The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Covert channels threaten conventional network security paradigms by exploiting existing system resources never intended to facilitate communication. By doing so, they can evade detection by conventional network security mechanisms such as firewalls. In order to improve network security, it is necessary to detect and disrupt covert communications. Due to the sheer number and variety of covert channel...
WiMAX, the acronym for Worldwide Interoperability for Microwave Access is a set of technical standards based on IEEE 802.16 standard. It provides an internet connection to broadband coverage area of several kilometers in radius, it's an adequate response to some rural or inaccessible areas. Unlike DSL (Digital Subscriber Line) or other wired technology, WiMAX uses radio waves and can provide point-to-multipoint...
The transmission of the Voice over Internet protocol requires high quality of speech to update this service. VoIP signal quality can be degraded by network layer problems which includes delay, packet loss and jitter. But the frame loss while transmitting voice over internet services may generate audible distortion in the perceived speech quality. The simulation model of VoIP network under impairments...
For high-speed serial links, the most important performance measurement is the bit error rate (BER). Many papers have proposed methods to calculate or estimate the BER under the conditions of systems with Jitter and ISI. One of these, StatEye method is very popular, using colored BER contours in StatEye, the BER can be estimated. The packet loss due to crosstalk always happens in communication products...
Using a peer-to-peer approach for live multimedia streaming applications offers the promise to obtain a highly scalable, decentralized, and robust distribution service. When constructing streaming topologies, however, specific care has to be taken in order to ensure that quality of service requirements in terms of delay, jitter, packet loss, and stability against deliberate denial of service attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.