نتایج جستجو برای: ترافیک voip

تعداد نتایج: 5058  

2009
Ruishan Zhang Xinyuan Wang Xiaohui Yang Ryan Farley Xuxian Jiang

Phone features, e.g., 911 call, voicemail, and Do Not Disturb, are critical and necessary for all deployed VoIP systems. In this paper, we empirically investigate the security of these phone features. We have implemented a number of attacks and experimented with VoIP services by leading VoIP service providers Vonage, AT&T and Gizmo. Our experimental results demonstrate that a man-in-the-middle ...

2007
Matthew Simon Jill Slay

The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. VoIP provides strong encryption and a decentralised data­based network. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. New methods are required to collect evidence from systems running VoIP software. This paper ...

2008
Alana Huebner

This report contains an experimental evaluation of the impact that congestion control algorithms NewReno, HTCP and CUBIC have on the latency of VoIP traffic. It was found that when a TCP flow and VoIP flow share a bottleneck link the induced delay in the VoIP flow is related to the growth of the congestion window. CUBIC induced the highest average latency in the VoIP flow and HTCP the least.

Journal: :Network Protocols & Algorithms 2016
Ramon Sanchez-Iborra Maria-Dolores Cano Joan García-Haro

Voice over LTE (VoLTE) emerges as the basis for voice services in future cellular networks. At the same time, Quality of user Experience (QoE) assessment methods have notably evolved in the last years, especially for Voice over IP (VoIP) services. The question that rises is, are these models ready to be used for VoLTE? In this paper, we contribute to answer this question by: (i) providing a hig...

2014
Rahul Singh Ritu Chauhan

Voice over Internet protocol (VoIP) is a new way of communicating. It is a technology that allows users to make telephone calls over an IP network. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. Business concerns of implementing VoIP, components of a VoIP system, and relevant security issues and concerns as they ap...

2007
Haiyong Xie Yang Richard Yang

It has been increasingly popular to build voice-over-IP (VoIP) applications based on peer-to-peer (P2P) networks in the Internet. However, many such VoIP applications free-ride the network bandwidth of Internet Service Providers (ISPs). Thus their success may come at a cost to ISPs, especially those on the edge of the Internet. In this paper, we study the VoIP quality of Skype, a popular P2P-ba...

2007
Markus Dunte Christoph Ruland

Voice-over-IP (VoIP) is one of the main applications or services, which dramatically increased the spread and usage of the Internet. VoIP describes the transmission and reception of voice and video data over networks that use the “internet protocol” (IP) as transport protocol. With the use of VoIP within company networks (intranet) investors hope to reduce the expenses for infrastructure and ma...

پروتکل SIP به عنوان پروتکل اصلی لایه کنترل در شبکه‌های نسل آینده و کاربردهای چند رسانه‌ای نظیر ویدئو کنفرانس، تلویزیون و تلفن اینترنتی (VoIP) مطرح شده است. اصلی‌ترین حملات موجود در VoIP با عنوان حملات سیل‌آسا شناخته می‌شوند که بیش از 98 درصد آن‌ها به علت مشکلات پیاده‌سازی و پیکربندی و کمتر از دو درصد آسیب‌پذیری‌های مربوطه به علت ضعف پروتکل به وقوع می‌پیوندند. در این مقاله یک مجموعه ویژگی برای ت...

Journal: :JDFSL 2011
David Irwin Jill Slay Arek Dadej Malcolm Shore

The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to c...

Journal: :Computer Networks 2010
Nico Bayer Bangnan Xu Veselin Rakocevic Joachim Habermann

Wireless Mesh Networks (WMNs) are seen as a means to provide last mile connections in Next Generation Networks (NGNs). Because of their auto configuration capabilities and the low deployment cost WMNs are considered to be an efficient solution for the support of multiple voice, video and data services in NGNs. This paper looks at the optimal provision of resources in WMNs for Voice over IP (VoI...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید