An Extended iSCSI Protocol Recognizing Multicast Session: iTRM

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transport Session Management for Multicast Transport Protocol

 This paper describes the transport session management (TSM) architecture and mechanisms for one-tomany multicast sessions. TSM is one of the crucial components for the multicast transport protocols, along with the reliability management. The main purpose of TSM is to maintain an active Transport Session stable and desirable. TSM is also extended to support the effective billing/charging and t...

متن کامل

An extended Java Call Control for Session Initiation Protocol

In this paper we propose a functional mapping between Java Call Control (JCC) and Session Initiation Protocol (SIP). We show its effectiveness in enabling easy service design and implementation through experimental results. For this purpose, we have implemented a JCC-SIP Resource Adaptor for a Jain Service Logic Execution Environment (JSLEE). In particular, we have used the Mobicents JSLEE, whi...

متن کامل

Design of the iSCSI Protocol

The iSCSI protocol enables accessing SCSI I/O devices over an IP network. TCP is used as a transport for SCSI I/O commands. We describe the design considerations and decisions in defining the iSCSI protocol: why we use TCP, how multiple TCP connections can be used to increase performance and reliability, why we require allegiance of a command to a particular TCP connection, the importance of Di...

متن کامل

A Performance Analysis of the iSCSI Protocol

Fibre channel has long dominated the realm of storage area networks (SAN’s). However, with increased development and refining, iSCSI is fast becoming an equal contender, which is causing many companies to reconsider how future storage networks shall be implemented. In addition to reduced costs and a unified network infrastructure, iSCSI allows for the deployment of storage networks over a commo...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology Journal

سال: 2009

ISSN: 1812-5638

DOI: 10.3923/itj.2009.1228.1234