prior to and during the call setup phase. (Harper, 2011)
Essentially, VoIP converts your voice into a digital signal that is sent via the internet. The signal is converted to a standard phone signal before it goes to a land line. There are a few ways that VoIP calls are made; computer to computer, computer to a network, and network to network.
How VoIP works
The way VoIP works is by using what is called an analog telephone adaptor (ATA). The ATA allows you to connect your phone line to your computer and that allows you to make phone calls across the Internet. The ATA converts the signal from analog to digital. The analog signal is taken from your regular phone and makes it a digital signal so that it can be transmitted through the Internet. One of the most popular providers for VoIP services is Vonage. AT&T is also a provider that uses VoIP and they include an ATA as part of its VoIP service. The setup is actually pretty straightforward, and is a pretty simple installation. Basically, what is required is plugging your phone line into the ATA, and running a phone line out of the ATA into your computer.

Tools of the trade
IP Phones
These look just like normal phones. The difference is that an IP phone has an RJ-45 connector that plugs into your computer, or router instead of an RJ-11 which is the standard connector used on normal phones. They have a handset, cradle and buttons just like a normal phone has. There are even Wi-Fi phones that allow you to make VoIP calls utilizing any Wi-Fi hot spot.

Computer-to-computer
Computer to computer is the easiest way to use VoIP. With the exception of paying for the Internet service through a provider, this is a free method of computer to computer calls. Long distance is normally free of charge, no matter how far between calls. Items required for this method of VoIP is the software, Internet connection, a sound card, microphone and speakers. An optional item would be a camera for video conferencing if that is a desire of the user.

Advantages
Low cost. This type of phone/computer service in the United States allows you to call anywhere for free.
It’s portable. You can take the phone converter and even the phone number and use it anywhere in the world, as long as you have access to a high-speed Internet connection. VoIP is also feature rich, offering items such as call...

Find Another Essay On Voice Over Internet Protocol Attacks

Explain what IPv6 is, and why it is being developed?

919 words - 4 pages such as follow: -(1) Real-time streams of data get broken(2) IP "spoofing"(3) No authentication(4) No encryption(5) The number of computers on the Internet is already greater than the number of unique addresses available for them on the Internet.IPv6 is being developed because it had helps to enhance streaming. Besides that, it also provides for crystal-clear voice-over-IP. Ipv6 will ensure that when the network clogs, routers won't chop up

The Internet's Impact on Information Technology Security

1408 words - 6 pages , ensure that the policies are strictly followed, and that the appropriate punishment is meted out for violations.Voice over Internet Protocol (VoIP) TelephonyVoIP telephony, the technology that allows the transmission of voice communications over the Internet, is growing rapidly, replacing the traditional PBX POTS-based telephone systems that companies have used for decades. The shunting voice communications through the Internet opens up yet

how the internet has changed society

2297 words - 10 pages 1973, Transmission Control Protocol/ Internet Protocol (TCP/IP) became the standard for computers to communicate over the Internet. In 1982 the word Internet is used for the first time. The domain name system (DNS) is introduced in 1984, which identified network addresses with .com, .org, and .edu. From that point on everything began to rapidly change. Things like America Online was developed, viruses started surfacing, and dial-up Internet

VoIP: A New Frontier for Security and Vulnerabilities

2668 words - 11 pages VoIP: A New Frontier for Security and Vulnerabilities Introduction to Voice over IP Technology      The promise of extremely cheap telephone service, utilizing the Internet to transmit voice, has made voice over IP an attractive and profitable idea. Vonage (http://www.vonage.com/) and other service providers entice consumers by charging a flat, monthly rate for unlimited long distance in the U.S. and Canada; the rate

Voice over IP

2304 words - 9 pages hear a dial tone and dial just as you always have. VoIP may also allow you to make a call directly from a computer using a conventional telephone or a microphone. I will discuss this in detail later.Voice over IP, also called voice over Internet Telephony, "is technology that makes it possible to have a telephone conversation over the Internet or a dedicated Internet Protocol network instead of dedicated voice transmission lines. This allows the

History of the Internet

1014 words - 4 pages . These connections are routers (or switches), which collectively share the job of directing the packets from connection to connection on the way to their destinations. The packet switching technology was a dramatic improvement over the circuit-switched telephone network where the entire path connecting a voice call between two parties was restricted to their conversation, even when they were silent.In 1963, JCR Licklider, head of the computer

Growth of, Control of, and Access to the Internet

4299 words - 17 pages The Internet started as a simple network that allowed researchers to communicate with each other over long distances. This eventually grew into the Internet as we know it today. With the advent of the Internet, many new opportunities have been presented. Businesses have a new way to advertise their products and reach their consumers. Likewise, consumers can browse products from the ease of their own homes. The Internet has revolutionized

VoIP Research Problem Analysis

2026 words - 8 pages hear a dial tone and dial just as you always have. VoIP may also allow you to make a call directly from a computer using a conventional telephone or a microphone. I will discuss this in detail later.Voice over IP, also called voice over Internet Telephony, "is technology that makes it possible to have a telephone conversation over the Internet or a dedicated Internet Protocol network instead of dedicated voice transmission lines. This allows the

VOIP Phone System Deployment

1613 words - 7 pages VOIP DEPLOYMENT Joann Terrell ITCC-2359 April 6, 2014 E. Frenzel VOIP DEPLOYMENT Welcome to the deployment of voice over IP or VOIP. This paper will explain the advantages and the disadvantages of using VOIP. The quality of service or QoS will be discussed. Security problems and solutions for IP telephone systems and networks. The basics and many protocols will be discussed. The voice clarity considerations will be discussed

Networking: Network Security

2472 words - 10 pages Are Needed? In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in terms of transmission. If data transmission is interrupted or data and information within the data is stolen when it is being transmitted this can have

The Creation of Border Gateway Protocol

1238 words - 5 pages routers and determines the routing decision based on that. It does not use Interior Gateway Protocol (IGP) metrics for routing decisions, but only decides the route based on path, network policies and rule sets. Actually, BGP was intended to route within an Autonomous System (AS), but rather to route between AS’s. In opposition to popular opinion, when multiple connections to the Internet are required, BGP is not a necessity. IGP can easily

Similar Essays

Voice Over Internet Protocol Essay

1082 words - 4 pages Sara R. FletcherID# 190513DMA210/1Topic: "Voice over Internet Protocol"10-11-03What is Voice over Internet Protocol and how dose it work? It's a technology for transmitting ordinary telephone calls over the Internet using packet-linked routes. Also called IP telephony. In English it means it's a system from transmitting telephone calls over data networks, such as the ones that make up the Internet. For example instead of using the telephone you

Voice Over Internet Protocol Analysis

706 words - 3 pages Introduction: VoIP is used very extensively today because it is cheap and can used along with network services. The Organizations use same network to send VoIP and data traffic. Many VoIP applications provide good Quality of Service (QoS) but the security they provide are not sufficient for the practical purposes. They can be easily hacked by the crackers since VoIP are used over unsecure public network. Adding Encryption algorithm to the VoIP

State Of The Art Networking Essay

1598 words - 6 pages better usability by supporting a variety of network environments and application scenarios [19]. It addresses TCP’s limitations by reducing the overhead required to send and receive streams of data. However, the pressure to reduce the cost and complexity of running streaming applications over the Internet and through wireless and mobile devices continues to mount. Moreover, users demand better security and privacy for their communication

Questions Regarding The Tcp/Ip Network Model

2300 words - 10 pages sequence may not be maintained when it reaches receiving host. When communicating over a network TCP will provide you with 100% reliability. Each data segment remains intact and arrives in the same order. When sent out, but UDP there no reliability in packets sent would reach. Explain how the IP protocol delivers segments for the transport layer protocols. Briefly describe some routing protocols used within the network layer The IP (Internet