1 TAC2000/2000.7 802.16 IP Telephony Lab IP Telephony (Voice over IP) Associate Professor Quincy Wu Graduate Institute of Communication.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

The leader in session border control for trusted, first class interactive communications.
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
CAPANINA Multimedia Applications Demo Specifications for Trial 1 Milan Lalovic Wireless Networks, BT Exact.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
SIP Simplified August 2010 By Dale Anderson. SIP Simplified Session Initiation Protocol Core of SIP specifications is documented in IETF RFC 3261 Many.
SIP Chapter 5. SIP History 1980s – first packet multimedia experiments 1992 – first IETF audio-cast 1996 – first SIP related IETF drafts Session Invitation.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
© 2006 Solegy LLC Internal Use Only Getting Connected with SIP Encryption _______________________________ By Eric Hernaez Solegy LLC May 16, 2007.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Fast Detection of Denial-of-Service Attacks on IP Telephony Hemant Sengar, Duminda Wijesekera and Sushil Jajodia Center for Secure Information Systems,
SIP Security Matt Hsu.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
DCP: The Datagram Control Protocol Eiman Zolfaghari E190 – Technical Communications Professor Hatton April 2002.
Dr. Philip Cannata 1 Principles of Network Applications.
Security in IP telephony (VoIP) David Andersson Erik Martinsson.
Leveraging Existing Application Processors in Mobile Devices to Implement VoIP Client.
Draft-manyfolks-sipping-ToIP-01.txt Real-Time Text Conversation Using SIP Total conversation Audio (VoIP) Video (Video conferencing) Real-time text conversation.
1 NETE4631 Communicating with the Cloud and Using Media and Streaming Lecture Notes #14.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
SIP Explained Gary Audin Delphi, Inc. Sponsored by
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Daniel Johnson. Playing a media file stored on a remote server on a local client.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
1 Lab Introduction – software Voice over IP. 2 Lab Capability and Status  Software used in this course installed in Engineering labs including the lab.
National Chi Nan University Performance Evaluation of Transport Protocols in Smart Meter Networks Speaker: Chia-Wen Lu Advisor: Dr. Quincy Wu Date: 2012/07/23.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
1 TAC2000/ LABORATORY 117 Outline of the Hands-on Tutorial  SIP User-Agent Register Register Make calls Make calls  Fault-Finding Tools Observe.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training September 27, 2004 Austin, Texas Introduction to.
Setup and Evaluate Quality of Service of VoIP on SCOLD Systems Sherry Adair Hakan Evecek Elizabeth Gates.
Ch 1. Computer Networks and the Internet Myungchul Kim
1 TAC2000/ IP Telephony Lab IP Telephony (Voice over IP) Assistant Professor Quincy Wu Graduate Institute of Communication.
1 End-user Protocols, Services and QoS. 2 Layering: logical communication application transport network link physical application transport network link.
1 Porting VoIP Applications to DCCP Speaker: Jia-Yu Wang Adviser: Quincy Wu School: National Chi Nan University.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Countermeasures of Spam over Internet Telephony in SIP.edu Campuses with MySQL and LDAP Support Speaker: Chang-Yu Wu Adviser: Dr. Quincy Wu School: National.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
CSC 450/550 Part 1: Introduction. CSC 450/550 Summary (1)Contact information (2)Course objective and topics (3)Course evaluation (4)* The layering principle.
Data Communications and Networks
RTP – Real-time Transport Protocol Elbert Tsay, Brad Bargabus, Patrick Lim, Henry Quach The Five Packeteers (minus 1  )
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
ICACT 2012 Performance Study on SNMP and SIP over SCTP in Wireless Sensor Networks Advisor: Quincy Wu Speaker: Chia-Wen Lu (Sally) National Chi Nan University.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
 More features than Skype  Help and support is great to help users with the many features  In-meeting technical support is available 24/7  Audio and.
 Problematic: Transfer of messages from one server to another. A user is never in direct contact with this server must use an client which.
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
Presents Fall Forum The H.323 Revolution Presented by Eli Orr October 2002.
Fortinet VoIP Security June 2007 Carl Windsor.
Instructor Materials Chapter 5 Providing Network Services
CNT 4704 Computer Communication Networking (not “analysis”)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
RTP and RTSP Realtime Transport Protocol
VoIP Signaling Protocols Framework
Ingate & Dialogic Technical Presentation
Presentation transcript:

1 TAC2000/ IP Telephony Lab IP Telephony (Voice over IP) Associate Professor Quincy Wu Graduate Institute of Communication Engineering National Chi Nan University

2 TAC2000/ IP Telephony Lab NTP VoIP Platform

3 TAC2000/ IP Telephony Lab What Is the Next Step?  What will happen after VoIP is free?  What do we need after free VoIP services become popular?  Better voice quality What metrics are important to voice services? What metrics are important to voice services? How does the customers make sure they get the service quality they pay for? How does the customers make sure they get the service quality they pay for?  More flexible services Call waiting, call transfer, call blast, … Call waiting, call transfer, call blast, … Voic , conferencing, … Voic , conferencing, … Instant message & presence Instant message & presence  Is there an easy way to create new VoIP services?  Stronger security requirement DoS attack DoS attack  It is easier to protect your servers. How do you protect your WiFi phone? SPIT - SPAM over IP Telephony SPIT - SPAM over IP Telephony  SPIM – SPAM over Instant Message

4 TAC2000/ IP Telephony Lab Research Topics Discussion is required for individual student  Quality SIP Mobility SIP Mobility  NAT Traversal (UDP and TCP)  TLS (Transport Layer Security, RFC 2246)  SCTP (Stream Control Transmission Protocol, RFC 2960)  DCCP (Datagram Congestion Control Protocol, RFC 4340) Performance Measurement Performance Measurement  OWAMP (One-way ping, RFC 3763)  PESQ (Perceptual Evaluation of Speech Quality, ITU-T P.862)  Security Real-Time Wiretapping Tools for VoIP Real-Time Wiretapping Tools for VoIP Automatic Detection of VoIP DoS Attacks Automatic Detection of VoIP DoS Attacks Steganography in Speex & iLBC codec Steganography in Speex & iLBC codec Performance Comparision with Secure RTP Performance Comparision with Secure RTP Performance Study of VoIP over Fast IPSec Performance Study of VoIP over Fast IPSec

5 TAC2000/ IP Telephony Lab Real-Time RTP Auditing  Libpcap  oRTP library  Windows Audio I/O Spy

6 TAC2000/ IP Telephony Lab Real-Time Audio Encryption  Real-time encryption algorithms  Analysis of various codecs  Schemes for key exchange  Secure RTP (RFC 3711)  Comparison with IPSec Encrypted RTP Media Stream Auditing ???

7 TAC2000/ IP Telephony Lab Training Focus  Three skills Implementation (Linux/FreeBSD, C/C++ programming) Implementation (Linux/FreeBSD, C/C++ programming) Solving difficult problems (using available tools & creating new tools) Solving difficult problems (using available tools & creating new tools) Presentation (speaking, writing) Presentation (speaking, writing)  Five disciplines Always acknowledge important messages. Always acknowledge important messages. Backup your files. Backup your files. Constant progress is required; write weekly reports. Constant progress is required; write weekly reports. Documentation is required as you will see we have lots of SOP (standard operating procedure); do not overload yourself with trivial jobs. Documentation is required as you will see we have lots of SOP (standard operating procedure); do not overload yourself with trivial jobs. English is the working language. English is the working language.

8 TAC2000/ IP Telephony Lab Graduation Requirements  Prototype Finish your implementation before the summer vacation in the 1st grade Finish your implementation before the summer vacation in the 1st grade  Presentation Read an English technical article every week Read an English technical article every week  Paper Publish a (domestic/international) conference paper before the winter vacation Publish a (domestic/international) conference paper before the winter vacation  Oral defense will be arranged in May or November.