Dissertations / Theses on the topic 'Protocollo SPI'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Protocollo SPI.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Pastore, Cesare. "Progetto software/firmware di un’interfaccia per acquisizione dati da un nodo sensore basato su microcontrollore." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/12957/.
Full textCosta, Daniel Gouveia. "Uma arquitetura baseada em SCTP e SIP para suporte a aplica??es VoIP m?veis e a especifica??o formal do seu m?dulo de controle." Universidade Federal do Rio Grande do Norte, 2006. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15461.
Full textNew versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. A communication architecture is proposed herein, integrating SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle voice applications over IP networks with mobility requirements. User localization procedures are specified in the application layer as well, using SIP, as an alternative mean to the mechanisms used by traditional protocols, that support mobility in the network layer. The SDL formal specification language is used to specify the operation of a control module, which coordinates the operation of the system component protocols. This formal specification is intended to prevent ambiguities and inconsistencies in the definition of this module, assisting in the correct implementation of the elements of this architecture
Novas vers?es do protocolo SCTP permitem sua utiliza??o para implementa??o de mecanismos de handover em n?vel de transporte, bem como o fornecimento de um servi?o de transmiss?o de dados parcialmente confi?vel. Integrando o SCTP com o protocolo de inicia??o de sess?es, SIP, al?m de utilizar adicionalmente servi?os de outros protocolos auxiliares, uma arquitetura de comunica??o p?de ser proposta, a fim de atender ?s aplica??es de voz sobre IP com requisitos de mobilidade. S?o especificados ainda os procedimentos de localiza??o de usu?rio em n?vel de aplica??o, utilizando o protocolo SIP, como alternativa aos mecanismos empregados por protocolos tradicionais que suportam mobilidade na camada de rede. A linguagem de especifica??o formal SDL ? utilizada para especificar o funcionamento de um M?dulo de Controle, relacionado ? opera??o coordenada dos protocolos que comp?e a arquitetura. Pretende-se assim evitar ambig?idades e inconsist?ncias na defini??o desse m?dulo, o que pode auxiliar em implementa??es corretas de elementos dessa arquitetura
El, Sawda Samer. "Contribution à l'amélioration de la sécurité pour le protocole SIP (Session Initiation Protocol)." Paris 6, 2011. http://www.theses.fr/2011PA066019.
Full textRaappana, M. (Markku). "Multipurpose synthesizable SystemVerilog Spi-Bus protocol verification system." Master's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201702231190.
Full textJärjestelmäpiirien (SOC) kompleksisuus on jatkuvassa kasvussa johtuen johdinpiirien pienenemisestä, alijärjestelmien määrän kasvusta, vaatimuksista tehonkulutuksessa, suorituskyvyn kasvusta, toiminnallisuuden kasvusta ja käytettävistä protokollista. Näillä attribuuteilla on vaikutusta kokonaissuunnitteluprosessin verifiointiprosessiin. Verifiointiprosessiin on tällä hetkellä saatavilla kaupallisia sovelluksia, joita voidaan hyödyntää kolmannen osapuolen suunnitteleman systeemin testaukseen ja verifioitiin. Samalla on myös olemassa testausalustoja, joista nämä sovellukset puuttuvat. Tämä diplomityö keskittyy tilanteeseen, jossa täytyy rakentaa systeemi joka helpottaa testattavassa laitteessa (DUT) käytettävän tietoväyläprotokollan verifiointi- ja testausprosessia. Serial Peripheral Interface (SPI)-väyläprotokollan tutkimus tuo esiin esimerkkejä, joihin voidaan törmätä, kun kyseistä väyläprotokollaa käytetään missä tahansa sitä hyödyntävässä systeemissä. Diplomityössä tutkitaan erilaisia testaus- ja verifiointimetodeja, jotta voidaan osoittaa mitä erilaisia työkaluja voidaan hyödyntää, kun uusi testattava laite lisätään olemassa olevaan systeemiin tai tutkitaan tämän käyttämää väyläprotokollaa. Kokonaissuunnitteluprosessia on tutkittu esittelemällä tietyn järjestelmän iteraatiovaiheita, joka kehitettiin ratkaisemaan aiemmin tarkasteltuja, tähän aiheeseen liittyviä ongelmia. Suunnitteluprosessin voidaan katsoa alkaneen tilanteesta, jossa mitään konkreettista ei ollut vielä valmiina ja päättyvän tilanteeseen jossa järjestelmän viimeinen iteraatio voitiin alkaa konkretisoimaan. Monikäyttöisen syntetisoituvan verifiointijärjestelmän funktionaalisuus ja rakenne esitellään. Tutkimalla simulointi- ja synteesiraportteja näytetään tämän järjestelmän varmennusprosessi. Diplomityön toteutumista ja tulevaisuuden jatkokehitysideoista keskustellaan. Tämä diplomityö osoittaa, että Nokia soveltajayrityksenä pystyy hyödyntämään tämän tutkielman lopputulemia. Lisäksi työn tulokset voidaan lisätä, modifioinnin jälkeen, yrityksen komponenttikirjastoon toimimaan itsenäisenä instanssina
Lakay, Elthea Trevolee. "SIP-based content development for wireless mobile devices with delay constraints." Thesis, University of the Western Cape, 2006. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_9048_1182233050.
Full textSIP is receiving much attention these days and it seems to be the most promising candidate as a signaling protocol for the current and future IP telephony services. Realizing this, there is the obvious need to provide a certain level of quality comparable to the traditional telephone service signalling system. Thus, we identified the major costs of SIP, which were found to be delay and security. This thesis discusses the costs of SIP, the solutions for the major costs, and the development of a low cost SIP application. The literature review of the components used to develop such a service is discussed, the networks in which the SIP is used are outlined, and some SIP applications and services previously designed are discussed. A simulation environment is then designed and implemented for the instant messaging service for wireless devices. This environment simulates the average delay in LAN and WLAN in different scenarios, to analyze in which scenario the system has the lowest costs and delay constraints.
Sharma, Neena. "SERIAL PROTOCOL BRIDGE." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352403332.
Full textCamilletti, Luca. "Comunicazione sicura mediante il protocollo SIP; uno studio di fattibilità." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3141/.
Full textMosavat, Vahid. "SIP Extensions for the eXtensible Service Protocol." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93107.
Full textEvloguieva, Evelina. "Light-weight SIP protocol for internet telephony services." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30117.
Full textEvloguieva, Evelina. "Light-weight SIP protocol for Internet telephony services." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0020/MQ55052.pdf.
Full textWu, YanHao. "SIP-based location service provision." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&.
Full textAl-Canaan, Amer. "Création de services de télécommunications en utilisant le protocole SIP et l'API JAIN-SIP." [S.l. : s.n.], 2005.
Find full textAl-Canaan, Amer. "Création de services de télécommunications en utilisant le protocole SIP et l'API JAIN-SIP." Mémoire, Université de Sherbrooke, 2005. http://savoirs.usherbrooke.ca/handle/11143/1301.
Full textVincenzi, Selene. "Supporto al multihoming nei protocolli SIP e RTP: uno strumento simulativo." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1626/.
Full textPiagnani, Paolo. "Studio ed analisi della sicurezza del protocollo SIP nelle reti Voice over IP." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/5178/.
Full textDzieweczynski, Marcin. "Implementation of Caller Preferences in Session Initiation Protocol (SIP)." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2238.
Full textSession Initiation Protocol (SIP) arises as a new standard of establishing and releasing connections for vast variety of multimedia applications. The protocol may be used for voice calls, video calls, video conferencing, gaming and many more.
The 3GPP (3rd Generation Partnership Project) suggests SIP as the signalling solution for 3rd generation telephony. Thereby, this purely IP-centric protocol appears as a promising alternative to older signalling systems such as H.323, SS7 or analog signals in PSTN. In contrast to them, SIP does not focus on communication with PSTN network. It is more similar to HTTP than to any of the mentioned protocols.
The main standardisation body behind Session Initiation Protocol is The Internet Engineering Task Force (IETF). The most recent paper published on SIP is RFC 3261 [5]. Moreover, there are working groups within IETF that publish suggestions and extensions to the main standard. One of those extensions is “Caller Preferences for the Session Initiation Protocol (SIP)” [1].
This document describes a set of new rules that allow a caller to express preferences about request handling in servers. They give ability to select which Uniform Resource Identifiers (URI) a request gets routed to, and to specify certain request handling directives in proxies and redirect servers. It does so by defining three new request header fields, Accept-Contact, Reject-Contact, and Request-Disposition, which specify the caller preferences. [1].
The aim of this project is to extend the existing software with caller preferences and evaluate the new functionality.
Saporetti, Lorenzo. "Multiplexing di protocolli SIP e RTP su canali virtuali multipercorso: oscuramento pacchetti." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/2712/.
Full textRajaram, Vijay Sundar. "Session initiation protocol for wireless channels." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4917.
Full textAngeles, Piña Carlos. "Distribution of Context Information using the Session Initiation Protocol (SIP)." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91854.
Full textKontext-medvetna (eng. Context-aware) applikationer är applikationer som utnyttjar information om användarens situation (d.v.s. användarens kontext) och förändrar applikationens beteende i syfte att hjälpa användaren i dennes vardagliga arbetsuppgiften. Idag överförs kontextuell-information (eng. context information) i nätverk som är opålitliga och dynamiskt föränderliga. Därtill tillkommer komplexiteten att kontextuell-information är ibland producerad i olika noder anslutna till olika nätverk.Utvecklingen av kontext-medvetna applikationer har hittills begränsats av ovannämnda svårigheter. Denna avhandling presenterar en metod för att distribuera kontextuell-information genom användning av mekanismer för händelsemeddelande (eng. event notification mechanisms) inbyggda i Session Initiation Protocol (SIP). Målet är att undersöka hur metoden kan användas för att möjliggöra tillgång till kontextuell-information oavsett vart den är producerad. Komponenten för distribution av kontextuell data, som presenteras i denna uppsats, använder SIP för direktmeddelanden (eng. Instant Messaging) och tekniken “Presence Leveraging Extensions (SIMPLE)” för datadelning av kontextuell data (eng. Context sharing). För detta ändamål används SIP närvaroserver (eng. SIP presence server), mer specifikt modulen för närvaroinformation tillhörande SIP Expressroutrar (SER). Komponenten för distribution av kontextuell information möjliggör både synkront och asynkront distribution. Valet mellan de två beror delvist på applikationens kravspecifikation för distribution av kontextuell information, delvist på typen av den kontextuella informationen. Baserat på systemet skalbarhet (eng. Scalability), användarens rörlighet och latens (eng. latency) kan man ge rekommendationer vilken av de två distributionssätten, synkront eller asynkront, som är lämpligast för distributionen av kontextuell information. Systemet utvärderades med hjälp av ett program som genererar belastning (eng. load generator). Resultaten visar att systemet är mycket skalbart. Responstiden för synkront åtkomst av kontextuell information är nästan konstant, medan responstiden för asynkront åtkomst ökar med informationsmängden i databasen, i respekt till den föregående prenumerationen av kontextändringar. Händelsemeddelande skickas regelbundet ( 2800 meddelande per sekund). Vi har dock medvetet valt att skapa en slumpmässigt dröjsmål (0 till 1 sekund) mellan varje uppdatering av kontextuell information (t.ex. en kvitto på en Publish-meddelande) och den tidpunkten då händelsemeddelande skickas till de användare som prenumererar på ändringarna. För utvecklingen av varje kontext-medveten applikation, som distribuerar kontextuell information måste man ta hänsyn till responstid vid beslut huruvida man ska välja synkront eller asynkront sätt för distribution. Denna uppsats ger empirisk data som hjälper applikationsutvecklare i detta val.
Romero, Eduardo Luis. "Mise en oeuvre des protocoles SIP et RTP sur système embarqué." Mémoire, Université de Sherbrooke, 2009. http://savoirs.usherbrooke.ca/handle/11143/1504.
Full textEl, Saghir Bassam. "A new approach for context-aware management of SIP communications." Evry, Institut national des télécommunications, 2009. http://www.theses.fr/2009TELE0009.
Full textIn recent years, the world telecommunications sector has undergone unprecedented changes driven mainly by the deployment of new communication technologies and services. Telecom operators are suffering from a steady decline in their revenues per user due to fierce competition and market saturation for traditional services. In order to attract new customers and retain existing ones, communication services proposed by these operators need to be aware of the user’s context, which includes information related to the user himself as well as his environment (e. G. His location, current activities and available devices). Unfortunately, interworking proposed context-aware solutions with current and next-generation networks still represents a big challenge for communication service providers as well as operators. This thesis addresses issues related to the development of context-aware communication systems by proposing a network-based agent called INCA (Intelligent Network-based Communication Assistant). INCA provides advanced management of SIP communications based on context information that is retrieved through a dedicated framework for context publication and notification. Its multilayered architecture is based on a generic layer model and implements a plan-centric approach for SIP session management. It also relies on a new context-aware communication model for providing communication adaptation based on user preferences
Trioschi, Luca. "Multiplexing di protocolli SIP e RTP su canali virtuali multipercorso: integrità e sicurezza." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/2706/.
Full textChtatou, Abdessamad. "Extension du protocole SIP pour le contrôle de la domotique distante." Mémoire, Université de Sherbrooke, 2005. http://hdl.handle.net/11143/8611.
Full textDeng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.
Full textRufino, Leonardo Maccari. "Integração do protocolo SIP à norma IEEE 1451 para redes de sensores sem fio." Florianópolis, SC, 2012. http://repositorio.ufsc.br/xmlui/handle/123456789/96189.
Full textMade available in DSpace on 2012-10-26T09:38:57Z (GMT). No. of bitstreams: 1 302647.pdf: 3317702 bytes, checksum: 0b78bafe8cfda4c10b5581993bff11db (MD5)
Redes de sensores sem fio (RSSF) são compostas por dispositivos chamados nós sensores, os quais são capazes de monitorar alguns fenômenos do meio ambiente que os rodeia, tais como informações escalares (temperatura, aceleração) ou multimídia (áudio, vídeo), transformando-os em sinais digitais e comunicando-se com outros nós da rede. A fim de padronizar o acesso e o comportamento das diversas plataformas existentes, a família de padrões IEEE 1451 foi desenvolvida. Esta padronização introduz conceitos interessantes, como a divisão do sistema em duas partes principais, NCAP (Network Capable Application Processor) e TIM (Transducer Interface Module), e a definição dos TEDS (Transducer Electronic Data Sheet). Porém, o padrão não trata eficientemente os requisitos das RSSF atuais, tal como a necessidade dos sensores executarem de forma eficiente e energeticamente consciente, permitindo economizar sua energia, fator crítico em grande parte destes dispositivos. Assim, este trabalho apresenta um novo modo de execução chamado TIM-IM (TIM Initiated Message), o qual permite que TIMs reportem seus dados sempre que houver novas leituras sensoriadas, ao invés de aguardar por polling originado pelo NCAP, evitando permanecer com o módulo de comunicação ligado grande parte do tempo. Adicionalmente, o padrão IEEE 1451 limita-se às redes de sensores que captam informações escalares. Assim, a presente dissertação visa, também, a integração de sensores multimídia à norma, apresentando algumas modificações tanto nos TEDS quanto nas mensagens trafegadas entre NCAP e TIM. A fim de permitir o acesso aos sensores através da rede do usuário, foi utilizado o protocolo SIP (Session Initiation Protocol). SIP vem sendo bastante utilizado atualmente junto à tecnologia VoIP (Voice over Internet Protocol), sendo responsável por estabelecer, modificar e finalizar uma sessão. Devido ao seu tamanho, torna-se inviável seu uso em muitos sistemas embarcados com restrição de recursos. Logo, este trabalho apresenta uma miniaturização do mesmo, alcançada através da eliminação de algumas requisições e campos de cabeçalho (do inglês header fields). Por fim, é apresentada a integração do protocolo SIP ao IEEE 1451. Para isto, foi utilizado o estabelecimento de sessões, assim como o esquema de notificação de presença presente no SIP e a extensão relativa à transferência de mensagens instantâneas. Assim, com a união de ambas as normas, permite-se que sensores sejam acessados por usuários remotos utilizando SIP phones, através da Internet, independentemente de sua localização física.
Wireless sensor networks (WSN) are formed by devices called sensor nodes capable of monitoring some phenomena around them, such as scalar information (temperature, acceleration) or multimedia (audio, video), transforming them into digital signals and communicating with other nodes. In order to standardize the access and behavior of the various platforms available, the IEEE 1451 standards family was developed. This standardization introduces interesting concepts, such as splitting the system into two major parts, NCAP (Network Capable Application Processor) and TIM (Transducer Interface Module), and the definition of TEDS (Transducer Electronic Data Sheet). However, the standard does not address efficiently the requirements of current WSN, such as the need for sensors perform efficiently and energyconscious, saving its energy, which is critical for most of these devices. This work presents a new execution mode called TIM-IM (TIM Initiated Message), which allows TIMs to report its data whenever there are new sensed readings, rather than wait for polling originated by NCAP, avoiding remain with the communication module connected all the time. Additionally, IEEE 1451 is limited to sensor networks that collect scalar information. Thus, this thesis also aims at the integration of multimedia sensors to the standard, presenting some modifications in TEDS and in the messages sent between NCAP and TIM. In order to allow the access to sensors via user#s network, it was used the SIP (Session Initiation Protocol) protocol. SIP has been widely used today by the VoIP (Voice over Internet Protocol) technology and it is responsible to establish, modify and terminate a session. Due to its size, its use is not feasible in many resource-constrained embedded systems. Thus, this work presented a miniaturization of the protocol, achieved through the elimination of some requests and header fields. Finally, it was presented the integration of SIP to IEEE 1451. For this, it was used the session establishment, as well as the presence notification scheme of the SIP protocol and the extension for the transfer of instant messages. Thus, with the union of both standards, sensors can be accessed by remote users using SIP phones through the Internet, regardless of their physical location.
Moreno, Carlos. "Design of a network architecture for multimedia services with SIP multicast." Evry, Institut national des télécommunications, 2009. http://www.theses.fr/2009TELE0006.
Full textThe proposed architecture permits a conference server to interact with multicast domains of Overlay and IP Multicast. It is the result of the improvement of conventional audio conferences with 3 complementary modules: a SIP extender, a multicast agent inside the conference server called MGA (Multicast Gateway Agent) and a multicast manager (Virtualization of connections). SIP extender lets unicast traffic go through a SIP UA (user agent) and the conference server bidirectionally. If the multicast manager gives any instruction, SIP messages are converted into multicast SIP extended ones and vice versa. Voice traffic is also routed towards the conference server, or towards MGA for the correct dispatching. MGA is in charge of routing multicast traffic, after interpreting SIP multicast extended messages sent from the SIP extender and sending back responses according to a multicast applicative table. It can also forward voice traffic to IP multicast groups by using a set of reflectors. The conference server could also include this function itself. The multicast manager sends instructions to the SIP extender just to let it know exactly which user agents should be included into SIP multicast groups according to operator orders. The results regarding QoS show that joining and leaving time in SIP multicast for group members are shorter in comparison with the IP multicast approach and reliability also increases, mainly in high congestion scenarios
Benisse, Mohamed Taib. "Transmission média sur les réseaux IP en utilisant les protocoles SIP et IAX." Mémoire, École de technologie supérieure, 2009. http://espace.etsmtl.ca/27/1/BENISSE_Mohamed_Ta%C3%AFb.pdf.
Full textKullenwall, Jonas. "Study of security aspects for Session Initiation Protocol." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1164.
Full textThe objective with this thesis is to describe security mechanisms that are inte-grated or are proposed to be integrated with the Session Initiation Protocol (SIP). SIP is used for establishing, modifying, and terminating multimedia ses-sions over the IP network. This thesis is divided into two main parts, where the first part describes the implemented security mechanisms in SIP and the second part describes a number of proposed security mechanisms that may be implemented in SIP. At the end of the report there is a section that presents the scripts and results from different security tests that were performed on two implementations of SIP. Apart from describing different security mechanisms in the first part of this thesis, this section also contains an analysis on how possible security threats against SIP may be used to launch different attacks. The analysis also describes how these attacks may be prevented, if possible, by using the secu-rity mechanisms provided by SIP. The second part also contains an analysis section, which is focusing on finding the advantages and disadvantages of using a specific security mechanism compared to a similar security mechanism that is currently used or has been used in SIP. In the last section of this thesis I present my conclusions and a summary of the results.
Muswera, Walter Tawanda. "Developing a cross platform IMS client using the JAIN SIP applet phone." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017934.
Full textMilanez, Mateus Godoi. "Avaliação dos protocolos VoIP SIP e IAX utilizando simulação e parâmetros de qualidade de voz." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-17062009-155138/.
Full textTelecommunications technologies are recently converging to the Next Generation Network conception, where it is proposed that all exchanged information should be classied by security and priority. As the currently available networks do not provide such practices, VoIP protocols, among other solutions, aim for the improvement of the calls quality. As the IAX VoIP protocol had been receiving credibility in the open source community in the last years, it is relevant to compare it to the SIP protocol, which is widely investigated in the literature. In this way, the objective of this work is the study and evaluation of the SIP and IAX protocols through verications of audio quality in VoIP calls. To implement the experiments, a structure that represents VoIP calls was developed in the \"Network Simulator\" software. For these calls, the PESQ method was used to evaluate the calls quality. Using this approach, it was possible to verify similarities between the SIP and IAX protocols regarding the problems of packet loss, delay, limitation in the data rate and jitter
SCHEINER, LEONARDO NAHMIAS. "PERFOMANCE ANALISYS OF SIP PROTOCOL ON THE SIGNALING OF VOICE OVER IP CALLS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7065@1.
Full textImpulsionada pelo grande crescimento da Internet, a telefonia IP conquistou a atenção do mercado e dos grandes fabricantes com promessas de redução de custo na operacão, gerência, provisionamento, manutenção e tarifação. Diversos protocolos foram desenvolvidos de modo a prover VoIP como o H.323, MGCP, Megaco e SIP. O SIP tem se destacado por ser um protocolo baseado em texto, estensível, independente do protocolo de transporte, e portanto mais flexível e simples que seu concorrente direto, o H.323. O SIP (Session Initiation Protocol) é um protocolo de sinalização utilizado para iniciar, modificar e terminar sessões, podendo ser usado para chamadas de voz sobre IP (VoIP) ou para troca de mensagens instantâneas, entre outras aplicações. Ele foi desenvolvido originalmente em 1996 e foi padronizado pela IETF em 1999. Neste trabalho, o desempenho do protocolo SIP para estabelecimento de chamadas VoIP será avaliado, já que há uma grande quantidade de trabalhos focando a qualidade da voz e poucos têm avaliado a sinalização [3]. Serão montados ambientes experimentais a fim de variar parâmetros como retardo, perda de pacotes, jitter, largura de banda e protocolo de transporte, permitindo verificar como esses parâmetros afetam isoladamente os tempos de post-dial delay, post-pickup delay e call release delay.
Pushed by the growth of the Internet, the IP Telephony conquered a great attention of the market and big suppliers, with promises of cost reductions on operation, management, provisioning, maintenance and billing. Different protocols were developed for providing VoIP such as H.323, MGCP, Megaco and SIP. SIP has been highlighted for being a text based protocol, extensible, independent of the transport protocol, therefore more flexible and simpler than your competitor, the H.323. SIP (Session Initiation Protocol) is a signaling protocol used for establish, modify and terminate sessions. It can be used for voice calls over IP (VoIP) or to exchange instant messaging, among other applications. It has been developed originally in 1996 and has been standardized by IETF in 1999. In this work, the performance of SIP protocol for establishing VoIP calls will be estimated, since there are a lot of papers focalizing in the voice quality and few treated the signaling [3]. Experimental environments will be used for varying parameters like delay, packet loss, jitter, bandwidth and transport protocol, allowing to verify how there parameters affect separately the post-dial delay, post-pickup delay and call release delay.
Richert, Adam. "Developing a Portable System for Medicine Dosage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235738.
Full textProjektet som presenteras i denna rapport är tänkt att utveckla ett portabelt elektroniskt system för användning som en medicinsk pillerbehållare. Med funktionaliteten att konfigurera upp till tolv dagligen upprepande alarm är syftet med medicindoseringssystemet först och främst att påminna användaren när de ska ta sin medicin. Lysdioder och användarens egna inspelade röst som notifikationer ska implementeras för att vidare hjälpa användaren att ta rätt medicin vid varje tillfälle. Enheten ska också ha en minneslogg som sparar upp till etthundra missade doseringar, vilket gör det möjligt för auktoriserad sjukvårdspersonal att verifiera användarens följsamhet till medicineringen.En översiktlig beskrivning av funktionaliteten samt det fysiska utseendet av enheten skrevs av projektägaren Victrix AB innan projektet startades. Det som detta projekt täcker är hårdvaruoch mjukvaruutvecklingen, så väl som där tillhörande designval. Projektet siktar på att följa den föreslagna funktionalitetsspecifikationen så nära som möjligt, och samtidigt göra välgrundade val för hårdoch mjukvara med enkelhet, effektivitet, energiförbrukning och tillgänglighet i åtanke. Genom att följa specifikationen är det slutliga målet att frambringa ökad medicinföljsamhet för användare av den med det här projektet utvecklade enheten.Utvecklingen av medicindoseringssystemet föregicks av en befogad bakgrundsstudie utformad genom användningen av kvalitativa forskningsmetoder. Hårdvara att användas för en första prototyp av enheten valdes sedan baserat på den insamlade informationen om existerande teknologier och relaterat arbete. Genom grundliga tester och regelbundet informationsutbyte med kunden konstruerades en prototyp av medicindoseringssystemet baserat på en Arduinomikrokontroller. Prototypen utvärderades att uppfylla 92% av kraven som Victrix ansåg vara av hög prioritet.
Elleuch, Wajdi. "Mobilité des sessions dans les communications multimédias en mode-conférence basées sur le protocole SIP." Thèse, Université de Sherbrooke, 2011. http://hdl.handle.net/11143/5799.
Full textRondini, Rogério Augusto. "Uma arquitetura baseada em espaço de tuplas para redes IMS." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-22052014-235246/.
Full textThe IP Multimedia Subsystem architecture, proposed by the 3rd Generation Partnership Project consortium as basis to support the convergence between mobile networks and the Internet, defines a set of architectural elements, among them, the Call Session Control Function and the Session Initiation Protocol. The Session Initiation Protocol is an application layer protocol used to establish, modify and terminate sessions between devices. On the IP multimedia subsystem based network, the Session Initiation Protocol play a key role on the communication between devices and the network, and between session management components. In the last years, studies have detected a performance bottleneck on IP multimedia subsystem networks due to centralized characteristic of the Session Initiation Protocol and in Session Control components. This work shows a distributed architecture for IP Multimedia Subsystem networks based on the tuple space paradigm, and the servers structured in a P2P network, aiming to achieve a scalable and fault-tolerant infrastructure. The validation of the architecture on the performance and scalability took place through the Coloured Petri Net formal modeling and simulation.
Jacobs, Ashley. "Investigating call control using MGCP in conjuction with SIP and H.323." Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1006516.
Full textDoring, Mathieu. "Développement d'une méthode SPH pour les applications à surface libre en hydrodynamique." Nantes, 2005. http://www.theses.fr/2005NANT2116.
Full textRecent development in numerical methods together with the increase of computational power available have allowed simulations of more and more complex flows. However interfacial flows remains a difficult task, especially when breaking, interface reconnection or impacts occurs. Theses difficulties arise mainly from the deformations of the computational domain during the simulation which are badly handled by mesh based Eulerian numerical methods. Smoothed Particle Hydrodynamics, being meshless and Lagrangian allows a simplified management of the interface. In this PhD a SPH based numerical methods has been developed in order to simulate complex free surface flows with impacts and huge breaking. A particular care was taken concerning increasment of the precision; thus different discretization schemes have been tested (Moving Least Square, Renormalisation) as well as boundary conditions (frozen particles, ghost particles) were implemented and tested. Comparison of obtained results with both experimental results and numerical simulations from different numerical methods (Volume of Fluid_Finite volume solvers, spectral potential solver) in development in the Fluid Mechanics Laboratory in a variety of test cases as dam breaking, sloshing in a tank, virtual bassin, impact of solid through free surface shows good agreement, confirming the potential of the SPH method in naval hydrodynamics. The development of an original and new method allowing the obtention of loads on solid boundary made us able to compute loads exerted on an obstacle in a dam breaking test case and to simulate impacts of a wedge in free motion with favourable comparison against experimental dynamic conditions in both configurations. Moreover, a work on parallelization of the code has been carried out, firstly in a data decomposition approach (OpenMP) which we gave up due to its poor efficiency. Then a domain decomposition method was implemented using MPI library and showed good results concerning speed-up in various configurations (PC cluster, SuperComputer) thanks to the overlapping of communication time by standard SPH serial operations. Finally the use of a Verlet like algorithm for neighbor search allowed the optimisation of computationnal efficiency. Thanks to code organisation, three dimensionnal simulations are possible with minimum adaptation
Seifert, David. "Brána pro překlad signalizačních zpráv pro videokonference." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220209.
Full textHsieh, Ming Chih. "Service provisioning in two open-source SIP implementation, cinema and vocal." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1008195.
Full textKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Yeftsifeyeu, Aliaksandr. "Hlasová služba v integrovaných sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220652.
Full textCrespi, Noël. "Evolutions des architectures de services pour maîtriser l'hétérogénéité de l'IMS." Paris 6, 2006. http://www.theses.fr/2006PA066513.
Full textŠvec, Michal. "Dohledový systém pro Internet Protocol Multimedia Subsystem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220193.
Full textHayrapetyan, Anush. "Formalized, validated and executable CPN models of SIP-based presence and dynamic discovery protocols for mobile applications." Click here for download, 2007. http://proquest.umi.com/pqdweb?did=1288671611&sid=2&Fmt=2&clientId=3260&RQT=309&VName=PQD.
Full textChe, Xiaoping. "Cross-fertilizing formal approaches for protocol conformance and performance testing." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0012/document.
Full textWhile today’s communications are essential and a huge set of services is available online, computer networks continue to grow and novel communication protocols are continuously being defined and developed. De facto, protocol standards are required to allow different systems to interwork. Though these standards can be formally verified, the developers may produce some errors leading to faulty implementations. That is the reason why their implementations must be strictly tested. However, most current testing approaches require a stimulation of the implementation under tests (IUT). If the system cannot be accessed or interrupted, the IUT will not be able to be tested. Besides, most of the existing works are based on formal models and quite few works study formalizing performance requirements. To solve these issues, we proposed a novel logic-based testing approach to test the protocol conformance and performance passively. In our approach, conformance and performance requirements can be accurately formalized using the Horn-Logic based syntax and semantics. These formalized requirements are also tested through millions of messages collected from real communicating environments. The satisfying results returned from the experiments proved the functionality and efficiency of our approach. Also for satisfying the increasing needs in real-time distributed testing, we also proposed a distributed testing framework and an online testing framework, and performed the frameworks in a real small scale environment. The preliminary results are obtained with success. And also, applying our approach under billions of messages and optimizing the algorithm will be our future works
Mehta, Anil. "MAC AND APPLICATION LAYER PROTOCOLS FOR HIGH PERFORMANCE NETWORKING." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/396.
Full textDeusajute, Alexandre Machado. "Proposta de um mecanismo de segurança alternativo para o SIP utilizando o protocolo Massey-Omura aperfeiçoado com o uso de emparelhamentos bilineares." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-20122010-155116/.
Full textVoice over IP (or VoIP) has been progressively adopted not only by a great number of companies but also by an expressive number of people, in Brazil and in other countries. However, this increasing adoption of VoIP in the world brings some concerns such as security risks and threats, mainly on the authenticity, privacy and integrity of the communication. In order to protect the media session, efficient protocols like the Secure Real-time Transport Protocol (SRTP) have been used. However, it depends on a secret key to make the communication secure. Thus, a good strategy is to take advantage of the signaling process to establish the media session, and agree on a common secret session key between the communicating parties. This signaling process is performed by specific types of protocols such as the Session Initiation Protocol (SIP), a very important signaling protocol, which has been used more and more by softphones in the Internet communication. Nevertheless, those risks and threats already exist in the own signaling process and, among them, the man-in-the-middle attack is the worst of all due to its high danger degree. After doing a bibliographical revision of the SIP security risks and threats, as well as its security mechanisms (analyzing their advantages and drawbacks), it was possible to generate a new security mechanism, which is presented in this work. The proposed mechanism uses a protocol for secure information exchange the Massey-Omura protocol which, when combined with bilinear pairings, provides a better security level for SIP in all its aspects (authenticity, privacy and integrity). Besides this, the new mechanism is evaluated by a proof of concept, in the which a functional SIP softphone was used. The security analysis and the results obtained from the proof of concept, make the proposed security mechanism a viable alternative for SIP.
Hussain, Intesab. "Solving flooding and SPIT based denial of service problems in voice over IP communications." Thesis, Paris 5, 2013. http://www.theses.fr/2013PA05S007.
Full textSession Initiation Protocol (SIP) is the widely used signaling protocol for voiceand video communication as well as other multimedia applications. Despiteof its flexibility and a common standard that can be leveraged to efficientlycombine a wide array of communication systems and technologies, it is exposedto a number of problems, including the vulnerability to several types of attacksdue to its open nature, in particular, and lack of a clear defense line. Likewise,flooding attack is one of the most destructive attacks targeting both User AgentServer (UAS) and User Agent Client (UAC), leading to a Denial of Service (DoS)in VoIP applications. In particular, INVITE message is considered as one of themajor root causes of flooding attacks in SIP. This is due to the fact that an attackermay send numerous INVITE requests without waiting for responses from theUAS or proxy in order to exhaust their resources. Moreover, SPIT problem inSIP is also a challenging issue which needs proper attention and appropriatesolutions.Most of the solutions proposed to overcome the flooding attacks are eitherdifficult to deploy in practice or require significant changes in the SIP servers.Additionally, the diverse nature of flooding attacks offers a huge challenge toenvisage appropriate prevention mechanisms. In this survey, we present acomprehensive study on flooding attacks against SIP by addressing its differentvariants and analyzing its consequences. We also classify the existing solutionscorresponding to different flooding behaviors, types and targets, and then weperform an extensive investigation of their main weaknesses and strengths.Additionally, we also take into account the underlying assumptions of eachsolution for a better understanding of its limitations. Specifically, we havethoroughly analyzed SPIT problems and few of the existing solutions proposedfor their prevention.The theoretical framework derived from our extensive literature survey led us topropose a solution for handling specific number of SIP requests in a particulartime window. Our proposed "Light Weight Scheme" is implemented in a SERSIP server. The evaluation results presented in this thesis depict the satisfactoryperformance of this approach. In order to cope with SIP flooding attacks, wepropose another solution based on "Strategy Based Proxy". This solution isdesigned for a SIP proxy that calculates the probability of a call being maliciouson the basis of its current experience. The obtained experience is also utilized tocalculate the probabilities of a successful call setup. This approach is useful forboth state-ful and state-less proxy servers.For dealing with SPIT, we have designed a 2-step solution. In first step, weextract the useful information from the VoIP traffic. In second step, we apply aNaive Bayes classifier on the date extracted from first step to determine whetherthe nature of an incoming SIP call is malicious or it is a harmless routine call.With this mechanism, we can detect the SPIT calls from a group of incomingSIP calls. Finally, we presents a detailed discussion and conclusions derivedfrom our case study carried out in this thesis along with future directions andpotential research areas related to VoIP security threats
Silva, Davison Gonzaga da. "Implementação de um sistema SIP para o sistema operacional Linux." [s.n.], 2003. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259317.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-03T18:53:15Z (GMT). No. of bitstreams: 1 Silva_DavisonGonzagada_M.pdf: 885396 bytes, checksum: 09530eec1ff6b03c4cb01ae4e9f06123 (MD5) Previous issue date: 2003
Mestrado
Tanriverdi, Eda. "Simulation Based Investigation Of An Improvement For Faster Sip Re-registration." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605210/index.pdf.
Full textregistration &ndash
activation&rdquo
, is investigated with a simulation prepared using OPNET. The literature about wireless mobile networks and SIP mobility is reviewed. Conditions for an effective mobile SIP network simulation are designed using message sequence charts. The testbed in [1] formed by Dutta et. al. that has been used to observe SIP handover performance is simulated and validated. The mobile nodes, SIP Proxy v servers, DHCP servers and network topology are simulated on &ldquo
OPNET Modeler Radio&rdquo
. Once the simulation is proven to be valid, the &ldquo
registration &ndash
activation&rdquo
is implemented. Different simulation scenarios are set up and run, with different mobile node speeds and different numbers of mobile nodes. The results show that the re-registration delay is improved by applying the &ldquo
registration &ndash
activation&rdquo
but the percentage of improvement depends on the improvement in the database access delay in the SIP Proxy server.
Bédard, Normand. "Sécurité d'une application de communication multimédia sous protocole IP dans un contexte médical." Mémoire, Université de Sherbrooke, 2010. http://savoirs.usherbrooke.ca/handle/11143/1530.
Full textGianoto, Antonio Carlos. "O processo de migração de sistemas corporativos de comunicação TDM para plataformas convergentes IP com preservação de ativos." Universidade Presbiteriana Mackenzie, 2006. http://tede.mackenzie.br/jspui/handle/tede/2749.
Full textFundo Mackenzie de Pesquisa
The aim of this elaboration is to present a study of the migration process involved transforming the digital PBX (Private Branch Exchange), TDM (Time Division Multiplex), SPC (Stored Program Control) based platforms of corporate communications on technology to converged IP (Internet Protocol) systems supported by the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol. This proposal analyzes the necessary interventions in order to preserve the investments made in these platforms, integrating them to existent data networks. Beside other benefits presented in this work, one key advantage is the possibility to transport voice over an existing data infrastructure, optimizing usage of carrier connections.
O objetivo desta dissertação é o de apresentar um estudo do processo de migração de plataformas de voz PABX (Private Automatic Branch Exchange) TDM (Time Division Multiplex) de comunicações corporativas baseadas na tecnologia CPA-T (Controle por Programa Armazenado estágio de comutação temporal digital), para sistemas convergentes suportados pelo protocolo TCP/IP (Transmission Control Protocol/Internet Protocol). São analisadas as intervenções necessárias para esta migração, preservando ao máximo os investimentos efetuados nestas plataformas, integrando-as as redes de dados existentes. Dentre outras vantagens apresentadas no texto, destaca-se a otimização dos acessos fornecidos pelas operadoras de telecomunicações pelo compartilhamento da infra-estrutura da rede de dados para o tráfego de sinais de voz.