Listing 1 - 4 of 4 |
Sort by
|
Choose an application
This book provides a collection of 15 excellent studies of Voice over IP (VoIP) technologies. While VoIP is undoubtedly a powerful and innovative communication tool for everyone, voice communication over the Internet is inherently less reliable than the public switched telephone network, because the Internet functions as a best-effort network without Quality of Service guarantee and voice data cannot be retransmitted. This book introduces research strategies that address various issues with the aim of enhancing VoIP quality. We hope that you will enjoy reading these diverse studies, and that the book will provide you with a lot of useful information about current VoIP technology research.
Internet telephony. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems --- Computer networking & communications
Choose an application
Clear, concise and comprehensive view of IMS and Rich Communication Suite (RCS) for developers Shows how to use RCS to create innovative applications for rapid uptake by end-users Covers service and operator scenarios for the IMS architecture Explains IMS architecture and protocols, from an application developer's perspective IMS Application Developer's Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it ""live"" on an operator's network. It offers practical guidance on bu
Database management. --- IMS (Computer system). --- IMS/VS (Computer system). --- Internet Protocol multimedia subsystem - Design and construction. --- Wireless communication systems - Design and construction. --- Internet Protocol multimedia subsystem --- Wireless communication systems --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Design and construction --- Internet telephony. --- Cell phone systems. --- Convergence (Telecommunication) --- Information Technology --- General and Others --- Telecommunication --- Cellular radio --- Cellular radiotelephone systems --- Cellular systems (Telecommunication) --- Cellular telephone systems --- Mobile telephony --- Wireless telephone systems (Cell phone) --- Mobile communication systems --- Telephone systems --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks
Choose an application
This book addresses three important issues in VoIP networks: Quality of Service, pricing and security. In addressing Quality of Service (QoS), it introduces the notion of delay not exceeding an upper limit, termed the bounded delay, to measure the Quality of Service in VoIP networks. Queuing models are introduced to measure performance in terms of bounded delays. Closed form solutions relating the impact of bounding delays on throughput of VoIP traffic are provided. Traffic that exceeds the delay threshold is treated as lost throughput. The results addressed can be used in scaling resources in a VoIP network for different thresholds of acceptable delays. Both single and multiple switching points are addressed. The same notion and analysis are also applied on jitter, another important indicator of the VoIP QoS This book also develops a pricing model based on the Quality of Service provided in VoIP networks. It presents the impact of quality of VoIP service demanded by the customer on the transmission resources required by the network using an analytical approach. In addition, it extends and applies the delay throughput analysis developed for VoIP networks in assessing the impact of risks constituted by a number of transportation channels, where the risk associated with each channel can be quantified by a known distribution. Finally, the book explores areas for future research that can be built on the foundation of research presented.
Internet telephony. --- Internet. --- TCP/IP (Computer network protocol). --- Internet telephony --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electrical Engineering --- Telecommunications --- TCP/IP (Computer network protocol) --- Digital telephone systems. --- Computer networks. --- Data transmission systems. --- Data communication systems --- Transmission of data --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telecommunication. --- Communications Engineering, Networks. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Electrical engineering. --- Electric engineering --- Engineering
Choose an application
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.
Internet telephony -- Security measures. --- Internet telephony. --- Internet. --- Internet telephony --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Security measures --- TCP/IP (Computer network protocol) --- Security measures. --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Computer network protocols --- Telephone systems --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing
Listing 1 - 4 of 4 |
Sort by
|