АНАЛИЗ ОСНОВНЫХ ПРОТОКОЛОВ АРХИТЕКТУРЫ IMS
Анотація
Analysis of the main protocols of the IMS architecture
Bringing existing networks in line IMS concept requirements can significantly increase the efficiency of the existing telecommunications environment. It should seek to reduce the number of protocols used, increasing their functionality, as well as identify opportunities for their modernization in the direction of solving problems to ensure the specified quality of service, bandwidth and reliability.
Посилання
https://ru.wikipedia.org/wiki/Session_Description_Protocol.
http://opds.sut.ru/old/electronic_manuals/itm_sait/tema71.htm.
https://www.ibm.com/developerworks/ru/library/wi-diameter/.
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6 DATASET • JANUARY 2012.
Investigation IMS architecture According to Security and QoS context © AJMAL MUHAMMAD, March 2014. © RAJA MUHAMMAD SHAMAYEL ULLAH, March 2014.
http://www.iksmedia.ru/articles/4128111-Bezopasnost-i-frodkontrol-v-setyax. html
«Журнал сетевых решений/LAN», № 12, 2000.
«ПРОБЛЕМИ ТЕЛЕКОМУНІКАЦІЙ 2015 року» - Верес Л.А., Семендяк Е.С./Виды интерфейсов и их функции в архитектуре IMS.
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2016 Александр Иванович Романов, Леонид Анатольевич Верес, Валерий Сергеевич Явися
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.