The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a scenario where service reliability is achieved through multiple providers, it is crucial to detect faulty equipment. Such a scenario is the IP Multimedia Core Network Subsystem (IMS). where service is provided by multiple instances of the Application Server (AS). These servers may reside on remote locations, and network link between the Call Session Control Function (CSCF) and AS may become broken...
Presence is one promising value-added service that enriches traditional telecom services and is well accepted in the Web environment. It is also an essential part of Next Generation Networks. The presence service runs on top of SIP and therefore causes a lot of traffic and processing overhead. Furthermore, presence service suffers under scaling issues and the traffic caused by presence is supposed...
In recent years, the networking community has put a significant research effort in identifying new ways to distribute content to multiple users in a better-than-unicast manner. Scalable delivery is more important now video is the dominant traffic type and further growth is expected. To make content distribution scalable, in-network optimization functions are needed such as caches. The established...
We present sensing mechanisms that can be used for implicit high-load and overload detection in SIP networks. By means of measurements and simulations we highlight the characteristics of SIP proxy servers for different load situations and using different transport protocols. Each protocol yields to distinctive patterns that encourage deriving an algorithm that is able to estimate a downstream server's...
Today's laptops and mobile terminals are equipped with several network interfaces belonging to different access technologies. Users can benefit from multi-homing to access network services anywhere, at any time and from any network. Multipath TCP (MPTCP) is a modified version of Transmission Control Protocol (TCP) which allows a TCP connection to simultaneously send data over multiple paths. One of...
In today's Internet age, web-based applications are an extremely logical way to disseminate, update, and visualize information. Our modern wired infrastructure and high-speed wireless access points make it possible to access high-bandwidth demanding applications from nearly everywhere. However, in places where infrastructure does not exist, and where information needs to be disseminated over areas...
Transport protocol design for supporting smart metering applications poses certain challenges because of unique issues. The issues stem from the need to deploy a significantly large number of meters (e.g., hundreds of thousands). Each meter generates small reports at a fixed low rate. All meters' reports are destined to the same data collection center and require reliable end-to-end delivery. Although...
We consider the novel problem of oblivious retrieval of images from an outsourced database server. Due to the complexity of managing images, in modern enterprise networks, individual users and organizations are using the services of external servers to store the images. The problem is to query and retrieve images while simultaneously satisfying the criteria of both the user and the database privacy...
This research demo describes the implementation of a mobile AR-supported educational course application, AR Circuit, which is designed to promote the effectiveness of remote collaborative learning for physics. The application employs the TCP/IP protocol enabling multiplayer functionality in a mobile AR environment. One phone acts as the server and the other acts as the client. The server phone will...
SCTP is a reliable transport protocol that supports redundant paths by multiaddressing. Dynamic reconfiguration of IP addresses of an existing association is also supported by an extension called the ADD-IP feature. SCTP tries to use of all available addresses on both end hosts, but among them, there are addresses that should preferably not be used by certain policies or that are known to be unusable...
It is necessary to monitor and control remotely the devices in scattered unattended machine rooms. The remote monitoring and controlling system are designed based on SNMP and TCP/IP, which uses mainly existing intranet. Following the introductions of SNMP and TCP/IP, overview design and software design of the system are presented. The system may achieve the management of unattended machine rooms and...
Covert channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, intended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel,...
Piecewise polynomials have been used to visually link and classify network traffic. The advantage of using piecewise polynomials to approximate traffic is that significantly less storage space is required when compared to traditional packet captures. However, when representing discrete data with continuous approximations, error is introduced. We analyze this error through the creation and examination...
Electronic document transfer is a key operation in many of today's most important applications (workflow, e-commerce, etc.). Each of these applications requires different security properties and constraints. Numerous communication protocols have been designed offering a set of security properties through the use of cryptographic tools. However, there is no clear match between the tools used and security...
Mobile TV services are being actively developed for a variety of last hop, broadband wireless technologies. Application layer error control mechanisms such as Broadband Video Streaming seek to reduce packet loss from raw UDP transport. This paper goes further than existing streaming protocols by integrating source-coded error resilience through data-partitioning and intra-refresh macroblocks with...
As migration to IPv6 occurs slowly, IPv4 and IPv6 hosts will coexist for many years. We consider a specific scenario where the legacy IPv4 systems can not be upgraded and also the new systems are IPv6. The mix of IPv4 and IPv6 machines exist in the same network and both need to interoperate. We propose a novel Translator called SBIIT (Socket identifier Based IPv4/IPv6 Translator), which is based on...
The paper is about mobile Stream Control Transmission Protocol (mSCTP) and the problems related to simultaneous mobility. Simultaneous mobility is when the both endpoints of a communication session are mobile and they move at about the same time. mSCTP works well in the case of non-simultaneous mobility where the SCTP association is established between a mobile endpoint and a stationary one. In the...
We analyze TCP-controlled bulk file transfers in a single station WLAN with nonzero propagation delay between the file server and the WLAN. Our approach is to model the flow of packets as a closed queueing network (BCMP network) with 3 service centres, one each for the Access Point and the STA, and the third for the propagation delay. The service rates of the first two are obtained by analyzing the...
Broadband Video Streaming (BVS) with selective retransmission trades a reduced but acceptable video quality during IEEE 802.16e hard handoff (HHO) for improved end-to-end latencies. Both forms of BVS promise better video quality with an HHO than UDP transport or traditional congestion-controlled streaming.
Nowadays, most Online Judge is based on Windows of J2EE, but in this article, introducing the distributed OJ base on Linux which runs the program in the child process and controls the child process by farther process calling function pstrace. The fact is that SOJ is more efficient and secure than others before.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.