16 research outputs found

    Mobile Probe for Cellular Network Coverage and Quality Measurement

    Get PDF
    This article describes a proposal of the probe application used for 2G–4G mobile network coverage and speech quality measurement. It is based on Android platform, most commonly used operation system for mobile phones. Measured results are visualized in the form of a map using GPS location. There are few tests available focusing on the applications that are most often used: test of the network coverage, speed of the websites loading, data rate test and voice quality test. The results are analyzed directly in the application and are also available over the web interface form. Individual results can be exported to standard output .csv, .json and .xml formats for further analysis

    Prepaid Voice Services Based on OpenBTS Platform

    Get PDF
    This article describes the design and implementation of prepaid voice services based on OpenBTS platform. By using various programming languages and open-source software tools, we can integrate prepaid voice services with this system, so its functionality is resembled as much as possible the operation of traditional GSM network provider. This article also provides description of how customers will approach their billing services, how they will access their accounts and pay their invoices

    Delay Variation Model with Two Service Queues

    No full text
    Delay in VoIP technology is very unpleasant issue and therefore a voice packets prioritization must be ensured. To maintain the high call quality a maximum information delivery time from the sender to the recipient is set to 150 ms. This paper focuses on the design of a mathematical model of end-to-end delay of a VoIP connection, in particular on a delay variation. It describes all partial delay components and mechanisms, their generation, facilities and mathematical formulations. A new approach to the delay variation model is presented and its validation has been done by experimention

    IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network

    No full text
    The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal emulation. SIP endpoints are registered with real SIP registrar and the incoming calls are routed to a honeypot according the rules in dialplan. The honeypot gathers valuable data about hacker's activity with no threat to production systems. Analysis of the honeypot data is crucial for further improvement of existing security mechanisms in VoIP networks. The paper describes the honeypot's behaviour and brings an analysis of a detected malicious activity as well

    Session Initiation Protocol Proxy in a Role of a Quality of Service Control Application in Software-Defined Networks

    No full text
    This article deals with quality of service (QoS) in internet protocol (IP) telephony by applying software-defined networking (SDN) tools. The authors develop a new design that deterministically classifies real-time protocol (RTP) streams based on data found in session initiation protocol (SIP) using SIP proxy as a mediator, and the concept making this possible is called SDN. Compared to traditional networks, SDN allows us to approach network configuration differently. SDN networks are programmable through software applications running on top of the SDN controller. One of the technologies that might benefit from this concept is IP telephony, which often needs an additional priority management configuration to ensure consistent quality of its real-time media exchange. Typically, a session protocol for real-time communications is SIP, and as such, its infrastructure may be used to classify the traffic in question and take advantage of the centralized approach of SDN networks to distribute the class information across the switching devices. Different approaches and possible applications are discussed in the conclusion. The contribution of this paper lies in the proposal of SDN-based QoS mechanisms. The entire design of the concept was implemented and validated in a laboratory environment. The results clearly demonstrate the efficiency of the proposed approach

    Exploratory Analysis of Virtualization Tools in Delay-Sensitive Environment

    No full text
    This article deals with an exploratory analysis of virtualized real-time applications. We compare selected virtualizations tools and present the achieved results in boxplots based on the performed exploratory analysis. The paper analyzes the impact of memory size and the number of processor cores on the delay itself and its variance in selected set of virtualization tools

    Voice Messaging System as a Form of Distribution of an Urgent Information

    No full text

    Automatic Classification of Attacks on IP Telephony

    No full text
    This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application

    Different Approaches for Face Authentication as Part of a Multimodal Biometrics System

    Get PDF
    This paper describes different approaches for the face authentication from the features and classification abilities point of view. Authors compare two types of features - Histogram of Oriented Gradients (HOG) and Local Binary Patterns (LBP) including their combination. These parameters are classified using Multilayer Neural Network (MLNN) and Support Vector Machines (SVM). Face authentication consists of several steps. The first step contains Viola-Jones algorithm for face detection. Authors resize the detected face for a fixed vector and afterwards, it is converted into grayscale. Next, feature extraction with a simple Min-Max normalization is applied. Obtained parameters are evaluated by classifiers and for each detected face, authors get posterior probability as the output of the classifier. Different approaches for face authentication are compared with each other using False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (EER), Receiver Operating Characteristic (ROC) and Detection Error Tradeoff (DET) curves. The results are verified with AR Face Database and elaborated in a feature extraction and classifier design point of view. Best results were achieved by HOG feature for SVM classifier. Detailed results are listed in the text below

    Bruteforce Attacks Blocking Solution on Embedded SIP Communication Server

    No full text
    This article deals with embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed
    corecore