Virtual Community Management for Enabling P2P Services in the IMS Network

Size: px
Start display at page:

Download "Virtual Community Management for Enabling P2P Services in the IMS Network"

Transcription

1 Virtual Community Management for Enabling P2P Services in the IMS Network Igor Radovanović, Johan Lukkien, Shudong Chen, Chris Molanus, Tanır Özçelebi Department of Mathematics and Computer Science, Eindhoven University of Technology Eindhoven, the Netherlands i radovanovic@yahoo.com, j.j.lukkien@tue.nl, shudong.chen@tue.nl, c.a.molanus@student.tue.nl, t.ozcelebi@tue.nl Abstract This paper addresses forming and management of a virtual community (VC) in the IP Multimedia Subsystem (IMS) network. A VC provides scope for mobile peer-to-peer (P2P) service sharing among end users and allows them control of sharing. The paper describes a number of services that enable forming and management of virtual communities and presents several service-oriented system architecture alternatives focusing on distribution of service access control and service discovery control between end users and operators as the owners of the IMS home-networks. Presented architecture alternatives are IMS compatible since they only introduce 5 additional services into the existing IMS architecture. A key service is an orchestrator that exposes new services composed of other services. A proofof-concept realization of the IMS architecture in which control of mobile service sharing is distributed among end users and operators is shown. I. INTRODUCTION The Internet has always been developing towards an open environment with high flexibility and distributed control and management, where complexity is put in end devices rather than in networks. This has not only enabled development of a myriad of applications by end users, but also enables the introduction of overlay networks on top of existing network infrastructures, in which devices belonging to the end users are used to route messages to other end devices, further shifting control from networks to end devices. Those overlay networks are used mainly for P2P content and storage sharing [1] which can be extended to P2P services sharing in general. The downside of the complexity being placed in end devices is that the end users, owning those devices, have to carry the burden of system and service management and security. The main mechanisms required for that are service discovery control and service access control. The former is used to discover services and the latter is used to permit, prioritize, and schedule the access to services [2]. Internet-based services offered by end users, content and application providers have become less dependent on network transport service, as quality of provided services increased over the last years, mainly due to overprovisioning of network resources. This trend leaves network providers (e.g. telecom operators) with little contribution to the value chain as application and content providers use networks as bit pipes for their services to the end users. A threat that network providers face is that they slowly lose their central role in the networked systems as the enablers of the end-to-end communication. Operators can try to avoid this by providing novel network services (services delivered by the network), which in combination with other networked services (user services accessible via a network) create new personalized applications. These services have to facilitate reliable and secure sharing of userowned mobile P2P services, and allow end users to have control of this sharing. Currently, the main advantages of services provided by telecom operators to users are guaranteed quality of service and improved trust offered to end users. An additional advantage is simplicity of usage, as complexity (of managing infrastructure and services) stays in the network rather than being shifted to end devices. Quality, trust and simplicity are results of system and service management, enabled by control of the system. The introduction of IP Multimedia Subsystem (IMS) proves the development of operators networks in this direction. IMS [3] is a backward compatible NGN architecture designed and standardized by the 3rd Generation Partnership Project (3GPP) group [4] for enabling a large variety of Internetlike services with easy provisioning for telecom operators. IMS aims to integrate legacy networks with the IP-based networks and provide services (applications) to end users at anyplace, anytime. The Session Initiation Protocol (SIP) [5] is employed at the application layer as a control safeguard in order to simplify integrating IMS with the Internet. The original intent of the IMS designers was to make the system architecture service oriented; however no explicit support for service publishing and discovery has been provided. In addition, the architecture fails to provide end users with a possibility to share their services over the network, just like they can do that over the Internet [8]. There are also drawbacks regarding the SIP protocol, which does not inherently provide separation of mobile services and devices on which services are running [8]. To make the desired system, operators need to distribute system complexity among end devices and network, giving access control to services owned by the end users partially back to these end users [6], [7]. The end users may also be given some control of service discovery. This can be possible if the system architecture is made flexible enough and discovery and access to services is secure. Flexibility can be solved by introducing service orientation into the IMS [8], whereas secure sharing can be achieved by introducing the virtual community concept [9]. This paper addresses the latter focusing on virtual community forming and management using standard protocols. Included are secure service discovery,

2 access and orchestration as well as distribution of service discovery control and service access control between end users and operators. The latter is addressed in the analysis of several service oriented architectural alternatives. II. RELATED WORK Sharing mobile peer-to-peer (P2P) services in IMS networks has been reported in the literature [2], [6]-[8]. In [7], authors present additions to the existing IMS architecture to provide mobile P2P services. They introduce a single additional service (a SIP-based application) for assigning super-peer roles in the system. They also present additional services for management, authentication, authorization and accounting, charging and digital rights management. Although the presented design uses an opensource security package, no detailed description of secure service discovery and access has been reported. Moreover, the paper does not address explicitly the issues of service discovery control and service access control and their possible distribution between end users and operators. The paper [6] presents a mobile client software architecture that allows mobile P2P content sharing in IMS networks. In contrast to server based architectures for content sharing [7], this solution uses the SIP protocol as a basis for deployment of mobile P2P services and adopts an architecture based on super-peers. The authors describe functionality of software components for content discovery control (i.e. publishing and searching) as well as the content transfer. They also address content access control of end users in the system. But security issues and the distribution of content mediation control and content access control are left unaddressed. The burden of managing the overlay infrastructure is left to the end user. Introducing P2P services into IMS is also shown in [8]. The paper presents an addition to the existing client software architecture in the IMS system by combining Web Services with SIP, to enable end users to become service providers and to facilitate P2P sharing in IMS. However, the paper addresses neither virtual community management, nor security aspects related to mobile service sharing. As result of a clientbased solution, the overlay infrastructure management has to be solved by the end users. In [10] the authors present a network based addition to the existing IMS architecture in the form of Index nodes forming a Chord-like ring overlay network [11] to realize the DHTbased distribution. They also describe SIP control signalling for file mediation and access control, while a description of VC forming and maintenance, and distribution of service discovery and access control is missing. Resource control and mediation in a mobile system combining fundamental P2P concepts with the mobile networks, are given in [2]. The paper gives a classification mechanism for mobile P2P architectures based on coordination and control of resources. This classification is used in our proposed solution as well for assessing different system architectural alternatives, taking services rather than resources into account. While [2] presents a single architecture that gives resource access control to end users, and resource discovery control to the operators, it does not address VC forming and maintenance. III. SYSTEM ARCHITECTURE To make a mobile IMS network where users can share P2P services, two functions are needed: service discovery control and service access control. Service discovery control includes service advertisement and is required for users to expose and find services. Service access control limits the discovery scope and is required so that users can manage and control the extent of sharing. In our design we combine these two functions in the concept of a virtual community (VC) as in [9]. In addition, we build the entire system as a Service Oriented Architecture where a community is made up of discoverable VC services. An outline of our VC operation is as follows. A user (or a service representing the user) knows an access point to the community where she presents her credentials. Through the access procedure, the user obtains a certificate for the VC. The certificate is needed in later interactions within the community and it represents a VC-level access control. Any authenticated VC member can expose services to the community. These services can only be found and accessed through a valid certificate. The service owner can provide further service-level access control (i.e. in addition to certificate access control) by enforcing an access policy. The registration and discovery of (user) services is done through a repository service, which leads to less overhead than broadcasting a query. In addition it relieves the user side from maintaining a view on the available services and it provides better protection of privacy since queries only reach the repository. Once services are discovered they can be orchestrated into an application. An orchestrator is a special service that is capable of using discovered services. In its basic form this means connecting service interfaces (i.e., connecting a provided interface of one service to a required interface of another one). A more elaborate orchestrator may add some logic, effectively acting as a service consumer and may expose a new service composed from other services. Building an orchestrator can be entirely the responsibility of the user. Alternatively, the community may provide an orchestrator service which takes a description of the orchestration as input and subsequently realizes the orchestration. This allows for sharing standard functionality that each orchestrator needs and supports further standardization of service interfaces. Finally, a VC supports quality of service monitoring. A user will experience a certain quality of a service she is using. This quality is monitored and recorded by a special service whose result can further be used for selecting a service. User behavior related to VC policies is also monitored, so that a users reputation is maintained. In summary, a VC is defined by the following core community services. The entry point is formed by the VCEntry service that returns access points for the other VC services, as well as a certificate. This certificate is obtained from the CertificateMgt service. The certificate certifies that the user

3 is indeed a member of the community as well as her access rights. The certificate can be decoded using the public key of CertificateMgt. Registered members can register and query the Repository service. An Orchestrator service supports setting up orchestrations as the means to use services. Behavior within the community and delivered service quality is monitored by the CreditMgt service. Although we describe these services as just single instances, replication is possible for scalability and reliability. Internal consistency protocols must then be in place. However, these are standard solutions and beyond the scope of this paper. A service-oriented architecture brings the problem that ownership of a device that runs a service does not imply control right of the usage of that service, since access to a service is via the network. For reliable operation, service registration should therefore come with a contract or resource budget that the service is sure to have on its platform. VC services can partly or entirely be deployed as either networked or network services. This leads to service access and discovery being either in the operator domain or in the user domain. We will analyse the two extreme cases and the hybrid case below, followed by our decision. In this comparison we use the following criteria: i) confidentiality and integrity of service discovery control, ii) service access control, iii) reliability of the system, iv) trust in users and operators, v) costs for end users and operators, and vi) scalability of the architecture in terms of response time. A. Deployment as user services In this deployment scenario all VC services are deployed on user devices (e.g. PCs, mobile phones, handhelds or Consumer Electronics equipment). This scenario gives the end user full control of how service discovery, access control and orchestration are implemented, and consequently full control of service discovery and service access. Little trust in the operator is needed since all communication between the services can be done over a secure channel, e.g. SSL. A major concern is the intermittent connectivity of a user s device and the possibility of the device being taken off-line without prior notice. If this device were providing a service, it would put the burden of overcoming such an event on the other end user devices in the VC, e.g., by replacing a core service with a substitute. These events also have implications for the overall reliability of the system. In addition, the end devices are typically resource constrained which may lead to slower service response as the VC size increases. Another concern is the total amount of transferred data. In IMS, all signaling traffic will go through the Call Session Control Function (CSCF) servers to reach the VC core community services, e.g., a service registration will involve VCEntry, Repository and CertificateMgt. If VC core services are distributed among end devices, VC core signaling among them is required, which will lead to more signalling traffic compared to the scenario where the services are co-located centrally. The operator would have little of service access and service discovery. The network would simply be used as a bit-pipe with the increased traffic as sole benefit. An operator would not be considered a stakeholder in the widespread adoption of this architecture. Little standardization and cross-community re-use of services can be expected. B. Deployment as network services The other extreme is to deploy all core community services on the application server of the IMS network. As opposed to the dynamism of a mobile end device, the presence of the application servers and the core community services in the IMS network is much more stable. Hence, service discovery and system maintenance become less of an issue. From the user s perspective, the functionality to implement VC properties would have to be provided by the operators, and consequently the user would have little or no control of service access and service discovery. There is however little need for end users to carry the burden of system maintenance which therefore, increases the reliability of the system. Since the application servers typically have more resource available to them and a certralized solution requires less VC core signaling, such a system is more scalable in terms of response time. This scenario uses less of the network s bandwidth and therefore generates less charges for users. From the operator s perspective, by having control of all core community services, they can choose how to implement the IMS framework to meet their own financial objective on the one hand, and their costumers expectations on the other. Control of all core community services gives an operator full control of service discovery and service access. With this, operators can better estimate the return on investment of these services, so that they can make an informed adjustment to their business model. A particular point here is the position of the orchestrator. If it is deployed as a user service, it mainly serves as a means to construct applications. When used as a network service it becomes easier for the operators to use the orchestration information in resource allocation and control, since such allocation is under full control of the operators. Although this works fine for the simple orchestrations that just connect services, it becomes more problematic to implement when orchestration contains logic and even exposes services. This has to be managed by enforcing service agreements between users and operators. C. Hybrid deployment In this scenario, some core community services are hosted by the operator and the others by the end users, depending on the comparison criteria metioned above. A balance would have to be found between the users ability to control the service access and service discovery and the benefits of having the service hosted by the operator. Generic (parameterized) services which end users can inherit can be used to tailor core community services according to the requirements of the user. An orchestrator is a good example of this: it takes

4 Fig. 1. The chosen hybrid deployment scenario of the core community services. Control of the VC is distributed over all three domains. an orchestration description as a parameter to perform the requested setup as explained above. Another alternative is that the VCEntry service is deployed as an IMS service. The operator guarantees to keep this gateway service running steadily. Meanwhile, an end user is allowed to choose his own VC maintenance policy. A possible way to do this is to make the VCEntry service capable of processing commands uploaded by users. In this way, the burden of the service discovery, as well as maintenance of the overlay, could be shifted to the operator, while the users could remain in control of the service discovery and the service access. The extent of this control would depend on which core community services are deployed in the operator s domain as well as how thes are implemented. In hybrid deployment, a high level trust from operators to end users is required since the operators would be allowing user-code to run inside their networks, which would therefore increase the complexity of service implementation. This trust can be mitigated by making legally binding agreements between the end user and the operator, and additional access control to core community services is mandatory. Allowing end users to host various services on their own devices would provide them with the highest extent of access and discovery control of these particular services. This comes along with increased data traffic to end devices boosting service costs. With the above analysis of the three different deployments, the hybrid deployment to form VCs in the IMS network is adopted in this paper. This deployment, depicted in Fig.1, gives end users more flexibility in how they choose to implement VCs, they have to loosely trust the operators, and they are relieved of maintenance problem. The VCEntry is actually implemented on a user device while other core community services including the CertificateMgt and the Repository, are deployed in the operator s domain. Other services registered by members will be hosted on end devices. Due to the trust relationship and the reputation consideration, the CreditMgt is under the control of the operators. Operators can provide their clients with added value by offering this CreditMgt service, which can also be used for accounting purposes. Fig. 2. Virtual community forming. IV. VIRTUAL COMMUNITY MANAGEMENT If an end user wants to share files with her friends over IMS, e.g., pictures and videos, she can firstly create a VC; then invite her friends to join this VC; next register services which can provide this file sharing functionality; and finally set up a file sharing application through combining these registered services. Service use (application creation) in a VC is done by an orchestrator which first discovers the required services from the repository, and then binds them together taking care of the service interfaces and protocols for connection and communication. A. Virtual community forming The VC formation process will be started once an initiative arises, e.g., file sharing among a group of trusted end users. The process of establishing a new virtual community is shown in Fig.2. In order to grant a creator control of service access and service discovery, VCEntry, which facilities the member registration and service publication, will run in the end user s domain as a user service. Hence, the creator has the right to define the join policy to the VC. After the VC is formed, the creator can broadcast the existence of this new VC to the network or multicast to her friends. Some of the core community services, including CertificateMgt, Repository, and CreditMgt will be deployed in the operator s domain as core IMS services for the sake of the costof system maintenance and of discovery. The CertificateMgt service generates a signature for this VC which will be later used for member and service authentication. Repository acts as an intermediary between service providers and service seekers. Authorized VC members can discover registered services from this repository or register their own services for sharing. To deploy CertificateMgt, the creator asks a deployer running on the application server to create or find an existing one and return the address. The same is true for the deployment of Repository. The access points of

5 Fig. 4. VC service registration. Fig. 3. VC member registration. CertificateMgt and Repository will be advertised to VCEntry. The shared secret of this VC, (e.g. the public key for authenticating CertificateMgt s signature), will be advertised among these core community services. In our implementation, all communication is done in SOAP, and all binary objects are first encoded into base64 so that they can be placed in the SOAP message. B. Virtual community member registration One of the main goals of forming a service-oriented VC in IMS is to keep the privacy of service providers and to secure the interactions among services. Therefore, service discovery and access can only be done within the scope of a VC. An end user first needs to register as a member and only then she can see the presence of other registered services. To become a VC member, an end user (represented by a device) needs to provide her profile to VCEntry and then the member registration process is activated. As shown in Fig.3, an applicant s profile is checked by VCEntry with the JoinPolicy to decide whether this user can be approved or not. If she is approved, VCEntry will invoke CertificateMgt to register her as a member of this VC. Upon the success of above steps, VCEntry will inform this new member about the access points of both the Repository and the CertificateMgt, together with the shared secret of this VC. With the access point of CertificateMgt, the member can apply for tickets which is required for each activity happening in this VC. C. Virtual community service registration and use A VC member can now discover registered services using the Repository. To register a new service, a member can send her service registration request to the Repository which will first check the validity of this member s ticket and dependin on the outcome, register this service. Compared to a service running outside a VC, a registered VC service is enriched with additional properties, like a black list and an access control list for making a local access control policy. Available roles of members and corresponding actions are stored in the access control list. Malicious user s information can be inserted into the black list. As stated previously, the operators can provide the end users with added value if some core Fig. 5. Secure service access. community services are deployed as network services. As an example, as part of the service registration this newly registered service will be assigned a credit value, for instance threshold +1 in Fig.4, by CreditMgt. This credit value will either increase or decrease based on the behavior of a service. In this way,the behavior of a service and its provider can be monitored. This is advantageous for both users and operators, as users can obtain better quality while operators can remove badly performing services. As a result, the trust between the operator and the end users can be increased. Within the scope of a VC, end users can build applications through composing the registered services by the orchestrator. This orchestrator discovers required services from the repository and binds them at runtime to create applications. During the execution of an application, SOAP messages exchanged between services will be encrypted to be carried by SIP, as shown in Fig.5. V. EXPERIMENTAL PLATFORM In order to test the feasibility of this service-oriented VC overlay in IMS, a file sharing example scenario is designed. In this scenario, an end user wants to share a picture stored on her mobile phone with her two friends. Considering the privacy of the content, she first creates a VC and then invites her friends to join. She registers a file server service into the Repository of this VC. And her two friends, who are VC members, now publish their file sink services and mouse services into the Repository. She uses an orchestrator to bind the file server service with one of the file sink services and meanwhile subscribes the orchestrator to the two mouse services for their double click mouse events. After the application starts, the picture will be transmitted from her mobile phone to one of her friends mobile phone. The picture destination can be switched to her other friend through a double click mouse event generated by another mobile phone. In this scenario, we deployed the VC core services and registered services in the

6 in existing SSL implementations. One of the key differences would be that SIP would be used as the transport protocol, particularly the SIP Message method. Fig. 6. Service deployment of the file sharing scenario. VCEntry is not connected to other services because the member- and the service registration are not shown. CreditMgt will be connected after the files have been shared. Fig. 7. A screen flash of the file sharing scenario. VI. C ONCLUSIONS This paper introduces 5 services enabling mobile P2P service sharing in the IMS network. It presents an analysis of three system architecture alternatives for forming and managing virtual communities. For each of the alternatives, distribution of service discovery control and service access control among end users and operators is discussed, and pros and cons from both the user s and the operator s perspective are given. In addition, a proof-of-concept of a mobile P2P file sharing service is demonstrated. The main contribution of the paper is the introduction of the VC concept and an orchestrator service in IMS. The main benefit for the user is the ability to control service sharing, while the main benefit for the operator is the possibility to generate more revenue. The operators are in control of critical services and the system maintenance. Our future work will focus more on the security of the complete system, as an extension to security of service access and service discovery provided here. ACKNOWLEDGMENT This work is supported by the COMET consortium funded by the European Commission 6th Framework Programme. R EFERENCES Fig. 8. Layered architecture of the experimental platform. manner depicted in Fig.6. Fig.7 shows a physical deployment and a screen flash of the file sharing scenario. Fig.8 illustrates the proof of concept of our solution. The example scenario was created using the standard-based IMS network simulator with communication services emulators. The open Source Glassfish/SailFin JavaEE/SIP server was used as the network application server [12]. UIQ 3 SDK emulators [13] where used as end devices which use the Ericsson s IMS Client Platfor (ICP) for Open-OS devices that extends JSR 281 standard [14]. The VC is created by an administrator (Admin) to allow end users to become members through an entry point. The same program also allows a file server (service provider) to share files with other users (service requesters) after joining the VC. The application is in principal split into two parts. The mobile application can take on the roles of, an Admin/ VCEntry, a service provider, or a service requester. The server application, which represents the network services, can function as a deployer, CertificateMgt, or a Repository. The deployer allows the Admin to create an instance of the CertificateMgt or the Repository. After creating the instance, it replies with the SIP address of the newly created instance. Secure channels are created similar to how they are created [1] P. Triantafillou and C. Xiruhaki and M. Koubarakis and N. Ntarmos, Towards High Performance Peer-to-Peer Content and Resource Sharing Systems, Proc. of CIDR, [2] F-U. Andersen et al., An Architecture Concept for Mobile P2P File Sharing Services, in Lecture Notes on Informatics (LNI) P-51, pp , ISBN , [3] Digital Cellular Telecommunications System (Phase 2+), Universal Mobile Telecommunications System (UMTS), IP Multimedia Subsystem (IMS), Stage 2, V7.6.0, TS , 3GPP, Dec [4] Oct [5] J. Rosenberg, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley and E. Schooler SIP: Session Initiation Protocol,, RFC 3261, IETF Network Working Group, June [6] M. Matuszewski, N. Beijar, J. Lehtinen, T. Hyyrylainen, Mobile peerto-peer content sharing application, in 3rd IEEE Consumer Communications and Networking Conference (CCNC), [7] A. Liotta, L. Lin, The Operator s Response to P2P Service Demand, in IEEE Communications Magazine, pp , July [8] Igor Radovanovic, Amit Ray, Johan Lukkien, Michel Chaudron, Dynamic mobile service provisioning in IP Multimedia Subsystem (IMS) using a Service Oriented Architecture, in the Springer Verlag as a part of its Lecture Notes in Computer Science series (LNCS 4749), [9] Shudong Chen, Igor Radovanovic, Johan Lukkien, VICSDA: Using Virtual Communities to Secure Service Discovery and Access, in the Springer Verlag as a part of its Lecture Notes in Computer Science series (LNCS 4577), [10] X. Ye, J. Zhang, J. Wang, Architecture of HIKEC: An IMS-based Mobile P2P File Sharing Service, in Proc. of International Conference on Communication Technology 2006, ICCT 06, pp. 1 4, Nov [11] I. Stoica et al., Chord: A scalable peer-to-peer lookup service for internet applications, in Proc. of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 01), Vol. 31, No. 4, pp , Oct [12] Oct [13] Oct [14] Sun Microsystems, JSR 281 IP Multimedia Subsystem (IMS) Services API, Public Draft version 0.9, Sep

IMS signalling for multiparty services based on network level multicast

IMS signalling for multiparty services based on network level multicast IMS signalling for multiparty services based on network level multicast Ivan Vidal, Ignacio Soto, Francisco Valera, Jaime Garcia, Arturo Azcorra UniversityCarlosIIIofMadrid Av.Universidad,30 E-28911, Madrid,

More information

Authentication, Authorization and Accounting Requirements for the Session Initiation Protocol

Authentication, Authorization and Accounting Requirements for the Session Initiation Protocol Internet Engineering Task Force INTERNET-DRAFT draft-ietf-sipping-aaa-req-02.ps SIP WG J. Loughney, G. Camarillo Nokia, Ericsson February 5, 2003 Expires: August, 2003 Authentication, Authorization and

More information

Service-Oriented Advanced Metering Infrastructure for Smart Grids

Service-Oriented Advanced Metering Infrastructure for Smart Grids Journal of Energy and Power Engineering 5 (2011) 455-460 Service-Oriented Advanced Metering Infrastructure for Smart Grids S. Chen 1, J.J. Lukkien 1 and L. Zhang 2 1. Department of Mathematics and Computer

More information

Proposal Architecture For Quality of Service Provisioning Within Inter-domain IP Multimedia Subsystem Context

Proposal Architecture For Quality of Service Provisioning Within Inter-domain IP Multimedia Subsystem Context Proposal Architecture For Quality of Service Provisioning Within Inter-domain IP Multimedia Subsystem Context Mosbah Ageal Computer Engineering Department, Higher Polytechnic Institute of Zliten, Zliten,

More information

User Customisation of Service Request Routing for the IP Multimedia Subsystem

User Customisation of Service Request Routing for the IP Multimedia Subsystem User Customisation of Service Request Routing for the IP Multimedia Subsystem Richard Spiers and Neco Ventura University of Cape Town, Rondebosch, South Africa 021 650 5296 Email: {rspiers,neco}@crg.ee.uct.ac.za

More information

Towards the Convergence between IMS and Social Networks

Towards the Convergence between IMS and Social Networks Towards the Convergence between IMS and Social Networks Ramon Alcarria, Tomas Robles Telematics Department Technical University of Madrid Madrid, Spain {ralcarria, trobles}@dit.upm.es Gonzalo Camarillo

More information

A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M.

A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M. A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M. Published in: International Journal of Communications, Network and System Sciences DOI:

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

Request for Comments: 3574 Category: Informational August 2003

Request for Comments: 3574 Category: Informational August 2003 Network Working Group J. Soininen, Ed. Request for Comments: 3574 Nokia Category: Informational August 2003 Status of this Memo Transition Scenarios for 3GPP Networks This memo provides information for

More information

Service Composition in IMS: A Location Based Service Example

Service Composition in IMS: A Location Based Service Example Service Composition in IMS: A Location Based Service Example Agata Brajdic, Ozren Lapcevic, Maja Matijasevic Faculty of Electrical Engineering and Computing University of Zagreb Zagreb, Croatia {agata.brajdic

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

A distributed mechanism to resolve dynamically Feature Interaction in the UMTS IP Multimedia Subsystem

A distributed mechanism to resolve dynamically Feature Interaction in the UMTS IP Multimedia Subsystem A distributed mechanism to resolve dynamically Feature Interaction in the UMTS IP Multimedia Subsystem Noël Crespi GET-INT, Institut National des Télécommunications. 9,rue Charles Fourier 91011 Evry Cedex

More information

IP Multimedia Subsystem Part 5 Marek Średniawa

IP Multimedia Subsystem Part 5 Marek Średniawa IP Multimedia Subsystem Part 5 Marek Średniawa mareks@tele.pw.edu.pl Institute of Telecommunications Project is co-financed by European Union within the European Social Fund 1 Identification in IMS Identities

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros

More information

Virtualization and Softwarization Technologies for End-to-end Networking

Virtualization and Softwarization Technologies for End-to-end Networking ization and Softwarization Technologies for End-to-end Networking Naoki Oguchi Toru Katagiri Kazuki Matsui Xi Wang Motoyoshi Sekiya The emergence of 5th generation mobile networks (5G) and Internet of

More information

A Web Services based Architecture for NGN Services Delivery

A Web Services based Architecture for NGN Services Delivery A Web Services based Architecture for NGN Services Delivery K. Rezabeigi, A. Vafaei, N. Movahhedinia Abstract The notion of Next Generation Network (NGN) is based on the Network Convergence concept which

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: September 2015

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: September 2015 Internet Engineering Task Force (IETF) R. Sparks Request for Comments: 7647 Oracle Updates: 3515 A.B. Roach Category: Standards Track Mozilla ISSN: 2070-1721 September 2015 Abstract Clarifications for

More information

Standardization Trends of the Next Generation Network in ETSI TISPAN

Standardization Trends of the Next Generation Network in ETSI TISPAN Standardization Trends of the Next Generation Network in ETSI TISPAN Akira Kurokawa and Isao Higashi Abstract International standardization of the Next Generation Network is being actively discussed in

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

New Value Chain through Service Platform

New Value Chain through Service Platform New Value Chain through Service Platform Oct. 24 th 2008 Ryozo Ito Senior Executive Consultant Hewlett-Packard Japan Technology for better business outcomes 2008 Hewlett-Packard Development Company, L.P.

More information

Network-based Fast Handover for IMS Applications and Services

Network-based Fast Handover for IMS Applications and Services Network-based Fast Handover for IMS Applications and Services Sang Tae Kim 1, Seok Joo Koh 1, Lee Kyoung-Hee 2 1 Department of Computer Science, Kyungpook National University 2 Electronics and Telecommunications

More information

Ericsson D. Willis. Cisco Systems. April 2006

Ericsson D. Willis. Cisco Systems. April 2006 Network Working Group Request for Comments: 4453 Category: Informational J. Rosenberg Cisco Systems G. Camarillo, Ed. Ericsson D. Willis Cisco Systems April 2006 Status of This Memo Requirements for Consent-Based

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

A Generic Service Architecture for Secure Ubiquitous Computing Systems

A Generic Service Architecture for Secure Ubiquitous Computing Systems Int. J. Communications, Network and System Sciences, 2012, 5, 50-65 http://dx.doi.org/10.4236/ijcns.2012.51007 Published Online January 2012 (http://www.scirp.org/journal/ijcns) A Generic Service Architecture

More information

Delivering Quadruple Play with IPTV over IMS

Delivering Quadruple Play with IPTV over IMS Delivering Quadruple Play with IPTV over IMS Bruno Chatras, Mikhaël Saïd France Telecom Research & Development 38-40 rue du Général Leclerc F-92794 Issy Moulineaux Cedex 9 Email: {bruno.chatras,mikhael.said}@orange-ftgroup.com

More information

Mapping Mechanism to Enhance QoS in IP Networks

Mapping Mechanism to Enhance QoS in IP Networks Mapping Mechanism to Enhance QoS in IP Networks by Sriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru in The 32nd International Conference on Information Networking (ICOIN 2018)

More information

GDS Resource Record: Generalization of the Delegation Signer Model

GDS Resource Record: Generalization of the Delegation Signer Model GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, and David Fort IRISA, Campus de Beaulieu, 35042 Rennes CEDEX, France {gilles.guette, bernard.cousin, david.fort}@irisa.fr

More information

Request for Comments: 5369 Category: Informational October Framework for Transcoding with the Session Initiation Protocol (SIP)

Request for Comments: 5369 Category: Informational October Framework for Transcoding with the Session Initiation Protocol (SIP) Network Working Group G. Camarillo Request for Comments: 5369 Ericsson Category: Informational October 2008 Framework for Transcoding with the Session Initiation Protocol (SIP) Status of This Memo This

More information

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich

More information

Resource authorization in IMS with known multimedia service adaptation capabilities

Resource authorization in IMS with known multimedia service adaptation capabilities Resource authorization in IMS with known multimedia service adaptation capabilities Tomislav Grgic, Vedran Huskic, and Maja Matijasevic University of Zagreb, Faculty of Electrical Engineering and Computing,

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

Request for Comments: Ericsson February 2004

Request for Comments: Ericsson February 2004 Network Working Group Request for Comments: 3702 Category: Informational J. Loughney Nokia G. Camarillo Ericsson February 2004 Authentication, Authorization, and Accounting Requirements for the Session

More information

Support of parallel BPEL activities for the TeamCom Service Creation Platform for Next Generation Networks

Support of parallel BPEL activities for the TeamCom Service Creation Platform for Next Generation Networks Support of parallel BPEL activities for the TeamCom Service Creation Platform for Next Generation Networks T.Eichelmann 1, 2, W.Fuhrmann 3, U.Trick 1, B.Ghita 2 1 Research Group for Telecommunication Networks,

More information

3GPP TS V7.0.0 ( )

3GPP TS V7.0.0 ( ) TS 23.198 V7.0.0 (2006-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Open Service Access (OSA); Stage 2 (Release 7) The present

More information

A PROPOSAL OF USER AUTHENTICATION AND A CONTENT DISTRIBUTION MECHANISM USING P2P CONNECTION OVER A MOBILE AD HOC NETWORK

A PROPOSAL OF USER AUTHENTICATION AND A CONTENT DISTRIBUTION MECHANISM USING P2P CONNECTION OVER A MOBILE AD HOC NETWORK A PROPOSAL OF USER AUTHENTICATION AND A CONTENT DISTRIBUTION MECHANISM USING P2P CONNECTION OVER A MOBILE AD HOC NETWORK Masato Oguchi, Yoshiko Nakatsuka y, and Chiho Tomizawa z Department of Information

More information

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,

More information

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services Hui-Kai Su 1,*, Wen-Hsu Hsiao 2, Jian-Ting Pan 3, Chen-Hung Liao 4, Kim-Joan Chen 3, and Chien-Min Wu 5 1 Dept. of Electrical

More information

Reflections on Security Options for the Real-time Transport Protocol Framework. Colin Perkins

Reflections on Security Options for the Real-time Transport Protocol Framework. Colin Perkins Reflections on Security Options for the Real-time Transport Protocol Framework Colin Perkins Real-time Transport Protocol Framework RTP: A Transport Protocol for Real-Time Applications RFCs 3550 and 3551

More information

Extension of Resource Management in SIP

Extension of Resource Management in SIP Extension of Resource Management in SIP Franco Callegati and Aldo Campi University of Bologna, Italy {franco.callegati,aldo.campi}@unibo.it Abstract. In this work we discuss the issue of communication

More information

A Flow Label Based QoS Scheme for End-to-End Mobile Services

A Flow Label Based QoS Scheme for End-to-End Mobile Services A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

MediaAUTH Draft Proposal

MediaAUTH Draft Proposal MediaAUTH Draft Proposal August 21, 2012 Contents 1 Introduction 2 2 Service & User Perspective 2 2.1 Login...................................... 2 2.2 Soft Login.................................... 3

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

PROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS

PROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS PROPOSAL THESIS RESEACH IP MULTIMEDIA PACKET DELAY AND TRAFFIC ANALYSIS Author DHANNY PERMATASARI PUTRI 55412110012 MAGISTER TELECOMMUNICATION PROGRAMME ELECTRO DEPARTEMENT UNIVERSITAS MERCU BUANA JAKARTA

More information

Application-Level QoS Negotiation and Signaling for Advanced Multimedia Services in the IMS

Application-Level QoS Negotiation and Signaling for Advanced Multimedia Services in the IMS IP MULTIMEDIA SUBSYSTEM Application-Level QoS Negotiation and Signaling for Advanced Multimedia Services in the IMS Lea Skorin-Kapov and Miran Mosmondor, Ericsson Nikola Tesla Ognjen Dobrijevic and Maja

More information

Issues of Operating Systems Security

Issues of Operating Systems Security ECAI 2007 - International Conference Second Edition Electronics, Computers and Artificial Intelligence 29 th 30 th June, 2007, Piteşti, ROMÂNIA Issues of Operating Systems Security Academy of Economic

More information

Performance Analysis: Impact of Signalling Load over IMS Core on KPIs

Performance Analysis: Impact of Signalling Load over IMS Core on KPIs Performance Analysis: Impact of Signalling Load over IMS Core on KPIs JIRI HOSEK, LUBOS NAGY, VIT NOVOTNY, PAVEL MASEK, and DOMINIK KOVAC Brno University of Technology, Department of Telecommunications,

More information

Mobility best practice. Tiered Access at Google

Mobility best practice. Tiered Access at Google Mobility best practice Tiered Access at Google How can IT leaders enable the productivity of employees while also protecting and securing corporate data? IT environments today pose many challenges - more

More information

Architecture of Distributed Systems Component-based Systems

Architecture of Distributed Systems Component-based Systems Architecture of Distributed Systems 2017-2018 Component-based Systems Original : J.J Lukkien Revision: R.H. Mak 25-Oct-17 Rudolf Mak TU/e Computer Science 2II45-CBSE Goals of this lecture Students have

More information

ITU-T Y Next generation network evolution phase 1 Overview

ITU-T Y Next generation network evolution phase 1 Overview I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

Online Mediation Controller - Basic Admin 2-1

Online Mediation Controller - Basic Admin 2-1 Online Mediation Controller - Basic Admin 2-1 Online Mediation Controller - Basic Admin 2-2 Online Mediation Controller - Basic Admin 2-3 Terminology AAA - Authentication Authorization Accounting AVP -

More information

IMS Client Framework for All IP-Based Communication Networks

IMS Client Framework for All IP-Based Communication Networks IMS Client Framework for All IP-Based Communication Networks D. Jayaram, S. Vijay Anand, Vamshi Raghav, Prashanth Kumar, K. Riyaz & K. Kishan Larsen & Toubro InfoTech Limited Research and Development Group,

More information

ETSI TS V9.0.0 ( ) Technical Specification

ETSI TS V9.0.0 ( ) Technical Specification TS 123 198 V9.0.0 (2010-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Open Service Access (OSA); Stage 2 (3GPP

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Spontania Administrators Manual

Spontania Administrators Manual Spontania Administrators Manual ClearOne 5225 Wiley Post Way Suite 500 Salt Lake City, UT 84116 Telephone 1.800.945.7730 1.801.975.7200 Spontania Support 801-974-3612 TechSales 1.800.705.2103 FAX 1.801.977-0087

More information

Improved One-Pass IP Multimedia Subsystem Authentication for UMTS

Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Lili Gu RMIT University Melbourne, Australia l.gu@student.rmit.edu.au Abstract As defined in the 3GPP specifications, a UMTS user device

More information

System Architecture Model Version 1.1 WV Tracking Number: WV-020

System Architecture Model Version 1.1 WV Tracking Number: WV-020 System Architecture Model Version 1.1 WV Tracking Number: WV-020 Notice Copyright 2001-2002 Ericsson, Motorola and Nokia. All Rights Reserved. Implementation of all or part of any Specification may require

More information

Alcatel-Lucent Open API Service. Unlock network access with open API and ecosystem management

Alcatel-Lucent Open API Service. Unlock network access with open API and ecosystem management Alcatel-Lucent Open API Service Unlock network access with open API and ecosystem management Embracing a new business model, Alcatel-Lucent offers a hosted service to help service providers open their

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Third annual ITU IMT-2020/5G Workshop and Demo Day 2018

Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 All Sessions Outcome Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 Geneva, Switzerland, 18 July 2018 Session 1: IMT-2020/5G standardization (part 1): activities and future plan in ITU-T SGs 1.

More information

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Network Working Group J. Peterson Request for Comments: 3764 NeuStar Category: Standards Track April 2004 enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Status of this

More information

Sentinet for BizTalk Server VERSION 2.2

Sentinet for BizTalk Server VERSION 2.2 for BizTalk Server VERSION 2.2 for BizTalk Server 1 Contents Introduction... 2 SOA Repository... 2 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring, Recording

More information

3GPP TS V6.1.0 ( )

3GPP TS V6.1.0 ( ) TS 29.161 V6.1.0 (2005-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Interworking between the Public Land Mobile Network (PLMN)

More information

Oracle Communications WebRTC Session Controller

Oracle Communications WebRTC Session Controller Oracle Communications WebRTC Session Controller Concepts Release 7.0 E40976-01 November 2013 Oracle Communications WebRTC Session Controller Concepts, Release 7.0 E40976-01 Copyright 2013, Oracle and/or

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

A Framework for Video Streaming to Resource- Constrained Terminals

A Framework for Video Streaming to Resource- Constrained Terminals A Framework for Video Streaming to Resource- Constrained Terminals Dmitri Jarnikov 1, Johan Lukkien 1, Peter van der Stok 1 Dept. of Mathematics and Computer Science, Eindhoven University of Technology

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Organization of user data 2 Reference DTR/TISPAN-02027-NGN-R1 Keywords architecture,

More information

to pay for it) has been waning. The Internet further changed the game.

to pay for it) has been waning. The Internet further changed the game. As the old telephone business models break down and new service paradigm takes over, communication companies must combine voice with the new services of the network. The SCI-Platform (Service Convergence

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud

More information

Why the end-to-end principle matters for privacy

Why the end-to-end principle matters for privacy Why the end-to-end principle matters for privacy Richard L. Barnes, BBN Technologies Cullen Jennings, Cisco Systems Introduction It is a basic challenge in the design of location-based services to balance

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Mobile Computing #MC05 Internet Protocol and Mobile Computing

Mobile Computing #MC05 Internet Protocol and Mobile Computing Mobile Computing #MC05 Internet Protocol and Mobile Computing CS60002: Distributed Systems Winter 2006-2007 Where we left off... Device databases Flash, OR/direct Synchronization Algorithms Push/notifications

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

Architectures of Distributed Systems 2011/2012

Architectures of Distributed Systems 2011/2012 Architectures of Distributed Systems 2011/2012 Component Based Systems Johan Lukkien TU/e Computer TU/e Informatica, Science, System Architecture and Networking 1 Goals Students have an overview of motivation

More information

Building on existing security

Building on existing security Building on existing security infrastructures Chris Mitchell Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm 1 Acknowledgements This is joint work with Chunhua Chen and Shaohua Tang

More information

SIP Routing Methodologies in 3GPP

SIP Routing Methodologies in 3GPP SIP Routing Methodologies in 3GPP Alexander A. Kist and Richard J. Harris RMIT University, BOX 2476V, Victoria 3001, Australia Phone: (+) 61 (3) 9925-5230, Fax: (+) 61 (3) 9925-3748 {kist,richard}@catt.rmit.edu.au

More information

A broadcasting enabled Residential Gateway for Next Generation Networks

A broadcasting enabled Residential Gateway for Next Generation Networks A broadcasting enabled Residential Gateway for Next Generation Networks Jaime García, Francisco Valera, Iván Vidal, and Arturo Azcorra Universidad Carlos III de Madrid Avda. Universidad 30, 28911 Leganes

More information

The Most Important Facts in a Nutshell Content Security User Interface Security Infrastructure Security In Detail...

The Most Important Facts in a Nutshell Content Security User Interface Security Infrastructure Security In Detail... Data security is the highest priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents The Most Important

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed

Overlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed Overlay Multicast Application Layer Multicast Structured Overlays Unstructured Overlays CAN Flooding Centralised Scribe/SplitStream Distributed PeerCast 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

Basic SAE Management Technology for Realizing All-IP Network

Basic SAE Management Technology for Realizing All-IP Network LTE SAE EPC Special Articles on SAE Standardization Technology Basic SAE Management Technology for Realizing All-IP Network The standardization of 3GPP Release 8 brings new provisions for All-IP networks

More information

Overview and Status of NGN Standardization Activities. Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories

Overview and Status of NGN Standardization Activities. Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories Overview and Status of NGN Standardization Activities Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories Contents 1. Outline of NGN 2. Key Technologies of NGN 3. Summary and

More information

IP Multimedia Services: Analysis of Mobile IP and SIP Interactions in 3G Networks

IP Multimedia Services: Analysis of Mobile IP and SIP Interactions in 3G Networks IPV6: BASIS FOR THE NEXT GENERATION NETWORKS IP Multimedia Services: Analysis of Mobile IP and SIP Interactions in 3G Networks Stefano M. Faccin, Nokia Research Center Poornima Lalwaney, Nokia Mobile Phones

More information

Date of publication: 11/07/2017

Date of publication: 11/07/2017 Questions & Answers INVITATION TO SHIFT2RAIL JU ASSOCIATED MEMBERS TO SUBMIT AN ANSWER IN VIEW OF THE REALIGNMENT OF THEIR ACTIVITIES AND ADDITIONAL COMMITMENT TO THE SHIFT2RAIL PROGRAMME Date of publication:

More information

SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE

SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE Journal of Information, Control and Management Systems, Vol. 8, (2010), No.3 SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE Pavel SEGEČ University of Žilina, Faculty of Management Science and

More information

Enhancing end-to-end QoS for multimedia streaming in IMS-based networks Ozcelebi, T.; Radovanovic, I.; Chaudron, M.R.V.

Enhancing end-to-end QoS for multimedia streaming in IMS-based networks Ozcelebi, T.; Radovanovic, I.; Chaudron, M.R.V. Enhancing end-to-end QoS for multimedia streaming in IMS-based networks Ozcelebi, T.; Radovanovic, I.; Chaudron, M.R.V. Published in: Proceedings 2nd International Conference on Systems and Networks Communications

More information

The JSR 281 IMS Services API: Time to Deliver

The JSR 281 IMS Services API: Time to Deliver YOUR LOGO HERE TS-5102 The JSR 281 IMS Services API: Time to Deliver Stefan Svenberg and Niclas Palm IMS Java Standardisation Ericsson AB http://www.ericsson.com 2007 JavaOne SM Conference Session TS-5102

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

Multi-Domain Service Optimization

Multi-Domain Service Optimization Multi-Domain Service Optimization 1. High-level summary New solutions need to be fifth-generation (5G)- and service-ready while covering the entire network along with individual network slice instances

More information

A Platform and Applications for Mobile Peer-to-Peer Communications

A Platform and Applications for Mobile Peer-to-Peer Communications A Platform and Applications for Mobile Peer-to-Peer s Takeshi Kato Norihiro Ishikawa Hiromitsu Sumino NTT DoCoMo Inc. 3-5, Hikarino-oka, Yokosuka Kanagawa JAPAN Johan Hjelm Ye Yu Shingo Murakami Ericsson

More information

Managing Service Capability and Service Feature Interactions in the IMS of UMTS

Managing Service Capability and Service Feature Interactions in the IMS of UMTS Managing Service Capability and Service Feature Interactions in the IMS of UMTS Anahita Gouya 1, Noël Crespi 1, Emmanuel Bertin 2, Lina Oueslati 1 1:{anahita.gouya,noel.crespi, lina.oueslati}@int-evry.fr,

More information

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell Strong Customer Authentication and common and secure communication under PSD2 PSD2 in a nutshell Summary On August 12, the EBA has issued the long-awaited draft of the Regulatory Technical Standards (RTS)

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information