Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (9)

Search Parameters:
Keywords = IP telephony

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
34 pages, 15255 KB  
Article
An Experimental Tethered UAV-Based Communication System with Continuous Power Supply
by Veronica Rodriguez, Christian Tipantuña, Diego Reinoso, Jorge Carvajal-Rodriguez, Carlos Egas Acosta, Pablo Proaño and Xavier Hesselbach
Future Internet 2025, 17(7), 273; https://doi.org/10.3390/fi17070273 - 20 Jun 2025
Viewed by 1063
Abstract
Ensuring reliable communication in remote or disaster-affected areas is a technical challenge due to unplanned deployment and mobilization, meaning placement difficulties and high operation costs of conventional telecommunications infrastructures. To address this problem, unmanned aerial vehicles (UAVs) have emerged as an excellent alternative [...] Read more.
Ensuring reliable communication in remote or disaster-affected areas is a technical challenge due to unplanned deployment and mobilization, meaning placement difficulties and high operation costs of conventional telecommunications infrastructures. To address this problem, unmanned aerial vehicles (UAVs) have emerged as an excellent alternative to provide quick connectivity in remote or disaster-affected regions at a reasonable cost. However, the limited battery autonomy of UAVs restricts their flight service time. This paper proposes a communication system based on a tethered UAV (T-UAV) capable of continuous operation through a wired power network connected to a ground station. The communications system is based on low-cost devices, such as Raspberry Pi platforms, and offers wireless IP telephony services, providing high-quality and reliable communication. Experimental tests assessed power consumption, UAV stability, and data transmission performance. Our results prove that the T-UAV, based on a quadcopter drone, operates stably at 16 V and 20 A, ensuring consistent VoIP communications at a height of 10 m with low latency. These experimental findings underscore the potential of T-UAVs as cost-effective alternatives for extending or providing communication networks in remote regions, emergency scenarios, or underserved areas. Full article
Show Figures

Figure 1

18 pages, 14493 KB  
Article
The Development of a Secure Internet Protocol (IP) Network Based on Asterisk Private Branch Exchange (PBX)
by Mubarak Yakubova, Olga Manankova, Assel Mukasheva, Alimzhan Baikenov and Tansaule Serikov
Appl. Sci. 2023, 13(19), 10712; https://doi.org/10.3390/app131910712 - 26 Sep 2023
Cited by 3 | Viewed by 2481
Abstract
The research problem described in this article is related to the security of an IP network that is set up between two cities using hosting. The network is used for transmitting telephone traffic between servers located in Germany and the Netherlands. The concern [...] Read more.
The research problem described in this article is related to the security of an IP network that is set up between two cities using hosting. The network is used for transmitting telephone traffic between servers located in Germany and the Netherlands. The concern is that with the increasing adoption of IP telephony worldwide, the network might be vulnerable to hacking and unauthorized access, posing a threat to the privacy and security of the transmitted information. This article proposes a solution to address the security concerns of the IP network. After conducting an experiment and establishing a connection between the two servers using the WireShark sniffer, a dump of real traffic between the servers was obtained. Upon analysis, a vulnerability in the network was identified, which could potentially be exploited by malicious actors. To enhance the security of the network, this article suggests the implementation of the Transport Layer Security (TLS) protocol. TLS is a cryptographic protocol that provides secure communication over a computer network, ensuring data confidentiality and integrity during transmission. Integrating TLS into the network infrastructure, will protect the telephone traffic and prevent unauthorized access and eavesdropping. Full article
(This article belongs to the Special Issue Artificial Intelligence and Robotics in Healthcare)
Show Figures

Figure 1

28 pages, 1391 KB  
Article
A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M
by Luis F. Gonzalez, Ivan Vidal, Francisco Valera, Raul Martin and Dulce Artalejo
Future Internet 2023, 15(8), 274; https://doi.org/10.3390/fi15080274 - 17 Aug 2023
Cited by 5 | Viewed by 2824
Abstract
Microservices have become promising candidates for the deployment of network and vertical functions in the fifth generation of mobile networks. However, microservice platforms like Kubernetes use a flat networking approach towards the connectivity of virtualised workloads, which prevents the deployment of network functions [...] Read more.
Microservices have become promising candidates for the deployment of network and vertical functions in the fifth generation of mobile networks. However, microservice platforms like Kubernetes use a flat networking approach towards the connectivity of virtualised workloads, which prevents the deployment of network functions on isolated network segments (for example, the components of an IP Telephony system or a content distribution network). This paper presents L2S-M, a solution that enables the connectivity of Kubernetes microservices over isolated link-layer virtual networks, regardless of the compute nodes where workloads are actually deployed. L2S-M uses software-defined networking (SDN) to fulfil this purpose. Furthermore, the L2S-M design is flexible to support the connectivity of Kubernetes workloads across different Kubernetes clusters. We validate the functional behaviour of our solution in a moderately complex Smart Campus scenario, where L2S-M is used to deploy a content distribution network, showing its potential for the deployment of network services in distributed and heterogeneous environments. Full article
Show Figures

Figure 1

16 pages, 1658 KB  
Article
Detecting SPIT Attacks in VoIP Networks Using Convolutional Autoencoders: A Deep Learning Approach
by Waleed Nazih, Khaled Alnowaiser, Esraa Eldesouky and Osama Youssef Atallah
Appl. Sci. 2023, 13(12), 6974; https://doi.org/10.3390/app13126974 - 9 Jun 2023
Cited by 2 | Viewed by 3107
Abstract
Voice over Internet Protocol (VoIP) is a technology that enables voice communication to be transmitted over the Internet, transforming communication in both personal and business contexts by offering several benefits such as cost savings and integration with other communication systems. However, VoIP attacks [...] Read more.
Voice over Internet Protocol (VoIP) is a technology that enables voice communication to be transmitted over the Internet, transforming communication in both personal and business contexts by offering several benefits such as cost savings and integration with other communication systems. However, VoIP attacks are a growing concern for organizations that rely on this technology for communication. Spam over Internet Telephony (SPIT) is a type of VoIP attack that involves unwanted calls or messages, which can be both annoying and pose security risks to users. Detecting SPIT can be challenging since it is often delivered from anonymous VoIP accounts or spoofed phone numbers. This paper suggests an anomaly detection model that utilizes a deep convolutional autoencoder to identify SPIT attacks. The model is trained on a dataset of normal traffic and then encodes new traffic into a lower-dimensional latent representation. If the network traffic varies significantly from the encoded normal traffic, the model flags it as anomalous. Additionally, the model was tested on two datasets and achieved F1 scores of 99.32% and 99.56%. Furthermore, the proposed model was compared to several traditional anomaly detection approaches and it outperformed them on both datasets. Full article
Show Figures

Figure 1

12 pages, 971 KB  
Article
Session Initiation Protocol Proxy in a Role of a Quality of Service Control Application in Software-Defined Networks
by Dalibor Zeman, Filip Rezac, Miroslav Voznak and Jan Rozhon
Designs 2022, 6(6), 123; https://doi.org/10.3390/designs6060123 - 4 Dec 2022
Viewed by 1904
Abstract
This article deals with quality of service (QoS) in internet protocol (IP) telephony by applying software-defined networking (SDN) tools. The authors develop a new design that deterministically classifies real-time protocol (RTP) streams based on data found in session initiation protocol (SIP) using SIP [...] Read more.
This article deals with quality of service (QoS) in internet protocol (IP) telephony by applying software-defined networking (SDN) tools. The authors develop a new design that deterministically classifies real-time protocol (RTP) streams based on data found in session initiation protocol (SIP) using SIP proxy as a mediator, and the concept making this possible is called SDN. Compared to traditional networks, SDN allows us to approach network configuration differently. SDN networks are programmable through software applications running on top of the SDN controller. One of the technologies that might benefit from this concept is IP telephony, which often needs an additional priority management configuration to ensure consistent quality of its real-time media exchange. Typically, a session protocol for real-time communications is SIP, and as such, its infrastructure may be used to classify the traffic in question and take advantage of the centralized approach of SDN networks to distribute the class information across the switching devices. Different approaches and possible applications are discussed in the conclusion. The contribution of this paper lies in the proposal of SDN-based QoS mechanisms. The entire design of the concept was implemented and validated in a laboratory environment. The results clearly demonstrate the efficiency of the proposed approach. Full article
Show Figures

Figure 1

12 pages, 5413 KB  
Article
Using the Discord Application to Facilitate EFL Vocabulary Acquisition
by Maria Alexandrovna Odinokaya, Elena Alexandrovna Krylova, Anna Vladimirovna Rubtsova and Nadezhda Ivanovna Almazova
Educ. Sci. 2021, 11(9), 470; https://doi.org/10.3390/educsci11090470 - 27 Aug 2021
Cited by 17 | Viewed by 8839
Abstract
Vocabulary knowledge is a prerequisite for mastering any foreign language. It takes a lot of time and effort to develop English as a foreign language (EFL) vocabulary skills. Efficient ways to facilitate this process should be studied and analyzed. The present study aimed [...] Read more.
Vocabulary knowledge is a prerequisite for mastering any foreign language. It takes a lot of time and effort to develop English as a foreign language (EFL) vocabulary skills. Efficient ways to facilitate this process should be studied and analyzed. The present study aimed to investigate the role of the Discord application in teaching and learning EFL vocabulary. Discord is a free messenger with support for IP telephony and video conferencing, as well as the possibility to create public and private chats for exchanging text and voice messages. The study relied on pre-test and post-test design to get the necessary data of one experimental and one control group, 80 university students altogether. The results of the pre-test showed no significant difference between the two groups. The experimental group was taught with the help of the Discord application, while the control group was dealing with the traditional educational process, that is, 180 min every week in a classroom with a textbook and no electronic educational resources. Results of the t-test indicated that the experimental group significantly outperformed the control group on a researcher-made vocabulary post-test. A post-treatment speaking test was administered—the participants took part in speaking interviews where they were asked to give a short speech on one of the topics studied during the experimental training. The representatives of the experimental group managed to use more vocabulary items per person correctly (pronunciation, lexical combinability, etc.). The findings revealed that the suggested way of using the Discord application may positively influence the acquisition of EFL vocabulary and its further application in speaking. Hence, it is recommended that the Discord application be used as a tool in the EFL vocabulary teaching and learning process to reinforce in-class tasks and activities. Full article
(This article belongs to the Section Higher Education)
Show Figures

Figure 1

9 pages, 5895 KB  
Article
Experimental Transmission of Digital Data Coded on Electrical Carriers at 2.1 GHz and 4.2 GHz by Using a Microwave Photonic Filter
by Ana Gabriela Correa-Mena, Alicia Vera-Marquina, Alejandro García-Juárez, Jorge Rodríguez-Asomoza and Ignacio Enrique Zaldívar-Huerta
Electronics 2020, 9(5), 833; https://doi.org/10.3390/electronics9050833 - 18 May 2020
Cited by 1 | Viewed by 2829
Abstract
This paper proposes and demonstrates the use of filtered microwave band-pass windows situated at 2.1 GHz and 4.2 GHz as electrical carriers to transmit digital signals. The use of an appropriate microwave photonic filter (MPF) allows for the generation of the microwave band-pass [...] Read more.
This paper proposes and demonstrates the use of filtered microwave band-pass windows situated at 2.1 GHz and 4.2 GHz as electrical carriers to transmit digital signals. The use of an appropriate microwave photonic filter (MPF) allows for the generation of the microwave band-pass windows. The key parameters of the filtering effect are the intermodal separation of a multimode laser diode (MLD), the chromatic dispersion parameter of the optical link, and its own length. Experimentally, it is demonstrated that the filtered band-pass windows can be used as electrical carriers to transmit digital signals at frequencies of 50 MHz, 100 MHz, and 150 MHz over 25.31 km of single-mode-standard-fiber (SM-SF). The quality Q-factor, jitter, and bit-error-rate are the parameters that allow for the evaluation of the quality of the digital signal transmission. The obtained results allow for the proposition of this photonic architecture in a passive optical network (PON) to distribute services like Internet Protocol (IP) telephony, internet, streaming video, and high definition television. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

19 pages, 2747 KB  
Article
A Distributed NFV-Enabled Edge Cloud Architecture for ICN-Based Disaster Management Services
by Van-Ca Nguyen, Ngoc-Thanh Dinh and Younghan Kim
Sensors 2018, 18(12), 4136; https://doi.org/10.3390/s18124136 - 26 Nov 2018
Cited by 4 | Viewed by 5085
Abstract
In disaster management services, the dynamic binding between roles and individuals for creating response teams across multiple organizations to act during a disaster recovery time period is an important task. Existing studies have shown that IP-based or traditional telephony solutions are not well-suited [...] Read more.
In disaster management services, the dynamic binding between roles and individuals for creating response teams across multiple organizations to act during a disaster recovery time period is an important task. Existing studies have shown that IP-based or traditional telephony solutions are not well-suited to deal with such group communication. Research has also shown the advantages of leveraging information centric networking (ICN) in providing essential communication in disaster management services. However, present studies use a centralized networking architecture for disaster management, in which disaster information is gathered and processed at a centralized management center before incident responses are made and warning messages are sent out. The centralized design can be inefficient in terms of scalability and communication. The reason is that when the network is very large (i.e., country level), the management for disaster services becomes very complicated, with a large number of organizations and offices. Disaster data are required to be transmitted over a long path before reaching the central management center. As a result, the transmission overhead and delay are high. Especially when the network is fragmented and network connectivity from a disaster-affected region to the central management center is disconnected, the service may be corrupted. In this paper, we designed and implemented a distributed edge cloud architecture based on ICN and network function virtualization (NFV) to address the above issues. In the proposed architecture, disaster management functions with predefined disaster templates were implemented at edge clouds closed to local regions to reduce the communication overhead and increase the service availability. The real implementation and performance evaluation showed that the proposed architecture achieves a significant improvement in terms of average bandwidth utilization, disaster notification delivery latency, routing convergence time, and successful request ratio compared to the existing approaches. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

16 pages, 1334 KB  
Article
Adaptable and Automated Small UAV Deployments via Virtualization
by Borja Nogales, Victor Sanchez-Aguero, Ivan Vidal and Francisco Valera
Sensors 2018, 18(12), 4116; https://doi.org/10.3390/s18124116 - 23 Nov 2018
Cited by 33 | Viewed by 5070
Abstract
In this paper, we present a practical solution to support the adaptable and automated deployment of applications of Small Unmanned Aerial Vehicles (SUAVs). Our solution is based on virtualization technologies, and considers SUAVs as programmable network platforms capable of executing virtual functions and [...] Read more.
In this paper, we present a practical solution to support the adaptable and automated deployment of applications of Small Unmanned Aerial Vehicles (SUAVs). Our solution is based on virtualization technologies, and considers SUAVs as programmable network platforms capable of executing virtual functions and services, which may be dynamically selected according to the requirements specified by the operator of the aerial vehicles. This way, SUAVs can be flexibly and rapidly adapted to different missions with heterogeneous objectives. The design of our solution is based on Network Function Virtualization (NFV) technologies, developed under the umbrella of the fifth generation of mobile networks (5G), as well as on existing Internet protocol standards, including flying ad hoc network routing protocols. We implemented a functional prototype of our solution using well-known open source technologies, and we demonstrated its practical feasibility with the execution of an IP telephony service. This service was implemented as a set of virtualized network functions, which were automatically deployed and interconnected over an infrastructure of SUAVs, being the telephony service tested with real voice-over-IP terminals. Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicle Networks, Systems and Applications)
Show Figures

Figure 1

Back to TopTop