1,105 research outputs found

    Service re-routing for service network graph: efficiency, scalability and implementation

    Get PDF
    The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of hops in a redirection increases, the length of SPath increases. The overhead for service routing protocols which uses SPath increases with the length of SPath. Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving service routing. In this paper, we propose a re-routing strategy to optimize service routing, and demonstrate how this strategy can be implemented using SPath to enhance the efficiency and scalability of Service Network Graph (SNG)

    Improving the performance of SCTP Transport Protocol over wireless networks

    Get PDF
    [Abstract]: Stream Control Transmission Protocol(SCTP) is a reliable transport protocol combining the advantages of TCP and UDP. SCTP has many desirable features including multihoming, multistreaming, and partial data reliability. These features have made SCTP perform much more effectively in multimedia networking applications. They have also worked better in wireless environment which traditional transport protocols are ineffective and cumbersome. Before the transmission, an application using SCTP needs to establish an association between the client and the server. The establishment of association requires a number which will be used to create multiple streams. However, SCTP has not specified a method or suggested any ideas of determine the number. In our paper, we focus on the performance of SCTP protocol over the wireless networks. The ideas is to extend the SCTP with a process of determining an optimal number prior to the association establishing. We examine the modified SCTP on a simulated wireless networks, and the experiment results of simulation using NS2 have shown the modified SCTP is feasible and also demonstrated the modified SCTP’s superiority of performance over TCP and UDP over the wireless networks

    REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs

    Get PDF
    Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks

    An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks

    Get PDF
    [Abstract]: When a user requests a service from a server (SA), SA will authenticate the user based on some stored authentication information. If the information is stored on another server or network which is not accessible to SA or not in a compatible form of that required by SA, the identity of the user cannot be established. Without a global authentication service, authentication of users from another autonomous network is a major security issue in service sharing. In this paper, we extended Network Service Sharing Infrastructure (NSSI) by which many networks are linked together for service sharing. Within NSSI, individual networks authenticate and grant authorizations independent of each other by using their own authentication information repository (AIR). NSSI enables authentication and authorization results to be relayed to other linked networks to access a shared services while individual networks still maintain their own authentication scheme or authentication requirements. NSSI facilitates dynamic aggregation of networks for service sharing with minimum administrative overhead

    The Effect of Self-repair on Judged Quality of Consecutive Interpreting: Attending to Content, Form and Delivery

    Get PDF
    This paper investigates the correlations between self-repair and subjective assessments of student interpreters’ performance in consecutive interpreting(CI). Twelve interpretations from an interpreting contest in China are transcribed, with the self-repairs identified and annotated based on Levelt’s classification (1983), including both overt and covert repairs. In addition to the final scores awarded at the contest, different methods and raters are used to assess the comprising aspects of an overall quality, namely content, form and delivery. Statistical analysis shows that: (1)overt repairs have a strong positive correlation with content, and moderate negative correlations with form and delivery; (2) form and delivery are negatively correlated with covert repairs, in terms of the frequencies of repetitions and pauses, and the mean length of pauses;(3) the judges’ overall assessments are more closely correlated with content than self-repairs. Finally, pedagogical implications for CI training are discussed, as are suggestions for future research
    • …
    corecore