The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Group mobility in mobile networks is responsible for dynamic changes of network utilization as well as concentrated accesses to base stations that eventually lead to a degradation of network quality. In particular, a fast-moving group of users intensively accessing the network, such as passengers on a train running in a densely populated area, affects the perceived network quality. Efficiently evaluating...
As the Internet has become an infrastructure for the global communication, a network failure and a quality degradation have become a serious problem. In order to solve the problem, a network monitoring system which monitors the traffic of Internet in real time is strongly desired. Traffic monitors which collect the statistics from captured packets play a key roll in the system; however, they are not...
Previous studies on inferring the origin of routing changes in the Internet are limited to failure events that generate a large number of routing changes. In this paper, we present a novel approach to origin inference of small failure events. Our scheme focuses on routing changes imposed on preferred paths of prefixes and not on transient paths triggered by path exploration. We first infer the preferred...
According to deployment of broadband access networks like FTTH (Fiber-To-The-Home), many Internet Service Providers in Japan start providing video broadcasting services via IP multicast. As the service develops into higher quality and more diverse, a broadcasting system capable of handling high bit-rate contents will be required. However, typical implementation of broadcasting server may have problems...
In these days, the deployment of Diffserv (Differentiated Services) that enables the QoS guarantee is urgently required by the IP network customers. However, AF (Assured Forwarding) PHB (Per Hop Behavior) in Diffserv still has not been provided by conventional routers. It is a realistic solution that SBR3 (Statistical Bit Rate 3) of ATM emulates AF PHB, but it is not clear whether TCP traffic over...
High speed IP communication is a killer application for 3rd generation (3G) mobile systems. Thus 3G network operators should perform extensive tests to check whether expected end-to-end performances are provided to customers under various environments. An important objective of such tests is to check whether network nodes fulfill requirements to durations of processing packets because a long duration...
In order to continue to provide high quality communication services, mobile network operators want to detect the degradation of the communication quality when it occurs. Since actively evaluating LTE network performance is costly and time consuming, mobile network operators passively monitor the network. A finite state machine is a powerful approach for monitoring the network condition. However, in...
It is important for network operators to know how users use the network to plan and design network facilities. In this paper, we propose flow classification method using binned time-series data in consideration of practicality. In this paper, we evaluate the proposed method by using mobile data traffic and show the method can maintain classification accuracy as compared with method using the whole...
The rapid growth of smartphone based User Equipment (UE) and the wide development of LTE networks have changed the traffic pattern of mobile applications. Today, many applications running on smartphones periodically generate background traffic by sending and receiving messages or retrieving updates (i.e. without user interaction). Since each activity requires the UE to first attach and then to detach...
Recent widespread use of smartphones and rich multimedia contents has brought a considerable increase in mobile traffic. Therefore, the characteristics of smartphone traffic need to be considered when designing mobile core networks. Smartphone traffic is categorized by whether it is generated from user interaction (foreground (FG) traffic) or not (background (BG) traffic), and such traffic types can...
The proportion of cellphone users who have smartphones has been increasing. However, many smartphone users are unhappy with its battery life, which is shorter than that of conventional cellphones. Users attribute this problem to the energy consumption caused by the background traffic that installed applications create. In most cases, users are not unaware of the background traffic in their daily use,...
Recently, indoor location-based services (LBS) have become attractive with the rapid development of indoor location estimation and with the spread of smartphones. An estimation technique using Bluetooth low energy (BLE) tags becomes most attractive and promising among other techniques for estimating location because a majority of smartphones supports BLE. The BLE tags transmit advertisement (ADV)...
This paper proposes a novel approach to separating background (BG) and foreground (FG) traffic based on periodicity analysis. As BG traffic is commonly periodically generated by applications, this trait is leveraged to effectively detect BG traffic. Concretely, the Period Candidate Array (PCA) approach is proposed to extract only necessary information from long and sparse traffic flows, hence quickly...
An evaluation model that simulates a realistic trend of latency variation is attracting attention for use in simulation studies on large-scale distributed services provided through mobile networks. Therefore, we propose a new modeling method using a Markov regime switching which builds the evaluation model where latency drastically changes with time as in the mobile network. Furthermore, the effectiveness...
With a wide spread of smartphones and tablets, a mobile network becomes frequently congested when many users concentrate to the same place. Especially when a large-scale event is held, a heavy network congestion interferes with the communication of the participants as well as local residents. In order to detect the network congestion, a large amount of traffic log should be analyzed in real time....
This paper proposes autonomous data transmission using off-peak hours for cellular-based machine-to-machine (M2M) communications. In the near future, there will be an enormous number of machine type terminals (MTs) capable of connecting to cellular networks. Thus, an efficient scheme for accommodating M2M traffic in existing cellular networks is required. To tackle this challenge, we focus on the...
Mobile network operators are keeping a watchful eye on video applications because of their high impact on traffic volume. For optimum mobile network design it is desirable to know more about the characteristics of video traffic, which depend on the behavior of the video application users who generates that traffic. We conducted a practical behavior analysis of video application users on smart phones,...
With a wide spread of smartphones and tablets, a mobile network becomes frequently congested when many users concentrate to the same place. Especially when a large-scale event is held, a heavy network congestion interferes with the communication of the participants and local residents. In order to detect the network congestion, a large amount of traffic log should be analyzed in real time. In this...
The Locator/ID Separation Protocol (LISP) is being standardized in IETF, which separates the IP address functionality into routing locators (RLOC) and endpoint identifiers (EID). LISP is applicable for instant Virtual Private Network (VPN) services because it has IP tunneling features. However, there are two main issues with application to VPN. One is a Map server/Map resolver (MS/MR) basically allows...
A user cooperative monitoring scheme is considered in which many but variable users' off-the-shelf PCs are involved as measurement end-point nodes (called beacons) to actively measure the performance of end-to-end paths between beacons in order to detect end-to-end performance degradation and identify (narrow down) degraded network links. In the scheme, the measurement paths with beacons are dynamically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.