539 research outputs found

    Rerouting Technique for Faster Restoration of Preempted Calls

    Get PDF
    In a communication network where resources are shared between instantaneous request (IR) and book-ahead (BA) connections, activation of future BA connections causes preemption of many on-going IR connections upon resource scarcity. A solution to this problem is to reroute the preempted calls via alternative feasible paths, which often does not ensure acceptably low disruption of service. In this paper, a new rerouting strategy is proposed that uses the destination node to initiate the rerouting and thereby reduces the rerouting time, which ultimately improves the service disruption time. Simulations on a widely used network topology suggest that the proposed rerouting scheme achieves more successful rerouting rate with lower service disruption time, while not compromising other network performance metrics like utilization and call blocking rate

    Real-time bandwidth encapsulation for IP/MPLS Protection Switching

    Get PDF
    Bandwidth reservation and bandwidth allocation are needed to guarantee the protection of voice traffic during network failure. Since voice calls have a time constraint of 50 ms within which the traffic must be recovered, a real-time bandwidth management scheme is required. Such bandwidth allocation scheme that prioritizes voice traffic will ensure that the voice traffic is guaranteed the necessary bandwidth during the network failure. Additionally, a mechanism is also required to provide the bandwidth to voice traffic when the reserved bandwidth is insufficient to accommodate voice traffic. This mechanism must be able to utilise the working bandwidth or bandwidth reserved for lower priority applications and allocate it to the voice traffic when a network failure occurs

    End to End Inter-domain Quality of Service Provisioning

    Get PDF

    Integrating Context-Awareness in the IP Multimedia Subsystem for Enhanced Session Control and Service Provisioning Capabilities

    Get PDF
    The 3GPP-defined IP Multimedia Subsystem (IMS) is becoming the de-facto standard for IP-based multimedia communication services. It consists of an overlay control and service layer that is deployed on top of IP-based mobile and fixed networks. This layer encompasses a set of common functions (e.g. session control functions allowing the initiation/modification/termination of sessions) and service logics that are needed for the seamless provisioning of IP multimedia services to users, via different access technologies. As it continues to evolve, the IMS still faces several challenges including: the enabling of innovative and personalized services that would appeal to users and increase network operators' revenues; its interaction with other types of networks (e.g. wireless sensor networks) as means to enhance its capabilities; and the support of advanced QoS schemes that would manage the network resources in an efficient and adaptive manner. The context-awareness concept, which comes from the pervasive computing field, signifies the ability to use situational information (or context) in support to operations and decision making and for the provision of relevant services to the user. Context-awareness is considered to enhance users' experience and is seen as an enabler to adaptability and service personalization - two capabilities that could play important roles in telecommunication environments. This thesis focuses on the introduction of the context-awareness technology in the IMS, as means to enhance its session control and service provisioning capabilities. It starts by presenting the necessary background information, followed by a derivation of requirements and a review of the related work. To ensure the availability of contextual information within the network, we then propose an architecture for context information acquisition and management in the IMS. This architecture leverages and extends the 3GPP presence framework. Building on the capabilities of this architecture, we demonstrate how the managed information could be integrated in IMS operations, at the control and service levels. Showcasing control level integration, we propose a novel context-aware call differentiation framework as means to offer enhanced QoS support (for sessions/calls) in IMS-based networks. This framework enables the differentiation between different categories of calls at the IMS session control level, via dynamic and adaptive resource allocation, in addition to supporting a specialized charging model. Furthermore, we also propose a framework for enhanced IMS emergency communication services. This framework addresses the limitations of existing IP-based emergency solutions, by offering three main improvements: a QoS-enhanced emergency service; a context-aware personalized emergency service; and a conferencing-enhanced emergency service. We demonstrate the use of context awareness at the IMS service level using two new context-aware IMS applications. Finally, to validate our solutions and evaluate their performance, we build various proof-of-concept prototypes and OPNET simulation model

    Fencing Cyberspace: Drawing Borders in a Virtual World

    Get PDF
    In the last few years, the Internet has increasingly become a source of information even for the historically computer illiterate. The growing popularity of the Internet has been driven in large part by the World Wide Web (web). The web is a system that facilitates use of the Internet by helping users sort through the great mass of information available on it. The web uses software that allows one document to link to and access another, and so on, despite the fact that the documents may reside on different machines in physically remote locations. The dispersion of data that is the Internet is thus largely overcome by the web\u27s ability to link related information in a manner transparent to the user. This has helped to make the Internet into a medium of mass communication and a vast commercial marketplace

    Performance Modelling and Resource Allocation of the Emerging Network Architectures for Future Internet

    Get PDF
    With the rapid development of information and communications technologies, the traditional network architecture has approached to its performance limit, and thus is unable to meet the requirements of various resource-hungry applications. Significant infrastructure improvements to the network domain are urgently needed to guarantee the continuous network evolution and innovation. To address this important challenge, tremendous research efforts have been made to foster the evolution to Future Internet. Long-term Evolution Advanced (LTE-A), Software Defined Networking (SDN) and Network Function Virtualisation (NFV) have been proposed as the key promising network architectures for Future Internet and attract significant attentions in the network and telecom community. This research mainly focuses on the performance modelling and resource allocations of these three architectures. The major contributions are three-fold: 1) LTE-A has been proposed by the 3rd Generation Partnership Project (3GPP) as a promising candidate for the evolution of LTE wireless communication. One of the major features of LTE-A is the concept of Carrier Aggregation (CA). CA enables the network operators to exploit the fragmented spectrum and increase the peak transmission data rate, however, this technical innovation introduces serious unbalanced loads among in the radio resource allocation of LTE-A. To alleviate this problem, a novel QoS-aware resource allocation scheme, termed as Cross-CC User Migration (CUM) scheme, is proposed in this research to support real-time services, taking into consideration the system throughput, user fairness and QoS constraints. 2) SDN is an emerging technology towards next-generation Internet. In order to improve the performance of the SDN network, a preemption-based packet-scheduling scheme is firstly proposed in this research to improve the global fairness and reduce the packet loss rate in SDN data plane. Furthermore, in order to achieve a comprehensive and deeper understanding of the performance behaviour of SDN network, this work develops two analytical models to investigate the performance of SDN in the presence of Poisson Process and Markov Modulated Poisson Process (MMPP) respectively. 3) NFV is regarded as a disruptive technology for telecommunication service providers to reduce the Capital Expenditure (CAPEX) and Operational Expenditure (OPEX) through decoupling individual network functions from the underlying hardware devices. While NFV faces a significant challenging problem of Service-Level-Agreement (SLA) guarantee during service provisioning. In order to bridge this gap, a novel comprehensive analytical model based on stochastic network calculus is proposed in this research to investigate end-to-end performance of NFV network. The resource allocation strategies proposed in this study significantly improve the network performance in terms of packet loss probability, global allocation fairness and throughput per user in LTE-A and SDN networks; the analytical models designed in this study can accurately predict the network performances of SDN and NFV networks. Both theoretical analysis and simulation experiments are conducted to demonstrate the effectiveness of the proposed algorithms and the accuracy of the designed models. In addition, the models are used as practical and cost-effective tools to pinpoint the performance bottlenecks of SDN and NFV networks under various network conditions

    An optimal admission control protocol for heterogeneous multicast streaming services

    Get PDF
    We investigate optimal call admission control (CAC) policy for multicast streaming services (MSS) in 3rd generation (3G) and beyond wireless mobile networks. Several MSS sessions are supported simultaneously in a bandwidth-limited network. Active sessions are those that are currently serving some users, and inactive sessions are those that are currently not serving any users. An admission decision in MSS is required only when an inactive session is requested, unlike in unicasting. For this reason, if a user request for an inactive MSS session arrives, we should make an admission decision in anticipation of (i) the possible reward earned based on users served during a session active time generated by accepting it, and (ii) the influence of the session active time upon the future status of network bandwidth and admission decisions. Our objective is to determine when to admit or block a user asking an inactive MSS session to achieve the optimality in rewards. We formulate this problem as a semi-Markov decision process (SMDP), and a value iteration algorithm is used to obtain an optimal stationary deterministic policy. We also derive the user blocking probability of the optimal policy by analyzing an embedded Markov chain induced by it.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=26hb201

    The relationship between copyright and contract law

    Get PDF
    Contracts lie at the heart of the regulatory system governing the creation and dissemination of cultural products in two respects: (1) The exclusive rights provided by copyright law only turn into financial reward, and thus incentives to creators, through a contract with a third party to exploit protected material. (2) From a user perspective purchases of protected material may take the form of a licensing contract, governing behaviour after the initial transaction. Thus, a review of the relationship between copyright and contract law has to address both supply- and demand-side issues. On the supply side, policy concerns include whether copyright law delivers the often stated aim of securing the financial independence of creators. Particularly acute are the complaints by both creators and producers that they fail to benefit from the exponential increase in the availability of copyright materials on the Internet. On the demand side, the issue of copyright exceptions and their policy justification has become central to a number of reviews and consultations dealing with digital content. Are exceptions based on user needs or market failure? Do exceptions require financial compensation? Can exceptions be contracted out by licence agreements? This report (i) reviews economic theory of contracts, value chains and transaction costs, (ii) identifies a comprehensive range of regulatory options relating to creator and user contracts, using an international comparative approach, (iii) surveys the empirical evidence on the effects of regulatory intervention, and (iv) where no evidence is available, extrapolates predicted effects from theory

    The grand coalition versus competing coalitions: trade-offs in how to standardize

    Get PDF
    The standardization landscape in the Information and Communication technology industries is fragmented in many different standardization bodies, industry consortia, and alliances. Some of these coalitions cooperate with each other, while others compete. The existence of competing standardization coalitions may prevent coordination on a common standard. There is a lot of debate among practitioners and analysts about whether this fragmentation creates a coordination failure. This paper takes a middle ground in this debate. Competition between standardization coalitions may indeed harm compatibility, but it also helps to mitigate coordination failures within standardization bodies and coalitions. The negotiation process in a coalition can cause coordination failures of its own. An important failure is lack of timeliness, due to delaying tactics by company delegates in the coalition. Introducing competition between coalitions can speed up negotiations within them, and thus help to overcome this intracommittee coordination failure. A game theoretic model explores the effect of competition between coalitions on the speed of decision-making and standardization.Economics ;
    • …
    corecore