8,498 research outputs found
Quality of service assurance for the next generation Internet
The provisioning for multimedia applications has been of increasing interest among researchers and Internet Service Providers. Through the migration from resource-based to service-driven networks, it has become evident that the Internet model should be enhanced to provide support for a variety of differentiated services that match applications and customer requirements, and not stay limited under the flat best-effort service that is currently provided.
In this paper, we describe and critically appraise the major achievements of the efforts to introduce Quality of Service (QoS) assurance and provisioning within the Internet model. We then propose a research path for the creation of a network services management architecture,
through which we can move towards a QoS-enabled network environment, offering support for a variety of different services, based on traffic characteristics and user expectations
QUALITY OF SERVICE ARCHITECTURES APPLICABILITY IN AN INTRANET NETWORK
The quality of service (QoS) concept, which appeared initially as a necessity to improve Internet users perception, deals actually with new valences along with information society maturation. At the organisationās level, the Intranet network shall assure in a similar manner as the Internet all kinds of services, which are useful to the organisationās users. Starting from the traditional QoS architectural models, network administrators shall plan and design a QoS architecture, which will map on the organisationās requirements, having at disposal not only own network elements but also communication services provided by other operators. The aim of this paper is to present, starting from the general QoS models, a comparative study of main advantages and drawbacks in implementing a specific Intranet QoS architecture taking into consideration all kind of aspects (material, financial, human resources), which impact on a good Intranet QoS management.QoS, IntServ, DiffServ, IntServ over DiffServ, VPN-MPLS, Intranet network
Recommended from our members
Towards scalable end-to-end QoS provision for VoIP applications
The growth of the Internet and the development of its new applications have increased the demand for providing a certain level of resource assurance and service support. The concept of ensuring quality of service (QoS) has been introduced in order to provide the support and assurance for these services. Different QoS mechanisms, such as integrated services (IntServ) and differentiated services (DiffServ), have been developed and introduced to provide different levels of QoS provision. However, IntServ can suffer from scalability issues that make it infeasible for large-scale network implementations. On the other hand, the aggregated-based per-flow technique of DiffServ does not provide such an end-to-end QoS guarantee. Recently, the IETF have proposed a new QoS architecture that implements IntServ over DiffServ in order to provide an end-to-end QoS for scalable networks. Hence, it became possible to provide and support a certain level of QoS for some delay sensitive and bandwidth-demanding applications such as voice over Internet Protocol (VoIP). With regard to VoIP applications, delay, jitter and packet loss are crucial issues that have to be taken into consideration for any VoIP system design and such parameters need a distinct level of QoS support
Performance Evaluation of IPTV over WiMAX Networks Under Different Terrain Environments
Deployment Video on Demand (VoD) over the next generation (WiMAX) has become
one of the intense interest subjects in the research these days, and is
expected to be the main revenue generators in the near future. In this paper,
the performance of Quilty of Service of video streaming (IPTV) over fixed
mobile WiMax network is investigated under different terrain environments,
namely Free Space, Outdoor to Indoor and Pedestrian. OPNET is used to
investigate the performance of VoD over WiMAX. Our findings analyzing different
network statistics such as packet lost, path loss, delay, network throughput.Comment: arXiv admin note: substantial text overlap with arXiv:1302.1409, and
substantial text overlap with other internet sources by other author
Policy issues in interconnecting networks
To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented
A robust self-organized public key management for mobile ad hoc networks
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential for any security framework of MANETs. However, traditional solutions to key management through accessing trusted authorities or centralized servers are infeasible for MANETs due to the absence of infrastructure, frequent mobility, and wireless link instability. In this paper, we propose a robust self-organized, public key management for MANETs. The proposed scheme relies on establishing a small number of trust relations between neighboring nodes during the network initialization phase. Experiences gained as a result of successful communications and node mobility through the network enhance the formation of a web of trust between mobile nodes. The proposed scheme allows each user to create its public key and the corresponding private key, to issue certificates to neighboring nodes, and to perform public key authentication through at least two independent certificate chains without relying on any centralized authority. A measure of the communications cost of the key distribution process has been proposed. Simulation results show that the proposed scheme is robust and efficient in the mobility environment of MANET and against malicious node attacks
- ā¦