1,626 research outputs found

    Options for Securing RTP Sessions

    Get PDF
    The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments. The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism. This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism

    Securing the RTP framework: why RTP does not mandate a single media security solution

    Get PDF
    This memo discusses the problem of securing real-time multimedia sessions, and explains why the Real-time Transport Protocol (RTP), and the associated RTP control protocol (RTCP), do not mandate a single media security mechanism. Guidelines for designers and reviewers of future RTP extensions are provided, to ensure that appropriate security mechanisms are mandated, and that any such mechanisms are specified in a manner that conforms with the RTP architecture

    Sending multiple RTP streams in a single RTP session

    Get PDF
    This memo expands and clarifies the behavior of Real-time Transport Protocol (RTP) endpoints that use multiple synchronization sources (SSRCs). This occurs, for example, when an endpoint sends multiple RTP streams in a single RTP session. This memo updates RFC 3550 with regard to handling multiple SSRCs per endpoint in RTP sessions, with a particular focus on RTP Control Protocol (RTCP) behavior. It also updates RFC 4585 to change and clarify the calculation of the timeout of SSRCs and the inclusion of feedback messages

    Is Explicit Congestion Notification usable with UDP?

    Get PDF
    We present initial measurements to determine if ECN is usable with UDP traffic in the public Internet. This is interesting because ECN is part of current IETF proposals for congestion control of UDPbased interactive multimedia, and due to the increasing use of UDP as a substrate on which new transport protocols can be deployed. Using measurements from the author’s homes, their workplace, and cloud servers in each of the nine EC2 regions worldwide, we test reachability of 2500 servers from the public NTP server pool, using ECT(0) and not-ECT marked UDP packets. We show that an average of 98.97% of the NTP servers that are reachable using not-ECT marked packets are also reachable using ECT(0) marked UDP packets, and that ~98% of network hops pass ECT(0) marked packets without clearing the ECT bits. We compare reachability of the same hosts using ECN with TCP, finding that 82.0% of those reachable with TCP can successfully negotiate and use ECN. Our findings suggest that ECN is broadly usable with UDP traffic, and that support for use of ECN with TCP has increased

    On the usefulness of finding charts Or the runaway carbon stars of the Blanco & McCarthy field 37

    Get PDF
    We have been recently faced with the problem of cross--identifying stars recorded in historical catalogues with those extracted from recent fully digitized surveys (such as DENIS and 2MASS). Positions mentioned in the old catalogues are frequently of poor precision, but are generally accompanied by finding charts where the interesting objects are flagged. Those finding charts are sometimes our only link with the accumulated knowledge of past literature. While checking the identification of some of these objects in several catalogues, we had the surprise to discover a number of discrepancies in recent works.The main reason for these discrepancies was generally the blind application of the smallest difference in position as the criterion to identify sources from one historical catalogue to those in more recent surveys. In this paper we give examples of such misidentifications, and show how we were able to find and correct them.We present modern procedures to discover and solve cross--identification problems, such as loading digitized images of the sky through the Aladin service at CDS, and overlaying entries from historical catalogues and modern surveys. We conclude that the use of good finding charts still remains the ultimate (though time--consuming) tool to ascertain cross--identifications in difficult cases.Comment: 4 pages, 1 figure, accepted by A&

    Determinants of OSS revenue model choices

    Get PDF
    The open source software movement is traditionally not affiliated to profit-oriented business behaviour. However, commercial activity has become increasingly common, and, business models have institutionalized in the field of open source software. The aim of this research paper is to explore the determinants of profitable revenue models for businesses based on open source software. Therefore, the study focuses on analysing different revenue options of open source software businesses as a part of more comprehensive open source software (OSS) business models. We explore other business model elements as the potential determinants of firm-level revenue model choices. This study draws on a qualitative research approach on the issue through two analytical business cases – MySQL and Red Hat – both of which illustrate the complexity and heterogeneity of solutions and options in the field of OSS. Thus, we analyse the business models of the selected case companies and identify the underlying endogenous elements, i.e. offerings, resources and relationships within them. Finally, we discuss the managerial implications derived from the cases to describe how these business model elements affect the development of successful revenue models in the field of open source software

    A Rich Population of X-ray Emitting Wolf-Rayet Stars in the Galactic Starburst Cluster Westerlund 1

    Full text link
    Recent optical and IR studies have revealed that the heavily-reddened starburst cluster Westerlund 1 (Wd 1) contains at least 22 Wolf-Rayet (WR) stars, comprising the richest WR population of any galactic cluster. We present results of a senstive Chandra X-ray observation of Wd 1 which detected 12 of the 22 known WR stars and the mysterious emission line star W9. The fraction of detected WN stars is nearly identical to that of WC stars. The WN stars WR-A and WR-B as well as W9 are exceptionally luminous in X-rays and have similar hard heavily-absorbed spectra with strong Si XIII and S XV emission lines. The luminous high-temperature X-ray emission of these three stars is characteristic of colliding wind binary systems but their binary status remains to be determined. Spectral fits of the X-ray bright sources WR-A and W9 with isothermal plane-parallel shock models require high absorption column densities log NH_{H} = 22.56 (cm−2^{-2}) and yield characteristic shock temperatures kT_shock ~ 3 keV (T ~ 35 MK).Comment: ApJL, 2006, in press (3 figures, 1 table
    • …
    corecore