Security on VoIP
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
Voice over Internet protocol (VoIP), is a way of communicating over Internet. It is one of the newest technology. There is an existing way of communication over any network. The Users can make the telephone calls over an IP network using this technology. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. There are two kinds of spoofing attacks are possible, first one is IP spoofing attack and another is URI spoofing attack, which are described in this review paper. The Implementation of VoIP concerned by businesses, components of a VoIP system, and relevant security issues. The business concerns will be those which are used to affect the Quality of Service (QoS). The network components call processors, gateways and two of the more common architectures are held by VoIP.
Authors and Affiliations
Deepak Kumar, Deepika, Krishan Sharma
Loss Reduction Using the Smart Power Flow Controller by Tap-Changing Algorithm of Sen Transformer
The transmission systems is to handle the power efficiently from generation stations to load stations. Even though a considerable amount of power is lost in transmission network components. As a result, a appropriate po...
Comparative Study and Analysis of Air Ejector Flow in Convergent and Convergent Divergent Nozzle of Aircraft
Ejectors are the devices which found its application commonly in aircraft system it has primary tubing ending up with a nozzle of converging or conversing diverging type which here treated as a scope for research. The c...
Domain Based Categorization Using Adaptive Preprocessing
As the number users accessing network for various purposes increases and simultaneously size of the Network and Internet traffic increase so, there is need for categorization web pages according to domain for easy acces...
Comparison Study between 1/2 Rate And 2/3 Rate Convolutional Encoder with Viterbi Decoder
As the need for bandwidth by bandwidth application became extremely alarming, the need to design a good encoders and decoders for the next generation wireless communications system became very imperative. Convolutional...
Counterfeit Indian Currency Detection Through Image Processing in Labview
Forged currency is problem for almost all cash based economy country like India. Counterfeit currency notes are big hurdle for India. In past few years only printing house of Reserve Bank of India has the ability to pri...