Sunday, June 23, 2019
Literature Review & Project Specification Essay
Literature Review & Project Specification - Essay ExampleTo date on that point are very hardly a(prenominal) routes in the Internet that support fully ATM-based backbone transmission, fast routers, QoS (Quality of Service) services and/or un-congested bandwidth resources. Yet VOIP is already being subroutined. VOIP croupe be viewed as an opportunistic parasite on the existing telephone system. This view will be further borne out as we examine other opportunities that have been seized by VOIP vendors. rotary systems are not well suited for packetised data communications of the type that is generated by Internet services such as Web page retrieval. That is because a circuit-based network is not well suited for exchanges between rapidly changing endpoints. A fundamental limitation of a circuit-based network is that each user can connect to only one endpoint at a time. That is, by arrangement with the central office (by dialling a telephone number) the switch will be programmed to m ove every package of data you send from your conveyor belt to one other outgoing conveyor belt. There is no mechanism in this situation for individual packages to receive special treatmentProject Specification - Telephone or mobile is a technology that almost everyone uses in the home, at work or on the move. Traditionally, telephone is a simple one-to-one or one to many communication technology but it is now offered with enhancements that accept video, chat, file passing and file sharing where suppliers are attempting to present a complete communication environment over mobile or landline. Due to his there is always a chance of misuse of communication via toll fraud.Toll fraud might be combated in several ways user training, detecting schemes, regular monitoring of internal extensions and issuing a personal authorization code for every employee according to the requirement and only then any languish distance call be matured. Sending bills regularly to the employee and ensuring p ayment for the calls made for personal use.Intention - Educates on toll fraud and helps in its prevention.Project surname - Toll Fraud -Preventive MeasuresProject Topic Area Overview - Toll fraud and dogged distance calls abuse are the unauthenticated or illegal use of long distance telephone services offered by the legitimate companies. They include not only those who steal authorization codes and use or sell them to others, but in addition any University employee who uses the Universitys long distance system for purposes other than official business (ITS, 2006). It is against the rules and regulations of any legitimate telecom company to charge personal telephone calls to a company or some University account either by illegally using companys or University telephone authorization codes and companys or University credit cards. Their corresponding employers stringently subject this kind of unauthorized use of companys or University telephone system for toll calls to legal and di sciplinary action. Protect your companys internal telephone directory. Restrict use to employees only. Adopt strict distribution controls and penalties for failure to comply with the privacy requirements of your company. When finished with the directories, have them shredded (Times Warner Telecom, 2006).According to Chen (2006) modern telephone system is a newly defined protocol which supports all users but also is compatible with the current technology
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.