97 research outputs found

    A business model for a sensors-enabled IMS environment

    Get PDF
    The IP Multimedia Subsystem (IMS) is one of the key components of third generation (3G) networks, while Wireless Sensor Networks (WSNs) are an emerging type of networks formed by a set of distributed sensor nodes that collaborate to monitor physical and environmental conditions. By integrating the sensing capabilities of WSNs in the IMS, a rich set of contextual information can be exploited to provide new and personalized multimedia services to IMS users. We have previously proposed a presence-based WSNs/IMS integration architecture, and discussed its design and implementation aspects. In this paper, we focus on the aspects needed for the practical deployment of this architecture. An enhanced IMS business model is proposed for the resulting sensors-enabled IMS environment, and several important support functions are elaborated, including: a two-level identification scheme, a charging model, security and information access control mechanisms, as well as WSN gateways\u27 dynamic discovery alternatives. © 2012 IEEE

    The design and implementation of a wireless healthcare application for WSN-enabled IMS environments

    Get PDF
    The IP Multimedia Subsystem (IMS) is one of the key components of third generation (3G) networks, while Wireless Sensor Networks (WSNs) are an emerging type of networks formed by a set of distributed sensor nodes that collaborate to monitor environmental and physical conditions. Combining the capabilities of WSNs and the IMS opens the door to a wide range of personalized and adaptive value added services for 3G users. We have previously proposed a solution for WSN/IMS integration. This solution enriches the IMS architecture with context acquisition and management components, and enables access to those capabilities via standard IMS interfaces. Wireless healthcare is one of the important application areas that can benefit from the combined IMS/WSNs capabilities. In this paper, we focus on this application area and present a case study on the design and implementation of a context-aware IMS wireless healthcare application, that leverages the capabilities of our WSN/IMS integration solution. The application\u27s detailed scenario and IMS deployment architecture are presented and a prototype is built and tested using Ericsson\u27s IMS simulated environment. © 2013 IEEE

    Control-level call differentiation in IMS-based 3G core networks

    Get PDF
    The 3GPP-defined IP Multimedia Subsystem is becoming the de facto standard for IP-based multimedia communication services. It consists of an overlay control and service layer that is deployed on top of IP-based mobile and fixed networks, in order to enable the seamless provisioning of IP multimedia services to 3G users. Service differentiation, which implies the network\u27s ability to distinguish between different classes of traffic (or service) and provide each class with the appropriate treatment, is an important aspect that is considered in 3G networks. In this article, we present a critical review of existing service differentiation solutions and propose a new control-level call differentiation solution for IMS-based 3G core networks. The solution consists of a novel call differentiation scheme, enabling the definition of various categories of calls with different QoS profiles. To enable the support of such profiles, an extended IMS architecture, relying on two adaptive resource management mechanisms, is proposed. Furthermore, simulations are used to evaluate the system performance. Compared to existing service differentiation solutions, our solution offers several benefits, such as: flexible QoS negotiation mechanisms, control over many communication aspects as means for differentiation, and a dynamic and adaptive resource management strategy. © 2011 IEEE

    Open virtual playground: Initial architecture and results

    Get PDF
    Network virtualization is a promising and technically challenging concept, which enables the dynamic creation of several co-existing logical network instances (or virtual networks) over a shared physical network infrastructure. There are several motivations behind this concept, including: cost-effective sharing of resources; customizable networking solutions; and the convergence of existing network infrastructures. We have previously proposed a new business model for virtual networking environments. In this paper, we use this model as well as concrete use cases as basis for the definition of the Open Virtual Playground - an open virtual multi-services networking architecture in which different levels of services (i.e. essential services, service enablers, service building blocks, and end-user services) offered by various players, can be dynamically discovered, used, and composed. Furthermore, a QoS-enabled VoIP service scenario is used to demonstrate the system operation and preliminary performance measurements are collected. © 2012 IEEE

    From the Internet of Things to the web of things-enabling by sensing as-A service

    Get PDF
    © 2016 IEEE. Sensing as a Service (SenaaS) is emerging as a prominent element in the middleware linking together the Internet of Things (IoT) and the Web of Things (WoT) layers of future ubiquitous systems. An architecture framework is discussed in this paper whereby things are abstracted into services via embedded sensors which expose a thing as a service. The architecture acts as a blueprint to guide software architects realizing WoT applications. Web-enabled things are eventually appended into Web platforms such as Social Web platforms to drive data and services that are exposed by these things to interact with both other things and people, in order to materialize further the future social Web of Things. Research directions are discussed to illustrate the integration of SenaaS into the proposed WoT architectural framework

    A green energy-aware hybrid virtual network embedding approach

    Get PDF
    © 2015 Published by Elsevier B.V. In the past few years, the concept of network virtualization has received significant attention from industry and research fora, as it represents a promising way to diversify existing networks and ensure the co-existence of heterogeneous network architectures on top of shared substrates. Virtual network embedding (VNE) is the process of dynamically mapping virtual resources (i.e. virtual nodes and links) onto physical substrate resources. VNE is the main resource allocation challenge in network virtualization and is considered as an NP-hard problem. Several centralized and distributed VNE approaches have been proposed, with the aim of satisfying different objectives ranging from QoS, to economical profit, and network survivability. More recently, emerging VNE approaches started investigating the optimization of new objectives such as energy-efficiency and networks\u27 security. In this work, we propose a green energy-aware hybrid VNE hybrid VN embedding approach that aims at achieving energy efficiency and resource consolidation, while minimizing CO2 emissions resulting from VNs operation. This approach consists of a hierarchical virtual networking management architecture in which control and management nodes collaborate for the splitting and embedding of sub-VNs requests to the cleanest substrate resources (i.e. the resources deployed in a sector with the smallest CO2 emission factor) available. Three different variants of our VNE algorithms, taking into consideration different resources\u27 selection criteria (i.e. energy source, request priority, and request location) are presented, and their performance is compared with two existing VNE algorithms based on centralized and distributed embedding approaches. The comparative performance analysis shows that our proposed approach enables a more efficient VN embedding in terms of: a reduced number of substrate resources needed, a faster request mapping time, as well as resource consolidation and reduced resource cost. Furthermore, it enables a reduction of the carbon footprint of the VNE operation, thus resulting in a more green and environmentally conscious approach to network virtualization

    Using Web services for application development in internet telephony : a case study on conferencing in SIP networks

    Get PDF
    Applications offered to end-users as value-added services are a critical element for the success and the survival of Internet telephony service providers. Some service creation frameworks have been proposed by IETF while alternative frameworks have been proposed by other forums such as Parlay and JAIN. All these frameworks have several drawbacks which may be solved by the use of web services. Web services are self-describing, modular business applications that expose the business logic as services over a network, generally, the Web. This thesis presents a case study on the use of web services to develop conferencing applications in SIP networks. The case study involves the definition of comprehensive web service interfaces that make conferencing capabilities available to developers. It also involves the implementation a sub-set of the interfaces as a gateway using SIP servlets, the development of two applications using the interfaces, and performance evaluation. The applications we have developed consist of dial in and dial out audio conferences. the standard frameworks provide. In addition, their use does not require a background in telephony or telecommunications. This could allow developers who are new to the telecom field, to easily integrate conferencing capabilities to their applications. Furthermore, a considerable reduction of the application footprint is achieved. This reduction saves time and effort for application developers. These benefits make web services an interesting approach, despite the overhead introduced

    Exploratory study on innovative use of ISO standards for IT security in the UAE

    Get PDF
    With the high percentage of security breaches, following IT standards could be one way to protecting sensitive information and auditing the accuracy, confidentiality, and integrity of information within the organization. ISO security standards enable organizations to practice safe security techniques to minimize the number of successful IT security attacks. Many researches have been established extensively in both the research and industry fields that highlighted the need for implementing an information security standards and policy in strive towards the securing of information. However, to the best of our knowledge, there is no such study on using ISO standards in the IT field, in the UAE. This paper focuses more specifically on the IT security techniques. Emirates Authority for Standardization and Metrology (ESMA) seeks to focus its efforts on the IT field - IT Security techniques being an area of interest. Since the UAE is always coping with the rapid growth in technology and it has a lack of publications on the topic of IT standards, it is worthy to address the usage of ISO standards in this region. This research survey, which sent to many public and private Emirati organizations, shows that the usage of ISO standards in this region of the world is quite promising

    An SLA-Aware Cloud Coalition Formation Approach for Virtualized Networks

    Get PDF
    IEEE One of the main challenges faced by cloud providers is the uncertainty in their workload, resulting from the high variability and the dynamic nature of clients\u27 demands. The inability to meet those demands during peak times can lead to high service rejection rates, experienced delays, and consequently profit and reputation losses. The concept of cloud federation has been proposed as a way to address this challenge, by enabling a group of cloud providers to collaborate by dynamically combining their resources as needed, to satisfy received requests. Existing cloud federation approaches fail to consider clients\u27 SLA requirements during the coalition formation process or provide a self-healing mechanism to deal with unexpected resources\u27 shortage during operation. Furthermore, the state of the art approaches suffer from performance issues, such as high execution times, unstable performance, and lack of convergence to a solution in complex scenarios (e.g. requests with mixed, independent types of VMs). This paper proposes a novel social gaming based approach for coalition formation in the cloud that finds the best coalition of cloud providers to answer requests, while satisfying the clients\u27 SLA requirements. The proposed algorithm, dubbed SLA Aware Cloud Coalition Formation algorithm (S-ACCF), leverages Irving\u27s roommate algorithm to form a stable coalition of cloud providers, with a rapid execution time. The S-ACCF algorithm is designed to maximize the coalition\u27s profit, while minimizing the number of participants in the coalition as well as the penalty incurred by providers who fail to offer all or some of the promised resources using a self-healing process. The S-ACCF algorithm was extensively tested using a variety of scenarios, and its performance was compared to two state of the art approaches: 1) the Optimal Cloud Federation Mechanism (OCFM) that relies on an exhaustive search of all possible solutions to find the best coalition; and 2) the Cloud Federation Formation Mechanism (CFFM) that relies on an iterative split-and-merge approach to find the best coalition. While the optimal approach (OCFM) always finds the best coalition leading to the highest collective profit, it has an exponential time complexity, thus leading to very large execution times. On the other hand, the split-and-merge approach (CFFM), which relies on random selection of sub-groups for coalition formation, suffers from instability (different results in repeated runs), high and variable execution time, and a noticeable requests\u27 rejection rate that changes between runs. The test results show that the S-ACCF algorithm addresses the limitations of the OCFM and the CFFM algorithms, and outperforms the optimal and split-and-merge approaches in terms of execution time, individual provider payoff, and the number of providers per coalition. Furthermore, it yields higher stability and zero rejection rate, when compared to the split-and-merge approach. Indeed, our proposed approach yields an execution time that is 12 to 25 times faster than the optimal and split-and-merge approaches, which is a major advantage for real-time applications. Moreover, when compared to the two other approaches, our S-ACCF algorithm always finds the smallest coalition possible satisfying the client requirements, thus leading to the highest individual payoff for providers and lower administration overhead. Finally, unlike the split-and-merge approach, our algorithm shows a stable performance, and converges towards the optimal solution in simple and complex scenarios, thus making it suitable for production environments
    corecore