Dissertations / Theses on the topic 'Voix sur IP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Voix sur IP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Abdelnur, Humberto Jorge Festor Olivier. "Gestion de vulnérabilités voix sur IP." S. l. : Nancy 1, 2009. http://www.scd.uhp-nancy.fr/docnum/SCD_T_2009_0005_ABDELNUR.pdf.
Full textAbdelnur, Humberto Jorge. "Gestion de vulnérabilités voix sur IP." Thesis, Nancy 1, 2009. http://www.theses.fr/2009NAN10005/document.
Full textVoIP networks are in a major deployment phase and are becoming widely accepted due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality. Assuring its security becomes crucial. Among the most dangerous threats to VoIP, failures and bugs in the software implementation will continue rank high on the list of vulnerabilities. This thesis provides three contributions towards improving software security. The first is a VoIP specific security assessment framework integrated with discovery actions, data management and security attacks allowing to perform VoIP specific assessment tests. The second contribution consists in an automated approach able to discriminate message signatures and build flexible and efficient passive fingerprinting systems able to identify the source entity of messages in the network. The third contribution addresses the issue of detecting vulnerabilities using a stateful fuzzer. It provides an automated attack approach capable to track the state context of a target device and we share essential practical experience gathered over a two years period in searching for vulnerabilities in the VoIP space
Gordon, David. "La sécurité de la voix sur IP." Mémoire, Université de Sherbrooke, 2008. http://savoirs.usherbrooke.ca/handle/11143/4859.
Full textKoenig, Lionel. "Masquage de pertes de paquets en voix sur IP." Thesis, Toulouse, INPT, 2011. http://www.theses.fr/2011INPT0010/document.
Full textPacket loss due to misrouted or delayed packets in voice over IP leads to huge voice quality degradation. Packet loss concealment algorithms try to enhance the perceptive quality of the speech. The huge variety of vocoders leads us to propose a generic framework working directly on the speech signal available after decoding. The proposed system relies on one single "hidden Markov model" to model time evolution of acoustic features. An original indicator of continuous voicing is added to conventional parameters (Linear Predictive Cepstral Coefficients) in order to handle voiced/unvoiced sound. Finding the best path with missing observations leads to one major contribution: a modified version of the Viterbi algorithm tailored for estimating missing observations. All contributions are assessed using both perceptual criteria and objective metrics
Nassar, Mohamed. "Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP." Phd thesis, Université Henri Poincaré - Nancy I, 2009. http://tel.archives-ouvertes.fr/tel-00376831.
Full textNotre travail combine deux domaines: celui de la sécurité des réseaux et celui de l'intelligence artificielle. Nous renforcons les mécanismes de sécurité existants en apportant des contributions sur trois axes : Une approche basée sur des mécanismes d'apprentissage pour le monitorage de trafic de signalisation VoIP, un pot de miel spécifique, et un modèle de corrélation des évenements pour la détection d'intrusion. Pour l'évaluation de nos solutions, nous avons développés des agents VoIP distribués et gérés par une entité centrale. Nous avons développé un outil d'analyse des traces réseaux de la signalisation que nous avons utilisé pour expérimenter avec des traces de monde réel. Enfin, nous avons implanté un prototype de détection d'intrusion basé sur des règles de corrélation des événements.
Bassil, Carole. "SVSP (Secure Voice over IP Simple Protocol) une solution pour la sécurisation de la voix sur IP." Phd thesis, Télécom ParisTech, 2005. http://pastel.archives-ouvertes.fr/pastel-00001577.
Full textBassil, Carole. "SVSP, Secure voice over IP simple protocole, une solution pour la sécurisation de la voix sur IP /." Paris : École nationale supérieure des télécommunications, 2006. http://catalogue.bnf.fr/ark:/12148/cb40208342h.
Full textBassil, Carole. "SVSP (Secure Voice over IP Simple Protocole) : une solution pour la sécurisation de la voix sur IP." Paris, ENST, 2005. http://www.theses.fr/2005ENST0045.
Full textSince the invention of the first telephone by Alexander Graham Bell in 1869, network telephony technology did not stop evolving: from circuit switching to packet switching, from fixed network to wireless network. Several new architectures were created which combines the transport of voice, data and image in the same data network. The nature of these open networks has an impact on the voice in terms of security. This yields to the imminent need to secure voice communications while insuring a good quality of service to the voice as well in fixed, wireless and IP networks. Different security solutions are proposed for the data. But partial even incomplete solutions are proposed for the voice. First, we define the needs for securing the telephony and the security services required. Thus, we analyze the security offered by the different telephone networks, namely the security in the traditional telephone network (PSTN and ISDN), in the mobile networks (GSM and UMTS), and in the IP network based on the H. 323 and SIP architectures. This will allow us to compare the security solutions offered by these telephony architectures and to be able to present their advantages and limitations and the security requirements that they cannot satisfy. This analysis drives us to an eloquent result that is the absence of a complete end to end security solution that complies with the security requirements of telephony. Secondly, we propose security architecture for a unified telephony architecture. This security architecture proposes a service layer that is inserted between N and N + 1 layers of the OSI reference model. This choice provides a transparency and an independence of the underlying network but requires reviewing the interfaces and therefore the needs to define an API between the security application and the underlying network that insures transparency. This architecture provides the security services and defines necessary security policies to secure voice communications. Following the security architecture, we defined a security protocol that we named SVSP for Simple Voice Security Protocol. SVSP satisfies the security services defined by this architecture that provides a secure end-to-end phone call. Studies were carried out to integrate it in different telephony infrastructures, namely with the traditional telephone network, GSM the mobile network and with the H. 323 standard for voice over IP communications. A prototype of SVSP was implemented followed by integrating it with SIP the IETF voip standard
Meddahi, Ahmed. "Voix sur IP : Modèles et architectures pour l'évaluation et l'optimisation des performances." Evry, Institut national des télécommunications, 2005. http://www.theses.fr/2005TELE0003.
Full textThere is a large consensus on the adoption of packetized media transmission in the near future. We can see that video broadcast has greatly benefited from these techniques (DVD, satellite and cable) and that audio is following. Voice is in our opinion the last medium to " resist " and this is due to the legacy circuit switched networks that have to be first replaced by packet switched ones. As voice is still occupying a large market share in telecommunications business, there is a serious concern from the operators' side as to offer at least the current " circuit switched " quality for future voice over IP communications. Also, " Despite huge efforts, the Internet (not IP) is incapable of carrying real-time or delaysensitive traffic ". So, before expecting a widespread deployment of Internet telephony, critical issues must be solved. The detailed analysis of the existing protocols and architectures models for voice over IP services, shows that performances optimization is necessary. For this, we propose several original contributions and prove that these propositions clearly improve global performances of the existing protocols and architectures for voice over IP, while assuring compatibility. These propositions are : -" Smart Profile ", a model and architecture for SIP performance optimization, particularly well adapted when network conditions are not satisfactory. Effectively, situations where bandwidth saving or availability is a constraint, the impact on the establishment delays can be significant. This is essentially due, to the textual format of SIP protocol but also, to the messages flow required for accessing to " complex " services. This model, minimizes establishment delays for a low level of complexity. " Smart Profile ", is an approach based on methods between " caching " and " compression " techniques. -" Packet-E-Model ", a model for the subjective and dynamic quality evaluation for voice over IP. This new model, extends and adapts the classical " E " model from the ITU-T G. 107 recommendation, to the particular context of IP networks, characterized by a high variability and complexity. It computes and provides a " MOS " type score, reflecting the subjective quality of the voice communication. " Packet-E-Model ", takes into account parameters such as delay or packet losses, " observed " on the IP path, for " MOS " calculation on a packet per packet basis. -" MOSQoS ", an architecture model for dynamically, controlling and adjusting Quality of Service (QoS), depending on the measurement and variability of voice quality. Classical QoS models are not much adapted to the particular characteristics of " VoIP ", for example in a mobility context, where voice quality perception can change dynamically during a session. So, this model, enables dynamic allocation of network resources, based on the " MOS " score variability which, represents the subjective quality (human perception) of the VoIP session. Feasibility and performance studies, resulting from simulation but also from implementation on different test-beds are very satisfactory and show that optimization is globally achieved. Results analysis shows the robustness of our contributions. Also, the models we proposed can be easily integrated in existing " VoIP " architectures
Mayorga, Ortiz Pedro. "Reconnaissance vocale dans un contexte de voix sur IP : diagnostic et propositions." Grenoble INPG, 2005. http://www.theses.fr/2005INPG0014.
Full textThe purpose of This work of thesis is to diagnose the new challenges for the speech recognition in the recent context of the voice over IP, and to propose some solutions making it possible to improve the performances of the automatic recognition systems. The first contribution of our work consequently consisted in diagnosing most precisely possible the problems due to the compression and the packet losses for two different recognition tasks: the automatic speech recognition and automatic speaker recognition. From the diagnosis result, we noted a more important degradation due to the compression on the speaker verification task. With regard to the automatic speech recognition, the most important degradation was caused by the packet losses. The second contribution of this thesis thus corresponds to the proposal for recovering techniques in order to improve the robustness of systems under significant packet losses conditions. The recovery techniques were applied on the basis of transmitter and receiver. The experimental results show that the techniques of interleaving based on the transmitter combined with the interpolation based on the receiver, prove to be the most efficient. In addition, our experiments also confirm the advantages of a "distributed architecture" where acoustic vectors traveling on the network from the client to the recognition server (concept of "distributed speech recognition" proposed by the international organization ETSI), compared to an architecture more traditional type "server pure" where the signal (or its compressed version) travels from the client terminal on the network to the recognition server
Trad, Abdelbasset. "Déploiement à grande échelle de la voix sur IP dans des environnements hétérogènes." Phd thesis, Nice, 2006. http://tel.archives-ouvertes.fr/tel-00406513.
Full textNagle, Arnault. "Enrichissement de la conférence audio en voix sur IP au travers de l'amélioration de la qualité et de la spatialisation sonore." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00003525.
Full textOuakil, Laurent. "Filtrage et qualité de service pour la téléphonie sur IP dans une architecture de gestion par politique dédiée au nomadisme et à la mobilité." Paris 6, 2006. http://www.theses.fr/2006PA066542.
Full textElleuch, Wajdi. "Mobilité des sessions dans les communications multimédias en mode-conférence basées sur le protocole SIP." Thèse, Université de Sherbrooke, 2011. http://hdl.handle.net/11143/5799.
Full textKhadra, Ali. "Amélioration de la robustesse de décodeurs de parole basés sur le modèle CELP en utilisant les informations retardées application au standard G.729 pour la voix sur IP." Mémoire, Université de Sherbrooke, 2003. http://savoirs.usherbrooke.ca/handle/11143/1229.
Full textNassar, Mohamed. "VoIP Networks Monitoring and Intrusion Detection." Thesis, Nancy 1, 2009. http://www.theses.fr/2009NAN10021/document.
Full textVoice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services and reducing operational costs. The large-scale deployment of VoIP has been leveraged by the high-speed broadband access to the Internet and the standardization of dedicated protocols. However, VoIP faces multiple security issues including vulnerabilities inherited from the IP layer as well as specific ones. Our objective is to design, implement and validate new models and architectures for performing proactive defense, monitoring and intrusion detection in VoIP networks. Our work combines two domains: network security and artificial intelligence. We reinforce existent security mechanisms by working on three axes: a machine learning approach for VoIP signaling traffic monitoring, a VoIP specific honeypot and a security event correlation model for intrusion detection. In order to experiment our solutions, we have developed VoIP agents which are distributed and managed by a central entity. We have developed an analyzer of signaling network traces and we used it to analyze real-world traces. Finally, we have implemented a prototype of a rule-based event-driven intrusion detection system
Khadra, Ali. "Amélioration de la robustesse de décodeurs de parole basés sur le modèle CELP en utilisant les informations retardées : application au standard G.729 pour la voix sur IP = Improving the robustness of CELP-like speech decoders using late-arrival packets information : application to G.729 standard in VoIP." Sherbrooke : Université de Sherbrooke, 2004.
Find full textCorre, Kevin. "User controlled trust and security level of Web real-time communications." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S029/document.
Full textIn this thesis, we propose three main contributions : In our first contribution we study the WebRTC identity architecture and more particularly its integration with existing authentication delegation protocols. This integration has not been studied yet. To fill this gap, we implement components of the WebRTC identity architecture and comment on the issues encountered in the process. In order to answer RQ1, we then study this specification from a privacy perspective an identify new privacy considerations related to the central position of identity provider. In the Web, the norm is the silo architecture of which users are captive. This is even more true of authentication delegation systems where most of the time it is not possible to freely choose an identity provider. In order to answer RQ3, we conduct a survey on the top 500 websites according to Alexa.com to identify the reasons why can't users choose their identity provider. Our results show that while the choice of an identity provider is possible in theory, the lack of implementation of existing standards by websites and identity providers prevent users to make this choice. In our second contribution, we aim at giving more control to users. To this end and in order to answer RQ2, we extend the WebRTC specification to allow identity parameters negotiation. We present a prototype implementation of our proposition to validate it. It reveals some limits due to the WebRTC API, in particular preventing to get feedback on the other peer's authentication strength. We then propose a web API allowing users to choose their identity provider in order to authenticate on a third-party website, answering RQ2. Our API reuse components of the WebRTC identity architecture in a client-server authentication scenario. Again, we validate our proposition by presenting a prototype implementation of our API based on a Firefox extension. Finally, in our third contribution, we look back on RQ1 and propose a trust and security model of a WebRTC session. Our proposed model integrates in a single metric the security parameters used in the session establishment, the encryption parameters for the media streams, and trust in actors of the communication setup as defined by the user. Our model objective is to help non-expert users to better understand the security of their WebRTC session. To validate our approach, we conduct a preliminary study on the comprehension of our model by non-expert users. This study is based on a web survey offering users to interact with a dynamic implementation of our model
Janczukowicz, Ewa Czeslawa. "QoS management for WebRTC : loose coupling strategies." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0010/document.
Full textThe number of real-time Over-The-Top (OTT) communication services has increased in the recent years. OTT solutions use the best-effort Internet delivery and rely on mechanisms built into the endpoints to adapt to underlying network fluctuations. Nevertheless, it is questionable if this approach is enough to provide acceptable quality of communication regardless the network conditions. Therefore, can network assistance be used to improve the quality of OTT real-time communication services?To address this question, we study OTT solutions with a focus on WebRTC. We identify three loose coupling strategies that leverage network mechanisms for improving OTT communication services quality.We verify the pertinence of these coupling strategies in the context of traffic management. We identify two approaches of traffic management solutions adapted to WebRTC traffic: 1) aiming at assuring lower queuing delays regardless the traffic or 2) isolating the sensitive traffic. We study the impact of identified traffic management solutions on WebRTC for wireline access networks (uplink, ADSL and fiber). The obtained results show that current Internet engineering practices are not well adapted to the WebRTC traffic, but are optimized for TCP traffic. Furthermore, the proposed solutions ensure more fairness between WebRTC and TCP flows and consequently enable avoiding WebRTC traffic starvation and improve the overall quality of the communication.In the final analysis, the evaluated traffic management solutions are positioned in the context of identified coupling strategies. Based on this assessment, we provide recommendations of improving WebRTC quality with the assistance of NSP
Coupechoux, Marceau. "Protocoles distribués de contôle d'accès au médium pour réseaux ad hoc fortements chargés." Paris, ENST, 2004. http://www.theses.fr/2004ENST0021.
Full textThis thesis contributes to the domain of medium access control for wireless ad hoc networks. These networks are by definition created for the occasion and usually have to operate without any existing fixed infrastructure. Chapter 1 gives a synthesis of contention-based and conflict-free MAC protocols. IEEE 802. 11 DCF, heir of the first family, is able to address single and multi-hop communications. The foremost objective of this dissertation is to find alternative schemes for improved MAC performance in highly loaded networks. Chapter 2 studies the capacity of IEEE 802. 11b in case of access point (AP) centric networks with TCP, UDP, and Voice over IP traffic. The performance degradation due to the near-far effect is highlighted and some solutions are proposed. A real world deployment is presented for outdoor proviosining of high speed Internet to low density areas. Advantage of using the multi-hop concept to extend the coverage range of an AP and the corresponding issues of degradation in throughput and fairness at high input loads have been analysed in detail. In chapter 3, we propose a new slotted protocol, called CROMA, to overcome the weaknesses of IEEE 802. 11 in highly loaded multi-hop ad hoc networks. An analytical study and extensive simulations show that CROMA clearly outperforms IEEE 802. 11 in the targeted environments. Chapter 4 explores three examples of cross-layer mechanisms. Capacity improvments have been demonstrated in three cases: (i) A scheduling policy can take advantage of node mobility. (ii) Multi-user diversity improves CROMA reservation scheme based on slotted ALOHA. (iii) Multi-user detection can offer additional improvment for reservation too
Dabbebi, Oussema. "Gestion des Risques dans les Infrastructures VoIP." Phd thesis, Université de Lorraine, 2013. http://tel.archives-ouvertes.fr/tel-00875141.
Full textLu, Jingxian. "L'auto-diagnostic dans les réseaux autonomes : application à la supervision de services multimédia sur réseau IP de nouvelle génération." Thesis, Bordeaux 1, 2011. http://www.theses.fr/2011BOR14461/document.
Full textThe autonomic networks show certain interest to manufacturers and operators of telecommunications. The self-diagnosis, the detection of failure and malfunction, is a critical issue in the context of these networks.We choose based-model diagnosis because it allows an automatic diagnosis, and is suitable to distributed network architecture. This diagnosis is based on an explicit modeling of normal and abnormal behavior of the system. We then use a generic diagnostic algorithm that uses this modeling to perform self-diagnosis. The modeling used is based on causal graph. It is an intuitive and efficient representation of causal relationships between observations and failures.The self-diagnosis algorithm we proposed based on the use of causal graphs. The principle is: when an alarm is triggered, the algorithm is run and, with the causal relationships between alarms and causes, the principal causes will be located. Since the causal graph modeling allows a modular and extensible model, it is possible to separate or merge according to the needs of services and communication architectures. This feature allows us to propose a distributed algorithm that adapts to autonomic network architecture. We have thus proposed a self-diagnosis algorithm that allows for the diagnosis corresponding to the autonomic network architecture to realize a global diagnosis.We have implemented this algorithm on a platform OpenIMS, and we showed that our self-diagnostic algorithm could be used for different types of services. The results of implement correspond to what is expected
Abdelnur, Humberto. "Architecture de Sécurité sur la Voix sur IP." Phd thesis, 2009. http://tel.archives-ouvertes.fr/tel-00436270.
Full textHaddouche, Fayçal. "Le support de VoIP dans les réseaux maillés sans fil WiMAX en utilisant une approche de contrôle et d'assistance au niveau MAC." Thèse, 2012. http://hdl.handle.net/1866/8445.
Full textWireless mesh networks (WMNs), because of their advantageous characteristics, are considered as an effective solution to support voice services, video and data in next generation networks. The IEEE 802.16-d specified for WMNs, through its mesh mode, two mechanisms of scheduling data transmissions; namely centralized scheduling and distributed scheduling. In this work, we evaluated the support of the quality of service (QoS) of the standard by focusing on distributed scheduling. System problems in the support of voice traffic have been identified. To solve these problems, we proposed a protocol for supporting VoIP, called Assisted VoIP Scheduling Protocol (AVSP), as an extension to the original standard to support high QoS to VoIP. Our preliminary simulation results show that AVSP provides a good improvement to support VoIP.