Analysis and Design of Instant Message System Based on P2P

Size: px
Start display at page:

Download "Analysis and Design of Instant Message System Based on P2P"

Transcription

1 Analysis and Design of Instant Message System Based on P2P Shen Zhiwei Ma Shaowu China Netcom Group Labs Beijing Abstract By analyzing current development conditions of mainstream Instant Message technologies and services, some detailed discussion about technical solution and formal operation deployment strategies of P2P Instant Message Services based on Internet is made. Several crucial problems of P2P Instant Message System about services management, interconnection with other instant message, security and profit-making mode are analyzed,, and how to develop P2P IM Services is proposed. Keywords P2P; Instant Message; Session Initiation Protocol; Profit-making Mode 1 Introduction At present, the application of IM (Instant Message) is used very widely, it is able to realize the integrated services based on Internet such as IP voice, data, and images. At the same time, the fee with PC voice one another is almost free,in virtue of the realizing of voice PC to phone must through fixed-line operator s interconnection, the fee is cheaper though not free. The very-low-fee or even cost-free IM software heavily shunt the traditional voice services of the operators. So need analyzing and research the IM, utilizing the technologies advantage of P2P IM to optimize operators own network and services, and bring forward the suited P2P IM scheme for operators faction. For the operators, the use of IM technologies based on P2P architecture would reduce communication equipment investment greatly, improve the network utilization rate and reduce the service development cost. And the operators could exploit many new value-added services based on P2P IM and make it become a new profit increment point. This paper proposes a solution of the IM based on P2P from the aspects of technical realization and service deployment by analyzing current mainstream IM technologies. 2 The current development conditions of Instant Message services Resently, with the rapid incensement of the number of the Internet users, the users of the IM also increase. Based on the I-Research market expection, the IM users all over the world would increase from 490 million in 2007 to 650 million in 2010, and the scale of IM market would increase from 150 million dollars to 280 hundred million dollars in The operators at home and abroad continuously propose new services. England Telecom had put forward a new Internet service that from Yahoo IM product to a phone in March 2004.China Telecom proposed Internet CALL ME IM system that provide the text message services among PC, PHS and mobile phone and the PC to 13

2 P2P 和 CDN 技 术 融 合 实 现 流 媒 体 业 务 phone voice service in November 2004, and the CALL ME update edition is tested in Guangdong province at present. China Mobile developed the IM Fetion based on Mobile Network that offering the text messages and voice services between a PC and a mobile phone in November 2006.China Union proposed the Mobile Network IM UMS that offering the text messages and voice services between a PC and a mobile phone in August 2007.China Netcom also provided CNCIM based on PHS in April 2007, and would propose CA based on Soft Switch. The development procedure of china IM is shown in figure 1.Figure 1(a) focuses on the time and figure 1(b) focuses on the function [1]. between different IM systems has become a serious problem[2,3]. Table.1 Contrast analyze of mainstream IM (a) For the profit-making mode, most IM platforms still use advertisement as their main way. This advertisement mode includes traditional, initiative and personal way. At the same time, it includes Internet, wireless and fixed-line Increment Services. The corporation mode makes profit by providing IM services for enterprises. The virtual telecommunication operators collect fees form the users to a dial fixed or mobile phone by using the IM software, and make profit with the IM brand patents. (b) Figure1 The development of IM in China ((a)about time,(b)about function) The contrastive analyis of current mainstream IM software such as QQ, MSN, TOM-Skype and Fetion according to the aspects of support network, work mode and protocol etc. is shown in table 1. It could be seen from table 1 that all of the IM platforms based on conventional C/S structure have their own private protocols except TOM-Skype, which is based on P2P mode and has standard protocol. So the IM system would have a bottleneck if the number of the users increases to a certain degree. At the same time, for the protocols not being opened, the interconnection 3 The technology realization scheme of P2P IM Services and deployment strategies After analyzing the contrast of the mainstream IM architecture with P2P technical features, a technical solution of the P2P IM providing a online real-time communication service across Internet, fixed and mobile networks that realized anywhere real-time communication to the users within fixed-telephone, PHS, PC, GSM mobile phone, CDMA mobile phone, GPRS mobile phone, 3G mobile phone and wifi/wimax mobile phone is proposed. The Internet communication services include the PC to PC text messages, presence of PC to PC, PC to PC voice, PC to PC video and PC to PC file transfer; the acrossnetwork data communication services consist of PC 14 信 息 通 信 技 术

3 to PC text messages, presence of PC to PC and PC to PC file transfer; and the across-network multimedia communication services are the PC to PC voices and PC to PC videos. At the same time, the system also supply the increment services based on content with a series of IM applications and the interface with the other services platform or content providers, for example, many people online games and personal spaces etc. management of users, platforms, contents and charges etc. In addition, the operation management level also provides the third-party interfaces. The physics topology of system is shown in figure 3. The established super node consists of chord ring and common users node connected with its adjacent super node that composed of partially decentralized structure topology. At the beginning, a node is a common node, and after it has run for certain time, Figure 2 Logical Architecture of P2P IM The solution adopts the partially decentralized structure topology and SIP/SIMPLE protocol as its calling signal, and the logical architecture is shown in figure 2. The access level is a terminal type of support services that including PC, wifi/wimax phone, fixed phone, PHS, GSM/GPRS/WAP mobile phone, CDMA mobile phone and 3G mobile phone etc. The network level is the uniform P2P overlay network above the access level, this level uses partially decentralized structure topology and is responsible for joining a peer and leaving a peer, choosing the calling route, maintaining the network stability with the chord algorithm and DHT algorithm. The service level is the system that could support services including Internet communication, the across-network data communication, the across-network multimedia communication and the increment services. The operation management level implements the the node could be converted to a super node when the node itself inspect own have enough performance and accessibility (for example, have an IP address and be able to run stably for a long time). The platform management server and content management server mostly manage every super node. The correlate information of users is stored through a database server. The message cache server stores the off-line text messages etc of the users. This system could interconnect with the operators own operation support system and the operators own increment services platform, SP/CP increment services platform and other IM systems through all kinds of interconnection gateway. All the IM services in this paper could be shown by WAP and WEB server. Considering the network of the operator, it is suggested that try to implement this system in one province or in one district in a practical deployment at the beginning. The system of P2P IM deployed in 15

4 P2P 和 CDN 技 术 融 合 实 现 流 媒 体 业 务 a province or a district metropolitan-area networks in the registration stage should be checked. Between (MAN), at the same time, validating usability the the validate communication the users could negotiate mechanism of P2P and the users experience effect a shared key which used for data transmission or by trial the each service function of P2P IM. As the communication stage. The system also provides the P2P architecture continuously mature, the mechanism functions of platform management and maintenance, of control and management improved, the market content release and management, system configure needs farther expand, the accumulate rich operation and management, long-distance monitoring and faults experience step by step, the internet bandwidth diagnose etc. farther increased and mobile terminal equipment its At present, much IM software have many performance better etc, we could deploy the system differences in the service function interface, and of P2P IM in core network. In this time, the system the description of data format that caused the deployment would be very flexibility that adjust the interconnection of different IM applications has dispose of super node which could deployed in core became a serious problem. Now there are two network, a province of backbone network or MAN, solutions, one is based on gateway, and the other is and super node s join, leave, failure all couldn t affect based on multi-protocol client. In this paper, a gateway the system stability. is adopted to realize the interconnection between one IM and another. On account of the real-time character of IM application that caused the network attack spread more fast and the result also more seriously through IM. We should design a specific information security IM system structure for IM garbage messages. For the security of transmission channel, a very credible encrypted channel mechanism is needed but Figure 3 Physics system topology of P2P IM there would not be a very high computing complexity. And for the enterprises, 4 Analyzing the management, it is suggested to build their own EIM (Enterprise IM) interconnection and security of P2P IM server inside, run the specific IM services, inspect and The solution of this paper proposed is a P2P IM note the flow of IM and the operation of IM users to system which could management, controlled and ensure the security of IM services [4]. operated. Before user login the system, user should send certificate request to authenticate server and 5 Analyzing the profit-making mode of through negotiation way to authenticate. The users P2P IM could login the system only using the authentication. When the operators develop the P2P IM services After the user logins the system successfully, the could earn function fee by providing the IM user need to establish a communication or exchange transmission function. The mobile IM could adopt data with the equity peer. Only after the successfully short message and IM client mode, the short message login the system, the users can search their equity charge basically by month and the client mode by peer information. Before the users exchange data, flow. At the same time, entirely deploying Increment the certificate which awarded by authenticate server Services about Internet, wireless, fixed-line etc to 16 信 息 通 信 技 术

5 attain the aim that through IM drive the Increment Services increased and through Increment Services attract the IM uses rise. The operators also may combine with the IM services CP/SP to cooperate and drive the whole IM industry chain harmonious developing. Except the tradition advertisement mode, the operators could attempt new mode including initiative and personal etc. For enterprise customers, the operators can provide IM servers and IM terminals to supply the IM services. And the fee of the PC to phone voice is also collected by the gateway. 6 Conclusion IM has become one of the important Internet applications after and web. The current IM architecture mostly bases on the C/S mode. The particular technical advantages of the IM system based on P2P architecture would be shown when the users and the services increase. This paper focuses on designing a logical and network architecture of P2P IM, analyzing some crucial problems about the management, interconnection, security and profitmaking mode of the P2P IM systems, and giving some practical deployment suggestions for the systems of P2P IM. References [1] iresearch market consultation [2] CHEN Gui-hai, LI Zheng-hua P2P Network: Architecture, Application and Design. Beijing: Tsinghua Press,2007 [3] YANG Tian-lu, LIU Yu-hong etc. The principle of P2P network technology and the examples of system development [M]. Beijing: Post&Telecom Press, 2007 [4] ZHANG Wen-mao, ZHANG Miao etc. Instant Messaging: the Present and the Future. Mini-Micro Systems of Computers, 2007, vol.28, no.7, pp 作 者 简 历 Shen Zhiwei China Netcom Group Labs, Beijing, , China Ma Shaowu China Netcom Group Labs, Beijing, , China 17

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

An Advanced Commercial Contact Center Based on Cloud Computing

An Advanced Commercial Contact Center Based on Cloud Computing An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

CDMA-based network video surveillance System Solutions

CDMA-based network video surveillance System Solutions 1 Contact:Peter Zhang Email: sales10@caimore.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Towards Cloud Streaming: architecture, mechanism and deployments

Towards Cloud Streaming: architecture, mechanism and deployments outline Towards Cloud Streaming: architecture, mechanism and deployments IETF-78, Clouds bar BoF, July 2010 Xiaogang Wei (arojoy@forcetech.net) Lisa Dewar (lisamariedewar@googlemail.com) About ForceTech

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone 2010 International Conference on E-Business and E-Government The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone Li Shangmeng, Shang Yanlei, Ha Jingjing, Chen Junliang

More information

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Zhong Wei 1, a, Wang Jianming 2, b and Zhang Yang 3, c 1 Beijing University of Posts and Telecommunications,

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Integrating VoIP Phones and IP PBX s with VidyoGateway

Integrating VoIP Phones and IP PBX s with VidyoGateway Integrating VoIP Phones and IP PBX s with VidyoGateway Updated February 2011 INDEX: I. ABSTRACT.1 II. III. IV. VIDYOGATEWAY OVERVIEW.. 1 NETWORK TOPOLOGIES AND DEFINITIONS...2 CONNECTING TO VIDYOCONFERENCES

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

The Experimental Practices of VoIP Based on the Commercial Softswitch Device

The Experimental Practices of VoIP Based on the Commercial Softswitch Device , pp. 167-176 http://dx.doi.org/10.14257/ijfgcn.2015.8.5.17 The Experimental Practices of VoIP Based on the Commercial Softswitch Device Liang Xin-tao 1, Zhu Hong-yuan 2 and Wang Dun-ci 1 1 College of

More information

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:

More information

Cisco Videoscape Distribution Suite Service Broker

Cisco Videoscape Distribution Suite Service Broker Data Sheet Cisco Videoscape Distribution Suite Service Broker Product Overview Cisco Videoscape Distribution Suite Service Broker (VDS-SB) encompasses a broad range of capabilities, particularly in accelerating

More information

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical

More information

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test: 1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Small Business Stackable Switch White Paper January 16, 2001

Small Business Stackable Switch White Paper January 16, 2001 4500 Great America Parkway Santa Clara, CA 95054 Small Business Stackable Switch White Paper January 16, 2001 Today s fast-paced global business arena, spurred by the Internet and World Wide Web (WWW),

More information

An ECG Monitoring and Alarming System Based On Android Smart Phone

An ECG Monitoring and Alarming System Based On Android Smart Phone Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Network Platform Makes SP More Brilliant

Network Platform Makes SP More Brilliant Network Platform Makes SP More Brilliant 1 CONTENTS 1 Platform Brief Introduction 2 DPI System 3 Network Management Platform 2 Do you want to Win more Customers Offer Better UE Develop More Services 25/04/2014

More information

Enhancing VoIP with Voice Peering

Enhancing VoIP with Voice Peering Enhancing VoIP with Voice Peering The Voice Peering Fabric is a service of Stealth Communications. Jinci Liu, Stealth Communications, Inc. Published: July 2005 (last revised January 2006) Abstract From

More information

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK International Journal of Computer Application and Engineering Technology Volume 1-Issue1, January 2012.pp.1-7 www.ijcaet.net DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.

Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1. Avaya Solution & Interoperability Test Lab Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.0 Abstract These Application

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

Datawire Secure Transport Value Proposition

Datawire Secure Transport Value Proposition Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

IMT-2000 Network Architecture

IMT-2000 Network Architecture IMT-2000 Network Architecture vtoshio Shimoe vtakamichi Sano (Manuscript received May 31, 2002) International Mobile Telecommunication-2000 (IMT-2000) is a third-generation mobile communication system.

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information

Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li

Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Research on Cloud Computing Network Architecture Based on SDN Technology Weibo Li wuhan textile university, Wuhan,

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

IPv6 Practices on China Mobile IP Bearer Network

IPv6 Practices on China Mobile IP Bearer Network IPv6 Practices on China Mobile IP Bearer Network draft-chen-v6ops-ipv6-bearer-network-trials-00.txt IETF 81-Quebec, July 2011 G. Chen, T. Yang, L. Li and H. Deng Background China Mobile IPv6 trial program

More information

Wireless E-commerce Payment and Its Development in China

Wireless E-commerce Payment and Its Development in China 200 International Conference of Information Science and Management Engineering Wireless E-commerce Payment and Its Development in China Liu Shifeng Zhejiang University, Ningbo Institute of Technology Ningbo,

More information

Huawei Agile WAN Solution

Huawei Agile WAN Solution Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16

More information

Study on Value Chain of Telecom VAS under Transformation Background

Study on Value Chain of Telecom VAS under Transformation Background Communications and Network, 2009, 1, 63-67 doi:10.4236/cn.2009.12010 Published Online November 2009 (http://www.scirp.org/journal/cn). Study on Value Chain of Telecom VAS under Transformation Background

More information

Integrating voice, video and data networks

Integrating voice, video and data networks Case Study: Integrating voice, video and data networks Steve Johnston steve.johnston@ecu.edu.au Manager, IT Infrastructure Edith Cowan University May 2005 About Edith Cowan University Origins go back to

More information

VOIP Security Essentials. Jeff Waldron

VOIP Security Essentials. Jeff Waldron VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry

More information

Constructing High Quality IP Core Network

Constructing High Quality IP Core Network Constructing High Quality IP Core Network What we need is not only a network, but also the services that network can provide. ---------Huawei-3Com Constructing networks is much like building bridges or

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Application Notes Rev 1.0 P/N 550-06690 Last Updated: October 26, 2015 Revision History Revision Date Revised

More information

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,

More information

Alexandre Weffort Thenorio - Data. IP-Telephony

Alexandre Weffort Thenorio - Data. IP-Telephony Alexandre Weffort Thenorio - Data IP-Telephony 1. Introduction... 3 2. What is it?... 4 3. Why IP-Telephony?... 4 3.1. Advantages... 4 3.1.1. Cost... 4 3.1.2. Functionality and Mobility... 4 3.2. Disadvantages...

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Lync for Mac 2011 Deployment Guide

Lync for Mac 2011 Deployment Guide 2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current

More information

Cellular Networks: Background and Classical Vulnerabilities

Cellular Networks: Background and Classical Vulnerabilities Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects

More information

Networks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Networks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content Networks 2 Gabriela Ochoa Lecture Networks 2/Slide 1 Content How is Internet connected? Internet backbone Internet service providers (ISP) How to connect a home computer to the Internet? How do networks

More information

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE Voice over LTE SUBSCRIBER TECHNOLOGY White Paper Mobile operators have invested a lot of time and money in Intelligent Network (IN) services for

More information

Supporting operators as they introduce Voice over LTE

Supporting operators as they introduce Voice over LTE 1 / 3 Japanese Monthly Telecommunication Magazine, November issue 2012 Mr. Jukka Hongisto, Nokia Siemens Networks Solution Architect Supporting operators as they introduce Voice over LTE The first commercial

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, November 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated

More information

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch. As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched

More information

Troubleshooting Voice Over IP with WireShark

Troubleshooting Voice Over IP with WireShark Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service

More information

VoIP in the Enterprise

VoIP in the Enterprise VoIP in the Enterprise Date: March. 2005 Author: Sonia Hanson Version: 1.1 1 1 Background Voice over IP In the late 1990s Voice over IP (VoIP) was seen as a disruptive new technology that had the potential

More information

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China Zhongqiang Liu 1, Kaiyi Wang 1*, Shufeng Wang 1, Feng Yang 1 and Xiandi Zhang 1, 1 Beijing Research Center for

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,

More information

Building Service-driven NGN

Building Service-driven NGN Building Service-driven NGN Agenda NGN Overview Commercial Cases Total Solution Product Family Current Communication Networks: network-based & device-oriented Network/service provider Subscriber Close

More information

Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs

Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs HOW TO BECOME A VOIP PROVIDER WITHOUT THE HEFTY COSTS? Start

More information

The NG-OSS Evolution of Telecom Service Providers: From Network-Focused to Customers-Focused

The NG-OSS Evolution of Telecom Service Providers: From Network-Focused to Customers-Focused The NG-OSS Evolution of Telecom Service Providers: From Network-Focused to Customers-Focused Lan Wang and Tingjie Lv School of Economics and Management, Beijing University of Posts and Telecommunications,

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

DESIGN OF DATA CENTER S HIGH RELIABILITY IN LARGE AGRICULTURAL ENTERPRISE

DESIGN OF DATA CENTER S HIGH RELIABILITY IN LARGE AGRICULTURAL ENTERPRISE DESIGN OF DATA CENTER S HIGH RELIABILITY IN LARGE AGRICULTURAL ENTERPRISE Hanxing Liu 1, Yingjie Kuang 1, Caixing Liu 1*, Lei Xiao 1, Guomao Xu 2 1 Department of Computer Science and Engineering, South

More information

International Journal of Scientific & Engineering Research Volume 3, Issue 12, December-2012 1 ISSN 2229-5518

International Journal of Scientific & Engineering Research Volume 3, Issue 12, December-2012 1 ISSN 2229-5518 International Journal of Scientific & Engineering Research Volume 3, Issue 12, December-2012 1 Voice over IP Mobile Telephony Using WIFI Rahul C. Vaidya, Prof. S.S. Kulkarni Abstract :- Voice telephony

More information

WHITE PAPER. Gaining Total Visibility for Lawful Interception

WHITE PAPER. Gaining Total Visibility for Lawful Interception WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication

More information

Acme Packet Net-Net SIP Multimedia-Xpress

Acme Packet Net-Net SIP Multimedia-Xpress Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering

More information

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) kolee@etri.re.kr, hsong@etri.re.kr Abstract.

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Mobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks

Mobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks Mobile Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks The Features NetWorks Mobile is a tool for analyzing, planning and optimizing the fixed-line part of your (mobile)

More information