New security and control protocol for VoIP based on steganography and digital watermarking
|
|
|
- Emma West
- 10 years ago
- Views:
Transcription
1 New security and control protocol for VoIP based on steganography and digital watermarking Wojciech Mazurczyk1 and Zbigniew Kotulski1,2 1 Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Telecommunications {W.Mazurczyk Z.Kotulski}@tele.pw.edu.pl 2 Polish Academy of Sciences, Institute of Fundamental Technological Research [email protected] Abstract In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF s (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application s traffic. Additionally this solution offers authentication and integrity, it is capable of exchanging and verifying QoS and security parameters. It is based on digital watermarking and steganography that is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content. Keywords: IP Telephony / VoIP security, digital watermarking, steganography 1. Introduction Nowadays two the most important fields in which Voice over Internet Protocol (VoIP) is lacking are providing certain Quality of Service (QoS) parameters and security considerations [3]. In this paper we consider new protocol that covers both those fields simultaneously. It provides information that is vital to control the network conditions and to verify authentication of the source and data integrity. In TCP/IP networks VoIP, which is a real-time service, uses RTP (Real-Time Protocol) with UDP (User Datagram Protocol) for transport of digital streams. Currently there is one control protocol for RTP and it is RTCP (Real-Time Control Protocol) [5]. It is designed to monitor the Quality of Service (data delivery) and to convey information about the participants in an on-going session. RTCP operates mainly on exchanging two special reports called: Receiver Report (RR) and Sender Report (SR). Parameters that are enclosed in those reports can be used to estimate the network status. We propose a new protocol that uses two techniques: digital watermarking and network steganography to achieve analogous functionality like RTCP but moreover offers additional advantages. The most important one is that it includes also security verification of the transmission source and the content send (authentication and integrity). This solution does not consume transmission bandwidth, because the control bits (a header of the new protocol) are transmitted in a covert (steganographic) channel and data (QoS and the security parameters) is inseparably bound to voice content as a watermark. The paper is organized as follows. In Section 2 both techniques, digital watermarking and steganography, are described. Next, we give details about proposed solution in Section 3. Finally, we end with conclusions in Section 4.
2 2. Steganography and Digital Watermarking Steganography and Digital Watermarking are Information Hiding subdisciplines. The general difference between those two techniques is that steganography s aim is to keep the existence of the information secret and in watermarking making it imperceptible Steganography: a covert channel Steganography is a process of hiding secret data inside other, normally transmitted data. Usually it means hiding a secret message within an ordinary message and the extraction of it at its destination. In ideal situation, anyone scanning data will fail to know it contains covert data. In modern digital steganography, data is inserted into redundant (provided but often unneeded) data, e.g. fields in communication protocols, graphic image, etc. TCP/IP steganography utilize the fact that few headers in packet are changed during transit. We will exploit here a covert channel, which is a method of communication that is not a part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information. In TCP/IP stack, there is a number of methods available, whereby covert channels can be established and data can be exchanged secretly between hosts. An analysis of the headers of typical TCP/IP protocols e.g. IP, UDP, TCP, HTTP, ICMP results in fields that are either unused or optional. This reveals many possibilities where data can be stored and transmitted. As described in [7] IP header posses few fields that are available to be used as a covert channel. Those fields are marked in Figure 1 with italics. The total capacity of those fields exceeds 60 bits per packet. And there are UDP and RTP protocols fields left to be used. Figure 1 IP header with marked fields (italics) available for steganography (source: [7]) For VoIP and our solution we will exploit unused/optional fields in IP/UDP/RTP packets because those protocols are used in almost all IP telephony implementations. In [7], [8] and [9] methods of hidden transmission are presented. We do not limit this solution to using only IP/UDP/RTP protocol. Lower layers of TCP/IP stack also offer steganography possibilities like for example stated in [10]. Furthermore we can distribute those control bits among those fields in a predetermined fashion (this pattern can be exchanged during a signalling phase of conversation). In those chosen fields we will transmit only header (control bits) of our protocol with the use of steganography technique. Header consists of 6 bits per packet, so such a type of transmission is potentially hard to discover. The details will be described in Section Watermarking: the imperceptible information Digital watermarking is a multidisciplinary methodology widely developed in the last decade. It covers a large field of various aspects, from cryptography to signal processing, and is generally used for marking the digital data (images, video, audio or text). There are several applications for digital watermarks, described in [1] and [2], that include: Fingerprinting (embedding a distinct watermark into every copy of the author s data), Annotation Watermark/Content labelling (embedding information, which describes the digital work
3 that can be later extracted), Usage control/copy control (authors can insert a watermark that indicates the number of copies permitted for each user). However the most important applications for our purposes are: the possibility of embedding the authentication and integrity watermark and exchanging additional information (for the controlling RTP packets purposes). The watermark that will be used in, proposed here, authentication and integrity solution must possess certain parameters, like: robustness, security, transparency, complexity, capacity, verification and invertibility. Those parameters are described in [1] and [2]. Their optimization for real-time audio system is crucial. They are often mutually competitive, however there is always a compromise necessary. That is why the embedded watermark, that we will use, must be characterized by high robustness, high security and must be nonperceptual. Not every watermarking technique is applicable for our solution. IP Telephony is the demanding, real-time service. That is why we need the watermarking schemes that really work for the real-time conversations. Such algorithms are described, e.g. in [2], [3] and [4]. Generally, audio watermarking algorithm is based on two functions: embedding of the watermark into voice and its extraction. As soon as the conversation begins, certain information is embed into the voice samples and sent through the communication channel. Then, the watermark is extracted from those samples before they reach the callee and the information retrieved is verified. If the watermark s data sent is correct, the conversation can be continued. Most digital watermarking algorithms for the real-time communication are designed to survive typical non-malicious operations like: low bit rate audio compression, codec changes, DA/AD conversion or packet loss. For example, in [2] the watermarking scheme developed at the Fraunhofer IPSI (Institut Integrierte Publikations und Informationssysteme) and the Fraunhofer IIS (Institut Integrierte Schaltungen) were tested for different compression methods. Those results revealed that the large simultaneous capacity and robustness depend on the scale of the codec compression. When the compression rate is high (1:53), the watermark is robust only when we embed about 1 bit/s. With a lower compression rate we can obtain about 30 bit/s, whereas the highest data rate was 48 bit/s with good robust, transparent and complexity parameters. For the monophonic audio signal, which is a default type for IP Telephony the watermark embedding algorithm appeared around 14 times faster and the watermark detector almost 6 times faster than the real-time. The next important thing for this scheme is how much information we can embed into the original voice data. This will influence the speed of the authentication and integrity process throughout the conversation. This parameter, in our solution, is expected to be high but it is not crucial. With low compression rates, we propose to add a pre-conversation stage. In this stage there will be few seconds of the RTP packets exchange without the conversation. It will delay the setup of the call but then, during the conversation, the time of verification will be shorter. However, the lowest payload watermarks (about 1 bit/s) cannot be accepted in our scheme because, in this case, the conversation would have to last enormously long to work correctly. 3. New control and security protocol The most important security services to secure IP Telephony system are: authentication, integrity and confidentiality. The first two can be provided with the use of our protocol. The third should be guaranteed in a different manner, e.g., with the use of the security mechanisms from a classical security model (the cryptographic mechanisms). As we described earlier we will use two information hiding techniques: steganography to create covert channel that will be used to transmit header (control bits) and digital
4 watermarking to bound the parameters of the protocol to voice send into the network (watermark). We assume that our solution is for using in IP protocol version 4 networks [14]. The protocol we are proposing here should posses PDU (Protocol Data Unit), of which size must be kept to minimum. It is important because as we said in the Section 2 the capacity capability of watermarks is limited if we want also watermark other parameters like robustness or security. Every PDU consists of header (control bits) and a certain number of data bits that are embedded into sender/receiver voice. Because the capacity of the watermark depends greatly on the codec s compression rate that is used, so it is possible that the lot of parameters can be distributed into a number of packets. The size (number of bits) of each parameter that will be transmitted with our protocol should be low. For all parameters it should not exceed 32 bits. This value is taken from RTCP protocol size of the parameters. Only one parameter (NTP timestamp) is greater than given value. Limited size of every parameter results in shorter time for the parameter to be transmitted and verified. However we do not dictate this value. It should depend on network bandwidth, status and codec s compression rate Protocol data unit description The PDU consists of two parts: the header (control bits) and the watermark data. The header/control fields are transmitted in a covert channel in unused/optional fields of IP/UDP/RTP protocol s headers. Actual value of the parameter is embedded into voice as a watermark. The header (control bits) are organized in fields as shown in the Table 1: Type of field Number of bits Function P (Parameter) 4 Describes parameter that is transmitted in the watermark S (Side) 1 Describes the side of the communication (1 - sender, 0 - receiver report) C (Continuity) 1 Describes if a packet contains the beginning or continuation of the parameter indicated in the field P (1 beginning of new parameter, 0 continuation of the last parameter) Table 1 Header fields and their function Exemplary values of the field P are shown below (analogous parameters like in RTCP [5]): 0001 authentication or integrity parameter (32 bits) 0010 parameter: LSR Last sender report (32 bits) 0011 parameter: DLSR Delay of last sender report (32 bits) 0100 parameter: Interarrival jitter (32 bits) 0101 parameter: Extend highest sequence number received (32 bits) 0111 parameter: Cumulative number of packet lost (24 bits) 1000 parameter: Fraction lost (8 bits) 1001 parameter: Sender s packet count (32 bits) 1011 parameter: NTP timestamp (64 bits) 1010 parameter: RTP timestamp (32 bits) Moreover, the PDU can have one of two payload types: security or informational. Security payload means that PDU contains certain authentication and/or integrity information that should be verified after its extraction. Two kinds of security payloads are available, first is used to provide authentication and integrity of the voice and its source. Second s role is to
5 authenticate protocol parameters that were send earlier (both security and informational). Details about security payload and cryptographic operations in this protocol will be covered in Section 3.2. Another payload type is informational. Each PDU carries one of the parameters that are used to monitor the quality of service and the network conditions. Fig. 2. General protocol operation Usually in one IP/UDP/RTP packet there is about milliseconds of voice, which is about bytes, depending on type of codec used. Lets say that we are able to embed in average about 10 bits/s of watermark into the voice stream. With that assumption we must send about 3-4 packets to achieve those 10 bits. In this protocol we set parameter s value to 32 bits, so this parameter will be transmitted in about 9-12 packets in more than 3 seconds of the voice. In the example scenario in Fig. 3, we see how the exemplary parameter: Interarrival jitter (32 bits) is transmitted for assumption: 10bits/packet. Fig. 3. Example of transmission of the Interarrival jitter parameter As we can see in Fig. 3 parameter characterized by code 0100 (Interarrival jitter) was sent in four IP/UDP/RTP packets. In the first packet both fields S and C was set to 1. In the next
6 packet field C changed its value to 0 because it is a continuation of the parameter s data that was sent in last packet. At the destination there must be a buffer to extract all data from each packet. After transmitting all packets for one parameter data is available to be used (for QoS monitoring) or to be verified (for security reasons) Authentication and integrity parameter calculation and security payload Authentication and integrity calculation will be performed similarly as described in [6] but with watermark specific considerations. In Section 3.1 we mentioned that two security payloads are available: - one is used to provide authentication and integrity of the voice and its source - second is to authenticate protocol parameters (both security and informational) that were send earlier First security parameter is a combination of user global identification and features that were extracted from the voice stream. It is expected that this parameter will have 32 bits. So if the concatenation of those two values exceeds this number of bits, there will be a hash function (marked as H) performed. Then only predetermined bits will be transmitted as a security parameter. Second security payload is a special parameter that will be used to provide greater security of the whole digital stream and transmission. The general idea of its calculation is presented in Figure 4. Fig. 4. Example of authentication and integrity mechanism for transmitted parameters First, we must emphasize that during a conversation (RTP packets flow) there will be constant two-way exchanging of certain sequence of parameters. Those parameters can be susceptible to e.g. modifications or other attacks. To prevent this situation every n-th packet is used to authenticate and provide integrity of n-1 parameters that were transmitted earlier. For the situation in Fig. 4. n=4. Three parameters that can contain informational or first kind of security payload are stored in sender buffer. After they all are placed there (B1, B2 and B3 blocks) the hash function (H) can be calculated, if the result value is too long. Because we assumed certain parameter length that is why we have to choose only 32 bits from the hash to be transmitted. For every conversation this pattern, in which bits are chosen, should be changed and its determination should be set and send in a signalling phase of the connection Level of Trust (LoT) mechanism However, we can still imagine a situation, in which the attacker disrupt transmission of the header/controls bits. In this situation the receiver is unable to retrieve any parameters that
7 were transmitted by the sender. Here we will describe a mechanism that will prevent such a situation. Both parties of the conversation will update special parameter named LoT (Level of Trust), during a conversation. If a parameter (security or informational) is received and verified, LoT value increases. In any other situation its value decreases. Additionally parameters that are exchanged during conversation influence LoT value differently. Informational parameters (QoS) add/subtract to LoT s value 1, first kind security parameters 2 and the second kind security parameter 5. If A sends to B a parameter, the algorithm of handling the LoT parameter (on B side) works, as described below in a pseudo-code: START /* CL - Critical Level, LoT - Level of Trust, T - timer */ CL = a; LoTA = x; TA = 0; /* Initiating values */ StartTimer(TA); FOR (i = 0; i++; i< End of Transmission) /* i - Time slot */ { IF (Parameter A correct) THEN { LoTA + {1 or 2 or 5}; * ResetTimer(TA); } ELSE (LoTA {1 or 2 or 5}); * IF (LoTA <= CL) OR (TA > k) THEN STOP; (1) IF (LoTA = a*x) THEN LoT = x; (2) } * value depends on the type of parameter (QoS, security) As we can see, the breakage of the call (or notification to the calling parties) will take place if the value of the LoT parameter is equal or below the given threshold (CL value) or if the timer TA expires (1). The LoT value changes during the conversation time. If every signalling message is successfully verified, the LoT value rises. To prevent its increase from reaching the infinity, we lower it, as soon as it reaches the value of the critical level multiplied by the start value of LoT (2). This way of decreasing the LoT value has one serious disadvantage: it allows an attacker to wait until LoT= (a*x)-1. But we must assume that he is able to posses information about its value and then safely spoof ((a*x) - 1 (CL + 1)) audio packets without LoT s falling below the threshold (CL). To prevent it, one must choose the initiating values (a and x) carefully. Their values should depend on network s parameters: the packet loss and possible delays. If the network does not suffer heavily from the packet loss, those values must be low. In the other case, they must be set to a higher level. For example, the network administrator or service provider can circumscribe those parameters for a certain network/user. 4. Conclusions New security and control protocol for VoIP service was presented. It uses two information hiding techniques: steganography to create covert channel in which the header (control bits) are passed and digital watermarking to transmit the actual data (parameter s value) in voice stream. The most important advantages of our solution are no consuming of available bandwidth, providing security, parameters to monitor QoS and network status in one protocol. What we want to emphasize is that the process of sending information for this protocol is continuous in time and although the bit rate per second offered by watermarking is usually not very high, when we consider a whole conversation we see that we are able to exchange quite a amount of data. The variety of different kind of parameters that can be used in our solution is not limited to security/monitoring status of the network ones. That is why this protocol can be freely extended to other data e.g. to support other and more detailed statistics as described in [11].
8 REFERENCES: [1] J. Dittmann, A. Mukherjee, M. Steinebach, Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication, Proceedings of the International Conference on Information Technology: Coding and Computing, IEEE Computer Science Society, Las Vegas, Nevada, USA (2000) pp [2] M. Steinebach, F. Siebenhaar, C. Neubauer, R. Ackermann, U. Roedig, J. Dittmann, Intrusion Detection Systems for IP Telephony Networks, Real time intrusion detection symposium, Estoril, Portugal (2002) pp. (17)1-9 [3] D. Richard Kuhn, Thomas J. Walsh, Steffen Fries: Security Considerations for Voice Over IP Systems, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (2004). [4] W. Mazurczyk, Z. Kotulski: New authentication and integrity scheme for IP Telephony based on digital watermarking, Elsevier, Computer&Security (to be published) [5] H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson: RTP: A Transport Protocol for Real-Time Applications, IETF, RFC 3550, July [6] S. Miner and J. Staddon. Graph-based authentication of digital streams. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages , May [7] S. J. Murdoch, S. Lewis: Embedding Covert Channels into TCP/IP. Information Hiding 2005: [8] K. Ahsan, D. Kundur: Practical Data Hiding in TCP/IP. In: Proceedings of Workshop on Multimedia Security at ACM Multimedia 02, Juan-les-Pins (on the French Riviera), December [9] R. Anderson, (Ed.): Proceedings of: Information Hiding.First International Workshop, Cambridge, U.K., May 30, June 1, 1996, vol of Lecture Notes in Computer Science, Springer-Verlag Inc. [10] K. Szczypiorski: HICCUPS: Hidden Communication System for Corrupted Networks. In Proc. of: The Tenth International Multi-Conference on Advanced Computer Systems ACS'2003, October 22-24, 2003 Międzyzdroje, Poland, pp.31-40, ISBN [11] T. Friedman, R. Caceres, A. Clark: RTP Control Protocol Extended Reports (RTCP XR), IETF, RFC 3611, November [12] V. Korjik, G. Morales-Luna: Information Hiding through Noisy Channels, Proceedings of 4th International Information Hiding Workshop, pp , Pittsburgh, PA, USA, April 2001 [13] M. K. Mihcak and R. Venkatesan: A Perceptual Audio Hashing Algorithm: A Tool For Robust Audio Identification and Information Hiding, Proceedings of 4th International Information Hiding Workshop, Pittsburgh, PA, April [14] Information Sciences Institute University of Southern California : IP (Internet Protocol), IETF, RFC 791, September 1981.
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
Lightweight Security Mechanism for PSTN-IP Telephony Convergence
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.5, May 2007 35 Lightweight Security Mechanism for PSTN-IP Telephony Convergence Wojciech Mazurczyk and Zbigniew Kotulski
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Practical Internet Steganography: Data Hiding in IP
Practical Internet Steganography: Data Hiding in IP Deepa Kundur Texas A&M University, College Station Department of Electrical Engineering 3128 TAMU, College Station Texas, USA 77843-3128 [email protected]
Basic principles of Voice over IP
Basic principles of Voice over IP Dr. Peter Počta {[email protected]} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos
Announcements I. Final Exam study guide online RTP / RTCP Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. III. Signup for project demos Teaching evaluations at end today copyright
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Adaptive VoIP with Audio Watermarking for Improved Call Quality and Security
Journal of Information Assurance and Security 2 (2007) 226-234 Adaptive VoIP with Audio Watermarking for Improved Call Quality and Security Wojciech Mazurczyk 1, Zbigniew Kotulski 1,2 1 Warsaw University
Measurement of IP Transport Parameters for IP Telephony
Measurement of IP Transport Parameters for IP Telephony B.V.Ghita, S.M.Furnell, B.M.Lines, E.C.Ifeachor Centre for Communications, Networks and Information Systems, Department of Communication and Electronic
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
Module 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus
Advanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
Voice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Voice-Over-IP Daniel Zappala CS 460 Computer Networking Brigham Young University Coping with Best-Effort Service 2/23 sample application send a 160 byte UDP packet every 20ms packet carries a voice sample
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
Keywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Application Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES Dinil.D 1, Aravind.P.A 1, Thothadri Rajesh 1, Aravind.P 1, Anand.R 1, Jayaraj Poroor
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
VegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet
VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet 1 Outlines 1. Introduction 2. QoS in VoIP 3. H323 4. Signalling in VoIP 5. Conclusions 2 1. Introduction to VoIP Voice
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Combining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
IP-Telephony Real-Time & Multimedia Protocols
IP-Telephony Real-Time & Multimedia Protocols Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Media Transport RTP Stream Control RTCP RTSP Stream Description SDP 2 Real-Time Protocol
Introduction to VoIP. 陳 懷 恩 博 士 副 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: [email protected] TEL: 03-9357400 # 255
Introduction to VoIP 陳 懷 恩 博 士 副 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: [email protected] TEL: 3-93574 # 55 Outline Introduction VoIP Call Tpyes VoIP Equipments Speech and Codecs Transport Protocols
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
Voice Over Internet Protocol(VoIP)
Voice Over Internet Protocol(VoIP) By Asad Niazi Last Revised on: March 29 th, 2004 SFWR 4C03 Major Project Instructor: Dr. Kartik Krishnan 1. Introduction The telecommunications companies around the world
Audio and Video for the Internet
RTP Audio and Video for the Internet Colin Perkins TT rvaddison-wesley Boston San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney 'lokyo Singapore Mexico City CONTENTS PREFACE
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
VoIP Shim for RTP Payload Formats
PITALS 50 pt 32 pt VoIP Shim for RTP Payload Formats draft-johansson-avt-rtp-shim Ingemar Johansson, Ericsson AB Outline MTSI in 3GPP Voice service requirements Problems with RTCP Why is inband signaling
Using transcoding for hidden communication in IP telephony
DOI 10.1007/s11042-012-1224-8 Using transcoding for hidden communication in IP telephony Wojciech Mazurczyk Paweł Szaga Krzysztof Szczypiorski # The Author(s) 2012. This article is published with open
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
VoIP network planning guide
VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead
TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic
TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
Voice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
How To Deliver High Quality Telephony Over A Network
Voice over Application Note Telephony Service over Satellite January 2012 Data Sells but Voice Pays In the early years of the industry, networks were deployed primarily for telephony services. As time
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
WhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability
Implementation of Video Voice over IP in Local Area Network Campus Environment
Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
QoS and the Advantages of Multimedia over IP
CHAPTER 4 Multimedia over IP The idea of multimedia communications is very appealing text, graphics, sound, and video all combined to enrich the ways in which we communicate and to transform communications
Voice Over IP. Priscilla Oppenheimer www.priscilla.com
Voice Over IP Priscilla Oppenheimer www.priscilla.com Objectives A technical overview of the devices and protocols that enable Voice over IP (VoIP) Demo Packet8 and Skype Discuss network administrator
Internet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dipl.-Inform. Stephan Groß Room: GRU314
VoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
An Analysis of Error Handling Techniques in Voice over IP
An Analysis of Error Handling Techniques in Voice over IP Martin John Lipka ABSTRACT The use of Voice over IP (VoIP) has been growing in popularity, but unlike its wired circuit-switched telephone network
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659
IAB CONCERNS ABOUT CONGESTION CONTROL Iffat Hasnian 1832659 IAB CONCERNS Outline 1- Introduction 2- Persistent High Drop rate Problem 3- Current Efforts in the IETF 3.1 RTP 3.2 TFRC 3.3 DCCP 3.4 Audio
point to point and point to multi point calls over IP
Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:
Glossary of Terms and Acronyms for Videoconferencing
Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical
VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. [email protected]
VoIP with SIP Session Initiation Protocol RFC-3261/RFC-2543 [email protected] 1 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
