2013
DOI: 10.1016/j.jnca.2013.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Can: A context-aware NAT traversal scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…According to evaluations, peer-to-peer communication between clients on different private networks can be efficiently initiated within the ICE platform in 4-5 seconds [19]. However, it is observable that delay in a real application environment is much higher.…”
Section: Connectivity Delaymentioning
confidence: 99%
See 2 more Smart Citations
“…According to evaluations, peer-to-peer communication between clients on different private networks can be efficiently initiated within the ICE platform in 4-5 seconds [19]. However, it is observable that delay in a real application environment is much higher.…”
Section: Connectivity Delaymentioning
confidence: 99%
“…The basic approach in this protocol is to use STUN and TURN protocols together and, thus, to provide peer-to-peer communication infrastructure in all NAT types. Tseng and others proposed a Context-Aware NAT (CAN) protocol to eliminate the connection set-up delay caused by STUN and TURN protocols, which are the basis of the ICE protocol [19]. In this study, agents working on peers gather network information of nodes and report them to the Session Initiation Protocol (SIP) server.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Context-aware recommender systems have been recently explored in some fields, such as music (Reddy & Mascia, 2006;Hariri et al, 2012), tourism (Cena et al, 2006;Baltrunas et al, 2011;Levi et al, 2012;Yang et al, 2013;Tseng et al, 2013), mobile guides (Carmagnola et al, 2008), movies (Said et al, 2011), micro-blogging services and location-based social networks (Ma et al, 2011;Yuan et al, 2015), and advertising (Dao et al, 2012). In the study of context-aware recommender systems, obtaining context information and paradigms for incorporating context into recommender systems are the two key points (Adomavicius & Tuzhilin, 2011).…”
Section: Literature Reviewmentioning
confidence: 99%
“…NAT traversal techniques (HUITEMA, 2006;HO et al, 2011;TSENG et al, 2013) were first developed due to the fact that several protocols, such as SIP (Session Initiation Protocol), are simply not able to traverse NAT devices. Those techniques are also required by multiple P2P applications as well as VoIP and videoconferencing which involve the communication of processes running on hosts at different administrative domains that are nearly always protected by NAT/firewall.…”
Section: Introductionmentioning
confidence: 99%