103 research outputs found

    VOIP Model for ICT Rural Communities Telecentre in Sintok

    Get PDF
    Transmission of Voice over Internet Protocol (VoIP) on packet switching networks is one of the rapidly emerging real-time applications. VoIP is a formation of audio and voice communication. It receive voice signal activities then encoded in digital form and divided into small parts of information as like voice data network packets. These data network packets are decoded and transmitted voice in signals then sender and receiver having a voice conversion. In a voice conversion, the clients send and receive packets in a bidirectional method. Each client work as a sender and as a receiver depends on the direction of traffic flow over network. The aim of this proposal is to propose a VOIP model for ICT rural community’s telecaster in Sintok

    Dimensions Of Security Threats In Cloud Computing: A Case Study

    Get PDF
    Even though cloud computing, as a model, is not new, organizations are increasingly implementing it because of its large-scale computation and data storage, flexible scalability, relative reliability, and cost economy of services. However, despite its rapid adoption in some sectors and domains, it is evident from research and statistics, that security-related threats are the most noticeable barrier to its widespread adoption. To investigate the reasons behind these threats, the authors used available literature to identify and aggregate information about IS security threats in cloud computing. Based on this information, the authors explored the dimensions of the nature of threat by interviewing a cloud computing practitioner in an organization that uses both the private and public cloud deployment models. From these findings, the authors found that IS security threats in cloud computing must be defined at different levels; namely, at the business and technical level, as well as from a generic and cloud-specific threat perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix (CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully comprehend the concerns so that they can make relevant decisions while availing cloud computing services

    A Novel Voice Priority Queue (VPQ) Schedule and Algorithm for VoIP over WLAN Network

    Get PDF
    The VoIP deployment on Wireless Local Area Networks (WLANs), which is based on IEEE 802.11 standards, is increasing. Currently, many schedulers have been introduced such as Weighted Fair Queueing (WFQ), Strict Priority (SP) General processor sharing (GPS), Deficit Round Robin (DRR), and Contention-Aware Temporally fair Scheduling (CATS). Unfortunately, the current scheduling techniques have some drawbacks on real-time applications and therefore will not be able to handle the VoIP packets in a proper way. The objective of this research is to propose a new scheduler system model for the VoIP application named final stage of Voice Priority Queue (VPQ) scheduler. The scheduler system model is to ensure efficiency by producing a higher throughput and fairness for VoIP packets. In this paper, only the final Stage of the VPQ packet scheduler and its algorithm are presented. Simulation topologies for VoIP traffic were implemented and analyzed using the Network Simulator (NS-2). The results show that this method can achieve a better and more accurate VoIP quality throughput and fairness index over WLANs

    A novel Voice Priority Queue (VPQ) scheduler and algorithm for VOIP over WLAN network

    Get PDF
    The VoIP deployment on Wireless Local Area Networks (WLANs), which is based on IEEE 802.11 standards, is increasing.Currently, many schedulers have been introduced such as Weighted Fair Queueing (WFQ), Strict Priority (SP) General processor sharing (GPS), Deficit Round Robin (DRR), and Contention-Aware Temporally fair Scheduling(CATS).Unfortunately, the current scheduling techniques have some drawbacks on real-time applications and therefore will not be able to handle the VoIP packets in a proper way.The objective of this research is to propose a new scheduler system model for the VoIP application named final stage of Voice Priority Queue (VPQ) scheduler.The scheduler system model is to ensure efficiency by producing a higher throughput and fairness for VoIP packets.In this paper, only the final Stage of the VPQ packet scheduler and its algorithm are presented.Simulation topologies for VoIP traffic were implemented and analyzed using the Network Simulator (NS-2).The results show that this method can achieve a better and more accurate VoIP quality throughput and fairness index over WLANs

    Multi-Agent System Approach for Trustworthy Cloud Service Discovery

    Get PDF
    Accessing the advantages of cloud computing requires that a prospective user has proper access to trustworthy cloud services. It is a strenuous and laborious task to find resources and services in a heterogeneous network such as cloud environment. The cloud computing paradigm being a form of distributed system with a complex collection of computing resources from different domains with different regulatory policies but having a lot of values could enhance the mode of computing. However, a monolithic approach to cloud service discovery cannot help the necessities of cloud environment efficiently. This study put forward a distributive approach for finding sincere cloud services with the use of Multi-Agents System for ensuring intelligent cloud service discovery from trusted providers. Experiments were carried out in the study using CloudAnalyst and the results indicated that extending the frontiers MAS approach into cloud service discovery by way of integrating trust into the process improves the quality of service in respect of response time and scalability. A further comparative analysis of the Multi-Agents System approach for cloud service discovery to monolithic approach showed that Multi-Agents System approach is highly efficient, and highly flexible for trustworthy cloud service discovery

    A Level-Wise Periodic Tree Construction Mechanism for Sleep Scheduling in WSN

    Get PDF
    The wireless sensor network(WSN) has been extensively used to monitor and control the natural ecosystem on a large scale like air quality, natural life, etc. Low battery power,low storage, and limited processing ability are the most critical areas of concern in WSN. To reduce energy utilization, the sensor nodes in WSN work in a cyclic process between active and sleep mode. A certain number of nodes are chosen active and they areresponsible for sensing as well as data transmission and rest of the nodes are gone to sleep. In order to lengthen the lifetime of network, in this paper we proposed a level wise periodic tree construction algorithm that uses a specific set of nodes to participate in tree construction, instead of all the nodes, to minimize the energy consumption. In this proposed approach, the main idea is to put the nodes, which are currently active and have already spent a significant amount of energy, to sleep mode, while giving chances to the leaf nodes, which has comparatively spent less energy, to become an active node and maintain connectivity. The performance of the proposed protocol is evaluated usingthe Castalia simulator. The simulation results show that the proposed level-wise periodic tree construction approach increases the durability of the network in conjunction with the non-level approach

    Chronology of the development of Active Queue Management algorithms of RED family. Part 1: from 1993 up to 2005

    Get PDF
    This work is the first part of a large bibliographic review of active queue management algorithms of the Random Early Detection (RED) family, presented in the scientific press from 1993 to 2023. The first part will provide data on algorithms published from 1993 to 2005
    corecore