3 research outputs found

    An efficient process for estimation of network demand for QoS-aware IP network planning

    No full text
    Estimations of network demand are an essential input to the IP network planning process. We present a technique for per traffic class IP network demand estimation based on harnessing information gathered for accounting and charging purposes. This technique represents an efficient use of pre-existing information, is easy to deploy, and, crucially, is highly cost-effective in comparison to traditional direct measurement systems employing dedicated traffic metering hardware. In order to facilitate QoS-aware network planning we also introduce a technique for estimation of QoS related effective bandwidth coefficients via analysis of a relatively small number of packet traces. The combination of the demand and effective bandwidth coefficient estimation techniques provide the basis for an effective, low-cost network planning solution. In this paper we present initial results that validate our contention that network accounting records can be reused to create a QoS aware demand matrix for IP networks

    Improved Performance of Secured VoIP Via Enhanced Blowfish Encryption Algorithm

    Get PDF
    Both the development and the integration of efficient network, open source technology, and Voice over Internet Protocol (VoIP) applications have been increasingly important and gained quick popularity due to new rapidly emerging IP-based network technology. Nonetheless, security and privacy concerns have emerged as issues that need to be addressed. The privacy process ensures that encryption and decryption methods protect the data from being alternate and intercept, a privacy VoIP call will contribute to private and confidential conversation purposes such as telebanking, telepsychiatry, health, safety issues and many more. Hence, this study had quantified VoIP performance and voice quality under security implementation with the technique of IPSec and the enhancement of the Blowfish encryption algorithm. In fact, the primary objective of this study is to improve the performance of Blowfish encryption algorithm. The proposed algorithm was tested with varying network topologies and a variety of audio codecs, which contributed to the impact upon VoIP network. A network testbed with seven experiments and network configurations had been set up in two labs to determine its effects on network performance. Besides, an experimental work using OPNET simulations under 54 experiments of network scenarios were compared with the network testbed for validation and verification purposes. Next, an enhanced Blowfish algorithm for VoIP services had been designed and executed throughout this research. From the stance of VoIP session and services performance, the redesign of the Blowfish algorithm displayed several significant effects that improved both the performance of VoIP network and the quality of voice. This finding indicates some available opportunities that could enhance encrypted algorithm, data privacy, and integrity; where the balance between Quality of Services (QoS) and security techniques can be applied to boost network throughput, performance, and voice quality of existing VoIP services. With that, this study had executed and contributed to a threefold aspect, which refers to the redesign of the Blowfish algorithm that could minimize computational resources. In addition, the VoIP network performance was analysed and compared in terms of end-to-end delay, jitter, packet loss, and finally, sought improvement for voice quality in VoIP services, as well as the effect of the designed enhanced Blowfish algorithm upon voice quality, which had been quantified by using a variety of voice codecs

    Autonomic Principles of IP Operations and Management:6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Proceedings

    No full text
    The proceedings contain 22 papers. The topics discussed include: traffic modeling and classification using packet train length and packet train size; adaptive bandwidth allocation method for long range dependence traffic; algorithms for fast resilience analysis in IP networks; a quantitative QoS routing model for diffserv aware MPLS networks; experience-based admission control with type-specific overbooking; applying blood glucose homeostatic model towards self management of IP QoS provisioned networks; new mathematical models for token bucket based meter/markers; an efficient process for estimation of network demand for QoS-aware IP network planning; a protocol for atomic deployment of management policies in QoS-enabled networks; towards automatic network management for mobile IPv4 based wireless networks; and principles of secure network configuration: towards a formal basis for self configuration
    corecore