PROTECTING AND SECURING CONVERGED NETWORKS WITHOUT COMPROMISING EFFICIENCY

  • Type: Project
  • Department: Information Management Technology
  • Project ID: IMT0064
  • Access Fee: ₦5,000 ($14)
  • Pages: 60 Pages
  • Format: Microsoft Word
  • Views: 293
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

This dissertation has extensively looked into all aspects of VoIP communications technology and information presented in preceding chapters, which build up a solid frame work to discuss the conceptual design model and investigate features that could be incorporated for actual projects, with parameters that are tested on field values, the dissertation follows a five course model, for answering different questions, both technical and business like, around central issues, that have been crucial to explanation of the topic; starting with a general overview of VoIP technology, analyzing current VoIP encryption methods, identifying security threats, designing a robust Voice over internet protocol system based on particulars discussed in preceding chapters, and finally, a Voice over internet protocol simulation.


TABLE OF CONTENTS

APPROVAL

DECLARATION ii

DEDICATION iii

ACKNOWLEDGEMENT iv

TABLE OF CONTENTS V

LIST OF ABBREVIATIONS vii

LIST OF TABLES Viii

LIST OF FIGURES ix

ABSTRACT X

CHAPTER ONE 1

INTRODUCTION 1

1.0 General Introduction 1

1.1 Scope oftheproject 2

1.2 Objective ofthe study 2

1.3 Advantages ofVoice over internet protocol 3

1.4 Limitations ofVoIP services 3

CHAPTER TWO 6

LITERATURE REVIEW 6

2.1 Voice over internet protocol Security Basics 6

2.2 Enterprise and carrier network architecture for secure VoW 8

2.3 Security issues in p2p VoW systems 12

2.4 Cross-layer security architecture (mobile communications) 14

2.5 Carrier peering and session border protocol 16

2.6 Security issues with NAT traversal mechanism 17

2.7 End user and hop-by-hop authentication techniques 18

2.8 Vulnerabilities in VOW protocol, e.g. SIP 18

2.9 QoS impact due to security implications 20

2.10 Miscellaneous security issues 22

CHAPTER THREE 24

METHODOLOGY 24

3.0 Introduction 24

3.1 Sample selection 29

3.2 Research procedures 29

3.3 Data Collection Instruments 29

3.4 Problems anticipated in the study 30

CHAPTER FOUR 31

RESULTS AND FINDINGS .3~

4.0 Introduction 31

4.1 VOIP project simulation 35

CHAPTER FIVE 39

CONCLUSION AND RECOMMENDATIONS 39

5.1 CONCLUSION 39

5.2 Recommendations 42

5.2.1 Prospects for future work 44

REFERENCES 45

APPENDICES 46

Appendix A. VISUALROUTE SOFTWARE MAIN INTERFACE 46

Appendix B. M1NITAB DATA PRESENTATION 47

Appendix C. REGRESSION ANALYSIS REPORT 50

Appendix D. MOVING AVERAGE CHART OF CALLS DROPPED 51

PROTECTING AND SECURING CONVERGED NETWORKS WITHOUT COMPROMISING EFFICIENCY
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Information Management Technology
    Project ID IMT0064
    Fee ₦5,000 ($14)
    No of Pages 60 Pages
    Format Microsoft Word

    Related Works

    TABLE OF CONTENTS DECLARATION ..................................................................................................................... .i APPROVAL ............................................................................................................................ .ii DEDICATION... Continue Reading
    TABLE OF CONTENTS DECLARATION ............................................................................................. ii APPROVAL .................................................................................................. iii DEDICATION ................................................................................................ iv... Continue Reading
    ABSTRACT  The research on “the role of the media in protecting and promoting human rights in Uganda” was conducted in Nation Television (NTV). The research was guided by the objectives of the study which included; finding out how the electronic media has promoted human rights in Uganda; establishing the challenges faced by the media in... Continue Reading
    ABSTRACT This study ' was carried out with different organizations and agencies in Kampala with specific aims to identify the circumstances which give rise to the arrest of street children and the legalities taken into account to... Continue Reading
    Abstract The study is an analysis of the law protecting women against gender sexual based violence in Uganda particularly central region. It was specifically aimed at identifying the loopholes within the law, causes effects and the extent of such violence on women. A review on related literature was carried out on current existing information. The... Continue Reading
    ABSTRACT The study examined the effects of drainage networks on floods in Calabar metropolis, Nigeria. The rapid increase in urbanization without corresponding infrastructures in the city of Calabar has led to increased incidences of flood as the available drainage channels cannot contend with the... Continue Reading
    ABSTRACT The study examined the effects of drainage networks on floods in Calabar metropolis, Nigeria. The rapid increase in urbanization without corresponding infrastructures in the city of Calabar has led to increased incidences of flood as the available drainage channels cannot contend with the volume of storm water. In view of this, the study... Continue Reading
    ABSTRACT Instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text messaging. In other words, the peer-to-peer scheme is used to eliminate the high bandwidth demands that server-centric file transfers would place on the provider’s network.... Continue Reading
    ABSTRACT Handwriting recognition is the ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices. The image of the written text may be sensed 'off line' from a piece of paper by optical scanning (optical character recognition) or intelligent... Continue Reading
    Call Us
    whatsappWhatsApp Us