4,911 research outputs found

    A Brief History of Mobile Telecommunication in Europe

    Get PDF
    Since the introduction of mobile telephony in the early fifties in Europe, US and Japan the demand for this service exploded. It seems that the latent demand for mobile telecommunication services for decade's continued to be very strong. Since the introduction of cellular technology the capacity of the services increasingly became able to meet the massive demand. Next and future generations of mobile telecommunication technologies bring increased transmission speed and more versatile services. This forces network operators to organise multi- sourced information flows supplied by service providers to increase the network effect of the system instead of providing the network infrastructure and leave the content to the users as in pure voice telephony. The drivers and inhibitors behind the emergence and recent developments of mobile telecommunications systems in Europe are highlighted in this paper. Liberalisation of the telecom markets in Europe drove new entrants to the market and curbed excessive pricing. However, in recent years the lack of challenging service is the main cause for the wavering development of newer generations of mobile telecommunication services.Telecommunications, Market Structure, Production, Pricing, Technological Change, Economic History, Europe

    Forum Session at the First International Conference on Service Oriented Computing (ICSOC03)

    Get PDF
    The First International Conference on Service Oriented Computing (ICSOC) was held in Trento, December 15-18, 2003. The focus of the conference ---Service Oriented Computing (SOC)--- is the new emerging paradigm for distributed computing and e-business processing that has evolved from object-oriented and component computing to enable building agile networks of collaborating business applications distributed within and across organizational boundaries. Of the 181 papers submitted to the ICSOC conference, 10 were selected for the forum session which took place on December the 16th, 2003. The papers were chosen based on their technical quality, originality, relevance to SOC and for their nature of being best suited for a poster presentation or a demonstration. This technical report contains the 10 papers presented during the forum session at the ICSOC conference. In particular, the last two papers in the report ere submitted as industrial papers

    Optimisation of Mobile Communication Networks - OMCO NET

    Get PDF
    The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University. The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing

    IT contribution in the consolidation of organizational competences - A case study on a hotel group

    Get PDF
    The information economy is based on the net appliance, which decreases the intermediary's participation in the activities of purchase and sale of products and services.The tourism sector has its activities based on information in which its products are considered low touch, where the purchaser acquires a service without a physical approaching with it.However, it can be noticed that there is still a trade off between embracing and wealth, but day-by-day it is reduced by the increasing use of Information Technology and communication through its information system.The advancement of IT allied to business' strategic can establish new models of business to observe in a more efficient way the sectors innovation that works intensively with information, contributing with the competence consolidation aiming the client and connected network attendance.This paper analyses, through a case study in a big Hotel network, some aspects that are related to IT's application for competitiveness increasing. Such aspects are related to the entrepreneur's strategic articulation as the general configuration of Front Office and Back Office, client's communication improvement, the use of web, client fidelity, disintermediation of activities and cultural activities adaptation on the services offering

    A source-destination based dynamic pricing scheme to optimize resource utilization in heterogeneous wireless networks

    Get PDF
    Mobile wireless resources demand is rapidly growing due to the proliferation of bandwidth-hungry mobile devices and applications. This has resulted in congestion in mobile wireless networks (MWN) especially during the peak hours when user traffic can be as high as tenfold the average traffic. Mobile network operators (MNOs) have been trying to solve this problem in various ways. First, MNOs have tried to expand the network capacity but have still been unable to meet the peak hour demand. Focus has then shifted to economic and behavioral mechanisms. The widely used of these economic mechanisms is dynamic pricing which varies the MWN resources' price according to the congestion level in the MWN. This encourages users to shift their non-critical traffic from the busy hour, when the MWN is congested, to off-peak hours when the network is under-utilized. As a result, congestion of the MWN during the peak hours is reduced. At the same time, the MWN utilization during the off-peak hours is also increased. The current dynamic pricing schemes, however, only consider the congestion level in the call-originating cell and neglect the call-destination cell when computing the dynamic price. Due to this feature, we refer the current dynamic pricing schemes as source–based dynamic pricing (SDP) schemes in this work. The main problem with these schemes is that, when the majority of the users in a congested cell are callees, dynamic pricing is ineffective because callers and not callees pay for network services, and resources used by callers and callees are the same for symmetric services. For example, application of dynamic pricing does not deter a callee located in a congested cell from receiving a call, which originates from a caller located in an uncongested cell. Also, when the distribution of prospective callees is higher than that of callers in an underutilized cell, SDP schemes are ineffective as callees do not pay for a call and therefore low discounts do not entice them to increase utilization. In this distribution, dynamic pricing entices prospective callers to make calls but since their distribution is low, the MWN resource utilization does not increase by any significant margin. To address these problems, we have developed a source-destination based dynamic pricing (SDBDP) scheme, which considers congestion levels in both the call-originating and calldestination cells to compute the dynamic price to be paid by a caller. This SDBDP scheme is integrated with a load-based joint call admission control (JCAC) algorithm for admitting incoming service requests in to the least utilized radio access technology (RAT). The load-based JCAC algorithm achieves uniform traffic distribution in the heterogeneous wireless network (HWN). To test the SDBDP scheme, we have developed an analytical model based on M/M/m/m queuing model. New or handoff service requests, arriving when all the RATs in the HWN are fully utilized, lead to call blocking for new calls and call dropping for handoff calls. The call blocking probability, call dropping probability and percentage MWN utilization are used as the performance metrics in evaluating the SDBDP scheme. An exponential demand model is used to approximate the users' response to the presented dynamic price. The exponential demand model captures both the price elasticity of demand and the demand shift constant for different users. The matrix laboratory (MATLAB) tool has been used to carry out the numerical simulations. An evaluation scenario consisting of four groups of co-located cells each with three RATs is used. Both SDP and the developed SDBDP schemes have been subjected under the evaluation scenario. Simulation results show that the developed SDBDP scheme reduces both the new call blocking and handoff call dropping probabilities during the peak hours, for all callercallee distributions. On the other hand, the current SDP scheme only reduces new call blocking and handoff call dropping probabilities only under some caller –callee distributions (When the callers were the majority in the HWN). Also, the SDBDP scheme increases the percentage MWN utilization during the off-peak for all the caller-callee distributions in the HWN. On the other hand, the SDP scheme is found to increase the percentage MWN utilization only when the distribution of callers is higher than that of callees in the HWN. From analyzing the simulations results, we conclude that the SDBDP scheme achieves better congestion control and MWN resource utilization than the existing SDP schemes, under arbitrary caller-callee distribution

    Self-configuring resource management in cooperative and uncooperative autonomous systems

    Get PDF
    In several circumstances, cooperation among autonomous agents is a prerequisite for effective or efficient task processing. This stems from the inherent or transient asymmetry of the agents resources and capabilities. Since agents process tasks autonomously, they have to decide by themselves under which conditions and to which means they cooperate. Such local decision making renders dedicated entities for resource management dispensable and, thus, may increase the systems fault-tolerance. In this report, we propose a framework for self-configuring resource management in cooperative and uncooperative environments. Therefore, we recognize the relatedness of autonomous agents and economic entities. Both are REMMs assess their resources and demands locally which leads to more efficiency of the overall system. We identify and discuss two dimensions of autonomy, i.e. principal-agent and inter-agent autonomy

    Naming and discovery in networks : architecture and economics

    Get PDF
    In less than three decades, the Internet was transformed from a research network available to the academic community into an international communication infrastructure. Despite its tremendous success, there is a growing consensus in the research community that the Internet has architectural limitations that need to be addressed in a effort to design a future Internet. Among the main technical limitations are the lack of mobility support, and the lack of security and trust. The Internet, and particularly TCP/IP, identifies endpoints using a location/routing identifier, the IP address. Coupling the endpoint identifier to the location identifier hinders mobility and poorly identifies the actual endpoint. On the other hand, the lack of security has been attributed to limitations in both the network and the endpoint. Authentication for example is one of the main concerns in the architecture and is hard to implement partly due to lack of identity support. The general problem that this dissertation is concerned with is that of designing a future Internet. Towards this end, we focus on two specific sub-problems. The first problem is the lack of a framework for thinking about architectures and their design implications. It was obvious after surveying the literature that the majority of the architectural work remains idiosyncratic and descriptions of network architectures are mostly idiomatic. This has led to the overloading of architectural terms, and to the emergence of a large body of network architecture proposals with no clear understanding of their cross similarities, compatibility points, their unique properties, and architectural performance and soundness. On the other hand, the second problem concerns the limitations of traditional naming and discovery schemes in terms of service differentiation and economic incentives. One of the recurring themes in the community is the need to separate an entity\u27s identifier from its locator to enhance mobility and security. Separation of identifier and locator is a widely accepted design principle for a future Internet. Separation however requires a process to translate from the identifier to the locator when discovering a network path to some identified entity. We refer to this process as identifier-based discovery, or simply discovery, and we recognize two limitations that are inherent in the design of traditional discovery schemes. The first limitation is the homogeneity of the service where all entities are assumed to have the same discovery performance requirements. The second limitation is the inherent incentive mismatch as it relates to sharing the cost of discovery. This dissertation addresses both subproblems, the architectural framework as well as the naming and discovery limitations
    corecore