754 research outputs found

    Voting in 2008: Ten Swing States

    Get PDF
    Surveys ten battleground states in the 2008 election to assess the progress made since 2006 in improving the voting process, including poll worker training, student voting rights, voter registration and education, and the allocation of voting machines

    An analysis of IP Telephony Signaling using the Session Initiation Protocol (SIP)

    Get PDF
    This paper examines both the emergence of IP telephony in the telecommunications industry and the Session Initiation Protocol (SIP) as a method for providing signaling services for IP telephony networks. The technical as well as cost advantages of IP telephony are addressed and the various SIP components, addressing mechanisms, protocol messages, and protocol functionality are discussed. The technical benefits of SIP are examined and a brief comparison is made between SIP and H.323, an ITU umbrella specification and a leading alternative to SIP. SIP and the latest version of H.323 are found to be relatively comparable, although due to the inherent simplicity in developing SIP implementations and applications, SIP has the potential to challenge H.323's dominance in the IP telephony signaling market space

    Analyzing Voice And Video Call Service Performance Over A Local Area Network

    Get PDF
    Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2010Thesis (M.Sc.) -- İstanbul Technical University, Institute of Science and Technology, 2010Bu çalışmada, VOIP teknolojisinden ve bu teknolojiyi kablolu ve kablosuz ortamda gerçeklemenin en önemli darboğazları anlatılacaktır. Ayrıca H.323, SIP (Session Initiation Protocol), Megaco ve MGCP gibi yaygın olarak kullanılan ses iletim protokolleri ve H.261, H.263 ve H.264 gibi görüntü iletim protokollerinden bahsedilmiştir. Ses kodek seçimi ve VOIP servis kalitesine etki eden faktörleri anlatılmaktadır. Bu tezde, ses, görüntü ve veri iletişimini aynı anda bünyesinde barındıran gerçek şebekeler simüle edilecektir. Kullanıcılara rastlantısal olarak ses, görüntü ve FTP gibi birtakım uygulamalar atanmıştır. Ayrıca önerilen kablolu şebekeye, kablosuz bir şebeke ilave edilerek sonuçlar incelenecektir. Optimal servis kalitesini sağlamak için seçilen uygun kuyruklama mekanizmaları ve kodek seçimlerini içeren senaryolar incelenecek ve OPNET ile elde edilmiş simülasyon sonuçları tartışılacaktır.In this study, we present a detailed description of the VoIP and also the most common challenges of implementing voice communication into wireline or wireless networks are discussed. Common voice protocols, such as H.323, Session Initiation Protocol (SIP), Megaco, MGCP and video protocols such as H.261, H.263, H.264 are described as well. CODEC selection and factors affecting VoIP Quality of Service are analyzed. We simulate a real network which includes both voice, video and data communication simultaneously. Workstations are randomly assigned to different applications, such as voice, video and FTP. We will also implement a wireless network to our proposed system. The scenarios including selecting appropriate queuing scheme and codec selection are presented and the simulation results with OPNET are drawn.Yüksek LisansM.Sc

    Generation of Network Service Descriptors from Network Service Requirements

    Get PDF
    Network Function Virtualization (NFV) is a new paradigm in Network Service (NS) provisioning. European Telecommunications Standards Institute (ETSI) proposed and standardized an architectural framework for NFV. By leveraging virtualization and Software-Defined Networking (SDN) technologies, NFV decouples network functionality from hardware infrastructure. This enables the automated provisioning of NSs and reduces the capital and operational costs for service operators. NFV Management and Orchestration (NFV-MANO) is a functional block in the NFV framework, and it is responsible for the deployment and life-cycle management of NSs. With NFV, the telecommunication industry is moving towards zero-touch, i.e. automation of all the processes. In order to orchestrate and manage an NS, NFV-MANO requires the NS’s deployment template. This template is referred to as NS Descriptor (NSD) and contains all the details for deployment and orchestration of the NS. De-signing such a descriptor requires the design of the NS, which is actually out of the NFV scope. Traditionally, service operators’ experts design NSs and NSDs. However, this design activity is time-consuming and error-prone; moreover, it is not fitting the Telecom’s vision of zero-touch. In this thesis, we will propose an approach to automate the process of NS and NSD design. The approach starts from a set of requirements provided as Network Service Requirements (NSReq). The NSReq describes the required network service at a high level of abstraction and focuses on the functional, architectural, and non-functional characteristics. With the help of an ontology representing the knowledge from Telecom standards and previous successful experiences, we decompose the NSReq. We select the set of Virtual Network Functions (VNF) from a catalog to design the NS. Considering all the levels of decomposition and the VNF’s dependencies captured from the ontology, we design all the possible for-warding graphs that can form an NS. We design each forwarding graph through different steps at different abstraction levels, i.e. functional, architectural, and VNF levels. According to each forwarding graph, we design an NSD along with the traffic flows in the NS. We re-fine each NSD by dimensioning its VNFs using the non-functional requirements in the NSReq. Accordingly, we refine the deployment flavor of each NSD. We have developed a prototype tool as a proof of concept for our proposed approach which we will discuss later in this thesis

    The NASA Astrophysics Data System: Architecture

    Full text link
    The powerful discovery capabilities available in the ADS bibliographic services are possible thanks to the design of a flexible search and retrieval system based on a relational database model. Bibliographic records are stored as a corpus of structured documents containing fielded data and metadata, while discipline-specific knowledge is segregated in a set of files independent of the bibliographic data itself. The creation and management of links to both internal and external resources associated with each bibliography in the database is made possible by representing them as a set of document properties and their attributes. To improve global access to the ADS data holdings, a number of mirror sites have been created by cloning the database contents and software on a variety of hardware and software platforms. The procedures used to create and manage the database and its mirrors have been written as a set of scripts that can be run in either an interactive or unsupervised fashion. The ADS can be accessed at http://adswww.harvard.eduComment: 25 pages, 8 figures, 3 table

    Obtaining antibiotics online from within the UK: a cross-sectional study

    Get PDF
    BACKGROUND: Improved antibiotic stewardship (AS) and reduced prescribing in primary care, with a parallel increase in personal internet use, could lead citizens to obtain antibiotics from alternative sources online. OBJECTIVES: A cross-sectional analysis was performed to: (i) determine the quality and legality of online pharmacies selling antibiotics to the UK public; (ii) describe processes for obtaining antibiotics online from within the UK; and (iii) identify resulting AS and patient safety issues. METHODS: Searches were conducted for 'buy antibiotics online' using Google and Yahoo. For each search engine, data from the first 10 web sites with unique URL addresses were reviewed. Analysis was conducted on evidence of appropriate pharmacy registration, prescription requirement, whether antibiotic choice was 'prescriber-driven' or 'consumer-driven', and whether specific information was required (allergies, comorbidities, pregnancy) or given (adverse effects) prior to purchase. RESULTS: Twenty unique URL addresses were analysed in detail. Online pharmacies evidencing their location in the UK ( n  = 5; 25%) required a prescription before antibiotic purchase, and were appropriately registered. Online pharmacies unclear about the location they were operating from ( n  = 10; 50%) had variable prescription requirements, and no evidence of appropriate registration. Nine (45%) online pharmacies did not require a prescription prior to purchase. For 16 (80%) online pharmacies, decisions were initially consumer-driven for antibiotic choice, dose and quantity. CONCLUSIONS: Wide variation exists among online pharmacies in relation to antibiotic practices, highlighting considerable patient safety and AS issues. Improved education, legislation, regulation and new best practice stewardship guidelines are urgently needed for online antibiotic suppliers

    Using decoys to block SPIT in the IMS

    Get PDF
    Includes bibliographical references (leaves 106-111)In recent years, studies have shown that 80-85% of e-mails sent were spam. Another form of spam that has just surfaced is VoIP (Voice over Internet Telephony) spam. Currently, VoIP has seen an increasing numbers of users due to the cheap rates. With the introduction of the IMS (IP Multimedia Subsystem), the number of VoIP users are expected to increase dramatically. This calls for a cause of concern, as the tools and methods that have been used for blocking email spam may not be suitable for real-time voice calls. In addition, VoIP phones will have URI type addresses, so the same methods that were used to generate automated e-mail spam messages can be employed for unsolicited voice calls. Spammers will always be present to take advantage of and adapt to trends in communication technology. Therefore, it is important that IMS have structures in place to alleviate the problems of spam. Recent solutions proposed to block SPIT (Spam over Internet Telephony) have the following shortcomings: restricting the users to trusted senders, causing delays in voice call set-up, reducing the efficiency of the system by increasing burden on proxies which have to do some form of bayesian or statistical filtering, and requiring dramatic changes in the protocols being used. The proposed decoying system for the IMS fits well with the existing protocol structure, and customers are oblivious of its operation

    Fast Nearest Neighbor Search with Keywords

    Get PDF
    Conventional spatial queries, such as range search and nearest neighbor retrieval, involve only conditions on objects’ geometric properties. Today, many modern applications call for novel forms of queries that aim to find objects satisfying both a spatial predicate, and a predicate on their associated texts. For example, instead of considering all the restaurants, a nearest neighbor query would instead ask for the restaurant that is the closest among those whose menus contain “steak, spaghetti, brandy” all at the same time. Currently the best solution to such queries is based on the IR2-tree, which, as shown in this paper, has a few deficiencies that seriously impact its efficiency. Motivated by this, we develop a new access method called the spatial inverted index that extends the conventional inverted index to cope with multidimensional data, and comes with algorithms that can answer nearest neighbor queries with keywords in real time. As verified by experiments, the proposed techniques outperform the IR2-tree in query response time significantly, often by a factor of orders of magnitude

    A Hellinger Distance Based Algorithm To Detect Distributed Denial Of Service Attacks On Voice Over Internet Protocol Environments

    Get PDF
    Voice communication over the Internet has experienced rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in number of VoIP subscribers is due to VoIP flexibility, Quality of Service and being low in cost. This growth has prompted a major shift from the traditional public switched telephone network (PSTN) which is circuit-switched to a packet-switched VoIP. The Session Initiation Protocol (SIP), protocol used in VoIP, is responsible in creating session between a caller and a callee for bidirectional communication using SIP messages. The VoIP, as with other services on the Internet, also suffers from various security issues and vulnerabilities, arising from new protocols and the existing infrastructure of traditional data network
    corecore