跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.172) 您好!臺灣時間:2024/12/13 22:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:羅燕芳
研究生(外文):YEN-FANG LO
論文名稱:運作於IMS之會談邊界控制器實證分析
論文名稱(外文):Hands-on Experiments on Session Border Controller for IMS
指導教授:鄭伯炤
指導教授(外文):Bo-Chao Cheng
學位類別:碩士
校院名稱:國立中正大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
畢業學年度:97
語文別:中文
論文頁數:79
中文關鍵詞:會談邊界控制器網路整合本籍用戶伺服器IP多媒體子系統會談啟始通信協定
外文關鍵詞:IP multimedia subsystemSIP(Session Initiation Protocol)network convergenceHSS( Home Subscriber Server)Session Border Controller
相關次數:
  • 被引用被引用:1
  • 點閱點閱:944
  • 評分評分:
  • 下載下載:21
  • 收藏至我的研究室書目清單書目收藏:0
採用會談啟始通信協定(SIP)系統架構, IP多媒體子系統(IMS)提供了重要的多媒體系統特性(如集中管理與漫遊支持)。因為穿越眾多的IP 網路邊界,IMS必需面對IP網路安全和相互聯繫的問題,為了成功管控所有的安全威脅和系統協商,這些問題皆需以更實際的方式解決。會談邊界控制器(SBC)是一個普通且有效的設備,藉由SIP, SBC被置於信號和/或媒體路徑中, 與其他重要的安全設備共同運作(例如防火牆,驗証和IPsec閘道器)。 準此,SBC能提供VoIP呼叫往返於一個被保護的IP網路。
此篇論文的目的是探討SBC的重要性與如何將SBC部署在不同的位置/情況(例如:電信業者至企業/家庭用戶之接取與電信業者至電信業者互連問題解決方案)。此研究亦對現時在市場上主要的SBC產品提供綜合性的勘探訊息。藉由廣泛的實驗實作(如追蹤呼叫流程與詮釋http認證),這篇論文為熟諳SBC的運作提供了一個好的起步。
Adopting the Session Initiation Protocol (SIP) system structure, IP Multimedia Subsystem (IMS) provides key multimedia system characteristics (such as centralized management and roaming support). Crossing over numerous borders of IP networks, IMS needs to face IP network security and interconnection issues that must be resolved in a more practical way so as to manage all threats security and system negotiations successfully.Session Border Controller (SBC) is a common and effective device, which is inserted into the signaling and/or media paths via SIP, to cooperate along with other strategical security equipments (such as firewall, authentication and IPsec gateway).As such, SBC is able to provide VoIP calls to and from a protected IP network.
It is the purpose of this thesis to explore the importance of SBC and determine what if SBC is deployed at the different locations/scenarios (e.g., carrier-to-enterprise/residential access and carrier-to- carrier access solutions). This research also provides comprehensive survey information on current main SBC products in the market. Through the extensive hands-on laboratory (such as tracing call flow and interpreting http authentication), this thesis offers a good starting point for understanding the operations of SBC.
誌謝辭 I
摘要 II
英文摘要 III
目錄 IV
圖目錄 V
表目錄 VI
第一章 緒論 1
1.1 研究背景 1
1.2 研究動機與目的 2
第二章 文獻討探 4
2.1 IMS 的技術與發展 4
2.2 IMS 網路分析 9
第三章 IMS 基本通訊協定介紹 18
3.1 SIP 議題 18
3.2 SDP 探討 25
3.3 RTP 簡介 27
3.4 TLS 與 IPSEC 分析 30
第四章 IMS 安全機制探討 35
4.1 IMS 安全議題 35
4.2 VOIP安全聯盟 38
第五章 SBC運用分析 40
5.1 SBC機能運用 40
5.2 SBC運用實證 48
第六章 結論與建議 60
參考文獻 62
附錄 中、英名詞彙編 66
作者簡介 68
[1]3GPPTS23.228v7.10.0. ,“IP Multimedia Subsystem (IMS) ” , Stage 2 .2007.
[2] http://www.3GPP.org
[3]3GPP TS 23.228 V5.13.0. ,“Technical Specification Group Services and System Aspects;IP Multimedia Subsystem (IMS) ” , Stage 2 ,2004-12
[4]J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley E. Schooler , “ SIP: Session Initiation Protocol ”RFC3261, 2002
[5]ETSI ES282 007., “IP Multimedia Subsystem (IMS) Functional Architecture ” , 2006
[6]Amit Mukhopadhyay & Carlos Urrutia-Valdés , “ IP Multi-media core network Subsystem (IMS):Enabler of Next Generation Services ” November , 2004
[7]http://www.TISPAN.org [4]ETSI ES282 007., “ IP Multimedia Subsystem (IMS) Functional Architecture ” , 2006.
[8]Inge Grønbæk , “NGN, IMS and service control – collected information”, N 31/2006
[9]3GPPTS29.228v7.5.0. ,“IP Multimedia (IM) subsystem Cx and Dx interfaces signalling flows and message contents (Release 7)”, 2007
[10]Christian Julien Sophia, “Converged Fixed-Mobile solutions:The TISPAN NGN approach ” ,22 November 2004
[11]3GPP TS 23.002 V5.12.0.,“ Technical Specification Group Services and Systems Aspects;Network architecture(Release 5) ” , 2003-09
[12]3GPP TS33.210v7.2.0. ,“Network Domain Security: IP network layer security (Release 7) ” , 2006.
[13]周昭光,“IMS系統簡介” ,2007
[14]H. Schulzrinne S. Casner R. Frederick V. Jacobson , “RTP: A Transport Protocol for Real-Time Applications” RFC 3550, July 2003
[15]M. Baugher D. McGrew M. Naslund E. Carrara K. Norrman , “The Secure Real-time Transport Protocol (SRTP) ”RFC 3711,March 2004
[16]S. Kent R. Atkinson,“ Security Architecture for the Internet Protocol” RFC 2401 ,November 1998
[17]D. Maughan M. Schertler M. Schneider J. Turner ,“Internet Security Association and Key Management Protocol (ISAKMP) ” RFC 2408 ,November 1998
[18]C. Kaufman, “ Internet Key Exchange (IKEv2) Protocol” RFC 4306 ,December 2005
[19]李承樺,“3G-WLAN安全架構”
[20]李忠憲,“Voice over IP & VoIP Security”
[21]林毓達,“VoIP系統的安全問題與測試方法”,網路通訊,173期2005 12月
[22]鄒應殿 ,“ VoIP網路安全介紹”
[23]3GPP2 S.S0086-B ,“IMS Security Framework” , Version: 2.0 , February 2008
[24]ERICSSON,“IMS Security” , 2006
[25]3GPP TS33.203v7.5.0. ,“Access security for IP-based services (Release 7) ” , 2007.
[26]Niemi J. Arkko V. Torvinen ,“ Hypertext transfer protocol (HTTP) digest authentication using authentication and key agreement(AKA) ”. RFC3310, IETF.,2002.
[27]Poikselka, Miikka (EDT)/ Mayer, Georg/ Khartabil, Hisham/ Niemi, Aki Baker & Taylor Books , “The IMS: IP Multimedia Concepts and Services” ,2006
[28]P. Calhoun J. Loughney E. Guttman G. Zorn J. Arkko ,“Diameter Base Protocol” RFC 3588 ,September 2003
[29]3GPP TS35.206v6.0.0. ,“ Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, Document2: Algorithm specification (Release 6) ” , 2004-l
[30]Telecommunications Magazine, “Session Border Control: making dreams reality”,September 2003
[31]Newport Networks ,“http://www.newport-networks.com/whitepapers/index.html”, Referenced 2008
[32]Acme Packet ,“http://www.acmepacket.com/html/page.asp?PageID={06E4AEBC-24E2-46CC-BA95-7C74288FA45B}”, Referenced 2009
[33]Camarillo G., “Functionality of Existing Session Border Controller (SBC)”, Internet-Draft, Work in Progress , January 2005
[34]Gladwin Dave, “Inter-working IPv4/IPv6: Crossing the Generation Gap”, Conference presentation at International SIP 2005 Paris, January 2005
[35]J. Franks P. Hallam-Baker J. Hostetler S. Lawrence P. Leach A. Luotonen L. Stewart ,“ HTTP Authentication: Basic and Digest Access Authentication” RFC2617, IETF. , 1999
[36]Mika Heikki Lehtinen ,“ Session Border Controller and IP Multimedia Standards ”Helsinki, Finland ,November 11 2005
[37]IEEE Computer, “Will Interoperability Problems Give IP Telephony a Busy Signal?”,March 2004
[38]M. Handley V. Jacobson ,“SDP: Session Description Protocol” RFC2327 ,April 1998
[39]J. Arkko V. Torvinen G. Camarillo A. Niemi T. Haukka, “Security Mechanism Agreement for the Session Initiation Protocol (SIP) ” , January 2003
[40]Evert, “HTTP Basic and Digest authentication with PHP” ,2009-02
[41]http://www.newport-networks.com/product/SBC.html ,Referenced 2009
[42]http://www.vpvp.com/kagoor_networks ,Referenced 2009
[43]http://tt.acesuppliers.com/news/new_1_15816.html, 2008-10
[44]電子時報 記者曹乙帆卅台北,http://www.wretch.cc/blog/leekming/4432823 , 2005-12-28
[45]http://www.voipsa.org/
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top