Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium最新文献

筛选
英文 中文
Economics of Video Telephony and VoIP over EV-DO Revision A 基于EV-DO的视频电话和VoIP经济学
Y. Krishnan, N. Raman, E. Zanone
{"title":"Economics of Video Telephony and VoIP over EV-DO Revision A","authors":"Y. Krishnan, N. Raman, E. Zanone","doi":"10.1109/NETWKS.2008.6231318","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.6231318","url":null,"abstract":"EV-DO Revision A, with its significantly higher carrier spectral efficiencies and data throughput enables VoIP, Video Telephony (VT) and other IMS applications to generate substantive value for telecom operators. In addition to preparing the operator network for future technology, these applications provide additional revenue opportunities while simultaneously bringing down both capital and operating expenses. Each of these two services - VT and VoIP - is economically viable on its own. Taken together, they offer additional synergistic benefits to the operator.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized synergy between 10 Gb/s and 40 Gb/s channels on a partially transparent network 部分透明网络中10gb /s通道和40gb /s通道的优化协同
A. Morea, T. Zami, F. Leplingard, D. Bayart
{"title":"Optimized synergy between 10 Gb/s and 40 Gb/s channels on a partially transparent network","authors":"A. Morea, T. Zami, F. Leplingard, D. Bayart","doi":"10.1109/NETWKS.2008.4763701","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763701","url":null,"abstract":"As optical networks are moving towards transparency to save expensive optoelectronic conversions, 40 Gb/s transmission technology appears on the field to meet the increasing capacity requirements. An advantage of transparent network is its independence of the bit rate and modulation format. Hence the transition from 10 to 40 Gb/s in a transparent network can be imagined as a gradual replacement of transponders working at 10 Gb/s with transponders at 40 Gb/s and the co-existence of both bit rates. In this paper we propose a routing method optimizing the exploitation of unused capacity in 40 Gb/s channels and also reducing the number of optoelectronic devices; we name this criterion ‘10/40 Gb/s synergy’. We show that routing 10 Gb/s demands at different bit rates is more performing than a routing at a fixed bit rate; we also show that the synergy minimize the number of required 40 Gb/s transponder as a function of traffic characteristics.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122493157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Kerckhoffs' principle for intrusion detection Kerckhoffs入侵检测原理
S. Mrdović, B. Perunicic
{"title":"Kerckhoffs' principle for intrusion detection","authors":"S. Mrdović, B. Perunicic","doi":"10.1109/NETWKS.2008.4763730","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763730","url":null,"abstract":"One of the basic principles of cryptography is that the security of a system must depend not on keeping secret the algorithm, but only the key. This principle is known as Kerckhoffs' Principle. In this paper we propose application of this principle in intrusion detection systems. The fact that attackers know the intrusion detection algorithm will not help them if there is a secret key for each implementation that makes it different enough from the others. Implementation of network packet payload anomaly detection IDS that enables application of the idea is presented. Results for various keys confirm excellent detection capabilities. Proof of concept mimicry attack protection example is provided.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130508579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Operator strategy and sustainability 运营商战略和可持续性
Niklas Carlheim-Muller
{"title":"Operator strategy and sustainability","authors":"Niklas Carlheim-Muller","doi":"10.1109/NETWKS.2008.4763751","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763751","url":null,"abstract":"? Main industry asset is the user community ? Critical area is to establish the mobile broadband business model ? Operators must co-operate on communication services, not compete ? IPTV / VoD is an industry opportunity ? Telecom 2.0 requires IMS","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dedicated protection scheme with availability guarantee 专用保护方案,保证可用性
János Tapolcai, P. Babarczi, P. Ho
{"title":"Dedicated protection scheme with availability guarantee","authors":"János Tapolcai, P. Babarczi, P. Ho","doi":"10.1109/NETWKS.2008.4763718","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763718","url":null,"abstract":"In this paper, a novel approach for availability evaluation is presented. In order to precisely capture the features of practical network operation and improve the accuracy in the availability evaluation, the dependency of network element failures is characterized by failure states (FS). For this purpose, a method that generating a failure state list for protection is developed and embedded in the proposed survivable routing algorithm such that the pre-defined connection availability can be guaranteed as simple as by protecting a single FS failure. Built on the availability evaluation a novel availability-constrained survivable routing algorithm, called Generalized Dedicated Protection (GDP), is introduced for circuit switched mesh networks. The proposed algorithm inherits the simplicity of dedicated protection mechanisms while offering the connection availability guarantee in presence of the network topological limitation that has been taken as the greatest challenge in the related research effort. Finally, extensive simulation is conducted to verify the advantages gained in the proposed GDP method compared with a number of previously reported counterparts.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114526538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cost models for Next Generation Networks with quality of service parameters 具有服务质量参数的下一代网络成本模型
L. Rodriguez de Lope, K. Hackbarth, A. Garcia, T. Plueckebaum, D. Ilić
{"title":"Cost models for Next Generation Networks with quality of service parameters","authors":"L. Rodriguez de Lope, K. Hackbarth, A. Garcia, T. Plueckebaum, D. Ilić","doi":"10.1109/NETWKS.2008.4763692","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763692","url":null,"abstract":"Most network operators and Internet service providers are offering Triple Play products that integrate services with different QoS requirements. A correct tariff scheme for these products should be correlated with the cost of production. This paper proposes a model based on TELRIC to calculate and distribute the cost of a network element according to the usage that each user type makes of it, based on the services demanded by the user. The cost model is based on the QoS required by different types of service and three traffic engineering methods: over-engineering, separated virtual tunnels and priority queuing, and studies their influence in costing estimation. The cost model is applied as an example to a connection between a DSLAM and a concentrator in order to estimate the influence of the QoS and the traffic engineering mechanisms in the resulting cost.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A model for analysis of SYN flood DoS attacks SYN flood拒绝服务攻击分析模型
N. Nissanke, Jun Sun
{"title":"A model for analysis of SYN flood DoS attacks","authors":"N. Nissanke, Jun Sun","doi":"10.1109/NETWKS.2008.4763729","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763729","url":null,"abstract":"Denial of Service (DoS) attacks pose a major threat to the use of the Internet for delivering critical commercial and public services. With reference to techniques that rely on better system configuration, in particular, TCP settings, this paper presents a novel mathematical model for understanding SYN flood DoS attacks considering both statistical properties of incoming legitimate and adversarial SYN traffic and, unlike in existing works, Round Trip Time (RTT) of TCP traffic. The approach relies on stochastic simulations for the general case but provides a closed-form solution for the case of incoming SYN traffic conforming to a Poisson process and backlog queues having an infinite capacity.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126368096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A financial and technological model for public regional broadband infrastructure 公共区域宽带基础设施的财务和技术模型
D. Pierattoni, D. Licursi, P. Montessoro
{"title":"A financial and technological model for public regional broadband infrastructure","authors":"D. Pierattoni, D. Licursi, P. Montessoro","doi":"10.1109/NETWKS.2008.6231297","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.6231297","url":null,"abstract":"Building an optical telecommunication network that allows operators offering broadband connection services stimulates the competitiveness and supports the spreading of services in a digital divided region. All the operators that wish to offer services to companies and private citizens can take advantage of this network, which allows them keeping their own operative independence while reaching the marginal areas in an effective way. This paper describes both financial and technological aspects of the successful development plan for a regional broadband infrastructure in Regione Friuli Venezia Giulia, Italy, evaluating costs and benefits of such long-term investments. Analyzing the regional project from a macro-economic point of view, the model appears to be attractive for all the involved stakeholders. Public intervention makes also the Region attractive to ICT operators, and more in general to investors.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126492966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
All-optical networks and switching technologies for a 3D videoconference system with feeling of presence 具有临场感的三维视频会议系统的全光网络和交换技术
A. Redondo, E. Sanchez, J. Z. Zaballa
{"title":"All-optical networks and switching technologies for a 3D videoconference system with feeling of presence","authors":"A. Redondo, E. Sanchez, J. Z. Zaballa","doi":"10.1109/NETWKS.2008.4763703","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763703","url":null,"abstract":"New ultra-low latency optical transmission and switching technologies are discussed in this paper. This work, carried out within the VISION project framework, sets the basis for building an ultra-low latency network for a high-quality videoconference system capable to provide a real feeling of presence, including 3D representation. The need of a full-optical transport network to achieve this aim is justified along the paper. The appropriate evolution of the switching techniques from optical circuit switching to optical packet switching is reasoned and the challenges hindering this evolution are stated. At a lower level, the technologies and materials available to perform optical switching, fulfilling the specific requirements, are reviewed. We present initial scalability simulations of electro-optic switches and future research in this field is posed. Finally, in this paper we propose and explain a design of a large optical packet switch employing optical labels.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bandwidth dimensioning in packet-based aggregation networks 基于分组的聚合网络中的带宽维度
W. Lautenschlaeger, W. Frohberg
{"title":"Bandwidth dimensioning in packet-based aggregation networks","authors":"W. Lautenschlaeger, W. Frohberg","doi":"10.1109/NETWKS.2008.4763737","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763737","url":null,"abstract":"Dimensioning of link capacities in packet networks in most cases is based on average traffic and some degree of over-provisioning. While mean traffic load is well understood and measurable, the appropriate degree of over-provisioning is a matter of guess and sometimes controversial disputes among experts. We show that traffic fluctuations around the mean value— and in consequence the required over-provisioning— are decisively influenced by the end user access capacity. A theoretical analysis of flow inter-arrival time and flow length probability distributions is used to derive a practical dimensioning rule for packet links in aggregation networks (LAN as well as WAN). The theory has been cross checked by real life experiments with real network equipment.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信