Measurement and Modelling of Internet Traffic Over 2.5 and 3G Cellular Core Networks

Total Page:16

File Type:pdf, Size:1020Kb

Measurement and Modelling of Internet Traffic Over 2.5 and 3G Cellular Core Networks DISSERTATION Measurement and Modelling of Internet Traffic over 2.5 and 3G Cellular Core Networks ausgef¨uhrt zum Zwecke der Erlangung des akademischen Grades eines Doktors der technischen Wissenschaften eingereicht an der Technischen Universit¨at Wien Fakult¨at f¨ur Elektrotechnik und Informationstechnik von DI Philipp Svoboda Wanriglgasse 1/5 A-1160 Wien Osterreich¨ geboren am 25. M¨arz 1978 in Wien Matrikelnummer: 9825199 Wien, im November 2008 Begutachter: Univ. Prof. Dr. Markus Rupp Institut f¨ur Nachrichtentechnik und Hochfrequenztechnik Technische Universit¨at Wien Osterreich¨ Univ. Prof. Dr. Andreas Kassler Computer Science Department Karlstadt University Sweden Abstract HE task of modeling data traffic in networks is as old as the first commercial telephony systems. TIn the recent past in mobile telephone networks the focus has moved from voice to packet- switched services. The new cellular mobile networks of the third generation (UMTS) and the evolved second generation (GPRS) offer the subscriber the possibility of staying online everywhere and at any time. The design and dimensioning is well known for circuit switched voice systems, but not for mobile packet-switched systems. The terms user expectation, grade of service and so on need to be defined. To find these parameters it is important to have an accurate traffic model that delivers good traffic estimates. In this thesis we carried out measurements in a live 3G core network of an Austrian operator, in order to find appropriate models that can serve as a solid basis for traffic simulations. A requirement for this work was a measurement system, which is able to capture and decode network traffic on various interfaces of the mobile core network. Such a system was established within the METAWIN system. Our results are based on this setup. The work can be split into three parts. First, we studied the service usage on a per user and session base separately for UMTS and GPRS. This analysis revealed that the service usage for UMTS and GPRS is gradually becoming more and more similar and that the main application in terms of transfered bytes is HTTP. Nevertheless, the main application in terms of handsets is WAP. As seen in many network measurements a small fraction of the subscribers generates the majority of the traffic. In a second step we derived traffic models at flow level for UDP/TCP, HTTP, WAP 1.x and WAP 2.0. The TCP and HTTP flows follow a heavy-tailed behavior as expected from wireline measurements. However, UDP and WAP flows showed no heavy-tail effects. Many properties of the mobile flows follow the same distributions as in wireline networks. Third, we designed several source level traffic models. These models allow a better understanding of the user interaction and network settings. In the case of HTTP and FTP we updated the parameters of existing models in order to meet our requirements. The mobile Internet access features high RTTs, so we modified existing e-mail models to reproduce traffic at a better granularity. In order to provide models for upcoming applications we designed three models for online games and a push to talk implementation. i ii Kurzfassung ER Wunsch nach einem Modell f¨ur den durch die Benutzer erzeugten Verkehr reicht zur¨uck Dbis zu den Anf¨angen der kommerziellen Telefonie. Die Einf¨uhrung der dritten Generation der Mobilfunktechnik (UMTS) beziehungsweise die Weiterentwicklung der zweiten Generation haben den Schwerpunkt der angebotenen Dienste von Sprache zu paketvermittelten Diensten verschoben. Im Gegensatz zu Sprachdiensten, wo seit Jahrzehnten bew¨ahrte Modelle verwendet werden, gibt es f¨ur paketvermittelte Dienste keine Verkehrsmodelle, welche auf ein mobiles Szenario zugeschnitten w¨aren. In dieser Arbeit haben wir die Messungen aus einem im operativen Betrieb befindlichen Mobil- funktnetz der dritten Generation herangezogen, um den Verkehr zu analysieren und in Folge passende Modelle zu entwerfen. Die Basis unserer Arbeit bildet das METAWIN System. Dieses erlaubt es, auf verschiedenen Schnittstellen des Mobilfunktnetzes Paketdaten aufzuzeichnen und dann je Benutzer und Sitzung auszuwerten. Wir haben die Arbeit in drei Bereiche gegliedert. Der erste Bereich befasst sich mit der Analyse des Benutzerverhaltens bezogen auf die verwendeten Dienste in UMTS und GPRS. Es hat sich gezeigt, dass die Hauptanwendung, bezogen auf das erzeugte Volumen, in beiden Netzen HTTP ist. Setzt man hingegen die Anzahl der involvierten Endger¨ate als Massstab f¨ur die Wichtigkeit eines Dienstes, so sind die verschiedenen Versionen von WAP am wichtigsten. Ahnlich¨ wie es sich in fr¨uheren Messungen an Festnetzkunden gezeigt hat, erzeugt ein kleiner Anteil der Kunden den Großteil der anfallenden Verkehrslasten. In einem weiteren Schritt haben wir Verkehrsmodelle auf Basis von Dienstfl¨ussen erstellt. Wir haben dabei eine Auswahl der wichtigsten Dienste herausgegriffen: TCP/UDP, HTTP und WAP. Die Verteilungen f¨ur HTTP und TCP zeigen, ¨ahnlich wie im Festnetz, eine sogenannte heavy tail Eigenschaft, w¨ahrend die anderen Dienste diese Eigenschaft nicht haben. Die Eigenschaften von UMTS und GPRS unterscheiden sich kaum, offenkundig reagieren diese Eigenschaften nicht auf die unterschiedlichen physikalischen Netzwerkparameter. In dritten und letzten Schritt haben wir f¨ur einige der Topdienste separate Verkehrmodelle ent- worfen. Im Falle von HTTP und FTP haben wir die Parameter von existierenden Modellen an unsere Daten angepasst. F¨ur den Maildienst haben wir gezeigt, dass man im Falle eines Internet- zugangs mit hohen Latenzzeiten den Authentifizierungsvorgang detailiert nachbilden muss, um eine hohe Genauigkeit zu erhalten. Die drei Modelle f¨ur Dienste, aus dem Bereich der Onlinespiele dienen als Grundlage f¨ur zuk¨unftige Dienste die mit steigender Leistungf¨ahigkeit der Funkschnittstelle ¨uber kurz oder lang auch Einzug in der mobilen Welt finden werden. Ein Modell f¨ur Push to Talk Dienste rundet die Analyse ab. iii iv Acknowledgements “The shortest distance between two points is under construction” N. Altito I would like to thank some of the persons without whose support this work would not have been possible. First of all, Univ. Prof. Dr. Markus Rupp, whose support and encouragement helped me through the difficult times which such a thesis has. Second, Dr. Fabio Ricciato for the opportunity to work in the METAWIN research group at the ftw. in Vienna. Third, Univ. Prof. Dr. Andreas Kassler, whose support and review helped me to improve and polish my work. I am also very grateful for the many fruitful discussions I had with the METAWIN staff which helped me greatly in succeeding in my work. In this context I thank mobilkom austria AG for technical and financial support of this work1 and the Kapsch Carrier Com as the second industrial partner in the METAWIN project. I would also like to express my thanks to my fellow colleagues of the Mobilfunk Gruppe at the Institute of Communications and Radio-Frequency Engineering in Vienna, Austria for an inspiring working environment and for many helpful comments and inputs. I would like to thank my father Alfred, my mother Gabriele and my brother Markus for supporting me in my work and providing me with a pleasant and stable background. Finally, I thank all my friends for their patience and the relaxing times we had. Vienna, November 2008 Philipp Svoboda Phone: (+43 1) 58801-38968 e-mail: [email protected] 1The views expressed in this thesis are those of author and do not necessarily reflect the views within mobilkom austria AG. v vi Contents 1 Introduction 1 1.1 Motivation ...................................... .... 3 1.2 OutlineandContributions. ......... 5 2 Theoretical Background 11 2.1 TheInternet:Acrashcourse . ........ 13 2.1.1 TheInternetProtocolSuite . ....... 13 2.1.2 The Application Layer: Internet Services . ........... 16 2.2 TrafficEngineering ................................ ...... 17 2.2.1 IntroductiontoTrafficEngineering . ......... 18 2.2.2 TrafficModels ................................... 19 2.3 Summary ......................................... 26 3 Measurement Setup and Introduction to 3G Core Networks 27 3.1 The Evolution of Mobile Core Networks . .......... 29 3.2 Introduction to the 3G Packet Switched Core Network . .............. 30 3.2.1 SystemArchitecture . ..... 31 3.2.2 BearerSpeedinUMTS ............................. 33 3.2.3 BearerSpeedinGPRSandEDGE . 34 3.3 ADataSessionina3GNetwork . ...... 35 3.4 TheMeasurementSetup............................. ...... 36 3.4.1 METAWIN ...................................... 36 3.4.2 Tracesfromalive3GCoreNetwork . ...... 40 3.5 Summary ......................................... 42 4 User Related Composition of GPRS/UMTS Traffic 43 4.1 Daily Usage Profile for UMTS and GPRS . ....... 45 4.2 VolumeandUserPopulation . ....... 47 4.2.1 Volumes and User Population in GPRS and UMTS . ....... 47 4.2.2 FractionofVolumeperService . ....... 48 4.2.3 ServiceMixDiurnalProfile . ...... 50 4.2.4 Grouping Subscribers per Service Access . ........... 52 4.2.5 FilteringinthePortAnalysis . ........ 53 4.3 AnalysisofthePDP-ContextActivity . .......... 54 4.3.1 Per-UserActivity............................... 54 4.3.2 Distribution of PDP-Context Duration . ......... 55 4.3.3 TheVolumeofaPDP-Context . 58 4.3.4 TotalNumbersperGroups . 60 4.4 Detecting and Filtering of Malicious Traffic . ............. 60 4.5 Summary ......................................... 62 vii 5 Application Flow Patterns 65 5.1 IntroductiontoFlowAnalysis. .......... 67 5.1.1 TheFlow ....................................... 68 5.1.2 ProtocolShares...............................
Recommended publications
  • Network Traffic Modeling
    Chapter in The Handbook of Computer Networks, Hossein Bidgoli (ed.), Wiley, to appear 2007 Network Traffic Modeling Thomas M. Chen Southern Methodist University, Dallas, Texas OUTLINE: 1. Introduction 1.1. Packets, flows, and sessions 1.2. The modeling process 1.3. Uses of traffic models 2. Source Traffic Statistics 2.1. Simple statistics 2.2. Burstiness measures 2.3. Long range dependence and self similarity 2.4. Multiresolution timescale 2.5. Scaling 3. Continuous-Time Source Models 3.1. Traditional Poisson process 3.2. Simple on/off model 3.3. Markov modulated Poisson process (MMPP) 3.4. Stochastic fluid model 3.5. Fractional Brownian motion 4. Discrete-Time Source Models 4.1. Time series 4.2. Box-Jenkins methodology 5. Application-Specific Models 5.1. Web traffic 5.2. Peer-to-peer traffic 5.3. Video 6. Access Regulated Sources 6.1. Leaky bucket regulated sources 6.2. Bounding-interval-dependent (BIND) model 7. Congestion-Dependent Flows 7.1. TCP flows with congestion avoidance 7.2. TCP flows with active queue management 8. Conclusions 1 KEY WORDS: traffic model, burstiness, long range dependence, policing, self similarity, stochastic fluid, time series, Poisson process, Markov modulated process, transmission control protocol (TCP). ABSTRACT From the viewpoint of a service provider, demands on the network are not entirely predictable. Traffic modeling is the problem of representing our understanding of dynamic demands by stochastic processes. Accurate traffic models are necessary for service providers to properly maintain quality of service. Many traffic models have been developed based on traffic measurement data. This chapter gives an overview of a number of common continuous-time and discrete-time traffic models.
    [Show full text]
  • Ethernet LAN (Angolul Link Layer) NET
    Computer Networks Sándor Laki ELTE-Ericsson Communication Networks Laboratory ELTE FI – Department Of Information Systems [email protected] http://lakis.web.elte.hu Based on the slides of Laurent Vanbever. Further inspiration: Scott Shenker & Jennifer Rexford & Phillipa Gill Last week on Computer Networks Overview What is a network made of? Three main components End-points Switches Links Overview How to share network resources? Resource handling Two different approaches for sharing Reservation On-demand Reserve the needed Send data when needed bandwidth in advance Packet-level multiplexing Flow-level multiplexing Pros & Cons Pros Cons Predictable performance Low efficiency Bursty traffic Short flows Simple and fast switching Complexity of circuit establ./teard. once circuit established Increased delay New circuit is needed in case of failures Implementation Reservation On-demand Circuit-switching Packet-switching e.g. landline phone networks e.g. Internet Packets Overview How to organize the network? Tier-1 ISP Tier-1 ISP IXP Tier-2 ISP Tier-2 ISP Access ISP Access ISP This week How does communication happen? How do we characterize it? Briefly… The Internet should allow processes on different hosts to exchange data everything else is just commentary… Ok, but how to do that in a complex system like the Internet? University net Phone company CabelTV company Enterprise net To exchange data, Alice and Bob use a set of network protocols Alice Bob A protocol is like a conversational convention The protocol defines the order and rules the parties
    [Show full text]
  • Internet Research: Comments on Formulating the Problem
    Internet Research: Comments on Formulating the Problem Gathered by Sally Floyd, with contributions from Deborah Estrin, Greg Minshall, Vern Paxson, Lixia Zhang, and others. January 21, 1998 1 Introduction Development and deployment in the infrastructure is of necessity incremental. This note contains a discussion about formulating the research Explicit examined assumptions are better than implicit un- problem for Internet research. examined ones. The goal of this note is to further the discussion of implicit Changes in the Internet can be unanticipated and uncon- and explicit assumptions in network research. In particular, trolled. this note tries to articulate one such set of assumptions for In- The Internet architecture and scale make requirements for ternet research. Each of these assumptions is shared by some global consistency problematic. subset of the network research community, though perhaps Some research problems have their own natural time none of these assumptions are shared universally. The goal scales. of this paper is not to argue the validity of the assumptions, but to articulate them, to invite discussion of con¯icting or shared sets of assumptions, and to consider the implications 3 Discussion of the assumptions of these assumptions in formulating problems in Internet re- search. This process would aim for both a greater convergence Robustness is more important than ef®ciency. of underlying assumptions, and a more explicit and examined Robustness has been one of the great strengths of the Inter- discussion of those assumptions. net, integral to its design from the very beginning [Clark88]. In some sense, this note is in the tradition of Shenker et al.©s One of our overriding assumptions is that it is critical not to paper on ºPricing in Computer Networks: Reshaping the Re- subordinate robustness to the goal of more closely approxi- search Agendaº [Shenker96], which is a discussion about for- mating optimal ef®ciency.
    [Show full text]
  • Third Annual Workshop on Meteorological and Environmental Inputs to Aviation Systems
    National Aeronautics and Space Ad ministration NASA CP-2104 PROCEEDINGS: THIRD ANNUAL WORKSHOP ON METEOROLOGICAL AND ENVIRONMENTAL INPUTS TO AVIATION SYSTEMS APRIL 3-5,1979 UNIVERSITY OF TENNESSEE SPACE INSTITUTE EDITORS: DENNIS W. CAMP WALTER FROST FAA-RD-79-49 i APPROVAL PROCEEDINGS: THIRD ANNUAL WORKSHOP ON METEOROLOGICAL AND ENVIRONMENTAL INPUTS TO AVIATION SYSTEMS Edited by Dennis W. Camp and Walter Frost The i formation in this report has been reviewed for t chni a1 content. Review of any information concerning Department of Defense or nuclear energy activities or programs has been made by the MSFC Security Classification Officer. This report, in its entirety, has been deter- mined to be unclassified. ahcmCHARLES A. LUNDQUIST / Director, Space Sciences Laboratory TECHNICAL REPORT STANDARD TITLE PAGE 1 REPORT NO, 12 GOVERNNENT ACCESSION NO. 13 RECIPIENT’S CATALOG NO. Proceedings. Third Annual Workshop on Meteorological and Environmental Inputs to Aviation Systems 6 PERFORMING ORGANIZATION CODE The University of Tennessee Space Institute Tullahoma, Tennessee 37388 12 SPONSORING AGENCY NAME AND ADDRESS Conference Publicat ion istration, Washington, D C 20553 mospheric Administration, The proceedings of a workshop on meteorological and environmental inputs to aviation systems held at The University of Tennessee Space Institute, Tullahoma, Tennessee, Apr.11 3-5, 1979, are reported The workshop was jointly sponsored by NASA, NOAA, and FAA and brought together many disciplines of the aviation communities in round table discussions The
    [Show full text]
  • The Internet
    The Internet G iovanni N eglia U niversità di Palerm o 2006/2007 Slides by courtesy of prof. B ianchi G. Bianchi, G. Neglia Traditional approach to Internet Teaching 1. transmission technologies • physical carriers, modulation, etc 2. data link protocols • reliable transfer of bits from point to point 3. Packet switching • Historical perspective, then technologies, routing, protocols, finally IP 4. Packet forwarding • Glue IP routing with layer 2, ARP,... 5. Transport protocols, application protocols • In a rush!! (just a bit of TCP, HTTP, …) G. Bianchi, G. Neglia 1 A pproach adopted in this course (almost) Top-Down ° Applications are indeed important ° What you see is what you learn first ß Start focusing on internet application programming ° Notion of sockets (no Java programming this year) ° Transport layer as application developement platform ß Web as driving application ° Limited details on other apps G. Bianchi, G. Neglia Course objectives & limits ß O B J ECTIV ES : ° U nderstanding w hat type of netw ork the Internet really is. ° U nderstanding w hy protocols have been designed as they are ° achieving capability to respond to laym an (the m ost critical) questions ° know ing w hat to read, w hen tech problem s arise ß LIM ITS : ° Scope lim ited to “just” inter-netw orking; no netw orking (no m ention to w hat’s below the internet protocol – dealt w ith in past courses) ° Lim ited to basic classical Internet (no m ention to recent developem ents) G. Bianchi, G. Neglia 2 Teaching Material Book and notes ° Nicola Blefari Melazzi, dispense, versione 4.2 (in italian), 2003 • Available online • In progress (310 pages at the moment) ° James F.
    [Show full text]
  • Next‐Generation Firewall Performance Benchmarking Methodology Draft
    Next‐Generation Firewall Performance Benchmarking Methodology Draft draft‐balarajah‐bmwg‐ngfw‐performance‐02 IETF 101, London, March 20, 2018 Bala Balarajah / Carsten Rossenhövel Goals . Provide benchmarking terminology and methodology for next‐generation network security devices including . Next‐generation firewalls (NGFW) . Intrusion detection and prevention solutions (IDS/ IPS) . Unified threat management (UTM) . Web Application Firewalls (WAF) . Strongly improve the applicability, reproducibility and transparency of benchmarks . Align the test methodology with today's increasingly complex layer 7 application use cases Table of Contents (1) 1. Introduction 2. Requirements 3. Scope 4. Test Setup . Test Bed Configuration . DUT/SUT Configuration . Test Equipment Configuration 5. Test Bed Considerations 6. Reporting . Key Performance Indicators Table of Contents (2) 7. Benchmarking Tests 1. Throughput Performance With NetSecOPEN Traffic Mix 2. Concurrent TCP Connection Capacity With HTTP Traffic 3. TCP/HTTP Connections Per Second 4. HTTP Transactions Per Second 5. HTTP Throughput 6. HTTP Transaction Latency 7. Concurrent SSL/TLS Connection Capacity 8. SSL/TLS Handshake Rate 9. HTTPS Transactions Per Second 10. HTTPS Throughput Test Setup Aggregation Solution Aggregation Switch/Router Switch/Router (optional) Under Test (optional) Emulated Router(s) Emulated Router(s) (optional) (optional) Emulated Clients Emulated Servers Test Equipment Test Equipment Feature Profiles NGFW Initial NGFW Future NG‐IPS AD WAF BPS SSL Broker SSL Inspection x Intrusion (IPS/IPS) x Web Filtering X Antivirus x Anti Spyware x Anti Botnet x DLP x DDoS x Certificate Validation x Logging and Reporting x App Identification x Key Performance Indicator (KPI) Definitions . TCP Concurrent Connections . TCP Connection Setup Rate . Application Transaction Rate . TLS Handshake Rate .
    [Show full text]
  • Multiplexing Traffic at the Entrance to Wide-Area Networks
    Multiplexing Traf®c at the Entrance to Wide-Area Networks RamoÂn CaÂceres Ph.D. Dissertation Report No. UCB/CSD 92/717 Computer Science Division University of California Berkeley CA 94720 December 1992 [email protected] -ii- Multiplexing Traf®c at the Entrance to Wide-Area Networks Copyright 1992 by RamoÂn CaÂceres - iii - A mis padres, Mon y Mirtha. -iv- Abstract Many application-level traf®c streams, or conversations, are multiplexed at the points where local-area networks meet the wide-area portion of an internetwork. Multiplexing policies and mechanisms acting at these points should provide good performance to each conversation, allocate network resources fairly among conversations, and make ef®cient use of network resources. In order to characterize wide-area network traf®c, we have analyzed traces from four Inter- net sites. We identify characteristics common to all conversations of each major type of traf®c, and ®nd that these characteristics are stable across time and geographic site. Our results contrad- ict many prevalent beliefs. For example, previous simulation models of wide-area traf®c have assumed bulk transfers ranging from 80 Kilobytes to 2 Megabytes of data. In contrast, we ®nd that up to 90% of all bulk transfers involve 10 Kilobytes or less. This and other ®ndings may affect results of previous studies and should be taken into account in future models of wide-area traf®c. We derive from our traces a new workload model for driving simulations of wide-area internetworks. It generates traf®c for individual conversations of each major type of traf®c.
    [Show full text]
  • UNITED STATES SECURITIES and EXCHANGE COMMISSION Washington, D.C
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 - -------------------------------------------------------------------------------- FORM 10-K (Mark One) |X| ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 [FEE REQUIRED] For the fiscal year ended December 31, 1996 OR | | TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE EXCHANGE ACT OF 1934 [NO FEE REQUIRED] For the transition period from _______ to _______ Commission file number 0-19551 - -------------------------------------------------------------------------------- Atlantic Tele-Network, Inc. (Exact name of registrant as specified in its charter) Delaware Chase Financial Center (State or other jurisdiction of P.O. Box 1730 incorporation or organization) St. Croix, U.S. Virgin Islands (Address of principal executive offices) 00821 47-0728886 (Zip Code) I.R.S. Employer Identification No.) (809) 777-8000 (Registrant's telephone number, including area code) _______________________________________________ Securities registered pursuant to Section 12(b) of the Act: Name of each exchange on Title of each class which registered ---------------------------- ---------------------------- Common Stock, Par Value $.01 per Share American Stock Exchange Securities registered pursuant to Section 12(g) of the Act: Title of each class - ---------------------------- None _______________________________________ Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities
    [Show full text]
  • A Peer-To-Peer Internet for the Developing World SAIF, CHUDHARY, BUTT, BUTT, MURTAZA
    A Peer-to-Peer Internet for the Developing World SAIF, CHUDHARY, BUTT, BUTT, MURTAZA Research Article A Peer-to-Peer Internet for the Developing World Umar Saif Abstract [email protected] Users in the developing world are typically forced to access the Internet at a Associate Professor fraction of the speed achievable by a standard v.90 modem. In this article, we Department of Computer Science, LUMS present an architecture to enable ofºine access to the Internet at the maxi- Opposite Sector U, DHA mum possible speed achievable by a standard modem. Our proposed architec- Lahore 54600 ture provides a mechanism for multiplexing the scarce and expensive interna- Pakistan tional Internet bandwidth over higher bandwidth P2P (peer-to-peer) dialup ϩ92 04 205722670, Ext. 4421 connections within a developing country. Our system combines a number of architectural components, such as incentive-driven P2P data transfer, intelli- Ahsan Latif Chudhary gent connection interleaving, and content-prefetching. This article presents a Research Associate detailed design, implementation, and evaluation of our dialup P2P data trans- Department of Computer fer architecture inspired by BitTorrent. Science, LUMS Opposite Sector U, DHA Lahore 54600 Pakistan 1. Introduction The “digital divide” between the developed and developing world is un- Shakeel Butt derscored by a stark discrepancy in the Internet bandwidth available to Research Associate end-users. For instance, while a 2 Mbps ADSL link in the United States Department of Computer costs around US$40/month, a 2 Mbps broadband connection in Pakistan Science, LUMS costs close to US$400/month. Opposite Sector U, DHA The reasons for the order of magnitude difference in end-user band- Lahore 54600 Pakistan width in the developed and the developing world are threefold: • Expensive International Bandwidth: Developing countries often Nabeel Farooq Butt have to pay the full cost of a link to a hub in a developed country, Research Associate making the cost of broadband Internet connections inherently ex- Department of Computer pensive for ISPs.
    [Show full text]
  • Quality of Service Oriented Traffic Engineering
    Quality of Service oriented Traffic Engineering Methods for Multi-Service Cellular Networks Dienstgüte-orientierte verkehrstheoretische Methoden für die Bereitstellung unterschiedlicher Dienste in zellularen Netzen Der Technischen Fakultät der Universität Erlangen-Nürnberg zur Erlangung des Grades DOKTOR INGENIEUR vorgelegt von LARISSA N. POPOVA Erlangen – 2009 Als Dissertation genehmigt von der Technischen Fakultät der Friedrich-Alexander-Universität Erlangen-Nürnberg Tag der Einreichung: 07. Dezember 2009 Tag der Promotion: 12. February 2010 Dekan: Prof. Dr.-Ing. Reinhard German Berichterstatter: Prof. Dr.-Ing. Villy Baek Iversen Prof. Dr.-Ing. Wolfgang Koch To my husband Denis and my sons Konstantin and Maxim Acknowledgment First of all, I would like to thank my supervisor Prof. Wolfgang Koch, for giving me the opportunity to pursue my Ph.D. at his Institute of Mobile Communication and for providing an environment where it was a pleasure to work. I am grateful to him for the fruitful discussions on my work, for his continued support and faith in the success of my research. I am indebted to Prof. Villy Baek Iversen for his kind-hearted mentoring, for reviewing my thesis, and for making my memorable stay at Technical University of Denmark, Lyngby, possible. I am very grateful to Dr. Wolfgang Gerstacker for his interest in my work, for his great encouragement, and for finding time to participate in the defense of this work. I would also like to thank all my colleagues at the Telecommunications Laboratory in Erlangen for creating pleasant and humorous atmosphere. Special thanks go to my roommate Armin Schmidt, for interesting scientific and non- scientific discussions, as well as for his technical LaTeX support.
    [Show full text]
  • Microwave Landing System MLS Area Navigation
    NORTH ATLANTIC TREATY ORGANIZATION ADVISORY GROUP FOR AEROSPACE RESEARCH AND DEVELOPMENT (ORGANISATION DU TRAlTE DE L'ATLANTIQUE NORD) AGARD Conference Proceedings No.410 EFFICIENT CONDUCT OF INDMDUAL FLIGHTS AND AIR TRAFFIC OPTIMUM UTILIZATION OF MODERN TECHNOLOGY (guidance, control, navigation, communication, surveillance and pkcessing facilities) FOR THE OVERALL BENEFIT OF CIVIL AND MILITARY AIRSPACE USERS And16 Benoit Symposium Chairman and Editor Papers presented at the 42nd Symposium of the Guidance and Control Panel, held in Brussels, Belgium, 10-13 June 1986. THE MISSION OF AGARD The mission of AGARD is to bring together the leading personalities of the NATO nations in the fields of science and technology relating to aerospace for the following purposes: -Exchanging of scientific and technical information; - Continuously stimulating advances in the aerospace sciences relevant to strengtheningthe common defence posture; - Improving the co-operation among member nations in aerospace research and development; - Providing scientific and technical advice and assistance to the Military Committee in the field of aerospace research and development (with particular regard to its military application); - Rendering scientific and technical assistance, as requested, to other NATO bodies and to member nations in connection with research and development problems in the aerospace field; - Providing assistance to member nations for the purpose of increasing their scientific and technical potential; - Recommending effective ways for the member nations to use their research and development capabilities for the common benefit of the NATO community. The highest authority within AGARD is the National Delegates Board consisting of officially appointed senior representatives from each member nation. The mission of AG- is camed out through the panels which are composed of exDerts aooointed bv the National Delecates.
    [Show full text]
  • ETR 226 TECHNICAL October 1995 REPORT
    ETSI ETR 226 TECHNICAL October 1995 REPORT Source: ETSI TC-RES Reference: DTR/RES-10-06 ICS: 33.060.20 Key words: LAN, radio Radio Equipment and Systems (RES); HIgh PErformance Radio Local Area Networks (HIPERLAN); Architecture for Time Bound Services (TBS) ETSI European Telecommunications Standards Institute ETSI Secretariat Postal address: F-06921 Sophia Antipolis CEDEX - FRANCE Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE X.400: c=fr, a=atlas, p=etsi, s=secretariat - Internet: [email protected] Tel.: +33 92 94 42 00 - Fax: +33 93 65 47 16 Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. New presentation - see History box © European Telecommunications Standards Institute 1995. All rights reserved. Page 2 ETR 226: October 1995 Whilst every care has been taken in the preparation and publication of this document, errors in content, typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to "ETSI Editing and Committee Support Dept." at the address shown on the title page. Page 3 ETR 226: October 1995 Contents Foreword .......................................................................................................................................................7 Introduction....................................................................................................................................................7 1 Scope ..................................................................................................................................................9
    [Show full text]