311 research outputs found

    A VoIP Implementation on an Embedded Platform

    Get PDF
    This thesis presents a method of building an open VoIP telephone using off-the-shelf hardware. VoIP has become an important area of study in computer science and engineering, but many of the pieces are expensive and proprietary. We discuss the process of building an open IP telephone, the design decisions and difficulties, a performance evaluation of the different pieces of the system, and methods and suggestions for improving the overall system. The IP telephone is built on the Freescale 68HC12 microcontroller because of its analog and digital capabilities and the Linksys WRT54GL router for its embedded simplicity and network capabilities. The lightweight Embedded Xinu operating system was selected to build up the VoIP capabilities on top of a functional network stack. Our results show that building this VoIP device is viable. The completed IP telephone establishes a call between two routers using UDP network transport and μ-law companding. The roundtrip latency is less than two milliseconds, and the phone has a PESQ MOS (voice quality) of 3.13

    From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission

    Get PDF
    abstract: The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls. In this dissertation, a study of what causes the users to fall victim to telephone scams is presented, and it demonstrates that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, a novel architecture and method to authenticate the transmission of the caller ID is proposed. The solution enables the possibility of a security indicator which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information.Dissertation/ThesisDoctoral Dissertation Computer Science 201

    WiMax - a critical view of the technology and its economics

    Get PDF
    University of the Witwatersrand Faculty of Engineering and the Built Environment School of Information and Electrical EngineeringMobile Broadband is now more of a necessity than a luxury, especially amongst the younger generation, irrespective of where they live. Mobile WiMax and LTE, the latest and fastest Mobile Broadband technologies, mark significant improvements over 3G networks because they use IP (Internet Protocol) end-to-end. To end-users, this means faster network speeds, better quality services, and increased coverage area. To the Network Operators, this means simplified network architectures, efficient use of resources, and improved security. In this report, the different issues and challenges related to deploying Mobile WiMax (802.16e or 802.16m) in rural South Africa, were identifed and explored. In this project, Atoll, SONAR, and Touch Point analysis tools were used to determine which Mobile Broadband technology is economically and technically suited for rural South Africa. It was found that LTE yields superior performance results than WiMax, which in turn yields superior performance results to all other existing 3G technologies. However it will take time for LTE to reach rural areas therefore WiMax can be considered as a solution to extend Broadband services to rural South Africa and thus assist in bridging the digital divide. Recommendations on how best to deploy Mobile WiMax are made based on observations made from the experimental work.MT201

    Network communication privacy: traffic masking against traffic analysis

    Get PDF
    An increasing number of recent experimental works have been demonstrating the supposedly secure channels in the Internet are prone to privacy breaking under many respects, due to traffic features leaking information on the user activity and traffic content. As a matter of example, traffic flow classification at application level, web page identification, language/phrase detection in VoIP communications have all been successfully demonstrated against encrypted channels. In this thesis I aim at understanding if and how complex it is to obfuscate the information leaked by traffic features, namely packet lengths, direction, times. I define a security model that points out what the ideal target of masking is, and then define the optimized and practically implementable masking algorithms, yielding a trade-off between privacy and overhead/complexity of the masking algorithm. Numerical results are based on measured Internet traffic traces. Major findings are that: i) optimized full masking achieves similar overhead values with padding only and in case fragmentation is allowed; ii) if practical realizability is accounted for, optimized statistical masking algorithms attain only moderately better overhead than simple fixed pattern masking algorithms, while still leaking correlation information that can be exploited by the adversary

    Vulnerabilities of signaling system number 7 (SS7) to cyber attacks and how to mitigate against these vulnerabilities.

    Get PDF
    As the mobile network subscriber base exponentially increases due to some attractive offerings such as anytime anywhere accessibility, seamless roaming, inexpensive handsets with sophisticated applications, and Internet connectivity, the mobile telecommunications network has now become the primary source of communication for not only business and pleasure, but also for the many life and mission critical services. This mass popularisation of telecommunications services has resulted in a heavily loaded Signaling System number 7 (SS7) signaling network which is used in Second and Third Generations (2G and 3G) mobile networks and is needed for call control and services such as caller identity, roaming, and for sending short message servirces. SS7 signaling has enjoyed remarkable popularity for providing acceptable voice quality with negligible connection delays, pos- sibly due to its circuit-switched heritage. However, the traditional SS7 networks are expensive to lease and to expand, hence to cater for the growing signaling demand and to provide the seamless interconnectivity between the SS7 and IP networks a new suite of protocols known as Signaling Transport (SIGTRAN) has been designed to carry SS7 signaling messages over IP. Due to the intersignaling between the circuit-switched and the packet-switched networks, the mo- bile networks have now left the “walled garden”, which is a privileged, closed and isolated ecosystem under the full control of mobile carriers, using proprietary protocols and has minimal security risks due to restricted user access. Potentially, intersignaling can be exploited from the IP side to disrupt the services provided on the circuit-switched side. This study demonstrates the vulnerabilities of SS7 messages to cyber-attacks while being trans- ported over IP networks and proposes some solutions based on securing both the IP transport and SCTP layers of the SIGTRAN protocol stack

    Utilizing ZigBee Technology for More Resource-efficient Wireless Networking

    Get PDF
    Wireless networks have been an essential part of communication in our daily life. Targeted at different applications, a variety of wireless networks have emerged. Due to constrained resources for wireless communications, challenges arise but are not fully addressed. Featured by low cost and low power, ZigBee technology has been developed for years. As the ZigBee technology becomes more and more mature, low-cost embedded ZigBee interfaces have been available off the shelf and their sizes are becoming smaller and smaller. It will not be surprising to see the ZigBee interface commonly embedded in mobile devices in the near future. Motivated by this trend, we propose to leverage the ZigBee technology to improve existing wireless networks. In this dissertation, we classify wireless networks into three categories (i.e., infrastructure-based, infrastructure-less and hybrid networks), and investigate each with a representative network. Practical schemes are designed with the major objective of improving resource efficiency for wireless networking through utilizing ZigBee technology. Extensive simulation and experiment results have demonstrated that network performance can be improved significantly in terms of energy efficiency, throughput, packet delivery delay, etc., by adopting our proposed schemes

    Towards an LTE hybrid unicast broadcast content delivery framework

    Get PDF
    The era of ubiquitous access to a rich selection of interactive and high quality multimedia has begun; with it, significant challenges in data demand have been placed on mobile network technologies. Content creators and broadcasters alike have embraced the additional capabilities offered by network delivery; diversifying content offerings and providing viewers with far greater choice. Mobile broadcast services introduced as part of the Long Term Evolution (LTE) standard, that are to be further enhanced with the release of 5G, do aid in spectrally efficient delivery of popular live multimedia to many mobile devices, but, ultimately rely on all users expressing interest in the same single stream. The research presented herein explores the development of a standards aligned, multi-stream aware framework; allowing mobile network operators the efficiency gains of broadcast whilst continuing to offer personalised experiences to subscribers. An open source, system level simulation platform is extended to support broadcast, characterised and validated. This is followed by the implementation of a Hybrid Unicast Broadcast Synchronisation (HUBS) framework able to dynamically vary broadcast resource allocation. The HUBS framework is then further expanded to make use of scalable video content

    Měření Triple play služeb v hybridní síti

    Get PDF
    The master's thesis deals with a project regarding the implementation, design and the quality of IPTV, VoIP and Data services within the Triple Play services. In heterostructural networks made up of GEPON and xDSL technologies. Different lengths of the optical and metallic paths were used for the measurements. The first part of the thesis is theoretically analyzed the development and trend of optical and metallic networks. The second part deals with the measurement of typical optical and metallic parameters on the constructed experimental network, where its integrity was tested. Another part of the thesis is the evaluation of Triple play results, regarding the test where the network was variously tasked/burdened with data traffic and evaluated according to defined standards. The last part is concerned with the Optiwave Software simulation environment.Diplomová práce se zabývá návrhem, realizací a kvalitou služeb IPTV, VoIP a Data v rámci Triple play služeb v heterostrukturní sítí tvořené GEPON a xDSL technologiemi. Pro měření byli využity různé délky optické a metalické trasy. První části diplomové práce je teoreticky rozebrán vývoj a trend optických a metalických sítí. Druhá část se zaměřuje na měření typických optických a metalických parametrů na vybudované experimentální síti, kde byla následně testována její integrita. Dalším bodem práce je vyhodnocení výsledků Triple play, kde síť je různě zatěžována datovým provozem a následně vyhodnocována podle definovaných norem. Závěr práce je věnovaný simulačnímu prostředí Optiwave.440 - Katedra telekomunikační technikyvýborn
    corecore