Best Possible Availability And Security For Ims-Based Voip Networks: Delegated Firewall Administration

Read Complete Research Material



[Best Possible Availability and Security for IMS-Based Voip Networks: Delegated Firewall Administration]

by

Abstract

The main purpose of this paper is to make an analysis on the best possible availability and security for IMS-Based Voip Networks: Delegated Firewall Administration. The IMS-Based Voip network is a very essential tool and network for the technology. Therefore, the security concerns are growing day by day for this network. Therefore, there is a great need to provide the desired security for the IMS-Based Voip networks. Voice over internet protocol (VoIP) is being widely used, while the integration of voice and data provide several opportunities. Lower cost and more flexibility are the main advantages of the VoIP which derived the attention of the enterprises to it. Unfortunately in the other extreme, some security issues may come across with the extensive use of VoIP (Ahmed, 2009, p. 58). The purpose of this review paper is to encourage the VoIP industry to consider the importance of the security matters of their application and to find the gaps by discussing the pros and cons of each application and performing the fair comparison.

Acknowledgements

In order to conduct this research proposal, I would like to thank my parents who provided me immense appreciation to conduct this research proposal. I would also like to thank my teachers who provided me full guidance whenever I needed it, and provided me complete help to develop this research proposal. I would also like to thank my fellow students who gave me support to conduct this research proposal.

Table of contents

Chapter 1: Introduction5

Background of the study5

Problem Statement6

Theoretical Framework7

Purpose of the study8

Research Questions8

Rationale of the study8

Significance of the study8

Limitation of the study9

Chapter 2: Literature Review9

VoIP Security Issues11

Summary of Literature14

Chapter 3: Materials and Methods15

Conceptual Framework16

Discussion17

Research Design18

Sampling18

Data Collection Tools19

Data Analysis19

Reliability & Validity19

Ethical issues21

References22

Best Possible Availability and Security for IMS-Based Voip Networks: Delegated Firewall Administration

Chapter 1: Introduction

Background of the study

Voice over IP or VoIP is a technique for transferring voice over networks that are based on IP protocol, basically internet. It has been bubbling under for a long time, but seems now to be gaining ground. Its cost-effectiveness, flexibility and the possibility to use the existing network for voice communication are something that enterprises and organization see worth venturing. In particular Banking, Financial Services and Insurance (also known as BFSI) have adapted VoIP in both their internal communication as well as customer service (Braun2003, p. 14).

However, while they plunge in head first, they often ignore the VoIP quality and security issues. New technologies contain bugs and problems that can, even under normal use, cause deterioration in sound quality that the users are not used to in the traditional telephone networks. Ensuring VoIP security and integrity against outside attacker is another challenge. While the traditional phone network is by no means flawless, it is in essence a closed network: an outside attacker has a hard time trying to get in. Putting the phone conversation in the internet opens them up for all the security threats of the IP based ...
Related Ads