Skip to main content

Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3446 Accesses

Abstract

IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in the existing PSTN networks. In addition to this, data network vulnerabilities affect the VOIP service causing a drop in the utilisation of voice communication. In this paper, the quality of service for voice calls is ensured with the integration of CAC mechanism with the bandwidth link utilization which makes an estimation of the demanded bandwidth. In terms of security, prevention of ARP cache poisoning attack is done by use of the signed MAC address response in local area networks. It makes the network confident that the admitted user is the authorized user and also it verifies that only the authorized users’ information is exchanged over the local area network. Also an approach that makes it difficult for the hacker to hack the data exchanged over the quality channel is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, S., Xuan, D., Bettati, R., Zhao, W.: Providing Absolute Differentiated Servicesfor Real-Time Applications in Static Priority Scheduling Networks. IEEE/ACM Trans. Networking 12(2), 326–339 (2004)

    Article  Google Scholar 

  2. Wang, S., Xuan, D., Bettati, R., Zhao, W.: Differentiated Services with Statistical RealTime Guarantees in Static-Priority Scheduling Networks. In: Proc. IEEE Real-Time Systems Symp. (December 2001)

    Google Scholar 

  3. Chong, S., Li, S.: Characterization Based Connection Control for Guaranteed Servicesin High Speed Networks. In: Proc. IEEE Infocom (April 1995)

    Google Scholar 

  4. Agrawal, G., Chen, B., Zhao, W., Davari, S.: Guaranteeing Synchronous Message Deadlines with the Timed Token Protocol. In: Proc. IEEE Int’1 Conf. Distributed Computing Systems (June 1992)

    Google Scholar 

  5. Jamin, S., Shenker, S., Danzig, P.: Comparison of Measurement-Based Admission Controller-Load Service. In: Proc. IEEE Infocom (April 1997)

    Google Scholar 

  6. Abad, C.L.: An analysis on the schemes for detecting and preventing ARP cache poisoning attack. In: IEEE Processing ICDCSW 2007 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Subashri, T., Gokul Vinoth Kumar, B., Vaidehi, V. (2010). Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics