Wednesday, May 15, 2019

Literature Review & Project Specification Essay

Literature canvas & Project Specification - Essay ExampleTo date there atomic number 18 very few routes in the Internet that support fully ATM-based backbone transmission, fast routers, QoS (Quality of Service) services and/or un-congested bandwidth resources. Yet VOIP is already world used. VOIP can be viewed as an opportunistic parasite on the existing telephone system. This view forget be further borne out as we examine other opportunities that have been seized by VOIP vendors.Circuit systems are not well suited for packetised data communications of the type that is generated by Internet services such(prenominal) as Web page retrieval. That is because a circuit-based network is not well suited for exchanges between apace changing endpoints. A fundamental limitation of a circuit-based network is that each user can bear on to only one endpoint at a time. That is, by arrangement with the central office (by dialling a telephone number) the switch will be programmed to move ever y package of data you send from your transporter belt to one other outgoing conveyor belt. There is no mechanism in this posture for individual packages to receive special treatmentProject Specification - Telephone or mobile is a technology that almost everyone uses in the home, at work or on the move. Traditionally, telephone is a simple one-to-one or one to m each communication technology but it is now offered with enhancements that hold video, chat, cross-file passing and file sharing where suppliers are attempting to present a complete communication environment everyplace mobile or landline. Due to his there is always a chance of misuse of communication via ships bell fraud. monetary value fraud might be combated in several ways user training, detection schemes, repair monitoring of internal extensions and issuing a personal authorization code for every employee according to the necessary and only then any long distance call be matured. Sending bills regularly to the emp loyee and ensuring fee for the calls made for personal use.Intention - Educates on toll fraud and helps in its prevention.Project Title - Toll Fraud -Preventive MeasuresProject Topic Area Overview - Toll fraud and long distance calls abuse are the unauthenticated or illegal use of long distance telephone services offered by the legitimate companies. They include not only those who steal authorization codes and use or sell them to others, but also any University employee who uses the Universitys long distance system for purposes other than official business (ITS, 2006). It is against the rules and regulations of any legitimate telecom community to charge personal telephone calls to a company or some University account either by illegally using companys or University telephone authorization codes and companys or University credit cards. Their corresponding employers strictly report this kind of unauthorized use of companys or University telephone system for toll calls to legal and disciplinary action. shelter your companys internal telephone directory. Restrict use to employees only. Adopt strict distribution controls and penalties for failure to comply with the cover requirements of your company. When finished with the directories, have them shredded (Times Warner Telecom, 2006).According to Chen (2006) modern telephone system is a fresh defined protocol which supports all users but also is compatible with the current technology

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.