Wednesday, March 20, 2019
Voice Over Internet Protocol Attacks Essay -- Information Technology
DefinitionVoIP or Voice over lucre Protocol, is a type of transmissions medium that is responsible for the delivery of real-time percentage and data communication. Unlike its analog predecessor in which the transport functionality was routed via the human beings switched tele mobilize network (PSTN), calls argon now converted from an analog note to a digital format, which is what the Internet Protocol (IP) uses for transmission and delivery, making VoIP possible. some(prenominal) other key processes, such as call foring, authentication, security, call control, and voice compression, atomic number 18 established by VoIP prior to and during the call setup phase. (Harper, 2011)Essentially, VoIP converts your voice into a digital signal that is sent via the internet. The signal is converted to a metre phone signal before it goes to a land line. There are a few ways that VoIP calls are made figurer to computer, computer to a network, and network to network. How VoIP worksThe way VoIP works is by victimization what is called an analog telephone adaptor (ATA). The ATA allows you to connect your phone line to your computer and that allows you to make phone calls across the Internet. The ATA converts the signal from analog to digital. The analog signal is taken from your regular phone and makes it a digital signal so that it can be transmitted through the Internet. One of the most touristy providers for VoIP services is Vonage. AT&T is also a provider that uses VoIP and they intromit an ATA as part of its VoIP service. The setup is actually bewitching straightforward, and is a pretty simple installation. Basically, what is required is plugging your phone line into the ATA, and running a phone line out of the ATA into your computer. Tools of the tradeI... ...ding_voip.pdfEdwards, J. (2007, January 11). Voip scams, phishing, and denial of service attacks. Retrieved from http//www.voip-news.com/feature/voip-scams-phishing-dos-011107/Harper, Alle n Shon Harris Jonathan cape Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The respectable Hackers Handbook, 3rd reading ( rouse Locations 7554-7557). McGraw-Hill Osborne Media. Kindle Edition.Harper, Allen Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Location 7554). McGraw-Hill Osborne Media. Kindle Edition.Harper, Allen Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Locations 7552-7554). McGraw-Hill Osborne Media. Kindle Edition.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment