M. Scharf, T. Voith, W. D. Roome, Bob Gaglianello, Moritz Steiner, V. Hilt, V. Gurbani
{"title":"Monitoring and abstraction for networked clouds","authors":"M. Scharf, T. Voith, W. D. Roome, Bob Gaglianello, Moritz Steiner, V. Hilt, V. Gurbani","doi":"10.1109/ICIN.2012.6376038","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376038","url":null,"abstract":"We consider the problem of building tightly coupled network and cloud management systems for “carrier clouds” based on an abstract view of the dynamic network state. Optimized resource placement in distributed clouds requires information about the internal network topology and state, in addition to other data center information. We present a distributed cloud system that accesses such data in an abstract way using the Application Layer Traffic Optimization (ALTO) protocol. The demonstration addresses how dynamic networking information can be gathered, how it can be abstracted and coupled with other data such as data center load, how it can be exposed, and how it can be integrated into a cloud management system. Our distributed cloud solution demonstrates that ALTO is well-suited for infrastructure-to-application information exposure.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A perspective on regulation and users' experience","authors":"D. Ludlam","doi":"10.1109/ICIN.2012.6376014","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376014","url":null,"abstract":"This paper describes users' experiences of both telephony and Internet services and infers some requirements from these experiences. It argues that sender authentication is an essential feature of communications systems and that it is not adequately provided today. Some regulatory decisions and their arbitrary impact on users and companies are discussed. Many of the ideas presented are not innovative: on the contrary much of the content is asking obvious questions and making obvious assertions that are familiar to many in the industry and to the general public, but that have not been dealt with effectively by the combination of market forces, regulators and governments.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134331377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Office on Demand: New cloud service platform for carrier","authors":"K. Shimizu, S. Nishinaga, S. Muto, N. Uchida","doi":"10.1109/ICIN.2012.6376020","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376020","url":null,"abstract":"We propose a novel cloud service platform “Office on Demand” (OOD) and its architecture. OOD functions as a cloud service marketplace targeted mainly for small and medium businesses (SMBs) with the needs to quickly prepare an ICT infrastructure for their business, to use network services without a complex configuration setup, and to use mobile terminal devices as fixed terminal devices. We also propose “Hybrid Office Gateway” (HOG), a user side device for OOD, which will give users accessibility to OOD without any complex network settings after subscribing to the fiber-optic network service onto which OOD is built. We have developed an architecture for OOD that can provide “Communication as a Service” (CaaS) + “Software as a Service” (SaaS)” based service for SMBs through cooperation with HOG, and implemented a prototype to examine and evaluate the architecture.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing consumerization - Should enterprise business context determine session policy?","authors":"Rebecca Copeland, N. Crespi","doi":"10.1109/ICIN.2012.6376024","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376024","url":null,"abstract":"This paper analyzes the impact of the fast-growing BYOD (Bring Your Own Device) trend in the corporate mobile market, which blurs lines between business and personal usage. To enable selective funding and resource optimization for BYOD, we propose that the enterprise determines its own service delivery policy, using an enterprise Business Context (eBC) Policy tool. The enterprise is best placed to ascertain session context and priorities from its internal context sources, kept only by the enterprise, to retain privacy. While NETWOK policies are controlled by network operators, the enterprise could and should determine the SESSION policies that are based on its business goals. The eBC policy can be further utilized for optimizing resource usage and influencing employee consumption. The enterprise goals need to be translated into standard policy rules and conveyed to the carriers via existing 3GPP standards, to fit in with existing networks. This is paper raises several new ideas which are further researched in follow-on papers.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"5 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131936914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Value added mobile broadband services Innovation driven transformation of the ‘smart pipe’","authors":"K. Kimbler, M. Taylor","doi":"10.1109/ICIN.2012.6376030","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376030","url":null,"abstract":"As consumer demand for mobile broadband data soars, data traffic is increasing exponentially. However actual data revenue is growing at a much slower pace. Furthermore, data profitability is significantly lower than voice or messaging. Hence, investors and financial analysts are currently marking down the future valuation of mobile operators' businesses. To counter this trend, operators need new ways of monetizing mobile broadband data while increasing profits. This can be achieved by transforming existing data businesses from unlimited or volume-based models to value-added data offerings. Examples are: demographically segmented and personalized data packages; data bundled-with-Internet-applications; sender-pays content models; and service-based charging. These “value added mobile broadband services” are becoming a new area for service innovation. This paper analyses current market trends and explains how the aggregation of traffic management, data charging, deep packet inspection and content optimization technologies enables this new “smart pipe” innovation. Existing market solutions and examples of already deployed value added data services are provided.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115135142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Corici, D. Vingarzan, T. Magedanz, P. Weik, N. Bayer, H. Einsiedler
{"title":"Connectivity support harmonization in future internet architecture","authors":"M. Corici, D. Vingarzan, T. Magedanz, P. Weik, N. Bayer, H. Einsiedler","doi":"10.1109/ICIN.2012.6376041","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376041","url":null,"abstract":"The current trend in mobile telecommunications is towards accommodating an increased data traffic throughput for a large number of subscribers. For this, the mobile operators are deploying more efficient access and core network technologies resulting in higher data rates at specific geographic locations responding to the future internet communication requirements. However, the new technologies come to extend the current deployments resulting in a complex system with high heterogeneous connectivity support functionality. This paper describes a set of functional extensions for the harmonization between legacy and future networks for access network selection and convergent authentication and authorization and data path establishment, exemplified as additions to the 3GPP Evolved Packet Core. These extensions enable a converged and efficient handling of the subscribers' requirements and data traffic in the future mobile operator networks. Furthermore, the functionality is detailed as implemented in the Future Internet Testbed of (Deutsche) Telekom Innovation Laboratories based on the Fraunhofer OpenEPC software implementation of the 3GPP architecture.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127789332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the design of a tuple space-based platform for IMS networks","authors":"Rogerio A. Rondini, G. Bressan","doi":"10.1109/ICIN.2012.6376011","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376011","url":null,"abstract":"The IP Multimedia Subsystem architecture, proposed by the 3GPP consortium as a basis to support the convergence between mobile networks and the Internet, states that Session Control components are implemented through Session Initiation Protocol. The Session Initiation Protocol is an application layer protocol used to establish, modify and terminate sessions between devices. In the last years, studies have detected a performance bottleneck in Session Initiation Protocol and in IMS Session Control components due to their centralized characteristic. This work introduces the design of a tuple space-based platform for IP Multi-media Subsystem networks with the aim of providing a decentralized, scalable and fault-tolerant infrastructure to deploy Next Generation Network applications.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nishimura, E. Iwasa, M. Irie, S. Kondoh, M. Kaneko, T. Fukumoto, M. Iio, K. Ueda
{"title":"Applying flexibility in scale-out-based web cloud to future telecommunication session control systems","authors":"H. Nishimura, E. Iwasa, M. Irie, S. Kondoh, M. Kaneko, T. Fukumoto, M. Iio, K. Ueda","doi":"10.1109/ICIN.2012.6376026","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376026","url":null,"abstract":"In traditional telecommunication networks, server resources are statically allocated to session control systems based on demand forecasting. However, the open platform on which third party developers provide various applications has recently made demand prediction difficult. In addition, static allocation concerning load peak results in less resource utilization during nonpeak times, and is not capable of handling unexpected demand fluctuation. To enable flexible on-demand resource control in telecommunication systems that reduces costs, we propose applying a scale-out architecture, which is commonly used in Web systems for resource optimization, to high availability telecommunication systems. We implemented a scale-out-based session control server cluster and showed that the number of servers comprising the cluster can be dynamically configured without serious interruption in service. We also confirmed that the performance of the cluster linearly scales to the number of servers, which indicates the feasibility of the scale-out-based telecommunication system architecture.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlling enterprise context-based session policy and mapping it to mobile broadband policy rules","authors":"Rebecca Copeland, N. Crespi","doi":"10.1109/ICIN.2012.6376025","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376025","url":null,"abstract":"In this paper we propose a method of translating enterprise business objectives into service delivery policy rules in Mobile Broadband networks. This enables enterprises to control their own session policies for BYOD (Bring Your Own Device) users and apply selective funding with prioritized service delivery. The proposed eBC (enterprise Business Context) Policy process uses internal corporate data to define session context attributes, which are evaluated against business policies to produce an eBC profile. This is used first to grant funding or defer the request to the user's carrier as `personal use'. Funded requests are processed further to determine service authorization levels and session delivery profiles. Finally, these values are mapped to 3GPP PCC parameters. We examine the feasibility of enterprises controlling and conveying session policies in terms of routing and intercepting employees' requests, and in conveying policy information to carriers using standard interfaces and accepted 3GPP models, such as Sponsoring Data and Virtual Networks.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115289311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Halos Networks ubiquitous networking and computing at the edge","authors":"A. Manzalini, N. Crespi, V. Gonçalves, R. Minerva","doi":"10.1109/ICIN.2012.6376035","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376035","url":null,"abstract":"This paper presents Halos Networks as an architectural paradigm for developing ubiquitous networking and computing services at the edge of the networks A Halos Network is like a wireless network spontaneously emerging through the interactions of distributed resources embedding wireless communication capabilities. Halos Networks are capable of delivering services and data virally through multiple devices, machines and objects interconnected with one other. This paper discusses business roles for Stakeholders in Halos Networks scenarios, specifically concluding with some remarks about the Operators' role.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122554291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}