Cap Report
Cap Report
CAPSTONE PROJECT-II
Submitted in partial fulfillment of the Requirement for the award of the Degree of
Manik Garg Roop Kanwal Divya Pahwa Ramandeep Kaur Mayank Shah
Registration Number: 10900871 Registration Number: 10900033 Registration Number: 10901208 Registration Number: 10901210 Registration Number:10900154
Under the Guidance of Mr. Sonit Singh
(Lovely School of Electronics and Communication Engineering) Lovely Professional University Punjab APRIL, 2013
Page |2
CERTIFICATE
This is to certify that the Dissertation titled Implementation of Network Security and VOIP technology made by this group of students is correct to the best of my knowledge and belief. The Capstone Project Proposal based on the technology / tool learnt is fit for the submission and partial fulfillment of the conditions for the award of B.Tech in from Lovely Professional University, Phagwara. Electronics and communicat ion
Examiner I
Examiner II
Page |3
ACKNOWLEDGEMENT
To make a project there is a need of guidance and motivation on every step. This gives us encouragement to do our best and help in reaching the goal. We feel immense pleasure to express our sincere thanks and deep sense of gratitude as it has been our privilege, to work under the best guidance of Mr. Sonit Singh. For his interest, perception and constant encouragement gave us confidence to carry out this study.
Roop Kanwal (10900033) Divya Pahwa (10901208) Manik Garg(10900871) Ramandeep Kaur(10901210) Mayank Shah(10900154)
Page |4
DECLARATION
We hereby declare that the project work entitled Implementation on Network Security and VOIP Technology is an authentic record of our own work carried out as requirements of Capstone Project (Part-I) for the award of degree of B.Tech. in Electronics and Communication from Lovely Professional University, Phagwara, under the guidance of Mr. Sonit Singh , during August to December, 2012.
Page |5
ABSTRACT
The project which is creating a complex network which is similar to daily life networks implemented in the offices, colleges, enterprises and organizations. This report presents an overview of the campus network architecture and includes descriptions of various design considerations, topologies, technologies, configuration design guidelines, and other
considerations relevant to the design of highly available, full-service campus switching fabric. It is also intended to serve as a guide to direct readers to more specific campus design best practices and configuration examples for each of the specific design options. It can be used as a manual for further designing of more complex networks by the network administrators and designers. The aim of the project is to design a complex network which can be implemented in practical daily life situations and using VOIP technology and understanding security attacks used by hackers concerned with a network and measures to protect the network from unauthorized access and damage.
Page |6
TABLE OF CONTENTS
Implementation of Network Security and VOIP technology ........................................................1 Certificate ...................................................................................................................................2 Acknowledgment ........................................................................................................................3 Declaration..................................................................................................................................4 Abstract ......................................................................................................................................5 Table of Contents ........................................................................................................................6 Table of Figures ..........................................................................................................................8 Chapter1 .....................................................................................................................................9 1.1Introduction............................................................................................................................9 Chapter 2 .................................................................................................................................. 10 2.1 Key terms and Scope of study ............................................................................................. 12 2.2 Wireless network attacks ................................................................................................... ..13 2.2.1Identity theft (MAC spoofing) ........................................................................................... 13 2.2.2 Man in the middle attack .................................................................................................. 14 2.2.3Unauthorized accesss.19 2.3 VoIP technology..21 2.3.1 Benefits of IP communications.21 2.3.2How VoIP works....................................................................................................................23 Chapter 3 .................................................................................................................................. 25 3.1 Software used ...................................................................................................................... 25 3.2Feautures Overview..25 3.3GNS3 supported platforms...25 3.4Version and other software used...26 3.5Network devices used specification..27 Chapter 4 .................................................................................................................................. 29
Page |7
4.1.3.1Types of access control list........................................................34 4.1.4VoIP configuration ............................................................................................................. 35 Chapter 5 (Bibliography) ........................................................................................................... 35 5.1 Conclusion : .......i 5.2 References ............................................................................................................................. i Chapter 6 (Bio-data of the candidates) ........................................................................................ ii
Page |8
Page |9
Chapter1
INTRODUCTION _____________________________________________________________________________________
Wireless networking presents many advantages Productivity improves because of increased accessibility to information resources. Network configuration and reconfiguration is easier, faster, and less expensive. However, wireless technology also creates new threats and alters the existing information security risk profile. For example, because communications takes place "through the air" using radio frequencies, the risk of interception is greater than with wired networks. If the message is not encrypted, or encrypted with a weak algorithm, the attacker can read it, thereby compromising confidentiality. Although wireless networking alters the risks associated with various threats to security, the overall security objectives remain the same as with wired networks: preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems. The objective of this paper is to assist managers in making such decisions by providing them with a basic understanding of the nature of the various threats associated with wireless networking and available countermeasures. The popularity of wireless Networks is a testament primarily to their convenience, cost efficiency, and ease of integration with other networks and network components. The majority of computers sold to consumers today come pre-equipped with all necessary wireless Networks technology. The benefits of wireless Networks include: Convenience, Mobility, Productivity, Deployment, Expandability and Cost. Wireless Network technology, while replete with the conveniences and advantages described above has its share of downfalls. For a given networking situation, wireless Networks may not be desirable for a number of reasons. Most of these have to do with the inherent limitations of the technology. The disadvantages of using a wireless network are: Security Range Reliability Speed
P a g e | 10
Wireless Networks present a host of issues for network managers. Unauthorized access points, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN troubleshooting. Most network analysis vendors, such as Network Instruments, Network General, and Fluke, offer WLAN troubleshooting tools or functionalities as part of their product line.
P a g e | 11
The attack: Its resource consumption is almost unmeasurable, and even if it doesnt keep out any reasonably knowledgeable security crackers willing to spend a few moments gaining access, it does keep out a lot of automated opportunistic attacks that are aiming solely for the absolute lowest-hanging fruit on the security tree. Since that lowest-hanging fruit consists of the majority of wireless access points, MAC filtering can be of value as a way of turning away the majority of opportunistic attackers. Method to attack: Listen in on network traffic. Pick out the MAC address. This can be done with a plethora of freely available security tools, including Nmap. Change your MAC address.
You can spoof a MAC address when using Nmap with nothing more than a spoofmac command line option for Nmap itself to hide the true source of Nmap probes. If you give it a MAC address argument of 0, it will even generate a random MAC address for you.For more general MAC address spoofing, your MAC address is trivially reset with tools available in default installs of most operating systems. Here are some examples: Linux: ifconfig eth0 hw ether 03:a0:04:d3:00:11 FreeBSD: ifconfig bge0 link 03:a0:04:d3:00:11 MS Windows: On Microsoft Windows systems, the MAC address is stored in a registry key. The location of that key varies from one MS Windows version to the next, but find that and
P a g e | 12
you can just edit it yourself. There are, of course, numerous free utilities you can download to make this change for you as well (such as Macshift for MS Windows XP). PREVENTION METHOD: Port security: Use the port security feature to mitigate MAC spoofing attacks. Port security provides the capability to specify the MAC address of the system connected to a particular port. This also provides the ability to specify an action to take if a port security violation occurs. It is a layer two traffic control feature on Cisco Catalyst switches. It enables an administrator configure individual switch ports to allow only a specified number of source MAC addresses ingressing the port. Its primary use is to deter the addition by users of "dumb" switches to illegally extend the reach of the network (e.g. so that two or three users can share a single access port).
P a g e | 13
The Attack: A MitM attack will take advantages of weaknesses in network communication protocols in order to convince a host that traffic should be routed through the attacker instead of through the normal router. In essence, the attacker is advertising that they are the router and the client should update their routing records appropriately. This attack is called ARP spoofing. The (greatly simplified) purpose of ARP (Address Resolution Protocol) is to enable IP address to MAC address translations for hosts. By design, ARP does not contain authentication. Therefore, any host can reply to an ARP request or send an unsolicited ARP response to a specific host. These ARP response messages are used by the attacker to instruct the victims machine that the appropriate MAC address for a given IP address is now the MAC address of the attackers machine. More specifically, the attacker is instructing the victim to overwrite their ARP cache for the IP->MAC entry for the router. Now, the IP address for the router will correspond to the MAC address for the attackers machine. What does this mean? Now, all of the victims traffic will be routed throug h the attacker. Of course, we dont stop here. In order to allow the traffic to reach the Internet, the attacker must
P a g e | 14
configure his system (or attack tool) to also forward this traffic to the original router. In addition, the attacker performs a similar ARP spoofing attack against the router. This way the router knows to send traffic, that was destined for the victim machine, to our attacker instead. The attacker then forwards on the traffic to the victim. This completes the chain and places the attacker in the middle of the communication. Impacts on HTTP
At this point, the attacker has the ability to view and modify any TCP traffic sent to or from the victim machine. HTTP traffic is unencrypted and contains no authentication. Therefore, all HTTP traffic can be trivially monitored/modified by the attacker. What about HTTPS?
Everything we have talked about thus far is related to getting in the middle of the network communications. This enables the attacker to view most exchanged data, but does not enable the attacker to intercept data exchanged of protocols that implement their own authentication and encryption (e.g. SSH, SSL/TLS)But, this is where the fun starts. The purpose of HTTPS is to create a secure communication over top of HTTP by the use of SSL or TLS.
PREVENTION METHOD: HTTPS ENCRYPTION: Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (http). HTTPS allows secure ecommerce transactions, such as online banking. HTTPS, the website encrypts the session with a digital certificate. Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data a public key known to everyone and a private or secret key known only to the recipient of the message.
P a g e | 15
Fig 3.0(SSL working) A browser requests a secure page (usually https://). The web server sends its public key with its certificate. The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted. The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data. The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data.
P a g e | 16
The web server sends back the requested html document and http data encrypted with the symmetric key. The browser decrypts the http data and html document using the symmetric key and displays the information.
2.2.3 UNAUTHORIZED ACCESS: While it may seem simple to protect your directory from unauthorized access, the problem can be more complicated. There are several opportunities along the path of directory information delivery for an unauthorized client to gain access to data. Unauthorized access includes: Unauthorized access to data via data-fetching operations Unauthorized access to reusable client authentication information by monitoring the access of others. Unauthorized access to data by monitoring the access of others.
Fig4.0(Showing comical images of unauthorized access) PREVENTION METHOD: Access control lists (ACLs): They perform packet filtering to control which packets move through a network and to where. The packet filtering provides security by helping to limit the network traffic, restrict the access of users and devices to a network, and prevent the traffic from leaving a network. IP access lists reduce the chance of spoofing and denial-of-service attacks and allow dynamic, temporary useraccess through a firewall. Access control lists (ACLs) perform packet filtering to control the flow of packets through a network. Packet filtering can restrict the access of users and devices to
P a g e | 17
a network, providing a measure of security. Access lists can save network resources by reducing traffic. The benefits of using access lists are as follows: Authenticate incoming rsh and rcp requestsAccess lists can simplify the identification of local users, remote hosts, and remote users in an authentication database that is configured to control access to a device. Block unwanted traffic or usersAccess lists can filter incoming or outgoing packets on an interface, thereby controlling access to a network based on source addresses, destination addresses, or user authentication. You can also use access lists to determine the types of traffic that are forwarded or blocked at device interfaces. Provide NAT controlAccess lists can control which addresses are translated by Network Address Translation (NAT). Reduce the chance of DoS attacksAccess lists reduce the chance of denial-of-service.
P a g e | 18
Economy: As opposed to connecting elements and applications of a communications system using expensive legacy voice technologies such as DS1 and DS0 line cards, trunk cards and digital signaling technologies, IP Communications networks allow customers to build network communication services based on IP networking technologies using Ethernet economics, often called silicon economics. One Ethernet port can replace 50 or more legacy voice circuits, line cards, and chassis equipment needed to provide equivalent service. The key point here is that the costs are significantly less to provide connections to other sites and to other applications.
Flexibility:
As opposed to connecting elements and applications of a communications system using legacy technologies that are proprietary, monolithic, and restrictive in nature, IP networking allows connections to be made. with virtual reachresources to be distributed anywhere as needed; economies to be gained by centralization of gateway resources, circuit, and server resources; and the use of many types of media and applications to be brought together to facilitate communications within an organization. IP Communications systems are also more capable in supporting mobility requirements, telecommuting, moves/adds/changes, centralized
management, outsourcing operations, extension mobility, desktop integration, front office, back office integration and applications, enterprise directories, and taking advantage of emerging web innovations and services such as instant messaging, presence, and mobility.
Resilience:
With business continuity and disaster recovery high on the agendas of many organizations, the resiliency of connectivity and abilities provided by IP Communications to keep the organization connected make it an ideal candidate for survivable services. Redundancy is built into intelligent layer 2 and layer 3 networking technologies and applications. Internet protocols offer superior failover, redundant and self-healing capabilities that are easyto deploy, open standards based, and can support not only voice, but all of an organization's communications services. The fact that the most resilient military and enterprise communications systems can now use IP Communications and Internet protocols to achieve five nines of reliability and availability
P a g e | 19
provides a superior alternative to rigid voice technologies. These legacy technologies are far more expensive, and are unable to provide the overall system resiliency needed for as broad a range of services and applications as can IP Communications.
P a g e | 20
Fig6.0 (Logo of simulator) The GNS3 network simulator is free, open source software that can be downloaded and used by anyone. GNS3 works by using real Cisco IOS images which are emulated using a program called Dynamips. GNS3 is really like the GUI part of the overall product. With this GUI, users get an easy to use interface that allows them to build complex labs consisting of a variety of supported Cisco routers. GNS3 is an excellent complementary tool to real labs for network engineers, administrators and people wanting to study for certifications such as Cisco CCNA, CCNP, CCIP and CCIE as well as Juniper JNCIA, JNCIS and JNCIE.It can also be used to experiment features of Cisco IOS, Juniper JunOS or to check configurations that need to be deployed later on real routers. Thanks to VirtualBox integration, now even system engineers and administrators can take advantage of GNS3 to make labs and study for Redhat (RHCE, RHCT), Microsoft (MSCE, MSCA), Novell (CLP) and many other vendor certifications. This project is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X.
Design of high quality and complex network topologies. Emulation of many Cisco IOS router platforms, IPS, PIX and ASA firewalls, JunOS. Simulation of simple Ethernet, ATM and Frame Relay switches. Connection of the simulated network to the real world! Packet capture using Wireshark.
P a g e | 21
3.2 GNS3 Supported Platforms These are the current platforms supported by GNS3. As you can see from the table, youve got quite a list of devices that can be used with GNS3 to build your labs. This is definitely another great feature of this simulator. As you all know, with each different model of Cisco devices, you have more or less features supported by that model. These mostly range from the types of commands supported on the particular IOS youre running for that platform.
Fig7.0 (Series of devices and protocol supported by GNS3.0 ) 3.3 Version and other software used We have used the latest version of GNS3 v0.8.3.1 all-in-one (installer which includes Dynamips, Qemu/Pemu, Putty, VPCS, WinPCAP and Wireshark) on WINDOWS operating system and using virtualization software VIRTUAL BOX in conjugation with CISCO IP
COMMUNICATOR.
P a g e | 22
Sr.no
Device
Type
Specification
Vendor
1 2 3
Linksys,Cisco Cisco
(a.)Linksys WRT300N Details: Device type: Wireless router 4 port-switch (Integrated) Data link protocol:Ethernet,fast Ethernet,IEEE802.11 b,g,n, Encryption Algorithm:WPA,WPA2,128-bit WEP, 64-bit WEP Features :MIMO technology ,Full duplex capability,Firewall protection ,MAC address filtering,Firmware upgradable,Stateful Packet Inspection (SPI),DHCP support ,NAT support Interfaces:WAN : 1 x Ethernet 10Base-T/100Base-TX - RJ-45,LAN : 4 x Ethernet 10Base-T/100Base-TX - RJ-45
(b.)Cisco 2620/21 Ethernet, Fast Ethernet Router: Device type:Wired router Data link protocol:Ethernet,Fast Ethernet,IEEE802.3,802.3u Features:Auto-sensing per device,Modular design,Manageable,NAT support Interfaces:Management : 1.0 x Auxiliary - RJ-45 - 1.0,2.0 x Console - RJ-45 - 1.0, 1.0 x Ethernet 10Base-T/100Base-TX - RJ-45 - 2.0
P a g e | 23
(c.)Catalyst 3560-24PS : Device type: Switch-24 ports-Layer Compliant Protocols:IEEE 802.3af,802.3x,802.1Q,802.1w, 802.1p,802.3z,802.3, 802.1x,802.1D,802.3ab Features:Layer 2 switching,Layer 3 switching,DHCP server,Full duplex capability, VLAN support,Trivial File Transfer Protocol (TFTP) support,Dynamic Trunking Protocol (DTP) support,DHCP snooping,DHCP support,Trunking,Access Control List (ACL) support,IP-routing, Interfaces:24 x Ethernet 10Base-T/100Base-TX - RJ-45 - PoE,1 x Console - RJ-45 Management.
(d.) Catalyst 2960-24-TT: Device type:Switch - 24 ports Compliant Protocols::IEEE 802.3af,802.3x,802.1Q,802.1w, 802.1p,802.3z,802.3, 802.1x,802.1D,802.3ab Features:Layer 2 switching,IPv6 support,VLAN support,Multiple Spanning Tree Protocol (MSTP) support,Port Security,MAC Address Notification,Dynamic Trunking Protocol (DTP) support,ARP support,BOOTP support,DHCP snooping,Dynamic IP address assignment,Broadcast Storm Control,Access Control List (ACL) support, Interfaces:24 x Ethernet 10Base-T/100Base-TX - RJ-45,2 x Ethernet10BaseT/100BaseTX/1000Base-T RJ-45
P a g e | 24
We can view the default port security configuration with show port-security
P a g e | 25
As you can see, there are a number of attributes which can be adjusted. We'll cover these in a moment. When a host connects to the switch port, the port learns the host's MAC address as the first frame is received:
Snapshot 2 (Learning of MAC address) Now, we disconnect the host from the port, connect a small switch or hub, and reconnect the original host plus a second, unauthorized host so that they both attempt to share the access port. Observe traffic: what happens as soon as the second host attempts to send
Snapshot 3 (Port status is changed to down) Inspecting the status of port security on the port again, we can see that the new MAC address triggered a violation. By default, a port security violation forces the interface into the errordisabled state. An administrator must re-enable the port manually by issuing the shutdown interface command followed by no shutdown. This must be done after the offending host has been removed, or the violation will be triggered again as soon as the second host sends another frame.
P a g e | 26
Snapshot 4 (Status of port security implied on device) 4.1.1 Tweaking Port Security Violation Mode
Port security can be configured to take one of three actions upon detecting a violation: shutdown (default);.The interface is placed into the error-disabled state, blocking all traffic. Protect; Frames from MAC addresses other than the allowed addresses are dropped; traffic from allowed addresses is permitted to pass normally. restrict ; Like protect mode, but generates a syslog message and increases the violation counter. By changing the violation mode to restrict, we are still alerted when a violation occurs, but legitimate traffic remains unaffected:
P a g e | 27
4.2 Implementing HTTPS on a webserver A basic topology of a network with router and switch with some host as users and a web server is set up to show this security measure and the web server we have configured the web server to work upon both HTTP as well as HTTPS protocols making it doubly applicable for any type of traffic requiring access to the particular website or service and protecting the network from eavesdropping by encrypting the data and passing it through secure tunnel where eavesdropping and intrusion is not possible.
P a g e | 28
4.3 Access List configuration An access control list (ACL), in networks is used to assign different permissions e.g deny/permit to an object. ACL Rules: List is applied from Top statement to bottom, order is important if first statement is matched then other are neglected. Default Invisible deny at bottom of every access list, it mean that if you have different hosts in network lets say 192.16.1.1, 192.16.1.2, 192.16.1.100 etc and you have create a access list in which you have only deny 192.16.1.100 to access internet. In this case all other host are also block because of this rule, you have whrite another statement to permit any other host to correct this.ACL is applied to interfaces that may be inbound or outbound direction 4.3.1 Types of Access Control List There are two main types of ACL 1. Standard ACL 2. Extended ACL Standard ACL: ACL Number range is from 1-99 Always apply near to destination Lower process utilization
P a g e | 29
Configuration of Standard ACL Syntax Router(config)#access-list <1-99> deny/permit host/network R3(config)#access-list 1 deny host 172.16.2.10 R3(config)#access-list 1 permit any R3(config)#int f1/0 R3(config-if)#ip access-group 1 out R1(config)#line vty 0 4 R1(config-line)#password cisco R1(config-line)#^Z R1#conf t R1(config)#access-list 2 deny 172.16.2.10 R1(config)#access-list 2 permit any R1(config)#line vty 0 4 R1(config-line)#access-class 2 in 4.4 VoIP configuration Here the setup of VoIP is made using 2 Ip-phones 2 routers and switch with 1 computer as node
P a g e | 30
Snapshot 10 (IP-phone with cisco ip communicator) First, drag all devices and configure router to work as DHCP server to lease IP addresses for IP phones.
ip dhcp pool test-vlan network 192.168.10.0 255.255.255.0 default-router 192.168.10.1 option 150 ip 192.168.10.1 Using option 150 is required to provide IP address to Cisco phone. Pool range is the whole network of 192.168.10.0/24. Here is the configuration of router. telephony-service max-ephones 3 max-dn 3 ip source-address 192.168.10.1 port 2005 auto assign 1 to 5 ! ephone-dn 1 number 1001 ! ephone-dn 2 number 1005 !
P a g e | 31
ephone-dn 3 number 1010 I have used IP phones with power supply. So, power adapter need to plug to get IP phone online. If you don't want and need PoE, have to use multilayer switch.Configure switch as follow; Enable trust boundary to Cisco phone using "mls qos trust device cisco-phone". interface FastEthernet0/1 switchport access vlan 10 switchport mode trunk switchport voice vlan 1 mls qos trust device cisco-phone ! interface FastEthernet0/4 switchport mode access switchport voice vlan 1 ! interface FastEthernet0/5 switchport mode access switchport voice vlan 1 Check in switch after phone online whether it's trusted Cisco Phone or not by executing command "mls qos interface fa0/1". trust device: cisco-phone is appear in outpout. Switch#sh mls qos interface fa0/1 FastEthernet0/1 trust state: not trusted trusted mode: not trusted COS override: dis default COS: 0 pass-through: none trust device: cisco-phone As soon as IP phones are online, following message appear in Cisco router and confirmed that phone are registered with IP address.
P a g e | 32
Router#%IPPHONE-6-REGISTER: ephone-1 IP:192.168.10.2 Socket:2 DeviceType:Phone has registered. Router#%IPPHONE-6-REGISTER: ephone-2 IP:192.168.10.3 Socket:2 DeviceType:Phone has registered. Check lease IP address in router using following command.
Router#sh ip dhcp binding IP address Client-ID/ Lease expiration Hardware address 192.168.10.3 0006.2A21.B937 -192.168.10.4 000B.BE52.8501 -192.168.10.2 0001.9628.4786 -192.168.10.6 0010.11E9.75C9 --
Page |i
Chapter 5 Conclusion
_______________________________________________________________________ Wireless networking provides numerous opportunities to increase productivity and cut costs. It also alters an organizations overall computer security risk profile. Although it is impossible to totally eliminate all risks associated with wireless networking, it is possible to achieve a reasonable level of overall security by adopting a systematic approach to assessing and managing risk. This report mentioned the threats and vulnerabilities associated with each of the three basic technology components of wireless networks (clients, access points, and the transmission medium) and described various commonly available countermeasures that could be used to mitigate those risks. It also stressed the importance of training and educating users in safe wireless networking procedures. We also demonstrated the VoIP technology and its upper hand of the conventional communication system as a practical implementation in real world scenario.
[2]http://reviews.cnet.com/routers/cisco-2621-ethernet-fast/4507-3319_7-112030.html
[3]http://reviews.cnet.com/routers/linksys-wrt300n-router/4507-3319_7-31851121.html
[4]http://www.cisco.com/web/learning/netacad/course_catalog/docs/Cisco_PacketTracer _AAG.pdf
[5]http://www.cisco.com/web/learning/netacad/downloads/pdf/PacketTracer5_0_Brochur e_0707.pdf
[6]http://ieeexplore.ieee.org/ielx5/49/32439/01514524.pdftp=&arnumber=1514524&isnu mbe
P a g e | ii
ii