1. 課程代號: 259025
  2. 課程名稱: 網路電話品質量測技術 (VoIP Quality Measurement)
  3. 授課教師: 吳坤熹
  4. 開授年級: 大三、大四、研究所
  5. 學分數: 3
  6. 授課時數: 3
  7. 上課時間: Wednesday 18:10-21:00
  8. 上課教室: TC-208 [*28 ext. 4492]
  9. 使用軟體:
    1. Wireshark
    2. X-Lite
    3. Linphone 3.5.2
    4. PuTTY 0.62
    5. Audacity
    6. Foobar 2000
    7. Camouflage 1.2.1
      • Download
      • This software allows you to hide anything in a normal file, including TXT, DOC, GIF.
  10. 先修課程: 無
  11. 課程目標: 簡介以 VoIP 網路電話品質量測所需之相關技術
  12. 評量方式: 作業(20%) 課堂報告(40%) 期中考(20%) 期末考(20%)
  13. 主要文獻: ITU-T P.800, ITU-T P.862, IETF IPPM Working Group Charter
  14. 參考書: Daniel Collins, "Carrier Grade Voice over IP", published by McGraw-Hill.
  15. 課程內容: (Syllabus)
    1. Introduction to VoIP
    2. Real-time Transport Protocol (RTP) & Session Initiation Protocol (SIP)
    3. Pulse-code modulation (PCM)
    4. Codecs: G.711, G.729
    5. Codecs: GSM, iLBC, Speex
    6. Mean Opinion Score (MOS)
    7. Perceptual Evaluation of Speech Quality (PESQ)
    8. One-way Active Measurement Protocol (OWAMP)
  16. 達成本系教育目標
    1. 配合國家經濟發展,培養符合資訊產業需求的工程技術人才
    2. 配合國家科技發展,培養具備前瞻資訊科技研發潛能的人才
    3. 配合全球永續發展潮流,培養具備國際視野、工程倫理、人文關懷及社會責任的科技人才
  17. 培養本系學生核心能力
    1. 具備使用英文閱讀資訊領域技術文件及學術論文的能力
    2. 具備程式設計基礎知識並應用於設計及實作資訊軟體的能力
    3. 具備團隊合作及獨立執行資訊工程領域學術研究的能力
    4. 具備撰寫學術論文的能力
  18. Selected Articles
    1. Voice over IP
    2. Quality
    3. Measurement
      1. Dimitri Papadimitriou, Lluis Fabrega, Pere Vila, Davide Careglio, Piet Demeester, " Measurement-based research: methodology, experiments, and tools", SIGCOMM Computer Communication Review , Volume 42 Issue 5, September 2012.
      2. RFC 6076 - Basic Telephony SIP End-to-End Performance Metrics
    4. Data Hiding
      1. Huaiqing Wang and Shuozhong Wang, " Cyber warfare: steganography vs. steganalysis Communications of the ACM , Volume 47 Issue 10, October 2004.
      2. Bender, W., Gruhl, D., Morimoto, N., and Lu, A. Techniques for data hiding, IBM Systems Journal 35, 3&4 (1996).
      3. Hal Berghel, Hiding data, forensics, and anti-forensics, Communications of the ACM, Volume 50 Issue 4, April 2007.
        • This article basically describes the techniques for hiding data on disks.
        • In the introductory section it mentioned some interesting tools like Loki, reverse WWW shell, Covert_TCP, NuShu on hiding data in network packets.
        • Camouflage software can hide anything in a normal file, which still looks like a TXT, GIF, DOC file.
        • The Metasploit project developed three tools to fool popular anti-forensic tools.
      4. Steganography Tools
        1. SilentEye on SourceForge
        2. StegSecret - A simple steganalysis tool on SourceForge
        3. Steganalysis tools on SourceForge
      5. Yana Kortsarts and Yulia Kempner, Enriching undergraduate computer science curriculum with steganography examples, Journal of Computing Sciences in Colleges , Volume 28 Issue 6, June 2013
      6. Mazurczyk, W., & Lubacz, J. (2008). LACK - a VoIP Steganographic Method. Telecommunication Systems, December 2009.
      7. J. Lubacz, W. Mazurczyk, and K. Szczypiorski, "Vice over IP", IEEE Spectrum, Vol. 47, No.2, pp.42–47, 2010. doi:10.1109/MSPEC.2010.5397787
      8. Gustavus J. Simmons, Symmetric and Asymmetric Encryption", ACM Computing Surveys (CSUR) , Volume 11 Issue 4, pp.305-330. December 1979
      9. Stuart Fox, " FBI: Russian Spies Hid Codes in Online Photos ", Msnbc.com , 08 Sept. 2011.
      10. Provos, N. and Honeyman P. Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy Magazine, 1, 3, 32-44, 2003