top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
IET networks
IET networks
Pubbl/distr/stampa Stevenage : , : Institution of Engineering and Technology, , ©2012-
Descrizione fisica 1 online resource (volumes) : illustrations
Disciplina 006
Soggetto topico Computer network architectures
Computer network protocols
Information networks
Telecommunication systems
Réseaux d'ordinateurs - Architectures
Protocoles de réseaux d'ordinateurs
Réseaux d'information
Systèmes de télécommunications
Soggetto genere / forma Periodical
periodicals.
Periodicals.
Périodiques.
Soggetto non controllato Telecommunications
ISSN 2047-4962
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti IET netw
Networks
Institution of Engineering and Technology networks
Networks, IET
Record Nr. UNISA-996279573803316
Stevenage : , : Institution of Engineering and Technology, , ©2012-
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Implementing NAP and NAC security technologies [[electronic resource] ] : the complete guide to network access control / / Daniel V. Hoffman
Implementing NAP and NAC security technologies [[electronic resource] ] : the complete guide to network access control / / Daniel V. Hoffman
Autore Hoffman Daniel (Daniel V.), <1972->
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., c2008
Descrizione fisica 1 online resource (290 p.)
Disciplina 005.8
Soggetto topico Computer network protocols
Computer networks - Access control
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-281-38194-2
9786611381943
0-470-37154-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?; Is There a Cisco NAC Alliance Program?; Understanding Clientless and Client-Based NAC; Pre-Admission NAC; Post-Admission NAC; Summary; Chapter 2: The Technical Components of NAC Solutions
Analyzing the Security Posture Setting Policy for Device Analysis; Communicating the Security Posture of the Device; Taking Action Based on the Security Posture; Remediating the Security Deficiency; The Reporting Mechanism; Summary; Chapter 3: What Are You Trying to Protect?; LAN-Based NAC; Mobile NAC; Summary; Chapter 4: Understanding the Need for LAN-Based NAC/NAP; The Security Reasons for LAN-Based NAC; Unintentional LAN-Based Threats; Real-World Example of an Unintentional Threat; Intentional LAN-Based Threats; Summary; Chapter 5: Understanding the Need for Mobile NAC
What's the Primary Need? Why Companies Look to Mobile NAC; Mobile NAC and Direct Attacks; Mobile NAC and the Wireless Threat; Mobile NAC and the Malware Threat; Summary; Chapter 6: Understanding Cisco Clean Access; Deployment Scenarios and Topologies; The Technical Components of Cisco Clean Access; The Purpose of Cisco Clean Access; Summary; Chapter 7: Understanding Cisco Network Admission Control Framework; Deployment Scenarios and Topologies; The Technical Components of the Cisco NAC Framework; The Purpose of Cisco NAC; Summary; Chapter 8: Understanding Fiberlink Mobile NAC
Deployment Scenarios and Topologies The Technical Components of Fiberlink Mobile NAC; The Purpose of Fiberlink Mobile NAC; Summary; Chapter 9: Understanding Microsoft NAP Solutions; Deployment Scenarios and Topologies; Microsoft 802.1x; The Technical Components of Microsoft NAP; The Purpose of Microsoft NAP; Summary; Chapter 10: Understanding NAC and NAP in Other Products; NAC-Like Functionality in Non-NAC Technologies; NAC and NAP Solutions from Other Vendors; Summary; Appendix A: Case Studies and Additional Information; Cisco Clean Access; McAfee NAC; Bradford Networks
Juniper Uniform Access Control Bibliography; Index
Record Nr. UNINA-9910454651003321
Hoffman Daniel (Daniel V.), <1972->  
Indianapolis, IN, : Wiley Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing NAP and NAC security technologies [[electronic resource] ] : the complete guide to network access control / / Daniel V. Hoffman
Implementing NAP and NAC security technologies [[electronic resource] ] : the complete guide to network access control / / Daniel V. Hoffman
Autore Hoffman Daniel (Daniel V.), <1972->
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., c2008
Descrizione fisica 1 online resource (290 p.)
Disciplina 005.8
Soggetto topico Computer network protocols
Computer networks - Access control
Computer networks - Security measures
ISBN 1-281-38194-2
9786611381943
0-470-37154-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?; Is There a Cisco NAC Alliance Program?; Understanding Clientless and Client-Based NAC; Pre-Admission NAC; Post-Admission NAC; Summary; Chapter 2: The Technical Components of NAC Solutions
Analyzing the Security Posture Setting Policy for Device Analysis; Communicating the Security Posture of the Device; Taking Action Based on the Security Posture; Remediating the Security Deficiency; The Reporting Mechanism; Summary; Chapter 3: What Are You Trying to Protect?; LAN-Based NAC; Mobile NAC; Summary; Chapter 4: Understanding the Need for LAN-Based NAC/NAP; The Security Reasons for LAN-Based NAC; Unintentional LAN-Based Threats; Real-World Example of an Unintentional Threat; Intentional LAN-Based Threats; Summary; Chapter 5: Understanding the Need for Mobile NAC
What's the Primary Need? Why Companies Look to Mobile NAC; Mobile NAC and Direct Attacks; Mobile NAC and the Wireless Threat; Mobile NAC and the Malware Threat; Summary; Chapter 6: Understanding Cisco Clean Access; Deployment Scenarios and Topologies; The Technical Components of Cisco Clean Access; The Purpose of Cisco Clean Access; Summary; Chapter 7: Understanding Cisco Network Admission Control Framework; Deployment Scenarios and Topologies; The Technical Components of the Cisco NAC Framework; The Purpose of Cisco NAC; Summary; Chapter 8: Understanding Fiberlink Mobile NAC
Deployment Scenarios and Topologies The Technical Components of Fiberlink Mobile NAC; The Purpose of Fiberlink Mobile NAC; Summary; Chapter 9: Understanding Microsoft NAP Solutions; Deployment Scenarios and Topologies; Microsoft 802.1x; The Technical Components of Microsoft NAP; The Purpose of Microsoft NAP; Summary; Chapter 10: Understanding NAC and NAP in Other Products; NAC-Like Functionality in Non-NAC Technologies; NAC and NAP Solutions from Other Vendors; Summary; Appendix A: Case Studies and Additional Information; Cisco Clean Access; McAfee NAC; Bradford Networks
Juniper Uniform Access Control Bibliography; Index
Record Nr. UNINA-9910782158803321
Hoffman Daniel (Daniel V.), <1972->  
Indianapolis, IN, : Wiley Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing NAP and NAC security technologies [[electronic resource] ] : the complete guide to network access control / / Daniel V. Hoffman
Implementing NAP and NAC security technologies [[electronic resource] ] : the complete guide to network access control / / Daniel V. Hoffman
Autore Hoffman Daniel (Daniel V.), <1972->
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., c2008
Descrizione fisica 1 online resource (290 p.)
Disciplina 005.8
Soggetto topico Computer network protocols
Computer networks - Access control
Computer networks - Security measures
ISBN 1-281-38194-2
9786611381943
0-470-37154-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control; About the Author; Credits; Contents; Acknowledgments; Introduction; An Ethical Hacker's Perspective; Misconceptions Abound; The Flow of This Book; What You'll Learn; Questions to Ask Yourself as You Read This Book; Chapter 1: Understanding Terms and Technologies; Who Is the Trusted Computing Group?; Is There a Cisco NAC Alliance Program?; Understanding Clientless and Client-Based NAC; Pre-Admission NAC; Post-Admission NAC; Summary; Chapter 2: The Technical Components of NAC Solutions
Analyzing the Security Posture Setting Policy for Device Analysis; Communicating the Security Posture of the Device; Taking Action Based on the Security Posture; Remediating the Security Deficiency; The Reporting Mechanism; Summary; Chapter 3: What Are You Trying to Protect?; LAN-Based NAC; Mobile NAC; Summary; Chapter 4: Understanding the Need for LAN-Based NAC/NAP; The Security Reasons for LAN-Based NAC; Unintentional LAN-Based Threats; Real-World Example of an Unintentional Threat; Intentional LAN-Based Threats; Summary; Chapter 5: Understanding the Need for Mobile NAC
What's the Primary Need? Why Companies Look to Mobile NAC; Mobile NAC and Direct Attacks; Mobile NAC and the Wireless Threat; Mobile NAC and the Malware Threat; Summary; Chapter 6: Understanding Cisco Clean Access; Deployment Scenarios and Topologies; The Technical Components of Cisco Clean Access; The Purpose of Cisco Clean Access; Summary; Chapter 7: Understanding Cisco Network Admission Control Framework; Deployment Scenarios and Topologies; The Technical Components of the Cisco NAC Framework; The Purpose of Cisco NAC; Summary; Chapter 8: Understanding Fiberlink Mobile NAC
Deployment Scenarios and Topologies The Technical Components of Fiberlink Mobile NAC; The Purpose of Fiberlink Mobile NAC; Summary; Chapter 9: Understanding Microsoft NAP Solutions; Deployment Scenarios and Topologies; Microsoft 802.1x; The Technical Components of Microsoft NAP; The Purpose of Microsoft NAP; Summary; Chapter 10: Understanding NAC and NAP in Other Products; NAC-Like Functionality in Non-NAC Technologies; NAC and NAP Solutions from Other Vendors; Summary; Appendix A: Case Studies and Additional Information; Cisco Clean Access; McAfee NAC; Bradford Networks
Juniper Uniform Access Control Bibliography; Index
Record Nr. UNINA-9910816635703321
Hoffman Daniel (Daniel V.), <1972->  
Indianapolis, IN, : Wiley Pub., c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing SSL/TLS using cryptography and PKI [[electronic resource] /] / Joshua Davies
Implementing SSL/TLS using cryptography and PKI [[electronic resource] /] / Joshua Davies
Autore Davies Joshua Dennis
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., Inc, 2011
Descrizione fisica 1 online resource (697 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
World Wide Web - Security measures
Computer network protocols
ISBN 1-283-02725-9
9786613027252
1-118-25579-8
1-118-03877-0
1-118-03875-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing SSL/TLS Using Cryptography and PKI; Contents; Introduction; Chapter 1: Understanding Internet Security; What Are Secure Sockets?; "Insecure" Communications: Understanding the HTTP Protocol; Implementing an HTTP Client; Adding Support for HTTP Proxies; Reliable Transmission of Binary Data with Base64 Encoding; Implementing an HTTP Server; Roadmap for the Rest of This Book; Chapter 2: Protecting Against Eavesdroppers with Symmetric Cryptography; Understanding Block Cipher Cryptography Algorithms; Implementing the Data Encryption Standard (DES) Algorithm; DES Initial Permutation
DES Key ScheduleDES Expansion Function; DES Decryption; Padding and Chaining in Block Cipher Algorithms; Using the Triple-DES Encryption Algorithm to Increase Key Length; Faster Encryption with the Advanced Encryption Standard (AES) Algorithm; AES Key Schedule Computation; AES Encryption; Other Block Cipher Algorithms; Understanding Stream Cipher Algorithms; Understanding and Implementing the RC4 Algorithm; Converting a Block Cipher to a Stream Cipher: The OFB and COUNTER Block-Chaining Modes; Chapter 3: Secure Key Exchange over an Insecure Medium with Public Key Cryptography
Understanding the Theory Behind the RSA AlgorithmPerforming Arbitrary Precision Binary Math to Implement Public-Key Cryptography; Implementing Large-Number Addition; Implementing Large-Number Subtraction; Implementing Large-Number Division; Comparing Large Numbers; Optimizing for Modulo Arithmetic; Using Modulus Operations to Efficiently Compute Discrete Logarithms in a Finite Field; Encryption and Decryption with RSA; Encrypting with RSA; Decrypting with RSA; Encrypting a Plaintext Message; Decrypting an RSA-Encrypted Message; Testing RSA Encryption and Decryption
Getting More Security per Key Bit: Elliptic Curve CryptographyHow Elliptic Curve Cryptography Relies on Modular Inversions; Using the Euclidean Algorithm to compute Greatest Common Denominators; Computing Modular Inversions with the Extended Euclidean Algorithm; Adding Negative Number Support to the Huge Number Library; Supporting Negative Remainders; Making ECC Work with Whole Integers: Elliptic-Curve Cryptography over Fp; Reimplementing Diffie-Hellman to Use ECC Primitives; Why Elliptic-Curve Cryptography?; Chapter 4: Authenticating Communications Using Digital Signatures
Using Message Digests to Create Secure Document SurrogatesImplementing the MD5 Digest Algorithm; Understanding MD5; A Secure Hashing Example; Securely Hashing a Single Block of Data; MD5 Vulnerabilities; Increasing Collision Resistance with the SHA-1 Digest Algorithm; Understanding SHA-1 Block Computation; Understanding the SHA-1 Input Processing Function; Understanding SHA-1 Finalization; Even More Collision Resistance with the SHA-256 Digest Algorithm; Preventing Replay Attacks with the HMAC Keyed-Hash Algorithm; Implementing a Secure HMAC Algorithm; Completing the HMAC Operation
Creating Updateable Hash Functions
Record Nr. UNINA-9910141045803321
Davies Joshua Dennis  
Indianapolis, Ind., : Wiley Pub., Inc, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing SSL/TLS using cryptography and PKI [[electronic resource] /] / Joshua Davies
Implementing SSL/TLS using cryptography and PKI [[electronic resource] /] / Joshua Davies
Autore Davies Joshua Dennis
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., Inc, 2011
Descrizione fisica 1 online resource (697 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
World Wide Web - Security measures
Computer network protocols
ISBN 1-283-02725-9
9786613027252
1-118-25579-8
1-118-03877-0
1-118-03875-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing SSL/TLS Using Cryptography and PKI; Contents; Introduction; Chapter 1: Understanding Internet Security; What Are Secure Sockets?; "Insecure" Communications: Understanding the HTTP Protocol; Implementing an HTTP Client; Adding Support for HTTP Proxies; Reliable Transmission of Binary Data with Base64 Encoding; Implementing an HTTP Server; Roadmap for the Rest of This Book; Chapter 2: Protecting Against Eavesdroppers with Symmetric Cryptography; Understanding Block Cipher Cryptography Algorithms; Implementing the Data Encryption Standard (DES) Algorithm; DES Initial Permutation
DES Key ScheduleDES Expansion Function; DES Decryption; Padding and Chaining in Block Cipher Algorithms; Using the Triple-DES Encryption Algorithm to Increase Key Length; Faster Encryption with the Advanced Encryption Standard (AES) Algorithm; AES Key Schedule Computation; AES Encryption; Other Block Cipher Algorithms; Understanding Stream Cipher Algorithms; Understanding and Implementing the RC4 Algorithm; Converting a Block Cipher to a Stream Cipher: The OFB and COUNTER Block-Chaining Modes; Chapter 3: Secure Key Exchange over an Insecure Medium with Public Key Cryptography
Understanding the Theory Behind the RSA AlgorithmPerforming Arbitrary Precision Binary Math to Implement Public-Key Cryptography; Implementing Large-Number Addition; Implementing Large-Number Subtraction; Implementing Large-Number Division; Comparing Large Numbers; Optimizing for Modulo Arithmetic; Using Modulus Operations to Efficiently Compute Discrete Logarithms in a Finite Field; Encryption and Decryption with RSA; Encrypting with RSA; Decrypting with RSA; Encrypting a Plaintext Message; Decrypting an RSA-Encrypted Message; Testing RSA Encryption and Decryption
Getting More Security per Key Bit: Elliptic Curve CryptographyHow Elliptic Curve Cryptography Relies on Modular Inversions; Using the Euclidean Algorithm to compute Greatest Common Denominators; Computing Modular Inversions with the Extended Euclidean Algorithm; Adding Negative Number Support to the Huge Number Library; Supporting Negative Remainders; Making ECC Work with Whole Integers: Elliptic-Curve Cryptography over Fp; Reimplementing Diffie-Hellman to Use ECC Primitives; Why Elliptic-Curve Cryptography?; Chapter 4: Authenticating Communications Using Digital Signatures
Using Message Digests to Create Secure Document SurrogatesImplementing the MD5 Digest Algorithm; Understanding MD5; A Secure Hashing Example; Securely Hashing a Single Block of Data; MD5 Vulnerabilities; Increasing Collision Resistance with the SHA-1 Digest Algorithm; Understanding SHA-1 Block Computation; Understanding the SHA-1 Input Processing Function; Understanding SHA-1 Finalization; Even More Collision Resistance with the SHA-256 Digest Algorithm; Preventing Replay Attacks with the HMAC Keyed-Hash Algorithm; Implementing a Secure HMAC Algorithm; Completing the HMAC Operation
Creating Updateable Hash Functions
Record Nr. UNINA-9910814482003321
Davies Joshua Dennis  
Indianapolis, Ind., : Wiley Pub., Inc, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The IMS [[electronic resource] ] : IP multimedia concepts and services in the mobile domain / / Miikka Poikselkä ... [et al.]
The IMS [[electronic resource] ] : IP multimedia concepts and services in the mobile domain / / Miikka Poikselkä ... [et al.]
Pubbl/distr/stampa Chichester, : John Wiley & Sons, c2004
Descrizione fisica 1 online resource (449 p.)
Disciplina 004.62
Altri autori (Persone) PoikselkäMiikka
Soggetto topico Computer network protocols
Internet telephony
Multimedia systems
ISBN 1-280-27390-9
9786610273904
0-470-87114-8
0-470-87115-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; PART I: ARCHITECTURE; 1 Introduction; 1.1 Why the Internet Protocol Multimedia Subsystem was developed; 1.2 Where did it come from?; 1.3 Other relevant standardization bodies; 2 IP Multimedia Subsystem Architecture; 2.1 Architectural requirements; 2.2 Description of IMS-related entities and functionalities; 2.3 IMS reference points; 3 IMS Concepts; 3.1 Overview; 3.2 Registration; 3.3 Session initiation; 3.4 Identification; 3.5 Identity modules; 3.6 Security services in the IMS; 3.7 Discovering the IMS entry point
3.8 S-CSCF assignment 3.9 Mechanism for controlling bearer traffic; 3.10 Charging; 3.11 User profile; 3.12 Service provision; 3.13 Connectivity between traditional Circuit-Switched users and IMS users; 3.14 Mechanism to register multiple user identities at once; 3.15 Sharing a single user identity between multiple terminals; 3.16 SIP compression; PART II: DETAILED PROCEDURES; 4 Introduction; 4.1 The example scenario; 4.2 Base standards; 5 An example IMS registration; 5.1 Overview; 5.2 Signalling PDP context establishment; 5.3 P-CSCF discovery; 5.4 Transport protocols
5.5 SIP registration and registration routing aspects 5.6 Authentication; 5.7 Access security-IPsec SAs; 5.8 SIP Security Mechanism Agreement; 5.9 Compression negotiation; 5.10 Access and location information; 5.11 Charging-related information during registration; 5.12 User identities; 5.13 Re-registration and re-authentication; 5.14 De-registration; 6 An Example IMS Session; 6.1 Overview; 6.2 Caller and callee identities; 6.3 Routing; 6.4 Compression negotiation; 6.5 Media negotiation; 6.6 Resource reservation; 6.7 Controlling the media; 6.8 Charging-related information for sessions
6.9 Release of a session 7 Routing of PSIs; 7.1 Scenario 1: routing from a user to a PSI; 7.2 Scenario 2: routing from a PSI to a user; 7.3 Scenario 3: routing from a PSI to another PSI; PART III: PROTOCOLS; 8 SIP; 8.1 Background; 8.2 Design principles; 8.3 SIP architecture; 8.4 Message format; 8.5 The SIP URI; 8.6 The tel URI; 8.7 SIP structure; 8.8 Registration; 8.9 Dialogs; 8.10 Sessions; 8.11 Security; 8.12 Routing requests and responses; 8.13 SIP extensions; 9 SDP; 9.1 SDP message contents; 9.2 SDP message format; 9.3 Selected SDP lines; 10 The Offer/Answer Model with SDP; 10.1 The offer
10.2 The answer 10.3 Offer/Answer processing; 11 RTP; 11.1 RTP for real-time data delivery; 11.2 RTCP; 11.3 RTP profile and payload format specifications; 11.4 RTP profile and payload format specification for audio and video (RTP/AVP); 12 DNS; 12.1 DNS resource records; 12.2 The naming authority pointer (NAPTR) DNS RR; 12.3 ENUM - the E.I64 to URI Dynamic Delegation Discovery System (DDD) application; 12.4 Service records (SRVs); 13 GPRS; 13.1 Overview; 13.2 Packet Data Protocol (PDP); 13.3 Access points; 13.4 PDP context types; 14 TLS; 14.1 Introduction; 14.2 TLS Record Protocol
14.3 TLS Handshake Protocol
Record Nr. UNINA-9910783289203321
Chichester, : John Wiley & Sons, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The IMS [[electronic resource] ] : IP multimedia concepts and services in the mobile domain / / Miikka Poikselkä ... [et al.]
The IMS [[electronic resource] ] : IP multimedia concepts and services in the mobile domain / / Miikka Poikselkä ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Chichester, : John Wiley & Sons, c2004
Descrizione fisica 1 online resource (449 p.)
Disciplina 004.62
Altri autori (Persone) PoikselkäMiikka
Soggetto topico Computer network protocols
Internet telephony
Multimedia systems
ISBN 1-280-27390-9
9786610273904
0-470-87114-8
0-470-87115-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Foreword; Preface; Acknowledgements; List of Figures; List of Tables; PART I: ARCHITECTURE; 1 Introduction; 1.1 Why the Internet Protocol Multimedia Subsystem was developed; 1.2 Where did it come from?; 1.3 Other relevant standardization bodies; 2 IP Multimedia Subsystem Architecture; 2.1 Architectural requirements; 2.2 Description of IMS-related entities and functionalities; 2.3 IMS reference points; 3 IMS Concepts; 3.1 Overview; 3.2 Registration; 3.3 Session initiation; 3.4 Identification; 3.5 Identity modules; 3.6 Security services in the IMS; 3.7 Discovering the IMS entry point
3.8 S-CSCF assignment 3.9 Mechanism for controlling bearer traffic; 3.10 Charging; 3.11 User profile; 3.12 Service provision; 3.13 Connectivity between traditional Circuit-Switched users and IMS users; 3.14 Mechanism to register multiple user identities at once; 3.15 Sharing a single user identity between multiple terminals; 3.16 SIP compression; PART II: DETAILED PROCEDURES; 4 Introduction; 4.1 The example scenario; 4.2 Base standards; 5 An example IMS registration; 5.1 Overview; 5.2 Signalling PDP context establishment; 5.3 P-CSCF discovery; 5.4 Transport protocols
5.5 SIP registration and registration routing aspects 5.6 Authentication; 5.7 Access security-IPsec SAs; 5.8 SIP Security Mechanism Agreement; 5.9 Compression negotiation; 5.10 Access and location information; 5.11 Charging-related information during registration; 5.12 User identities; 5.13 Re-registration and re-authentication; 5.14 De-registration; 6 An Example IMS Session; 6.1 Overview; 6.2 Caller and callee identities; 6.3 Routing; 6.4 Compression negotiation; 6.5 Media negotiation; 6.6 Resource reservation; 6.7 Controlling the media; 6.8 Charging-related information for sessions
6.9 Release of a session 7 Routing of PSIs; 7.1 Scenario 1: routing from a user to a PSI; 7.2 Scenario 2: routing from a PSI to a user; 7.3 Scenario 3: routing from a PSI to another PSI; PART III: PROTOCOLS; 8 SIP; 8.1 Background; 8.2 Design principles; 8.3 SIP architecture; 8.4 Message format; 8.5 The SIP URI; 8.6 The tel URI; 8.7 SIP structure; 8.8 Registration; 8.9 Dialogs; 8.10 Sessions; 8.11 Security; 8.12 Routing requests and responses; 8.13 SIP extensions; 9 SDP; 9.1 SDP message contents; 9.2 SDP message format; 9.3 Selected SDP lines; 10 The Offer/Answer Model with SDP; 10.1 The offer
10.2 The answer 10.3 Offer/Answer processing; 11 RTP; 11.1 RTP for real-time data delivery; 11.2 RTCP; 11.3 RTP profile and payload format specifications; 11.4 RTP profile and payload format specification for audio and video (RTP/AVP); 12 DNS; 12.1 DNS resource records; 12.2 The naming authority pointer (NAPTR) DNS RR; 12.3 ENUM - the E.I64 to URI Dynamic Delegation Discovery System (DDD) application; 12.4 Service records (SRVs); 13 GPRS; 13.1 Overview; 13.2 Packet Data Protocol (PDP); 13.3 Access points; 13.4 PDP context types; 14 TLS; 14.1 Introduction; 14.2 TLS Record Protocol
14.3 TLS Handshake Protocol
Record Nr. UNINA-9910811827903321
Chichester, : John Wiley & Sons, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks / / Mohamed Boucadair
Inter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks / / Mohamed Boucadair
Autore Boucadair Mohamed
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , 2009
Descrizione fisica 1 online resource (275 p.)
Disciplina 004.69/5
004.695
Collana Wiley series on communications networking & distributed systems
Soggetto topico Internet telephony
Computer network protocols
ISBN 1-282-01079-4
9786612010798
0-470-74218-6
0-470-74219-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Terminology and Definitions -- Acronyms and Abbreviations -- Acknowledgement -- 1 Introduction -- 1.1 General Introduction -- 1.2 On Voice over IP and Telephony over IP -- 1.3 Context -- 1.4 Enhancement Strategies to Solve SIP Issues -- 1.5 IAX: Towards Lightweight Telephony Architectures -- 1.6 IAX and Standardisation -- 1.7 Rationale -- 1.8 What This Book is Not -- 1.9 Structure of the Book -- 2 The IAX Protocol at a Glance -- 2.1 What Does IAX Stand For? -- 2.2 Is IAX Specific to the Asterisk Platform? -- 2.3 What is the Difference between IAX2 and IAX? -- 2.4 Why another New VoIP Protocol? -- 2.5 How Does IAX Solve VoIP Pains? -- 2.6 How is Calls Multiplexing Achieved? -- 2.7 And What About Demultiplexing? -- 2.8 What Port Number Does IAX Use? -- 2.9 What Transport Protocol Does IAX Use? -- 2.10 Is IAX a Reliable Protocol? -- 2.11 How Does IAX Ensure Reliability? -- 2.12 Is there an IAX Registration Procedure? -- 2.13 Does IAX Registration Differ from SIP Registration? -- 2.14 How Are Media Streams Transported in IAX? -- 2.15 Is CODEC Negotiation Supported by IAX? -- 2.16 Is On-Fly CODEC Change Possible During a Call? -- 2.17 IAX: a Path-Coupled or Decoupled Protocol? -- 2.18 Can IAX be Aware of the Status of the Network Load? -- 2.19 What About Security? -- 2.20 Could IAX Devices Be Managed? -- 2.21 Is Firmware Version Updating Supported by IAX? -- 2.22 Can IAX Be Extended to Offer New Features? -- 2.23 How is an IAX Resource Identified? -- 2.24 What Does an IAX URI Look Like? -- 2.25 Is it Possible to Set a Call Involving Several IAX Servers? -- 2.26 Is it Possible to Discover the Location of an IAX Resource? -- 2.27 What Is DUNDi? -- 2.28 What Is TRIP? -- 2.29 What Is ENUM? -- References -- Further Reading -- Part One: IAX Protocol Specifications -- 3 IAX Uniform Resource Identifier -- 3.1 Introduction -- 3.2 Format of IAX Uniform Resource Identifiers -- 3.3 Examples of IAX Uniform Resource Identifiers -- 3.4 Comparing IAX Uniform Resource Identifiers.
3.5 IAX Uniform Resource Identifiers and ENUM -- References -- Further Reading -- 4 IAX Frames -- 4.1 Introduction -- 4.2 Full Frames -- 4.3 Mini Frames -- 4.4 Meta Frames -- 4.5 Encrypted Frames -- 4.6 Conclusion -- References -- Further Reading -- 5 IAX Information Elements -- 5.1 Introduction -- 5.2 List of IAX Information Elements -- 5.3 Example of IAX Information Element Traces -- References -- Further Reading -- 6 IAX Messages -- 6.1 Introduction -- 6.2 Taxonomy of IAX Messages -- 6.3 IAX Requests/Responses -- 6.4 IAX Functional Categories -- 6.5 IAX Media Frames -- 6.6 IAX Reliable/Unreliable Messages -- References -- Further Reading -- 7 IAX Connectivity Considerations -- 7.1 Introduction -- 7.2 IAX Transport Protocol -- 7.3 IAX Port Number -- 7.4 IAX Call Multiplexing and Demultiplexing -- 7.5 IAX Reliability Mechanism -- 7.6 Authentication and Encryption -- 7.7 Conclusion -- References -- Further Reading -- 8 IAX Operations -- 8.1 Introduction -- 8.2 Provisioning and Firmware Download -- 8.3 Registration -- 8.4 Call Setup -- 8.5 Call Tear-Down -- 8.6 Call Monitoring -- 8.7 Call Optimisation -- 8.8 Conclusion -- References -- Further Reading -- Part Two: Discussion and Analysis -- 9 IAX and Advanced Services -- 9.1 Introduction -- 9.2 CODEC Negotiation -- 9.3 Video Sessions -- 9.4 Negotiation of Several Media Types in the Same IAX Session -- 9.5 Presence Services -- 9.6 Instant Messaging -- 9.7 Topology Hiding -- 9.8 Mobility -- 9.9 Miscellaneous -- 9.10 Conclusion -- References -- Further Reading -- 10 Multi-IAX Servers Environment -- 10.1 Introduction -- 10.2 Focus -- 10.3 Discovery of IAX Resources -- 10.4 Setting End-to-End Calls -- 10.5 Load Balancing -- 10.6 Path-Coupled and Path-Decoupled Discussion -- 10.7 Forking -- 10.8 Route Symmetry -- 10.9 Conclusion -- References -- 11 IAX and NAT Traversal -- 11.1 Introduction -- 11.2 Structure -- 11.3 NAT Types -- 11.4 IAX and NAT Traversal Discussion -- 11.5 Operational Considerations -- 11.6 Conclusion -- References.
Further Reading -- 12 IAX and Peer-to-Peer Deployment Scenarios -- 12.1 Introduction -- 12.2 Scope -- 12.3 A P2P Solution for Corporate Customers -- 12.4 Conclusion -- References -- Further Reading -- 13 IAX and IPv6 -- 13.1 Introduction -- 13.2 Context and Assumptions -- 13.3 Service Migration to IPv6 -- 13.4 Structure -- 13.5 The IP Address Exhaustion Problem -- 13.6 IPv6: a Long-Term Solution -- 13.7 Why IPv6 May Be Problematic for Telephony Signalling Protocols: the SIP Example -- 13.8 IAX: an IP Version-Agnostic Protocol? -- 13.9 Deployment of IAX Services in a 'Pure' IPv6 Environment -- 13.10 Heterogeneous Environment -- 13.11 Conclusion -- References -- Further Reading -- 14 IAX: Towards a Lightweight SBC? -- 14.1 Introduction -- 14.2 IP Telephony Administrative Domain -- 14.3 Deployment Scenarios -- 14.4 Deployment Contexts -- 14.5 Service Limitations Caused by SBCs -- 14.6 Functional Decomposition -- 14.7 Taxonomy of SBC Functions in an SIP Environment -- 14.8 Validity of these Functions in an IAX Architecture -- 14.9 Conclusion -- References -- Further Reading -- Part Three: Deployment Scenarios in SIP-Based Environments -- 15 Scenarios for the Deployment of IAX-Based Conversational Services -- 15.1 SIP Complications -- 15.2 Structure -- 15.3 Beyond the 'SIP-Centric' Era -- 15.4 Methodology -- 15.5 Overall Context -- 15.6 Architectural Requirements -- 15.7 Brief Comparison -- 15.8 Taxonomy -- 15.9 Introducing IAX into Operational Networks -- 15.10 Conclusion. / -- References -- 16 IAX in the Access Segment of SIP-Based Service Architectures -- 16.1 Introduction -- 16.2 A 'High-Level' Description of the Interworking Function -- 16.3 Examples of Call Flows -- 16.4 Bandwidth Optimisation: An Extension to SIP -- 16.5 Conclusion -- References -- 17 Validation Scenario -- 17.1 Overview -- 17.2 Configuring Asterisk Servers -- 17.3 Configuring the SIP Express Router (SER) -- 17.4 User Agent Configuration -- 17.5 Conclusion -- Further Reading -- Index.
Record Nr. UNINA-9910145827203321
Boucadair Mohamed  
Chichester, U.K. : , : Wiley, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks / / Mohamed Boucadair
Inter-asterisk exchange (IAX) deployment scenarios in SIP-enabled networks / / Mohamed Boucadair
Autore Boucadair Mohamed
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , 2009
Descrizione fisica 1 online resource (275 p.)
Disciplina 004.69/5
004.695
Collana Wiley series on communications networking & distributed systems
Soggetto topico Internet telephony
Computer network protocols
ISBN 1-282-01079-4
9786612010798
0-470-74218-6
0-470-74219-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Terminology and Definitions -- Acronyms and Abbreviations -- Acknowledgement -- 1 Introduction -- 1.1 General Introduction -- 1.2 On Voice over IP and Telephony over IP -- 1.3 Context -- 1.4 Enhancement Strategies to Solve SIP Issues -- 1.5 IAX: Towards Lightweight Telephony Architectures -- 1.6 IAX and Standardisation -- 1.7 Rationale -- 1.8 What This Book is Not -- 1.9 Structure of the Book -- 2 The IAX Protocol at a Glance -- 2.1 What Does IAX Stand For? -- 2.2 Is IAX Specific to the Asterisk Platform? -- 2.3 What is the Difference between IAX2 and IAX? -- 2.4 Why another New VoIP Protocol? -- 2.5 How Does IAX Solve VoIP Pains? -- 2.6 How is Calls Multiplexing Achieved? -- 2.7 And What About Demultiplexing? -- 2.8 What Port Number Does IAX Use? -- 2.9 What Transport Protocol Does IAX Use? -- 2.10 Is IAX a Reliable Protocol? -- 2.11 How Does IAX Ensure Reliability? -- 2.12 Is there an IAX Registration Procedure? -- 2.13 Does IAX Registration Differ from SIP Registration? -- 2.14 How Are Media Streams Transported in IAX? -- 2.15 Is CODEC Negotiation Supported by IAX? -- 2.16 Is On-Fly CODEC Change Possible During a Call? -- 2.17 IAX: a Path-Coupled or Decoupled Protocol? -- 2.18 Can IAX be Aware of the Status of the Network Load? -- 2.19 What About Security? -- 2.20 Could IAX Devices Be Managed? -- 2.21 Is Firmware Version Updating Supported by IAX? -- 2.22 Can IAX Be Extended to Offer New Features? -- 2.23 How is an IAX Resource Identified? -- 2.24 What Does an IAX URI Look Like? -- 2.25 Is it Possible to Set a Call Involving Several IAX Servers? -- 2.26 Is it Possible to Discover the Location of an IAX Resource? -- 2.27 What Is DUNDi? -- 2.28 What Is TRIP? -- 2.29 What Is ENUM? -- References -- Further Reading -- Part One: IAX Protocol Specifications -- 3 IAX Uniform Resource Identifier -- 3.1 Introduction -- 3.2 Format of IAX Uniform Resource Identifiers -- 3.3 Examples of IAX Uniform Resource Identifiers -- 3.4 Comparing IAX Uniform Resource Identifiers.
3.5 IAX Uniform Resource Identifiers and ENUM -- References -- Further Reading -- 4 IAX Frames -- 4.1 Introduction -- 4.2 Full Frames -- 4.3 Mini Frames -- 4.4 Meta Frames -- 4.5 Encrypted Frames -- 4.6 Conclusion -- References -- Further Reading -- 5 IAX Information Elements -- 5.1 Introduction -- 5.2 List of IAX Information Elements -- 5.3 Example of IAX Information Element Traces -- References -- Further Reading -- 6 IAX Messages -- 6.1 Introduction -- 6.2 Taxonomy of IAX Messages -- 6.3 IAX Requests/Responses -- 6.4 IAX Functional Categories -- 6.5 IAX Media Frames -- 6.6 IAX Reliable/Unreliable Messages -- References -- Further Reading -- 7 IAX Connectivity Considerations -- 7.1 Introduction -- 7.2 IAX Transport Protocol -- 7.3 IAX Port Number -- 7.4 IAX Call Multiplexing and Demultiplexing -- 7.5 IAX Reliability Mechanism -- 7.6 Authentication and Encryption -- 7.7 Conclusion -- References -- Further Reading -- 8 IAX Operations -- 8.1 Introduction -- 8.2 Provisioning and Firmware Download -- 8.3 Registration -- 8.4 Call Setup -- 8.5 Call Tear-Down -- 8.6 Call Monitoring -- 8.7 Call Optimisation -- 8.8 Conclusion -- References -- Further Reading -- Part Two: Discussion and Analysis -- 9 IAX and Advanced Services -- 9.1 Introduction -- 9.2 CODEC Negotiation -- 9.3 Video Sessions -- 9.4 Negotiation of Several Media Types in the Same IAX Session -- 9.5 Presence Services -- 9.6 Instant Messaging -- 9.7 Topology Hiding -- 9.8 Mobility -- 9.9 Miscellaneous -- 9.10 Conclusion -- References -- Further Reading -- 10 Multi-IAX Servers Environment -- 10.1 Introduction -- 10.2 Focus -- 10.3 Discovery of IAX Resources -- 10.4 Setting End-to-End Calls -- 10.5 Load Balancing -- 10.6 Path-Coupled and Path-Decoupled Discussion -- 10.7 Forking -- 10.8 Route Symmetry -- 10.9 Conclusion -- References -- 11 IAX and NAT Traversal -- 11.1 Introduction -- 11.2 Structure -- 11.3 NAT Types -- 11.4 IAX and NAT Traversal Discussion -- 11.5 Operational Considerations -- 11.6 Conclusion -- References.
Further Reading -- 12 IAX and Peer-to-Peer Deployment Scenarios -- 12.1 Introduction -- 12.2 Scope -- 12.3 A P2P Solution for Corporate Customers -- 12.4 Conclusion -- References -- Further Reading -- 13 IAX and IPv6 -- 13.1 Introduction -- 13.2 Context and Assumptions -- 13.3 Service Migration to IPv6 -- 13.4 Structure -- 13.5 The IP Address Exhaustion Problem -- 13.6 IPv6: a Long-Term Solution -- 13.7 Why IPv6 May Be Problematic for Telephony Signalling Protocols: the SIP Example -- 13.8 IAX: an IP Version-Agnostic Protocol? -- 13.9 Deployment of IAX Services in a 'Pure' IPv6 Environment -- 13.10 Heterogeneous Environment -- 13.11 Conclusion -- References -- Further Reading -- 14 IAX: Towards a Lightweight SBC? -- 14.1 Introduction -- 14.2 IP Telephony Administrative Domain -- 14.3 Deployment Scenarios -- 14.4 Deployment Contexts -- 14.5 Service Limitations Caused by SBCs -- 14.6 Functional Decomposition -- 14.7 Taxonomy of SBC Functions in an SIP Environment -- 14.8 Validity of these Functions in an IAX Architecture -- 14.9 Conclusion -- References -- Further Reading -- Part Three: Deployment Scenarios in SIP-Based Environments -- 15 Scenarios for the Deployment of IAX-Based Conversational Services -- 15.1 SIP Complications -- 15.2 Structure -- 15.3 Beyond the 'SIP-Centric' Era -- 15.4 Methodology -- 15.5 Overall Context -- 15.6 Architectural Requirements -- 15.7 Brief Comparison -- 15.8 Taxonomy -- 15.9 Introducing IAX into Operational Networks -- 15.10 Conclusion. / -- References -- 16 IAX in the Access Segment of SIP-Based Service Architectures -- 16.1 Introduction -- 16.2 A 'High-Level' Description of the Interworking Function -- 16.3 Examples of Call Flows -- 16.4 Bandwidth Optimisation: An Extension to SIP -- 16.5 Conclusion -- References -- 17 Validation Scenario -- 17.1 Overview -- 17.2 Configuring Asterisk Servers -- 17.3 Configuring the SIP Express Router (SER) -- 17.4 User Agent Configuration -- 17.5 Conclusion -- Further Reading -- Index.
Record Nr. UNINA-9910830232403321
Boucadair Mohamed  
Chichester, U.K. : , : Wiley, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui