1. Home
  2. Browse by Author

Browsing by Author "Erten,Y.M."

Filter results by typing the first few letters
Now showing 1 - 5 of 5
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 1
    An End-To Qos Control Scheme for Video Transmission Over Internet
    (2003) Genel,H.; Erten,Y.M.
    Real-time digital video transmission over Internet is a challenging problem. Real-time video traffic is bursty, cannot tolerate delays in delivery and requires a lot of bandwidth, which contrast with the characteristics of current Internet. In this work, we address the various aspects of the problem and present a work that makes use of the standards and proposed techniques in order to implement an efficient and robust real-time video transmission framework providing adequate video presentation quality over the best effort Internet offering no quality of service (QoS) guarantees. © 2003 IEEE.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 2
    Handling Nat Traversal and Mobility for Multimedia Traffic
    (2006) Gaylani,N.; Erten,Y.M.
    Network Address Translator (NAT) traversal is a problem for many applications because a host in a private network cannot be contacted by a node which is outside this network unless the communication is initiated by the host itself. This restriction poses further problems when one of the hosts moves during an active session to a new location which is also behind a NAT. In this study we have proposed solutions to the above problems based on Mobile IP and SIP messaging. Our solutions are based on hole punching and the assumption that the hosts already know the details of each other. Hence it will not be required to consult the proxy or location servers when reestablishing the communication and this should reduce the required handoff time. © 2006 IEEE.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 9
    A Layered Security Architecture for Corporate 802.11 Wireless Networks
    (Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.
    In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.
  • Loading...
    Thumbnail Image
    Conference Object
    A Layered Security Architecture for Corporate 802.11 Wireless Networks
    (Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.
    In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 63
    Performance Analysis of Ad-Hoc Networks Under Black Hole Attacks
    (Institute of Electrical and Electronics Engineers Inc., 2007) Dokurer,S.; Erten,Y.M.; Acar,C.E.
    A wireless ad-hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad-hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Black Hole attacks on the network performance. We simulated black hole attacks in Network Simulator 2 (ns-2) and measured the packet loss in the network with and without a black hole. We also proposed a simple solution against black hole attacks. Our solution improved the network performance in the presence of a black hole by about 19%. © 2007 IEEE.