Amandeep Singh, Gaston Ormazabal, H. Schulzrinne, Yan Zou, P. Thermos, Sateesh Addepalli
{"title":"Unified Heterogeneous Networking Design","authors":"Amandeep Singh, Gaston Ormazabal, H. Schulzrinne, Yan Zou, P. Thermos, Sateesh Addepalli","doi":"10.1145/2554666.2554670","DOIUrl":"https://doi.org/10.1145/2554666.2554670","url":null,"abstract":"The Internet was designed under the assumption that end-hosts are stationary and have one interface. Current mobile devices have multiple network interfaces, such as Wi-Fi, LTE, WiMAX, and possibly Ethernet. Such diverse network connectivity can be used to increase both reliability and performance by running applications over multiple links sequentially, for a seamless user experience, or in parallel, for bandwidth and performance enhancements. Users are also consuming Internet services from multiple locations and devices, such as smartphones, tablets, laptops, and IP-enabled TVs. The existing networking stack, however, offers almost no support for intelligently exploiting such network, location and device diversity.\u0000 Since, most Internet devices today are mobile, we propose a unified networking architecture that makes optimal use of a heterogeneous dynamic environment, both in terms of networks and user devices. The system core functionalities include mobility, multi-homing, multipath, and disruption tolerance. The system enables mobile nodes to make decisions about how and when to use each or a combination of networks, in a secure manner. With this new architecture, we envision a shift from current applications supporting a single network, location, and device at a time, to applications that can support multiple networks, multiple locations, and multiple devices.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Log Files with Limited Labeled Data","authors":"S. Hommes, R. State, T. Engel","doi":"10.1145/2554666.2554668","DOIUrl":"https://doi.org/10.1145/2554666.2554668","url":null,"abstract":"We address the problem of anomaly detection in log files that consist of a huge number of records. In order to achieve this task, we demonstrate label propagation as a semi-supervised learning technique. The strength of this approach lies in the small amount of labelled data that is needed to label the remaining data. This is an advantage since labelled data needs human expertise which comes at a high cost and becomes infeasible for big datasets. Even though our approach is generally applicable, we focus on the detection of anomalous records in firewall log files. This requires a separation of records into windows which are compared using different distance functions to determine their similarity. Afterwards, we apply label propagation to label a complete dataset in only a limited number of iterations. We demonstrate our approach on a realistic dataset from an ISP.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130952193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bringing VoIP Signatures to Mobile Devices","authors":"R. Marx, N. Kuntze, Hagen Lauer","doi":"10.1145/2554666.2554669","DOIUrl":"https://doi.org/10.1145/2554666.2554669","url":null,"abstract":"With the advent of LTE another technology is gaining momentum in mobile communication, viz. Voice-over-IP (VoIP). While LTE provides state-of-the-art security features such as confidentiality, integrity, and authenticity, non-repudiation of voice communication over LTE is not addressed. At the same time the utilization of mobile phone devices for business communication is already common practice. However, applications supporting specific business requirements, such as the confirmability of statements made in a phone call, are missing.\u0000 VoIP Signatures is a recognized concept to achieve both non-repudiation for VoIP calls as well as integrity protection against the manipulation of recorded conversations. We present the integration of this concept with a VoIP client running on a mobile device. The implementation concept has been optimized for applicability on standard smartphones with regard to given characteristics such as processing power limitations. The implementation concept is introduced and the performance has been evaluated, resulting in a promising statement regarding the applicability of our approach on future mobile devices providing Voice-over-LTE functionality.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117318685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying abnormal patterns in cellular communication flows","authors":"David Goergen, V. Mendiratta, R. State, T. Engel","doi":"10.1145/2554666.2554671","DOIUrl":"https://doi.org/10.1145/2554666.2554671","url":null,"abstract":"Analyzing communication flows on the network can help to improve the overall quality it provides to its users and allow the operators to detect abnormal patterns and react accordingly.\u0000 In this paper we consider the analysis of large volumes of cellular communications records. We propose a method that detects abnormal communications events covering call data record volumes, comprising a country-level data set. We detect patterns by calculating a weighted average using a sliding window with a fixed period and correlate the results with actual events happening at that time. We are able to successfully detect several events using a data set provided by a mobile phone operator, and suggest examples of future usage of the outcome such as real time pattern detection and possible visualisation for mobile phone operators.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An IMS testbed for SIP applications","authors":"C. Caba, José Soler","doi":"10.1145/2554666.2554667","DOIUrl":"https://doi.org/10.1145/2554666.2554667","url":null,"abstract":"The paper presents the design and implementation of an emulation platform for the IP Multimedia Subsystem. The SIP Servlet API v1.1 has been used to implement the final system. The purpose of the emulation is to offer to IMS service developers an environment where they can integrate development, deployment and testing of their SIP applications in a single platform, easy to setup and maintain. The emulation platform offers the possibility of configuring network triggers (e.g. initial Filter Criteria and Service Point Triggers) through a web interface, and executing complex test scenarios according to the configuration. The result is ideal to introduce telecommunication students to service development, testing and deployment in a user friendly environment.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125349646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Websocket enabler: achieving IMS and web services end-to-end convergence","authors":"G. Nicolas, Karim Sbata, E. Najm","doi":"10.1145/2124436.2124441","DOIUrl":"https://doi.org/10.1145/2124436.2124441","url":null,"abstract":"Over the last few years, significant evolutions such as the mobile phones' enhanced web-browsing capabilities and the technical incursion of Web major players into the Telco world (e.g. Google, Facebook) have reduced the gap between Telecom and Web worlds. In this context, converging IMS and Web service platforms has become a key challenge that needs to be addressed by both Web and Telecom players. Several interesting solutions, illustrating different convergence approaches, have been proposed so far. Unfortunately, none of them has been able to provide an efficient way to set up end-to-end converging services. Indeed, Web-based applications are synchronous, as they rely on HTTP. On the other hand, IMS services can be provided in both asynchronous and synchronous modes. We define synchronous applications as services in which each provided resource or piece of information has to be explicitly requested by the consumer and asynchronous applications as services that can notify their consumers anytime they need. But recently, the W3C and the IETF have released new standards (HTML5 and Websocket protocol), introducing important evolutions in the Web paradigm. In particular, the Websocket technology allows a native support for asynchronous Web applications. Our proposal is a converging framework (called WSE, standing for Websocket Enabler) that takes advantage of this new technology to achieve end-to-end service convergence.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123580681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing interactive multi-user VoIP applications using synchronization contracts with ECharts","authors":"Yi Huang, L. Dillon","doi":"10.1145/2124436.2124446","DOIUrl":"https://doi.org/10.1145/2124436.2124446","url":null,"abstract":"VoIP services are increasingly expected to support complex interactions among many autonomous users. A conferencing service, for example, must allow dial-in users to freely join and leave a call, and permit an administrator to control who may join a call and kick out participants who should be (temporarily or permanently) excluded. The need to maintain application state complicates development of VoIP applications on top of SIP [3], even in the case of single-user applications. For multi-user applications, the need to synchronize SIP threads that concurrently access shared application state when responding to messages from different users significantly increases this complexity [2].","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122967047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What went wrong?: negative results from VoIP service providers","authors":"Mark Lindsey","doi":"10.1145/2124436.2124453","DOIUrl":"https://doi.org/10.1145/2124436.2124453","url":null,"abstract":"Will the extensibility of SIP, the security environment of the Internet, and software development practices of a few vendors turn VoIP into the next great technology to be replaced? Has the spirit of open, interoperable, democratized telecommunication been lost in the haste to upgrade old telephone networks?","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Getting SIP endpoints and network call control to work well together","authors":"Eric Cheung, Thomas M. Smith","doi":"10.1145/2124436.2124460","DOIUrl":"https://doi.org/10.1145/2124436.2124460","url":null,"abstract":"The Session Initiation Protocol (SIP) was designed as a protocol to establish multimedia over IP sessions between endpoints. Several protocol elements have been introduced to support common features such as call redirection and transfer performed at the endpoints. At the same time, real-world deployments have shown that intermediaries are commonly deployed in the network to provide advanced features. Conflicts between these protocol elements and intermediary application servers may lead to failure of operations and undesirable feature interactions. This paper examines the problems and proposes a general solution suite which includes suggested handling of these protocol elements and feature interaction management. The benefits include smooth interoperability of endpoint protocol elements and network-resident applications, and desirable overall service behavior.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiments with SIP over TLS in an NG-9-1-1 testbed","authors":"M. Suresh, A. Goulart, U. Desai, W. Magnussen","doi":"10.1145/2124436.2124445","DOIUrl":"https://doi.org/10.1145/2124436.2124445","url":null,"abstract":"Security is an important concern in Voice over IP (VoIP) applications. An approach to securing the signaling, such as the Session Initiation Protocol (SIP) messages, is by using Transport Layer Security (TLS). Several studies have been done to measure the impact of using TLS on SIP. However, there have not been any tests on the use of TLS in the scenario of emergency IP-based calls, such as Next Generation 9-1-1 (NG-9-1-1) calls. We propose to demonstrate NG-9-1-1 calls over TLS, and present preliminary statistics of different call scenarios.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}