Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
The traditional approach to implementing admission control, as exemplified by the Integrated Services proposal in the IETF, uses a signalling protocol to establish reservations a...
Lee Breslau, Edward W. Knightly, Scott Shenker, Io...
In this paper, we study web services methods and approaches to enable real-time communication services over IP. This approach extends web services methodologies from service integ...
The threat of commoditization poses a real challenge for service providers. While the end-to-end principle is often paraphrased as “dumb network, smart end-systems”, the origi...
With multimedia applications, the Internet traffic increased a lot in volume, but also suffered major alterations in its nature, requesting other network services besides the curr...