{"title":"基于隧道技术的VoIP网络性能评价","authors":"Dumitru-Lucian Murariu, Petrica Ciotirnae","doi":"10.1109/ECAI46879.2019.9042008","DOIUrl":null,"url":null,"abstract":"The solution of distributing data between multiple sites over public networks is a solution that most companies value more and more. This strategy is justified by its multiple advantages, particularly in terms of data availability. However, the intermediary network through which these operations are carried out is often the Internet. No one can deny that this network does not provide any mechanism of privacy, integrity, or authentication. The purpose of this paper is to analyze the key performance indicators (KPI) of a Voice over IP network that crosses a public network using VPN (Virtual Private Network) technology.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Performance Evaluation of the VoIP Networks Using Tunneling Techniques\",\"authors\":\"Dumitru-Lucian Murariu, Petrica Ciotirnae\",\"doi\":\"10.1109/ECAI46879.2019.9042008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The solution of distributing data between multiple sites over public networks is a solution that most companies value more and more. This strategy is justified by its multiple advantages, particularly in terms of data availability. However, the intermediary network through which these operations are carried out is often the Internet. No one can deny that this network does not provide any mechanism of privacy, integrity, or authentication. The purpose of this paper is to analyze the key performance indicators (KPI) of a Voice over IP network that crosses a public network using VPN (Virtual Private Network) technology.\",\"PeriodicalId\":285780,\"journal\":{\"name\":\"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECAI46879.2019.9042008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECAI46879.2019.9042008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Evaluation of the VoIP Networks Using Tunneling Techniques
The solution of distributing data between multiple sites over public networks is a solution that most companies value more and more. This strategy is justified by its multiple advantages, particularly in terms of data availability. However, the intermediary network through which these operations are carried out is often the Internet. No one can deny that this network does not provide any mechanism of privacy, integrity, or authentication. The purpose of this paper is to analyze the key performance indicators (KPI) of a Voice over IP network that crosses a public network using VPN (Virtual Private Network) technology.