540 research outputs found

    VoIP under the EU regulatory framework : preventing foreclosure?

    Get PDF
    In June 2004, the European Commission (EC) issued an "Information and Consultation Document" (European Commission 2004) that discussed how the Regulatory Framework of the European Union (EU) should be adapted to accommodate Voice over IP (VoIP) and invited relevant parties to comment on the Consultation Document. In our study, we use the responses of the different market parties to identify how incumbents seek to foreclose the market for VoIP telephony. From these responses we conclude that foreclosure is not only attempted by setting high prices for the use of infrastructure, but also by the strategic choice of infrastructure technology, which raises the cost of entry. We label the latter form of foreclosure "technological foreclosure" – as opposed to "market foreclosure". A simple modeling exercise shows that regulators seeking to avoid market foreclosure might trigger technological foreclosure. We argue that this has happened with the unbundling of the local loop in the EU, and that it might happen again with the transition to VoIP. We conclude that the current rights and obligations assigned to telecom companies effectively protect incumbents from competition by VoIP entrants. Moreover, the inaction of regulatory authorities when it comes to numbering and communication protocols is advantageous for incumbents and might obstruct the provision of new services in the future

    QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols

    Get PDF
    Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation

    Context-Aware Voip congestion control service

    Get PDF
    Published in The African Journal of Information and Communication, Issue no 11 2010/2011IP networks can have difficulty coping with delay-sensitive VoIP traffics during emergency situations caused by fires and related disasters. During emergencies there is a huge increase in voice and video traffic, causing a huge strain on the network. The strain on the network is as a result of both essential and non-essential traffic. In such crisis situations, calls originating from or destined for rescue personnel, such as doctors and police, are considered essential. Any other calls from eyewitnesses and the public are considered non-essential, since they degrade the quality of service for the emergency response teams by consuming the scarce network resources. Providing the rescue team with the quality of service that they require necessitates network access restriction for non-essential traffic. In this paper, the authors present a voice and video service that uses Context-Awareness and Semantic Web technologies to restrict network access to privileged users during crisis situations. The service monitors the network for crisis conditions, enables the network to respond appropriately when a crisis occurs, detects the end of the crisis and reverts to its default state.IP networks can have difficulty coping with delay-sensitive VoIP traffics during emergency situations caused by fires and related disasters. During emergencies there is a huge increase in voice and video traffic, causing a huge strain on the network. The strain on the network is as a result of both essential and non-essential traffic. In such crisis situations, calls originating from or destined for rescue personnel, such as doctors and police, are considered essential. Any other calls from eyewitnesses and the public are considered non-essential, since they degrade the quality of service for the emergency response teams by consuming the scarce network resources. Providing the rescue team with the quality of service that they require necessitates network access restriction for non-essential traffic. In this paper, the authors present a voice and video service that uses Context-Awareness and Semantic Web technologies to restrict network access to privileged users during crisis situations. The service monitors the network for crisis conditions, enables the network to respond appropriately when a crisis occurs, detects the end of the crisis and reverts to its default state

    Context-aware VoIP congestion control service

    Get PDF
    IP networks can have difficulty coping with delay-sensitive VoIP traffics during emergency situations caused by fires and related disasters. During emergencies there is a huge increase in voice and video traffic, causing a huge strain on the network. The strain on the network is as a result of both essential and non-essential traffic. In such crisis situations, calls originating from or destined for rescue personnel, such as doctors and police, are considered essential. Any other calls from eyewitnesses and the public are considered non-essential, since they degrade the quality of service for the emergency response teams by consuming the scarce network resources. Providing the rescue team with the quality of service that they require necessitates network access restriction for non-essential traffic. In this paper, the authors present a voice and video service that uses Context-Awareness and Semantic Web technologies to restrict network access to privileged users during crisis situations. The service monitors the network for crisis conditions, enables the network to respond appropriately when a crisis occurs, detects the end of the crisis and reverts to its default state

    Creation of value with open source software in the telecommunications field

    Get PDF
    Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200

    An open virtual multi-services networking architecture for the future internet

    Get PDF
    © 2015, El Barachi et al.; licensee Springer. Network virtualization is considered as a promising way to overcome the limitations and fight the gradual ossification of the current Internet infrastructure. The network virtualization concept consists in the dynamic creation of several co-existing logical network instances (or virtual networks) over a shared physical network infrastructure. We have previously proposed a service-oriented hierarchical business model for virtual networking environments. This model promotes the idea of network as a service, by considering the functionalities offered by different types of network resources as services of different levels – services that can be dynamically discovered, used, and composed. In this paper, we propose an open, virtual, multi-services networking architecture enabling the realization of our business model. We also demonstrate the operation of our architecture using a virtualized QoS-enabled VoIP scenario. Moreover, virtual routing and control level performance was evaluated using proof-of-concept prototyping. Several important findings were made in the course of this work; one is that service-oriented concepts can be used to build open, flexible, and collaborative virtual networking environments. Another finding is that some of the existing open source virtual routing solutions such as Vyatta are only suitable for building small to medium size virtual networking infrastructures

    An open virtual multi-services networking architecture for the future internet

    Get PDF
    © 2015, El Barachi et al.; licensee Springer. Network virtualization is considered as a promising way to overcome the limitations and fight the gradual ossification of the current Internet infrastructure. The network virtualization concept consists in the dynamic creation of several co-existing logical network instances (or virtual networks) over a shared physical network infrastructure. We have previously proposed a service-oriented hierarchical business model for virtual networking environments. This model promotes the idea of network as a service, by considering the functionalities offered by different types of network resources as services of different levels – services that can be dynamically discovered, used, and composed. In this paper, we propose an open, virtual, multi-services networking architecture enabling the realization of our business model. We also demonstrate the operation of our architecture using a virtualized QoS-enabled VoIP scenario. Moreover, virtual routing and control level performance was evaluated using proof-of-concept prototyping. Several important findings were made in the course of this work; one is that service-oriented concepts can be used to build open, flexible, and collaborative virtual networking environments. Another finding is that some of the existing open source virtual routing solutions such as Vyatta are only suitable for building small to medium size virtual networking infrastructures

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue To VolP or Not to VolP Preparing Your Campus for a VolP Conversion Strategic Planning in the College and University Ecosystem: The Common Denominators Advertorial: Going Wireless at Fiber Speeds Open-Source VolP for Colleges and Universities Institutional Excellence Award Honorable Mention The Naval Postgraduate School Interview President\u27s Message From the Executive Director Here\u27s My Advic
    • …
    corecore