SlideShare a Scribd company logo
Deepanshu Dogra
Roll No- MCA/25011/21
Subject: Data Communication and
Computer Networks
Internet Telephony
Internet Telephony is a powerful and economical
communication option by combination of the
telephone network and data networks.
Internet telephony uses internet to send audio
between two or more computers users in the real
time.
Advantages of Internet Telephony:
• Full scalability and flexibility: The best Internet Telephony
solutions are hosted in the cloud, so there’s no need for the
customer to buy, install and maintain expensive on-premise
platforms.
• Lower costs: Typically, IP Telephony is more cost-efficient than
traditional landline and mobile telephony. With a cloud
telephony solution, internal calls within an organization are
completely free of charge.
• Seamless accessibility and portability: Users can access their
Internet Telephony services from anywhere and from any
device as long as they have an Internet connection
• Advanced features: With Internet Telephony, voice and data
are transported over the same network, making new services
possible such as high quality video calls.
• Excellent voice quality: IP Telephony has come a long way
since it was first introduced in the 1990s. As long as the user
has a fast and stable Internet connection with good
bandwidth, VoIP calls should experience no latency issues or
interruptions.
Disadvantages of Internet Telephony
• Reliable Internet Connection Required: The overall quality of
the call depends on the speed of the internet connection.
• Latency and Jitter: When communicating online each message
is broken into bits of data called “data packets.” These packets
are then reassembled at their intended destination to create
the original message. Latency and jitter are when these data
packets either hit delays in transmission or get improperly
re-assembled.
• Limited Location Tracking for Emergency Calls: Location
tracking is the final con of VoIP. Because of VoIP’s portability
and accessibility, it’s difficult for third parties to pinpoint
where a call originates.
Generations of Internet Telephony:
• First Generation: Introduction to enable voice conversations
user with telephony software-equipped-computers.
• Second generation: It overcomes the difficulties by mapping
IP Addresses.
• Third Generation: Internet telephony starts to receive serious
attention. Gateways were introduced that provide a two way
interface between the PSTN( public switched telephone
network) and internet.
Ideal Internet Telephony
• High Volume call processing between private and public
networks.
• High Volume real-time translation between IP and switched
networks.
• Economic scalability.
• Broad acceptance and implementations of standards
Thank you

More Related Content

Similar to DEEPANSHU_PPT.pptx

Future of voip- karan singh cypher
Future of voip- karan singh cypherFuture of voip- karan singh cypher
Future of voip- karan singh cypher
Karan Maker
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
Fringe Division
 
5G PPT
5G PPT5G PPT
5G PPT
Sharon Moses
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
Tara Hardin
 
18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docx18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docx
Veenask6
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
Deevena Dayaal
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
Masuma Akhatar
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
Himanshu Pathak
 
5g
5g5g
Mis 5
Mis 5Mis 5
Voice over ip
Voice over ipVoice over ip
Voice over ip
SHUBHAM MORGAONKAR
 
5 g (fifth gen.)
5 g (fifth gen.)5 g (fifth gen.)
5 g (fifth gen.)
guru shankar
 
Chapter Two.pdf
Chapter Two.pdfChapter Two.pdf
Chapter Two.pdf
MamushLeta
 
LECTURE 1-Introduction to mobile communication systems.pptx
LECTURE 1-Introduction to mobile communication systems.pptxLECTURE 1-Introduction to mobile communication systems.pptx
LECTURE 1-Introduction to mobile communication systems.pptx
AOmaAli
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3
Vishnu M Dinesan
 
N4Less18.ppt
N4Less18.pptN4Less18.ppt
N4Less18.ppt
ssuser1facb81
 

Similar to DEEPANSHU_PPT.pptx (20)

Future of voip- karan singh cypher
Future of voip- karan singh cypherFuture of voip- karan singh cypher
Future of voip- karan singh cypher
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
5G PPT
5G PPT5G PPT
5G PPT
 
VoIP
VoIPVoIP
VoIP
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
 
18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docx18ec743-Multimedia_Communications_UNIT_I.docx
18ec743-Multimedia_Communications_UNIT_I.docx
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
 
5g
5g5g
5g
 
Mis 5
Mis 5Mis 5
Mis 5
 
Voice over ip
Voice over ipVoice over ip
Voice over ip
 
4 g
4 g4 g
4 g
 
5 g (fifth gen.)
5 g (fifth gen.)5 g (fifth gen.)
5 g (fifth gen.)
 
Chapter Two.pdf
Chapter Two.pdfChapter Two.pdf
Chapter Two.pdf
 
1 2 3 4 5 g
1 2 3 4 5 g1 2 3 4 5 g
1 2 3 4 5 g
 
LECTURE 1-Introduction to mobile communication systems.pptx
LECTURE 1-Introduction to mobile communication systems.pptxLECTURE 1-Introduction to mobile communication systems.pptx
LECTURE 1-Introduction to mobile communication systems.pptx
 
VOIP
VOIPVOIP
VOIP
 
Voice over internet protocol (voip)3
Voice over internet protocol      (voip)3Voice over internet protocol      (voip)3
Voice over internet protocol (voip)3
 
N4Less18.ppt
N4Less18.pptN4Less18.ppt
N4Less18.ppt
 

More from VivekRajawat9

Communication
CommunicationCommunication
Communication
VivekRajawat9
 
Generating Test Cases
Generating Test CasesGenerating Test Cases
Generating Test Cases
VivekRajawat9
 
5g Cellular Wireless Network.pptx
5g Cellular Wireless Network.pptx5g Cellular Wireless Network.pptx
5g Cellular Wireless Network.pptx
VivekRajawat9
 
World Series Problem
World Series ProblemWorld Series Problem
World Series Problem
VivekRajawat9
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operations
VivekRajawat9
 
Architecture Security in VANET
Architecture Security in VANET Architecture Security in VANET
Architecture Security in VANET
VivekRajawat9
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
VivekRajawat9
 

More from VivekRajawat9 (7)

Communication
CommunicationCommunication
Communication
 
Generating Test Cases
Generating Test CasesGenerating Test Cases
Generating Test Cases
 
5g Cellular Wireless Network.pptx
5g Cellular Wireless Network.pptx5g Cellular Wireless Network.pptx
5g Cellular Wireless Network.pptx
 
World Series Problem
World Series ProblemWorld Series Problem
World Series Problem
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operations
 
Architecture Security in VANET
Architecture Security in VANET Architecture Security in VANET
Architecture Security in VANET
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

DEEPANSHU_PPT.pptx

  • 1. Deepanshu Dogra Roll No- MCA/25011/21 Subject: Data Communication and Computer Networks
  • 2. Internet Telephony Internet Telephony is a powerful and economical communication option by combination of the telephone network and data networks. Internet telephony uses internet to send audio between two or more computers users in the real time.
  • 3. Advantages of Internet Telephony: • Full scalability and flexibility: The best Internet Telephony solutions are hosted in the cloud, so there’s no need for the customer to buy, install and maintain expensive on-premise platforms. • Lower costs: Typically, IP Telephony is more cost-efficient than traditional landline and mobile telephony. With a cloud telephony solution, internal calls within an organization are completely free of charge. • Seamless accessibility and portability: Users can access their Internet Telephony services from anywhere and from any device as long as they have an Internet connection
  • 4. • Advanced features: With Internet Telephony, voice and data are transported over the same network, making new services possible such as high quality video calls. • Excellent voice quality: IP Telephony has come a long way since it was first introduced in the 1990s. As long as the user has a fast and stable Internet connection with good bandwidth, VoIP calls should experience no latency issues or interruptions.
  • 5. Disadvantages of Internet Telephony • Reliable Internet Connection Required: The overall quality of the call depends on the speed of the internet connection. • Latency and Jitter: When communicating online each message is broken into bits of data called “data packets.” These packets are then reassembled at their intended destination to create the original message. Latency and jitter are when these data packets either hit delays in transmission or get improperly re-assembled.
  • 6. • Limited Location Tracking for Emergency Calls: Location tracking is the final con of VoIP. Because of VoIP’s portability and accessibility, it’s difficult for third parties to pinpoint where a call originates.
  • 7. Generations of Internet Telephony: • First Generation: Introduction to enable voice conversations user with telephony software-equipped-computers. • Second generation: It overcomes the difficulties by mapping IP Addresses. • Third Generation: Internet telephony starts to receive serious attention. Gateways were introduced that provide a two way interface between the PSTN( public switched telephone network) and internet.
  • 8. Ideal Internet Telephony • High Volume call processing between private and public networks. • High Volume real-time translation between IP and switched networks. • Economic scalability. • Broad acceptance and implementations of standards