Voip HelpDesk
Monday, November 27, 2006
Why are Speakeasy VoIP + Broadband better together?
The answer is crystal clear...

Free worldwide calling - Speakeasy digital phone service (VoIP) includes local calling and free unlimited long distance calling to the continental U.S. and 22 countries worldwide.*

Crystal-clear calls - Unlike other VoIP providers, Speakeasy carries both digital voice service and broadband over one nationwide private network. This keeps your calls secure and enables VQ Technology (voice call prioritization) to deliver crystal-clear call quality. Speakeasy VoIP requires a Speakeasy broadband connection.

Easy to use - You don't have to be a tech-head to enjoy the benefits of VoIP. Simply connect your existing telephone to a Speakeasy-provided adapter for fast and easy setup. Enhanced productivity features can be managed from any location with our user-friendly online Communications Center (web portal).

Support that's truly supportive - With a single provider, there's no finger pointing between vendors. Plus Speakeasy delivers dedicated support, which means the person who answers your call solves your problem - no passing the buck.

When you combine Home VoIP + OneLink DSL, you free yourself from the phone company and get one predictable affordable bill for your internet connection, and your local and long-distance phone service.
posted by suzzee @ 11:11 AM   0 comments
Wednesday, November 22, 2006
VoIP : Is It Secure?
VoIP quality and reliability problems have largely been overcome, but security remains a real issue. As the Internet has shown, a flexible, open, digital communications platform attracts parasites.

It's only a matter of time before we see voice spam on VoIP systems, along with viruses, worms, and security breaches. Any business looking at VoIP systems should carefully assess its security needs and ensure that vendors can meet them. It should look at securing its VoIP infrastructure the same way it secures its intranet, e-mail system, and corporate databases.

There is no technical reason why VoIP systems can't be as good as, and probably better than, conventional phone systems in these areas. Skype, for example, encrypts every call end to end, providing more privacy than any traditional phone company. The potential security threats to VoIP are real but are no more worrisome than the security issues that are an accepted part of using the Internet in business. Companies simply need to appreciate that VoIP makes their phone systems part of the IT infrastructure, rather than a black box they trust a phone company to secure and manage.

Though VoIP's biggest payoffs will accrue to those who deploy it strategically, there are several approaches for test-driving the technology without betting the farm.

Follow the upgrade cycle. Many companies are deploying VoIP today because their phone systems are becoming obsolete. Companies should therefore look at their upgrade plans as opportunities to move toward VoIP. But this evaluation shouldn’t be limited to a review of communications systems. Planned upgrades to the corporate data network and computer hardware also provide an opportunity to introduce VoIP. Some firms will find themselves deploying the technology first through their customer relationship management systems. Others will introduce it as a tool for supply chain management, to make it easier for supply chain partners to communicate. Others will deploy VoIP as a feature of the corporate help desk so that computer support calls can be handled more efficiently. These deployments may be more tactical than strategic, but that shouldn't delay the initial activity.

A VoIP analog to VisiCalc and ICQ is Skype, the free VoIP software. Though it’s used principally by individuals looking to save on their long-distance bills, half of Skypeusers say they have used the service for business communications. Managers should welcome employees; experimentation with Skypeand similar VoIP software packages. The VoIP killer app in an organization may be one that the CIO doesn’t anticipate but that an employee devises out of personal necessity. By observing users who bring in VoIP through the back door, often on their personal PCs, managers may gain insights into how the company can use the technology and the cost/benefit equation for bringing VoIP through the front door.

Of course, companies shouldn't ignore the security issues that any software on the corporate network can create. The beauty of software like Skype is that it operates through the public Internet without requiring access behind the corporate firewall, obviating many security
posted by suzzee @ 10:34 PM   0 comments
Sunday, November 19, 2006
Digital Video Broadcasting

ETS 800 300

Certain implementations suitable for Digital Video Broadcasting (DVB) broadcasting systems are supported by CATV infrastructures. Specifically, implementations of the Return Channel for interactive services are supported by CATV.
DVB involves a standard link.

Mpeg Header
4 byte Mpeg-2 transport stream header as defined in ISO 13818-1 with a specific PID designated for MAC messages. The value of this PID is 0 x 1C. The transport scrambling control field of the MPEG header is set to 00.

Upstream Marker
24 bit field, 3 byte marker that provides upstream QPSK synchronization information. At least one packet with synchronization information must be sent in every period of 3 msec. The definition of the field is as follows:

Bit 0: Upstream Marker Enable - When this field has the value ‘1,’ the slot marker pointer is valid. When this field has the value ‘0,’ the slot marker pointer is not valid.
Bits 1 - 3: MAC Message Framing - Bit 1 relates to the first MAC message slot within the MPEG frame, bit 2 to the second MAC message within the MPEG frame, and bit 3 to the last MAC message within the MPEG frame. Possible values:
0 - A MAC message terminates in this slot.
1 - A MAC message continues from this slot into the next, or the slot is unused. If the slot is unused, the first two bytes of the slot are
0 x 0000.
Bits 4 - 7: Reserved
Bits 8 - 23: Upstream Slot Marker Pointer - A 16 bit unsigned integer which indicates the number of downstream “symbol” clocks between the next Sync byte and the next 3 msec time marker. Bit 23 is considered the most significant bit of this field.

Slot Number4
A 16 bit field which is defined as follows:

Bit 0: Slot Position Register Enable (msb) - When this field has the value ‘1,’ the slot position register is valid. When this field has the value ‘0,’ the slot position register is not valid.
Bits 1-3: Reserved
Bit 4: Set to the value ‘1.’ This bit is equivalent to M12 in the case of OOB downstream.
Bit 5: Odd Parity - This bit provides odd parity for upstream slot position register. It is equivalent to M11 in the case of OOB downstream.
Bits 6 - 15: Upstream Slot Position Register - 10 bit counter which counts from 0 to n with bit 6 the msb. These bits are equivalent to M1 - M10 in the case of OOB downstream.

MAC Flag Control
24 bit field (b0 (msb), b1, b2 . . . b23) that provides control information used in conjunction with the ‘MAC Flags’ and ‘Extension Flags’ fields. The definition of the MAC Flag Control field is as follows:

* b0 - b2 - Channel 0 control field.
* b3 - b5 - Channel 1 control field.
* b6 - b8 - Channel 2 control field.
* b9 - b11 - Channel 3 control field.
* b12 - b14 - Channel 4 control field.
* b15 - b17 - Channel 5 control field.
* b18 - b20 - Channel 6 control field.
* b21 - b23 - Channel 7 control field.

MAC Flags
26 byte field containing 8 slot configuration fields (24 bits each) which contain slot configuration information for the related upstream channels followed by two reserved bytes. The first 3 bytes correspond to MAC Flag Set 1, the second 3 bytes to MAC Flag Set 2, etc.

Ext. Flags
A 26 byte field used when one or more 3.088 Mbit/s or 6.176 Mbit/s upstream QPSK links are used. The definition of the Extension Flags field is identical to the definition of the MAC Flags field (above). The Extension Flags field contains the MAC Flags from 9 to 16.

MAC Message
The MAC Message field contains a 40 byte message in hexadecimal code.
posted by suzzee @ 11:59 AM   0 comments
Wednesday, November 15, 2006
Voice over Internet Protocol
Voice over Internet Protocol, also called VoIP, IP Telephony, Internet telephony, Broadband telephony, Broadband Phone and Voice over Broadband is the routing of voice conversations over the Internet or through any other IP-based network.

Protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. They may be viewed as commercial realizations of the experimental Network Voice Protocol (1973) invented for the ARPANET.ce providers. Some cost savings are due to utilizing a single network to carry voice and data, especially where users have existing underutilized network capacity they can use for VoIP at no additional cost. VoIP to VoIP phone calls on any provider are typically free, whilst VoIP to PSTN calls generally costs the VoIP user.

There are two types of PSTN to VoIP services: DID (Direct Inward Dialing) and access numbers. DID will connect the caller directly to the VoIP user while access numbers require the caller to input the extension number of the VoIP user. Access numbers are usually charged as a local call to the caller and free to the VoIP user(citation/example needed) while DID usually has a monthly fee. There are also DID that are free to the VoIP user but is chargeable to the caller .
posted by suzzee @ 11:56 AM   0 comments
Saturday, November 11, 2006
Using VOIP In Education
Although voip has increasingly been chosen as the preferred telecommunication solution for higher education and K-12 school districts, many educators aren't taking advantage of voip in the classroom. Leading voip service provider, voip.com, helps teachers unlock voip's potential.
Merging voice and data networks opens up a world of opportunities for improved communication between teachers and parents, students, peers, and specialists. Perhaps the most common benefit is better interaction between parents and teachers at the K-12 level. Keeping parents in the loop is a proven method for improving student performance, while forging stronger ties between families and districts pays off when it's time to get a bond approved.
Distance learning also enables educators to reach traditionally disenfranchised students, even if they're socioeconomically disadvantaged, geographically spread out, disabled, or struggling with full-time responsibilities. Voip adds another dimension to online classes. Incorporating voice chat lets students experience a synchronous learning environment that has more of the give and take found in offline classes. Additionally, distance students are able to work collaboratively on group projects, gaining important team management skills they'll need in the "real" world.
Another frequently overlooked area is course content; virtual textbooks can include rich multimedia content right on their pages, unlike traditional print books and because it's so much cheaper to produce eTexts, students can easily produce their own books as part of their coursework. Shy students often blossom in an online class, finding it's more comfortable to participate in class because they're not standing up in front of a room full of people.
Lastly, one of the most exciting ways to use voip in the classroom is to take your class online, to the virtual world of Second Life. There, students have the chance to apply some of what they're learning: creating virtual businesses, mocking up engineering designs, testing social theories, and designing online solutions to real world problems.
posted by suzzee @ 4:32 AM   0 comments
About Me

Name: suzzee
Home:
About Me:
See my complete profile
Previous Post
Archives
Shoutbox

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.

Links
Powered by

BLOGGER