欢迎来到留学生英语论文网

客服信息

我们支持 澳洲论文代写 Assignment代写、加拿大论文代写 Assignment代写、新西兰论文代写 Assignment代写、美国论文代写 Assignment代写、英国论文代写 Assignment代写、及其他国家的英语文书润色修改代写方案.论文写作指导服务

唯一联系方式Q微:7878393

当前位置:首页 > 论文范文 > It Research

Telephone system

发布时间:2018-02-14
该论文是我们的学员投稿,并非我们专家级的写作水平!如果你有论文作业写作指导需求请联系我们的客服人员

The anticipated centralize telephone system will be IP PBX telephone system (Internet Protocol Private Branch Exchange). It is the merger of a PBX telephone system and a VoIP telephone system. Making it have more robust features.

PBX (Private Branch Exchange) is a small telephone network system that is set to work within a company while setting up several lines to an outside phone organization where calls can go in or out.

VoIP is a development in telephony systems that uses a packet switched networks for example the internet to give digitized voice data from one point to another.

An IP PBX is a private branch exchange that exchange calls between users (VoIP users) on local lines allocating to all users certain numbers of phone lines. It has the capabilities to evolve, building blocks for expansion and it is based on IP telephony transporting voice data through the network. It can also communicate with a SIP phones, gateways and providers using the industry standard SIP protocol. Sip is an acronym for Session Initiation Protocol. A good IP PBX telephone system can switch calls between a VoIP user and a conventional telephone user, or between two conventional telephone users in the same way that a conventional PBX does.

It is sometimes abbreviated as IP-PBX, IP/PBX, or IPPBX. With a conservative IP PBX, different networks are needed for voice and data interactions. With IP PBX, Internet access and VoIP communications and conventional telephone communications, are all achievable by means of a single line to each user. This provides tractability and scalability as the venture grows, and can also reduce long-term operation.

By means of an IP PBX you can without difficulty use a VOIP service provider for protracted distance and international calls because it uses single connection for voice and data which simplifies the network and can manage the cost. The periodical savings are important. If you have branch offices, you can easily connect phone systems between branches and make without charge phone calls. As technologies transform, VoIP telephones can be upgraded so you get the latest and best technology, all of the time and without a large investment. Also, the elimination and reduction of MAC cost (Move, Add, Change), that is to say in an IP environment, when a worker is transferred to another branch or office, the identity of the device follows the device and not the cable pair.

An IP PBX operates as software on a system; it can influence the higher processing strength of the system and user interface as well as operating system features. An expert in networking field and computers should be able to install and maintain an IP PBX. By disparity, a branded phone system often requires an installer skilled on that particular branded system.

This is to say that it works well in any environment and can offer multiple capabilities, services and integrated functions.

It enable companies to deliver better customer services. In view of the fact that the IP telephone system is now computer based, companies can incorporate phone tasks with business functions.

More also, it also enable the remote workforce at a very low cost giving people in the remote office the same level of services they enjoy when they are in the office.

Telecommuting is a job agreement in which workers benefit from litheness in working site and hours.

Well-known IT industrialists such as Avaya, Cisco, Linksys, Asterisks and Nortel provide IP PBX systems that support remote voice functions. To be precise, IP soft phones and IP desk phones together with the miracles of the unrestricted or public internet allow workers to be connected to their business telephone system at abode.

This implies that it is cheaper to expand and easy to add more features to.

It is much easier for companies to retain employees because you can offer them more flexibility and the ability to work from home.

this works well because of the inbuilt presence feature which allows workers to see if their colleagues are available or not.

It also provides less time explaining how to use phone system because managing the actual phone is much easier for the users.

Redundancy here is the duplication of information in telecommunications in order to cut the risk of error. An excellent business continuity plan must take into consideration communications equipment redundancy so that when key facility becomes inaccessible, they can always utilize a backup and business would still be in function.

Other benefits include; adding and moving extension is much easier because administration of the system is web based.

Very important Internet works necessitate the highest-level security features, and as we know, IP PBX is prone to attacks such as the DOS attack (Denial of Service attack), call spoofing (identity theft).

With the introduction of VoIP, the call for security is increased, which implies that protecting the security of conversations is thus compulsory. In a conventional office telephone system, security is a more valid postulation. Prying in conversations needs physical right to use telephone lines or compromise of the office internet protocol private branch exchange (IP PBX). Very few security-sensitive companies worry about encrypting voice traffic over conventional telephone lines. For Internet-based connections, it is not so.

IP PBX telephone systems are just as exposed as any other network that is linked to the Internet. Also, passwords, firewalls, virtual private networks, and other regular security options propose several protections, as does comprehensive call reporting that captures information on every single number dialed.

The risks involved in using IP PBX include improper maintenance, public image that is (few network applications can affect the company?s image as much as their IP PBX is being used by scams), tempting targets by looking for exposed IP PBX system to lunch phishing scam and illegal route calls.

Endeavour to secure the IP PBX authorization codes on a permanent basis and always remind employees of the need to keep all access code secure and change them frequently. The password must be long and very complex.

Implement all IP PBX security features where possible.

Contact equipment vendors for security information so as to detect toll fraud( toll fraud is an illegal use of an organization resources remotely by a third party)

Block all out-going international calls unless it is needed for routine business.

Endeavour to audit telecom bills regularly, especially after vacations and holidays.

Try to limit the number of employees authorize to use remote access. If possible, change the password and authorization codes when an employer leaves the organization.

Never transfer calls for strangers outside the IP PBX.

Always be alert to possible IP PBX abuse site.

Know your dial plan and ensure that callers can not access contexts which allows for outbound dialing. Be very careful if you are using DISA (Direct Inward System Access) application.

DISA enables individuals trying to call in from outside the IP PBX environment to get an internal dial-tone. With this, he can make calls as if it is from an extension linked to the IP PBX telephone system. This is the scenario, caller A outside the IP PBX phone system makes a call to a number in BigCo plc. Caller A will hear an uninterrupted signal. He has to authenticate with a password followed by the pound key (#). If the authenticated password is acceptable again he will hear a tone but this time it is from inside of the IP PBX phone system.

Firewall is important to the security of IP networks. When it comes to protecting your network against intruders, firewall is usually the first form of defense. Firewalls works by blocking traffic considered to be intrusive or just basic malicious from flowing through them. For this to work, correct firewall configuration is needed. In other for this to be set up, it requires some ports to be opened. Ports required to be opened include SIP port (Session Initiation Protocol) usually port 5060 and is used to set up sessions on a network. Other ports include RTP port (Real-Time Transport Protocol) which is use to transport IP PBX data, RTCP port (Real-Time Transport Control Protocol). For two people to communicate in a standard working environment their IP phones must be connected with a two way connection. The SIP server sending the invite must know the IP port number of caller?s phone in advance and this must stay the same. Common firewall configuration problem is the one way audio or no audio at all. For this to be rectified, the administrator of the system should use static port mappings, which is ensuring that firewall, forward all connections on range to the SIP server without being changed.

Confidentiality is the prerequisite to keep information secured and classified. Information ranging from private documents, financial information to security information such as passwords. The confidentiality of information on the switch must be safe-guarded against toll fraud, voice and data interception, and denial of service attacks. Some information acts as a gateway for attackers and makes their job (to infiltrate the company?s privacy) easier. Some of the information includes operating systems, communication protocols and IP addresses. With standard telephones, eavesdropping regularly needs either physical access to tap a line, or infiltration of a switch. This (physical access) will increase the risk of hacker being revealed.

The most important point in IP PBX physical security is to prevent vandalization of assets that will result to service or business disruption and monetary loss. Structures accommodating the IP PBX system should be kept low (quietly) and show little clue of its function. A physical security boundary should be clearly established. IP PBX network equipment should be secured to ensure protection from damage and unauthorized access or use.

Remote access to a network is the ability to access the network without the user being present physically (on site). By doing so will require an Internet Service Provider (ISP).

With remote access, companies can have mobile access to their corporate data such as e-mails and databases. If you must use IP PBX remotely, the company server must be an authenticated server.

An authentication server is a server that grants authentication services to users through a network. It is a foundation for authorization, privacy and non-repudiation (doing something without the right to do so), and utilizes algorithms like Kerberos and public encryption keys.

Without strong authentication, remote services can be vulnerable to man-in-the-middle attacks, denial of services (DOS), interception of passwords and important company data. There are various remote access authentication options that companies can use, examples are Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Microsoft's implementation of CHAP (MS-CHAP), Extensible Authentication Protocol/Transport Layer Security (EAP/TLS).

The most preferable is the Extensible Authentication Protocol/Transport Layer Security (EAP/TLS) this is because it uses more secure authentication technique like smart cards, Kerberos, and digital certificates. They are more secure than using the user name and password authentication method and also makes the network more scalable as the company grows. Most companies use the One Time Password generator (OTP device) for Authentication which works by randomly generating a random codes that is joined with a PIN (the user configures) to a password for the user.



上一篇:A Disorder That Affects The Endocrine System Medical Essay 下一篇:IT Essay: An analysis of difficulties experienced by visually impaired users on the web and how to d