This document outlines a MSc dissertation proposal that aims to study the viability of using wireless VoIP in geographically challenged areas of Kenya. The study will involve an empirical analysis and simulation of wireless VoIP networks in areas with geographical challenges. The objectives are to determine quality of service of wireless VoIP, simulate a wireless VoIP network with a focus on reliability, and report the findings of the study and simulations. The scope will involve testing wireless VoIP performance in different challenging areas of Nairobi. A literature review on related topics like wireless mesh networks and VoIP technologies will also be conducted.
Cloud computing provides a way for organizations to share distributed resources over a network. However, data security is a major concern in cloud computing since data is stored remotely. The document discusses several techniques used for data security in cloud computing including authentication, encryption, data masking, and data traceability. The latest technologies discussed are a cloud information gateway that can control data transmission and secure logic migration that transfers applications to an internal sandbox for secure execution.
A firewall is a system or set of rules designed to permit or deny computer applications access to networks based on a set of rules. Firewalls can be implemented through software or hardware and work by examining network packets and blocking or allowing passage based on the packet's contents. There are several types of firewalls including network layer, application layer, circuit layer, and stateful multi-layer inspection firewalls. Firewalls help secure private networks from unauthorized access from other networks like the internet.
Cloud computing is an internet-based computing technology, where shared re-sources
such as software, platform, storage and information are provided to customers on demand.
Cloud computing is a computing platform for sharing resources that include infrastructures,
software, applications, and business processes. The exact definition of cloud computing is A
large-scale distributed computing paradigm that is driven by economies of scale, in which a
pool of abstracted, virtualized, dynamically scalable, managed computing power, storage,
platforms, and services are delivered on demand to external customers over the Internet .
this presentation covers all the main points that need to know about vpn. That includes the types,overview,future plans,advantage,disadvantage,working of vpn.
Fog computing is a distributed computing paradigm that processes data closer to IoT devices rather than sending all data to centralized cloud servers. This helps address issues like high latency, bandwidth constraints, and scalability challenges. Fog computing deploys compute and storage resources between end devices and cloud data centers. It can perform tasks like data aggregation, analytics, and decision making near devices to enable low-latency applications. Coordinating fog and cloud resources requires addressing challenges regarding resource management, load balancing, APIs, security, and fault tolerance.
This document outlines a syllabus for a course on Internet of Things technology. It discusses several topics that will be covered in Module 4 on data and analytics for IoT, including an introduction to data analytics for IoT, structured versus unstructured data, data in motion versus data at rest, and an overview of descriptive, diagnostic, predictive, and prescriptive analytics. Specific techniques that will be examined include machine learning, big data analytics tools, edge streaming analytics, and network analytics. Examples are provided for each topic to illustrate key concepts relating to analyzing large amounts of IoT sensor data.
This document discusses cloud computing. It begins with an introduction defining cloud computing as internet-based computing where shared resources are provided on demand. It then covers the history, components, architecture, types (public, private, hybrid), advantages of flexibility, low cost and easy management, and disadvantages of dependency and security issues of cloud computing.
Cloud computing allows users to access data and software over the internet rather than locally. While convenient, this presents security risks as users lose some control over their data. Common threats include hacking, malware, and insider privileges being misused. However, the document outlines security measures for cloud computing like encryption, access control, backups, and continuous monitoring that can help protect users if implemented properly. The key is treating security as an ongoing process rather than a one-time event.
Cloud computing provides a way for organizations to share distributed resources over a network. However, data security is a major concern in cloud computing since data is stored remotely. The document discusses several techniques used for data security in cloud computing including authentication, encryption, data masking, and data traceability. The latest technologies discussed are a cloud information gateway that can control data transmission and secure logic migration that transfers applications to an internal sandbox for secure execution.
A firewall is a system or set of rules designed to permit or deny computer applications access to networks based on a set of rules. Firewalls can be implemented through software or hardware and work by examining network packets and blocking or allowing passage based on the packet's contents. There are several types of firewalls including network layer, application layer, circuit layer, and stateful multi-layer inspection firewalls. Firewalls help secure private networks from unauthorized access from other networks like the internet.
Cloud computing is an internet-based computing technology, where shared re-sources
such as software, platform, storage and information are provided to customers on demand.
Cloud computing is a computing platform for sharing resources that include infrastructures,
software, applications, and business processes. The exact definition of cloud computing is A
large-scale distributed computing paradigm that is driven by economies of scale, in which a
pool of abstracted, virtualized, dynamically scalable, managed computing power, storage,
platforms, and services are delivered on demand to external customers over the Internet .
this presentation covers all the main points that need to know about vpn. That includes the types,overview,future plans,advantage,disadvantage,working of vpn.
Fog computing is a distributed computing paradigm that processes data closer to IoT devices rather than sending all data to centralized cloud servers. This helps address issues like high latency, bandwidth constraints, and scalability challenges. Fog computing deploys compute and storage resources between end devices and cloud data centers. It can perform tasks like data aggregation, analytics, and decision making near devices to enable low-latency applications. Coordinating fog and cloud resources requires addressing challenges regarding resource management, load balancing, APIs, security, and fault tolerance.
This document outlines a syllabus for a course on Internet of Things technology. It discusses several topics that will be covered in Module 4 on data and analytics for IoT, including an introduction to data analytics for IoT, structured versus unstructured data, data in motion versus data at rest, and an overview of descriptive, diagnostic, predictive, and prescriptive analytics. Specific techniques that will be examined include machine learning, big data analytics tools, edge streaming analytics, and network analytics. Examples are provided for each topic to illustrate key concepts relating to analyzing large amounts of IoT sensor data.
This document discusses cloud computing. It begins with an introduction defining cloud computing as internet-based computing where shared resources are provided on demand. It then covers the history, components, architecture, types (public, private, hybrid), advantages of flexibility, low cost and easy management, and disadvantages of dependency and security issues of cloud computing.
Cloud computing allows users to access data and software over the internet rather than locally. While convenient, this presents security risks as users lose some control over their data. Common threats include hacking, malware, and insider privileges being misused. However, the document outlines security measures for cloud computing like encryption, access control, backups, and continuous monitoring that can help protect users if implemented properly. The key is treating security as an ongoing process rather than a one-time event.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Cloud computing concepts have existed for many years in technologies like mainframe computing and utility computing. While cloud computing is commonly associated with 21st century applications and services, its foundations can be traced back to earlier distributed computing models. Cloud computing abstracts hardware and software resources that are shared dynamically via virtualization and accessed over a network.
This document discusses cloud computing and security issues. It defines cloud computing as relying on shared computing resources over networks rather than local servers. Cloud security aims to provide information security across public, private and hybrid cloud models. Some key security issues include data security, protecting hardware and data from threats, and network security, protecting the network from attacks. Multi-tenancy can also create security problems when applications from different customers are combined on shared infrastructure.
This document discusses packet sniffers, which are software applications that can monitor and capture network traffic. It describes how packet sniffers work by putting the network adapter into promiscuous mode to see all network traffic. The document outlines different types of packet sniffers, including commercial and underground varieties. It explains that packet sniffers are used for both legitimate purposes like network debugging and security, as well as illegitimate purposes like hacking. Specific packet sniffer software like Wireshark are profiled, describing their features, capabilities, and limitations. Risks of using packet sniffers like potential security vulnerabilities are also highlighted.
Fog computing refers to performing computing tasks closer to the source of data generation rather than solely relying on centralized cloud computing. It helps address issues like high bandwidth needs and latency by processing some data locally and only sending valuable aggregated data to the cloud. Fog computing is driven by the rise of IoT and is useful for applications requiring low latency like connected cars, smart grids, and healthcare. It aims to make decisions and processing occur as close to data generation as possible using localized computing resources and devices.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
This document discusses cloud security and provides an overview of McAfee's cloud security program. It begins with definitions of cloud computing and cloud security. It then analyzes the growth of the global cloud security market from 2012-2014. Next, it discusses McAfee's cloud security offerings, strengths, weaknesses, opportunities, threats and competitors in the cloud security space. It also provides details on some of McAfee's major customers. Finally, it discusses Netflix's move to the cloud and its cloud security strategy.
The document discusses pervasive computing, which refers to microprocessors being embedded everywhere and computing being available anywhere. It is enabled by technologies like mobile internet access, wireless communication, and Bluetooth. Pervasive computing allows access from any device, on any network, with any data. It aims to spread intelligence and connectivity to more or less everything, from ships and aircrafts to coffee mugs and the human body. Some principles of pervasive computing include anytime/anywhere access, physical integration between computing nodes and the physical world, and instantaneous interoperation between devices. Examples of applications include smart clothing, interactive flexible posters, and pill cameras.
Fog computing is a paradigm that extends cloud computing and services to the edge of the network, similar to cloud but providing data computation, storage, and application services closer to users. This helps address issues with cloud like limited bandwidth, latency, and security vulnerabilities. Fog computing uses techniques like user behavior profiling and decoy systems to detect unauthorized access and secure data in the cloud from attackers. It has a decentralized architecture with fog devices acting as intermediaries between user devices and the cloud. Potential applications and scenarios of fog computing include smart grids, smart traffic lights, software defined networks, and the Internet of Things.
The document discusses the security mechanisms in GSM cellular networks. It describes how GSM uses encryption algorithms (A3, A5, A8) and a challenge-response mechanism involving a random number (RAND) and signed response (SRES) to authenticate users. While the A5 stream cipher has an effective key length of 40 bits, this provides adequate security for conversations given their short lifespan of weeks. GSM networks are the most secure cellular standard due to using encryption, temporary IDs, and digital signaling compared to analog networks.
This document discusses edge computing and how it relates to IoT and AI. It defines key concepts like IoT, AI, machine learning, and cloud computing. It then explains that edge computing allows data from IoT devices to be processed locally instead of sending it to data centers, improving latency, security, costs and business uptime. Some applications of edge computing include autonomous vehicles, augmented reality, retail, and connected homes/offices.
Development in the technology of sensor such as Micro Electro Mechanical Systems (MEMS), wireless communications, embedded systems, distributed processing and wireless sensor applications have contributed a large transformation in Wireless
Sensor Network (WSN) recently. It assists and improves work performance both in the field of industry and our daily life. Wireless Sensor Network has been widely used in many areas especially for surveillance and monitoring in agriculture and habitat monitoring. Environment monitoring has become an important field of control and protection, providing real-time system and control communication
with the physical world. An intelligent and smart Wireless Sensor Network system can gather and process a large amount of data from the beginning of the monitoring and manage air quality, the conditions of traffic, to weather situations.
This unit includes the following content :
*Introduction to cloud computing
*Move to cloud computing
*Types of cloud
*Working of cloud computing
*Characteristics of cloud
NETWORK SECURITY
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for network security. 6 Hrs
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher. 7 Hrs
UNIT - 3
Principles of Public-Key Cryptosystems, The RSA algorithm, Key Management, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash Functions. 6 Hrs
UNIT - 4
Digital signatures, Authentication Protocols, Digital Signature Standard. 7 Hrs
UNIT - 5
Web Security Consideration, Security socket layer (SSL) and Transport layer security, Secure Electronic Transaction. 6 Hrs
UNIT - 6
Intruders, Intrusion Detection, Password Management. 6 Hrs
UNIT - 7
MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures. 7 Hrs
UNIT - 8
Firewalls Design Principles, Trusted Systems. 6 Hrs
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
This document discusses several security services: authentication, which verifies the identity of communication parties; access control, which limits access to systems and applications; data confidentiality, which protects transmitted data from unauthorized access; data integrity, which prevents unauthorized data modification; and nonrepudiation, which prevents senders or receivers from denying transmitted messages. These services provide specific types of protection for system resources and are implemented through security mechanisms to enforce security policies.
Machine learning for wireless networks @Bestcom2016Merima Kulin
A tutorial on applying machine learning techniques for optimizing wireless networks. Topic include: (i) why and how to use data science in wireless network research; (ii) introduce a generic framework for applying data science in wireless networks; (iii) practical example that shows how to instantiate the framework using best practices.
This document provides an introduction to IoT security. It discusses key components of IoT including sensors, actuators, microcontrollers, communication capabilities, and identification. The document outlines the ITU-T IoT reference model and describes security challenges at different levels including devices, fog networks, core networks, and data centers. It also discusses common IoT security issues such as unpredictable behavior, device similarity, problematic deployments, lack of upgrades, and lack of transparency. Finally, the document summarizes common IoT security tools including encryption, passwords, hardware security modules, two-factor authentication, and public key infrastructure certificates.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
VPN allows remote access to private networks over public networks like the Internet. It uses encryption and tunneling protocols to securely transmit data. There are three main types of VPN implementations: intranet within an organization, extranet for external access, and remote access for mobile employees. VPN provides benefits like reduced costs, scalability, and flexibility compared to traditional private networks.
This document proposes a new 5-location network design for ABC Medical Practice to improve security, data backup, and network scalability. It includes an inventory of current and required hardware, software needs, a disaster recovery plan and cost analysis, and work breakdown structures for planning, deployment, and staff training. The proposed design features centralized backups, VPN connectivity between sites, and allows remote administration.
This document outlines a study on resolving latency problems when streaming online videos through broadband, wireless, and mobile networks. The study aims to find cost-effective hardware or software solutions to reduce latency and the amount of data packets required for streaming. Potential causes of latency are identified as bandwidth restrictions, traffic congestion, and the high data needs of high-quality videos. Current industry practices like reducing video quality are noted. The proposed solution aims to retain video quality while restricting data available for streaming through video codec experimentation and inexpensive hardware. The scope and methodology, including experimentation and questionnaires, are described.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Cloud computing concepts have existed for many years in technologies like mainframe computing and utility computing. While cloud computing is commonly associated with 21st century applications and services, its foundations can be traced back to earlier distributed computing models. Cloud computing abstracts hardware and software resources that are shared dynamically via virtualization and accessed over a network.
This document discusses cloud computing and security issues. It defines cloud computing as relying on shared computing resources over networks rather than local servers. Cloud security aims to provide information security across public, private and hybrid cloud models. Some key security issues include data security, protecting hardware and data from threats, and network security, protecting the network from attacks. Multi-tenancy can also create security problems when applications from different customers are combined on shared infrastructure.
This document discusses packet sniffers, which are software applications that can monitor and capture network traffic. It describes how packet sniffers work by putting the network adapter into promiscuous mode to see all network traffic. The document outlines different types of packet sniffers, including commercial and underground varieties. It explains that packet sniffers are used for both legitimate purposes like network debugging and security, as well as illegitimate purposes like hacking. Specific packet sniffer software like Wireshark are profiled, describing their features, capabilities, and limitations. Risks of using packet sniffers like potential security vulnerabilities are also highlighted.
Fog computing refers to performing computing tasks closer to the source of data generation rather than solely relying on centralized cloud computing. It helps address issues like high bandwidth needs and latency by processing some data locally and only sending valuable aggregated data to the cloud. Fog computing is driven by the rise of IoT and is useful for applications requiring low latency like connected cars, smart grids, and healthcare. It aims to make decisions and processing occur as close to data generation as possible using localized computing resources and devices.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
This document discusses cloud security and provides an overview of McAfee's cloud security program. It begins with definitions of cloud computing and cloud security. It then analyzes the growth of the global cloud security market from 2012-2014. Next, it discusses McAfee's cloud security offerings, strengths, weaknesses, opportunities, threats and competitors in the cloud security space. It also provides details on some of McAfee's major customers. Finally, it discusses Netflix's move to the cloud and its cloud security strategy.
The document discusses pervasive computing, which refers to microprocessors being embedded everywhere and computing being available anywhere. It is enabled by technologies like mobile internet access, wireless communication, and Bluetooth. Pervasive computing allows access from any device, on any network, with any data. It aims to spread intelligence and connectivity to more or less everything, from ships and aircrafts to coffee mugs and the human body. Some principles of pervasive computing include anytime/anywhere access, physical integration between computing nodes and the physical world, and instantaneous interoperation between devices. Examples of applications include smart clothing, interactive flexible posters, and pill cameras.
Fog computing is a paradigm that extends cloud computing and services to the edge of the network, similar to cloud but providing data computation, storage, and application services closer to users. This helps address issues with cloud like limited bandwidth, latency, and security vulnerabilities. Fog computing uses techniques like user behavior profiling and decoy systems to detect unauthorized access and secure data in the cloud from attackers. It has a decentralized architecture with fog devices acting as intermediaries between user devices and the cloud. Potential applications and scenarios of fog computing include smart grids, smart traffic lights, software defined networks, and the Internet of Things.
The document discusses the security mechanisms in GSM cellular networks. It describes how GSM uses encryption algorithms (A3, A5, A8) and a challenge-response mechanism involving a random number (RAND) and signed response (SRES) to authenticate users. While the A5 stream cipher has an effective key length of 40 bits, this provides adequate security for conversations given their short lifespan of weeks. GSM networks are the most secure cellular standard due to using encryption, temporary IDs, and digital signaling compared to analog networks.
This document discusses edge computing and how it relates to IoT and AI. It defines key concepts like IoT, AI, machine learning, and cloud computing. It then explains that edge computing allows data from IoT devices to be processed locally instead of sending it to data centers, improving latency, security, costs and business uptime. Some applications of edge computing include autonomous vehicles, augmented reality, retail, and connected homes/offices.
Development in the technology of sensor such as Micro Electro Mechanical Systems (MEMS), wireless communications, embedded systems, distributed processing and wireless sensor applications have contributed a large transformation in Wireless
Sensor Network (WSN) recently. It assists and improves work performance both in the field of industry and our daily life. Wireless Sensor Network has been widely used in many areas especially for surveillance and monitoring in agriculture and habitat monitoring. Environment monitoring has become an important field of control and protection, providing real-time system and control communication
with the physical world. An intelligent and smart Wireless Sensor Network system can gather and process a large amount of data from the beginning of the monitoring and manage air quality, the conditions of traffic, to weather situations.
This unit includes the following content :
*Introduction to cloud computing
*Move to cloud computing
*Types of cloud
*Working of cloud computing
*Characteristics of cloud
NETWORK SECURITY
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for network security. 6 Hrs
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher. 7 Hrs
UNIT - 3
Principles of Public-Key Cryptosystems, The RSA algorithm, Key Management, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash Functions. 6 Hrs
UNIT - 4
Digital signatures, Authentication Protocols, Digital Signature Standard. 7 Hrs
UNIT - 5
Web Security Consideration, Security socket layer (SSL) and Transport layer security, Secure Electronic Transaction. 6 Hrs
UNIT - 6
Intruders, Intrusion Detection, Password Management. 6 Hrs
UNIT - 7
MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures. 7 Hrs
UNIT - 8
Firewalls Design Principles, Trusted Systems. 6 Hrs
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
This document discusses several security services: authentication, which verifies the identity of communication parties; access control, which limits access to systems and applications; data confidentiality, which protects transmitted data from unauthorized access; data integrity, which prevents unauthorized data modification; and nonrepudiation, which prevents senders or receivers from denying transmitted messages. These services provide specific types of protection for system resources and are implemented through security mechanisms to enforce security policies.
Machine learning for wireless networks @Bestcom2016Merima Kulin
A tutorial on applying machine learning techniques for optimizing wireless networks. Topic include: (i) why and how to use data science in wireless network research; (ii) introduce a generic framework for applying data science in wireless networks; (iii) practical example that shows how to instantiate the framework using best practices.
This document provides an introduction to IoT security. It discusses key components of IoT including sensors, actuators, microcontrollers, communication capabilities, and identification. The document outlines the ITU-T IoT reference model and describes security challenges at different levels including devices, fog networks, core networks, and data centers. It also discusses common IoT security issues such as unpredictable behavior, device similarity, problematic deployments, lack of upgrades, and lack of transparency. Finally, the document summarizes common IoT security tools including encryption, passwords, hardware security modules, two-factor authentication, and public key infrastructure certificates.
Cloud here means data and encryption means to secure the data. In this ppt you can get to know about various encryption algorithms which are used to secure the data.
VPN allows remote access to private networks over public networks like the Internet. It uses encryption and tunneling protocols to securely transmit data. There are three main types of VPN implementations: intranet within an organization, extranet for external access, and remote access for mobile employees. VPN provides benefits like reduced costs, scalability, and flexibility compared to traditional private networks.
This document proposes a new 5-location network design for ABC Medical Practice to improve security, data backup, and network scalability. It includes an inventory of current and required hardware, software needs, a disaster recovery plan and cost analysis, and work breakdown structures for planning, deployment, and staff training. The proposed design features centralized backups, VPN connectivity between sites, and allows remote administration.
This document outlines a study on resolving latency problems when streaming online videos through broadband, wireless, and mobile networks. The study aims to find cost-effective hardware or software solutions to reduce latency and the amount of data packets required for streaming. Potential causes of latency are identified as bandwidth restrictions, traffic congestion, and the high data needs of high-quality videos. Current industry practices like reducing video quality are noted. The proposed solution aims to retain video quality while restricting data available for streaming through video codec experimentation and inexpensive hardware. The scope and methodology, including experimentation and questionnaires, are described.
The document proposes improving wireless network coverage at the Jackson Avenue Warehouse facility by taking control of unused IT infrastructure from a departed company, installing additional access points, and upgrading switches and cabling to expand network access across problematic areas of the warehouse and storage locations. A list of specific equipment and access point placements is provided, along with diagrams and total estimated costs to implement the wireless upgrades.
The document provides a technical discussion and recommendations for implementing a wireless network solution for the ABC chain of sporting goods stores. It discusses implementing separate WLAN, WWAN, and mobility components. For the WLAN, it recommends installing Cisco 4500 series switches with PoE and Cisco 1240AG series access points in each store. A Cisco PIX 506E firewall is also recommended for each store. The WWAN would connect the 10 stores using Cisco 2800 routers with 3G WWAN cards and external antennas from Verizon Wireless. The solution would allow remote employees to access inventory and process orders using smartphones.
This document proposes a lightweight digital library framework that aims to address challenges faced by organizations in developing countries with limited resources. It summarizes existing digital library frameworks and software tools, and identifies their complexity as a hindrance to adoption and management over time. The proposed framework aims to explicitly avoid formalisms and APIs to allow for easier adoption and management of digital library systems. It will investigate defining simplicity for digital library architectures and implementing systems based on simple designs.
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
This document proposes a network design to connect an online ordering system to two suppliers. It includes a firewall, router, web server and database server at the company. Each supplier will have its own router connected to the internet. The bill of materials lists the required server, router, category 5 cables and DSL internet connection. The total cost is around PHP 40,864.
This document proposes a network plan for a new school building. It discusses infrastructure considerations like data closets, a main distribution facility (MDF), intermediate distribution facilities (IDFs), bandwidth needs, cabling, wireless access points, testing, documentation, budget, and rationale. The goal is to seamlessly integrate technology into teaching and learning through a flexible and easy-to-use network.
The network provides 100Mbps bandwidth with the ability to upgrade to 1000Mbps. Wireless access is provided via 802.11g. Three servers provide Active Directory, file sharing, intranet, email, and more. Switches support 10/100/1000Mbps Ethernet with fiber optic and wireless connectivity. Wireless devices support 108Mbps throughput with high-gain antennas providing coverage up to 2 miles. Dell servers run Windows Server 2003 and include a file/web server with RAID5 storage. Workstations have Core 2 Duo CPUs and run Windows Vista with Office 2003. Point of sale terminals have Celeron CPUs and run Windows with barcode scanners. Installation will take 10 days to set up wiring and systems
This document is a sample thesis submitted by Daniel Manfred Klein to Lakehead University in partial fulfillment of the requirements for a Master of Science in Computer Science degree. The thesis includes an introduction describing the main ideas and providing examples of tables from cited references. It also includes a chapter on graphs displaying examples from references. The thesis is written in LaTeX and includes standard thesis components such as a table of contents, list of tables and figures, acknowledgments, and references.
The document outlines 19 potential project titles for a Cisco summer internship in 2011. The projects cover a wide range of topics including network performance testing, automation, monitoring, management, and security tools.
Project Proposal Sample: RFID on Warehouse Management SystemCheri Amour Calicdan
This document is a thesis submitted for a Master's degree in Information Technology that proposes developing a Warehouse Management System integrated with RFID technology. The project aims to automate manual processes at a warehouse to reduce errors, improve data accuracy, increase speed and control over inventory. Currently the warehouse relies on a paper-based semi-automated system with 65 personnel which is inefficient and ineffective. The proposed system would use RFID readers on forklifts and fixed locations, along with RFID tags on assets and shelves, to automate tracking and provide real-time inventory and reports. This is intended to streamline operations and address bottlenecks affecting the production cycle.
Introduction and objectives of the projectrihan696
The document provides an overview of a school management system project. It includes chapters on introduction, system study, system analysis, system design, system testing, implementation, maintenance, and conclusion. The objectives are to computerize the manual school management system to reduce paperwork and increase efficiency. The key modules covered include student records, fee collection, faculty information, timetables, exam results, and library management. Visual Basic 6.0 is used for the front-end and SQL Server 2000 is used for the back-end database. A feasibility analysis was conducted and the system was found to be technically, economically, and operationally feasible.
The document outlines guidelines for formatting a final year project proposal. It includes sections for the project title, student names and roll numbers, main text formatting, headings formatting, figures and tables, and references. Guidelines are provided for font type, size, indentation, spacing, capitalization, and other formatting rules to maintain a consistent structure and appearance.
This document discusses physical supply and distribution, which concerns moving goods from suppliers to manufacturers as inbound movement, and from manufacturers to customers as outbound movement. It also discusses transportation methods companies use to deliver goods to customers, either directly or through intermediaries like wholesalers, warehouses, and transportation companies. Key concepts covered are total cost, customer service through factors like time, dependability, and convenience, and balancing distribution costs with customer service.
The document outlines a marketing plan for Dream Bakers, a café and bakery located in Mardan, Pakistan. It will offer a variety of coffee, cakes, pastries and other products at competitive prices. The plan details the target market, strategies, financial projections, and controls to achieve the mission of offering high quality bakery products and becoming a leading reputable bakery in the area. It analyzes competitors, trends, and provides breakdowns of expenses, cash flows, and the breakeven point. The marketing team will implement strategies around pricing, promotion, and product/service quality to attract customers and achieve financial objectives.
This document provides an overview of massive MIMO technology in 5G networks. It begins with an introduction to 5G and a literature review. It then discusses 5G technology, including spectrum deployment, features, architecture and challenges. It also covers MIMO in 4G LTE networks. The main topic of massive MIMO in 5G is then explained, including its construction, operation modes, limitations and the issue of pilot contamination. Applications and the scope of massive MIMO are discussed before concluding with a summary of the key points.
This seminar report provides an overview of 5G technology. It discusses the evolution of wireless networks from 1G to 5G, describing the key features of each generation. The report then focuses on 5G technology, explaining what it is, the research work being done, the proposed 5G architecture and protocol stack, key features and applications. It concludes by discussing the future potential of 5G networks.
US NORTHCOM Study: Commercial Wireless Doug Hanchard
This document provides a summary of a study examining the utility of commercial wireless technologies to enable communications for US Northern Command operations. Key conclusions include:
- A variety of commercial wireless technologies were analyzed over a 10-year horizon, including WiFi, cellular networks, satellite communications, and emerging technologies.
- Near-term focus (3-5 years) should be on technologies with market viability supported by commercial vendors to provide capabilities for bandwidth, coverage, and cost.
- Mature cellular networks can provide wide-area coverage, while technologies like WiFi and WiMax offer rapid deployment capabilities. IP is crucial for interoperability across networks.
- Recommendations and roadmaps will identify commercially supported technologies
SON (Self Organizing Networks) An analysis of its benefits in the mobile domainSumitKumar3094
Mobile Telecommunications Networks over the time has grown in
complexity and has reached the stage at which automations are now
indispensable for running a modern day mobile network. Crucial areas of network
such as design, planning, and optimization need a real time automation solution.
This is why the SON technology was developed. SON is a dynamic plug and play
system of hardware and software bundle which when connected to the
telecommunications network would automatically configure, optimize and heal the
network.
As with every new technology, there is always a degree of scepticism
that comes along and it is quite important to validate its functioning before we
accept it. The aim of this project is to analyse the three key features of SON i.e.
Load Balancing / ANR on 3G network, RET feature analysis on LTE network and
GSM spectrum Management on 2G network. It is intended to implement these
features on a live network and see the overall gain in the network performance. A
critical analysis is done to see the magnitude of impact due to SON. It is also
intended to find out areas where SON did not work well and had issues with its
implementation, working and accuracy.
In this project the main functionality of SON was closely reviewed when it was
implemented in an urban cluster. The KPI gains were measured in the area of
capacity, coverage, load balancing and quality improvements. The final result not
only gauged the magnitude of performance improvement but also highlighted the
complexity and drawbacks of the SON solution.
Some remarkable improvements in the network quality were observed
especially in the 3G and 2G network but there were couple of areas where SON
had issues and had failed to achieve what expected. These were noted as
learnings and areas of future improvement.
This document is a training report submitted by Jatin Kumar, a student at B.S. Anangpuria Institute of Technology and Management, in partial fulfillment of the requirements for a Bachelor of Technology degree in Electronics and Communication Engineering. The report provides an overview of the student's training at Electronics Niketan, under the Ministry of Communication and Information Technology, Government of India. It includes acknowledgments, a table of contents, and sections on the company profile, an introduction to cognitive radio and dynamic spectrum access, the history and background leading to cognitive radio, basic concepts of cognitive radio, and future applications.
Mobile WiMAX is a wireless broadband technology that uses OFDMA and MIMO to provide high-speed Internet access over long distances. It supports both TDD and FDD duplex modes and uses OFDM to divide the wireless signal into multiple sub-carriers. MIMO implements space-time coding to improve link robustness and reduce fade margin. Mobile WiMAX also features advanced security, mobility support with fast handovers, and dynamic allocation of uplink and downlink resources.
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks have come to the forefront of the scientific community recently and it consists of small nodes with sensing, Communications and computing capabilities. The Wireless Sensor Network Systems can be applied to monitor different environments ranging from military to civil applications. It is observed that different protocols necessary for smooth functioning of the network system are highly application specific. Current WSNs typically communicate directly with a centralized controller or satellite. In this paper we survey the different research challenges in Wireless Sensor Networks and purpose of various research Challenges activities is the development of a framework, which is radically simplifies the development of software for sensor network applications and characteristic Features of Sensor Networks.
The document introduces a testbed for implementing and evaluating an OFDMA-based network coded cooperation system using software defined radio nodes, which allows for the transmission of multiple nodes through TDMA or FDMA. The system was tested through image transmission and showed significantly improved bit error rate performance compared to direct transmission, demonstrating the benefits of network coding for improving transmission quality and reliability. Key implementation details and experimental results are provided to evaluate the performance of the proposed OFDMA-based network coded cooperation scheme.
IRJET- Different Technique over 5G LTE Wireless Network: A SurveyIRJET Journal
This document discusses different techniques for 5G LTE wireless networks. It provides an overview of the evolution of wireless communication technologies from 1G to 5G. 5G networks are expected to provide higher data rates of 1Gbps or more compared to 4G networks. The document also discusses the architecture and working of 5G networks, including using massive MIMO technology to establish indoor and outdoor setups to reduce infiltration losses through building walls. This will help improve energy efficiency, cell throughput, data rates, and spectral efficiency of cellular networks.
5G And Future Communications Network ArchitectureJim Jimenez
This document provides a literature review and final report on 5G and future communications network architecture. It discusses the evolution of wireless communications from 1G to 4G technologies. It then examines the need for a 5G network to address increasing data demands. Key 5G technologies discussed include millimeter wave communication, massive MIMO, heterogeneous networks, and software-defined networking. The document also explores 5G vision, use cases such as broadband access in dense areas, and concludes with recommendations and critical reflection.
This document provides a seminar report on optical network architecture presented by Siddharth Singh at JSS Mahavidyapeetha. It begins with acknowledging those who helped and guided in completing the report. The abstract provides an overview of optical networks and how they provide high bandwidth through technologies like DWDM and routing/grooming at the wavelength level. It discusses network architectures like SONET, PONs, and topologies like bus, star and tree. The report is divided into chapters covering topics like DWDM systems, synchronous optical networking, PON history and elements, and network topologies.
This document provides a network design proposal for the Undercroft Lecture Theatre at La Trobe University. The objectives are to upgrade the existing network to support more devices and applications with improved coverage, capacity, and reliability. The challenges include the building architecture limiting access point placement and potential interference. The proposed solution adds access points and switches to increase coverage throughout the area. It aims to meet growing demands, support real-time applications, and provide a secure, fault-tolerant network design capable of handling peak usage. Hardware components, software tools, and a risk analysis are discussed to support the network upgrade recommendations.
This document provides an overview of the requirements for developing a mobile application called "Free Park" to help disabled users locate parking spaces. The application will allow users to view available parking locations, prices, and reserve spaces for a chosen duration. It will connect to a SQLite database to store user data and parking information. The application will be created in Java using Android SDK and will integrate with Google Maps and the Liverpool government website for additional parking details. Security measures like WPA2 encryption will also be implemented once the basic application functionality is established. The goal is to create a user-friendly mobile solution to help disabled individuals more easily find and reserve accessible parking spots.
- The document proposes analytical models to estimate electromagnetic field (EMF) emissions from Wi-Fi and powerline communication (PLC) links in a home network.
- It develops a model for Wi-Fi EMF emissions based on assumptions about the transmission system, propagation environment, and a path loss model. This is used to define a "radiant exposure" (RE) routing metric that estimates the expected radiated energy within a radiation-sensitive area from transmitting along a path.
- The RE metric incorporates the effects of distance between the radiating sources and sensitive area, as well as the asymmetry of radiated energy regarding the direction of each link. It is designed to fit within shortest path routing algorithms to find minimum
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
The document is a thesis submitted by Maryam Hamidirad for the degree of Master of Applied Science. It proposes a cooperative mechanism to reduce energy consumption in the downlink channel of LTE networks for multicast video transmission. The mechanism clusters users based on distance from the base station. A cluster header is chosen using a utility function and receives data directly from the base station. Cluster headers then relay the data to other users in their cluster using WLAN. Simulations show the approach reduces base station power consumption by 5-25% compared to conventional multicast transmission.
This document discusses the challenges facing next-generation networks. It describes how current networks are struggling to handle the exponential growth in data usage and number of users. Next-generation networks aim to address this by improving network capabilities. However, developing these advanced networks presents challenges such as maintaining energy efficiency, addressing environmental impacts, and dealing with security and software issues. Specific challenges mentioned include utilizing spectrum efficiently using technologies like cognitive radio, reducing carbon emissions, and handling problems associated with software-defined networking.
This document provides a literature review on topological planning of heterogeneous mobile networks in dense areas. It discusses the need for heterogeneous networks using a mix of macro, pico, femtocell and relay base stations. The network architecture is presented, including different types of base stations and their characteristics. Challenges of network planning in dense areas are also addressed, such as mitigating interference between indoor base stations and outdoor macrocells. Pathloss models and different interference scenarios are reviewed to understand their impact on network capacity and coverage optimization.
The Ace of Smart City Construction. White Paper. WoMasterWoMaster
WoMaster's White Paper introduces a new sophisticated approach to Smart City System integration. Integrating wireless, Ethernet networks, and sensor network has never been easier with new industrial IP67 Smart City Box. The new communication system provides a complex solution for video surveillance in smart cities, GPS, alarm systems, LoRa communication, video analysis, etc.
Similar to Proposal For M Sc Project Networks And Distributed Systems (20)
The Ace of Smart City Construction. White Paper. WoMaster
Proposal For M Sc Project Networks And Distributed Systems
1. UNIVERSITY OF NAIROBI
An Empirical Study and
Simulation of Wireless
VoIP in Areas that are
Geographically Challenged
Network Performance and Distributed
Computing
Kenneth Odhiambo ‐ P58/70655/2008
Supervisor: Theuri
3/21/2010
Study Programme: Masters in Computer Science (MSc. CS)
This Document outlines my MSc. Dissertation Project Proposal, the purpose of which is to
propose a solution that will incorporate a people excluded from the cellular network as a
result of geographical challenges. The study will attempt to report the viability of Wireless
VoIP in geographically challenged areas, through an empirical study and simulation to
address areas related to performance in a wireless environment.
2. Table of Contents
Contents
1. Introduction ....................................................................................................................... 2
1.1. Problem description ....................................................................................................... 2
1.2. Objective.......................................................................................................................... 3
1.3. Importance of Study (to the MSc. CS) ............................................................................ 3
1.4. Scope of Study: ................................................................................................................ 4
2. Literature Review ............................................................................................................... 5
3. Methodology ....................................................................................................................... 7
4. Resources Required ............................................................................................................ 8
4.1. Software Components..................................................................................................... 8
4.2. Hardware Resources ...................................................................................................... 8
4.3. Other Resources .............................................................................................................. 8
5. Time Schedule..................................................................................................................... 9
6. Bibliography ..................................................................................................................... 10
1|Page CONTACT : 0733-999235;; kenodhiambo@zoho.com
3. 1. Introduction
The most prevalent and successful wireless technologies are all cellular. Cellular carriers are
scrambling to provide fast, efficient IP transport mechanisms across the various cellular
networks. But therein lies a lot of the problem. With wireless technology, challenges are
often about finding a line of sight — a clear path from the office or transmitter beaming out
the internet signal to the home or business receiving it. Thus, forested areas, mountainous
regions and remote villages will most certainly be overlooked by cellular carriers, given that
these kinds of terrain require several towers to be setup and this is simply not cost‐effective
for most cellular carriers. Cellular carriers thrive on high demand for voice services which
usually have a high cost of deployment.
Fixed wireless VoIP is cheaper to deploy and has much higher data capacity but the end‐user
device (usually a computer) is more expensive than a cellphone. These not withstanding,
wireless devices are experiencing a plummet in prices globally; this is also reflected in the
local market. A key point to note is that once connectivity has been brought to a reasonable
distance then it can be spread to the challenged area by setting up a Wi‐Fi VoIP mesh
network. Creating a local community wireless network can be done quickly using off‐the‐
shelf components. The real challenge is to build enough demand to make such a network
financially sustainable. The best way to do this is through telephony. A considerable latent
demand for person‐to‐person communication already exists, and phones are easy to use,
have low maintenance and support costs, and can support a wide range of voice based and
data services.
Therefore, this study will assess the use of wireless VoIP technologies for promoting
telecommunication development and applications in the geographically challenged areas.
1.1. Problem description
The country of Kenya boasts some 39 million people (as of the recent census – not yet
confirmed) living in an area spanning 582,650 sq km with the rift valley as one of the major
land marks, deserts to the north, forests and mountainous in the central and western part of
the country and a few islands in the Coastal and Nyanza provinces. With the country’s sheer
size, come the inevitable geographical challenges of deploying microwave technology
2|Page CONTACT : 0733-999235;; kenodhiambo@zoho.com
4. successfully. With microwave being the de facto connectivity method in Kenya, We are
forced to deal with the challenges that it brings such as susceptibility to a number of factors
that lead to signal degradation and eventually loss of that signal consequently we get a
communication breakdown. Some of these factors include signal attenuation over distance,
lack of line of sight (LoS), noise addition to the signal etc. Thus, Although Kenya has an
expansive microwave network, in certain areas communication is still a problem. The
microwave network is mainly used for voice communication, with data coming of age slowly.
Only 1 in 400 Kenyans have regular Internet access despite the plunging costs of connectivity,
yet Voice over IP (VoIP) has been touted as a significantly lower‐cost communication media.
With these in mind, we want to look at how communication can be delivered to
geographically challenged areas that cellular providers overlook while taking into
consideration challenges such as performance, quality of service, and resource optimization
of VoIP.
1.2. Objective
The main objective is to study and document ways of delivering wireless VoIP to
geographically challenged areas at lower costs while maintaining high performance,
Other objectives include
1. To determine the quality of service offered by wireless VoIP in geographically
challenged areas
2. Simulate a Wireless VoIP Network with focus on Reliability and suggest ways of
addressing the resultant problems
3. To report the finding of the study and simulations
1.3. Importance of Study (to the MSc. CS)
VoIP is a rapidly evolving technology that could possibly revolutionize the
telecommunication industry. When implemented on wireless data networks, VoIP could
prove to be instrumental in the convergence of existing fixed and cellular telephony
networks with the fast growing wired and wireless data networks. Capacity and Quality of
Service are two of the most important issues that need to be resolved before the
commercial deployment of wireless VoIP.
3|Page CONTACT : 0733-999235;; kenodhiambo@zoho.com
5. 1.4. Scope of Study:
The study focuses on the quality of VoIP in wireless networks with mobile devices both in lab
and live network environment setups by conducting a methodic performance analysis.
Likewise, our study will encompass the signaling performance required for VoIP applications.
We will evaluate VoIP quality and signaling performance in non challenged environment. The
Session initiation protocol (SIP) will be the selected protocol for use during experimentation.
The Study will be conducted in Nairobi area in the following selected areas;
Kileleshwa Estate – A highly vegetative area with new high‐rise buildings springing up.
Kiserean Region, ‐ A hilly suburb with sparsely populated settlements
Nairobi Dam – This area will represent regions with larges quantities of water bodies
Our study takes into consideration both the performance of the network and also the
performance of real embedded VoIP clients. In addition, we validate the results, by
comparing them to the actual performance in areas with clear lines of sight from the service
providers within the Nairobi Region. Based on the results, we analyze the primary
differences in performance between simulations found in the literature, our lab experiences
and a live network case study. Finally, we discuss possible features that can improve the
performance enough in current and future releases to support Wireless VoIP in
geographically challenged areas.
4|Page CONTACT : 0733-999235;; kenodhiambo@zoho.com
6. 2. Literature Review
An extensive research on the area under discussion will be reviewed, this will feature major
literatures on Wireless mesh networks, VoIP and the surrounding technologies Also best
practices and guidelines used in the networking projects are reviewed. Some of the
indicative literature review is given below:
1. Corinna “Elektra” Achele et al, Wireless Networking in the Developing World, first
Edition, Limehouse Book Sprint Team, 2006
This book looks at a practical introduction to radio physics with details on how a
wireless infrastructure can be built for very little cost compared to traditional wired
alternatives. Light is shed on where waves emanating from device are going, what
happens when they bounce off objects and how they can be used in the same area
without interfering with each other. It examines the intricacies of antennas and
transmission lines receiving signals and passing them to the receiver with minimum
amount of distortion for decoding.
2. Paul J. Fong et al, Configuring Voice over IP, Second edition, Syngress Publishing,
Inc. 800 Hingham Street Rockland, MA 02370, USA, 2002.
To truly add value to wireless VoIP, it is imperative that information relating to new
technologies is taken into account, with coverage of topics such as Session Initiation
Protocol (SIP) and Media Gateway Control Protocol (MGCP). VoIP networks are
required to interconnect in some manner with a traditional voice network, such as to
the public switched telephone network. An understanding of traditional voice‐
networking technology is also invaluable because the historic aspects of voice
networking provide an insight into why certain VoIP protocols are designed and
operate the way they do. After all, there would be no VoIP without traditional voice!
This book offers a review of the available QoS techniques, it also provides actual
configurations of ways to implement several techniques to maintain and improve
voice quality. Finally, this literature will provide guidance that is required to
understand, design, deploy, and maintain VoIP networks.
5|Page CONTACT : 0733-999235;; kenodhiambo@zoho.com
7. 3. Dr.Ghossoon M.Waleed Al‐Saadoon, “Asterisk Open Source to Implement Voice
over Internet Protocol”, IJCSNS International Journal of Computer Science and
Network Security, VOL.9 No.6, June 2009
This journal provides a procedural approach to building a VoIP network. In order to
be able to simulate a Wireless VoIP network, an understanding of the following will
be important:
1. Setup a server that provides VoIP using Asterisk.
2. Determine the advantages of using VoIP.
3. Check the difference of Asterisk over other type of VoIP server.
4. Study the differences between H.323 protocol and Session Initiation protocol (SIP).
4. The Easy Guide to Data and Voice Networking, Cisco Systems Ltd. The Square
Stockley Park Uxbridge Middlesex UB11 1BN
6|Page CONTACT : 0733-999235;; kenodhiambo@zoho.com
9. 4. Resources Required
4.1. Software Components
Asterisk – Free Open Source Tool
Open source software PBX system.
Asterisk gives us connectivity for both PSTN and VoIP networks.
Provides channels for communication on different hardware’s, protocols (SIP), and
codec’s.
Yate – Free Open Source Tool
Yate is an open source soft phone which can be used as VoIP client.
Yate provides many modules like ‘callgen’, and ‘message sniffer’ for measuring the
performance of the PBX server.
NS3 – Free Open Source Tool
To ensure the validity of the results and to extend the results in areas like node
mobility we will simulate an access point based wireless network using the Network
Simulator (NS2 or NS3). NS2 is a discrete event simulator meant for networking
research
4.2. Hardware Resources
Wireless IP Phones – Estimate Price: Kes 1000/=
Active analog Phone ‐ Estimate Price: Kes 1,000/=
GSM Smart Phones with Symbian OS Installed ‐ Estimate Price: Kes 15,000/=
Linksys SPA3102 – Gateway ‐ Estimate Price: Kes 8,000/=
Linksys ATA – Adapter ‐ Estimate Price: Kes 8,000/=
PC ‐ Estimate Price: Kes 10,000/=
4.3. Other Resources
Travel Expenses ‐ Estimate Price: Kes 10,000/=
Documentation – Estimate Price: Kes 5,000/=
Supervisory (72,000/=)
Total Budget expenditure: Estimate Price: Kes: 58,000/=
8|Page CONTACT : 0733-999235;; kenodhiambo@zoho.com
11. 6. Bibliography
i. Dr.Ghossoon M.Waleed Al‐Saadoon, “Asterisk Open Source to Implement Voice over
Internet Protocol”, IJCSNS International Journal of Computer Science and Network
Security, VOL.9 No.6, June 2009
ii. Paul J. Fong et al, Configuring Voice over IP, Second edition, Syngress Publishing, Inc.
800 Hingham Street Rockland, MA 02370, USA, 2002.
iii. Corinna “Elektra” Achele et al, Wireless Networking in the Developing World, first
Edition, Limehouse Book Sprint Team, 2006
iv. Steven M. Ross (The University of Memphis) and Gary R. Morrison (Wayne State
University), experimental research methods,
v. A. Al‐Naamany, H. Bourdoucen and W. Al‐Menthari, Modeling and Simulation of
Quality of Service in VoIP Wireless LAN, Journal of Computing and Information
Technology ‐ CIT 16, 2008, 2, Pages 131–142.
vi. WIKIPEDIA, Voice over IP. Article from Wikipedia, December 2009. (Available on:
http://en.wikipedia.org/wiki/VoIP ).
vii. R. Price, S. Manor, C. Bormann, T. Bremen, J. Christoffersson, H. Hannu, Z. Liu, and J.
Rosenberg, Signaling Compression (SigComp). RFC 3320, January 2003. [Online].
Available: http://www.rfc‐editor.org/rfc/rfc3320.txt
viii. Professor Aduda’s Lecture Notes on Research Methodologies
ix. T. J. Patel, V. A. Ogale and S. Baek, N. Cui, R. Park, Capacity Estimation of VOIP
Channels on Wireless Networks, WNCG, Dept of Electrical and Computer Engineering,
The University of Texas at Austin, Austin TX 78712
10 | P a g e CONTACT : 0733-999235;; kenodhiambo@zoho.com