Embedded systems, networks and protocols research group. Ondřej Ryšavý 3rd Annual Conference of IT4Innovation
|
|
- Franklin Fleming
- 8 years ago
- Views:
Transcription
1 Embedded systems, networks and protocols research group Ondřej Ryšavý 3rd Annual Conference of IT4Innovation
2 Embedded systems, networks and protocols research group Task: Design of embedded systems, networks and protocols Team Leader : Miroslav Švéda Team Members (6): Petr Matoušek, Pavel Očenášek, Ondřej Ryšavý, Vladimír Veselý, Matěj Grégr, Jaroslav Ráb
3 Research statement (A1) Research cyber threats and protective methods to increase security of computer networks (A2) Research communication platform for cyber physical systems to enable building large scale distributed applications (A3) Research Software Defined Networks (SDN) as a next flexible networking technology
4 Recent and Current Projects PRISTINE (EU FP7, ) SEC6NET (MV, ) Automated attack processing (MPO ČR, ) SCADA system for control and monitoring RT processes (TAČR, ) ATLANTIS-DeSIRE^2: Dependable Systems International Research and Educational Experience (ATLANTIS-DESIRE, )
5 PRISTINE Project Goal is to investigate RINA (Recursive InterNetwork Architecture) to: Finish its specification (fill missing pieces, resolve conflicts) demonstrate its applicability to high scalability, multihoming, built-in security, seamless access to real-time information and operation in dynamic environments. Possible applications as middleware for cloud-computing, real-time distribute environments, service oriented computing
6 PRISTINE Big Picture
7 PRISTINE Project - our tasks consortium consists of TSSG, I2CAT, Telefonica, Ericsson, Nextworks, Thales, Nexedi, BiSDN, Atos, Juniper, University of Oslo, Brno University of Technology, Telecom SudParis, CREATE-NET, iminds. implementation of simulation environment to support design, development and evaluation of RINA mechanisms and policy contribution to security mechanisms, resilience and data forwarding
8 Sec6net project Modern Tools for Detection and Mitigation of Cyber Criminality on the New Generation Internet research and development of tools for recognition and monitoring network traffic, further offline analysis of network traffic, and methods of securing local networks network security: methods and tools for extracting and presenting information from network traffic, detecting anomalies in traffic network forensics: tools for extracting data from network communication, searching for patterns, unusual or specific user behavior issues: large data sets of source information, new protocols, divergences to standards, encrypted and tunneled communication
9 1 2 ABC 4 5 GHI JKL 7 8 PQRS TUV * 0 OPER 3 DEF 6 MNO 9 WXYZ # CISCO IP PHONE 7970 SERIES -? ABC 4 5 GHI JKL 7 8 PQRS TUV * 0 OPER 3 DEF 6 MNO 9 WXYZ # CISCO IP PHONE 7970 SERIES -? + Motivation RTP Detection Fast RTP Detection and Codecs ignalling and Voice Transmission in VoIP Classification in Internet Traffic SIP RTP SIP RTP Probe On-line detection of RTP communication on dynamic ports. Research Goals RTP detection without signalling protocols. On-line detection of RTP communication on dynamic ports. RTP detection without signalling protocols. Simple but precise classification of the payload Simple but precise classification of the payload (what kind of codec). On-the-fly embedded solution. Matoušek, Ryšavý, Kmet (BUT) Fast RTP Detection and Classification ICDF2C 2014, New Haven,CT 3 / 17
10 RTP Traffic
11 Two phase detection
12 Length of flow
13 Codec Detection
14 Codecs Classification Implementation Scheme of RTP detection and Codec classification Detection/classification Stream DB input packets RTP Filter RTP packets Stream Collector RTP streams classified streams RTCP packets RTCP packets RTCP Analyser Codec Mapper Implementation packet Stand-alone filter: packet C-language that application may be for Unix RTP and(udp, Windows. RTP header signature) Plugin into NetFox Detective forensics tool. flow filter: analyse a subsequence of packet within the flow Matoušek, Ryšavý, Kmet (BUT) Fast RTP Detection and Classification ICDF2C 2014, New Haven,CT 11 / 17 (sequence numbers, payload size, timestamps)
15 Method evaluation We used available data sets to evaluate the method. Except silk-class codecs the method recognise all normal RTP flows.
16 Conclusions
17 This year (SW) products QnxTimeSync - A tool for measuring real precision of network synchronization in real-time operating systems, software, 2014 IP45 Host Implementation for Linux, OSX, Windows, software, 2014 IP45 Border Gateway Implementation for Linux, software, 2014 Database of samples of VoIP communication with different codecs, software, others by the end of the year
18 Selected publications MATOUŠEK Petr, RYŠAVÝ Ondřej and KMEŤ Martin. Fast RTP Detection and Codecs Classification in Internet Traffic. The Journal of Digital Forensics, Security and Law. 2014, vol. 2014, no. 2, pp ISSN POLČÁK Libor, HRANICKÝ Radek and MARTÍNEK Tomáš. On Identities in Modern Networks. The Journal of Digital Forensics, Security and Law. 2014, vol. 2014, no. 2, pp ISSN ŠVÉDA Miroslav. Dependability in Cyber-Physical Systems Network Applications. In: Proceedings of the 5th International Conference on Circuits, Systems, Control, Signals Salerno: North Atlantic University Union, 2014, pp ISBN GRÉGR Matěj, PODERMAŃSKI Tomáš and ŠVÉDA Miroslav. Measuring Quality and Penetration of IPv6 Services. In: The Tenth International Conference on Networking and Services CHAMONIX MONT-BLANC: Institute for Systems and Technologies of Information, Control and Communication, 2014, pp ISBN
19 Current state Team focusing on network security and programability consisting of members with complementary skills. There are two running projects which is currently the maximum we can reasonable handle. Students (~20) at all levels (Bc, Mgr, Phd) participate in R&D projects. Actively searching further funding possibilities
20 Outlook IT4I work follows planned activities, some adjustments were necessary with respect to other projects Objectives are set for the next period: Network security (in Internet as well as in Industrial Networks) Communication platform for CPS (project proposal made) Specific areas of Software Defined Networking New projects are needed after 2015.
21 New proposals Design of Computer Networks with Respect to Network Applications Support (GACR) analyse the sources of these issues, identify major drawbacks of the current Internet communication propose possible solutions with respect to requirements specified by the domain of Internet-based CPS. NetFP - Network Forensic Analysis Platform (TACR) platform for network forensics capable of complex analysis of traffic data to achieve the significant improvement in the area of efficient analysis of heterogenous network forensic data in large Siemens Innovation at NineSigma Requests Cloud-base industrial control applications
22 Our group and HPC? HPC resources of IT4I not used yet, but there are some applications considered for HPC deployment: analysis of a huge amount of data from network in order to detect anomaly behaviour or creating long-term user profiles simulation of large scale networks in order to evaluate quantitative parameters (part of PRISTINE) Currently, we are doing small scale experiments in order to prepare algorithms for HPC environment
23 Embedded systems, networks and protocols research group
IRATI - Investigating RINA as an Alternative to TCP/IP
Títol de la presentació de powerpoint IRATI - Investigating RINA as an Alternative to TCP/IP FIRE Engineering Workshop, Ghent, Belgium November 6th, 2012 Sergi Figuerola Project coordinator Director @
More informationEarthLink Business SIP Trunking. Toshiba IPedge Customer Configuration Guide
EarthLink Business SIP Trunking Toshiba IPedge Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011
More informationEarthLink Business SIP Trunking. Asterisk 11.2 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking Asterisk 11.2 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0
More informationUnit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
More informationMicrobase OpenSIPs Summit 2015 Building an ITSP with OpenSIPs 2.1
Microbase OpenSIPs Summit 2015 Building an ITSP with OpenSIPs 2.1 Antonis Psaras, Managing Partner, Microbase Microbase Microbase is a communications software developer and supplier, with a leading role
More informationEarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking ININ IC3 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011
More informationALERT & Cisco CallManager
Micromedia International Technical specification Author : Pierre Chevrier Pages : 28 Company : Micromedia International Date : 26/05/2011 Réf. : ETT_20090618_000001.docx ALERT & Cisco CallManager This
More information920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationFrom traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik
From traditional to alternative approach to storage and analysis of flow data Petr Velan, Martin Zadnik Introduction Network flow monitoring Visibility of network traffic Flow analysis and storage enables
More informationWeek 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks
Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass, P. Stewart, J. D. Thornton, R. L. Braynard ACM ReArch 2009 Main point Content-centric
More informationVoice Over Internet Protocol(VoIP)
Voice Over Internet Protocol(VoIP) By Asad Niazi Last Revised on: March 29 th, 2004 SFWR 4C03 Major Project Instructor: Dr. Kartik Krishnan 1. Introduction The telecommunications companies around the world
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationINdigital ESinet SIP interconnection
content and concepts INdigital telecom INdigital ESinet SIP interconnection a whitepaper guide to sip trunk connections for INdigital ESinets issued as a part of the INdigital telecom network notes series
More informationReceiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationpoint to point and point to multi point calls over IP
Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
More informationInternet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
More informationCommunications Solutions Group Product Bulletin
Communications Solutions Group Product Bulletin Title: Open Text FirstClass Unified Communications Support for Dialogic PBX/TDM Integration Hardware EOL Notice Bulletin Number: 218 Version: 1.0 Date: November
More informationEarthLink Business SIP Trunking. Avaya IPO IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking Avaya IPO IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 August 30, 2011 CHANGE HISTORY Version Date Change Details Changed By 1.0 8/30/2011
More informationMarratech Technology Whitepaper
Marratech Technology Whitepaper Marratech s technology builds on many years of focused R&D and key reference deployments. It has evolved into a market leading platform for Real Time Collaboration (RTC)
More informationMyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)
MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment) N.B. Goto MyIC Preferences in the System Toolbar. Description: this may be any appropriate description of the
More informationSIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
More informationImplementing VoIP over Fatima Jinnah Women University
www.ijcsi.org 161 Implementing VoIP over Fatima Jinnah Women University Ammara Tahir 1, Tahira Mahboob 2, Malik Sikandar Hayat khiyal 3 1 Software Engineering Department, Fatima Jinnah Women University
More informationVoIP Fraud and Misuse
DFN Tagung 15.10.2013 VoIP Fraud and Misuse Detection and Mitigation Prof. Dr.-Ing. Erwin P. Rathgeb Dirk Hoffstadt, M.Sc. Networking Technology Group Institute for Experimental Mathematics & Institute
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
More informationMonitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
More informationOpen Source VoIP Traffic Monitoring
Open Source VoIP Traffic Monitoring Luca Deri What is VoIP? VoIP is the routing of voice conversations over the Internet or through any other IP-based network (Wikipedia). Advantages: It allows
More informationSIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops
SIP (Session Initiation Protocol) Technical Overview Presentation by: Kevin M. Johnson VP Engineering & Ops Page 1 Who are we? Page 2 Who are we? Workforce Automation Software Developer Page 3 Who are
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationAnalysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
More informationRTP Performance Enhancing Proxy
PACE RTP Performance Enhancing Proxy V2 Whilst the above information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure its accuracy, Inmarsat makes no warranty
More informationCurrent and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
More informationCisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationApplication Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
More informationMonitoring high-speed networks using ntop. Luca Deri <deri@ntop.org>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
More informationVoice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
More informationABC SBC: Securing and Flexible Trunking. FRAFOS GmbH
ABC SBC: Securing and Flexible Trunking FRAFOS GmbH 1. Introduction Enterprises are increasingly replacing their PBXs with VoIP PBX or are extending their PXB with a VoIP module to benefit from attractive
More informationHigher Education: E9-1-1 Solution Enhances Safety on Large University Campus
CASE STUDY Higher Education: E9-1-1 Solution Enhances Safety on Large University Campus SAFETY SERVICES THE ORGANIZATION Lynn University (LU), founded in 1962, is an independent, nonprofit university located
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationCisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
More informationHow To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationThreat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
More informationBest Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
More informationTraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic
TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm
More informationIP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationSecure VoIP for optimal business communication
White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product
More informationOracle Enterprise Operations Monitor
ORACLE DATA SHEET Oracle Enterprise Operations Monitor For enterprise IT managers who need to rapidly troubleshoot communications network outages and service degradations, the Oracle Enterprise Operations
More informationA B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
More informationPreparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014
Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014 [Type text] As the limited number of remaining IPv4 addresses are allocated to ISPs, it is becoming increasingly
More informationOpen Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
More informationTesting IVR Systems White Paper
Testing IVR Systems Document: Nexus8610 IVR 05-2005 Issue date: Author: Issued by: 26MAY2005 Franz Neeser Senior Product Manager Nexus Telecom AG, Switzerland We work to improve your network Abstract Interactive
More informationOverview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
More informationSECURITY & REAL-TIME APPLICATION INSIGHT
SECURITY & REAL-TIME APPLICATION INSIGHT OCTOBER 2014 AGENDA Knowing what s on your Network Benefits of Application Recognition Deeper Insight and Content Decoding Security Customer Use Case NETWORK SECURITY
More informationEAGLE EYE IP TAP. 1. Introduction
1. Introduction The Eagle Eye - IP tap is a passive IP network application platform for lawful interception and network monitoring. Designed to be used in distributed surveillance environments, the Eagle
More informationHow to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions
How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the NEC SV8100 IP PBX to connect to Integra Telecom SIP trunks.
More informationColumbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems
Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems Henning Schulzrinne Eilon Yardeni Somdutt Patnaik Columbia University CS Department Gaston Ormazabal Verizon
More informationCan PowerConnect Switches Be Used in VoIP Deployments?
PowerConnect Application Note #11 February 2004 Can PowerConnect Switches Be Used in VoIP Deployments? This Application Notes relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
More informationIntegrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
More informationVoice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
More informationKeywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
More informationVoice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples
Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead
More informationACN2005 Term Project Improve VoIP quality
ACN2005 Term Project Improve VoIP quality By introducing TCP-Friendly protocol Burt C.F. Lien ( 連 矩 鋒 ) CSIE Department, National Taiwan University p93007@csie.ntu.edu.tw Abstract The most notorious of
More informationHow to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions
How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Allworx 6x IP PBX to connect to Integra Telecom
More informationETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
More informationTLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
More informationBasic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future
More informationOn-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
More informationThis chapter describes the features of the Cisco Unified IP Phone 6921, 6941, 6945, and 6961.
This chapter describes the features of the Cisco Unified IP Phone 69, 694, 6945, and 696. Cisco Unified IP Phone 69 The Cisco Unified IP Phone 69 provides these features: Phone connections Buttons and
More informationVoice Over IP. Priscilla Oppenheimer www.priscilla.com
Voice Over IP Priscilla Oppenheimer www.priscilla.com Objectives A technical overview of the devices and protocols that enable Voice over IP (VoIP) Demo Packet8 and Skype Discuss network administrator
More informationAn Oracle White Paper July 2013. Oracle Enterprise Operations Monitor: Real-Time Voice over Internet Protocol Monitoring and Troubleshooting
An Oracle White Paper July 2013 Oracle Enterprise Operations Monitor: Real-Time Voice over Internet Protocol Monitoring and Troubleshooting Introduction... 1 Overview... 2 Key Functions and Features...
More informationAn Overview of the Cisco Unified Wireless IP Phone 7921G
CHAPTER1 An Overview of the Cisco Unified Wireless IP Phone 7921G The Cisco Unified Wireless IP Phone 7921G provides wireless voice communication over an Internet Protocol (IP) network. Like traditional
More informationVoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com sales@advancedvoip.com support@advancedvoip.com Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
More informationHow To Deliver High Quality Telephony Over A Network
Voice over Application Note Telephony Service over Satellite January 2012 Data Sells but Voice Pays In the early years of the industry, networks were deployed primarily for telephony services. As time
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationCVOICE Exam Topics Cisco Voice over IP Exam #642-432 7/14/2005
CVOICE Exam Topics Cisco Voice over IP Exam #642-432 7/14/2005 From the Cisco CVOICE 642-432 Exam Topics Voice over IP Technologies Describe the similarities and differences between PSTN and VoIP including
More informationSecuring IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
More informationFlowMon. Complete solution for network monitoring and security. INVEA-TECH info@invea-tech.com
FlowMon Complete solution for network monitoring and security INVEA-TECH info@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects project
More informationAdvanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
More informationCompliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationPalladion Enterprise SOLUTION BRIEF. Overview
is a real-time, end-to-end service monitoring, troubleshooting and analytics solution that provides unprecedented insight into VoIP and Unified Communications (UC) networks. Palladion allows enterprises
More informationNext Generation. VoIP Application Firewall. www.novacybersecurity.com
Next Generation VoIP Application Firewall Are you aware that you are vulnerable to all threats on the Internet? With increasing voice and video transmission over IP and emerging new technologies such as
More informationVoice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
More informationOnline Network Traffic Security Inspection Using MMT Tool
Online Network Traffic Security Inspection Using MMT Tool Wissam Mallouli, Bachar Wehbi, Edgardo Montes de Oca Michel Bourdellès, Denis Rocher and Arnaud Baloche Montimage EURL, 39 rue Bobillot, 75013
More informationVOICE SERVICES AND AVIATION DATA NETWORKS
VOICE SERVICES AND AVIATION DATA NETWORKS Anuj Bhatia, Anant Shah, Nagaraja Thanthry, and Ravi Pendse, Department of Electrical and Computer Engineering, Wichita State University, Wichita KS Abstract The
More informationVoice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
More informationVoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
More informationINdigital SIP trunk interconnection
content and concepts INdigital telecom INdigital SIP trunk interconnection a whitepaper guide to sip trunk connections to the INdigital network Issued as a part of the INdigital telecom network notes series
More informationIPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
More informationHigh-performance VoIP Traffic Optimizer Client Solution
AP-VTO200 VoIP Traffic Optimizer Client High-performance VoIP Traffic Optimizer Client Solution AddPac Technology 2014, Sales and Marketing www.addpac.com Contents Product Overview Benefits and Features
More informationCYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
More informationConnecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More information