Mobile Ad hoc Network (MANET) routing protocols studies in the last decade have focused more on proactive routing protocols with many specifics to data traffic. Only fewer works have addressed the issues of reactive protocols supporting voice application. This research work analyses the performance of VoIP application in MANET configured with Temporary Ordered Routing Algorithm (TORA) routing protocol as on-demand routing protocol. The VoIP application is evaluated using four different parameters namely; codec, MAC protocol, mobility and node density in an OPNET simulation environment. The quality of transmission was measured through different performance metrics such as jitter, Mean Opinion Score (MOS), end-to-end delay and throughput. Results show that major metrics that had high impact on the performance of the network included mobility and node density. It research proved that communication in an ad hoc network using TORA is more productive and effective with fewer nodes. It could also be said that given the utilization of TORA routing protocol in MANET, quality of voice communication is disproportionate to node density. Increase in the number of nodes greatly depreciates voice quality. In the whole, the work provides a very good analysis that could help the academia and industries in reaching decisions for a most suiting routing protocol at any given ad hoc voice communication setup.
Incidence response and handling has become quite a crucial, indispensible constituent of information technology security management, as it provides an organised way of handling the aftermaths of a security breach. It presents an organisation's reaction to illegitimate and unacceptable exploits on its assets or infrastructure. The goal must be to successfully neutralise the incident, such that damages are significantly reduced with attendant reduction in recovery time and costs. To achieve this, several approaches and methodologies proposed have been reviewed with a view to identifying essential processes. What is needed is referred to as incident capability mingled with collaborations. This defines a shift from response to management of computer security incidents in anointer relationship manner that foster collaboration through the exchange and sharing of incidence management details among several distinct organizations. Key step-up aspects centre on issues of enforcing and assuring trust and privacy. A viable collaborative incident response approach must be able to proffer both proactive and reactive mechanisms that are management-oriented and incorporating all required techniques and procedures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.