Veena B. Mendiratta

Veena B. Mendiratta
Nokia · Bell Labs

PhD

About

65
Publications
7,149
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
588
Citations

Publications

Publications (65)
Article
Full-text available
In Software Defined Networking (SDN), network programmability is enabled through a logically centralized control plane. Production networks deploy multiple controllers for scalability and reliability reasons, which in turn rely on distributed consensus protocols to operate in a logically centralized manner. However, bugs in distributed control plan...
Article
Driven by the growth of cloud and virtualization technologies, telecom services are under pressure to become increasingly dynamic. Cloud services can be instantiated in a matter of minutes on computing platforms, which can rapidly schedule and allocate virtualized physical resources. A similar flexibility to adapt to dynamic service requests remain...
Preprint
Full-text available
Efficient network slicing is vital to deal with the highly variable and dynamic characteristics of network traffic generated by a varied range of applications. The problem is made more challenging with the advent of new technologies such as 5G and new architectures such as SDN and NFV. Network slicing addresses a challenging dynamic network resourc...
Chapter
The recovery and repair durations of large fault-tolerant systems generally span several orders of magnitude. The distributions also violate the common modeling assumption of an exponential distribution for the recovery and repair time. A reward-based semi-Markov model is presented that can be used to predict the steady-state availability of such s...
Article
A traffic generation model is a stochastic model of the data flow in a communication network. These models are useful during the development of telecommunication technologies and for analyzing the performance and capacity of various protocols,algorithms, and network topologies. We present here two modeling approaches for simulating internet traffic...
Conference Paper
In this paper we take a closer look at the operation of software defined networking (SDN) in intra-domain networks. The focus is on the dependability issues related to interworking of SDN controllers, network OS (NOS), and forwarding in the data plane. Both the separation of the control and data planes, and the (virtually) centralized control proce...
Article
Full-text available
People in modern society use mobile phones as their primary way to retrieve information and to connect with others across the globe. The kinds of connections these devices support give rise to networks atmany levels, from those among devices connected by near-field radio or bluetooth, to society-wide networks of phone calls made between individuals...
Article
Full-text available
This paper presents the segregated failures model (SFM) of availability of fault- tolerant computer systems with several recovery procedures. This model is compared with a Markov chain model and its advantages are explained. The basic model is then extended for the situation when the coverage factor is unknown and the failure escalation rates must...
Article
Knowing the number of virtual machines (VMs) that a cloud physical hardware can (further) support is critical as it has implications on provisioning and hardware procurement. However, current methods for estimating the maximum number of VMs possible on a given hardware is usually the ratio of the specifications of a VM to the underlying cloud hardw...
Article
Mobile communication flows describe the on-going traffic on the network and are therefore a good indication of what is happening. Analysing these flows can improve the overall quality offered to the users and it can enable operators to detect abnormal patterns and react. This paper will focus on the analysis of cellular communications records. By u...
Conference Paper
Analyzing communication flows on the network can help to improve the overall quality it provides to its users and allow the operators to detect abnormal patterns and react accordingly. In this paper we consider the analysis of large volumes of cellular communications records. We propose a method that detects abnormal communications events covering...
Article
In today's world, mobile phone penetration has reached a saturation point. As a result, subscriber churn has become an important issue for mobile operators as subscribers switch operators for a variety of reasons. Mobile operators typically employ churn prediction algorithms based on service usage metrics, network performance indicators, and tradit...
Conference Paper
This paper presents an empirical analysis of cloud incidents reported in the Cloutage.org database. The trend, causes, and impact of three types of incidents, namely, Outage, Vulnerability, and, failure during automatic updates (Auto Fail) were examined. Service availability was also analyzed based on the outage duration data. The analysis suggeste...
Conference Paper
Full-text available
Mobile phones have become one of the primary tools for individuals to communicate, to access data networks, and to share information. Service providers collect data about the calls placed on their network, and these calls exhibit a large degree of variability. Providers model the structure of the relationships between network subscribers as a mobil...
Article
This paper focuses on how the system behavior of highly reliable telecommunications systems can be characterized with respect to the distribution of outage durations and the escalating recovery mechanisms implemented in the system. We develop models that can be used to predict the outage distributions and identify measures that are required for a s...
Article
Communication networks in the railway sector are critical to the operation of the system and have stringent requirements for reliability and safety. These types of networks are commonly characterized as “mission critical.” Further, rail communication networks have requirements for interoperability with legacy technology and long life cycle support....
Article
Alcatel-Lucent is at the forefront of Application Enablement to strengthen service provider offerings. Project Neuron, one of the finalists of an Alcatel-Lucent Entrepreneurial boot camp held in North America (2009), proposes a set of pre-integrated capabilities called macro-enablers to achieve rapid creation of third party–developed applications t...
Conference Paper
A five-state model of software rejuvenation is introduced that divides the working state into three sub-states: working, vulnerable, and preparing. The preparing state models the period during which workload is drained from software elements that are about to be rejuvenated. We compared our model to a four-state model that only has working and vuln...
Article
The advent of mashup technologies in Web 2.0 has enabled the rapid integration of telecommunications capabilities into web-based services. Recent award-winning voice communication mashups have been aimed at the enterprise or emergency services markets; however, these mashups and the underlying mashup technologies do not provide support for the Qual...
Conference Paper
The process can fail to deliver its expected outputs and consequently contribute to the introduction of faults into the software system. The process may fail due to ambiguous and unsuitable notations, unreliable tool-support, flawed methods and techniques ...
Conference Paper
Telecommunications systems achieve high levels of reliability by implementing detection and recovery mechanisms with high coverage. With the trend towards the use of more COTS components in these systems the choices available for the systems detection and recovery mechanisms are more limited. An escalating recovery model with varying coverage facto...
Conference Paper
With the growing advent of object-oriented and component-based software development paradigms, architecture-based software reliability analysis has emerged as an attractive alternative to the conventional black-box analysis based on software reliability growth models. The primary advantage of the architecture-based approach is that it explicitly re...
Article
This paper presents the segregated failures model (SFM) of availability of fault-tolerant computer systems with several recovery procedures. This model is compared with a Markov chain model and its advantages are explained. The basic model is then extended for the situation when the coverage factor is unknown and the failure escalation rates must b...
Conference Paper
The IP multimedia subsystem (IMS) enables an access-agnostic next generation network (NGN) that integrates wireless, wireline and Internet technologies. IMS provides for real-time voice and data services over a packet-switched domain via a session initiation protocol (SIP) infrastructure. It also offers a cost-effective platform for the creation an...
Article
Design of highly secure systems is increasingly important. This paper explores the relationship between reliability engineering and security engineering for software products. Our work has indicated that designing for reliability and designing for security share many common ideas and, more importantly, techniques that can be leveraged in product de...
Conference Paper
Full-text available
This paper focuses on software failure data collected during the testing and deployment phases of a project and explores what we can learn by analyzing it through the use of real examples.
Article
Full-text available
non-peer-reviewed This paper presents a method of estimating the availability of fault-tolerant computer systems with several recovery procedures. A segregated failures model has been proposed recently for this purpose. This paper provides further analysis and extension of this model. The segregated failures model is compared with a Markov chain mo...
Conference Paper
Full-text available
The use of several distinct recovery procedures is one of the techniques that can be used to ensure high availability and fault-tolerance of computer systems. This method has been applied to telecommunications systems and usually uses redundant hardware and special recovery software to restore the system after hardware and software failures. We pro...
Conference Paper
The Session Initiation Protocol (SIP) has emerged as the preferred Internet telephony signaling protocol for communications networks. In this capacity, it becomes increasingly essential to characterize both the performance and the reliability of the signaling entities utilizing the protocol. We provide an analytical look at the performance of a SIP...
Conference Paper
The telecommunications industry has achieved high reliability and availability for telephone service over decades of development. However, the current design does not aim at providing service survivability when a local switching office fails due to catastrophic damage. In this paper, several survivable architectures for telephone subscriber network...
Article
The events of September 11, 2001, not only changed the public worldview of security and trust but also the telecommunications industry's view of how it must address Homeland Security requirements for service survivability and recovery. Historically, public telecommunications service has evolved to be highly reliable through hardware and software re...
Conference Paper
The public switched telephone network (PSTN) was designed for high reliability and availability and has achieved an impressive record of service over its history. People today expect continuous telephone service, even in emergencies such as the loss of commercial power or construction cable cuts. The PSTN, however, was not designed for survivabilit...
Article
In this paper we present a hierarchical modeling approach for analyzing network reliability and performance, and apply it to the analysis of a distributed telecommunications switching system for Voice Over Packet applications. The aspects of performability that are addressed in this paper include the following: node cluster partial and total availa...
Conference Paper
Full-text available
System architectures based on a cluster of computers have gained substantial attention recently. In a clustered system, complex software-intensive applications can be built with commercial hardware, operating systems, and application software to achieve high system availability and data integrity, while performance and cost penalties are greatly re...
Conference Paper
Clustered computing systems, using commercially available computers networked in a loosely-coupled fashion, can provide high levels of reliability if appropriate levels of error detection and recovery software are implemented in the middleware and application layers. In this paper, we present a modeling approach for analyzing the hardware and softw...
Conference Paper
Telecommunications systems are characterized by highly stringent reliability requirements for system availability and defect rate. A combination of approaches is used to achieve high software reliability, namely, fault avoidance, fault removal and implementation of fault-tolerant mechanisms. This paper focuses on the implementation of software faul...
Article
A comprehensive set of activity and energy-demand projections for each of the major transportation modes and submodes is presented. Projections are developed for a business-as-usual scenario, which provides a benchmark for assessing the effects of potential conservation strategies. This baseline scenario assumes a continuation of present trends, in...
Conference Paper
The major economic impacts that result from petroleum-supply interruptions and the subsequent effects on the demand for freight transportation are described. This analysis involved a simulation of the effects of three different fuel-supply shortfalls on intercity freight transportation. The research included the use of three economic and transporta...
Article
Cover title. "June 1981." Thesis (Ph. D in Civil Engineering)--Northwestern University, 1981. Includes bibliographical references (p. 160-165).
Article
It is demonstrated that a need exists to establish special Federal energy-conservation programs dealing directly with the major urban centers of the country if the major objective of the National Energy Plan of reducing the annual growth rate of energy consumption to 2 percent or less is to be met.
Article
The IP Multimedia Subsystem (IMS) is a Next Generation Network (NGN) architecture that provides a platform for integrated wireline, wireless and Internet services. Reliable operation of IMS is essential because it provides services that are critical to our day-to-day lives. A systematic methodology to quantitatively assess the reliability of IMS co...

Network

Cited By

Projects

Project (1)
Project
Based on definition provided by T1.A1 working group, we show how to quantify and use survivability