Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, Internet Protocol (IP) telephony is becoming popular because it offers more flexibility in the implementation of new features and services. Session Initiation Protocol (SIP) is a peer-to-peer, multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF) plays a vital role in providing services to IP telephony. SIP is ASCII-based, resembling HTTP, and reuses...
With the comprehensive development of Next Generation Network (NGN), voice calls on IPv6 (VoIP over IPv6) is the general trend. This paper studies the core Signalling Conrol Protocol of NGN-SIP features and structure, analyzes the model based on SIP, researches the framework of voice within SIP, eventually proposed the way to complete VoIP in the environment of IPv6 with VC++.
This paper analyses the vulnerabilities exist in SIP protocol, and how these vulnerabilities can be exploited by attackers to attack the SIP based networks i.e VoIP and IMS [IP Multimedia Subsystem]. An attack tool is developed to exploit those vulnerabilities and a two-gram self learning solution is proposed to protect SIP based networks from these attacks.
In this paper, the technology of trusted boundary based on port trust value is discussed. When IP phones are connected to the existing switch-based campus area network, PC is connected to the access port of IP phone. To avoid IP phone is disconnected from the network and PC is directly into the switch port, trusted boundary based on port trust value is applied. In an IP PBX, trusted mode or untrusted...
Voice telephony over mobile is currently supported at a cost using service provider such as GSM, or using IP service provider at cheaper cost. The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local Area Network) as a means of communication between mobile phones at no cost. The system will allow users to search for other...
With the proliferation of the Internet, voice over IP and multimedia communication become more and more important. One of the protocol that facilitated this development is Session Initiation Protocol (SIP). SIP is a signaling protocol which manages the session establishment and termination. It can be based on UDP or TCP at the transport layer. In this paper, the strengths and weaknesses of SIP over...
Over the past decade, wireline Service Providers (SP) have been looking for ways to evolve the existing PSTN network to Next Generation Network (NGN). The economics of the PSTN migration to NGN could not result in a positive business case for SPs. However, new market conditions are squeezing SPs' margins for traditional voice services in the PSTN. Meanwhile, recently standardized IP Multimedia Services...
Over the last decade, VoIP has had a fast growth particularly in Small Office Home Office environments overloading the wireless accesses in the last mile. Network Coding schemes have advantageous features for throughput performance but VoIP is a delay critical service requiring fast routing algorithms. In this paper, we design, implement and measure experimental values for a network coding based VoIP...
The potential increase in the popularity of greedy software such as download accelerator software and greedy application such as P2P leads to a significant demands for reconstruction of the old fashion max-min fairness definition. Furthermore, these applications and software monopolize network bandwidth and hence result in magnificent degradation in the performance of real-time application such as...
Mobile users' demand for using the best available network connection encourages mobile network operators (MNOs) to construct multi-access networks managed by all-IP based mobile networks. For such an MNO, the IP Multimedia Subsystem (IMS) is a promising service control infrastructure to provide IP-based multimedia services with QoS guarantee in the multi-access network. The service centralization...
In 3GPP standard, LTE networks are currently specified by considering Mobile VoIP combined with IMS for session control to ensure voice calls support. So, Mobile VoIP over LTE with IMS can be considered as a target for voice support migration from the current support in Circuit Switched (CS) Domain. Because Mobile VoIP services could potentially be supported over HSPA in the coming years and LTE coverage...
QoS in Convergent networks is widely discussed item in IP networks. But with the implementation of the Next Generation Networks by most operators around the world, QoS for different services and applications must fulfill. In order to deal with this problem, we simulate end to end QoS parameters, according to ITU Y.1540 and Y.1541 recommendations and different scheduling algorithms proposed by manufacturers...
More and more VoIP applications have emerged with the development of network and multimedia coding techniques. Their traffic identification is meaningful to for network management and application optimization. In this paper, a new traffic identification scheme, which combines traffic flow statistic analysis with host behavior estimation, is proposed to identify the VoIP traffic at transport layer...
With almost 70% of poor living in rural areas, there is a urgent need for rural economic growth. The lack of rural economic growth leads to underdevelopment, illiteracy, Urban migration, health issues etc. With the advancement in the telecommunication sector, we want to leverage technology for this purpose. The purpose of this paper is to identify and present the opportunities that can be created...
IP Multimedia Subsystem (IMS) is very important due to the critical role it plays in the Next Generation Network (NGN) of the Fixed and Mobile Networks. Voice traffic in IMS will be served using Internet Protocol (IP) which is called Voice over IP (VoIP). This paper uses the "E-Model", (ITU-T G.107), as an optimization tool to select network and voice parameters like coding scheme, packet...
It needs to consider the establishment and release of IP telephony signaling-SIP or H.323 while analyzing VoIP network performance with OPNET, involving complex protocol configuration such as MGCP. What's more, the simulation efficiency will be greatly reduced in large-scale network. This paper presented an new idea to study the performance of VoIP network, it used the built-in hybrid simulation mechanism...
Area Coverage for ground-to-air voice communication can be extended largely while radio stations are connected with ground-based wired network. This application system has three main characteristics: half-duplex conversation, twice voice encoding and voice over IP transferring. Under this scenario, we present an objective calculation model, which is based on E-model, to evaluate the end-to-end voice...
With the comprehensive development of Next Generation Network (NGN), voice calls on IPv6 (VoIP over IPv6)is the general trend. This paper studies the core Signaling Control Protocol of NGN-SIP features and structure, analyzes the model based on SIP, researches the framework of voice within SIP, eventually proposed the way to complete the voice calls in the environment of IPv6.
The rapid growth of the access technologies provides an opportunity for appropriately equipped user terminals to access the rich communication suite services. And the IP Multimedia Subsystem (IMS) could very well be the best solution for most operators. The more recent releases have included interfaces to non-IP Capable Access Network (IP-CAN) as well as IP-CAN. In addition to, a Mobile VoIP (mVoIP)...
Using communication services like voice services, chat services and web 2.0 technologies (wikis, blogs, etc) are a common part of everyday life in a personal or business context. These communication services typically authenticate participants. Identities identify the communication peer to users of the service or to the service itself. Calling line identification used in the Session Initiation Protocol...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.