3,287 research outputs found

    Reflections on security options for the real-time transport protocol framework

    Get PDF
    The Real-time Transport Protocol (RTP) supports a range of video conferencing, telephony, and streaming video ap- plications, but offers few native security features. We discuss the problem of securing RTP, considering the range of applications. We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications. This approach treats RTP as a framework with a set of extensible security building blocks, and prescribes mandatory-to-implement security at the level of different application classes, rather than at the level of the media transport protocol

    Analysis of google entry in unified communications from a resource and competence perspective

    Get PDF
    The business communications market has been deeply transformed by technological and product convergence, due to the progressive substitution of traditional TDM-based voice products and services by ToIP (Telephony over IP) based products and services. The adoption of IP and the management of voice applications in the same way as data application has given rise to convergence offerings under the name of Unified Communications, and allowed the entry of data communications vendors, such as Cisco, in a market initially dominated by TDM-based product vendors. The increasing dissociation between hardware and software and the virtualisation of services have induced the entry of new players relying on their position in software and web services, among which Microsoft and Google. In this paper, drawing on the resource-based perspective, we analyse the patterns of entry of Google in this market. In particular, we highlight how Google relies on current specific resources, acquire and/or develop complementary resources in order to be able to compete on this market. In this work in progress paper, we put emphasis on the acquisition strategy of Google --

    The diffusion of IP telephony and vendors' commercialisation strategies

    Get PDF
    This is a post-peer-review, pre-copyedit version of an article published in the Journal of Information Technology. The definitive publisher-authenticated version is available at the link below.The Internet telephony (IP telephony) has been presented as a technology that can replace existing fixed-line services and disrupt the telecommunications industry by offering new low-priced services. This study investigates the diffusion of IP telephony in Denmark by focusing on vendors’ commercialisation strategies. The theory of disruptive innovation is introduced to investigate vendors’ perceptions about IP telephony and explore their strategies that affect the diffusion process in the residential market. The analysis is based on interview data collected from the key market players. The study's findings suggest that IP telephony is treated as a sustaining innovation that goes beyond the typical voice transmission and enables provision of advanced services such as video telephony

    Quality of Service challenges for Voice over Internet Protocol (VoIP) within the wireless environment

    Get PDF

    Securing the RTP framework: why RTP does not mandate a single media security solution

    Get PDF
    This memo discusses the problem of securing real-time multimedia sessions, and explains why the Real-time Transport Protocol (RTP), and the associated RTP control protocol (RTCP), do not mandate a single media security mechanism. Guidelines for designers and reviewers of future RTP extensions are provided, to ensure that appropriate security mechanisms are mandated, and that any such mechanisms are specified in a manner that conforms with the RTP architecture

    TV-Centric technologies to provide remote areas with two-way satellite broadband access

    Get PDF
    October 1-2, 2007, Rome, Italy TV-Centric Technologies To Provide Remote Areas With Two-Way Satellite Broadband Acces
    • 

    corecore