The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Providing Quality of Service (QoS) and Quality of Experience (QoE) in connection with media data like audio or video is of key importance for the evolution of future packet-based networks. Especially in telecommunications, the subjective service quality as perceived by the end user depends amongst other parameters on the setup success rate as well as on the delay for session setup, which is measured...
As a main signaling protocol for multimedia sessions in the Internet, SIP (Session Initiation Protocol) introduces a retransmission mechanism to maintain the reliability for its realtime transmission. However, retransmission will make the server overload worse. Recent collapse of SIP servers due to emergencyinduced call volume indicates that the built-in SIP overload control mechanism cannot prevent...
This paper presents a modelling approach for performability evaluation of Kerberos servers which dynamically renew keys under pseudo-secure conditions in order to significantly reduce the chances of potential intruders. Since the proposed approach involves temporary interruption to link/server access, it has implications in terms of performance degradation. An analytical method is used to evaluate...
Enterprises are physically distributed over different locations like continents, countries, plants, divisions, laboratories, departments, work-groups and so on. However, logically an enterprise can function as one unit of work. To support such logical unity among the dispersed objects, a generic framework of distributed computing is necessary. As there is no global clock available to synchronize the...
We propose a novel tag selection algorithm to improve the efficiency of tag arbitration in RFID systems. Based on the probability that a given tag is located in the sensing range of the reader, our algorithm involves two steps. First, tags with higher probabilities are selected and directly arbitrated by their IDs, in order to eliminate the collisions caused by multiple tag replies and reduce the...
Most current web application use HTTP (Hyper Text Transfer Protocol) and TCP (Transmission Control Protocol) to retrieve objects from the Internet. SCTP (Stream Control Transmission Protocol) is recently proposed transport protocol with congestion control mechanism similar to that of TCP. Waiting delay is an important performance criterion for when transferring web object over the Internet. In this...
To determine the potential signaling traffic reductions, the session establishment procedures are investigated. The investigation shows that, the S-CSCF (Serving Call Session Control Function) is the major bottleneck in IMS (IP Multimedia Subsystem) and the existing 3GPP (the 3rd Generation Partnership Project) Service Triggering Algorithm (3GPP STA) increases largely the end to end session setup...
Reliable Server Pooling (RSerPool) denotes the new IETF standard for a lightweight server redundancy and session failover framework for availability-critical applications. A number of research papers have already addressed the service and pool management performance of RSerPool in general. However, the important topic of security, including the system robustness against intentional attacks, has not...
Transmission Control Protocol (TCP) is widely used transport protocol to provide reliable data delivery. It is the backbone protocol of most of the internet based applications. Importance of the TCP based applications in different networks with diverse conditions leads to the modifications and enhancements in basic TCP algorithm. In this paper, we evaluate the performance of TCP Tahoe, Reno, New Reno...
Being a fast-growing Internet application, streaming media application shares the network resources with the regular Internet traffic, and is susceptible to the existing security holes of the Internet, such as SETUP request flooding attack, session hijacking attack, TEARDOWN attack and RTP attack. In this paper, we propose a highly needed streaming media intrusion detection system. Our approach is...
The server cluster technology become more and more prevalent in the enterprise level applications, failure detection is one of the key technologies which can ensure the server cluster continue providing services. This paper introduced several types of the server cluster failure, and its design objects; we then analyzed the existed detection mechanisms, and get rid of the traditional detection enhancement...
Host resources (e.g., CPU time and buffer space) in mobile ad hoc networks must be shared between the devices own applications and networking functions, such as routing and packet forwarding on behalf of remote nodes. Previous work has ignored the performance conflicts that arise due to the need to share host resources. In this work, using both analytical and statistical-based empirical analysis,...
IMS is a core subsystem that provides multimedia services in the next generation network. The architecture of IMS specifies a series of functional entities. In order to analyze and research the performance of IMS network and services more quickly and conveniently, an IMS simulation system model based on NS2 is proposed, the design and implementation of the key issues are given. Some simulation scenarios...
To determine the potential signaling traffic reductions, the session establishment procedures were investigated. The investigation showed that, the S-CSCF (serving call session control function) is the major bottleneck in IMS (IP multimedia subsystem) network. And then the modeling of 3GPP (3rd Generation Partnership Project) service triggering algorithm (STA) in IMS was presented. The session setup...
The delivery of critical messages within delay constraints is an important criterion in the design and management of computer communication networks in the manufacturing environment. This environment is generally characterized by a large number of disparate data groups, each with their own network statistics and delivery requirements. The study and analysis of the token passing bus is of particular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.