نتایج جستجو برای: megaco

تعداد نتایج: 21  

Journal: :RFC 2003
Bill Foster David Auerbach Flemming Andreasen

This document is being published for the information of the community. It describes a non-IETF protocol that is currently being deployed in a number of products. Implementers should be aware of RFC 3015, which was developed in the IETF Megaco Working Group and the ITU-T SG16, and which is considered by the IETF and the ITU-T to be the standards-based (including reviewed security considerations)...

Journal: :RFC 2005
Bill Foster Flemming Andreasen

This document is being published for the information of the community. It describes a non-IETF protocol that is currently being deployed in a number of products. Implementers should be aware of RFC 3015, which was developed in the IETF Megaco Working Group and the ITU-T SG16, and which is considered the standards-based (including reviewed security considerations) way to meet the needs that MGCP...

2005
F. Andreasen

This document is being published for the information of the community. It describes a non-IETF protocol that is currently being deployed in a number of products. Implementers should be aware of RFC 3015, which was developed in the IETF Megaco Working Group and the ITU-T SG16, and which is considered the standards-based (including reviewed security considerations) way to meet the needs that MGCP...

2007
Wojciech Mazurczyk Zbigniew Kotulski

A new, lightweight security mechanism for the PSTN-VoIP hybrid networks is described. It is based on the two informationhiding techniques: audio watermarking and network steganography. The proposed scheme is suitable especially for the PSTN-IP-PSTN (toll-by-passing) scenario, which nowadays is a very popular application of the IP Telephony systems. Proposed mechanism can be used to authenticate...

Journal: :CoRR 2006
Wojciech Mazurczyk Zbigniew Kotulski

In this paper we describe a new, lightweight security mechanism for PSTN-VoIP cooperation that is based on two information hiding techniques: digital watermarking and steganography. Proposed scheme is especially suitable for PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular application of IP Telephony systems. With the use of this mechanism we authenticate end-to-end transm...

Journal: :journal of advances in computer research 2013
pedram hajipour

in this paper, new features of satellite configuration, such as ip network  based infrastructure and separated signaling and media  are considered to propose a variety of satellite configurations in different orbits. because of their  different altitude in space such as low earth orbit(leo) and geostationary orbit (geo). a test bed used to test call setup delay in a one space link to process th...

2015
Jianqiang Xin

........................................................................................................... 4 Document Conventions................................................................................... 4 Introduction.................................................................................................... 5 Overview of VoIP techniques..........................................

Journal: :RFC 2003
Christian Groves Marcello Pantaleo Terry L. Anderson Tom Taylor

This document defines the protocol used between elements of a physically decomposed multimedia gateway, i.e., a Media Gateway and a Media Gateway Controller. The protocol presented in this document meets the requirements for a media gateway control protocol as presented in RFC 2805. This document replaces RFC 3015. It is the result of continued cooperation between the IETF Megaco Working Group ...

2006
Teodora Guenkova-Luy Andreas Schorr Franz J. Hauck Miguel Gómez Christian Timmerer Ingo Wolf Andreas Kassler

The delivery and adaptation of multimedia content in distributed and heterogeneous environments requires flexible control and management mechanisms in terminals and in control entities inside the network. In the near future, it is important to reach interoperability between the IETF approaches on multimedia session establishment and control and the MPEG-21 efforts for multimedia streaming and a...

2001
BUR GOODE

During the recent Internet stock bubble, articles in the trade press frequently said that, in the near future, telephone traffic would be just another application running over the Internet. Such statements gloss over many engineering details that preclude voice from being just another Internet application. This paper deals with the technical aspects of implementing voice over Internet protocol ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید