Narrow your search
Listing 1 - 4 of 4
Sort by

Book
VoIP Technologies
Author:
ISBN: 9535155067 953307549X Year: 2011 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a collection of 15 excellent studies of Voice over IP (VoIP) technologies. While VoIP is undoubtedly a powerful and innovative communication tool for everyone, voice communication over the Internet is inherently less reliable than the public switched telephone network, because the Internet functions as a best-effort network without Quality of Service guarantee and voice data cannot be retransmitted. This book introduces research strategies that address various issues with the aim of enhancing VoIP quality. We hope that you will enjoy reading these diverse studies, and that the book will provide you with a lot of useful information about current VoIP technology research.


Book
IMS application developer's handbook : creating and deploying innovative IMS applications
Author:
ISBN: 1283173875 9786613173874 0123821932 0123821924 9780123821928 9781283173872 9780123821935 Year: 2011 Publisher: Oxford [U.K.] : Academic Press, an imprint of Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Clear, concise and comprehensive view of IMS and Rich Communication Suite (RCS) for developers Shows how to use RCS to create innovative applications for rapid uptake by end-users Covers service and operator scenarios for the IMS architecture Explains IMS architecture and protocols, from an application developer's perspective IMS Application Developer's Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it ""live"" on an operator's network. It offers practical guidance on bu


Book
Voice over IP networks : quality of service, pricing and security
Authors: ---
ISBN: 3642143296 9786613083975 364214330X 1283083973 Year: 2011 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book addresses three important issues in VoIP networks: Quality of Service, pricing and security. In addressing Quality of Service (QoS), it introduces the notion of delay not exceeding an upper limit, termed the bounded delay, to measure the Quality of Service in VoIP networks. Queuing models are introduced to measure performance in terms of bounded delays. Closed form solutions relating the impact of bounding delays on throughput of VoIP traffic are provided. Traffic that exceeds the delay threshold is treated as lost throughput. The results addressed can be used in scaling resources in a VoIP network for different thresholds of acceptable delays. Both single and multiple switching points are addressed. The same notion and analysis are also applied on jitter, another important indicator of the VoIP QoS This book also develops a pricing model based on the Quality of Service provided in VoIP networks. It presents the impact of quality of VoIP service demanded by the customer on the transmission resources required by the network using an analytical approach. In addition, it extends and applies the delay throughput analysis developed for VoIP networks in assessing the impact of risks constituted by a number of transportation channels, where the risk associated with each channel can be quantified by a known distribution. Finally, the book explores areas for future research that can be built on the foundation of research presented.


Book
Voice over IP security : a comprehensive survey of vulnerabilities and academic research
Author:
ISBN: 1441998659 1441998667 Year: 2011 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.

Keywords

Internet telephony -- Security measures. --- Internet telephony. --- Internet. --- Internet telephony --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Security measures --- TCP/IP (Computer network protocol) --- Security measures. --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Computer network protocols --- Telephone systems --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing

Listing 1 - 4 of 4
Sort by