Examination Of Triple Play Deployment In Wide Area Network
Volume 6 - Issue 6, June 2023 Edition
[Download Full Paper]
Author(s)
Seth Okyere-Dankwa1, Mensah Sitti2, Solomon Anab3
Keywords
PON, GPON, VOICE, VIDEO, DATA
Abstract
There has been a significant change in the communication industry for the past decade. Customers taste has changed and the deregulation in the industry brought about more competition. There is now much concern, talk and discussions on Triple Play that is video, voice and data services over an integrated network. Meanwhile most of the networks being used today are designed with data application in mind. Data being non-real time application is not affected by delay, drop and jitter as a result of congestion. The impact on delay, drop and jitter has negative effect on video and voice being transmitted over network. This Study discusses the characteristics of data, voice and video facilities and their network requirements. The Study also looks at the effective, efficient and more reliable network facilities that will support the convergence of voice, video and data. The Study will finally touch on the management and security issues of the network which support the convergence.
References
[1] Abdellaoui, Z., Dieudonne, Y., & Aleya, A. (2021). Design, implementation and evaluation of a Fiber To The Home (FTTH) access network based on a Giga Passive Optical Network GPON. Array, 10, 100058.
[2] Aris, A. B., & Abd Rahman, M. K. (2019). A Novel Distributed Multi-access Platform for Broadband Triple-Play Service Delivery. In Advances in Information and Communication Networks: Proceedings of the 2018 Future of Information and Communication Conference (FICC), Vol. 1 (pp. 26-43). Springer International Publishing.
[3] Beshley, M., Romanchuk, V., Chervenets, V., & Masiuk, A. (2016, September). Ensuring the quality of service flows in multiservice infrastructure based on network node virtualization. In 2016 International Conference Radio Electronics & Info Communications (UkrMiCo) (pp. 1-3). IEEE.
[4] Durante, L., Seno, L., & Valenzano, A. (2021). A formal model and technique to redistribute the packet filtering load in multiple firewall networks. IEEE Transactions on Information Forensics and Security, 16, 2637-2651.
[5] Ezra, P. J., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R., & Damasevicius, R. (2022). Secured communication using virtual private network (VPN). Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 309-319.
[6] Frnda, J., Voznak, M., & Sevcik, L. (2016). Impact of packet loss and delay variation on the quality of real-time video streaming. Telecommunication Systems, 62(2), 265-275.
[7] Gupta, H., Gupta, P., Kumar, P., Gupta, A. K., & Mathur, P. K. (2018, October). Passive optical networks: Review and road ahead. In TENCON 2018-2018 IEEE Region 10 Conference (pp. 0919-0924). IEEE.
[8] Hauser, F., Häberle, M., Schmidt, M., & Menth, M. (2020). P4-ipsec: Site-to-site and host-to-site vpn with ipsec in p4-based sdn. IEEE Access, 8, 139567-139586.
[9] Koczka, F. (2020). Opportunities of Darknet Operations in Cyber Warfare: Examining its Functions and Presence in the University Environment. Academic and Applied Research in Military and Public Management Science, 19(1), 65-81.
[10] Latal, J., Kralik, M., Wilcek, Z., Kolar, J., & Vojtech, J. (2017). Deployment and measurement of quality of service parameters for triple play services in optical access networks. Communications-Scientific letters of the University of Zilina, 19(3), 34-45.
[11] Li, B. Q., & Ma, Y. L. (2023). A ‘firewall’effect during the rogue wave and breather interactions to the Manakov system. Nonlinear Dynamics, 111(2), 1565-1575.
[12] Liem, A. T., Sandag, G. A., Hwang, I. S., & Nikoukar, A. (2017, August). Delay analysis of dynamic bandwidth allocation for triple-play-services in EPON. In 2017 5th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-6). IEEE.
[13] Mallick, K., Atta, R., Sarkar, N., Dutta, B., Kuiri, B., Mandal, P., & Patra, A. S. (2022). Performance evaluation of free space optics communication system in the scenario of triple play service using probabilistic shaping scheme. Optics Communications, 522, 128699.
[14] Mandal, G. C., Mukherjee, R., Das, B., & Patra, A. S. (2018). Next-generation bidirectional triple-play services using RSOA based WDM radio on free-space optics PON. Optics Communications, 411, 138-142.
[15] Mat, N. R. N., Rashidi, C. B. M., Aljunid, S. A., Endut, R., & Ali, N. (2020, January). Enrichment of wireless data transmission based on visible light communication for triple play service application. In AIP Conference Proceedings (Vol. 2203, No. 1, p. 020066). AIP Publishing LLC.
[16] Qin, R. (2022, May). Analysis and implementation of man-in-the-middle attack on Microsoft's PPTP. In International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022) (Vol. 12245, pp. 32-38). SPIE.
[17] Ramana, S., Ramu, S. C., Bhaskar, N., Murthy, M. R., & Reddy, C. R. K. (2022, May). A Three-Level Gateway protocol for secure M-Commerce Transactions using Encrypted OTP. In 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 1408-1416). IEEE.
[18] Singh, A., & Bhogal, R. K. (2022, August). Performance Investigation of Back-Compatible Integrated TWDM/GPON System Using MDM And Pulse Shapes. In Journal of Physics: Conference Series (Vol. 2327, No. 1, p. 012036). IOP Publishing.
[19] Singh, M. K., Singh, A. K., & Singh, N. (2019). Multimedia analysis for disguised voice and classification efficiency. Multimedia Tools and Applications, 78(20), 29395-29411.
[20] Smyslov, V. (2022). RFC 9227 Using GOST Ciphers in the Encapsulating Security Payload (ESP) and Internet Key Exchange Version 2 (IKEv2) Protocols.
[21] Taranov, K., Rothenberger, B., Perrig, A., & Hoefler, T. (2020, July). sRDMA: efficient NIC-based authentication and encryption for remote direct memory access. In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference (pp. 691-704).
[22] Zaripova, D. A. (2021). Network security issues and effective protection against network attacks. International Journal on Integrated Education, 4(2), 79-85.
[23] Zhao, Q., & Ding, G. Z. (2016, June). The Design and Analysis of Campus Network under the Background of Triple Play. In 2016 International Conference on Information System and Artificial Intelligence (ISAI) (pp. 100-103). IEEE.