A protocol for reliable decentralized conferencing
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
The Information Discovery Graph: Towards a Scalable Multimedia Resource Directory
WIAPP '99 Proceedings of the 1999 IEEE Workshop on Internet Applications
Plug-and-play PKI: a PKI your mother can use
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
HOTSEC'06 Proceedings of the 1st USENIX Workshop on Hot Topics in Security
Perspectives: improving SSH-style host authentication with multi-path probing
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Proceedings of the 5th international conference on Emerging networking experiments and technologies
VoCCN: voice-over content-centric networks
Proceedings of the 2009 workshop on Re-architecting the internet
A new approach to securing audio conference tools
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
On adapting HTTP protocol to content centric networking
Proceedings of the 7th International Conference on Future Internet Technologies
Coexist: integrating content oriented publish/subscribe systems with ip
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems
Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On name-based group communication: Challenges, concepts, and transparent deployment
Computer Communications
Hi-index | 0.00 |
In this paper we present the design of an audio conference tool, which is one of our efforts to explore application de- signs on top of Named Data Networking. Instead of rely- ing on centralized services as current implementations do, ACT takes a named data approach to discover ongoing conferences as well as speakers in each conference, and to fetch voice data from individual speakers. The resulting design is completely distributed and robust against component failures. We discuss design alternatives and tradeoffs, scalability and security considerations, as well as remaining issues for future work.