Information Systems and Electronic Communications in Logistics Management



Similar documents
Security issues in Voice over IP: A Review

ICTTEN5204A Produce technical solutions from business specifications

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Ingate Firewall/SIParator SIP Security for the Enterprise

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Alexandre Weffort Thenorio - Data. IP-Telephony

Packetized Telephony Networks

Prepared by the Commission on E-Business, IT and Telecoms

White Paper. avaya.com 1. Table of Contents. Starting Points

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud Supervisor: Prof.Dr. Shawkat K.Guirguis

VOIP Security Essentials. Jeff Waldron

Security and Risk Analysis of VoIP Networks

Business case for NGN. Arunabha Mukhopadhyay IIM Lucknow

Mitigating the Security Risks of Unified Communications

Cisco Advanced Services for Network Security

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application

FDIC Division of Supervision and Consumer Protection

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone

Threat Mitigation for VoIP

Securing SIP Trunks APPLICATION NOTE.

Core Data Service 2015 IT Domain Definition Change Overview

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Pocket E-Guide. Sponsored By:

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

An Oracle White Paper February Centralized vs. Distributed SIP Trunking: Making an Informed Decision

Enterprise Systems: From Supply Chains to ERP to CRM

CPNI VIEWPOINT 02/2007 ENTERPRISE VOICE OVER IP

Recommended IP Telephony Architecture

Voice over IP Networks: Ensuring quality through proactive link management

International Journal of Scientific & Engineering Research Volume 3, Issue 12, December ISSN

Introduction Chapter 1. Uses of Computer Networks

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Traffic Management Solutions for Social Innovation Business

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Contents. Specialty Answering Service. All rights reserved.

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

Voice Over Internet Protocol(VoIP)

convergence: preparing the enterprise network

Wireless Network Standard and Guidelines

Wireless Network Security

BT Hosted IPT (VoIP)

Layered protocol (service) architecture

CompTIA Network+ (Exam N10-005)

Addressing Convergence and IP Telephony in Enterprise Communications

BEng (Hons) Telecommunications. Examinations for / Semester 1

SIP Trunking with Microsoft Office Communication Server 2007 R2

Computer Network Engineering

ICT budget and staffing trends in the UK

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

ICANWK406A Install, configure and test network security

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

Building the Lync Security Eco System in the Cloud Fact Sheet.

Mobile System Technologies Certification Program

Voice over Internet Protocol (VoIP) Core-Edge Working Group Meeting, September 28-29, 2004 Chintan Vaishnav Research Assistant, MIT CFP

Business Model Analysis and Evaluation Framework for PQoS-aware VoIP and IPTV Services of Mobile Operators

Management Information Systems. B08. Interorganizational and Global Information Systems

IT6304 e-business Applications (Optional)

VOICE OVER IP SECURITY

Intelligent Systems: Unlocking hidden business value with data Microsoft Corporation. All Right Reserved

VoIP Security, an overview of the Threat Landscape

Managing Data, Voice, and Converged IP Networks

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The changing face of global data network traffic

Chapter 2 PSTN and VoIP Services Context

VoIP / SIP Planning and Disclosure

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

HP Networking and Aastra

LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013

Secure VoIP for optimal business communication

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Implementation of Video Voice over IP in Local Area Network Campus Environment

VoIP Timing and Synchronization Best Practices

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Innovation in Security. Secure Enterprise U n i f i e d C o m m u n i c a t i o n to protect business assets in the 21st Century

Basics of Internet Security

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

Maruleng Local Municipality

Internet Communications Using SIP

Cisco Network Optimization Service

ICT budget and staffing trends in Healthcare

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Agency Centralized IT Reference Model

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON D.C

Is Skype Safe for Judges?

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

An outline of the security threats that face SIP based VoIP and other real-time applications

Networking Technology Online Course Outline

Broadband Bonding Network Appliance TRUFFLE BBNA6401

TAXONOMY OF TELECOM TERMS

Transcription:

Information Systems and Electronic Communications in Logistics Management Ephrem Eyob, Virginia State University, Petersburg, VA 23806 eeyob@vsu.edu ABSTRACT Telecommunications and Networking Technologies have enjoyed massive investments from the industry and government resulting into an unparallel rapid growth in the transmission of voice, video, and data over wired and wireless media. In spite of the advancements made, telecommunications and networking had experienced security problems which had led to the development of various approaches to protect information. This paper proposes to present trends in telecommunications and networking technologies. In addition, it will discuss major applications in Logistics Management. INTRODUCTION In the evolution of information systems and communication technologies (ICT), the Internet has played a primary role in the explosive growth of the information systems logistics applications [3]. New innovative application such as Voice over IP (VoIP) has played disruptive role to many telecommunication firms business models that depended on public switched telephone networks (PSTN). The constant reduction of costs for hardware, software, and operating costs have made VoIP, IPTV, videoconferencing, IP multimedia systems as technology of choice to many business including the logistics industry [2]. Additionally new Intelligent Multimedia Knowledge Applications (IMKA) [1] provides new techniques in discovering knowledge from these rich multi-media tools. Both perceptual and semantic multimedia contents are being developed for all types of applications including in logistics operations. Efficient techniques in data mining of these contents are constantly developed. This brief paper will try to ponder on issues related to VoIP and IPTV uses in logistics and the security infrastructure vulnerability and strategies to mitigate such threats. BACKGROUND For many decades PSTN has played the role as the backbone for reliable communication technology for many organizations. However, PSTN is now a matured declining technology with the advent of cellular telephony and VoIP. VoIP as a growth technology has not yet attained the technological maturity in

terms of quality, security, and compatibility compared to PSTN. VoIP s infrastructure is based on the Internet and is vulnerable to security threats. Customer Lead Time, Fill Rates, Lost Rates Demand Pattern Variability ABC Policies Warehouse Constraints Transportatio n Financial Constraints Supplier lead time, Lead Time Variability, Forecast Error *Adapted from APICS, Production and Inventory Management Journal Vol. 1, No. 1, 1999. Wireless cellular telephony with text, video, and voice features is spreading and is being adapted quickly because of the cost and strategic advantages in quickly putting these infrastructures as compared to old online cable based connections of PSTN. Internet based voice applications are becoming a strategic competitive tools in being integrated for electronic commerce such as business to business (B2B), business to commerce (B2C), business to government (B2G), customer relations management (CRM), and logistics applications with features of converting voice into text and text to voice [6, pg 563, 2006]. These types of systems are useful in finding information easily as they are searchable for text based information. Logistics related applications can integrate such features to make the system more effective and can also add language translations capacity that can include global related logistics when the language of operations is different. Intelligent Multimedia Knowledge Application (IMKA) represents the effort to search knowledge from multimedia contents in voice, video, static pictures, and text [2, 4]. It is a promising area that can advance the formation of knowledge from and help business run their operations efficiently. SECURITY ISSUES in TELECOMMUNICATION Security is a broad problem in information technology including telecommunication applications. Major security issues in logistics applications include: Authentication, authorization, auditing, privacy, integrity, availability, and non repudiation. The schematic relationships of these factors are shown in Figure 1 [7].

Figure 1 Security Issue in a Network Adapted Scambray, J. e al. Hacking Exposed 2 nd New York: McGraw Hill, 2000 The discussion that follows will focus on security issues to VoIP only. Telecommunication infrastructure include hardware, software, supporting services such as Transmission Control Protocol (TCP), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Internet Protocol (IP) and VoIP protocols [1]. Any of these protocols can be maliciously attacked to disrupt the system by compromising the authentication, privacy or simply make the server unavailable by overwhelming with bogus page requests. For example, one recent common application that is widely being used is the VoIP networks. The attacks on VoIP can range from disruption, malicious attacks to degrade its integrity, spamming and eavesdropping. Any or all of these disruptions can make VoIp ineffective, since Internet telephone connectivity should be instantaneous to compete with switched telephone network. A few milliseconds delay in the connection can heavily degrade the suitability of using VoIP or IPTV for voice or video supported communications. Quality of service (QoS) and reliability of these systems is in the order of 99.999 percent. System wide strategies to minimize any sort of disruptions have to be developed, if Void is to be the choice of technology for customers and compete with legacy systems.

FUTURE TRENDS The telecommunication community is constantly looking for ways to develop new technology that will allow the integration of multimedia contents and develop tools for example, sensor generated data such as from GPS, RFID and other telemetric sources, Intelligent Multimedia Knowledge Application (IMKA), that search knowledge from multimedia contents. This is a very difficult problem since voice, video, and other similar content media are not easily searchable their original contents based on a specific data or information as it would to text based. Future research in this rich field is to incorporate multimedia contents from different sources and use context to improve application performance of logistics and supply chain information exchanges in the network [5]. New application on the Internet provides voice to text and text to voice conversion. This medium will enhance in information search tremendously [6]. Figure 2 Traditional CRM Information Gap*[6] Adapted from Turban pg. 564

Current trends as shown in Figure 3, is to connect logistics application, CRM, customers, manufacturing, sales force marketing and demand estimates using mobile connected tools. The mobile phone, hand held RFI readers, palm systems, personal organizers, pagers, etc., are directly connected with the CRM with virtually no delay. These efficiencies bring complete and accurate information in real-time to make necessary inventory and manufacturing schedules adjustments. Older systems were not accurate and speedy due to the necessity to re-enter data at a later time because the CRM system was not compatible or not seamlessly integrated with the various productivity devices such as hand held organizers, pagers and other devices. CONCLUSION This paper briefly touched issues related to telecommunication applications specifically VoIP use in logistics and supply chain and associated risks in security loopholes. Applications that are easily hacked and disrupted are not only risky to the organization but may increase its liability to customers whose personal information was compromised. Recent examples that made headlines such as hacking data bases with millions of credit cards account information, Veterans Affairs personnel social security numbers and other personal information, make the security threats of VoIP based systems more daunting. Software designers should make great efforts to mitigate and control such threats if VoiP technology is to be embraced for sensitive business applications such as logistics. REFERENCES [1] Materna, 2006, A Proactive Approach to VoIP Security: Understanding VoIP Security Requirements, Threats and Architecture, www.voipshield.com Uploaded, August 20, 2006. [2] www.ee.columbia.edu/dvm/researchproject/multimedia.htm. [3] Kukier, 1999 http://www.isoc.org/inet99/proceedings/ie/ie_2.htm uploaded September 4, 2006 [4] Benitez, A.B. and Chang, S.F. Image Classification Using Multimedia Knowledge Networks, Proceedings of the International Conference on Image Processing, 2003, Barcelona, Spain. [5] Rowe, Lawrence and Jain Ramesh. ACM SIGMM Retreat Report on Future Directions in Mulitmedia Research. March 2004. pp. 1-12.

[6] Turban, Efraim David King, Dennis Viehland, and Jae Lee (2006). Electronic Commerce: A Managerial Perspective. Prentice Hall [7] Scambray, J. e al. Hacking Exposed 2 nd New york: McGraw Hill, 2000