Browsing Centre for Research in Distributed Technologies (CREDIT) by Authors
Affects of queuing mechanisms on RTP traffic: comparative analysis of jitter, end-to-end delay and packet lossEpiphaniou, Gregory; Maple, Carsten; Sant, Paul; Reeve, Matthew (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2010)The idea of converging voice and data into a best-effort service network, such as the Internet, has rapidly developed the need to effectively define the mechanisms for achieving preferential handling of traffic. This sense of QoS assurance has increased due to the enormous growth of users accessing networks, different types of traffic competing for available bandwidth and multiple services running on the core network, defined by different protocols and vendors. VoIP traffic behaviour has become a crucial element of the intrinsic QoS mainly affected by jitter, latency and packet loss rates. This paper focuses on three different mechanisms, DropTail (FIFO), RED and DiffServ, and their effects on real-time voice traffic. Measurements of jitter, end-to-end delay and packet loss, based on simulation scenarios using the NS-2 network simulator are also presented and analyzed.
Awareness of wireless security by home and business usersMaple, Carsten; Jacobs, Helen; Reeve, Matthew (IADIS, 2006)There has been rapid increase in the popularity of wireless networks in both the home and the small office environment. However, with the convenience wireless networking brings there is also an added risk in terms of security. From surveys conducted in a number of countries, it appears there is still lack of awareness of the need for securing wireless networks and the level of security provided by the different wire less encryption protocols. With increasing quantities of e-Government services being available online, such as income tax returns, car registration and health-related services, it is important that the public are aware of the risks of submitting personal information on unsecured or weakly secured networks. This paper highlights the types of wireless encryption protocols available,the cost of using these protocols and provides recommendation for home and business users when us ing e-Government services.
Choosing the right wireless LAN security protocol for the home and business userMaple, Carsten; Jacobs, Helen; Reeve, Matthew (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2006)The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.