Introduction:
IMS is mainly an enabling technology it does not directly implement complete useful end user application, rather it offers a standard layer to run multimedia applications. These applications include: VoIP, Presence, Instant Messaging, push-To-Talk and Video Conferencing [2]. The IMS architecture provide a number of benefits which include better person-to-person communications; enhanced interaction between media streams which enables easy integration and interworking of different IP-based services; better service mobility which makes it possible to offer services over various access networks and provide opportunity for third-party developers and vendors to easily create and integrate new solutions through well-defined APIs and standards [1].
Based on SIP IMS is IP-based service control and management system that sets up an overlay on the under-laying transport infrastructure and offer the option of end-to-end IP based multimedia services. IMS is changing the implementation and deployment of telecommunication services very significantly. With these changes there are challenges as well that IMS is facing in its widespread deployment. Some challenges are those that IMS has inherited from IP and SIP as these two are its base [4]. Most of the challenges IMS facing are related to security, some of the most important of them are discussed in my paper and explained that how they are affecting the deployment of IMS. In some other challenges include the Regulatory and Law constraints and user centric control are also affecting its widespread deployment and use.
IP Multimedia Subsystem:
Today, the entire Telecommunication service provider’s community is planning to change their Infrastructure to offer their custome...
... middle of paper ...
....1.0, March 2006.
[3] D. Rahadian, “IP Multimedia Subsystem (IMS) and Its Comparison with Different Systems,” presented at Seminar in High Performance Network Architecture (HPNA), University of Stuttgart, Germany, 2005.
[4] Hunter, M. T., Clark, R. J., and Park, F. S. 2007. Security issues with the IP multimedia subsystem (IMS). In Proceedings of the 2007 Workshop on Middleware For Next-Generation Converged Networks and Applications (Port Beach, California, November 26 - 26, 2007). MNCNA '07. ACM, New York, NY, 1-6. DOI= http://doi.acm.org/10.1145/1376878.1376887
[5]Islam, S. and Grégoire, J. 2009. User-centric service provisioning for IMS. In Proceedings of the 6th international Conference on Mobile Technology, Application & Systems (Nice, France, September 02 - 04, 2009). Mobility '09. ACM, New York, NY, 1-8. DOI= http://doi.acm.org/10.1145/1710035.1710040
Verizon offers a variety of services and products for its customers including: 100% 4G LTE wireless networks, largest portfolio of wireless devices and smartphones in the market, high speed broadband internet, television and interactive devices, and enterprise solutions information technology. The existence and size of Verizon’s current infrastructure as it relates to its retail locations, wireless coverage area, and its global ip network are above peer in comparison with its primary competitors. The global ip network itself spans over 150 countries and more than 2,700 cities. Meanwhile, Verizon is also the U.S. largest wireless provider and has more 4G LTE wireless coverage than all other networks combined.
The industry has loyal customers with broad customer base that lowers the collective bargaining power of buyers to medium. The switching cost is very low and thus the customers can turn to a service provider who provide faster and innovative service but this is overcome by customized services and integrating into their customer supply chain.
Years later, the Telecommunication Act of 1996 triggered dramatic changes in the competitive landscape. SBC Communications Inc. established itself as a global communications provider by acquiring Pacific Telesis Group and becoming the new AT&T. The merger of AT& T and BellSouth, along with the ownership consolidation of Cingular Wireless and YELLOWPAGES.COM, will speed convergence, competition and continued innovation in the communications and entertainment industry, creating new solutions for consumers and businesses and positioned to lead the industry in one of its most signifi...
The world is experiencing a communications revolution. The Internet, e-Commerce and other developments (including the convergence of communication technologies) are profoundly reshaping economic and social life. AT&T must position itself to meet the challenge of this revolution. The strategic development of information-based industries is a key to the future social and economic development of the world.
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
A. A. IP Cameras Keep Watching. PC World 30.10 (2012): 42. MAS Ultra - School Edition. Web. The Web.
Telecommunications gained mainstream attention in the early 90’s; however the initial key market was business men and women, who used their phones whilst being on the move and so allowing them to communicate with their companies with ease. Though in the modern era, telecommunication went through segmentation in the market trends, and now in this day and age it would be difficult to find someone who does not own some form of mobile technology. Many phone providers battle to provide the best service for their customers (Figure 1).
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
It has been demonstrated that a number of interoperable systems must be implemented to fully protect a network; a strategy known as Defense in Depth. Due to the multitude of security devices and device categories available, it can be very difficult to identify the correct tools for meeting security goals. Using the Defense in Depth strategy will require an understanding of the interactions between devices occuring within the network.
The media extensions for the Intel Architecture (IA) were designed to enhance performance of advanced media and communication applications. The MMX™ technology provides a new level of performance to computer platforms by adding new instructions and defining new 64-bit data types, while preserving compatibility with software and operating systems developed for the Intel Architecture.
In conclusion, this research has established that development of the TCP / IP protocol was a major step in improving communication between systems. It provided many applications which run on the protocol and thus providing many services that were not available before. It is therefore important to make use of these services in order to provide quality communication.
capacity and performance. However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats. To combat those threats and ensure that e-business transactions are not compromised, security technology must play a major role in today's networks.
The Session Initiation Protocol is an Application Layer protocol that can run on User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP) and Transmission Control Protocol (TCP). It facilitates the initiation, termination and modification of communication session between individual or multiple recipients (unicast or multicast session), it does not know about the details of a session. SIP also supports redirection services, which make users to initiate and receive communication services from any location or network. In November 2000, SIP was accepted as permanent element of IP Multimedia System (IMS) architecture and 3GPP signaling protocol for IP-based streaming multimedia services in cellular systems.
switching behaviour. Literature reveals about the factors of switching cost, better customer care services, networking coverage, advertising , etc for switching behaviour of customers. The researchers identify the problem of industry that if one firm gains then other must be losing a customer. Number of network providers are increasing calling for an intense competition. Empowerment of technology has led to growth of mobile industry more economical.
The TCP/IP is the most important internet operation protocol in the world. While IP protocol performs the mass of the functions which is needed for the internet to work. It does not have many capabilities which are essential and needed by applications. In TCP/IP model these tasks are performed by a pair of protocols that operate at the transport layer. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). These two protocols are vital when it comes to delivering and managing the communication of numerous applications. To pass on data streams to the proper applications the Transport layer must identify the target application. First, to be able to attain this, Transport layer assigns an application an identifier. In the TCP/IP model call this identifier a port number. Every individual software process needing to access the network is assigned a un...