Voice over Internet Protocol (VoIP) technologies are integral to modern telecommunications because of
their advanced features, flexibility, and economic benefits. Internet Service Providers initially promoted
these technologies by providing low cost local and international calling. At present, there is also a great
deal of interest in using IP-based technologies to replace traditional small and large office telephone
systems that use traditional PBX’s (Private Branch eXchange). Unfortunately, the large majority of the
emerging VoIP based office telephone systems have followed the centralized design of traditional public
and private telephone systems in which all the intelligence in the system is at the core, with quite expensive
hardware and software components and appropriate redundancy for adequate levels of reliability. In this
paper, it is argued that a centralized model for an IP-based telecommunications system fails to exploit the
full capabilities of Internet-inspired communications and that, very simple, inexpensive, elegant and
flexible solutions are possible by deliberately avoiding the centralized approach. This paper describes the
design, philosophy and implementation of a prototype for a fully distributed IP-based Telecommunication
System (IPTS) that provides the essential feature set for office and home telecommunications, including IPbased
long-distance and local calling, and with the support for video as well as data and text. The
prototype system was implemented with an Internet-inspired distributed design using open source software,
with appropriate customizations and configurations.
VoIP is one of a family of internet technologies and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks.
FB: https://www.facebook.com/mstfahsin
This research work investigates and improves the performance of Voice over Internet Protocol (VoIP) traffic using IPV4 and IPV6 over WiMAX networks and the impact of various voice codec schemes and statistical distribution for Voice over Internet Protocol (VoIP) over WiMAX has been investigated in detail.
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...IJCNCJournal
Free Space Optical (FSO) communication is a very recent and emerging technology to establish broadband
wireless data transmission system using modulated optical beams. The adoption of FSO system is mainly
needed when any physical connection between the transmitter and receiver is practically impossible and
where high bandwidth data transmission is expected. The performance of FSO communication technology
is highly dependent on atmospheric attenuation which is related to the visibility of the different weather
conditions as well as operating wavelengths. This paper presents our study about the effect of visibility as
well as operating wavelengths on atmospheric attenuation in different weather conditions for point-to-point
free space optical link. Moreover, it also discusses the methodology to find out the optimum link distance
for point-to-point FSO link which will be operated in different weather conditions. It is found that,
atmospheric attenuation is changed with the change in weather condition as well as operating wavelengths.
VoIP is one of a family of internet technologies and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks.
FB: https://www.facebook.com/mstfahsin
This research work investigates and improves the performance of Voice over Internet Protocol (VoIP) traffic using IPV4 and IPV6 over WiMAX networks and the impact of various voice codec schemes and statistical distribution for Voice over Internet Protocol (VoIP) over WiMAX has been investigated in detail.
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...IJCNCJournal
Free Space Optical (FSO) communication is a very recent and emerging technology to establish broadband
wireless data transmission system using modulated optical beams. The adoption of FSO system is mainly
needed when any physical connection between the transmitter and receiver is practically impossible and
where high bandwidth data transmission is expected. The performance of FSO communication technology
is highly dependent on atmospheric attenuation which is related to the visibility of the different weather
conditions as well as operating wavelengths. This paper presents our study about the effect of visibility as
well as operating wavelengths on atmospheric attenuation in different weather conditions for point-to-point
free space optical link. Moreover, it also discusses the methodology to find out the optimum link distance
for point-to-point FSO link which will be operated in different weather conditions. It is found that,
atmospheric attenuation is changed with the change in weather condition as well as operating wavelengths.
In this paper, three novel designs of broadband patch antenna are proposed. The first design propose
broadband slotted equilateral triangular patch antenna (ETPA) operating on frequency around 1800 MHz.
The second design propose broadband slotted right angle isosceles triangular patch antenna RAITPA operating on frequency around 2400 MHz. The third design proposes wideband V-Slotted and shorted edge ETPA antenna operating on frequency around 2400 MHz. The two powerful software HFSS and IE3D are used to simulate the proposed designs. Very good agreement between HFSS and IE3D software is obtained. The designs were chosen to fit modern wireless communication applications operate at Industrial Scientific Medical (ISM) bands such as Wireless local area networks (WLAN). Moreover, mounting the patch on thick substrate with loaded slot technique and loading the patch with a notch technique were used to enhance the bandwidth of those designs. Hence, large fractional bandwidth is obtained.
One of the important steps in routing is to find a feasible path based on the state information. In order to support real-time multimedia applications, the feasible path that satisfies one or more constraints has to be computed within a very short time. Therefore, the paper presents a genetic algorithm to solve the paths tree problem subject to cost constraints. The objective of the algorithm is to find the set of edges connecting all nodes such that the sum of the edge costs from the source (root) to each node is minimized. I.e. the path from the root to each node must be a minimum cost path connecting them. The algorithm has been applied on two sample networks, the first network with eight nodes, and the last one with eleven nodes to illustrate its efficiency.
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
The domain of wireless Local Area Networks (WLANs) is growing speedily as a consequence of
developments in digital communications technology. The early adopters of this technology have mainly
been vertical application that places a premium on the mobility offered by such systems. Examples of these
types of applications consist of stocking control in depot environments, point of sale terminals, and rental
car check-in. Furthermore to the mobility that becomes possible with wireless LANs; these systems have
also been used in environments where cable installation is expensive or impractical. Such environments
include manufacturing floors, trading floors on stock exchanges, conventions and trade shows, and historic
buildings. With the increasing propagation of wireless LANs comes the need for standardization so as to
allow interoperability for an increasingly mobile workforce. Despite all the advantages and facilities that
Wi-FI offers, there is still the delay problem that is due to many reasons that are introduced in details in
our case study which also presents the solutions and simulation that can reduce this delay for better
performance of the wireless networks
An Optimal Software Framework for Parallel Computation of CRCIJCNCJournal
CRC is a common error detection method used in different areas such as information storage and data
communication. CRC depends on modulo-2 division by a predetermined divisor called the generator. In
this method, the transmitter divides the message by the generator and concatenates the calculated residue
to the message. CRC is not able to detect every kind of errors. The properties of the generator determine
the range of errors which are detectable in the receiver side. The division operation is currently performed
sequentially, so developing methods for parallel computation of the residue makes CRC suitable for
network protocols and software applications. This paper presents a novel software framework for parallel
computation of CRC using ODP polynomials.
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
The aim of this paper is to present a new System on Chip (SoC) reconfigurable gateway
architecture for Voice over Internet Telephony (VOIP). Our motivation behind this work is
justified by the following arguments: most of VOIP solutions proposed in the market are based
on the use of a general purpose processor and a DSP circuit. In these solutions, the use of the
serial multiply accumulate circuit is very limiting for the signal processing. Also, in embedded
VOIP based DSP applications, the DSP works without MMU (memory management unit). This
is a serious limitation because VOIP solutions are multi-task based. In order to overcome these
problems, we propose a new VOIP gateway architecture built around the OpenRisc-1200-V3
processor. This last one integrates a DSP circuit as well as a MMU. The hardware architecture
is mapped into the VIRTEX-5 FPGA device. We propose a design methodology based on the
design for reuse and design with reuse concepts. We demonstrate that the proposed SoC
architecture is reconfigurable, scalable and the final RTL code can be reused for any FPGA or
ASIC technology. Performances measures, in the VIRTEX-5 FPGA device family, show that the
SOC-gateway architecture occupies 52% of the FPGA in term of slice LUT, 42% of IOBs, 60%
of bloc memory, 8% of integrated DSP, 16% of PLL and the total power is estimated at
4.3Watts.
In a hyperconnected economy, businesses need tools that empower employees to work together and get more done, anytime, anywhere, using the devices they prefer. SIP Trunking enhances mobility and presence, and provides end-to-end unified communications applications, among other advantages. This paper explains how companies can simplify company-wide business communications using SIP-to energize communications, productivity, collaboration, and business growth.
The objective of study is to guarantee QoS for multiple service class traffic in a multiple connection environment and to examine a case of QoS deployment over a cellular WiMAX network. In particular, the thesis compares the performance how much bandwidth for voip
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...cscpconf
The aim of this paper is to present a new System on Chip (SoC) reconfigurable gateway architecture for Voice over Internet Telephony (VOIP). Our motivation behind this work is
justified by the following arguments: most of VOIP solutions proposed in the market are based on the use of a general purpose processor and a DSP circuit. In these solutions, the use of the serial multiply accumulate circuit is very limiting for the signal processing. Also, in embedded VOIP based DSP applications, the DSP works without MMU (memory management unit). This is a serious limitation because VOIP solutions are multi-task based. In order to overcome these
problems, we propose a new VOIP gateway architecture built around the OpenRisc-1200-V3 processor. This last one integrates a DSP circuit as well as a MMU. The hardware architecture is mapped into the VIRTEX-5 FPGA device. We propose a design methodology based on the design for reuse and design with reuse concepts. We demonstrate that the proposed SoC architecture is reconfigurable, scalable and the final RTL code can be reused for any FPGA or ASIC technology. Performances measures, in the VIRTEX-5 FPGA device family, show that the SOC-gateway architecture occupies 52% of the FPGA in term of slice LUT, 42% of IOBs, 60% of bloc memory, 8% of integrated DSP, 16% of PLL and the total power is estimated at 4.3Watts
SIP Trunking - The cornerstone of unified communicationsJake Weaver
SIP trunks perform some key call and session control and management functions, and serve in place of traditional access lines and trunks.ix Typically provisioned by carriers over T1 trunks, carrier-based SIP trunk services interface between carriers’ nodes and SIP-enabled customer premises equipment, such as a SIP gateway or IP PBX.x SIP Trunks also interconnect customer sites with hosted VOIP/IP centrex services, cloud/software as a service (SaaS) applications, and facilitate customer connectivity with IMS-based applications, like single number service (see sidebar). At the carrier, SIP Trunks interconnect to IP-based WAN services, VOIP/multimedia-enabled network nodes and from these, to the public switched telephone network (PSTN).
The migration from analog or ISDN to Voice-over-IP can lead to significant changes in business communications. For private customers, the migration is generally easy to implement. Many companies, however, face far-reaching changes. Join us on our journey into the future of IP communications.
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsAshik Jibon
A VoIP provider must be committed to working with you to find a resolution to VoIP challenges and able to help you successfully navigate VoIP across multiple calling environments now and in the future. Find a provider who has extensive experience in the VoIP softphone technology landscape. Visit us at Joon.us to learn more.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Neuro-symbolic is not enough, we need neuro-*semantic*
A distributed ip based telecommunication system using sip
1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
A DISTRIBUTED IP-BASED TELECOMMUNICATION
SYSTEM USING SIP
Carlton Andre Thompson1, Haniph A. Latchman2, Nathan Angelacos3, Bharath
Kumar Pareek4
Department of Electrical and Computer Engineering, University of Florida, Gainesville,
Florida
ABSTRACT
Voice over Internet Protocol (VoIP) technologies are integral to modern telecommunications because of
their advanced features, flexibility, and economic benefits. Internet Service Providers initially promoted
these technologies by providing low cost local and international calling. At present, there is also a great
deal of interest in using IP-based technologies to replace traditional small and large office telephone
systems that use traditional PBX’s (Private Branch eXchange). Unfortunately, the large majority of the
emerging VoIP based office telephone systems have followed the centralized design of traditional public
and private telephone systems in which all the intelligence in the system is at the core, with quite expensive
hardware and software components and appropriate redundancy for adequate levels of reliability. In this
paper, it is argued that a centralized model for an IP-based telecommunications system fails to exploit the
full capabilities of Internet-inspired communications and that, very simple, inexpensive, elegant and
flexible solutions are possible by deliberately avoiding the centralized approach. This paper describes the
design, philosophy and implementation of a prototype for a fully distributed IP-based Telecommunication
System (IPTS) that provides the essential feature set for office and home telecommunications, including IPbased long-distance and local calling, and with the support for video as well as data and text. The
prototype system was implemented with an Internet-inspired distributed design using open source software,
with appropriate customizations and configurations.
KEYWORDS
Network Protocols, SIP, Distributed, Telecommunications, Phone system, Highly available, IP, VoIP
1. INTRODUCTION
In recent years there has been a push by telecommunications service providers to move to IPbased telephony. The two major application domains that have been addressed in the evolution of
VoIP technologies are (i) VoIP for telephone call cost reduction and (ii) VoIP for in-office
communication. We will briefly examine each of these areas.
1.1. VoIP for Telephone Cost Reduction
Providers, such as Vonage and magicJack, have helped to popularize the idea of ‘Voice over IP’
(VoIP) [1] [2]. Such VoIP telephony has been made possible via an Internet connection by using
a VoIP phone adapter, (Figure 1) or a computer application. This allows the connection to an
Internet Telephone Service Provider (ITSP) to make free or low cost VoIP calls to the PSTN
worldwide. Such systems work by converting the analog signal to a digital format that is sent over
the Internet. A VoIP user desiring to call regular PSTN numbers, must first establish an account
DOI : 10.5121/ijcnc.2013.5607
121
2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
with an ITSP which then enables VoIP calls via their analog telephone, computer, or mobile
device software. VoIP users are able to make free calls to other users of the ITSP system and
local, long distance, and international calls to PSTN numbers for a fraction of what it costs via
traditional Public Switched Telephone Network (PSTN). For example, at the time of this writing,
Vonage offers long distance calls to some countries for as little as $0.05 per minute (call to
Belize) [1]. This is in contrast to the cost of $0.48 per minute using the PSTN or $0.55 using a
cellphone [3]. This is nearly a 10 times cost reduction by using VoIP versus the PSTN or
cellphone. The ITSP typically has a contract with the destination country or intermediary PSTN
provider. It should be noted however, in some countries VoIP devices are considered illegal due
to the issue of ‘revenue-bypass’, with outbound international calling being the most sensitive [4].
The tremendous cost savings in using VoIP for local, long distance, and international calling calls
result from using the Internet and packet switching to replace the sequence of traditional
telephone circuits made up of central office, tandem switches, toll switches, and a variety of
circuit based telecommunications links[5]
Figure 1. VoIP calling using adapter
1.2. VoIP for In-Office Communication
The same IP-based technologies may also be used to reap tremendous cost, performance, and
service benefits for in-office communications by replacing the central PBX with an IP-based
system for Telecommunications. The traditional PBX centralized design uses component
redundancy to increase reliability, Figure 2[6]. The major components (CPU, the Memory, the
Switching Matrix and the Power supply), have failover backups in the case of an outage. It must
be noted, however, that there is no redundancy at the line and trunk interface level. Thus, in case
of line or trunk interface failure, users will experience service disruptions.
Though highly reliable, traditional PBXs for in-office communication are based on a centralized
design that goes back to the early days of telephony, with all the intelligence of the telephone
system located in the central PBX of the switching system. This design is inherently costly to
purchase, maintain, operate and expand. In addition, it also promotes vendor lock-in, where new
features are only available only when the vendor supplies them, in a proprietary way. These
factors have motivated a great deal of interest in migrating to an open IP-based system using the
Session Initiation Protocol (SIP) which supports in-office telephony and at the same time allows
access to the cost savings in VoIP calling. In contrast to proprietary PBX’s, as an IETF open
standard, customer driven SIP customizations are now possible and cost-effective, and feature
prominently in the feature set implementations of the IP-based Telecommunication System
(IPTS) described in this paper.
122
3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Figure 2: Redundancy in a traditional PBX
The large majority of VoIP developers of in-office telephone solutions have adopted essentially
the same legacy centralized philosophy of the traditional PBX and have built what may be termed
IP-PBX’s in which the RJ-11 from the PBX are replaced by RJ-45 Ethernet wires connected to IP
telephones. In this paper we argue that this legacy centralized model grossly limits the
exploitation of the full potential of Internet-inspired telecommunications.
In what follows we first describe some approaches that have been adopted for building IP-PBX’s
and then we describe a distributed IPTS that moves away from the legacy centralized model that
allows the exploitation of Internet technologies for converged Voice, Video, Text and Data as
well as mobility.
The rest of the paper is organized as follows: Section 2 describes some proprietary and opensource IP-PBX approaches while Section 3 gives an overview of the philosophy of the distributed
IPTS motivated in this paper. Section 4 explains Session Initiation Protocol, which is at the core
of the message exchange of the IPTS, and Section 5 gives a more detailed description of a
prototype of a completely functional and distributed IPTS. In Section 6, the IPTS functionality
and preliminary feature set are explained and Section 7 gives concluding comments and direction
for future work.
2. THE IP-PBX APPROACH
2.1. Cisco’s Solution
A Cisco IP-PBX system developed on traditional PBX architecture is shown in Figure 3 [5].
Despite claims of high reliability, the drawback is its centralized design, which suffers from all
the negative attributes of traditional PBX design and is only a small step in advancement for
VoIP. The cost of Cisco’s system is high; a BTS Feature License for 6.0.3 Release SIP Update
feature costs $4,200,000, not including the primary and backup hardware costs or IP telephone
costs. [6].
123
4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Figure 3: Cisco’s Five-Nines System [5]
2.2. Shoretel System
Figure 4: Distributed Call Control [8]
Shoretel’s distributed VoIP system (Figure 4), as described in their white paper [8], utilizes a
distributed call control component and employs modules with relatively smaller number of
components, thus making it less vulnerable to failures. Shoretel claims their modular design
makes the components easier and cheaper to repair, but still uses an interconnected set of
centralized systems.
Shoretel uses an N+1 redundancy model, which removes the possibility of a single point of
failure, for their system. In this method of redundancy, instead of a central component to manage
the entire system, the load is distributed amongst multiple units. If the number of units is n, then
in case of a fault in any one unit, only 1/nth of the users are affected. If another unit is added, then
the system becomes n+1 redundant, which becomes part of the same system. In case one of the
units fails, the load is distributed amongst the rest. The distributed call control component
increases the network availability because all the processing of calls is handled by the nearest call
control component. In the case of WAN failure, the individual subcomponents are self-sufficient.
In the case of a hardware or network failure, separate failover trunks can do the job of routing the
calls. There are also provisions for analog trunks in case the digital trunks fail. Another feature to
protect the system from network failures is its ability to use the PSTN even for internal calls.
Therefore, even if the IP network fails, the internal calls are routed out to the PSTN, and then in
turn to the destination using Direct Inward Dialing (DID). Software reliability was not available
124
5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
at the time of its publishing; however the average system base cost is about $3000, not including
the IP telephones [9].
2.3. Open-source Based IP PBX Systems
Several open-source projects have developed technologies that are used to build centralized IPPBX’s - though the same products can be used as building blocks in a non-centralized IP
telephony system, as motivated in this paper. For example, Asterisk [10] and FreeSWITCH [11]
are commonly used to build IP-PBX systems that are centralized.
3. THE IP-BASED TELECOMMUNICATION SYSTEM APPROACH
Instead of developing a central IP-PBX, an IP-based Telecommunication System (IPTS) as
described in this paper uses a highly reliable and well designed LAN connection as the backbone
(or essentially the backplane – to use PBX/IP-PBX analogies) and a fully distributed and
Internet-inspired design to provide in-office IP-based local and long-distance communication.
The voice data can be compressed, and redundancy in the voice samples can be removed before
they are buffered at the IP gateway for transmission, leading to a very efficient use of bandwidth.
The use of IP-based network also makes it extremely convenient to network multiple IPTS’s
simply and inexpensively to create a distributed regional or global network, without the
requirement of special long distance trunks.
Perhaps the biggest advantage of the IPTS design is the flexibility that they provide and this is
leveraged to implement a fundamental paradigm shift in design philosophy. Instead of using
central, expensive components at the core that drive the entire system, this design uses many
inexpensive, replaceable components that can be upgraded, replaced, or removed without
disrupting the operation of the live IPTS system. The end devices are intelligent IP phones or
softphones that manage their own presence and availability in the network. They also control
parameters like call forwarding rules and voicemail time-outs among other settings. Most of the
updates and enhancements to the server are software based. The administrator can access the
server remotely through the Internet or another IP-based network. Changes to the system, like
modification of particular parameters, addition of new subscribers, or changing the privileges of
existing subscribers can be made extremely conveniently. Upgrading the server is also usually a
software operation and hence proves to be inexpensive. IP-based systems are also highly scalable
because of their modular design. Extra modules can be added at reasonable costs. The users also
benefit from the portability that the IP-based network provides. By using a softphone, they can
access the telephone network from anywhere in the world where an Internet connection is
available. All that is required is the IP address of the server and the authentication information of
the user.
The goal of this research is to provide a converged distributed system that provides phone calls,
text, email, and video routed to a single device while on-the-go, with “follow-me” services, for
home and office calls.
The innovative system design is a feature-rich, open source, and fully functional IPTS developed
in a manner that is well suited for a distributed design. It is managed by a Session Initiation
Protocol (SIP) router, called Kamailio, running on Alpine Linux, with additional features like
music on hold, conference call, automated attendant and voicemail. The media functions are
provided by FreeSWITCH, which can also act as the Session Border Controller (SBC).
In the next section we give a brief overview of the SIP protocol on which the messaging system in
125
6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
the IPTS is based.
4. SESSION INITIATION PROTOCOL
The Session Initiation Protocol (SIP) is one of the most popular protocols used for setting up
VoIP calls and is the crux of the IPTS. It is responsible for initializing, modifying and tearing
down sessions [12]. The addressing for these sessions are based on Uniform Resource Identifiers
(URI) of the involved parties and not the terminals that they are using.
SIP is a text based application-layer protocol, and its syntax is very similar to the Hypertext
Transfer Protocol (HTTP). It does not serve as a media gateway and is solely responsible for the
session setup/tear-down signaling. SIP does not define the media transfer protocol; it can be used
over either TCP or UDP, and by default uses port number 5060. The similarity of SIP to HTTP
allows compatibility with web browsers. The SIP message can be of any format, so various kinds
of information may be transmitted via SIP. It may contain messages from other protocols such as
Real Time Protocol (RTP), Session Description Protocol (SDP), Resource Reservation Protocol
(RSVP) and Real Time Streaming Protocol (RTSP).
SIP is responsible for determining the location of the end point to be used based on the URI, with
the help of a DNS server and intermediary proxies. Availability of users and their willingness to
establish the communication link is negotiated before a call is established and prior to the flow of
information/media. Call initiations, transfers, holds, and session termination are all managed by
SIP.
A SIP server accepts requests from a User Agent Client (UAC) and sends back responses. The
server may act as a proxy server, in which case it can act as a client and forward requests to
another server on behalf of a client. The server also functions as a registrar, accepting REGISTER
requests, and checking if the UAC is authorized to register with the network. The user can only
make a call through a SIP proxy if he/she is registered. The SIP Proxy server forms a triangular
topology with the user agent server and client as shown in Figure 5 [12]. The proxy server
receives requests from the UAC, and decides where to forward that request. It may either forward
it to a User Agent Server (UAS) or to another proxy. The response also follows the same path in
reverse. In case the server finds multiple destinations for the requests, it can fork the request and
send it to all of them.
Figure 5: Triangular Topology
The basic SIP protocol [13] [14] uses basic six message types, or methods, which take care of all
the functions described in the previous section. These are:
•
INVITE: This is a request sent by a UAC to establish a call with another UA. It includes
the parameters and description of the media in the SDP format.
126
7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
•
•
•
•
•
ACK: Used to acknowledge the receipt of the response to an INVITE message. It is the
last message send during the initial establishment of the call.
OPTIONS: Used to query about the capability of another user agent.
BYE: Sent when a user agent wishes to terminate the call.
CANCEL: Used to cancel a pending request.
REGISTER: Used to register to a SIP server as explained earlier.
The requests listed above generally result in a response code. The different response codes are
shown in Table I [12].
TABLE I. SIP RESPONSE CODES
Response Code
1xx
2xx
3xx
4xx
5xx
6xx
Name
Provisional
Success
Redirection
Client Error
Server Error
Global Failure
Meaning
Request received, processing
Action successful (acts as ACK)
Further action required
Current server cannot process
Server failed to process request
No server can process request
5. COMPONENTS OF THE IP-BASED TELECOMMUNICATION
SYSTEM
5.1. Overview
A fully functional IPTS consists of several components responsible for various aspects of the
communication, Figure 7. A generic overview of each of these components and the role they play
in the system is now given [15]. This is followed by a detailed description of the actual
components used and roles employed in the system.
1) SIP Proxy: This is the central component of the system, which in this set-up is Kamailio.
It is responsible for registering users and maintaining a user database. It also takes care of
setting up and tearing down of VoIP connections. It does not handle the actual
multimedia traffic.
2) User Administration and Provision Portal: The administration portal allows users to
manage their subscription, and the administrator to regulate the subscribers’ privileges.
3) PSTN Gateway: The PSTN gateway enables VoIP subscribers to make calls to PSTN
subscribers.
4) Media Server: A media server is required to deal with functions that require interactive
media communication between the IPTS system and the user agents.
5) Media Proxy: Directing outgoing calls to the network of the VoIP provider requires the
resolving of certain issues. One of the main concerns is NAT traversal. Detail of this
functionality is provided in section 8.4.
6) Monitoring Tools: These tools are required to debug any problem in the SIP server. These
may include a protocol analyzer, and packet sniffing tools like ngrep, Wireshark,
tcpdump and ethereal. Kamailio has a module called SIP Trace, which is also useful in
detecting errors in the SIP server’s operation.
127
8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Figure 7. VOIP System Components
The prototype IPTS was built using Kamailio, a Session Initiation Protocol (SIP) router for the
setting up and routing of calls and FreeSWITCH, which acts as the media server to provide extra
features such as music-on-hold, voicemail, automated attendant, conference calling etc. Calls to
the Public Switched Telephone Network (PSTN) are supported with the help of FreeSWITCH,
which also functions as the Session Border Controller (SBC) and provides a SIP-based trunk to
the service provider. Alpine Linux is the operating system used for implementing the Kamailio
and FreeSWITCH since it is highly suitable for running IP-based telecommunication systems,
because of its security, speed and run-from-RAM capabilities.
The individual components of the system are described in more detail in the following sections.
5.2. Alpine Linux
The operating system (OS) on which the IPTS has been set up is Alpine Linux. It is a Linux
operating system specially designed for routers, firewalls, Virtual Private Networks (VPNs) and
VOIP [16]. It is very simple to install and can run on a USB stick, which is how we are running it.
It is intended for the experienced Linux user and gives the user full control over the system.
Alpine Linux uses PaX security, which implements least privilege protection for memory access.
This creates a highly secure kernel which is extremely difficult to penetrate, protecting it from
bugs [17].
Alpine Linux takes about 4-5 MB of space, excluding the kernel, as compared to gigabytes in the
case of most operating systems. It can run from RAM, reducing risk caused by hard disk failure.
For RAM based installs, data can be backed up using the Linux Backup Utility (LBU). LBU
saves all the configuration information in a single file, which can then be used when the system is
restarted to get back the previous saved configuration. The configuration file can also be copied to
any compatible Alpine Linux system, resulting in the exact same settings on a separate USB stick.
Therefore, the OS is highly portable.
A very useful feature in Alpine Linux is the Alpine Configuration Framework (ACF), a web
configuration utility. ACF thus gives the user a GUI for configuring nearly all the settings.
5.3. Kamailio
Kamailio is the open source SIP router used in the IPTS. It can handle thousands of calls per
second even on low-budget hardware. It also acts as the registrar. IP versions 4 and 6 both are
128
9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
supported by Kamailio, and it has support for communication via TCP, UDP, Transport Layer
Security (TLS) and Stream Control Transmission Protocol (SCTP) [18].
Kamailio has been written entirely in the C language. This makes it extremely portable and
expandable. New modules for any specific purpose can be easily written using the C language
[17]. It is also possible to access scripts written Lua Python, Perl or other supported languages
from inside Kamailio, which gives the administrator complete control of the operations of the SIP
server.
Kamailio is capable of operating in stateless and stateful modes and provides NAT traversal
support for SIP and RTP traffic. It also has features for routing fail-over and replication for high
availability. This feature is highly suited to our goal.
The accounting of the calls through Kamailio is event based, and the parameters of the accounting
are easily configurable. It also has features for accounting of multi-leg calls. The data of the users
is usually stored in a database, for which we have used PostgreSQL as the database management
system [17]. All the necessary information about the subscribers is stored in the PostgreSQL
database.
The inter-connection of Kamailio to other services like Media Servers and PSTN gateways is
fairly simple. Creating a fully functional IPTS with Kamailio as the SIP proxy is thus easily
achievable.
1) Scalability: When operated on systems with 4GB memory, it can serve about 300,000
online subscribers at one time, and when used as a load balancer in stateless mode, it
achieves rates of over 5000 call setups per second [18].
2) Kamailio Architecture: Kamailio consists of a core around which all the features
described above are built. The core handles the basic functionality as a SIP server and
Registrar. The majority of functions are handled by parts of the architecture known as
modules. Their functionality is added through new commands and parameters used inside
scripts. Each module usually takes care of one feature and is independent of the other
modules. At the time of writing, almost 200 modules exist and the ones that are needed
by the system are ‘loaded’ into the configuration file [19]. New modules can be easily
added without affecting the core or any other module.
3) The Configuration File: The kamailio.cfg configuration file is the place where the entire
IPTS system is shaped. A large number of parameters are available through the
configuration file. All the routing criteria are described here. Almost every scenario of the
SIP protocol can be defined along with the actions needed. The file allows the
administrator to access and change parameters specific to a user or a call, which gives
him/her total control over the management of the IPTS system. In addition to this, some
changes may also be made during run-time.
4) Role of Kamailio in the IPTS: Kamailio is the most significant component of the IPTS as
it performs the role of the 'core' of the network, much like backbone routers form the
'core' of the Internet. Like backbone routers, the IPTS allows for multiple routers
(pathways to UAC's) providing high availability in case of component failures. In many
implementations Kamailio also performs the duties of the SIP registrar. In the IPTS a
PostgreSQL database of the registered users is maintained, and Kamailio verifies the
authenticity of the users based on this database.
Once registered, users can make calls according to the privileges provided per their
subscription and agreement with the service provider. Call origination and setup will go
to the Kamailio server, which then determines the type of call requested and performs
authentication checks. Based on the type of call, the routing decision is then made. Calls
129
10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
may be immediately routed to the destination if it is an internal call, or a DNS query may
be performed to figure out the correct destination.
During regular operation, Kamailio may run in stateless mode, which means that once calls are
setup and established Kamailio serves as a simple packet forwarder. The performance of the
system is improved by reducing the load on the SIP router, enabling it to support more users
simultaneously, since Kamailio discards the messages immediately after forwarding.
Additionally, Kamailio can also perform the accounting and billing of the calls once they are
concluded. This operation takes place when one of the parties involved in the call hangs up,
thereby sending a BYE message to the SIP server. This function may require the SIP router to
function in a stateful mode.
5.4. FreeSWITCH
FreeSWITCH is an open source IP telephony platform. It is highly scalable and works with a
comprehensive range of communication protocols. It can be used as a simple switching engine, a
PBX, a media gateway, or a media server to host IVR applications [20]. It makes complicated
functions like voicemail and music on hold fairly simple to incorporate into the phone system. In
the designed IPTS telephone system, FreeSWITCH functions as a media server and an SBC.
The design of FreeSWITCH, like Kamailio, is based on a stable central core with modules for
specific functionality. The core provides interfaces to these modules, allowing the developers to
manage the system efficiently, and if needed, add their own modules conveniently. The various
modules that operate on the core are completely independent of each other. Each module
generates a number of generic events, which enter into the core. The other modules are
programmed to listen for these events and are driven by them accordingly.
The most important modules in the FreeSWITCH architecture are the Endpoint modules. These
modules provide an interface to one of the supported communication protocols. Such a
connection between FreeSWITCH and a protocol such as SIP or H.323 is known as a session. The
connection is based on the parameters and settings defined in the XML configuration files.
The basic operation of FreeSWITCH is the following. First, a SIP phone sends call setup message
to the SIP module. The call is then passed to the core state machine. This brings FreeSWITCH in
the routing state. It now looks for a module called the Dialplan, which is an XML file describing
call specific actions for each scenario, known as an extension. The Dialplan now builds a task list
for the current call and inserts instructions into the session object. After this, FreeSWITCH goes
into the execute state, sequentially implementing the tasks described in the Dialplan. The
execution is done by the Application module. The task list is created by the Dialplan in the form
of the application name and the arguments it requires. The applications loaded on the core will be
listening for these tasks and will execute the ones intended for them.
The configuration can be written in a modular fashion, with different XML files for different
purposes. The files can then be included in the central configuration file, where the processing of
each call starts. This is particularly useful while creating user accounts. Each user account can be
created as a separate file, therefore making it extremely convenient to manage the privileges of
the individual users. The users may also be grouped together and have a common account file.
A session border controller (SBC) is a device located at the logical boundary of two networks,
which controls the communication between them. It resolves compatibility issues arising as a
result of differences in the administration and protocols of the bordering networks, providing
interoperability in spite of the mismatch. It can also provide security features, keeping a check on
the volume of traffic entering the network, and hiding its topology from surrounding networks.
Some of the functions an SBC can perform are listed below [21]:
130
11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
•
•
•
•
•
•
•
•
Network topology hiding
Protection from intentional and unintentional flooding of a network
Protection from unauthorized access to a network
Resolving Network Address Translation (NAT) issues
Protocol conversion
Transcoding of media traffic
Translation of phone number formats
Providing additional QoS support
Figure 8. FreeSWITCH as SBC
FreeSWITCH also serves as the SBC for the IPTS phone system, where it is used for network
topology hiding and to resolve NAT traversal issues. FreeSWITCH is used to access the external
networks, such as the PSTN and the network of the VoIP provider. This can be seen in Figure 8.
It thus acts as the single interface visible to these external networks, hiding the SIP proxy and the
rest of the topology. This makes communication simpler, and also makes the system less
vulnerable to attacks. In order to perform this function, FreeSWITCH acts as a Back-to-back User
Agent (B2BUA). This means that it answers requests from the IP phones, and then generates a
new SIP call to the destination. The difference between a B2BUA and a SIP proxy is that all the
data, including the media streams passes through the B2BUA. Hence it stays in the loop of the
communication for the entire duration of the call. This is shown in Figure 9.
131
12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Figure 9. FreeSWITCH as B2BUA
The system created currently resides in a private network, with private IP addresses. This creates
a problem, because a NAT device can only convert IP addresses at Layer 3 and not on the
Application layer [21]. This culminates in a situation where the call is connected, but audio data is
not able to traverse the network. FreeSWITCH resolves this issue by staying in the loop of the
communication and changing the private IP address of the SIP devices to its own public IP
address before relaying it to the outside world, thus acting once again as a B2BUA.
6. OPERATION OF THE COMPLETE SYSTEM
6.1. Overview
The IPTS offers a novel approach to IP telephony. It provides all the features present in existing
IP-PBXs, but at much lower costs as it is based entirely on open source software and has very
modest hardware requirements. It runs on Random Access Memory (RAM), which makes it
extremely easy to maintain and highly portable system. The USB disks running the system can be
plugged into any computer with the appropriate amount of RAM and an Internet connection,
resulting in the exact same functionality. The USB is made un-writable during normal operation,
which leads to a highly protected tamper-proof system. Duplicating the USB disks is fairly
straightforward, a feature that is beneficial for backing up the system as well as expanding the
system.
The prototype system is Internet-inspired, and the intelligence of the network lies at the terminal
equipment, as mentioned in Section 5. The server does not impose any form of features on the
phones. This allows the user flexibility to tweak system parameters by means of their SIP phones,
irrespective of the type of end system.
It is a distributed type of system, in the sense, that the SIP server is not in the communication loop
at all times. It is only involved in the setting up of the call. The media does not traverse through
the SIP server; it goes directly from one end system to the other. This reduces the traffic flow
through the server making it much more efficient. As a result, the number of dropped calls is
reduced. It also allows the server to support more calls simultaneously.
132
13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
The distributed and end system oriented design of the IPTS phone system also gives it structure,
which centralized servers lack. Different kinds of functions are divided in an organized manner
across the system, instead of one server doing it all. For instance, Kamailio is responsible for the
call set up and FreeSWITCH handles the media functions and also acts as the Back to Back User
Agent (B2BUA). IP phones are able to handle call transfers and call forwarding. They can also
control parameters of other functions such as the ringer timeout. The structure of the system is
depicted in Figure 10 in contrast to traditional phone systems. As we can see, the system will
connect to the PSTN network as well and can support Direct Inward Dialing (DID).
Figure 10. Complete IPTS
The system provides several extra functions apart from basic voice calls. The functions that we
are concentrating on include:
•
•
•
•
•
•
Internal Calls
External Calls
Music on Hold
Voicemail
Conference Calls
Automated Attendant
6.2. Call Processing
As described earlier, the information and credentials of the registered users are stored in a
PostgreSQL database. Users may be added manually by extension number or provisioning. In the
case of provisioning, once a registered device comes online, it gets all the configuration
information by sending a DHCPREQUEST to the DHCP server with option 66, followed by a
request to the provisioning server.
Every call, irrespective of its destination goes through some initial steps before it can finally be
routed according to the destination URI and other factors, such as the availability of the called
party. When a user dials an extension or external number, the SIP enabled phone generates an
INVITE message with the appropriate destination URI. This message is sent to the SIP router,
Kamailio. The message is first checked for corrupt or illegal fields, such as the length of the
message being too large, or the number of hops allowed being too many. Now, based on the
destination URI, a number of actions may be taken by Kamailio. These are now described:
133
14. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
1) Internal Calls: An internal call is defined as a call whose source and destination are both
registered to the same SIP server. These calls are handled only by Kamailio. Once the
initial processing of the INVITE message is completed; if the destination is found in the
table, Kamailio concludes that this is an internal call and accordingly sets the parameters
of the call. The INVITE message is then relayed to the destination extension. The
destination SIP-enabled telephone receives this INVITE message, and if not busy, replies
with a 200 OK message. The 200 OK message reaches the Kamailio server and is relayed
to the caller. Once the caller receives 200 OK, it replies with an ACK, and the call is
established. The transfer of voice data is not handled by SIP. When one of the
participants of the call hangs up, a BYE message is generated and relayed to the other
participant through the Kamailio server. The call ends when the message is
acknowledged. After the call ends any required post processing like billing may be
performed.
2) External Calls: When a registered user on the system dials a number outside the network,
it is known as an external call. To be able to make external calls we need to have a VoIP
account with a service provider. These calls are routed through FreeSWITCH. The calls
are identified by first dialing a “9” before the telephone number. The call initially goes
through the same steps as the internal calls. However, in the step where Kamailio looks
for the destination in the registered users table, it fails. Kamailio then identifies with the
help of the leading 9 that it is an external call. At this point, it redirects the call to
FreeSWITCH for further routing. Within the FreeSWITCH configuration files, an
external SIP profile is defined, which has the credentials of the VoIP account which will
allows us to make the external call. In the FreeSWITCH dialplan, a condition is defined
for destination phone numbers starting with 9. The call is bridged to the VoIP service
provider's server using the mod_sofia module. The authentication is performed using the
information provided in the external SIP profile. Hence, the call is established.
FreeSWITCH now stays in the call for the entire duration, acting as a B2BUA.
3) Music on Hold: The phone system provides music on hold (MOH). This means that
whenever a user registered on the server puts a call on hold the other participant of the
call gets music streamed to his/her phone. This requires a media proxy, which is
FreeSWITCH in this system. A Music on Hold extension is defined in the FreeSWITCH
dialplan. When a call is placed on hold, a new branch is formed by Kamailio, and the call
is redirected to the MOH extension. The pressing of the hold button culminates in a new
INVITE being generated by the user agent with a blank payload.
4) Voicemail: If a user does not answer a call, it fails over to voicemail, where a message
can be recorded. Every registered user requires a FreeSWITCH voicemail account to be
able to receive messages. This can be done using Alpine Linux's web configuration utility
or by creating individual configuration files for each of the users in the FreeSWITCH
directory. There is an entry for the voicemail extension in the FreeSWITCH dialplan that
uses the voicemail application. The messages can also be forwarded to an e-mail address
if needed.
5) Conference Calls: The conference call feature allows more than two users to talk to each
other simultaneously. A series of extension numbers are reserved for conference calls.
For example, in this system, the extension numbers of the form 30XX are used for
conference calls. This means that a conference call can be initiated by a user simply by
dialing any extension of this form. Other users who wish to join the conference call can
do so by dialing the same extension. The behavior of FreeSWITCH when a conference
call is initiated is similar to when Music on Hold has to be played. The conference call is
handled by the application called conference. If this application is initialized correctly
with the correct domain address, it takes care of all the bridging expected.
6) Automated Attendant: This feature provides the caller with an Interactive Voice Response
(IVR) system. This can be used to redirect incoming calls without an operator. The call is
134
15. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
redirected through FreeSWITCH in a similar manner as the conference calls.
7. CONCLUSION
A fully functional distributed IP-based Telecommunications System was designed and
implemented. It provides the common features of a traditional office PBX, namely music-onhold, voicemail, automated attendant and conference calls. External calls to any PSTN extension
can be made by redirecting the call to FreeSWITCH and using it as a B2BUA. Intelligent SIP
phones used in the system can directly take the configuration settings from the provisioning
server, and get automatically registered. The phones can handle call transfers on their own. The
user can also modify any of the settings as per his/her requirement. The phone will then inform
the provisioning server of these changes. The designed system is thus highly flexible.
The system has been created in a manner that highly suits the design of a distributed IP telephony
system. As a result, it is the first step in achieving a single device for all communication needs.
Future work on the system will be on improving reliability by adding redundant components and
also automatic provisioning, with an examination of the relationship of the approach articulated in
this paper with emerging the IP Multimedia Subsystem principles [22].
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
Vonage Home Page. [Online]. Available: http://www.vonage.com/
Magic Jack. [Online]. Available: http://www.magicjack.com/plus-v05/
AT&T
International
Rates
[Online].
Available:
http://www.att.com/media/att/2013/support/pdf/uverse_international_rates.pdf
“Telephone Communications: Bypass of the Local Telephone Companies”, RCED-86-66, Aug 18,
1986 [Online]. Available: http://www.gao.gov/products/RCED-86-66
A. Leon-Garcia, “Communication Networks”, 2nd Ed. New York, NY, USA: McGraw-Hill, 2004.
“IP telephony: The five nines story,” White Paper, Cisco Systems, 2002. [Online]. Available:
http://www.cisco.com/web/IT/solutions/pdf/ipcom/5nine_story_wp.pdf
“Cisco FL VOIP Price List - Industry Solutions - Cisco Systems” [Online]. Available:
http://www.cisco.com/web/strategy/government/fl_voip/price_list_archive.html
“IP telephony: Reliability you can count on,” White Paper, Shorten, 2009. ” [Online]. Available:
http://www.shoretel.com/resource_center/results?#/?white_paper=&content=92715959
“ShoreTel
Pricelist
–
Peppm”
”
[Online].
Available:
http://www.peppm.org/Products/ShoreTel/price.pdf
Asterisk Home Page ” [Online]. Available: http://www.asterisk.org/
FreeSWITCH Home Page ” [Online]. Available: http://www.freeswitch.org/
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E.
Schooler, “SIP: Session initiation protocol,” IETF RFC 3261, Jun. 2002. [Online]. Available:
http://datatracker.ietf.org/doc/rfc3261/
J. Rosenberg, H. Schulzrinne, “Reliability of Provisional Responses in the Session Initiation Protocol
(SIP),” IETF RFC 3262, Jun. 2002. [Online]. Available: http://www.ietf.org/rfc/rfc3262.txt
C. Holmberg, E. Burger, H. Kaplan, “Session Initiation Protocol (SIP) INFO Method and Package
Framework,” IETF RFC 6086, Jun. 2011. [Online]. Available: http://tools.ietf.org/html/rfc6086
F. E. Goncalvez” Building Telephony Systems with OpenSER: A step-by-step guide to building a
high performance Telephony System”. Birmingham, UK: Packt Pub., 2008.
About alpine Linux. [Online]. Available: http://alpinelinux.org/about
H. A. Latchman, N. Angelacos, and N. Copa, “Enterprise VOIP solutions with alpine Linux,” in
Slashroots 2011 Developer’s Conference.
Kamailio official online documentation. [Online]. Available: http://www.kamailio.org/docs/
“Kamailio Modules - v4.0.x (stable)”. [Online]. Available: http://kamailio.org/docs/modules/stable/
A. Minessale and M. S. Collins, “FreeSWITCH 1.0.6.” Birmingham, UK: Packt Publishing, 2010.
P. Park, “Voice over IP Security”. Indianapolis, IN, USA: Cisco Press, 2009.
135
16. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
[22] “IP
Multimedia
Subsystem”.
[Online].
Available:
http://en.wikipedia.org/wiki/IP_Multimedia_Subsystem
[23] S. Pal, R. Gadde, and H. A. Latchman, “On the reliability of Voice over IP (VoIP) telephony,” in The
SPRING 9th International Conference on Computing, Communications and Control Technologies,
Orlando, Florida, USA, Mar. 2011.
[24] J. Rosenberg, “A Hitchhiker's Guide to the Session Initiation Protocol (SIP),” IETF RFC 5411 Jan.
2009. [Online]. Available: http://www.ietf.org/rfc/rfc5411.txt
[25] R. Horak, “Telecommunications and data communications handbook”. Hoboken, NJ, USA: WileyInterscience, 1991.
[26] E. Marcus and H. Stern, “Blueprints for high availability”, 2nd ed. Indianapolis, IN, USA: Wiley
Pub., 2003.
[27] E. Basart, “Building reliable IP telephony systems,” ShoreTel, Sunnyvale, CA, Tech. Rep., Oct 2006.
[28] J. Peterson, “Telephone number mapping (ENUM) service registration for presence services,” ETF
RFC 3953, Jan. 2005. [Online]. Available: https://datatracker.ietf.org/doc/rfc3953/
[29] “The international public telecommunication numbering plan,” International Telecommunication
Union (ITU). P. Faltstrom, “E.164 number and DNS,” IETF RFC 2916, Sep. 2000. [Online].
Available: https://datatracker.ietf.org/doc/rfc3953/
[30] D. Minoli and E. Minoli, “Delivering voice over IP networks”, 2nd Ed.New York, USA: Wiley Pub.,
2002.
[31] M. Mealling, “Dynamic delegation discovery system (DDDS) part three: The domain name system
(DNS)
database,”
IETF
RFC
3403,
Oct.
2002.
[Online].
Available:
https://datatracker.ietf.org/doc/rfc3403/
Authors
Carlton Thompson Completed BS & MS degree at the University of Florida in the
Department of Electrical Engineering. Previous research was done using Electrical
Impedance Tomography (EIT) for the development of a system for capturing and
reconstructing impedance images of the head, and extracting information about bleedingrelated impedance changes from background noise. Results gathered from two and threedimensional finite element models of the head will be used to test reconstruction methods on a skull model.
Current work is on development of a completely distributed IP-based Telecommunications System (IPTS).
Dr. Haniph A. Latchman is a Rhodes Scholar and received his Ph.D. from Oxford
University in 1986 and his Bachelor of Science degree (First Class Honors) from the
University of The West Indies-Trinidad and Tobago, in 1981. Dr. Latchman joined the
University of Florida in 1986 and is presently Professor of Electrical and Computer
Engineering. Dr. Latchman has received numerous teaching and research awards, including the 1998
University of Florida Teacher of the Year and the 2000 IEEE Undergraduate Teaching Award. Dr.
Latchman is the author of more than 180 Journal and refereed conference papers and 4 books. He has
directed 24 Ph.D. Dissertations and 35 MS Theses. He has also served as Associate editor and guest editor
for several leading Journals in his research areas of Robust Control Systems and Communication Networks.
For further information about Dr. Latchman’s research and teaching program, visit http://www.list.ufl.edu.
Nathan Angelacos has worked with various networking technologies for 25 years. Most
projects involved the impossible - like building a wireless mesh network blocks away from
NYC's Office of Emergency Management transmitters. He has done large-scale SIP / VoIP
deployments in a variety of topologies, including VPN and DMVPN networks.
He is
currently the senior systems engineer for a SIP wholesale provider.
Bharath Kumar Pareek received B.E. in Electronics and Communications from
Visvesvaraya Technological University, India in 2011 and received his M.S. in Electrical and
Computer Engineering with Computer Engineering as his specialization from University of
Florida in 2013. He is currently a Research Assistant at Laboratory for Information Systems
and Telecommunications, Department of ECE, University of Florida. His research interests include Voice
over Internet Protocol, Machine Learning, Cloud Computing and Computer Networks.
136