Characterizing MEGACO Security in the presence Diameter Server

نویسندگان

  • Pedram Hajipour
  • Kolsoom Abbasi Shahkooh
چکیده

This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed within the Internet Engineering Task Force(IETF).Diameter is loosely based on Remote Authentication Dial In User Service (RADIUS), which has previously been used to provide AAA services for dial-up and terminal server access environments. An analytical model is provided for the performance of a MEGACO network while there is a Diameter server to guarantee Authentication in call flow. Ultimately, the M/M/c and M/D/c traffic models are provided to evaluate QoS (Quality of Service) in the call flow and some of the key performance benchmarks response time to process the MEGACO calls and mean number of jobs in the system when there is security mechanism is studied.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterizing Reservation Management for Media Gateway Controller (Performance and Reliability)

In this paper, analysis and simulation of Media Gateway Controller (MEGACO) based COPS (Common Open Policy Server) which is a protocol defined in IETF (Internet Engineering Task Force) to transport configuration requests and deliver the policies is presented. For this scenario, three queuing models include M/M/1, M/M/c and M/D/c were applied . Then, some of the key performance benchmarks look l...

متن کامل

Characterizing Reservation Management for Media Gateway Controller (Performance and Reliability)

In this paper, analysis and simulation of Media Gateway Controller (MEGACO) based COPS (Common Open Policy Server) which is a protocol defined in IETF (Internet Engineering Task Force) to transport configuration requests and deliver the policies is presented. For this scenario, three queuing models include M/M/1, M/M/c and M/D/c were applied . Then, some of the key performance benchmarks look l...

متن کامل

On Vulnerability Testing of VoIP Software - The MEGACO/H.248 System as an Example

The ever increasing quantity of newly discovered computer security holes makes many network-based service including especially Voice over IP (VoIP) system vulnerable, hence impose a heavy impact on business development. Megaco or H.248 is a recent emerging VoIP protocol which will promote carriers to move into VoIP applications. In this paper, we present the vulnerability testing of Megaco prot...

متن کامل

Request for Comments: 3660

This document is being published for the information of the community. It describes a non-IETF protocol that is currently being deployed in a number of products. Implementers should be aware of RFC 3525 [37], which was developed in the IETF Megaco Working Group and the ITU-T SG16, and is considered by the IETF and ITU-T to be the standards-based (including reviewed security considerations) way ...

متن کامل

The Implementation of Residential Media Gateway in Interworking Between Megaco/H.248 and SIP

 As a IP telephony protocol, the SIP is gaining increasing popularity. There is yet POTS(Plain Old Telephone Service) line as the existing subscriber line. The Megaco/H.248 may be used for call between the POTS line and SIP. So, it is needed that method for interworking between Megaco/H.248 and SIP. In this paper, we propose the implementation of Residential Media Gateway Prototype in Interwor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDCTA

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2010