{"title":"Network security through software defined networking: a survey","authors":"J. François, Lautaro Dolberg, O. Festor, T. Engel","doi":"10.1145/2670386.2670390","DOIUrl":"https://doi.org/10.1145/2670386.2670390","url":null,"abstract":"Network security is a predominant topic both in academia and industry. Many methods and tools have been proposed but the attackers are still able to launch massive and effective attacks. Keeping the pace with the new threats appearing or becoming more sophisticated everyday is of a paramount of importance. Software Defined Networking (SDN) has recently emerged and promotes the programmability of the networks, which thus allows to enable in-network security functions. This includes firewalls, monitoring applications or middlebox support through OpenFlow devices. Therefore, this paper reviews the related approaches which have been proposed by identifying their scope, their practicability, their advantages and their drawbacks.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework for validating heterogeneous networks and solutions","authors":"Dave Snyder, Lizette Velázquez","doi":"10.1145/2670386.2670393","DOIUrl":"https://doi.org/10.1145/2670386.2670393","url":null,"abstract":"This paper presents a Domain based Solution Verification and Validation Program that has been defined at the Alcatel-Lucent IP Transformation Center (IPTC). The program takes into account a need to support multi-technologies, multi-use, and multi-customers. Its definition is driven by business needs using Domain Analysis and Engineering methodologies and principles. The analysis, design, validation, and implementation of the program take place through experimental research. Over the years, incremental learning has been used to modify and fine tune the program. These provide the input needed for a meta-design that, in turn, leads to a set of topologies and a \"super set\" of use cases, tests and rules. This program also defines an application integration process that supports the related business processes that encompass the understanding of architectural principles, solution realization, and solution delivery.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124755629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving root cause failure analysis in virtual networks via the interconnected-asset ontology","authors":"H. Birkholz, Ingo Sieverdingbeck","doi":"10.1145/2670386.2670395","DOIUrl":"https://doi.org/10.1145/2670386.2670395","url":null,"abstract":"Identifying and locating root cause failures in virtual networks via active probing is a complex and repetitive task. Automation of this procedure requires a machine-processable representation that is not only capable of expressing the composition of physical network topologies but also the virtual networks supported by them. In this paper, we present an extension of the Interconnected-asset Ontology that allows to represent nested virtual networks. This extended representation is used to automatically generate sets of active probes that analyze the state of network paths. A proof-of-concept implementation is applied in the production network of a wide area network service provider. The corresponding evaluation shows that our approach is viable and can streamline the process significantly.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust channel assignment method for multi-radio networks","authors":"Amalya Mihnea, M. Cardei","doi":"10.1145/2670386.2670394","DOIUrl":"https://doi.org/10.1145/2670386.2670394","url":null,"abstract":"Cognitive radio networks solve the problem of inefficient spectrum usage by allowing secondary users to share spectrum with primary users. In this paper we introduce and analyze a channel assignment algorithm which is robust to the presence of primary users that could reclaim multiple channels at once. This algorithm can be used in multi-radio multi-channel networks. The analysis of interference helps us to choose the most efficient parameters for our algorithm. By reducing interference, the capacity of the network is improved and this leads to an increased efficiency in communication.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131719571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Janus: a general purpose WebRTC gateway","authors":"A. Amirante, T. Castaldi, L. Miniero, S. Romano","doi":"10.1145/2670386.2670389","DOIUrl":"https://doi.org/10.1145/2670386.2670389","url":null,"abstract":"This paper deals with the design and implementation of Janus, a general purpose, open source WebRTC gateway. Details will be provided on the architectural choices we took for Janus, as well as on the APIs we made available to extend and make use of it. Examples of how the gateway can be used for complex WebRTC applications are presented, together with some experimental results we collected during the development process.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123550725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Setting up CLUE telepresence sessions via the WebRTC data channel","authors":"R. Presta, S. Romano","doi":"10.1145/2670386.2670396","DOIUrl":"https://doi.org/10.1145/2670386.2670396","url":null,"abstract":"In this paper we present the current results of our ongoing work in the field of standardization of the CLUE telepresence framework within the Internet Engineering Task Force. We first introduce the CLUE architecture and data model. Then, we move to the definition of an application-level protocol for the negotiation and setup of telepresence sessions between CLUE-enabled entities. We propose to transport CLUE protocol messages on top of the WebRTC data channel, which is a further ongoing effort involving both the Internet and the World Wide Web standards organizations. The data channel allows for low-latency, secure transmission of generic data in a peer-to-peer fashion. The paper also describes a proof-of-concept implementation of the mentioned features. Such an implementation aims to represent a living playground for the collection of real-world data for the definition of a call flows standard document illustrating protocol interactions and use cases.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126281354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of large call data records with big data","authors":"David Goergen, V. Mendiratta, R. State, T. Engel","doi":"10.1145/2670386.2670388","DOIUrl":"https://doi.org/10.1145/2670386.2670388","url":null,"abstract":"Mobile communication flows describe the on-going traffic on the network and are therefore a good indication of what is happening. Analysing these flows can improve the overall quality offered to the users and it can enable operators to detect abnormal patterns and react.\u0000 This paper will focus on the analysis of cellular communications records. By using the collected call and message exchanges we present a method based on the PageRank algorithm that detects abnormal communications events. Taking the number of calls and the total call duration as parameters we use a weighted version of the PageRank algorithm to further investigate the influence of these parameters on the connected network graph. We proceed by correlating the results obtained with events happening in the respective region and at that time.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of FEC mechanisms in the performance of low bit rate codecs in lossy mobile environments","authors":"Rolando Herrero, M. Cadirola","doi":"10.1145/2670386.2670387","DOIUrl":"https://doi.org/10.1145/2670386.2670387","url":null,"abstract":"In this paper we focus on Forward Error Correction (FEC) mechanisms based on media redundancy applied to various Low Bit Rate (LBR) speech codecs in the context of lossy mobile environments. Specifically, we deal with different state of the art linear prediction based codecs ranging from narrowband G.729AB and AMR-NB to wideband Opus and SILK, all of them enabled to support Discontinued Transmission (DTX) mode, and packetized over switched networks as RTP/UDP/IP traffic. We evaluate these speech codecs applied in conjunction with media redundancy techniques to a network scenario where packet loss bursts and latency are induced to mimic mobile environments that are normally mathematically modeled as a two-state Markov process. In addition to obtaining the application layer packet loss and comparing it to the mathematical model we also compute the Perceptual Evaluation of Speech Quality (PESQ) score in an attempt to correlate packet loss to real perceived speech quality.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"328 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120840168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Goergen, Angelo Migliosi, V. Gurbani, R. State, T. Engel
{"title":"Spatial and temporal analysis of Twitter: a tale of two countries","authors":"David Goergen, Angelo Migliosi, V. Gurbani, R. State, T. Engel","doi":"10.1145/2670386.2670392","DOIUrl":"https://doi.org/10.1145/2670386.2670392","url":null,"abstract":"People share information with their peers using social media services (e.g. sharing their latest news over Facebook or Twitter) in order to inform the peers about their current situation. This has become a huge part of our social life. During crises this behaviour becomes even more acute because it allows people to reassure their peers (followers and friends) of their well being expeditiously. Of late, social media services have been also used for another purpose during crises: that of informing oneself over the current evolution of the crises. However obtaining relevant information from social media can be a difficult challenge as the bar for posting information, good or bad, is very low. Filtering the flow of messages such that only relevant information is remaining is critical in times of crises. To aid in this, we propose a spatial-temporal model that collects the data from Twitter. The data is further processed to evaluate the density of tweets surrounding the area. We also evaluate the possibility of shared user accounts by determining the physical distance and velocity between messages originating from the same user account.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An open-source platform for converged services","authors":"Jonathan Michaux, E. Buu, J. Hlavacek, E. Najm","doi":"10.1145/2554666.2554672","DOIUrl":"https://doi.org/10.1145/2554666.2554672","url":null,"abstract":"Following a telecommunications industry-wide move to provide converged services that integrate solutions from both the Web and the telephony domains, we look in to the challenges in providing adequate environments that foster the creation of these types of services. The challenge in aligning these different service paradigms is that they differ in the way they deal with composition, state management, flow control, and more. Attempts at integrating these different paradigms must do so in a way that encourages the production of high quality code that does not get lost in managing the heterogeneous nature of the underlying resources. We present our experience with the Moteli engine, an open source project that directly addresses these issues.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}