15 research outputs found

    Service outsourcing and billing in inter-domain IMS scenarios

    Get PDF
    ArticleResource sharing in commercial mobile networks may present operators with options to cut costs and prevent network churn. In resource sharing, when the network experiences resource constraints, the operator can negotiate with other reachable networks to outsource the provision of network access services. The revenue earned from user payments will be shared by the home operator and the serving operator. Operators participating in service outsourcing are faced with financial challenges with regard to network revenue sharing. Moreover, an operator’s users are placed under service control of the visited operator, a situation that may impact customer experience. On the other hand, the visited operator allocates network resources to visiting users, thus there is a risk of service blockage for home users. In this paper we explore resource sharing in inter-domain frameworks, and investigate factors that influence revenue distribution amongst involved operators. We develop strategies for use by operators to maximize revenue from resource sharing. This work is done in the domain of IP Multimedia Subsystem communications

    Inter-subnet localized mobility support for host identity protocol

    Get PDF
    Host identity protocol (HIP) has security support to enable secured mobility and multihoming, both of which are essential for future Internet applications. Compared to end host mobility and multihoming with HIP, existing HIP-based micro-mobility solutions have optimized handover performance by reducing location update delay. However, all these mobility solutions are client-based mobility solutions. We observe that another fundamental issue with end host mobility and multihoming extension for HIP and HIP-based micro-mobility solutions is that handover delay can be excessive unless the support for network-based micro-mobility is strengthened. In this study, we co-locate a new functional entity, subnet-rendezvous server, at the access routers to provide mobility to HIP host. We present the architectural elements of the framework and show through discussion and simulation results that our proposed scheme has achieved negligible handover latency and little packet loss

    Distributed mobility management with mobile Host Identity Protocol proxy

    Get PDF
    The architectural evolution from hierarchical to flatter networks creates new challenges such as single points of failure and bottlenecks, non-optimal routing paths, scalability problems, and long handover delays. The cellular networks have been hierarchical so that they are largely built on centralized functions based on which their handover mechanisms have been built. They need to be redesigned and/or carefully optimized. The mobility extension to Host Identity Protocol (HIP) proxy, mobile HIP Proxy (MHP), provides a seamless and secure handover for the Mobile Host in the hierarchical network. However, the MHP cannot ensure the same handover performance in flatter network because the MHP has also utilized the features offered by the hierarchical architecture. This paper extends the MHP to distributed mobile HIP proxy (DMHP). The performance evaluation of the DMHP in comparison to MHP and other similar mobility solutions demonstrates that DMHP does indeed perform well in the flatter networks. Moreover, the DMHP supports both efficient multi-homing and handover management for many mobile hosts at the same time to the same new point of attachment

    Comparison of Path Selection Algorithms for ATM Networks

    No full text
    The choice of routing algorithms for use in ATM networks has a large impact on network efficiency. While the PNNI specification provides a scalable framework for topology discovery and information distribution, various path selection algorithms may be used. Dynamic routing using path pre-computation is widely used, but various path selection strategies are possible. This paper the blocking rate caused by load-packing, load-balancing, shortest-hop, and hybrid strategies for path selection

    Enhanced gateway selection for optimal routing in a distributed Evolved Packet Core (EPC) network

    No full text
    The introduction of Long Term Evolution (LTE) and the Evolved Packet Core (EPC) has led to a proliferation of data hungry mobile devices and services. The result is a surge in mobile data traffic compelling operators to look for solutions to improve system scalability and flexibility to cope with this traffic surge. One such solution is the distribution of the EPCs data plane entities, that is, by moving them closer to the network edge. Within the EPC's standardized gateway selection framework for IP traffic routing in a distributed environment, mobility of User Equipment (UEs) with IP traffic destined to local networks leads to nonoptimal routing. Furthermore, when a UE has multiple Packet Data Network (PDN) connections which include local and central core network connections, there is a high likelihood of the occurrence of nonoptimal routing for the local connections. Such nonoptimal routing may lead to inefficient use of backhaul network resources and may further result in degradation of Quality of Service for delay sensitive applications. In this paper, we investigate and propose a solution to the nonoptimal routing problem for local IP traffic in such an environment. The testbed implementation and evaluation shows that the proposed scheme can improve the routing and ensure service quality for local IP traffic in a distributed EPC network

    Virtual Network Capacity Expansion through Service Outsourcing

    No full text
    Roaming agreements in 3G and beyond 3G networks can greatly enhance the delivery of services to end users. The cost of service delivery to the user depends on the price charged on networks traversed by user traffic. In a QoS DiffServ environment, network resources may be sold in aggregate blocks at wholesale prices to competing ISPs. This can influence the cost of delivering services between two points using access networks owned by competing operators. Demand for network services by users varies over time and network capacities are finite; thus a fully loaded network would reject new service requests and an underutilized network will become less productive. In this paper we explore a service outsourcing scheme between competing operators that allows a custodian network operating at full capacity to outsource service provision to a candidate network. Outsourcing would be price-influenced enabling the home (custodian) operator to levy local predictable charges to the end users for services offered on the visited network. This will virtually expand the capacity of the custodian network and boost incomes for both operators

    An Automated Signature Generation Method for Zero-Day Polymorphic Worms Based on Multilayer Perceptron Model

    No full text
    Polymorphic worms are considered as the most dangerous threats to the Internet security, and the danger lies in changing their payloads in every infection attempt to avoid the security systems. In this paper, we propose an accurate signature generation system for zero-day polymorphic worms. We have designed a novel Double-honeynet system, which is able to detect zero-day polymorphic worms that have not been seen before. To generate signatures for polymorphic worms we have two steps. The first step is the polymorphic worms sample collection which is done by the Double-honeynet system. The second step is the signature generation for the collected samples which is done by k-means clustering algorithm and a Multilayer Perceptron Model. The system collects different types of polymorphic worms; we used the k-means clustering algorithm to separate each type into a cluster. The Multilayer Perceptron Model is used to generate signatures for each cluster. The main goal for this system is to reduce the false positives and false negatives
    corecore