A Source Discovery Protocol for ASM Applications in SSM Networks
|
|
|
- Barbra King
- 9 years ago
- Views:
Transcription
1 A Source Discovery Protocol for ASM Applications in SSM Networks Mickaël Hoerdt, Frédéric Beck Université Louis Pasteur LSIIT Boulevard Sébastien Brant Illkirch, France Damien Magoni Université Louis Pasteur LSIIT Boulevard Sébastien Brant Illkirch, France Jean-Jacques Pansiot Université Louis Pasteur LSIIT Boulevard Sébastien Brant Illkirch, France Abstract The Single Source Multicast (SSM) model has considerable attention from the research community as it could finally bring a scalable solution for some multicast applications. In the SSM model it is the responsibility of the applications to tell the network what are their sources of interest. As a consequence, the SSM model is well suited for one to many multicast applications (such as TV and radio streaming) because there is only one source to discover and it is supposed to be well known. However there still does not exist an SSM session layer protocol and middleware in order to help Any Source Multicast (ASM) applications to discover the presence or departure of the SSM sources. In this paper, we propose a detailed architecture for such a source discovery session layer protocol. We have implemented our protocol as a middleware called Libemu and freely available as an open source library. I. INTRODUCTION Classical multicast multi-sources applications use the Deering s [1] ASM group communication model where anyone, including non-members, can send packets with one local operation to a group identifier G with best effort guarantees that its packets will be transmitted to all group members: the network duplicates packets and manages the dynamics of sources and receivers. With the new Holbrook s [2] SSM model it is the responsibility of applications to tell the network who are their sources of interest. In this paper we propose a detailed architecture and implementation of a source discovery session layer protocol for making ASM applications able to use SSM sources. Among the most important sections of this paper, section IV presents an overview of the problem and our solution to it. In section V we describe the ASM over SSM emulation part of the protocol. Section VI presents an optional source management mechanism to perform some control operations on an applicative group. Finally section VII shows the various states in which a source can be. II. PREVIOUS WORK In his thesis [2], Holbrook considered the case of using multi-source applications in SSM network only environment. He defined two schemes, an hybrid approach of them and evaluated them: he proposed a sender advertisement scheme using a control channel and a session relaying scheme using a central node, and argues that both of them have advantages and drawbacks. He measured the startup delay of the sessions and simulated both propositions but did not define an architecture for it. That s why we propose a detailed architecture based on his idea in this paper. In paper [3] Chesterfield and Schooler propose to modify RTP/RTCP to have it working under SSM environment. It is aimed at large scale multimedia distribution and control and dot not consider the case of medium sized multiparty conferences. Their solution could work under specific applications [4], [5] but reduces the information provided by RTP/RTCP protocol for conference applications and could only work with multicast applications using RTP/RTCP. We try here to define an architecture aimed at multi-source applications, as independent as possible from the application and only providing independent services for an applicative group. An architecture based on session relaying has been proposed in [6]. They propose to put multiple proxies on the network to improve the deployment of SSM. They do not consider the problem of multi-source in SSM networks. A more recent work proposes to modify the SSM model to allow multiple source to emit toward a channel [7]. They argue that this require little modifications in the forwarding state entries, improve the multicast state scalability, and eliminate the single point of failure problem present in the solutions proposed in [2]. We believe that their solution will require a very high deployment effort as it require to change the IGMP and PIM-SSM specification, in the hosts and in the routers. This paper describes a protocol which could be used in the current SSM architecture to achieve the source discovery in the existing SSM Network. We have implemented the protocol as a freely available library for the research community [8]. III. MOTIVATION AND GOALS As a first point, we would like to have a quickly usable architecture, according to the latest network and application research efforts. We would like to be able to use multisource multicast at the inter-domain Internet scale too. This means using SSM service, because it is simple to maintain for operators and because it is believed to be a viable solution for large scale Internet multicast. Second, this proposition must be scalable regarding the number of announced sources and fault tolerant regarding the
2 source dynamics. This means using soft-state retransmission and UDP for control messages. For application performances and ease of portability, the architecture must be as transparent as possible with respect to the classical ASM model. On the implementation viewpoint, this architecture must be portable, independent of the IP version stack used and easy to use for an application developer. IV. PROBLEM OVERVIEW In this section, we will describe an architecture that solves the problems cited, and permits the use of channels in multisender applications. This architecture is inspired by Hugh W. Holbrook s thesis [2]. A. Problems to solve We aim to use channels in multi-sender applications, but to do so, we have several problems to solve. Firstly, in the ASM model described by Deering, a multicast group is only identified by its IP address. But here, we will work with SSM multicast channels, which are described by a tuple (S,G) composed of the unicast IP address of a source S and an IP multicast address G where only S is allowed to put data in. But then, knowing that at the moment, in most of the multi-source multicast applications a multicast group is identified by both its IP multicast address and the port used to send data to, the problem of identifying a multicast group appears. Secondly, on the one hand, in ASM when a receiver joins a group, he discovers automatically the sources when they send data to the group. In the same way, when a new source appears, the receivers learn it simply by receiving the packets sent. On the other hand, with the SSM model, no such mechanism exists, because we work with channels (S,G) where S is the single source being able to emit on this channel. Consequently, the receivers must have a way of discovering the active sources and being informed of the arrival of new ones. To achieve these goals, we have two choices as exposed in [2]: Session Relaying. Sender Advertising. We will now explain a solution, based on sender advertising. B. Solution proposed This solution uses at least a channel per source, and a control channel, used for relaying various administration information and source advertising for the group. This control channel identifies the multicast group, and runs on top of UDP for sending data. Therefore, to announce a group, it is only necessary to advertise this channel and the UDP port used, receivers having only to join the multicast channel and bind it to obtain all information necessary to take part in the session. The source of this control channel will be the controller of the group, and will perform various operations for this group, like advertising new sources, giving the list of the existing ones on demand and optionally making some network group management. As it is possible for the same controller to have authority for several groups, it has been decided to use a single controller that takes care of multiple groups. This controller uses a single UDP socket listening on an announced port to communicate with the sources or the receivers which want to learn the existing sources. The source advertising messages and other administration messages are sent to all the receivers via the control channel. One control channel corresponds to one ASM group at the network level. This controller takes care on a controller S of all the control channels identified by a channel (S,...). These channels do not necessarily use the same UDP port to sent data to. This controller is run at the application level of the OSI model, because it takes care of the interaction between the network and the applications used in multicast sessions. The advantage of having this controller running on the application layer, is that it is possible to choose its location so that the performances are the best, and it introduces the possibility of doing group management at the application layer. Moreover to manipulate UDP socket is very easy and allows quick implementation on the hosts. This paper describes a protocol which could be used between the sources or the receivers and the controller in SSM networks to manage sources. V. ASM OVER SSM EMULATION In this section, we describe the ASM over SSM emulation part of the protocol, which means the way the receivers learn the active sources for a group at a given time, and the new ones which could appear during the session. A. Protocol description for source-controller interaction Now we will describe the interaction between a source for a group, and the controller (that means the controller responsible of source announcing ) for this group. We ll only take a look at the source advertising, the group management control is optional and is described in Section VI. 1) With a new source: When a new source wants to announce itself, it must begin by informing the controller. The controller then stores the information about the source in its cache. To achieve robustness and scalability, this announcement is sent periodically with a message composed of the protocol header with an optional SDP payload [9], [10]. We call this message ON. It is sent to the UDP socket of the controller s process. This message must contain all the necessary information for a receiver to join the channel used by the source to send its data to the group. It is composed of the new source channel information and possibly transport or protocol over IP information. It must be noted that the transport information is only destined to applications and not the protocol described here. In the previous example, the application behavior is the same than the ASM one. It means that UDP sources have to send
3 to the same UDP announced port and that each receiver have to bind on the same UDP port for data reception. Once this message ON has been treated, the controller announces the source to the receivers and optionally send an ON RESP to the new source to inform it about various session parameters, depending on the group management policy. To do so, it forwards this message to the whole group via the control channel, if the source is allowed to send data to the group. Therefore, all the receivers learn that this source exists, and are able to join the channel it uses to send data if desired. Figure 1 illustrates this mechanism. multicast applications working over IP could use this source discovery protocol. The message OFF is almost identical to the message ON. It is sent to the announced port of the control channel on an UDP socket and is a message composed of this protocol s header with payload containing the identifier of the group and the identifier of the channel used to send data. These two parameters are sufficient to leave the channel corresponding to the source. If the message OFF is lost, the source timer will expire in the controller cache because it is no more updated with the periodic ON messages. As a consequence a OFF message will be sent in the control channel and the receivers will unsubscribe for this source. Fig. 1. Interaction Source-Controller for a message ON 2) With an existing source: Periodically, a source must send a message ON to the controller, in order to inform it that it is still active, and the controller forwards this message on its control channel to the receivers. For each source, the controller keeps a timer ON validity which gives the time the source entry in his cache is valid. If the controller does not receive such a message before the timer associated with the source ends, it considers that the source is not active anymore, removes the corresponding entry in his cache and sends a message OFF to inform the receivers that this source no longer exists. The sources and the receivers also have to maintain timers in order to take care of the validity of the various information and messages. For example, a source has to run a timer for the validity of a message ON in order to take care of the periodical sent of this message. A source can also explicitly announce that it stops its activity by sending a message OFF to the controller, which removes the corresponding entry in its cache and forwards this message on the corresponding control channel in order to inform the receivers, which then leave this channel. The mechanism is illustrated on figure 2. Note that some upper layer protocols already have a function to advertise the end in a session participation(bye packets from RTCP protocol). this mechanism may be redundant for some applications but one important thing of our approach is that the control plane is over UDP and the data plane is over IP. This means that any Fig. 2. Interaction Source-Controller for a message OFF B. Protocol description for receiver-controller interaction Here we describe the interaction between a receiver and the group s controller. We distinguish the case when a receiver demands information about the sources which are active for the group, and the case when a source has announced itself. 1) Information Request: The controller acts here as a directory of sources. A receiver which wants to learn the list of the existing sources for a group on which the controller has authority, sends him a unicast message on a known port from the receiver. This message is an UDP packet with a payload containing the protocol header and the group identifier, which is the tuple (S,G). We call this message a message INFO REQ. When the controller receives such a message, it takes a look at its cache, and responds to the receiver in unicast with a message INFO RESP giving this list of sources and enough information for the receiver to join the corresponding channels if wanted. If the controller wants to be able to give these information, it has to maintain a cache containing all these. That means that the cache must contain the group identifier (S,G), if there are more than one controller, the control channels used by these controllers, the dates of beginning and ending of validity of the session, and the source list. That gives the table I. The source list is composed of zero or several entries. Each entry describes a source and gives the information that a
4 TABLE I CONTROLLER S CACHE INFORMATION control channel second control channel other control channels beginning ending sources receiver may need to join the channel used for sending data to the group. Such an entry is illustrated on table II. TABLE II SOURCE LIST DETAILS sending channel port KICKED MUTED coding information Timer The flags KICKED and MUTED are used if source management operations are performed, and are set to 0 by default, and the coding information are optional. This cache is used by the controller to store all the information for a group, but the receivers have to maintain the same cache, but limited to the joined applicative group. This cache is updated thanks to the messages sent on the control channel. The message INFO RESP is an UDP packet with as payload this protocol s header with a SDP description describing the session and the sources. The SDP part contains the group identifier, the dates of beginning and end of validity of the session, and a list of zero or more channels and ports used by the sources to send data to the group, and possibly more information about these sources which the receivers could need. When a receiver receives a packet INFO RESP,ifithas not done so yet, it joins the control channel, and does the same with the channels used by the sources which it has interest in. See Figure 3. Fig. 3. Interaction Receiver-Controller 2) Source advertising: When a new source announces its activity to the controller. The controller has to inform all the receivers. To do so, it forwards the message ON from the source on the control channel. In the same way, when the controller detects the explicit or implicit departure of a source, it forwards or sends, according to the case, a message OFF for this source on the control channel. VI. SOURCE MANAGEMENT CAPABILITIES This protocol allows the possibility to perform some control operations on an applicative group. These source management operations are optional. In this section, we give two examples of such operations, the KICK and MUTE mechanisms, inspired by the control operations available in the IRC protocol [11]. A. KICK The KICK operation consists in forbidding a source to send data to the group. As we are using channels, the controller cannot block the traffic from the source, but it has the possibility to advice the receivers to not receive it. Indeed, if a source is not wanted anymore for a group, the flag KICKED is set in the entry corresponding from the controller s cache, and a message KICK is sent on the control channel for this source. Then, all the receivers learn that the source is not desired anymore and have the possibility to leave the corresponding channel, after having set the flag KICKED in their cache. As the source is still active, it sends periodically ON messages to the controller, but as long as the flag KICKED is set for this source, the controller does not forward these messages, but instead sends a KICK message. If the source is authorized to emit again, it is enough to withdraw the KICKED flag and to propagate a message ON for this source on the control channel, the receivers unsetting the KICKED flag in their cache will have the possibility to join again the corresponding channel if it has been left. This mechanism is transparent for the sources: this operation is done by the receivers which are supposed to leave the channel used by the source. B. MUTE This mechanism is less violent than the KICK one. Here the source is not undesirable, but in order to save resources or to maintain session integrity, it is wished that only specified sources transmit data at a given time. To do so, the controller sends a message MUTE containing the group identifier to the sources that should not send data. When they receive such a message, sent in unicast to their announced port UDP (the address is known from the channel used to send data to), the sources stop sending data on their channels, but keep doing the other things like sending periodical ON messages to the controller. To authorize the source to emit again, a message UNMUTE containing the group identifier is send to the source. If a source has been asked to mute, the flag MUTED is set in the corresponding entry in the controller s cache, and this flag is removed if the source is authorized to send data to the group. As long as the flag MUTE is set, the controller periodically sends MUTE message to the source. This operation is totally transparent for the receivers, unlike the KICK one where they have to perform JOIN and LEAVE actions. But this operation needs the cooperation of the source
5 which has to stop sending data to the group. That implies that sources also run a process which listens on this port and performs the needed operations if MUTE or UNMUTE messages are. C. Timers To perform all these operations, both the source and the controller have to keep running timers, in order to take care of the validity of KICK and MUTE messages. If the timer associated to the MUTE message expires, the source decides that it can send data again, removes the MUTE flag and sends again on its data channel. A receiver has to run a timer giving the validity of a KICK message. If this timer runs out, the KICKED flag is removed and the channel data corresponding to the source is joined (if it was left). In the same way, the controller has to maintain two timers giving the duration before the next sent of a KICK or MUTE message. The timers used for KICK and MUTE periodical messages have the same value than the timer used for the ON message. VII. STATES OF THE SOURCE In this section, we describe the different states in which a source can be, depending on the action realized thanks to this protocol. We will distinguish the ASM over SSM emulation part and the Control operations. A. ASM over SSM emulation states The different states in which a source can be in this case are: ACTIVE: the source is considered to be active, notifying it periodically to the controller with ON messages. INACTIVE: the source has never been active or has sent a OFF message. The following state diagram illustrated in figure 4 describes the different states and the transition between them for the ASM over SSM emulation part, which means the source advertising. B. Source management states If the optional source management operations are performed, some new states are introduced. The different states in which a source can be in this case are: ACTIVE: the source is normally active. MUTED: The source has been asked by the controller to stop sending data on its channel. KICKED: The source has been KICKED by the controller (but it is still active). INACTIVE: The source has announced that it is not active anymore. The MUTE state is transparent for the receivers, the muted source s channel (multicast tree) is kept. This state is only available for sources. In the same way, the KICKED state has only sense for the receivers, the channel of a kicked source is removed (actually it is virtually removed by the controller s KICK message, the source keeps its data channel and keeps on sending data on it). We can imagine that we send a message KICK to the source to advertise it that it has been kicked from the session, but it is not an obligation as the receivers will not get the data anymore. The INACTIVE state is reached when the receiver has the OFF message forwarded on the control channel. The following state diagram illustrated in figure 5 describes the different states and the transition between them for the source management operations. Mute Unmute Muted Off Active On Kick Kicked Off Inactive Inactive UnRegister_a_source (Send OFF) Fig. 4. Register_a_source (Send ON) Received On_resp (update local middleware info) Active Timer On cycle expired (Send ON) State diagram for ASM over SSM emulation Fig. 5. State diagram for source management VIII. BREAKDOWNS AND CONSEQUENCES The basic idea to prevent breakdowns is setup a backup controller. The master controller S sends on its control channel periodical ALIVE messages to show that it is always active. This message is a UDP packet with this protocol s header and a SDP description containing the group identifier for which it is the controller. If the backup controller S does not receive any ALIVE message from S on (S,G) after the configured time, it considers that S is down and begins sending ALIVE packets and source
6 advertising. A source which was kicked by the other controller will be announced as active the next time it sends a message ON unless the new one kicks it. In the same way, a source that has been asked to mute, after the timer of the validity of the MUTE message has expired, will begin to send data again. To avoid this situation, it is possible to distribute this by adding a KICK flag in each receiver s cache. Then, if the master controller kicks a source, it announces it with a message KICK, which causes this KICK to be set in all receivers, including the second master. This flag would be valid until a ON message for this source is sent. Such a mechanism gives us at the application level the possibility for the application based on this protocol to ask the user if he still wants to receive data from the source even if the controller recommends to kick it, or if he wants to follow the controller s order in case of a MUTE message. Supposing that the master controller S breaks down, S detects it and begins assuming this role as already described earlier. A receiver that has already joined the group is a member of both control channels, and then receives the control data on (S,G ), and except the time until S takes the control, nothing special happens. In the same way, a receiver that wants to join the session joins both control channels, and has the information he needs from S. IX. TIMERS AND THEIR DEFAULT VALUES The messages ON, KICK and MUTE are sent periodically in order to add robustness to the protocol. Therefore, we have to use several timers to define the validity of the different states and information. In this section, we describe the different timers used by this protocol and their default value. Some of them are configurable, the other ones depend on each others. ON Validity : This timer describe the validity of a source entry in the controller s cache. It is the reference used to define most of other timers. If we allow its value to being configurable, we could distribute it to the sources and the receivers thanks to the ON message. Default: 15 seconds. ON F orwarding : This timer describes the period the controller uses to send ON messages on the control channel. Default: 1/3 * ON Validity (5 seconds). ON Cycle : The ON Cycle is the period between two ON messages sent by a source. In order to be robust to one message ON lost, we must have 2 * ON Cycle > ON Validity Default: 1/3 ON Validity (5 seconds). ON S rc: The ON Src is the time of validity of a ON message for a receiver. Default: ON Validity (15 seconds). KICK: It is the time of validity of a KICK message sent by the controller, and is used at the receiver s level. Default: ON Validity (15 seconds). MUTE: It is the time of validity of a MUTE message sent by the controller, and is used at the source s level. Default: ON Validity (15 seconds). ALIV E: It is the time of validity of an ALIVE message sent by the controller, and is used at the receiver s level. Actually, it only makes sense for the other controllers if we have redundancy in order to add robustness. Default: 2*ON Validity (30 seconds). ALIV E Cycle : It is the time between two ALIVE messages sent by the controller. Default: 3/4 * ON Validity (12 seconds). X. SCALABILITY CONSIDERATIONS An important question is the scalability of this architecture, especially at the controller point. The controller is acting as a sort of rendez-vous point ala PIM, and a relay node for control messages between sources and receivers in the emulated ASM group. It is then a central point of failure, sensible to the bandwidth generated by the different announcing sources. We consider here the problem of bandwidth scalability at the controller in the worst case with the default timers values. What is the amount of required download bandwidth at the controller point in function of the number of synchronized announcing sources? If we take the messages defined in [12], an ON message which contains one channel will take 158 bytes on the wire, considering that the source is transmitting on Ethernet and IPv6 and that the announced channel is IPv6. With IPv4 it will take 90 bytes considering that the announced channel is IPv4. In a critical case, if there are N synchronized sources announcing themselves and located at 100 different hosts and that all the messages arrive together at the controller, the mean bandwidth required is a simple linear function, N*158 byte/sfor IPv6 and N*90 byte/s for IPv4 as illustrated in figure 6. Mean required bandwidth (bytes/s) Fig Ipv6 IPv Number of active sources Required download bandwidth vs number of announcing sources. The generated bandwidth is not too high as we are considering this case and that applications with more that 100 applicative sources at the same time are very specific and will be certainly based on the ASM network service model if it is finally deployed. Moreover thanks to the acknowledgement mechanism, it is possible to rate limit the sources at the controller. Note that once the messages arrive at the controller,
7 the Controller has complete control over the bandwidth usage of its control channel. XI. SECURITY CONSIDERATIONS At this moment, this protocol does not provide security mechanism at all. The only security warrants are based on IP. Because this protocol is based on top of a connectionless protocol (UDP), it s very easy for someone to abuse the security mechanisms offered by IP with techniques like IP spoofing. This is why it is very important on the receiver part to bind on the two part of the (S,G) control channel. According to the SSM service model, and how the SSM multicast tree construction is done at the IP level, it is more difficult to spoof a SSM channel than an IP. More security mechanisms could be imagined, like using a single session identifier per group which is only distributed between the controllers. But the security problem is not limited to the controller. We can imagine that a source usurps another one s identity and carries out false advertisements for this one. By doing so, a source can be announced as no more active whereas it still sends data. To avoid this, we could use an appropriate authentication mechanism, which can be done thanks to the acknowledgment messages for example. XII. IMPLEMENTATION Our architecture is further defined in an Internet draft available to the research community [12]. In particular, this draft contains the full description of the protocol messages, the format of the packets as well as the definition of all headers and flags. We have implemented our middleware as a library called Libemu that can be used by applications running over Windows, Linux or *BSD operating systems depending on the IP stack version. The library is implemented in C++ and consists in more than 8000 lines of code. It is freely available for download at [8]. It s worth noticing that our library makes use of the GNU Common C++ library (freely available) and needs an host implementation of the multicast protocols IGMPv3 and MLDv2. These protocol implementations are provided by the Kame s project under *BSD and can be found in the latest GNU/Linux Kernel version or in the new 2.6.x versions. have filled this gap by designing an architecture able to provide such a discovery service. We have defined a new protocol and implemented its corresponding middleware in order to enable ASM applications linked against our library to discover SSM sources. Our next task consists in assessing the performance of our proposal through extensive simulations. We also plan to evaluate our implementation in the environment of the 6NET project and to define a proxy architecture based on this protocol in order to use unmodified ASM applications on SSM networks. XIV. ACKNOWLEDGMENTS This work was partly sponsored by the 6net European project under contract number IST REFERENCES [1] S. Deering, Multicast routing in a datagram internetwork, Ph.D. dissertation, Standford University, Dec [2] H. Holbrook, A channel model for multicast, Ph.D. dissertation, Standford University, Aug [3] J. Chesterfield and E. M. Schooler, An extensible rtcp control framework for large multimedia distributions, IEEE Symposium on Network Computers and Applications (NCA-03), Apr [4] S. McCanne and V. Jacobson, vic : A flexible framework for packet video, in ACM Multimedia, 1995, pp [Online]. Available: citeseer.nj.nec.com/mccanne95vic.html [5] V. H. an M-A. Sasse and I. Kouvelas, Successful multiparty audio communication over the internet, Communications of the ACM, vol. 41, no. 5, May [6] D. Zappala and A. Fabbri, Using ssm proxies to provide efficient multiple-source multicast delivery, in IEEE Globecom, Sixth Global Internet Symposium, Nov [Online]. Available: [7] K. Sarac, P. Namburi, and K. C. Almeroth, Ssm extensions: Network layer support for multiple senders in ssm, in ICCCN, Dallas, Oct [Online]. Available: ksarac/research/publications/icccn03.pdf [8] F. Beck and M. Hoerd, Libemu 1.0, Université Louis Pasteur, hoerdt/libemu/. [9] M. Handley, C. Perkins, and E. Whelan, Session announcement protocol, Internet Engineering Task Force, Request For Comments 2974, October [10] M. Handley and V. Jacobson, Sdp: Session description protocol, Internet Engineering Task Force, Request For Comments 2327, April [11] J. Oikarinen and D. Reed, Internet relay chat protocol, Internet Engineering Task Force, Request For Comments 1459, May [12] F. Beck, M. Hoerdt, and J.-J. Pansiot, Source discovery protocol in ssm network, Internet Engineering Task Force, Internet Draft, June XIII. CONCLUSION Our work aims at providing a multicast library for multisource applications wanting to connect to Source Specific Multicast only networks. Source Specific Multicast is a new multicast over IP distribution paradigm: by pushing the source selection in the hosts, it is a good candidate for an Internet wide multicast service offer. It is well fitted for TV and radio streaming applications but it does not provide automatic source discovery as the original Any Source Multicast paradigm from Steeve Deering does. Considering multi-source applications with source dynamics and old applications based on the ASM model, a multicast library (usable as a middleware) implementing a source discovery protocol was missing. In this paper we
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Multimedia Communications Voice over IP
Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Advanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Approaches to Multicast over Firewalls: an Analysis
Approaches to Multicast over Firewalls: an Analysis Loïc Oria [email protected] August 1999 1 Introduction Most commercial organisations, and increasingly even universities, use firewalls to constrain
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols
Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission
Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission Majid Ashraf Derwesh Department of Electronics and Communication
Introduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
IP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Introduction to Mobile IPv6
1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras [email protected] GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
A Loss Detection Service for Active Reliable Multicast Protocols
A Loss Detection Service for Active Reliable Multicast Protocols M. Maimour and C. D. Pham RESAM, Lyon1. ENS, 46 allee d Italie 69364 Lyon Cedex 07 - France email:{mmaimour,cpham}@ens-lyon.fr Abstract
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
CHAPTER 10 IP MULTICAST
CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
2.1.2.2.2 Variable length subnetting
2.1.2.2.2 Variable length subnetting Variable length subnetting or variable length subnet masks (VLSM) allocated subnets within the same network can use different subnet masks. Advantage: conserves the
Improved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel
BUILDING MPLS-BASED MULTICAST VPN SOLUTION DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel Agenda Multicast VPN (mvpn) Overview L3VPN Multicast Solution using PIM/GRE (Draft-Rosen) MPLS Multicast Building
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,
Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
Join failure notification for PIM-SM multicast routing
Join failure notification for PIM-SM multicast routing draft-hilt-pim-tree-unreachability-00.txt may 2007 updated/modified version of draft-hoerdt-pim-group-unreachable-00 B.HILT MIPS Haute Alsace University,
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, [email protected]. Introduction
IP Anycast: Point to (Any) Point Communications Draft 0.3 Chris Metz, [email protected] Introduction The Internet supports several different communication paradigms. Unicast is defined as a point-to-point
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
RESOURCE DISCOVERY IN AD HOC NETWORKS
RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR-98-769 August 1998 This project is in part supported by FX Palo Alto Laboratories and
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
Introduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
Industrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Session Announcement (SAP, RFC 2974) Session Description (SDP, RFC 2327) (SDP, draft-ietf-mmusic-sdp-new-11)
Session Announcement (SAP, RFC 2974) Session Description (SDP, RFC 2327) (SDP, draft-ietf-mmusic-sdp-new-11) Conference Establishment Session Description Workshop 1. Create Descr.: IP Multimedia Workshop
Video Streaming with Network Coding
Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
What communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos
Announcements I. Final Exam study guide online RTP / RTCP Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. III. Signup for project demos Teaching evaluations at end today copyright
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Research on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
Network Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. [email protected]
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
TiVo Connect Automatic Machine Discovery Protocol Specification
TiVo Connect Automatic Machine Discovery Protocol Specification 1 Introduction This document describes how "machines" (TiVo DVRs and/or PCs) running TiVo Connect software automatically "discover" each
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose
Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining
MOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
