Accessibility Links

  • Skip to content
  • Skip to search IOPscience
  • Skip to Journals list
  • Accessibility help
  • Accessibility Help

Click here to close this panel.

Purpose-led Publishing is a coalition of three not-for-profit publishers in the field of physical sciences: AIP Publishing, the American Physical Society and IOP Publishing.

Together, as publishers that will always put purpose above profit, we have defined a set of industry standards that underpin high-quality, ethical scholarly communications.

We are proudly declaring that science is our only shareholder.

A Survey on Voice over Internet Protocol (VoIP) Reliability Research

Om Prakash Roy 1 and Vinod Kumar 1

Published under licence by IOP Publishing Ltd IOP Conference Series: Materials Science and Engineering , Volume 1020 , 6th International Conference on Computers Management & Mathematical Sciences (ICCM 2020) 22nd-23rd November 2020, Nirjuli, India Citation Om Prakash Roy and Vinod Kumar 2021 IOP Conf. Ser.: Mater. Sci. Eng. 1020 012015 DOI 10.1088/1757-899X/1020/1/012015

Article metrics

835 Total downloads

Share this article

Author e-mails.

[email protected]

[email protected]

Author affiliations

1 Department of EE, NERIST, Arunachal Pradesh 791109, India

Buy this article in print

VoIP technology deals with the real-time data communication for voice transfer in the form of digital packets through internet communication and facilitates public to make use of internet for video and phone calls. The voice data packets are transferred from source to the destination and vice versa. VoIP require high speed internet connection for data transfer on data network. It is necessary to arrive the data packet from its source to the destination with high level of reliability. It is very important to analyse link failure, packet loss, delay and jitter during the data communication. Components involved in data communication should be reliable. This paper provides a survey for step wise development and use of reliability techniques for gaining high quality of voice in VoIP network.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence . Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Research on Security of VoIP Network

  • Conference paper
  • Cite this conference paper

voip research paper topics

  • Xiaojun Liu 2 &
  • Chunxia Tu 2  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 231))

Included in the following conference series:

  • International Conference on Information and Management Engineering

2059 Accesses

1 Citations

As a voice transmission technology based on packet switching, VoIP is quite different from traditional telephone service which is based on circuit switching, which results in specific security issues on VoIP network. In addition, because of the high real time request for VoIP network, the characteristics of network services and the security strategies applied bring challenges for the capability and QoS of VoIP network. In this paper, the existing security threat and several security measures of VoIP network have been analyzed, and the author put forward suggestions for VoIP system deployment and related management policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Unable to display preview.  Download preview PDF.

Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP:Session Initiation Protocol. IETF RFC 3261 (June 2002)

Google Scholar  

Gupta, P., Shmatikov, V.: Security Analysis of Voice-over-IP Protocols. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, pp. 49–63 (July 2007)

Feng, C., Malik, S.: Vulnerability Analysis and best practices for adopting IP telephony in critical infrastructure sectors. IEEE Communication Magazine (2006)

NIST SP 800-58, Security Consideration for Voice Over IP Systems

Rosenberg, J., Schulzrinne, H., Camarillo, G., et al.: SIP:Session initiation protocol [EB/OL] [S.L]. IETF, vol. 6 (2002)

Lippmann, R.P., Cunningham, R.K.: Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks. Computer Networks-the International Journal of Computer and Telecommunica-tions Networking 34(4), 597–603 (2000)

ITU-T RFC 3015 Megaco Protocol Version 1.0. [S] (November 2000)

ITU-T RFC 3525 Gateway Control Protocol Version 1.[S] (June 2003)

Download references

Author information

Authors and affiliations.

School of Computer, Huanggang Normal University, Hubei, Huanggang, 438000, China

Xiaojun Liu & Chunxia Tu

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Suzhou University, No. 1, Shizi Street, 215006, Suzhou City, China

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper.

Liu, X., Tu, C. (2011). Research on Security of VoIP Network. In: Dai, M. (eds) Innovative Computing and Information. ICCIC 2011. Communications in Computer and Information Science, vol 231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23993-9_9

Download citation

DOI : https://doi.org/10.1007/978-3-642-23993-9_9

Publisher Name : Springer, Berlin, Heidelberg

Print ISBN : 978-3-642-23992-2

Online ISBN : 978-3-642-23993-9

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Voice Over Internet Protocol (VoIP) Research Paper

  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Voice over Internet Protocol (VoIP) refers to the use of packet-switched internet protocol (IP) networks to relay a voice message. VoIP is among the latest modes of communication. As with a majority of the novel technologies, VoIP comes with both opportunities and security challenges. It has a unique architecture compared to the conventional circuit-based telephony. As a result, VoIP is susceptible to numerous security risks.

The benefits of a VoIP system to an enterprise include flexibility and low operation cost. There are different forms of Voice over Internet Protocol systems.

They include mobile units, conferencing units, and the ordinary telephone handsets. For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. A VoIP system has little tolerance for interruptions. There is no single solution to security challenges that face data transmitted over VoIP. Thus, organizations should ensure that they acquire the appropriate network infrastructure.

Introduction

Voice over Internet Protocol refers to a collection of technologies and methods that facilitate the transfer of voice messages over IP networks. Other terms that are used to refer to VoIP networks include Internet telephony, IP telephony, and broadband phone service among others. VoIP systems can run on any form of computer. Additionally, the conventional telephone handsets can be modified to handle VoIP services.

Other equipment that can provide VoIP services includes mobile units, conferencing units, and “softphone”. Cheng and Lai (2010) argue, “Quality of service (QoS) is fundamental to the operation of a VoIP network” (p. 82). Thus, it is imperative to guarantee security measures when operating a Voice over Internet Protocol network.

Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard to guarantee the quality of service. Among the challenges that affect a VoIP network include firewall delays, jitter, encryption-produced latency and blockage of call setups (Cheng & Lai, 2010). One of the benefits of VoIP over other communication networks is that it is cost-effective. The VoIP system compresses the electronic traffic of an organization into a single physical network.

Thus, it saves an institution from the cost of procuring a private branch exchange (PBX). To explore the challenges that affect VoIP networks, this paper will give an overview of the system. It will discuss the equipment, data handling, cost, speed, and security issues that affect a VoIP network. Additionally, the paper will discuss the quality of service issues..

Overview of VoIP

Many people who have the knowledge of data communication might have “little background in transmitting voice or real-time imaging in a packet-switched environment” (Cheng & Lai, 2010, p. 86).

VoIP technology is a novel concept to many people. Most people assume that it is possible to transmit voice messages over the normal network infrastructures without changing them. The reality is that installation a VoIP system results in numerous complications to the ordinary network. A majority of these challenges are made severe by security considerations.

VoIP Equipment

There are different types of Voice over Internet Protocol systems. Almost every computer can support VoIP services. Apple Macintosh iChat, Microsoft NetMeeting, and Linux platforms provide some VoIP services (Chong & Matthews, 2004). Voice over Internet Protocol is the infrastructure that helps to “dial telephone numbers and communicate with people on the other end of a connection who have a VoIP system” (Chong & Matthews, 2004, p. 109).

The increase in demand for VoIP services has led to the development of multiple products. The conventional telephone handsets are developed with additional features to support VoIP services. Some handsets are equipped with a small liquid-crystal display (screen), which helps to configure their advanced functionalities like call-park and conference calls.

Apart from modification of the conventional telephone handsets, VoIP technology has led to the invention of conferencing units. The groups offer services akin to those of the ordinary conference calling phone systems. The only difference is that conferencing units enable users to synchronize data communication services.

The invention of VoIP network has led to an adjustment of the average personal computer (PC) to create a “softphone”. A “softphone” is a collection of a headset, personal computer, software and a cheap connection service (Endler & Collier, 2006). The primary disadvantage of a “softphone” system is that it is prone to privacy and security issues. Personal computers that are connected to the internet get infested with viruses, worms and a multitude of malicious software.

Therefore, it is hard to guarantee the security of a voice message transmitted through a “softphone” system (Endler & Collier, 2006). Besides, personal computers are mostly connected to data networks. Hence, the use of “softphone” system makes it impractical to split data and voice networks. Voice over Internet Protocol system comprises numerous apparatus like routers, call processors, protocols, gateways, and firewalls.

Data handling

Endler and Collier (2006) assert, “Before any voice can be sent, a call must be placed” (p. 24). For a conventional phone system, call placement entails dialing the number of the intended recipient. The telephone company’s system processes the dialed number and connects the caller to the consignee.

Voice over Internet Protocol system operates differently. Once the user dials a number, a composite sequence of packet exchanges ensues in line with a VoIP signaling protocol. The challenge is that while computer systems are distinguished by their Internet Protocol (IP) address, the user dials a regular telephone number to initiate a call. For the call to be completed, the phone number has to be connected to the IP address of the called party.

A set of rules is used to identify the IP address that matches with the recipient’s phone number. Once the recipient answers a call, the voice is changed into a digital signal and split into a series of packets. The entire process begins by changing analog voice pointers to digital. Because digitized voice demands a vast number of bits, “a compression algorithm is used to reduce the volume of data to be transmitted” (Endler & Collier, 2006, p. 31).

The compressed information is entered into data packets for secure transmission. The voice packets use the Real-time Transport Protocol (RTP). Each packet has a unique header field that contains the information used to reconstruct the packets to obtain the voice signal.

One reason many institutions opt to use the VoIP system is that it is cheap compared to other modes of communication. The VoIP system does not use the switched telephone networks. Consequently, it is cheap to transmit voice messages over long distances. The VoIP system does not send voice traffic over the ordinary telecommunication line configurations (Jiang & Henning, 2000). Instead, the traffic travels over private data network lines or the internet.

Voice over Internet Protocol is also cheap since it consolidates all of an institution’s electronic traffic. An institution does not require procuring distinct private branch exchange tile lines for each type of traffic. Even though installing the VoIP system is expensive, a company enjoys noteworthy savings by managing a single network (Jiang & Henning, 2000).

An institution does not incur the cost of maintaining a telephony system. Moreover, the work of the system administrator becomes less tasking. The administrator manages a single instead of multiple networks. A company does not require hiring different workers to manage voice and data networks.

Speed and Quality

Theoretically, Voice over Internet Protocol can minimize the usage of bandwidth and enhance the quality of communication compared to the traditional public switched telephone network. Jiang and Henning (2000) posit, “The use of high bandwidth media, combined with high quality of digitized voice, makes VoIP a flexible alternative for speech transmission” (p. 84). However, the circumstances are quite intricate. System administrators encounter challenges in the effort to channel all the traffic of an organization through a single network.

The network becomes overcrowded leading to delays. The bandwidth usage depends on the digitization of voice by circuits, codecs or software procedures that encrypt and decrypt data for communication.

Therefore, minimizing the usage of the bandwidth may result in sluggish encryption and transmission processes (Jiang & Henning, 2000). Technologists are in the process of enhancing the quality and speed of transmitting voice messages through VoIP systems. Indeed, a majority of the organizations that uses VoIP systems do not detect momentous dilapidation in quality or speed.

Security Issues

The introduction of Voice over Internet Protocol system increases the demand for security measures within a company. A business requires guaranteeing the safety of both its data and voice. The federal government agencies have the duty to safeguard a lot of classified and unclassified data.

The agencies need to protect both the financial and sensitive information. On the other hand, public and private corporations require safeguarding their communications. Bradbury (2007) argues that in an ordinary office telephone system, “security is a more valid assumption” (p. 484).

One can hardly intercept communications. To block the communication, one needs to tamper with the private branch exchange of an institution or access the telephone line. Only institutions that transmit sensitive and classified information opt to encrypt voice traffic. The same does not happen for the Internet-related connections. Information sent via the internet is prone to interceptions. Thus, it is imperative to encrypt it to ensure that it is safe.

Bradbury (2007) alleges that the packets mailed via the internet go through systems that not under the control of both the sender and the recipient. If a hacker accesses one of the systems, they can install programs and screen packets for sensitive information. It underlines the reason people use encryption software to transmit data over the VoIP systems.

The existing internet structural design does not offer the security measures analogous to those of the traditional phone lines. The only way to secure the Voice over Internet Protocol system is to apply security techniques like the ones used to protect data networks. Currently, institutions use firewalls and encryption to secure the VoIP systems.

Quality of Service Issues

According to Bai and Ito (2006), quality of service is paramount to the functionality and effectiveness of a VoIP system. In spite of the installation cost, a VoIP system enhances communication within an organization. However, the discharge of varied security procedures affects the quality of service. For instance, the use of firewalls affects the speed of call setups. Moreover, it results in call delays, jitters, and encryption-produced latency.

Bai and Ito (2006) argue “Quality of service issues is central to VoIP security” (p. 801). If organizations were able to guarantee the quality of service, they would have been in a position to use the security measures used to safeguard data networks.

Nevertheless, it is hard to use most security measures used to secure data networks due to the time-critical state of the Voice over Internet Protocol networks. Also, VoIP systems do not tolerate packet loss and disruptions. The primary quality of service issues related to VoIP includes latency, packet loss, and jitter among others.

According to Kumar (2006), latency in Voice over Internet Protocol refers to the duration that it takes a voice data to travel from the sender to the receiver.

Preferably, institutions would like to use a network that has as low latency as possible. Nevertheless, there are realistic lower limits on the holdup of VoIP. For one-way traffic, the upper bound is 150 milliseconds (ms) (Kumar, 2006). The 150 ms limit corresponds to the present latency limit witnessed in local calls across the public switched telephone network lines in the United States.

The latency bound for international calls is 400 milliseconds. Calls made via the Voice over Internet Protocol network must satisfy the 150 ms limit to imitate the quality of service that the present phones offer. The time constraint experienced in VoIP systems leaves diminutive room for mistakes in packet delivery (Kumar, 2006). Further, it makes it difficult for institutions to implement many security techniques.

The process of data encryption and shipment across the United States may take up to 130 milliseconds. The time taken to transmit voice data across the North American continent may be less than 100 milliseconds. Security discharge and queuing take between 20 and 50 milliseconds.

Kumar (2006) maintains that delay does not only arise at the terminals of the system. Every leap along the system results in a fresh queuing delay and probably a processing latency for the case of a safety checkpoint. Also, transmission of big packets may lead to bandwidth jamming and increased latency. Therefore, Voice over Internet Protocol networks work well with small packages.

Toral, Torres, Hernandez, and Estrada (2008) define jitter as the inconsistent packet delays. It results from limited bandwidth conditions in VoIP networks and may have severe effects on the overall quality of service. Toral et al. (2008) claim, “Variations in delays can be more detrimental to the quality of service than the actual delays” (p. 14).

Jitter may lead to erroneous reassembling of packets. Real-time Transport Protocol (RTP) depends on User Datagram Protocol (UDP). As a result, jumbled packets are not reconstructed at the protocol level. Nonetheless, RTP enables programs to reorganize the packets using the timestamp and sequence number fields. The cost of rearranging the packets is intractable when dealing with the stretched time limits of voice over Internet Protocol.

An increase in jitter results in the packets arriving at the terminal in bursts. Therefore, to manage jitter at the terminals, it is imperative to use a buffer. Toral et al. (2008) allege that for a buffer to be effective, it has to release the packets after every 150 milliseconds to minimize variations in delays.

Toral et al. (2008) maintain that the buffer implementation gets complicated when it is hard to tell if a missing packet is lost or delayed. If a latency is principally unreliable, the system cannot rely on historical delay times to determine the condition of a missing packet. Apart from the buffer, individuals can use firewalls and routers to manage jitter.

They can also use network elements that process data based on its urgency. Another way that an institution might mitigate jitter in its VoIP system is by enhancing the usage of the bandwidth. Nevertheless, it is hard to improve bandwidth usage without compromising the security of the data.

Packet Loss

Melvin and Murphy (2007) maintain that Voice over Internet Protocol is extremely intolerant of packet loss. Packet loss may arise as a result of excess latency. Some packets fail to reach the destination on time leading to them being cast off to accommodate the newer ones. Packet loss may also arise due to jitter. The primary reason VoIP is prone to packet loss is because it relies on the Real-time Transport Protocol.

A packet may reach the destination after its adjacent packets have been removed from the buffer, thus rendering it redundant (Melvin & Murphy, 2007). VoIP packets are normally minuscule and carry little information. Hence, it might be hard for a person to detect the missing words in case of packet loss. The only disadvantage is that packets are not lost separately. Bandwidth overcrowding and other sources of packet loss interfere with all the packages that are in transit.

The loss of a single packet might not affect the meaning of the intended message. Nevertheless, probabilistically “the loss of one packet means the loss of several packets” (Tadeus, 2004, p. 179). In other words, the loss of a single packet may result in the loss of numerous packets, thus degrading the quality of service.

Although it is hard to use an efficient delivery protocol like Transmission Control Protocol to enhance the quality of service, one can still minimize the challenge of packet loss. Tadeus (2004) argues that one cannot ensure that all the packets reach the intended destination. If one has an adequate bandwidth, they can send redundant information to cancel the prospect of loss. The problem is that it is hard to get such bandwidth.

The introduction of redundant information results in latency and, at times, aggravates packet loss. Steps are underway to develop novel codecs like internet Low Bit-rate Codec that tolerate packet loss. The codecs will guarantee that the meaning of a message does not change despite the loss of some packets.

The development of Voice over Internet Protocol network is a complex process that must be handled with great care. The network managers can hardly detect the numerous challenges that affect data packets. The incorporation of a VoIP system into an already overworked network may be detrimental to an organization. There is no approved solution to the challenges, which affect voice data that is in transit via a VoIP network.

Organizations must use different solutions selectively according to the nature of VoIP system that they use. Institutions can run secure VoIP systems; however, they have to incur a high cost with respect to installing security measures. Until the experts come up with a reliable and efficient method of running a VoIP network, organizations should operate their systems cautiously. They should ensure that they acquire the correct software and establish the appropriate network infrastructure.

Bai, Y., & Ito, M. (2006). A study for providing better quality of service to VoIP users. Advanced Information Networking and Applications, 1 (2), 799-804.

Bradbury, D. (2007). The security challenges inherent in VoIP. Computers & Security, 26 (7), 485-487.

Cheng, F., & Lai, W. (2010). An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan. Digital Investigation, 7 (2), 81-89.

Chong, H., & Matthews, H. (2004). Comparative analysis of traditional telephone and voice-over-internet protocol (VoIP) systems. Electronics and the Environment, 3 (1), 106-111.

Endler, D., & Collier, M. (2006). Hacking exposed VoIP: Voice over IP security secrets & solutions , New York: McGraw-Hill.

Jiang, W., & Henning, S. (2000). Analysis of on-off patterns in VoIP and their effect on voice traffic aggregation. Computer Communications and Networks, 4 (1), 82-87.

Kumar, A. (2006). An overview of voice over internet protocol (VoIP). Rivier College Online Academic Journal, 2 (1), 1-13.

Melvin, H., & Murphy, L. (2007). Time synchronization for VoIP quality of service. Internet Computing, 6 (3), 57-63.

Tadeus, U. (2004). Quality of service in VoIP communication. International Journal of Electronics and Communications, 58 (3), 178-182.

Toral, H., Torres, D., Hernandez, C., & Estrada, L. (2008). Self-similarity, packet loss, jitter, and packet size: Empirical relationships for VoIP. Electronics, Communications and Computer, 5 (3), 11-16.

  • Network Technologies Analysis
  • Voice Over Internet Protocol
  • Analogue to Digital Sound Effect Processor
  • Twitter Discussion Application Programming Interface
  • You Cannot Live Without Mobile Phones
  • My Favourite Mobile Apps
  • Value of Smartphone Security
  • Monopolistic Competition of Smart Phones
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2019, June 3). Voice Over Internet Protocol (VoIP). https://ivypanda.com/essays/voice-over-internet-protocol-voip/

"Voice Over Internet Protocol (VoIP)." IvyPanda , 3 June 2019, ivypanda.com/essays/voice-over-internet-protocol-voip/.

IvyPanda . (2019) 'Voice Over Internet Protocol (VoIP)'. 3 June.

IvyPanda . 2019. "Voice Over Internet Protocol (VoIP)." June 3, 2019. https://ivypanda.com/essays/voice-over-internet-protocol-voip/.

1. IvyPanda . "Voice Over Internet Protocol (VoIP)." June 3, 2019. https://ivypanda.com/essays/voice-over-internet-protocol-voip/.

Bibliography

IvyPanda . "Voice Over Internet Protocol (VoIP)." June 3, 2019. https://ivypanda.com/essays/voice-over-internet-protocol-voip/.

Voice Over Internet Protocol (VOIP) Setup: Case Study Analysis

48 Pages Posted: 4 Nov 2022

GPDCM Jayasekara

University of Plymouth; NSBM Green University Town

Date Written: April 22, 2022

Voice over internet protocol, sometimes known as VoIP, is a technology that allows users to make free phone calls or video calls over the internet. Voice over IP (VoIP) is a technology that allows you to transmit your voice from an analogue transmission to a digital one. After that, you can make a direct phone call. IP telephony, broadband, and broadband telephony are all terms that can be heard. VoIP services are subject to fluctuations. As previously stated, VoIP frameworks give clients the option of selecting their own equipment. Calls can now be made using a variety of devices, including traditional telephones, IP telephones, personal computers, and cell phones, ensuring that telephone calls are no longer restricted to a single device. As a result, VoIP has made tremendous strides forward in the communication field. Voice over IP (VoIP) is an example (VoIP). Voice over Internet Protocol (VoIP) is a method of communicating over the internet.

Keywords: VOIP, Setup, Project, IP Phone, Call Testing

Suggested Citation: Suggested Citation

Chamoth Madushan Jayasekara (Contact Author)

University of plymouth ( email ).

Plymouth United Kingdom 0701245270 (Phone)

NSBM Green University Town ( email )

Pitipana - Thalagala Rd Homagama Sri Lanka 0701245270 (Phone)

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, io: productivity, innovation & technology ejournal.

Subscribe to this fee journal for more curated articles on this topic

IO: Theory eJournal

Sustainable technology ejournal, information systems ejournal, communication & technology ejournal.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

voip research paper topics

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

VOIP security

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Save to Library
  • Asterisk Voip Follow Following
  • Tutorial Delphi Follow Following
  • Delphi Programming Follow Following
  • Tracer Study Follow Following
  • IPSec Follow Following
  • Comunicação Sem Fio Follow Following
  • VoIP over WiFi Follow Following
  • VoIP/SIP/IMS Follow Following
  • Voip Follow Following
  • Networking, VoIP, Security Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Publishing
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

VoIP Research Papers: Ideas to Consider

VoIP Research Papers: Ideas to Consider

VoIP technologies became a real breakthrough in communication. They considerably reduced costs on distant telephony and enhanced the effectiveness of different voice applications and services.

However, VoIP technologies are still not completely recognized. You can learn more about them while working on VoIP research papers .

Writing research papers on VoIP is an ordinary assignment for those studying Science and Technology. So, we are glad to help you with writing research papers on VoIP!

Several ideas for VoIP research papers are introduced below:

Idea#1 for VoIP research papers

Investigate what prevents VoIP from being adopted. It may be:

  • Quality issues;
  • Costs on switching;
  • Communication bandwidth;
  • Data security, etc

Idea#2 for VoIP research papers

Examine VoIP as a category of software/hardware. It allows people to use the Internet as communication transmission. Write about the providers in research papers on VoIP . Vonage is a good example in this case.

Idea#3 for VoIP research papers

Find out how this technology has evolved and present the history of its development in research papers on VoIP. Discuss the advantages and disadvantages of VoIP. Work with original sources to make your paper more valid.

Idea#4 for VoIP research papers

Write how this technology affects today’s business world and relations between countries. You may interview people, visit forums, and so on to gather enough information for such VoIP research papers.

If you need more help with writing VoIP research papers, you may use some past papers on this topic. Study how other students develop this idea and think how you can do your best! Good luck!

Our site will be helpful for those who need more ideas for a research paper on UML or research papers on wireless.

Similar Posts

Research papers on movies, a research paper on charles dickens: ideas to consider, choosing a topic for stock market research papers, topics for an original research paper on football, your research paper on martin luther king, catchy ideas for your research papers on family.

Cookie

  • Grades 6-12
  • School Leaders

NEW: Classroom Clean-Up/Set-Up Email Course! 🧽

The Big List of Essay Topics for High School (120+ Ideas!)

Ideas to inspire every young writer!

What one class should all high schools students be required to take and pass in order to graduate?

High school students generally do a lot of writing, learning to use language clearly, concisely, and persuasively. When it’s time to choose an essay topic, though, it’s easy to come up blank. If that’s the case, check out this huge round-up of essay topics for high school. You’ll find choices for every subject and writing style.

  • Argumentative Essay Topics
  • Cause-and-Effect Essay Topics
  • Compare-Contrast Essay Topics
  • Descriptive Essay Topics
  • Expository and Informative Essay Topics
  • Humorous Essay Topics

Literary Essay Topics

  • Narrative and Personal Essay Topics
  • Personal Essay Topics
  • Persuasive Essay Topics

Research Essay Topics

Argumentative essay topics for high school.

When writing an argumentative essay, remember to do the research and lay out the facts clearly. Your goal is not necessarily to persuade someone to agree with you, but to encourage your reader to accept your point of view as valid. Here are some possible argumentative topics to try. ( Here are 100 more compelling argumentative essay topics. )

  • The most important challenge our country is currently facing is … (e.g., immigration, gun control, economy)
  • The government should provide free internet access for every citizen.
  • All drugs should be legalized, regulated, and taxed.
  • Vaping is less harmful than smoking tobacco.
  • The best country in the world is …
  • Parents should be punished for their minor children’s crimes.
  • Should all students have the ability to attend college for free?
  • Should physical education be part of the standard high school curriculum?

Should physical education be part of the standard high school curriculum?

WeAreTeachers

  • Schools should require recommended vaccines for all students, with very limited exceptions.
  • Is it acceptable to use animals for experiments and research?
  • Does social media do more harm than good?
  • Capital punishment does/does not deter crime.
  • What one class should all high schools students be required to take and pass in order to graduate?
  • Do we really learn anything from history, or does it just repeat itself over and over?
  • Are men and women treated equally?

Cause-and-Effect Essay Topics for High School

A cause-and-effect essay is a type of argumentative essay. Your goal is to show how one specific thing directly influences another specific thing. You’ll likely need to do some research to make your point. Here are some ideas for cause-and-effect essays. ( Get a big list of 100 cause-and-effect essay topics here. )

  • Humans are causing accelerated climate change.
  • Fast-food restaurants have made human health worse over the decades.
  • What caused World War II? (Choose any conflict for this one.)
  • Describe the effects social media has on young adults.

Describe the effects social media has on young adults.

  • How does playing sports affect people?
  • What are the effects of loving to read?
  • Being an only/oldest/youngest/middle child makes you …
  • What effect does violence in movies or video games have on kids?
  • Traveling to new places opens people’s minds to new ideas.
  • Racism is caused by …

Compare-Contrast Essay Topics for High School

As the name indicates, in compare-and-contrast essays, writers show the similarities and differences between two things. They combine descriptive writing with analysis, making connections and showing dissimilarities. The following ideas work well for compare-contrast essays. ( Find 80+ compare-contrast essay topics for all ages here. )

  • Public and private schools
  • Capitalism vs. communism
  • Monarchy or democracy
  • Dogs vs. cats as pets

Dogs vs. cats as pets

  • Paper books or e-books
  • Two political candidates in a current race
  • Going to college vs. starting work full-time
  • Working your way through college as you go or taking out student loans
  • iPhone or Android
  • Instagram vs. Twitter (or choose any other two social media platforms)

Descriptive Essay Topics for High School

Bring on the adjectives! Descriptive writing is all about creating a rich picture for the reader. Take readers on a journey to far-off places, help them understand an experience, or introduce them to a new person. Remember: Show, don’t tell. These topics make excellent descriptive essays.

  • Who is the funniest person you know?
  • What is your happiest memory?
  • Tell about the most inspirational person in your life.
  • Write about your favorite place.
  • When you were little, what was your favorite thing to do?
  • Choose a piece of art or music and explain how it makes you feel.
  • What is your earliest memory?

What is your earliest memory?

  • What’s the best/worst vacation you’ve ever taken?
  • Describe your favorite pet.
  • What is the most important item in the world to you?
  • Give a tour of your bedroom (or another favorite room in your home).
  • Describe yourself to someone who has never met you.
  • Lay out your perfect day from start to finish.
  • Explain what it’s like to move to a new town or start a new school.
  • Tell what it would be like to live on the moon.

Expository and Informative Essay Topics for High School

Expository essays set out clear explanations of a particular topic. You might be defining a word or phrase or explaining how something works. Expository or informative essays are based on facts, and while you might explore different points of view, you won’t necessarily say which one is “better” or “right.” Remember: Expository essays educate the reader. Here are some expository and informative essay topics to explore. ( See 70+ expository and informative essay topics here. )

  • What makes a good leader?
  • Explain why a given school subject (math, history, science, etc.) is important for students to learn.
  • What is the “glass ceiling” and how does it affect society?
  • Describe how the internet changed the world.
  • What does it mean to be a good teacher?

What does it mean to be a good teacher?

  • Explain how we could colonize the moon or another planet.
  • Discuss why mental health is just as important as physical health.
  • Describe a healthy lifestyle for a teenager.
  • Choose an American president and explain how their time in office affected the country.
  • What does “financial responsibility” mean?

Humorous Essay Topics for High School

Humorous essays can take on any form, like narrative, persuasive, or expository. You might employ sarcasm or satire, or simply tell a story about a funny person or event. Even though these essay topics are lighthearted, they still take some skill to tackle well. Give these ideas a try.

  • What would happen if cats (or any other animal) ruled the world?
  • What do newborn babies wish their parents knew?
  • Explain the best ways to be annoying on social media.
  • Invent a wacky new sport, explain the rules, and describe a game or match.

Explain why it's important to eat dessert first.

  • Imagine a discussion between two historic figures from very different times, like Cleopatra and Queen Elizabeth I.
  • Retell a familiar story in tweets or other social media posts.
  • Describe present-day Earth from an alien’s point of view.
  • Choose a fictional character and explain why they should be the next president.
  • Describe a day when kids are in charge of everything, at school and at home.

Literary essays analyze a piece of writing, like a book or a play. In high school, students usually write literary essays about the works they study in class. These literary essay topic ideas focus on books students often read in high school, but many of them can be tweaked to fit other works as well.

  • Discuss the portrayal of women in Shakespeare’s Othello .
  • Explore the symbolism used in The Scarlet Letter .
  • Explain the importance of dreams in Of Mice and Men .
  • Compare and contrast the romantic relationships in Pride and Prejudice .

Analyze the role of the witches in Macbeth.

  • Dissect the allegory of Animal Farm and its relation to contemporary events.
  • Interpret the author’s take on society and class structure in The Great Gatsby .
  • Explore the relationship between Hamlet and Ophelia.
  • Discuss whether Shakespeare’s portrayal of young love in Romeo and Juliet is accurate.
  • Explain the imagery used in Beowulf .

Narrative and Personal Essay Topics for High School

Think of a narrative essay like telling a story. Use some of the same techniques that you would for a descriptive essay, but be sure you have a beginning, middle, and end. A narrative essay doesn’t necessarily need to be personal, but they often are. Take inspiration from these narrative and personal essay topics.

  • Describe a performance or sporting event you took part in.
  • Explain the process of cooking and eating your favorite meal.
  • Write about meeting your best friend for the first time and how your relationship developed.
  • Tell about learning to ride a bike or drive a car.
  • Describe a time in your life when you’ve been scared.

Write about a time when you or someone you know displayed courage.

  • Share the most embarrassing thing that ever happened to you.
  • Tell about a time when you overcame a big challenge.
  • Tell the story of how you learned an important life lesson.
  • Describe a time when you or someone you know experienced prejudice or oppression.
  • Explain a family tradition, how it developed, and its importance today.
  • What is your favorite holiday? How does your family celebrate it?
  • Retell a familiar story from the point of view of a different character.
  • Describe a time when you had to make a difficult decision.
  • Tell about your proudest moment.

Persuasive Essay Topics for High School

Persuasive essays are similar to argumentative , but they rely less on facts and more on emotion to sway the reader. It’s important to know your audience, so you can anticipate any counterarguments they might make and try to overcome them. Try these topics to persuade someone to come around to your point of view. ( Discover 60 more intriguing persuasive essay topics here. )

  • Do you think homework should be required, optional, or not given at all?
  • Everyone should be vegetarian or vegan.
  • What animal makes the best pet?
  • Visit an animal shelter, choose an animal that needs a home, and write an essay persuading someone to adopt that animal.
  • Who is the world’s best athlete, present or past?
  • Should little kids be allowed to play competitive sports?
  • Are professional athletes/musicians/actors overpaid?
  • The best music genre is …

What is one book that everyone should be required to read?

  • Is democracy the best form of government?
  • Is capitalism the best form of economy?
  • Students should/should not be able to use their phones during the school day.
  • Should schools have dress codes?
  • If I could change one school rule, it would be …
  • Is year-round school a good idea?

A research essay is a classic high school assignment. These papers require deep research into primary source documents, with lots of supporting facts and evidence that’s properly cited. Research essays can be in any of the styles shown above. Here are some possible topics, across a variety of subjects.

  • Which country’s style of government is best for the people who live there?
  • Choose a country and analyze its development from founding to present day.
  • Describe the causes and effects of a specific war.
  • Formulate an ideal economic plan for our country.
  • What scientific discovery has had the biggest impact on life today?

Tell the story of the development of artificial intelligence so far, and describe its impacts along the way.

  • Analyze the way mental health is viewed and treated in this country.
  • Explore the ways systemic racism impacts people in all walks of life.
  • Defend the importance of teaching music and the arts in public schools.
  • Choose one animal from the endangered species list, and propose a realistic plan to protect it.

What are some of your favorite essay topics for high school? Come share your prompts on the WeAreTeachers HELPLINE group on Facebook .

Plus, check out the ultimate guide to student writing contests .

We Are Teachers

You Might Also Like

Parents should be punished for their minor children’s crimes.

100 Thought-Provoking Argumentative Writing Prompts for Kids and Teens

Practice making well-reasoned arguments using research and facts. Continue Reading

Copyright © 2024. All rights reserved. 5335 Gate Parkway, Jacksonville, FL 32256

Numbers, Facts and Trends Shaping Your World

Read our research on:

Full Topic List

Regions & Countries

  • Publications
  • Our Methods
  • Short Reads
  • Tools & Resources

Read Our Research On:

How Pew Research Center will report on generations moving forward

Journalists, researchers and the public often look at society through the lens of generation, using terms like Millennial or Gen Z to describe groups of similarly aged people. This approach can help readers see themselves in the data and assess where we are and where we’re headed as a country.

Pew Research Center has been at the forefront of generational research over the years, telling the story of Millennials as they came of age politically and as they moved more firmly into adult life . In recent years, we’ve also been eager to learn about Gen Z as the leading edge of this generation moves into adulthood.

But generational research has become a crowded arena. The field has been flooded with content that’s often sold as research but is more like clickbait or marketing mythology. There’s also been a growing chorus of criticism about generational research and generational labels in particular.

Recently, as we were preparing to embark on a major research project related to Gen Z, we decided to take a step back and consider how we can study generations in a way that aligns with our values of accuracy, rigor and providing a foundation of facts that enriches the public dialogue.

A typical generation spans 15 to 18 years. As many critics of generational research point out, there is great diversity of thought, experience and behavior within generations.

We set out on a yearlong process of assessing the landscape of generational research. We spoke with experts from outside Pew Research Center, including those who have been publicly critical of our generational analysis, to get their take on the pros and cons of this type of work. We invested in methodological testing to determine whether we could compare findings from our earlier telephone surveys to the online ones we’re conducting now. And we experimented with higher-level statistical analyses that would allow us to isolate the effect of generation.

What emerged from this process was a set of clear guidelines that will help frame our approach going forward. Many of these are principles we’ve always adhered to , but others will require us to change the way we’ve been doing things in recent years.

Here’s a short overview of how we’ll approach generational research in the future:

We’ll only do generational analysis when we have historical data that allows us to compare generations at similar stages of life. When comparing generations, it’s crucial to control for age. In other words, researchers need to look at each generation or age cohort at a similar point in the life cycle. (“Age cohort” is a fancy way of referring to a group of people who were born around the same time.)

When doing this kind of research, the question isn’t whether young adults today are different from middle-aged or older adults today. The question is whether young adults today are different from young adults at some specific point in the past.

To answer this question, it’s necessary to have data that’s been collected over a considerable amount of time – think decades. Standard surveys don’t allow for this type of analysis. We can look at differences across age groups, but we can’t compare age groups over time.

Another complication is that the surveys we conducted 20 or 30 years ago aren’t usually comparable enough to the surveys we’re doing today. Our earlier surveys were done over the phone, and we’ve since transitioned to our nationally representative online survey panel , the American Trends Panel . Our internal testing showed that on many topics, respondents answer questions differently depending on the way they’re being interviewed. So we can’t use most of our surveys from the late 1980s and early 2000s to compare Gen Z with Millennials and Gen Xers at a similar stage of life.

This means that most generational analysis we do will use datasets that have employed similar methodologies over a long period of time, such as surveys from the U.S. Census Bureau. A good example is our 2020 report on Millennial families , which used census data going back to the late 1960s. The report showed that Millennials are marrying and forming families at a much different pace than the generations that came before them.

Even when we have historical data, we will attempt to control for other factors beyond age in making generational comparisons. If we accept that there are real differences across generations, we’re basically saying that people who were born around the same time share certain attitudes or beliefs – and that their views have been influenced by external forces that uniquely shaped them during their formative years. Those forces may have been social changes, economic circumstances, technological advances or political movements.

When we see that younger adults have different views than their older counterparts, it may be driven by their demographic traits rather than the fact that they belong to a particular generation.

The tricky part is isolating those forces from events or circumstances that have affected all age groups, not just one generation. These are often called “period effects.” An example of a period effect is the Watergate scandal, which drove down trust in government among all age groups. Differences in trust across age groups in the wake of Watergate shouldn’t be attributed to the outsize impact that event had on one age group or another, because the change occurred across the board.

Changing demographics also may play a role in patterns that might at first seem like generational differences. We know that the United States has become more racially and ethnically diverse in recent decades, and that race and ethnicity are linked with certain key social and political views. When we see that younger adults have different views than their older counterparts, it may be driven by their demographic traits rather than the fact that they belong to a particular generation.

Controlling for these factors can involve complicated statistical analysis that helps determine whether the differences we see across age groups are indeed due to generation or not. This additional step adds rigor to the process. Unfortunately, it’s often absent from current discussions about Gen Z, Millennials and other generations.

When we can’t do generational analysis, we still see value in looking at differences by age and will do so where it makes sense. Age is one of the most common predictors of differences in attitudes and behaviors. And even if age gaps aren’t rooted in generational differences, they can still be illuminating. They help us understand how people across the age spectrum are responding to key trends, technological breakthroughs and historical events.

Each stage of life comes with a unique set of experiences. Young adults are often at the leading edge of changing attitudes on emerging social trends. Take views on same-sex marriage , for example, or attitudes about gender identity .

Many middle-aged adults, in turn, face the challenge of raising children while also providing care and support to their aging parents. And older adults have their own obstacles and opportunities. All of these stories – rooted in the life cycle, not in generations – are important and compelling, and we can tell them by analyzing our surveys at any given point in time.

When we do have the data to study groups of similarly aged people over time, we won’t always default to using the standard generational definitions and labels. While generational labels are simple and catchy, there are other ways to analyze age cohorts. For example, some observers have suggested grouping people by the decade in which they were born. This would create narrower cohorts in which the members may share more in common. People could also be grouped relative to their age during key historical events (such as the Great Recession or the COVID-19 pandemic) or technological innovations (like the invention of the iPhone).

By choosing not to use the standard generational labels when they’re not appropriate, we can avoid reinforcing harmful stereotypes or oversimplifying people’s complex lived experiences.

Existing generational definitions also may be too broad and arbitrary to capture differences that exist among narrower cohorts. A typical generation spans 15 to 18 years. As many critics of generational research point out, there is great diversity of thought, experience and behavior within generations. The key is to pick a lens that’s most appropriate for the research question that’s being studied. If we’re looking at political views and how they’ve shifted over time, for example, we might group people together according to the first presidential election in which they were eligible to vote.

With these considerations in mind, our audiences should not expect to see a lot of new research coming out of Pew Research Center that uses the generational lens. We’ll only talk about generations when it adds value, advances important national debates and highlights meaningful societal trends.

  • Age & Generations
  • Demographic Research
  • Generation X
  • Generation Z
  • Generations
  • Greatest Generation
  • Methodological Research
  • Millennials
  • Silent Generation

Download Kim Parker's photo

Kim Parker is director of social trends research at Pew Research Center .

Teens and Video Games Today

As biden and trump seek reelection, who are the oldest – and youngest – current world leaders, how teens and parents approach screen time, who are you the art and science of measuring identity, u.s. centenarian population is projected to quadruple over the next 30 years, most popular.

1615 L St. NW, Suite 800 Washington, DC 20036 USA (+1) 202-419-4300 | Main (+1) 202-857-8562 | Fax (+1) 202-419-4372 |  Media Inquiries

Research Topics

  • Email Newsletters

ABOUT PEW RESEARCH CENTER  Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions. It is a subsidiary of  The Pew Charitable Trusts .

© 2024 Pew Research Center

voip research paper topics

  • Trustworthy AI

Our trust in technology relies on understanding how it works. It’s important to understand why AI makes the decisions it does. We’re developing tools to make AI more explainable, fair, robust, private, and transparent.

Tiny benchmarks for large language models

  • Foundation Models

IBM’s Granite model is one of the most transparent LLMs in the world

voip research paper topics

  • AI Transparency
  • Open Source

What is red teaming for generative AI?

  • Adversarial Robustness and Privacy
  • Fairness, Accountability, Transparency
  • Natural Language Processing

An AI model trained on data that looks real but won’t leak personal information

voip research paper topics

  • Data and AI Security

The latest AI safety method is a throwback to our maritime past

voip research paper topics

  • Explainable AI
  • Generative AI

What is AI alignment?

  • Automated AI
  • See more of our work on Trustworthy AI
  • AI Testing We’re designing tools to help ensure that AI systems are trustworthy, reliable and can optimize business processes.
  • Adversarial Robustness and Privacy We’re making tools to protect AI and certify its robustness, and helping AI systems adhere to privacy requirements.
  • Explainable AI We’re creating tools to help AI systems explain why they made the decisions they did.
  • Fairness, Accountability, Transparency We’re developing technologies to increase the end-to-end transparency and fairness of AI systems.
  • Trustworthy Generation We’re developing theoretical and algorithmic frameworks for generative AI to accelerate future scientific discoveries.
  • Uncertainty Quantification We’re developing ways for AI to communicate when it's unsure of a decision across the AI application development lifecycle.

voip research paper topics

Science for Social Good

IBM Science for Social Good partners IBM Research scientists and engineers with academic fellows, subject matter experts from NGOs, public sector agencies, and social enterprises to tackle emerging societal challenges using science and technology.

Publications

  • Cynthia Dwork
  • Kristjan Greenewald
  • Frank Libsch
  • Steve Bedell
  • Assala Benmalek
  • Celia Cintas
  • Leshem Choshen
  • LREC-COLING 2024
  • Brian W. Bauer
  • JMIR Mental Health

voip research paper topics

Building trustworthy AI with Watson

Our research is regularly integrated into Watson solutions to make IBM’s AI for business more transparent, explainable, robust, private, and fair.

  • Skip to main content
  • Skip to search
  • Skip to footer

Products and Services

Now available: ccna v1.1 exam topics.

Validate your knowledge and skills in network fundamentals and access, IP connectivity, IP services, security fundamentals, and more. Take your IT career in any direction by earning a Cisco Certified Network Associate (CCNA) certification.

CCNA certification

Validate your knowledge and skills in network fundamentals and access, IP connectivity, IP services, security fundamentals, and more. Take your IT career in any direction by earning a Cisco Certified Network Associate (CCNA) certification.

Your career in networking begins with CCNA

Take your IT career in any direction by earning a CCNA. CCNA validates a broad range of fundamentals for all IT careers - from networking technologies, to security, to software development - proving you have the skills businesses need to meet market demands.

Networking fundamentals

Showcase your knowledge of networking equipment and configuration. Be able to troubleshoot connectivity issues and effectively manage networks.

IP Services

Demonstrate your ability to configure routing for different IP versions and describe the purpose of redundancy protocols. Be able to interpret the components of a routing table.

Security fundamentals

Understand threats and ways to prevent them. Identify key elements of a security program, like user awareness and training. Demonstrate practical skills like setting up secure access to devices and networks.

Understand how automation affects network management, and compare traditional networks with controller-based networking. Leverage APIs, and understand configuration management tools.

Your career in networking begins with CCNA

CCNA Certification

How it works, no formal prerequisites.

CCNA is an asset to IT professionals of all experience levels, but learners often benefit from one or more years of experience implementing and administering Cisco solutions.

Example learner profiles

  • Individuals looking to move into the IT field
  • IT professionals looking to stand out in the job market
  • IT professionals looking to enrich their current roles with additional networking skills

To earn the CCNA certification, you’ll need to pass a single required exam.

Getting started

To earn this certification, you’ll need to pass a single required exam.

A variety of resources are available to help you study - from guided learning to self-study and a community forum.

voip research paper topics

Unlock your career potential

Because CCNA covers so many IT fundamentals, it’s a great way to stand out no matter where your career takes you.

Potential roles

Network engineer.

Apply a range of technologies to connect, secure, and automate complex networks.

Network administrator

Install, maintain, monitor, and troubleshoot networks and keep them secure.

Help desk administrator

Diagnose and troubleshoot technical issues for clients and employees.

Alumni testimonials

Ccna moved elvin up the career ladder.

CCNA moved Elvin up the career ladder

"Passing that CCNA exam triggered a chain of events I could never have predicted. First, I was a student, then a teacher, then a Cisco instructor, and I eventually became a Cisco VIP."

Elvin Arias Soto, CloudOps engineer

CCNA, CCDP, CCDA, CCNP, CCIE

Certifications give Kevin instant credibility at work

Certifications give Kevin instant credibility at work

"People always want to know who they're talking to. They want to know if you’re qualified. Certifications give you instant credibility."

Kevin Brown, CyberOps analyst

CCNA, CyberOps Associate

Ben made a career change with a Cisco certification

Ben made a career change with a Cisco certification

"I chose to pursue Cisco certifications because I knew it would put me in the best position to start a career in networking."

Ben Harting, Configuration engineer

Maintain your certification

Your certification is valid for three years. You can renew with Continuing Education credits or retake exams before they expire.

CCNA essentials webinar series

Learn what to expect from the CCNA exam, and chart your path to certification success.

CCNA certification guide

Get familiar with Cisco’s learning environment, find study resources, and discover helpful hints for earning your CCNA.

CCNA Prep Program

Packed with 50+ hours of resources, webinars, and practice quizzes, CCNA Prep On Demand is your ultimate study buddy.

Enhance your learning journey

Stay up to date.

Get the latest news about Cisco certifications, plus tools and insights to help you get where you want to go.

CCNA community

Not sure where to begin? Head to the Cisco CCNA community to get advice and connect with experts.

IMAGES

  1. Voip Research Paper

    voip research paper topics

  2. A Review Paper: Voice over Internet Protocol

    voip research paper topics

  3. 🌈 Easy paper topics. 162 Intriguing Science Research Paper Topics for

    voip research paper topics

  4. (PDF) A Survey Paper on Voice over Internet Protocol (VOIP)

    voip research paper topics

  5. 📚 VOIP Research Essay Example

    voip research paper topics

  6. Research paper on VOIP Technology

    voip research paper topics

VIDEO

  1. My Reaction That sanchem019 the sector company group's backup Got 164 Subscribers

  2. What is VOIP (Voice Over Internet Protocol)? How does VOIP work by Dr. Ujjwal Chugh #voip #digital

  3. What are the most popular and commonly used VoIP Phone features in 2023?

  4. VOIP

  5. Online Workshop on Research Paper Writing & Publishing Day 1

  6. Online Workshop on Research Paper Writing & Publishing Day 2

COMMENTS

  1. A study of Voice-over-Internet Protocol quality metrics

    Research methodology This study has reviewed 38 papers relevant to VoIP quality metrics. A search with query “SIP and SIP over WebSocket quality metrics†has been conducted on Google Scholar and returned 277 results as of April 2021. ... Four popular VoIP applications at the time of research are used to be compared with each other ...

  2. 41079 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on VOIP. Find methods information, sources, references or conduct a literature review on VOIP

  3. (PDF) A Closer Look on Challenges and Security Risks of Voice Over

    This paper aims to direct future research efforts and to offer helpful guidelines for practitioners. Keywords-Network security, Speaker Detection, attack on VoIP, Tracing a VoIP call, voice over ...

  4. Full article: Conducting qualitative interviews via VoIP technologies

    The paper starts with a review of the methodological literature and a discussion of the advantages and disadvantages of online interviews. ... which makes it difficult to select the appropriate VoIP technology for a research project. ... L., & Mullan, B. (2019). Voice-only Skype for use in researching sensitive topics: A research note ...

  5. VoIP Technology: Applications and Challenges

    This book is a valuable source of information for academics and researchers, as it provides state-of-theart research in VoIP technology. It is also of interest to network designers, application architects, and service providers looking for a coherent understanding of VoIP across a wide range of devices, network applications and user categories.

  6. PDF Voice over Internet Protocol (VOIP): Overview, Direction And ...

    VoIP has great benefits of increased saving, high quality voice and video streaming and several other added value services. Examples of VoIP software are: Skype, Google talks and windows live messenger (Di Wu, 2002). 2. Overview of VoIP VoIP stand for Voice over Internet Protocol. VoIP enables us to compress and convert voice signal to digital ...

  7. 41079 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on VOIP. Find methods information, sources, references or conduct a literature review on VOIP

  8. PDF A Survey of Voice over IP Security Research

    4 Survey of VoIP Security Research In the this section, we classify various research papers across the first four elements of the VoIPSA taxonomy (the last two relate to physical and non-security issues). We also include a cross-cutting category, which includes work that covers multiple areas (e.g.,

  9. A Survey on Voice over Internet Protocol (VoIP) Reliability Research

    VoIP technology deals with the real-time data communication for voice transfer in the form of digital packets through internet communication and facilitates public to make use of internet for video and phone calls. The voice data packets are transferred from source to the destination and vice versa. VoIP require high speed internet connection ...

  10. PDF A Comprehensive Survey of Voice over IP Security Research

    Research Angelos D. Keromytis, Senior Member, IEEE Abstract—We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set. We classify these papers according to an extended version of the VoIP Security Alliance (VoIPSA) Threat Taxonomy. Our goal is to provide ...

  11. Voice over Internet Protocol on Mobile Devices

    Voice over internet protocol (VoIP) is a way to carry out a telephone conversation over a data network. VoIP products promise converged telecommunications and data services that are cheaper, more versatile and provide good voice quality as compared to traditional offerings. Although VoIP is widely used, VoIP on mobile devices is still in its infancy. Currently, there are a number of VoIP ...

  12. PDF Voice over Internet Protocol (VoIP): The Dynamics of Technology and

    (P2P) VoIP a non-issue for CALEA is exactly what might make it an issue. Second, if P2P VoIP aspires to be a telephony substitute, it will invite the threat of social regulation. Third, arms race between CALEA-compliant and non-compliant technologies may raise the cost of CALEA compliance.

  13. Research on Security of VoIP Network

    In addition, because of the high real time request for VoIP network, the characteristics of network services and the security strategies applied bring challenges for the capability and QoS of VoIP network. In this paper, the existing security threat and several security measures of VoIP network have been analyzed, and the author put forward ...

  14. Voice Over Internet Protocol (VoIP) Research Paper

    We will write a custom essay on your topic a custom Research Paper on Voice Over Internet Protocol (VoIP) 808 writers online . ... (PBX). To explore the challenges that affect VoIP networks, this paper will give an overview of the system. It will discuss the equipment, data handling, cost, speed, and security issues that affect a VoIP network ...

  15. Voice Over Internet Protocol (VoIP) Research Papers

    —This paper describes a comparative study of the performance of VoIP over wireless networks using OPNET tool. The simulation study is completed by running VoIP application in different network scenarios with IEEE 802.16 (UGS, ertPS) and IEEE 802.11 (b, g) with best effort service and interactive service The result clearly illustrated that the ...

  16. Full article: Design and implementation of a VoIP PBX integrated

    One research project investigated voice spam ... features high stability, reliability, and security needed to build a VoIP PBX for the purposes of this paper (Google Cloud, Quotas & Limits, Citation 2020). The GCP service is selected for this work since the Cloud creates 1 VM instances with two vCPU capacity, 7.5 GB RAM, and 100 GB disk for $26 ...

  17. Voice Over Internet Protocol (VOIP) Setup: Case Study Analysis

    Voice over IP (VoIP) is a technology that allows you to transmit your voice from an analogue transmission to a digital one. After that, you can make a direct phone call. IP telephony, broadband, and broadband telephony are all terms that can be heard. VoIP services are subject to fluctuations. As previously stated, VoIP frameworks give clients ...

  18. Voice over Internet protocol (VoIP)

    During the Internet stock bubble, articles in the trade press frequently said that, in the near future, telephone traffic would be just another application running over the Internet. Such statements gloss over many engineering details that preclude voice from being just another Internet application. This paper deals with the technical aspects of implementing voice over Internet protocol (VoIP ...

  19. A Detail Review on Voice over Internet Protocol (VoIP)

    Abstract — Voice over Internet protocol (VoIP) is a new way of. communicating. It is a technology that allows users to make. telephone calls over an IP netw ork. This paper will describe. Voice ...

  20. Voip Research Paper Topics

    Voip Research Paper Topics - Free download as PDF File (.pdf), Text File (.txt) or read online for free. voip research paper topics

  21. VOIP security Research Papers

    Voice over IP (VoIP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks, this paper reviews models, frameworks and auditing standards proposed to this date to manage VoIP security through a literature review, with descriptions of both the historical and philosophical evolution reflecting an adequate knowledge of related research.

  22. VoIP Research Papers: Ideas to Consider

    Idea#4 for VoIP research papers. Write how this technology affects today's business world and relations between countries. You may interview people, visit forums, and so on to gather enough information for such VoIP research papers. If you need more help with writing VoIP research papers, you may use some past papers on this topic.

  23. 120+ Fascinating Essay Topics for High School Students

    The following ideas work well for compare-contrast essays. ( Find 80+ compare-contrast essay topics for all ages here.) Public and private schools. Capitalism vs. communism. Monarchy or democracy. Dogs vs. cats as pets. WeAreTeachers. Paper books or e-books. Two political candidates in a current race.

  24. How Pew Research Center will report on generations moving forward

    How Pew Research Center will report on generations moving forward. Journalists, researchers and the public often look at society through the lens of generation, using terms like Millennial or Gen Z to describe groups of similarly aged people. This approach can help readers see themselves in the data and assess where we are and where we're ...

  25. Trustworthy AI

    We need to be able to look inside AI systems, to understand the rationale behind the algorithmic outcome, and even ask it questions as to how it came to its decision. At IBM Research, we're working on a range of approaches to ensure that AI systems built in the future are fair, robust, explainable, account, and align with the values of the ...

  26. CCNA

    Your career in networking begins with CCNA. Take your IT career in any direction by earning a CCNA. CCNA validates a broad range of fundamentals for all IT careers - from networking technologies, to security, to software development - proving you have the skills businesses need to meet market demands.