1001 18699A9 (19) United States (10) Pub

Total Page:16

File Type:pdf, Size:1020Kb

1001 18699A9 (19) United States (10) Pub US 201001 18699A9 (19) United States (10) Pub. N0.: US 2010/0118699 A9 (12) Patent Application Publication (48) Pub. Date: May 13, 20 10 Xiong et al. CORRECTED PUBLICATION (54) SYSTEMS AND METHODS FOR DYNAMIC Publication Classi?cation QUALITY OF SERVICE (51) Int- Cl (76) Inventors: Bo Xiong, Sunnyvale, CA (US); H041‘ 12/56 (200601) Dean Chang, Sunnyvale, CA (US) (52) US. Cl. ................................................... .. 370/2301 Correspondence Address: JONES DAY 222 EAST 41ST ST (57) ABSTRACT NEW YORK’ NY 10017 (Us) Systems, methods, and apparatus for routing are provided in _ Which a connection track comprising a plurality of network or (21) Appl' NO" 11/805’604 transport layer packets, received by a router, is identi?ed by . _ examination of header ?elds of one or more ?rst packets in the (22) Flled' May 24’ 2007 plurality of packets. One or more quality of service (QoS) Prior Publication D ata parameters is associated With the connection track by deter mining Whether the track encodes a data type by (i) an iden (l5) Correction of US 2008/0291827 A1 Nov. 27, 2008 ti?cation of a predetermined application protocol used Within See (63) Related US. Application Data. the one or more ?rst packets and/or (ii) a comparison of a payload of one or more packets in the plurality of packets to (65) Us 2008/0291827 A1 NOV‘ 27’ 2008 known data type formats. A ?rst QoS parameter is set to a ?rst . value in a ?rst value range When the connection track contains Related U's' Apphcatlon Data the ?rst data type. The connection track is routed through the (63) Continuation-in-part of application No, 11 /805,471, router in accordance With the one or more QoS parameters ?led on May 22, 2007, noW abandoned. assigned to the connection track. 104A 104A 104A 104A 106A 100 /'\ 106A 102 N _ _ N z 5 16 Power : CPU : Source 5 : \12 18\14 l | 30 I _\ f 32 Connection track control module 34 Lookup table I38 1 Connection track 1 f 40 1 Data type f QoS parameter 1 f42-l 1 ' 42-1-N QoS parameter N f38_2 Connection track 2 f 40 2 f . Data type I422 l QoS parameter 1 42-2 N QoS parameter N f 1 38-M Connection track M f Patent Application Publication May 13, 2010 Sheet 1 of 3 US 2010/0118699 A9 104A 104A 104A 104A 106A 100 106A K’ /—\ K106A 106A 102 \ J _ _ \ z 5 16 Power ; CPU ; Source 5 E “12 14 J 18\ I 30 _\ f 32 Connection track control module 3 4 Lookup table / 3 8 1 Connection track 1 f 40 1 Data type f 42 l 1 QoS parameter 1 f _ _ 42-1-N QoS parameter N 3 8_2 Connection track 2 40-2 Data type f 42 2 1 QoS parameter 1 f _ _ ' 42-2-N QoS parameter N f 1 38-M Connection track M f \ 106B \106B _/106B 104B 104B 104B 104B Patent Application Publication May 13, 2010 Sheet 2 of 3 US 2010/0118699 A9 Receive one or more network layer or transport layer packets I Associate each of the one or more network layer or transport layer packets with a ?rst connection track in a plurality of connection tracks based on values in one or more header ?elds of the respective network layer or transport layer packets Encode one or more of the network layer or transport layer packets assigned to the ?rst connection track with a wrapper ‘ l /-208 Add a data structure to a lookup table for the ?rst connection track I t /210 Place a pointer to the data structure in the lookup table in the wrapper of each of the one or more of the network layer or transport layer packets assigned to the ?rst connection track that have been wrapped with a wrapper 212 {214 the packets in the NO Extract the payload from one or more ?rst connection track include a predetermined application network layer or transport layer protocol? packets in the ?rst connection track f- 21 6 t f 21 8 Determine the data type encoded in Determine the data type encoded in the packets of the ?rst Connection the packets of the ?rst connection track from the predetermined track by comparing the payload from application protocol the one or more network layer or transport layer packets in the ?rst connection track to known data types Assign QoS parameters to the ?rst connection track based upon the data type encoded in the one or more network layer or transport layer packets of the ?rst connection track v f 222 Store the QoS parameters and, optionally, the data type encoded in the ?rst connection track in the data structure for the ?rst connection track in the lookup table v F 224 Route the ?rst connection track through the router in accordance with the QoS parameters of the connection track and, optionally, also in accordance with an Internet Service Provider-policy or other con?gurable router policy l K- 226 Remove the data structure for the ?rst connection track from the lookup table when the connection track has been routed Fig. 2 Patent Application Publication May 13, 2010 Sheet 3 0f 3 US 2010/0118699 A9 104A 104A 104A 104A 300"\ Power ' Source 12 18 14 30 Connection track control module Lookup table Connection track 1 Data type QoS parameter 1 0 0 QoS parameter N Connection track 2 Data type QoS parameter 1 QoS parameter N Connection track M 0 104B 104B 104B 104B Fig. 3 US 2010/0118699 A9 May 13,2010 SYSTEMS AND METHODS FOR DYNAMIC complexity and processing time involved With RSVP nego QUALITY OF SERVICE tiation makes RSVP, by itself, unsatisfactory. [0007] Another exemplary protocol, the differentiated Ser CROSS REFERENCE TO RELATED vices (“DiffServ”) protocol is an alternative technique to APPLICATION RSVP, Which utiliZes six DiffServ bits in the IP header to [0001] The present application is a continuation-in-part of indicate one of several limited QoS classes. In particular, as US. patent application Ser. No. to be determined entitled discussed in the IETF’s “De?nition of the Differentiated Ser “Systems and Methods for Dynamic Quality of Service,” vices Field (DS Field) in the IPv4 and IPv6 Headers” (“RFC attorney docket number 12108-001-999, that Was ?led on 2474”) and “An Architecture for Differentiated Services” May 22, 2007. (“RFC 2475”), DiffServ is intended to alloW netWork service providers to offer to each netWork user a range of netWork FIELD OF THE INVENTION services Which are differentiated on the basis of performance. [0002] The present invention relates to systems and meth In such a scheme, by marking a speci?c ?eld (eg the DS ods for dynamic QoS routing Where a connection track com ?eld) of each packet With a speci?c value, a user can request, prising data is routed from source to destination by a router on a packet by packet basis, a speci?c limited performance path that satis?es the QoS (e.g., bandWidth and delay) class level. This value Would specify the per-hop behavior to requirements of the connection track. be allotted to that packet Within the provider’s netWork. [0008] Typically, the user and netWork provider Would BACKGROUND OF THE INVENTION negotiate a policy (e.g. policing pro?le) that describes the rate [0003] Many IP routers typically support only “best effort” at Which traf?c can be submitted at each service class level. tra?ic. However, the bandWidth available to people has been Packets submitted in excess of this pro?le Would not be allot increasing rapidly With the advent of broadband access. The ted the service class level requested. An important feature of result is that many neW services are noW desired that require DiffServ is vieWed to be its scalability, Which alloWs the better QoS than “best effort” IP can support. Also, With broad protocol to be deployed in very large netWorks. This scalabil band, the problem of controlling the total usage and carrier ity is achieved by forcing as much complexity out of the core expense has become important. Thus, it has become neces of the netWork and into the boundary devices that process sary to improve both the delay performance and the control of loWer volumes of tra?ic and lesser numbers of ?oWs. HoW bandwidth for IP service, much as Was accomplished inATM. ever, this protocol has signi?cant limits that preclude Diff Also, call rejection for high bandWidth streaming services Serv from providing an effective solution to the problems like video is required instead of random discards if quality is faced With implementing QoS in an IP netWork. For example, to be maintained. DiffServ is a traf?c classi?cation technique that only has six [0004] Moreover, neW quality of service (QoS) standards bits With a total of only thirteen general service classes require that netWork devices, such as netWork sWitches, de?ned. Four classes are reserved for assured service. One address these requirements. For example, the IEEE 802.1 class is reserved for expedited service. There are, hoWever, no standard divides netWork tra?ic into several classes of service QoS de?nitions to quantify each class, Which thereby limits based on sensitivity to transfer latency, and prioritizes these the QoS types that can be supported. Since the Internet Will classes of service. The highest class of service is recom need to be able to carry a Wide variety of QoS types, this mended for netWork control tra?ic, such as sWitch-to-sWitch quanti?cation limitation greatly restricts the future use of con?guration messages.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Traffic Recognition in Cellular Networks
    IT 09 010 Examensarbete 30 hp March 2009 Traffic Recognition in Cellular Networks Alexandros Tsourtis Institutionen för informationsteknologi Department of Information Technology Abstract Traffic Recognition in Cellular Networks Alexandros Tsourtis Teknisk- naturvetenskaplig fakultet UTH-enheten Traffic recognition is a powerful tool that could provide valuable information about the network to the network operator. The association of additional information Besöksadress: carried by control packets in the core cellular network would help identify the traffic Ångströmlaboratoriet Lägerhyddsvägen 1 that stem from each user and acquire statistics about the usage of the network Hus 4, Plan 0 resources and aid detecting problems that only one or a small group of users experience. The program used is called TAM and it operates only on Internet traffic. Postadress: The enhancements of the program included the support for the Gn and Gi interfaces Box 536 751 21 Uppsala of the cellular network where the control traffic is transferred via the GTP and RADIUS protocols respectively. Furthermore, the program output is verified using Telefon: two other tools that operate on the field with satisfactory results and weaknesses 018 – 471 30 03 were detected on all tools studied. Finally, the results of TAM were demonstrated Telefax: with conclusions being drawn about the statistics of the network. The thesis 018 – 471 30 00 concludes with suggestions for improving the program in the future. Hemsida: http://www.teknat.uu.se/student Handledare: Tord Westholm Ämnesgranskare: Ivan Christoff Examinator: Anders Jansson IT 09 010 Tryckt av: Reprocentralen ITC Acknowledgements My thanks goes first to my supervisor in Ericsson, Tord Westholm for sug- gesting valuable comments, helping to structure the work and the presenta- tion and allowing me to take decisions concerning the project direction.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Soulseek Free Download Windows 10 Soulseek 157 NS 13E
    soulseek free download windows 10 Soulseek 157 NS 13e. Soulseek is an ad-free, spyware free, and just plain free file sharing (P2P) application. Addition to basic file sharing application, it has a community and community-related features. Based on peer-to-peer technology, virtual rooms allow you to meet people with the same interests, share information, and chat freely using real-time messages in public or private. Screenshots: Other editions: HTML code for linking to this page: Keywords: soulseek p2p file sharing peer-to-peer community chat chat. 1 License and operating system information is based on latest version of the software. SoulSeek. Soulseek is a p2p program that was born in order to share music, intending to be a platform to help new artists find a place in the music industry, or at least, to let them be listened to by Soulseek users. Soulseek grew and now it is used for sharing all kind of files, but specifically music. SoulSeek is the competitor of other p2p programs like eMule or Kazaa. One point on its favor is that it is Ad-free, spyware free, totally free, and in addition, you don't have to register to go into their net. Soulseek, with its built-in people matching system, is a great way to make new friends and expand your mind! SoulSeek. SoulSeek es una aplicación P2P para compartir archivos a través de Internet, cuyo contenido ha sido orientado a la música. El propósito de SoulSeek es mejorar la velocidad de descarga con respecto a susmás direcctos competidores, como eMule o Kazaa.
    [Show full text]
  • Instructions for Using Your PC ǍʻĒˊ Ƽ͔ūś
    Instructions for using your PC ǍʻĒˊ ƽ͔ūś Be careful with computer viruses !!! Be careful of sending ᡅĽ/ͼ͛ᩥਜ਼ƶ҉ɦϹ࿕ZPǎ Ǖễƅ͟¦ᰈ Make sure to install anti-virus software in your PC personal profile and ᡅƽញƼɦḳâ 5☦ՈǍʻPǎᡅ !!! information !!! It is very dangerous !!! ᫬ΚTẝ«ŵ┭ՈT Stop violation of copyright concerning illegal acts of ơųጛňƿՈ☢ͩ ⚷<ǕO਍ᜐ&« transmitting music and ₑᡅՈϔǒ]ᡅ others through the Don’t forget to backup ඡȭ]dzÑՈ Internet !!! important data !!! Ȥᩴ̣é If another person looks in at your E-mail, it’s a big ὲâΞȘᝯɣ׏r problem !!! Don’t install software in dz]ǣrPǎᡅ ]ᡅîPéḳâ╓ ͛ƽញ4̶ᾬϹ࿕ ۅTake care of keeping your some other PCs without ੥ˊΙǺ password !!! permission !!! ₐ Stop sending the followings !!! ؄ŌՈϹوInformation against public order and Somebody targets on your PC for Pǎ]ᡅǕễạǑ͘͝ࢭÛ ΞȘƅ¦Ƿń morals illegal access !!! Ոƅ͟ǻᢊ᫁᫨ĐՈ ࿕Ϭ⓶̗ʵ£࿁îƷljĈ Information about discrimination, Shut out those attacks with firewall untruth and bad reputation against a !!! Ǎʻ ᰻ǡT person ᤘἌ᭔ ᆘჍഀ ጠᅼૐᾑ ᭼᭨᭞ᮞęɪᬡ෉ᬡǰɟ ᆘȐೈ࿴ ᾑ૥ ጠᅼ3ظ ᤘἌ᭔ ǰɟᯓۀ᭞ᮞ᭿ᮐᮧ᭪᭑᭎ᮖ᭤ᬞᬢ ഄᅤ Έʡȩîᬡ͒ͮᬢـ ᅼܘᆘȐೈ ǸᆜሹظᤘἌ᭔࿴ ཬᴔ ᭼᭨᭞ᮞᬞᬢŽᬍ᭑᭎ᮖ᭤̛ɏ᭨ᮀ᭳ᭅ ரἨ᳜ᄌ࿘Π ؼ˨ഀ ୈ᡼ὼ$ ഄጵ↬3L ʍ୰ᬞᯓ ᄨῼ33 Ȋථᬚᬌᬻᯓ ഄ˽ ઁǢᬝຨϙଙͮـᅰჴڹެ ሤᆵͨ˜Ɍ ጵႸᾀ żᆘ᭔ ᬝᬜ᫞Ϊ̎UઁɃᬢ ࡶ୰ᬝ᭲ᮧ᭪ᬢ ᄨؼᾭᄨ ᾑ૥ ٕ࿩ᅨ ΰ̛ᬞ᭫ᮌᯓ ᭻᭮᭚᭍᭮ᮂᭅ ሬČ ཬȴ3 ᾘɤɟ3 Ƌᬿᬍᬞᯓ ᫾ᬿᬒᬼۏąഄᅼ Ѹᆠᅨ ᮌᮧᮖᭅ ⃸ᛴܠ ఼ ᆬð3 ᤘἌ᭔࿴ ƂŬᯓ ᭨ᮀ᭳᭑᭒᭍ᭅƖ̳ᬞ ĩᬡ᭼᭨᭞ᮞᬞٴ ரἨ᳜ᄌ࿘ ᭼᭤ᮚᮧ᭴ᬡɼǂᬢ ڹެ ᵌೈჰ˨ ˜ϐ ᛄሤ↬3 ᆜೈᯌ ϤᏤ ᬊᬖ᫾ᬽᬊᬻ᫹ᯓ ᭏ᮞ᭤᭳ᮧᮖᬊᬝ᫷ᬚ ሬČʀ ͌ǜ ąഄᅼ ΰ̛ᬞ ޅ᫾᫿᫵ᬝᬒᬡ᭼᭨᭞ᮞᭅ ᤘἌ᭔Π ͬϐʼ ᆬð3 ʏͦᬞɃᬌᬾȩî ēᬖᬙ᫷ᬾᯓ ܘˑˑᏬୀΠ ᄨؼὼ ሹ ߍɋᬞ᫵ᬒᬾȩî ᮀᭌ᭏᭍᭑᭔ᮧᮖwƫᬚފᴰᆘ࿘ჸ $±ᅠʀ =Ė ܘ૥Čٍᅨ ᙌۨ5ࡨٍὼ ሹ ഄϤᏤ ᤘἌ᭔ ኩ˰Π3 ᬢ͒ͮᬊᬝ᫷ᯓ ᭢ᮎ᭮᭳᭍᭑᭳ᬊᬻ᫹ᯓـ ʧʧ¥¥ᬚᬚP2PP2P᭨᭨ᮀᮀ᭳᭳᭑᭑᭒᭒᭍᭍ᬢᬢ DODO NOTNOT useuse P2PP2P softwaresoftware ̦̦ɪɪᬚᬚᬀᬀᬱᬱᬎᬎᭆᭆᯓᯓ inin campuscampus networknetwork !!!! Z ʧ¥᭸᭮᭳ᮚᮧ᭚ᬞ᫽ᬄᬾ੒ͮᬢȴƏΜˉ᭢᭤᭱ Z All communications in our campus network are ᬈᬿᬙ᫷ᬱᬌ᫟ʧ¥ᬚP2P᭨ᮀ always monitored automatically.
    [Show full text]
  • Download Whole Journal
    and Audiovisual Archives Internationale Vereinigung der Schall- und audiovisuellen Archive Association Internationale d' Archiv Sonores et Audiovisuelles iasa journal • Journal of the International Association of Sound and Audiovisual Archives IASA • Journal de l'Association Internationale d'Archives Sonores et Audiovisuelles IASA • Zeitschrift der Internationalen Vereinigung der Schall- und audiovisuellen Archive IASA • EI Journal de Asociaci6n Internacional de Archivos Sonoros y Audiovisuales Editor: lise Assmann, The South African Broadcasting Corporation (SABC) Media Libraries, POBox 931,2006 Auckland Park, South Africa. Fax +27 (0 I I) 7144419· eMaikass!!'l~'l111~aJ>~<:9-,-~ Language Editor: Dorothy van Tonder, SABC The IASA Journal is published twice a year and sent to all the members of IASAApplications for membership of IASA should be sent to the Secretary General (see list of officers below). The annual dues are €40 for individual members and € 158 for institutiGlnal members. Back copies of the IASA Journal from 1971 are available on application. Subscription to the current year's issues of the IASA Journal is also available to non­ members at a cost of £70. Le IASA Journal est publie deux fois I'an et distribue 3 tous les membres de I'association. Veuillez envoyer vos demandes d'adhesion au secretaire dont vous trouverez I'adresse ci-dessous. Les cotisations annuelles se montent actuellement 3 €40 pour les membres individuels et € 158 pour les membres institutionnels. Les anciens numeros (3 partir de 1971 ) du IASA Journal sont disponibles sur demande. Ceux qui ne sont pas membres de I 'Association peuvent s'abonner au IASA Journal pour I'annee en cours au cout de €70.
    [Show full text]
  • Balancing Your Internet Cyber-Life with Privacy and Security
    . Balancing Your Internet Cyber-Life with Privacy and Security Joseph Guarino Owner/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP www.evolutionaryit.com in association with GBC/ACM Often... When I speak about security/privacy threats to non-technical customers, friends and family are incredulous. It's almost as if I am speaking about science fiction. Copyright © Evolutionary IT 2008 2 Security is a real concern unlike Bigfoot. Frame from Patterson-Gimlin film taken on October 21st, 1967 Copyright © Evolutionary IT 2008 3 Objectives ● Elucidate and demystify the subjects of cyber security and privacy in plain English. ● Explain why your privacy/security is important and how to protect it. ● Impart understanding of the privacy/security risks, impacts, ramifications. ● Give you practical knowledge to protect yourself, family and community. Copyright © Evolutionary IT 2008 4 Who am I? Joseph Guarino Working in IT for last 15 years: Systems, Network, Security Admin, Technical Marketing, Project Management, IT Management CEO/Sr. IT consultant with my own firm Evolutionary IT CISSP, LPIC, MCSE, PMP www.evolutionaryit.com Computer Security The fundamentals for the everyday users. Copyright © Evolutionary IT 2008 6 Common Misperceptions ● “I have anti-virus software...” ● “I don't personally have anything of value on my computer...” ● “I have a firewall...” ● “There are no major financial risks...” Copyright © Evolutionary IT 2008 7 Key terms/concepts Define some key terms... Copyright © Evolutionary IT 2008 8 General Terms ● Software Bug – an error, flaw or mistake in a computer program. ● Vulnerability – is a weakness in a system that allows an attacker to exploit or otherwise violate the integrity of your system.
    [Show full text]
  • Public Peer-To-Peer Filesharing Networks’ Evaluation
    PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters.
    [Show full text]
  • State of the Art in Peer-To-Peer Performance Testing
    State of the Art in Peer-to-Peer Performance Testing European Advanced Networking Test Center About EANTC The European Advanced Networking Test Center (EANTC) offers vendor independent network quality assurance since 1991 Business Areas Test and certification of network components for manufacturers Network design consultancy and proof of concept testing for service providers Request for Proposal (RfP) support, acceptance testing and network audits for large enterprises and government organizations EANTC Berlin, Germany Agenda 1. How much P2P traffic is out there today? 2. What categories of DPI detection solutions exist? 3. How is EANTC testing P2P filters? What are the key performance indicators? 4. What were the results of the InternetEvolution test? P2P Internet Statistics Traffic Statistics Germany P2P Protocols in Germany P2P 74% BitTorrent 66% eDonkey 29% HTTP 11% Tunnel/ Other df Encryption Media Streaming 0% Gnutella 0% DirectConnect NNTP DDL* 8% 4% 1% 0% 5% FTP E-Mail IM VoIP/Skype 1% 0% 0% 1% * DDL: Direct download links of one-click file hoster like RapidShare.com or MegaUpload.com Source: ipoque Internet study 2007 P2P Detection – Signature Based Each P2P protocol has its own mechanism to manage the P2P network and coordinate the traffic distribution P2P filter devices search for protocol specific pattern (signature) in each IP packet to identify P2P traffic Deep Packet Inspection (DPI) - once the signature is identified the detection reliability is high Encrypted P2P traffic is hard to identify with this method BitTorrent Signature Example BitTorrent Signature P2P Detection – Behavior Based P2P software implements mechanism to avoid detection – obfuscation (e.g. encrypted transfer) P2P traffic has specific behavior: Each client opens connections to many other clients file/tracker requests and file search (mostly not encrypted) File Search/Request (not encrypted) .
    [Show full text]
  • Download Soulseek Windows 8
    Download soulseek windows 8 Download. To see what changed in the latest release, check out the Changelog. Important note to Windows 8 and AVG users: AVG is known to cause. I'm itching to release this build as it already fixed a lot of issues for quite a few users, but since it includes changes to very sensitive download. and safe download. Soulseek latest version: Free File Sharing for Entertainment Lovers. The programme makes it very easy to download torrents so that they can be saved and used at a later date. View full description OS. Windows Soulseek is an ad free spyware free just plain free file sharing network for Windows Mac and Linux Our rooms search engine and search correlation system. Download Editors' Rating: Since it is free, P2P fans might take Soulseek for a spin, but they'll probably also want to 8. My rating. 0 stars. Write review. Reviews: Current version, All versions You can open up multiple search windows. Download Soulseek NS 13e for Windows. SoulSeek is a free P2P file sharing application for Windows-based computers that wants to be unique. Soulseek Screenshot. License: Free Freeware; Language: English; Publisher: Soulseek; OS: Windows 10 / 8 / 7 / Vista / XP; Updated: May 6. SoulSeek download. Quando o assunto é SoulSeek. Gratuito; 6,90 MB; Para Windows XP/Vista/7/8/; Atualizado em 24/2/; SoulSeek, LLC. Download SoulseekQT. Soulseek is a unique ad-free, spyware free, and just plain free file sharing application. Windows/macOS/Linux. Download Soulseek: A file sharing application which can find music online with user MB | For Windows 7, Windows 8 (bit, bit) / Vista / XP (Free).
    [Show full text]