ABSTRACT
This dissertation has extensively looked into all aspects of VoIP communications technology and information presented in preceding chapters, which build up a solid frame work to discuss the conceptual design model and investigate features that could be incorporated for actual projects, with parameters that are tested on field values, the dissertation follows a five course model, for answering different questions, both technical and business like, around central issues, that have been crucial to explanation of the topic; starting with a general overview of VoIP technology, analyzing current VoIP encryption methods, identifying security threats, designing a robust Voice over internet protocol system based on particulars discussed in preceding chapters, and finally, a Voice over internet protocol simulation.
TABLE OF CONTENTS
APPROVAL
DECLARATION ii
DEDICATION iii
ACKNOWLEDGEMENT iv
TABLE OF CONTENTS V
LIST OF ABBREVIATIONS vii
LIST OF TABLES Viii
LIST OF FIGURES ix
ABSTRACT X
CHAPTER ONE 1
INTRODUCTION 1
1.0 General Introduction 1
1.1 Scope oftheproject 2
1.2 Objective ofthe study 2
1.3 Advantages ofVoice over internet protocol 3
1.4 Limitations ofVoIP services 3
CHAPTER TWO 6
LITERATURE REVIEW 6
2.1 Voice over internet protocol Security Basics 6
2.2 Enterprise and carrier network architecture for secure VoW 8
2.3 Security issues in p2p VoW systems 12
2.4 Cross-layer security architecture (mobile communications) 14
2.5 Carrier peering and session border protocol 16
2.6 Security issues with NAT traversal mechanism 17
2.7 End user and hop-by-hop authentication techniques 18
2.8 Vulnerabilities in VOW protocol, e.g. SIP 18
2.9 QoS impact due to security implications 20
2.10 Miscellaneous security issues 22
CHAPTER THREE 24
METHODOLOGY 24
3.0 Introduction 24
3.1 Sample selection 29
3.2 Research procedures 29
3.3 Data Collection Instruments 29
3.4 Problems anticipated in the study 30
CHAPTER FOUR 31
RESULTS AND FINDINGS .3~
4.0 Introduction 31
4.1 VOIP project simulation 35
CHAPTER FIVE 39
CONCLUSION AND RECOMMENDATIONS 39
5.1 CONCLUSION 39
5.2 Recommendations 42
5.2.1 Prospects for future work 44
REFERENCES 45
APPENDICES 46
Appendix A. VISUALROUTE SOFTWARE MAIN INTERFACE 46
Appendix B. M1NITAB DATA PRESENTATION 47
Appendix C. REGRESSION ANALYSIS REPORT 50
Appendix D. MOVING AVERAGE CHART OF CALLS DROPPED 51
Research, S. (2022). Protecting And Securing Converged Networks Without Compromising Efficiency. Afribary. Retrieved from https://afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency
Research, SSA "Protecting And Securing Converged Networks Without Compromising Efficiency" Afribary. Afribary, 30 Aug. 2022, https://afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency. Accessed 26 Nov. 2024.
Research, SSA . "Protecting And Securing Converged Networks Without Compromising Efficiency". Afribary, Afribary, 30 Aug. 2022. Web. 26 Nov. 2024. < https://afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency >.
Research, SSA . "Protecting And Securing Converged Networks Without Compromising Efficiency" Afribary (2022). Accessed November 26, 2024. https://afribary.com/works/protecting-and-securing-converged-networks-without-compromising-efficiency