Stateless security filtering of optical data signals: an approach based on code words
|
|
- Bethanie Paulina Benson
- 8 years ago
- Views:
Transcription
1 Stateless security filtering of optical data signals: an approach based on code words Maha Sliti, Noureddine Boudriga Communication Networks and Security Research Lab. University of Carthage, Tunisia Abstract In this paper, we propose an optical stateless filtering architecture which allows the traffic filtering at the optical layer. Indeed, each traffic stream will be identified by a unique identifier composed of a set of code words. In the core node, a set of optical filtering rules will be applied to this traffic stream based on its corresponding identifier in order to accept or reject the traffic stream. The stateless filtering process is based on the logical comparison between the received traffic identifier and the optical filtering signal which are composed of a set of code words. The proposed architecture is composed by two main components. The first component is an encoder implemented in the edge node, which generates traffic stream identifiers. And, the second component is the optical stateless filtering module which is implemented in the core node. Index Terms all-optical network, optical stateless filtering, code words, optical traffic identifier, optical logic gates, SOA. I. INTRODUCTION The amount of research being done in the area of optical communications has dramatically increased over the last years. A large proportion of the telecommunications functionalities including switching, flow control, and buffering are nowadays possible to be performed on the optical layer. As a consequence, many applications and services rely on the large bandwidth and high Quality of Service (QoS) provided by optical infrastructures. Due to the sensitivity of the aforementioned applications, more security requirements for optical networks are necessary. Indeed, some optical networks features can be used by an attacker to analyze traffic, eavesdrop, deny service, etc. Several approaches have been proposed in the literature to address the protection of optical networks [1], [2] and [3]. In [4], [5], authors propose filtering functionalities in optical networks. In [4], a filtering approach was developed in the frame of the WISDOM (WIrespeed Security Domains using Optical Monitoring) project which considers algorithms directly at high-speed optical data communication rates. One major drawback of these methods is that they do not take into consideration the specific features of optical networks. They just translate traditional security mechanisms to optical architectures. In [5], the authors propose an optical firewall architecture which filters a new category of attacks against optical networks that aims at exhausting the capabilities of the core nodes. This approach is limited to filtering attacks based on the BHP packets and allows only the BHP DOS attack filtering. In this paper, we propose an all optical stateless filtering architecture which allows the traffic filtering at the optical layer. Indeed, each traffic stream will be identified by a unique identifier composed of a set of code words. In the core node, a set of optical filtering rules will be applied to this traffic stream based on its corresponding identifier in order to accept or reject the traffic stream. The stateless filtering process is based on the logical comparison between the received traffic identifier and the optical filtering signal which are composed of a set of code words. This work improves the idea presented by the authors in [6] which presents a stateless optical filtering approach based on optical code words and considers an electronic security policy. The key contributions with respect to the previously published research are: 1) To the best of our knowledge, our work includes the first study of the stateless filtering process at the optical layer based on optical filtering rules and code words. This allows the filtering process, based on traffic identifiers, to be performed at very high bit rates. 2) The design of the optical stateless filtering architecture is based on optical logic gates AND/XOR which allows greater flexibility and variety in optical filtering rules. 3) Different types of optical filtering rules are considered according to the type of protocols. By optimizing the number of optical filtering rules applied to each traffic stream, the filtering process is more optimized in terms of filtering delay and quality of the transmitted signal. 4) The filtering architecture is built upon components available by current technology. Therefore, the architecture is effectively implementable. The rest of the paper is organized as follows. Section 2 presents the all-optical signal processing. Section 3 describes the mapping between packets and filtering rules. The design of all optical filtering operations is presented in Section 4. The proposed optical stateless firewall architecture is described in Section 5. Simulations and experimental results are given in Section 6. Finally, Section 7 concludes the paper. II. ALL-OPTICAL SIGNAL PROCESSING For optical signal processing and ultra-high-speed telecommunication, all-optical logic operations are required in order to avoid the electronic-optical conversion. All-optical logic gates are indispensable to critical networking functions, such as pattern matching, all-optical switching, signal regeneration, header recognition, pseudorandom number generation, and parity checking. All optical logic gates can be realized 118
2 by nonlinear optical signal materials that enable different light beams to interact. In the literature, many approaches have been proposed to achieve all-optical logic operations, based on the nonlinear effects either in optical fiber or in semiconductor optical amplifier (SOA) [7]. Compared with optical fiber based logic gates, SOAs based logic gates are promising because of their power efficiency and their potential for photonic integration. SOA is characterized by several nonlinearity effects, such as four wave mixing (FWM), crossphase modulation (XPM), and cross-gain modulation (XGM). In order to implement the all optical logic gates, AND and XOR, used to implement the proposed all optical filtering operations, we consider the XGM effect in the SOA. The cross modulation gain (XGM) consists on the gain modulation induced by a control signal that affects the gain of the signal propagating simultaneously in the SOA. A. Basic all-optical signal processing operations In this section, we present some basic operations of alloptical signal processing which are: 1) the all optical matching operation Matchop (S in,r) verifies the matching between two fields in the input optical signals. 2) the all optical greater operation Supop (S in,r) verifies whether a field in the first optical signal is greater than a field in the second optical signal. B. Design of all-optical signal processing operations In this section, we present the design of the proposed all optical filtering operations which is based on the use of all optical logic gates (AND, XOR). 1) Design of all optical logic gates and/xor: a) All optical logic gate AND: The all-optical AND gate structure is designed using two SOAs by considering crossgain modulation (XGM), as illustrated in Figure 1 [8]. With proper manipulation of pump and probe signals, the truth table is verified. Figure 2. Optical XOR gate design. the signal R. The all optical operations Matchop(S in,r) and Supop(S in,r) are achieved by an all-optical N-bit comparator based on SOAs exploiting XGM between two counterpropagating signals [10]. The N-bit all-optical comparator allows the comparison of two signals A and B by computing the functions A > B and A = B. The functiona = B performs the all optical matching operation Matchop(S in,r) and the function A > B performs the all optical greater operation Supop(S in,r). The all optical N-bit comparator [10], illustrated in Figure 3, compares two N-bit signals A and B. The comparison is performed sequentially starting from the Most Significant Bit (MSB). At the output of the XOR gate, a Serial to Parallel Conversion (SPC) is performed. The AND (AND1) is performed between the i th bit of the XOR output and the preceding inverted (i 1) bits. The AND1 output is a sequence of N bits that represents the function A = B. At the AND1 output, whether the input signals A and B match, the N bits are 0. Infact, the XOR output is 0 for each compared bit. Otherwise, the AND1 will be equal to 1 when the first mismatch is found. The AND (AND2), between the AND1 output and the input signal A, performs the function A > B. When the input signals A and B match, AND1 output is 0, consequently A > B is 0. When the first mismatch occurs, AND1 output becomes 1. If the corresponding bit of A is 1, thus A > B is 1. Otherwise, A > B is 0. In the same manner, AND (AND3), between the AND1 output and B, represents the function A < B. Figure 1. Optical AND gate design. b) All optical logic gate XOR: Figure 2 presents the design of the all-optical XOR gate by using cross-gain modulation (XGM). The design [9] does not require additional input beam such as a clock signal or continuous wave light, which is required in other all-optical XOR gates. The alloptical XOR gate structure is designed using two SOAs. With proper manipulation of pump and probe signals, the truth table is verified. 2) Design of all optical operations: The all optical operation Matchop(S in,r) verifies that a field in a signal S in (the received signal) matches a field in a signal R in the optical domain. And, the all optical operation Supop(S in,r) verifies whether a field in the signal S in is greater than a field in Figure 3. Optical comparator design. III. ALL OPTICAL STATELESS FIREWALL ARCHITECTURE The proposed optical stateless filtering architecture, illustrated in Figure 4, allows the data signal filtering at the optical layer. In the edge node, each traffic stream will be identified 119
3 by a unique identifier composed of a set of code words which are a sequence of optical pulses. At the reception of a traffic stream at the core node, a set of optical filtering rules is applied to its corresponding identifier, in order to accept or reject the traffic stream. The proposed architecture is mainly composed by two components. The first component is the traffic identifier generation module which is implemented in the edge node and ensures the mapping between traffic streams and optical code words. And, the second component is the optical stateless filtering module which is implemented in the core node and based on the mapping between optical filtering rules and optical code words. At the reception of the traffic stream composed by the payload, the traffic identifier and the label, these fields are extracted and processed as follows: the payload is stored in an optical virtual memory (VOM) during the filtering delay, based on the label, the traffic identifier will be switched to the corresponding filtering sub-module by using an Optical Switch Gate (OSG). The proposed stateless filtering module implements optical filtering rules based on all optical filtering operations achieved by all optical logic gates AND/XOR. The stateless filtering module is composed of a set of optical filtering rules. Each optical filtering rule is based on one or several optical filtering operations. The payload will be sent to the next node only if it verifies at least a filtering rule. Indeed, we consider a "default deny" optical filtering policy known as where the filtering rules specify only traffics which are authorized to be forwarded by the optical filter. Traffic streams which do not match any configured rule will be denied by default. The stateless filtering module is subdivided to a set of submodules allowing the filtering of different types of protocols depending on the received Label. IV. MAPPING PACKETS AND FILTERING RULES In this section, we explain the traffic identifier generation in the edge node which insures the mapping between traffic streams and optical code words and the mapping between filtering rules and code words in the firewall core node. Indeed, each traffic stream will be identified by a unique identifier composed of a set of code words. In the core node, packets can be accepted or rejected based on their traffic identifiers. In order to perform the proposed filtering process, it is necessary to define a first mapping between traffic streams and traffic identifiers and a second mapping between optical filtering rules and code words. A. Traffic identifier generation A received traffic data <P>, in the edge node, contains a set of fields < F 1,F 2,...,F n > which uniquely identifies the traffic (Source IP address, source port, destination IP address, destination port, type of transport protocol, flag, etc). Therefore, the Traffic Identifier is generated for each traffic data <P> based on the fields < F 1,F 2,...,F n > by proceeding as follows: For each field < F i > formed by a sequence of s bits, a set of 2 s code words are generated and ordered starting from the smallest to the largest code word value. Therefore, if d 1 and d 2 are two different values of the field < F i > with d 1 < d 2, cd 1 and cd 2 are two code words with cd 1 < cd 2, then cd 1 is mapped to d 1 and cd 2 is mapped to d 2. The traffic identifier will be composed by a sequence of code words < cd 1,cd 2,...,cd n > representing the set of fields < F 1,F 2,...,F n > in a predefined order. The code words order in the Traffic Identifier is important and must be respected by the traffic generator module since the same order will be considered by the filtering module in the core node. Therefore, the optical filtering rules consider this order to verify whether a traffic stream matches a rule or not. The generated traffic identifier < cd 1,cd 2,...,cd n > is associated to the beginning of each traffic data <P>: <P><trafficidentifier>. The skilled reader will understand that the traffic identifier will be treated in the optical layer since it is not associated to the Header which requires the conversion of the optical signal into an electronic signal as an intermediate step. This allows the filtering process, based on traffic identifiers, to be performed at very high bit rates. Figure 4. All optical stateless firewall architecture. B. Mapping filtering rules and code words The all optical filtering process insures the access control security service of the traffic streams at the optical layer. The access control service consists in discriminating the traffic streams to be forwarded by the firewall core node according to an all optical security policy. The all optical security policy is formed by a set of filtering rules represented by optical signals generated by the filtering module depending on the protocol to be filtered. 120
4 The proposed all optical filtering process, performed in the firewall core node, is based on the mapping between filtering rules and code words. In this objective, each filtering rule is traduced to one or several optical filtering operations. In the following, we present the main types of all optical filtering rules which traduce the main electronic filtering rules to the optical domain: 1) All optical filtering of a unique field value: We consider the following filtering rule: If field = a then drop. In order to obtain an all optical filtering policy and to perform an all optical filtering process, an optical signal R, containing the code word corresponding to the field value a, is generated based on the same ordered set of code words considered for the traffic identifier generation. In order to verify that a received traffic data matches or not this rule, we define an all optical filtering operation noted Match op (S in,r) which have as inputs : S in (the traffic identifier) and R (the optical generated signal). Therefore, the rule in electronic domain is traduced to the optical layer as follows: if Match op (S in,r) then drop. 2) All optical filtering of interval of values: We consider the following filtering rule: If field > a then drop. The generated optical signal R is composed of the code word corresponding to the field value a. In order to verify that a received traffic data matches or not this rule, we define an all optical filtering operation noted Sup op (S in,r) which have as inputs : S in and R. Therefore, the rule is traduced to the optical domain as follows: if Sup op (S in,r) then drop. 3) All optical filtering of intervals of values: We consider the following filtering rule: If field G then drop with G = [a 1,a 2 ] [a 3,a 4 ]... [a n 1,a n ]. In this case, n optical signals will be generated and each optical signal contains the code word cd i (with 1 < i < n) corresponding to a field value in the range < a 1,a 2,a 3,a 4,...,a n 1,a n >. Therefore, the rule is traduced to the optical domain as follows: if Or ((Sup op (S in,r cd1 ) and Sup op (S in,r cd2 )), (Sup op (S in,r cdn 1 ) and Sup op (S in,r cdn )) ) then drop. V. DESIGN OF ALL OPTICAL FILTERING OPERATIONS The presented all optical filtering rules allowing to perform traffic stream filtering in the optical domain, are based on the presented all optical signal processing operations: All optical matching operation Match op (S in,r) which verifies that a code word in the signal S in matches a code word in the signal R, All optical comparison operation Sup op (S in,r) which verifies that a code word in the signal Sin is greater than a code word in the signal R. With S in and R are two optical signals such as S in corresponds to the received traffic identifier and R is the generated optical signal based on the considered filtering policy. The presented all optical signal processing operations perform the main types of all optical filtering operations: filtering of a unique field value, filtering of an interval of values, filtering of intervals of values. In this section, we present the design of the proposed all optical filtering operations. The traffic identifier signal, extracted from the received payload, is composed of a sequence of code words corresponding to field values. The order of these code words is indispensable since the optical signal R contains the code words to be verified by a filtering rule, by considering the same order of code words. If the generated signal R verifies the code word cd 1 for example and does not verify other code words in the traffic identifier, its structure will be as follows: cd 1, padding 2,...,padding n, where padding i is a sequence of pulses that allows the traffic identifier and the signal R to have the same length. Figure 5 illustrates the all optical filtering process based on the filtering operations Match op (S in,r) and Sup op (S in,r) performed by the N-bit comparator. Therefore, the extracted traffic identifier S in and the rule signal R are compared by the presented all-optical N-bit comparator. Then, the result of the comparison will be passed to a set of optical delay lines (ODLs) in order to delay pulses having as indexes i <= length cd1 to the L+1 index with length cd1 is the length of the cd 1 and L is the length of the signal R. At the output of the set of optical delay lines, a threshold detector detects a pulse in the L + 1 index of the output signal in the case of non matching of the optical signals S in and R. In the contrary case, the threshold detector does not detect a pulse. Figure 5. Optical filtering operation design. VI. SIMULATIONS AND EXPERIMENTAL RESULTS In this section, we evaluate the performance of the proposed stateless filtering approach based on code words. As simulation environment, we have considered Matlab For simulation purpose, we consider: a network connected in an arbitrary topology, each link has a fixed number of wavelengths and link loads are mutually independent. In order to analyze the security efficiency of the proposed filtering approach, as described by Figure 6, we compute the true positive rate in function of the false positive rate. We consider the following parameters: the erroneous load probability, the legitime load probability, the firewall node density in the network (the firewall node number in the network relatively to the total core node number in the network), the number of filtering rules for each firewall node and the filtering delay for each filtering rule. The true positive rate measures the proportion of erroneous packets which are correctly filtered by the firewall node. The false positive rate measures the proportion of legitime packets which are filtered by the firewall node. We consider the Receiver Operating Characteristic (ROC) curve as a tool to assess the performance of the optical layer 121
5 Figure 6. True positive rate in function of false positive rate. Figure 7. Filtering delay in function of firewall node density. filtering mechanism. Indeed, this curve is the plot of the true positive rate in function of the false positive rate. The closer the ROC plot is to the upper left corner, the higher the overall accuracy of the test. The area under the ROC curve (AUC) is a scalar measure. If the AUC is equal to 1, it reflects perfect forecasts. As illustrated in Figure 6, we notice that the true positive rate increases in function of the firewall node density in the network. Thus, the detection of erroneous and legitimate traffic streams can be assured only by nodes that implement the filtering module. The AUC in the case of the highest firewall node density value is greater than the AUC in the case of the lowest firewall node density. Therefore, the variation of the firewall node density in the network have a critical effect on the global performance of the firewall nodes. Furthermore, we analyze the effect of the proposed filtering approach on the global network performances and we fix the following parameters: the firewall node density, the number of filtering rules for each firewall node, the filtering delay for each filtering rule, the delay of one turn of the optical signal in the Virtual Optical Memory (VOM, [11]) and the degradation of the optical signal resulting of one turn in the VOM. The following parameters are assessed: the global delay spent by the traffic data in firewall nodes in function of the firewall node density in the network as illustrated in Figure 7. the global optical signal quality degradation which results from the traffic data delay in the VOM during the filtering process. This degradation depends on the firewall node density in the network as illustrated in Figure 8. In Figure 7, we notice that the global filtering delay increases in function of the firewall node density. Indeed, the traffic data is delayed in the VOM during the filtering delay in each firewall node which increases the global delay in the network. The accumulated delay in the VOM implies the Figure 8. Optical signal degradation in function of firewall node density. degradation of the optical signal quality depending on the number of turns in the VOM. Therefore, the turn number cannot exceed a maximum number of times n to preserve from unacceptable degradation of SNR. The envelope of the signal can experience severe changes with loss of information due to the effect of attenuation and dispersion. The threshold n is evaluated to 120 turns when the standard components are considered [11]. In Figure 8, we notice that the global degradation increases in function of the firewall node density in the network. And, finally, the following parameters are considered: the number of filtering rules for each firewall node, the number of code words filtered by each rule, the delay of one code word filtering and the delay of one turn of the optical signal in the VOM, in order to evaluate the firewall node performance 122
6 by assessing the effect of filtered code word number on the optical signal degradation during the filtering process. Figure 9. Optical signal degradation in function of filtered code word number. In Figure 9, we notice that the optical signal degradation depends on the maximum number of filtered code words by a rule. Indeed, the total delay required to filter several code words implies to delay the traffic data in the VOM which results on the degradation of the optical signal quality depending on the number of turns of the signal in the VOM. Therefore, the number of filtered code words cannot exceed a maximum value because of unacceptable degradation of SNR. The equation 1, established in [11], gives the logarithmic Q factor expression after i turns in the loop, which is deduced from the SNR i, and where B 0 is the optical bandwidth of the photodetector and B c is the electrical bandwidth of the receiver filter. The equation 2, established in [11], gives the SNR expression after i turns in the loop, where P in is the input signal power, SNR SSB is the SSB signal to noise ratio, η SP is the ratio of electrons in higher and lower states, h is the Plank s constant, f is the bandwidth that measures the noise figure and G EDFA is the EDFA gain. B 0 Q i (db) = 20log( SNR i ) (1) B c SNR i = P insnr SSB C i (2) where C i = iη SP hsnr SSB f(g EDFA 1)(2λ 0 λ(i+ 1))+iP in. This limit can be improved by extracting the different code words to be checked by a filtering rule, then check them in parallel instead of serial verification. This solution presents a constraint when extracting the code words from the traffic identifier however it can increase the number of filtered code words by decreasing the signal degradation caused by the number of turns in the VOM. VII. CONCLUSIONS AND PROSPECTS In this work, we have proposed an optical stateless filtering architecture which allows the traffic filtering at the optical layer. Each traffic stream is identified by a unique identifier composed of a set of code words. In the core node, a set of optical filtering rules will be applied to this traffic stream based on its corresponding identifier in order to accept or reject the traffic stream. Our work includes the first study of the stateless filtering process at the optical layer based on optical filtering rules and code words which allows the filtering process to be performed at very high bit rates. Furthermore, the design of the optical stateless filtering architecture is based on optical logic gates AND/XOR which allows greater flexibility and variety in optical filtering rules. The proposed filtering architecture is built upon SOAs in order to implement the all optical logic gates. Therefore, the architecture is effectively implementable. In future works, the proposed stateless filtering architecture will be extended to a stateful filtering architecture based on code words in order to allow the filtering of connection-oriented protocols in addition to non connectionoriented protocols. REFERENCES [1] T. Wu and A. Somani, "Cross-talk attack monitoring and localization in all-optical networks," IEEE/ACM Trans. Networking, vol. 13, no. 6, pp , Dec [2] C. Mas, I. Tomkos, and O. Tonguz, "Failure location algorithm for transparent optical networks," IEEE J. Select. Areas Commun., vol. 23, no. 8, pp , Aug [3] M. Sivakumar, R. K. Shenai, and K. Sivalingam, "A survey of survivabilty techniques for optical WDM networks," in Emerging Optical Network Technologies: Architectures, Protocols and Performance, A. Sivalingam and S. Subramaniam, Eds. New York, USA: Springer Science+Media, Inc., 2005, ch. 3, pp [4] R.J. Manning, R. Giller, X. Yang, R.P. Webb, D. Cotter, "Faster Switching with Semiconductor Optical Amplifiers," Proceedings of the International Conference on Photonics in Switching, pp , Aug [5] M. Sliti, M. Hamdi, N. Boudriga, "A novel optical firewall architecture for burst switched networks," International Conference on Transparent Optical Networks, Munich, Germany, [6] N. Boudriga, M. Sliti, W. Abdallah, "Optical code-based filtering architecture for providing access control to all-optical networks (Invited)," International Conference on Transparent Optical Networks, Coventry, England, [7] A. Rostami, H. Baghban, R. Maram, "Nanostructure Semiconductor Optical Amplifiers: Building Blocks for All-Optical Processing (Engineering Materials)," Springer, ISBN , [8] Kim, S.H. Kim, J.H. Son, C.W. Kim, G. Byun, Y.T. Jhon, Y.M. Lee, S. Woo, D.H., "Implementation of All-Optical Logic and Using Xgm Based on Semiconductor Optical Amplifiers," Optical Internet and Next Generation Network, COIN-NGNCON 2006, 9-13 July [9] V. K. Srivastava and V. Priye, "All optical half adder design using equations governing XGM and FWM effect in semiconductor optical amplifier," Int. J. Appl. Eng. Res. 1(3), (2010). [10] M. Scaffardi, P. Ghelfi, E. Lazzeri, L. Poti, A. Bogoni, "Photonic processing for digital comparison and full addition based on semiconductor optical amplifiers," IEEE J. of Select. Topics in Quantum Electron, 14, 3, 1-8, May/June, [11] S. Batti,. M. Zghal, N. Boudriga, "A New All-Optical Switching Node Including Virtual Memory and Synchronizer," JNW 5(2): (2010). 123
Optical Multicast Protocol for LEO Satellite Networks
Optical Multicast Protocol for LEO Satellite Networks Maha Sliti, Walid Abdallah, Noureddine Boudriga Communication Networks and Security Research Lab, University of Carthage Ariana, Tunisia e-mail: maha.sliti@supcom.tn,
More informationA Novel Optical Firewall Architecture for Burst Switched Networks
A Novel Optical Firewall Architecture for Burst Switched Networks Maha Sliti, Mohamed Hamdi, Noureddine Boudriga Communication Networks and Security Research Lab. University of Carthage, Tunisia ABSTRACT
More informationSuppression of Four Wave Mixing in 8 Channel DWDM System Using Hybrid Modulation Technique
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 2 (2014), pp. 97-108 International Research Publication House http://www.irphouse.com Suppression of Four
More informationOptical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach
Int. J. Communications, Network and System Sciences, 2009, 7, 652-656 doi:10.4236/icns.2009.27074 Published Online October 2009 (http://www.scirp.org/ournal/icns/). Optical Network Traffic Control Algorithm
More informationMultiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationA Quality of Service Scheduling Technique for Optical LANs
A Quality of Service Scheduling Technique for Optical LANs Panagiotis G. Sarigiannidis, Member, IEEE, Sophia G. Petridou, Member, IEEE, Georgios I. Papadimitriou, Senior Member, IEEE Department of Informatics
More informationDESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com
More informationDynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
More informationA Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
More informationModeling and Performance Analysis of DWDM Based 100 Gbps Low Power Inter-satellite Optical Wireless Communication (LP-IsOWC) System
ISSN(Print): 2377-0538 ISSN(Online): 2377-0546 DOI: 10.15764/STSP.2015.01001 Volume 2, Number 1, January 2015 SOP TRANSACTIONS ON SIGNAL PROCESSING Modeling and Performance Analysis of DWDM Based 100 Gbps
More informationFour Wave Mixing in Closely Spaced DWDM Optical Channels
544 VOL. 1, NO. 2, AUGUST 2006 Four Wave Mixing in Closely Spaced DWDM Optical Channels Moncef Tayahi *, Sivakumar Lanka, and Banmali Rawat Advanced Photonics Research lab, Department of Electrical Engineering
More informationPART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
More informationSDH and WDM: a look at the physical layer
SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and
More informationAbstract. Cycle Domain Simulator for Phase-Locked Loops
Abstract Cycle Domain Simulator for Phase-Locked Loops Norman James December 1999 As computers become faster and more complex, clock synthesis becomes critical. Due to the relatively slower bus clocks
More informationSDH and WDM A look at the physical layer
SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationOPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationA Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationA New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir
More informationSolution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
More informationProviding Deterministic Quality-of-Service Guarantees on WDM Optical Networks
2072 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 10, OCTOBER 2000 Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks Maode Ma and Mounir Hamdi, Member, IEEE
More informationPerformance advantages of resource sharing in polymorphic optical networks
R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference
More informationDiscussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications
More informationHyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
More informationLimiting factors in fiber optic transmissions
Limiting factors in fiber optic transmissions Sergiusz Patela, Dr Sc Room I/48, Th. 13:00-16:20, Fri. 9:20-10:50 sergiusz.patela@pwr.wroc.pl eportal.pwr.wroc.pl Copying and processing permitted for noncommercial
More informationA TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
More informationEfficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
More informationDuobinary Modulation For Optical Systems
Introduction Duobinary Modulation For Optical Systems Hari Shanar Inphi Corporation Optical systems by and large use NRZ modulation. While NRZ modulation is suitable for long haul systems in which the
More informationClearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
More informationPerformance Management and Fault Management. 1 Dept. of ECE, SRM University
Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported
More informationAn Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
More informationDoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationIndex Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
More informationNetwork administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationSTANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
More informationMULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL
MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL Sandeep Kumar 1, Arpit Kumar 2 1 Sekhawati Engg. College, Dundlod, Dist. - Jhunjhunu (Raj.), 1987san@gmail.com, 2 KIIT, Gurgaon (HR.), Abstract
More informationPUMPED Nd:YAG LASER. Last Revision: August 21, 2007
PUMPED Nd:YAG LASER Last Revision: August 21, 2007 QUESTION TO BE INVESTIGATED: How can an efficient atomic transition laser be constructed and characterized? INTRODUCTION: This lab exercise will allow
More informationEfficient Alarm Management in Optical Networks
Efficient Alarm Management in Optical Networks Sava Stanic, Suresh Subramaniam, Hongsik Choi, Gokhan Sahin, and Hyeong-Ah Choi Department of Electrical & Computer Engineering Department of Computer Science
More informationScaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
More informationTHE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
More informationCourse 12 Synchronous transmission multiplexing systems used in digital telephone networks
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationAnalog vs. Digital Transmission
Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
More informationNetwork Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
More informationSmart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More information8 Gbps CMOS interface for parallel fiber-optic interconnects
8 Gbps CMOS interface for parallel fiberoptic interconnects Barton Sano, Bindu Madhavan and A. F. J. Levi Department of Electrical Engineering University of Southern California Los Angeles, California
More informationIntroduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk
Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski trakovski@nyus.edu.mk Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems
More informationPART II. OPS-based metro area networks
PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationDual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
More informationFlexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com
More informationTesting Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
More informationARTIFICIAL NEURAL NETWORKS IN THE SCOPE OF OPTICAL PERFORMANCE MONITORING
1 th Portuguese Conference on Automatic Control 16-18 July 212 CONTROLO 212 Funchal, Portugal ARTIFICIAL NEURAL NETWORKS IN THE SCOPE OF OPTICAL PERFORMANCE MONITORING Vítor Ribeiro,?? Mário Lima, António
More informationDepartment of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
More informationImplementation of Digital Signal Processing: Some Background on GFSK Modulation
Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)
More informationFIBER OPTIC COMMUNICATIONS. Optical Fibers
FIBER OPTIC COMMUNICATIONS Optical Fibers Fiber optics (optical fibers) are long, thin strands of very pure glass about the size of a human hair. They are arranged in bundles called optical cables and
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More informationACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
More informationFPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,
More informationIntroduction to Optical Networks
Yatindra Nath Singh Assistant Professor Electrical Engineering Department Indian Institute of Technology, Kanpur Email: ynsingh@ieee.org http://home.iitk.ac.in/~ynsingh 1 What are optical network? Telecomm
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationA Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
More informationVoice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
More informationTraffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE M. Amir Mehmood Outline Background Pakistan Internet Exchange - PIE Motivation Preliminaries Our Work
More informationAPPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?
QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS By Thierno Diallo, Product Specialist With the increasing demand for advanced voice and video services, the traditional best-effort delivery model is
More informationHow To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
More informationLarge-Capacity Optical Transmission Technologies Supporting the Optical Submarine Cable System
Large-Capacity Optical Transmission Technologies Supporting the Optical Submarine Cable System INOUE Takanori Abstract As one of the foundations of the global network, the submarine cable system is required
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationA Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
More informationDistributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed shf_ibrahim@yahoo.com Khaled M. F. Elsayed, senior member IEEE khaled@ieee.org Department
More informationThree Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
More informationNon-Data Aided Carrier Offset Compensation for SDR Implementation
Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationDesign of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
More informationA Policy-Based Admission Control Scheme for Voice over IP Networks
Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationVoIP QoS on low speed links
Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia Ivana.Pezelj@CARNet.hr QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical
More informationMonitoring VoIP Call Quality Using Improved Simplified E-model
Monitoring VoIP Call Quality Using Improved Simplified E-model Haytham Assem, David Malone Hamilton Institute, National University of Ireland, Maynooth Hitham.Salama.2012, David.Malone@nuim.ie Jonathan
More informationContents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION
Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationVoice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
More informationImpact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
More information