Voip Deployment Assignment.

Read Complete Research Material

VOIP DEPLOYMENT ASSIGNMENT.

VoIP deployment assignment.

Abstract

Current technological advancements in information technology within organizations are facing both demands and constraints: demands in the form of a converged network where telephony, wire speed networks, and security are requirements rather than a necessity, constraints where energy in the form of green IT is becoming a hallmark of excellence within an organization. Reliable low energy consumption communication in all its forms is therefore a vital part of any modern industry.

VoIP deployment assignment

Approach to Evaluating a Unified Communications Network

Introduction

This paper talks about the VoIP scheme of Nortel Network. From Alexander Graham Bell's initial phone patents to the any location, anytime attachments of today, Nortel have been at the forefront of discovery in the ever developing annals of communications. This article compares Microsoft Unified Communications, encompassing the accessible data about Microsoft Communications Server 14, to Cisco® Unified Communications Solutions in critical localities (Kurose 2000).

 Model for a New Company Implementing VoIP

Following is a form for a new business in alignment to apply VoIP in its system.

Voice over Internet Protocol conveys calls by high pace Internet attachments other than utilizing customary methods. Fees are directed for both localized and long expanse services. However, the charges are usually the identical for both localized and long distance. This detail solely competently decreases the cost of telecommunications for numerous enterprises one time they swap over. While added charges normally request for worldwide calling, monetary savings of some kind over customary calling services usually arrive into play.

A benefit is that it allows the testing of the current environment by deploying QoS and bandwidth calculations which require certain steps and guidelines to perform the assessment for an existing installation.

Some of the steps include:

Performing audits

Estimating the VoIP traffic, through monitoring tools such as uptime or SCOM; such applications provide graphical peaks in traffic where the highest utilization exists.

Examining the network's ability by performing audits and analyses to check bandwidth delay and loss. Examining the hardware and compatibility with the VoIP network.

Proposing the implemented solution

Performing audits of the network involves obtaining network diagrams and other methods such as company documentation and design implementations of the network to understand connections between devices and branches and the type of hardware.

A security consideration is that essential firewalls and NIPS (network intrusion prevention systems) or NAT (Network Address Translation) must be considered when deploying and using VoIP.

As VoIP uses IP packets to transfer data, some older or packet based firewalls will be unable to understand protocols such as H.323 or SIP enabled protocols and therefore consideration of a zone based or application based firewall will allow protocols to pass through the firewall and state fully inspect each packets at the application layer of the OSI model. .Conducting this audit will require the inspection of the physical layer of the OSI model by ensuring that telephones meet the appropriate power requirements, which are different in each country.

Site surveys require additional check of power supplies, UPS, and battery backup system for all the VoIP ...
Related Ads