Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse

Projekt (0)

5 VÄGA HEA
Punktid

Lõik failist

Tallinna Tehnikaülikool Raadio- ja sidetehnika instituut
Projekt ainetes ,,IRT0030 Andmeside"
ja
,,IRT0100 Kommunikatsioonivõrkude struktuurid ja teenused"
teemal
« VoIP teenus»
Üliõpilane: Ruslan Karpovits Õpperühm: IATM Matrikli nr: 050829 Õppejõud: Avo Ots
Tallinn
2008 Author 's word This project is written to show some interesting aspects of working with VoIP ( Voice over Internet Protocol ) service. The project briefly describes the process of finding a solution for based VoIP problem and its realization.
-2- Contents
Introduction .............................................................................................................................. - 4 -
Mission ....................................................................................................................................... - 5 -
Solution...................................................................................................................................... - 5 - Scheme .................................................................................................................................... - 5 - Components ............................................................................................................................ - 5 - Configuration ......................................................................................................................... - 7 - Monitoring.............................................................................................................................. - 8 - Price ..................................................................................................................................... - 10 -
Conclusion ............................................................................................................................... - 10 -
Referencies .............................................................................................................................. - 11 -
-3- Introduction VoIP is a solid technology available since some years that allows people to communicate via voice using the IP protocol instead of telephone lines. Unfortunately this technology has been relegated in a niche market due to several factors such as proprietary standards, high price tag, limited integration with existing telephony environments. However in the last couple of years the situation changed dramatically since some open source tools such as asterisk as well as low- cost VoIP telephone adapters and services become available. In fact , today it is quite common for internet providers to provide their customers VoIP calls at very low cost, if any, in addition to standard xDSL connectivity.
The VoIP uses Internet protocol (IP) to send digitized voice traffic over the Internet or private networks . An IP packet consists of a train of digits containing a control header and a data payload. The header provides network navigation information for the packet, and the payload contains the compressed voice data.
While circuit -switched telephony deals with the entire message , VoIP-based data transmission is packet-based, so that chunks of data are packetized (separated into units for transmission), compressed, and sent across the network--and eventually re-assembled at the designated receiving end. The key point is that there is no need for a dedicated link between transmitter and receiver.
Packetizing voice data involves adding header and trailer information to the data blocks. Packetization overhead (additional time and data introduced by this process) must be reduced to minimize added latencies (time delays through the system). Therefore , the process must achieve a balance between minimizing transmission delay and using network bandwidth most efficiently --smaller size allows packets to be sent more often, while larger packets take longer to compose. On the other hand , larger packets amortize the header and trailer information across a bigger chunk of voice data, so they use network bandwidth more efficiently than do smaller

Vasakule Paremale
Projekt #1 Projekt #2 Projekt #3 Projekt #4 Projekt #5 Projekt #6 Projekt #7 Projekt #8 Projekt #9 Projekt #10 Projekt #11
Punktid 50 punkti Autor soovib selle materjali allalaadimise eest saada 50 punkti.
Leheküljed ~ 11 lehte Lehekülgede arv dokumendis
Aeg2009-01-24 Kuupäev, millal dokument üles laeti
Allalaadimisi 68 laadimist Kokku alla laetud
Kommentaarid 0 arvamust Teiste kasutajate poolt lisatud kommentaarid
Autor audia Õppematerjali autor
„IRT0100 Kommunikatsioonivõrkude struktuurid ja teenused“

Teemal: «VoIP teenus»

Kasutatud allikad

Sarnased õppematerjalid

thumbnail
3
doc

Tööstuslik andmeside kontrolltöö 2 abimaterjal - vastused

oData transparency: In bit and byte oriented protocols, there is a problem if a control character (for ETX (End of Text) ·Same as ETB, only no more blocks will follow. ITB (End of > Differences with HDLC ­ length of protocol field (1B or 2B) byte-oriented protocols) or the start-of-frame flag (for bit-oriented protocols) appears in the actual data. Intermediate Transmission Block) ·Same as ETB, except that the receiving statio Differs from HDLC because of multiaccess MAC that provides · Maximum payload length (default: 1500) This was not likely to happen in ASCII text, but is very likely with binary data. This is known as a data will not acknowledge after the error checking. EOT (End of Transmission) framing/error detection: · Type of CRC (2B or 4B) transparency problem an can be rectified with byte stuffing (for byte-orien

Tööstuslik andmeside
thumbnail
21
odp

Internet ( slaidid )

Internet Andra Oja What is Internet? The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. History of the Internet 1957:The United States Department of Defense formed a small agency called ARPA (Advanced Research Projects Agency) to develop military science and technology. 1961-1965:The Massachusetts Institute of Technology (MIT) started to research sharing information in small, phone-linked networks. ARPA is one of their main sponsors. 1966: The first ARPANET plan is unveiled by Larry Roberts of MIT. Packet switching techno

Erialaline inglise keel
thumbnail
102
pdf

Kommunikatsioonimudel

1. Üldine kommunikatsioonimudel Sõnumi allikas->saatja(allikast info)->edastussüsteem->vastuvõtja->sihtjaam [üheks näiteks võiks olla: Arvuti->modem->ÜKTV->modem->arvuti] sisendinfoAllikas(sisendandmed g(t))->edastaja e. transmitter(edasi saadetud signaal s(t))->edastussüsteem(saadud signaal r(t))->vastuvõtja(väljund andmed g'(t))- >lõppunkti saaväljund informatsioon m' 2. Kommunikatsioonisüsteemi ülesanne • mõistlik kasutamine/koormamine • liidestus(kokku ühendamine. Ntx: võrk+võrk, arvuti+võrk) • Signaalide genereerimine(edastamine)(signaalide ühest süsteemist teise üleviimine) • Sünkroniseerimine [andmeedastuse algust(saatja) ja lõppu(vastuvõtjat)] • Andmeside haldamine • Vigade avastamine ja parandamine(näiteks side mürarikkas keskkonnas) • Voojuhtimine (vastuvõtja saab pakette vastu võtta kindla kiirusega->on vaja kont

Tehnoloogia
thumbnail
16
docx

Social media information and data collection and security

New Media Economy Social media information and data collection and security In this brief essay, i would like to focus on the social media platforms in our moren society. How people use them, what kind of information we give away, what companies will do with this. Information sharing and data protection has become very popular theme in the recent few years. People care more about their privacy and avoid „big brother“ foreshadowing. It is important to know what social media platforms promise and are they really going to keep it. Users should think about what they share and what kind of information they generate. Because it is all recorded and some info can be traced back to real people. Privacy and data protecion topics are becoming more and more important and the amouts of data generated is becoming larger. When wrongly access this kind of data, a lot damage could be done by criminals. Users privacy settings should be reviewd and fixed when needed. Social media Humans hav

Inglise keel
thumbnail
140
pdf

Thesis Kivimaa August 2022

Thesis “How is it possible to calculate IT security effectiveness?” Kristjan Kivimaa August 2022 1 Abstract In IT Security world, there is lack of available, reliable systems for measuring security levels/posture. They lack the range of quantitative measurements and easy and fast deployment, and potentially affects companies of all sizes. Readily available security standards provide qualitative security levels, but not quantitative results – that would be easily comparable. This deficiency makes it hard for companies to evaluate their security posture accurately. Absence of security metrics makes it complicated for customers to select the appropriate measures for particular security level needed. The research question for this research project is – “How is it possible to calculate IT security effectiveness?”. The aim of this research is to use this reference m

Infotehnoloogia
thumbnail
120
doc

Lühendite seletus

A... AA Auto Answer AAA Authentication, Authorization and Accounting AAB All-to-All Broadcast AAC Advanced Audio Coding AACS Advanced Access Control System AAL Asynchronous Transfer Mode Adaption Layer AAM Automatic Acoustic Management AAP Applications Access Point [DEC] AARP AppleTalk Address Resolution Protocol AAS All-to-All Scatter AASP ASCII Asynchronous Support Package AAT Average Access Time AATP Authorized Academic Training Program [Microsoft] .ABA Address Book Archive (file name extension) [Palm] ABAP Advanced Business Application Programming [SAP] ABC * Atanasoff-Berry Computer (First digital calculating machine that used vacuum tubes) ABEND Abnormal End ABI Application Binary Interface ABIOS Advanced BIOS ABIST Automatic Built-In Self-Test [IBM] ABLE Adaptive Battery Life Extender + Agent Building and Learning Environment [IBM] ABM Asynchronous Balanced Mode ABR Available Bit Rate ABRD

Informaatika
thumbnail
18
docx

Vormistamine ülesanne 3

Edith D. de Leeuw, Joop J. Hox, Don A. Dillman INTERNATIONAL HANDBOOK OF SURVEY METHODOLOGY ÜLESANNE Õppeaines: SISSEJUHATUS ERIALASSE Tehnoloogia ja ringmajanduse instituut Õpperühm: Juhendaja: Tallinn 2021 TABLE OF CONTENTS 2 1 THE CORNERSTONES OF SURVEY RESEARCH 1.1 Introduction The idea of conducting a survey is deceptively simple. It involves identifying a specific group or category of people and collecting information from some of them in order to gain insight into what the entire group does or thinks; however, undertaking a survey inevitably raises questions that may be difficult to answer. How many people need to be surveyed in order to be able to describe fairly accurately the entire group? How should the people be selected? What questions should be asked and how should they be posed to respondents? In addition, what data collectio

Andme-ja tekstitöötlus
thumbnail
215
docx

Steve Krug-Dont Make Me Think 2014

Don’t Make Me Think, Revisited A Common Sense Approach to Web Usability Steve Krug Don’t Make Me Think, Revisited A Common Sense Approach to Web Usability Copyright © 2014 Steve Krug New Riderswww.newriders.com To report errors, please send a note [email protected] New Riders is an imprint of Peachpit, a division of Pearson Education. Editor: Elisabeth Bayle Project Editor: Nancy Davis Production Editor: Lisa Brazieal Copy Editor: Barbara Flanagan Interior Design and Composition: Romney Lange Illustrations by Mark Matcho and Mimi Heft Farnham fonts provided by The Font Bureau, Inc. (www.fontbureau.com) Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. For information on getting permission for reprints and excerpts, [email protected]. Notice of Liability Th

Kategoriseerimata




Meedia

Kommentaarid (0)

Kommentaarid sellele materjalile puuduvad. Ole esimene ja kommenteeri



Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun