The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Enterprises are physically distributed over different locations like continents, countries, plants, divisions, laboratories, departments, work-groups and so on. However, logically an enterprise can function as one unit of work. To support such logical unity among the dispersed objects, a generic framework of distributed computing is necessary. As there is no global clock available to synchronize the...
To relieve the end user of the configuration burden that arises when new devices are installed in the (home) network, service discovery protocols (SDP) have been devised. These enable automatic discovery of the services these devices offer. Yet, the existing SDPs are not compatible or interoperable. In this paper, we propose a framework that automatically translates between the various SDPs. We also...
Delay/disruption tolerant networking (DTN) has recently been proposed as a very effective solution to cope with the problems posed by challenged networks (long delays, disruptions, absence of end-to-end connectivity, etc.). In order to assess DTN performance in such scenarios, it is essential to be able to rely on specific evaluation tools. In this paper we present DTNperf_2, which is a client-server...
Web services technology is considered a key enabler for NEC. However, existing Web service protocols are designed for use over the Internet, and cannot necessarily be directly applied in military tactical networks where bandwidths are low and communication disruptions are frequent. In this paper we present a novel prototype proxy solution which adds both delay and disruption tolerance to SOAP. The...
As the number of mobile users increases, and cell phones become more powerful, delivering multimedia content to them using a centralized infrastructure becomes both expensive and inadequate. Here we study an alternative solution, which leverages local dedicated caches on these devices to opportunistically fulfill other user requests, in a peer-to-peer manner. The problem we study is that of choosing...
This paper, in accordance with the authors' continuing research investigates the effect of adding extra servers in Session Initiation Protocol (SIP) signaling network on session setup delay in the IP Multimedia Subsystem (IMS). The effect of applying more than one server in reducing waiting time in each of the nodes of the system is previously investigated by the authors in and applying more servers...
Performance of transport control protocol (TCP) in wireless mesh networks (WMNs) has been a topic of intense research interest. The interest is aimed to provide high-speed TCP connectivity on the wireless mesh backbone that acts as an extension to the wired infrastructure of the Internet. As an effort to actualize this aim, we propose a framework incorporating orthogonal radio channels and novel mechanisms...
We propose a novel tag selection algorithm to improve the efficiency of tag arbitration in RFID systems. Based on the probability that a given tag is located in the sensing range of the reader, our algorithm involves two steps. First, tags with higher probabilities are selected and directly arbitrated by their IDs, in order to eliminate the collisions caused by multiple tag replies and reduce the...
Most current web application use HTTP (Hyper Text Transfer Protocol) and TCP (Transmission Control Protocol) to retrieve objects from the Internet. SCTP (Stream Control Transmission Protocol) is recently proposed transport protocol with congestion control mechanism similar to that of TCP. Waiting delay is an important performance criterion for when transferring web object over the Internet. In this...
To determine the potential signaling traffic reductions, the session establishment procedures are investigated. The investigation shows that, the S-CSCF (Serving Call Session Control Function) is the major bottleneck in IMS (IP Multimedia Subsystem) and the existing 3GPP (the 3rd Generation Partnership Project) Service Triggering Algorithm (3GPP STA) increases largely the end to end session setup...
This paper in accordance with the authors' previous work, investigates the effect of adding extra servers in Session Initiation Protocol (SIP) signaling network on session setup in the Ip Multimedia Subsystem (IMS). The delay analysis is explored by describing the SIP signaling traffic with M/M/r notation. SIP servers overload problem is addressed and the effect of adding servers will be investigated...
IP multicast is a bandwidth efficient technology that can be utilised for one-to-many or many-to-many communications via satellite for aeronautical passenger communication. An AAA framework for multicast services was presented. The framework combines the GDOI multicast security protocol with AAA functionality enabling network providers to control access to multicast sessions and account the usage...
Peer-to-peer (P2P) live video streaming systems have recently received significant attention, with commercial deployment gaining increased popularity in the Internet. It is evident from our experiences with real-world systems that, it is not uncommon to have hundreds of thousands of users trying to join a program in the first few minutes of a live broadcast. This phenomenon, unique in live streaming...
Reliable Server Pooling (RSerPool) is the IETF's new standard for a common server redundancy and session failover framework to support availability-critical applications. Server pools are maintained by redundant management components denoted as registrars. These registrars monitor the availability of servers in the pool and remove them in case of failure. Furthermore, they synchronize their view of...
IP-based Wireless Sensor Networks (IP-WSN) are envisioned to play an important role in the realization of pervasive environments. Comprised of hundreds or even thousands of nodes, these networks may never undergo pre-deployment address configuration. The stateless autoconfiguration capability is therefore essential to the spontaneity of such pervasive networks. Recently, several address autoconfiguration...
Autonomous systems should deal with many and various data coming from the environment. In order to be able to process efficient and quick on-line and real-time analysis, it is necessary to have the capability of control on the input event streams in order to focus the processing mainly on the relevant data. The protocol introduced in this paper is devoted to give control and focus capabilities to...
Currently, most research and educational backbone networks consist of 10 G-bps network and some hosts connect to this backbone with 10-Gbps. When the hosts try to transfer data with high speed, network often experiences congestion at the backbone due to a confliction with commodity traffic. In such situations, queue size at the bottleneck point has an impact on the throughput performance of TCP data...
Modular design is a common approach for dealing with complex tasks in modern cryptology. The critical of this approach is to design a secure hybrid protocol. In this paper, we study password-based key exchange in the three-party setting within the UC framework and design a hybrid protocol that UC-securely realizes such task. Next we partition the task into two sub-tasks, three-party key distribution...
Interdomain Traffic Engineering (TE) across domains employing Path Computation Elements should allow a source domain to select a good AS path, i.e. one likely to allow the actual setup of an interdomain tunnel. This is impossible if the AS path is computed online during path setup (which happens, e.g., in per-domain tunnel setup). On the other hand, the routes that a source domain learns from BGP...
Motivated by the amount of short-lived TCP traffic due to interactive applications like web browsing, we propose two schemes to reduce the download time of TCP flows. Both schemes explicitly try to overcome the long delay suffered when TCP has to recover from the loss of the last data segment in a flow, loss for which Fast Retransmit cannot be triggered. The first scheme consists in transmitting twice...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.