{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:43Z","timestamp":1750307143200,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T00:00:00Z","timestamp":1319068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,20]]},"DOI":"10.1145\/2047594.2047663","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"269-274","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Measuring the performance of VoIP over Wireless LAN"],"prefix":"10.1145","author":[{"given":"Keshav","family":"Neupane","sequence":"first","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]},{"given":"Victor","family":"Kulgachev","sequence":"additional","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]},{"given":"Andrew","family":"Elam","sequence":"additional","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]},{"given":"Sri Harsha","family":"Vasireddy","sequence":"additional","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]},{"given":"Hetal","family":"Jasani","sequence":"additional","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kuhn Richard Thomas Walsh and Steffen Freiss. \"Security Considerations for Voice Over IP Systems.\" National Institute of Standards and Technology. U.S. Department of Commerce n.d. Web. 16 Oct 201 Kuhn Richard Thomas Walsh and Steffen Freiss. \"Security Considerations for Voice Over IP Systems.\" National Institute of Standards and Technology. U.S. Department of Commerce n.d. Web. 16 Oct 201"},{"key":"e_1_3_2_1_2_1","unstructured":"Bibis Konstantinos. \"Contributed Models. VoIP over 802.11g and the need for QoS\" OPNET. Web. https:\/\/enterprise1.opnet.com\/tsts\/4dcgi\/MODELS_FullDescription?ModelID=630. Bibis Konstantinos. \"Contributed Models. VoIP over 802.11g and the need for QoS\" OPNET. Web. https:\/\/enterprise1.opnet.com\/tsts\/4dcgi\/MODELS_FullDescription?ModelID=630."},{"key":"e_1_3_2_1_3_1","unstructured":"Salah K. and A. Alkhoraidly. \"An OPNET-based Simulation Approach for Deploying VoIP.\" Web. Salah K. and A. Alkhoraidly. \"An OPNET-based Simulation Approach for Deploying VoIP.\" Web."},{"key":"e_1_3_2_1_4_1","unstructured":"\"Frame Relay Network Performance.\" Opnet Lab Manual. Web. \"Frame Relay Network Performance.\" Opnet Lab Manual. Web."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Li Jie and Cui Qi-Fan. \"The QoS Research of VoIP over WLAN.\" 1782--1785. Web. 22 Sep 2010 Li Jie and Cui Qi-Fan. \"The QoS Research of VoIP over WLAN.\" 1782--1785. Web. 22 Sep 2010","DOI":"10.1109\/ICCCAS.2006.285019"},{"key":"e_1_3_2_1_6_1","first-page":"18","author":"Modeler Documentation Set PNET","year":"2010","journal-title":"Inc."},{"key":"e_1_3_2_1_7_1","unstructured":"Solution & Interoperability Test Lab Application Notes.\" Avaya Inc. 6\/25\/2004. Web. 22 Sep 2010. support.avaya.com\/css\/P8\/documents\/003839390. Solution & Interoperability Test Lab Application Notes.\" Avaya Inc. 6\/25\/2004. Web. 22 Sep 2010. support.avaya.com\/css\/P8\/documents\/003839390."},{"edition":"6","volume-title":"Lammle, Todd. \"Cisco Press","year":"2009","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"El-fishawy N M Zahara and M El-gamala. \"Capacity estimation of VoIP transmission over WLAN.\" 24th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2007) (2007): n. pag. Web. 2 Dec 2010. El-fishawy N M Zahara and M El-gamala. \"Capacity estimation of VoIP transmission over WLAN.\" 24th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2007) (2007): n. pag. Web. 2 Dec 2010.","DOI":"10.1109\/NRSC.2007.371394"},{"key":"e_1_3_2_1_10_1","unstructured":"Kuhn Richard Thomas Walsh and Steffen Freiss. \"Security Considerations for Voice Over IP Systems.\" National Institute of Standards and Technology. U.S. Department of Commerce n.d. Web. 16 Oct 201 Kuhn Richard Thomas Walsh and Steffen Freiss. \"Security Considerations for Voice Over IP Systems.\" National Institute of Standards and Technology. U.S. Department of Commerce n.d. Web. 16 Oct 201"},{"key":"e_1_3_2_1_11_1","unstructured":"\"Full Rate.\" Wikipedia the Free Encyclopedia. Web. 22 Nov. 2010. http:\/\/en.wikipedia.org\/wiki\/Full_Rate. \"Full Rate.\" Wikipedia the Free Encyclopedia. Web. 22 Nov. 2010. http:\/\/en.wikipedia.org\/wiki\/Full_Rate."},{"key":"e_1_3_2_1_12_1","unstructured":"\"G.711.\" Wikipedia the Free Encyclopedia. Web. 22 Nov. 2010. http:\/\/en.wikipedia.org\/wiki\/G.711. \"G.711.\" Wikipedia the Free Encyclopedia. Web. 22 Nov. 2010. http:\/\/en.wikipedia.org\/wiki\/G.711."},{"key":"e_1_3_2_1_13_1","unstructured":"OPNET Modeler Documentation Set.\" OPNET Technologies Inc 2009 . Web. 3 Dec 2010. Web: http:\/\/www.opnet.com. OPNET Modeler Documentation Set.\" OPNET Technologies Inc 2009 . Web. 3 Dec 2010. Web: http:\/\/www.opnet.com."}],"event":{"name":"SIGITE' 11: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"West Point New York USA","acronym":"SIGITE' 11"},"container-title":["Proceedings of the 2011 conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047663","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047594.2047663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:55Z","timestamp":1750240135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,20]]},"references-count":13,"alternative-id":["10.1145\/2047594.2047663","10.1145\/2047594"],"URL":"https:\/\/doi.org\/10.1145\/2047594.2047663","relation":{},"subject":[],"published":{"date-parts":[[2011,10,20]]},"assertion":[{"value":"2011-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}