7 research outputs found

    Disruption tolerance for SIP

    Get PDF
    The wireless networks have been built with versatile wireless network technology, including both wide area wireless networks and local area wireless networks. In such heterogeneous network environment, mobile users may experience either short or long interruption for different reasons while having a multimedia conversation. A lot of emphasis is concentrated on improving radio signal and enhancing seamless handover. However, recovery and backup multimedia conversation from a temporary network failure is also an interesting topic to be discussed. In this thesis, a SIP-based communication with enabling of disruption tolerance mechanism is introduced. We present the idea of media stream and SIP signaling based detection and recovery mechanisms, and come with an implementation of the prototype. The disruption tolerance functions include the ways of detecting network failure, storing the conversation during the meanwhile of the network disconnection, recover the previous broken multimedia session and replay the unheard voice. A brief experimental SIP network is built to evaluate the disruption tolerance functions of the software prototype. The result of the experimentation shows that the multimedia session can be recovered from the broken session in a short time, and the important conversation will not be lost during the short network disconnection. The replayed voice brings a delay to the recovered conversation which is not good experience for the users. However, the delayed conversation is much better than losing the conversation

    A criação de redes de próxima geração IMS usando produtos Open Source

    Get PDF
    Estágio realizado na PT InovaçãoTese de mestrado integrado. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200

    Standardization of network interfaces : a framework for collaborative development and go-to-market strategy

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2006."June 2006."Includes bibliographical references.Over the last decade technological innovation in computers and communications industries has resulted in higher penetration of technology intensive products in businesses and homes. In communications industry, the true value of converged networks will be exploited only if the products and services provided end-to-end quality, reliability and consistency of features and functionalities that are offered. However, for this to happen, the products, systems and networks need to be interoperable. Interoperability can be accomplished most effectively and efficiently by use of common standards; but at the same time use of common standards potentially and arguably leads to commoditization of products, and constrains ability of product differentiation. Processes for setting standards, are not only messy but are prolonged, and quite often lead to battles for platform leadership. As incumbent telecommunications service providers transition from the public switched telephone networks to the IP-based data networks, customer expectations are high, challenges are many and failures are costly.(cont.) Verizon Interoperability Forum has taken on this challenge by attempting to develop standards for interfaces for network elements that are used on Verizon's own network. It is proposed that network interfaces' standards exhibit characteristics of network effects and possess a great potential for becoming a de facto standard.by Uday Hardikar.S.M

    Analysis of the security mechanism in the IMS architecture

    Get PDF
    Orientador: Yuzo IanoDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de ComputaçãoResumo: Considerando-se que para controlar e possibilitar a entrega de diversos conteúdos e serviços a qualquer tipo de acesso fazia-se necessário um núcleo bem definido e estruturado, surgiu o IMS (IP Multimedia Subsystem) com o propósito de prover a integração completa das redes e serviços. O IMS define uma arquitetura completa e framework que habilita a convergência de voz, vídeo, dados e tecnologia de rede móvel através de uma infraestrutura baseada em IP, preenchendo a distância entre os dois paradigmas de comunicação mais bem sucedidos, celular e tecnologia IP. Este trabalho apresenta a arquitetura IMS como controle central de todas as redes, e uma arquitetura para o desenvolvimento de aplicações móveis que incorporem voz, vídeo e dados. A arquitetura IMS apesar de promissora apresenta inúmeras oportunidades de melhoria no seu mecanismo de segurança, muitas dessas oportunidades de melhoria estão relacionadas a falhas e até mesmo a falta de especificações de segurança quando a arquitetura foi originalmente implementada. Assim o maior desafio na implantação e globalização da arquitetura IMS são as falhas de segurança e a vulnerabilidade que a arquitetura possui a diversos tipos de ataques que podem atingir e prejudicar, tanto operadoras quanto usuários da rede. O objetivo deste projeto de pesquisa é apresentar uma análise detalhada sobre a estrutura da arquitetura IMS focando principalmente na arquitetura de segurança desenvolvida pela 3GPP, e assim prover análises e soluções para os ataques, vulnerabilidades e falhas de segurança que atingem a arquitetura tanto do ponto de vista de operadoras e provedores de serviço quanto na perspectiva do usuárioAbstract: Considering that to control and enable the delivery of diverse content and services to any type of access it should make necessary a core well-defined and structuralized, appeared the IMS (IP Multimedia Subsystem) in order to provide the complete integration of networks and services. IMS defines a complete architecture and framework that enables the convergence of voice, video, data and mobile network technology over an infrastructure based on IP, in addition to filling the gap between the two communications paradigms most successful, cellular and IP technology. This paper presents the IMS architecture as central control of all networks, and architecture for developing mobile applications that incorporate voice, video and data. The IMS architecture despite being promising presents numerous opportunities for improvement in its security mechanism, many of these opportunities for improvement are related to failures and even the lack of security specifications when creating the architecture. So the biggest challenge in the implementation of the IMS architecture and globalization are the security issues and vulnerabilities that the architecture faces being vulnerable to several types of attacks that can reach and affect carriers and network users. The objective of this research project is to present a detailed analysis on the structure of the IMS architecture focusing primarily on security architecture developed by 3GPP, and thus provide analysis and solutions about the attacks, vulnerabilities and security issues that affect the architecture from the point of view of carriers, service providers and from the network usersMestradoTelecomunicações e TelemáticaMestre em Engenharia Elétric

    SIP based IP-telephony network security analysis

    Get PDF
    Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, GrimstadThis thesis evaluates the SIP Protocol implementation used in the Voice over IP (VoIP) solution at the fibre/DSL network of Èlla Kommunikasjon AS. The evaluation focuses on security in the telephony service, and is performed from the perspective of an attacker trying to find weaknesses in the network. For each type of attempt by the malicious attacker, we examined the security level and possible solutions to flaws in the system. The conclusion of this analysis is that the VoIP service is exploitable, and that serious improvements are needed to achieve a satisfying level of security for the system

    Internet Media Type message/sipfrag

    No full text
    corecore