Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls

2012 ◽  
Vol 6 (3) ◽  
pp. 141-148 ◽  
Author(s):  
G. Epiphaniou ◽  
G.A. Safdar ◽  
P. Sant ◽  
C. Maple
Author(s):  
Martin Grasdal ◽  
Laura E. Hunter ◽  
Michael Cross ◽  
Laura Hunter ◽  
Debra Littlejohn Shinder ◽  
...  

2010 ◽  
Vol 13 (1) ◽  
pp. 102 ◽  
Author(s):  
Davianys Alicia Navarro Rey ◽  
Jhon Edisson Villarreal Padilla ◽  
Luis Guillermo Martínez

El siguiente artículo presenta un análisis de las métricas de QoS (Quality Of Service) más relevantes para el servicio IPTV (Internet Protocol Television) sobre una infraestructura de red Móvil basada en MIPV4 y MIPV6, el cual es realizado con el Sniffer Wireshark. Es de suma importancia evaluar las métricas en el servicio, dado que esto permitirá observar cuál es el rendimiento de la red durante la trasmisión de cualquier servicio multimedia, dependiendo del protocolo móvil. De acuerdo a lo anterior, el resultado logrado es que en MIPV6 es más eficiente la calidad de la red para trasmitir un servicio IPTV, dado que las métricas evaluadas arrojaron que hay menos retardo y pérdidas de paquetes durante la trasmisión, esto se puede notar dado que en MIPV4, cuando el MN(Mobile Node) se encuentra ubicado en el FA(Foreing Agent), la pérdida es de 7% mientras que en MIPV6 es de 2%, favoreciendo la trasmisión del servicio hacia MIPV6. Para continuar con el trabajo, se recomienda evaluar la QoE (Quality Of Experience) del servicio en los diferentes protocolos móvil, con el fin de lograr un acercamiento a lo que puedan percibir o sentir los usuarios sobre el servicio.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host, network-to-network, and network-to-host as well.


Author(s):  
Homero Toral-Cruz ◽  
Deni Torres-Román ◽  
Leopoldo Estrada-Vargas

In this chapter, we present a solution for evaluating the Quality of Services (QoS) of Voice over Internet Protocol (VoIP). First, we present an introduction to the main concepts and mathematical background relating to QoS and Internet Protocol (IP) traffic nature, which subsequently are used in the measurements, analysis, and modeling of VoIP traffic. Secondly, we analyze network measurements and the result of the simulation in order to characterize the VoIP traffic nature. As results of this analysis, it is shown that VoIP jitter can be modeled by alpha-stable distributions and self-similar processes, with either Short or Long Range Dependence (i.e., SRD or LRD). Thirdly, we investigate the packet loss effects on the VoIP jitter, and present a methodology for simulating packet loss on VoIP jitter. Finally, we found an empirical relationship between the Hurst parameter (H) and the Packet Loss Rate (PLR); this relationship is based on voice traffic measurements and can be modeled by means of a power-law function with three fitted parameters.


Sign in / Sign up

Export Citation Format

Share Document