draft-ietf-behave-nat-behavior-discovery-01. Derek MacDonald. Bruce Lowekamp. Changes from IETF-68. Clarified that only stun servers with two IP addresses should ...
Add text for MTU length exception corresponding to change to 3489bis. ... Update terminology for endpoint-independent and address-dependent from 4787 (thanks ...
saturn.example.com. DHT holds mapping between peer's domain name and ... Apps don't need NAT traversal code. No need for endless 'ICE for protocol X' drafts ...
Online passive measurement of physical layer's available bandwidth (Wren) Integration of Virtuoso's application monitoring and Wren's traffic monitoring ...
Evidence for feasibility of prediction-based best-effort RT service for these applications ... Currently under construction. Remos. Overview: HPDC'98, DeWitt, et al ...
Cullen Jennings. Cisco. 2. VoIP/IM. VoIP Voice over IP (Internet Protocol) ... Alice- Alice's Node. Bob- Bob's Node. Standard SIP used for connection. No ...
interactive visualization services David O Hallaron School of Computer Science and Department of Electrical and Computer Engineering Carnegie Mellon University
Can we use this information to compute a global traffic load matrix? ... Measure performance (running time) of application (BSP patterns application) ...
lots of good undergraduates. Research. Remos: SNMP-based topology and utilization for distributed apps ... Boils down to schemas and protocols. 9. Existing Pieces ...
Jacobo Bielak and Omar Ghattas (CMU CE) David O'Hallaron (CMU CS and ECE) ... Receive an MPEGs, JPEG and/or videotapes in a couple of weeks/months. ...
Trust of names based on DNS and delegation of hierarchy. CA names are an ... Assumptions very dubious based on general mix of existing good/evil in the network ...
Should be able to define remote management usage for centrally administered overlay ... ID only delivered to specific node, not to node responsible for Node-ID ...
Such statements include oral statements in IETF sessions, as well as written and ... Overlay Pointers - Ted Hardie - 10 min. draft-hardie-p2poverlay-pointers-00 ...
P2PSIP Charter Proposal Many people helped write this charter Heading and such Peer-to-Peer Session Initiation Protocol (P2PSIP) Chairs: TBD RAI Area Director(s ...
Bandwidth Metrics and Measurement Tools Xin, Lu High-Performance Computing Group Computer Science University of Windsor Bandwidth Metrics NMWG divide bandwidth into ...
On-line game, conferencing, Internet broadcasting. VOD service, VoIP ... control in real-time Internet audio conferencing,' in Proceedings of AVSPN 97, 1997. ...
Protocol suggested by myself and Cullen Jennings of Cisco. Available as IETF Internet-Draft ... Alice (User ID 234) Bob (User ID 011) Node A stores a registration for ...
Protocol and System Design, Reliability, and Energy Efficiency in Peer-to-Peer Communication Systems Salman Abdul Baset salman@cs.columbia.edu Thesis defense
... whether to provide TURN service) based on results and contact with other peers ... experimental evidence that the use of behavior-discovery results in improved ...
'amazing the. phone rings' 'does it do. call transfer?' 'how can I make it. stop ringing? ... consumer applications. serious trust issues. Motivation. no ...
Uses buddy list/phone book to augment search. Several uses we are interested in ... I maintain a list of references at. http://www.p2psip.org. Contact me via email ...
Clients enroll in same manner as peer (have certificates) Messages signed just as peer ... relies on source-based routing and multi-hop destination lists ...
The Running Time Advisor. A Resource Signal-based Approach to ... Which host should the application send the task to so that its running time is appropriate? ...
Spectrogram. Frequency domain. 26. Host Load Has Exploitable Structure. Time domain. Autocorrelation. Spectrogram. Frequency domain. 27. Linear Time Series Models ...