Answered You can hire a professional tutor to get the answer.

QUESTION

Complete 12 pages APA formatted article: Literature Review & Project Specification.

Complete 12 pages APA formatted article: Literature Review & Project Specification. To date there are very few routes in the Internet that support fully ATM-based backbone transmission, fast routers, QoS (Quality of Service) services and/or un-congested bandwidth resources. Yet VOIP is already being used. VOIP can be viewed as an opportunistic parasite on the existing telephone system. This view will be further borne out as we examine other opportunities that have been seized by VOIP vendors.

Circuit systems are not well suited for packetised data communications of the type that is generated by Internet services such as Web page retrieval. That is because a circuit-based network is not well suited for exchanges between rapidly changing endpoints. A fundamental limitation of a circuit-based network is that each user can connect to only one endpoint at a time. That is, by arrangement with the central office (by dialling a telephone number) the switch will be programmed to move every package of data you send from your conveyor belt to one other outgoing conveyor belt. There is no mechanism in this situation for individual packages to receive special treatment!

Project Specification - Telephone or mobile is a technology that almost everyone uses in the home, at work or on the move. Traditionally, telephone is a simple one-to-one or one to many communication technology but it is now offered with enhancements that include video, chat, file passing and file sharing where suppliers are attempting to present a complete communication environment over mobile or landline. Due to his there is always a chance of misuse of communication via toll fraud.

Toll fraud might be combated in several ways: user training, detection schemes, regular monitoring of internal extensions and issuing a personal authorization code for every employee according to the requirement and only then any long distance call be matured. Sending bills regularly to the employee and ensuring payment for the calls made for personal use.

Intention - Educates on toll fraud and helps in its prevention.

Project Title - Toll Fraud -Preventive Measures

Project Topic Area Overview - Toll fraud and long distance calls abuse are the unauthenticated or illegal use of long distance telephone services offered by the legitimate companies. "They include not only those who steal authorization codes and use or sell them to others, but also any University employee who uses the University's long distance system for purposes other than official business" (ITS, 2006). It is against the rules and regulations of any legitimate telecom company to charge personal telephone calls to a company or some University account either by illegally using company's or University telephone authorization codes and company's or University credit cards. Their corresponding employers strictly subject this kind of unauthorized use of company's or University telephone system for toll calls to legal and disciplinary action. "Protect your company's internal telephone directory. Restrict use to employees only. Adopt strict distribution controls and penalties for failure to comply with the privacy requirements of your company. When finished with the directories, have them shredded" (Times Warner Telecom, 2006).

According to Chen (2006) modern telephone system is "a newly defined protocol which supports all users but also is compatible with the current technology.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question