Presenting Solutions to Increase Simultaneous Call in VOIP System by SIP Protocol - Based Media Server
暂无分享,去创建一个
[1] Roni Even,et al. Conferencing Scenarios , 2006, RFC.
[2] Nikos Vrakas,et al. Obscuring users' identity in VoIP/IMS environments , 2014, Comput. Secur..
[3] George C. Polyzos,et al. On the performance of secure user-centric VoIP communication , 2014, Comput. Networks.
[4] Jonathan D. Rosenberg,et al. Network Working Group a Framework for Conferencing with the Session Initiation Protocol (sip) , 2022 .
[5] Fatemeh Samsami,et al. E-learning Media Server Evaluation and its architecture modeling with signaling load tests , 2013 .
[6] Liping Zhang,et al. An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks , 2016, J. Netw. Comput. Appl..
[7] M. A. Qadeer,et al. Voice - Video Communication on Mobile Phones and PCs' Using Asterisk EPBX , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[8] Craig Partridge. Isochronous applications do not require jitter-controlled networks , 1991, RFC.
[9] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[10] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[11] Daeyoung Kim,et al. Performance Enhancement of SIP proxy server by using lhash for matching transaction , 2007, The 9th International Conference on Advanced Communication Technology.
[12] Mauro Femminella,et al. Design, Implementation, and Performance Evaluation of an Advanced SIP-Based Call Control for VoIP Services , 2009, 2009 IEEE International Conference on Communications.
[13] Jingyu Wang,et al. Probe-based end-to-end overload control for networks of SIP servers , 2014, J. Netw. Comput. Appl..
[14] Eduardo Casilari,et al. A Comparative Study of VoIP Standards with Asterisk , 2009, 2009 Fourth International Conference on Digital Telecommunications.
[15] Xinyuan Wang,et al. Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation , 2014, Int. J. Crit. Infrastructure Prot..
[16] Regis J. Bates. Securing VoIP: Keeping Your VoIP Network Safe , 2014 .
[17] D. Kukolj,et al. Comparison of SIP and H.323 Protocols , 2008, 2008 The Third International Conference on Digital Telecommunications (icdt 2008).