Refine
Departments, institutes and facilities
Document Type
- Conference Object (50)
- Article (7)
- Part of a Book (1)
- Doctoral Thesis (1)
- Patent (1)
- Report (1)
Year of publication
Keywords
- WiLD (3)
- 802.11 (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- Internet (2)
- LoRa (2)
- Long-Distance WiFi (2)
- OpenFlow (2)
- WiFi (2)
- Customization (1)
Filling the Pipe
(1995)
An Information on Demand teleservice that was developed at the German National Research Center for Information Technology (GMD) provides remote access to multimedia information consisting of audio, video, and text [jonas et al. 94]. It uses a bidirectional narrowband message link between the end user and the service provider, and a unidirectional broadband data link from the service provider to the end user. Since the IoD teleservice is used across a satellite connection (among others), it turned out to be necessary to implement an access protocol that is optimized for the access of real-time multimedia data across a long-delay high-bandwidth link, a long fat pipe [jacobsen et al. 92]. This paper introduces the MediaService Protocol (MSP) and describes a prototype implementation (version 0.6).
The Internet Engineering Task Force (IETF) is currently working on the development of Differentiated Services (DiffServ). DiffServ seems to be a promising technology for next-generation IP networks supporting Quality-of-Services (QoS). Emerging applications such as IP telephony and time-critical business applications can benefit significantly from the DiffServ approach since the current Internet often can not provide the required QoS. This paper describes an implementation of Differentiated Services for Linux routers and end systems. The implementation is based on the Linux traffic control package and is, therefore, very flexible. It can be used in different network environments as first-hop, boundary or interior router for Differentiated Services. In addition to the implementation architecture, the paper describes performance results demonstrating the usefulness of the DiffServ concept in general and the implementation in particular.
ATM virtual studio services
(1996)
The term "virtual studio" refers to real-time 3D graphics systems used to render a virtual set in sync with live camera motion. As the camera pans and zooms, the virtual set is redrawn from the correct perspective. Using blue room techniques, actors in front of the real camera are then “placed in” the virtual set. Current virtual studio systems are centralized – the blue room, cameras, renderers etc. are located at a single site. However distributed configurations offer significant economies such as the sharing of expensive rendering equipment among many sites. This paper describes early expe- riences of the DVP1 project in the realization of a distributed virtual studio. In particular we de- scribe the first video production using a distributed virtual studio over ATM and make observations concerning network QOS requirements.
This paper presents the current stage of an IP-based architecture for heterogeneous environments, covering UMTS-like W-CDMA wireless access technology, wireless and wired LANs, that is being developed under the aegis of the IST Moby Dick project. This architecture treats all transmission capabilities as basic physical and data-link layers, and attempts to replace all higher-level tasks by IP-based strategies.
More and more devices will be connected to the internet [3]. Many devicesare part of the so-called Internet of Things (IoT) which contains many low-powerdevices often powered by a battery. These devices mainly communicate with the manufacturers back-end and deliver personal data and secrets like passwords.
Verschiedene intelligente Heimautomatisierungsgeräte wie Lampen, Schlösser und Thermostate verbreiten sich rasant im privaten Umfeld. Ein typisches Kommunikationsprotokoll für diese Geräteklasse ist Bluetooth Low Energy (BLE). In dieser Arbeit wird eine strukturierte Sicherheitsanalyse für BLE vorgestellt. Die beschriebene Vorgehensweise kategorisiert bekannte Angriffsvektoren und beschreibt einen möglichen Aufbau für eine Analyse. Im Zuge dieser Arbeit wurden einige sicherheitsrelevante Probleme aufgedeckt, die es Angreifern ermöglichen die Geräte vollständig zu übernehmen. Es zeigte sich, dass im Standard vorgesehene Sicherheitsfunktionen wie Verschlüsselung und Integritätsprüfungen häufig gar nicht oder fehlerhaft implementiert sind.