1. 課程代號: 259025
  2. 課程名稱: 網路電話品質量測技術 (VoIP Quality Measurement)
  3. 授課教師: 吳坤熹
  4. 開授年級: 大三、大四、研究所
  5. 學分數: 3
  6. 授課時數: 3
  7. 上課時間: Wednesday 18:10-21:00
  8. 上課教室: TC-208 [94334492]
  9. 使用軟體:
    1. Wireshark
    2. X-Lite
    3. Linphone 3.5.2
    4. PuTTY 0.62
    5. Audacity
    6. Foobar 2000
    7. Camouflage 1.2.1
      • Download
      • This software allows you to hide anything in a normal file, including TXT, DOC, GIF.
    8. Web100
  10. 先修課程: 無
  11. 課程目標: 簡介以 VoIP 網路電話品質量測所需之相關技術
  12. 評量方式: 作業(20%) 課堂報告(40%) 期中考(20%) 期末考(20%)
  13. 教科書: Tom Hughes-Croucher and Mike Wilson, Node: Up and Running, 2012.
  14. 參考書: Daniel Collins, "Carrier Grade Voice over IP", published by McGraw-Hill.
  15. 參考文獻: ITU-T P.800, ITU-T P.862, IETF IPPM Working Group Charter
  16. 課程內容: (Syllabus)
    1. Introduction to VoIP
    2. Real-time Transport Protocol (RTP) & Session Initiation Protocol (SIP)
    3. Pulse-code modulation (PCM)
    4. Codecs: G.711, G.729
    5. Codecs: GSM, iLBC, Speex
    6. Mean Opinion Score (MOS)
    7. Perceptual Evaluation of Speech Quality (PESQ)
    8. One-way Active Measurement Protocol (OWAMP)
  17. 達成本系教育目標
    1. 配合國家經濟發展,培養符合資訊產業需求的工程技術人才
    2. 配合國家科技發展,培養具備前瞻資訊科技研發潛能的人才
    3. 配合全球永續發展潮流,培養具備國際視野、工程倫理、人文關懷及社會責任的科技人才
  18. 培養本系學生核心能力
    1. 具備使用英文閱讀資訊領域技術文件及學術論文的能力
    2. 具備程式設計基礎知識並應用於設計及實作資訊軟體的能力
    3. 具備團隊合作及獨立執行資訊工程領域學術研究的能力
    4. 具備撰寫學術論文的能力
  19. Selected Articles
    1. Voice over IP
    2. Socket Programming
    3. Quality
      1. OPTICOM Perceptual Evaluation of Streaming Video Quality (PEVQ)
      2. Kevin Fall and Steve McCanne, "You Don't Know Jack about Network Performance", ACM Queue, May 1, 2005.
      3. RFC 6928 - Increasing TCP's Initial Window, April 2013.
      4. Sudhir R. Ahuja, Robert Ensor, VoIP: What is it Good for?, ACM Queue, September 1, 2004.
      5. Douglas C. Sicker, Tom Lookabaugh, VoIP Security: Not an Afterthought, ACM Queue, September 1, 2004.
      6. Phil Sherburne, Cary Fitzgerald, You Don't Know Jack About VoIP, ACM Queue, September 1, 2004.
      7. VoIP Traffic Models for IEEE 802.20 System Performance Evaluation
    4. Measurement Tools
      1. TANet 網路品質測試系統
      2. Dimitri Papadimitriou, Lluis Fabrega, Pere Vila, Davide Careglio, Piet Demeester, " Measurement-based research: methodology, experiments, and tools", SIGCOMM Computer Communication Review , Volume 42 Issue 5, September 2012.
      3. Voice, Video, and Data Quality Test Solutions
      4. Google Measurement Lab
        • NDT
      5. TWAREN Mresurement Web , Weather Map
      6. 台中區網 網路氣象台
      7. Internet2 Performance Initiative
      8. iperf3
      9. bwctl
      10. perfsonar
      11. StreamTest
      12. Siege Testing Tool
      13. Network Tools - Tracepath
      14. jMeter - a 100% pure Java application for load test.
      15. One-way ping
      16. Active Measurement Project - Caida (Center for Applied Internet Data Analysis)
    5. Network Emulation
      1. NetEm(8)
    6. Data Hiding
      1. Huaiqing Wang and Shuozhong Wang, " Cyber warfare: steganography vs. steganalysis Communications of the ACM , Volume 47 Issue 10, October 2004.
      2. Bender, W., Gruhl, D., Morimoto, N., and Lu, A. Techniques for data hiding, IBM Systems Journal 35, 3&4 (1996).
      3. Hal Berghel, Hiding data, forensics, and anti-forensics, Communications of the ACM, Volume 50 Issue 4, April 2007.
        • This article basically describes the techniques for hiding data on disks.
        • In the introductory section it mentioned some interesting tools like Loki, reverse WWW shell, Covert_TCP, NuShu on hiding data in network packets.
        • Camouflage software can hide anything in a normal file, which still looks like a TXT, GIF, DOC file.
        • The Metasploit project developed three tools to fool popular anti-forensic tools.
      4. Steganography Tools
        1. SilentEye on SourceForge
        2. StegSecret - A simple steganalysis tool on SourceForge
        3. Steganalysis tools on SourceForge
      5. Yana Kortsarts and Yulia Kempner, Enriching undergraduate computer science curriculum with steganography examples, Journal of Computing Sciences in Colleges , Volume 28 Issue 6, June 2013
      6. Mazurczyk, W., & Lubacz, J. (2008). LACK - a VoIP Steganographic Method. Telecommunication Systems, December 2009.
      7. J. Lubacz, W. Mazurczyk, and K. Szczypiorski, "Vice over IP", IEEE Spectrum, Vol. 47, No.2, pp.42–47, 2010. doi:10.1109/MSPEC.2010.5397787
      8. Gustavus J. Simmons, Symmetric and Asymmetric Encryption", ACM Computing Surveys (CSUR) , Volume 11 Issue 4, pp.305-330. December 1979
      9. Stuart Fox, " FBI: Russian Spies Hid Codes in Online Photos ", Msnbc.com , 08 Sept. 2011.
      10. Provos, N. and Honeyman P. Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy Magazine, 1, 3, 32-44, 2003
      11. Hide data inside JPGs with Free File Camouflage - BetaNews