The NFV transformation is gaining incredible momentum from mobile operators as one of the significant solutions to improve resource allocation and system scalability in 5G networks. However, the ...ultra-dense deployments in 5G create high volumes of traffic that pushes the physical and virtual resources of cloud-based networks to edge limits. Consider a distributed cloud, replacing the core network with virtual entities in the form of VNFs still requires efficient integration with various underlying hardware technologies. Therefore, orchestrating the distribution of load between cloud geo-data centers starts by instantiating virtual and physical network topologies that connect involved fronthaul with relevant VNFs. In this article, we provide a framework to manage calls within 5G network clusters for efficient utilization of computational resources and also to prevent unnecessary signaling. We also propose a new scheme to instantiate virtual tunnels for call forwarding between network clusters leading to new logic networks that combine geo-data centers and fronthaul. To facilitate service chaining in cloud, we propose a new enhanced network functions virtualization management and orchestration (E-MANO) that extends telemetry services to the radio access network for instant monitoring of available radio resources. We provide analysis and testbed results in support of our proposals.
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification) spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller-ID ...spoofing is a critical security threat in modern telecommunication systems, allowing attackers to impersonate legitimate callers and gain access to sensitive information. While these attacks pose a significant threat to the telecom and financial industries, the existing solutions are limited to only closed-circuit options for subscribers of the same service provider. In this paper, we present a novel blockchain-based solution to effectively prevent caller-ID spoofing attacks in real time. Our approach employs a low-latency consensus algorithm to manage and verify end-to-end the caller-ID information of Internet Service Providers (ISPs) and institutions. We propose a two-step verification process, in which the accuracy and integrity of Automatic Number Identification (ANI) information is verified at different stages of the call. The proposed solution initiates a renewal of the ISP registration on every caller-ID change, making it unaffected by unusual situations such as roaming, the use of an IP-PBX (Internet Protocol Private Branch Exchange), or the use of a VPN (Virtual Private Network). We also discuss the proposed solution's feasibility and potential deployment issues, including its integration into existing RFC (Request for Comments) efforts and the necessary regulations for service providers to demonstrate compliance. Furthermore, we address future research directions, such as handling complex call scenarios such as call forwarding and teleconference calls. Our approach not only improves the security of telecommunication systems but also provides an efficient and scalable solution to prevent caller-ID spoofing attacks.
Modeling Speedup in Multi-OS Environments Tauro, Brian R.; Liu, Conghao; Hale, Kyle C.
2019 IEEE 27th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
Conference Proceeding
For workloads that place strenuous demands on system software, novel operating system designs like unikernels, library OSes, and hybrid runtimes offer a promising path forward. However, while these ...systems can outperform general-purpose OSes, they have limited ability to support legacy applications. Multi-OS environments, where the application's execution is split between a compute plane and a data plane operating system, can address this challenge, but reasoning about the performance of applications that run in such a split execution environment is currently guided only by expert intuition and empirical analysis. As the level of specialization in system software and hardware continues to increase, there is both a pressing need and ripe opportunity for investigating analytical models that can predict application performance and guide programmers' intuition when considering multi-OS environments. In this paper we present such a model to place bounds on application speedup, beginning with a simple, intuitive formulation, and progressing to a more refined, predictive model. We present an analysis of the model, apply it to a diverse set of benchmarks, and evaluate it using a prototype measurement tool for analyzing workload characteristics relevant for multi-OS environments.
In this paper we consider the influence of a call forwarding service on the
traffic process in modern telecommunication networks. We analyse in detail
only the case when the called user is busy. It ...is proved that call forwarding
not only increases utilization of servers and the percent of successful calls
but it also increases the call loss. On the simple example, we showed that
this call loss increase is greater in the case of local (internal) and
incoming calls, but smaller in the case of outgoing calls. The reason for
such behaviour is in the role of call forwarding function in the case of
internal and incoming traffic. In that situation call forwarding function
decreases the effect of limited number of users on the decrease of offered
traffic, comparing to the case of internal and incoming traffic without call
forwarding (Engset traffic model). This statement is illustrated by
comparative graphics of traffic loss without call forwarding function, and
with this function when considering, separately, internal, incoming, and
outgoing traffic.
Virtual office is a room less office but still has reception services and call forwarding services. This study examines the development and benefits of virtual office in supporting business growth, ...especially for start-up companies. Shifting the traditional business model towards modern business models that utilize this technology often does not require a business place such as an office to run its business. This research is a qualitative and descriptive research. Virtual office is here to answer the problem of flexibility and credibility of a company. Virtual office is one option for a company to save costs, especially companies that have a small capital structure and startup company.
SMS-Based Offline Mobile Device Security System Furtado, Royston; More, Atharva; Bhatt, Jay ...
2020 International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE),
2020-July
Conference Proceeding
Mobile Device Security is an important factor as all the user's sensitive information is stored on the mobile device. The problem of mobile devices getting lost or stolen has only been increasing. ...There are various systems which provide Online Mobile Device Security which require internet to perform their required functions. Our proposed system SMS Based Offline Mobile Device Security System provides mobile device users with a wide range of security features that help protect the mobile device from theft and also acts as an assistant that helps the users in any problems they may face in their day-to-day lives. The project aims to develop a mobile security system that will allow the user to manipulate his mobile device from any other device through SMS which can be used to get contact information from the user's mobile device remotely, help find the phone by maximizing the volume and playing a tone, trace the current location of the mobile device, get the IMEI No of the device, lock the device, send a message that will be converted to speech and played on the user's mobile device, call forwarding, message forwarding and various other features. It also has an additional security feature that will detect a sim card change and send the new SIM card mobile no to the recovery mobile numbers specified during initial setup automatically. Hence, the user will be able to manipulate his phone even after the SIM card has been changed. Therefore, the SMS-Based Offline Mobile Device Security System provides much more security for the mobile device than the existing online device security methods.
To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper we investigate, ...examine, and try to adapt the current active probing technologies to fault isolation and problem determination of telecommunication networks. The unfitness, issues, and difficulties while adopting these IP-networking probing methods into fault isolation of telecommunication networks are addressed and elaborated. For achieving our goal, call-forwarding which is a dedicated function (or feature) in telecommunication networks is utilized to overcome the unfitness and difficulties while applying probing technologies to fault isolation of telecommunication networks. Numerous experiments with different probe sets, probe stations, total probe lengths, network topologies, and probing algorithms are conducted and analyzed to validate our strategy. From the results of our experiments, we can find that phone call-forwarding can not only facilitate the fault isolation with the existing active probing techniques, but also increase the system flexibility on the installation of probe stations. Meanwhile, on the basis of our experimental results, several practical suggestions are also provided for system implementation.
A smart space, such as smart sensor rooms, an office, or simply an area, requires a smart telephony network for an effective voice communication between users. Nowadays, modern Private Branch ...Exchange (PBX) system does not only provide telephone exchange, but also supports many heterogeneous telephony networks and provides many other useful functions as well. Despite its powerfulness, PBX still cannot achieve a basic requirement for a smart space: It cannot adapt its surroundings automatically, i.e. people still need to make the call forwarding setting manually. In this paper, we propose a system with an algorithm named “2D location-aware” for tracking a person in a smart space. According to the ever-changing environment, the system performs an on-the-fly configuration to provide a dynamic telephony network. In other words, we aim to make all the telephones in the network available to every user in the smart space for receiving his phone calls without any manual call forwarding settings.