Currently, Peer to peer (P2P) technology has dramatically transformed the landscape of the Internet traffic, which attracts researchers to do more research on the deployment of P2P in heterogeneous networks. Current G...
详细信息
Currently, Peer to peer (P2P) technology has dramatically transformed the landscape of the Internet traffic, which attracts researchers to do more research on the deployment of P2P in heterogeneous networks. Current GSM/GPRS system cannot support real P2P, because it does not allow mobile terminal to get a fixed ip address, but in 3G it is possible. On the other hand ipmultimediasubsystem (IMS) is a key technology of 3G; it uses Sip to control sessions of higher layer services and has ability of multiple access network combination. We are currently working on SARACEN, one of the FP7 project in Europe which is based on multimedia communication. The main goal of the SARACEN project is to research and develop a platform, over which distribution of multimedia streams can be supported through innovative techniques, both as regards media encoding, but also as regards media distribution using P2P[1]. In media distribution, we found few challenges with P2P like piracy, security, content delivery time, bandwidth management etc. In this paper we are going to propose a new environment with collaboration of P4P (Provider Portal for P2P) and IMS. This proposed architecture consists of P2PSip, DRM, AAA, iTracker, Sip AS, Gateway and other components. This architecture is not only for our project but also for general purpose to resolve the p2p challenges in heterogeneous environment.
With the development of World Wide Web, more and more non-PC devices are required to networking. So embedded web servers are needed and they have been used in multitude of embedded applications. With them the remote m...
详细信息
ISBN:
(纸本)9781612847719
With the development of World Wide Web, more and more non-PC devices are required to networking. So embedded web servers are needed and they have been used in multitude of embedded applications. With them the remote maintenance and diagnosis of components and systems by Web browsers via the Internet or a local Intranet has a very weight for many development projects. In this paper the architecture of a EWS is presented and its implementation is also introduced in detail. Finally, a real application example shows the performance of this EWS.
MECS, the multimedia environmental control system, is a Windows-based tool for connection management. It carries out as an application interface to a wireless network packet communication system, in which it is used t...
详细信息
MECS, the multimedia environmental control system, is a Windows-based tool for connection management. It carries out as an application interface to a wireless network packet communication system, in which it is used to provide local and remote audio and video control, and to interact with the other RS232/infrared-oriented devices that support shared controlling processes. In this paper we document the design, operation and continued evolution of MECS. We present MECS's general architecture model, its connection control protocol and its relationship to other system components.
Despite the efforts of security communities, the gap between the available protection against cyber-attacks and the number of successful attacks remains significant. The need for new countermeasures is clear and urgen...
详细信息
Despite the efforts of security communities, the gap between the available protection against cyber-attacks and the number of successful attacks remains significant. The need for new countermeasures is clear and urgent as cyber-attacks are more than ever capable of causing loss of human life; destroying the environment, and causing a high level of disruption to critical infrastructures. The impact of cyber-attacks is sometimes comparable to the impact of traditional military actions. However, the lack of understanding of the scope of attacks and how they operate could lead to unsuccessful protection mechanisms. We have analysed attacks targeting IT and business network, and Critical infrastructure, as a result we present four levels of visibility of attacks that need to be considered when designing or implementing security mechanisms. In our discussion of these four levels of visibility of attacks, we particularly focus on one level where malicious users actions are direct threats to the targeted system but yet not visible by the targeted systems. We conclude by presenting our detection and mitigation framework concept.
The recent emergence of Cloud Computing in the IT world has opened doors for new revenue streams and business models. The movement towards a service-oriented architecture and an all-ip based communication system has l...
详细信息
ISBN:
(纸本)9781457719356
The recent emergence of Cloud Computing in the IT world has opened doors for new revenue streams and business models. The movement towards a service-oriented architecture and an all-ip based communication system has led to the ipmultimediasubsystem (IMS) being accepted as the Next Generation Networks (NGN) service control-provisioning platform. The Telco 2.0 domain can benefit from service enhancement and Web 2.0 technologies such as Cloud Computing. This can be achieved by opening gateways and APIs guarding rich underlying network resources (e.g. location) to 3 rd Party ASPs, thus adopting the delivery of Network as a Service (NaaS). Telco services are faced with opportunities to make use of powerful computational power and storage services offered by cloud environments to accelerate business-processing speeds.
Because of the variety of types of collaboration services used in enterprises today, there is difficulty in integrating related work threads from different collaboration environments. Each collaboration tool differs i...
详细信息
Because of the variety of types of collaboration services used in enterprises today, there is difficulty in integrating related work threads from different collaboration environments. Each collaboration tool differs in storage model, APIs, content organization, content addressing, content formats, user authentication, and user interface. Nevertheless users prefer to be able to choose which collaboration tool they use for a given interaction, and over the course of long-term collaboration, will typically use a variety of tools, including email, instant messages, wikis, blogs, web conferences, and shared documents. The solution presented here is to provide a federated integration of these different collaboration tools to make content access and transfer straight forward between different systems. Additionally, we enable the user to achieve this federation by working directly in the client application of their choice; we illustrate this with plug-ins for MS Outlook, Internet Explorer and Skype. Our architecture integrates both desktop and server-centric tools. Additionally it is now possible to use hosted collaboration services in the cloud. This further complicates the ability to federate collaboration tools because of requirements to protect enterprise information and information flows. We present an architecture to address the federation of cloud-based collaboration services.
Services such as multimedia, Voip, video-conferencing, social networking and others impose new requirements on providers and constraints on network designers. Fair Queueing algorithms like CSFQ or Stochastic Fair BLUE...
详细信息
Services such as multimedia, Voip, video-conferencing, social networking and others impose new requirements on providers and constraints on network designers. Fair Queueing algorithms like CSFQ or Stochastic Fair BLUE have been used to improve the quality of the packet transmission. Such mechanisms usually supervise the bandwidth consumption per-flow and become helpless in the presence of P2P traffic. In quest for high quality transmission, multimediaapplications are designed to use more and more P2P paradigms. As P2P traffic is also exposed to congestion, few works address congestion control in mixed traditional ip (for short called ip traffic) and P2P traffic. In this paper, we propose a model flow for the mixture of the two and present a principle and a method based on per-subscriber flow control, for congestion control. An architecture based on the Token-Based Traffic Control for P2P applications is introduced. The token resource consumed by each subscriber is counted and controls for both core and edge routers are generated in the case of ip and P2P traffic. The traffic is measured at core routers and the measurement data is conveyed to edge routers. They label the Token-Level on incoming packets according to the congestion index, and police the total input token of each P2P subscriber. Simulations results and the analysis of the impact on the performance of this approach on some P2P experiments are given.
This paper shows that a reasonably better network bandwidth utilization in ipTV or general video delivery networks can be obtained with an automated RSVP-TE LSP reservation mechanism and by adding some video-awareness...
详细信息
This paper shows that a reasonably better network bandwidth utilization in ipTV or general video delivery networks can be obtained with an automated RSVP-TE LSP reservation mechanism and by adding some video-awareness “intelligence” to certain Label Switching Routers which are part of the service provider's MPLS core network. We have implemented this intelligence on Juniper routers taking advantage of the JUNOS SDK, deployed the solution on a network test bed, and performed some measurements to validate the previous statement.
ipv6 over low-power wireless personal area networks(6LoWPAN),composed by large number of constrained devices with wireless communication ability,are becoming more and more important,not only because their reduced cost...
详细信息
ipv6 over low-power wireless personal area networks(6LoWPAN),composed by large number of constrained devices with wireless communication ability,are becoming more and more important,not only because their reduced cost but also a lot of real world applications and their ability to connect to ip *** devices in 6LoWPAN are expected to be deployed in extremely large numbers and they are expected to have limited compute,display and input capabilities,it makes network management critical in *** Simple Network Management Protocol(SNMP)is a widely used application protocol for network management and information *** this paper,a network management architecture of 6LoWPAN based on SNMP is designed,including SNMP agents for constrained devices supporting IEEE 802.15.4 Radios and Contiki Embedded Operating System and SNMP manager in real ipv6 network.
The provision of ipmultimediasubsystem (IMS) introduces important advantages for users of 3G WLAN networks. However, a multi pass authentication procedure needs to be performed before accessing the IMS, resulting in...
详细信息
ISBN:
(纸本)9781457702495
The provision of ipmultimediasubsystem (IMS) introduces important advantages for users of 3G WLAN networks. However, a multi pass authentication procedure needs to be performed before accessing the IMS, resulting in added overhead and quality of service (QoS) degradation, which deters service providers from adopting the IMS model. The problem is further compounded when the user moves from one Wireless Local Area Network (WLAN) domain into another, requiring that the authentication procedure be constantly repeated. To mitigate this problem, we present a lightweight, robust, and architecture-compatible IMS authentication protocol that implements a one-pass IMS procedure by promoting efficient key re-use for a mobile user. We derive an analytical model of our proposed scheme, and conduct numerical analysis that reveal a user authentication delay decrease of more than 50 percent.
暂无评论