1,381 research outputs found
Empirical assessment of VoIP overload detection tests
The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we explore such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). We focus on large-deviations based techniques developed earlier in that monitor the number of connections present, and that issue an alarm when this number abruptly changes. The procedures proposed in are demonstrated by using real traces from an operational environment. Our experiments show that our detection procedure is capable of adequately identifying load changes
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions
Network steganography conceals the transfer of sensitive information within
unobtrusive data in computer networks. So-called micro protocols are
communication protocols placed within the payload of a network steganographic
transfer. They enrich this transfer with features such as reliability, dynamic
overlay routing, or performance optimization --- just to mention a few. We
present different design approaches for the embedding of hidden channels with
micro protocols in digitized audio signals under consideration of different
requirements. On the basis of experimental results, our design approaches are
compared, and introduced into a protocol engineering approach for micro
protocols.Comment: 20 pages, 7 figures, 4 table
EVEREST IST - 2002 - 00185 : D23 : final report
Deliverable públic del projecte europeu EVERESTThis deliverable constitutes the final report of the project IST-2002-001858 EVEREST. After its successful completion, the project presents this document that firstly summarizes the context, goal and the approach objective of the project. Then it presents a concise summary of the major goals and results, as well as highlights the most valuable lessons derived form the project work. A list of deliverables and publications is included in the annex.Postprint (published version
MIPv6 Experimental Evaluation using Overlay Networks
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated
Wireless Networks and Overlay Networks, which are present in the notion of the
forthcoming generation of wireless communications. Individual wireless access networks
show limitations that can be overcome through the integration of different technologies
into a single unified platform (i.e., 4G systems). This paper summarises practical experiments
performed to evaluate the impact of inter-networking (i.e. vertical handovers) on
the Network and Transport layers. Based on our observations, we propose and evaluate a
number of inter-technology handover optimisation techniques, e.g., Router Advertisements
frequency values, Binding Update simulcasting, Router Advertisement caching, and Soft
Handovers. The paper concludes with the description of a policy-based mobility support
middleware (PROTON) that hides 4G networking complexities from mobile users, provides
informed handover-related decisions, and enables the application of different vertical
handover methods and optimisations according to context.Publicad
Providing End-to-End Connectivity to SIP User Agents Behind NATs
The widespread diffusion of private networks in SOHO scenarios is fostering an increased deployment of Network Address Translators (NATs). The presence of NATs seriously limits end-to-end connectivity and prevents protocols like the Session Initiation Protocol (SIP) from working properly. This document shows how the Address List Extension (ALEX), which was originally developed to provide dual-stack and multi-homing support to SIP, can be used, with minor modifications, to ensure end-to-end connectivity for both media and signaling flows, without relying on intermediate relay nodes whenever it is possibl
VoIP security - attacks and solutions
Voice over IP (VoIP) technology is being extensively and rapidly deployed. Flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues. First, we briefly describe basic VoIP architecture and its fundamental differences compared to PSTN. Next, basic VoIP protocols used for signaling and media transport, as well as defense mechanisms are described. Finally, current and potential VoIP attacks along with the approaches that have been adopted to counter the attacks are discussed
Clock synchronisation for UWB and DECT communication networks
Synchronisation deals with the distribution of time and/or frequency across a network
of nodes dispersed in an area, in order to align their clocks with respect to time and/or frequency. It remains an important requirement in telecommunication networks, especially in Time Division Duplexing (TDD) systems such as Ultra Wideband (UWB)
and Digital Enhanced Cordless Telecommunications (DECT) systems. This thesis explores three di erent research areas related to clock synchronisation in communication networks; namely algorithm development and implementation, managing Packet Delay Variation (PDV), and coping with the failure of a master node.
The first area proposes a higher-layer synchronisation algorithm in order to meet the specific requirements of a UWB network that is based on the European Computer
Manufacturers Association (ECMA) standard. At up to 480 Mbps data rate, UWB
is an attractive technology for multimedia streaming. Higher-layer synchronisation
is needed in order to facilitate synchronised playback at the receivers and prevent distortion, but no algorithm is de ned in the ECMA-368 standard. In this research area, a higher-layer synchronisation algorithm is developed for an ECMA-368 UWB network. Network simulations and FPGA implementation are used to show that the new algorithm satis es the requirements of the network.
The next research area looks at how PDV can be managed when Precision Time
Protocol (PTP) is implemented in an existing Ethernet network. Existing literature
indicates that the performance of a PDV ltering algorithm usually depends on the
delay pro le of the network in which it is applied. In this research area, a new sample-mode PDV filter is proposed which is independent of the shape of the delay profile. Numerical simulations show that the sample-mode filtering algorithm is able to match or out-perform the existing sample minimum, mean, and maximum filters, at differentlevels of network load.
Finally, the thesis considers the problem of dealing with master failures in a PTP
network for a DECT audio application. It describes the existing master redundancy
techniques and shows why they are unsuitable for the specific application. Then a
new alternate master cluster technique is proposed along with an alternative BMCA
to suit the application under consideration. Network simulations are used to show
how this technique leads to a reduction in the total time to recover from a master
failure
- …