Principles, Systems and Applications of IP Telecommunications最新文献

筛选
英文 中文
Unified Heterogeneous Networking Design 统一异构组网设计
Principles, Systems and Applications of IP Telecommunications Pub Date : 2013-10-15 DOI: 10.1145/2554666.2554670
Amandeep Singh, Gaston Ormazabal, H. Schulzrinne, Yan Zou, P. Thermos, Sateesh Addepalli
{"title":"Unified Heterogeneous Networking Design","authors":"Amandeep Singh, Gaston Ormazabal, H. Schulzrinne, Yan Zou, P. Thermos, Sateesh Addepalli","doi":"10.1145/2554666.2554670","DOIUrl":"https://doi.org/10.1145/2554666.2554670","url":null,"abstract":"The Internet was designed under the assumption that end-hosts are stationary and have one interface. Current mobile devices have multiple network interfaces, such as Wi-Fi, LTE, WiMAX, and possibly Ethernet. Such diverse network connectivity can be used to increase both reliability and performance by running applications over multiple links sequentially, for a seamless user experience, or in parallel, for bandwidth and performance enhancements. Users are also consuming Internet services from multiple locations and devices, such as smartphones, tablets, laptops, and IP-enabled TVs. The existing networking stack, however, offers almost no support for intelligently exploiting such network, location and device diversity.\u0000 Since, most Internet devices today are mobile, we propose a unified networking architecture that makes optimal use of a heterogeneous dynamic environment, both in terms of networks and user devices. The system core functionalities include mobility, multi-homing, multipath, and disruption tolerance. The system enables mobile nodes to make decisions about how and when to use each or a combination of networks, in a secure manner. With this new architecture, we envision a shift from current applications supporting a single network, location, and device at a time, to applications that can support multiple networks, multiple locations, and multiple devices.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Classification of Log Files with Limited Labeled Data 标记数据有限的日志文件分类
Principles, Systems and Applications of IP Telecommunications Pub Date : 2013-10-15 DOI: 10.1145/2554666.2554668
S. Hommes, R. State, T. Engel
{"title":"Classification of Log Files with Limited Labeled Data","authors":"S. Hommes, R. State, T. Engel","doi":"10.1145/2554666.2554668","DOIUrl":"https://doi.org/10.1145/2554666.2554668","url":null,"abstract":"We address the problem of anomaly detection in log files that consist of a huge number of records. In order to achieve this task, we demonstrate label propagation as a semi-supervised learning technique. The strength of this approach lies in the small amount of labelled data that is needed to label the remaining data. This is an advantage since labelled data needs human expertise which comes at a high cost and becomes infeasible for big datasets. Even though our approach is generally applicable, we focus on the detection of anomalous records in firewall log files. This requires a separation of records into windows which are compared using different distance functions to determine their similarity. Afterwards, we apply label propagation to label a complete dataset in only a limited number of iterations. We demonstrate our approach on a realistic dataset from an ISP.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130952193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bringing VoIP Signatures to Mobile Devices 为移动设备提供VoIP签名
Principles, Systems and Applications of IP Telecommunications Pub Date : 2013-10-15 DOI: 10.1145/2554666.2554669
R. Marx, N. Kuntze, Hagen Lauer
{"title":"Bringing VoIP Signatures to Mobile Devices","authors":"R. Marx, N. Kuntze, Hagen Lauer","doi":"10.1145/2554666.2554669","DOIUrl":"https://doi.org/10.1145/2554666.2554669","url":null,"abstract":"With the advent of LTE another technology is gaining momentum in mobile communication, viz. Voice-over-IP (VoIP). While LTE provides state-of-the-art security features such as confidentiality, integrity, and authenticity, non-repudiation of voice communication over LTE is not addressed. At the same time the utilization of mobile phone devices for business communication is already common practice. However, applications supporting specific business requirements, such as the confirmability of statements made in a phone call, are missing.\u0000 VoIP Signatures is a recognized concept to achieve both non-repudiation for VoIP calls as well as integrity protection against the manipulation of recorded conversations. We present the integration of this concept with a VoIP client running on a mobile device. The implementation concept has been optimized for applicability on standard smartphones with regard to given characteristics such as processing power limitations. The implementation concept is introduced and the performance has been evaluated, resulting in a promising statement regarding the applicability of our approach on future mobile devices providing Voice-over-LTE functionality.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117318685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identifying abnormal patterns in cellular communication flows 识别细胞通信流中的异常模式
Principles, Systems and Applications of IP Telecommunications Pub Date : 2013-10-15 DOI: 10.1145/2554666.2554671
David Goergen, V. Mendiratta, R. State, T. Engel
{"title":"Identifying abnormal patterns in cellular communication flows","authors":"David Goergen, V. Mendiratta, R. State, T. Engel","doi":"10.1145/2554666.2554671","DOIUrl":"https://doi.org/10.1145/2554666.2554671","url":null,"abstract":"Analyzing communication flows on the network can help to improve the overall quality it provides to its users and allow the operators to detect abnormal patterns and react accordingly.\u0000 In this paper we consider the analysis of large volumes of cellular communications records. We propose a method that detects abnormal communications events covering call data record volumes, comprising a country-level data set. We detect patterns by calculating a weighted average using a sliding window with a fixed period and correlate the results with actual events happening at that time. We are able to successfully detect several events using a data set provided by a mobile phone operator, and suggest examples of future usage of the outcome such as real time pattern detection and possible visualisation for mobile phone operators.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An IMS testbed for SIP applications 用于SIP应用程序的IMS测试平台
Principles, Systems and Applications of IP Telecommunications Pub Date : 2013-10-15 DOI: 10.1145/2554666.2554667
C. Caba, José Soler
{"title":"An IMS testbed for SIP applications","authors":"C. Caba, José Soler","doi":"10.1145/2554666.2554667","DOIUrl":"https://doi.org/10.1145/2554666.2554667","url":null,"abstract":"The paper presents the design and implementation of an emulation platform for the IP Multimedia Subsystem. The SIP Servlet API v1.1 has been used to implement the final system. The purpose of the emulation is to offer to IMS service developers an environment where they can integrate development, deployment and testing of their SIP applications in a single platform, easy to setup and maintain. The emulation platform offers the possibility of configuring network triggers (e.g. initial Filter Criteria and Service Point Triggers) through a web interface, and executing complex test scenarios according to the configuration. The result is ideal to introduce telecommunication students to service development, testing and deployment in a user friendly environment.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125349646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Websocket enabler: achieving IMS and web services end-to-end convergence Websocket使能器:实现IMS和web服务端到端的融合
Principles, Systems and Applications of IP Telecommunications Pub Date : 2011-08-01 DOI: 10.1145/2124436.2124441
G. Nicolas, Karim Sbata, E. Najm
{"title":"Websocket enabler: achieving IMS and web services end-to-end convergence","authors":"G. Nicolas, Karim Sbata, E. Najm","doi":"10.1145/2124436.2124441","DOIUrl":"https://doi.org/10.1145/2124436.2124441","url":null,"abstract":"Over the last few years, significant evolutions such as the mobile phones' enhanced web-browsing capabilities and the technical incursion of Web major players into the Telco world (e.g. Google, Facebook) have reduced the gap between Telecom and Web worlds. In this context, converging IMS and Web service platforms has become a key challenge that needs to be addressed by both Web and Telecom players. Several interesting solutions, illustrating different convergence approaches, have been proposed so far. Unfortunately, none of them has been able to provide an efficient way to set up end-to-end converging services. Indeed, Web-based applications are synchronous, as they rely on HTTP. On the other hand, IMS services can be provided in both asynchronous and synchronous modes. We define synchronous applications as services in which each provided resource or piece of information has to be explicitly requested by the consumer and asynchronous applications as services that can notify their consumers anytime they need. But recently, the W3C and the IETF have released new standards (HTML5 and Websocket protocol), introducing important evolutions in the Web paradigm. In particular, the Websocket technology allows a native support for asynchronous Web applications. Our proposal is a converging framework (called WSE, standing for Websocket Enabler) that takes advantage of this new technology to achieve end-to-end service convergence.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123580681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing interactive multi-user VoIP applications using synchronization contracts with ECharts 使用ECharts的同步合约开发交互式多用户VoIP应用程序
Principles, Systems and Applications of IP Telecommunications Pub Date : 2011-08-01 DOI: 10.1145/2124436.2124446
Yi Huang, L. Dillon
{"title":"Developing interactive multi-user VoIP applications using synchronization contracts with ECharts","authors":"Yi Huang, L. Dillon","doi":"10.1145/2124436.2124446","DOIUrl":"https://doi.org/10.1145/2124436.2124446","url":null,"abstract":"VoIP services are increasingly expected to support complex interactions among many autonomous users. A conferencing service, for example, must allow dial-in users to freely join and leave a call, and permit an administrator to control who may join a call and kick out participants who should be (temporarily or permanently) excluded. The need to maintain application state complicates development of VoIP applications on top of SIP [3], even in the case of single-user applications. For multi-user applications, the need to synchronize SIP threads that concurrently access shared application state when responding to messages from different users significantly increases this complexity [2].","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122967047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What went wrong?: negative results from VoIP service providers 出了什么问题?: VoIP服务提供商的负面结果
Principles, Systems and Applications of IP Telecommunications Pub Date : 2011-08-01 DOI: 10.1145/2124436.2124453
Mark Lindsey
{"title":"What went wrong?: negative results from VoIP service providers","authors":"Mark Lindsey","doi":"10.1145/2124436.2124453","DOIUrl":"https://doi.org/10.1145/2124436.2124453","url":null,"abstract":"Will the extensibility of SIP, the security environment of the Internet, and software development practices of a few vendors turn VoIP into the next great technology to be replaced? Has the spirit of open, interoperable, democratized telecommunication been lost in the haste to upgrade old telephone networks?","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Getting SIP endpoints and network call control to work well together 使SIP端点和网络呼叫控制很好地协同工作
Principles, Systems and Applications of IP Telecommunications Pub Date : 2011-08-01 DOI: 10.1145/2124436.2124460
Eric Cheung, Thomas M. Smith
{"title":"Getting SIP endpoints and network call control to work well together","authors":"Eric Cheung, Thomas M. Smith","doi":"10.1145/2124436.2124460","DOIUrl":"https://doi.org/10.1145/2124436.2124460","url":null,"abstract":"The Session Initiation Protocol (SIP) was designed as a protocol to establish multimedia over IP sessions between endpoints. Several protocol elements have been introduced to support common features such as call redirection and transfer performed at the endpoints. At the same time, real-world deployments have shown that intermediaries are commonly deployed in the network to provide advanced features. Conflicts between these protocol elements and intermediary application servers may lead to failure of operations and undesirable feature interactions. This paper examines the problems and proposes a general solution suite which includes suggested handling of these protocol elements and feature interaction management. The benefits include smooth interoperability of endpoint protocol elements and network-resident applications, and desirable overall service behavior.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experiments with SIP over TLS in an NG-9-1-1 testbed 基于TLS的SIP协议在NG-9-1-1测试台上的实验
Principles, Systems and Applications of IP Telecommunications Pub Date : 2011-08-01 DOI: 10.1145/2124436.2124445
M. Suresh, A. Goulart, U. Desai, W. Magnussen
{"title":"Experiments with SIP over TLS in an NG-9-1-1 testbed","authors":"M. Suresh, A. Goulart, U. Desai, W. Magnussen","doi":"10.1145/2124436.2124445","DOIUrl":"https://doi.org/10.1145/2124436.2124445","url":null,"abstract":"Security is an important concern in Voice over IP (VoIP) applications. An approach to securing the signaling, such as the Session Initiation Protocol (SIP) messages, is by using Transport Layer Security (TLS). Several studies have been done to measure the impact of using TLS on SIP. However, there have not been any tests on the use of TLS in the scenario of emergency IP-based calls, such as Next Generation 9-1-1 (NG-9-1-1) calls. We propose to demonstrate NG-9-1-1 calls over TLS, and present preliminary statistics of different call scenarios.","PeriodicalId":243241,"journal":{"name":"Principles, Systems and Applications of IP Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信