382 research outputs found

    Investigation on probing schemes in probe-based multicast admission control

    Get PDF
    Multicast is an efficient approach to save network bandwidth for multimedia streaming services. To provide Quality of Services (QoS) for the multimedia services while maintain the advantage of multicast in bandwidth efficiency, admission control for multicast sessions are expected. Probe-based multicast admission control (PBMAC) schemes are of a sort of scalable and simple admission control for multicast. Probing scheme is the essence of PBMAC. In this paper, after a detailed survey on three existing probing schemes, we evaluate these schemes using simulation and analysis approaches in two aspects: admission correctness and group scalability. Admission correctness of the schemes is compared by simulation investigation. Analytical models for group scalability are derived, and validated by simulation results. The evaluation results illustrate the advantages and weaknesses of each scheme, which are helpful for people to choose proper probing scheme for network

    Monitoring multicast traffic in heterogeneous networks

    Get PDF
    Estágio realizado no INESC - Porto e orientado pelo Prof. Doutor Ricardo MorlaTese de mestrado integrado. Engenharia Electrotécnica e de Computadores - Major Telecomunicações. Faculdade de Engenharia. Universidade do Porto. 200

    Internet protocol television (IPTV): The Killer application for the next-generation internet

    Get PDF
    Internet Protocol Television (IPTV) will be the killer application for the next-generation Internet and will provide exciting new revenue opportunities for service providers. However, to deploy IPTV services with a full quality of service (QoS) guarantee, many underlying technologies must be further studied. This article serves as a survey of IPTV services and the underlying technologies. Technical challenges also are identified

    Adaptive Applications over Active Networks: Case Study on Layered Multicast

    Full text link
    peer reviewedIn this paper we study the potential and limitations of active networks in the context of adaptive applications. We present a survey of active networking research applied to adaptive applications, and a case study on a layered multicast active application. This active application is a congestion control protocol that selectively discards data in the active routers, and prunes multicast tree branches affected by persistent congestion. Our first results indicate that active networks can indeed help such an application to adapt to heterogeneous receivers, with a minimum amount of state overhead, equivalent to that of a single IP multicast group

    WIC midwintermeeting on IP-television (IP-TV):proceedings of a one-day workshop, Eindhoven, January 19, 2007

    Get PDF

    A Framework for Controlling Quality of Sessions in Multimedia Systems

    Get PDF
    Collaborative multimedia systems demand overall session quality control beyond the level of quality of service (QoS) pertaining to individual connections in isolation of others. At every instant in time, the quality of the session depends on the actual QoS offered by the system to each of the application streams, as well as on the relative priorities of these streams according to the application semantics. We introduce a framework for achieving QoSess control and address the architectural issues involved in designing a QoSess control laver that realizes the proposed framework. In addition, we detail our contributions for two main components of the QoSess control layer. The first component is a scalable and robust feedback protocol, which allows for determining the worst case state among a group of receivers of a stream. This mechanism is used for controlling the transmission rates of multimedia sources in both cases of layered and single-rate multicast streams. The second component is a set of inter-stream adaptation algorithms that dynamically control the bandwidth shares of the streams belonging to a session. Additionally, in order to ensure stability and responsiveness in the inter-stream adaptation process, several measures are taken, including devising a domain rate control protocol. The performance of the proposed mechanisms is analyzed and their advantages are demonstrated by simulation and experimental results

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table

    Wireless measurement Scheme for bandwidth Estimation in Multihop Wireless Adhoc network

    Get PDF
    The necessity to bear real time and multimedia application for users of Mobile 1D468;1D485;1D489;1D490;1D484; Network (1D474;1D468;1D475;1D46C;1D47B;) is becoming vital. Mobile 1D468;1D485;1D489;1D490;1D484; network facilitates decentralized network that can present multimedia users with mobility that they have demanded, if proficient 1D478;1D490;1D47A; multicast strategies were developed. By giving the guarantee of 1D478;1D490;1D47A; in 1D468;1D485;1D489;1D490;1D484; network, the proficient bandwidth estimation method plays a very important role. The research paper represented here presents a splendid method for estimating or measuring Bandwidth in 1D468;1D485;1D489;1D490;1D484; network whose character is decentralized in nature. Contrasting in the centralized formation, the bandwidth estimating in 1D468;1D485;1D489;1D490;1D484; is significant and this eventually makes an influence over the 1D478;1D490;1D47A; of the network communication. The admission control and dynamic bandwidth management method which is presented here, facilitates it with fairness and rate guarantees despite the distributed link layer fair scheduling being absent. Alteration has been made over 1D474;1D468;1D46A; layer and this method is appropriate where the peer-to-peer (1D477;1D7D0;1D477;) multimedia transmissions rates are amended in compliantly fashion.In the research work presented here the architecture of the 1D474;1D468;1D46A; layer has been altered and the data handling capacity has been increased. This technique is adopted to facilitate higher data rate transmission and eliminate congestion over the considerednetwork. The proposed technique implements the splitting of 1D474;1D468;1D46A; into two sub layer where one will be responsible for control data transmission while other effectively transmits the data bits. Thus it results into higher data rate transmission with better accuracy and optimized network throughput. The research work in the presented paper exhibits superior accuracy and is very much effective in bandwidth estimation and management application in multi hop Mobile Ad-H

    Theories and Models for Internet Quality of Service

    Get PDF
    We survey recent advances in theories and models for Internet Quality of Service (QoS). We start with the theory of network calculus, which lays the foundation for support of deterministic performance guarantees in networks, and illustrate its applications to integrated services, differentiated services, and streaming media playback delays. We also present mechanisms and architecture for scalable support of guaranteed services in the Internet, based on the concept of a stateless core. Methods for scalable control operations are also briefly discussed. We then turn our attention to statistical performance guarantees, and describe several new probabilistic results that can be used for a statistical dimensioning of differentiated services. Lastly, we review recent proposals and results in supporting performance guarantees in a best effort context. These include models for elastic throughput guarantees based on TCP performance modeling, techniques for some quality of service differentiation without access control, and methods that allow an application to control the performance it receives, in the absence of network support

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio
    • …
    corecore