Search results for "computer.internet_protocol"
showing 10 items of 168 documents
An Integrated Multi-service Software Simulation Platform: SIMPSONS Architecture
2005
This paper describes SIMPSONS (SIp and MPls Simulations On NS-2), which is a software platform for simulating multiple network scenarios, such as Telephony Over IP (TOIP), and multi-services networks extending the functionalities of Network Simulator NS-2. The innovative aspects of SIMPSONS is the complete integration of control protocols and traffic engineering mechanisms inside the same simulation tool. In fact, next generation networks must meet basically two fundamental requirements: support of Quality of Service (QoS) and Traffic Engineering (TE) functionalities. SIMPSONS is able to simulate DiffServ, MPLS, OSPF and SIP and their interaction in everything TOIP scenario. So with this po…
Visualization of EDI messages
2003
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has become more important and their tasks more difficult. Current development activities for supporting the utilization of XML in electronic commerce focuses on message standardization and specification of common business architectures, processes, and web practices. A need to visualize EDI messages in different contexts to human readers has received insufficient attention in ongoing activities. In this paper we discuss problems and approaches related to the visualization of EDI messages in XML format. An idea of a standar…
Model-based approaches for the development of event-based systems using embedded services
2010
This paper presents a development use case of event-based system using (embedded) services specified in UPnP specification. Although we use only UPnP, we considered that the use case is also applicable for other (XML-based) service description technologies.
Inter-provider AAA and Billing of VoIP Users with Token-based Method
2007
With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …
Secure interworking with P2PSIP and IMS
2010
In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3rd party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement this system model and analyze it in several aspects: number of hops and delay, trust improvement and protection against malicious or compromised intermediate peers. We conclude that the proposed architecture is feasible and improves security. As far as we know our research is the first study …
Trust enhancement of P2PSIP communication systems
2011
Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, d…
Transport service for session initiation protocol in SIP-T scenarios
2005
The traditional telephone service has undergone deep changes in the years concerning the techniques of commutation and signaling. Today, public switched telecom networks (PSTNs) and private integrated services networks (PINSs) are strongly directed to adopt IP-based backbone. If it is possible to transfer the voice on packet switching network, in such reliable way, using voice over IP (VoIP) techniques, there is not still a valid alternative to the signaling systems, reliable and unfailing, like signaling system n.7 (SST). Session initiation protocol (SIP) seems to be the best candidate. SIP is an application layer signaling protocol and the problem remains still opened for what it concerns…
Analysis and Simulation of the Signaling Protocols for the DiffServ Framework
2006
This paper considers signaling protocols for the DiffServ QoS framework. Originally, DiffServ had no standardized signaling solution, which resulted in the static configuration for the DiffServ domain. However, the dynamic allocation of resources within the domain allows to ensure the per-flow QoS guarantees and achieve better performance. At the moment, several signaling solutions for DiffServ framework are available. Thus, it is crucial to analyse these solutions and interconnections between them. In particular, the RSVP, aggregated RSVP, GIST, COPS, and SIP protocols will be considered. The simulation comprises several scenarios that present that the dynamic allocation of resource within…
A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing
2021
Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …
An Innovative Statistical Tool for Automatic OWL-ERD Alignment
2016
Aligning two representations of the same domain with different expressiveness is a crucial topic in nowadays semantic web and big data research. OWL ontologies and Entity Relation Diagrams are the most widespread representations whose alignment allows for semantic data access via ontology interface, and ontology storing techniques. The term ""alignment" encompasses three different processes: OWL-to-ERD and ERD-to-OWL transformation, and OWL-ERD mapping. In this paper an innovative statistical tool is presented to accomplish all the three aspects of the alignment. The main idea relies on the use of a HMM to estimate the most likely ERD sentence that is stated in a suitable grammar, and corre…