Protecting And Securing Converged Networks Without Compromising Efficiency

ABSTRACT

This dissertation has extensively looked into all aspects of VoIP communications technology and information presented in preceding chapters, which build up a solid frame work to discuss the conceptual design model and investigate features that could be incorporated for actual projects, with parameters that are tested on field values, the dissertation follows a five course model, for answering different questions, both technical and business like, around central issues, that have been crucial to explanation of the topic; starting with a general overview of VoIP technology, analyzing current VoIP encryption methods, identifying security threats, designing a robust Voice over internet protocol system based on particulars discussed in preceding chapters, and finally, a Voice over internet protocol simulation.


TABLE OF CONTENTS

APPROVAL

DECLARATION ii

DEDICATION iii

ACKNOWLEDGEMENT iv

TABLE OF CONTENTS V

LIST OF ABBREVIATIONS vii

LIST OF TABLES Viii

LIST OF FIGURES ix

ABSTRACT X

CHAPTER ONE 1

INTRODUCTION 1

1.0 General Introduction 1

1.1 Scope oftheproject 2

1.2 Objective ofthe study 2

1.3 Advantages ofVoice over internet protocol 3

1.4 Limitations ofVoIP services 3

CHAPTER TWO 6

LITERATURE REVIEW 6

2.1 Voice over internet protocol Security Basics 6

2.2 Enterprise and carrier network architecture for secure VoW 8

2.3 Security issues in p2p VoW systems 12

2.4 Cross-layer security architecture (mobile communications) 14

2.5 Carrier peering and session border protocol 16

2.6 Security issues with NAT traversal mechanism 17

2.7 End user and hop-by-hop authentication techniques 18

2.8 Vulnerabilities in VOW protocol, e.g. SIP 18

2.9 QoS impact due to security implications 20

2.10 Miscellaneous security issues 22

CHAPTER THREE 24

METHODOLOGY 24

3.0 Introduction 24

3.1 Sample selection 29

3.2 Research procedures 29

3.3 Data Collection Instruments 29

3.4 Problems anticipated in the study 30

CHAPTER FOUR 31

RESULTS AND FINDINGS .3~

4.0 Introduction 31

4.1 VOIP project simulation 35

CHAPTER FIVE 39

CONCLUSION AND RECOMMENDATIONS 39

5.1 CONCLUSION 39

5.2 Recommendations 42

5.2.1 Prospects for future work 44

REFERENCES 45

APPENDICES 46

Appendix A. VISUALROUTE SOFTWARE MAIN INTERFACE 46

Appendix B. M1NITAB DATA PRESENTATION 47

Appendix C. REGRESSION ANALYSIS REPORT 50

Appendix D. MOVING AVERAGE CHART OF CALLS DROPPED 51

Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Research, S. (2022). Protecting And Securing Converged Networks Without Compromising Efficiency. Afribary. Retrieved from https://tracking.afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency

MLA 8th

Research, SSA "Protecting And Securing Converged Networks Without Compromising Efficiency" Afribary. Afribary, 30 Aug. 2022, https://tracking.afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency. Accessed 30 Nov. 2024.

MLA7

Research, SSA . "Protecting And Securing Converged Networks Without Compromising Efficiency". Afribary, Afribary, 30 Aug. 2022. Web. 30 Nov. 2024. < https://tracking.afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency >.

Chicago

Research, SSA . "Protecting And Securing Converged Networks Without Compromising Efficiency" Afribary (2022). Accessed November 30, 2024. https://tracking.afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency