Results 51 to 60 of about 578 (137)
Novel Method of Reducing the Allocated Bandwidth by Voip
Old telecommunication systems are gradually being replaced by a new system that works over IP networks, which is known as voice over internet protocol (VoIP). VoIP has several merits (e.g., very cheap call rate), which make it increasingly popular in the
Abualhaj Mosleh M.+3 more
doaj +1 more source
A Survey of Load Balancing Approaches Based on Switch Migration in Software‐Defined Networks
In this article, after discussing the load balancing of multiple controllers as one of the research challenges in this field, its solution through the switch migration is investigated. A variety of load balancing methods based on switch migration are investigated and then a comprehensive comparison is made between them.
Hamid Reza Naji, Harir Riyahi
wiley +1 more source
A Black Box Analysis of Webrtc Mouth-To-Ear Delays
Due to the recent shift toward cloud based computing, some of the world's leading standardization bodies have combined forces to provide guidelines and standards for native implementation of RealTime Communication (RTC) in the browsers.
Oliwia Komperda+2 more
doaj +1 more source
Over the past decades, Session Initiation Protocol (SIP) has been commonly utilized in signaling protocol to control and signal multimedia communication sessions for providing various services to users. Video calls and internet telephony over Internet Protocol (IP) are the most common applications on SIP.
V. Sreenivasulu+2 more
wiley +1 more source
Digital forensics in VoIP networks [PDF]
With VoIP being deployed on large scale, forensic analysis of captured VoIP traffic is of major practical interest. In this paper, we present a new fingerprinting approach that identifies the types of devices (name, version, brand, series) in captured VoIP traffic. We focus only on the signaling plane and discard voice related data.
François, Jérôme+3 more
openaire +3 more sources
Voz IP seguras implementadas en Redes Definidas por Software
Hablar sobre las redes definidas por software, es un paradigma, son más agiles, escalables y dinámicas, para un mejor aumento de programación y automatización.
Byron Oviedo-Bayas+3 more
doaj
Perkembangan teknologi informasi dan komunikasi yang semakin maju, didukung dengan jaringan internet yang semakin sering digunakan dalam kehidupan sehari-hari serta pentingnya komunikasi dalam sebuah lingkungan pemerintahan, maka dalam penelitian ini ...
Maftufin Exsan, Umi Fadlilah
doaj +1 more source
This study highlights the urgent need for effective real‐time network security solutions in the face of increasing cyber threats. It examines the performance of a logistic regression model enhanced by Bayesian optimization for detecting TOR traffic using the UNB‐CIC TOR‐NonTOR datasets and a Bayesian‐optimized random forest model for the CIC ...
Manisankar Sannigrahi+2 more
wiley +1 more source
LACK—a VoIP steganographic method [PDF]
The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK's hidden data insertion procedure on ...
Józef Lubacz, Wojciech Mazurczyk
openaire +2 more sources
Análisis de vulnerabilidades para la capa de aplicación en la transmisión VoIP
RESUMEN Este documento describirá el análisis de ciertas vulnerabilidades presentes en la capa de aplicación de la transmisión VoIP empleando un escenario de prueba basado en PBX Elastix y herramientas de Testing VoIP como Backtrack y Wireshark. También
Germania del Rocío Veloz Remache
doaj