Qatar Ports Management Company: The IP Telephony Structure

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Aim of the project

The main aim of this project is the development of IP telephony as a means of communication in the Qatar Ports Management Company (QPMC). IP telephony is a mode of communication which is employed by companies in the enhancement of mobility and flexibility in that communication within and without the building is made possible and hassle free. When this project is implemented, the company will have the advantage of a reduced cost in communication and have an added security considering that IP telephony is a concept that enhances privacy (Schulzrinne 1997; Pan and Schulzrinne, 1997) (b).

Project objectives

The IP telephony technology will provide additional data and voice security to the company as all voice movement will be closely monitored with ease. This will result from the sense that the employees will be suited with specially configured departmental phones. The quality of the voice in the company will be improved greatly. (Rosenberg and Schulzrinne, 1998)

Other features which are targeted are instant messaging systems in all lines and the use of VoIP. (Schulzrinne 1997) (a). On completion of the project, it will be fully documented and all the workers provided with copies of user guides which will enhance some smooth transition into the new system (Andersson et al 2006; Schulzrinne, 1997 (b)).

Primary research

The existing problem within the organization is closely linked with the absence of the effective communication tool for the team, and the absence of opportunity to make long distance calls. In fact, the offered project of IP telephony network creation will be used for resolving the existing communication problem and providing an opportunity for the team to have the properly adjusted connection.

The problems that have been found at the current stage are as follows:

  • Existing PSTN networks are not able to realize the required functionality, and do not provide the required security level.
  • VoIP provides the opportunity to add more than one call within the frames of the only high speed connection. Hence, it may be useful for decreasing the informational load of the office in general, and adjust a better connection within the organization (for making internal calls)
  • Conference call, call diverts, automatic redial, number identification are the opportunities that are cheaper (or even free), and of higher quality over the IP network. While the costs for phone calls are unreasonably high in the PSTN networks
  • PSTN networks are less safe, and digitization is more reliable in VoIP networks
  • The company needs to get additional information such as whether a subscriber is available for a call. Moreover, conference integrations are often required, while traditional networks are not able to provide such a service.

Secondary research

A lot and in depth research was done on the implications, benefits, disadvantages and cost of the system. This helped in the ensuring of the feasibility of the project. When IP telephony is used in an organization, some benefits that come with it is the use of the voice over IP. This mode of communication has advantages to both the user and the signal carrier in a variety of ways. (Singh and Schulzrinne, 2004)

  • There is provision of adjustability in the network. The end users of the system can chose the usability mode in the amount of compression and data manipulation that they use.
  • Some protocols used in this network help in securing it to such an extent that it gets very secure using some techniques like encryption, cryptography and other techniques which ensure that the communication is safe.
  • Real time transport protocol has been known to support user identification in all levels like in bridged multi-conferences where caller ID has been of question. This has an advantage over common protocols like POTS and ISDN

There are more other additional benefits that come with this required of telephony service like the integration of computers and telephony, easy to customize, use of multimedia, voice separation, silence suppression and so on. All this combined makes this mode of telephony the requisite mode for any company which wants to integrate the latest technology in its operations (Faulkner 2000).

A standard architecture for IP telephony is shown below.

A standard architecture for IP telephony
(Braden, 2006)

In the transfer of voice and video through IP telephony, some of the features that differentiate them from the other services include the use of sequencing of data packets. If they lose their order during transfer, synchronization between media where the silence between sounds is reconstructed to avoid disturbance, encryption of data, allows feedback on quality of service, multicasting, indication of frames among other features.

Resource requirements

For the implementation of this project, there will be some necessary hardware and software requirements which have to be put in place. In the first place it is necessary to have a network PSTN which will be having an IP address, cables, routers and switches and servers. Of other importance will be computers, IP telephones and an express router (CallManager).

System requirements generally depend in the number of calls made, and the load of the phone line. Hence, in accordance with Stellman and Greene (2005) optimal requirements are as follows:

Hardware

  • 1.8 – 2.6 GHz Pentium IV processor or equivalent*
  • 1 GB of RAM and higher
  • Display with 1024×768 resolution

Every fifty simultaneous calls require up to 1GB of RAM memory, and 2 GHz of processor speed are required if the amount of simultaneous calls is more then 150.

Hardware space required depends on the necessities and objectives of the organization. If the calls are voice recorded up to 1 GB will be required for every 24 hours of low quality records. If the data storage is required for call data storage, then, every 10 000 calls will require up to 100 MB.

Software

These are not critical, as the most effective software packs have been tested for various platforms, and may be used either with windows, or with Linux OS.

Quality management

For this project to comply with the normal standards, it must qualify for ISO authenticity. In order for this to be clear and applicable, the project must be able to ensure that the needs of the end user are met and that it will be able to provide all the desired characteristics of IP telephony.

The management of the project has set aside a quality assurance team which will make sure that the project meets all the required standards through assessments. The installation of the IP telephony should meet all the basic requirements of a standard IP telephony system.

In this establishment, the team should dig deep into the required control measures in the standardization of an IP telephony network. This should be followed by the necessary quality control measures which should meet all the requirement measures and criteria. This can be done using various tools like PRINCE2. (Strathmeyer 1996).

After the control is done the team should keep a record of the measures which have been adhered to such that at the end of the day, the team will have been able to tell what should be looked into again. (Pan and Schulzrinne 1997).

Table 1. Risk assessment (Busse et al 1996; Low 1996).

Type of risk Description Risk Level Risk management plan
Poor Internet Connection This will violate the work of the entire system. VoIP connection becomes vulnerable and unreliable if connection is not reliable enough. High risk/middle probability The company should take care of the reserve connection line, or be prepared to implement text messengers if the connection speed is not sufficient or voice messaging.
Change of Company’s requirements Business circumstances may change, and the company will no longer need operative connection and the opportunity to make long-distance calls. Or these functions may be delegated to an outsourced call-center Low risk/middle probability The possible delegation of any functions should be included into strategic planning, hence, risk management actions will not be required
Overestimated value of VoIP technology In reality it may happen that the opportunities and values of IP telephony are essentially overestimated High risk/high probability The company needs to perform adequate assessment of the strategies and evaluate the necessity of effective and instant communication tools.
Delays in project implementation The project of creating the reliable IP telephony network may not be completed in time. High risk/high probability Project management strategy should consider such an opportunity and be able to involve additional personnel for the implementation process if needed.
Hardware failure Equipment may fail because of a fraud attack or voltage leap. High risk/low probability Reserve data copy creation is the inevitable part of IT management strategy. Additionally, UPS should be provided for the data storages and servers. Additionally, information security strategy should be improved.

Design

Functional diagram of the IP telephony network is based on the key principles of effective gateway creation. In general, these are common for any IP network creation regardless of the actual size of the network, and disperse of subscribers within a single building:

Functional diagram of the IP telephony network

The design of the system will be base on the SIP protocol. In the identification of the names, the nodes will be named according to the mode of SIP URLs. The key of the node in this place is used together with the IP address of the place that the node is listening to. A good example is a node which is listening to 192.168.0.9 and the key that identifies this communication is put as 8, the User resource identifier of that node in particular will be sip:8 @ 192.168.0.9. This code will be used by all the nodes in the building in ensuring that communication is logged and that all the nodes that are using a particular line are traceable (Zhang et al 1998).

There will be a mode of authentication for first time users. This will have to depend on the likelihood of the user having a public key infrastructure. For those who do not have, the system will generate one for them automatically and send it to their emails. The password is then stored for future use. The block diagram below shows how a standard node in the company would look like (Davies 2007).

The block diagram

The architecture of the project will be dependent on a distributed hash table. This will make sure that the architecture of the project maintains a standard client server model. The DHT will also act as a server in some extremes. This will be initiated using the ends that do have super fast nodes (Stellman & Greene 2005). The diagram below shows how the super nodes make use of as servers to other nodes

How the super nodes make use of as servers to other nodes

The system discussed in the preceding paragraphs has been shown to take keen interest in scalability and is more reliable. It can also be interoperable with the current infrastructure.

Gant Chart

The following tables provide a general overview of the stages of the projects and their schedule. Detailed Gantt charts can be seen on the figures below.

Gantt Chart for Analysis & Design and Implementation
Gantt Chart for Analysis & Design and Implementation.
Gantt Chart for Analysis and Design
Gantt Chart for Analysis and Design.
Analysis and Design Critical Path
Analysis and Design Critical Path.
Gantt Chart for Implementation
Gantt Chart for Implementation.
Implementation Critical Path
Implementation Critical Path.

The basis for the chart can be seen through PERT analysis below.

Table 2. PERT Table.

Task No. Activity Pessimistic Most likely Optimistic Estimated Duration (days) PERT Analysis Predecessors
Analysis and Design
1 Identify deliverables and objectives specification 8 5 4 5
2 Specification and clarification 8 5 4 5 1
3 Evaluating similar projects 8 5 4 5 2
4 Clear proof with reading the work 7 5 4 5 2
5 Investigate with research 14 10 8 10 2
6 Plan methodology 8 5 4 5 5
7 Risk Assessments 7 5 4 5 5
8 Identify the design plan 7 6 4 6 5
9 Identify Final design documentation 2 1 1 1 7
Implementation
10 Create implementation plan 7 5 3 5
11 Create the necessary infrastructure 8 5 3 5 10
12 Select and Purchase equipment 15 10 7 10 10
13 Perform test launch of the system 15 10 7 10 11
14 Perform debugging 20 15 12 15 11
15 Perform system adjustment 20 14 12 15 12
16 Risk Assessments 20 14 12 15 13
17 Train personnel 17 11 7 11 15
18 Run in test mode 17 11 10 12 16

References

Andersson, E. et al 2006. Software engineering for Internet applications. Cambridge : MIT.

Braden, B. et al 1997 “Resource ReSerVation protocol (RSVP) – version 1 functional specification,” 2205, Internet Engineering Task Force.

Busse, I et al 1996, “Dynamic QoS control of multimedia applications based on

Davies B. 2007, Doing Successful Research project, using qualitative or quantitative methods. USA: Palgrave Macmillan

Faulkner, X. 2000. Usability Engineering. London: McMillan.

ITU. 2003. The Essential Report on IP Telephony. International Telecommunication Union. Web.

Low, C. 1996 “The internet telephony red herring,” in Proceedings of Global Internet, (London, England), pp. 72–80.

MITEL. 2005. Advancing Business Communications with IP Telephony. Mitel Networks Corporation. Web.

Pan, P & Schulzrinne, H. 1997 “Yessir: A simple reservation mechanism for the internet,” Technical Report RC 20697, IBM Research, Hawthorne, New York.

Rosenberg, J. & Schulzrinne, H. 1998 “Timer reconsideration for enhanced RTP scalability,” in Proceedings of the Conference on Computer Communications (IEEE Infocom),San Francisco: California. RTP,” Computer Communications, vol. 19, pp. 49–58.

Schulzrinne, H. 1997 (a) “A comprehensive multimedia control architecture for the Internet,” in Proc. International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV), St. Louis, Missouri

Schulzrinne, H. 1997 (b) “Re-engineering the telephone system,” in Proc. of IEEE Singapore International Conference on Networks (SICON), Singapore.

Singh, K. & Schulzrinne, H. 2004 Peer-to-peer internet telephony using SIP. In New York Metro Area Networking Workshop, New York, NY.

Stellman, A. & Greene, J. 2005. Applied Software Project Management. Cambridge, MA: O’Reilly Media

Strathmeyer, C. 1996 “Feature topic: Computer telephony,” IEEE Communications Magazine, vol. 34.

WANG, D. Voice over IP (VoIP). Arlington: College of Engineering. Web.

Zhang, L et al 1998, “Separating identifiers and locators in addresses: An analysis of the GSE proposal for IPv6,” Internet Draft, Internet Engineering Task Force

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!