{"title":"Sound excerpt based similarity search in P2P applications","authors":"G. Richly, G. Hosszú, F. Kovács","doi":"10.1109/NETWKS.2008.4763743","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763743","url":null,"abstract":"The increasing popularity of file sharing systems was practically grounded by music recordings becoming widely available. The successful introduction was closely followed by new systems, all utilizing search methods essentially based on meta-data. In this article a measure for audio similarity is proposed. The frequency of the amplitude values of the sound wave signal is determined and utilized in a previously developed content searching procedure to achieve automatic classification. The new, low complexity inspection method enables to determine more local characteristics then the amplitude-histogram, such as the silence periods. The length of the determined periods and their relative position increase the dimension of the similarity measure.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"61 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128346085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tugkan Tuglular, Fusun Cetin, Oguz Yarimtepe, Gurcan Gercek
{"title":"Firewall configuration management using XACML policies","authors":"Tugkan Tuglular, Fusun Cetin, Oguz Yarimtepe, Gurcan Gercek","doi":"10.1109/NETWKS.2008.4763735","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763735","url":null,"abstract":"This paper proposes an architecture for XACML based management of firewall configurations in large enterprise networks. The goal of this architecture is to allow administrators and end-users to manage their firewalls, while enforcement of organizational policy is ensured to prevent unacceptable traffic gaining access to the private network domain. The central architectural component is the domain policy server which pushes organizational policy down to firewalls deployed in its domain. In addition to its reporting function, the domain policy server monitors and verifies policy changes, i.e. checks for inter- and intrafirewall anomalies, on any firewall within its domain. The proposed architecture includes firewall agent components, where one resides on each firewall, through which coordinated operations on firewall policies are achievable. Firewall policies, topologies, and configuration messages that are stored and exchanged within the architecture are presented in XML. Although available XACML is used for the representation of firewall policies, two DTDs are developed to express topologies and configuration messages. A prototype implementation of this architecture is presented in this paper along with examples of firewall configuration management operations.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127205171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS as the tool for enabling Broadband commodity within access networks","authors":"E. Areizaga, A. Foglar, A. J. Elizondo","doi":"10.1109/NETWKS.2008.6231321","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.6231321","url":null,"abstract":"This paper describes the QoS features that will transform the access networks landscape in order to bring “‘Broadband’” as a commodity while setting up the pillars of the “‘Future Media Internet’”. Quality of Experience is obviously key for emerging and future services. Broadcasting services will first need to equal the QoE of their counterparts in the Open-air market (for IP-TV examples would be artifact-free, no picture freezing, fast zapping times) and offer new features often using interactivity (Time-shifted TV, access to more content, 3DTV with feeling of presence). The huge variety of communications alternatives will lead to different requirements per customer, whose needs will also be dependent on parameters like where the connection is made, the time of the day/day of the week/period of the year or even his/her mood. Today's networks, designed for providing just Broadband connectivity, will not be enough to satisfy customer's needs and will necessarily support the introduction of new and innovative services. The Networks of the future should learn from the way the users are communicating, what services they are using, where, when, and how, and adapt accordingly.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Telco goes for IT A Service Oriented IT Infrastructure for Next Generation Networks","authors":"G. Carls, B. Frohnhoff","doi":"10.1109/NETWKS.2008.4763689","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763689","url":null,"abstract":"This article presents the benefits for Telco operators by introducing a Service Oriented Infrastructure (SOI) as basic fundament of NGN services in a converging Telco and IT market.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Casier, Andy Gouwy, S. Verbrugge, D. Colle, M. Pickavet, P. Demeester
{"title":"Using discrete event simulation to reduce operational expenses for a telecom operator","authors":"K. Casier, Andy Gouwy, S. Verbrugge, D. Colle, M. Pickavet, P. Demeester","doi":"10.1109/NETWKS.2008.4763733","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763733","url":null,"abstract":"Capital expenditures for a network operator have often and in high detail been considered in different studies. In contrast there are little or no studies in which a detailed (quantitative) study is made on operational expenditures (OpEx). Existing studies on operational expenditures for network operators propose classification and models for existing operational processes and are aimed at a cost calculation (based on averages of time and resource consumption). While such studies allow comparing different technologies or operational solutions to each other, they allow no optimization of the existing projects. Additionally they also neglect the clear and important link of an operational process and several timing aspects and constraints. For instance typical telecom service level agreements often cite maximum downtime or handling time.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129179814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient algorithm for designing reliable ip networks with an access/edge/core hierarchical structure","authors":"S. Chamberland","doi":"10.3138/infor.47.2.117","DOIUrl":"https://doi.org/10.3138/infor.47.2.117","url":null,"abstract":"In this paper, we tackle the design problem of reliable internet protocol (IP) networks with a three-level (access/edge/core) hierarchical structure. This problem consists in selecting the number of routers and their types to install at each level, selecting the port types to install in each router, finding the access, edge and core networks, selecting the link types and routing the traffic within the network. The routes are computed using the shortest paths using link metrics as the lengths of the links such as for the open shortest path first (OSPF) routing protocol, i.e., the most widely deployed intra domain routing protocol for IP networks. Moreover, a minimum information rate (MIR) traffic parameter is guarantee between each pair of clients for the normal state of the network and for all single edge and core links failure scenarios. A tabu search algorithm is proposed to find network solutions rapidly. Finally, numerical results are presented and analyzed. The results show that the algorithm found solutions, on average, within 3.26% of the optimal solutions.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The concept and model of Unique Name Service for convergent networks","authors":"B. Gódor, Tamás Jakabfy, G. Sallai","doi":"10.1109/NETWKS.2008.4763680","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763680","url":null,"abstract":"The present paper introduces a novel concept for identifying subscribers in convergent telecommunication networks with a unique identifier. This unique identification is independent of the providers the subscriber is in contract with and can be independent of the services the subscriber uses. The concept is termed as Unique Name Service (UNS) that is an extension of the FMC one-number concept and the generalization of the presently available naming and addressing services such as ENUM and UCI. In contrast to the current naming and addressing services, the UNS does not restrict the format of the unique user identifier i.e. it provides a generic, flexible and future proof service. Beyond the description of the UNS concept, we also define its abstract model, which we use to give design guidelines for the real-life implementation of the UNS.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architectural model of enterprise multiservice network maintaining mobility","authors":"N. Kryvinska, L. Auer, P. Zinterhof, C. Strauss","doi":"10.1109/NETWKS.2008.4763679","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763679","url":null,"abstract":"The global dealing demands flexibility in when and how work gets done, as modern businesses increasingly require real-time responses to partners and customers. With low costs, companies look to mobility as a way to speed responsiveness and increase the personalization of their customer service offerings. Mobility can bring enterprises directly in touch with the customer, creating an interaction and not only a transaction. In addition, the fact that many companies do business beyond their local area raises the need to be able to continue operating even in the event of a local or regional crisis. For this reason, mobility is one of the key pillars of a business continuity plan. It is also a key element of networking that allows enterprises to unlock their business process from fixed points. Although wireless networking is one of the most important structural components of an overall mobile strategy, mobility consists of much more than just WLANs. A unified approach to enterprise mobility delivers integrated wired and wireless networking, mobile extensions to unified communications, geographic and end-point independent network access and location services as its major architectural components. As a consequence, this paper focuses on a converged architecture that spans wired and wireless networks to enable a seamless delivery of integrated services across the enterprise. We construct a service scenario framework for this architecture and also put forward an analytical model of the delivery framework for analyzing network behavior response for the inclusion of new services.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132662323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing reliable WDM networks — A global approach","authors":"S. Chamberland, A. Bahri","doi":"10.1109/NETWKS.2008.4763726","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763726","url":null,"abstract":"In this paper, we address the global problem of designing reliable wavelength division multiplexing (WDM) networks including the traffic grooming. This global problem consists in finding the number of optical fibers between each pair of optical nodes, finding the configuration of each node with respect to transponders, finding the virtual topology (i.e., the set of lightpaths), routing the lightpaths, grooming the traffic (i.e, grouping the connections and routing them over the lightpaths) and, finally, assigning wavelengths to the lightpaths. Instead of partitioning the problem into subproblems and solving them successively, we propose a mathematical programming model that addresses it as a whole. This approach has the advantage of providing better results since, in general, optimal solutions to all subproblems do not provide an optimal solution to the global problem. Numerical results show the relevance of designing the physical layer and finding the traffic grooming simultaneously.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Domínguez-Dorado, J. Gónzalez-Sánchez, J. Domingo-Pascual
{"title":"PILEP: a contribution to PCE-based interdomain path computation","authors":"M. Domínguez-Dorado, J. Gónzalez-Sánchez, J. Domingo-Pascual","doi":"10.1109/NETWKS.2008.4763712","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763712","url":null,"abstract":"The process of computing routes that network traffic must follow throughout Internet has become more complex in the last years. Nowadays, this process is subject to the application of several constraints related to traffic engineering, resources management, quality of the offered services, security or robustness. The application of all these constraints has caused an increase of complexity of those nodes in charge of path computation. Sometimes, the amount of time and resources spent to compute routes is superior to resources used in the main task of these nodes: traffic classification and forwarding. PCE (Path Computation Element) architecture is being developed to diminish that problem in the context of constraint-based path computation for MPLS (Multiprotocol Label Switching). Although research work in relation to this topic is making progress quickly, there are still some unsolved aspects. As a contribution to PCE development, in this work we present a mechanism called PILEP (Procedure for Interdomain Location of External PCEs) that allows the dynamic discovery of routes computation elements in interdomain environments, making use of the existing routing protocols.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116131720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}