Unclassified DSTI/ICCP/CISP(2007)14/FINAL
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Voip): SIP and Related Protocols Fall 2013, Period 1 Lecture Notes of G
IK2554 Practical Voice Over IP (VoIP): SIP and related protocols Fall 2013, Period 1 Lecture notes of G. Q. Maguire Jr. For use in conjunction with: Henry Sinnreich and Alan B. Johnston, Internet Communications Using SIP: Delivering VoIP and Multimedia KTH Information and Services with Session Initiation Protocol, 2nd Edition, Wiley, Communication Technology August 2006, ISBN: 0-471-77657-2. © 2004-2013 G.Q.Maguire Jr. All rights reserved. No part of this course may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission of the author. Last modified: 2013.08.30:12:51 Maguire Cover.fm Total pages: 1 [email protected] 2013.08.30 Module 1: Introduction........................................................................... 35 Welcome to the course! .......................................................................... 36 Staff Associated with the Course............................................................ 37 Instructor (Kursansvarig) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 37 Goals, Scope and Method....................................................................... 38 Goals of the Course - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 38 Scope and Method - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network
A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network oMi-Ryong Park, Chang-Min Park, and Jong-Hyup Lee Router Technology Department, Network Research Lab., ETRI 161 Kajong-Dong, Yusong-Gu, Taejon, 305-350, Korea Tel: +82-42-860-1211, Fax: +82-42-860-5213 Abstract: - Lately, Internet is generally accepted as a principle communication protocol for voice and data networks. Moreover data and voice is converging with one network over the Internet. Each node has its own IP address for existing packet data on the Internet. Even multi-media terminals including Internet phone, Internet fax, and Internet-enabled electric devices, are transferring variable-sized packets. There are several working groups for studying converged data and voice communication in Internet. Such converged network services especially for Internet telephony as Voice over IP (VoIP) or SoftSwitch have already been suggested. We believe that the VoIP service become a killer application on the Internet for the future. Many protocols such as Session Initiation Protocol (SIP), Media Gateway Control Protocol (MGCP), MEGACO, SIGTRAN of Internet Engineering Task Force (IETF) and H.323 series of International Telecommunication Unit (ITU-T), are accepted as standards required for the VOIP service. In this paper, we suggest a Telephone-Domain Name System (T-DNS) architecture for detecting simply the destination IP address at the converged network. T-DNS is based on a Client and Server and an original Internet Domain Name Service (DNS) model. But it expands the DNS architecture for detecting destination IP address by querying the Uniform Resource Locator (URL) of telephone numbers. -
Wiretapping End-To-End Encrypted Voip Calls: Real-World Attacks on ZRTP
Preprint Version, Accepted for Publication in PoPETS 2017; 2017 (3):1–17 Dominik Schürmann*, Fabian Kabus, Gregor Hildermeier, and Lars Wolf Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP Abstract: Voice calls are still one of the most com- saging apps, such as WhatsApp and Facebook Messen- mon use cases for smartphones. Often, sensitive personal ger [10, 36]. As a result, mobile messaging, the most information but also confidential business information popular smartphone feature, finally includes end-to-end is shared. End-to-end security is required to protect encryption for average users. Comparing their security against wiretapping of voice calls. For such real-time features with that of voice calls shows a major imbal- communication, the ZRTP key-agreement protocol has ance. While making voice calls is the second most popu- been proposed. By verbally comparing a small number lar smartphone feature with 93% popularity [25], its se- of on-screen characters or words, called Short Authenti- curity is often neglected. It is difficult to retrofit the tra- cation Strings, the participants can be sure that no one ditional Public Switched Telephone Network with end- is wiretapping the call. Since 2011, ZRTP is an IETF to-end security, but it is feasible to protect users of mod- standard implemented in several VoIP clients. ern Voice over IP (VoIP) apps. In this paper, we analyzed attacks on real-world VoIP To protect real-time communication channels, the systems, in particular those implementing the ZRTP ZRTP key agreement protocol has been proposed. Based standard. We evaluate the protocol compliance, er- on the Diffie-Hellmann (DH) key exchange, it has been ror handling, and user interfaces of the most common standardized in 2011 as RFC 6189 [38]. -
ENUM: an Enabler for Voip and Next Generation Services
ITU Workshop on “Origin Identification and Alternative Calling Procedures” (Geneva, Switzerland, 19-20(AM) 2012) ENUM: an Enabler for VoIP and Next Generation Services Steven D. Lind Senior Member of the Technical Staff, AT&T [email protected] Geneva, Switzerland, 19-20 March(AM) 2012 What is ENUM? Provides mapping from E.164 numbers to IP resources Telephone number as domain name Built on top of DNS Number “holder” needs to opt-in Example: +1-973-236-6787 Lookup 7.8.7.6.6.3.2.3.7.9.1.e164.arpa sip:[email protected] DNS sip: [email protected] mailto:[email protected] mailto:[email protected] Geneva, Switzerland, 19-20 March(AM) 2012 2 Assumption Use of standard telephone numbers (ITU-T Recommendation E.164) is not going away PSTN/analog terminals are going to be around IP phones will use 12-button keypad Globally unique identifier that has established familiarity with end users Geneva, Switzerland, 19-20 March(AM) 2012 3 Types of ENUM End-User ENUM used to discover IP endpoints where data is placed in a public ENUM tree by end-users (or their agents) Provider ENUM (aka Carrier or Infrastructure ENUM) used to discover IP-based points of interconnection where data is placed in a private ENUM tree by carriers of record Geneva, Switzerland, 19-20 March(AM) 2012 4 Why is ENUM Important? ENUM will enable VoIP interoperability E.164 addresses will be used as names in VoIP networks ENUM enables call routing between VoIP service providers E.164 addresses are not directly routable in an IP/VoIP network Use ENUM to map E.164 number to an Internet address that can be used to setup communication (e.g. -
ENUM & DNS Principles for an Interoperator IP Backbone Network
ETSI TS 184 010 V3.1.1 (2011-08) Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networks (TISPAN); ENUM & DNS Principles for an Interoperator IP backbone network 2 ETSI TS 184 010 V3.1.1 (2011-08) Reference DTS/TISPAN-04015-NGN-R3 Keywords DNS, ENUM ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. -
Itu-T Supplement to Rec. E.164 Operational and Administrative Issues Associated with National Implementations of the Enum Functi
ITU-T SUPPLEMENT TO REC. E.164 (CLEAN VERSION) OPERATIONAL AND ADMINISTRATIVE ISSUES ASSOCIATED WITH NATIONAL IMPLEMENTATIONS OF THE ENUM FUNCTIONS DRAFT # 11.2 STATUS: REVISED DRAFT #11.2 UPDATED DURING THE 7-16 MAY 2002 STUDY GROUP 2 MEETING IMPORTANT NOTE on the STATUS of ITU-T SUPPLEMENTS: Supplements are only informative and are, therefore, not considered to be an integral part of any Recommendation(s). They do not imply any agreement on the part of the ITU-T (Recommendation A.13, 10/2000, Section 2.4) - 2 - ENUM supplement to ITU-T Rec. E.164 OPERATIONAL AND ADMINISTRATIVE ISSUES ASSOCIATED WITH NATIONAL IMPLEMENTATIONS OF THE ENUM FUNCTIONS Table of Contents 1 Introduction ............................................................................................................................... 2 2 Scope ........................................................................................................................................... 2 3 References .................................................................................................................................. 2 3.1 IETF .................................................................................................................................... 2 3.2 ITU ...................................................................................................................................... 2 4 Definitions .................................................................................................................................. 2 4.1 General -
TRIP, ENUM and Number Portability
TRIP, ENUM and Number Portability Nicklas Beijar Networking Laboratory, Helsinki University of Technology P.O. Box 3000, FIN-02015 HUT, Finland [email protected] order to make connectivity between all IP- and PSTN- Abstract terminals possible, the problem of terminal and gateway location must be solved. In these problems, addressing is This paper describes the problem of locating terminals central. Number portability allows users to change using E.164 numbers, and the problem of selecting a operators and locations without changing the telephone suitable gateway for calls from an IP telephony network number. To smoothen the transition to an IP-based to the public switched telephone network (PSTN). telephone network, number portability is also required Generally, these are the problems of mapping the name between PSTN and IP-networks. of a destination into an address, and to find the best route to the destination in a combined IP and PSTN network. The main signaling protocols for IP telephony are Number portability is closely related to these problems. Session Initiation Protocol (SIP) [1] and H.323 [2]. The Due to number portability the address of a destination is architectures that they define are similar, although changed without changing its name. Number portability different names are used for the network elements. Calls may also change the optimal route to a destination. can be established between IP telephony terminals directly, but usually the call setup signaling passes Two protocols are being developed by the Internet through a gatekeeper (in H.3232) or signaling server (in Engineering Task Force (IETF) to solve these problems. -
(Issn 2249-3905) Impact Factor – 1.776
IJREAS VOLUME 4, ISSUE 3 (MARCH 2014) (ISSN 2249-3905) IMPACT FACTOR – 1.776 SEGREGATION OF IP TELEPHONY PROTOCOL IN ANDROID AND WINDOWS CELL PHONES Shivani Chaudhary* Preety Joon** ___________________________________________________________________________ ABSTRACT VoIP oftenly known as IP telephony emerged as convenient protocol for transmission of voice through internet connections. VoIP technology is involved in the delivery of voice communication & multimedia sessions over ip networks. VoIP is available on many smart phones & internet devices so that users of portable devices, may place calls or send sms over 3G or Wi-Fi. The main focus of this paper is to study the VoIP technology in windows & android cell phones. Keywords— VoIP telephony, signalling control protocol, media control protocol. ___________________________________________________________________________ *Department of Computer Science, Ditm, Gannaur,Sonepat **Department of Computer Science, Ditm,Gannuar,Sonepat International Journal of Research in Engineering & Applied Sciences http://www.euroasiapub.org 161 IJREAS VOLUME 4, ISSUE 3 (MARCH 2014) (ISSN 2249-3905) IMPACT FACTOR – 1.776 I. INTRODUCTION Voice over IP (VoIP, abbreviation of voice over Internet Protocol) commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communitions and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, -
TR 184 007 V2.1.1 (2008-08) Technical Report
ETSI TR 184 007 V2.1.1 (2008-08) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Naming/Numbering Address Resolution (NAR) 2 ETSI TR 184 007 V2.1.1 (2008-08) Reference DTR/TISPAN-04011-NGN-R2 Keywords addressing, enum, DNS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. -
IP Telephony Best Practice in EU National Research Networks
Set of IP Telephony Best Practices in National Research Networks in EU Best Practice Document Produced by CESNET led working group on Multimedia transmissions and collaborative environment (CBPD146) Miroslav VOZNAK, et al. March 2011 © TERENA 2011. All rights reserved. Document No: GN3-NA3-T4-CBPD146 Version / date: March 7, 2011 Original language : EN Original title: “Set of IP Telephony Best Practices in National Research Networks in EU” Original version / date: V1.2 of March 7, 2011 Contact: [email protected] Editor: Miroslav VOZNAK, [email protected] CESNET, z. s. p. o. Zikova 4, 160 00 Praha 6 Czech Republic Authors : Miroslav VOZNAK , CESNET, Czech Republic, 1 st chapter and editing all chapters nd Ulf TIGERSTED , CSC Ltd., Finland, 2 chapter rd Branko RADOJEVIC , CARNET, Croatia, 3 chapter th Michal HALAS , STU, Slovakia, 4 chapter th Miguel DUARTE , FCCN, Portugal, 5 chapter CESNET bears responsibility for the content of this document. Parts of the report may be freely copied, unaltered, provided that the original source is acknowledged and copyright preserved. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 23 8875, relating to the project 'Multi-Gigabit European Research and Education Network and Associated Services (GN3)'. 2 About Authors Miroslav VOZNAK holds a position as an associate professor at Department of telecommunications in Ostrava, Czech Republic. He received his M.S. and Ph.D. degrees in telecommunications from the VSB – Technical University of Ostrava, in 1995 and 2002, respectively. He is author or co-author more than 130 publications indexed in database of Research and Development in Czech Republic. -
MAGIC: a Collaboration Project to Globally Connect Researchers and Academics
MAGIC: A collaboration project to globally connect researchers and academics Leandro Marcos de O. GUIMARÃES1, María José LÓPEZ2 1RNP, Rua Lauro Müller, 116, sala 1103 - Botafogo, Rio de Janeiro - RJ - 22290-906, Brazil Tel: + 55 21 2102-9660, Fax: + 55 21 2279-3731, Email: [email protected] 2RedCLARA, Av. El Parque 4680-A, Oficina 108, Santiago, Chile Tel: + 56 2 584 86 18 , Email: [email protected] Abstract Building on the success of the ELCIRA project, RedCLARA - with partners from Latin America, Europe, the Caribbean, West and Central Africa, Eastern and Southern Africa, North Africa and the Middle East, Central Asia and Asia-Pacific is leading MAGIC (Middleware for collaborative Applications and Global vIrtual Communities), a cooperation project that aims to significantly improve the ability of researchers and academics around the world to collaborate together. MAGIC might be the first really global collaborative project in the REN environment. But which are the benefits of the project to its partner institutions’ (UbuntuNet and WACREN) members? How can the African researchers and academics benefit from MAGIC? By fostering and easing collaboration and mobility, MAGIC is fostering intra-regional and global collaboration, helping to reduce the technological gap, and as a consequence, in the long term, to reduce the brain drain. Keywords Collaboration, identity federations, eduroam, eduGAIN, scientific communities, researchers, academics, RENs, NRENs. Introduction A collaboration project to globally connect researchers and academics - aims to establish a set of agreements for all the participating world regions, aimed at consolidating and completing the building blocks of middleware necessary for the establishment of a marketplace of services and real-time applications which will facilitate mobility and the work of global science communities. -
IMS Interconnect: Peering, Roaming and Security – Part One
TECHNOLOGY WHITE PAPER IMS Interconnect: Peering, Roaming and Security – Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish successful peering arrangements. This paper provides an introduction to IMS interconnection and identifies security considerations that carriers must address in order to achieve the proper balance of providing access while maintaining security. The paper is organized into two parts – Part One introduces key concepts and definitions related to network interconnections and interconnect models, while Part Two addresses the security mechanisms within the IMS standards and identifies potential security threats that face IMS carriers looking to interconnect their networks. Introduction While service providers are rushing to bring their initial IMS service offerings into commercial service, a number of them are also beginning to look beyond their basic IMS architectures to explore the potential for connecting to other carrier’s networks. By interconnecting their networks, carriers are looking to extend their reach and to leverage opportunities to explore new business models with partner providers. These types of provider-to-provider connections are not a new phenomena, there are examples of interconnected carriers in the PSTN world, the mobile telephone environment, and in the IP service provider industry. The Internet is a perfect example of a fully interconnected network – subscribers can interact with other subscribers and services, regardless of which service provider they belong to. The advantages of creating interconnected IMS networks include: • Carriers can provide services to their IMS subscribers while those subscribers visit geographies, regions, or networks where that carrier does not have a physical presence.