نتایج جستجو برای: ترافیک voip

تعداد نتایج: 5058  

2002
Falko Dressler

With the arising of telephony over the internet, loads of institutes start looking at that new technology. They ask themselves for sense and meaningful use. Many questions appeared to be answered first. The first one is about the interoperability of the end systems. It should be possible to change the vendor and implement the new devices without any problems into the existing VoIP infrastructur...

2008
Xiangning Fan Dengkui Zhu

WiMAX system is based on OFDMA, and it is very suitable for VoIP traffic. At the same time, aggressive AMC and frame bundling are two important techniques to improve the performance of VoIP, and so they are applied to WiMAX system in this paper. The simulation results show that when the system is in short of bandwidth, these two techniques indeed reduce the PER and delay jitter of the VoIP user...

2010
Italo Dacosta Patrick Traynor

Authentication is an important mechanism for the reliable operation of any Voice over IP (VoIP) infrastructure. Digest authentication has become the most widely adopted VoIP authentication protocol due to its simple properties. However, even this lightweight protocol can have a significant impact on the performance and scalability of a VoIP infrastructure. In this paper, we present Proxychain –...

2007
Alex Talevski Elizabeth Chang Tharam Dillon

The rapid growth of computing, the Internet and telecommunications systems have resulted in a broad range of ways to communicate and access information. Voice over Internet Protocol (VoIP) is a Computer Telephony Integration (CTI) solution that transports voice traffic over a data network as an alternative to the Plain Old Telephone Service (POTS). VoIP products promise converged telecommunicat...

2012
Rachana Kamble

VoIP services are scarifying, due to delay in transmission of voice packets (Latency), echo, jitter, packet loss and other Quality of Service (QoS) problems arrived in VoIP phones. The weakness on QoS is managing by voice and data service together on a VoIP network. In this paper we dedicated to studying the response of data transmission quality, characteristic of voice quality, the service qua...

2001
Jeff Hicks

Our focus is on organizations that deploy and troubleshoot voice over IP (VoIP) networks. These groups may be professional services or pre-and post-sales engineering groups. A big problem with VoIP is the quality of calls, which is most affected by convergence with existing data network traffic. In most scenarios, the data network will require tuning in order to achieve acceptable quality for v...

Journal: :INTER 2021

The use of telephone and VoIP (Voice over Internet Protocol) interviews has become necessary owing to the legal restrictions safety measures introduced during COVID-19 pandemic. This furthered scholarly dialogue surrounding choice interview mode, assumption that face-to-face are "gold standard" [Novick, 2008: 397]. general public also more accustomed utilising in their day-to-day lives. In this...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده فنی و مهندسی 1389

در این پایان نامه روش جدیدی برای پنهان نگاری داده در محیط های بلادرنگ تحت شبکه ارائه شده است. این فرآیند ترکیبی از روش های lsb وlack به نام (lasb) می باشد. با ترکیب این روش ها احتمال تشخیص داده ی پنهان شده به حداقل می رسد. برای فراهم آوردن محیط voip از پروتکل rtp استفاده شده و الگوریتم های lack ،lsb و lasb در محیط voip با استفاده از زبان برنامه نویسی c# پیاده سازی شده اند. برای پی بردن به کارای...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1375

هیستامین که در اثر دکربوکسیلاسیون باکتریائی هیستیدین در ماهیان پلاژیک تولید می شود، باعث ایجاد مسمومیت اسکومبرتوکسین می گردد. این تحقیق به منظور بررسی و انتخاب یک روش ساده، مطمئن (صحت و دقت زیاد) جهت اندازه گیری هیستامین و تعیین تاثیر فراوری بر روی سطح هیستامین در ماهی و فرآورده های آن انجام شد. در این رابطه سه روش اندازه گیری هیستامین در نمونه های ماهی مورد ارزیابی قرار گرفتند نتایج حاصله نشان...

Journal: :Applied sciences 2023

Voice over Internet Protocol (VoIP) and its underlying Session Initiation (SIP) are widely deployed technologies since they provide an efficient fast means of both voice data communication a single network. However, in spite their advantages, also have security threats due to the inherent vulnerabilities (IP) that can potentially be exploited by hackers. This study introduces novel defense mech...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید