Show simple item record

dc.contributor.authorRadmand, Pedram
dc.contributor.authorSingh, Jaipal
dc.contributor.authorDomingo, M.
dc.contributor.authorArnedo, J.
dc.contributor.authorTalevski, Alex
dc.contributor.editorGabriele Kotsis
dc.contributor.editorDavid Taniar
dc.contributor.editorEric Pardede
dc.contributor.editorImad Saleh
dc.contributor.editorIsmail Khalil
dc.date.accessioned2017-01-30T13:58:22Z
dc.date.available2017-01-30T13:58:22Z
dc.date.created2011-03-14T20:01:39Z
dc.date.issued2010
dc.identifier.citationRadmand, Pedram and Singh, Jaipal and Domingo, Marc and Arnedo, Joan and Talevski, Alex. 2010. VoIP: making secure calls and maintaining high call quality, in Kotsis, G. and Taniar, D. and Pardede, E. and Saleh, I. and Khalil, I. (ed), 8th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2010), Nov 8 2010, pp. 56-62. Paris, France: Association for Computing Machinery (ACM).
dc.identifier.urihttp://hdl.handle.net/20.500.11937/36905
dc.identifier.doi10.1145/1971519.1971532
dc.description.abstract

Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no security and just the use of IP firewalls in Local and Wide Area Networks (LAN and WAN). The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used. The implementation of any encryption algorithm in low bandwidth environments degrades the voice quality due to increased loss packets and packet latency, but as bandwidth increases encrypted VoIP calls provided better service compared to an unsecured environment.

dc.publisherACM
dc.titleVoIP: making secure calls and maintaining high call quality
dc.typeConference Paper
dcterms.source.startPage56
dcterms.source.endPage62
dcterms.source.titleProceedings of the 8th international conference on advances in mobile computing & multimedia (MoMM2010)
dcterms.source.seriesProceedings of the 8th international conference on advances in mobile computing & multimedia (MoMM2010)
dcterms.source.isbn9783854032731
dcterms.source.conference8th International Conference on Advances in Mobile Computing & Multimedia (MoMM2010)
dcterms.source.conference-start-dateNov 8 2010
dcterms.source.conferencelocationParis, France
dcterms.source.placeFrance
curtin.note

© ACM, 2010. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the 8th International Conference on Advances in Mobile Computing & Multimedia, ISBN: 978-1-4503-0440-5, MoMM 2010. http;//dx.doi.org/10.1145/1971519.1971532

curtin.departmentDigital Ecosystems and Business Intelligence Institute (DEBII)
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record