Search results for "computer.internet_protocol"

showing 10 items of 168 documents

An Integrated Multi-service Software Simulation Platform: SIMPSONS Architecture

2005

This paper describes SIMPSONS (SIp and MPls Simulations On NS-2), which is a software platform for simulating multiple network scenarios, such as Telephony Over IP (TOIP), and multi-services networks extending the functionalities of Network Simulator NS-2. The innovative aspects of SIMPSONS is the complete integration of control protocols and traffic engineering mechanisms inside the same simulation tool. In fact, next generation networks must meet basically two fundamental requirements: support of Quality of Service (QoS) and Traffic Engineering (TE) functionalities. SIMPSONS is able to simulate DiffServ, MPLS, OSPF and SIP and their interaction in everything TOIP scenario. So with this po…

Service (systems architecture)Session Initiation Protocolbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOpen Shortest Path FirstMultiprotocol Label SwitchingAdmission controllaw.inventionNetwork simulationTraffic engineeringlawNext-generation networkInternet ProtocolTelephonyStream Control Transmission ProtocolSoftware architecturebusinesscomputerComputer network
researchProduct

Visualization of EDI messages

2003

Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has become more important and their tasks more difficult. Current development activities for supporting the utilization of XML in electronic commerce focuses on message standardization and specification of common business architectures, processes, and web practices. A need to visualize EDI messages in different contexts to human readers has received insufficient attention in ongoing activities. In this paper we discuss problems and approaches related to the visualization of EDI messages in XML format. An idea of a standar…

Service (systems architecture)Third partyMultimediaStandardizationStyle sheetComputer scienceXSLcomputer.internet_protocolcomputer.software_genreVisualizationWorld Wide WebComputingMethodologies_DOCUMENTANDTEXTPROCESSINGcomputerXMLcomputer.programming_languageElectronic data interchangeProceedings of the 5th international conference on Electronic commerce - ICEC '03
researchProduct

Model-based approaches for the development of event-based systems using embedded services

2010

This paper presents a development use case of event-based system using (embedded) services specified in UPnP specification. Although we use only UPnP, we considered that the use case is also applicable for other (XML-based) service description technologies.

Service (systems architecture)business.industrycomputer.internet_protocolComputer scienceEvent basedComputerApplications_COMPUTERSINOTHERSYSTEMSDevelopment (topology)Home automationServerEmbedded systemUniversal Plug and PlayThe InternetSoftware engineeringbusinesscomputerXML2010 2nd International Conference on Computer Technology and Development
researchProduct

Inter-provider AAA and Billing of VoIP Users with Token-based Method

2007

With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …

Session Initiation ProtocolAccess networkbusiness.product_categoryVoice over IPbusiness.industrycomputer.internet_protocolComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSService providerComputer securitycomputer.software_genreSecurity Assertion Markup LanguageInternet accessThe InternetRoamingbusinesscomputerComputer network2007 First International Global Information Infrastructure Symposium
researchProduct

Secure interworking with P2PSIP and IMS

2010

In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3rd party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement this system model and analyze it in several aspects: number of hops and delay, trust improvement and protection against malicious or compromised intermediate peers. We conclude that the proposed architecture is feasible and improves security. As far as we know our research is the first study …

Session Initiation ProtocolApplication serverbusiness.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSIP Multimedia Subsystemcomputer.software_genreSystem modelServerChord (peer-to-peer)businessSubjective logiccomputerInternetworkingComputer network
researchProduct

Trust enhancement of P2PSIP communication systems

2011

Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, d…

Session Initiation ProtocolComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOverlayComputer securitycomputer.software_genreCommunications systemComputer Science ApplicationsDistributed hash tableNAT traversalConfidentialitySubjective logicChord (peer-to-peer)computerInternational Journal of Internet Technology and Secured Transactions
researchProduct

Transport service for session initiation protocol in SIP-T scenarios

2005

The traditional telephone service has undergone deep changes in the years concerning the techniques of commutation and signaling. Today, public switched telecom networks (PSTNs) and private integrated services networks (PINSs) are strongly directed to adopt IP-based backbone. If it is possible to transfer the voice on packet switching network, in such reliable way, using voice over IP (VoIP) techniques, there is not still a valid alternative to the signaling systems, reliable and unfailing, like signaling system n.7 (SST). Session initiation protocol (SIP) seems to be the best candidate. SIP is an application layer signaling protocol and the problem remains still opened for what it concerns…

Session Initiation ProtocolVoice over IPbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceSIP trunkingSignaling protocolIP tunnelInternet protocol suiteNext-generation networkbusinesscomputerComputer networkAPCC/MDMC '04. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceeding
researchProduct

Analysis and Simulation of the Signaling Protocols for the DiffServ Framework

2006

This paper considers signaling protocols for the DiffServ QoS framework. Originally, DiffServ had no standardized signaling solution, which resulted in the static configuration for the DiffServ domain. However, the dynamic allocation of resources within the domain allows to ensure the per-flow QoS guarantees and achieve better performance. At the moment, several signaling solutions for DiffServ framework are available. Thus, it is crucial to analyse these solutions and interconnections between them. In particular, the RSVP, aggregated RSVP, GIST, COPS, and SIP protocols will be considered. The simulation comprises several scenarios that present that the dynamic allocation of resource within…

Session Initiation Protocolbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlDomain (software engineering)Signaling protocolCore routerResource allocationResource managementbusinesscomputerComputer network
researchProduct

A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing

2021

Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEvent (computing)business.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCrowdsourcingComputer securitycomputer.software_genreDomain (software engineering)Random forestCrowdsourcing; Proximity Graph; Sybil detection; Trust and Truthfulness; Vehicular Social NetworkCrowdsourcing Proximity Graph Sybil detection Trust and Truthfulness Vehicular Social NetworkGraph (abstract data type)RADIUSbusinesscomputer
researchProduct

An Innovative Statistical Tool for Automatic OWL-ERD Alignment

2016

Aligning two representations of the same domain with different expressiveness is a crucial topic in nowadays semantic web and big data research. OWL ontologies and Entity Relation Diagrams are the most widespread representations whose alignment allows for semantic data access via ontology interface, and ontology storing techniques. The term ""alignment" encompasses three different processes: OWL-to-ERD and ERD-to-OWL transformation, and OWL-ERD mapping. In this paper an innovative statistical tool is presented to accomplish all the three aspects of the alignment. The main idea relies on the use of a HMM to estimate the most likely ERD sentence that is stated in a suitable grammar, and corre…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalRelation (database)computer.internet_protocolComputer scienceSemantic Web Rule LanguageComputer Science::Information Retrieval010401 analytical chemistry020206 networking & telecommunications02 engineering and technologyOntology (information science)SemanticsSemantic data model01 natural sciencesOWL-S0104 chemical sciences0202 electrical engineering electronic engineering information engineeringHidden Markov models Knowledge representation languages Ontologies (artificial intelligence) Semantic Web Databases OWL ERDSemantic WebcomputerSentence2016 IEEE Tenth International Conference on Semantic Computing (ICSC)
researchProduct