Search results for "Telephony"

showing 10 items of 84 documents

PCP-DV: An End-to end Admission Control Mechanism for IP Telephony

2001

In this paper we describe a novel endpoint admission control mechanism for IP telephony:the PCP-DV which is characterized by two fundamental features. First, it does not rely on any additional procedure in internal network routers other than the capability to apply different service priority to probing and data packets. Second, the triggering mechanism for the connection admission decision is based on the analysis of the delay variation statistics over the probing flow. Numerical results for an IP telephony traffic scenario prove that 99th delay percentiles not greater than few ms per router are guaranteed even in overload conditions.

RouterVoice over IPEnd-to-end principleNetwork packetbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThe InternetOptical IP SwitchingAdmission controlTelephonybusinessComputer network
researchProduct

Energy Efficient Resource Allocation for Wireless Power Transfer Enabled Collaborative Mobile Clouds

2016

In order to fully enjoy high rate broadband multimedia services, prolonging the battery lifetime of user equipment is critical for mobile users, especially for smartphone users. In this paper, the problem of distributing cellular data via a wireless power transfer enabled collaborative mobile cloud (WeCMC) in an energy efficient manner is investigated. WeCMC is formed by a group of users who have both functionalities of information decoding and energy harvesting, and are interested for cooperating in downloading content from the operators. Through device-to-device communications, the users inside WeCMC are able to cooperate during the downloading procedure and offload data from the base sta…

ScheduleenergiatehokkuusComputer Networks and CommunicationsComputer sciencewireless power transfer02 engineering and technology7. Clean energyBase station0203 mechanical engineeringresources allocation0202 electrical engineering electronic engineering information engineeringWirelessResource managementElectrical and Electronic Engineeringenergy efficiencyta113collaborative mobile cloudscontent distributionta213business.industryQuality of service020206 networking & telecommunications020302 automobile design & engineeringEnergy consumptionUser equipmentMobile telephonybusinessComputer networkEfficient energy useIEEE Journal on Selected Areas in Communications
researchProduct

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

Call Admission Control in Single and Two-Tier Cellular Networks

2010

We consider four strategies for call admission control (CAC) in single and two-tier cellular networks, which are designed to ensure advantage of handover calls: dynamic redundancy (cutoff priority scheme), partial dynamic redundancy (fractional guard channel scheme), static redundancy (rigid division-based CAC scheme) and restriction of the number of new calls admitted (new call bounding scheme). We show the advantage of dynamic reservation by numerical analysis. We strictly prove it in the case of two-channel system with losses.

Scheme (programming language)business.industryComputer scienceCall Admission ControlDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReservationHandoverBounding overwatchComputer Science::Networking and Internet ArchitectureRedundancy (engineering)Cellular networkMobile telephonybusinesscomputerComputer networkcomputer.programming_language
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct

Action-oriented classification of families' information and communication actions: exploring mothers' viewpoints

2009

Action-oriented service and technology development begins with the idea that people use technologies to reach their action goals. Consequently, we should investigate user needs and how they can be satisfied, and adapt services and technologies to the natural course of actions. Here, we focus on family communication and investigate mobile communication service types for families. For this study 10 mothers were interviewed; we investigated the nature of their everyday information and communication needs and the different knowledge and information transfer actions that were discovered in their families. Qualitative analysis of these interviews was used to generate a taxonomy, which, in turn, c…

Service (business)Information transferFocus (computing)Knowledge managementbusiness.industryComputer scienceGeneral Social SciencesViewpointsHuman-Computer InteractionWorld Wide WebArts and Humanities (miscellaneous)Action (philosophy)Information and Communications TechnologyTaxonomy (general)Developmental and Educational PsychologyMobile telephonybusinessBehaviour & Information Technology
researchProduct

What benefits couldn't ‘Joyn’ enjoy?

2019

Abstract This case study examines the dynamics of the mobile instant messenger (MIM) market in Korea. MIMs have been disrupting traditional mobile communication services such as voice, SMS, and media content. In response to MIMs, Korean Mobile Network Operators (MNOs) jointly launched a standards-based messenger service called Joyn, which ultimately performed poorly. Focusing on Joyn, this study analyses the changing status of MNOs and their counter-strategies against MIMs in the context of the turbulent mobile services market. For the analysis, we use a co-evolutionary framework encompassing technological, market, and regulatory domains and apply a platform competition perspective. The cas…

Service (business)business.industry020209 energyInstant messenger05 social sciencesContext (language use)02 engineering and technologyBusiness modelCompetition (economics)Management of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringCellular networkMobile telephonyBusiness and International ManagementTelecommunicationsbusiness050203 business & managementApplied PsychologyInstantTechnological Forecasting and Social Change
researchProduct

An Integrated Multi-service Software Simulation Platform: SIMPSONS Architecture

2005

This paper describes SIMPSONS (SIp and MPls Simulations On NS-2), which is a software platform for simulating multiple network scenarios, such as Telephony Over IP (TOIP), and multi-services networks extending the functionalities of Network Simulator NS-2. The innovative aspects of SIMPSONS is the complete integration of control protocols and traffic engineering mechanisms inside the same simulation tool. In fact, next generation networks must meet basically two fundamental requirements: support of Quality of Service (QoS) and Traffic Engineering (TE) functionalities. SIMPSONS is able to simulate DiffServ, MPLS, OSPF and SIP and their interaction in everything TOIP scenario. So with this po…

Service (systems architecture)Session Initiation Protocolbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOpen Shortest Path FirstMultiprotocol Label SwitchingAdmission controllaw.inventionNetwork simulationTraffic engineeringlawNext-generation networkInternet ProtocolTelephonyStream Control Transmission ProtocolSoftware architecturebusinesscomputerComputer network
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct

Propagation Channels for mmWave Vehicular Communications : State-of-the-art and Future Research Directions

2018

Vehicular communications essentially support automotive applications for safety and infotainment. For this reason, industry leaders envision an enhanced role for vehicular communications in the fifth generation of mobile communications technology. Over the years, the number of vehicle- mounted sensors has increased steadily, which potentially leads to more volume of critical data communications in a short time. Also, emerging applications such as remote/autonomous driving and infotainment such as high-definition movie streaming require data-rates on the order of multiple Gb/s. Such high data rates require a large system bandwidth, but very limited bandwidth is available in the sub-6 GHz cel…

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer scienceComputer Science - Information Theoryfrequency bandsAutomotive industry02 engineering and technologyFOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineeringajoneuvotElectrical and Electronic EngineeringElectrical Engineering and Systems Science - Signal ProcessingHigh data rateta213business.industryInformation Theory (cs.IT)Bandwidth (signal processing)020206 networking & telecommunicationsMicrowave transmissionwireless communicationComputer Science ApplicationsvehiclesExtremely high frequencylangaton viestintätaajuusalueetCellular frequenciesMobile telephonybusinessTelecommunicationsCommunication channelIEEE Wireless Communications
researchProduct