An Extended iSCSI Protocol Recognizing Multicast Session: iTRM
نویسندگان
چکیده
منابع مشابه
Transport Session Management for Multicast Transport Protocol
This paper describes the transport session management (TSM) architecture and mechanisms for one-tomany multicast sessions. TSM is one of the crucial components for the multicast transport protocols, along with the reliability management. The main purpose of TSM is to maintain an active Transport Session stable and desirable. TSM is also extended to support the effective billing/charging and t...
متن کاملAn extended Java Call Control for Session Initiation Protocol
In this paper we propose a functional mapping between Java Call Control (JCC) and Session Initiation Protocol (SIP). We show its effectiveness in enabling easy service design and implementation through experimental results. For this purpose, we have implemented a JCC-SIP Resource Adaptor for a Jain Service Logic Execution Environment (JSLEE). In particular, we have used the Mobicents JSLEE, whi...
متن کاملDesign of the iSCSI Protocol
The iSCSI protocol enables accessing SCSI I/O devices over an IP network. TCP is used as a transport for SCSI I/O commands. We describe the design considerations and decisions in defining the iSCSI protocol: why we use TCP, how multiple TCP connections can be used to increase performance and reliability, why we require allegiance of a command to a particular TCP connection, the importance of Di...
متن کاملA Performance Analysis of the iSCSI Protocol
Fibre channel has long dominated the realm of storage area networks (SAN’s). However, with increased development and refining, iSCSI is fast becoming an equal contender, which is causing many companies to reconsider how future storage networks shall be implemented. In addition to reduced costs and a unified network infrastructure, iSCSI allows for the deployment of storage networks over a commo...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2009
ISSN: 1812-5638
DOI: 10.3923/itj.2009.1228.1234