Araştırma Makalesi
BibTex RIS Kaynak Göster

Video Konferans Uygulamalarında Güvenlik Duvarı ve Sanal Özel Ağ (VPN) Kullanımının Performans Analizi

Yıl 2024, Cilt: 12 Sayı: 4, 1879 - 1894, 23.10.2024
https://doi.org/10.29130/dubited.1462133

Öz

Bilgi ve iletişim teknolojilerindeki süratli gelişmeler; e-devlet, e-ticaret, e-sağlık, e-öğrenme gibi uygulama alanlarıyla bu teknolojileri hayatımızın her alanının vazgeçilmez öğesi haline getirmiştir. Özellikle küresel Covid-19 salgın süreci; aynı anda farklı yerlerde bulunan kişilerin, internet üzerinden görüntülü ve sesli bir şekilde iletişim kurmalarını sağlayan video konferans uygulamalarında zorunlu gelişmelere yol açmıştır. İnternet üzerinden sunulan uygulamaların hızla yaygınlaşmasına sebep olan teknolojideki gelişmeler, aynı zamanda internete bağlı cihaz sayısında ve internet üzerinden akan veri trafiğinde çok ciddi artışlara sebep olmaktadır. Bunun neticesi olarak, video konferans uygulamaları gibi internet üzerinden kullanılan uygulamaların güvenlik ihtiyaçları da artan güvenlik tehdidi riskleriyle orantılı olarak artmaktadır. Güvenlik duvarı ve sanal özel ağ kullanımı, internet üzerinden kullanılan uygulamalar için en temel güvenlik çözümlerindendir. Güvenlik duvarı, kurumsal bir ağ ile internet bulutu arasına konumlandırılarak ağa gelen ve giden trafiği tanımlı kurallara göre filtreleyen cihazdır. Sanal özel ağ ise, kurumsal bir ağa, internet bulutu üzerinden noktadan noktaya güvenli bir bağlantı sağlar. Bu çalışmada, video konferans uygulamalarının güvenlik duvarı ve sanal özel ağ ile kullanımının uygulama performansına etkileri analiz edilmiştir. Video konferans uygulamalarında; katılımcılar arasında gerçek zamanlı, çift yönlü ve büyük boyutlu bir veri akışı olduğundan bu uygulamaların performansında gecikme ve paket kayıpları belirleyici olmaktadır. Bu uygulamaların güvenlik duvarı ve sanal özel ağ ile kullanımının performans analizinin yapılması ağ protokollerinde, ağ bileşenlerinde ve video konferans uygulamalarında daha sonra yapılabilecek iyileştirmeler için yol gösterici olacaktır. Benzetim metodunun kullanıldığı çalışmada, OPNET benzetim aracı ile oluşturulan farklı senaryoların benzetimiyle elde edilen veriler karşılaştırılmalı olarak analiz edilmiştir.

Kaynakça

  • [1] D. Taser, E. Aydin, A. O. Torgaloz, and Y. Rofcanin, “An examination of remote e-working and flow experience: The role of technostress and loneliness,” Computers in Human Behavior, vol. 127, Feb. 2022.
  • [2] I. B. A. I. Iswara, I. G. M. N. Desnanjaya, I. B. G. Sarasvananda, I. G. Adnyana, and I. D. P. G. W. Putra, “Analysis of Quality of Service (QoS) Apache Open Meeting Video Conference Application and Bigbluebutton on Virtual Private Server,” Proceedings of the 2021 6th International Conference on New Media Studies, pp. 1–6, 2021.
  • [3] N. Austin, R. Hampel, and A. Kukulska-Hulme, “Video conferencing and multimodal expression of voice: Children’s conversations using Skype for second language development in a telecollaborative setting,” System, vol. 64, pp. 87–103, Feb. 2017.
  • [4] K. Okabe-Miyamoto, E. Durnell, R. T. Howell, and M. Zizi, “Video conferencing during emergency distance learning impacted student emotions during COVID-19,” Computers in Human Behavior Reports, vol. 7, Aug. 2022.
  • [5] R. S. Oeppen, G. Shaw, and P. A. Brennan, “Human factors recognition at virtual meetings and video conferencing: how to get the best performance from yourself and others,” British Journal of Oral and Maxillofacial Surgery, vol. 58, no. 6, pp. 643–646, Jul. 2020.
  • [6] L. Billingsley, “Using Video Conferencing Applications to Share the Death Experience During the COVID-19 Pandemic,” Journal of Radiology Nursing, vol. 39, no. 4, pp. 275–277, Dec. 2020.
  • [7] L. Liu, J. Li, H. Xu, K. Xue, and J. C. Xue, “Efficient Real-time Video Conferencing with Adaptive Frame Delivery,” Computer Networks, vol. 234, Oct. 2023.
  • [8] A. C. M. Queiroz, A. Y. Lee, M. Luo, G. Fauville, J. T. Hancock, and J. N. Bailenson, “Too tired to connect: Understanding the associations between video-conferencing, social connection and well-being through the lens of zoom fatigue,” Computers in Human Behavior, vol. 149, Dec. 2023.
  • [9] M. Baldi and Y. Ofek, “End-to-End Delay Analysis of Videoconferencing over Packet-Switched Networks,” IEEE/ACM Transactions on Networking, vol. 8, no. 4, pp. 479–492, Aug. 2000.
  • [10] S. Firestone, T. Ramalingam, and S. Fry, Voice and Video Conferencing Fundamentals. Cisco Press, 2007.
  • [11] F. A. Sofian, “Dramatism of A Video Conferencing Class: Student’s Behavior and Expectations,” Proceedings of the 2023 17th International Conference on Ubiquitous Information Management and Communication, pp. 1–5, 2023.
  • [12] P. Gladović, N. Deretić, and D. Drašković, “Video Conferencing and its Application in Education,” JTTTP - Journal of Traffic and Transport Theory and Practice, vol. 5, no. 1, Mar. 2020.
  • [13] S. Afzal, V. Testoni, C. E. Rothenberg, P. Kolan, and I. Bouazizi, “A holistic survey of multipath wireless video streaming,” Journal of Network and Computer Applications, vol. 212, Mar. 2023.
  • [14] F. Tommasi, V. De Luca, and C. Melle, “Packet losses and objective video quality metrics in H.264 video streaming,” Journal of Visual Communication and Image Representation, vol. 27, pp. 7–27, Feb. 2015.
  • [15] S. Liu, S. P. Lee, K. H. Kim, Z. Zhang, and K. W. Rim, “Achieving high-level QoS in multi-party video-conferencing systems via exploitation of global time,” Proceedings of the 2009 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, pp. 151–160, 2009.
  • [16] M. Baldi and Y. Ofek, “End-to-end Delay of Videoconferencing over Packet Switched Networks,” Proceedings of the Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, pp. 1084-1092, Jan. 98.
  • [17] A. L. H. Chow, H. Yang, C. H. Xia, M. Kim, Z. Liu, and H. Lei, “EMS: Encoded Multipath Streaming for Real-time Live Streaming Applications,” Proceedings of the 17th annual IEEE International Conference on Network Protocols, pp. 233-243, Oct. 2009
  • [18] R. Steinmetz, “Human Perception of Jitter and Media Synchronization,” Journal on Selected Areas in Communications, vol. 14, no. 1, pp. 61-72, Jan. 1996.
  • [19] A. Vakili and J. C. Grégoire, “QoE management for video conferencing applications,” Computer Networks, vol. 57, no. 7, pp. 1726–1738, May 2013.
  • [20] T. P. Van, C. N. T. Xuan, and H. P. Minh, “SunFA - An open-source application for behavior analysis in online video-conferencing,” Proceedings of 2022 RIVF International Conference on Computing and Communication Technologies, pp. 578–583, 2022.
  • [21] B. Reddy Bhimireddy, A. Nimmagadda, H. Kurapati, L. Reddy Gogula, R. Rani Chintala, and V. Chandra Jadala, “Web Security and Web Application Security: Attacks and Prevention,” 2023 9th International Conference on Advanced Computing and Communication Systems, pp. 2095–2099, 2023.
  • [22] M. G. Gouda and A. X. Liu, “Structured firewall design,” Computer Networks, vol. 51, no. 4, pp. 1106–1120, Mar. 2007.
  • [23] A. Korty, D. Calarco, and M. Spencer, “Balancing risk with virtual private networking during a pandemic,” Business Horizons, vol. 64, no. 6, pp. 757–761, Nov. 2021.
  • [24] L. Das Dhomeja, S. Abbasi, A. A. Shaikh, and Y. A. Malkani, “Performance Analysis of WLAN Standards for Video Conferencing Applications,” International Journal of Wireless & Mobile Networks, vol. 3, no. 6, pp. 59–69, Dec. 2011.
  • [25] M. I. Mohamed Abouseda, K. A. Bozed, and A. Ragab Zerek, “Simulation of Video Conferencing over IP Network with QoS Using Riverbed,” Proceedings of 2nd International Conference on Automation, Control, Engineering and Computer Science, 2015.
  • [26] K. Sharma, N. Bhatia, and N. Kapoor, “Performance Evaluation of 802.11 WLAN Scenarios in OPNET Modeler,” International Journal of Computer Applications, vol. 22, no. 9, pp. 30-35, May 2011.
  • [27] P. Singh, “Evaluation of Various Traffic Loads in MANET with DSR Routing Protocol Through Use of OPNET Simulator,” International Journal of Distributed and Parallel Systems, vol. 3, no. 3, pp. 75–83, May 2012.
  • [28] H. A. Mohammed, and A. H. Ali, “Effect of Some Security Mechanisms on the QoS VoIP Application Using OPNET,” International Journal of Current Engineering and Technology, vol. 3, no. 5, pp. 1626-1630, Dec. 2013.
  • [29] M. K. Hasan, “Farklı Ağ Teknolojilerinde Trafik Ölçümü ve Performans Karşılaştırması,” M.S. thesis, Dept. Elect. and Electron. Eng., Erciyes Univ., Kayseri, 2017.
  • [30] M. Aamir, M. Zaidi, and H. Mansoor, “Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET,” International Journal of Computer Science Issues, vol. 9, Jun. 2012.
  • [31] M. Jacobi, and L. Maycock, “Comparison of IPv4 and IPv6 QoS Implementations Using Differentiated Services.” Accessed: Apr. 22, 2024. [Online]. Available: http://shura.shu.ac.uk/21615/
  • [32] C. Çakir, and H. Kaptan, “VoIP Teknolojilerinde Opnet Tabanlı Güvenlik Uygulaması,” Bilişim Teknolojileri Dergisi, vol. 2, no. 3, Sep. 2009.
  • [33] S. Çam, “Güvenlik Duvarı ve Sanal Özel Ağ Çözümlerinin Ağ Performansına Etkilerinin İncelenmesi,” M.S. thesis, Dept. Comput. Eng., Trakya Univ., Edirne, 2020.
  • [34] J. Helkey, L. Holder, and B. Shirazi, “Comparison of simulators for assessing the ability to sustain wireless sensor networks using dynamic network reconfiguration,” Sustainable Computing: Informatics and Systems, vol. 9, pp. 1–7, Mar. 2016.
  • [35] J. Gomez, E. F. Kfoury, J. Crichigno, and G. Srivastava, “A survey on network simulators, emulators, and testbeds used for research and education,” Computer Networks, vol. 237, Dec. 2023.
  • [36] Manpreet, and J. Malhotra, “A Survey on MANET Simulation Tools,” International Conference on Innovative Applications of Computational Intelligence on Power, Energy and Controls with their Impact on Humanity, pp. 495-498, Nov. 2014
  • [37] G. H. Adday, S. K. Subramaniam, Z. A. Zukarnain, and N. Samian, “Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey,” IEEE Access, vol. 12, pp. 22938-22977, 2024.
  • [38] A. Şentürk, “Kablosuz Multimedya Algılayıcı Ağlar İçin Görüntü Sıkıştırmaya Dayalı Yeni Bir Enerji Duyarlı Uygulama Katmanı Algoritması Geliştirme,” Ph.D. dissertation, Dept. Elect. Electron. and Comput. Eng., Düzce Univ., Düzce, 2017.
  • [39] A. Senturk, R. Kara, and I. Ozcelik, “Fuzzy logic and image compression based energy efficient application layer algorithm for wireless multimedia sensor networks,” Computer Science and Information Systems, vol. 17, no. 2, pp. 509–536, Jun. 2020.
  • [40] A. Musa and I. Awan, “Functional and Performance Analysis of Discrete Event Network Simulation Tools,” Simulation Modelling Practice and Theory, vol. 116., Apr. 2022.
  • [41] T. Arvind, “A Comparative Study of Various Network Simulation Tools,” International Journal of Computer Science & Engineering Technology, vol. 7, no. 8, pp. 374-378, Aug. 2016.
  • [42] M. H. Kabir, S. Islam, M. J. Hossain, and S. Hossain, “Detail Comparison of Network Simulators,” International Journal of Scientific & Engineering Research, vol. 5, no. 10, pp. 203-218, Oct. 2014.
  • [43] Z. Lu and H. Yang, Unlocking the Power of OPNET Modeler. Cambridge University Press, 2012.
  • [44] E. Kocabaş, “IPv4 ve IPv6 Desteklenen Yönlendirme Protokollerinin Performans Analizi / Karşılaştırılması,” M.S. thesis, Dept. Comput. Eng., Karabük Univ., Karabük, 2019.
  • [45] H. Develi, “Süleyman Demirel Üniversitesi Kampüs Ağının OPNET ile Modellenmesi,” M.S. thesis, Dept. Electron. Comput. Educ., Süleyman Demirel Univ., Isparta, 2009.
  • [46] A. Ghulam, “Kablosuz Örgü Ağlarında Yönlendirme Protokollerinin Karşılaştırılması,” M.S. thesis, Dept. Comput. Educ., Erciyes Üniversitesi, Kayseri, 2018.

Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications

Yıl 2024, Cilt: 12 Sayı: 4, 1879 - 1894, 23.10.2024
https://doi.org/10.29130/dubited.1462133

Öz

Rapid developments in information technologies have made these technologies indispensable elements of our lives with application areas such as e-government, e-commerce, e-health, e-learning. Particularly the global Covid-19 pandemic period has led to forced improvements in video conferencing applications, which enable users in different locations at the same time to communicate via video and audio over internet. Developments in technology, which cause the rapid increase of applications served over internet, also cause a significant increase in the number of devices connected to internet and the data traffic flowing over internet. As a result, the security needs of applications used over internet, such as video conferencing applications, are increasing in proportion to the increasing security threat risks. The use of firewall and VPN (Virtual Private Network) are the most basic security solutions for applications used over internet. A firewall is a device, which is positioned between a corporate network and the internet cloud, filtering incoming and outgoing traffic to and from the network according to defined rules. VPN, on the other hand, provides a secure point-to-point connection to a corporate network through the internet cloud. In this study, the effects of firewall and VPN usage in video conferencing applications were analyzed in terms of application performance. In video conferencing applications; since there is a real-time, bidirectional and large-scale data flow between the participants, delay and packet loss determine the performance of these applications. Analyzing how these applications perform when used with firewalls and VPN will guide further improvements in network protocols, components and related applications. In the study in which the simulation method was used, the data obtained from the simulation of different scenarios created with the OPNET tool were analyzed comparatively.

Kaynakça

  • [1] D. Taser, E. Aydin, A. O. Torgaloz, and Y. Rofcanin, “An examination of remote e-working and flow experience: The role of technostress and loneliness,” Computers in Human Behavior, vol. 127, Feb. 2022.
  • [2] I. B. A. I. Iswara, I. G. M. N. Desnanjaya, I. B. G. Sarasvananda, I. G. Adnyana, and I. D. P. G. W. Putra, “Analysis of Quality of Service (QoS) Apache Open Meeting Video Conference Application and Bigbluebutton on Virtual Private Server,” Proceedings of the 2021 6th International Conference on New Media Studies, pp. 1–6, 2021.
  • [3] N. Austin, R. Hampel, and A. Kukulska-Hulme, “Video conferencing and multimodal expression of voice: Children’s conversations using Skype for second language development in a telecollaborative setting,” System, vol. 64, pp. 87–103, Feb. 2017.
  • [4] K. Okabe-Miyamoto, E. Durnell, R. T. Howell, and M. Zizi, “Video conferencing during emergency distance learning impacted student emotions during COVID-19,” Computers in Human Behavior Reports, vol. 7, Aug. 2022.
  • [5] R. S. Oeppen, G. Shaw, and P. A. Brennan, “Human factors recognition at virtual meetings and video conferencing: how to get the best performance from yourself and others,” British Journal of Oral and Maxillofacial Surgery, vol. 58, no. 6, pp. 643–646, Jul. 2020.
  • [6] L. Billingsley, “Using Video Conferencing Applications to Share the Death Experience During the COVID-19 Pandemic,” Journal of Radiology Nursing, vol. 39, no. 4, pp. 275–277, Dec. 2020.
  • [7] L. Liu, J. Li, H. Xu, K. Xue, and J. C. Xue, “Efficient Real-time Video Conferencing with Adaptive Frame Delivery,” Computer Networks, vol. 234, Oct. 2023.
  • [8] A. C. M. Queiroz, A. Y. Lee, M. Luo, G. Fauville, J. T. Hancock, and J. N. Bailenson, “Too tired to connect: Understanding the associations between video-conferencing, social connection and well-being through the lens of zoom fatigue,” Computers in Human Behavior, vol. 149, Dec. 2023.
  • [9] M. Baldi and Y. Ofek, “End-to-End Delay Analysis of Videoconferencing over Packet-Switched Networks,” IEEE/ACM Transactions on Networking, vol. 8, no. 4, pp. 479–492, Aug. 2000.
  • [10] S. Firestone, T. Ramalingam, and S. Fry, Voice and Video Conferencing Fundamentals. Cisco Press, 2007.
  • [11] F. A. Sofian, “Dramatism of A Video Conferencing Class: Student’s Behavior and Expectations,” Proceedings of the 2023 17th International Conference on Ubiquitous Information Management and Communication, pp. 1–5, 2023.
  • [12] P. Gladović, N. Deretić, and D. Drašković, “Video Conferencing and its Application in Education,” JTTTP - Journal of Traffic and Transport Theory and Practice, vol. 5, no. 1, Mar. 2020.
  • [13] S. Afzal, V. Testoni, C. E. Rothenberg, P. Kolan, and I. Bouazizi, “A holistic survey of multipath wireless video streaming,” Journal of Network and Computer Applications, vol. 212, Mar. 2023.
  • [14] F. Tommasi, V. De Luca, and C. Melle, “Packet losses and objective video quality metrics in H.264 video streaming,” Journal of Visual Communication and Image Representation, vol. 27, pp. 7–27, Feb. 2015.
  • [15] S. Liu, S. P. Lee, K. H. Kim, Z. Zhang, and K. W. Rim, “Achieving high-level QoS in multi-party video-conferencing systems via exploitation of global time,” Proceedings of the 2009 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, pp. 151–160, 2009.
  • [16] M. Baldi and Y. Ofek, “End-to-end Delay of Videoconferencing over Packet Switched Networks,” Proceedings of the Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, pp. 1084-1092, Jan. 98.
  • [17] A. L. H. Chow, H. Yang, C. H. Xia, M. Kim, Z. Liu, and H. Lei, “EMS: Encoded Multipath Streaming for Real-time Live Streaming Applications,” Proceedings of the 17th annual IEEE International Conference on Network Protocols, pp. 233-243, Oct. 2009
  • [18] R. Steinmetz, “Human Perception of Jitter and Media Synchronization,” Journal on Selected Areas in Communications, vol. 14, no. 1, pp. 61-72, Jan. 1996.
  • [19] A. Vakili and J. C. Grégoire, “QoE management for video conferencing applications,” Computer Networks, vol. 57, no. 7, pp. 1726–1738, May 2013.
  • [20] T. P. Van, C. N. T. Xuan, and H. P. Minh, “SunFA - An open-source application for behavior analysis in online video-conferencing,” Proceedings of 2022 RIVF International Conference on Computing and Communication Technologies, pp. 578–583, 2022.
  • [21] B. Reddy Bhimireddy, A. Nimmagadda, H. Kurapati, L. Reddy Gogula, R. Rani Chintala, and V. Chandra Jadala, “Web Security and Web Application Security: Attacks and Prevention,” 2023 9th International Conference on Advanced Computing and Communication Systems, pp. 2095–2099, 2023.
  • [22] M. G. Gouda and A. X. Liu, “Structured firewall design,” Computer Networks, vol. 51, no. 4, pp. 1106–1120, Mar. 2007.
  • [23] A. Korty, D. Calarco, and M. Spencer, “Balancing risk with virtual private networking during a pandemic,” Business Horizons, vol. 64, no. 6, pp. 757–761, Nov. 2021.
  • [24] L. Das Dhomeja, S. Abbasi, A. A. Shaikh, and Y. A. Malkani, “Performance Analysis of WLAN Standards for Video Conferencing Applications,” International Journal of Wireless & Mobile Networks, vol. 3, no. 6, pp. 59–69, Dec. 2011.
  • [25] M. I. Mohamed Abouseda, K. A. Bozed, and A. Ragab Zerek, “Simulation of Video Conferencing over IP Network with QoS Using Riverbed,” Proceedings of 2nd International Conference on Automation, Control, Engineering and Computer Science, 2015.
  • [26] K. Sharma, N. Bhatia, and N. Kapoor, “Performance Evaluation of 802.11 WLAN Scenarios in OPNET Modeler,” International Journal of Computer Applications, vol. 22, no. 9, pp. 30-35, May 2011.
  • [27] P. Singh, “Evaluation of Various Traffic Loads in MANET with DSR Routing Protocol Through Use of OPNET Simulator,” International Journal of Distributed and Parallel Systems, vol. 3, no. 3, pp. 75–83, May 2012.
  • [28] H. A. Mohammed, and A. H. Ali, “Effect of Some Security Mechanisms on the QoS VoIP Application Using OPNET,” International Journal of Current Engineering and Technology, vol. 3, no. 5, pp. 1626-1630, Dec. 2013.
  • [29] M. K. Hasan, “Farklı Ağ Teknolojilerinde Trafik Ölçümü ve Performans Karşılaştırması,” M.S. thesis, Dept. Elect. and Electron. Eng., Erciyes Univ., Kayseri, 2017.
  • [30] M. Aamir, M. Zaidi, and H. Mansoor, “Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET,” International Journal of Computer Science Issues, vol. 9, Jun. 2012.
  • [31] M. Jacobi, and L. Maycock, “Comparison of IPv4 and IPv6 QoS Implementations Using Differentiated Services.” Accessed: Apr. 22, 2024. [Online]. Available: http://shura.shu.ac.uk/21615/
  • [32] C. Çakir, and H. Kaptan, “VoIP Teknolojilerinde Opnet Tabanlı Güvenlik Uygulaması,” Bilişim Teknolojileri Dergisi, vol. 2, no. 3, Sep. 2009.
  • [33] S. Çam, “Güvenlik Duvarı ve Sanal Özel Ağ Çözümlerinin Ağ Performansına Etkilerinin İncelenmesi,” M.S. thesis, Dept. Comput. Eng., Trakya Univ., Edirne, 2020.
  • [34] J. Helkey, L. Holder, and B. Shirazi, “Comparison of simulators for assessing the ability to sustain wireless sensor networks using dynamic network reconfiguration,” Sustainable Computing: Informatics and Systems, vol. 9, pp. 1–7, Mar. 2016.
  • [35] J. Gomez, E. F. Kfoury, J. Crichigno, and G. Srivastava, “A survey on network simulators, emulators, and testbeds used for research and education,” Computer Networks, vol. 237, Dec. 2023.
  • [36] Manpreet, and J. Malhotra, “A Survey on MANET Simulation Tools,” International Conference on Innovative Applications of Computational Intelligence on Power, Energy and Controls with their Impact on Humanity, pp. 495-498, Nov. 2014
  • [37] G. H. Adday, S. K. Subramaniam, Z. A. Zukarnain, and N. Samian, “Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey,” IEEE Access, vol. 12, pp. 22938-22977, 2024.
  • [38] A. Şentürk, “Kablosuz Multimedya Algılayıcı Ağlar İçin Görüntü Sıkıştırmaya Dayalı Yeni Bir Enerji Duyarlı Uygulama Katmanı Algoritması Geliştirme,” Ph.D. dissertation, Dept. Elect. Electron. and Comput. Eng., Düzce Univ., Düzce, 2017.
  • [39] A. Senturk, R. Kara, and I. Ozcelik, “Fuzzy logic and image compression based energy efficient application layer algorithm for wireless multimedia sensor networks,” Computer Science and Information Systems, vol. 17, no. 2, pp. 509–536, Jun. 2020.
  • [40] A. Musa and I. Awan, “Functional and Performance Analysis of Discrete Event Network Simulation Tools,” Simulation Modelling Practice and Theory, vol. 116., Apr. 2022.
  • [41] T. Arvind, “A Comparative Study of Various Network Simulation Tools,” International Journal of Computer Science & Engineering Technology, vol. 7, no. 8, pp. 374-378, Aug. 2016.
  • [42] M. H. Kabir, S. Islam, M. J. Hossain, and S. Hossain, “Detail Comparison of Network Simulators,” International Journal of Scientific & Engineering Research, vol. 5, no. 10, pp. 203-218, Oct. 2014.
  • [43] Z. Lu and H. Yang, Unlocking the Power of OPNET Modeler. Cambridge University Press, 2012.
  • [44] E. Kocabaş, “IPv4 ve IPv6 Desteklenen Yönlendirme Protokollerinin Performans Analizi / Karşılaştırılması,” M.S. thesis, Dept. Comput. Eng., Karabük Univ., Karabük, 2019.
  • [45] H. Develi, “Süleyman Demirel Üniversitesi Kampüs Ağının OPNET ile Modellenmesi,” M.S. thesis, Dept. Electron. Comput. Educ., Süleyman Demirel Univ., Isparta, 2009.
  • [46] A. Ghulam, “Kablosuz Örgü Ağlarında Yönlendirme Protokollerinin Karşılaştırılması,” M.S. thesis, Dept. Comput. Educ., Erciyes Üniversitesi, Kayseri, 2018.
Toplam 46 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Gömülü Sistemler
Bölüm Makaleler
Yazarlar

Serdar Arpacı Bu kişi benim 0000-0002-7141-0539

Arafat Şentürk 0000-0002-9005-3565

Yayımlanma Tarihi 23 Ekim 2024
Gönderilme Tarihi 31 Mart 2024
Kabul Tarihi 18 Mayıs 2024
Yayımlandığı Sayı Yıl 2024 Cilt: 12 Sayı: 4

Kaynak Göster

APA Arpacı, S., & Şentürk, A. (2024). Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications. Duzce University Journal of Science and Technology, 12(4), 1879-1894. https://doi.org/10.29130/dubited.1462133
AMA Arpacı S, Şentürk A. Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications. DÜBİTED. Ekim 2024;12(4):1879-1894. doi:10.29130/dubited.1462133
Chicago Arpacı, Serdar, ve Arafat Şentürk. “Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications”. Duzce University Journal of Science and Technology 12, sy. 4 (Ekim 2024): 1879-94. https://doi.org/10.29130/dubited.1462133.
EndNote Arpacı S, Şentürk A (01 Ekim 2024) Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications. Duzce University Journal of Science and Technology 12 4 1879–1894.
IEEE S. Arpacı ve A. Şentürk, “Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications”, DÜBİTED, c. 12, sy. 4, ss. 1879–1894, 2024, doi: 10.29130/dubited.1462133.
ISNAD Arpacı, Serdar - Şentürk, Arafat. “Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications”. Duzce University Journal of Science and Technology 12/4 (Ekim 2024), 1879-1894. https://doi.org/10.29130/dubited.1462133.
JAMA Arpacı S, Şentürk A. Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications. DÜBİTED. 2024;12:1879–1894.
MLA Arpacı, Serdar ve Arafat Şentürk. “Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications”. Duzce University Journal of Science and Technology, c. 12, sy. 4, 2024, ss. 1879-94, doi:10.29130/dubited.1462133.
Vancouver Arpacı S, Şentürk A. Performance Analysis of Firewall and Virtual Private Network (VPN) Usage in Video Conferencing Applications. DÜBİTED. 2024;12(4):1879-94.