Analysis and Design of Instant Message System Based on P2P
|
|
- Iris Brown
- 7 years ago
- Views:
Transcription
1 Analysis and Design of Instant Message System Based on P2P Shen Zhiwei Ma Shaowu China Netcom Group Labs Beijing Abstract By analyzing current development conditions of mainstream Instant Message technologies and services, some detailed discussion about technical solution and formal operation deployment strategies of P2P Instant Message Services based on Internet is made. Several crucial problems of P2P Instant Message System about services management, interconnection with other instant message, security and profit-making mode are analyzed,, and how to develop P2P IM Services is proposed. Keywords P2P; Instant Message; Session Initiation Protocol; Profit-making Mode 1 Introduction At present, the application of IM (Instant Message) is used very widely, it is able to realize the integrated services based on Internet such as IP voice, data, and images. At the same time, the fee with PC voice one another is almost free,in virtue of the realizing of voice PC to phone must through fixed-line operator s interconnection, the fee is cheaper though not free. The very-low-fee or even cost-free IM software heavily shunt the traditional voice services of the operators. So need analyzing and research the IM, utilizing the technologies advantage of P2P IM to optimize operators own network and services, and bring forward the suited P2P IM scheme for operators faction. For the operators, the use of IM technologies based on P2P architecture would reduce communication equipment investment greatly, improve the network utilization rate and reduce the service development cost. And the operators could exploit many new value-added services based on P2P IM and make it become a new profit increment point. This paper proposes a solution of the IM based on P2P from the aspects of technical realization and service deployment by analyzing current mainstream IM technologies. 2 The current development conditions of Instant Message services Resently, with the rapid incensement of the number of the Internet users, the users of the IM also increase. Based on the I-Research market expection, the IM users all over the world would increase from 490 million in 2007 to 650 million in 2010, and the scale of IM market would increase from 150 million dollars to 280 hundred million dollars in The operators at home and abroad continuously propose new services. England Telecom had put forward a new Internet service that from Yahoo IM product to a phone in March 2004.China Telecom proposed Internet CALL ME IM system that provide the text message services among PC, PHS and mobile phone and the PC to 13
2 P2P 和 CDN 技 术 融 合 实 现 流 媒 体 业 务 phone voice service in November 2004, and the CALL ME update edition is tested in Guangdong province at present. China Mobile developed the IM Fetion based on Mobile Network that offering the text messages and voice services between a PC and a mobile phone in November 2006.China Union proposed the Mobile Network IM UMS that offering the text messages and voice services between a PC and a mobile phone in August 2007.China Netcom also provided CNCIM based on PHS in April 2007, and would propose CA based on Soft Switch. The development procedure of china IM is shown in figure 1.Figure 1(a) focuses on the time and figure 1(b) focuses on the function [1]. between different IM systems has become a serious problem[2,3]. Table.1 Contrast analyze of mainstream IM (a) For the profit-making mode, most IM platforms still use advertisement as their main way. This advertisement mode includes traditional, initiative and personal way. At the same time, it includes Internet, wireless and fixed-line Increment Services. The corporation mode makes profit by providing IM services for enterprises. The virtual telecommunication operators collect fees form the users to a dial fixed or mobile phone by using the IM software, and make profit with the IM brand patents. (b) Figure1 The development of IM in China ((a)about time,(b)about function) The contrastive analyis of current mainstream IM software such as QQ, MSN, TOM-Skype and Fetion according to the aspects of support network, work mode and protocol etc. is shown in table 1. It could be seen from table 1 that all of the IM platforms based on conventional C/S structure have their own private protocols except TOM-Skype, which is based on P2P mode and has standard protocol. So the IM system would have a bottleneck if the number of the users increases to a certain degree. At the same time, for the protocols not being opened, the interconnection 3 The technology realization scheme of P2P IM Services and deployment strategies After analyzing the contrast of the mainstream IM architecture with P2P technical features, a technical solution of the P2P IM providing a online real-time communication service across Internet, fixed and mobile networks that realized anywhere real-time communication to the users within fixed-telephone, PHS, PC, GSM mobile phone, CDMA mobile phone, GPRS mobile phone, 3G mobile phone and wifi/wimax mobile phone is proposed. The Internet communication services include the PC to PC text messages, presence of PC to PC, PC to PC voice, PC to PC video and PC to PC file transfer; the acrossnetwork data communication services consist of PC 14 信 息 通 信 技 术
3 to PC text messages, presence of PC to PC and PC to PC file transfer; and the across-network multimedia communication services are the PC to PC voices and PC to PC videos. At the same time, the system also supply the increment services based on content with a series of IM applications and the interface with the other services platform or content providers, for example, many people online games and personal spaces etc. management of users, platforms, contents and charges etc. In addition, the operation management level also provides the third-party interfaces. The physics topology of system is shown in figure 3. The established super node consists of chord ring and common users node connected with its adjacent super node that composed of partially decentralized structure topology. At the beginning, a node is a common node, and after it has run for certain time, Figure 2 Logical Architecture of P2P IM The solution adopts the partially decentralized structure topology and SIP/SIMPLE protocol as its calling signal, and the logical architecture is shown in figure 2. The access level is a terminal type of support services that including PC, wifi/wimax phone, fixed phone, PHS, GSM/GPRS/WAP mobile phone, CDMA mobile phone and 3G mobile phone etc. The network level is the uniform P2P overlay network above the access level, this level uses partially decentralized structure topology and is responsible for joining a peer and leaving a peer, choosing the calling route, maintaining the network stability with the chord algorithm and DHT algorithm. The service level is the system that could support services including Internet communication, the across-network data communication, the across-network multimedia communication and the increment services. The operation management level implements the the node could be converted to a super node when the node itself inspect own have enough performance and accessibility (for example, have an IP address and be able to run stably for a long time). The platform management server and content management server mostly manage every super node. The correlate information of users is stored through a database server. The message cache server stores the off-line text messages etc of the users. This system could interconnect with the operators own operation support system and the operators own increment services platform, SP/CP increment services platform and other IM systems through all kinds of interconnection gateway. All the IM services in this paper could be shown by WAP and WEB server. Considering the network of the operator, it is suggested that try to implement this system in one province or in one district in a practical deployment at the beginning. The system of P2P IM deployed in 15
4 P2P 和 CDN 技 术 融 合 实 现 流 媒 体 业 务 a province or a district metropolitan-area networks in the registration stage should be checked. Between (MAN), at the same time, validating usability the the validate communication the users could negotiate mechanism of P2P and the users experience effect a shared key which used for data transmission or by trial the each service function of P2P IM. As the communication stage. The system also provides the P2P architecture continuously mature, the mechanism functions of platform management and maintenance, of control and management improved, the market content release and management, system configure needs farther expand, the accumulate rich operation and management, long-distance monitoring and faults experience step by step, the internet bandwidth diagnose etc. farther increased and mobile terminal equipment its At present, much IM software have many performance better etc, we could deploy the system differences in the service function interface, and of P2P IM in core network. In this time, the system the description of data format that caused the deployment would be very flexibility that adjust the interconnection of different IM applications has dispose of super node which could deployed in core became a serious problem. Now there are two network, a province of backbone network or MAN, solutions, one is based on gateway, and the other is and super node s join, leave, failure all couldn t affect based on multi-protocol client. In this paper, a gateway the system stability. is adopted to realize the interconnection between one IM and another. On account of the real-time character of IM application that caused the network attack spread more fast and the result also more seriously through IM. We should design a specific information security IM system structure for IM garbage messages. For the security of transmission channel, a very credible encrypted channel mechanism is needed but Figure 3 Physics system topology of P2P IM there would not be a very high computing complexity. And for the enterprises, 4 Analyzing the management, it is suggested to build their own EIM (Enterprise IM) interconnection and security of P2P IM server inside, run the specific IM services, inspect and The solution of this paper proposed is a P2P IM note the flow of IM and the operation of IM users to system which could management, controlled and ensure the security of IM services [4]. operated. Before user login the system, user should send certificate request to authenticate server and 5 Analyzing the profit-making mode of through negotiation way to authenticate. The users P2P IM could login the system only using the authentication. When the operators develop the P2P IM services After the user logins the system successfully, the could earn function fee by providing the IM user need to establish a communication or exchange transmission function. The mobile IM could adopt data with the equity peer. Only after the successfully short message and IM client mode, the short message login the system, the users can search their equity charge basically by month and the client mode by peer information. Before the users exchange data, flow. At the same time, entirely deploying Increment the certificate which awarded by authenticate server Services about Internet, wireless, fixed-line etc to 16 信 息 通 信 技 术
5 attain the aim that through IM drive the Increment Services increased and through Increment Services attract the IM uses rise. The operators also may combine with the IM services CP/SP to cooperate and drive the whole IM industry chain harmonious developing. Except the tradition advertisement mode, the operators could attempt new mode including initiative and personal etc. For enterprise customers, the operators can provide IM servers and IM terminals to supply the IM services. And the fee of the PC to phone voice is also collected by the gateway. 6 Conclusion IM has become one of the important Internet applications after and web. The current IM architecture mostly bases on the C/S mode. The particular technical advantages of the IM system based on P2P architecture would be shown when the users and the services increase. This paper focuses on designing a logical and network architecture of P2P IM, analyzing some crucial problems about the management, interconnection, security and profitmaking mode of the P2P IM systems, and giving some practical deployment suggestions for the systems of P2P IM. References [1] iresearch market consultation [2] CHEN Gui-hai, LI Zheng-hua P2P Network: Architecture, Application and Design. Beijing: Tsinghua Press,2007 [3] YANG Tian-lu, LIU Yu-hong etc. The principle of P2P network technology and the examples of system development [M]. Beijing: Post&Telecom Press, 2007 [4] ZHANG Wen-mao, ZHANG Miao etc. Instant Messaging: the Present and the Future. Mini-Micro Systems of Computers, 2007, vol.28, no.7, pp 作 者 简 历 Shen Zhiwei China Netcom Group Labs, Beijing, , China Ma Shaowu China Netcom Group Labs, Beijing, , China 17
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2
More informationAn Advanced Commercial Contact Center Based on Cloud Computing
An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,
More informationResearch on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
More informationAn Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationCDMA-based network video surveillance System Solutions
1 Contact:Peter Zhang Email: sales10@caimore.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to
More informationResearch on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationTowards Cloud Streaming: architecture, mechanism and deployments
outline Towards Cloud Streaming: architecture, mechanism and deployments IETF-78, Clouds bar BoF, July 2010 Xiaogang Wei (arojoy@forcetech.net) Lisa Dewar (lisamariedewar@googlemail.com) About ForceTech
More informationIPv4 and IPv6: Connecting NAT-PT to Network Address Pool
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence
More informationExploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
More informationIntelligent Content Delivery Network (CDN) The New Generation of High-Quality Network
White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming
More informationEfficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
More informationThe Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone
2010 International Conference on E-Business and E-Government The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone Li Shangmeng, Shang Yanlei, Ha Jingjing, Chen Junliang
More informationAUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationA Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
More informationAn Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
More informationICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationResearch on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream
Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Zhong Wei 1, a, Wang Jianming 2, b and Zhang Yang 3, c 1 Beijing University of Posts and Telecommunications,
More informationImplementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
More informationOn Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
More informationWhite Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
More informationIntegrating VoIP Phones and IP PBX s with VidyoGateway
Integrating VoIP Phones and IP PBX s with VidyoGateway Updated February 2011 INDEX: I. ABSTRACT.1 II. III. IV. VIDYOGATEWAY OVERVIEW.. 1 NETWORK TOPOLOGIES AND DEFINITIONS...2 CONNECTING TO VIDYOCONFERENCES
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More informationThe Experimental Practices of VoIP Based on the Commercial Softswitch Device
, pp. 167-176 http://dx.doi.org/10.14257/ijfgcn.2015.8.5.17 The Experimental Practices of VoIP Based on the Commercial Softswitch Device Liang Xin-tao 1, Zhu Hong-yuan 2 and Wang Dun-ci 1 1 College of
More informationMODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:
More informationCisco Videoscape Distribution Suite Service Broker
Data Sheet Cisco Videoscape Distribution Suite Service Broker Product Overview Cisco Videoscape Distribution Suite Service Broker (VDS-SB) encompasses a broad range of capabilities, particularly in accelerating
More informationEnterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical
More informationChapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:
1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationSmall Business Stackable Switch White Paper January 16, 2001
4500 Great America Parkway Santa Clara, CA 95054 Small Business Stackable Switch White Paper January 16, 2001 Today s fast-paced global business arena, spurred by the Internet and World Wide Web (WWW),
More informationAn ECG Monitoring and Alarming System Based On Android Smart Phone
Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android
More informationof the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationUPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
More informationNetwork Platform Makes SP More Brilliant
Network Platform Makes SP More Brilliant 1 CONTENTS 1 Platform Brief Introduction 2 DPI System 3 Network Management Platform 2 Do you want to Win more Customers Offer Better UE Develop More Services 25/04/2014
More informationEnhancing VoIP with Voice Peering
Enhancing VoIP with Voice Peering The Voice Peering Fabric is a service of Stealth Communications. Jinci Liu, Stealth Communications, Inc. Published: July 2005 (last revised January 2006) Abstract From
More informationDEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK
International Journal of Computer Application and Engineering Technology Volume 1-Issue1, January 2012.pp.1-7 www.ijcaet.net DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between
More informationApplication notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.
Avaya Solution & Interoperability Test Lab Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.0 Abstract These Application
More informationCONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
More informationA network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and
NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media
More informationDatawire Secure Transport Value Proposition
Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationIMT-2000 Network Architecture
IMT-2000 Network Architecture vtoshio Shimoe vtakamichi Sano (Manuscript received May 31, 2002) International Mobile Telecommunication-2000 (IMT-2000) is a third-generation mobile communication system.
More informationP2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com
More informationResearch on Cloud Computing Network Architecture Based on SDN Technology Weibo Li
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li wuhan textile university, Wuhan,
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
More informationIPv6 Practices on China Mobile IP Bearer Network
IPv6 Practices on China Mobile IP Bearer Network draft-chen-v6ops-ipv6-bearer-network-trials-00.txt IETF 81-Quebec, July 2011 G. Chen, T. Yang, L. Li and H. Deng Background China Mobile IPv6 trial program
More informationWireless E-commerce Payment and Its Development in China
200 International Conference of Information Science and Management Engineering Wireless E-commerce Payment and Its Development in China Liu Shifeng Zhejiang University, Ningbo Institute of Technology Ningbo,
More informationHuawei Agile WAN Solution
Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationMasters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
More informationMETHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT
Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16
More informationStudy on Value Chain of Telecom VAS under Transformation Background
Communications and Network, 2009, 1, 63-67 doi:10.4236/cn.2009.12010 Published Online November 2009 (http://www.scirp.org/journal/cn). Study on Value Chain of Telecom VAS under Transformation Background
More informationIntegrating voice, video and data networks
Case Study: Integrating voice, video and data networks Steve Johnston steve.johnston@ecu.edu.au Manager, IT Infrastructure Edith Cowan University May 2005 About Edith Cowan University Origins go back to
More informationVOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
More informationConstructing High Quality IP Core Network
Constructing High Quality IP Core Network What we need is not only a network, but also the services that network can provide. ---------Huawei-3Com Constructing networks is much like building bridges or
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationInternet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
More informationSAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
More informationConfiguring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment
Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Application Notes Rev 1.0 P/N 550-06690 Last Updated: October 26, 2015 Revision History Revision Date Revised
More informationEnabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
More informationAlexandre Weffort Thenorio - Data. IP-Telephony
Alexandre Weffort Thenorio - Data IP-Telephony 1. Introduction... 3 2. What is it?... 4 3. Why IP-Telephony?... 4 3.1. Advantages... 4 3.1.1. Cost... 4 3.1.2. Functionality and Mobility... 4 3.2. Disadvantages...
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationLync for Mac 2011 Deployment Guide
2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current
More informationCellular Networks: Background and Classical Vulnerabilities
Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects
More informationNetworks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content
Networks 2 Gabriela Ochoa Lecture Networks 2/Slide 1 Content How is Internet connected? Internet backbone Internet service providers (ISP) How to connect a home computer to the Internet? How do networks
More informationINTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE
INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE Voice over LTE SUBSCRIBER TECHNOLOGY White Paper Mobile operators have invested a lot of time and money in Intelligent Network (IN) services for
More informationSupporting operators as they introduce Voice over LTE
1 / 3 Japanese Monthly Telecommunication Magazine, November issue 2012 Mr. Jukka Hongisto, Nokia Siemens Networks Solution Architect Supporting operators as they introduce Voice over LTE The first commercial
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated
More informationPSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
More informationTroubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
More informationVoIP in the Enterprise
VoIP in the Enterprise Date: March. 2005 Author: Sonia Hanson Version: 1.1 1 1 Background Voice over IP In the late 1990s Voice over IP (VoIP) was seen as a disruptive new technology that had the potential
More informationA SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China
A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China Zhongqiang Liu 1, Kaiyi Wang 1*, Shufeng Wang 1, Feng Yang 1 and Xiandi Zhang 1, 1 Beijing Research Center for
More informationContent Distribution over IP: Developments and Challenges
Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,
More informationIntegration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,
More informationBuilding Service-driven NGN
Building Service-driven NGN Agenda NGN Overview Commercial Cases Total Solution Product Family Current Communication Networks: network-based & device-oriented Network/service provider Subscriber Close
More informationManaged VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs
Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs HOW TO BECOME A VOIP PROVIDER WITHOUT THE HEFTY COSTS? Start
More informationThe NG-OSS Evolution of Telecom Service Providers: From Network-Focused to Customers-Focused
The NG-OSS Evolution of Telecom Service Providers: From Network-Focused to Customers-Focused Lan Wang and Tingjie Lv School of Economics and Management, Beijing University of Posts and Telecommunications,
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More information2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
More informationDESIGN OF DATA CENTER S HIGH RELIABILITY IN LARGE AGRICULTURAL ENTERPRISE
DESIGN OF DATA CENTER S HIGH RELIABILITY IN LARGE AGRICULTURAL ENTERPRISE Hanxing Liu 1, Yingjie Kuang 1, Caixing Liu 1*, Lei Xiao 1, Guomao Xu 2 1 Department of Computer Science and Engineering, South
More informationInternational Journal of Scientific & Engineering Research Volume 3, Issue 12, December-2012 1 ISSN 2229-5518
International Journal of Scientific & Engineering Research Volume 3, Issue 12, December-2012 1 Voice over IP Mobile Telephony Using WIFI Rahul C. Vaidya, Prof. S.S. Kulkarni Abstract :- Voice telephony
More informationWHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationYour Voice is Critical. OpenScape Enterprise voice solutions gives power to voice
Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication
More informationAcme Packet Net-Net SIP Multimedia-Xpress
Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering
More informationRequirements and Service Scenarios for QoS enabled Mobile VoIP Service
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) kolee@etri.re.kr, hsong@etri.re.kr Abstract.
More informationHIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
More informationEnterprise VoIP Services over Mobile Ad-Hoc Technologies
Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the
More informationInformation Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationMobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks
Mobile Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks The Features NetWorks Mobile is a tool for analyzing, planning and optimizing the fixed-line part of your (mobile)
More information