2010-06-23 12:03:54 - Не могу записать данные в файл: /home/iwork985/domains/gambitik.ru/public_html/265604013asdfrewq/cache_gambitik_ru_f9.txt
2010-06-23 12:03:54 - Не могу записать данные в файл: /home/iwork985/domains/gambitik.ru/public_html/265604013asdfrewq/cache_gambitik_ru_f9.txt
2010-06-23 12:03:54 - Не могу записать данные в файл: /home/iwork985/domains/gambitik.ru/public_html/265604013asdfrewq/cache_gambitik_ru_f9.txt
Security issiues in VOIP Applications - My news blog

PostHeaderIcon

Security issiues in VOIP Applications

This key exchange could be carried out in multiple ways including manually sending the key or through a complex key exchange protocol. After the key exchange process, all the data between the communicating nodes will be encrypted. Even if an attacker gets access to the datagram’s, he/she will not be able decode the data immediately. As the encryption algorithm becomes complex, it becomes harder for the attacker to decode the data within the encrypted datagram.   The most likely widespread solution to the network address translation is UDP encapsulation of IPsec. This implementation is supported by the IETF and effectively allows all ESP traffic to traverse the NAT. In tunnel mode, this model wraps the encrypted IPsec packet in a UDP packet with a new IP header and a new UDP header, usually using port 500.  Problems arising from VOIPsec   There are certain issues associated with VOIP that are not applicable to normal data traffic. Chief among them are latency, jitter, and packet loss. These issues are introduced into the VOIP environment because it is a real time media transfer. In standard data transfer over TCP, if a packet is lost, it can be resent by request. In VOIP, there is no time to do this. Packets must arrive at their destination and they must arrive fast.  Solutions to VOIPsec issues   Latency: When an end to end encryption is performed in VOIP it (cryptographic engine) introducesthe studies reveals that cryptographic engine as a bottleneck for voice traffic transmitted over IPsec.   One proposed solution to the bottlenecking at the routers due to the encryption issues is to handle encryption/decryption solely at the endpoints in the VOIP network [33].

Pages: 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14


Add comment:
Name:
Sait link: http://
Your message:
Enter today\\\\'s date, 2 digits
(spam protection):
 



News

Types of Car Insurance Policies

Types of Car Insurance PoliciesAuthor: Amy Nutt.The law requires that anyone who drives a car must have car insurance. Purchasing car insurance involves buying a policy from an insurance provider. The premium you pay depends on a number of factors such as age, gender, and the make, model, and year of the car. When you look for an insurance policy that will provide you with appropriate coverage, it is important to understand the types of car insurance policies that are available.



Popular

Want To Earn Or Make Online Money Quickly And Easily Today?

Want To Earn Or Make Online Money Quickly And Easily Today?Author: C. LawrenceThe question really goes: do you want to earn or make online money, or do you want to earn big online money today. There is a difference you know. Some people can earn or make online money by simply setting up a website and selling wares. This can easily be seen in the countless websites selling specific products, or advertising services or even promoting ideas to sell. You can do this in 2 ways too.



New!

What to Eat to Gain Muscle Mass Quickly and Naturally

What to Eat to Gain Muscle Mass Quickly and NaturallyAuthor: David KamauThe saying that "you are what you eat" holds true when it comes to muscle building. Many people ask what to eat to gain muscle quickly and naturally, without pills and needles. Well, it is not just a question of what but also how.The first thing you should think of, as any professional bodybuilder will tell you, is protein. Protein is what builds up muscle mass and strength, and not getting enough of it could live you frustrated.