Sciweavers

265 search results - page 30 / 53
» Security Patterns for Voice over IP Networks
Sort
View
BELL
2002
86views more  BELL 2002»
13 years 10 months ago
Middleboxes: Controllable media firewalls
Internet technology is promised to provide the broadband multi-service future. Today this technology can not provide basic quality guarantees for the services rendered. Generally ...
Paul Sijben, Willem van Willigenburg, Michel de Bo...
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 4 months ago
Extension and Application of the Network Utilization Characteristic Metric to IEEE 802.11e
— In this paper we describe a time-based admission control scheme for Multimedia over IP services in wireless LANs based on the IEEE 802.11e standard. We build on an existing wor...
Rosario Giuseppe Garroppo, Luca Tavanti, Stefano L...
FSKD
2010
Springer
241views Fuzzy Logic» more  FSKD 2010»
13 years 10 months ago
FUZPAG: A fuzzy-controlled packet aggregation scheme for wireless mesh networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop backhaul networks in which mesh routers relay traffic on behalf of clients or other routers. Due to large MAC layer ov...
Peter Dely, Andreas Kassler, Nico Bayer, Hans Joac...
IADIS
2004
13 years 11 months ago
Telecollaboration - a case study for performance analysis of voip systems
The evolving nature of complex traffic issues of IP (Internet Protocol)-based Telecollaboration (TC) business system technology requires an intuitive understanding for the partici...
Venkatesh Mahadevan, Zenon Chaczko
DFN
2004
13 years 11 months ago
SIP Security
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker