packet header
Recently Published Documents


TOTAL DOCUMENTS

121
(FIVE YEARS 30)

H-INDEX

11
(FIVE YEARS 1)

2022 ◽  
Vol 31 (3) ◽  
pp. 1971-1980
Author(s):  
Mosleh M. Abualhaj ◽  
Abdelrahman H. Hussein ◽  
Qasem M. Kharma ◽  
Qusai Y. Shambour ◽  
Sumaya N. Al-Khatib
Keyword(s):  

Author(s):  
Manjur Kolhar

Timeworn telecommunication are progressively being substituted by a new one that run over IP networks, which is recognized as voice over internet protocol (VoIP). VoIP has a number of qualities (e.g., inexpensive call rate), which make it progressively widespread in the telecommunication domain. However, VoIP faces plentiful obstacles that slow its growth. One of the major obstacles is poorly utilizing the network bandwidth. A number of techniques have been offered to handle this obstacle, including packet multiplexing techniques. This paper designs an original multiplexing techniques, called packet multiplexing and carrier header (PM-CH), to decrease the quantity of the bandwidth consumed by VoIP. PM-CH protect the bandwidth by multiplexing the packets in a header and using the Timestamp field in the RTP header. The achievement of the PM-CH technique was examined depends on connection capacity and payload shortening. Simulation outcomes show that the PM-CH technique outperforms the contrast technique in the two factors. For instance, the PM-CH technique’s connection capacity outperforms the comparable technique by 58.9% when the connection bandwidth is 1000 kbps. Consequently, the PM-CH technique attains its objective of reducing the unexploited bandwidth caused by VoIP.


2021 ◽  
Author(s):  
Vedika J. Kulkarni ◽  
R. Manju ◽  
Ruchika Gupta ◽  
John Jose ◽  
Sukumar Nandi

2021 ◽  
Vol 4 (4) ◽  
pp. 72
Author(s):  
Manjur Kolhar

5G technology is spreading extremely quickly. Many services, including Voice Over Internet Protocol (VoIP), have utilized the features of 5G technology to improve their performance. VoIP service is gradually ruling the telecommunication sector due to its various advantages (e.g., free calls). However, VoIP service wastes a substantial share of the VoIP 5G network’s bandwidth due to its lengthy packet header. For instance, the share of the packet header from bandwidth and channel time reaches 85.7% of VoIP 5G networks when using the IPv6 protocol. VoIP designers are exerting considerable efforts to solve this issue. This paper contributes to these efforts by designing a new technique named Zeroize (zero sizes). The core of the Zeroize technique is based on utilizing the unnecessary fields of the IPv6 protocol header to keep the packet payload (voice data), thereby reducing or “zeroizing” the payload of the VoIP packet. The Zeroize technique substantially reduces the expanded bandwidth of VoIP 5G networks, which is reflected in the wasted channel time. The results show that the Zeroize technique reduces the wasted bandwidth by 20% with the G.723.1 codec. Therefore, this technique successfully reduces the bandwidth and channel time of VoIP 5G networks when using the IPv6 protocol.


Author(s):  
Alan Saji

A botnet, especially with remote-controlled bots that offers a platform for many cyber threats. The powerful measure in opposition to that botnet is supplied by IDS (Intrusion get right of entry to gadget). The IDS frequently monitors and identifies the presence of powerful attacks by way of assessing community site visitor’s dangers. The IDS (PI-IDS) check for payload detects energetic tries to test the user's statistics gram protocol (UDP) and transmission manage protocol (TCP) comparisons with acknowledged attacks but the PI-IDS method is destroyed if the package is encrypted. PI-IDS shortages are conquer by using traffic-primarily based IDS (T-IDS), do now not take a look at package load; as a substitute, it exams the packet header to split get entry to, however this manner isn't always appropriate in modern-day global due to the fact network traffic is growing swiftly so looking at the header of every packet isn't always operating nicely and because of this advantage price is also essential. therefore, We endorse a new approach to this paper T-IDS creates an RDPLM (information-readable getting to know model) based totally on the set capabilities, in addition to a feature selection method, simplified sub spacing and multiple randomized meta-mastering techniques .The accuracy of our model is 99.984% and the education time is 21.38 s on a 9aaf3f374c58e8c9dcdd1ebf10256fa5 botnet database. it has been discovered that some mechanical studying fashions resemble a deep neural community, reducing mistakes in pruning the venture of locating a drug in a totally small series, and a random tree.


Author(s):  
Manjur Kolhar

5G technology propagation curve is ascending rapidly. 5G will open up the horizon to improve the performance of many other IP-based services such as voice over IP (VoIP). VoIP is a worldwide technology that is expected to rule the telecommunication world in the near future. However, VoIP has expended a significant part of the 5G technology bandwidth with no valuable use owing to its lengthy packet header. This issue even worsens when VoIP works in IPv6 networks, where the wasted bandwidth and airtime may reach 85.7% of 5G networks. VoIP developers have exerted many efforts to tackle this snag. This study adds to these efforts by proposing a new method called Zeroize (zero sizes). The main idea of the Zeroize method is to use superfluous fields of the IPv6 protocol header to carry the digital voice data of the packet and, thus, reduce or zeroize the VoIP packet payload. Although simple, the Zeroize method achieves a considerable reduction of the wasted bandwidth of 5G networks, which also directly affects the consumed airtime. The performance analysis of the Zeroize method shows that the consumed bandwidth is saved by 20% with the G.723.1 codec. Thus, the Zeroize method is a promising solution to reduce the wasted bandwidth and airtime of 5G networks when running VoIP over IPv6.


2021 ◽  
Author(s):  
Zhongyu MA ◽  
Yanxing Liu ◽  
Qun Guo ◽  
Xiaochao Dang ◽  
Zhanjun Hao ◽  
...  

Abstract Internet of Remote Things (IoRT) is widely used in both military and civilian applications. However, due to the unique characteristics, which is characterized as long-distance and high-latency, the design of the routing protocol is a great challenge of IoRT. In this paper, a QoS-oriented and traffic-aware multi-path routing protocol (QoTa-MRP) is proposed for IoRT. QoTa-MRP is composed of two parts. The first part is the link traffic-aware based multi-paths source route discovery mechanism, which is used to establish multi-paths with lower link disjoint degree. The second part is path similarity and traffic priority based multi-path selection mechanism, which is used to determine the transmission mode of the traffic flows to enhance the reliability or effectiveness of the transmission. Simultaneously, the protocol is theoretically analyzed in terms of the successful transmission rate of routing transmission data packet. Finally, the dynamic source routing, which is a very representative protocol and is usually used as the baseline comparison protocol, is revisited for the performance verification of the QoTa-MRP in IoRT. It is shown in the simulation results that there are significant superiorities of QoTa-MRP than that of DSR in terms of network throughput, packet loss rate and routing packet header overhead in IoRT.


2021 ◽  
Vol 11 (11) ◽  
pp. 5245
Author(s):  
Syed M. Raza ◽  
Haekwon Jeong ◽  
Moonseong Kim ◽  
Hyunseung Choo

Service Function Chaining (SFC) is an emerging paradigm aiming to provide flexible service deployment, lifecycle management, and scaling in a micro-service architecture. SFC is defined as a logically connected list of ordered Service Functions (SFs) that require high availability to maintain user experience. The SFC protection mechanism is one way to ensure high availability, and it is achieved by proactively deploying backup SFs and installing backup paths in the network. Recent studies focused on ensuring the availability of backup SFs, but overlooked SFC unavailability due to network failures. This paper extends our previous work to propose a Hybrid Protection mechanism for SFC (HP-SFC) that divides SFC into segments and combines the merits of local and global failure recovery approaches to define an installation policy for backup paths. A novel labeling technique labels SFs instead of SFC, and they are stacked as per the order of SFs in a particular SFC before being inserted into a packet header for traffic steering through segment routing. The emulation results showed that HP-SFC recovered SFC from failure within 20–25 ms depending on the topology and reduced backup paths’ flow entries by at least 8.9% and 64.5% at most. Moreover, the results confirmed that the segmentation approach made HP-SFC less susceptible to changes in network topology than other protection schemes.


Sign in / Sign up

Export Citation Format

Share Document