Secured Network Conferencing using VOIP
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
22-04-2010, 11:03 AM


Introduction:

VoIP is a set of rules, also known as protocols, and devices that enable users to make phone calls over the Internet. "VoIP systems transmit signals to set up and tear down calls and media to make it possible for users to hear each other talk. These signals and media are sent over networks as packets just like other forms of data. Another term for VoIP is 'packet telephony.'

VOIP
Short for Voice over Internet Protocol, VoIP describes the category of hardware and software that enables people to make telephone calls via the Internet.
30 years ago Internet didn't exist. Interactive communications were only made by telephone at PSTN line . Today we can see a real revolution in communication world, everybody begins to use PCs and Internet for job and free time to communicate each other, to exchange data (like images, sounds, documents) and, sometimes, to talk each other using applications like Internet Phone. It starts to diffuse a common idea that could be the future and that can allow real-time vocal communication: VoIP


Advantages and Disadvantages of VOIP Technology


With all the acronyms flying around these days, sometimes itâ„¢s hard to know just what a set of initials stands for. VOIP stands for Voice Over Internet Protocol. VOIP often masquerades by other names as well, such as: IP Telephony, Internet telephony, and digital phone.

Now that you know what VOIP stands for. VOIP is the latest, hottest trend in telephone service. VOIP makes it possible to have voice conversations over the Internet through the use of Internet phones.

Now this ability to have conversations via your computer has many advantages. One is that it makes it easy for business people to stay connected and in touch. VOIP technology also has the advantage of giving people from around the globe an opportunity to talk directly for generally much less than long distance charges would be. The savings on telephone charges alone make VOIP highly attractive to many people.

While these are great advantages, there is a downside. Because of its newness, VOIP technology is not quite as good overall as ordinary telephone service. Many people who use Internet telephony complain about the reception they get. This technology is rapidly improving, though, and some VOIP providers already have pretty darn good equipment out there.

Too, unless your digital telephone is directly connected to a landline phone company, you will be at the mercy of power outages. Thereâ„¢s also a problem with Internet providers going down and leaving you stranded without telephone service. So many experts recommend that you keep a landline or cell phone along with your Internet phone. This, of course, pushes up costs which makes VOIP telephones less desirable to many folks.

Another downside to VOIP technology that™s very important to know about is that it is susceptible to identity theft. Because many VOIP service providers do not have secure lines”yet”your calls can be listened to by people you aren™t aware are listening in.

It™s a little like the old days when the telephone was first invented and mass produced. People called through what were call party lines that meant anyone could listen”and they did. We humans just can™t resist eavesdropping. Today, though, this can also make it easy for those unscrupulous, well, thugs to rip off your personal and confidential information. So when choosing a VOIP service provider, you want to be sure you™re getting the most secure line as possible.

And just like when the telephone was first invented, VOIP technology will take some time to perfect. But it is technology that™s here to stay. As people get busier and are attempting to multi-task everything, being able to have a telephone conversation while you continue to work on your computer, all in one simple package, is just too good to resist. So the one thing you can count on is that in a year or two, VOIP telephones will be practically as common as cell phones”and probably with equipment and service plans available that are as good as cell phone manufacturers and service providers have now.

Requirement for the company :

To develope a VoIP environment for sending of text and voice by implementing auto security is included for both text and voice packets

EXISTING SYSTEM:
In the present day Hotmail Server, MSN Server provide separate windows for transmitting and receiving text and voice are available and in Yahoo Server the voice is stored in a file and then it is converted into packets and it is transmitted by the use of Half duplex communication. Both the windows for voice and text cannot be used simultaneously to transmit or receive. Also security of the text or voice packets is optional.

PROPOSED SYSTEM:
This "Secured Network Conferencing Using VoIP" evolves in the VoIP environment. Sending of text and voice using single window is possible. Auto security is included for both text and voice packets. IP Telephony can be attached with the system in the Intranet environment directly and in Internet environment through VoIP server.

The Voice over Internet Protocol merges the VoIP devices like IP Telephony, Palms, PDAs, etc. over IP network for communication, in which case the source and destination may be telephone network or computer network.

In the proposed system, we implement the voice conferrencing between systems in LAN. The systems should have head sets attached to it.


Abstract(Specification)

The Java provides all the packages, classes, and methods necessary to establish and maintain real time audio/data conferencing sessions over IP data networks. Java provides transformation compatibility over various networks and operating systems. The audio/data conferencing is done in point-to-point fashion, Multicasting and Broadcasting, satisfying the users requirements.

Any user can join in the conference by registering himself to the server. Similarly many users can join in it. The current on-line user list will be displayed on the screen. The user can communicate with them and the conversation is made both on text and voice based in the form of unicasting or broadcasting depending on the necessity.



Modules

1. AudioBase
? Base class for stream-based audio i/o
? Current volume level
? Opens the sound hardware
? Find the current playback level

2. AudioCapture

Class that provides an AudioInputStream that reads its data from the sound card input the AudioInputStream is in the network format get and open the target data line for capture. Sets the output stream

3. AudioPanel

Class that sets the Microphone,Speaker frequency levels. This includes Mike testing, Mute, Buffer Size in milliseconds, Disconnect, Setting the volume.

4. AudioPlayback

Class that reads its audio from an AudioInputStream. Get the playback data line for capturing the voice.

5. ChatApplet

Window where the user gives the login of the machine and start the chatting. Here user can adjust the frequency level of the speaker and microphone, Change the port number.........like this.

6. ConnectionSettings

Microphone and Speaker are connected to the system.Port number of the current machine, Connection Type, Format code are included.

7. TCP Network

The protocol which supports our project and implimentation is TCP. UDP is not supported. Listening port, ReceiveStream, OutputSream, InetAddress, etc. are given

SOFTWARE REQUIREMENTS
Platform : JAVA
Operating System : Microsoft Windows NT 4.0 or
Windows 2000 or XP

HARDWARE REQUIREMENTS
Processor : 733 MHz Pentium III Processor
RAM : 128 MB
Hard Drive : 10GB
Monitor : 14 VGA COLOR MONITOR
Keyboard : 104 Keys
Floppy Drive : 1.44 MB
Mouse : Logitech Serial Mouse
Disk Space : 1 GB
HeadSet : 2 Nos.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
Harish Ramamoorthy
Active In SP
**

Posts: 3
Joined: Jan 2012
#2
30-01-2012, 05:43 PM

Hi,

Can you please share the full project and implimentation of Secured Network Conferencing using VoIP.

Regards,
Harish R
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#3
31-01-2012, 10:21 AM


to get information about the topic Secured Network Conferencing using VOIP full report ,ppt and related topic refer the link bellow

topicideashow-to-secured-network-conferencing-using-voip
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,057 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Network Assisted Mobile Computing with Optimal Uplink Query Processing pdf seminar projects maker 0 473 20-09-2013, 04:01 PM
Last Post: seminar projects maker
  The Content-Based Image Retrieval using the Pulse Coupled Neural Network PPT seminar projects maker 0 553 14-09-2013, 01:58 PM
Last Post: seminar projects maker
  AUTOMATED BUSINESS INTELLIGENCE NETWORK FOR SOFTWARE REQUIREMENT SPECIFICATIONS seminar projects maker 0 437 12-09-2013, 03:46 PM
Last Post: seminar projects maker
  The Awareness Network PPT project girl 1 599 02-09-2013, 01:43 PM
Last Post: Guest
  A Study on Topological Characteristics of Wireless Sensor Network pdf study tips 0 412 30-08-2013, 04:57 PM
Last Post: study tips
  Trust Based Secured Adhoc on Demand Distance Vector Routing Protocol for Mobile pdf study tips 0 440 27-08-2013, 02:18 PM
Last Post: study tips
  Inter Bank Fund Transfer in Distributed Network smart paper boy 1 1,422 01-08-2013, 03:07 PM
Last Post: Guest
  Sensor Network Based Oilwell Health Monitoring and Intelligent Control pdf study tips 0 424 01-08-2013, 12:47 PM
Last Post: study tips
  Implementation of Secured password for Web applications using two server model pdf study tips 0 398 12-07-2013, 02:04 PM
Last Post: study tips