Networking Books voip Books

Voice over IP by Professor Richard Harris

Voice over IP by Professor Richard Harris

Voice over IP by Professor Richard Harris

This note covers the following topics: current state of the art in Internet Telephony, key protocols involved in VoIP and their roles in this new technology, limitations of current VoIP technology, key factors influencing the growth of Internet telephony services for global communications.

Author(s):

s37 Pages
Similar Books
Practical Voice Over IP Lecture notes

Practical Voice Over IP Lecture notes

This note is to make you understand what Voice over IP (VoIP) systems are, their basic architectures, and the underlying protocols and provides a basis for your own research and development in this area.

s429 Pages
Voice over IP by Dr. Aaron Solomon

Voice over IP by Dr. Aaron Solomon

This note covers the following topics: IP Telephony, Transporting Voice by Using IP,Session Initiation Protocol (SIP), IETF Structure and Internet Standards Process, SIP-based VoIP Lab, Socket Programming--Traceroute, IPv6 Socket Programming, UDP Socket Programming, Waveform Function.

sNA Pages
Voice over IP by Professor Richard Harris

Voice over IP by Professor Richard Harris

This note covers the following topics: current state of the art in Internet Telephony, key protocols involved in VoIP and their roles in this new technology, limitations of current VoIP technology, key factors influencing the growth of Internet telephony services for global communications.

s37 Pages
Security Issues and Countermeasure for VoIP (PDF 33p)

Security Issues and Countermeasure for VoIP (PDF 33p)

This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem. At first, this paper gives a brief introduction of VoIP techniques: the network structure, network components, protocols and standards, data handling procedures, quality of service requirements, etc. Secondly, the paper discusses the VoIP specific security threats using the principle of CIA (Confidentiality, Integrity and Availability). The countermeasure to mitigate these threats is also discussed.

s33 Pages