Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185998
Y. Shavitt
The Internet is a vital tool in all aspects of today’s life. Its operation, however, is far from being optimal, and only in some cases satisfactory. In order to understand its operation and suggest ways to improve it, one needs to know the fundamental characteristics of the interactions in the network at all levels: packets, flows, devices, and entire networks. However, the Internet was not built with measurement as a fundamental feature, thus tools and techniques had to be built to enable measuring and analyzing various aspects of its operations. This tutorial will give the participants a review of Internet measurement techniques at various levels. After a short review of basic Internet features, we will discuss the reasons for measuring the Internet, what can be measured, how, where, and when it can be done, with examples from previous projects. The tutorial will also touch on modeling issues. A large part of the tutorial will focus on topology measurements, and will discuss the main challenges in this area.
{"title":"Internet topology measurement","authors":"Y. Shavitt","doi":"10.1109/CONTEL.2005.185998","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185998","url":null,"abstract":"The Internet is a vital tool in all aspects of today’s life. Its operation, however, is far from being optimal, and only in some cases satisfactory. In order to understand its operation and suggest ways to improve it, one needs to know the fundamental characteristics of the interactions in the network at all levels: packets, flows, devices, and entire networks. However, the Internet was not built with measurement as a fundamental feature, thus tools and techniques had to be built to enable measuring and analyzing various aspects of its operations. This tutorial will give the participants a review of Internet measurement techniques at various levels. After a short review of basic Internet features, we will discuss the reasons for measuring the Internet, what can be measured, how, where, and when it can be done, with examples from previous projects. The tutorial will also touch on modeling issues. A large part of the tutorial will focus on topology measurements, and will discuss the main challenges in this area.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125876849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185863
P. K. Mohanty
The legacy circuit switched telecom networks typically use intelligent network architecture or adjunct platforms for enhanced services such as Free Phone, Voice VPN, calling card and messaging. As the telecom operators deploy Voice over Internet Protocol to migrate towards a common packet based infrastructure for voice and data, they want the services to work across both circuit switched and packet networks. This paper examines the service deployment strategies for telecom operators during this network migration phase.
{"title":"Service deployment strategies for telecom operators","authors":"P. K. Mohanty","doi":"10.1109/CONTEL.2005.185863","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185863","url":null,"abstract":"The legacy circuit switched telecom networks typically use intelligent network architecture or adjunct platforms for enhanced services such as Free Phone, Voice VPN, calling card and messaging. As the telecom operators deploy Voice over Internet Protocol to migrate towards a common packet based infrastructure for voice and data, they want the services to work across both circuit switched and packet networks. This paper examines the service deployment strategies for telecom operators during this network migration phase.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126249097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185885
A. Devlic, G. Jezic
User profiles are used to integrate contextual information about mobile users and objects/devices in their environment. They represent structured knowledge used by a system to provide relevant information set to the user.
{"title":"Location-aware information services using user profile matching","authors":"A. Devlic, G. Jezic","doi":"10.1109/CONTEL.2005.185885","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185885","url":null,"abstract":"User profiles are used to integrate contextual information about mobile users and objects/devices in their environment. They represent structured knowledge used by a system to provide relevant information set to the user.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185865
B. Nadinic, R. Buzdon
Using knowledge discovery techniques in telecommunication companies has already become an established practice, mostly for segmentation and prediction of customers that will leave the provider. This work demonstrates on data from a regional telecommunication provider how knowledge discovery techniques can be used to create a model that will predict which customers will cease paying their bills. Three different phases of the project are discussed: modelling, analysis and model evaluation. This work shows that knowledge discovery techniques can be successfully used for additional company-specific purposes.
{"title":"New possibilities for knowledge discovery in telecommunication companies","authors":"B. Nadinic, R. Buzdon","doi":"10.1109/CONTEL.2005.185865","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185865","url":null,"abstract":"Using knowledge discovery techniques in telecommunication companies has already become an established practice, mostly for segmentation and prediction of customers that will leave the provider. This work demonstrates on data from a regional telecommunication provider how knowledge discovery techniques can be used to create a model that will predict which customers will cease paying their bills. Three different phases of the project are discussed: modelling, analysis and model evaluation. This work shows that knowledge discovery techniques can be successfully used for additional company-specific purposes.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"77 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185946
A. Teixeira, T. Silveira, A. Ferreira, P. André, P. Monteiro, M. Lima, R. Nogueira, J. Rocha
In this paper we assess experimentally the performance dependence of a Cross Gain Modulation all- optical router architecture module on power of Optical Code Division Multiple Access headers. The technique allows transparency of high data rate packets based on Cross Gain Modulation process, which is normally quite limited in terms of rate performance. I. INTRODUCTION Current telecommunications network traffic demands are evolving quite rapidly with the increasing number of services. This traffic growth, up to now, has been kept up with the widespread use of WDM (wavelength division multiplexing) transmission technology. However, the adoption of the latter technology has also meant that electronic packet routers will have to terminate a large number of WDM ports each carrying high data rate traffic. There is much evidence to suggest that the processing capabilities of electronic routers will not cope with the rate of traffic growth in the near future. This fact motivates the search of alternatives to route the traffic in the optical layer, which has significant speed performance advantages. There have been numerous efforts in the area of all- optical packet switching, where some of the functions of electronic routers are now performed directly in the optical layer. Most of these efforts come under the banner of GMPLS and aim to switch packets based on the contents of an optical label. One of the functions that any router, electrical or optical, has to perform, is to decode the contents of a packet header/label and look it up in a table, called LIB (label information base), to decide the appropriate destination port to forward the packet to, and replace the label with a new one. In most packet switching concepts and demonstrators presented so far, the header or lookup is most often implemented with electronics. However, some approaches are already doing it entirely on the optical domain
{"title":"OCDMA headers properties impact on an alloptical packet router module","authors":"A. Teixeira, T. Silveira, A. Ferreira, P. André, P. Monteiro, M. Lima, R. Nogueira, J. Rocha","doi":"10.1109/CONTEL.2005.185946","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185946","url":null,"abstract":"In this paper we assess experimentally the performance dependence of a Cross Gain Modulation all- optical router architecture module on power of Optical Code Division Multiple Access headers. The technique allows transparency of high data rate packets based on Cross Gain Modulation process, which is normally quite limited in terms of rate performance. I. INTRODUCTION Current telecommunications network traffic demands are evolving quite rapidly with the increasing number of services. This traffic growth, up to now, has been kept up with the widespread use of WDM (wavelength division multiplexing) transmission technology. However, the adoption of the latter technology has also meant that electronic packet routers will have to terminate a large number of WDM ports each carrying high data rate traffic. There is much evidence to suggest that the processing capabilities of electronic routers will not cope with the rate of traffic growth in the near future. This fact motivates the search of alternatives to route the traffic in the optical layer, which has significant speed performance advantages. There have been numerous efforts in the area of all- optical packet switching, where some of the functions of electronic routers are now performed directly in the optical layer. Most of these efforts come under the banner of GMPLS and aim to switch packets based on the contents of an optical label. One of the functions that any router, electrical or optical, has to perform, is to decode the contents of a packet header/label and look it up in a table, called LIB (label information base), to decide the appropriate destination port to forward the packet to, and replace the label with a new one. In most packet switching concepts and demonstrators presented so far, the header or lookup is most often implemented with electronics. However, some approaches are already doing it entirely on the optical domain","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185826
Guangyi Liu, Jianhua Zhang, Ping Zhang
As the increasing demand for mobile data service, 2Mbps peak data rate of TD-SCDMA will not fulfill the user’s need any more in several years. While the new B3G system to provide high data rate service is still not available until 2010, the current TD-SCDMA must be enhanced to fulfill the requirement of the new service. As one 3G standard accepted by ITU and 3GPP, TD-SCDMA should also be enhanced and improved as WCDMA and CDMA2000. In this paper, the future vision on the evolution and enhancement of TD-SCDMA is given out. According to our research, the smooth evolution from TD-SCDMA to B3G TDD can be summarized as five phases: TSM, LCR, HDR, B3G TDD and after 4G; while the research and development on TD-SCDMA enhancement can be done from the aspects of Generalized Distributed Antenna Arrays (GDAA), Dynamical Radio Resource Management, MIMO, AMC, etc. Finally, a High Data Rate proposal for TDSCDMA is presented as a reference for future research on this topic, and the peak data rate is 3.96Mbps.
{"title":"The vision on future TD-SCDMA","authors":"Guangyi Liu, Jianhua Zhang, Ping Zhang","doi":"10.1109/CONTEL.2005.185826","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185826","url":null,"abstract":"As the increasing demand for mobile data service, 2Mbps peak data rate of TD-SCDMA will not fulfill the user’s need any more in several years. While the new B3G system to provide high data rate service is still not available until 2010, the current TD-SCDMA must be enhanced to fulfill the requirement of the new service. As one 3G standard accepted by ITU and 3GPP, TD-SCDMA should also be enhanced and improved as WCDMA and CDMA2000. In this paper, the future vision on the evolution and enhancement of TD-SCDMA is given out. According to our research, the smooth evolution from TD-SCDMA to B3G TDD can be summarized as five phases: TSM, LCR, HDR, B3G TDD and after 4G; while the research and development on TD-SCDMA enhancement can be done from the aspects of Generalized Distributed Antenna Arrays (GDAA), Dynamical Radio Resource Management, MIMO, AMC, etc. Finally, a High Data Rate proposal for TDSCDMA is presented as a reference for future research on this topic, and the peak data rate is 3.96Mbps.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"81 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133763766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185881
D. Ramljak
This paper deals with application of P2P technology and semantic description of services in solving the problem of discovering Internet services from a mobile terminal. As a solution to this problem, we propose the system named Semantic Web Services Discovery (SWSD). This system is based on P2P technology, semantic description of Internet services, and access from a mobile terminal. The JXTA P2P platform is chosen as an implementation of P2P technology, and DAML-S is chosen for semantic description of services. This paper elaborates the architecture and implementation of SWSD system. The runtime operation of the system is verified through the case study of finding the stock exchange information on the Internet from a mobile terminal.
{"title":"Discovering services from mobile terminal by means of peer-to-peer networking and semantic descriptions","authors":"D. Ramljak","doi":"10.1109/CONTEL.2005.185881","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185881","url":null,"abstract":"This paper deals with application of P2P technology and semantic description of services in solving the problem of discovering Internet services from a mobile terminal. As a solution to this problem, we propose the system named Semantic Web Services Discovery (SWSD). This system is based on P2P technology, semantic description of Internet services, and access from a mobile terminal. The JXTA P2P platform is chosen as an implementation of P2P technology, and DAML-S is chosen for semantic description of services. This paper elaborates the architecture and implementation of SWSD system. The runtime operation of the system is verified through the case study of finding the stock exchange information on the Internet from a mobile terminal.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133823098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185907
C. Aoun, E. Davies, H. Tschofenig, S. Thiruvengadam
This document provides an overview of the impact of NATs and Firewalls on Internet applications and then describes state-of-the-art solutions and current research initiatives that allow applications to work in the presence of NATs and Firewalls. Firewalls and Network Address Translators are inevitable in modern Internet as they play a very important role in protecting and managing network resources but these middleboxes are obstacles for multimedia traffic that use dynamic ephemeral ports. There is a need for a signaling protocol, which can request a change of policy rules in a firewall or creation of a binding in the NAT. To develop a protocol or to design a network architecture, it is necessary to understand the implication of middleboxes such as NATs and Firewalls with respect to the deployment of services like Voice over IP. Different solutions for middlebox traversal have been developed over the past years with different constraints and limitations. This document compares these approaches against common criteria.
{"title":"Interaction of firewalls and network address translators with internet applications","authors":"C. Aoun, E. Davies, H. Tschofenig, S. Thiruvengadam","doi":"10.1109/CONTEL.2005.185907","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185907","url":null,"abstract":"This document provides an overview of the impact of NATs and Firewalls on Internet applications and then describes state-of-the-art solutions and current research initiatives that allow applications to work in the presence of NATs and Firewalls. Firewalls and Network Address Translators are inevitable in modern Internet as they play a very important role in protecting and managing network resources but these middleboxes are obstacles for multimedia traffic that use dynamic ephemeral ports. There is a need for a signaling protocol, which can request a change of policy rules in a firewall or creation of a binding in the NAT. To develop a protocol or to design a network architecture, it is necessary to understand the implication of middleboxes such as NATs and Firewalls with respect to the deployment of services like Voice over IP. Different solutions for middlebox traversal have been developed over the past years with different constraints and limitations. This document compares these approaches against common criteria.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185969
K. Brzezinski
In the industrial context, the link between standardized service/protocol specifications and the needs of a network operator has been mostly informal, which breaks the "formality chain" of the system life-cycle. We present the idea of formalized operator requirements (ORs) that can be effectively used by network operators as a backbone of their development activities. We define a semi-formal OR notation and discuss its properties. We show how it may support network development tasks that require the handling of relations between the capabilities of signalling protocols and implementable services. We also present the support tool that has actually been used to handle ORs for the ISUPv2 signalling platform
{"title":"Formalizing operator requirements for the development of telecommunications networks and services","authors":"K. Brzezinski","doi":"10.1109/CONTEL.2005.185969","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185969","url":null,"abstract":"In the industrial context, the link between standardized service/protocol specifications and the needs of a network operator has been mostly informal, which breaks the \"formality chain\" of the system life-cycle. We present the idea of formalized operator requirements (ORs) that can be effectively used by network operators as a backbone of their development activities. We define a semi-formal OR notation and discuss its properties. We show how it may support network development tasks that require the handling of relations between the capabilities of signalling protocols and implementable services. We also present the support tool that has actually been used to handle ORs for the ISUPv2 signalling platform","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185923
L. Janowski, Z. Papir
The paper presents a burstiness curve - a trade- off between Token Bucket descriptors - derived for a FBM traffic model using an envelope analysis. The burstiness curve is defined by traffic parameters (mean, variance, and Hurst parameter) and the considered Token Bucket packet drop probability. The Obtained results allow for more control to be imposed on Token Bucket parameters, when shaping the traffic of a particular service on the network.
{"title":"Analysis of a burstiness curve for FBM traffic and token bucket shaping algorithm","authors":"L. Janowski, Z. Papir","doi":"10.1109/CONTEL.2005.185923","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185923","url":null,"abstract":"The paper presents a burstiness curve - a trade- off between Token Bucket descriptors - derived for a FBM traffic model using an envelope analysis. The burstiness curve is defined by traffic parameters (mean, variance, and Hurst parameter) and the considered Token Bucket packet drop probability. The Obtained results allow for more control to be imposed on Token Bucket parameters, when shaping the traffic of a particular service on the network.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}