Library items tagged:

Anonymous
The acquisition, set up and deployment of an H.323 videoconferencing studio is outside of the scope of this guide; such information is available from VTAS. However, there are security considerations to be made in the deployment. In the simplest case, the site will be deploying a single, fixed-location studio-based H.323 system, to be used by university or college members who wish to participate in videoconferences with people at other JANET-connected sites. Topology considerations The main site considerations include:
Anonymous
There are many aspects to the security of H.323 videoconferencing systems. Some of these are shared with H.320 ISDN-based systems, e.g. the physical security of the equipment itself. The greater focus with IP-based systems lies in the ability for attackers to ‘snoop’ the conferencing data in transit, or to attack the H.323 components themselves over the Internet, leading to a loss of service or other undesirable consequences.
Anonymous
As services begin to converge to use the Internet, and its associated IP, there will be an increasing need for awareness by sites of security issues for IP-based voice, video and data exchanges.
Anonymous
When considering the security of an H.323 conferencing system, it is important to place concerns over that security into perspective.
Anonymous
References CISCO, 2001. Deploying QoS for Voice and Video in IP Networks. Cisco® Networkers 2001 Conference presentation VVT-213. Cisco®. CISCO, 2003a. How LAN Switches Work. [WWW 6 February 2004] http://www.cisco.com/warp/public/473/lan-switch-cisco.pdf
Anonymous
The UWA (University of Wales, Aberystwyth) gatekeeper currently has seven H.323 videoconferencing endpoints in its zone. These consist of: four UWA WVN PictureTel 970 CODECs (each with a potential bandwidth of up to 2Mbit/s). two Leadtek BVP 8770 H.323 videophones. These have a maximum bandwidth of 640kbit/s. a Tandberg® 8000, with a maximum bandwidth of 768kbit/s. These are distributed around the University as follows:
Anonymous
Local area networks of any significant size, which almost certainly encompasses all those at educational organisations, are complex and unpredictable systems. The traffic flows produced within these networks, and the interactions between different flows within network components such as switches, are highly complex. Classifying, policing and priority queuing allow the network administrator some control over how these flows transit the network, and – crucially for voice and video traffic – allow time-critical traffic to have priority over other, less time-sensitive traffic.
Anonymous
In many cases, it will not be possible to physically separate H.323 and campus network traffic, and it will be necessary for all traffic to share the same physical links. In this case there are some methods that can be used to provide some level of protection to H.323 traffic, above that provided to the campus traffic.
Anonymous
This section examines the role of physical separation in the provision of reliable and secure links for real-time traffic. In many cases equipment can be directly connected together without being also plugged into the campus LAN directly. This can be especially beneficial when equipment is dedicated to a task – such as videoconferencing equipment – that operates stand-alone, i.e. is not part of a desktop PC used for normal network access/applications.
Anonymous
Layer 1 - The Physical Layer Most modern campuses have installed switched networks but there remain sections of some networks that have hubs or co-axial cabling with repeaters. Because these networks are built on protocols that accept collisions, and hence congestion, as a normal part of network life, their traffic forwarding algorithms will back off from sending frames in the face of congestion.