Attenuation versus link range for 1550 nm as wavelength. 

Attenuation versus link range for 1550 nm as wavelength. 

Source publication
Article
Full-text available
Voice over Internet Protocol (VoIP) technology has observed rapid growth in the world of telecommunications. VoIP offers high-rate voice services at low cost with good flexibility, typically in a Wireless Local Area Network (WLAN). In a voice conversation, each client works either as a sender or a receiver depending on the direction of traffic flow...

Similar publications

Article
Full-text available
In this paper a Call Admission Control (CAC) scheme for Voice over Internet Protocol (VoIP) over a Wireless Local Area Network (WLAN) is proposed. The CAC scheme is based on the Endpoint Admission Control (EAC) paradigm where the endpoints, i.e. the WLAN terminals, probe the network to ascertain if the call can be supported with acceptable Quality...
Article
Full-text available
Voice over Internet Protocol (VoIP) has grown quickly in the world of telecommunication. Wireless Local Area Networks (WLANs) are the most performance assuring technology for wireless networks, and WLANs have facilitated high-rate voice services at low cost and good flexibility. In a voice conversation, each client works as a sender or a receiver d...
Article
Full-text available
To improve the performance of IEEE 802.11 wireless local area (WLAN) networks, different frame-aggregation algorithms are proposed by IEEE 802.11n/ac standards to improve the throughput performance of WLANs. However, this improvement will also have a related cost in terms of increasing delay. The traffic load generated by mixed types of application...
Article
Full-text available
This paper is the first of its kind in presenting a detailed characterisation of IEEE 802.11ac using real experiments. 802.11ac is the latest Wireless Local Area Network (WLAN) standard that is rapidly being adapted because of its potential to deliver very high throughput. The throughput increase in 802.11ac can be attributed to three factors—large...

Citations

... The use and adoption of VoIP is faced by a set of challenges resulting from two main factors [24,25]: ...
Thesis
Full-text available
Today, applications of real-time multimedia require heavily use of networks resources in which it affects the network performance. So, Quality of Service (QoS) of such networks is highly needed to be investigated and improved. VoWLAN is a VoIP system over Wi-Fi which offers a significantly extended operational range. In this thesis, we analyse the performance of Deficit Round Robin (DRR), Fair Queue (FQ), DropTail (FIFO), Stochastic Fair Queue (SFQ), and Random Early Discard (RED) queuing management schemes for VoIP over SCTP 802.11n in Wi-Fi n using NS2 network simulator based on QoS (throughput, delay, and jitter) to obtain a better call quality for the users. In the used simulator, we generate SCTP VoIP traffic over Wi-Fi n and measure the impact of each node with applying different queue management schemes. The results of our simulation showed that the Drop Tail and RED queuing schemes performed better than other queue management schemes, in which both give high throughput, less delay and less jitter.
... Even Nowadays, scientists and researchers are using AI techniques for solving future-driven network security attacks like distributed denial of service (DDoS) attacks [20][21][22][23]. Furthermore, AI can implement using software-defined networking [SDN] [24][25][26][27][28][29][30][31], named data networking (NDN) [32][33][34] and cloud computing network [35] with voice over IP (VoIP) [36][37][38][39] fiber optic [40][41][42], worldwide interoperability for microwave access (WiMAX) [43][44][45], swarm intelligence (SI) [46], Deep learning (DL) [47], robotic system [48], and Satellite [49]. In order to estimate the PID controller performance, an objective function is used in the AI techniques as mentioned above. ...
... SI strategies have been dynamically utilized in the field of improvement, this being of critical importance for science, engineering, robotics, and computer and telecommunication network industries. Scientists and researchers are solving future oriented network security problems in Software-Defined Networking (SDN) [5][6][7][8][9][10][11][12][13][14], Named Data Networking (NDN) [15][16][17], and cloud computing network [18] with future applications such as voice over IP (VoIP) [19][20][21][22] fiber optic [23][24][25], worldwide interoperability for microwave access (WiMAX) [26][27][28] with the support of SI, AI and machine learning (ML) [29]. Particle swarm optimization (PSO) is perceived as the most probable population-based stochastic algorithm, suggested by Kennedy et al. [30], which is utilized to tackle global optimization problems. ...
... In this way, security can be ensured to mitigate attacks caused by human carelessness, lack of awareness, and other bot attacks to protect sensitive data from possible security attacks [1][2][3][4][5][6] like distributed denial of service (DDoS) attacks [7][8][9][10] as the first line of defense. Furthermore, information security is big factor to implement internet of things (IoT) for smart cities [11][12][13][14][15][16][17][18][19] using software-defined networking [SDN] [20][21][22][23][24][25][26], named data networking (NDN) [27][28][29] and cloud computing network [30] with voice over IP (VoIP) [31][32][33][34] fiber optic [35][36][37], worldwide interoperability for microwave access (WiMAX) [37][38][39][40], swarm intelligence (SI) [41], artificial intelligence (AI), machine learning (ML) [42], deep learning (DL) [42][43][44], and artificial neural network (ANN) [45]. ...
... In this way, security can be ensured to mitigate attacks caused by human carelessness, lack of awareness, and other bot attacks to protect sensitive data from possible security attacks [1][2][3][4][5][6] like distributed denial of service (DDoS) attacks [7][8][9][10] as the first line of defense. Furthermore, information security is big factor to implement internet of things (IoT) for smart cities [11][12][13][14][15][16][17][18][19] using software-defined networking [SDN] [20][21][22][23][24][25][26], named data networking (NDN) [27][28][29] and cloud computing network [30] with voice over IP (VoIP) [31][32][33][34] fiber optic [35][36][37], worldwide interoperability for microwave access (WiMAX) [37][38][39][40], swarm intelligence (SI) [41], artificial intelligence (AI), machine learning (ML) [42], deep learning (DL) [42][43][44], and artificial neural network (ANN) [45]. ...
Article
Full-text available
This study presents the current state of research on multi-factor authen-tication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentica-tion discipline, and most of them proposed the best possible approaches, but there are very limited studies in the area that can comprehend all these innovative and effective approaches. Using Web of Science data of the research publications on the topic, the study adopted the bibliometric approach to find the evolution of authentication in the security domain, especially multi-factor authentication. This study finds the impact of the research in the selected domain using bibliometric analysis. This research also identifies the key research trends that most of the researchers are paying attention to. The highest number of publications on multi-factor authentication were published in 2019 while the highest number of citations were received in 2014. United States, India, and China are the leading countries publishing the most on multi-factor authentication.
... In [42], the authors proposed a hypothetical idea of smart controller placement for SDN engineering. Essentially, SDN is poised to apply future applications, for example, voice over IP (VoIP) [43][44][45], fiber optic [46][47][48], worldwide interoperability for microwave access (WiMAX) [49][50][51], and artificial intelligence (AI) and machine learning (ML) [52], deep learning (DL) [53] unmanned aerial vehicle (UAV) and autonomous electric vehicle (AEV) through satellite [54]. The above works neither considered intelligent reinforcement controller algorithm nor DDoS attack danger. ...
Article
Full-text available
In the design and planning of next-generation Internet of Things (IoT), telecommunication, and satellite communication systems, controller placement is crucial in software-defined networking (SDN). The programmability of the SDN controller is sophisticated for the centralized control system of the entire network. Nevertheless, it creates a significant loophole for the manifestation of a distributed denial of service (DDoS) attack straightforwardly. Furthermore, recently a Distributed Reflected Denial of Service (DRDoS) attack, an unusual DDoS attack, has been detected. However, minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem. Moreover, recently the high frequencies of DDoS attacks have increased dramatically. In this paper, a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed. Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence. The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99% accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.
... Different security mechanisms such as firewalls, authentication schemes, different encryption methods, antiviruses, etc., are currently used to protect sensitive data from possible security attacks [12][13][14] on vulnerable devices [15][16][17] like the distributed denial of service (DDoS) attacks [18][19][20][21] as the first line of defense. IoT can implement using software-defined networking [SDN] [22][23][24], future network architecture [25][26][27][28], named data networking (NDN) [29][30][31] and cloud computing network [32] with voice over IP (VoIP) [33][34][35][36] fiber optics [37][38][39], worldwide interoperability for microwave access (WiMAX) [40][41][42], deep learning (DL) [43], artificial intelligence (AI), and machine learning (ML) [44]. ...
Article
Full-text available
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity over the last decade, resulting in an exponential growth in the IoT networks, connected devices, and the data processed therein. Since IoT devices generate and exchange sensitive data over the traditional internet, security has become a prime concern due to the generation of zero-day cyberattacks. A network-based intrusion detection system (NIDS) can provide the much-needed efficient security solution to the IoT network by protecting the network entry points through constant network traffic monitoring. Recent NIDS have a high false alarm rate (FAR) in detecting the anomalies, including the novel and zero-day anomalies. This paper proposes an efficient anomaly detection mechanism using mutual information (MI), considering a deep neural network (DNN) for an IoT network. A comparative analysis of different deep-learning models such as DNN, Convolutional Neural Network, Recurrent Neural Network, and its different variants, such as Gated Recurrent Unit and Long Short-term Memory is performed considering the IoT-Botnet 2020 dataset. Experimental results show the improvement of 0.57–2.6% in terms of the model’s accuracy, while at the same time reducing the FAR by 0.23–7.98% to show the effectiveness of the DNN-based NIDS model compared to the well-known deep learning models. It was also observed that using only the 16–35 best numerical features selected using MI instead of 80 features of the dataset result in almost negligible degradation in the model’s performance but helped in decreasing the overall model’s complexity. In addition, the overall accuracy of the DL-based models is further improved by almost 0.99–3.45% in terms of the detection accuracy considering only the top five categorical and numerical features
... Recently, the promotion of wireless technologies has accelerated the production of edge applications for wireless environments [19][20][21][22]. In the same vein, VoIP services have also been implemented for wireless networks and renamed as VoWLAN [23,24]. Although this new application has grown in importance on the Internet, the issue of service quality remains as a significant challenge [25,26]. ...
Article
Full-text available
Voice transmission over wireless edge networks is a conventional, cost-effective technology to transmit voice calls over 802.11 edge networks. In this type of service, Session Initiating Protocol (SIP) is responsible for initiating sessions. Research has shown that the call control algorithm that controls SIP sessions can also guarantee the quality of the medium during audio data transmission. In spite of decision-making in wireless access points and changing the parameters of the medium access sublayer (MAC), the existing algorithms are complicated and cannot adequately ensure service quality and efficient use of system resources. Therefore, the purpose of this study is to propose a new algorithm that enables a SIP server to decide to admit or reject an incoming call, in concise time. This algorithm considers the dynamic parameters of the network such as the location of node, channel busyness rate and real-time traffic percentage of the channel without changing the settings of MAC sublayer. The location of each system depending on the access point that transmits the call has a great impact on how the required service is provided. Implementation of this location-aware method on a real network testbed is indicative of remarkable superiority over the recently proposed methods in terms of service quality as measured by parameters, such as response time, call duration, loss-rate, and delay in real-time packets.
... The use of SDNs is expanding, being used in applications such as voice over IP (VoIP) [47][48][49], fiber optic networks [50][51][52], worldwide interoperability for microwave access (WiMAX) networks [53][54][55], multiple input multiple output (MIMO) [56], Named Data Networking (NDN) [57][58][59] and cloud computing network [60], artificial intelligence (AI) and machine learning [ML] networks [61], and unmanned aerial vehicle (UAV) and autonomous electric vehicle (AEV) control through satellite networks [62]. The research into these topics has considered neither a smart backup controller nor the DDoS attack threat. ...
Article
Full-text available
In software-defined networks (SDNs), controller placement is a critical factor in the design and planning for the future Internet of Things (IoT), telecommunication, and satellite communication systems. Existing research has concentrated largely on factors such as reliability, latency, controller capacity, propagation delay, and energy consumption. However, SDNs are vulnerable to distributed denial of service (DDoS) attacks that interfere with legitimate use of the network. The ever-increasing frequency of DDoS attacks has made it necessary to consider them in network design, especially in critical applications such as military, health care, and financial services networks requiring high availability. We propose a mathematical model for planning the deployment of SDN smart backup controllers (SBCs) to preserve service in the presence of DDoS attacks. Given a number of input parameters, our model has two distinct capabilities. First, it determines the optimal number of primary controllers to place at specific locations or nodes under normal operating conditions. Second, it recommends an optimal number of smart backup controllers for use with different levels of DDoS attacks. The goal of the model is to improve resistance to DDoS attacks while optimizing the overall cost based on the parameters. Our simulated results demonstrate that the model is useful in planning for SDN reliability in the presence of DDoS attacks while managing the overall cost.
... WLAN has ended up a ubiquitous networking technology deployed around the world. A primary goal of this survey paper is to develop a framework for WLAN, which help emergency traffic and provide strict Quality of Service (QoS) assurance for lifesaving emergency traffic in a dense emergency state of affairs the place an excessive quantity of nodes report the emergency [1,2]. To attain this objective, an ordinary perception of WLANs is required. ...
Article
The IEEE 802.11-based Wireless Local Area Network (WLAN) has become a ubiquitous networking technology deployed around the world. IEEE 802.11 WLAN are now widely used for real-time multimedia applications (e.g. voice and video streaming) and distributed emergency services such as telemedicine, healthcare, and disaster recovery. Both time-sensitive applications and emergency traffic are not only characterized by their high bandwidth requirements, but also impose severe restrictions on end-to-end packet delays (i.e. response time), jitter (i.e. delay variance) and packet losses. In other words, time-sensitive applications and emergency services require a strict Quality of Service (QoS) guarantee. Medium Access Control (MAC) protocol is one of the key factors that influence the performance of WLANs. The IEEE 802.11e working group enhanced the 802.11 MAC to provide QoS support in WLANs. However, recent studies have shown that 802.11e Enhanced Distributed Channel Access (EDCA) standard has limitations and it neither supports strict QoS guarantee nor emergency traffic. Providing a strict QoS guarantee as well as supporting emergency traffic under high traffic loads is really a challenging task in WLANs. A thorough review of literature on QoS MAC protocols reveals that most QoS schemes have focused on either network throughput enhancement or service differentiation by adjusting Contention Window (CW) or Inter-Frame Spaces (IFS). Therefore, a research on developing techniques to provide a strict QoS guarantee as well as support for emergency traffic is required in such systems. To achieve this objective, a general understanding of WLANs is required. This paper aims to provide an introduction to various key concepts of WLANs that are necessary for design, model and develop such framework. Our main contribution in this paper is the QoS for IEEE 802.11 WLAN and MAC protocols for supporting industrial emergency traffic over network and future directions.