2 research outputs found

    Literature review software defined networking for VoIP, SDN

    Get PDF
    Se realizó un análisis de implementaciones de redes SDN enfocándonos a redes con servicios VoIP. Se identificaron implementaciones con OpenFlow como base, así como implementaciones con enfoques de virtualizacion de servicios SIP. Actualmente, el uso de SDN con VoIP se utiliza para permitir un control de QoS y QoE de manera dinámica, eficaz y con bajo coste de implementación. Por último, se analizaron desarrollos de SDN enfocados a seguridad, CAC (Call Admisión Control) y enfoques a la gestión de recursos.An analysis of implementations of SDN networks was carried out, focusing on networks with VoIP services. Implementations with OpenFlow as a base were identified, as well as implementations with approaches to virtualization of SIP services. Currently the use of SDN with VoIP is used to allow QoS and QoE control in a dynamic, efficient way and with low implementation cost. Finally, SDN developments focused on security, CAC (Call Admission Control) and approaches to resource management were analyzed

    Strategies to Secure a Voice Over Internet Protocol Telephone System

    Get PDF
    Voice over internet protocol (VoIP) provides cost-effective phone service over a broadband internet connection rather than analog telephone services. While VoIP is a fast-growing technology, there are issues with intercepting and misusing transmissions, which are security concerns within telecommunication organizations and for customers. Grounded in the routine activity theory, the purpose of this multiple case study was to explore strategies information technology (IT) security managers used to secure VoIP telephone systems in telecommunication organizations. The participants consisted of nine IT security managers from three telecommunication organizations in New York who possessed the knowledge and expertise to secure a VoIP telephone system. The data were collected using semi structured interviews, note taking, and one document from one organization. Four themes emerged from the thematic analysis: best practices for VoIP security, using a secure VoIP provider, VoIP security recommendations, and awareness of future security concerns. A key recommendation for IT security professionals is to ensure encryption to secure a VoIP telephone system. The implications for positive social change include the potential for IT security managers and telecommunication organizations to reduce data breaches and the theft of their customers’ identities and credit card information
    corecore