IoT traffic management and integration in the QoS supported network

BKJ Al-Shammari, N Al-Aboody… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
This paper proposes: 1) a traffic flow management policy, which allocates and organizes
machine type communication (MTC) traffic flows network resources sharing within evolved …

A new algorithm for optimization of quality of service in peer to peer wireless mesh networks

M Gheisari, J Alzubi, X Zhang, U Kose, JAM Saucedo - Wireless Networks, 2020 - Springer
Nowadays, wireless mesh networks are known as important parts of different commercial,
scientific, and industrial processes. Their prevalence increases day-by-day and the future of …

[PDF][PDF] A comprehensive review on VoIP over Wireless LAN networks

H Kazemitabar, S Ahmed, K Nisar… - Computer Science …, 2010 - scholar.archive.org
Abstract Voice over Internet Protocol (VoIP) is one of the most important technologies in the
world of communication. Around 20 years of research on VoIP, some Quality of Service …

Securing session initiation protocol

O Younes, U Albalawi - Sensors, 2022 - mdpi.com
The session initiation protocol (SIP) is widely used for multimedia communication as a
signaling protocol for managing, establishing, maintaining, and terminating multimedia …

WiFi network virtualization to control the connectivity of a target service

K Nakauchi, Y Shoji - IEEE Transactions on Network and …, 2015 - ieeexplore.ieee.org
This paper proposes a WiFi network virtualization technique to control the connectivity of a
target service. The packet-level delay violation ratio can be reduced even in a congested …

Performance analysis of VoIP over 3G and 4G LTE network

M Kassim, RA Rahman, MAA Aziz… - 2017 International …, 2017 - ieeexplore.ieee.org
Wireless mobile telecommunication has evolved from the Third Generation (3G) to Fourth
Generation (4G) network. Mobile WiMAX and Long Term Evolution are the first two platforms …

An experimental evaluation and characterization of VoIP over an LTE-A network

M Di Mauro, A Liotta - IEEE Transactions on Network and …, 2020 - ieeexplore.ieee.org
Mobile telecommunications are converging towards all-IP solutions. This is the case of the
Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support …

[PDF][PDF] A survey on voice over ip over wireless lans

H Kazemitabar, S Ahmed, K Nisar, AB Said… - International Journal of …, 2010 - csd.uoc.gr
Voice over Internet Protocol (VoIP) is a form of voice communication that uses audio data to
transmit voice signals to the end user. VoIP is one of the most important technologies in the …

A new approach based on game theory to reflect meta-cluster dependencies into VoIP attack detection using ensemble clustering

F Bavifard, M Kheyrandish, M Mosleh - Cluster Computing, 2023 - Springer
Despite wide applicability of Voice over IP (VoIP), it's highly vulnerable to various attacks.
Most prominent ways to secure it employ intrusion detection systems (IDS); based on …

Functional and I/sub DDQ/testing on a static RAM

R Meershoek, B Verhelst, R McInerney… - Proceedings …, 1990 - ieeexplore.ieee.org
A layout defect analysis was performed on an 8K* 8 static RAM. Simulations were done to
determine the electrical behavior and detection possibilities of the defects. The authors …