StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Solutions to Performance Problems in VoIP over a Wireless LAN - Annotated Bibliography Example

Cite this document
Summary
This bibliography "Solutions to Performance Problems in VoIP over a Wireless LAN" discusses simulation and analysis of packet loss in user datagram protocol transfers. The bibliography considers static analysis of executables to detect malicious patterns…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful

Extract of sample "Solutions to Performance Problems in VoIP over a Wireless LAN"

ASSIGNMENT SUBMISSION Due date: Thursday Week 10 (11:45 PM AEST) Part: Written Assessment Weighting: 30% of total assessment. Submission: Individual - Electronic (see course website for details) Instructions It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words! Please complete your assignment using this submission template file, inserting your responses where indicated. DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers. Please fill in the following details: Student Name Student Number Week 1 Task One aspect of week one was data compression.  Although data compression techniques are widely used, there are several issues reported with audio compression particularly when these techniques are used for voice over IP (VOIP).  Collect and summarise two resources that explain the specific technologies such as VOIP and audio data compression. Resource 1 Solutions to performance problems in VoIP over a 802.11 wireless LAN Wang, W., Liew, S.C. and Li, V.O., 2005. Solutions to performance problems in VoIP over a 802.11 wireless LAN. Vehicular Technology, IEEE Transactions on, 54(1), pp.366-384. Available: http://hub.hku.hk/bitstream/10722/42708/1/105029.pdf?accept=1 [Accessed 24/01/2016]. Summary: Scholars agree that Voice over Internet Protocol (VOIP) is poised to be an integral part of Internet application. In particular, the authors assess the topic from the perspective of solutions with regard to performance problems. The resource provides in-depth analysis of advanced voice-compression techniques as well as bandwidth sharing when it comes to packet-switched networks. The literatures reviewed (related work search) by the authors indicate that VOIP can significantly enhance the efficiency of a given bandwidth. The interpretation of this view is that the authors attempted to compare earlier methods such as voice over traditional telephone networks and concluded that VOIP enhances the creation of new services. In interesting point to note is the analysis the authors give regarding VOIP and Pulse-Code Modulation (PCM) voice. They note that with VOIP, it is practical to encode and compress PCM voice signals into a low rate packet streams using codecs. Resource 2 Title and Reference: Challenges of voice-over-IP-over-wireless Eriksson, G.A., Olin, B., Svanbro, K. and Turina, D., 2000. Challenges of voice-over-IP-over-wireless. ERICSSON REV(ENGL ED), 77(1), pp.20-31. Available: http://www.recursosvoip.com/docs/english/2000013.pdf [Accessed 23/01/2016]. Summary: Some of the contested issues with regard to VOIP have been its challenges over wireless. These authors succinctly assess this issue by concentrating their data analysis on challenges of voice over IP over wireless. The main challenge their data reveal is that there is concern in designing radio-access bearers and this has been necessitated by the fact that it is not easy to find suitable implementation points when once concentrates on radio-access bearers for VOIP. Secondly, resource gathered data on header compression for real-time IP. While there are different conclusion that were made, the most captivating part is that the larger headers of a given protocol if used when voice data is communicated or sent over the Internet then it consist of a major problem when it comes to VOIP over wireless. This resource is therefore relevant in understanding the need to design technologies that integrate VOIP and compressions. Week 2 Task When we think about operating systems, we tend to focus on desktop operating systems like Windows, Linux and OS X.  In recent years, the emergence of tablets and smart phones has led to advances in the operating systems that run these devices.  Collect and summarise two resources detailing the role of mobile operating systems. Resource 1 Title and Reference: Operating systems for mobile computing Hall, S.P. and Anderson, E., 2009. Operating systems for mobile computing. Journal of Computing Sciences in Colleges, 25(2), pp.64-71. Available: http://anibal.gyte.edu.tr/hebe/AblDrive/69276048/w/Storage/104_2011_1_601_69276048/Downloads/m41.pdf [Accessed 24/01/2016]. Summary: Studies have now shifted attention to the need to understand the roles of specialised operating systems to host mobile computers. These scholars addressed this issue under the topic “Operating System for Mobile Computing”: to understand the deviating roles of mobile OS from the OS operating desktops. Taking a case study on the iPhone that was unveiled by Apple the authors see mobile OS as open sourced model that can allow application developer to integrate or write applications. The resource explains that with mobile OS, Google can be able to embed or include their own search sites into the OS just like the case of Internet Explorer on Windows thus introducing to the market mobile phone OS that directly links clients to internet. Additionally, the OS are written in Java language making it possible for additional applications. Resource 2 Title and Reference: Structuring the smartphone industry: is the mobile internet OS platform the key? Kenney, M. and Pon, B., 2011. Structuring the smartphone industry: is the mobile internet OS platform the key?. Journal of Industry, Competition and Trade, 11(3), pp.239-261. Available: http://link.springer.com/article/10.1007/s10842-011-0105-6/fulltext.html [Accessed 24/01/2016]. Summary: In the wake of new technologies in mobile phones there is need to assess whether their OS is the key to problems that have affected other OSs. The cornerstone of their argument is that without the introduction of mobile OS and redefinition of the smartphone products by Apple, it will be difficult to understand the roles played by mobile OS. It therefore means that with the convergence of Internet services, mobile telephony and individual computing, the authors see mobile OS as the facilitator of these features. Importantly though, the resource notes that Google has been taking different approach from Apple in the design of their mobile OS. From this perspective they argue that the OS serves the purpose of promoting Android as an open platform. Consequently the OS helps in enhancing services such as maps and emails and search adverts that are delivered from the cloud. Week 3 Task The 'last mile' is considered the speed bottleneck because of limited bandwidth that restricts data transfer from the telephone exchange to the customer premises.  Australian government is currently addressing this problem by rolling out National Broadband Network (NBN).  Collect and summarise two resources detailing how higher data transfer rates can be achieved in the last mile. Resource 1 Title and Reference: Last mile by laser Acampora, A., 2002. Last mile by laser. Scientific American, 287(1), pp.32-7. Available: www.mems.ece.ufl.edu/courses/spring2003/project1/lastmile.doc [Accessed 23/01/2016]. Summary: Evidence of research on the relationship between speed of data transfer and telephone exchange is myriad. However, different approach has been given by Acampora (2002) arguing that short range infrared lasers have the potential of increasing the rate of data transfer in the last mile. Discrediting previous researches that indicated that coaxial cables and copper wires had the potential of increasing the rate, his data analysis indicated that with short-range infrared lasers users will be assured the needed gigabit-per-second capacity needed to attain advanced bandwidth-intensive applications and services. The authors also finds that bridging the last mile will only be possible if short range infrared lasers are designed to complement free-space optics. In case of digital information that comes in form of the 1’s and 0’s (electronic signals) it is prudent to send them through a window or roof mounted infrared laser diode transmitter. Resource 2 Title and Reference: Dynamic bandwidth allocation algorithm for multimedia services over Ethernet PONs Choi, S.I. and Huh, J.D., 2002. Dynamic bandwidth allocation algorithm for multimedia services over Ethernet PONs. ETRI journal, 24(6), pp.465-468. Available: http://etrij.etri.re.kr/etrij/journal/getPublishedPaperFile.do?fileId=SPF-1045893321174 [Accessed 23/01/2016]. Summary: This resource has been chosen for its connectedness with bandwidth data delivered to customers and communication networks. In order to help readers understand how strategies of higher data transfer rates can be enhanced the authors note that last mile has been the most challenging part of telecommunication to upgrade to new technology. However, they recommend that to enhance data transfer rates one should improve their services over the last miles. Citing telephony companies across Asia and Europe the resource notes the need to mix networks (good example being fixed wireless access). The interpretation of ‘mixing’ is that companies should be able to use wireless instead of wires when connecting wireline network and a stationary terminal. Additionally, the study has proposed other measures that are relevant when it comes to the rate of transfer. For instance, it notes about the significance of broadband over power lines or applications such as WiMAX. Week 4 Task The text chapter for week four mentions Transport layer protocols such as TCP.  Collect and summarise two resources that discuss other Transport layer protocols.  The resources must not be about the same protocol. Resource 1 Title and Reference: An experimental evaluation of voice quality over the Datagram Congestion Control Protocol Balan, H.V., Eggert, L., Niccolini, S. and Brunner, M., 2007, May. An experimental evaluation of voice quality over the Datagram Congestion Control Protocol. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE (pp. 2009-2017). IEEE. Available: https://www.researchgate.net/profile/Lars_Eggert/publication/221244118_An_Experimental_Evaluation_of_Voice_Quality_Over_the_Datagram_Congestion_Control_Protocol/links/00b7d51a4bdc33202e000000.pdf [Accessed 23/01/2016]. Summary: With the continued adoption of TCP as the most preferred transport layer protocols, studies have continued to assess the effectiveness of other transport layer protocols. This study has been picked as it assesses the effectiveness of other protocols with regard to TCP. In particular, it reviews Datagram Congestion Control Protocol (DCCP) to understand how its usage in the carriage of VOIP traffic can rival other protocols. In order to understand the whether DCCP can be designed to carry media traffic and the related congestion controlled, the authors critically evaluated the quality of the voice that Internet telephony calls can sustain when there is prototype implementations of different DCCP variants. In much as the thesis statement of the research was to establish if DCCP could perform better than other protocols, data analysis have shown that when DCCP is compared with other protocols (like UDP and TCP) they perform less effective. Resource 2 Title and Reference: Simulation and analysis of packet loss in user datagram protocol transfers Markovski, V., Xue, F. and Trajković, L., 2001. Simulation and analysis of packet loss in user datagram protocol transfers. The Journal of Supercomputing, 20(2), pp.175-196. Available: http://www2.ensc.sfu.ca/people/faculty/ljilja/ENSC833/Assignments/papers/kluwer.pdf [Accessed 23/01/2016]. Summary: Other than DCCP, resource reviews User Datagram Protocol (UDP) and its effectiveness in telephony as transport layer protocols. Covering simulation and analysis of packet loss taking place in video transfers when engineers use UDP, the study noted that if there is need to attain the required quality of service in multimedia transfer then an understanding of packet loss patterns in IP networks is essential. The resource considers UDP as an integral part of transport layer protocols and uses it to assess the loss of packet in a video transfer over what it terms as ‘UDP with ns-2’ simulations as directed by genuine video traffic. The study however, does not provide link between UDP as transport layer protocols and its effectiveness with video transfer. For instance, the results merely indicate that packet loss could burst and that continuous packet losses tremendously contribute to the general packet loss without giving connectedness with previous studies. Week 5 Task New and novel forms of malware are released daily.  Collect and summarise two resources that discuss how antivirus/anti-malware software handle these newly released viruses/malware.  The resources must not be about the same software. Resource 1 Title and Reference: Static analysis of executables to detect malicious patterns Christodorescu, M. and Jha, S., 2006. Static analysis of executables to detect malicious patterns. WISCONSIN UNIV-MADISON DEPT OF COMPUTER SCIENCES. Available: http://www.dtic.mil/dtic/tr/fulltext/u2/a449067.pdf [Accessed 23/01/2016]. Summary: Arguing from the topic ‘Static analysis of executables to detect malicious patterns’ the author details how Norton as antivirus software detects and handles newly released viruses and malwares. According to the authors, the functional platform of Norton is to detect malicious codes and categorise them as threat. According to case studies taken on three companies the research studied, Norton is designed by group of engineers to detect emergence of new malwares and viruses. However, to curb emerging malwares/viruses, malicious code writers simply attempt to obfuscate the code considered malicious so as to in an attempt to subvert code detectors (Norton or engineers working for Norton). However, Norton will respond by designing newer architectures that detect malicious patterns that are resistant to basic obfuscation transformations. The authors further note that the malicious code will be categorised according to its propagation to help users take necessary actions. Resource 2 Title and Reference: Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases Nachenberg, C.S., Symantec Corporation, 2002. Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases. U.S. Patent 6,357,008. Available: https://www.google.com/patents/US6357008 [Accessed 23/01/2016]. Summary: Software developers have enhanced the functionalities of software by incorporating dynamic heuristic methods that detect computer viruses and malwares using evaluation phases and decryption exploration. Taking a case study on Kaspersky as one of the widely used antivirus and antimalware software, the authors argue that the software deals with emergence of new malwares and virus through exploring and evaluation process. Beginning with exploration, engineers have designed the software to copy or emulate at least once every part of a given code within sector suspected to be having malware or virus. For evaluation process to detect and deal with newly released malware and or virus, the software has pre-programmed architecture that analyse any suspicious behaviors that the computer might have detected during the process of exploration and decryption phases to estimate so that it can evaluate if the target is attached by malware or virus. Week 6 Task "Availability" and "Application response time" are some of the key QoS metrics.  Collect and summarise two resources that discuss how Availability and Application response times can impact Quality of Service.  Resource 1 Title and Reference: QoS issues in web services Menasce, D., 2002. QoS issues in web services. Internet Computing, IEEE, 6(6), pp.72-75. Available: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1067740&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1067740 [Accessed 23/01/2016]. Summary: The inherent relationship between the two factors is that QoS works as a combination of Availability and Application response times. According to the author, the more Availability and Application response times is derailed the more we are likely to affect QoS. The position the author takes in cementing the argument is that QoS will consider average time of response as well as percentile of the response time. It can therefore be interpreted that if one works in tandem with available and applicable response times then the rate at which a service will be able to processes will be enhanced. As the author considers, a function that evaluates how throughput varies with the intensity of the load is also critical in realizing Availability and Application response times and QoS. It therefore means that with Availability and Application response times QoS improves as programs sending requests will be efficient. Resource 2 Title and Reference: A survey of quality of service in mobile computing environments Chalmers, D. and Sloman, M., 1999. A survey of quality of service in mobile computing environments. Communications Surveys, IEEE, 2(2), pp.2-10. Available: https://www.doc.ic.ac.uk/research/technicalreports/1998/DTR98-10.pdf [Accessed 23/01/2016]. Summary: Survey of QoS in mobile computing environment has been considered to be necessary in understanding the link between QoS and Availability and Application response times. Unlike previous scholars who dwelt on the telephony, Chalmers and Sloman (1999) assess QoS on multimedia applications. The thesis statement of the study establishes that availability and application response times positively influences QoS especially in cases where business tend to be depended on networked, distributed or high-speed communications for web based applications and multimedia applications. The view point of the authors is that there has been misleading assumption that QoS can be provided and maintained even if Availability and Application response times is not given consideration. Basically, this assumption is flawed from the viewpoint of technology and business. The resource further notes that packaging computer technology and mobile telephony still requires Availability and Application response times for successful QoS. Week 7 Task Digital dashboards (tools) display critical information and provide support in decision making.  Collect and summarise two resources that discuss the benefits of these products.  The resources must not be about the same product. Resource 1 Title and Reference: KPIs-The metrics that drive performance management Bauer, K., 2004. KPIs-The metrics that drive performance management. Information Management, 14(9), p.63. Available: http://search.proquest.com/openview/dc6ab764896a552c4a38fc7dca106792/1?pq-origsite=gscholar [Accessed 23/01/2016]. Summary: Digital dashboards have been regarded as important factor in the process of business management particularly in the depiction of the performance of specific department or an enterprise. While scholars have attempted to see these tools as catalyst in decision making, there are some products in the market that cuts across decision making to offer services such as key performance indicators. In particular, the resource enumerates that KPI digital dashboard is a tool that helps managers to understand and execute with ease, discernable view of their business management, performance and decision making. However, the author notes that the process of selecting and defining KPI that suite a given function of an enterprise may not be easy. Linking the difficult with current marketplace, companies should consider factors such as enterprise resource planning, business performance management and supply chain management before working with KPI. Resource 2 Title and Reference: An approach for selecting software-as-a-service (SaaS) product Godse, M. and Mulik, S., 2009, September. An approach for selecting software-as-a-service (SaaS) product. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 155-158). IEEE. Available: http://dspace.library.iitb.ac.in/jspui/bitstream/100/2447/2/An%20approach%20for%20selecting%20%20%28SaaS%29.pdf [Accessed 23/01/2016]. Summary: Due to complexity in the marketplace, there have been need to assess the effectiveness of SaaS (software-as-a-service) decision making dashboard as tool that provides solutions to challenges that we have been facing. This tool according to the resource differs significantly with KPI as it provides a high level of overview regarding decision making and performance of every department in an organization. The authors recommend that the dashboard is a product that can easily suit firms looking for quick assessment of performance of every sector so that a given decision can be reached. One aspect that the authors have made clear regarding the dashboard is that the tool has inherent architecture that assesses the performance of trail leads against a moving target, and provides quick analysis that necessitates decision making process. For SaaS, we are having a tool that provides response---a factor that is paramount in business operations. Week 8 Task Object-oriented DBMSs (ODBMS) are becoming popular because of their ability to store both data and procedures.  Collect and summarise two resources that discuss Object-oriented database management systems. Resource 1 Title and Reference: Object Data Management Cattell, R.G., 1994. Object Data Management: Object-Oriented and Extended. Addison-Wesley Longman Publishing Co., Inc.. Available: http://dl.acm.org/citation.cfm?id=527625 [Accessed 23/01/2016]. Summary: Engineers are currently concerned with tools that necessitate the process of storing both data and procedures. It is for this reasons that authors have attempted to provide comprehensive of object-oriented data management services (object-oriented DBMSs). The resource has been picked as a result of its comprehensive analysis of object-oriented DBMSs and how it can be adopted by different organisations looking to store both the data and procedures. The author begins the analysis by enumerating giving different definitions regarding object data management. This is followed by categorization of new system the authors believe necessitate the process of data management in general and data and procedure storage in particular. The book gives special interest to wide range of technologies that are now meant to improve the platform of object-oriented DBMSs however, the author is keen to note that there is need for users to consider other database approaches when incorporating object-oriented DBMSs. Resource 2 Title and Reference: Object-oriented database management systems Bertino, E. and Martino, L., 1991. Object-oriented database management systems: concepts and issues. Computer, 24(4), pp.33-47. Available: http://eislab.gatech.edu/courses/me6754/resources/1991-bertino.pdf [Accessed 23/01/2016]. Summary: Concepts and issues concerning object-oriented database management systems have been interpreted differently across academic papers. This resource offers detailed information regarding pertinent concepts and issues that have been affecting policy makers and design managers with regard to object-oriented database management systems. To begin with, the resource is concerned with shifting the assumption people have been having that object-oriented database management systems only suit business administration. Instead, it presents evidence that object-oriented database management systems can be accompanied by other tools and software so that it necessitates operations such as designs. Furthermore, applications such as hypermedia are areas the author is concerned about and opine that object-oriented database management systems should be extended to cover these areas. The data authors present further affirms that object-oriented database management systems or technologies have now been enhanced to combine the expressive power of languages used in programming thus offering insight regarding data management. Week 9 Task CASE tools are commonly used by the organisations to increase productivity and Quality. Collect and summarise two resources that discuss the pros and cons (benefits and risks) of CASE tools.  One resource must be about the "positives” and one must be about the "negatives”. Resource 1 Title and Reference: An empirical test of object-based output measurement metrics in a computer aided software engineering (CASE) environment. Banker, R.D., Kauffman, R.J. and Kumar, R., 1991. An empirical test of object-based output measurement metrics in a computer aided software engineering (CASE) environment. Information Systems Working Papers Series, Vol. Summary: Benefits of Computer-Aided Software Engineering have stretched beyond the expected domain in the last few decades. Analysing different benefits users can accrue from CASE tools, the authors restricts their findings on the benefits of CASE tools on business management and administration. The study begins with estimation and productivity assessment of companies that have been using CASE tools for their business operations. It noted that companies using CASE tools stood a chance of enhancing their operations and efficiency in service delivery. To concretise their findings, the study relied on the sample case of 196 CASE tools using firms and noted that the tools promote management control systems which in turn enhance strategic cost management by more specifically tracking software development productivity within a given company. Under the sub-topic ‘Function Points’ the authors note that the tools necessitate functionality. Resource 2 Title and Reference: Computer-aided software engineering Bergin, T.J. ed., 1993. Computer-aided software engineering: Issues and trends for the 1990s and beyond (Vol. 1). IGI Global. Available: https://books.google.co.uk/books?hl=en&lr=&id=aJn5TnDT_Q0C&oi=fnd&pg=PA3&dq=challenges+of+computer-aided+software+engineering+tools&ots=3czahfMtjh&sig=gkaAXLUdkEyBV-hKo2FY8RiyIrQ&redir_esc=y#v=onepage&q=challenges%20of%20computer-aided%20software%20engineering%20tools&f=false [Accessed 23/01/2016]. Summary: The work shows a shift in focus where scholars strongly document challenges of Computer Aided Software Engineering tools. Under the topic Issues and Trends for the CASE in 1990s the author critically shows that there have been different industries that have been driving the growing demand for CASE tools. As a result the tools have since faced a number of pros. Enumerating a few the resource shows is the requirement definition as one of the challenges companies are facing with the tools. That is, it has been a challenge to integrate the tools with specific requirements of users and specific constituents of systems. Secondly, the tools have issues concerning management, planning and improvement. The author argues that project scales that have been increasing have made it difficult to pass data through CASE tools especially for those users used to managing large software using ad hoc or manual approaches. Week 10 Task Project selection methods are categorised into "Mathematical" and "Benefit measurements" model.  Collect and summarise two resources that explain these models. Resource 1 Title and Reference: A comprehensive 0–1 goal programming model for project selection Badri, M.A., Davis, D. and Davis, D., 2001. A comprehensive 0–1 goal programming model for project selection. International Journal of Project Management, 19(4), pp.243-252. Available: https://www.researchgate.net/profile/Masood_Badri/publication/223527986_A_comprehensive_01_goal_programming_model_for_project_selection/links/53d732200cf228d363eadbdf.pdf [Accessed 23/01/2016]. Summary: An important point the authors considers while assessing benefit measurements and mathematical models and project selection methods is their position that there is need for the incorporation of conflicting project selection methods into a given decision model so that the project selected can be in tandem with the general goal of the firm. Discussing the application of ‘benefit measurements’ the authors note that the model is essential where one intends to attain decreasing long-run cost. However, for this to be attained the authors further found that there will be need to consider software, hardware and other components of the firm or project to be selected. Discussing ‘mathematical’ as another model the resource incorporates the aspect of ranking and scoring risks that are associated with projects so that analytical hierarchy techniques suits cases where the cost of projects, risks and benefits are not known. Resource 2 Title and Reference: A decision framework for R&D project selection Coldrick, S., Lawson, C.P., Ivey, P.C. and Lockwood, C., 2002. A decision framework for R&D project selection. In Engineering Management Conference, 2002. IEMC'02. 2002 IEEE International (Vol. 1, pp. 413-418). IEEE. Available: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1038468&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1038468 [Accessed 23/01/2016]. Summary: The resource discusses project selection methods from the viewpoint of competitive advantage. Incorporating both models (benefit measurements and mathematical) the books is interesting in understanding the link between project selection and lifespan of the project. In its data analysis it found that there will be profit maximization from projects provided the company recognizes the different types of projects and their specific needs. On the other hand, there is a concern that benefit measurements and mathematical models may only help in understanding market trends for the project but there will still be need for a qualitative scoring stage, financial considerations and risk analysis. Different from other articles and books the authors argue that the models should be integrated in such a way that they can be applicable to different sets of projects in all sizes of firm to provide structure that assist engineers in the decision making process. MARKING SHEET - DO NOT DELETE (Up to 1.5 marks per response; up to 3 marks per weekly task) Criteria 0 No Response Read More

Secondly, resource gathered data on header compression for real-time IP. While there are different conclusion that were made, the most captivating part is that the larger headers of a given protocol if used when voice data is communicated or sent over the Internet then it consist of a major problem when it comes to VOIP over wireless. This resource is therefore relevant in understanding the need to design technologies that integrate VOIP and compressions. Week 2 Task When we think about operating systems, we tend to focus on desktop operating systems like Windows, Linux and OS X.

  In recent years, the emergence of tablets and smart phones has led to advances in the operating systems that run these devices.  Collect and summarise two resources detailing the role of mobile operating systems. Resource 1 Title and Reference: Operating systems for mobile computing Hall, S.P. and Anderson, E., 2009. Operating systems for mobile computing. Journal of Computing Sciences in Colleges, 25(2), pp.64-71. Available: http://anibal.gyte.edu.tr/hebe/AblDrive/69276048/w/Storage/104_2011_1_601_69276048/Downloads/m41.

pdf [Accessed 24/01/2016]. Summary: Studies have now shifted attention to the need to understand the roles of specialised operating systems to host mobile computers. These scholars addressed this issue under the topic “Operating System for Mobile Computing”: to understand the deviating roles of mobile OS from the OS operating desktops. Taking a case study on the iPhone that was unveiled by Apple the authors see mobile OS as open sourced model that can allow application developer to integrate or write applications.

The resource explains that with mobile OS, Google can be able to embed or include their own search sites into the OS just like the case of Internet Explorer on Windows thus introducing to the market mobile phone OS that directly links clients to internet. Additionally, the OS are written in Java language making it possible for additional applications. Resource 2 Title and Reference: Structuring the smartphone industry: is the mobile internet OS platform the key? Kenney, M. and Pon, B., 2011.

Structuring the smartphone industry: is the mobile internet OS platform the key?. Journal of Industry, Competition and Trade, 11(3), pp.239-261. Available: http://link.springer.com/article/10.1007/s10842-011-0105-6/fulltext.html [Accessed 24/01/2016]. Summary: In the wake of new technologies in mobile phones there is need to assess whether their OS is the key to problems that have affected other OSs. The cornerstone of their argument is that without the introduction of mobile OS and redefinition of the smartphone products by Apple, it will be difficult to understand the roles played by mobile OS.

It therefore means that with the convergence of Internet services, mobile telephony and individual computing, the authors see mobile OS as the facilitator of these features. Importantly though, the resource notes that Google has been taking different approach from Apple in the design of their mobile OS. From this perspective they argue that the OS serves the purpose of promoting Android as an open platform. Consequently the OS helps in enhancing services such as maps and emails and search adverts that are delivered from the cloud.

Week 3 Task The 'last mile' is considered the speed bottleneck because of limited bandwidth that restricts data transfer from the telephone exchange to the customer premises.  Australian government is currently addressing this problem by rolling out National Broadband Network (NBN).  Collect and summarise two resources detailing how higher data transfer rates can be achieved in the last mile. Resource 1 Title and Reference: Last mile by laser Acampora, A., 2002. Last mile by laser. Scientific American, 287(1), pp.32-7. Available: www.mems.ece.ufl.edu/courses/spring2003/project1/lastmile.

doc [Accessed 23/01/2016]. Summary: Evidence of research on the relationship between speed of data transfer and telephone exchange is myriad.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Solutions to Performance Problems in VoIP over a Wireless LAN Annotated Bibliography Example | Topics and Well Written Essays - 3250 words, n.d.)
Solutions to Performance Problems in VoIP over a Wireless LAN Annotated Bibliography Example | Topics and Well Written Essays - 3250 words. https://studentshare.org/information-technology/2066548-contact-me
(Solutions to Performance Problems in VoIP over a Wireless LAN Annotated Bibliography Example | Topics and Well Written Essays - 3250 Words)
Solutions to Performance Problems in VoIP over a Wireless LAN Annotated Bibliography Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/information-technology/2066548-contact-me.
“Solutions to Performance Problems in VoIP over a Wireless LAN Annotated Bibliography Example | Topics and Well Written Essays - 3250 Words”. https://studentshare.org/information-technology/2066548-contact-me.
  • Cited: 0 times

CHECK THESE SAMPLES OF Solutions to Performance Problems in VoIP over a Wireless LAN

The Internet Speed and Wi-Fi Coverage at Camps and Dormitory

It is notable that the foundation of any wireless network is an access point (AP); a device that broadcasts a wireless signal which computers could detect and then tune into.... It is necessary for devices and computers to be equipped with wireless network adapters so as to connect to an AP and join a wireless network.... The devices can only connect to the internet when within a limited and short range of a wireless network.... Wi-Fi essentially offers wireless high-speed internet as well as network connections....
7 Pages (1750 words) Research Proposal

Wireless Network System for an IT Training Centre

The need for a wireless lan arose due to the requirement of mobility of users while staying connected to the network.... wireless lan is a computer networking technology that uses Radio Frequency (RF) as a connecting medium instead of wires and cables (Khayat, 2002).... 'Narrowband wireless lan's', 'Spread Spectrum wireless lan's' and 'Infrared wireless lan's'.... As is evident, the access to a wireless network can be gained only if the users are having devices which have wireless facility....
14 Pages (3500 words) Assignment

Wireless Networks-WLAN's

The equipment required to build a wireless networking solution is pretty straight forward and consists of the usual network interface cards and routers apart from the set up of access points at requisite places (Russell Shaw, 2001).... In the current section, the concept of wireless networking and the various trends associated with it shall be discussed in close detail.... hellip; As the name suggests, wireless networking is different from wired networking wherein the use of wires for the purpose of communication is totally eliminated....
23 Pages (5750 words) Essay

Wireless Network System for an IT Training Centre

The need for a wireless lan arose due to the requirement of mobility of users while staying connected to the network.... This essay “Wireless Network System for an IT Training Centre” will discuss development and implementation of wireless lan instead of wires and cables.... 'Narrowband wireless lan's', 'Spread Spectrum wireless lan's' and 'Infrared wireless lan's'.... As is evident, the access to a wireless network can be gained only if the users are having devices which have a wireless facility....
14 Pages (3500 words) Essay

Wireless Power Transmission

Moreover, the research project enlarges the view and knowledge of wireless systems.... hellip; Moreover, the research project enlarges the view and knowledge of wireless systems.... To curb the messy picture of using wired systems, wireless power transmission comes handy and an effective way to charge portable and low-power gadgets....
10 Pages (2500 words) Essay

A Network Solution for Sports Authority Field

wireless lan has proposed or this stadium.... A high-density wireless lan is able to gather for the needs of the thousands of fans in the stands who are simultaneously seeking information in real-time.... Currently, it is assumed that the stadium has no lan connection to gather for the needs of the users.... This paper details a proposed lan infrastructure that is suitable to serve the needs of various users in the stadium.... The first section describes a lan infrastructure that will allow stadium users to connect Sports Authority Fieldely to the internet using their devices such as smartphones and tablets....
18 Pages (4500 words) Term Paper

Wireless Power Transmission

This work called "wireless Power Transmission" describes the view and knowledge of wireless systems.... From this work, it is clear about the use of wireless power transmission ability.... and Ho, “wireless power transfer (WPT) is a promising new solution to provide convenient and perpetual energy supplies to wireless networks”.... To curb the messy picture of using wired systems, wireless power transmission comes in handy and an effective way to charge portable and low-power gadgets....
49 Pages (12250 words) Coursework

Voice Over Internet Protocol

This paper "Voice over Internet Protocol" seeks to look into the various concerns and also the requirements of secure VOIP connections.... Voice over Internet Protocol (VoIP) has for some time now grown to be a very popular mode of phone communication and has started to outpace the traditional means like the public switched telephone networks due to the flexibility and the low-cost nature of VOIP.... oIP has gain popularity over the years and it is preferred as a more cost-effective and reliable means of making calls over long distances....
81 Pages (20250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us