Composition of GPRS/UMTS traffic : snapshots from a live network
|
|
|
- Rolf Campbell
- 9 years ago
- Views:
Transcription
1 Composition of GPRS/UMTS traffic : snapshots from a live network Philipp Svoboda 1, Fabio Ricciato 2, Eduard Hasenleithner 2, and Rene Pilz 2 1 Vienna Univ. of Technology, Inst. of Communications and Radio-Frequency Engineering. [email protected], 2 Telecommunications Research Center Vienna, ftw. {ricciato, ehasenle, pilz}@ftw.at Abstract. This paper focuses on the traffic composition in a real GPRS/UMTS network. We present results from two datasets covering two one-week measurement periods, in December 2004 and November We show how users and traffic split between access technologies (GPRS and UMTS) and services, and present an analysis of the per-user activity at the PDP-context level. The results reported here provide an up-to-date view of the traffic and user activity in an operational 3G network. It should help those researchers interested in reproducing synthetic network scenarios to gain a better understanding about the traffic environment in a real network. Moreover, we discuss several technicalities found in performing such measurements, which should be helpful to those researchers active in 3G monitoring. 1 Introduction The growing popularity of 3G terminals and services has extended the coverage of wireless Internet access to the geographic area, and 3G networks are becoming key components of the global Internet in Europe. However the 3G penetration and service portfolio are still in an evolutionary phase. The planning and operation of a real network, as well as the related research activities, are based on a set of assumptions about the traffic and the service access patterns. In such an evolutionary environment it is therefore of key importance to perform measurements campaigns, or better maintain a continuous measurement program, in order to extract such information and track the evolution of the network environment. This paper is meant to represent a contribution towards a better understanding of the global traffic composition in a real 3G network. This work results from extensive traffic monitoring on top of the operational 3G network of mobilkom austria AG & Co KG, the leading mobile operator in Austria, EU. We provide an insight into the high-level composition of the global traffic in the network under study, for both GPRS and UMTS, and at the same time discuss some technical issues related to traffic monitoring in 3G. The content of this paper should be of interest to those researchers working on 3G, and provide them with a better understanding of how the traffic environment in a real 3G network looks like. To the best of our knowledge this is the first paper reporting measurement results about traffic composition in UMTS.
2 The rest of the paper is organized as follows. Section 2 introduces the monitoring setup and describes the analysis process. Section 3 investigates on the distribution of users and traffic between GPRS and UMTS, and the traffic per user. In Section 4 we look at the traffic composition with respect to different services. In Section 5 we inspect the per-user activity at the level of PDP-contexts. In Section 6 we reference those few available previous papers presenting similar measurements for GPRS (no paper appeared so far for UMTS). Finally in Section 7 we conclude and suggest directions for further work. 2 Monitoring setting and analysis process The monitoring system. The development of a large-scale passive monitoring system - including a parser for the whole protocol stack of the 3G Core Network - and its deployment in the operational network of mobilkom austria AG & Co KG were accomplished within the METAWIN project [1]. Packets are captured with DAG cards and recorded with GPS synchronized timestamps. For privacy requirements, the frames are completely anonymized on-the-fly before being stored on the hard-disk: all subscriberrelated fields at any layer of the 3GPP protocol stack (e.g. IMSI, MSISDN, IMEI) are hashed with a secret non-invertible function, while the user payload at the application layer is stripped-off. Tracking modules. The monitoring system covers both the user- and control-plane. On each interface an on-line stateful module tracks the current TIMSI (Temporary International Mobile Subscriber Identifier) for each Mobile Station (MS), so each packet can be associated to the originating MS 1. Furthermore, the tracking module on Gb/IuPS links tracks the MS position (i.e. cell), while the tracking module on Gn maintains several PDP-context attributes (e.g. APN). Such tracking modules enable some forms of analysis and traffic slicing that would not be possible based only on stateless traces. For instance, the analysis of per-user traffic can not be based on the IP address which is assigned dynamically. Also, the analysis of traffic for a specific class of users, e.g. discriminated by means of the APN, would not be possible without maintaining state for each PDP-context. The tracking procedure is prone to some limitations, for instance border effects at the boundaries of the measurement window: PDP-contexts that were activated before the start of the measurement period will not be accounted in the final statistics, leading to a certain under-estimation and bias against long PDP-contexts. In our data we verified that the fraction of unassigned packets (i.e. packets that are found in the traces but can not be referred to any fully tracked PDP-context) is less than 2% of the total packets seen durign the first day. 1 Note that each MS is distinguished by a local identifier obtained by hashing the real IMSI. This process protects the user identity, since the real IMSI is never recorded. Furthermore the hash function and its parameters are undisclosed to the research staff, thus preventing real-tohashed IMSI mapping associations for specific MS. For sake of simplicity in this paper we will maintain the term IMSI to refer to the local MS identifier.
3 Capturing on Gn. While we passively monitor all core network interfaces (Gi, Gn, Gb, IuPS) the results presented in this work are based exclusively on traces captured on Gn, specifically on the links near the GGSNs. All Gn links attached to all GGSNs were monitored, covering 100% of GPRS and UMTS traffic from home subscribers, traffic from visiting roaming subscribers is not considered. The choice of Gn for this type of analysis was based on the following motivations. First, capturing on Gi links would not allow per-ms discrimination nor PDP-context analysis, since IMSIs and PDP activations are not present on Gi. Second, complete coverage of IuPS/Gb would require tapping more physical links. Since separate SGSNs are used for UMTS and GPRS, on Gn it is possible to discriminate GPRS and UMTS traffic based on the IP address of the SGSN which is found in the IP header below the GTP layer (for more details about the 3GPP protocol stack see e.g. [2, pp. 41]). Analysis process. The analysis process works as follows. A piece of ad-hoc code parses the entire packet trace and extracts a set of attributes for each PDP-context and for each connection (a definition of connection for UDP is given below). The PDP-context attributes include IMSI, start time, duration, transferred volumes (separate values for user data and signaling and for uplink and downlink), etc. The connection attributes include PDP-context identifier, IP addresses and ports, start time, duration, volumes, etc. Volumes and connections. A point of clarification is due regarding the usage of the term volume and connections. By total volume we refer to the cumulated number of bytes at the IP layer, i.e. the GTP payload. Lower layer overhead (e.g. GTP header and below) are not considered here. Unless differently specified the volume values given in this paper refer to the cumulated uplink and downlink traffic. Regarding the term connection, in case of TCP traffic it will refer to the plain TCP connection. For UDP traffic we define a connection as the union of all packets seen with the same quadruple (source / destination addresses and ports) and within the same PDP-context, with a maximum inter-packet spacing of T (we used T =10 min). This choice might be critical when comparing the two implementation of the same service adopting different transport protocols, e.g. WAP 1.x (over UDP) and WAP 2.0 (over TCP). We verified that the average number of WAP connections per-user is approximately the same for both implementations: 1.3 and 1.4 for WAP 1.x and WAP 2.0 respectively. This comforts our definition of connection for UDP. Non-disclosure policy. For proprietary reasons we can not disclose several absolute quantitative values like traffic volumes, number of users, number of Gn links, etc. that are considered business critical by the operator. In other words we can not disclose the size of the user population and of the traffic aggregate but only their composition. To comply with such policy, we provide only relative values, i.e. fractions, or re-scaled values. In other cases we had to truncate graphs (e.g. for ranked distribution) to avoid revealing the absolute number of users.
4 3 Volumes and User Population in GPRS and UMTS As a first step we show how the total traffic and user population are split between different services. We present results from two separate one-week periods in December 2004 and in November 2005, hereafter denoted respectively as Dec04 and Nov05 datasets. The comparison between the two provides an insight into the historical changes in the macroscopic traffic composition during almost one year. Attached to the 3G Core Network there are two different Radio Access Networks (RANs), namely GPRS and UMTS, delivering different link bandwidth (for further details see e.g. [3, pp. 23]). Since UMTS radio deployment is more recent, the UMTS coverage is smaller than GPRS and limited to urban and suburban areas. Note that EDGE was introduced in August 2005, therefore the dataset Nov05 includes data traffic from EDGE terminals, which we will account simply as GPRS. Table 1 shows the relative fractions of users and volumes found in the network for GPRS and UMTS. Users are identified by their IMSI (see note 1 ). Note that only active users are accounted here, i.e. with at least one PDP-context activation in the measurement window. Attached but inactive users are not accounted. Note that in general UMTS capable terminals can also access GPRS radio outside the UMTS coverage. We label as GPRS users those seen exclusively on the GPRS section during the measurement period, while those that accessed the UMTS at least once are classified as UMTS users. A caveat is due here since a UMTS user can also generate GPRS traffic: while this traffic is correctly accounted as GPRS, the GPRS user count in Table 1 only considers GPRS-only users. Therefore, the average per-user traffic can not be derived from Table 1. From Table 1 it can be seen that in Dec04 the number of active UMTS users was approximately two orders of magnitude less than GPRS, but the two groups generated comparable traffic volumes. In fact at that time a large fraction of UTMS mobile stations were 3G datacards mounted on laptops 2 coupled with flat-rate contracts, while UMTS hand-held devices were just starting to spread among subscribers. In Nov05 the fraction of UMTS users has increased, as the combined effect of additional UMTS subscribers plus legacy GPRS users upgraded to UMTS hand-held terminals. The fact that for UMTS the growth factor in the volume share is substantially less than for the user share suggests that most of the new additional terminals were hand-held devices rather than laptop datacards, under the assumption that the former ones generate less traffic than the latter due to a combination of differences in terminal capabilities and billing schemes. However laptop datacards are still an important subset in the UMTS terminal population. The rough comparison between the ratios of volume to user shares anticipates that the average per-user traffic is larger for UMTS than GPRS. This was expected, given that UMTS delivers a higher bandwidth and hence a better user experience than GPRS, despite they share the same billing tariffs. As a next step we evaluated directly the weekly volume generated by individual users. The per-user volume distributions for GPRS and UMTS in Nov05 are reported in Figure 1. All values are in MB/week. Note that in these figures a single MS producing both types of traffic (say v u and v g volumes respectively in UMTS and GPRS) will appear as two different MSs with distinct volumes in each class (i.e., v u and v g ). 2 See e.g.
5 Table 1. Fraction of users and volume in GPRS and UMTS Dec04 Nov05 RAN Users Volume RAN Users Volume GPRS 98.8% 58.3% GPRS 90.7% 33.3% UMTS 1.2% 41.7% UMTS 9.3% 66.7% UMTS GPRS UMTS GPRS emp CCDF Fraction of Volume Volume per User / MB (a) Volume per User (CDF) Fraction of Users (b) Fraction of volume (y) cumulated by fraction of top users (x) Fig. 1. Distribution of Volume per User in MB/week in Nov05. (The x axis is truncated to 10 4 ) Figure 1(a) reports the CCDF. It can be seen that the median is around 5.4 MB/week for UMTS and only 43 KB/week for GPRS. The distribution spans around five orders of magnitudes, denoting a large disparity in the user behavior. This can be seen well from Figure 1(b), where we plot the fraction y of total volume generated by the fraction x of top users in loglog scale. We obtain that the top 1% of UMTS users generated around 14% of total traffic, while the top 1% of GPRS users generated 52% of total traffic. For the 10% of top users, the cumulated fraction of volume jumps to 58% for UMTS and 92% for GPRS. The GPRS figures reveal that the vast majority of users seen on GPRS are generating less than 1MB/week. At the other extreme of the range are the heavy-users, who transfer massive volumes of traffic. This suggests the possibility to classify the users into a small set of classes, so as to distinguish sporadic, heavy and intermediate users. In general such classification would be service-dependent, however as far as the total network load is concerned we can ignore service-specific metrics and just consider the total transferred volume in the measurement period. Hence we classified the users into four groups based on arbitrarily chosen threshold values on the weekly volume v: very low (v 10kB), low (10kB < v 1MB), medium (1 MB < v < 100 MB) and high (v 100MB). We used the same boundary values for UMTS and GPRS. Table 2 shows the fraction of users and volume within each group for both datasets. It can be seen that the vast majority of users (70-90%) in GPRS have less than 1MB per week (low and very low users), but they generate only a small fraction of the total traffic ( 3-6%). Note that the lowest group generate a negligible amount of traffic, despite ( 25-40%) of the users are found here. These are users that had a single or very few session (e.g. MMS via WAP), or perhaps activated a spurious PDP-context. We also note in GPRS an
6 Table 2. Grouping per transferred volume (Values in fraction of total) GPRS UMTS Dec04 high medium low very low Dec04 high medium low very low Users 0.1% 29.3% 29.3% 41.3% Users 13.0% 83.3% 3.5% 0.2% Volume 7.0% 89.3% 3.7% < 0.01% Volume 61.4% 38.6% < 0.1% < 0.01% Nov05 high medium low very low Nov05 high medium low very low Users 0.2% 11.5% 61.7% 26.6% Users 7.6% 59.4% 28.9% 4.1% Volume 24.3% 69.5% 6.2% < 0.01% Volume 51.2% 48.5% 0.3% < 0.01% increase in the fraction of volume in the high group, from 7% to 24%: this is maybe an indication that more laptop datacards are being used on GPRS/EDGE. In UMTS, we see that the low and very low groups were almost empty in Dec04 (less than 4% of users), while in Nov05 they raised to almost 33.0%. This is probably due to the introduction of a large number of hand-held devices, while in Dec04 the predominant terminal type was laptop datacard. 4 Service Mix In a next step we analyzed the volume share per each service. The figures in this section do not include custom services implemented for specific customers, which where prefiltered based on the APN. Also, we filtered traffic on ports tcp:135 and tcp:445, which is used by several scanning worms (see discussion in Section 4.3). The results are presented in Figure 2 for UMTS and GPRS separately and for both datasets. In all cases the largest volume share is on WEB. The biggest change occurred in GPRS, where the WAP 1.0 share halved from 30% to 13%. Looking at the relative growth of volume for each service, we found that the WAP traffic in GPRS did increase in absolute volume (+80%), but less than other services (e.g. +339% for WEB). Mail (POP3 + SMTP + IMAP) grew by +170% in GPRS and +160% in UMTS. The HTTPs service did also grow considerably on GPRS (+719%). Interestingly in Nov05 we found 0.8% of UMTS traffic was related to a popular online game (World of Warcraft). 4.1 Service Mix over time Next we analyzed the stability of service shares on a day-by-day basis, limited to the top services. Table 3 shows the fraction of volume per service accumulated within each day. We can discriminate two different profiles for working days and for the weekend. The WEB traffic is always dominant and its relative share increases in the weekend - in UMTS 58-60% in working days and 65% in weekend. The share of traffic (POP3 and SMTP) decreases in the weekend (in UMTS it roughly halves). We also notice a decrease of Rest UDP (which includes tunneled traffic, e.g. IPSEC) and VPN. The most likely explication is that this traffic is related to business people that tend not to use their mobile access on weekends. We observe that the WAP share in GPRS is relatively stable across all days. Regarding the usage of it is interesting to note that GPRS and UMTS display different levels of asymmetry: the ratio of downloads (POP3+IMAP volume) to
7 (a) GPRS Dec04 (b) GPRS Nov05 (c) UMTS Dec04 (d) UMTS Nov05 Fig. 2. Service Shares for UMTS and GPRS Table 3. Daily service shares - GPRS / UMTS Nov05 UMTS GPRS Service Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat Sun HTTP HTTPs POP SMTP WAP 1.x WAP FTP VPN Rest TCP Rest UDP sending (SMTP volume) is on average 2.8 for GPRS and 2.1 for UMTS. This can be accounted to the smaller uplink bandwidth in GPRS (21.4 kbit/s) and consequently relatively long transfer times which refrain the users from massive sending. Network-planning departments often refer to the busy hour to dimension their networks. To answer the question if the weekly traffic share can also be used to adjust traffic shares in a busy hour simulation, we split the traffic further into bins of two hours. The results for two sample days are presented in Figure 3 (note that the y axis has been rescaled by an undisclosed factor in order not to disclose absolute volumes). The shape of the curves shows the busy hour between 7 p.m and 9 p.m. The inspection of the volume shares for each bin reveals that the traffic composition is relatively stable with the time-of-day in the range 10 am to 9 pm, with fluctuations within 5%
8 (a) UMTS Nov05 (b) GPRS Nov05 Fig. 3. Time of day effect in Nov05 (The y axis have been renormalized - see text) Table 4. Grouping customers per used Services (Values in fraction of total) GPRS UMTS Usage: WAP only WAP and Mail Internet Usage: WAP only WAP and Mail Internet Dec % 9.3% 1.4% Dec04 0.1% 1.4% 98.5% Nov % 5.5% 12.0% Nov % 1.6% 73.4% (note that during the night the traffic level is very low and some service disappear completely). We conclude that the daily volume statistics are representative of the peak hour composition. 4.2 Grouping per Service We now grouped the users according to the services they used. Following [4] we defined the following three groups: WAP only, WAP and Mail and Internet Services (no WAP). Table 4 shows the relative numbers of users in each of the three groups for GPRS and UMTS in Dec04 and Nov05. The first group represents the vast majority in GPRS, users who only use a mobile phone to browse WAP pages, download ring tones, send MMS via WAP and so on. In Nov05 [resp. Dec04] these are 80% of the GPRS users [resp. 90%], but only generate 20% [resp. 37%] of the total traffic. This group accounted for 0.1% of the UMTS users in Dec04, but in Nov05 they raised to one quarter of the total UMTS population (despite still the share of WAP in around 1% in UMTS). This is consistent with the notation made above, that in Dec04 most users active on UMTS were laptop datacard users. The second group is able to browse WAP, transfer s but does not have WEB traffic. In the last group there is no WAP traffic and mainly WEB volumes. This includes the mobile offices, users who use their notebook or smart-phones for accessing the internet outside their company. This group grew in GPRS (from 1.4% to 12%), bearing the whole WEB traffic (50% of total). Note that the GPRS numbers for Dec04 are consistent with the result presented in [4] on a different mobile provider. Notably, the combined growth of the Internet group in GPRS and WAP only in UMTS results in the two user populations being less distant now than one year ago. This is also confirmed from the reduced differences between UMTS and GPRS in the total service shares (Figure 2). It is possible to conjecture that the introduction of EDGE
9 in GPRS and the ongoing replacement of handheld terminals towards UMTS-capable devices are probably the driving forces behind such convergence. 4.3 Filtering spurious connections During the explorative analysis a large number of packets were directed to ports tcp:135 and tcp:445, mainly TCP SYN in the uplink direction. This is due to some self-propagating worms attached to some infected 3G terminals. The presence of such unwanted traffic should be expected since laptops with 3G datacards - often equipped with popular operating systems - coexist nowadays with handsets and smart-phones in the 3G network, and it is well-known that unwanted traffic is a steady component of the traffic in the wired networks since years (see for instance [5]). The detailed analysis of unwanted traffic and its impact on the 3G network will be covered in a following separate paper. Here is important that such traffic does not express user preference, and therefore we filtered it out before the analysis. The filtering rules were set heuristically as follows. For TCP we filtered out all connections with less than 2 packets in each directions (i.e., complete handshake plus one data packet). For UDP we filtered out all connections with less than 1 packet in each direction. The fraction of filtered packets was 3.4% in TCP and 2.1% in UDP in Dec04. 5 Analysis of the PDP-context activity In this section we investigated the activity of each user at the level of PDP-contexts. The PDP-context in a GPRS/UMTS network is comparable to a dial-up process in wired networks: a user has to establish a PDP-context to transfer data via a mobile network (for a detailed list see [6]). For this analysis we considered the Nov05 dataset. 5.1 Per-user activity For each PDP-context j generated by MS i we extracted the total volume v ji and the duration d ji. For each MS i, we considered the following attributes: total number n i of PDP-contexts, total transferred volume s i = n i j=1 v ji and total on-time t i = n i j=1 d ji. The Figure 4 shows scatter plots of these three attributes with logarithmic binning, splitted to UMTS and GPRS. Each point represents the number of users i within the loglog binning. In all plots there are boundaries due to admissible regions. The limit in Figure 4(a) and 4(d) relates to the presence of a minimum value for the duration of a PDP-context, say d min, which forces a user with n i PDP-context to stay on-line for at least s i n i d min. We obtain that in this case GPRS and UMTS have a similar footprint. In the Figures 4(b) and 4(e) the distribution is lower limited by the maximum available bandwidth (cumulated uplink and downlink), which is 384 kbit/s and 85.6 kbit/s for UMTS and respectively for GPRS. The slope of the lower boundary of the distribution approaches this values (320 kbit/s and 80.1 kbit/s), the difference being due to idle periods within each PDP-context.As expected the large cluster for UMTS (Figure 4(b)) is shifted to the right compared to GPRS (Figure 4(e)), due to the higher bandwidth. The upper limit is due to the presence of a time-out for long inactive
10 vol_time.txt Scatter Plot Number of IMSIs in BIN (log) 4 Connections to the Service Number of Users in BIN (log) Total connection time / sec vol_con.txt Scatter Plot e+06 1e+07 Volume / Bytes 1e+08 1e e+06 1e+07 1e+08 Volume / Bytes (a) ti vs. ni (b) ti vs. si (c) ni vs. si (d) ti vs. ni (e) ti vs. si (f) ni vs. si Fig. 4. Logaritmic Scatter Plots of per-ms activity attributes: Number of PPD-Contexts, Total ON-time and Total Volume for UMTS (upper row) and GPRS (lower row). PDP-contexts. In GPRS, for ni > 200 there is a linear cluster, with an average PDP-context duration around 12 sec. The same cluster is also visible in Figure 4(f), indicating a constant size of the transferred volume within each PDP-context (around 1.7 kbytes). This is likely a cluster of automatic services, with periodic activation of short PDP-contexts. Note that for UMTS only very few MS yield more than 200 PDP-contexts in the measurement window. Despite the MSs with ni > 200 are a minor part of the total population (less than 0.1%), they generate a considerable fraction of all PDP-contexts (6.4% in UMTS and 33.6% in GPRS), accounting for 3% of the total volume. Interestingly 22.8% of the UMTSusers and 37.8% of the GPRS-users had only one PDP-context within the observation period. This indicates that our measurement period was too small for the low frequency caused by sporadic users. 5.2 Distribution of PDP-context duration Based on the high dispersion of ni revealed by Figure 5, we know that a simple PDF of dji would be biased by those few users with a very high number of PDP-contexts. These are likely due to automatic periodic access to some custom service, with an intrinsically different behavior from other users. We therefore decided to classify the users into two main groups based on the total number of PDP-contexts and an arbitrary boundary value set to ni =200. The CDF of the PDP-context duration for each group is shown in Figure 5. The curves for the group with ni 200 fit Weibull functions with parameters (188.5; 0.37) for GPRS and (936.0; 0.49) for UMTS. Note that the duration of PDPcontexts is larger in UMTS than in GPRS. For the group with ni >200 the curves show strong discrete steps, which is consistent with the hypothesis of automatically
11 1 0.8 emp. CDF d i (n i 200) UMTS d i (n i >200) UMTS 0.2 d i (n i 200) GPRS d i (n i >200) GPRS Duration of PDP context / sec Fig. 5. Empirical CDF of PDP-context Duration generated procedures. In those applications where it is required to reproduce traffic patterns from this sub-population it might be useful to have a closed form representation of the empirical distribution. This can be approximated by a combination of discrete steps and a fitted curve of the residual PDP-contexts, with parameters extracted from the measurements. However we remark that such patterns are highly service-specific, and highly volatile due to the relative small number of involved MSs: for instance the introduction of a new service or simply a parameter change (e.g. a time-out) can have a major impact on the overall PDP-context pattern. 6 Related works Regarding the service shares there are several papers showing results from measurements in mobile networks, but they are limited to GPRS. In [4] and [7] traffic on the Gn interface was recorded. The dataset was correlated with RADIUS messages to evaluate the service usage in the GPRS network at the PDP-context level. The observation periods were respectively 32 and 24 days recorded by a mobile operator in Hungary in beginning The results presented there show a smaller share of WEB traffic, likely due to the absence of laptop datacards at that time. In [8] more recent data is presented (end 2004). The recorded interface was Gb. The observation period was from 11 a.m to 4 p.m. on ten consecutive days. There are results for the fraction of volumes transferred with UDP and TCP, which match with our records, but no detailed information on the volume per service. There are also older publications covering certain specific services, mainly WAP (e.g. [9], [10]). The only other work presenting statistics about PDP-contexts in GPRS was the technical report [4]. To the best of our knowledge no previous paper so far has reported measurement results about the traffic composition in a real UMTS network. 7 Conclusions and Future Work In this paper we have presented measurement results from an operational GPRS/UMTS network. We provided insight into aspects like traffic composition, per-user traffic distribution and per-user activity at the PDP-context level. We found that the global traffic
12 composition is relatively stable on a daily basis, with some moderate differences between weekends and working days. We found a large variability in the weekly traffic per user, with distributions spanning five orders of magnitude and most of the volume concentrated on a small fraction of heavy-users. The inspection of the per-user activity at the PDP-context level held similar findings: the total user on-time spans several orders of magnitude. In GPRS most of the PDP-contexts are generated by a minor fraction of terminals, likely automated terminals with periodic PDP-context activations. These aspects should be carefully considered when trying to reproduce synthetically the network-wide environment. More specifically, they challenge the practicality of adopting the concept of a representative average user in synthetic simulations. In this work we have moved the first steps to wards the classification of separate user groups, based on the degree of activity and of the accessed services. In the continuation of this work we will try to zoom-in on the user behavior of some specific classes of users. For instance, based on our traces it would be interesting to directly compare the patterns of WEB traffic found in the 3G network with those found in the wired Internet (e.g. following the procedure developed in [11]). The ongoing refinement of the monitoring system will soon make it possible the direct discrimination of the terminal type (laptop datacards, smart-phones, etc. ) based on the the TAC code included in the IMEI identifier. This will allow the exact analysis of traffic based on terminal type. References 1. METAWIN Project. FTW. 2. Gunnar Heine. GPRS - signaling & protocol analysis. Inacon, H. Holma and A. Toskala. Wcdma for umts, radio access for third generation mobile communications, third edition. John Wiley & Sons, Ltd., Kaldena, Varga, Woutersc, and Sandersd. Wireless service usage and traffic characteristics in gprs networks. Technical report, Technical Report Vodafone, R. Pang et al. Characteristics of Internet Background Radiation. Proc. of the International Measurements Conference (IMC 04), Taormina, Sicily, Italy., October TS General Packet Radio Service (GPRS), Service description. ETSI/3GPP. 7. T. Varga, H. Bert, and B. Sanders. Analysis and modelling of wap traffic in gprs networks. ITCSS 04 Antwerpen, pages , H. Dahmouni, D. Rosse, B. Morin, and S. Vaton. Impact of traffic composition on gprs performance. ITC 19th, pages , P. Stuckmann and H. Finck. A wap traffic model and its appliance for the performance analysis of wap over gprs. Proceedings of the IEEE International Conference on Third Generation Wireless and Beyond, pages , June P. Stuckmann and C. Hoymann. Performance evaluation of wap-based applications over gprs. Communications, ICC IEEE International Conference, 5: , A. Bianco et al. Web user session characterization via clustering techniques. IEEE GLOBE- COM, 2005.
Traffic Analysis and Modeling for World of Warcraft
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. Traffic Analysis and Modeling for World of Warcraft
Measurement and Modelling of Internet Traffic at Access Networks
Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department
QoS of Internet Access with GPRS
Dept. of Prof. Dr. P. Tran-Gia QoS of Internet Access with GPRS Dirk Staehle 1, Kenji Leibnitz 1, and Konstantin Tsipotis 2 1 [staehle,leibnitz]@informatik.uni-wuerzburg.de 2 Libertel-Vodafone [email protected]
Empirix xcentrix Mobile Broadband Analysis Package
Datasheet Empirix xcentrix Mobile Broadband Analysis Package Predict: Timely intelligence and expert analysis reveals innovative business opportunities and enables smarter decision-making across the organization
Traffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
3GPP Technologies: Load Balancing Algorithm and InterNetworking
2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology 3GPP Technologies: Load Balancing Algorithm and InterNetworking Belal Abuhaija Faculty of Computers
Monitor - Analyse - Solve
Monitor - Analyse - Solve Data probing solution on Gn & Gp-interface Real-time visibility on mobile data performance Fast deployment, easy-to-use, cost-effective A different approach towards network monitoring
GPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
How is SUNET really used?
MonNet a project for network and traffic monitoring How is SUNET really used? Results of traffic classification on backbone data Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Wireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.
STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected]
DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Index. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284
bindex.fm Page 296 Tuesday, March 22, 2005 7:17 AM Index 2G, 2.5G, 3G 13 3GPP 118 Release 5 (Rel 5) 124 Release 6 (Rel 6) 125 Release 97/98 (Rel 97/98) 119 Release 99 (Rel 99) 120 4 3GPP2 129 4G 13, 44
Live Traffic Monitoring with Tstat: Capabilities and Experiences
Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010 Outline Motivations Tstat - TCP STatistic
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
10 th World Telecommunication/ICT Indicators Meeting (WTIM-12) Bangkok, Thailand, 25-27 September 2012
10 th World Telecommunication/ICT Indicators Meeting (WTIM-12) Bangkok, Thailand, 25-27 September 2012 Contribution to WTIM-12 session Document C/12-E 26 September 2012 English SOURCE: TITLE: Nokia Siemens
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
A System for Detecting a Port Scanner in 3G WCDMA Mobile Networks
A System for Detecting a Port Scanner in 3G WCDMA Mobile Networks K. Sekwon 1, O. Joohyung 1, I. Chaetae 1, and K. Inho 2 1 Korea Internet & Security Agency, IT Venture Tower, Jungdaero 135, Songpa, Seoul
Network Monitoring Using Traffic Dispersion Graphs (TDGs)
Network Monitoring Using Traffic Dispersion Graphs (TDGs) Marios Iliofotou Joint work with: Prashanth Pappu (Cisco), Michalis Faloutsos (UCR), M. Mitzenmacher (Harvard), Sumeet Singh(Cisco) and George
In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings.
2 2.1 Introduction In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. It has been reported that growth in Internet traffic levels
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
What is going on in Mobile Broadband Networks?
Nokia Networks What is going on in Mobile Broadband Networks? Smartphone Traffic Analysis and Solutions White Paper Nokia Networks white paper What is going on in Mobile Broadband Networks? Contents Executive
UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen
UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
GSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT
MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT STRATEGIC WHITE PAPER As wireless network operators are faced with enormous CAPEX and OPEX decisions, effective and
Performance Issues of TCP and MPEG-4 4 over UMTS
Performance Issues of TCP and MPEG-4 4 over UMTS Anthony Lo [email protected] 1 Wiskunde end Informatica Outline UMTS Overview TCP and MPEG-4 Performance Summary 2 1 Universal Mobile Telecommunications
Managing Capacity Using VMware vcenter CapacityIQ TECHNICAL WHITE PAPER
Managing Capacity Using VMware vcenter CapacityIQ TECHNICAL WHITE PAPER Table of Contents Capacity Management Overview.... 3 CapacityIQ Information Collection.... 3 CapacityIQ Performance Metrics.... 4
Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014
VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
General Packet Radio Service (GPRS): Mobility- and Session Management
ehrstuhl für ommunikationsnetze Prof. Dr.-Ing. Jörg Eberspächer General Packet Radio Service (GPRS): Mobility- and Session Management ITG-Fachgruppe 5.2.4 "IP und Mobility June 20, 2001. Tagung amp-intfort
WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
Internet2 NetFlow Weekly Reports
Internet2 NetFlow Weekly Reports Stanislav Shalunov Internet2 Fall Member Meeting, Indianapolis, 2003-10-13 What is NetFlow? Originally a Cisco proprietary technology Now supported by other vendors and
3G smartphones. ericsson White paper Uen 284 23-3250 February 2015
ericsson White paper Uen 284 23-3250 February 2015 3G smartphones optimizing user experience and network efficiency Rapid global smartphone uptake is creating new mobile data traffic patterns. There is
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Traffic Recognition in Cellular Networks
IT 09 010 Examensarbete 30 hp March 2009 Traffic Recognition in Cellular Networks Alexandros Tsourtis Institutionen för informationsteknologi Department of Information Technology Abstract Traffic Recognition
Opus Guide for IT Managers
Opus Guide for IT Managers Table of Contents Introduction...1 System Requirements...2 Configuration...3 Integration...3 Networking...3 Security...5 Interconnectivity...6 History Archival Sizing...7 Introduction
Performance of UMTS Code Sharing Algorithms in the Presence of Mixed Web, Email and FTP Traffic
Performance of UMTS Code Sharing Algorithms in the Presence of Mixed Web, Email and FTP Traffic Doru Calin, Santosh P. Abraham, Mooi Choo Chuah Abstract The paper presents a performance study of two algorithms
Admission Control for VoIP Traffic in IEEE 802.11 Networks
Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected]
Traffic Modelling for Fast Action Network Games
to be published in Multimedia Tools And Applications 24 (MTAP) Traffic Modelling for Fast Action Network Games Johannes Färber University of Stuttgart, Inst. of Communication Networks and Computer Engineering
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices
ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices Document ID: 119148 Contributed by Krishna Kishore DV, Sujin Anagani, and Parthasarathy M, Cisco TAC Engineers. Jun 12, 2015 Contents
ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification
TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
REPORT ITU-R M.2134. Requirements related to technical performance for IMT-Advanced radio interface(s)
Rep. ITU-R M.2134 1 REPORT ITU-R M.2134 Requirements related to technical performance for IMT-Advanced radio interface(s) (2008) TABLE OF CONTENTS... Page 1 Introduction... 2 2 Scope and purpose... 2 3
Enterprise Network Control and Management: Traffic Flow Models
Enterprise Network Control and Management: Traffic Flow Models William Maruyama, Mark George, Eileen Hernandez, Keith LoPresto and Yea Uang Interactive Technology Center Lockheed Martin Mission Systems
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
Identifying Diverse Usage Behaviors of Smartphone Apps
Identifying Diverse Usage Behaviors of Smartphone Apps Qiang Xu University of Michigan Ann Arbor, MI [email protected] Jeffrey Erman AT&T Labs Research Florham Park, NJ [email protected] Alexandre
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes SAN/iQ Remote Copy Networking Requirements Legal Notices Warranty The only warranties for HP products and services are set forth in the express
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
Inter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
Mobile Backhaul The Next Telecoms Revolution
Mobile Backhaul The Next Telecoms Revolution Foreword Every once in a while the telecommunications industry experiences a technological and commercial revolution. One such revolution took place in the
App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
Planning of UMTS Cellular Networks for Data Services Based on HSDPA
Planning of UMTS Cellular Networks for Data Services Based on HSDPA Diana Ladeira, Pedro Costa, Luís M. Correia 1, Luís Santo 2 1 IST/IT Technical University of Lisbon, Lisbon, Portugal 2 Optimus, Lisbon,
King Fahd University of Petroleum & Minerals Computer Engineering g Dept
King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 543 Mobile and Wireless Networks Term 111 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: [email protected] 12/24/2011
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
NETWORK MANAGEMENT DISCLOSURE
NETWORK MANAGEMENT DISCLOSURE Rules issued by the Federal Communications Commission ( FCC ) require broadband Internet access providers, such as Vyve Broadband, LLC (together with its subsidiaries, Vyve
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
app coverage applied EXTRACT FROM THE ERICSSON MOBILITY REPORT
app applied EXTRACT FROM THE ERICSSON MOBILITY REPORT NOVEMBER 2013 App COVERAGE applied The use of smartphones and tablets has caused a surge in mobile data around the world. Today, users want reliable
Delivering Network Performance and Capacity. The most important thing we build is trust
Delivering Network Performance and Capacity The most important thing we build is trust The Ultimate in Real-life Network Perfomance Testing 1 The TM500 Family the most comprehensive 3GPP performance and
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention
Realtime Network Monitoring for Lawful Interception and Data Retention 2 Realtime Network Monitoring with Passive Probes Realtime monitoring of network connections has been used by telecom operators for
Wireless Access of GSM
Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade
The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com [email protected] September 2003 1 Agenda Today s IT challenges Introduction to Network
GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers
GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers F. Galliano (1), N.P. Magnani (1), G. Minerva (1), A. Rolando (2), P. Zanini (3) (1) CSELT - Via G. Reiss Romoli, 274 - Torino
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
