SIP Over NON-TLS vs TLS Environment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 86

Survey Paper | Information Technology | India | Volume 4 Issue 3, March 2015

SIP Over NON-TLS vs TLS Environment

Prapti Priya Nayak, G. Sujatha

SIP is a dominant signalling protocol that is used over various transport protocols for a successful session establishment along with data/audio/video transfer. This paper gives a survey on SIP over both NON-TLS and TLS Environment. It also gives a performance study of SIP by using three transport layer protocols.

Keywords: SIP, TLS, TCP, UDP, PBX, Performance Analysis

Edition: Volume 4 Issue 3, March 2015

Pages: 1315 - 1318

Share this Article

How to Cite this Article?

Prapti Priya Nayak, G. Sujatha, "SIP Over NON-TLS vs TLS Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152210, Volume 4 Issue 3, March 2015, 1315 - 1318

Enter Your Email Address




Similar Articles with Keyword 'SIP'

Downloads: 112

Research Paper, Information Technology, India, Volume 7 Issue 2, February 2018

Pages: 291 - 294

Indias Arm Manufacturing in Defence Sector

Kashif Kaularikar, Ajeet Yadav, Farheen Baig, Sabeeha Khan, Shehnaz Khan

Share this Article

Downloads: 130 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 796 - 799

Implementation of Mobile To Mobile Calling through Wi-Fi

Vishal S. Kasat, Rakesh Pandit

Share this Article

Similar Articles with Keyword 'TCP'

Downloads: 110

Research Paper, Information Technology, China, Volume 5 Issue 2, February 2016

Pages: 1855 - 1858

Bandwidth Utilization Optimization on Agent Based CR Networks

Aladje Umaro Balde, Cui Lin

Share this Article

Downloads: 112

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2049 - 2054

Securing TCP/IP Stacks Using IP Tables

Hamisu I. Usman, J. Dharani

Share this Article



Top