Voice over Internet Protocol

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 2 of 21 - About 204 Essays
  • Improved Essays

    When a person is browsing on the Internet, that person may not realize how their privacy is being affected. One moment, a person will be looking at computers on Amazon, and the next second, he/she will discover an advertisement for a computer being sold on Amazon while browsing his/her Facebook feed. This is the act of their web privacy settings being taken advantage of through the use of personal information gathered from third-party sources on the web. Web privacy is being assaulted in the…

    • 759 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    System Security

    • 1010 Words
    • 5 Pages

    System security comprises of the procurements and approaches embraced by a system overseer to counteract and screen unapproved access, abuse, alteration, or refusal of a PC system and system available assets. To comprehend what is system security, it serves to comprehend that no single arrangement shields you from a mixture of dangers. You require various layers of security. On the off chance that one comes up short, despite everything others stand. System security is proficient through…

    • 1010 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    room or kids post picture of themeselves naked or not naked but stupid picture and put it on the internet. It stay on the internet and haut from the rest of their life. They cant get job in the future because when a manger search people on the application. They see that she has a naked picture or doing drug picture on her profile. In other protect yourself do not post picture on the profile or internet because it will spread around the…

    • 769 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Ixwebhosting Case Analysis

    • 1022 Words
    • 5 Pages

    Ixwebhosting Reviews and Coupons Started with a server in a living room in 1999, Ixwebhosting have grown to be one of the best hosting companies in the market. With over a decade of experience, they have gained the necessary knowledge and stability to provide the best service to over 100,000 customers that they serve today. If you are working on a small budget and in need of a dedicated IP address, Ixwebhosting might just be the best choice for you. For only $3.95 you get amazing features…

    • 1022 Words
    • 5 Pages
    Decent Essays
  • Superior Essays

    impressive feat. Some cities have managed to accomplish it, and along with the wonder and awe of free Wi-Fi anywhere you go comes a combination of inherent risks we have to consider. These risks range from potentially disastrous security risk to local internet providers losing sales, being forced to increase prices, and the mind-blowing amount of money required to attain this. One should keep in mind all these risks before deciding to move forward into the decision of implementing a city-wide…

    • 703 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    A traditional traffic model for circuit switched data as well as packet data is the Poisson process in which the number of incoming packets per time is according to Poisson distribution. It is one of the most widely used and oldest traffic models. In this model the length of each packet is based on exponential distribution and the number of simultaneously ongoing packets is according to Erlang distribution [16]. The Poisson process is characterized as a renewal process. In a Poisson process the…

    • 710 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The amount of data that must be transmitted through the Internet increases exponential, new applications such as RealAudio, Real Video, Internet Phone software and videoconferencing systems need a lot more bandwidth than the applications that were used in the early years of the Internet, this means that without any bandwidth control, the quality of these real-time streams depends on the bandwidth that is just available…

    • 493 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2. 135.46.57.14 3. 135.46.52.2 4. 192.53.40.7 5. 192.53.56.7 g entirely with bytes is much simpler than working with individual bits. Answers: 1. 135.46.63.10 Using the first 22 bits of it as…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    explanation of ONT(Optical Network Terminal), ONU, FTTH-BPON and FTTH-GEPON systems in FTTx premises. 2. Objectives The key objectives of the lab are : • Learning Fiber to the home - BPON and Fiber to the home - GEPON systems. • To process the layer 2 internet services in Gigabit passive optical network (GPON) FTTH using OLT CLI command and FTTH U2000 client-server and monitoring the performance of fiber optic media. • [1] The main motive for this lab is to introduce and investigate the…

    • 1575 Words
    • 7 Pages
    Superior Essays
  • Page 1 2 3 4 5 6 7 8 9 21