Data Voice and Video is a Enterprise Networking

Enterprises continue to plan and evaluate the convergence of corporate communications over the IP infrastructure. IT organizations (ITOs) must pay close attention to the readiness of the underlying network infrastructure to ensure the highest level of availability and best possible end-user experience.

Network Convergence

Network convergence is the efficient coexistence of telephone, video and data communication within a single network. The use of multiple communication modes on a single network offers convenience and flexibility that are not possible with separate infrastructures. Today, net convergence is more commonly referred to as unified communications.  It includes:

Texting - the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
Web surfing - exploring a sequence of web sites in a random, unplanned way, or simply using the web to look for something in a questing way.
Voice over IP (VoIP) - the transmission of voice and multimedia content over Internet Protocol (IP) networks. 
Streaming media - video or audio content sent in compressed form over the Internet and played immediately, rather than being saved to the hard drive.
Videoconference applications - a live, visual connection between two or more people residing in separate locations for the purpose of communication.
Online gaming - the running of specialized applications known as electronic games or video games on game consoles like X-box and Playstation or on personal computers.
E-commerce - the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.

Converged network challenges

As network convergence evolved, major challenges confronted network developers. Sheer demand for bandwidth was perhaps the most significant because all the applications and services take advantage of the single network. As applications became more sophisticated, and users exchanged increasingly rich content and data, early attempts at converging network resources often become overwhelmed.

Over time, it has become clear that effective network convergence lies in the design, installation and maintenance of adequate hardware and software. Companies began to plan to have enough bandwidth to support all the devices and services that would access their converged network, and redundancy was built into the network to ensure that mission-critical applications continued to operate during any kind of failure.

Security Concern!

When malicious attacks occurred on siloed networks, attackers could only access whatever data was on the particular network they broke into; telecommunications, closed-circuit TV and PCs ran on different networks, so attackers could access only one resource at a time. Once all those resources used the same infrastructure, an attacker could access all of them through a single access point.

Originally, the top concern was eavesdropping, or the unauthorized interception of VoIP, messaging other traffic. UC endpoints, whether desktops, laptops, or IP phones, all connect to the data network, and can be tapped by compromising the network anywhere along the data route.

IP telecommunications providers around the world lose hundreds of millions of dollars annually due to stolen services through toll fraud. Converged voice and video traffic typically uses the Session Initiation Protocol (SIP) to control calls, but the actual media stream for a call is separate from that control stream. It is possible, therefore, to use SIP to spoof the call manager about what kind of call it is controlling. For example, the perpetrator might tell the call manager that a call will be voice-only, but then stream high-definition video instead, essentially defrauding the system owner of the higher revenues for the video traffic.

Vishing, the VoIP-enabled form of phishing, is another security concern around network convergence. By applying the basic techniques of phishing to a new toolset, vishers use spoofed Caller ID or other call information to suggest that they are calling in an official capacity and get recipients to reveal confidential information over the phone.


Denial of service (DoS) was an attack vector that had new applications in the converged network world. While it was virtually unknown with traditional telephony, today's attacker can aim to disrupt the communications infrastructure at the desktop level by swamping or crashing phones -- or at the gateway level by taking out the network nodes that interface an enterprise VoIP installation with the outside world. They can also attack call managers directly by using SIP or other protocols to crash the manager with an endless flood of valid, but dishonest session requests.

01

IP CCTV 

IP CCTV is one of the Data, Voice and Video Convergence technologies, Previously CCTV used Analog technology and could only be monitored On Line via a DVR (Digital Video Recorder), but with the extraordinary development of Multi Media technology, Analog CCTV can be developed using IP CCTV and this has resulted in many changes: 1. Using 1 type of Infrastructure, namely Fiber Optic or UTP, 2. Using the IP protocol so that monitoring can be done per IP, 3. With the use of IP, the development of CCTV is unlimited.