Implementation of Wireless VoIP System based on VPN
نویسندگان
چکیده
VoIP isn’t secure since it uses the Internet to which many people connect simultaneously. In this paper, we designed and implemented a Wireless VoIP + VPN system with which secure telephone calls are possible using the open project SIP VoIP Gateway, 'Asterisk' and 'OpenVPN'. Key-Words: VoIP, VPN, SIP, Wireless, Security, WiFi
منابع مشابه
Best Approach for Video Codec Selection Over VoIP Conversation Using Wireless Local Area Network
This study evaluates video codec performance over VoIP using a campus wireless network. Today, the deployment of VoIP occurs in various platforms, including VoIP over LAN, VoIP over WAN and VoIP over VPN. Therefore, this study defines which video codec provides good video quality over VoIP transmission. The soft phone is used as a medium for communication between two parties. A network manageme...
متن کاملA novel approach for security issues in VoIP networks in Virtualization with IVR
VoIP (Voice over Internet Protocol) is a growing technology during last decade. It provides the audio, video streaming facility on successful implementation in the network. However, it provides the text transport facility over the network. Due to implementation of it the cost effective solution, it can be developed for the intercommunication among the employees of a prestigious organization. Th...
متن کاملImplementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
With increasing popularity and ever emerging business needs there was an immense focus to improve the Internet world and to provide guarantee for service delivery. Simplest example for this case is VoIP where two subscribers make a voice call through MPLS based backbone. The end subscribers should have similar quality as that of POTS. Subscribers will expect a real time conversation with limite...
متن کاملCost-optimal design of VoIP networks using the VPN concept
This paper addresses the issue of cost-optimal voice over IP (VoIP) network design. In the applied model, the whole VoIP network is divided into two logical components: the access network and the transport network. The access network consists of VoIP end-points that connect to the transport network through edge routers serving as gateways. Since multiple edge routers may be available for any gi...
متن کاملTrusted License Distribution System Based on IPSec VPN for Mobile DRM
With the rapid development of mobile applications, DRM systems used for mobile terminals and wireless environment become popular. However, the present DRM schemes are not fit for mobile applications because of the new security problems in wireless environment and the limitations of mobile terminals. In this paper, a trusted license distribution system based on IPSec VPN and its correlative issu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inform. and Commun. Convergence Engineering
دوره 6 شماره
صفحات -
تاریخ انتشار 2008