The convergence of data and voice networks in the business environment takes on a new twist with the emergence of wireless networking. The freedom of mobility told her i would users in a Wireless LAN has proven to provide a noticeable boost in productivity, efficiency, and. employee https://literacymiliter.com/ spirits. No longer is the work force tied to their desk when face to face. Workers can access company files and receive important communications from anywhere on the company campus that is in choice of a radio access point.
With voice communications thrown into the mix, mobile users can stay in touch while roaming the property inside or out, and even on the road. The acceptance of the fixed to mobile convergence concept by the telecoms industry only promises to fuel the fire for the adopting of VoIP over Wireless.
The Challenges of Implementing VoIP over Wireless Networks
As with any emerging technology, there are challenges to overcome. The development of the converged network, i. e. data and voice for a passing fancy IP based LAN, while yet to be an established convention, is demonstrating to be beneficial for businesses from both an expense and productivity perspective. Adding the outlook of VoIP over a wireless network introduces a whole new set of issues.
VoIP is a time sensitive technology. Calls must be set up and authenticated, and voice packets must arrive at their destination without being interrupted and on time. This involves a near continuous network stream, uninterrupted by less sensitive data transmissions. The execution of Quality of Service techniques on wired LANs guaranteeing that these voice packets receive priority, and call quality issues such as latency, jitter, and bundle loss have been completely addressed.
Enter the standards based wireless network, a technology in an earlier stage of development, and more challenges occur. While today’s wired network provides plenty of bandwidth for both voice and data to coexist, WLANs provide less bandwidth, and Quality of Service issues must be revisited. Security measures such as authentication and encryption must be implemented and can add to the problem by increasing the size of the voice bundle. Additionally, users on the move will traverse wireless access points where handoffs must be quick and smooth.
The IEEE 802 standards overseeing wireless technology are growing rapidly and promise to deal with a diverse array of Wireless issues. Increasing the bandwidth available, prioritizing voice packets for QoS, authentication and encryption protocols for security, and enhanced roaming techniques are all being addressed.
Also in development is the wireless technology commonly known as WiMax, providing for the execution of high bandwidth wireless communications covering miles all the way to 30 miles. The development of WiMax could prove of great consequence to developing countries, as well as Metropolitan LANs.
Security in a VoIP/WiFi Network
Companies desperate to implement wVoIP must take security issues into consideration before it starts. As with any IP network, the dangers of cyber-terrorist, denial of service, highjacking and spam, all lurk in the shadows.
Because a wireless network uses radio frequencies as its transmission media, the security normally offered by a firewall in a wired network is not sufficient, as a result of the physics. Whereas to break into a wired LAN requires cyber-terrorist to either physically be inside the network in order to hack into in through the Internet, in a WLAN they can grab network transmissions from the air while parked next door. The security conditions that network administrators must consider in a VoWLAN are the privacy of talks, and the protection of the network structure.
For Wireless networks, security has had a unreliable start with the execution of WEP as its security mechanism. WEP offers up authentication and encryption between the user and the access point, and was found to be easily hacked. The 802. 11i standard, used as WPA2 (Wireless Protected Access), offers up better quality security by requiring two way authentication between the user and the network, and uses AES (Advanced Encryption Standard) as its encryption engine.
As network administrators plan the rollout of a wireless VoIP network, the greatest security threat they face is improper execution. Building security into the design of the initial deployment can, and may affect the network topology, as well as material costs. Failure to do so could lead to further expenses in loss of services and network redesigns in the event of compromise.
Wireless, VoIP, and the Cellular Networks
Manufacturers of cellular devices are incorporating Wireless radios into their mobile phones at an rising rate. New versions of mobile os’s are quit complete with a built-in VoIP heap, inviting carriers and manufacturers to add VoIP functionality to their devices. Dual and Quad band cell phones can select from the most robust network available, cellular or Wireless, and place a call accordingly.
As cell phones are more like mobile offices, the benefits of a mobile work force become apparent. In the case of the street knight, the ability to communicate via email, txt messaging, video or voice, allows them to stay on the road longer without losing touch. In the age of instant information, mobile office applications allow files to be down loaded, edited, and published, increasing the productivity of the vacationer to the point where almost everything which can be done at the office can be done on the road.
A cell phone that can switch between cellular and Wireless networks can significantly reduce telecoms costs at the corporate office. With Wireless ‘hang-outs’ sprouting up at hotels, coffee shops, bookstores, and corporate LANs across the globe, mobile workers can stay in touch with office and family both on and off the job. With the addition of a VoIP service provider, cheaper VoIP calls can be made from any Wireless network at the push of a button.
Imagine, if you will, another where one phone, with one cell phone number, can faultlessly traverse cellular networks, Wireless networks, cable and PSTN landlines. Where roaming and switching between disparate networks occur without being interrupted or loss of call quality. Fixed Mobile Convergence is the buzzword of the decade, and the IP Multimedia Subsystem (IMS) buildings is the standard that promises to get us there.
The purpose of IMS is to provide all the services and applications that the Internet provides, both current, and as of yet unimagined. IP based services such as VoIP, Push to talk cellular (POC), videoconferencing, txt messaging, community services, presence information and file sharing, are just some of the number of choices. Designed to work with any fixed, mobile or wireless bundle switched network, in the opposite direction compatibility for the legacy enterprise switched phone system is provided with the use of gateways.
Although still in its infancy, IMS has already been being implemented by AT&T as the platform in it’s freshly acquired Cingular cellular network. Interest in choosing a new structure by mobile and fixed operators has been along, as they weigh the costs and benefits of the new technology.
As the technology of VoIP over Wireless networks continues to develop, businesses of all sizes can experience the benefits of increased mobility, productivity, and significant cost benefits. Standards committees are constantly working on ways to increase security and quality of service, and as fixed mobile convergence gains acceptance in the telecoms industry, more choices in the services offered and the IP applications available to businesses will automatically follow. What will also be interesting to watch, is how these very bandwidth intensive applications will be priced by the carrier networks, and how it will affect the neutrality of the Internet.