Author(s):  
Dwayne Stevens ◽  
David T. Green

Voice over Internet Protocol (VoIP) networks signal an evolution in telecommunications that is accelerating the convergence of the Internet and the public switched telephone network (PSTN). Offering decreased costs and other benefits, VoIP is poised to transform telecommunications and the organizations that use them. However, some consider VoIP a security nightmare, combining the worst vulnerabilities of IP networks and voice networks. DOS attacks, crash attacks, packet spoofing, buffer overflow attacks, spam over Internet telephony (SPIT), and word injection all pose threats to commercial enterprise networks and the mission critical operations that they support.


2009 ◽  
Vol 24 (1) ◽  
pp. 25-34 ◽  
Author(s):  
Ioanna D Constantiou ◽  
Anastasia Papazafeiropoulou ◽  
Yogesh K Dwivedi

The Internet telephony (IP telephony) has been presented as a technology that can replace existing fixed-line services and disrupt the telecommunications industry by offering new low-priced services. This study investigates the diffusion of IP telephony in Denmark by focusing on vendors’ commercialisation strategies. The theory of disruptive innovation is introduced to investigate vendors’ perceptions about IP telephony and explore their strategies that affect the diffusion process in the residential market. The analysis is based on interview data collected from the key market players. The study's findings suggest that IP telephony is treated as a sustaining innovation that goes beyond the typical voice transmission and enables provision of advanced services such as video telephony.


Author(s):  
Philip E. Steinberg ◽  
Darren Purcell

Electronic communications refer to forms of communication where ideas and information are embedded in spatially mobile electronic signals. These include the internet, telephony, television, and radio. Electronic communications are linked to state power in a complex and, at times, contradictory manner. More specifically, a tension exists between divergent pressures toward constructing electronic communication spaces as spaces of state power, as spaces of escape, and as spaces for contesting state power. On the one hand, states often invest in infrastructure and empower regulatory institutions as they seek to intensify their presence within national territory, for example, or project their influence beyond territorial borders. The widespread use of electronic communication technologies to facilitate governmental power is especially evident in the realm of cyberwarfare. E-government platforms have also been created to foster interaction with the state through electronic means. On the other hand, communication systems thrive through the idealization (and, ideally, the regulatory construction) of a space without borders, whereby individuals might bypass, or even actively work to subvert, state authority. Just as the internet has been seen as a means for state power to monitor the everyday lives and subjectivities of the citizenry, it has also been employed as a tool for democratization. Various institutions have emerged to govern specific electronic communication networks, including those that are focused on reproducing the power of individual states, those that operate in the realm of intergovernmental organizations, those that devolve power to actors in local government, and those that empower corporations or civil society.


2010 ◽  
pp. 1427-1436
Author(s):  
Dwayne Stevens ◽  
David T. Green

Voice over Internet Protocol (VoIP) networks signal an evolution in telecommunications that is accelerating the convergence of the Internet and the public switched telephone network (PSTN). Offering decreased costs and other benefits, VoIP is poised to transform telecommunications and the organizations that use them. However, some consider VoIP a security nightmare, combining the worst vulnerabilities of IP networks and voice networks. DOS attacks, crash attacks, packet spoofing, buffer overflow attacks, spam over Internet telephony (SPIT), and word injection all pose threats to commercial enterprise networks and the mission critical operations that they support.


Author(s):  
Rui Prior ◽  
Susana Sargento

Having its roots in the military ARPANET, conceived as a data transport network with a focus on resilience, the Internet supports only a best-effort service model, where all packets are treated the same way, therefore providing a single level of service. Now that the Internet is becoming a ubiquitous global communication infrastructure, new applications are emerging with more demanding and diversified requirements than data transport. Internet telephony, for example, has much stricter delay requirements than remote terminal, the most demanding of the original applications. The deployment of other service models providing better quality of service (QoS) is of great importance for the transport of these new applications.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2001 ◽  
Vol 120 (5) ◽  
pp. A735-A735
Author(s):  
C STREETS ◽  
J PETERS ◽  
D BRUCE ◽  
P TSAI ◽  
N BALAJI ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document