7,963 research outputs found

    Quality of Service challenges for Voice over Internet Protocol (VoIP) within the wireless environment

    Get PDF

    Economic Development Potential through IP Telephony for Namibia

    Get PDF
    IP telephony, economic growth, telecommunications, ICT, Granger causality, Namibia

    Satellite system performance assessment for in-flight entertainment and air traffic control

    Get PDF
    Concurrent satellite systems have been proposed for IFE (In-Flight Entertainment) communications, thus demonstrating the capability of satellites to provide multimedia access to users in aircraft cabin. At the same time, an increasing interest in the use of satellite communications for ATC (Air Traffic Control) has been motivated by the increasing load of traditional radio links mainly in the VHF band, and uses the extended capacities the satellite may provide. However, the development of a dedicated satellite system for ATS (Air Traffic Services) and AOC (Airline Operational Communications) seems to be a long-term perspective. The objective of the presented system design is to provide both passenger application traffic access (Internet, GSM) and a high-reliability channel for aeronautical applications using the same satellite links. Due to the constraints in capacity and radio bandwidth allocation, very high frequencies (above 20 GHz) are considered here. The corresponding design implications for the air interface are taken into account and access performances are derived using a dedicated simulation model. Some preliminary results are shown in this paper to demonstrate the technical feasibility of such system design with increased capacity. More details and the open issues will be studied in the future of this research work

    New security and control protocol for VoIP based on steganography and digital watermarking

    Get PDF
    In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic. Additionally this solution offers authentication and integrity, it is capable of exchanging and verifying QoS and security parameters. It is based on digital watermarking and steganography that is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content.Comment: 8 pages, 4 figures, 1 tabl

    Comment: Monitoring Networked Applications With Incremental Quantile Estimation

    Full text link
    Comment: Monitoring Networked Applications With Incremental Quantile Estimation [arXiv:0708.0302]Comment: Published at http://dx.doi.org/10.1214/088342306000000619 in the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org

    SecMon: End-to-End Quality and Security Monitoring System

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guaranties makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement's results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On Computer Science - Research And Applications, Poland, Kazimierz Dolny 31.01-2.02 2008; 14 pages, 5 figure
    • 

    corecore