Verified Document

Voice Over IP Assessing The Term Paper

Bibliography

Bal Athwal, Fotios C. Harmantzis, & Venkata Praveen Tanguturi. (2010). Valuing Hosted VoIP services in the enterprise market: case application using real options. International Journal of Technology Management, 49(1-3), 250-271.

Basaglia, S., Caporarello, L., Magni, M., & Pennarola, F.. (2009). Environmental and organizational drivers influencing the adoption of VoIP. Information Systems and eBusiness Management, 7(1), 103-118.

Bayer, N., Xu, B., Rakocevic, V., & Habermann, J.. (2010). Application-aware scheduling for VoIP in Wireless Mesh Networks. Computer Networks,

54(2), 257.

Blefari-Melazzi, N., Daigle, J., & Femminella, M.. (2009). Efficient and stateless deployment of VoIP services. Computer Networks, 53(5), 706.

Reu-Ching Chen, & Chen-Sung Chang. (2007). Optimum latency guarantee by using weighting methods in real time VOIP. Journal of Information & Optimization Sciences, 28(4), 641-651.

de Bijl, P., & Peitz, M.. (2009). Access regulation and the adoption...

Journal of Regulatory Economics, 35(2), 111-134.
Diffie, W., & Landau, S.. (2009). Communications Surveillance: Privacy and Security at Risk. Association for Computing Machinery. Communications of the ACM, 52(11), 42.

Karapantazis, S., & Pavlidou, F.. (2009). VolP: A comprehensive survey on a promising technology. Computer Networks, 53(12), 2050.

Michael Marsanu. (2006). VoIP: carrying the most sensitive data? Network Security, 2006(9), 19.

Nunn, L., McGuire, B., & Crowe, B.. (2010). Voice-Over-Internet Protocol (VOIP) Cost Efficiencies and the Decision to Implement. The Review of Business Information Systems, 14(1), 1-11.

Theodore Tryfonas, Iain Sutherland, & Ioannis Pompogiatzis. (2007). Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples. Internet Research, 17(1), 61.

Wang, C., & Wei, H.. (2009). IEEE 802.11n MAC Enhancement and Performance Evaluation. Mobile Networks and Applications, 14(6), 760-771.

Patrick…

Sources used in this document:
Theodore Tryfonas, Iain Sutherland, & Ioannis Pompogiatzis. (2007). Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples. Internet Research, 17(1), 61.

Wang, C., & Wei, H.. (2009). IEEE 802.11n MAC Enhancement and Performance Evaluation. Mobile Networks and Applications, 14(6), 760-771.

Patrick Xavier. (2008). From universal service to universal network access? Info: the Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media, 10(5/6), 20-32.
Cite this Document:
Copy Bibliography Citation

Related Documents

Fiber Optics Assessing the Uses
Words: 1260 Length: 5 Document Type: Thesis

Fourth, as fiber optic lacks conductivity it does not heat up, expand, contract or lose any of its conductivity properties over time. Fiber optic cable therefore has a lower Total Cost of Ownership (TCO) as a result of not having to contend with the continual wear and tear on the metallurgical values of the wire (Ferelli, 23, 24). The Specific Advantages of Fiber Cabling over Copper: Taking a Closer Look It's been

Secure Teleconferencing Assessing the Security
Words: 1639 Length: 5 Document Type: Essay

Web conferencing systems have been faced with resistance to change by those responsible for knowledge transfer and knowledge management, as these systems are seen as a threat to the more costly and time-consuming approaches to sharing knowledge. It has been seen that employees will resist using Web Ex-systems as they are afraid it makes the transfer of their knowledge too easy, and therefore is a risk to their status

New Product Acceptance in the
Words: 3875 Length: 10 Document Type: Term Paper

The other members of the value chain, particularly the service providers and device manufacturers, vie strongly against one another for differentiating content. Through the use of the access in order to top content as currency, content or brand owners and publishers will extend their control of the value chain by buying or merely controlling and by way of content distribution points. (Future Mobile Entertainment Scenarios: MEF White Paper) Possible opportunities

Mobile Telephony Cellular Service Was Launched in
Words: 2630 Length: 10 Document Type: Essay

Mobile Telephony Cellular service was launched in UK in 1985. Cantel and affiliates of Mobility UK were licenced to operate at 800 MHz. Personal Communications Services (PCS) operating at 1.8 GHz was licenced in UK in December 1995 with two new players, Clearnet and Microcell each receiving 30 MHz of spectrum. Mobility UK affiliates and Cantel each received 10 MHz of new spectrum. PCS service was launched in late 1997. Today,

Strategic Information Technology Plan Oesterlen Services for
Words: 6081 Length: 19 Document Type: Essay

Strategic Information Technology Plan Oesterlen Services for Youth is an organization that helps troubled youth in Ohio. It consists of a counseling center and a foster care placement program, as well as residential services for both male and female youth for intensive care cases. In order for Oesterlen to continue to help as many youth as possible, it has to be up-to-date on its technology. To that end, it has set

Network Performance for Davis Networks
Words: 5282 Length: 18 Document Type: Capstone Project

Network Implementation for Davis Networks Inc. In the proposal, effort is made to develop an affordable local LAN for Davis Networks Inc. The effort involves provision of wireless Internet connection to all individuals for their desktops and laptops from the current high speed connection they have at an affordable price (800 USD -- 1000 USD). Provision of the internet to the same location costs approximately 700 USD including all other expenses

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now