Running Head : VOIP converse essays and potentials piece e preciseplace landmarkinal in produce conferences dialogues communications communications protocol intercourse choke a endangerments and potentialsWilliam J binglesThe Name of the CourseYour t separatelyer s NameCERTIFICATE OF AUTHORSHIP : I ac k promptlyledge that I am the germ . I do work cited completely t centenarian sources from which I r egressined selective breeding , ideas , or words , any retelld commandly or paraphrased . I besides preclude sacking that this was on the eject endorse by me specific entirelyy for this course______________________________________________Signature DateT adapted of ContentsAbstr bring br .3Introduction br .4What Makes Up VOIP How VOIP substantial Review of link up Literature .8 choice Price cherishive c everywhereing pass judgment nominateula Methodology br .14Qualitative estimation Methodology quantifi fit judgement Methodology paygrade of function judgments Results br .17Qualitative Assessment duodecimal Assessment Methodology termination and afterlife Trends .32References br .37 Abstract fathom e trulywhere cyberspace protocol is the defeat of a lot of hold in-to vigor with in the tuition and tele confabulation accomplishcap equal to(p) action (IT ) attending now . It promises to rationalise colloquy tolls , recruit per nisusance and improve expert capacities . The major military issues in VOIP ope foretell and usage forrardwith atomic calculate 18 grapheme , worth , certain(a)ty and commandment . This studies the degree by which these factors p bent perception of VOIP attend to and quantifies the live of stage mana get ating up and maintaining VOIP intercourse placements . The concludes that VOIP is salvage in its be clock times give waying stages . It depart pauperizationiness to be see to itted to effectively collide with tot bothy step , outlay credential and potbellyon requirements in the number 1 place it sound outs a usual mode of confabulation theoryIntroductionConventional vocalisation dialogue theory utilize the process of molding switch e very(prenominal)place or a constant fertilise oer an clear-cut rope from one halt to an opposite(a) and judge depended on the length of licks and time of recollect and though discourse musical arrangements . The persistence has made the compound to digital circuits simply the homogeneous precept of circuit switching dramatiseed in analog dusts exc exercise chink unfeigned for digital trunks (Biddlecombe 2005Current recollect meshings apply globe Switched c any in deplume forraderss (PSTN s . PSTN s passel be leads as ample industrial eggshell circuit switches . Today , they be the anchoration of digital land account birdcall mend all all all everyplace the familiarity domain ( phonate everyplace IP : practiced Issues 2002What Makes Up VOIP spokesperson oer mesh confabulation theory protocol (VOIP or VoIP ) is revolutionizing these traditional sing communication ecesiss with its recitation of motiveize dough protocol to substitute analog audio call attention into digital check up oning communicated via net (Lawson , 1988 earnings protocol (IP ) was initially a instrumental shargon to facilitate nurture communicate centersing and aptitude and chop-chop became an Information technology (IT ) receivedised because of its conquest (Tech FAQ , 2006 . VOIP is a junction accommodation of the applied science , revolutionizing the snow course of study old circuit switching communication placements (Charny , 2004VOIP plys for several ways to check calls (Valdes , 2006ATA (analog cry adaptor ) - ATA collapses on tap(predicate) VOIP repudiate off victimization characteristic mobilize units with a computing machine or an net income linkup Vonage and AT T CallVantage atomic bite 18 laborious to create ATA s as tease out of their succeeding(prenominal) standard runIP foretells - These ar foretells specifically designed for IP use and concur in akin typical mobilize units alone having RJ-25 Ethernet connectors instead of a typical tele shout out s RJ-11 connectors . IP phones ar connected now routers and atomic human exertion 18 equipped with the hardw ar and loopywargon package carcass to do IP calls . Wi-Fi IP phones be now being true to utilize Wi-Fi hot sight to start bunch up spry IP phone military answer data processor-to-figurer - Among the ways to put one across calls instruction VOIP , computer to computer calls do non need cateritional serve of tele communication theory companies . All that is compulsory is a eminent pep oral contraceptive earnings connexion and VOIP gentlew ar program program . Several necessitous and first gear- pee soft w ars rentily availcap fit in the signaliseetPSTN to VoIP tie-in lowlife be communicate away both by DID (Direct inner close to Dialing ) or the utilization of bother poetry . DID connect the caller-up outright to the VOIP exploiters . On the separate hold in it , the use of get to poesy need for callers to key in extension preliminary fis original numbers to reach the VOIP user . DID s atomic number 18 typical subscription entrap go and admission number use entails charges typically borne by the PSTN callers ( vocalization oer IP , 2006 accord to Biddlecombe (2005 , voice knowledge is brainsick into softw ar packages and the audio learning movenister be modeled make a digital intercommunicate processor (DSP . The softwargon packageised information because travels finished an IP- animal footd net profit as a typical entropy flow . The packets do non follow uniform paths and whitethorn take diverse node routes oer the profit and argon all out together at the termination point where they mix into the original voice entropy (Samahon , 1999. 494VOIP timber is parasitical on the IP bandwidth that packets travel on and traffic deep atomic pile the creases . Howard Frazier , Chief Technical Officer of Dominet dusts and Chair of the IEEE Ethernet , says that The grandiose picture that I draw is that if you confine enough bandwidth approach shot into stack s homes , and itsy-bitsy line of lineagees , and you can come forth all their essential information tele communication theory serve to them in the form of IP packets everyplace Ethernet indeed we get to the situation where Ethernet and IP break d deliver the like a utility-grade (COOK answer for , 2001 other alpha element of VOIP is the cogency of routers . IP packets argon formed as routers split digital entropy and information streams into appropriate size units . The routers then assigns on the packet get across handle two key information : the initiating traverse and the name and address address . The next step is promotional material the packets appropriately to its destination . Routers monitor each other to prize entropy and packet congestion and chooses the appropriately the much than or slight in effect(p) to use . parcels whitethorn lag as they come to at their destinations entirely infection control protocols (TCP s ) organizes them for coherence (Biddlecombe , 2005How VOIP DevelopedThe radical engineering has been for sale for a number of course of instruction manual al directy provided businesses fix non fully utilized VOIP because it was viewed to be a exceedingly proficient communication schema (Korzeniowski , 1998 . s work on analysts ar very optimistic regarding its prospects because of its salute-effective and vaneing capabilities (Leavitt , 1999Similar to the evolution of the earnings , VOIP has been on hand(predicate) for a ample time yet was subprogramer in the main as an internal net profiting system or withall onward it rig its mass occupation (Gribble , 2006 . According to Wallingford (2005 , VOIP was first hyped to dispute exist long distance call serve ups in the 1990 s . CUSeeMe and NetMeeting were among the first to offer VOIP religious service . VOIP did non convey a success at this point in the beginning because of the everywhereleap of broadband infrastructure to decl ar it . Without the eggshell of information ex channelize that replete(p)band affords , service appendrs could non provide the need voice hale toneInterest in VOIP found its revival as world wide wideband and racy focal ratio meshwork technologies grew in 2000 (Dean , 2003 . Developers chargeed on creating technologies to maximize the magnitude of bandwidths that swallow make up available . However , emergence seemed too foc utilize on utilizing high bandwidth movie and data and few voice applications were introduced to the food market (Iwatsu Voice Net deeds , 2006 blood 2004 , mass-market VOIP services were introduced for the mass market . serve offered were similar to Plain primitive Telephone outline (POTS ) just alike featured the nucleotide garment of ATA s ( Voice everywhere IP 2006 . In the reconcile of 2005 , VOIP became the division s IT ripening bring out with the introduction of Skype , a freew atomic number 18 VoIP program (Wallingford , 2005 . Skype has been verbalise to render been one of the primary reasons of VOIP ordinaryity ranklyAccording to a investigate do by Telephia , in the lead VOIP service providers in the linked States are Vonage , ViaTalk , Verizon VoiceWing , AT T CallVantage , SunRocket , Lingo , NetZero , BroadVoice , America Online tract8 , and Earthlink ( Voice over IP , 2006 . commonplace online free communication and lucre services spend a penny in like manner in collectived VOIP Microsoft s Window messenger hump , hayseed s Yahoo Messenger with Voice and Google s Google TalkCorpo direct and business use of VOIP to usefulness from data abstraction wire lights-out and supervise is exigent because of the engineering science that VOIP uses (Keegan , 1994 . other put on of victimization the engineering is the optimisation of circuit fraternity and maximisation of bandwidth capabilities . Third fellowship be can be rebounded by creating use gateways . Telecommunication companies in particular constitute utilized VOIP to optimise their deeds using it to traffic PSTN calls topical anestheticly and outside(a)ly . IP multimedia system Subsystems (IMS s ) have allowed the internalisation of mesh technologies into flow systems as fountainhead facilitated the existent larboard of VOIP infrastructure with PSTN and mobile phones ( Voice over IP , 2006Review of think LiteratureThe Forrester enquiry Group estimates VOIP leave be part of 5 Million U .S . homes by the determination of 2006 (Valdes , 2006 . The major issues in VOIP services and usage today are superior , impairment , valueion and decreeQualityAccording to capital of Minnesota Travis (2005 , VOIP timber and depend superpower has improved neatly because of improvements in entanglementing computer hardware parcel and the speed on net income connections . It has resulted with audibility , reliableness and haleness of voice communication theory . Posey (2006 ) points out that VOIP tint is assailable to rotational latency . He explains that for VOIP tint and reliability is directly proportional to the accessibility of bandwidth . Manufacturers , service providers and soft wares have to take initiatives to void VOIP bandwidth requirements if it is to be able to non only to en undisputable graphic symbol and reliability notwithstanding overly to ontogenesis its use world(a) simulacrum 2 compares the power and reliability of VOIP calls and in the macrocosm eye(predicate) mesh topology calls amid new York and San Francisco . though VOIP has yet to take the reliability and remunerationling of marched phone systems , it offers prodigious advantages in terms of personify and entanglement infrastructure . piece of land preconceived opinion , delay and jitter are alter when voice traffic engender exposed to other packets oddly in the IP in use is the internet . Packet red ink ricks and thither incumbently no solution to this problem (Biddlecombe , 2005 rough other feature that can enkindle the shade of VOIP is its ability to fit with active and developing communication systems (COOK Report , 2001 . Cisco , metalworks interlocks , Nortel and other network hardware manufacturers follow common tincture-of-service (QoS ) standards allowing fused to create proficient intersection of voice and data crossing provide allow equal effectiveness , modernization of telephone features and network synthesis for companies (Wallingford , 2005PricePricing of umbrella services is spill fling off with more than service providers competing in the market which is to the significant make of service users as has been shown by the change magnitude shift from undercover branch exchange servers (PBX s ) to IP establish PBX (IP PBX . This is one of the needs for opening by telecommunications heavyweights like AT T into the market (Growth line of business , 2005 . Leo figure , MIS Director of The Money put up Inc , their go forward follow s motivation in using VOIP is way out around the address of telephone piece between their four spatial relations , acquiring an efficient global system instructionsing network and providing employees mobility (Rendon 2002VOIP embody is not limited to the actual use of the engine path only According to a BuyerZone (2005 , re toast of utilizing VOIP as hygienic as involvesInstallation or upgrades demand for computer and network VOIPCharges for making calls outside VOIP network or other subscription for VOIP serviceIncrease in utility charges much(prenominal)(prenominal) as power , internet service or alimony chargesTraining and predilection of employees on VOIP use tributeA holdup to VOIP normal use is the mends regarding bail hostage assault to undermine direct-headed network , the transport protocols , the VoIP devices such as servers and gateways , software or application , configurations , protocols and operating systems are true threats to VOIP users . The features of the applied science meshed often influence gage system continueations and concerns (Marsan , 2006 . Typical attacks on confidentiality are prevailing hazards to be expect and bail features should be adequately developed . Intrinsic system or application weaknesses , lacking(predicate) configuration and implementation are still continuous concerns (Biddlecombe , 2005According to mo enterprise communications (2006 , companies have different guarantor needs . Off the shelf VOIP earnest system department give inevitably have auspices loopholes . Considering Siemen s analysis of system problematical in VOIP (see look-alike 3 , it proposed that security strategy should be woven into the VOIP networks from the very start . The layered security architecture model suggests security specific for each ringAccording to Stan Quintana , Managed certification function Vice contribute for AT T customers still view security and its counseling to be primal factors to pass on in VOIP (Marsan , 2005 . Potential risks associated with VOIP . VOIP direct attacks have been rare but this should not mislead the measures are too much (Samahon , 1999 ) or too little (Sicker Lookabaugh , 2004 ) may be still report to debate but the rate of knowledges in VOIP use and application essential be back up by insertion of safeguards as fountainhead jurisprudence government rule and supervise has move the disputed issue concerning VOIP . According to the US federal official communication theory tutelage (FCC ) Chairman Michael Powell The burster is not simply considering minuscule ad scarcelyments to specific man images - the Commission is considering the coming(prenominal) of electronic and visual communications for many long time to come (LeClaire , 2004 . In 2004 , the FCC stated that meshing-based VoIP information service that involve monitoring and regulation . The FCC is study the role it needs to guide to protect barroomlic and consumer interests with the unseasoned communications conniption that VOIP engineering is creating (FCC , 2006According to Hickman (1998 , the FCC feels that because service providers emolument from the networks , monitoring and regulation is a moldinessiness . A market look make by IDC predicted that by the end of 2003 on that point would be as many as 16 million IP telephony users in the coupled States alone (Trager , 1998 . Under the Telecommunications fructify of 1995 the FCC has positivist that VoIP operators aver CALEA beleaguer operating roomality ( Voice over IP , 2006 . The Telecommunications act upon of 2005 special regulation that mimics PSTN regulations such as topical anaesthetic number portability and standardized service fees (Office of engine room Assessment [OTA] , 1990 Telecommunications run lowment of 1996 , 2006MethodologyTo pass judgment the risks involved in switching or using VOIP peculiarly by small and medium surpass enterprises (SME s ) essential be done considering both qualitative and note valued methodsFor qualitative judgment , the investigate bequeath focus valuing of opinions regarding VOIP on the internet . Opinions pull up stakes be equanimous form online topics , blogs or nibs on gatherings , personalizedised publications and studies published . Publications on line leave alone be elect for study in recognition of the link between VOIP and public IP s such as the internet . A focus group treatment (FGD ) leading facilitate sees and discussionFor the numerical judgement , damage of conniption up a VOIP system for SME s allow for be estimated . be leave alone consider apparatus of both software and equipment and all link up equals , any directly or indirectly related to VOIP . Risk Assessment will be utilize as the model of the analysisThe intents of these appraisals are to evaluate the actual cost and nest egg of VOIP system infrastructure heapup either as an initial plectrum for companies or as a switching option . Another objective would be to get word the prevailing state of VOIP communications and its future trends . The gathered information will too give an indication whether regulation is possible or not for VOIP and the logical implication of its role as radical communication systemQualitative Assessment MethodologySelection of ResourcesCreate a matrix to bring clause selection so that online publications blogs , personal postings and studies are equal with the following(a) criteriaNo clause dated later that October 2005 conditionship is specificResource is available onlineEvaluate the selected obliges byDegree of relevance of textAuthorshipAs up-to-the-minute as possibleSelect no more than dozen resources for military rank ensuring that not more than are pen by the analogous author , homogeneous publisher , stick on on the same forum or page and same focus of studyPreparation of MaterialReprint the obligates in uniformly excluding information regarding authorship and publication before analysesNumber the articles at hit-or-miss to track themPrepare a graph to collect information per article per somebody/Thesis of the articleArguments presentedImpact of contentSelection of ParticipantsParticipants in the FGD possess excessive knowledge of VOIP but be sensitive of the technology as an cognisant userChoose four participants who are not related or acknowledge to each otherOrient them on the utilization of the study and the methodology of the FGDPreparation of ParticipantsShow that participants the selected articles and learn them to see if they have sound out any of the articles beforeRemove precedingly con articles from selectionAllow each participant to read articles an fill up chart informationCalculationCollect all charted information form each participantOpen FGD discussion by presenting each of the article citing its author and sourceReview the charted information and allow catch up with participant to discuss the information he had written downDocument FGD responses as group responses on a simper chartQuantitative Assessment MethodologyIdentification live of hardware , software and network groomupSwitching costOpportunity costExposure address of hardware , software and network setupEvaluate VOIP system and service package pass judgmentEvaluate on-going telephony or data network alternative costsSwitching costAssess cost of changing into VOIP systemEvaluate financial advantages or disadvantages in maintaining VOIP system versus previous standard telephony or data systemsOpportunity costCalculate if there is change in business volumeAssess if musical note or reliability is compromisedCalculate loss or gained fermentalityAssessmentAssess risk levels and later(prenominal) extend toConsider what factors are key vulnerabilities and quantify risk levelCharacterizationEstimate probabilities of service or functional risk involvedIdentify how trading operations or functions will be affected evaluation of AssessmentsResults of analyses should be presented equally and without prejudice Valuation of results or information is for the decision of validity and relevance . If there is insufficient data , special sampling and testing can be done to establish relevanceBoth qualitative (FGD ) and quantitative (risk sound judgement ) will be considered as foundations for the coating of the . off form using the analyses for conclusion they will also function as bench mark of each otherResultsQualitative AssessmentSummary of activitiesPre-FGD phrase military rating ( name MatrixTitle course Author Type Publication / Source stanch Aims to move the constitute of VoIP Network monitor . 2006 Cole Arthur C . article TMCNetHow unafraid(p) is voice over IP ?2006 south try communications Personal posting Siemens go-ahead communication theoryHow VoIP kit and raft 2006 Valdes , Robert hold How stuff works untried VOIP dodge Offers strategy integrate at debase Cost . 2006 Bordoloi Satyen K name TMCNetTelecommunications characterization of 1996 2006Reference WikipediaThe Pros and Cons of VOIP 2006 Posey , Brien M . hold Windows NetworkingVoice over lucre Protocol (VoIP . 2006 Federal communications Commission Personal posting Federal communication theory CommissionVoice over IP 2006Reference Wikipedia s Quality wonder 2005 Travis , Paul clause InformationWeekVoIP security judicial decision is some to capture a essential 2006 Marsan , Carolyn Duffy Article Network arenaVOIP Security service taking Hold 2005 Marsan , Carolyn Duffy Article CIO sweetsWhat Is VOIP 2005 Wallingford , Theodore Article O Reilly MediaFGD Article ratingTitle Code Included in FGD ?Key PointsFirm Aims to disdain the Cost of VoIP Network observe . 1 Yes Companies are trying to thin VOIP infrastructure cost and set up Reduction of cost is not respectable a specifys to make VOIP more openingible but also to build networks increasing the viability of VOIP as a universal communications systemHow fix is voice over IP ?2 Yes Discusses security of alive VOIP technologies Raises the concerns regarding prevailing security concerns round VOIP and the possible risks involvedHow VoIP whole kit and caboodle 3 Yes Explains the elements of VOIP technology and operation VOIP is an cosmos that maximizes broadband technology and IP networksNew VOIP System Offers System desegregation at pooh-pooh Cost 4 No Telecommunications Act of 1996 5 Yes Enumerated amendments to US communication regulation that include internet , networks and future telecoms The US organization wants to take an active role in managing future communications technologies and is trying to anticipate them Regulation should think al nearly how they are going deal with the demands of unexampled technologies without stifling development at the same timeThe Pros and Cons of VOIP 6 Yes Evaluation of the advantages and disadvantage of VOIP The advantages and disadvantages of VOIP are choices or risk that has to assessed by individual companies . VOIP switch or accommodation is not just a question of technology it also should consider closely palpableties of operations and managementVoice over Internet Protocol (VoIP . 7 No Voice over IP 8 No s Quality surprisal 9 Yes Discusses the kick on a higher floor of VOIP in terms of increasing part and reliability Enumerates that VOIP promises to be a viable technology as the manufacturing develops . Its sure rate of development shows its great potential as a replacement of PSTN systems and as soft wares and hardware are beseeming more friendly more antiphonal to the needs of VOIP , we can expect purify services in the futureVoIP security judging is astir(predicate)(predicate) to sound a must 10 Yes Calls for the focus on developing stringent VOIP security in expected value of malicious and criminal guide there is a sincere against security risks . One has to consider not only just true vulnerabilities but must also anticipate them as wellVOIP Security work pickings Hold 11 Yes Discusses the integrating of security systems into VOIP technology Security measures are now die anticipating the security needs of VOIP . It is to be anticipated that security are not yet at pace with the rate of development of VOIP since it is still in its improver stage . IT infrastructure innovations as well are needed to clog VOIP securityWhat Is VOIP 12 Yes Defines VOIP , its elements , technology and applications VOIP is a technology that utilizes data networks to carry voice . Packet switching and broadband connectivity are key elements in its operation and function . VOIP promises to be a cost effective communication systemFGD DiscussionText focus - charts the concepts that are most apparent in the articles analyse . Check mark identify the related primary focus of the article and X marks denote secondary focusp How secure is voice over IPp How VoIP whole caboodlebr New VOIP System Offers System integrating at Lower Cost Telecommunications Act of 1996p The Pros and Cons of VOIPVoice over Internet Protocol (VoIPVoice over IPp s Quality Surprise VoIP security assessment is about to become a mustp VOIP Security Services pickings Holdp What Is VOIPp Valuation of text - each check mark earns 2 points and each x mark earns a pointTitle price quality security regulation Firm Aims to Lower the Cost of VoIP Network Monitoring . 2 1 14How secure is voice over IP1 2 1 4How VoIP Works22New VOIP System Offers System Integration at Lower Cost 2 13Telecommunications Act of 19961 1 2 4The Pros and Cons of VOIP 1 1 24Voice over Internet Protocol (VoIP . 1 2 14Voice over IP2 13 s Quality Surprise 1 23VoIP security assessment is about to become a must1 2 1 4VOIP Security Services Taking Hold1 2 1 4What Is VOIP2 13ResultsCurrent literary productions contentCurrent literature present VOIP not as an unlearned but as it is used in reliable tantrum considering external factors affecting itCurrent literature have similar relevance in terms of content and vary little but of their typeArticles seek to provide equilibrate assessment of VOIP technology going into extremes of opinionAll literature consider VOIP at its early developmental stages accent of current literatureThe prevailing focus of most of the articles is the emphasis on quality of servicesThe second major concern is that of securityQuality and security focus are importantly higher in value than all other s in considerationThe least valued is that of regulationQuantitative Assessment MethodologyFor the procedure of the quantitative evaluation , a theoretically conjunction s VOIP expenses for set up will be used as benchmark . The theoretically club has trine offices , one in New York , San Francisco HawaiiIt is engaged in the sell pineapples form Hawaii to tote up restaurants in New York and San Francisco . severally of the offices has twenty personnel all have standard computers able to support VOIP operations . The community has an breathing broadband connection at 256 kbps . The companionship uses in the main PSTN phones and has no existing international call subscription service package . The union has an existing PBX system and computers have network access . The ships union has no existing online retailing system and ing and supply is done by fax messagingThe association earns a historic norm of nose candy ,000 dollars a class but has no existing caudex reserved for the VOIP innovation . The company expects to join on company s productiveness by an medium 20 from historical second-rate yearly overdue to the migration to VOIP for the next tercet yearsIdentificationAccording to Biddlecombe (2005 , VOIP frameation entails investing in hardware , software and internet connectionHardware cost depends on the size of the organization , the functionality or services needed and the geographic and spacial requirementsLAN , routers , cabling and access points are some of the hardware a VOIP requiresOff the shelf and free programs provide rudimentary functions and VOIP services but may charge for additional servicesCharging for local and international calls to non-VOIP phones (PSTN and mobile phonesCharging for fax , FTP and other network functions and management peters higher(prenominal) speed internet connections directly affect quality of VOIP services (Posey , 2006A company may have to upgrade connection speed since what may be adequate for existing data or PBX needs may not be able to adequately support VOIPIn some countries , VOIP has been placed under confinement when using standard internet services , special connection services may have to be procured even if current bandwidth can already support VOIPSwitching costThe company was assessed 15 ,000 to set up the main office in Hawaii and the two removed(p) offices in New York and San Francisco (BuyerZone , 2005The company upgrades to T3 bandwidth 150 a calendar month additional fee to their existing subscription for the next three yearsThe company had to pay for additional software features to incorporate existing fax systems , one time fee of 250Opportunity costThe company billet to install online retailing as part of its services to maximize bandwidth and stretch forth business operations , setup cost is 5 ,500 with periodical maintenance and support fees of 90Exposure twelvemonth 1 division 2 year 3Installation Package 15 ,000 .00 surplus Bandwidth 1 ,800 .00 1 ,800 .00 1 ,800 .00Fax System Incorporation 290 .00 retail System apparatus 5 ,500 .00 Support Fee 1 ,080 .00 1 ,080 .00 1 ,080 .00br 23 ,670 .00 2 ,880 .00 2 ,880 .00AssessmentRisk Schedule course 1Target do good (with 20 growing one hundred twenty ,000 .00Cost of VOIP migration - course of instruction 1 23 ,670 .00 acquire prat for the year 143 ,670 .00 existing increase from average 43 .67Year 2Target Profit (with 20 growth great hundred ,000 .00Cost of VOIP operations - Year 2 2 ,880 .00Profit target for the year 122 ,880 .00 Actual increase from average 22 .88Year 3Target Profit (with 20 growth 120 ,000 .00Cost of VOIP operations - Year 3 2 ,880 .00Profit target for the year 122 ,880 .00 Actual increase from average 22 .88EvaluationThe most troublesome year to mitigate risk for the company because of the greatest sum total of cash outlay . If the company is to maintain its current productivity , operations must be able to generate 143 ,670 .00 in profit for the yearMonetary risk diminishes significantly in Year 1 and 2CharacterizationYear 1 will mean that the company will be unlikely to wager productivity targets .

Since the company already has a standing profit level of 100 ,000 annually the probability will be low that they will be able to meet the newborn target considering the learning curves still to be mastered with new operationsCost lessening other than in IT should be part of the agenda to smear impact on gainYear 2 and Year 3 will probably be part years for the company . The less additional cost by VOIP will allow it to spicy profit it may not have been able to meet in Year 1Profit levels will be compromised in Year 1 but in Year 2 and Year 3 advancement profit and operations will be more apparentThe company needs to be able to fend for operations in Year 1 and 2 to support existing operations , additional costs and unfulfilled profits , if any , from Year 1Conclusion and prospective TrendsDean (2003 ) suggested that the adjustments of VOIP are for the following reasonsTo conjure business efficiency and competitivenessTo be technologically up to date and preserve competitive leverageTo desegregate voice and data network managementTo increase employee productivityTo be cost-effectiveThe cost effectiveness comes primarily from the companies ability to circumvent telecommunications cost that come in the form of international phone charges and other PSTN related telephony charges gratis(p) VOIP should be musical theme of not in its substantial subject matter since there are costs to it cypher , broadband connection and hardware and software needed to support VOIP . The real cost benefit of VOIP may actually come from being able to conflate data and voice communications into a angiotensin-converting enzyme network affording the company as whole as well its employees flexibility to stick connected , constantly if needed , in real timeVOIP , like any other technology is a tool . being so , it can be utilized either for assorted intentions . It also retains the intrinsic vulnerabilities of IP networks and as there have developed security measure for existing IP networks , so should there be efforts to protect the justice of VOIP communications . There are existing VoIP security tools and software in the market . Developers should be able to keep in discernment the realities of VOIP communications and provide options to personalize security measures as needed by companies (Iwatsu Voice Networks , 2006VOIP technology is affording let on cost alternatives and new gross streams for companies specially those in telecommunications but it has also created new convey for crimes . According to the Laura Parsky Deputy ally attorney Genera in the US Department of Justice , that VOIP is providing criminals communication alternatives that the political relation is till unable to monitor to fate policing (Keegan , 1994VOIP was also not been able to match PSTN quality and reliability . The availability of PSTN telephone systems was ensured by implementing network engineering as well as controlled access to the network . VOIP allows routers to assess routes for the voice packets to go through and when doing so over public IP systems with large number of users lack the Internet , do and distributed DoS attacks also become real problems that affect VOIP reliability and quality . Engineers have to contrive techniques to lift network design and access control VoIP has to address the issue of security for transmitted messages before it can become universal . The Internet s packet-switched architecture may provide carriers and businesses cost and efficiency advantages but also huge security headaches as well . Along with IPv6 many versions of VoIP software have conflate encryption , offering better security than older implementations (Varshney et al , 2002 . The use of these advanced authentication and sureness techniques will serve well address such important security and quality issues of VOIP (se Results . crossways the board enhancements in Internet security will help protect VOIP integrity and make it more viable for integration to existing communication systemsVOIP can benefit form the adaptation of common practices that have implement for the internet such asDeliberate investment funds in interoperability and convergence at all levels of the technologyTaking advantage of technical opportunities in an IP-based network but in fallback-friendly mode that protects functionalitySustaining efforts give to software engineering practices that map security and performance in real-timeLeveraging a broad base development for both ideas and programmingParticipating in the discussion about well-disposed policy and regulatory damages around VoIP (Sicker Lookabaugh , 2004Creating diversity or services and configurations to their infrastructures to make sure of their abilities in security and develop the ability to safely integrate different components from several vendors through never-ending testingEstablishing cooperative act involving the service provider vendors , and customers to upraise security , quality and developmentA caller move in VOIP development was suggested by Nascimiento et al (2006 . The betoken involved the utilization of IETF IPSec to enhance confidentiality and security design holes of radiocommunication receiver VoIP networks Their study think that a QoS tool based on E-Model is an efficient and objective manner to evaluate the impact of the IPSec on the traffic VoIP . This tool can be soft used in a BSS or PICONET environment where the quantity of voice communication quality is specially required due to the wireless channel behaviorAccording to Sims (2004 , CIO-Today mention the Forrester Research that evaluates the pros and cons of VOIP adoption and found out that though VOIP has gravid significantly . US households were utmost less than what was expected or has been apparent in commercial industries , Three percentageageage were using a paid service and 1 percent used a free one . long dozen percent were interested or very interested . Forrester utter set is the issue that will get user attention (Sims , 2004 . If households do not become part of VOIP networks , it can in earnest limit the applications and universality of the technologyThe internalization of VOIP and mobile communications moreover , could at last turn the tides for skeptics of VOIP . peregrine VoIP is one of the scathing focuses of VOIP development today . The development of mobile communication units that are maximizing new processors that have allowed multimedia functions and increasing availability of access points is render this development in VOIP communications . Delivering mobile VoIP will be a revolutionary occasion for the IT industry and will become a realization of true communications mobilityOne of the sure things ahead for VOIP is that it will be subject to more speculation and government will try to regulate it more is only to make sure that they are aware of VOIP industry developments . According to the FCC (2006 ) its efforts are to protect the public who can become to be the most vulnerable against the technology . According to Biddlecombe (2005 , VOIP should become real services for real need and real people And VOIP , with its realities and possibilities is worth the risk of internalization but efforts to utilize VOIP should keep in mind not to use the technology not only for its own sakeVOIP has significant costs and requires long term use for true realization of spending and potential . Risks must calculated with benefits , keeping in mid that these factors may change dynamically in the future as VOIP grows into its role in the It industryReferencesBiddlecombe , Elizabeth (2005 . VOIP primer : How it works - and what the pious platitude means . Retrieved on October 5 , 2006 from hypertext absent protocol /network .silicon .com / investigate /specialreports /VOIP /0 ,3912775 9 ,00 .htmBordoloi , Satyen K (2006 . New VOIP System Offers System Integration at Lower Cost . TMCNet . Retrieved on October 5 , 2006 from hypertext head protocol /news .tmcnet .com /news /2006 /04 /19 /1587066 .htmBuyerZone (2005 . Real-world VOIP phone system rates from BuyerZone buyers . Retrieved on October 5 , 2006 from hypertext transfer protocol / vane .buyerzone .com /telecom_equipment /VOIP /bps-VOIP-rates .htmCharny , Ben (2004 . The price of VOIP s thriftiness . CNET news Retrieved on October 5 , 2006 from hypertext transfer protocol /news .com .com /The price of VOIP s thriftiness /2100-7352_3-5273275 htmlCole , Arthur C (2006 . Firm Aims to Lower the Cost of VOIP Network Monitoring . TMCnet . Retrieved on October 5 , 2006 from hypertext transfer protocol /VOIPservices .tmcnet .com /feature /articles /2524-firm-aims-lower-cos t-VOIP-network-monitoring .htmCOOK Report (2001 . Tools for Access and Scaling : Ethernet in the premier(prenominal) Mile , 10 lance in Backbone , ENUM In PSTN . The COOK Report on Internet Protocols Technology , political economy July . Policy . pp . 1-23Dean , T (2003 . take out to Telecommunications Technology . London : Thomson eruditeness , IncDuffy , Jim (2004 . More VOIP issues bubbling up More VOIP issues bubbling up . Network universe . Retrieved on October 5 , 2006 from hypertext transfer protocol / web .networkworld .com /news /2004 /0209VOIPreg .htmlFederal communication theory Commission (2006 . Voice over Internet Protocol (VOIP . Retrieved on October 5 , 2006 from http /network .fcc .gov /VOIPGribble , C (2006 ) History of the Web Beginning at CERN . Retrieved on October 5 , 2006 from http / web .hitmill .com /internet /web_history .htmlGrowth seam (2005 . Cut-price communications : VOIP takes off Retrieved on October 5 , 2006 from http / entanglement .growthbusiness .co .uk / expansion /170 /cutprice-communications-VO IP-takes-off .thtmHickman , Angela (1998 . The FCC Takes On IP telephony . PC snip people 17 ,. 29Internet phone service : fundamental technology , telecom combat (2006 . CBC News Online . October 5 , 2006 from http / web .cbc .ca /news / footing /VOIPIwatsu Voice Networks (2006 . Converged Technology : A Cost-Effective Alternative to VOIP reverberate Systems . Retrieved on October 5 , 2006 http / entanglement .technology-reports .com /report .aspKeegan ,(1994 . High Tech Pirates Collecting Phone Calls ground forces Today br. 4AKorzeniowski , Paul (1998 , July 20 . IP Telephony Is tantalising . PC Week strength 15 .. 291Lawson , Stephen (1998 . 3Com to add IP telephony (development deal with eFusion (Company argumentation and Marketing . InfoWorld intensity level 20 .. 23Leavitt , Neal (1999 . Will 1999 be the year of IP telephony . Computer br. 15LeClaire , Jennifer (2004 . FCC Chairman Opposes States Regulation of VOIP . E-Commerce measure . Retrieved on October 5 , 2006 from http / entanglement .ecommercetimes .com /story /37472 .htmlMarsan , Carolyn Duffy (2005 .VOIP Security Services Taking Hold . CIO News . Retrieved on October 5 , 2006 from http / entanglement .cio .in /news /viewArticle /ARTICLEID 1721Marsan , Carolyn Duffy (2006 .VOIP security assessment is about to become a must . Network World . Retrieved on October 5 , 2006 from http / web .techworld .com /security /features /index .cfm ?featureid 2680 pagt ype samecatsamechanMobile VOIP (2006 . Wikipedia Online cyclopaedia . Retrieved on October 5 , 2006 from http /en .wikipedia .org /wiki /Mobile_VOIPNascimento , A , Passito , A , Mota , E , Nascimento , E , and Carvalho , L (2006 . fecal matter I Add a full VOIP Call ? proceedings of the 2006 International Symposium on World of receiving set , Mobile and Multimedia Networks (WOWMOM 06 . IEEE Computer SocietyPosey , Brien M (2006 . The Pros and Cons of VOIP . Windows Networking Retrieved on October 5 , 2006 from http / vane .windowsnetworking .com /articles_tutorials /Pros-Cons-VOIP .htmRendon , Jim (2002 . analyst : VOIP offers more than cost savings Networking News . Retrieved on October 5 , 2006 from http /searchnetworking .techtarget .com /originalContent /0 ,289142 ,sid7_gci 857902 ,00 .htmSamahon , Tuan N (1999 . The graduation exercise Amendment case against FCC IP telephony regulation (Internet Protocol . Federal Communications Law diary . Volume 51 .. 493Sicker , D .C . and Lookabaugh , T (2004 . Queue Focus : : VOIP Security : not an afterthought . Queue Volume 2 Number 6Siemens enterprise Communications (2006 . How secure is voice over IP Retrieved on October 5 , 2006 from http / web .siemens .com /index .jsp ?sdc_p t8ls8o1374727i508cd1080788fmu0n11 47519pHPz3Sims , David (2004 . VOIP think : High Point among 2010 and 2014 TMCNet . Retrieved on October 5 , 2006 http /www .tmcnet .com /channels /selecting-VOIP-solutions /VOIP-solutions-a rticles /VOIP-gains-steam-in-coming-years .htmTech FAQ (2006 . VOIP . Retrieved on October 5 , 2006 from http /www .tech-faq .com /VOIP .shtmlTelecommunications Act of 1996 (2006 . Wikipedia Online cyclopaedia Retrieved on October 5 , 2006 from http /en .wikipedia .org /wiki /Telecommunications_Act_of_1996Trager , Louis (1998 . FCC regulation of net telephony possible . ZDNews Retrieved on October 5 , 2006 from http /www .zdnet .com /intweek /print /980413 /306725 .htmlTravis , Paul (2005 . s Quality Surprise . InformationWeek Retrieved on October 5 , 2006 http /informationweek .com /story /showArticle .jhtml jsessionid RVFJRVCDOG CMSQSNDBCSKHSCJUMEKJVN ?articleID 4Office of Technology Assessment (1990 . comminuted Connections Communication for the Future , OTA-CIT-407 , Washington , D .C :U .S Government Printing OfficeValdes , Robert (2006 . How VOIP Works . Retrieved on October 5 , 2006 from http /electronics .howstuffworks .com /ip-telephony .htmVarshney , U , Snow , A , McGivern , M . and Howard , C (2002 . Voice over IP . Communications of the ACM Volume 45 Number 1 . Colman , Price (1998 November 30Voice over IP (2006 . Wikipedia Online Encyclopaedia . Retrieved on October 5 , 2006 from http /en .wikipedia .org /wiki /Voice_over_IPVoice over IP : Technical Issues (2002 . more than Research Network . Retrieved on October 5 , 2006 from http /www .more .net /technical /research /VOIP /technical /issues .htmlWallingford , Theodore (2005 . What Is VOIP . O Reilly Media . Retrieved on October 5 , 2006 from http /www .oreillynet .com /pub /a /network /2005 /09 /02 /what-is-VOIP .html pp . 1-4Refer to en .wikipedia .org /wiki /Mobile_VoIP for information regarding mobile VOIP ( Mobile VOIP , 2006To learn more about Skype , refer to product information provided at www .skype .com 67Y]pp LMwezhff367f7Z[]ppppbr ILMfMgdezhfhh?e?e?e?e?e?e?e?e?e?ekdlRR?eRRRRRRRRR?e?e?epp kdppppp ?e?e?e?e?e?e?e?e?e?e?e?e?e?e?e?eCode number is assign before FGD . and Key Points entries are summaries of FGD discussion enters are taken from online quote done by BuyerZone (see www .buyerzone .comVOIP PAGE 38 Figure 1 . Typical VOIP and computer setup (Source : Federal Communications CommissionFigure 2 . VOIP calls and public network calls between New York and San Francisco (Source : Keynotes Systems , as cited in Travis (2005 Figure 3 . VOIP Layered Security architecture Model (Source : Siemens Enterprise Communications ...If you want to get a full essay, set out it on our website:
Ordercustompaper.comIf you want to get a full essay, wisit our page: write my paper
No comments:
Post a Comment