Analyzing Ip Phone Data In Cisco Packet Tracer: A Comparative Study Of Different Network Topologies Using Machine Learning And Network Analysis Methods
Keywords:
Communication networks, IP Phones, Cisco Packet Tracer, Data Science Techniques, Network optimization.Abstract
In the contemporary business landscape, communication networks are indispensable for seamless operations. IP phones are pivotal in facilitating effective voice communication. This study delves into analyzing network data using IP phones within different topologies in Cisco Packet Tracer. By Leveraging data mining and machine learning techniques, it seeks to expose valuable insights into network performance, traffic patterns, and potential vulnerabilities. These findings hold significant promise for network optimization, performance enhancement, and fortified security measures. This research provides advantages to network administrators and data scientists and contributes to the overall reliability and efficiency of IP phone networks, ensuring they are well-equipped to meet the demands of the modern digital era.
Downloads
References
R. Demeter et al., "A quantitative study of using Cisco Packet Tracer simulation software to improve IT students' creativity and outcomes," 2019 10th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Naples, Italy, 2019, pp. 353-358, doi: 10.1109/CogInfoCom47531.2019.9089920.
Q. Liu and Q. Liu, "A Study on Topology in Computer Network," 2014 7th International Conference on Intelligent Computation Technology and Automation, Changsha, China, 2014, pp. 45-48, doi: 10.1109/ICICTA.2014.18.
Toral-Cruz and D. Torres-Romin, "IP telephony: an overview," (ICEEE). 1st International Conference on Electrical and Electronics Engineering, 2004., Acapulco, Mexico, 2004, pp. 23-28, doi: 10.1109/ICEEE.2004.1433842..
N. Chirdchoo, W. Cheunta, K. Saelim and P. Kovintavewat, "Design and implementation of a VoIP system for campus usage: A case study at NPRU," 2013 13th International Symposium on Communications and Information Technologies (ISCIT), Surat Thani, Thailand, 2013, pp. 216-221, doi: 10.1109/ISCIT.2013.6645852..
S. R. Guruvayur and R. Suchithra, "A detailed study on machine learning techniques for data mining," 2017 International Conference on Trends in Electronics and Informatics (ICEI), Tirunelveli, India, 2017, pp. 1187-1192, doi: 10.1109/ICOEI.2017.8300900.
Sharmin, Moshammad & Hossain, Md. Anwar. (2019). Analysis and Comparative Study for Developing Computer Network in Terms of Routing Protocols Having IPv6 Network Using Cisco Packet Tracer. 7. 16-29. 10.11648/j.se.20190702.11
Abdul rashid, Nazre & Othman, Md & Johan, Rasyidi & Sidek, Salman. (2019). Cisco Packet Tracer Simulation as Effective Pedagogy in Computer Networking Course. International Journal of Interactive Mobile Technologies (iJIM). 13. 4.
Kumar, Anil & Ed, Kavyashree. (2022). Study on Network Simulation using Cisco Packet Tracer.
Lim, Francis. (2016). A Review-Analysis of Network Topologies for Microenterprises. 175-180. 10.14257/astl.2016.135.42.
Ayad Hameed Mousa, Nibras Talib Mohammed, Enas Ali Mohammed; EFCNT: An evaluation framework for computer's network topologies. AIP Conf. Proc. 22 August 2019; 2144 (1): 050010.
Klimo, Martin & Kovacikova, Tatiana & Segeč, Pavel. (2004). Selected issues of IP telephony. Komunikacie. 6. 63-70. 10.26552/com.C.2004.4.63-70.
Pourqasem, Javad & Karimi, Sina & Edalatpanah, S A.. (2012). A survey of voice over internet protocol (VOIP) technology. International Computer Mathematical Science and Applications. 6.
Sunil Kumar, Mr. Kratika Sharma, 2016, A Review Paper on Voice over Internet Protocol, International Journal Of Engineering Research & Technology (IJERT) V-Impact – 2016 (Volume 4 – Issue 32)
Bokonda, Loola & Khadija, Ouazzani Touhami & Souissi, Nissrine. (2020). Predictive analysis using machine learning: Review of trends and methods. 10.1109/ISAECT50560.2020.9523703.
Yogesh, Singh & Bhatia, Pradeep & Sangwan, Om. (2007). A REVIEW OF STUDIES ON MACHINE LEARNING TECHNIQUES. International Journal of Computer Science and Security. 1.
Khan, N.U.; Wan, W.; Riaz, R.; Jiang, S.; Wang, X. Prediction and Classification of User Activities Using Machine Learning Models from Location-Based Social Network Data. Appl. Sci. 2023, 13, 3517.
Tudoroiu, A.. (2023). Study of Different Network Topologies Using Cisco Packet Tracer. The Scientific Bulletin of Electrical Engineering Faculty. 23. 31-33. 10.2478/sb eef-2023-0005.
Y Sreeraman, et al. "APMWMM: Approach to Probe Malware on Windows Machine using Machine Learning." 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC). IEEE, 2022.
KK Sushanth, et al. "DPMLT: Diabetes prediction using machine learning techniques." 2022 International Conference on Electronics and Renewable Systems (ICEARS). IEEE, 2022.
M Loukya, et al. "Comparative Analysis of Customer Loan Approval Prediction using Machine Learning Algorithms." 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS). IEEE, 2022.
CP Lakshmi, et al. "A review of Machine Learning techniques for breast cancer diagnosis in medical applications." 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, 2019.
Saibaba, Ch MH, et al. "Prediction of Public Mental Health by using Machine Learning Algorithms." 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS). IEEE, 2022.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.