Networking Books voip Books

Voice over IP by Dr. Aaron Solomon

Advertisement

Voice over IP by Dr. Aaron Solomon

Voice over IP by Dr. Aaron Solomon

This note covers the following topics: IP Telephony, Transporting Voice by Using IP,Session Initiation Protocol (SIP), IETF Structure and Internet Standards Process, SIP-based VoIP Lab, Socket Programming--Traceroute, IPv6 Socket Programming, UDP Socket Programming, Waveform Function.

Author(s):

sNA Pages
Similar Books
VoIP Lecture Notes   (PDF 112P)

VoIP Lecture Notes (PDF 112P)

This note covers the following topics: protocol overview, components, H.225, RAS , Q.931, H 235V2 security, H 323 & firewalls, sccpskinny, RTP and RTCP,SIP, sample sip session, request methods, request headers, replies, SDP and SIP fire

s112 Pages
Voice over IP by Professor Richard Harris

Voice over IP by Professor Richard Harris

This note covers the following topics: current state of the art in Internet Telephony, key protocols involved in VoIP and their roles in this new technology, limitations of current VoIP technology, key factors influencing the growth of Internet telephony services for global communications.

s37 Pages
Voice   over IP  Protocols and Standards (PDF 20P)

Voice over IP Protocols and Standards (PDF 20P)

This paper first discusses the key issues that inhibit Voice over IP (VOIP) to be popular with the users. This document discuss the protocols and standards that exist today and are required to make the VOIP products from different vendors to interoperate. The main focus is on H.323 and SIP (Session Initiation Protocol), which are the signaling protocols. We also discuss some hardware standards for internet telephony.

s20 Pages
Security Issues and Countermeasure for VoIP (PDF 33p)

Security Issues and Countermeasure for VoIP (PDF 33p)

This paper focuses on these VoIP specific security threats and the countermeasures to mitigate the problem. At first, this paper gives a brief introduction of VoIP techniques: the network structure, network components, protocols and standards, data handling procedures, quality of service requirements, etc. Secondly, the paper discusses the VoIP specific security threats using the principle of CIA (Confidentiality, Integrity and Availability). The countermeasure to mitigate these threats is also discussed.

s33 Pages

Advertisement