Ts 101 470 V1.1.1 (2013-11)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Seguridad En Redes
Seguridad en Redes Alejandro Corletti Estrada www.darFe.es Seguridad en Redes Madrid, octubre de 2016 Este libro puede ser descargado gratuitamente para emplearse en cualquier tipo de actividad docente, quedando prohibida toda acción y/o actividad comercial o lucrativa, como así también su derivación y/o modificación sin autorización expresa del autor. RPI (Madrid): M-6249/2016 ISBN: 978-84-617-5291-1 Alejandro Corletti Estrada ([email protected] - [email protected]) www.darFe.es Seguridad en Redes Este libro en formato electrónico con extensión “PDF” es el que se encuentra disponible gratuitamente en Internet. La versión impresa del mismo (que sí es de pago) puede ser solicitada por correo electrónico a la cuenta: [email protected] Alejandro Corletti Estrada Página 4 Seguridad en Redes Agradecimientos A todos los que a través del apoyo, reconocimiento y agradecimientos de la obra anterior “Seguridad por Niveles”, me han dado ánimo para seguir reuniendo temas y escribir este nuevo libro. A mi “gran Maestro” Antonio Castro Lechtaler, con el que tuve el placer de iniciarme en la docencia y compartir hermosos años dentro de su Cátedra. A Chema Alonso que con infinita paciencia supo dedicarme algo de su escaso tiempo para escribir uno de los prólogos de este libro. A “Nacho” (José Ignacio Bravo Vicente) y “Paco” (Francisco Martín Vázquez), quienes con su buena onda y enorme conocimiento, logran día a día mantenerme en este ritmo del “cacharreo”, bajándome de las nubes de la teoría de Seguridad y Redes. A un sinnúmero de Operadores de red, gente de Seguridad y de Auditoría de muchos Países (cada uno de ellos sabe bien a quiénes me refiero), que vienen sufriéndome y aguantando desde hace varios años (muchas gracias, de verdad). -
Toip Functionality in Asterisk: Making Toip Communication More Available and Interoperable by Integrating It in the IP-PBX Asterisk
Final Thesis ToIP functionality in Asterisk: Making ToIP communication more available and interoperable by integrating it in the IP-PBX Asterisk by Sara Hörlin LITH-IDA-EX--07/045--SE 2007-08-17 II Linköpings universitet Department of Computer and Information Science Final Thesis ToIP functionality in Asterisk: Making ToIP communication more available and interoperable by integrating it in the IP-PBX Asterisk by Sara Hörlin LITH-IDA-EX--07/045--SE 2007-08-17 Supervisor: Gunnar Hellström Examiner: Mariam Kamkar III IV V Abstract In the thesis the advantages with Text over IP (ToIP) is explained and it is motivated why it is a good idea to integrate this in Asterisk. It also presents an implementation of a ToIP extension in Asterisk. ToIP means communicating over a network based on Internet protocols with real-time text. Real-time text means a character is sent to the receiving terminal as soon the sender has typed it or with a small delay. There is a presentation level standard for real-time text conversation called T.140 (ITU-T 1998). There is also an Internet standard for transmission of real-time text called RFC 4103 which uses T.140 (Hellström 2005). There are other ways of communicating by the Internet. Most common is with Voice over IP (VoIP) which is the same as using the telephone but on the Internet. Another way of communicating is with Instant Messaging (IM) which is a message oriented text communicating method. In the thesis IM and ToIP is compared in a survey. The result point at IM is not better than ToIP even though it is much more commonly used. -
Next Generation 911 (NG911) Standards Identification and Review
The National 911 Program Next Generation 911 (NG911) Standards Identification and Review A compilation of existing and planned standards for NG911 systems Washington, DC April 2018 Next Generation 911 (NG911) Standards Identification and Review DOCUMENT CHANGE HISTORY The table below details the change history of this Standards Identification and Review document. Version Publication Date Description 1.0 September 21, 2011 Initial Release 2.0 September 7, 2012 Updated Standards 3.0 January 8, 2014 Routine Revision / Updated Standards 4.0 March 4, 2015 Routine Revision / Updated Standards 5.0 March 2016 Routine Revision / Updated Standards 6.0 March 2017 Routine Revision / Updated Standards 7.0 April 2018 Routine Revision / Updated Standards Page i Next Generation 911 (NG911) Standards Identification and Review Table of Contents Introduction .................................................................................................................................................. 1 What Is a Standard? ...................................................................................................................................... 2 What Are Best Practices? .............................................................................................................................. 3 Stakeholders ................................................................................................................................................. 3 Standards Organizations .............................................................................................................................. -
The Session Initiation Protocol (SIP): an Evolutionary Study Salman Abdul Baset, Vijay K
JOURNAL OF COMMUNICATIONS, VOL. 7, NO. 2, FEBRUARY 2012 89 The Session Initiation Protocol (SIP): An Evolutionary Study Salman Abdul Baset, Vijay K. Gurbani, Alan B. Johnston, Hadriel Kaplan, Brian Rosen and Jonathan D. Rosenberg Abstract— The Session Initiation Protocol (SIP) was devel- and control (rewind, forward) multimedia streams from oped to control multi-media sessions on the Internet. Shortly a media server. RTP is a protocol for transporting real- after its debut as a standard in 1999, SIP was adopted time data such as audio, video, or instant messages. In by the 3rd Generation Partnership Project (3GPP) as the preferred signaling protocol for the Internet Multimedia 1996, these were the protocols that powered the Internet Subsystem (IMS). This adoption provided a boost to the multicast backbone (MBONE) for loosely coupled multi- nascent protocol as traditional telecommunication services cast conferences. SIP was introduced into this mix. were interpreted in the context of the new protocol and In early 1996, there were two protocols competing for as SIP introduced richer services in the form of instant session establishment in the IETF: the Session Invitation messaging and rich presence to traditional telephony. In this paper, we study the evolution of the protocol from its Protocol and the Simple Conference Invitation Protocol roots to its use in operational networks today and the issues (SCIP). Session Invitation Protocol was responsible only it faces in such networks. We also provide a glimpse to the for setting up the session and providing rudimentary continued progression of SIP in Peer-to-Peer (P2P) networks capability negotiation; once the session had started, it was and take a critical look at where SIP has succeeded, and not used at all [7]. -
08-003 Detailed Functional and Interface Specification NENA I3 Solution
Understanding NENA’s i3 Architectural Standard for NG9-1-1 Today, NENA takes a significant step toward achieving the vision of Next Generation 9-1-1 service. As we adopt Version 1.0 of NENA Technical Standard 08-003, Detailed Functional and Interface Specification for the NENA i3 Solution – Stage 3, we consider it important to explain how this standard relates to long-term efforts to modernize our nation’s emergency communications systems. This NENA standard intentionally describes an end-state NG9-1-1 architecture, rather than an immediate “build-to” specification for a complete NG9-1-1 system. Broadly speaking, 9-1-1 systems will reach the end-state envisioned by the i3 Standard only over the long term. In the interim, transitional steps must be taken to maintain support for legacy interfaces from originating service providers such as wireline and cellular telephone carriers, and to accommodate legacy PSAP equipment. At the same time, we recognize that state and local authorities will begin deploying ESInets and other core components of the i3 architecture as those components reach the market. Likewise, originating service providers and access network operators may begin deploying new network elements in support of longer-term NG9-1-1 services. The i3 architecture anticipates the existence of transitional states in origination services, access networks, and 9-1-1 systems and includes specifications for network elements that will be required to support a growing variety of “call” types as deployed systems evolve toward the end-state. Critically, the i3 standard is not, by itself, the same thing as an NG9-1-1 system.