The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Short range ad-hoc wireless networks can be used to deliver streaming multimedia for information, entertainment and advertisement purposes. To enable short-range communication between various devices, the Wi-Fi Alliance proposed an extension to the IEEE802.11 Wi-Fi standard called Wi-Fi Peer-to-Peer (P2P). It allows compliant devices to form ad-hoc communication groups without interrupting conventional...
The latest experiences hint that the QoS (Quality of Service) approaches adopted by IMS (IP Multimedia Subsystem) technologies are still suffering from a primary containment factor due to the nondifferentiation between IPTV (Internet Protocol Television) video components. The success of IPTV services depends on how the customer perceives QoS related to the provided stream. The satisfaction of this...
Efficient content distribution is a critical challenge in vehicular networks (VANETs). This is due to the characteristics of vehicular networks, such as high mobility, dynamic topologies, short-lived links and intermittent connectivity between vehicles. Recently, information-centric networking (ICN) has been proposed to VANET scenarios for improving content delivery of infotainmentapplications. However,...
This paper describes a flexible multimedia stack which provides media content from number of different streaming protocols. The main goal is to facilitate and accelerate integration with different TV and Set Top Box platforms. Presented solution can be used on Android as well as on Linux based systems. Advantages of this solution are unified data flow and processing of media data. It provides elementary...
Streaming media applications generate a sizable part of network traffic and represent a significant proportion of network providers' income. The commitment to user satisfaction can be summarized by different concepts, content providers emphasizing quality of experience (QoE), whereas network providers are more focused on quality of service (QoS). Measuring QoS parameters, and understanding the relationship...
In the past, virtualisation, and with it the move toward the cloud, has had a strong influence on the ICT (Information Communication Technology) sector, and now seems set to revolutionise the telecommunications sector as well. The virtualisation into software artefacts of functions that would usually be deployed as hardware has come to be known as Network Function Virtualisation (NFV), and the European...
The paper deals with the design of a Robot based automation framework that can be used for the enhancement of the capabilities and standards of an enterprise functional testing. The paper firstly introduces IMS (IP Multimedia Subsystems) and the necessity to build an end-to-end framework for functional testing. The protocol involved for call handling is the SIP (Session Initiation Protocol). Along...
Trickle algorithm, a transmission scheduling algorithm developed for wireless sensor networks (WSNs), is now widely used in low power and lossy networks. IPV6 Routing Protocol for Low Power and Lossy Networks (RPL) and Multicast Protocol for Low Power and Lossy networks (MPL) have employed Trickle algorithm as a basic mechanism for message dissemination. Trickle algorithm adopts a “polite gossip”...
In peer-to-peer overlay networks, distributed hash tables have been characterized as self-organizing, scalable, and robust. Up to now, distributed hash tables allow to store, search and retrieve only single data elements, which make the creation of more complex applications, such as distributed online social networks, very cumbersome. Sophisticated applications require the support for various and...
The replication and dissemination of multimedia data become increasingly convenient and efficient, so a lot of redundant multimedia data, especially image files, have been generated and stored on the Internet. Therefore, it is necessary to perform deduplication of images. However, the existing deduplication methods of regular files are hash-based, which cannot be applied to the deduplication of images...
At the edge of the network with cache servers, researchers usually focused on how to cache the contents or how to deliver cached contents from edge network to user equipment (UE). In this paper, we study the content delivery scheme in ultra-dense network (UDN) scenario. Since small cells (SCs) are densely and largely deployed in UDNs, it is hard to operate the SCs with a central unit. Thus, our delivery...
The Hyper-linked communications concept applies much of the hypermedia concepts, widely used on Web content, to the communications realm. This paradigm allows to synchronize, structure and navigate communication content integrated into voice and video calls. Voice and image together can express emotions like no other medium can. With hypermedia concepts, we can add even more value to conference calls...
Quality of Service (QoS) and Experience (QoE) monitoring is a must during the management of services deployed over the Internet. This is particularly critical for Voice over IP (VoIP), as its degradation is immediately perceived by end users. From our experience, we highlight the impact that TCP segmentation exerts on online VoIP monitoring systems. On the one hand, it makes difficult to interpret...
Providing proper technical solutions to cover all requirements of the Voice over LTE (VoLTE) service is still a great challenge for operators. Network monitoring is one of the important methods to support service verification, deployment and operations. The VoLTE service utilizes both the LTE Evolved Packet Core (EPC), and the IP Multimedia Subsystem (IMS). These architectures are built on different...
Current networks have much limitations due to their rigidity, which is given by static configurations mainly based on commands or static scripts. The resource provisioning is less automatic and the efficiency decreases. Moreover, virtualization and cloud are changing radically the traffic patterns of the data center. This is mainly due to the communication between servers, because the applications...
Current networks have much limitations due to their rigidity, which is given by static configurations mainly based on commands or static scripts. The resource provisioning is less automatic and the efficiency decreases. Moreover, virtualization and cloud are changing radically the traffic patterns of the data center. This is mainly due to the communication between servers, because the applications...
Technological generation change have expanded the use of VoIP. In parallel to this expansion, exploiting the vulnerabilities of the VoIP systems have increased. Fuzzing test are widely used in the discovery of these vulnerabilities. In our study, we discuss the discovery of vulnerabilities of SIP based VoIP system with Fuzzing test and the exploitation of these vulnerabilities. Also, we describe the...
The broadcasting industry has recently begun to adopt statistical multiplexing based network platform in their workflow to support professional live audio/video (AV) transmission instead of the Time Division Multiplexing (TDM) based system. These audio-over-packet switched systems require a carefully designed and managed network to ensure key quality measures of the real-time (RT) media, such as low...
Transportable nodes in a healthy and demanding network set-up of Mobile Adhoc Network (MANET) are self-governing with self-configurable potential due to high occurrence of topology alteration and changeable rescheduling of the network mechanism during data communication. Due to simplicity of set up, the energetic networking system in MANET is very victorious in conditions where it is complicated to...
The previous work, suggests a portioned picturebroadcasting system where screens of small size are accumulated togenerate screen of bigger size through Ethernet network interfacethat helps in easy install & implementation of digitized displaydevices. The system makes use of Texas Instruments Da Vinciplatform, that is comprised of Da Vinci TMS320DM6646 dual coreCPU along an ARM9 core & C64+...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.