This note covers the following topics: protocol
overview, components, H.225, RAS , Q.931, H 235V2 security, H 323 & firewalls,
sccpskinny, RTP and RTCP,SIP, sample sip session, request methods, request
headers, replies, SDP and SIP fire
This book provides a collection
of 15 excellent studies of Voice over IP (VoIP) technologies. This book
introduces research strategies that address various issues with the aim of
enhancing VoIP quality.
This note covers the following topics:
technology and regulation, voip classification and the regulatory challenges,
methodology the system dynamics standard method, system dynamics model for
calea, calea background, calea causal loops, Calea stock and flow, model
analysis and policy lessons for Calea.
This note covers the following topics: protocol
overview, components, H.225, RAS , Q.931, H 235V2 security, H 323 & firewalls,
sccpskinny, RTP and RTCP,SIP, sample sip session, request methods, request
headers, replies, SDP and SIP fire
This paper focuses on these VoIP specific security threats and the
countermeasures to mitigate the problem. At
first, this paper gives a brief introduction of VoIP techniques: the network
structure, network components, protocols and standards, data handling
procedures, quality of service requirements, etc. Secondly, the paper
discusses the VoIP specific security threats using the principle of CIA
(Confidentiality, Integrity and Availability). The countermeasure to mitigate
these threats is also discussed.