StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Internet protocol and VoIP security - Essay Example

Cite this document
Summary
VoIP is one of the most important emerging trends in telecommunications and it integrates communication services into the IP network infrastructure. The aim of this work is to devvelop a methodology that will lead to a high level solution using MPLS (Multi protocol layer switch) for VPN as a new technique related to security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Internet protocol and VoIP security
Read Text Preview

Extract of sample "Internet protocol and VoIP security"

Download file to see previous pages

Further in this dissertation we will identify strengths and weaknesses in VoIP and acknowledging areas suitable for further development. VoIP (Voice over Internet Protocol) in simple words would be transmission of voice signal over internet such as SIP and H.323. There are a lots of other protocols which are used in VoIP technology such as UDP etc., but I think the most important of all would be SIP. This is because SIP is used by VoIP for establishing and terminating a session. So as we said SIP handles the setup, modification and responsible for ending a session between two terminals, these can be transmitted over internet using either UDP or TCP.H.323 is the standard for using audio-video protocol over the internet.

It comes recommended by ITU (International Telecommunications Union). http://www.itu.int/net/home/index.aspx . VoIP is emerging as a new technology and becoming very popular. Even with this popularity VoIP has serious issues that need to be looked into. One is QoS and the other is Security. QoS is an important issue because IP was never designed to carry real time content such as voice. ( Lima et.al 2006)SIP is also an important factor of VoIP because as we know SIP stands for Session internet protocol.

SIP are used for authentication create or terminate calls. SIP calls can be either established over UDP or TCP protocols. Improving security directly effects QoS. Security may also be enhanced by AES (Advance Encryption standard) is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. (CSRC 2001) Based on my research and as stated by Carrole Bassil et al in "Critical VPN Security Analysis and New Approach for Securing VoIP Communications over VPN Networks" the best security is Virtual private network (VPN) and the most VPN solution for tunneling.

VPN are created using encryption, authentication and tunneling. The basic idea behind using VPN is to have a secure network from point-to-point. VPN certainly increase the security but encryption will cause delays in VoIP, therefore the solution would be to have some kind of SLA (service level agreement) implemented in the network which can be achieved by MPLS.During my research for VoIP it was observed that a lot of works has been done from the prospective of securing the network such as using firewalls, or improving the encryption etc, but there was no attempt of securing the network and maintaining the QoS at the same time.

According to Fernando Manchini Serenato and Juergen Rochol in future telecom and data network will be integrated into one and in this situation it will be important to maintain QoS. Presently most of the internet infrastructure supports only best effort service which means there are no guarantees if the information will be delivered. In this specific and many other articles MPLS has been discussed in general and have not been specifically used for VoIP. The major part of this project would be where I will design a solution to secure the VoIP network using IPsec tunnel, and MPLS for managing the QoS.

The solution I will propose is traffic engineering with MPLS, because it plays a major role IP Network by delivering QoS as well as traffic engineering features. Manchini Serenato and Juergen Rochol believe that MPLS will very soon will be adopted in all network because different QoS of services can be implemented such as

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internet protocol and VoIP security Essay Example | Topics and Well Written Essays - 3750 words”, n.d.)
Internet protocol and VoIP security Essay Example | Topics and Well Written Essays - 3750 words. Retrieved from https://studentshare.org/miscellaneous/1530556-internet-protocol-and-voip-security
(Internet Protocol and VoIP Security Essay Example | Topics and Well Written Essays - 3750 Words)
Internet Protocol and VoIP Security Essay Example | Topics and Well Written Essays - 3750 Words. https://studentshare.org/miscellaneous/1530556-internet-protocol-and-voip-security.
“Internet Protocol and VoIP Security Essay Example | Topics and Well Written Essays - 3750 Words”, n.d. https://studentshare.org/miscellaneous/1530556-internet-protocol-and-voip-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet protocol and VoIP security

Voice over Internet Protocol

VOICE OVER internet protocol (VOIP) Voice over internet protocol (VoIP) Author Author's Affiliation Date Table of Contents 1.... In this scenario, VoIP (Voice over internet protocol) is a new network technology that offers a wide variety of significant advantages such as better data transfer and communication.... Though, VoIP is abbreviated as Voice over internet protocol but it is as well known as Internet Telephony or IP Telephony for the reason that it allows us to make phone calls absolutely free or cheaper....
11 Pages (2750 words) Research Paper

VoIP Security Problem and Solution

The research paper “voip security Problem and Solution” looks at Voice over Internet Protocol (VoIP), which is a famous buzzword these days.... Moreover, the basic design of VoIP is very much different from customary circuit-based technology of telephony, and this difference results in major security problems and issues (Kuhn, Walsh and Fries).... pg This report will present a detailed analysis of security problems and issues due to application of VoIP technology at Hargreaves, Hargreaves, Hartley and Hunter (usually known as H4) company....
5 Pages (1250 words) Essay

Network and Internet Security

This essay deals with the issue of network and Internet security.... According to the text, session keys are a critical component to the operation of different security solutions.... Based on that, this channel faces very high security risks since if the message is tapped or eavesdropped, the attacker can be in a position to use the shared secret key to either encrypt or decrypt the entire conversation.... Based on that, data security is highly compromised....
6 Pages (1500 words) Essay

Radio over Internet Protocol

This paper "Radio over internet protocol" discusses the overall technology architecture of Radio over internet protocol, its working, potential advantages and possible limitations.... nbsp;… Radio over internet protocol is also acknowledged as RoIP.... It is utilized to illustrate the growth of Voice over internet protocol (VoIP) by means of radio repeaters with base stations.... Dissimilar from Voice over internet protocol (VoIP), where two voice communication takes place among two devices, Radio over internet protocol is radio interoperability that is facilitated through communicating hardware devices, such as that among legacy and new radio systems or a computer or PDA, and land mobile radio....
8 Pages (2000 words) Coursework

Security Flaws of IPSec

In this research “security Flaws of IPSec” the author will present a detailed analysis of some of the main security aspects and role of IPSec in securing a network from inside as well as outer threats.... It will assess and broadly study the IPSec and the impact of how does IPSec implement security.... hellip; This report will also analyze some of the main aspects of how is” IPSec a Scalable and Robust Solution to the problems associated with network security”....
8 Pages (2000 words) Assignment

Session Initiation Protocol

hellip; The author of the following paper states that SIP trunking means that streams from an IP media that are broadcasted from within an enterprise remains a stream from an IP Media and passes somewhere else within the enterprise or across the enterprise's boundary to a different enterprise through the internet protocol.... It facilitates an enterprise to extend voip (voice over IP) telephony beyond an enterprise's firewall without necessarily using an IP-PSTN gateway....
12 Pages (3000 words) Essay

Security Features which are Most Effective on Interconnectivity Using VoIP

This report "security Features which are Most Effective on Interconnectivity Using VoIP" discusses efforts to improve on networking security, however, the services that are being offered using different software's whose security features are not guaranteed.... However due to its rapid growth and development little has been taken into considerations to implement security features, to ensure such connectivity is secure for the data/information being relayed....
11 Pages (2750 words) Report

Transmission Control Protocol and User Datagram Protocol

… The paper "Transmission Control protocol and User Datagram Protocol" is a brilliant example of an assignment on logic and programming.... The paper "Transmission Control protocol and User Datagram Protocol" is a brilliant example of an assignment on logic and programming.... Transmission Control Protocol (TCP) is a set of protocols or rules that are used with internet protocol to send data interns of units or packets between computers that are interconnected or over the Internet....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us