PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Agent based VoIP Application with Reputation Mechanisms

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper we introduce our new VoIP model the aim of which is to meet the challenges of modern telephony. We present project concepts, details of implementation and our testing environment which was designed for testing many aspects of VoIP based systems. Our system combines mechanisms for ensuring best possible connection quality (QoS), load balance of servers in infrastructure, providing security mechanisms and giving control over the packet routing decisions. The system is based on Peer-to-Peer (P2P) model and data between users are routed over an overlay network, consisting of all participating peers as network nodes. In the logging process, each user is assigned to a specific node (based on his/her geographic location and nodes load). Every node also has a built-in mechanism allowing to mediate between the user and the main server (e.g. in logging process). Besides that, because nodes are participating in data transmission, we have control over the data flow route. It is possible to specify the desired route, so, regardless of the external routing protocol, we can avoid paths that are susceptible to eavesdropping. Another feature of presented system is usage of agents. Each agent acts with a single node. Its main task is to constantly control the quality of transmission. It analyzes such parameters like link bandwidth use, number of lost packets, time interval between each packets etc. The information collected by the agents from all nodes allows to built a dynamic routing table. Every node uses Dijkstra’s algorithm to find the best at the moment route to all other nodes. The routes are constantly modified as a consequence of changes found by agents or updates sent by other nodes. To ensure greater security and high reliability of the system, we have provided a reputation mechanism. It is used during updating of the information about possible routes and their quality, given by other nodes. Owing to this solution nodes and routes which are more reliable get higher priority.
Rocznik
Strony
88--92
Opis fizyczny
Bibliogr. 14 poz., rys.
Twórcy
autor
  • PhD student at Jagellonian University, Department of Physics, Astronomy and Applied Computer Science, Cracow, Poland
autor
  • Institute of Fundamental Technological Research of the Polish Academy of Sciences
  • Department of Electronics and Information Technology of Warsaw University of Technology, Poland
Bibliografia
  • [1] D. Cohen, “A Protocol for Packet-Switching Voice Communication,” Computer Networks, vol. 2, no. 4–5, 1976.
  • [2] One Way Transmission Time, ITU-T, G.114, 2003.
  • [3] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications,” IETF, RFC 3550, Tech. Rep., Jul. 2003.
  • [4] H.323. Packet-Based Multimedia Communication Systems, ITU-T, Jul. 2003.
  • [5] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, “SIP: Session Initiation Protocol,” IETF, RFC 3261, Tech. Rep., Jun. 2002.
  • [6] M. Wooldridge and N. R. Jennings, “Intelligent Agents: Theory and Practice,” The Knowledge Engineering Review, 1995.
  • [7] X. Che and L. J. Cobley, “VoIP Performance over Different Interior Gateway Protocols,” in IJCNIS, Apr. 2009.
  • [8] J. Rosenberg, R. Mahy, P. Matthews, and D. Wing, “Session Traversal Utilities for NAT,” RFC 5389, Tech. Rep., Oct. 2008.
  • [9] Z. Hu, “NAT Traversal Techniques and Peer-to-Peer Applications,” in HUT T-110.551 Seminar on Internetworking, Apr. 2005.
  • [10] R. Baden, D. Clark, and S. Shenker, “Integrated Services in the Internet Architecture: An Overview,” IETF RFC 1633, Tech. Rep., Jun. 1994.
  • [11] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, “An Architecture for Differentiated Services,” IETF RFC. 2475, Tech. Rep., Dec. 1998.
  • [12] W. Mazurczyk and Z. Kotulski, “Adaptive VoIP with Audio Watermarking for Improved Call Quality and Security,” Journal of Information Assurance and Security, vol. 2, no. 3, pp. 226–234, 2007.
  • [13] M. Pioro and D. Medhi, “Routing, Flow, and Capacity Design in Communication and Computer Networks,” The Morgan Kaufmann Series in Networking, 2004.
  • [14] M. Dworkin, “Recommendation for Block Cipher Modes of Operation,” NIST Special Publication 800-38A, NIST, 2001.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c4227f5a-acf4-4124-b2b2-e40ebe95d5bc
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.