Session Initiation Protocol

Author(s):  
Ilija Basicevic ◽  
Miroslav Popovic

With the appearance of the Internet as an important communications medium for widespread everyday use, which can be dated to the mid 90s, a need to establish a signalization protocol for multimedia communications was recognized. There were two major proposals: SIP by the Internet community, and H.323 by ITU-T.

Author(s):  
A.M. Ponomarev

The article presents the results of a validating study carried out within the framework of the research under the grant "Building predictive models of the dynamics of the development of mobilization-type Internet communities". The aim of the study is to test the empirical model of integration of the Internet community in terms of the validity of the content and the validity of the criteria. The subject of the study is the validity of the criteria and integration factors identified in this model. The research methods are a survey of internal experts and a comparative analysis of assessments of the criteria and factors of integration of the specified model by external and internal experts. The results obtained allow us to conclude that it is correct to identify the criteria and factors for integrating the Internet community at the first stages of the research project. Differences in the assessment by two types of experts of the significance of some criteria and factors of integration of Internet communities receive the fixation of two observation positions - external and internal - as two types of explanation, namely, an understanding and descriptive explanation, respectively. The conducted research not only allows to introduce new criteria and factors of integration into the empirical model of integration of the Internet community, but also to draw an important theoretical conclusion. Online communities in their development manifest both the properties of real social groups and the properties of networks. These two methodological attitudes can be equally successfully applied in the analysis of online communities of the mobilization type. In the first case, analyzing the behavior of the online community as a social group, the dynamics of its mobilization function is mostly recorded. In the second case, analyzing the behavior of a community as a network, the dynamics of its volume and the dynamics of information potential are described to a greater extent.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

The Domain Name System - DNS is regarded as one of the critical infrastructure component of the global Internet because a large-scale DNS outage would effectively take a typical user offline. Therefore, the Internet community should ensure that critical components of the DNS ecosystem - that is, root name servers, top-level domain registrars and registries, authoritative name servers, and recursive resolvers - function smoothly. To this end, the community should monitor them periodically and provide public alerts about abnormal behavior. The authors propose a novel quantitative approach for evaluating the health of authoritative name servers – a critical, core, and a large component of the DNS ecosystem. The performance is typically measured in terms of response time, reliability, and throughput for most of the Internet components. This research work proposes a novel list of parameters specifically for determining the health of authoritative name servers: DNS attack permeability, latency comparison, and DNSSEC validation.


2011 ◽  
Vol 22 (05) ◽  
pp. 1073-1098
Author(s):  
SHLOMI DOLEV ◽  
YUVAL ELOVICI ◽  
ALEX KESSELMAN ◽  
POLINA ZILBERMAN

As more and more services are provided by servers via the Internet, Denial-of-Service (DoS) attacks pose an increasing threat to the Internet community. A DoS attack overloads the target server with a large volume of adverse requests, thereby rendering the server unavailable to "well-behaved" users. In this paper, we propose two algorithms that allow attack targets to dynamically filter their incoming traffic based on a distributed policy. The proposed algorithms defend the target against DoS and distributed DoS (DDoS) attacks and simultaneously ensure that it continues to serve "well-behaved" users. In a nutshell, a target can define a filtering policy which consists of a set of traffic classification rules and the corresponding amounts of traffic for each rule. A filtering algorithm is enforced by the ISP's routers when a target is being overloaded with traffic. The goal is to maximize the amount of filtered traffic forwarded to the target, according to the filtering policy, from the ISP. The first proposed algorithm is a collaborative algorithm which computes and delivers to the target the best possible traffic mix in polynomial time. The second algorithm is a distributed non-collaborative algorithm for which we prove a lower bound on the worst-case performance.


2020 ◽  
Vol 4 (2) ◽  
pp. 21-39
Author(s):  
Abdul Munir ◽  
Riki Harianto

live streaming is a latest innovation for people to express themselves and exchange ideas. The current social media that is becoming a trend among the people and using live streaming as a means to interact is social media live streaming Bigo live. The existence of bigo live as an internet community forum (Cyber Community) certainly changes in the norms and values ​​adopted by these users, so it cannot be denied that in the internet community (Cyber Community) there are changes and rules that occur . One of them appears an interaction created virtually in the world, where the emergence of a form of deviation that occurs in social media live streaming bigo live, one of which is cyber sexual harassment. The method used in this study uses visual methods. The theory used in this paper is the theory of routine activities where observations take place and observe every bigo live social media user.


2015 ◽  
Vol 5 (1) ◽  
Author(s):  
Neha Goel ◽  
Sonia Gupta ◽  
C. K. Jha

With the growth of Internet, websites have become a dynamic tool in the market for every business to both acquire and service their customers. Online presence through websites has given them a global and wider reach. Good design and well management are the two key aspects of the effective website to catch the attention of visitors. Nowadays, the analysis and behavior of website visitors can be used to convert them into customers and serve them in a better way. This can be carried out on the weblogs which are generated as a result of user’s access to a website. This paper aims to study the log files of an astrological website. An astrological website has not gained much attention in the internet community as people prefer going to the astrologers in person to resolve their problems. The log files of an astrology website were taken, preprocessed and analyzed using Analyze Key Influencers technique a feature of Microsoft SQL Server Data Mining Add-ins for Microsoft Office 2007. The information obtained can be used to enhance the effectiveness of the website.


Author(s):  
Martin C. J. Elton ◽  
John Carey

This chapter describes how relevant the study of new media and telecommunication innovations, such as videotex, has been to research on developments around the Internet and the Web. It elaborates the distinctions between the Internet and the Web. Additionally, some of the more interesting links between research issues from long ago (in Internet time!) and those of significance today are explained. Online databases developed the initial designs for information services that would appear on the Web. CompuServe and The Source are the best-known ASCII videotex services. These videotex services provide links to other organisations with which the companies did business. The Internet was initially an infrastructure that efficiently transmitted data and at very low cost; fairly soon, it also became able to transmit asynchronous and real-time voice and video. The Internet community resolved the problem of interlinking disparate computer systems so as to produce new and synergistic wholes.


Sign in / Sign up

Export Citation Format

Share Document