NEC Europe

Displaying 1-8 of 8 results

  • White Papers // May 2012

    On Supporting Mobile Peer to Mobile Peer Communications

    In this paper, the authors propose a new method for assessing the sociability scalar of a mobile peer by the network, most importantly with no involvement of the mobile peer. The sociability metric can help in the Application Layer Traffic Optimization (ALTO) guidance in Mobile Peer-to-Mobile Peer (MP2MP) scenario to...

    Provided By NEC Europe

  • White Papers // May 2012

    Real-Time Web Application Roadblock: Performance Penalty of HTML Sockets

    HTML socket streams, such as XHR-polling and HTML5 web-sockets, are being rapidly embraced because they operate over HTTP(S) protocols and ports, allowing them to easily traverse security firewalls and HTTP proxies, unlike raw TCP streams. This paper presents an active measurement study of these protocols and compares their performance to...

    Provided By NEC Europe

  • White Papers // May 2012

    A Destination Prediction Model Based on Historical Data, Contextual Knowledge and Spatial Conceptual Maps

    Mobile wireless network technology has enabled the development of increasingly diverse applications and devices resulting in an exponential growth in usage and services. One challenge in mobility management is the movement prediction. Prediction of the user's longer-term movement (e.g., 10 min in advance) with reasonable accuracy is very important to...

    Provided By NEC Europe

  • White Papers // Feb 2011

    Virtual Identity Framework for Telecom Infrastructures

    Identity Management has so far been a field mainly applications and Web focused. This paper describes a novel approach to cross layer identity management that extends digital identities to the network, the Virtual IDentity (VID) Framework. The VID framework provides strong privacy to the user, while easily supporting personalization cross-service...

    Provided By NEC Europe

  • White Papers // Jun 2010

    Crosstalk: A Scalable Cross-Protocol Monitoring System for Anomaly Detection

    Monitoring is crucial both to the correct operation of a network and to the services that run on it. Operators perform monitoring for various purposes, including traffic engineering, quality of service, security and detection of faults and mis-configurations. However, the relentless growth of IP traffic volume renders real-time monitoring and...

    Provided By NEC Europe

  • White Papers // Jan 2010

    DECON: Decentralized Coordination for Large-Scale Flow Monitoring

    Monitoring at the flow level is crucial to ensure the correct operation of networks. Any sizable network relies on a number of monitoring probes, both to provide different observation points but also to scale to the ever-increasing number of flows that go through it. This situation gives rise to the...

    Provided By NEC Europe

  • White Papers // Jul 2009

    Protecting SIP Against Very Large Flooding DoS Attacks

    The use of the Internet for VoIP communications has seen an important increase over the last few years, with the Session Initiation Protocol (SIP) as the most popular protocol used for signaling. Unfortunately, SIP devices are quite vulnerable to Denial-of-Service (DoS) attacks, many of them becoming unresponsive and even resetting...

    Provided By NEC Europe

  • White Papers // Jun 2008

    Striping Without Sacrifices: Maintaining POSIX Semantics in a Parallel File System

    Striping is a technique that distributes file content over multiple storage servers and thereby enables parallel access. In order to be able to provide a consistent view across file data and metadata operations, the file system has to track the layout of the file and know where the file ends...

    Provided By NEC Europe

  • White Papers // Feb 2011

    Virtual Identity Framework for Telecom Infrastructures

    Identity Management has so far been a field mainly applications and Web focused. This paper describes a novel approach to cross layer identity management that extends digital identities to the network, the Virtual IDentity (VID) Framework. The VID framework provides strong privacy to the user, while easily supporting personalization cross-service...

    Provided By NEC Europe

  • White Papers // Jun 2008

    Striping Without Sacrifices: Maintaining POSIX Semantics in a Parallel File System

    Striping is a technique that distributes file content over multiple storage servers and thereby enables parallel access. In order to be able to provide a consistent view across file data and metadata operations, the file system has to track the layout of the file and know where the file ends...

    Provided By NEC Europe

  • White Papers // Jun 2010

    Crosstalk: A Scalable Cross-Protocol Monitoring System for Anomaly Detection

    Monitoring is crucial both to the correct operation of a network and to the services that run on it. Operators perform monitoring for various purposes, including traffic engineering, quality of service, security and detection of faults and mis-configurations. However, the relentless growth of IP traffic volume renders real-time monitoring and...

    Provided By NEC Europe

  • White Papers // Jan 2010

    DECON: Decentralized Coordination for Large-Scale Flow Monitoring

    Monitoring at the flow level is crucial to ensure the correct operation of networks. Any sizable network relies on a number of monitoring probes, both to provide different observation points but also to scale to the ever-increasing number of flows that go through it. This situation gives rise to the...

    Provided By NEC Europe

  • White Papers // Jul 2009

    Protecting SIP Against Very Large Flooding DoS Attacks

    The use of the Internet for VoIP communications has seen an important increase over the last few years, with the Session Initiation Protocol (SIP) as the most popular protocol used for signaling. Unfortunately, SIP devices are quite vulnerable to Denial-of-Service (DoS) attacks, many of them becoming unresponsive and even resetting...

    Provided By NEC Europe

  • White Papers // May 2012

    On Supporting Mobile Peer to Mobile Peer Communications

    In this paper, the authors propose a new method for assessing the sociability scalar of a mobile peer by the network, most importantly with no involvement of the mobile peer. The sociability metric can help in the Application Layer Traffic Optimization (ALTO) guidance in Mobile Peer-to-Mobile Peer (MP2MP) scenario to...

    Provided By NEC Europe

  • White Papers // May 2012

    Real-Time Web Application Roadblock: Performance Penalty of HTML Sockets

    HTML socket streams, such as XHR-polling and HTML5 web-sockets, are being rapidly embraced because they operate over HTTP(S) protocols and ports, allowing them to easily traverse security firewalls and HTTP proxies, unlike raw TCP streams. This paper presents an active measurement study of these protocols and compares their performance to...

    Provided By NEC Europe

  • White Papers // May 2012

    A Destination Prediction Model Based on Historical Data, Contextual Knowledge and Spatial Conceptual Maps

    Mobile wireless network technology has enabled the development of increasingly diverse applications and devices resulting in an exponential growth in usage and services. One challenge in mobility management is the movement prediction. Prediction of the user's longer-term movement (e.g., 10 min in advance) with reasonable accuracy is very important to...

    Provided By NEC Europe