Ebook "Network security technologies" presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.
The Internet Protocol (IP) Multimedia Subsystem, better known as "The IMS", is
based on the specification of the Session Initiation Protocol (SIP) as standardized by
the Internet Engineering Task Force (IETF). But SIP as a Protocol is only one part
of it; the IMS is more than just a protocol. It is an architecture for the convergence of
data, speech and mobile networks and is based on a wide range of protocols, of
which most have been developed by the IETF.
Two areas in which automation tools would be
of great use to administrators of security policies
are: reasoning about policies where the goal
might be, for instance, detecting inconsistencies
between a new security policy rule and an
existing policy; and in finding network
configurations which satisfy a set of policies.
Security policies expressed in terms of firewall
configuration are complicated and difficult to
reason about, both for man and machine.
SYSTEM ANALYSIS FUNDAMENTALS
FUNDAMENTALS OF SYSTEM ANALYSIS
Third generation systems focus on providing a universal platform to afford multifarious communications options at all levels, i.e. the radio as well as the core network sides. This implies the application of optimum techniques in multiple access and interworking protocols for the physical and upper layers, respectively.
EVOLUTION OF VoIP SIGNALING PROTOCOLS1
This chapter reviews the existing and emerging VoIP signaling and call control protocols. In PSTN networks, ISUP (ISDN user part) and TCAP (transaction capabilities application part) messages of the SS7 protocol  are commonly used for call control and interworking of services. The ﬁrst generation (released in 1996) of VoIP signaling and media control protocols, such as ITU-T’s H.225/H.245—deﬁned under ITU-T’s H.323 umbrella protocol —was intended to o¤er LAN-based real-time VoIP services....
Summary ISUP provides a rich network interface to call processing at an SSP. The increased bandwidth and protocol standardization allow a greater range of services that are able to interwork both within a network and across network boundaries