End-to-end QoS negotiation in network federations

Size: px
Start display at page:

Download "End-to-end QoS negotiation in network federations"

Transcription

1 End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010

2 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation Definitions and problem formulation Game model Conclusion 2 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

3 Big picture of the Internet I want to do Cloud computing! Operators had their time, now comes the OTTs age I want more bandwidth for free! The Future Internet belongs to robots We need to upgrade our equipments to sustain your demands, give us compensation You may see Internet as a black box The reality is much more complex Pay me I m famous! And I, remote surgery! Paying for bandwidth, are you kidding me? 3 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

4 Diagnosis To support future high performance applications, today s Internet is facing major issues : Need for End-to-end QoS guarantees (bandwidth, latency, availability, reliability, security, etc.) not possible to extend the current protocol (scalability, confidentiality concerns) Risk of divergence (2 different Internet networks) Reconsider economic agreements Following the historic Tiers hierarchy, new interconnections might be needed Operators will not guarantee anything without compensations Revenue may be cannibalized by OTTs (e.g. Disney) Internet networks must undergo significant transformations: New business models to provide operators incentives to upgrade their infrastructures and deploy new management architectures New architectures, protocols, algorithms that will realize these new business models and enable the on-demand/scheduled establishment of end-to-end QoS guaranteed connection 4 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

5 Different revenue models and associated organization N 1 - Coalition SLSs + cost information This model might not be accepted by regulation Authorities + confidentiality on costs N 2 - Open Market SLSs + bids Several properties to be respected (efficiency, budget balance, etc;). Need to be incentive enough for operators so that they cooperate N 3 Federation/Alliances SLSs + Prices Inline with operators expectations + incentives to cooperate + no cost disclosure 5 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

6 Alliance Business model «When transaction costs are high, the alliance governance structure is the best suited to manage transactions with an intermediate degree of asset specificity [ ] Williamson 1991 Centralized alliance of operators, a Third party handles critical processes ensuring confidentiality on sensitive data Third party Distributed alliance of operators, processes respect confidentiality requirements by construction IC Agent IC Agent IC Agent IC Agent 6 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

7 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation Definitions and problem formulation Game model Conclusion 7 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

8 End-to-end SLA composition problem Q 0 C 1 C 2 Carrier Carrier 0 0 C K C 1 C 2 Carrier Carrier 1 1 C 1 C K Carrier C Carrier C 2 C K Carrier Carrier 3C 2 3 C K 8 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

9 Focus on Step 1 : A possible scenario A possible scenario: 1. A customer requests a service with a (normalized) level of QoS 2. The third party (i.e. a centralized entity receiving customer demands and having access to SLS repositories) treats the request 1. Find a chain of SLSs that satisfies the required QoS demand profile 2. Asks each participant carrier about the bandwidth availability for its corresponding SLS 3. The third party makes an offer to the customer 4. The customer accepts or refuses 5. If the customer accepts, SLSs are committed as SLAs 9 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

10 0 1 Definitions General definition: a SLA (Service Level Agreement) is a committed SLS (Service Level Specification). A SLS represents network resource capabilities in an abstract manner (end-points, thresholds over QoS parameters, etc.) thus avoiding Topology and Capacity publishing Formal definition: In a network federation, aach carrier i publishes J i SLSs. A SLS s ij, j=1,, J i is a tuple (D ij, L ij, B ij, P ij, (in ij, eg ij )) where D ij, L ij, B ij are guarantees on delay, packet-loss and bandwidth (other parameters such as availability could be represented); P ij is a price; (in ij, eg ij ) is a pair of ingress and egress nodes, between which parameters are guaranteed Customer demands are formulated similarly : (D r, L r, B r, P r,s, t)) where QoS parameters corresponds to the choice of a normalized profile of demand k=1,, K, P r is not disclosed, s and t are the source and target nodes. 10 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

11 Problem formulation Optimization criteria could be added Published data Solved when providers check the SLS availability 11 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

12 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation Definitions and problem formulation Game model Conclusion 12 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

13 2 games 1st game : providers compete on prices Incomplete information, providers can only observe the frequency of SLS demands 2nd game : third party and customer Focus on the 2nd game (the 1st game is played before) 2 players N players when repeated Extensive game with incomplete information Utilities: Third party: whole provider utilities, depends on the customer/provider acceptance, objective is to maximize a long-term (discounted) revenue Customer: depends on price, QoS proposed, etc. -> unknown but for a same QoS profile of demand a customer prefers to pay less. 13 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

14 Game model : Third party and Customer Players strategies Customer : chooses a demand profile k and has a limit of price, p bk he is ready to pay; a customer accepts or refuses a proposition. Third party : proposes a SLS chains C k among the SLS chains satisfying profile k and C k is associated to a price p(c k ) we assume this price is the sum of the prices of the SLSs composing chain C k Histories Any history has the form ((k, p bk ), C k, v) where v={ y, or n } Preferences/Utilities no accurate model of customer utility Assumption 1 : for a same QoS, a customer will prefer to pay less Assumption 2 : if all the SLS chain prices are superior to the customer price bound, he will refuse any proposition 14 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

15 Game model : Third party and Customer Nash equilibrium A dominant strategy for the 3rd party is to choose the chain having the lowest price NE when the game is repeated A subgame equilibrium is attainable, after an infinite number of steps: the third party chooses the chains by decreasing values of prices until the customer accepts, similarly the customer can refuse all proposition until he discover the least cost one Problem : the third party reveals all information, still the dominant strategy is to choose the chain having the lowest price. But does it meet the federation objective? 15 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

16 Conclusion Network federation : A new organizational model for ISPs No cost disclosure, price competition, respect of confidentiality Enables incentives for networks to provide QoS Next steps Learning mechanisms to study customer utilities Study of the game between providers Interactions between game 1 and 2 Open issues Comparison of incentives provided by different organizational models Regulation issues 16 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

17 Questions Contact: 17 Solving the end-to-end SLA composition problem October 2009 All Rights Reserved Alcatel-Lucent 2009

A Game-Theoretic Framework for Congestion Control in General Topology Networks

A Game-Theoretic Framework for Congestion Control in General Topology Networks A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control

More information

The Implication of Overlay Routing on ISPs Connecting Strategies

The Implication of Overlay Routing on ISPs Connecting Strategies The Implication of Overlay Routing on ISPs Connecting Strategies Graduate School of Information Science and Technology, Osaka University Xun Shao, Go Hasegawa, Yoshiaki Taniguchi, and Hirotaka Nakano IP

More information

An Architecture for Personal Broadband. Broadband Working Group Elisabeth Maida, MIT May 25, 2006

An Architecture for Personal Broadband. Broadband Working Group Elisabeth Maida, MIT May 25, 2006 An Architecture for Personal Broadband Broadband Working Group Elisabeth Maida, MIT May 25, 2006 Agenda The Vision of Personal Broadband Our Approach Define the potential business models Identify the functional

More information

A BGP-Based Mechanism for Lowest-Cost Routing

A BGP-Based Mechanism for Lowest-Cost Routing A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang Theoretical Motivation Internet is comprised of separate administrative

More information

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved NOTICE This document contains DragonWave proprietary information. Use, disclosure, copying or distribution of any part of the information contained herein, beyond that for which it was originally furnished,

More information

ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09

ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA 215462 STREP FP7-ICT-2007 The Network of the Future 1 Motivation Inter carrier (inter Domain) service provisioning automation is gaining

More information

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability Professor Anna Nagurney Department of Operations and Information Management Isenberg School of Management

More information

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Christos Bouras and Dimitris Primpas Research Academic Computer Technology Institute, N.Kazantzaki

More information

Introduction to algorithmic mechanism design

Introduction to algorithmic mechanism design Introduction to algorithmic mechanism design Elias Koutsoupias Department of Computer Science University of Oxford EWSCS 2014 March 5-7, 2014 Part I Game Theory and Computer Science Why Game Theory and

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

Incentive Mechanisms for the Enforcement of Collaboration between Network Service Providers

Incentive Mechanisms for the Enforcement of Collaboration between Network Service Providers Incentive Mechanisms for the Enforcement of Collaboration between Network Service Providers Eleni Agiatzidou Ph.D. Candidate in Information Systems Department of Informatics Supervisor: Prof. George D.

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information

Patrick DeGraba Federal Trade Commission* Why Bill and Keep? Hotel Konigswinter, Germany 3 April 2006

Patrick DeGraba Federal Trade Commission* Why Bill and Keep? Hotel Konigswinter, Germany 3 April 2006 Patrick DeGraba Federal Trade Commission* Why Bill and Keep? Hotel Konigswinter, Germany 3 April 2006 *Any opinions expressed herein do not necessarily reflect those of the FTC or any Commissioner. Why

More information

Introduction to Game Theory

Introduction to Game Theory Lecture Introduction to Game Theory March 30, 005 Lecturer: Anna R. Karlin Notes: Atri Rudra In this course we will look at problems and issues which fall in the intersection of Computer Science and Economics.

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC. How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:

More information

Cyber Partnership Blueprint: An Outline

Cyber Partnership Blueprint: An Outline Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.

More information

Task Allocation Negotiation and the Contract Net Protocol

Task Allocation Negotiation and the Contract Net Protocol Task Allocation Negotiation and the Contract Net Protocol March 25, 2003 Class Meeting 19 Outline Introduction to Task Allocation The Contract Net Protocol Multi-Robot Task Allocation What is task allocation?

More information

Appropriate Layer-2 Interconnection Between IXPs

Appropriate Layer-2 Interconnection Between IXPs Appropriate Layer-2 Interconnection Between IXPs Keith Mitchell NANOG31, San Francisco 24/25 th May 2004 Layer-2 Interconnect Typical scenarios faced by IXP operators today: ISPs conserving router ports

More information

IP exchange. Providing a quality based solution. for IP Interconnect

IP exchange. Providing a quality based solution. for IP Interconnect IP exchange Providing a quality based solution for IP Interconnect In Brief IP exchange - IPX Providing a quality based solution for IP Interconnect The IPX is an interconnect service that is offered by

More information

Vertical Handover Decision Strategies A double-sided auction approach

Vertical Handover Decision Strategies A double-sided auction approach Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous

More information

New Market Models for Traffic Exchange. Dennis Weller Chief Economist, Verizon WIK International Workshop Konigswinter 4 April 2006

New Market Models for Traffic Exchange. Dennis Weller Chief Economist, Verizon WIK International Workshop Konigswinter 4 April 2006 New Market Models for Traffic Exchange Dennis Weller Chief Economist, Verizon WIK International Workshop Konigswinter 4 April 2006 Markets and Policies for the Exchange of Value Among Networks Do we need

More information

Project: A survey and Critique on Algorithmic Mechanism Design

Project: A survey and Critique on Algorithmic Mechanism Design Project: A survey and Critique on Algorithmic Mechanism Design 1 Motivation One can think of many systems where agents act according to their self interest. Therefore, when we are in the process of designing

More information

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Over-contribution in discretionary databases

Over-contribution in discretionary databases Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center

ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center For more info contact Sol Distribution Ltd. A NEW NETWORK PARADIGM What do the following trends have

More information

Motivation and Intro. Vadim Ermolayev. MIT2: Agent Technologies on the Semantic Web

Motivation and Intro. Vadim Ermolayev. MIT2: Agent Technologies on the Semantic Web MIT2: Agent Technologies on the Semantic Web Motivation and Intro Vadim Ermolayev Dept. of IT Zaporozhye National Univ. Ukraine http://eva.zsu.zp.ua/ http://kit.zsu.zp.ua/ http://www.zsu.edu.ua/ http://www.ukraine.org/

More information

OPPORTUNITY TO ACCELERATE MOMENTUM

OPPORTUNITY TO ACCELERATE MOMENTUM OPPORTUNITY TO ACCELERATE MOMENTUM Pierre-Paul Allard Chief Customer Officer Juniper Networks CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within

More information

New Jersey LFN Packet Check List

New Jersey LFN Packet Check List New Jersey LFN 2012-10 Packet Check List Contract Documents Screenshot Page from solicitation that indicates Lead Agency and issuance of solicitation on behalf of themselves, U.S. Communities and agencies

More information

IP Differentiated Services

IP Differentiated Services Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. 7. IP Diffserv introduction Pag. 1 IP Differentiated Services Providing differentiated services in IP networks

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing

More information

The Role and Contribution of OMA in Service Delivery Platform Standardization

The Role and Contribution of OMA in Service Delivery Platform Standardization The Role and Contribution of OMA in Service Delivery Platform Standardization ITU-T SDP Workshop 17 October 2011 Musa Unmehopa Technical Plenary Chairman, OMA Senior Manager, Alcatel-Lucent What I ll be

More information

Development of IPX: Myth or Reality?

Development of IPX: Myth or Reality? Development of IPX: Myth or Reality? Patrick MeLampy -CTO/Founder Acme Packet Acme Packet 1 Agenda IPX Acme Packet Perspective IPX and LTE/VoLTE Acme Packet Acme Packet Page 2 IPX A Vendor Perspective

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

Request for Proposals for Design/Engineering Support Services (RFP No MBI-01)

Request for Proposals for Design/Engineering Support Services (RFP No MBI-01) Request for Proposals for Design/Engineering Support Services (RFP No. 2017-MBI-01) Bidders Conference Questions September 26, 2016 Deadline: September 29, 2016 Question 1. Will the Operators be responsible

More information

Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet

Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet Alcatel-Lucent 1850 TSS Product Family Seamlessly migrate from SDH/SONET to packet The Alcatel-Lucent 1850 Transport Service Switch (TSS) products are a family of Packet-Optical Transport switches that

More information

ISPs, Backbones and Peering

ISPs, Backbones and Peering ISPs, Backbones and Peering 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Norton2010

More information

The Desired State. Solving the Data Center s N-Dimensional Challenge

The Desired State. Solving the Data Center s N-Dimensional Challenge The Desired State Solving the Data Center s N-Dimensional Challenge Executive Summary To solve this fundamental problem in the softwaredefined age how to assure application performance while utilizing

More information

An Intelligent Service Oriented Infrastructure supporting Real-time Applications

An Intelligent Service Oriented Infrastructure supporting Real-time Applications An Intelligent Service Oriented Infrastructure supporting Real-time Applications Future Network Technologies Workshop 10-11 -ETSI, Sophia Antipolis,France Karsten Oberle, Alcatel-Lucent Bell Labs Karsten.Oberle@alcatel-lucent.com

More information

Open ContEnt Aware Networks

Open ContEnt Aware Networks Open ContEnt Aware Networks Nathalie Amann, Yann Levené Orange Labs Workshop "Optimization of Network Resources for Content Access and Delivery September 6 th, 2012 www.ict-ocean.eu V.2004-10-01 Agenda

More information

The Marketplace for Cloud Resources

The Marketplace for Cloud Resources 153 153 95 19 14 21 18 225 22 24 222 222 222 24 24 24 153 153 153 12 12 12 11 215 165 23 225 115 24 51 51 Deutsche Börse Cloud Exchange The Marketplace for Cloud Resources June 214 Deutsche Börse Cloud

More information

When Milliseconds Matter. The Definitive Buying Guide to Network Services for Healthcare Organizations

When Milliseconds Matter. The Definitive Buying Guide to Network Services for Healthcare Organizations When Milliseconds Matter The Definitive Buying Guide to Network Services for Healthcare Organizations The Changing Landscape of Healthcare IT Pick any of the top trends in healthcare and you ll find both

More information

Strategic Network Formation

Strategic Network Formation Strategic Network Formation Zhongjing Yu, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming What s meaning of Strategic Network Formation? Node : a individual.

More information

Open access or Making money openly. David D. Clark MIT Computer Science and AI Lab January, 2006

Open access or Making money openly. David D. Clark MIT Computer Science and AI Lab January, 2006 Open access or Making money openly David D. Clark MIT Computer Science and AI Lab January, 2006 Topic? This talk is about: The current debate over open access and network neutrality Proposals to rewrite

More information

Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach

Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach Chapter 23 Network Selection and Handoff in Wireless Networks: A Game Theoretic Approach Josephina Antoniou, Vicky Papadopoulou, Vasos Vassiliou, and Andreas Pitsillides Contents 23.1 Introduction... 536

More information

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer

More information

Internet Pricing. Abstract. 1 Introduction. 2 Interconnection. Md. Rafiqul Hasan Chowdhury Helsinki University of Technology

Internet Pricing. Abstract. 1 Introduction. 2 Interconnection. Md. Rafiqul Hasan Chowdhury Helsinki University of Technology Internet Pricing Md. Rafiqul Hasan Chowdhury Helsinki University of Technology rafiqul.chowdhury@hut.fi Abstract Internet pricing can be seen from two points of view - between service providers and end-users

More information

Ethernet Services over OTN Interoperability Steps Closer to Reality

Ethernet Services over OTN Interoperability Steps Closer to Reality Ethernet Services over OTN Interoperability Steps Closer to Reality By: Jim Jones, Optics Products and Solutions Marketing Manager, Alcatel-Lucent Categories: Article Archive Tags: Ethernet, interoperability,

More information

Challenging Applications of Stochastic Programming

Challenging Applications of Stochastic Programming Challenging Applications of Stochastic Programming Anton J. School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia, USA Stochastic Programming SPXII Conference Halifax

More information

Service Level Specifications, Cornerstone to E2E QoS across the Internet?

Service Level Specifications, Cornerstone to E2E QoS across the Internet? Service Level Specifications, Cornerstone to E2E QoS across the Internet? Yves T Joens Project Manager Network Strategy Group Yves T Joens, Washington 25-26 October page n 1» Outline IP Research in Europe

More information

Air Force Institute of Technology

Air Force Institute of Technology 1 Air Force Institute of Technology Extending Net-Centric Quality of Service to Systems of Systems 12 th Annual NDIA Systems Engineering Conference San Diego, CA 26-29 October 2009 Major Vinod Naga, USAF

More information

Business Strategy Theatre

Business Strategy Theatre Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Pricing QoS in Campus Networks

Pricing QoS in Campus Networks Session: ENT 102-065 Pricing QoS in Campus Networks Nazli Mollah, Marcos S. Pinto Melville University, City Tech, CUNY Abstract Campus Quality of Service (QoS) concerns the transformation of current campuses

More information

Strategic Models for State & Regional Broadband Development. Internet2 Fall Member Meeting Raleigh, NC 5 October 2011

Strategic Models for State & Regional Broadband Development. Internet2 Fall Member Meeting Raleigh, NC 5 October 2011 Strategic Models for State & Regional Broadband Development Internet2 Fall Member Meeting Raleigh, NC 5 October 2011 The Need for Partnerships! How advanced networking has been organized from a traditional

More information

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom

More information

Cloud Computing and Its Impact on Software Licensing

Cloud Computing and Its Impact on Software Licensing Cloud Computing and Its Impact on Software Licensing By Gretchen Kwashnik & Jim Cecil January 25, 2012 What is Cloud Computing? Cloud computing is a model for enabling: on-demand network access to a shared

More information

NEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements

NEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements WHITEPAPER Version 1.1 May 1, 2018 Contents of the white paper are subject to changes and improvements ABSTRACT The Fourth Industrial revolution brings the implementation of such technologies like Big

More information

APMS CONFERENCE 2017 EECC: GET PRO-INVESTMENT MEASURES BACK ON TRACK. Manuel Braga Monteiro Deutsche Telekom Group Prague, 31st October 2017

APMS CONFERENCE 2017 EECC: GET PRO-INVESTMENT MEASURES BACK ON TRACK. Manuel Braga Monteiro Deutsche Telekom Group Prague, 31st October 2017 APMS CONFERENCE 2017 EECC: GET PRO-INVESTMENT MEASURES BACK ON TRACK Manuel Braga Monteiro Deutsche Telekom Group Prague, 31st October 2017 DT GROUP PRESENCE IN EUROPE Integrated Operators Mobile Only

More information

Data Center Applications and MRV Solutions

Data Center Applications and MRV Solutions Data Center Applications and MRV Solutions Introduction For more than 25 years MRV has supplied the optical transport needs of customers around the globe. Our solutions are powering access networks for

More information

International Journal of Emerging Technology and Innovative Engineering Volume I, Issue 5, May 2015 (ISSN: )

International Journal of Emerging Technology and Innovative Engineering Volume I, Issue 5, May 2015 (ISSN: ) International Journal of Emerging Technology and Innovative Engineering Volume I, Issue 5, May 2015 (ISSN: 2394 6598) LTE-A SHARING RELATIONSHIP IN MACROCELL AND FEMTOCELLS FOR SPECTRUM Jayaseelan.G [1],

More information

The Emerging World of Broadband Public Private Partnerships. February 24, 2016 Coalition for Local Internet Choice

The Emerging World of Broadband Public Private Partnerships. February 24, 2016 Coalition for Local Internet Choice The Emerging World of Broadband Public Private Partnerships February 24, 2016 Coalition for Local Internet Choice Seeking understanding of priorities and goals Balance reward, risk, and control Potential

More information

Brochure. Application Development, Test & Delivery. Seven Ways to Fail. Avoid the business risks of inadequately testing your applications.

Brochure. Application Development, Test & Delivery. Seven Ways to Fail. Avoid the business risks of inadequately testing your applications. Application Development, Test & Delivery Avoid the business risks of inadequately testing your applications. Network conditions affect the performance of applications in many ways. Research suggests that

More information

Network Planning, Control and Management Perspectives on Dynamic Networking

Network Planning, Control and Management Perspectives on Dynamic Networking Network Planning, and Management Perspectives on Dynamic Networking Dr. Thomas Michaelis Michael Duelli Mohit Chamania Bernhard Lichtinger Franz Rambach Stefan Türk Nokia Siemens Networks Research, Technology

More information

FORM 0928A Section O Hospitals

FORM 0928A Section O Hospitals FORM 0928A Section O Hospitals This information must be completed by any organization that indicated in Section H that it is a hospital described in 170(b)(1)(A)(iii). 1. Are all the doctors in your community

More information

A National ICT Transformation Model. December 2010

A National ICT Transformation Model. December 2010 A National ICT Transformation Model December 2010 Compound Productivity Growth National Productivity Drives Standard of Living 100% 75% 5% Standard of Living Doubles in 14 Years 50% 3% Standard of Living

More information

Roadmap to Availability

Roadmap to Availability Roadmap to Availability 1 Agenda Business and Availability in 2005 Our Availability Challenges in 2005 Building Your Availability Roadmap Managing Availability some insight 1 Business and Availability

More information

Evolving Enterprise Networks with SPB-M

Evolving Enterprise Networks with SPB-M Evolving Enterprise Networks with SPB-M Evolving Enterprise Networks with SPB-M 2017, October 11 Executive Summary Enterprise network managers are being forced to do more with less. Their networks are

More information

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study Case Study 1588v2 Performance Validation for Mobile Backhaul May 2011 Executive Summary Many mobile operators are actively transforming their backhaul networks to a cost-effective IP-over- Ethernet paradigm.

More information

Composable Infrastructure for Public Cloud Service Providers

Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure Delivers a Cost Effective, High Performance Platform for Big Data in the Cloud How can a public cloud provider offer

More information

Internet. Internet. Internet. S Verkkopalvelujen tuotanto S Network Service Provisioning Lecture 8: Peering

Internet. Internet. Internet. S Verkkopalvelujen tuotanto S Network Service Provisioning Lecture 8: Peering Lic.(Tech.) Marko Luoma (1/33) Lic.(Tech.) Marko Luoma (2/33) S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Lecture 8: The value of is in global reachability Reachability comes

More information

Saba Hosted Customer Privacy Policy

Saba Hosted Customer Privacy Policy Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data

More information

Parsimonious Active Monitoring and Overlay Routing

Parsimonious Active Monitoring and Overlay Routing Séminaire STORE Parsimonious Active Monitoring and Overlay Routing Olivier Brun LAAS CNRS, Toulouse, France February 23 rd, 2017 Olivier Brun STORE Seminar, February 20th, 2017 1 / 34 Outline Introduction

More information

draft-zhang-nsis-interdomain-qosm-02.txt

draft-zhang-nsis-interdomain-qosm-02.txt NSIS Working Group Internet-Draft Expires: December 2006 J. Zhang Queen Mary, Univ. of London E. Monteiro University of Coimbra P. Mendes DoCoMo Euro-Labs G. Karagiannis University of Twente J. Andres-Colas

More information

Solutions of Stochastic Coalitional Games

Solutions of Stochastic Coalitional Games Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8443-8450 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410881 Solutions of Stochastic Coalitional Games Xeniya Grigorieva St.Petersburg

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the

More information

ITU Workshop. NGN Regulation and Migration Strategies (13-15 th October, 2010)

ITU Workshop. NGN Regulation and Migration Strategies (13-15 th October, 2010) ITU Workshop NGN Regulation and Migration Strategies (13-15 th October, 2010) Lav Gupta, Principal Advisor, Telecom Regulatory Authority of India, New Delhi Phone :+91-11-23216930, Fax: +91-11-23235270

More information

Comment on Strategic Information Management Under Leakage in a. Supply Chain

Comment on Strategic Information Management Under Leakage in a. Supply Chain Comment on Strategic Information Management Under Leakage in a Supply Chain Lin Tian 1 School of International Business Administration, Shanghai University of Finance and Economics, 00433 Shanghai, China,

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Pricing in the Presence of Peering

Pricing in the Presence of Peering Pricing in the Presence of Peering Euiwoong Lee David Buchfuhrer Lachlan Andrew Ao Tang Steven Low Engineering & Applied Science Caltech Outline Inter-domain routing on Internet Pricing to maximize revenue

More information

IoT Security and Risk Management

IoT Security and Risk Management SESSION ID: GPS1-R03 IoT Security and Risk Management Tyson Macaulay Chief Security Strategist, Fortinet IoT Security is a BIG STORY! Security as a % of IT Budget 4% 7% 20 Billion+ devices? 2% Source:

More information

APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS

APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS Table of Contents Executive Summary 3 The Colocation Market 4 An Introduction to DCIM 5 The Value of DCIM for Colocation Providers

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

How operators can differentiate through policies when sharing small cells

How operators can differentiate through policies when sharing small cells How operators can differentiate through policies when sharing small cells Ilaria Malanchini, Markus Gruber (Bell Labs Alcatel-Lucent Germany) May 11, 2015 1 Wireless resource sharing in Europe 1 ST STEP

More information

Internet Economics: The Use of Shapley Value for ISP Settlement

Internet Economics: The Use of Shapley Value for ISP Settlement IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 775 Internet Economics: The Use of Shapley Value for ISP Settlement Richard T. B. Ma, Dah Ming Chiu, Fellow, IEEE, John C. S. Lui, Fellow,

More information

Peering at DE-CIX. Frank P. Orlowski Director BIZ Development, Marketing & Consulting. DE-CIX is proud to be the Silver Sponsor of MENOG7

Peering at DE-CIX. Frank P. Orlowski Director BIZ Development, Marketing & Consulting. DE-CIX is proud to be the Silver Sponsor of MENOG7 Peering at DE-CIX Frank P. Orlowski Director BIZ Development, Marketing & Consulting DE-CIX is proud to be the Silver Sponsor of MENOG7 Istanbul, October 2010 Mission DE-CIX s mission is to provide premium

More information

Three 3G market scenarios

Three 3G market scenarios Savitar Research Group Three 3G market scenarios An Indian perspective Sriram Bhamidipati 10/25/2010 Aug-00 Feb-01 Aug-01 Feb-02 Aug-02 Feb-03 Aug-03 Feb-04 Aug-04 Feb-05 Aug-05 Feb-06 Aug-06 Feb-07 Aug-07

More information

The Shapley value mechanism for ISP settlement

The Shapley value mechanism for ISP settlement The Shapley value mechanism for ISP settlement Richard T.B. Ma Dept. of Electrical Engineering Columbia University tbma@ee.columbia.edu Vishal Misra Dept. of Computer Science Columbia University misra@cs.columbia.edu

More information

3. Authorize budget changes as outlined in the Financial Impacts and Budget Actions section of this report.

3. Authorize budget changes as outlined in the Financial Impacts and Budget Actions section of this report. City Council Report To: From: Mayor and City Council City Council Meeting: March 1, 2016 Agenda Item: 3.B Jory Wolf, Chief Information Officer, Information Systems Department, Broadband Subject: Digital

More information

Carrier SDN for Multilayer Control

Carrier SDN for Multilayer Control Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration

More information

The Evolution of Internet Interconnection from Hierarchy to Mesh : Implications for Government Regulation. May 5, 2014

The Evolution of Internet Interconnection from Hierarchy to Mesh : Implications for Government Regulation. May 5, 2014 The Evolution of Internet Interconnection from Hierarchy to Mesh : Implications for Government Regulation May 5, 2014 The Structure of the Early Internet: Hierarchical In order to connect with other ISPs,

More information

How to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved

How to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved How to Choose a CDN Improve Website Performance and User Experience Imperva, Inc. 2017 All Rights Reserved CONTENTS Introduction...3 How Does a CDN Work?...5 The Most Important Factors to Consider When

More information

Farmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Farmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and Farmers Mutual Telephone Company Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Farmers Mutual Telephone

More information

REGULATORY FRAMEWORK FOR THE QOS OF OTTS TOWARDS A SUSTAINABLE AND THRIVING DIGITAL ECOSYSTEM

REGULATORY FRAMEWORK FOR THE QOS OF OTTS TOWARDS A SUSTAINABLE AND THRIVING DIGITAL ECOSYSTEM Un Peuple Un But Une Foi PRIMATURE REGULATORY FRAMEWORK FOR THE QOS OF OTTS TOWARDS A SUSTAINABLE AND THRIVING DIGITAL ECOSYSTEM Malick SYLLA Head of QoS & Coverage Department ARTP / SENEGAL Dakar, March

More information

CLOUD GOVERNANCE SPECIALIST Certification

CLOUD GOVERNANCE SPECIALIST Certification CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Agenda We study how to route over the Internet 1. Context The Internet, a network of networks Relationships between ASes 2.

More information