Filters








53 Hits in 3.4 sec

RELOAD/CoAP architecture with resource aggregation/disaggregation service

L. Rodrigues, J. Guerreiro, N. Correia
2016 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)  
For this purpose CoAP Usage for RELOAD, a generic selforganizing P2P overlay network service, has been proposed to be used as a lookup service, to store available resources and as a cache for sensor data  ...  M2M communication is expected to occur at a global level and for this reason federations of device networks are also expected.  ...  ACKNOWLEDGMENT This work was supported by FCT (Foundation for Science and Technology) from Portugal within CEOT (Center for Electronic, Optoelectronic and Telecommunications) and UID/MULTI/00631/2013 project  ... 
doi:10.1109/pimrc.2016.7794607 dblp:conf/pimrc/RodriguesGC16 fatcat:rq24fop6tzap3bw37uhuljk45u

Using RELOAD and CoAP for wide area sensor and actuator networking

Jouni Mäenpää, Jaime Jiménez Bolonio, Salvatore Loreto
2012 EURASIP Journal on Wireless Communications and Networking  
To integrate CoAP and RELOAD, we introduce a CoAP application usage for RELOAD.  ...  The architecture is based on combining two protocols being standardized by the Internet Engineering Task Force, REsource LOcation And Discovery (RELOAD) and Constrained Application Protocol (CoAP).  ...  The usage is similar to the SIP usage for RELOAD [14] . The CoAP usage for RELOAD will be described in more detail in Section 6.  ... 
doi:10.1186/1687-1499-2012-121 fatcat:dbclaacifzd33i5fidqx2gblqu

A trust-based strategy for addressing residual attacks in the RELOAD architecture

O. Dabbebi, R. Badonnel, O. Festor
2012 2012 IEEE International Conference on Communications (ICC)  
The RELOAD protocol defines a peer-to-peer signalling overlay designed to support these networks.  ...  We propose in this work to address these residual attacks by integrating into the RELOAD architecture a dedicated trust model coupled with prevention countermeasures.  ...  The enrolment server 1 Uniform Resource Identifier 2 REsource LOcation And Discovery affects to each node a Node-ID and public key certificates that are used to sign RELOAD messages as well as RELOAD  ... 
doi:10.1109/icc.2012.6364305 dblp:conf/icc/DabbebiBF12 fatcat:tu7p3fqcfrhgfje4umbfa7kc4u

A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP

Alexander Knauf, Gabriel Hege, Thomas C. Schmidt, Matthias Wählisch
2010 Principles, Systems and Applications of IP Telecommunications on - IPTComm '10  
We propose a P2P-signaling protocol scheme for a distributed conference control with SIP, that splits the semantic of Identifier and Locator of a SIP conference URI in a standard-compliant manner.  ...  This protocol scheme serves as further basis for a virtualization in RELOAD.  ...  The P2PSIP working group is now standardizing a signaling protocol for REsource LOcation and Discovery (RELOAD) [3] .  ... 
doi:10.1145/1941530.1941548 dblp:conf/iptcomm/KnaufHSW10 fatcat:umtcaokrhncfnjqm5qcxfh2a4y

The Session Initiation Protocol (SIP): An Evolutionary Study

Salman Abdul Baset, Vijay K. Gurbani, Alan B. Johnston, Hadriel Kaplan, Brian Rosen, Jonathan D. Rosenberg
2012 Journal of Communications  
We also provide a glimpse to the continued progression of SIP in Peer-to-Peer (P2P) networks and take a critical look at where SIP has succeeded, and more importantly, where it has failed to meet expectations  ...  Shortly after its debut as a standard in 1999, SIP was adopted by the 3rd Generation Partnership Project (3GPP) as the preferred signaling protocol for the Internet Multimedia Subsystem (IMS).  ...  ACKNOWLEDGEMENTS The authors gratefully acknowledge Henning Schulzrinne for his insights and a close reading of the manuscript.  ... 
doi:10.4304/jcm.7.2.89-105 fatcat:3j3uawgrybhrfoxncxcdixpxwq

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services [chapter]

Hui-Kai Su, Wen-Hsu Hsiao, Jian-Ting Pan, Chen-Hung Liao, Kim-Joan Chen, Chien-Min Wu
2012 Lecture Notes in Computer Science  
Thus, we proposed a multi-constraint resource search algorithm for P2P-SIP conferencing services.  ...  How to search the heterogeneous resource efficiently is a key point in the dynamic and distributed environment.  ...  In addition, no service discovery usage standard for RELOAD was proposed.  ... 
doi:10.1007/978-3-642-35606-3_42 fatcat:jvornyjiejga3nj4tocwo574zq

Security Issues in VoIP Telecommunication Networks [chapter]

Xiaohui Yang, Ram Dantu, Duminda Wijesekera
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
FIGURE 30-1 Main SIP components. some of the security issues and how these issues are exploited even in commercial VoIP providers with some suggestions for improvement in security.  ...  SIP Networking Components A network consists of different logical components that communicate with each other in a predefined way.  ...  ACKNOWLEDGEMENTS We would like to thank Kalyan Pathapati Subbu, Vikram Chandrasekaran, Srikanth Jonnada and Chaitra Urs for all the editing support and help provided.  ... 
doi:10.1016/b978-0-12-415815-3.00030-3 fatcat:2tfkcsyugjhfjgijtzwqwmg7ia

Autonomous decentralised M2M application service provision

Michael Steinheimer, Ulrich Trick, Michael Steinheimer, Bogdan Ghita, Woldemar Fuhrmann
2017 2017 Internet Technologies and Applications (ITA)  
The SIP Usage for RELOAD (IETF RFC 7904, 2016) is presented below and demonstrates the way of operating a RELOAD-based application, but also indicates the disadvantages of RELOAD.  ...  The Resource Location and Discovery Protocol (RELOAD) project (IETF RFC 6940, 2014) specifies a fully decentralised P2P signalling protocol usable over the Internet.  ...  A central MSP must always request all services to be linked to each other and receives a response from these services.  ... 
doi:10.1109/itecha.2017.8101904 fatcat:iixuusgvsneh3emppuuvbteklq

Conferencing Service Interworking in Peer-to-Peer and IMS Networks

Jinsub Sim
2012 KSII Transactions on Internet and Information Systems  
The growth of Internet technologies and the widespread use of mobile devices have been paving the way for the increasing use of conferencing services.  ...  Two types of systems have been designed to provide conferencing services: 1) a conferencing system using session control over a peer-to-peer (P2P) network and 2) an IP Multimedia Subsystem (IMS) conferencing  ...  The Internet Engineering Task Force (IETF) has been striving to propose a Resource Location and Discovery (RELOAD) usage for Distributed Conference Control (DisCo) [1], using RELOAD [1] as the P2P-based  ... 
doi:10.3837/tiis.2012.09.009 fatcat:ehevacs2mvavpla7icl3qcqvmu

QoS Measurement-Based CAC for an IP Telephony System [chapter]

José Ma Saldaña, José I. Aznar, Eduardo Viruete, Julián Fernández-Navajas, José Ruiz
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
This work presents a Call Admission Control (CAC) system for a SIP-based IP Telephony platform.  ...  and a VoIP-PSTN gateway placed at destination country, and a second step by means of PSTN, from the gateway to the end-user, accounted with local tariffs.  ...  Acknowledgements This work has been partially financed by RUBENS (Rethinking the Use of Broadband access for Experience-optimized Networks and Services) project, of EUREKA CELTIC (code EU-3187 CP5-020)  ... 
doi:10.1007/978-3-642-10625-5_1 fatcat:em6khrur2rh23ewej7qeecmu6u

Smart Delivery of Multimedia Content for Wireless Applications [chapter]

Theo Kanter, Per Lindtorp, Christian Olrog, Gerald Q. Maguire
2000 Lecture Notes in Computer Science  
and the number of users.  ...  in order to meet the criteria for specific applications.  ...  However, [5, 6] show how we can avoid this pitfall by relying on a general signaling protocol (e.g., the Session Initiation Protocol -SIP [10] ) for the location of resources and use it to set up a  ... 
doi:10.1007/3-540-45494-2_6 fatcat:xkxd52bbczaatgiri37mr44d6e

On the performance of secure user-centric VoIP communication

Pantelis A. Frangoudis, George C. Polyzos
2014 Computer Networks  
We identify quality degradation factors and quantify their importance by simple analysis and experimentation, showing that typical user Wi-Fi equipment can sustain a satisfactory number of concurrent secure  ...  potential performance-wise, by designing a VoIP communications scheme tailored to open-access wireless environments, but also with wider applicability, and experimenting with it to estimate its upper  ...  The REsource LOcation And Discovery (RELOAD) protocol has been specified by the Working Group for signaling in a P2PSIP network. Cirani et al.  ... 
doi:10.1016/j.comnet.2014.06.009 fatcat:lzqnafpqxrbyffnpu42xp6djim

Grid service architecture for videoconferencing [chapter]

Wenjun Wu, Ahmet Uyar, Hasan Bulut, Sangyoon Oh, Geoffrey Fox
2006 Grid Technologies  
In this paper we present a scalable, integrated and service-oriented collaboration system, namely Global Multimedia Collaboration System, based on the XGSP collaboration framework and NaradaBrokering messaging  ...  This system can provide videoconferencing services to heterogeneous endpoints such as H.323, SIP, Access Grid, RealPlayer as well as cellular phone.  ...  A SIP system usually includes SIP clients, a SIP Proxy Server, a Registrar Server, a Location Server, and a Redirect Server as well as a SIP Multipoint Control Unit (MCU).  ... 
doi:10.2495/1-84564-055-1/03 fatcat:ffkcmb2ct5cdvgqievjzpefida

P2P Overlay Performance in Large-Scale MANETs

Thomas Kunz, Babak Esfandiari, Silas Ngozi, Frank Ockenfeld
2018 International Journal of Communications, Network and System Sciences  
We therefore studied the performance of P2P overlays such as Chord, creating a number of flat and hierarchical MANET networks.  ...  Our results show that an unmodified P2P network does not perform well even for relatively small network sizes.  ...  Retrieving any network resource generally involves random walks and/or flooding approaches, which are inefficient and do not guarantee the discovery of a resource [18] .  ... 
doi:10.4236/ijcns.2018.117009 fatcat:o5g3sqlvmrbjplxzxqueqfp2u4

A Survey on M2M Service Networks

Juhani Latvakoski, Antti Iivari, Paul Vitic, Bashar Jubeh, Mahdi Alaya, Thierry Monteil, Yoann Lopez, Guillermo Talavera, Javier Gonzalez, Niclas Granqvist, Monir Kellil, Herve Ganem (+1 others)
2014 Computers  
Self-Optimization is the ability of the system to continuously monitor and control resources to improve performance and efficiency.  ...  Overlays have been used to route control messages and connect different entities (e.g., SIP and XMPP), and also to implement data forwarding and dissemination (e.g., Chord, Tapestry, and Pastry).  ...  The authors wish to thank all contributors of A2Nets project, and especially the  ... 
doi:10.3390/computers3040130 fatcat:74vq35r6jjd27oubdpze7ef4e4
« Previous Showing results 1 — 15 out of 53 results