VoIP - What is the Problem?

Written by E. B. Randall

Continued from page 1

For most this is not an issue when they have high speed internet access, however, it can become a problem with satellite links or any other system where unusually long distances and many hops are involved.

On private networks, there is rarely a problem using VoIP and many companies with internal networks (such as telcos and power companies) use VoIP to communicate within their organizational network structure.

However, whenrepparttar available end-to-end bandwidth is less than 256 Kbps, a good VoIP system will require mechanisms to overcome fragmentation ofrepparttar 143579 data stream.

Security is an issue everywhere onrepparttar 143580 internet and what this means is that VoIP also needs to deal with firewalls and NATs (Network Address Translation). While some systems can do NAT and firewall traversal on their own, others requirerepparttar 143581 use of SBCs (Session Border Controllers) to managerepparttar 143582 traversal.

One major, though non-technical, challenge to VoIP, comes from traditional telephone service providers who are being by-passed by consumers who loverepparttar 143583 extremely low (or zero) long-distance charges they can get by using VoIP. Exactly how this works out overrepparttar 143584 long run will be fascinating to watch. Inrepparttar 143585 meantime, VoIP services are continually being improved and extended. Enjoy them.

For more on VoIP, conference calling, web conferencing and more visit http://www.AltaGlobal.com. Find more on wireless and cellular subjects at http://www.AltaGlobal.org. For networking and security check

Mobile devices security

Written by Mike Ber

Continued from page 1

Almost atrepparttar same time withrepparttar 143265 appearance ofrepparttar 143266 first Trojan for PDAs,repparttar 143267 first virus to affect cell phones has also arrived. This worm is called “Cabir”, and it has been spotted by some security specialists who issued an alert concerningrepparttar 143268 danger. Cabir spreads using a file named “Caribe.sis” and travels across devices working withrepparttar 143269 Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showingrepparttar 143270 text message "Caribe". After thatrepparttar 143271 worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also,repparttar 143272 battery’s life ofrepparttar 143273 infected device is harshly reduced during this process. The inventors of Cabir did not designrepparttar 143274 worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowingrepparttar 143275 Caribe package requires pressing a button priorrepparttar 143276 files can be loaded intorepparttar 143277 receiving phone.

It was predictable that viruses and worms for cell phones and PDAs would appear. This isrepparttar 143278 end result ofrepparttar 143279 impressive advances made in mobile communication technology inrepparttar 143280 past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached torepparttar 143281 new devices. The encryption technology expands to mobile devicesrepparttar 143282 identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access torepparttar 143283 data stored withinrepparttar 143284 device, which is either lost or stolen.

Mike Ber is the owner of the Canadian Domain Name Portal called www.Every.ca He is also a contributing author to www.ComputerMagazine.ca, www.Developer.ca, and www.XP.ca

    <Back to Page 1
ImproveHomeLife.com © 2005
Terms of Use