80 research outputs found
VOIP vs GSM Technology: The Way of the Future for Communication
This chopter presents ~·(;/?as o disruptive lechnology to GSM technnfog_1· as \l'c/1 os the issues. controFersies,
and problems surmunding its deployment. It gin•s o gent'ral introduction oftlze evolution
o/ communication svsten1s fim11 thE! POTS. /u (}SAf, and IWW ~'(J/P Se1•ur~.d issues that swTound the
deployment of Voir such tiS [Jrovision of PSTN equivalent sen ices hy Voir scf'l'i<:c pml'iclers. regulation
ofthe service. introduction (~{latency and other counter measures bv some operators. threat posed
io PSTN providers due to eme1gence ol T-iJ!P. the needfin· technical stundardi:::ation of Vu!P. securill'
issues, different cost structure, and cjuality ofservh:e pruvided H'<:'re alsu discussed in details Solutions
and recommendations wei·e suggested to overcome rheclwllenges outlined. Tli)[P is eri!sented us the trul·
o/the.fillurcj(n' communication T1'hen thisfinallv happens depends 011 how .fits! I he choll<'llges outlined
in this chapter are addressed Fulurc and ell/crging re.\'Curdltrends in the dep/ovmenl of Vn!P such cts
locating users in a st!cure a11d reliahle wuy, monitoring IIJ!P 11Cllt'ork.1·. as ll;elf us inrrusion derecriun
and prevention on SIP tt•ere also considered. alter whic/1. conc/usiun ti'US made This dWjJ/er is hnth
informative and interestin
The Impact of the Internet on Telecommunication Architectures
The ever-growing popularity of the Internet is dramatically changing the landscape of the communications market place. The two separate worlds of the Internet and Telecommunications are converging. The respective advantages of the two environments are being integrated to fulfill the promise of the information super-highways. In this paper, we examine the impact of the Internet on the main telecommunication architectures, namely the IN, the TMN and TINA. There are two new tendencies for implementing telephony services in combination with the Internet: running part of the control sys tem over the Internet, or conveying both the user data and the control information over the Internet. We examine these two trends, and elaborate on possible ways of salvaging the best parts of the work achieved by the TINA-Consortium in the Internet context
Telecommunication Services Engineering- Definitions, Architectures and Tools
This paper introduces telecommunication services engineering through a definition of services, of network architectures that run services, and of methods, techniques and tools used to develop services. We emphasize the Intelligent Network (IN), the Telecommunication Management Network (TMN) and TINA architecture
Recommended from our members
Toward the PSTN/Internet Inter-Networking--Pre-PINT Implementations
This document contains the information relevant to the development of the inter-networking interfaces underway in the Public Switched Telephone Network (PSTN)/Internet Inter-Networking (PINT) Working Group. It addresses technologies, architectures, and several (but by no means all) existing pre-PINT implementations of the arrangements through which Internet applications can request and enrich PSTN telecommunications services. The common denominator of the enriched services (a.k.a. PINT services) is that they combine the Internet and PSTN services in such a way that the Internet is used for non-voice interactions, while the voice (and fax) are carried entirely over the PSTN. One key observation is that the pre-PINT implementations, being developed independently, do not inter-operate. It is a task of the PINT Working Group to define the inter-networking interfaces that will support inter-operation of the future implementations of PINT services
A hybrid and cross-protocol architecture with semantics and syntax awareness to improve intrusion detection efficiency in Voice over IP environments
Includes abstract.Includes bibliographical references (leaves 134-140).Voice and data have been traditionally carried on different types of networks based on different technologies, namely, circuit switching and packet switching respectively. Convergence in networks enables carrying voice, video, and other data on the same packet-switched infrastructure, and provides various services related to these kinds of data in a unified way. Voice over Internet Protocol (VoIP) stands out as the standard that benefits from convergence by carrying voice calls over the packet-switched infrastructure of the Internet. Although sharing the same physical infrastructure with data networks makes convergence attractive in terms of cost and management, it also makes VoIP environments inherit all the security weaknesses of Internet Protocol (IP). In addition, VoIP networks come with their own set of security concerns. Voice traffic on converged networks is packet-switched and vulnerable to interception with the same techniques used to sniff other traffic on a Local Area Network (LAN) or Wide Area Network (WAN). Denial of Service attacks (DoS) are among the most critical threats to VoIP due to the disruption of service and loss of revenue they cause. VoIP systems are supposed to provide the same level of security provided by traditional Public Switched Telephone Networks (PSTNs), although more functionality and intelligence are distributed to the endpoints, and more protocols are involved to provide better service. A new design taking into consideration all the above factors with better techniques in Intrusion Detection are therefore needed. This thesis describes the design and implementation of a host-based Intrusion Detection System (IDS) that targets VoIP environments. Our intrusion detection system combines two types of modules for better detection capabilities, namely, a specification-based and a signaturebased module. Our specification-based module takes the specifications of VoIP applications and protocols as the detection baseline. Any deviation from the protocol’s proper behavior described by its specifications is considered anomaly. The Communicating Extended Finite State Machines model (CEFSMs) is used to trace the behavior of the protocols involved in VoIP, and to help exchange detection results among protocols in a stateful and cross-protocol manner. The signature-based module is built in part upon State Transition Analysis Techniques which are used to model and detect computer penetrations. Both detection modules allow for protocol-syntax and protocol-semantics awareness. Our intrusion detection uses the aforementioned techniques to cover the threats propagated via low-level protocols such as IP, ICMP, UDP, and TCP
VOIP WITH ADAPTIVE RATE IN MULTI- TRANSMISSION RATE WIRELESS LANS
“Voice over Internet Protocol (VoIP)” is a popular communication technology that plays a vital role in term of cost reduction and flexibility. However, like any emerging technology, there are still some issues with VoIP, namely providing good Quality of Service (QoS), capacity consideration and providing security. This study focuses on the QoS issue of VoIP, specifically in “Wireless Local Area Networks (WLAN)”.
IEEE 802.11 is the most popular standard of wireless LANs and it offers different transmission rates for wireless channels. Different transmission rates are associated with varying available bandwidth that shall influence the transmission of VoIP traffic
Implementation of Vertical Handoff Algorithm between IEEE802.11 WLAN and CDMA Cellular Network
Today’s wireless users expect great things from tomorrow’s wireless networks. These expectations have been fueled by hype about what the next generations of wireless networks will offer. The rapid increase of wireless subscribers increases the quality of services anytime, anywhere, and by any-media becoming indispensable. Integration of various networks such as CDMA2000 and wireless LAN into IP-based networks is required in these kinds of services, which further requires a seamless vertical handoff to 4th generation wireless networks. The proposed handoff algorithm between WLAN and CDMA2000 cellular network is implemented. The results of the simulation shows the behavior of the handoff and the time spent in WLAN or CDMA. The number of weak signal beacons determines whether a handoff is required or not. In this algorithm, traffic is classified into real-time and non real-time services
The Beginnings and Prospective Ending of “End-to-End”: An Evolutionary Perspective On the Internet’s Architecture
The technology of “the Internet” is not static. Although its “end-to- end” architecture has made this “connection-less” communications system readily “extensible,” and highly encouraging to innovation both in hardware and software applications, there are strong pressures for engineering changes. Some of these are wanted to support novel transport services (e.g. voice telephony, real-time video); others would address drawbacks that appeared with opening of the Internet to public and commercial traffic - e.g., the difficulties of blocking delivery of offensive content, suppressing malicious actions (e.g. “denial of service” attacks), pricing bandwidth usage to reduce congestion. The expected gains from making “improvements” in the core of the network should be weighed against the loss of the social and economic benefits that derive from the “end-to-end” architectural design. Even where technological “fixes” can be placed at the networks’ edges, the option remains to search for alternative, institutional mechanisms of governing conduct in cyberspace.
- …