-
341
Analiza protokola kvaliteta usluga telekomunikacionih mreža / Analysis of quality of service protocols in telecommunication networks
Published 2003-05-01“…Protokoli kvaliteta usluga (Quality of Service - QoS) sadašnjih i budućih telekomunikacionih mreža razvijeni su, pored ostalog, sa ciljem da podrže različite klase usluga (Class of Service - CoS) komunikaciju u realnom vremenu, kao i prenos multimedijalnih poruka preko paketskih IP (Internet Protocol) mreža. U raduje dat pregled karakteristika tih protokola i ocena njihovih konkretnih mogućnosti u obezbeđenju kvaliteta usluga unutar sistema ('s vrha do dna', tj. vertikalno u OSI arhitekturi) kao i 'horizontalno' odnosno s kraja na kraj veze, tj. između izvora i odredišta. / Today's and future telecommunication networks must enable transmission throughout heterogeneous environment, using different Quality of Service protocols, Quality of Service protocols use a variety of complementary mechanisms to enable deterministic end-to-end different data delivery. …”
Get full text
Article -
342
Mathematical Bottom-to-Up Approach in Video Quality Estimation Based on PHY and MAC Parameters
Published 2017-01-01“…Verification of the model was checked by experimental method with consideration of Internet protocol television (IPTV) service delivery in Digital Subscriber Line network.…”
Get full text
Article -
343
Simulation-based optimization of signaling procedures in IP multimedia subsystem
Get full text
Article -
344
Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat
Published 2022-10-01“…The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols. …”
Get full text
Article -
345
A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection
Published 2016-10-01“…On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol) packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. …”
Get full text
Article -
346
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks
Published 2015-08-01“…The dramatically increasing number of connected things based on Internet protocol is leading to a new concept called the Internet of Things (IoT). …”
Get full text
Article -
347
A Design for an Internet Router with a Digital Optical Data Plane
Published 2017-02-01“…This paper presents a complete design for an optical Internet router based on the component steps required for Internet protocol (IP) packet forwarding. Implementations of hop count decrement and header matching are integrated with a simulation-based approach to variable-length packet traffic merging that avoids recirculation, demonstrating an approach for an all-optical data plane. …”
Get full text
Article -
348
Building Model for the University of Mosul Computer Network Using OPNET Simulator
Published 2013-04-01“…These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. …”
Get full text
Article -
349
Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks
Published 2020-03-01“…In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution. …”
Get full text
Article -
350
Technology that Touches Lives: Teleconsultation to Benefit Persons with Upper Limb Loss
Published 2011-12-01“… This article describes how expert prosthetists and occupational therapists at Touch Bionics, a manufacturer of advanced upper limb prosthetic devices, employ Voice over the Internet Protocol (VoIP) videoconferencing software telehealth technologies to engage in remote consultation with users of prosthetic devices and/or their local practitioners. …”
Get full text
Article -
351
An Appropriate Traffic Routing Scheme for Node-to-Node Communications in LEO Satellite Network Using Hybrid Mesh Topology
Published 2008-06-01“…Some of themare based on the Internet Protocol (IP), the Asynchronous Transfer Mode (ATM) switching,and the Routing Sets (RS).This paper will introduce an improving for the new packet routing mechanism overinter-connected satellite networks that is the Minimum Flow Maximum Residual (MFMR)algorithm that will be based on RS concept and will give simulation results of a certainscenario. …”
Get full text
Article -
352
Nonlinear remote monitoring system of manipulator based on network communication technology
Published 2023-01-01“…In this article, in the Visual C++ environment, the transmission control protocol/internet protocol technology is used to build a remote monitoring system for the robotic arm, and it mainly realizes the function of the robotic arm running according to the trajectory in the remote. …”
Get full text
Article -
353
CONGESTION CONTROL PADA JARINGAN KOMPUTER BERBASIS MULTI PROTOCOL LABEL SWITCHING (MPLS)
Published 2020-04-01“…Nilai-nilai yang didapatkan dari paramater tersebut kemudian dibandingkan dengan standar dari Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) dengan tujuan untuk mengetahui kualitas layanan pengiriman data pada jaringan MPLS ketika terjadi network congestion di lintasanya. …”
Get full text
Article -
354
An Optimal Rejuvenation Strategy for Increasing Service Reliability of a VOIP System with Multiple Components
Published 2017-12-01“…In this day and age Voice over Internet Protocol (VoIP) has turned out to be a revolutionary technology in the field of telecommunication. …”
Get full text
Article -
355
An Early Fire Detection Algorithm Using IP Cameras
Published 2012-05-01“…In this paper we propose an algorithm to detect the presence of smoke using video sequences captured by Internet Protocol (IP) cameras, in which important features of smoke, such as color, motion and growth properties are employed. …”
Get full text
Article -
356
Encryption VoIP based on Generated Biometric Key for RC4 Algorithm
Published 2021-03-01“…Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. …”
Get full text
Article -
357
The role of National Strategies in maintaining Competitive Edge in Information and Communication Technologies
Published 2006-12-01“…This paper examines the economical impact of IPv6, Internet Protocol's next generation. Technically, IPv6 represents an upgrade, an evolution that offers the resources necessary for deeper and wider market penetration of the IP technology, to support the needs of a global economy, to build new products and new services. …”
Get full text
Article -
358
Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks.
Published 2020-01-01“…However, the firewall provided by OpenFlow suffers from Internet protocol version 6 (IPv6) fragmentation, which can be used to bypass the OpenFlow firewall. …”
Get full text
Article -
359
Variability and Performance of Short to Long-Range Single Baseline RTK GNSS Positioning in Indonesia
Published 2019-01-01“…This method uses Ultra High Frequency (UHF) radio to transmit the correction data, however, due to gain and power issues, Networked Transport of RTCM via Internet Protocol (RTCM) is used to transmit the correction data for a longer baseline. …”
Get full text
Article -
360
Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation
Published 2018-01-01“…The deployment of Internet Protocol version 6 (IPv6) has raised security concerns among the network administrators. …”
Get full text
Article