SearchSkip to Search Results
- 32MacGregor, Mike (Supervisor)
- 2Mir, Shahnawaz (Supervisor)
- 1Afzal, Muhammad Idrees
- 1Baweja, Amardeep Singh
- 1Bhansali, Ritika
- 1Bhat, Shriya
- 4Internet telephony
- 3Quality of service (Computer networks)
- 3Routing protocols (Computer network protocols)
- 3Voice over IP networks
- 2Long-Term Evolution (Telecommunications)
- 2Routers (Computer networks)
Wireless sensors network is a type of the Ad-hoc network. It is comprised of many sensors, interlinked with each other for performing the same function collectively such as monitoring the weather conditions, temperature, different kind of vibrations, sound etc. Any distributed system requires...
With the enormous growth of the IP network, network security has become one of the important issues facing corporations today. It is important that a business is able to protect the private data of its customers and business strategies from unauthorized access. Failure to do this can greatly...
In the past, the target audience of traditional advertising (such as newspapers, magazines, and billboards) has not incurred costs associated with the ads. This is not necessarily the case when it comes to online advertising. Presumably, online ads increase the total size of webpages that are...
These days, technology has advanced and facilitates networking. With data demand rising exponentially over the networks, security is a rising concern. The data over a network is highly vulnerable to risks of both intentional attacks and unintentional events. IPv6 was designed with security in...
Long-term evolution (LTE) networks are expanding worldwide due to their capability to provide high data rates to fulfill the growing data needs of mobile subscribers. RF spectrum is limited but its underutilization means that more subscribers can be accommodated in the LTE network. The technology...
In this technological world, data leakage poses a severe threat to every organization as well as to individuals. Every day, a new data leak or a data breach is happening, and the number of data leaks is increasing continuously, resulting in the rise in the cost of handling a data leak. Whether...
Cybersecurity is the process or state of protecting programs, networks, and systems from any cyber-attack. These cyber-attacks are usually aimed at changing, accessing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. In an enterprise,...
Voice application in a packet switched network, Voice over IP is rapidly becoming popular. Besides valuable service for users, its sensitivity for loss, latency and jitter brings network technologists’ attention into it and they came up with the idea of implementing QoS on VoIP network as...
Currently, outdoor localization can be done using a GPS device which obtains positions from satellites. However GPS signals are not available in indoor environments. We can precisely measure signal levels on the devices in a wireless sensor network (WSN). Various room conditions and...
The project scope, Analysis of Voice Over IP deployments in Multi-site MPLS VPN Environments, included a broad range of networking concepts and technologies from MPLS, L3 MPLS VPN, hub-and-spoke VPN to OSPF and BGP while diving deep into VoIP call emulation, data transfers using IXIA IxChariot...