Question

One end user is connected with the base station router (BSR) in a typical IP network....

One end user is connected with the base station router (BSR) in a typical IP network. The networked has assigned unique IP address to the user. The end user like to make a call to another user in public network using IP internet cloud. Mention the name of the device that will make the connection.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The device which establishes the connection of one end user connected to the base station router (BSR) in an IP network to another user in public network is IP-PBX (Private branch exchange). This is the central switching system call to the other end user through the IP internet cloud. This technology is called VoIP (voice over internet protocol).

the follwing figure shows the typical IP PBX system to facilitate voice and video call over the internet.

IP Phone FAX PBX IP network PSTN IP camera IP video phone

IP Phone FAX PBX IP network PSTN IP camera IP video phone

Add a comment
Know the answer?
Add Answer to:
One end user is connected with the base station router (BSR) in a typical IP network....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 13. A router on a home network is assigned an IP address of 128.123.45.67. A computer...

    13. A router on a home network is assigned an IP address of 128.123.45.67. A computer in the home network is assigned a private IP address of 192.168.10.62. This computer is assigned the public IP address 128.123.45.67: 1922. Which IP address is used for routing data packets on the Internet? Is overloading being used? 14. Why are the layers of the OSI model important to the network administrator?

  • Consider a scenario, a faculty member is sitting in his office in the department of Computer Science and is connected to...

    Consider a scenario, a faculty member is sitting in his office in the department of Computer Science and is connected to the network using an Ethernet cable connection. His device has been assigned a private IP address (192.168.56.1) which cannot be used to connect to the Internet. However, he is still connected to the Internet and is able to use all resources on the Internet. Answer the following Explain, how a user with a private IP is connected to the...

  • Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1, #2 and #3. For each device, both its Internet Protocol (IP) address and its MAC addre...

    Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1, #2 and #3. For each device, both its Internet Protocol (IP) address and its MAC address (also called the Physical address or the Ethernet address) are shown. The Subnet Mask used by all devices is 255.255.255.192 (which is same as prefix length “/26”). (5 points) Assuming that Client #1 sent a packet to Client #3 and then Client #3 sent a packet...

  • Create the network specified in the assignment. NOTE: THIS IS NOT A DIAGRAM OF YOUR PERSONAL...

    Create the network specified in the assignment. NOTE: THIS IS NOT A DIAGRAM OF YOUR PERSONAL HOME NETWORK! Start with a house. You'll need to enlarge the house (you will learn how to do this by reading the software's help topics or by experimentation) to be able to put all "inside" devices inside the house graphic. You may substitute a large rectangle to represent the house -- and place all "inside" devices inside the rectangle. This house must be labeled...

  • Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper)...

    Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper) utility, which can be used on a network running IPv4 to verify that TCP/IP is configured correctly and communicating with the network. A ping test is typically the first thing network professionals try when troubleshooting a TCP/IP connection problem. For this project, you can use any type of workstation that's running TCP/IPv4, preferably one connected to the Internet. The output described in the following...

  • The first script is validate.sh. This is a simple form validation script that will be used...

    The first script is validate.sh. This is a simple form validation script that will be used to verify the inputs given. Normally, this would be done to validate input from a website or another program before entry into a database or other record storage. In this case, we will keep it simple and only focus on the input validation step. In particular, the script should prompt the user for four values: first name, last name, zip code, and email address....

  • Project 4: Month-end Sales Report with array and validation Input dialog box for initial user prompt...

    Project 4: Month-end Sales Report with array and validation Input dialog box for initial user prompt with good data and after invalid data Input OK Cancel Input dialog boxes with sample input for Property 1 Ingut X Input Enter the address for Property 1 Enter the value of Property 1: OK Cancel Input dialog boxes after invalid data entered for Property 1 Error Please enter anmumber greater than D Ester the walue of Peoperty t Console output END SALES REPORT...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

  • Question 81 Web ____ caters to user-generated content. a. ​1.5 b. ​1.0 c. ​4.0 d. ​2.0...

    Question 81 Web ____ caters to user-generated content. a. ​1.5 b. ​1.0 c. ​4.0 d. ​2.0 1 points Question 82 Webpages secured by SSL have URLs that begin with ____. a. ​SSL:// b. ​IETF:// c. ​S-http:// d. ​https:// 1 points Question 83 When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a ____. a. ​newsreader b. ​news widget c. ​news catcher d. ​news...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT