149 research outputs found
VOIP vs GSM Technology: The Way of the Future for Communication
This chopter presents ~·(;/?as o disruptive lechnology to GSM technnfog_1· as \l'c/1 os the issues. controFersies,
and problems surmunding its deployment. It gin•s o gent'ral introduction oftlze evolution
o/ communication svsten1s fim11 thE! POTS. /u (}SAf, and IWW ~'(J/P Se1•ur~.d issues that swTound the
deployment of Voir such tiS [Jrovision of PSTN equivalent sen ices hy Voir scf'l'i<:c pml'iclers. regulation
ofthe service. introduction (~{latency and other counter measures bv some operators. threat posed
io PSTN providers due to eme1gence ol T-iJ!P. the needfin· technical stundardi:::ation of Vu!P. securill'
issues, different cost structure, and cjuality ofservh:e pruvided H'<:'re alsu discussed in details Solutions
and recommendations wei·e suggested to overcome rheclwllenges outlined. Tli)[P is eri!sented us the trul·
o/the.fillurcj(n' communication T1'hen thisfinallv happens depends 011 how .fits! I he choll<'llges outlined
in this chapter are addressed Fulurc and ell/crging re.\'Curdltrends in the dep/ovmenl of Vn!P such cts
locating users in a st!cure a11d reliahle wuy, monitoring IIJ!P 11Cllt'ork.1·. as ll;elf us inrrusion derecriun
and prevention on SIP tt•ere also considered. alter whic/1. conc/usiun ti'US made This dWjJ/er is hnth
informative and interestin
Resilience to DDoS attacks
Tese de mestrado, Segurança Informática, 2022, Universidade de Lisboa, Faculdade de CiênciasDistributed Denial-of-Service (DDoS) is one of the most common cyberattack used by malicious
actors. It has been evolving over the years, using more complex techniques to increase its attack power
and surpass the current defense mechanisms.
Due to the existent number of different DDoS attacks and their constant evolution, companies need
to be constantly aware of developments in DDoS solutions
Additionally, the existence of multiple solutions, also makes it hard for companies to decide which
solution best suits the company needs and must be implemented.
In order to help these companies, our work focuses in analyzing the existing DDoS solutions, for
companies to implement solutions that can lead to the prevention, detection, mitigation, and tolerance
of DDoS attacks, with the objective of improving the robustness and resilience of the companies against
DDoS attacks.
In our work, it is presented and described different DDoS solutions, some need to be purchased and
other are open-source or freeware, however these last solutions require more technical expertise by
cybersecurity agents.
To understand how cybersecurity agents protect their companies against DDoS attacks, nowadays, it
was built a questionnaire and sent to multiple cybersecurity agents from different countries and
industries.
As a result of the study performed about the different DDoS solutions and the information gathered
from the questionnaire, it was possible to create a DDoS framework to guide companies in the decisionmaking process of which DDoS solutions best suits their resources and needs, in order to ensure that
companies can develop their robustness and resilience to fight DDoS attacks.
The proposed framework it is divided in three phases, in which the first and second phase is to
understand the company context and the asset that need to be protected. The last phase is where we
choose the DDoS solution based on the information gathered in the previous phases. We analyzed and
presented for each DDoS solutions, which DDoS attack types they can prevent, detect and/or mitigate
Simulating and prototyping software defined networking (SDN) using Mininet approach to optimise host communication in realistic programmable networking environment
In this project, two tests were performed. On the first test, Mininet-WiFi was used to simulate a
Software Defined Network to demonstrate Mininet-WiFi’ s ability to be used as the Software
Defined Network emulator which can also be integrated to the existing network using a Network
Virtualized Function (NVF). A typical organization’s computer network was simulated which
consisted of a website hosted on the LAMP (Linux, Apache, MySQL, PHP) virtual machine, and
an F5 application delivery controller (ADC) which provided load balancing of requests sent to the
web applications. A website page request was sent from the virtual stations inside Mininet-WiFi.
The request was received by the application delivery controller, which then used round robin
technique to send the request to one of the web servers on the LAMP virtual machine. The web
server then returned the requested website to the requesting virtual stations using the simulated
virtual network. The significance of these results is that it presents Mininet-WiFi as an emulator,
which can be integrated into a real programmable networking environment offering a portable,
cost effective and easily deployable testing network, which can be run on a single computer. These
results are also beneficial to modern network deployments as the live network devices can also
communicate with the testing environment for the data center, cloud and mobile provides.
On the second test, a Software Defined Network was created in Mininet using python script. An
external interface was added to enable communication with the network outside of Mininet. The
amazon web services elastic computing cloud was used to host an OpenDaylight controller. This
controller is used as a control plane device for the virtual switch within Mininet. In order to test
the network, a webserver hosted on the Emulated Virtual Environment – Next Generation (EVENG)
software is connected to Mininet. EVE-NG is the Emulated Virtual Environment for
networking. It provides tools to be able to model virtual devices and interconnect them with other
virtual or physical devices. The OpenDaylight controller was able to create the flows to facilitate
communication between the hosts in Mininet and the webserver in the real-life network.Electrical and Mining EngineeringM. Tech. (Electrical Engineering
Creation of value with open source software in the telecommunications field
Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200
Service composition based on SIP peer-to-peer networks
Today the telecommunication market is faced with the situation that customers are requesting for new telecommunication services, especially value added services. The concept of Next Generation Networks (NGN) seems to be a solution for this, so this concept finds its way into the telecommunication area. These customer expectations have emerged in the context of NGN and the associated migration of the telecommunication networks from traditional circuit-switched towards packet-switched networks.
One fundamental aspect of the NGN concept is to outsource the intelligence of services from the switching plane onto separated Service Delivery Platforms using SIP (Session Initiation Protocol) to provide the required signalling functionality. Caused by this migration process towards NGN SIP has appeared as the major signalling protocol for IP (Internet Protocol) based NGN. This will lead in contrast to ISDN (Integrated Services Digital Network) and IN (Intelligent Network) to significantly lower dependences among the network and services and enables to implement new services much easier and faster. In addition, further concepts from the IT (Information Technology) namely SOA (Service-Oriented Architecture) have largely influenced the telecommunication sector forced by amalgamation of IT and telecommunications. The benefit of applying SOA in telecommunication services is the acceleration of service creation and delivery. Main features of the SOA are that services are reusable, discoverable combinable and independently accessible from any location. Integration of those features offers a broader flexibility and efficiency for varying demands on services.
This thesis proposes a novel framework for service provisioning and composition in SIP-based peer-to-peer networks applying the principles of SOA. One key contribution of the framework is the approach to enable the provisioning and composition of services which is performed by applying SIP. Based on this, the framework provides a flexible and fast way to request the creation for composite services. Furthermore the framework enables to request and combine multimodal value-added services, which means that they are no longer limited regarding media types such as audio, video and text. The proposed framework has been validated by a prototype implementation
Supporting NAT traversal and secure communications in a protocol implementation framework
Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para obtenção do Grau de Mestre em Engenharia Electrotécnica e de ComputadoresThe DOORS framework is a versatile, lightweight message-based framework developed in ANSI C++. It builds upon research experience and subsequent knowledge garnered from the use and development of CVOPS and OVOPS, two well known protocol development frameworks that have obtained widespread acceptance and use in both the Finnish industry and academia. It conceptually resides between the operating system and the application, and provides a uniform development environment shielding the developer from operating system speci c issues. It can be used for developing network services, ranging from simple
socket-based systems, to protocol implementations, to CORBA-based applications and object-based gateways.
Originally, DOORS was conceived as a natural extension from the OVOPS framework to
support generic event-based, distributed and client-server network applications. However,
DOORS since then has evolved as a platform-level middleware solution for researching the provision of converged services to both packet-based and telecommunications networks, enterprise-level integration and interoperability in future networks, as well as studying application development, multi-casting and service discovery protocols in heterogeneous IPv6 networks.
In this thesis, two aspects of development work with DOORS take place. The rst is
the investigation of the Network Address Translation (NAT) traversal problem to give
support to applications in the DOORS framework that are residing in private IP networks to interwork with those in public IP networks. For this matter this rst part focuses on the development of a client in the DOORS framework for the Session Traversal Utilities for NAT (STUN) protocol, to be used for IP communications behind a NAT. The second aspect involves secure communications. Application protocols in communication networks are easily intercepted and need security in various layers. For this matter the second part
focuses on the investigation and development of a technique in the DOORS framework
to support the Transport Layer Security (TLS) protocol, giving the ability to application protocols to rely on secure transport layer services
ACUTA Journal of Telecommunications in Higher Education
In This Issue
5G\u27s Promise: 1,000 x Capacity, 1,000 x Challenges
Higher-Speed WLANs About to Emerge
State of the Residential Network 2013
LTE: The Next Wave of Wireless Evolution
The 10 Most Costly Pitfalls of DAS Deployment and How to Avoid Them
DAS on Campus: Solutions for Wireless Service
Decision Criteria for Selecting a Wireless lntrusion Prevention System
lnstitutional Excellence Award
President\u27s Message
From the CE
Computational Aspects of Heat Transfer in Structures
Techniques for the computation of heat transfer and associated phenomena in complex structures are examined with an emphasis on reentry flight vehicle structures. Analysis methods, computer programs, thermal analysis of large space structures and high speed vehicles, and the impact of computer systems are addressed
- …