Networking Books voip Books

VoIP Technologies

Advertisement

VoIP Technologies

VoIP Technologies

This book provides a collection of 15 excellent studies of Voice over IP (VoIP) technologies. This book introduces research strategies that address various issues with the aim of enhancing VoIP quality.

Author(s):

s346 Pages
Similar Books
Voice   over Internet Protocol (VoIP) The Dynamics of Technology and Regulation (PDF   166P)

Voice over Internet Protocol (VoIP) The Dynamics of Technology and Regulation (PDF 166P)

This note covers the following topics: technology and regulation, voip classification and the regulatory challenges, methodology the system dynamics standard method, system dynamics model for calea, calea background, calea causal loops, Calea stock and flow, model analysis and policy lessons for Calea.

s166 Pages
Voice over IP by Professor Richard Harris

Voice over IP by Professor Richard Harris

This note covers the following topics: current state of the art in Internet Telephony, key protocols involved in VoIP and their roles in this new technology, limitations of current VoIP technology, key factors influencing the growth of Internet telephony services for global communications.

s37 Pages
Security   Considerations for Voice Over IP Systems (PDF 99P)

Security Considerations for Voice Over IP Systems (PDF 99P)

This document is published by National Institute of Standards and Technology, this covers the following: Overview of VOIP, VOIP Equipment,  Quality of Service Issues, Overview of VOIP Data Handling ,Cost, Privacy and Legal Issues with VOIP, VOIP Security Issues,Speed and Quality,  H.323,  SIP Gateway Decomposition,  Firewalls, Address Translation, and Call Establishment,  Encryption and IPsec,  Solutions to the VOIPsec Issues,  Planning for VOIP Deployment, VOIP Risks, Threats, and Vulnerabilities.

s99 Pages
Security Issues and Countermeasure for VoIP (PDF 33p)

Security Issues and Countermeasure for VoIP (PDF 33p)

This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem. At first, this paper gives a brief introduction of VoIP techniques: the network structure, network components, protocols and standards, data handling procedures, quality of service requirements, etc. Secondly, the paper discusses the VoIP specific security threats using the principle of CIA (Confidentiality, Integrity and Availability). The countermeasure to mitigate these threats is also discussed.

s33 Pages

Advertisement