By Topic

Telecommunications Forum (TELFOR), 2012 20th

Date 20-22 Nov. 2012

Filter Results

Displaying Results 1 - 25 of 424
  • [Copyright notice]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (419 KB)  
    Freely Available from IEEE
  • [Front matter]

    Page(s): 1 - 23
    Save to Project icon | Request Permissions | PDF file iconPDF (854 KB)  
    Freely Available from IEEE
  • Contents

    Page(s): 1 - 20
    Save to Project icon | Request Permissions | PDF file iconPDF (311 KB)  
    Freely Available from IEEE
  • Author index

    Page(s): 1 - 11
    Save to Project icon | Request Permissions | PDF file iconPDF (163 KB)  
    Freely Available from IEEE
  • Environmental safety standards and WLAN indoor propagation

    Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1054 KB) |  | HTML iconHTML  

    In this paper, the indoor propagation of an Access Point (AP) operating at frequency of 2.4 GHz is studied in the building of the Communication Engineering Department/University of Mosul as a case study for environmental fields. The power density in the corridor of the 2nd floor is measured, simulated and compared with the available electromagnetic safety standards such as ICNIRP, FCC, EUROPEAN, and Salzburg standards. The measurements are carried out using a Laptop with Wifihopper software and the results obtained are compared with simulated results obtained using EFC-400TC software package version (2009) for high frequency. The measurements are carried using an adjustable height of a hand-made trolley carrying the laptop at the center of 30×30cm square. A comparison between the measured and simulated results for this case study is made and evaluated using correlation coefficient factor as a measure of evaluation. All results are compared with the available electromagnetic safety standards such as ICNIRP, FCC, EUROPEAN, and Salzburg standards. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regulations on EMF exposure in Serbia and its neighboring countries

    Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (83 KB) |  | HTML iconHTML  

    The aspiration of human population to live in a healthy condition, in which environmental pollution of any kind has been reduced to minimum, grows daily. Accordingly, it is necessary that relevant laws and regulations limit the exposure of human population to various side effects, which also include non-ionizing radiation. For that reason, in 2009 the Republic of Serbia has adopted the Law and a set of supporting regulations in order to protect human health and the environment from hazards due to exposure to non-ionized radiation. The aim of this paper is to survey the government policies of Serbia's neighboring countries in regard to the protection from electromagnetic fields. This paper gives an overview of neighboring countries legislatives and regulations. The information for this paper was obtained by searching governmental websites, scientific publications and policy summaries by various organizations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regulatory methods to foster NGA deployment

    Page(s): 21 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (67 KB) |  | HTML iconHTML  

    Rolling out a Next Generation Access network (NGA) involves tremendous investments and such it is of crucial importance to drive down the costs. This paper will present current situation regarding the European Commission work on exploring ways to achieve such cost savings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business model analysis for the spectrum spot market scenario

    Page(s): 24 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    In this document we analyze business model of the spectrum spot market scenario, which involves novel spectrum sharing mechanisms for the mobile services delivery. Based on the proposed scenario and spectrum management mechanisms, we describe new revenue opportunities for network operators and discuss its influence on the strategy of the current key market players. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of implementation of ISO-IEC 20000 Edition 2 standard in IT systems of Telecom operator through comparison with ITIL V3 best practices

    Page(s): 32 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (709 KB) |  | HTML iconHTML  

    This paper presents the improvement of the implementation of ISO/IEC 20000 Edition 2 standard by comparison with the ITIL V3 set of best practices for implementing an IP multimedia subsystem of Telecom operator. In this paper implementation of IMS system has been done by using ISO/IEC 20000 Edition 2 recommendations and service lifecycle with its comparisons with ITIL V3 recommendations and service lifecycle. The aim of this paper is to present the improved service lifecycle of ISO/IEC 20000 Edition 2 standard through comparative analysis with ITIL V3 implementation of IMS system. Improved implementation of ISO/IEC 20000 Edition 2 standard will be shown in the form of new processes that are added to existing service lifecycle and are evaluated with Key Performance Indicators (KPIs), Key process activities and missing activities that will be singled out as a separate processes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of the eTOM standard through the comparison with ITIL V3 best practices

    Page(s): 36 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    Managing of IT services is becoming one of the most interesting topics in today's business. Many standards define the management of IT services in an IT organization. eTOM represents a most commonly adopted standard for management over IT services in telecommunication industry, while ITIL is generally the most adopted standard which is used in almost every industry. Most of the Telecom operators use the eTOM standards regarding the fact that it is specialized for telecommunication industry. The goal of this work is to suggest the new improved eTOM standard which is going to consist of all components that ITIL V3 has, but which the current eTOM standard doesn't have. The investigation has been made in two Telecom operators in Bosnia and Herzegovina. In the first Telecom operator the processes are arranged according to the eTOM standard, and in the second Telecom operator the processes are arranged according to the ITIL V3 best practices. Both Telecom operators are providing classical Internet services like Internet, IPTV, VoIP, E-mail and Hosting and the teams responsible for these functions are identical. The new improved eTOM standard includes all teams which contain ITIL V3 and do not include the existing eTOM standard. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of the eTOM Operations phase through the comparison with ITIL best practices

    Page(s): 40 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (396 KB) |  | HTML iconHTML  

    IT services, daily management and daily use of those services is nowadays part of every business. That's why there are many standards to define management and control of use for IT services. One of them is eTOM standard which represents a most common standard for building and management of IT services in telecommunication industry, like Telecom operators. Another one is ITIL which can be used in every industry and is very common in use. The main goal of this paper is to suggest new improvement of eTOM standard based on those components and characteristics of ITIL that current eTOM standard doesn't have. Idea for improvement is based of comparison of Service Desk implementation using eTOM standard and Service Desk implementation using ITIL best practices wile Service Desk in both cases has same goal of ensuring functionality and availability of services and stable communication with users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing key determinants of the position of middle management in a telecommunications company

    Page(s): 44 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (433 KB) |  | HTML iconHTML  

    The complexity of the telecommunications industry determines the management organization complexity of a telecommunications company. In complex business environment the company management is expected to achieve profit and growth. To achieve given goals, the management needs to make tough business decisions in all segments of business, the middle management being especially vulnerable. The goal of this paper is to identify, examine and evaluate the key external and internal determinants of the position of middle management in a company. The research focused on the effects of recession and technology as the external determinants, and computerization and reorganization as the internal determinants that significantly determine the position of middle management in a telecommunications company. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Innovation model in the ICT industry — The case of the german telekom

    Page(s): 40 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (86 KB) |  | HTML iconHTML  

    This paper investigates the adaptation of the Open Innovation (OI) model in the ICT industry. The focal point of this paper is the investigation of the knowledge flow in ICT companies, analyzing outside-in and inside-out innovation processes. After elucidation of the OI model, we will exemplarily explain the adaptation of the OI approach in the ICT's industry by presenting the case study concerning the innovation policy within the Deutsche Telekom. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The analysis of Implementing the IPv6 protocol in Bosnia and Herzegovina

    Page(s): 52 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    The Internet is a tool widely available all around the world. It is used by home users or by companies to satisfy their private or business needs. The object of this work is to investigate about the real status of the IPv6 protocol implementation in BiH. The goal of the research is to determine the implementation level of the IPv6 standard in public service companies in BiH, covering the telecommunication industry. The research focuses on technical and social aspects of IPv6 development in BiH. At the end, the aim is to determine the degree of readiness to implement the new standard which is essential for companies that provide Internet services (ISP). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination of LTE and IMS to deliver location based services

    Page(s): 56 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (139 KB) |  | HTML iconHTML  

    With an increasing demand for IP-based services, context-aware systems have attracted much attention. One such is location based services. This paper introduces a new mechanism based on the 3rd Generation Partnership Project (3GPP) by which effective contexts are transferred to the service providers. In this novel approach, Access Network Discovery and Selection Function (ANDSF) act as location enabler, therefore the issue of transmitting the context information to different service providers will be addressed in 3GPP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadband Universal Service and Access: Trends and models

    Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    This paper addresses the problem of broadband development in Europe and new roles of Universal Service and Universal Access. Review of European Universal Service Obligation and criteria for inclusion of broadband in scope of Universal Service are presented. Based on the EU commission approach, we discussed models for broadband deployment and their decomposition. The aim of these models is to identify the main access gaps and the scope of services to be considered. The proposed model gives possible intervention methods. Financial scheme based on public private partnership is emphasized. The paper proposes that the broadband Universal Service and Universal Access policy should be a part of national broadband plans and agendas. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student behavior in the mobile telecommunication market

    Page(s): 64 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB)  

    In the current environment telecom service providers are trying to adapt an offer in line with customer requirements. Student population is one of a group of users of telecommunications services. Behavioral segmentation allows investigation of the student population in the use of telecommunications services. Users can be divided according to the behavior, habits, loyalty or frequency of use of services or products. Segmentation allows service providers to create the potential user groups and tariffs that are based on a variety of habits and behaviors related to the use of telecommunications services. This paper presents the results of use of telecommunications services among students. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nikola Tesla's patent applications therefor patents had not been granted

    Page(s): 68 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (61 KB)  

    In this paper are presented the results of an investigation directed to discovery and identification of Nikola Tesla's patent applications filed with the United States Patent Office, but appropriate patents had not been granted to him. The investigation showed that Tesla had at least 33 American patent applications, but patents had not been granted therefor, that shed light on his inventive activities in the United States of America. The subject matter of these patent applications are different Tesla's inventions in the fields of electrical engineering, mechanical engineering and processing technology, more precisely metallurgy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protection of property rights in computer software

    Page(s): 71 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (62 KB) |  | HTML iconHTML  

    This paper deals with the laws and regulations on public ownership of the various components of computer software, in order to allow future development of information and communication technologies. As examples of property rights from the practice, considers the problems of procurement of pirated software, theft of ideas, development of software and etc. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Responsibility in application of ICT as legal, moral and ethical issues

    Page(s): 75 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (64 KB) |  | HTML iconHTML  

    In this paper we address one of the most important aspects of using ICT, collective and individual responsibility of computer experts as legal, moral and ethical issue. Responsibility in the role, causal responsibility, rebuke, and legal responsibility are different approach to understand the meaning of responsibility in ICT, which are discussed in this paper. The important question of responsibility is whether a software product or service, which is especially important when we consider the damage caused by an error in the software code. We can conclude that responsibility from a legal point of view is clear if the legal framework is clear and precise, and the moral responsibility is much more complicated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key security measures for personal data protection in IT systems

    Page(s): 79 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (75 KB) |  | HTML iconHTML  

    In today's IT era and interconnected corporate world, people are being asked to give away large amounts of personal information for various business purposes. This raises concern of people regarding adequate and secure use of personal information. Here are presented key technical measures, mapped especially to personal information which should be implemented in IT systems. These measures encompass controls related to systems and applications access, communications protection, security and availability of data at rest and other. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Local Area Network Behavior under RTS Flood DoS attack

    Page(s): 83 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (253 KB) |  | HTML iconHTML  

    Wireless Local Area Networks (WLANs) are subject to different types of vulnerabilities. Denial of Service (DoS) attacks are among the most challenging issues regarding WLANs. In this paper, we present our approach to simulate the RTS flood DoS attack, and to analyze the effects of this attack on IEEE 802.11 WLANs. OPNET Modeler 14.5 advanced network simulator is used to simulate this type of attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation during handover in WLAN network with different transport protocol variants

    Page(s): 87 - 90
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    This paper describes and makes an analysis of performance of Stream Control Transmission Protocol (SCTP) compared with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) over Mobile IP (MIP) using Network Simulator (NS-2). This new transport layer protocol has recently been accepted by Internet Engineering Task Force (IETF) as a proposed standard to address a number of TCP limitations. We conduct the simulation study of the three transport protocols in 802/11b WLAN network. The performance analysis was done over mobile-IP network environment that enables to measure the several performance metrics such as throughput, packet delay and the number of sent and loss packets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility sensitive algorithm for vertical handovers from WiMAX to WLAN

    Page(s): 91 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    Decisions for vertical handover in heterogeneous mobile and wireless networks are very important because they impact the QoS of the mobile users and they are also dependent upon the mobility. Choosing the right radio interface at a given moment when mobile terminal has more than one available wireless or mobile network can be based on different factors like signal strength, the power of the battery, available bandwidth, price, etc. In this paper we propose and implement an algorithm which uses mobile node's speed as a factor for vertical handover decision between WiMAX and WLAN networks. We use IEEE 802.21 for providing the algorithm. For vertical handovers certainly the most important services are real-time services, from which the voice call continuity has primary importance. Therefore, the algorithm is tested regarding the VoIP users in WiMAX-WLAN heterogeneous environment, and it shows improvements on vertical handover latency, packet loss and average throughput of the users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP analysis in multihop wireless environment

    Page(s): 99 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    Synergy of Internet, wired and wireless networks is done. TCP remains the most important and most used transport protocol for non real time services such as web, email, ftp, which are basis for additional value-added or novel IP-based services. In this paper we conduct detailed analysis of the impact of the Duplicated ACK and Delayed ACK parameters on the throughput in multihop wireless scenario with incorporated loss models under traffic load provided by different TCP versions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.