Sunday, November 24, 2019

Arthur MillerBIO essays

Arthur MillerBIO essays With The Death of a Salesman during the winter of 1949 on Broadway, Arthur Miller began to live as a playwright who has since been called one of this century's three great American dramatists by the people of America. The dramatist was born in Manhattan in October 17, 1915, to Isadore and Agusta Miller, a conventional, well to do Jewish couple. Young Arthur Miller was an intense athlete and a weak scholar. Throughout his youth he was molded into one of the most creative playwrights America has ever seen, without these priceless childhood experiences there would have never have been the basis and foundation for his great works. During his bright career as playwright he demonstrated extreme talent on two of his greatest pieces The Crucible and the Death of a Salesman. He has also written other powerful, often mind-altering plays: A View from the Bridge, A Memory of Two Mondays, After the Fall, Incident at Vichy, and The Price. Who could forget the film The Misfits and the dramatic special Playing for Time. Death of a Salesman was not Arthur Miller's first success on Broadway. His first plays were Honors at Dawn (1936) and No Villain (1937) which won the University of Michigan Hopwood Awards. His Death of a Salesman won the Pulitzer prize in 1949, which was another proof of his excellent talent. Miller wrote The Crucible in 1953 during the McCarthy period when Americans were accusing each other of Pro-Communist beliefs. Many of Miller's friends were being attacked as Communists and in 1956, Miller himself was brought before the House of Un-American Activities Committee where he was found guilty of beliefs in Communism. The verdict was reversed in 1957 in an appeals court. The Crucible is set against the backdrop of the mad witch-hunts of the Salem witch trials in the late 17th century. It is about a town, after accusations from a few girls, which begins a mad hunt for witches that did not exist. Many townspeople were hanged on...

Thursday, November 21, 2019

Giorgio Armani Fashion Brand Essay Example | Topics and Well Written Essays - 1500 words

Giorgio Armani Fashion Brand - Essay Example The Company has been named after the designer, Giorgio Armani who happens to be its founder. The success gained by Armani since its establishment in 1975 reflects in the fact that in only about 3.5 decades, the Company has over 300 stores in 36 different countries of the world with a net worth of more than 3 billion Euros (Blue X Clothing, 2011). Despite the fact that Armani accessories are extremely popular among the elite, it has little customers from the lower and lower-middle class background. This paper aims at identifying a trend employing which, Armani can increase the sale of its accessories among the people from lower and lower-middle class background. An understanding of the Armani’s Brand Values and Image: The weight of brand values maintained by Armani can be estimated from the fact that they are based on the innovative designs and charismatic persona of the founder of Armani and Giorgio Armani has been recently entitled as the â€Å"most successful designer† of the world (Blue X Clothing, 2011). ... ope, Frank Martell made a speech in which he expressed his views about the brand value of Armani in these words: Giorgio Armani and Gucci topped ACNielsen’s Global ‘Most Coveted Fashion Brands’ ranking by scoring consistently high responses from online consumers in every part of the world - a remarkable testament to the power and universal appeal of these two luxury fashion brands †¦ Regardless of where they live, when consumers in Italy, China or UAE purchase a Gucci bag or a Giorgio Armani suit they are prepared to pay a premium because they are buying the image the brand represents. In Armani’s case, consumers know they are getting quality, sophistication and style – timeless values with global appeal. (Frank Martell cited in ACNielsen, 2006). The Armani Brand covers a total of five lines of luxury clothing with their own unique accessories including watches and colognes. The main collection of this Brand is the signature Giorgio Armani line which produces accessories for people aged between 35 and 50 years. Armani is the most profligate brand with respect to cost. It primarily caters for the needs of those people that want to buy gowns and outfits like the ones worn by the artists and celebrities of Hollywood when they walk on the red carpet. The largest of all Armani lines is Emporio Armani which produces accessories for young professionals that are somewhere from 25 to 35 years of age. Of all the lines of Armani, this one is the most popular among Armani’s clients. Accessories from the Emporio Armani line are accessible both online and at high end department stores. Needs of the high end clients are addressed by the Armani Collezioni. It includes such accessories as slim fitting outfits and handmade jumpers which are sold in extravagant Armani

Wednesday, November 20, 2019

Solid modeling Research Paper Example | Topics and Well Written Essays - 2250 words

Solid modeling - Research Paper Example The invention of the technique of solid modeling gives room for the mechanization of many complicated engineering calculations that are performed in the design process. The historical progress of solid modeling is seen in the perspective of the entire history of computer-aided design. The major milestone of this progress was the development of the system of research known as BUILD, and the commercial supplement of the system, known as Romulus (Siu and Tan 41) This system influenced the development of ACIS, Parasolid, and later solid modeling system. One of the very first developers of computer aided design ASCON, started the internal improvement of its individual solid modeler back in 1990’s (Siu and Tan 42). In 2012, the scientific division of the ASCON turned into a separate corporation and was called C3D labs (Siu and Tan 42). It was given the duty of creating the C3D modeling system as a separate product. Other significant contributions originated from Mà ¤ntylà ¤, particularly his GWB, as well as from GPM project that brought about hybrid modeling systems in the early 1980’s (Siu and Tan 43). It was during this time that the pr ogramming concept of solid modeling known as PLaSM was invented at Rome University. The discovery of 3D CAD/CAM, however, is attributed to Pierre Bezier, a French engineer (Siu and Tan 44). In the period between 1967 and 1968, he came up with UNISURF after his mathematical study about surfaces. This invention was meant to ease the process of designing tools and parts of the automotive engineering. Later, UNISURF developed into the working foundation for the subsequent generation of computer-aided design software. Another influential happening in the development of solid modeling was the establishment of Manufacturing and Consulting Services in 1971 (Li et al. 23). Dr. Hanratty founded this MCS. As computers progressively became more affordable, there has been a gradual expansion of the application areas. The development of

Monday, November 18, 2019

Total computer Inc Case Study Example | Topics and Well Written Essays - 250 words

Total computer Inc - Case Study Example Although he states that the money indicated is correct, he does not state the exact money. For this confirmation to be used in editing additional information from documents that show that the transaction took place such as cash receipts and delivery documents. In the last example, the auditor did not receive a confirmation response by email. This necessitated the undertaking of additional procedures such as examination of cash receipts and the contract between Total Computer Inc and Dot. Bomb Inc. These additional procedures helped in arranging for payments and correcting procedural issues where there was a violation of the contract between these two companies. When dealing with account receivable balances, examination of the well stated confirmation records are adequate for auditing. However, in cases where the auditor is not in a position to get the confirmation messages, additional procedures can be carried out. These are documents that indicate the existence of the transaction or the assertion. This ranges from cash receipts, shipping documentation and others that show that the transaction took

Friday, November 15, 2019

The Geometric Arrangement Of Computer Systems

The Geometric Arrangement Of Computer Systems A network often simply referred to as computer network, is a collection of computers and devices connected by communications channels. Computers on a network are sometimes called nodes. In information technology network is series of points or nodes interconnected by communication paths. These communication channels facilitate communications among users and allow users to share resources with other users. Networks may be classified according to a wide variety of characteristics. Topology : The geometric arrangement of a computer system. The most common topology or general configurations of networks include the: Bus topology Star topology Token ring topology Networks can also be characterized in terms of spatial distance: A group of two or more computer systems linked together. There are many types of computer networks, including: Local-area networks (LANs): In this type of network the computers linked within the organization. Wide-area networks (WANs) : The computers are farther apart and are connected by different communication channels. Metropolitan-area networks MANs): A data network designed for a town or city. Campus-area networks (CANs): The computers are within a limited geographic area. Egg: campus Home-area networks (HANs): A network contained within a users home that connects a persons digital devices. Internet Protocols: Before going to Internet protocols first we have to know about the protocol. Protocol : The protocol defines a common set of rules and signals that computers on the network use to communicate. The Internet Protocol (IP) is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP. The Internet Protocol is responsible for addressing hosts and routing datagram (packets) from a source host to the destination host across one or more IP networks. The sending of packets from source to destination is performed based on two types of networks: These networks include: Wired network: A wired network is a physical system that allows multiple computers communicate with each other. Wired networking is usually accomplished by using cables and other hardware to connect one computer to another. Once a wired home network has been installed, users within the network can share computer files and documents as well as printers and scanners. In This network the packets are transferred by using TCP/IP. Wireless network: Connecting one computer to another computer is called network. We are connecting these computers to transfer packets from source to destination. But we are using wireless network, instead of cables we are using radio waves to transfer these packets by using UDP (User Datagram packet). TCP/IP Architecture: Internet protocol suite which standardized for the entire networking environment describes specific rule guidelines for communication strategy. This protocol architecture deals with communication between source and destination which means how the data should be formatted, how the packets should identify the address of the receiver and how the packets are transmitted from source to destination. In this TCP/IP architecture the data should be transferred in the form of packets from source to destination. The transmission of packets starts from source and these packets transmits through different types of layers and finally it reaches the destination. In this architecture there are 4different layers, each layer performs its own functionality to reach destination. In this architecture each layer sends the information to the lower layer to process the functionality of that layer, after completion of processing the information passed to lower layer and so on. This process repeats till the packet should reach the destination. The 4 different layers of TCP/IP protocol architecture and each layer is described below: Application Layer: This layer provides the some functionality to perform different services of the lower layers. And this layer provides different protocols for the purpose of exchanging data between different layers. The protocols which are defined by application layer are known as application protocols and these are used to exchange the information: There are different protocols used in application layer are described as follows: The Hypertext Transfer Protocol (HTTP): This protocol used in application layer which is used to perform the transmission of files among the network. The File Transfer Protocol (FTP): It is also one protocol used in application layer to perform the transmission of interactive files. The Simple Mail Transfer Protocol (SMTP) by using this protocol the transmission of mail messages and file attachments are done. The functionality of application layer similar to the functionalities of OSI Application, Presentation Layer and Session Layer. Transport Layer This is the second layer of TCP/IP protocol architecture. This Transport layer deals with Transmission Control Protocol (TCP).This protocol is used to know the status of packet transmission whether it reached the exact destination or not. Before reaching the destination it performs the error checking which means it is in the right order or not. Network Layer This is the one of the important layer of TCP/IP protocol architecture. In this layer it deals with the Internet protocol (IP).The communication of these layers should be done by using this protocol. Network Access Layer The network access layer is the combination of Data link layer and physical layer. The Data link layer deals with the transmission of data packets across the architecture. This Data link layer provides different functionalities like formatting the data in packets, error detection and the flow of data from source to destination. And coming to physical layer deals with the physical medium such as voltage levels, connector types and handshake procedures. TCP/IP Protocol Layers Chapter 2 In chapter 1, I have mainly discussed about the VoIP and brief structure of dissertation. This chapter helps in understanding the VoIP system, key components, and protocols. It is good to understand the concepts and the technology when working on a new system. 2.1 Overview The generations have changed, so the way of communicating to your family, friends has changed. Not only quality is a concern but low cost is also an important factor for making calls. These are the few things which brought a lot of research work for Voice over internet protocol (VoIP). VoIP is a way sending voice packet over the internet. VoIP not only provides cheap calls but also provides better quality than before. 2.2 What is VoIP? VoIP is one of greatest invention in human kind; it basically allows transmission of human voice in the form of digital packet over a network. It is in demand due to lower call rates, implementation on a existing network, better quality than before. Many people, organisations have been consistently working on this technology to get a better performance of the service. This technology could be also implemented in a local area network. The process involves compressing and digitization of voice and transforming into Internet Protocol packets and sending the format over network. This is the process which is known as Voice over Internet Protocol (VoIP). [4] 2.3 VoIP History Computer to Computer calling begin in Israel in 1995 by vocaltech Software by name internet phone. This software was designed and used to make Voice calls [8]. The whole system consists of basic things such as speakers, modem, and sound cards. The voice signals were digitized, turned into voice packets, so that they could be travelled over the network and in the end, packets would be shifted back into voice signals. The overall quality was not at all good and not even near traditional phone calls. But still it is considered as a major milestone as it was birth of new technology. The designed software had to be installed on both systems (caller and receiver) to process the voice call. Therefore it was the birth of first IP phone. Later after few years in 1998, number of private companies, organisation started working and using this technology more effectively. It is valuable assets as it is due to provide cheap long distance calls, avoid high charges with traditional phone system. These companies were able to design and organize VoIP doors on the internet, which would allow cheaper calls through Computer to Computer and also from regular phone to phone. This enhancement brought more awareness of the technology, market profits among private organisation and investors. However on the other side general people were unknown with the technology due non availability of high speed internet connection in most of the areas. This was one of the main reasons that it couldnt get popular quickly. Enterprises, small organisation already started using the benefits of VoIP; communication with voice across the networks was deployed and used. As time passed more standards and protocols were introduced for better quality as VoI P in beginning stages was not a good quality [4]. In initially stages when it was introduced, it was not considered as a potential technology. In some parts of North America it was offered free, which allowed free phone calls using regular phone. Though it was not considered potential technology, it was slowly getting popular and accepted in various areas such as enterprises, general public. Finally it was a well known model by 1998, where VoIP was used about 1% of voice traffic and in just two years of time by the year 2000, it was used over 3 % of traffic. This growth was mainly due improvement in the system. [10]. VoIP is rapidly growing year by year. It is likely to reach around 300 million users of VoIP around the world. 2.4 Protocols A protocol can be defined as a combination or set of rules. These are necessary for data transmission by two or more computers over a network. These protocols determine data compression, acknowledgements, and error checking methods. [12] 2.4.1 Internet Protocol Internet protocol is the primary network protocol used across the network. By using this protocol the packets are sent across the network.It is a connectionless protocol which means each packet is travelling in the network is independent and is not related to any other unit. The connection oriented protocol transmission control protocol (TCP) handles all the packets. 2.4.2 H.323 The H.323 is one of the two important protocols used in VoIP. H.323 protocol is a standard designed by international telecommunications union (ITU), which sets rules for multimedia applications across the network. It is used for sending audio, data packets, and video over IP network, which basically means providing real time multimedia applications. It behaves as real time protocol and also non real time protocol. [6]. Most of the ITU-T terminal recommendations provide only terminals. However H.323 provides various components along with terminals on a network [13]. They are gateway, gatekeepers, and multiple control units. These components provide point to point/multipoint multimedia communications, when connected together. Below is the figure of H.323 architecture Figure: 1 H.323 architecture Ref [13] 2.4.2.1 H.323 terminal The H.323 terminal is also known as client; usually it is a computer or internet phone with H.323 client. The H.323 terminal gives real time bidirectional video, voice, data interactions. H.225.0 is used to specify call signalling, packetization, synchronizations. On the other side H.245 is used to specify messages for opening and closing logical connections beside other commands [14]. 2.4.2.2 Gate keeper Gatekeeper supports address translation and other access control for H.323 standards. H.323 is the standard that points the system; this protocol provides different types of services such as voice, video and packet transmission. A gatekeeper acts as routing manager, which is responsible for all end nodes in a particular area. [11] 2.4.2.3 Gateway Gateway is a part of the VoIP system, which is used to modify audio and fax call in real time. Mainly it works between internet and plain old telephone system as a converter. This IP telephony gateway converts analogy signal into internet data packets and sends data as a regular data packet over a network. Once the packet is received on the receiver end, it is re converted into analogy voice signal. It allows regular telephone calls to be achieved through the internet and provides communication between Private Branch Exchange (PBX) and internet.[15] 2.4.2.4 Multi Point Control Units Multipoint Control Unit (MCU) acts as a multipoint conference to establish a connection among three or more devices and gateways. It is usually integrated with a client , gateway. There are two elements associated to MCU, one is multipoint controller and second is multipoint processor. In this multipoint conferencing, two types of stages involved, centralized and decentralized. Centralized multipoint mode provides direct communication of H.323 devices to MCU in P2P method. Multipoint controller is used in a point to point call way and moreover it is also used to check if it has to multi cast or uncast the information such as audio and video. In the other mode decentralized multipoint, multicast method is used to transfer all data to other devices. The multi point control unit checks the readiness of all devices and sends different data streams [16]. 2.4.3 SIP It is a protocol used for modifying, terminating, establishing sessions over a network. It is also called as signalling protocol and mainly used for internet telephony VoIP calls. It is designed by the internet engineering task force (IETF) for real time transmission. There are different components in SIP.SIP is less weight than H.323 and moreover when it comes to flexibility, it is more flexible [17]. It can also used for video, audio, multimedia sessions. It is more popular and being adopted more due to more flexibility than H.323. The structure of SIP is same as of Hyper Text Transport Protocol (HTTP); it follows the client server model [18] 2.4.3.1 Main Components involved in SIP User Agent User Agent works as logical entity at SIP end station software. It acts as client when initialising session requests and acts as server when replying to a session request. It has the capabilities of initiating and answering calls. It also has the ability to save and manage call state that is why it is known as intelligent [4]. Proxy Server They are used as computers and requests are forwarded by them on the behalf of other computers. They are one kind of intermediate server, forwarding requests from the user to SIP server [4]. Figure: 2 an example of proxy server Ref [4] Redirect Server It is a second type of intermediate server. The main responsibilities of this server is to give name resolution and user location. It simply gives the information needed to start the originating client. Once it has been done, it is no more involved in the process [4] Registrar Server Registrar Server is a server that is used to register the location information from the user agent and saves the registration information. This sort of concept creates a directory for all logged and also specifies their location.[4] 2.5 QOS QOS is Quality of Service refers to the capability of a network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and IP-routed networks that may use any or all of these underlying technologies. The primary goal of Qos is to provide priority including dedicated bandwidth of service is most important part for any multimedia application. It is more considered in a private network such as connection of multiple offices than on worldwide internet. Initially, internet was known for sending email and file. However it is more than just sending files, now it has real time applications such as video, gaming, internet telephony. As the VoIP technology has evolved so much, there is more need for better Qos. Below table provides a list of Qos parameters [19]: For a successful VoIP deployment, Qos is an important tool. Bandwidth is one of important factor in VoIP, if enough bandwidth is provided; the voice quality will be more than just satisfied. This is the reason services in organisation doesnt need planned QOS as they have enough bandwidth. A successful VoIP deployment requires a careful examination and network assessment, as well as a system to measure and monitor the system in order to benefit from the cost savings, flexibility and functionality VoIP offers. There are five areas to consider when planning a VoIP deployment: Make sure the network can handle VoIP. Keep the deployment simple. Create network service maps and update service-level agreements. Consider QoE. Quality of experience (QoE) . Review, reassess and repeat. However as the network grows such as internet, more complications, issues arise as there are multiple services to be handled, several areas are to be covered, security is concerned. The aim is quite simple, IP telephony must meet the requirements of a user, which means voice quality should be similar to that of PSTN in such a way to retain same standards and satisfy the user expectations. When the voice signals are transmitted over the network, the data is divided into packets and transmitted across the network through network elements such as routers, switches. In this process to achieve better results, Qos is to be followed which would give importance to real time application over non real time applications.[20]. The main factors network analysis are mainly delay, jitter (variation in delay), and packet loss. Packet Loss: One of the very important factors in VoIP Qos is packet loss. This generally occurs when the packet is dropped during peak loads and congestion. This happens as VoIP packets are very sensitive of voice transmission. The main reason or largest cause of a packet loss is a packed being dropped due to overload in the network. This is the main factor which can significantly affect VoIP quality [22] Delay Delay is the key performance of QoS , which is needed to be reduced . End to end delay is the duration taken by a analog signal to transmit from the sender to receiver. Delay does not produce noise , however it affects the quality of conversation. When the delay reaches about 250ms, the telephonic conversation observes its impact. Between 300 ms and 500 ms the talk gets slightly difficult. Finally if it reaches above 500 ms makes an impossible communication. In VoIP the delay could be anywhere between 50 to 100 ms , however in POTS , the delay is generally under 10 ms.[22] Jitter Delay Variation sometimes also known as Jitter is the variation in packet delay. It is mainly the difference value between the delay of two consequent voice packets. In the internet terminology they can explained in a simple manner , if the packet n has delayed highly then chances are high for the packet n+1 also[21]. To reduce the delay between two queuing packets, a jitter buffer is used. This buffer stores arriving packets temporarily in order to reduce the difference value between two packets. For some reason, if the packets are delayed then it simply discards the packet. The acceptable value considered for jitter is between 0ms and 50ms and anything above this is not acceptable [18] done Techniques for jitter absorption 1. same playout time is set for all packets for whole session or for the duration of one session. 2. The second technique involves adaptive adjustment of the playout time during silence period related to present network. This technique is also called as talkspurts adjustment. 3. This technique is also known as within talkspurts adjustment. In this method constantly adapting the playout time for each packet, which needs the scaling of voice packets [15] 2.6 Initial VoIP Study and Design There are various real time applications running on internet, such as calling over PC, Video and voice. When deploying these services across networks, there are many difficulties and issues are faced. Some of them are directly related to QoS ; is the network capable of handling the new application and whether there will be any negative impact on existing services in the network. For real time application such as VoIP, which uses UDP as transport layer protocol, QoS is not guaranteed. Researchers are always working on these issues depending upon the real time application. In order to achieve good results, a good policy , QoS should be implemented. There are many things to be considered to give a high standard service. To begin packetization , delay , network design are few things to establish QoS.[7] However other things are signalling protocol , security, bandwidth, power failures. Certainly there are numerous methods available to achieve QoS. But it is really important to understand and estimate the requirement of this QoS by a particular system. Sometimes it is noticed by the engineers that spending on the network parameters is less than on QoS. As a result, it is important thing to consider before deploying, whether to design a QoS or not. 2.7 Components of VoIP Below figure gives an end to end VoIP system Components from sending point to receiving point. As seen in the figure the different components involved are encoder, packetizer, playback buffer, depacketizer , decoder. Voice is in the form of analog , which moves along the time , which usually is limited within 4kHz. Bandwidth [18]. The analog or audio signal is first converted into samples , which is a digital signal , which is then transmitted across the network [17]. Next to encoder it is packetizer , which encapsulates the digital samples into packets along with real time protocol (RTP),User Datagram Protocol(UDP),IP and Ethernet headers. Finally the digital packet moves into the network and passes through playback buffer. Playback buffer mainly used to absorb any kind of changes, delay. In final stages the packet enters depacketizer and then decoder which convert the digital signal into analog signal. Fig 3: source Assessing the Quality of Voice Communications Over Internet Backbones [17 ]. 2.8 CODEC A codec is software that converts analog signal into digital bits and transmits them as data across the network. These Codecs use high level methods for coding [12]. Table 2 : 2.9 Performance related QoS parameters. One of the most important metrics for QoS in VoIP is bandwidth. It plays an important role as the voice channels rely on the present bandwidth. Apart from this constraint, there are other important factors which also decide the quality of calls; they are loss of packets, delay and other variations. End to End delay It can be explained as the duration taken by the information to pass from the speaker or caller to the receiver. VoIP requires real time traffic transmission across the network and this transmission end-to-end delay is most important factor to decide QoS. ITU-T suggests that end-to-end delay should be less than 150ms for a high quality conversation [12] Bandwidth The bandwidth required to make a single call in one way is 64kbps. If the call is using G.711, the codec samples 20ms of voice for each packet. We need 50 packets to send per second. In addition to this packet, other headers of protocols are also added. They are real time protocol, user datagram protocol, internet protocol and Ethernet. In the end 226 bytes must be transmitted 50 times per sec. This value is only for one way. The total required bandwidth for each call is 100pps for both directions [19]. Call Distribution One of the very important factor before planning or designing is the calculation of internal and external calls. The call usage statistics plays an important role in VoIP deployment. The statistics would give a clear picture of nature of call, time, duration, peak time. In order to achieve best QoS , always a worst scenario should be considered. Like, busiest call transmitting time should be considered of the month. This would make sure that all other calls are provided with well planned QoS. 2.10 Advantages and Disadvantages There are many advantages associated with VoIP, especially when compared to PSTN it gives various benefits. The good thing about this technology is that it is not only beneficial to small and large enterprises but also for residential users. Low cost Most of the VoIP companies provide low calling cost for distant places, which are almost same as local call. Only condition is that the user must have broadband connection to use the VoIP service. Now a days most of the places such as homes, offices are equipped with internet connection. This is the main advantage with VoIP technology, as it does not need a completely new system to make cheaper calls. In some situations the calling cost will be absolutely free, even though the call will be an international call. Lets take the scenario where the user is using his or her computer connected with internet. In this process the user just needs software installed on the computer and also at the receiver end, software must be installed. The entire conversation between these two computers is free of cost. Multimedia Applications Apart from regular international calls VoIP service also provides unified messaging, real time applications such as audio and video conferencing, e-learning and other entertainment applications. VoIP has brought number of new things in the internet world. Corporate benefits VoIP, or Voice over Internet Protocol, is rapidly becoming a top choice for people wishing to avoid costly telephone service. For this reason it became more popular. The following are three top reasons for using VoIP. The reasons are Huge savings Options Its Not Going Anywhere VoIP calling can significantly remove all international charges for companies making distant calls overseas. These savings can be also included when calls are made within the organisations. But when it comes to international calling more savings are achieved. Especially for companies with data networks have an edge over the technology. With recent improvement in VoIP quality, call can be compared to PSTN and used as regular method of calling. Disadvantages However, there are still some disadvantages of VOIP especially when it comes to using the technology for functions beyond the one caller to one caller scenario. one of the disadvantage is If multiple users need to make VOIP calls, it can be difficult for the company to know exactly how much bandwidth to provide especially if internet access, video conferencing or other data transmission services are using the same path. Broadband connection A high speed internet service is necessary to run VoIP service; it is applicable for both enterprises and residential. If the internet speed is low, then quality of VoIP may degrade. Power outage One of the major drawbacks of VoIP is disconnection of service in power outage. Whereas PSTN works even when there is power outage. Comparatively PSTN is more reliable in such situation. However this situation can be controlled in VoIP by using generators to provide power. Chapter -3 Literature Review Related Work In order to provide more security the usage of VOIP network deployment is increased. Because of low price calls most of the enterprises uses network, it causes network congestion. To avoid network congestion we preferred VOIP network deployment system. After many researches, VOIP is issued in both wire and wireless. The demand of VOIP service has increased because of its security, performance, quality of service (QOS) and network infrastructure enhancement. This chapter mainly focused on research papers on VOIP deployment and present reviews of performance and quality of service (QOS) measurements. 3.1 VoIP Network Securities In general there are always problem with network attacks like denial of service, worms, network attacks which can be made by man and etc. similarly VOIP system can also faces the attacking problems and degrade the performance of voice services. Here we need to prefer intruder detection system which can handle the network oriented attacks efficiently. Even we will get attacks like spams on the mailing system. The main aim of denial of service is to interrupt the services from resources by making them unavailable to the user. Multi-Layered VoIP Security Because of threats attacks the quality of voice will be degrade, it causes the service useless. Denial of service and distributed denial of service attaches degrades the quality of voice. VoIP service introducing the greatest achievement by providing security in communication by control (signaling) and content (voice) parallel channels which together form the VoIP service. The attacks damage the whole service useless. 3.2 VoIP network Performance In communication world , a lot of research work is going on to evaluate VoIP performance by analyzing different inputs such as traffic, packet delivery time, receiving time, jitter and network congestion. In the reference [4], the author designed a network model using computer simulation. This research explains the network performance in respect to various available links and network. The VoIP performance review shows the loss patterns in terms of packet loss, delay time and network congestion, it measures the delay and loss characteristics. Kostas [5] deliberated the VoIP performance on different networks and they discuss the delay and loss measurement characteristics, they discuss founded on round trip delay measurements. The quality results can be seen with the delay and packet loss. 3.3 VoIP Quality of Services VoIP services are gradually adapting in to new level of services and used by different sectors. Currently there are some challenges for this technology. Anyone providing VoIP services should be able to achieve certain standards and quality of the service should satisfy the user. The availability of QoS is an important factor for the end users. Therefore understanding the issues related to QoS is one of the important factor , QoS parameters should be properly analysed and if any loop hole is found , it should be accordingly rectified. Cole et al. [6] propose a quality measurement method by studying the review on E-Model [7] by measuring the quintiles of delay and loss. Markopoulou et al. [8] employs subject quality measures to review internet backbone ability, this work is based on packet tracer which are able to present overall quality of VoIP. In this

Wednesday, November 13, 2019

Wireless Internet :: Essays Papers

Wireless Internet By 2004, the wireless subscriber base worldwide is expected to reach 1.4 billion users, and approximately 300 million users will be accessing the Internet from some form of wireless appliance. The race is on, and Nortel Networks have first-mover advantage. Nortel Networks already demonstrated wireless applications at speeds more than 25 times faster than today's industry standard. Recently, Herschel Shosteck Associates ranked Nortel Networks first in Wireless Internet infrastructure strategy, and The Yankee Group ranked Nortel Networks first in next-generation Wireless Internet architecture. More than 75 percent of North American and 50 percent of European backbone Internet traffic travels across Nortel optical networking equipment. Now Nortel Networks helping service providers deliver the unconstrained access and high bandwidth multimedia content second Wave of eBusiness customers demand. Nortel Networks 3G (Third Generation) networks provide wireless operators with faster time-to-market and greater profitability. Nortel Networks solutions offer clear migration paths, allowing service providers to leverage their existing network investments while upgrading. And they work collaboratively with Nortel Networks customers, achieving the fastest time-to-market possible. Wireless Internet gives emerging wireless service providers a powerful opportunity to differentiate themselves from their competition based on the ability to rapidly create and deliver profitable next-generation Wireless Internet services while maximizing the efficiency of their networks. Wireless Internet brings value to service providers by: Helping generate profits, quickly. Reducing the time required to design and deploy new Wireless Internet services. It’s enabling new revenues quickly and assuring a positive return on their network investment. Wireless Internet also improving performance, at reduced costs by facilitating the fast identification and repair of network faults, the proactive optimization of network performance, and the acceleration of the service-provisioning process. Nortel Networks also Evolving and growing with service providers' needs by supporting multiple wireless network technologies, spanning multiple wireless-network generations, and building cr oss-domain management capabilities on a single, scalable, and open platform. Nortel Networks' state-of-the-art DMS-100 Wireless product is a multi-functional switching system that integrates the industry's most respected DMS-100/200 (local/toll) wireline and DMS Mobile Telephone Exchange (MTX) digital wireless switching systems onto a single hardware platform. The DMS-100 Wireless offers a flexible and cost effective way for a service provider to establish a single point of presence in both traditional wireline and wireless markets, as well as new data and internet telephony markets. And, by delivering new integrated customer services such as a single voice mail box, one number capabilities, and feature transparency, service providers can pursue new revenue opportunities, increase customer satisfaction, and establish a market presence as a technology leader.