MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "a8818423-91b0-4866-a8a1-01ea233ef8d3"}, "_deposit": {"id": "4768", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4768"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4768", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "The Effect of Security on Performance in a VoIP Network using An Analytical Simulator", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, Voice over IP (VoIP) is a majorand challenging task for communicationtechnology. In this paper, we focus on VoIPwhich transmits voice over packet switchednetworks such as LANs or WANs. Addingsecurity to a VoIP system, the quality of serviceand performance of the system are at risk. Thecontribution of this paper has two main parts;firstly it illustrates registration call setup usingDiffie-Hellman Key Exchange Algorithm.Secondly, it evaluates two key performance of aVoIP: delay and bandwidth using an analyticalsimulator. The processing steps of this paperare: the Key Exchange Algorithm generates akey to provide authentication. The generatedkey is used by AES Algorithm to secure thesignaling and voice traffic within a VoIP systembased on SIP (Session Initiation Protocol)server. In addition, Counting Process inStochastic Processes is also used for callbreakdown."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "RTP"}, {"interim": "Security"}, {"interim": "Simulation"}, {"interim": "SIP"}, {"interim": "Network Design"}, {"interim": "VoIP"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9015.pdf", "filesize": [{"value": "406 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 406000.0, "url": {"url": "https://meral.edu.mm/record/4768/files/9015.pdf"}, "version_id": "a703b94d-a0bf-4990-b20b-9d1d19235d11"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Nhway, Ohnmar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-04-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/64"}, "item_title": "The Effect of Security on Performance in a VoIP Network using An Analytical Simulator", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004768", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-02"}, "publish_date": "2019-07-02", "publish_status": "0", "recid": "4768", "relation": {}, "relation_version_is_last": true, "title": ["The Effect of Security on Performance in a VoIP Network using An Analytical Simulator"], "weko_shared_id": -1}
The Effect of Security on Performance in a VoIP Network using An Analytical Simulator
http://hdl.handle.net/20.500.12678/0000004768
http://hdl.handle.net/20.500.12678/00000047680c52194d-30dc-4194-9fab-6054ec791951
a8818423-91b0-4866-a8a1-01ea233ef8d3
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | The Effect of Security on Performance in a VoIP Network using An Analytical Simulator | |||||
Language | en | |||||
Publication date | 2011-04-05 | |||||
Authors | ||||||
Nhway, Ohnmar | ||||||
Description | ||||||
Nowadays, Voice over IP (VoIP) is a majorand challenging task for communicationtechnology. In this paper, we focus on VoIPwhich transmits voice over packet switchednetworks such as LANs or WANs. Addingsecurity to a VoIP system, the quality of serviceand performance of the system are at risk. Thecontribution of this paper has two main parts;firstly it illustrates registration call setup usingDiffie-Hellman Key Exchange Algorithm.Secondly, it evaluates two key performance of aVoIP: delay and bandwidth using an analyticalsimulator. The processing steps of this paperare: the Key Exchange Algorithm generates akey to provide authentication. The generatedkey is used by AES Algorithm to secure thesignaling and voice traffic within a VoIP systembased on SIP (Session Initiation Protocol)server. In addition, Counting Process inStochastic Processes is also used for callbreakdown. | ||||||
Keywords | ||||||
RTP, Security, Simulation, SIP, Network Design, VoIP | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/64 | |||||
Journal articles | ||||||
Ninth International Conference On Computer Applications (ICCA 2011) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |