Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.最新文献

筛选
英文 中文
Internet topology measurement 互联网拓扑测量
Y. Shavitt
{"title":"Internet topology measurement","authors":"Y. Shavitt","doi":"10.1109/CONTEL.2005.185998","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185998","url":null,"abstract":"The Internet is a vital tool in all aspects of today’s life. Its operation, however, is far from being optimal, and only in some cases satisfactory. In order to understand its operation and suggest ways to improve it, one needs to know the fundamental characteristics of the interactions in the network at all levels: packets, flows, devices, and entire networks. However, the Internet was not built with measurement as a fundamental feature, thus tools and techniques had to be built to enable measuring and analyzing various aspects of its operations. This tutorial will give the participants a review of Internet measurement techniques at various levels. After a short review of basic Internet features, we will discuss the reasons for measuring the Internet, what can be measured, how, where, and when it can be done, with examples from previous projects. The tutorial will also touch on modeling issues. A large part of the tutorial will focus on topology measurements, and will discuss the main challenges in this area.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125876849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service deployment strategies for telecom operators 电信运营商的业务部署策略
P. K. Mohanty
{"title":"Service deployment strategies for telecom operators","authors":"P. K. Mohanty","doi":"10.1109/CONTEL.2005.185863","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185863","url":null,"abstract":"The legacy circuit switched telecom networks typically use intelligent network architecture or adjunct platforms for enhanced services such as Free Phone, Voice VPN, calling card and messaging. As the telecom operators deploy Voice over Internet Protocol to migrate towards a common packet based infrastructure for voice and data, they want the services to work across both circuit switched and packet networks. This paper examines the service deployment strategies for telecom operators during this network migration phase.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126249097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location-aware information services using user profile matching 使用用户配置文件匹配的位置感知信息服务
A. Devlic, G. Jezic
{"title":"Location-aware information services using user profile matching","authors":"A. Devlic, G. Jezic","doi":"10.1109/CONTEL.2005.185885","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185885","url":null,"abstract":"User profiles are used to integrate contextual information about mobile users and objects/devices in their environment. They represent structured knowledge used by a system to provide relevant information set to the user.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
New possibilities for knowledge discovery in telecommunication companies 电信公司知识发现的新可能性
B. Nadinic, R. Buzdon
{"title":"New possibilities for knowledge discovery in telecommunication companies","authors":"B. Nadinic, R. Buzdon","doi":"10.1109/CONTEL.2005.185865","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185865","url":null,"abstract":"Using knowledge discovery techniques in telecommunication companies has already become an established practice, mostly for segmentation and prediction of customers that will leave the provider. This work demonstrates on data from a regional telecommunication provider how knowledge discovery techniques can be used to create a model that will predict which customers will cease paying their bills. Three different phases of the project are discussed: modelling, analysis and model evaluation. This work shows that knowledge discovery techniques can be successfully used for additional company-specific purposes.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"77 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OCDMA headers properties impact on an alloptical packet router module OCDMA报头属性对一个相对包路由器模块的影响
A. Teixeira, T. Silveira, A. Ferreira, P. André, P. Monteiro, M. Lima, R. Nogueira, J. Rocha
{"title":"OCDMA headers properties impact on an alloptical packet router module","authors":"A. Teixeira, T. Silveira, A. Ferreira, P. André, P. Monteiro, M. Lima, R. Nogueira, J. Rocha","doi":"10.1109/CONTEL.2005.185946","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185946","url":null,"abstract":"In this paper we assess experimentally the performance dependence of a Cross Gain Modulation all- optical router architecture module on power of Optical Code Division Multiple Access headers. The technique allows transparency of high data rate packets based on Cross Gain Modulation process, which is normally quite limited in terms of rate performance. I. INTRODUCTION Current telecommunications network traffic demands are evolving quite rapidly with the increasing number of services. This traffic growth, up to now, has been kept up with the widespread use of WDM (wavelength division multiplexing) transmission technology. However, the adoption of the latter technology has also meant that electronic packet routers will have to terminate a large number of WDM ports each carrying high data rate traffic. There is much evidence to suggest that the processing capabilities of electronic routers will not cope with the rate of traffic growth in the near future. This fact motivates the search of alternatives to route the traffic in the optical layer, which has significant speed performance advantages. There have been numerous efforts in the area of all- optical packet switching, where some of the functions of electronic routers are now performed directly in the optical layer. Most of these efforts come under the banner of GMPLS and aim to switch packets based on the contents of an optical label. One of the functions that any router, electrical or optical, has to perform, is to decode the contents of a packet header/label and look it up in a table, called LIB (label information base), to decide the appropriate destination port to forward the packet to, and replace the label with a new one. In most packet switching concepts and demonstrators presented so far, the header or lookup is most often implemented with electronics. However, some approaches are already doing it entirely on the optical domain","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The vision on future TD-SCDMA 对未来TD-SCDMA的展望
Guangyi Liu, Jianhua Zhang, Ping Zhang
{"title":"The vision on future TD-SCDMA","authors":"Guangyi Liu, Jianhua Zhang, Ping Zhang","doi":"10.1109/CONTEL.2005.185826","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185826","url":null,"abstract":"As the increasing demand for mobile data service, 2Mbps peak data rate of TD-SCDMA will not fulfill the user’s need any more in several years. While the new B3G system to provide high data rate service is still not available until 2010, the current TD-SCDMA must be enhanced to fulfill the requirement of the new service. As one 3G standard accepted by ITU and 3GPP, TD-SCDMA should also be enhanced and improved as WCDMA and CDMA2000. In this paper, the future vision on the evolution and enhancement of TD-SCDMA is given out. According to our research, the smooth evolution from TD-SCDMA to B3G TDD can be summarized as five phases: TSM, LCR, HDR, B3G TDD and after 4G; while the research and development on TD-SCDMA enhancement can be done from the aspects of Generalized Distributed Antenna Arrays (GDAA), Dynamical Radio Resource Management, MIMO, AMC, etc. Finally, a High Data Rate proposal for TDSCDMA is presented as a reference for future research on this topic, and the peak data rate is 3.96Mbps.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"81 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133763766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovering services from mobile terminal by means of peer-to-peer networking and semantic descriptions 通过点对点网络和语义描述的方式发现移动终端上的服务
D. Ramljak
{"title":"Discovering services from mobile terminal by means of peer-to-peer networking and semantic descriptions","authors":"D. Ramljak","doi":"10.1109/CONTEL.2005.185881","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185881","url":null,"abstract":"This paper deals with application of P2P technology and semantic description of services in solving the problem of discovering Internet services from a mobile terminal. As a solution to this problem, we propose the system named Semantic Web Services Discovery (SWSD). This system is based on P2P technology, semantic description of Internet services, and access from a mobile terminal. The JXTA P2P platform is chosen as an implementation of P2P technology, and DAML-S is chosen for semantic description of services. This paper elaborates the architecture and implementation of SWSD system. The runtime operation of the system is verified through the case study of finding the stock exchange information on the Internet from a mobile terminal.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133823098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interaction of firewalls and network address translators with internet applications 防火墙和网络地址转换器与互联网应用程序的交互
C. Aoun, E. Davies, H. Tschofenig, S. Thiruvengadam
{"title":"Interaction of firewalls and network address translators with internet applications","authors":"C. Aoun, E. Davies, H. Tschofenig, S. Thiruvengadam","doi":"10.1109/CONTEL.2005.185907","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185907","url":null,"abstract":"This document provides an overview of the impact of NATs and Firewalls on Internet applications and then describes state-of-the-art solutions and current research initiatives that allow applications to work in the presence of NATs and Firewalls. Firewalls and Network Address Translators are inevitable in modern Internet as they play a very important role in protecting and managing network resources but these middleboxes are obstacles for multimedia traffic that use dynamic ephemeral ports. There is a need for a signaling protocol, which can request a change of policy rules in a firewall or creation of a binding in the NAT. To develop a protocol or to design a network architecture, it is necessary to understand the implication of middleboxes such as NATs and Firewalls with respect to the deployment of services like Voice over IP. Different solutions for middlebox traversal have been developed over the past years with different constraints and limitations. This document compares these approaches against common criteria.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formalizing operator requirements for the development of telecommunications networks and services 规范运营商对电信网络和业务发展的要求
K. Brzezinski
{"title":"Formalizing operator requirements for the development of telecommunications networks and services","authors":"K. Brzezinski","doi":"10.1109/CONTEL.2005.185969","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185969","url":null,"abstract":"In the industrial context, the link between standardized service/protocol specifications and the needs of a network operator has been mostly informal, which breaks the \"formality chain\" of the system life-cycle. We present the idea of formalized operator requirements (ORs) that can be effectively used by network operators as a backbone of their development activities. We define a semi-formal OR notation and discuss its properties. We show how it may support network development tasks that require the handling of relations between the capabilities of signalling protocols and implementable services. We also present the support tool that has actually been used to handle ORs for the ISUPv2 signalling platform","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of a burstiness curve for FBM traffic and token bucket shaping algorithm FBM流量突发曲线分析及令牌桶整形算法
L. Janowski, Z. Papir
{"title":"Analysis of a burstiness curve for FBM traffic and token bucket shaping algorithm","authors":"L. Janowski, Z. Papir","doi":"10.1109/CONTEL.2005.185923","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185923","url":null,"abstract":"The paper presents a burstiness curve - a trade- off between Token Bucket descriptors - derived for a FBM traffic model using an envelope analysis. The burstiness curve is defined by traffic parameters (mean, variance, and Hurst parameter) and the considered Token Bucket packet drop probability. The Obtained results allow for more control to be imposed on Token Bucket parameters, when shaping the traffic of a particular service on the network.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信