Evolution of Traffic Patterns in Telecommunication Systems
ABSTRACT This paper compares new empirical data from mobile and IP telephony with old measurements of the Plain Old Telephony Service (POTS). The results show the impact on traffic patterns from the changes in technology from fixed to mobile phones, reduction in speech quality from fixed phone to mobile and IP phones, changes in tariffs from usage based to flat-rate subscriptions, and introduction of alternative message based communication services. The results in the paper indicate that the traffic pattern evolution and variations are dominated by the tariffs and the daily life cycle that changes the user's context and demand. Significant changes in the daily and weekly traffic profiles are observed. Moreover, the average call holding times are very senstitive to the pricing scheme. Finally, the results indicate that Short Message Service (SMS) seems to serve as a supplement to phone calls, in particular in the evenings.
- SourceAvailable from: arantxa.ii.uam.es
- "Conversely, there is no consensus as to which model should be used for the call holding times (where it is clear that the exponential distribution is not a good candidate). A broad range of distributions have been proposed, such as the hyper-exponential , the inverse Gaussian , and the log-normal . The trend-removal issue can be approached relying on general traffic forecasting techniques , or by time series with seasonal cycles . "
Conference Paper: Anomaly detection in VoIP traffic with trends[Show abstract] [Hide abstract]
ABSTRACT: In this paper we present methodological advances in anomaly detection, which, among other purposes, can be used to discover abnormal traffic patterns under the presence of deterministic trends in data, given that specific assumptions about the traffic type and nature are met. A performance study of the proposed methods, both if these assumptions are fulfilled and violated, shows good results in great generality. Our study features VoIP call counts, but the methodology can be applied to any data following, at least roughly, a non-homogeneous Poisson process (think of highly aggregated traffic flows).Teletraffic Congress (ITC 24), 2012 24th International; 01/2012
- [Show abstract] [Hide abstract]
ABSTRACT: With the adoption of the fourth generation (4G) technologies, the green Metrozones concept presents a viable approach to address the non-negligible presence of power-hungry base transceiver stations (BTSs), and the mushrooming of metro access points (M-APs); and their contributions to the world's carbon footprint. This paper proposes a new hybrid-BTS (H-BTS) system architecture for the green Metrozones. The hybrid free-space optical and radio frequency (FSO/RF) system is integrated at the macro-cellular tier, to enable high-capacity, power-efficient wireless backhauling. A resource prioritization mechanism is designed, to maintain good control and optimal on-demand resource allocation. Next, a basic access signalling (BAS) scheme is introduced, to necessitate the discovery, registration and monitoring of active M-APs. The proposed BAS scheme enables the sleep-wake-on-demand (SWoD) mechanism and the cooperative inter-cell support. Furthermore, preliminary feasibility studies are carried out to examine the time-varying characteristics of the BTS daily traffic profile, and the performance of the proposed hybrid FSO/RF systems under different weather conditions.Environment Friendly Energies and Applications (EFEA), 2012 2nd International Symposium on; 06/2012
Article: Anomaly detection in diurnal data[Show abstract] [Hide abstract]
ABSTRACT: In this paper we present methodological advances in anomaly detection tailored to discover abnormal traffic patterns under the presence of seasonal trends in data. In our setup we impose specific assumptions on the traffic type and nature; our study features VoIP call counts, for which several traces of real data has been used in this study, but the methodology can be applied to any data following, at least roughly, a non-homogeneous Poisson process (think of highly aggregated traffic flows). A performance study of the proposed methods, covering situations in which the assumptions are fulfilled as well as violated, shows good results in great generality. Finally, a real data example is included showing how the system could be implemented in practice.Computer Networks 02/2014; 60:187–200. DOI:10.1016/j.bjp.2013.11.011