80 research outputs found

    VOIP vs GSM Technology: The Way of the Future for Communication

    Get PDF
    This chopter presents ~·(;/?as o disruptive lechnology to GSM technnfog_1· as \l'c/1 os the issues. controFersies, and problems surmunding its deployment. It gin•s o gent'ral introduction oftlze evolution o/ communication svsten1s fim11 thE! POTS. /u (}SAf, and IWW ~'(J/P Se1•ur~.d issues that swTound the deployment of Voir such tiS [Jrovision of PSTN equivalent sen ices hy Voir scf'l'i<:c pml'iclers. regulation ofthe service. introduction (~{latency and other counter measures bv some operators. threat posed io PSTN providers due to eme1gence ol T-iJ!P. the needfin· technical stundardi:::ation of Vu!P. securill' issues, different cost structure, and cjuality ofservh:e pruvided H'<:'re alsu discussed in details Solutions and recommendations wei·e suggested to overcome rheclwllenges outlined. Tli)[P is eri!sented us the trul· o/the.fillurcj(n' communication T1'hen thisfinallv happens depends 011 how .fits! I he choll<'llges outlined in this chapter are addressed Fulurc and ell/crging re.\'Curdltrends in the dep/ovmenl of Vn!P such cts locating users in a st!cure a11d reliahle wuy, monitoring IIJ!P 11Cllt'ork.1·. as ll;elf us inrrusion derecriun and prevention on SIP tt•ere also considered. alter whic/1. conc/usiun ti'US made This dWjJ/er is hnth informative and interestin

    The Impact of the Internet on Telecommunication Architectures

    Get PDF
    The ever-growing popularity of the Internet is dramatically changing the landscape of the communications market place. The two separate worlds of the Internet and Telecommunications are converging. The respective advantages of the two environments are being integrated to fulfill the promise of the information super-highways. In this paper, we examine the impact of the Internet on the main telecommunication architectures, namely the IN, the TMN and TINA. There are two new tendencies for implementing telephony services in combination with the Internet: running part of the control sys tem over the Internet, or conveying both the user data and the control information over the Internet. We examine these two trends, and elaborate on possible ways of salvaging the best parts of the work achieved by the TINA-Consortium in the Internet context

    Telecommunication Services Engineering- Definitions, Architectures and Tools

    Get PDF
    This paper introduces telecommunication services engineering through a definition of services, of network architectures that run services, and of methods, techniques and tools used to develop services. We emphasize the Intelligent Network (IN), the Telecommunication Management Network (TMN) and TINA architecture

    A hybrid and cross-protocol architecture with semantics and syntax awareness to improve intrusion detection efficiency in Voice over IP environments

    Get PDF
    Includes abstract.Includes bibliographical references (leaves 134-140).Voice and data have been traditionally carried on different types of networks based on different technologies, namely, circuit switching and packet switching respectively. Convergence in networks enables carrying voice, video, and other data on the same packet-switched infrastructure, and provides various services related to these kinds of data in a unified way. Voice over Internet Protocol (VoIP) stands out as the standard that benefits from convergence by carrying voice calls over the packet-switched infrastructure of the Internet. Although sharing the same physical infrastructure with data networks makes convergence attractive in terms of cost and management, it also makes VoIP environments inherit all the security weaknesses of Internet Protocol (IP). In addition, VoIP networks come with their own set of security concerns. Voice traffic on converged networks is packet-switched and vulnerable to interception with the same techniques used to sniff other traffic on a Local Area Network (LAN) or Wide Area Network (WAN). Denial of Service attacks (DoS) are among the most critical threats to VoIP due to the disruption of service and loss of revenue they cause. VoIP systems are supposed to provide the same level of security provided by traditional Public Switched Telephone Networks (PSTNs), although more functionality and intelligence are distributed to the endpoints, and more protocols are involved to provide better service. A new design taking into consideration all the above factors with better techniques in Intrusion Detection are therefore needed. This thesis describes the design and implementation of a host-based Intrusion Detection System (IDS) that targets VoIP environments. Our intrusion detection system combines two types of modules for better detection capabilities, namely, a specification-based and a signaturebased module. Our specification-based module takes the specifications of VoIP applications and protocols as the detection baseline. Any deviation from the protocol’s proper behavior described by its specifications is considered anomaly. The Communicating Extended Finite State Machines model (CEFSMs) is used to trace the behavior of the protocols involved in VoIP, and to help exchange detection results among protocols in a stateful and cross-protocol manner. The signature-based module is built in part upon State Transition Analysis Techniques which are used to model and detect computer penetrations. Both detection modules allow for protocol-syntax and protocol-semantics awareness. Our intrusion detection uses the aforementioned techniques to cover the threats propagated via low-level protocols such as IP, ICMP, UDP, and TCP

    VOIP WITH ADAPTIVE RATE IN MULTI- TRANSMISSION RATE WIRELESS LANS

    Get PDF
    “Voice over Internet Protocol (VoIP)” is a popular communication technology that plays a vital role in term of cost reduction and flexibility. However, like any emerging technology, there are still some issues with VoIP, namely providing good Quality of Service (QoS), capacity consideration and providing security. This study focuses on the QoS issue of VoIP, specifically in “Wireless Local Area Networks (WLAN)”. IEEE 802.11 is the most popular standard of wireless LANs and it offers different transmission rates for wireless channels. Different transmission rates are associated with varying available bandwidth that shall influence the transmission of VoIP traffic

    Implementation of Vertical Handoff Algorithm between IEEE802.11 WLAN and CDMA Cellular Network

    Get PDF
    Today’s wireless users expect great things from tomorrow’s wireless networks. These expectations have been fueled by hype about what the next generations of wireless networks will offer. The rapid increase of wireless subscribers increases the quality of services anytime, anywhere, and by any-media becoming indispensable. Integration of various networks such as CDMA2000 and wireless LAN into IP-based networks is required in these kinds of services, which further requires a seamless vertical handoff to 4th generation wireless networks. The proposed handoff algorithm between WLAN and CDMA2000 cellular network is implemented. The results of the simulation shows the behavior of the handoff and the time spent in WLAN or CDMA. The number of weak signal beacons determines whether a handoff is required or not. In this algorithm, traffic is classified into real-time and non real-time services

    The Beginnings and Prospective Ending of “End-to-End”: An Evolutionary Perspective On the Internet’s Architecture

    Get PDF
    The technology of “the Internet” is not static. Although its “end-to- end” architecture has made this “connection-less” communications system readily “extensible,” and highly encouraging to innovation both in hardware and software applications, there are strong pressures for engineering changes. Some of these are wanted to support novel transport services (e.g. voice telephony, real-time video); others would address drawbacks that appeared with opening of the Internet to public and commercial traffic - e.g., the difficulties of blocking delivery of offensive content, suppressing malicious actions (e.g. “denial of service” attacks), pricing bandwidth usage to reduce congestion. The expected gains from making “improvements” in the core of the network should be weighed against the loss of the social and economic benefits that derive from the “end-to-end” architectural design. Even where technological “fixes” can be placed at the networks’ edges, the option remains to search for alternative, institutional mechanisms of governing conduct in cyberspace.

    Evolution of Positioning Techniques in Cellular Networks, from 2G to 4G

    Get PDF
    corecore