Search results for "Telephony"
showing 10 items of 84 documents
PCP-DV: An End-to end Admission Control Mechanism for IP Telephony
2001
In this paper we describe a novel endpoint admission control mechanism for IP telephony:the PCP-DV which is characterized by two fundamental features. First, it does not rely on any additional procedure in internal network routers other than the capability to apply different service priority to probing and data packets. Second, the triggering mechanism for the connection admission decision is based on the analysis of the delay variation statistics over the probing flow. Numerical results for an IP telephony traffic scenario prove that 99th delay percentiles not greater than few ms per router are guaranteed even in overload conditions.
Energy Efficient Resource Allocation for Wireless Power Transfer Enabled Collaborative Mobile Clouds
2016
In order to fully enjoy high rate broadband multimedia services, prolonging the battery lifetime of user equipment is critical for mobile users, especially for smartphone users. In this paper, the problem of distributing cellular data via a wireless power transfer enabled collaborative mobile cloud (WeCMC) in an energy efficient manner is investigated. WeCMC is formed by a group of users who have both functionalities of information decoding and energy harvesting, and are interested for cooperating in downloading content from the operators. Through device-to-device communications, the users inside WeCMC are able to cooperate during the downloading procedure and offload data from the base sta…
5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X
2019
Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…
Call Admission Control in Single and Two-Tier Cellular Networks
2010
We consider four strategies for call admission control (CAC) in single and two-tier cellular networks, which are designed to ensure advantage of handover calls: dynamic redundancy (cutoff priority scheme), partial dynamic redundancy (fractional guard channel scheme), static redundancy (rigid division-based CAC scheme) and restriction of the number of new calls admitted (new call bounding scheme). We show the advantage of dynamic reservation by numerical analysis. We strictly prove it in the case of two-channel system with losses.
Secure and efficient data storage in unattended wireless sensor networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…
Action-oriented classification of families' information and communication actions: exploring mothers' viewpoints
2009
Action-oriented service and technology development begins with the idea that people use technologies to reach their action goals. Consequently, we should investigate user needs and how they can be satisfied, and adapt services and technologies to the natural course of actions. Here, we focus on family communication and investigate mobile communication service types for families. For this study 10 mothers were interviewed; we investigated the nature of their everyday information and communication needs and the different knowledge and information transfer actions that were discovered in their families. Qualitative analysis of these interviews was used to generate a taxonomy, which, in turn, c…
What benefits couldn't ‘Joyn’ enjoy?
2019
Abstract This case study examines the dynamics of the mobile instant messenger (MIM) market in Korea. MIMs have been disrupting traditional mobile communication services such as voice, SMS, and media content. In response to MIMs, Korean Mobile Network Operators (MNOs) jointly launched a standards-based messenger service called Joyn, which ultimately performed poorly. Focusing on Joyn, this study analyses the changing status of MNOs and their counter-strategies against MIMs in the context of the turbulent mobile services market. For the analysis, we use a co-evolutionary framework encompassing technological, market, and regulatory domains and apply a platform competition perspective. The cas…
An Integrated Multi-service Software Simulation Platform: SIMPSONS Architecture
2005
This paper describes SIMPSONS (SIp and MPls Simulations On NS-2), which is a software platform for simulating multiple network scenarios, such as Telephony Over IP (TOIP), and multi-services networks extending the functionalities of Network Simulator NS-2. The innovative aspects of SIMPSONS is the complete integration of control protocols and traffic engineering mechanisms inside the same simulation tool. In fact, next generation networks must meet basically two fundamental requirements: support of Quality of Service (QoS) and Traffic Engineering (TE) functionalities. SIMPSONS is able to simulate DiffServ, MPLS, OSPF and SIP and their interaction in everything TOIP scenario. So with this po…
Improvement of a Service Level Negotiation Protocol using Formal Verification
2013
International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…
Propagation Channels for mmWave Vehicular Communications : State-of-the-art and Future Research Directions
2018
Vehicular communications essentially support automotive applications for safety and infotainment. For this reason, industry leaders envision an enhanced role for vehicular communications in the fifth generation of mobile communications technology. Over the years, the number of vehicle- mounted sensors has increased steadily, which potentially leads to more volume of critical data communications in a short time. Also, emerging applications such as remote/autonomous driving and infotainment such as high-definition movie streaming require data-rates on the order of multiple Gb/s. Such high data rates require a large system bandwidth, but very limited bandwidth is available in the sub-6 GHz cel…