End-to-end QoS negotiation in network federations
|
|
- Elijah Pitts
- 6 years ago
- Views:
Transcription
1 End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010
2 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation Definitions and problem formulation Game model Conclusion 2 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
3 Big picture of the Internet I want to do Cloud computing! Operators had their time, now comes the OTTs age I want more bandwidth for free! The Future Internet belongs to robots We need to upgrade our equipments to sustain your demands, give us compensation You may see Internet as a black box The reality is much more complex Pay me I m famous! And I, remote surgery! Paying for bandwidth, are you kidding me? 3 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
4 Diagnosis To support future high performance applications, today s Internet is facing major issues : Need for End-to-end QoS guarantees (bandwidth, latency, availability, reliability, security, etc.) not possible to extend the current protocol (scalability, confidentiality concerns) Risk of divergence (2 different Internet networks) Reconsider economic agreements Following the historic Tiers hierarchy, new interconnections might be needed Operators will not guarantee anything without compensations Revenue may be cannibalized by OTTs (e.g. Disney) Internet networks must undergo significant transformations: New business models to provide operators incentives to upgrade their infrastructures and deploy new management architectures New architectures, protocols, algorithms that will realize these new business models and enable the on-demand/scheduled establishment of end-to-end QoS guaranteed connection 4 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
5 Different revenue models and associated organization N 1 - Coalition SLSs + cost information This model might not be accepted by regulation Authorities + confidentiality on costs N 2 - Open Market SLSs + bids Several properties to be respected (efficiency, budget balance, etc;). Need to be incentive enough for operators so that they cooperate N 3 Federation/Alliances SLSs + Prices Inline with operators expectations + incentives to cooperate + no cost disclosure 5 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
6 Alliance Business model «When transaction costs are high, the alliance governance structure is the best suited to manage transactions with an intermediate degree of asset specificity [ ] Williamson 1991 Centralized alliance of operators, a Third party handles critical processes ensuring confidentiality on sensitive data Third party Distributed alliance of operators, processes respect confidentiality requirements by construction IC Agent IC Agent IC Agent IC Agent 6 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
7 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation Definitions and problem formulation Game model Conclusion 7 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
8 End-to-end SLA composition problem Q 0 C 1 C 2 Carrier Carrier 0 0 C K C 1 C 2 Carrier Carrier 1 1 C 1 C K Carrier C Carrier C 2 C K Carrier Carrier 3C 2 3 C K 8 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
9 Focus on Step 1 : A possible scenario A possible scenario: 1. A customer requests a service with a (normalized) level of QoS 2. The third party (i.e. a centralized entity receiving customer demands and having access to SLS repositories) treats the request 1. Find a chain of SLSs that satisfies the required QoS demand profile 2. Asks each participant carrier about the bandwidth availability for its corresponding SLS 3. The third party makes an offer to the customer 4. The customer accepts or refuses 5. If the customer accepts, SLSs are committed as SLAs 9 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
10 0 1 Definitions General definition: a SLA (Service Level Agreement) is a committed SLS (Service Level Specification). A SLS represents network resource capabilities in an abstract manner (end-points, thresholds over QoS parameters, etc.) thus avoiding Topology and Capacity publishing Formal definition: In a network federation, aach carrier i publishes J i SLSs. A SLS s ij, j=1,, J i is a tuple (D ij, L ij, B ij, P ij, (in ij, eg ij )) where D ij, L ij, B ij are guarantees on delay, packet-loss and bandwidth (other parameters such as availability could be represented); P ij is a price; (in ij, eg ij ) is a pair of ingress and egress nodes, between which parameters are guaranteed Customer demands are formulated similarly : (D r, L r, B r, P r,s, t)) where QoS parameters corresponds to the choice of a normalized profile of demand k=1,, K, P r is not disclosed, s and t are the source and target nodes. 10 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
11 Problem formulation Optimization criteria could be added Published data Solved when providers check the SLS availability 11 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
12 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation Definitions and problem formulation Game model Conclusion 12 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
13 2 games 1st game : providers compete on prices Incomplete information, providers can only observe the frequency of SLS demands 2nd game : third party and customer Focus on the 2nd game (the 1st game is played before) 2 players N players when repeated Extensive game with incomplete information Utilities: Third party: whole provider utilities, depends on the customer/provider acceptance, objective is to maximize a long-term (discounted) revenue Customer: depends on price, QoS proposed, etc. -> unknown but for a same QoS profile of demand a customer prefers to pay less. 13 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
14 Game model : Third party and Customer Players strategies Customer : chooses a demand profile k and has a limit of price, p bk he is ready to pay; a customer accepts or refuses a proposition. Third party : proposes a SLS chains C k among the SLS chains satisfying profile k and C k is associated to a price p(c k ) we assume this price is the sum of the prices of the SLSs composing chain C k Histories Any history has the form ((k, p bk ), C k, v) where v={ y, or n } Preferences/Utilities no accurate model of customer utility Assumption 1 : for a same QoS, a customer will prefer to pay less Assumption 2 : if all the SLS chain prices are superior to the customer price bound, he will refuse any proposition 14 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
15 Game model : Third party and Customer Nash equilibrium A dominant strategy for the 3rd party is to choose the chain having the lowest price NE when the game is repeated A subgame equilibrium is attainable, after an infinite number of steps: the third party chooses the chains by decreasing values of prices until the customer accepts, similarly the customer can refuse all proposition until he discover the least cost one Problem : the third party reveals all information, still the dominant strategy is to choose the chain having the lowest price. But does it meet the federation objective? 15 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
16 Conclusion Network federation : A new organizational model for ISPs No cost disclosure, price competition, respect of confidentiality Enables incentives for networks to provide QoS Next steps Learning mechanisms to study customer utilities Study of the game between providers Interactions between game 1 and 2 Open issues Comparison of incentives provided by different organizational models Regulation issues 16 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
17 Questions Contact: 17 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009
A Game-Theoretic Framework for Congestion Control in General Topology Networks
A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control
More informationThe Implication of Overlay Routing on ISPs Connecting Strategies
The Implication of Overlay Routing on ISPs Connecting Strategies Graduate School of Information Science and Technology, Osaka University Xun Shao, Go Hasegawa, Yoshiaki Taniguchi, and Hirotaka Nakano IP
More informationAn Architecture for Personal Broadband. Broadband Working Group Elisabeth Maida, MIT May 25, 2006
An Architecture for Personal Broadband Broadband Working Group Elisabeth Maida, MIT May 25, 2006 Agenda The Vision of Personal Broadband Our Approach Define the potential business models Identify the functional
More informationA BGP-Based Mechanism for Lowest-Cost Routing
A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang Theoretical Motivation Internet is comprised of separate administrative
More informationDragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved
NOTICE This document contains DragonWave proprietary information. Use, disclosure, copying or distribution of any part of the information contained herein, beyond that for which it was originally furnished,
More informationETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09
ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA 215462 STREP FP7-ICT-2007 The Network of the Future 1 Motivation Inter carrier (inter Domain) service provisioning automation is gaining
More informationA Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability Professor Anna Nagurney Department of Operations and Information Management Isenberg School of Management
More informationInvestigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning
Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Christos Bouras and Dimitris Primpas Research Academic Computer Technology Institute, N.Kazantzaki
More informationIntroduction to algorithmic mechanism design
Introduction to algorithmic mechanism design Elias Koutsoupias Department of Computer Science University of Oxford EWSCS 2014 March 5-7, 2014 Part I Game Theory and Computer Science Why Game Theory and
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationIncentive Mechanisms for the Enforcement of Collaboration between Network Service Providers
Incentive Mechanisms for the Enforcement of Collaboration between Network Service Providers Eleni Agiatzidou Ph.D. Candidate in Information Systems Department of Informatics Supervisor: Prof. George D.
More informationLecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end
More informationPatrick DeGraba Federal Trade Commission* Why Bill and Keep? Hotel Konigswinter, Germany 3 April 2006
Patrick DeGraba Federal Trade Commission* Why Bill and Keep? Hotel Konigswinter, Germany 3 April 2006 *Any opinions expressed herein do not necessarily reflect those of the FTC or any Commissioner. Why
More informationIntroduction to Game Theory
Lecture Introduction to Game Theory March 30, 005 Lecturer: Anna R. Karlin Notes: Atri Rudra In this course we will look at problems and issues which fall in the intersection of Computer Science and Economics.
More informationBackground Brief. The need to foster the IXPs ecosystem in the Arab region
Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed
More informationVodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.
How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationTask Allocation Negotiation and the Contract Net Protocol
Task Allocation Negotiation and the Contract Net Protocol March 25, 2003 Class Meeting 19 Outline Introduction to Task Allocation The Contract Net Protocol Multi-Robot Task Allocation What is task allocation?
More informationAppropriate Layer-2 Interconnection Between IXPs
Appropriate Layer-2 Interconnection Between IXPs Keith Mitchell NANOG31, San Francisco 24/25 th May 2004 Layer-2 Interconnect Typical scenarios faced by IXP operators today: ISPs conserving router ports
More informationIP exchange. Providing a quality based solution. for IP Interconnect
IP exchange Providing a quality based solution for IP Interconnect In Brief IP exchange - IPX Providing a quality based solution for IP Interconnect The IPX is an interconnect service that is offered by
More informationVertical Handover Decision Strategies A double-sided auction approach
Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous
More informationNew Market Models for Traffic Exchange. Dennis Weller Chief Economist, Verizon WIK International Workshop Konigswinter 4 April 2006
New Market Models for Traffic Exchange Dennis Weller Chief Economist, Verizon WIK International Workshop Konigswinter 4 April 2006 Markets and Policies for the Exchange of Value Among Networks Do we need
More informationProject: A survey and Critique on Algorithmic Mechanism Design
Project: A survey and Critique on Algorithmic Mechanism Design 1 Motivation One can think of many systems where agents act according to their self interest. Therefore, when we are in the process of designing
More informationThe Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne
The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationOver-contribution in discretionary databases
Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center For more info contact Sol Distribution Ltd. A NEW NETWORK PARADIGM What do the following trends have
More informationMotivation and Intro. Vadim Ermolayev. MIT2: Agent Technologies on the Semantic Web
MIT2: Agent Technologies on the Semantic Web Motivation and Intro Vadim Ermolayev Dept. of IT Zaporozhye National Univ. Ukraine http://eva.zsu.zp.ua/ http://kit.zsu.zp.ua/ http://www.zsu.edu.ua/ http://www.ukraine.org/
More informationOPPORTUNITY TO ACCELERATE MOMENTUM
OPPORTUNITY TO ACCELERATE MOMENTUM Pierre-Paul Allard Chief Customer Officer Juniper Networks CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within
More informationNew Jersey LFN Packet Check List
New Jersey LFN 2012-10 Packet Check List Contract Documents Screenshot Page from solicitation that indicates Lead Agency and issuance of solicitation on behalf of themselves, U.S. Communities and agencies
More informationIP Differentiated Services
Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. 7. IP Diffserv introduction Pag. 1 IP Differentiated Services Providing differentiated services in IP networks
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing
More informationThe Role and Contribution of OMA in Service Delivery Platform Standardization
The Role and Contribution of OMA in Service Delivery Platform Standardization ITU-T SDP Workshop 17 October 2011 Musa Unmehopa Technical Plenary Chairman, OMA Senior Manager, Alcatel-Lucent What I ll be
More informationDevelopment of IPX: Myth or Reality?
Development of IPX: Myth or Reality? Patrick MeLampy -CTO/Founder Acme Packet Acme Packet 1 Agenda IPX Acme Packet Perspective IPX and LTE/VoLTE Acme Packet Acme Packet Page 2 IPX A Vendor Perspective
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationRequest for Proposals for Design/Engineering Support Services (RFP No MBI-01)
Request for Proposals for Design/Engineering Support Services (RFP No. 2017-MBI-01) Bidders Conference Questions September 26, 2016 Deadline: September 29, 2016 Question 1. Will the Operators be responsible
More informationAlcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet
Alcatel-Lucent 1850 TSS Product Family Seamlessly migrate from SDH/SONET to packet The Alcatel-Lucent 1850 Transport Service Switch (TSS) products are a family of Packet-Optical Transport switches that
More informationISPs, Backbones and Peering
ISPs, Backbones and Peering 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Norton2010
More informationThe Desired State. Solving the Data Center s N-Dimensional Challenge
The Desired State Solving the Data Center s N-Dimensional Challenge Executive Summary To solve this fundamental problem in the softwaredefined age how to assure application performance while utilizing
More informationAn Intelligent Service Oriented Infrastructure supporting Real-time Applications
An Intelligent Service Oriented Infrastructure supporting Real-time Applications Future Network Technologies Workshop 10-11 -ETSI, Sophia Antipolis,France Karsten Oberle, Alcatel-Lucent Bell Labs Karsten.Oberle@alcatel-lucent.com
More informationOpen ContEnt Aware Networks
Open ContEnt Aware Networks Nathalie Amann, Yann Levené Orange Labs Workshop "Optimization of Network Resources for Content Access and Delivery September 6 th, 2012 www.ict-ocean.eu V.2004-10-01 Agenda
More informationThe Marketplace for Cloud Resources
153 153 95 19 14 21 18 225 22 24 222 222 222 24 24 24 153 153 153 12 12 12 11 215 165 23 225 115 24 51 51 Deutsche Börse Cloud Exchange The Marketplace for Cloud Resources June 214 Deutsche Börse Cloud
More informationWhen Milliseconds Matter. The Definitive Buying Guide to Network Services for Healthcare Organizations
When Milliseconds Matter The Definitive Buying Guide to Network Services for Healthcare Organizations The Changing Landscape of Healthcare IT Pick any of the top trends in healthcare and you ll find both
More informationStrategic Network Formation
Strategic Network Formation Zhongjing Yu, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming What s meaning of Strategic Network Formation? Node : a individual.
More informationOpen access or Making money openly. David D. Clark MIT Computer Science and AI Lab January, 2006
Open access or Making money openly David D. Clark MIT Computer Science and AI Lab January, 2006 Topic? This talk is about: The current debate over open access and network neutrality Proposals to rewrite
More informationNetwork Selection and Handoff in Wireless Networks: A Game Theoretic Approach
Chapter 23 Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach Josephina Antoniou, Vicky Papadopoulou, Vasos Vassiliou, and Andreas Pitsillides Contents 23.1 Introduction... 536
More informationA Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things
A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer
More informationInternet Pricing. Abstract. 1 Introduction. 2 Interconnection. Md. Rafiqul Hasan Chowdhury Helsinki University of Technology
Internet Pricing Md. Rafiqul Hasan Chowdhury Helsinki University of Technology rafiqul.chowdhury@hut.fi Abstract Internet pricing can be seen from two points of view - between service providers and end-users
More informationEthernet Services over OTN Interoperability Steps Closer to Reality
Ethernet Services over OTN Interoperability Steps Closer to Reality By: Jim Jones, Optics Products and Solutions Marketing Manager, Alcatel-Lucent Categories: Article Archive Tags: Ethernet, interoperability,
More informationChallenging Applications of Stochastic Programming
Challenging Applications of Stochastic Programming Anton J. School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia, USA Stochastic Programming SPXII Conference Halifax
More informationService Level Specifications, Cornerstone to E2E QoS across the Internet?
Service Level Specifications, Cornerstone to E2E QoS across the Internet? Yves T Joens Project Manager Network Strategy Group Yves T Joens, Washington 25-26 October page n 1» Outline IP Research in Europe
More informationAir Force Institute of Technology
1 Air Force Institute of Technology Extending Net-Centric Quality of Service to Systems of Systems 12 th Annual NDIA Systems Engineering Conference San Diego, CA 26-29 October 2009 Major Vinod Naga, USAF
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationCSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service
CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have
More informationPricing QoS in Campus Networks
Session: ENT 102-065 Pricing QoS in Campus Networks Nazli Mollah, Marcos S. Pinto Melville University, City Tech, CUNY Abstract Campus Quality of Service (QoS) concerns the transformation of current campuses
More informationStrategic Models for State & Regional Broadband Development. Internet2 Fall Member Meeting Raleigh, NC 5 October 2011
Strategic Models for State & Regional Broadband Development Internet2 Fall Member Meeting Raleigh, NC 5 October 2011 The Need for Partnerships! How advanced networking has been organized from a traditional
More informationITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum
ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom
More informationCloud Computing and Its Impact on Software Licensing
Cloud Computing and Its Impact on Software Licensing By Gretchen Kwashnik & Jim Cecil January 25, 2012 What is Cloud Computing? Cloud computing is a model for enabling: on-demand network access to a shared
More informationNEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements
WHITEPAPER Version 1.1 May 1, 2018 Contents of the white paper are subject to changes and improvements ABSTRACT The Fourth Industrial revolution brings the implementation of such technologies like Big
More informationAPMS CONFERENCE 2017 EECC: GET PRO-INVESTMENT MEASURES BACK ON TRACK. Manuel Braga Monteiro Deutsche Telekom Group Prague, 31st October 2017
APMS CONFERENCE 2017 EECC: GET PRO-INVESTMENT MEASURES BACK ON TRACK Manuel Braga Monteiro Deutsche Telekom Group Prague, 31st October 2017 DT GROUP PRESENCE IN EUROPE Integrated Operators Mobile Only
More informationData Center Applications and MRV Solutions
Data Center Applications and MRV Solutions Introduction For more than 25 years MRV has supplied the optical transport needs of customers around the globe. Our solutions are powering access networks for
More informationInternational Journal of Emerging Technology and Innovative Engineering Volume I, Issue 5, May 2015 (ISSN: )
International Journal of Emerging Technology and Innovative Engineering Volume I, Issue 5, May 2015 (ISSN: 2394 6598) LTE-A SHARING RELATIONSHIP IN MACROCELL AND FEMTOCELLS FOR SPECTRUM Jayaseelan.G [1],
More informationThe Emerging World of Broadband Public Private Partnerships. February 24, 2016 Coalition for Local Internet Choice
The Emerging World of Broadband Public Private Partnerships February 24, 2016 Coalition for Local Internet Choice Seeking understanding of priorities and goals Balance reward, risk, and control Potential
More informationBrochure. Application Development, Test & Delivery. Seven Ways to Fail. Avoid the business risks of inadequately testing your applications.
Application Development, Test & Delivery Avoid the business risks of inadequately testing your applications. Network conditions affect the performance of applications in many ways. Research suggests that
More informationNetwork Planning, Control and Management Perspectives on Dynamic Networking
Network Planning, and Management Perspectives on Dynamic Networking Dr. Thomas Michaelis Michael Duelli Mohit Chamania Bernhard Lichtinger Franz Rambach Stefan Türk Nokia Siemens Networks Research, Technology
More informationFORM 0928A Section O Hospitals
FORM 0928A Section O Hospitals This information must be completed by any organization that indicated in Section H that it is a hospital described in 170(b)(1)(A)(iii). 1. Are all the doctors in your community
More informationA National ICT Transformation Model. December 2010
A National ICT Transformation Model December 2010 Compound Productivity Growth National Productivity Drives Standard of Living 100% 75% 5% Standard of Living Doubles in 14 Years 50% 3% Standard of Living
More informationRoadmap to Availability
Roadmap to Availability 1 Agenda Business and Availability in 2005 Our Availability Challenges in 2005 Building Your Availability Roadmap Managing Availability some insight 1 Business and Availability
More informationEvolving Enterprise Networks with SPB-M
Evolving Enterprise Networks with SPB-M Evolving Enterprise Networks with SPB-M 2017, October 11 Executive Summary Enterprise network managers are being forced to do more with less. Their networks are
More information1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study
Case Study 1588v2 Performance Validation for Mobile Backhaul May 2011 Executive Summary Many mobile operators are actively transforming their backhaul networks to a cost-effective IP-over- Ethernet paradigm.
More informationComposable Infrastructure for Public Cloud Service Providers
Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure Delivers a Cost Effective, High Performance Platform for Big Data in the Cloud How can a public cloud provider offer
More informationInternet. Internet. Internet. S Verkkopalvelujen tuotanto S Network Service Provisioning Lecture 8: Peering
Lic.(Tech.) Marko Luoma (1/33) Lic.(Tech.) Marko Luoma (2/33) S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Lecture 8: The value of is in global reachability Reachability comes
More informationSaba Hosted Customer Privacy Policy
Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data
More informationParsimonious Active Monitoring and Overlay Routing
Séminaire STORE Parsimonious Active Monitoring and Overlay Routing Olivier Brun LAAS CNRS, Toulouse, France February 23 rd, 2017 Olivier Brun STORE Seminar, February 20th, 2017 1 / 34 Outline Introduction
More informationdraft-zhang-nsis-interdomain-qosm-02.txt
NSIS Working Group Internet-Draft Expires: December 2006 J. Zhang Queen Mary, Univ. of London E. Monteiro University of Coimbra P. Mendes DoCoMo Euro-Labs G. Karagiannis University of Twente J. Andres-Colas
More informationSolutions of Stochastic Coalitional Games
Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8443-8450 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410881 Solutions of Stochastic Coalitional Games Xeniya Grigorieva St.Petersburg
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationBusiness Continuity & Disaster Recovery
knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the
More informationITU Workshop. NGN Regulation and Migration Strategies (13-15 th October, 2010)
ITU Workshop NGN Regulation and Migration Strategies (13-15 th October, 2010) Lav Gupta, Principal Advisor, Telecom Regulatory Authority of India, New Delhi Phone :+91-11-23216930, Fax: +91-11-23235270
More informationComment on Strategic Information Management Under Leakage in a. Supply Chain
Comment on Strategic Information Management Under Leakage in a Supply Chain Lin Tian 1 School of International Business Administration, Shanghai University of Finance and Economics, 00433 Shanghai, China,
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationPricing in the Presence of Peering
Pricing in the Presence of Peering Euiwoong Lee David Buchfuhrer Lachlan Andrew Ao Tang Steven Low Engineering & Applied Science Caltech Outline Inter-domain routing on Internet Pricing to maximize revenue
More informationIoT Security and Risk Management
SESSION ID: GPS1-R03 IoT Security and Risk Management Tyson Macaulay Chief Security Strategist, Fortinet IoT Security is a BIG STORY! Security as a % of IT Budget 4% 7% 20 Billion+ devices? 2% Source:
More informationAPPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS
APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS Table of Contents Executive Summary 3 The Colocation Market 4 An Introduction to DCIM 5 The Value of DCIM for Colocation Providers
More informationTechnical Report CS : Incorporating Trust in Network Virtualization
Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE
More informationHow operators can differentiate through policies when sharing small cells
How operators can differentiate through policies when sharing small cells Ilaria Malanchini, Markus Gruber (Bell Labs Alcatel-Lucent Germany) May 11, 2015 1 Wireless resource sharing in Europe 1 ST STEP
More informationInternet Economics: The Use of Shapley Value for ISP Settlement
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 775 Internet Economics: The Use of Shapley Value for ISP Settlement Richard T. B. Ma, Dah Ming Chiu, Fellow, IEEE, John C. S. Lui, Fellow,
More informationPeering at DE-CIX. Frank P. Orlowski Director BIZ Development, Marketing & Consulting. DE-CIX is proud to be the Silver Sponsor of MENOG7
Peering at DE-CIX Frank P. Orlowski Director BIZ Development, Marketing & Consulting DE-CIX is proud to be the Silver Sponsor of MENOG7 Istanbul, October 2010 Mission DE-CIX s mission is to provide premium
More informationThree 3G market scenarios
Savitar Research Group Three 3G market scenarios An Indian perspective Sriram Bhamidipati 10/25/2010 Aug-00 Feb-01 Aug-01 Feb-02 Aug-02 Feb-03 Aug-03 Feb-04 Aug-04 Feb-05 Aug-05 Feb-06 Aug-06 Feb-07 Aug-07
More informationThe Shapley value mechanism for ISP settlement
The Shapley value mechanism for ISP settlement Richard T.B. Ma Dept. of Electrical Engineering Columbia University tbma@ee.columbia.edu Vishal Misra Dept. of Computer Science Columbia University misra@cs.columbia.edu
More information3. Authorize budget changes as outlined in the Financial Impacts and Budget Actions section of this report.
City Council Report To: From: Mayor and City Council City Council Meeting: March 1, 2016 Agenda Item: 3.B Jory Wolf, Chief Information Officer, Information Systems Department, Broadband Subject: Digital
More informationCarrier SDN for Multilayer Control
Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration
More informationThe Evolution of Internet Interconnection from Hierarchy to Mesh : Implications for Government Regulation. May 5, 2014
The Evolution of Internet Interconnection from Hierarchy to Mesh : Implications for Government Regulation May 5, 2014 The Structure of the Early Internet: Hierarchical In order to connect with other ISPs,
More informationHow to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved
How to Choose a CDN Improve Website Performance and User Experience Imperva, Inc. 2017 All Rights Reserved CONTENTS Introduction...3 How Does a CDN Work?...5 The Most Important Factors to Consider When
More informationFarmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and
Farmers Mutual Telephone Company Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Farmers Mutual Telephone
More informationREGULATORY FRAMEWORK FOR THE QOS OF OTTS TOWARDS A SUSTAINABLE AND THRIVING DIGITAL ECOSYSTEM
Un Peuple Un But Une Foi PRIMATURE REGULATORY FRAMEWORK FOR THE QOS OF OTTS TOWARDS A SUSTAINABLE AND THRIVING DIGITAL ECOSYSTEM Malick SYLLA Head of QoS & Coverage Department ARTP / SENEGAL Dakar, March
More informationCLOUD GOVERNANCE SPECIALIST Certification
CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Agenda We study how to route over the Internet 1. Context The Internet, a network of networks Relationships between ASes 2.
More information