The design of an extended and generic authentication, authorization, accounting, and charging architecture (AAAC Arch.) has been performed within the IST project MobyDick. In addition, this architecture has been imple...
详细信息
The design of an extended and generic authentication, authorization, accounting, and charging architecture (AAAC Arch.) has been performed within the IST project MobyDick. In addition, this architecture has been implemented to address MobyDick's main objective: to facilitate the deployment of a ubiquitous mobile IPv6-based, quality-of-service (QoS)-aware infrastructure through a flexible and evolutionary AAAC Architecture. While the AAAC Arch. is based on the DIAMETER protocol, basic concepts developed cover session and services models, user profiles to allow for user mobility and QoS-aware authorization. Based on those basic building blocks for the extended AAAC Arch., the implementation of user registration, service authorization, metering, accounting, charging, and auditing is discussed. The paper closes with the presentation of the two trial sites used and their testbeds.
AKQUI, a tool for passive network traffic measurement, consists of dedicated hardware measurement equipment and a software framework for traffic analysis. The purpose of AKQUI is to gather network traffic over a long ...
详细信息
AKQUI, a tool for passive network traffic measurement, consists of dedicated hardware measurement equipment and a software framework for traffic analysis. The purpose of AKQUI is to gather network traffic over a long period of time and to extensively analyze the recorded traffic. It is well suited for the use in telecom network laboratories. An overview of the hardware and software of AKQUI is given, and then some measurement results obtained from recording the traffic of a multimedia (audio and video) teleteaching lecture are presented.
Path prediction is currently being considered for use in the context of mobile and wireless computing toward more efficient network resource management schemes. Path prediction allows the network and services to furth...
详细信息
Path prediction is currently being considered for use in the context of mobile and wireless computing toward more efficient network resource management schemes. Path prediction allows the network and services to further enhance the quality of service levels the user enjoys. Such mechanisms are mostly meaningful in infrastructures like wireless LANs. In this article we present a path prediction algorithm that exploits the machine learning algorithm of learning automata. The decision of the learning automaton is driven by the movement patterns of a single user but is also affected by the aggregated patterns demonstrated by all users. Simulations of the algorithm, performed using the Realistic Mobility Pattern Generator, show increased prediction accuracy.
We present a token-based accounting mechanism that alleviates the free riding problem in P2P networks. The approach is complemented by distributed pricing as a flexible and viable scheme to incite users to share valua...
详细信息
We present a token-based accounting mechanism that alleviates the free riding problem in P2P networks. The approach is complemented by distributed pricing as a flexible and viable scheme to incite users to share valuable content and to efficiently balance requests among all peers based on economic decisions.
SHARK is a novel concept and middleware service for search in peer-to-peer (P2P) networks. Rather than flooding a network like Gnutella or imposing numerical IDs on objects like distributed hash tables, it is based on...
详细信息
SHARK is a novel concept and middleware service for search in peer-to-peer (P2P) networks. Rather than flooding a network like Gnutella or imposing numerical IDs on objects like distributed hash tables, it is based on directed routing of keywords in a multidimensional redundant metadata hierarchy. SHARK arranges nodes and objects in the network and in semantic clusters. In spite of its rich keyword search capabilities, it achieves a high degree of scalability, outperforming random networks by several orders of magnitude. It can easily be adopted for applications as diverse as file sharing, P2P trading, or distributed expert and knowledge market places.
There is an emerging need for content management systems (CMS) enabling collaborative development, administration, and distribution of content over the Internet. Many CMS solutions are currently based on a client/serv...
详细信息
There is an emerging need for content management systems (CMS) enabling collaborative development, administration, and distribution of content over the Internet. Many CMS solutions are currently based on a client/server architecture with a central server for storage and management. While such centralized systems simplify management with respect to data consistency, security, and accountability, they lack scalability and reliability. Pure peer-to-peer (P2P) network architectures are based on the assumption that no central server exists and has to be relied on, since peers collaboratively provide content and core system functionality that would be provided otherwise by a single server. A P2P-based CMS scales much better, since available system resources increase linearly with the number of participating peers. In addition, the availability of the system can be raised without much effort, by increasing the redundancy of content across the peer.
Developments in VLSI technologies create the possibility of hosting several independent (sub) systems in a single chip. There is a need to share a number of resources, especially off-chip resources, which creates new ...
详细信息
Developments in VLSI technologies create the possibility of hosting several independent (sub) systems in a single chip. There is a need to share a number of resources, especially off-chip resources, which creates new constraints in the design process. Although performance is still a key constraint, sharing implies that secure access to those resources and QoS guarantees are needed. In this paper, an architecture is presented that achieves the goals listed above. The Embedded Hardware Manager acts as a middleware between the applications and the resources, taking the role of resource manager and security agent. The results show that it can prevent resource misuse and undue information peeking or even altering while maintaining individual QoS guarantees. At the same time, high performance is still achieved.
暂无评论