Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1121
![Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks](/file/thumb/15011026/particle-swarm-optimization-for-multi-constrained-routing-in-telecommunication.png)
Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks
Статья научная
By our analysis, the QoS routing is the optimization problem under the satisfaction of multiple QoS constraints. The Particles Swarm Optimization (PSO) is an optimization algorithm which has been applied to finding shortest path in the network. However, it might fall into local optimal solution, and is not able to solve the routing based on multiple constraints. To tackle this problem, we propose a new method of solving the multiple constraints routing. This paper firstly sets up a multi constrained QoS routing model and constructs the fitness value function by transforming the QoS constraints with a penalty function. Secondly, the iterative formulas of the original PSO are improved to tailor to non-continuous search space of the routing problem. Finally, the natural selection and mutation ideas of the Genetic Algorithm (GA) are applied to the PSO to improve the convergent performance. The simulation results show that the proposed GA-PSO algorithm can not only successfully solve the multi-constrained QoS routing problem, but also achieves a better effect in the success rate of the searching optimal path.
Бесплатно
![Passive Antenna Arrays in UAV Communication Systems Passive Antenna Arrays in UAV Communication Systems](/file/thumb/15019294/passive-antenna-arrays-in-uav-communication-systems.png)
Passive Antenna Arrays in UAV Communication Systems
Статья научная
This article explores the design, modeling, and experimental validation of passive antenna arrays (AAs) tailored for unmanned aerial vehicle (UAV) communication systems. Focusing on the technical composition and functionalities of various types of passive antenna arrays, the study delves into different antenna elements that comprise these arrays, discussing their integration into comprehensive systems. Through rigorous modeling aimed at predicting performance in diverse operational conditions and backed by experimental studies, the paper provides practical insights for the development and optimization of AAs. These passive systems leverage the collective strength of multiple antennas to form directed beams, enhancing signal clarity and reducing interference, thereby supporting robust communication links essential for UAV operations.
Бесплатно
![Password Hardened Biometric: A Complete Solution of Online Security Password Hardened Biometric: A Complete Solution of Online Security](/file/thumb/15011200/password-hardened-biometric-a-complete-solution-of-online-security.png)
Password Hardened Biometric: A Complete Solution of Online Security
Статья научная
In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security of online transaction using secure and unique biometric template. The uniqueness of our process is that we store biometric template and password together in encrypted form both without the fusion of score level and decision level, which leads a successful way to combine multiple technologies, different from earlier methods. Password hardened biometric system helps to generate many different secure biometric templates for the same biometric system. It also generates unique biometric templates for multiple biometric systems from the same biometric trait.
Бесплатно
![Password Security: An Analysis of Password Strengths and Vulnerabilities Password Security: An Analysis of Password Strengths and Vulnerabilities](/file/thumb/15011548/password-security-an-analysis-of-password-strengths-and-vulnerabilities.png)
Password Security: An Analysis of Password Strengths and Vulnerabilities
Статья научная
Passwords can be used to gain access to specific data, an account, a computer system or a protected space. A single user may have multiple accounts that are protected by passwords. Research shows that users tend to keep same or similar passwords for different accounts with little differences. Once a single password becomes known, a number of accounts can be compromised. This paper deals with password security, a close look at what goes into making a password strong and the difficulty involved in breaking a password. The following sections discuss related work and prove graphically and mathematically the different aspects of password securities, overlooked vulnerabilities and the importance of passwords that are widely ignored. This work describes tests that were carried out to evaluate the resistance of passwords of varying strength against brute force attacks. It also discusses overlooked parameters such as entropy and how it ties in to password strength. This work also discusses the password composition enforcement of different popular websites and then presents a system designed to provide an adaptive and effective measure of password strength. This paper contributes toward minimizing the risk posed by those seeking to expose sensitive digital data. It provides solutions for making password breaking more difficult as well as convinces users to choose and set hard-to-break passwords.
Бесплатно
![Patch Based Sclera and Periocular Biometrics Using Deep Learning Patch Based Sclera and Periocular Biometrics Using Deep Learning](/file/thumb/15018612/patch-based-sclera-and-periocular-biometrics-using-deep-learning.png)
Patch Based Sclera and Periocular Biometrics Using Deep Learning
Статья научная
Biometric authentication has become an essential security aspect in today's digitized world. As limitations of the Unimodal biometric system increased, the need for multimodal biometric has become more popular. More research has been done on multimodal biometric systems for the past decade. sclera and periocular biometrics have gained more attention. The segmentation of sclera is a complex task as there is a chance of losing some of the features of sclera vessel patterns. In this paper we proposed a patch-based sclera and periocular segmentation. Experiments was conducted on sclera patches, periocular patches and sclera-periocular patches. These sclera and periocular patches are trained using deep learning neural networks. The deep learning network CNN is applied individually for sclera and periocular patches, on a combination of three Data set. The data set has images with occlusions and spectacles. The accuracy of the proposed sclera-periocular patches is 97.3%. The performance of the proposed patch-based system is better than the traditional segmentation methods.
Бесплатно
![Path Loss Analysis of ZigBee for Smart Meter Network Deployment in NAN Path Loss Analysis of ZigBee for Smart Meter Network Deployment in NAN](/file/thumb/15019475/path-loss-analysis-of-zigbee-for-smart-meter-network-deployment-in-nan.png)
Path Loss Analysis of ZigBee for Smart Meter Network Deployment in NAN
Статья научная
A fundamental and vital aspect of Smart Metering infrastructure is the communication technologies and techniques associated with it, especially between the Smart Meters and the Data Concentrator Unit. Among many available communication technologies, ZigBee provides a low-cost, low-power, and easy-to-deploy network solution for a Smart Meter network. There exists limited literature that discusses ZigBee as a potential communication technology for long-range networks. Hence thorough analysis is demanded on the suitability of ZigBee for smart meter deployment under different types of environmental conditions, coverage ranges, and obstacles. This work evaluates the performance of an extended ZigBee module in outdoor as well as indoor conditions in the presence of different types of obstacles. Parameters are obtained for path loss exponent and the standard deviation of the Gaussian Random variable to validate the Log Normal Shadowing model for modeling long-range ZigBee communication. The impact of obstacles on path loss is also considered. The results show that the Log Normal Shadowing model is a good approximation for the behavior of ZigBee path loss. Accordingly, the suitability of ZigBee for a Smart Meter network spanned as a Neighborhood Area Network is also assessed based on the approximated model.
Бесплатно
![Performance Analysis and Enhancement of TCP in Presence of Jitter in Wireless Networks Performance Analysis and Enhancement of TCP in Presence of Jitter in Wireless Networks](/file/thumb/15011533/performance-analysis-and-enhancement-of-tcp-in-presence-of-jitter-in-wireless.png)
Performance Analysis and Enhancement of TCP in Presence of Jitter in Wireless Networks
Статья научная
In wireless networks two types of losses namely congestion loss and transmission loss are significant. One of the important transmission losses is jitter. Variation in inter-arrival time is called jitter. When jitter value is greater than half of the average round trip time cause timeout loss and sender window size falls to one packet resulting reduction in throughput and degradation in the quality of service (QoS). In this paper, we are discussing a new model for transmission control protocol (TCP) which is capable of changing its window size based on the feedback. In the new model TCP is added with intelligence so that it can distinguish the type of losses. If the loss is due to congestion, congestion control algorithm is invoked and loss is due to jitter immediate-recovery algorithm is invoked to recover from the throughput loss. The technique also provides an end-to-end congestion control. The performance of TCP is further enhanced by discussing stability. Time-delay control theory is applied for the analysis of asymptotic stability. The stability boundaries of random early detection (RED) control parameter Pmax and jitter control parameter β are derived. Using the characteristic equation of Hermite matrix an approximate solution of q(t) (queue length) which converges to a given target value is derived. The results are analyzed based on graphs and statistical data using Matlab R2009b.
Бесплатно
![Performance Analysis of 5G New Radio LDPC over Different Multipath Fading Channel Models Performance Analysis of 5G New Radio LDPC over Different Multipath Fading Channel Models](/file/thumb/15018629/performance-analysis-of-5g-new-radio-ldpc-over-different-multipath-fading-channel.png)
Performance Analysis of 5G New Radio LDPC over Different Multipath Fading Channel Models
Статья научная
The creation and developing of a wireless network communication that is fast, secure, dependable, and cost-effective enough to suit the needs of the modern world is a difficult undertaking. Channel coding schemes must be chosen carefully to ensure timely and error-free data transfer in a noisy and fading channel. To ensure that the data received matches the data transmitted, channel coding is an essential part of the communication system's architecture. NR LDPC (New Radio Low Density Parity Check) code has been recommended for the fifth-generation (5G) to achieve the need for more internet traffic capacity in mobile communications and to provide both high coding gain and low energy consumption. This research presents NR-LDPC for data transmission over two different multipath fading channel models, such as Nakagami-m and Rayleigh in AWGN. The BER performance of the NR-LDPC code using two kinds of rate-compatible base graphs has been examined for the QAM-OFDM (Quadrature Amplitude Modulation-Orthogonal Frequency Division Multiplexing) system and compared to the uncoded QAM-OFDM system. The BER performance obtained via Monte Carlo simulation demonstrates that the LDPC works efficiently with two different kinds of channel models: those that do not fade and those that fade and achieves significant BER improvements with high coding gain. It makes sense to use LDPC codes in 5G because they are more efficient for long data transmissions, and the key to a good code is an effective decoding algorithm. The results demonstrated a coding gain improvement of up to 15 dB at 10-3 BER.
Бесплатно
![Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation](/file/thumb/15011227/performance-analysis-of-aodv-cbrp-dsdv-and-dsr-manet-routing-protocol-using-ns2.png)
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation
Статья научная
A Mobile Ad-hoc Network (MANET) is a collection of multi-hop wireless mobile nodes among which the communication is carried out without any centralized control or fixed infrastructure. MANET is a self-organized, self-configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The wireless link in the network are highly error prone and can go down frequently due to the mobility of nodes, interference and less infrastructure. Hence, because of the highly dynamic environment routing in MANET is a very difficult task. Over the last decade various routing protocols have been proposed for the mobile ad-hoc network and the most important among all of them are AODV, DSR, DSDV and CBRP. This research paper gives the overview of these routing protocols as well as the characteristics and functionality of these routing protocols along with their pros and cons and then make their comparative analysis in order to measure the performance of the network. The main objective of this paper is to compare the performance of all the four routing protocols and then to make the observations about how the performance of these routing protocols can be improved. Performance of these routing protocols are compared on the basis of various parameters such as throughput, delay and packet delivery ratio.
Бесплатно
![Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System](/file/thumb/15011484/performance-analysis-of-anti-phishing-tools-and-study-of-classification-data.png)
Статья научная
The term Phishing is a kind of spoofing website which is used for stealing sensitive and important information of the web user such as online banking passwords, credit card information and user's password etc. In the phishing attack, the attacker generates the warning message to the user about the security issues, ask for confidential information through phishing emails, ask to update the user's account information etc. Several experimental design considerations have been proposed earlier to countermeasure the phishing attack. The earlier systems are not giving more than 90 percentage successful results. In some cases, the system tool gives only 50-60 percentage successful result. In this paper, a novel algorithm is developed to check the performance of the anti-phishing system and compared the received data set with the data set of existing anti-phishing tools. The performance evaluation of novel anti-phishing system is studied with four different classification data mining algorithms which are Class Imbalance Problem (CIP), Rule based Classifier (Sequential Covering Algorithm (SCA)), Nearest Neighbour Classification (NNC), Bayesian Classifier (BC) on the data set of phishing and legitimate websites. The proposed system shows less error rate and better performance as compared to other existing system tools.
Бесплатно
![Performance Analysis of Black Hole Attack in Vanet Performance Analysis of Black Hole Attack in Vanet](/file/thumb/15011137/performance-analysis-of-black-hole-attack-in-vanet.png)
Performance Analysis of Black Hole Attack in Vanet
Статья научная
Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.
Бесплатно
![Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints](/file/thumb/15010972/performance-analysis-of-cluster-based-wireless-sensor-networks-with-application.png)
Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints
Статья научная
Clustering is an efficient techniques used to achieve the specific performance requirements of large scale wireless sensor networks. In this paper we have carried out the performance analysis of cluster-based wireless sensor networks for different communication patterns formed due to application constraints based upon LEACH protocol, which is among the most popular clustering protocols proposed for these types of networks. Simulation results based upon this protocol identify some important factors that induce unbalanced energy consumption among sensor nodes and hence affect the network lifetime. This highlights the need for an adaptive clustering protocol that can increase the network lifetime by further balancing the energy consumption among sensor nodes. Paper concludes with some recommendations for such protocol.
Бесплатно
![Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain](/file/thumb/15017239/performance-analysis-of-cryptographic-hash-functions-suitable-for-use-in.png)
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Статья научная
A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated. The comparative analysis of different hashing algorithms allows us to choose the most suitable candidates for building decentralized systems type of blockchain.
Бесплатно
![Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data](/file/thumb/15011940/performance-analysis-of-improved-clustering-algorithm-on-real-and-synthetic-data.png)
Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data
Статья научная
Clustering is an important technique in data mining to partition the data objects into clusters. It is a way to generate groups from the data objects. Different data clustering methods or algorithms are discussed in the various literature. Some of these are efficient while some are inefficient for large data. The k-means, Partition Around Method (PAM) or k-medoids, hierarchical and DBSCAN are various clustering algorithms. The k-means algorithm is more popular than the other algorithms used to partition data into k clusters. For this algorithm, k should be provided explicitly. Also, initial means are taken randomly but this may generate clusters with poor quality. This paper is a study and implementation of an improved clustering algorithm which automatically predicts the value of k and uses a new technique to take initial means. The performance analysis of the improved algorithm and other algorithms by using real and dummy datasets is presented in this paper. To measure the performance of algorithms, this paper uses running time of algorithms and various cluster validity measures. Cluster validity measures include sum squared error, silhouette score, compactness, separation, Dunn index and DB index. Also, the k predicted by the improved algorithm is compared with optimal k suggested by elbow method. It is found that both values of k are almost similar. Most of the values of validity measures for the improved algorithm are found to be optimal.
Бесплатно
![Performance Analysis of Inter-Satellite Optical Wireless Communication Performance Analysis of Inter-Satellite Optical Wireless Communication](/file/thumb/15011830/performance-analysis-of-inter-satellite-optical-wireless-communication.png)
Performance Analysis of Inter-Satellite Optical Wireless Communication
Статья научная
The evolution of optical communications systems from long fibers to robust wireless system has led to the idea of connecting two satellites using an optical wireless link. The rapid developments in satellite communication point to the possibilities of satellite networks as a method for them to communicate with each other. The optical wireless communication (OWC) enables the information exchange between satellites at higher speed and also a satellite can act as a relay between two satellites or between a satellite and ground base station. Light signal of high frequency is used as a carrier for the optical link between satellites and lasers are commonly used as a source of light. One of the primary reasons for preferring OWC over RF link is high data rate with acceptable bit error rate (BER). The communication between two lower earth orbit (LEO) satellites is studied under this research work. The quality factor (Q-factor) or BER is used as a key metric to analyze the performance of the inter-satellite link (ISL). This work presents the performance enhancement of the system by using multiple antennas and advanced modulation techniques.
Бесплатно
![Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine](/file/thumb/15017003/performance-analysis-of-network-applications-on-ipv6-cloud-connected-virtual.png)
Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine
Статья научная
The rapid growth of the Internet and a number of changes in the technology landscape have resulted to move traditional IPv4 networks to virtualized IPv6 networks. Reliable and fast delivery of network services with minimum hardware and lower cost are the main challenges for network operators in the modern technological era. Network operators are moving towards the virtual IPv6 networks. As IP protocol does not guarantee packet delivery, therefore, for reliable delivery of services like FTP, HTTP, and SMTP, the IP protocol is associated with TCP on the transport layer while audio/video live streaming, and real-time applications use UDP. QoS of video streaming and real-time applications are depended upon better network resources management and planning while QoE is dependent on network performance. Different sizes of the packet affect overall QoS. Optimum services can be achieved through the proper selection of routing protocol in the network. In this study, the performance of the IPv6 virtual machine connected to the large scale virtual IPv6 network through the cloud is measured and compared on the basis of the packet sizes of TCP and UDP. GNS3 network emulator and VMware have been used for testing and analyzing the performance of the IPv6 virtual network in terms of several parameters such as convergence, RTT, throughput, jitter, and packet loss. Results indicate that the EIGRPv6 routing protocol with the collaboration of BGPv4 delivers better performance through virtual network services over the cloud network.
Бесплатно
![Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas](/file/thumb/15010992/performance-analysis-of-qos-multicast-routing-in-mobile-ad-hoc-networks-using.png)
Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
Статья научная
In this paper, a quality of service (QoS) multicast routing protocol in mobile ad hoc networks (MANETs) by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. This paper studies TDMA-based timeslot allocation and directional antennas, and presents an effective algorithm for calculating bandwidth of a multicast tree. We also propose a novel on-demand QoS multicasting routing algorithm in TDMA-based mobile ad hoc networks using directional antennas. The simulation result shows the performance of this QoS multicast routing algorithm in TDMA-based mobile ad hoc networks using directional antennas.
Бесплатно
![Performance Analysis of Rectangular and circular Shape Building Deployment for an Indoor Visible Light Communication System Performance Analysis of Rectangular and circular Shape Building Deployment for an Indoor Visible Light Communication System](/file/thumb/15011862/performance-analysis-of-rectangular-and-circular-shape-building-deployment-for-an.png)
Статья научная
The LED (Light emitting diode) based lighting systems are gaining popularity for its dual use i.e. for energy efficient lighting systems as well as for indoor optical wireless communication systems. Although, Visible light spectrum has the capability to provide very large system bandwidth (in THz), yet these systems have the limitation on account of limited modulation bandwidth. Besides, Visible light communication (VLC) systems also suffer due to multi-path propagation resulting in further depletion of system bandwidth due to pulse broadening. Therefore, one of the deployment objective of a visible light communication (VLC) system is to reduce the root mean square (RMS) delay parameter besides minimizing the number of LEDs. Hence, performance analysis of two geometrical shape structures mainly rectangular and circular models are explored for ubiquitous indoor coverage using hyper- heuristics evolutionary algorithm(HypEA) under spatial receiver mobility. Therefore, it is possible to achieve lower RMS delay spread and hence multi- fold increase in the overall system bandwidth without the use of complex system techniques like OFDM- MIMO etc.
Бесплатно
![Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP](/file/thumb/15011218/performance-analysis-of-route-discovery-by-cross-layer-routing-protocolrdclrp.png)
Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP
Статья научная
Wired and wireless network is based on the TCP / IP architecture but it is not sufficient to cope with the dynamics of the MANET. Cross layer design can be an alternative architecture for MANET. Frequent route break is one of the major problems of mobile adhoc network (MANET). Path breaks due to less available battery power and mobility of nodes. Most of the battery power is consumed in flooding of control packets. A key challenge in the design of efficient routing protocol is to reduce link breakage and flooding of control packets. Route breakage can be reduced if the possibility of route breakage is predicted and a handoff is done without drop of data packets. If route breakage is reduced, the more battery power will be available with nodes. In turn it reduces the possibility of route breakage and the possibility of flooding. This is a cumulative effect. So a novel preemptive route repair algorithm is proposed named as RDCLRP- Route discovery by cross layer routing protocol to reduce frequency of control packet flooding and route breakage. Three variants of RDCLRP and their results are illustrated. In this paper, the impact of the number of nodes on performance of RDCLRP are investigated and analyzed. The results show 55.6% reduction in link breakage, 14.7% improvement in residual battery power and an average of 6.7% increase in throughput compared to basic AODV.
Бесплатно
![Performance Analysis of VOIP over GRE Tunnel Performance Analysis of VOIP over GRE Tunnel](/file/thumb/15011477/performance-analysis-of-voip-over-gre-tunnel.png)
Performance Analysis of VOIP over GRE Tunnel
Статья научная
Voice over IP (VoIP) is commonly known as phone service over the Internet. Any service using public IP network requires certain extent of security. Demand for security in VOIP technology is increasing. VPN is one of the commonly used methods to secure VOIP traffic. In this paper we simulated behavior of a VOIP communication while running over a GRE VPN Tunnel using OPNET Modeler 17.5. During the simulation, such performance parameters as: choice of voice signaling protocol, voice Codec, parameters arising from network QoS (in this study, homogenous vs. heterogeneous network environment) and type of VPN tunneling protocol, were examined. We evaluated performance of VOIP communications in homogenous and heterogeneous network environments, configured based on two different signaling protocols, namely H.323 and SIP. Also, G.711 and G.723 were configured and tested as the choice for voice Codecs. GRE was implemented as the tunneling protocol. Result analysis of this study indicated that GRE Tunnel didn't show a significant increase in such call quality of service (QoS) performance factors as: end-to-end delay, call setup time, or a decrease in call MOS value. Even though in a non-ideal (heterogeneous) network environment, call quality of service (QoS) performance factors shoed poor results; however, there was no significant evidence to suggest that GRE Tunnel is the root cause for such poor results.
Бесплатно