Buffer and error management techniques in voice over IP

Ceylan, Serkan


Buffer Sharing on an OFDMA Downlink
GİRİCİ, TOLGA; Ozel, Omur; Uysal, Elif (2010-09-30)
In this work we consider the allocation of buffer space to data streams sharing a common high-speed wireless transmitter. As an example, we focus on an OFDMA-based downlink system scenario. Scheduling for maximum throughput has been extensively studied in the literature. However, the practically interesting case of a finite buffer has not been sufficiently addressed before. Especially in the case of overloaded packet queues, the choice of buffer management policy substantially affects the throughput perform...
Context-sensitive and keyword density-based supervised machine learning techniques for malicious webpage detection
Altay, Betul; Dokeroglu, Tansel; Coşar, Ahmet (2019-06-01)
Conventional malicious webpage detection methods use blacklists in order to decide whether a webpage is malicious or not. The blacklists are generally maintained by third-party organizations. However, keeping a list of all malicious Web sites and updating this list regularly is not an easy task for the frequently changing and rapidly growing number of webpages on the web. In this study, we propose a novel context-sensitive and keyword density-based method for the classification of webpages by using three su...
Window Based Fair Aggregator for the Scalable Support of QoS Guarantees in the Backbone: An Experimental Performance Study
Sanli, Mustafa; Pehlivanli, Aydin; Schmidt, Şenan Ece (2016-02-18)
Video and voice traffic currently have the biggest share in the Internet. These applications require end-to-end Quality of Service (QoS) guarantees for each flow. The packet schedulers in the routers play an important role in providing end-to-end QoS support in the Internet. It is important that the implementation of packet schedulers scale with the steady increase in the data rates and the number of flows. In our previous work we proposed Window Based Fair Aggregator (WBFA) to decrease the number of flows....
Memory organization in pipelined hierarchical search structures for packet classification
Rumelili, Çağla Irmak; Bazlamaçcı, Cüneyt Fehmi; Erdem, Oğuzhan; Department of Electrical and Electronics Engineering (2013)
Packet classification is a main requirement in routers to manage network security and traffi c. In high speed networks packet classification in line rates has become a major challenge. Our design mainly benefits from a parallel pipelined architecture implemented on field programmable gate arrays (FPGA) to achieve high speed packet processing. The presented solution is based on Hierarchical Hybrid Search Structure (HHSS) [5]. Our work solves the deep pipeline problem of HHSS in a memory e fficient way. This ...
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256
Calik, Cagdas; Turan, Meltem Sonmez (2010-08-11)
Hamsi is one of the second round candidates of the SHA-3 competition In this study, we present non-random differential properties for the compression function of Hamsi-256 Based on these properties, we first demonstrate a distinguishing attack that requires a few evaluations of the compression function Then, we present a message recovery attack with a complexity of 210 48 compression function evaluations Also, we present a pseudo-preimage attack for the compression function with complexity 2(254 25)
Citation Formats
S. Ceylan, “Buffer and error management techniques in voice over IP,” M.S. - Master of Science, Middle East Technical University, 2002.