.

Thursday, February 7, 2019

Voice Over Internet Protocol Attacks Essay -- Information Technology

DefinitionVoIP or Voice over Internet Protocol, is a type of transmissions medium that is responsible for the delivery of real-time voice and entropy communication. Unlike its running(a) predecessor in which the transport functionality was routed via the public switched anticipate network (PSTN), calls are now converted from an analog signal to a digital format, which is what the Internet Protocol (IP) uses for transmission and delivery, making VoIP possible. Several early(a) key processes, such as signaling, authentication, security, call control, and voice compression, are ceremonious by VoIP prior to and during the call setup phase. (Harper, 2011)Essentially, VoIP converts your voice into a digital signal that is sent via the internet. The signal is converted to a standard retrieve signal before it goes to a land pull back. There are a few ways that VoIP calls are made computer to computer, computer to a network, and network to network. How VoIP worksThe way VoIP works is by using what is called an analog telephone adaptor (ATA). The ATA allows you to connect your phone line to your computer and that allows you to give birth phone calls across the Internet. The ATA converts the signal from analog to digital. The analog signal is interpreted from your regular phone and makes it a digital signal so that it bottomland be transmitted through the Internet. One of the most popular providers for VoIP serve is Vonage. AT&T is also a provider that uses VoIP and they include an ATA as part of its VoIP service. The setup is actually pretty straightforward, and is a pretty transparent installation. Basically, what is required is plugging your phone line into the ATA, and running a phone line out of the ATA into your computer. Tools of the tradeI... ...ding_voip.pdfEdwards, J. (2007, January 11). Voip scams, phishing, and denial of service attacks. Retrieved from http//www.voip-news.com/feature/voip-scams-phishing-dos-011107/Harper, Allen Shon Harris Jonathan cape Chris shoot Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, tertiary Edition (Kindle fixings 7554-7557). McGraw-Hill Osborne Media. Kindle Edition.Harper, Allen Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Location 7554). McGraw-Hill Osborne Media. Kindle Edition.Harper, Allen Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (Kindle Locations 7552-7554). McGraw-Hill Osborne Media. Kindle Edition.

No comments:

Post a Comment