Key management is a fundamental part of protecting Internet multimedia applications like VoIP, but the protocols can be difficult to design. Securing VoIP Networks explains the current and emerging key management security, amid detailed charts to guide you through the process of securing your network.
Chapter 3 of "IPTV Crash Course" by Joseph Weber and Tom Newberry presents an overview of IP suite data transmission basics and advanced protocols that IPTV utilizes in creating a television service supported by the Internet.
"SIP Architecture" explains how SIP revolutionized the Internet communication industry, and helps you to understand the functions and features of the system.
In this chapter, you'll read about some of the more popular Cisco CME phone and call processing features. You will see examples of how these features can be configured and combined to provide a rich and flexible set of functions. You will also see how to configure call transfer and forwarding functions in a variety of network scenarios.
Converging voice and data on the same wire, regardless of the protocols used, ups the ante for network security engineers and managers. One consequence of this convergence is that in the event of a major network attack, the organization's entire telecommunications infrastructure can be at risk. Securing the whole VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use.
"VoIP: An In-Depth Analysis," discusses some of the issues that both developers and users need to consider when working with VoIP.
VoIP technolgies are not immune to system failures, from hacking to jitter, and these issues can present problems for companies who depend on their network. This chapter examines some of the issues that are faced by VoIP systems, focusing on those that can be addressed by IPv6, namely scalability and end-to-end robustness.
This was first published in December 2007