Results 1 - 10
of
600
SIP: session initiation protocol
- IETF RFC 3261
, 2002
"... This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet ..."
Abstract
-
Cited by 174 (18 self)
- Add to MetaCart
(Show Context)
This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress". The list of current Internet-Drafts can be accessed at
Concurrent Multipath Transfer using SCTP Multihomingover Independent . . .
, 2005
"... Concurrent Multipath Transfer (CMT) uses the Stream Control Transmission Protocol’s (SCTP) multihoming ..."
Abstract
-
Cited by 165 (12 self)
- Add to MetaCart
Concurrent Multipath Transfer (CMT) uses the Stream Control Transmission Protocol’s (SCTP) multihoming
Application-Layer Mobility Using SIP
- Mobile Computing and Communications Review
, 2000
"... ..."
(Show Context)
Video transport over ad hoc networks: Multistream coding with multipath transport
- IEEE J. Sel. Areas Commun
, 2003
"... Abstract—Enabling video transport over ad hoc networks is more challenging than over other wireless networks. The wireless links in an ad hoc network are highly error prone and can go down frequently because of node mobility, interference, channel fading, and the lack of infrastructure. However, the ..."
Abstract
-
Cited by 118 (20 self)
- Add to MetaCart
(Show Context)
Abstract—Enabling video transport over ad hoc networks is more challenging than over other wireless networks. The wireless links in an ad hoc network are highly error prone and can go down frequently because of node mobility, interference, channel fading, and the lack of infrastructure. However, the mesh topology of ad hoc networks implies that it is possible to establish multiple paths between a source and a destination. Indeed, multipath transport provides an extra degree of freedom in designing error resilient video coding and transport schemes. In this paper, we propose to combine multistream coding with multipath transport, to show that, in addition to traditional error control techniques, path diversity provides an effective means to combat transmission error in ad hoc networks. The schemes that we have examined are: 1) feedback based reference picture selection; 2) layered coding with selective automatic repeat request; and 3) multiple description motion compensation coding. All these techniques are based on the motion compensated prediction technique found in modern video coding standards. We studied the performance of these three schemes via extensive simulations using both Markov channel models and OPNET Modeler. To further validate the viability and performance advantages of these schemes, we implemented an ad hoc multiple path video streaming testbed using notebook computers and IEEE 802.11b cards. The results show that great improvement in video quality can be achieved over the standard schemes with limited additional cost. Each of these three video coding/transport techniques is best suited for a particular environment, depending on the availability of a feedback channel, the end-to-end delay constraint, and the error characteristics of the paths. Index Terms—Ad hoc networks, error resilience, IEEE 802.11, multipath transport, video transport, wireless networks.
The Transport Layer Security
- TLS) Protocol, Version 1.2. RFC
"... This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this pro ..."
Abstract
-
Cited by 111 (1 self)
- Add to MetaCart
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This document specifies Version 1.0 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying
The devil and packet trace anonymization,”
- SIGCOMM Comput. Commun. Rev.,
, 2006
"... ABSTRACT Releasing network measurement data-including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymized packet traces for public use entails many more vexing considerations than just the usual notion of how to scr ..."
Abstract
-
Cited by 93 (5 self)
- Add to MetaCart
(Show Context)
ABSTRACT Releasing network measurement data-including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymized packet traces for public use entails many more vexing considerations than just the usual notion of how to scramble IP addresses to preserve privacy. Publishing traces requires carefully balancing the security needs of the organization providing the trace with the research usefulness of the anonymized trace. In this paper we recount our experiences in (i) securing permission from a large site to release packet header traces of the site's internal traffic, (ii) implementing the corresponding anonymization policy, and (iii) validating its correctness. We present a general tool, tcpmkpub, for anonymizing traces, discuss the process used to determine the particular anonymization policy, and describe the use of metadata accompanying the traces to provide insight into features that have been obfuscated by anonymization.
A transport layer approach for improving end-to-end performance and robustness using redundant paths
- In USENIX Annual Technical Conference
, 2004
"... Recent work on Internet measurement and overlay networks has shown that redundant paths are common between pairs of hosts and that one can often achieve better end-to-end performance by adaptively choosing an alternate path [8, 27]. In this paper, we propose an end-to-end transport layer protocol, m ..."
Abstract
-
Cited by 88 (3 self)
- Add to MetaCart
(Show Context)
Recent work on Internet measurement and overlay networks has shown that redundant paths are common between pairs of hosts and that one can often achieve better end-to-end performance by adaptively choosing an alternate path [8, 27]. In this paper, we propose an end-to-end transport layer protocol, mTCP, which can aggregate the available bandwidth of those redundant paths in parallel. By striping one flow’s packets across multiple paths, mTCP can not only obtain higher endto-end throughput but also be more robust under path failures. When some paths fail, mTCP can continue sending packets on other paths, and the recovery process normally takes only a few seconds. Because mTCP could obtain an unfair share of bandwidth under shared congestion, we integrate a shared congestion detection mechanism into our system. It allows us to dynamically detect and suppress paths with shared congestion so as to alleviate the aggressiveness problem. mTCP can also passively monitor the performance of several paths in parallel and discover better paths than the path provided by the underlying routing infrastructure. We also propose a heuristic to find disjoint paths between pairs of nodes using traceroute. We have implemented our system on top of overlay networks and evaluated it in both PlanetLab and Emulab. 1
Delay-Tolerant Networking Architecture
, 2007
"... This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007). IESG Note ..."
Abstract
-
Cited by 65 (2 self)
- Add to MetaCart
(Show Context)
This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007). IESG Note
Architecture and performance of SIGMA: A seamless handover scheme for data networks
- IEEE ICC, Seoul, South Korea
, 2005
"... Mobile IP to handle mobility of Internet hosts at the network layer. Mobile IP, however, suffers from a number of drawbacks such as high handover latency, packet loss, and conflict with network security solutions. In this paper, we describe and evaluate the performance of SIGMA,aSeamless IP diversit ..."
Abstract
-
Cited by 55 (26 self)
- Add to MetaCart
(Show Context)
Mobile IP to handle mobility of Internet hosts at the network layer. Mobile IP, however, suffers from a number of drawbacks such as high handover latency, packet loss, and conflict with network security solutions. In this paper, we describe and evaluate the performance of SIGMA,aSeamless IP diversity based Generalized Mobility Architecture. SIGMA utilizes IP diversity to achieve a seamless handover of a mobile host, and is designed to solve many of the drawbacks of Mobile IP. Various aspects of the performance of SIGMA and Mobile IPv6 enhancements have been compared. Criteria for performance evaluation include handover latency, packet loss, throughput, and network friendliness. I.
A New Method to SupportUMTS-WLAN Vertical Handover Using SCTP
- IEEE WirelessCommunications Magazine
, 2004
"... Abstract — This paper proposes a new method to facilitate seamless vertical handover (VHO) between UMTS and WLAN networks using the Stream Control Transmission Protocol (SCTP). The multi-homing capability and dynamic address reconfiguration (DAR) extension of SCTP are applied in a UMTS/WLAN overlay ..."
Abstract
-
Cited by 46 (5 self)
- Add to MetaCart
(Show Context)
Abstract — This paper proposes a new method to facilitate seamless vertical handover (VHO) between UMTS and WLAN networks using the Stream Control Transmission Protocol (SCTP). The multi-homing capability and dynamic address reconfiguration (DAR) extension of SCTP are applied in a UMTS/WLAN overlay architecture to decrease VHO delay and improve throughput performance. Unlike techniques based on Mobile IP (MIP) or Session Initiation Protocol (SIP), the SCTPbased VHO scheme does not require the addition of components such as home/foreign agents or SIP server to the existing networks. Therefore the proposed scheme provides a networkindependent solution that is preferred by service providers. Performance evaluations are presented to demonstrate the effectiveness of the proposed scheme. Keywords: M-SCTP, WLAN, UMTS, vertical handover I.