Search results for "Computer network"

showing 10 items of 1634 documents

Fuzzy-neural Web switch supporting differentiated service

2006

New designs of the Web switches must incorporate a client-and-server-aware adaptive dispatching algorithm to be able to optimize multiple static and dynamic services providing quality of service and service differentiation. This paper presents such an algorithm called FNRD (Fuzzy-Neural Request Distribution) which operates at layer-7 of the OSI protocol stack. This algorithm assigns each incoming request to the server with the least expected response time estimated using the fuzzy approach. FNRD has ability for learning and adaptation by means of a neural network feedback loop. We demonstrate through the simulations that our dispatching policy is more effective than state-of-the-art layer-7…

Service qualitybusiness.industryComputer scienceQuality of serviceDifferentiated servicecomputer.software_genreFuzzy logicProtocol stackThe InternetArtificial intelligenceWeb servicebusinesscomputerComputer network
researchProduct

Inter-provider AAA and Billing of VoIP Users with Token-based Method

2007

With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …

Session Initiation ProtocolAccess networkbusiness.product_categoryVoice over IPbusiness.industrycomputer.internet_protocolComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSService providerComputer securitycomputer.software_genreSecurity Assertion Markup LanguageInternet accessThe InternetRoamingbusinesscomputerComputer network2007 First International Global Information Infrastructure Symposium
researchProduct

Secure interworking with P2PSIP and IMS

2010

In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3rd party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement this system model and analyze it in several aspects: number of hops and delay, trust improvement and protection against malicious or compromised intermediate peers. We conclude that the proposed architecture is feasible and improves security. As far as we know our research is the first study …

Session Initiation ProtocolApplication serverbusiness.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSIP Multimedia Subsystemcomputer.software_genreSystem modelServerChord (peer-to-peer)businessSubjective logiccomputerInternetworkingComputer network
researchProduct

Trust enhancement of P2PSIP communication systems

2011

Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, d…

Session Initiation ProtocolComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOverlayComputer securitycomputer.software_genreCommunications systemComputer Science ApplicationsDistributed hash tableNAT traversalConfidentialitySubjective logicChord (peer-to-peer)computerInternational Journal of Internet Technology and Secured Transactions
researchProduct

Transport service for session initiation protocol in SIP-T scenarios

2005

The traditional telephone service has undergone deep changes in the years concerning the techniques of commutation and signaling. Today, public switched telecom networks (PSTNs) and private integrated services networks (PINSs) are strongly directed to adopt IP-based backbone. If it is possible to transfer the voice on packet switching network, in such reliable way, using voice over IP (VoIP) techniques, there is not still a valid alternative to the signaling systems, reliable and unfailing, like signaling system n.7 (SST). Session initiation protocol (SIP) seems to be the best candidate. SIP is an application layer signaling protocol and the problem remains still opened for what it concerns…

Session Initiation ProtocolVoice over IPbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceSIP trunkingSignaling protocolIP tunnelInternet protocol suiteNext-generation networkbusinesscomputerComputer networkAPCC/MDMC '04. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceeding
researchProduct

Analysis and Simulation of the Signaling Protocols for the DiffServ Framework

2006

This paper considers signaling protocols for the DiffServ QoS framework. Originally, DiffServ had no standardized signaling solution, which resulted in the static configuration for the DiffServ domain. However, the dynamic allocation of resources within the domain allows to ensure the per-flow QoS guarantees and achieve better performance. At the moment, several signaling solutions for DiffServ framework are available. Thus, it is crucial to analyse these solutions and interconnections between them. In particular, the RSVP, aggregated RSVP, GIST, COPS, and SIP protocols will be considered. The simulation comprises several scenarios that present that the dynamic allocation of resource within…

Session Initiation Protocolbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlDomain (software engineering)Signaling protocolCore routerResource allocationResource managementbusinesscomputerComputer network
researchProduct

The simulation and analysis of the revenue critierion based adaptive WFQ

2003

This paper presents the simulation and analysis of the adaptive resource allocation model, which was proposed and theoretically considered in our previous works. It relies upon the Weighted Fair Queueing (WFQ) service policy and uses the revenue criterion to adjust weights. The purpose of the proposed model is to maximize a provider's revenue and, at the same time, ensure the required Quality-of-Service (QoS) for end-users. Our previous works provided the theoretical evaluation of the proposed model and considered the single-node case only. This paper presents more realistic network scenario, which includes a set of clients and several intermediate switching nodes with the proposed model. T…

Set (abstract data type)Mathematical optimizationbusiness.industryComputer scienceQuality of serviceRevenueResource allocationTotal revenueState (computer science)businessWeighted fair queueingQueueComputer network
researchProduct

A Quantum-Inspired Classifier for Early Web Bot Detection

2022

This paper introduces a novel approach, inspired by the principles of Quantum Computing, to address web bot detection in terms of real-time classification of an incoming data stream of HTTP request headers, in order to ensure the shortest decision time with the highest accuracy. The proposed approach exploits the analogy between the intrinsic correlation of two or more particles and the dependence of each HTTP request on the preceding ones. Starting from the a-posteriori probability of each request to belong to a particular class, it is possible to assign a Qubit state representing a combination of the aforementioned probabilities for all available observations of the time series. By levera…

Settore INF/01 - InformaticaComputer Networks and Communicationsbot detectionData modelsTime series analysisearly decisionquantum-inspired computingTime measurementCorrelationCostsmultinomial classificationPredictive modelsbot detection; Correlation; Costs; Data models; early decision; multinomial classification; multivariate sequence classification; Predictive models; quantum-inspired computing; sequential classification; Task analysis; Time measurement; Time series analysis;multivariate sequence classificationTask analysisSafety Risk Reliability and Qualitybot detection; Correlation; Costs; Data models; early decision; multinomial classification; multivariate sequence classification; Predictive models; quantum-inspired computing; sequential classification; Task analysis; Time measurement; Time series analysissequential classification
researchProduct

The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks

2022

Traditional social network analysis can be generalized to model some networked systems by multilayer structures where the individual nodes develop relationships in multiple layers. A multilayer network is called multiplex if each layer shares at least one node with some other layer. In this paper, we built a unique criminal multiplex network from the pre-trial detention order by the Preliminary Investigation Judge of the Court of Messina (Sicily) issued at the end of the Montagna anti-mafia operation in 2007. Montagna focused on two families who infiltrated several economic activities through a cartel of entrepreneurs close to the Sicilian Mafia. Our network possesses three layers which sha…

Settore INF/01 - InformaticaComputer Networks and Communicationssocial networkcentralitycriminal networklayer similaritymultilayer network; social network; criminal network; layer similarity; centralitymultilayer networkFuture Internet; Volume 14; Issue 5; Pages: 123
researchProduct

Analysis of Users Behaviour from a Movie Preferences Perspective

2018

Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…

Settore INF/01 - InformaticaExploitComputer Networks and CommunicationsPerspective (graphical)020206 networking & telecommunications02 engineering and technologyHomophilyDecentralizationPopularityData scienceDecentralized Online Social NetworksData availabilityHomophilyTerm (time)Data availabilitySimilarity (psychology)0202 electrical engineering electronic engineering information engineeringDecentralized Online Social Network020201 artificial intelligence & image processingData availability; Decentralized Online Social Networks; Homophily; Computer Networks and Communications
researchProduct