By Topic

ITU Kaleidoscope Academic Conference: Living in a converged world - Impossible without standards?, Proceedings of the 2014

Date 3-5 June 2014

Filter Results

Displaying Results 1 - 25 of 43
  • Index of authors

    Page(s): 301 - 302
    Save to Project icon | Request Permissions | PDF file iconPDF (96 KB)  
    Freely Available from IEEE
  • Chair's message

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (181 KB)  

    The ITU Kaleidoscope series of conferences debuted in 2008 has grown into a well-recognized platform for the exchange of ideas between researchers and standardization experts working to advance the state-of-the-art of information and communication technology (ICT). The ITU academia membership category, launched in 2011, fortified the cause of the Kaleidoscope series, and the conference is increasing in importance as academia scales-up its engagement in ITU work. I would like to express my appreciation to ITU for selecting Bonch-Bruevich Saint-Petersburg State University of Telecommunications (SPbSUT) as this year's host as well as my gratitude for the professionalism with which ITU organized the event. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Committees

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (128 KB)  
    Freely Available from IEEE
  • Conference programme

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (350 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (287 KB)  
    Freely Available from IEEE
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1702 KB)  
    Freely Available from IEEE
  • Foreword

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (130 KB)  

    During my tenure as Director of ITU's Telecommunication Standardization Bureau one of my priorities has been the formalization of academic and research institutes' contribution to the work of ITU, and in particular the Telecommunication Standardization Sector. I am pleased to say that the seeds sown over the past several years have taken root, and ITU's relationship with academia and the research community is set to flourish in the years to come. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote summaries

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (140 KB)  

    Nanotechnology is providing a new set of tools to the engineering community to design nanoscale components with unprecedented functionalities. The integration of several nanocomponents into a single entity will enable the development of advanced nanomachines. Nanonetworks, i.e., networks of nanomachines, will enable a plethora of applications in the biomedical, environmental, industrial and military fields. To date, it is still not clear how nanomachines will communicate. The miniaturization of a classical antenna to meet the size requirements of nanomachines would impose the use of very high radiation frequencies, which would compromise the feasibility of electromagnetic nanonetworks. Therefore, a new wireless technology is needed to enable this paradigm. The objective of this work is to establish the foundations of graphene-enabled electromagnetic communication in nanonetworks. First, novel graphene-based plasmonic nanoantennas are proposed, modeled and analyzed. The results obtained point to the Terahertz Band (0.1-10 THz) as the frequency range of operation of novel nanoantennas. For this, the second contribution in this work is the development of a novel channel model for Terahertz Band communication. In addition, the channel capacity of the Terahertz Band is numerically investigated to highlight the potential of this still-unregulated frequency band. In third place, new communication mechanisms for electromagnetic nano-networks are developed. These include a novel modulation based on the transmission of femtosecond-long pulses, new low-weight codes for channel error prevention in nanonetworks, a novel symbol detection scheme at the nanoreceiver, a new energy model for self-powered nanomachines with piezoelectric nanogenerators, and a new Medium Access Control protocol tailored to the Terahertz Band. Finally, a one-to-one nanolink is emulated to validate the proposed solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to support a standard on a multi-level playing field of standardization: Propositions, strategies and contributions

    Page(s): 207 - 214
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB)  

    This paper uses the example of the Electric Vehicle (EV) ecosystem to examine the options that the automotive industry has for participating in standardization. Standardization is part of the genesis of a technology and contributes to the development and propagation of that technology. The perspective of an incumbent of the automotive industry is taken in order to explore and map the basic participation strategies. Standard supporter strategies are illustrated, by way of example, based on the presentation of case studies for the core charging-interface standards. Because standardization participation is determined by industry-specific motives, namely to support a standard via targeted active participation, we incorporate a forum-shopping approach based on the standardization landscape into our considerations. The global multi-level playing field is characterized by diversity, the participation and reciprocal involvement of consortia, competing standard development organizations, boundary spanners as well as political-level involvement for the support of standardization and establishment of innovations. It becomes apparent that it can be necessary for a standards supporter to ensure a high level of diversification in its standardization activities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of new information and communication technologies using Activity-Based Costing and Tensor Analysis of Networks

    Page(s): 269 - 274
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (138 KB)  

    Assessment of new information and communication technologies (ICTs) requires simultaneous consideration of a large number of technical, social and economic aspects. We suggest a top-down approach, which includes preliminary analyzing the possible consequences of introducing new technologies. Socio-economical and technical indicators can be connected with each other with the use of Activity-Based Costing (ABC). To cope with the difficulty of the problems emerging in ICTs we suggest expanding this method using Tensor Analysis of Networks (TAN) to represent the information about the activities in information and communication (IC) services and their structural relationships. An illustrative example is given where the introduction of new ICTs in the disaster warning systems is assessed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)

    Page(s): 275 - 282
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (427 KB)  

    With the rapid advancement in technology and the growing complexities in the interaction of these technologies and networks, it is even more important for countries and organizations to gain sustainable security advantage. Security advantage refers to the ability to manage and respond to threats and vulnerabilities with a proactive security posture. This is accomplished through effectively planning, managing, responding to and recovering from threats and vulnerabilities. However not many organizations and even countries, especially in the developing world, have been able to equip themselves with the necessary and sufficient know-how or ability to integrate knowledge and capabilities to achieve security advantage within their environment. Having a structured set of requirements or indicators to aid in progressively attaining different levels of maturity and capabilities is one important method to determine the state of cybersecurity readiness. The research introduces the Cybersecurity Capability Maturity Model (CM2), a 6-step process of progressive development of cybersecurity maturity and knowledge integration that ranges from a state of limited awareness and application of security controls to pervasive optimization of the protection of critical assets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content distribution in Information Centric Network: Economic incentive analysis in game theoretic approach

    Page(s): 215 - 220
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (437 KB)  

    The contributions of this paper are twofold. Firstly, we analyze the decision making problem of caching contents by the network players of Information Centric Networking (ICN) from a game theoretic perspective. We also mention a possible content distribution model for ICN. By our proposed game theory, different network players can find the optimality taking into consideration which benefits them with optimum revenue. Secondly, we present a solution for Live Streaming Media broadcast in ICN and analyze the economic part with a decision tree. We believe, our paper clearly shows the economic incentives for major network players which can stand as a motivation to achieve the faster accommodation of ICN architecture. Besides, we identify some standardization issue in ICN architecture and we emphasize on the need for a common standard for content routers (CR) so that as a node in the ICN, CR ensure scalable content delivery as well as its functionalities match with the Internet open standard philosophy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Innovative RF localization for wireless video capsule endoscopy

    Page(s): 221 - 228
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (520 KB)  

    Radiofrequency (RF) localization is used in many fields of daily routine of almost everyone. It is becoming crucial application in many fields, starting from industry to everyday life. Location is calculated using radio waves in many applications such as GPS system, indoor localization using WLAN system, localization based on mobile network parameters like A-GPS system, or localization in warehouses using RFID tags. In this work, we present radiofrequency localization of endoscopic smart pill inside human body used for visual imaging of human gastrointestinal (GI) tract. This kind of visual imaging can bring significant benefit to the medical doctors and patients, if there would be a possibility to localize the pill, while moving through the GI tract. Frequency band proposed for this application is MedRadio band (401 - 406 MHz) and ISM band (2.4 GHz). Finally, the patients and medical staff would welcome standardization in the field of endoscopic pill and its localization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economical efficiency assessment model of spectrum conversion for new mobile wireless technologies

    Page(s): 229 - 232
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (221 KB)  

    The article deals with potential methodological approach for economical efficiency assessment of radio spectrum conversion for new mobile wireless technologies in the conditions of the limited released budgetary provisions. The task of choosing the conversion efficiency criterion was considered, the linear optimization model of conversion based on the procedural approach was proposed in the article. The issues concerning linearization of the objective function and limitation system for implementation of the linear programming approach to satisfy the radio spectrum conversion tasks were also addressed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mutual key agreement protocol to mitigate replaying attack in eXpressive Internet Architecture (XIA)

    Page(s): 233 - 240
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (311 KB)  

    Several Future Internet (FI) architectures have been proposed to address the problems of the Internet including flexibility (so called IP bottleneck), host-based addressing (addressing a host rather than the content itself), and security. In this paper, we focus on eXpressive Internet Architecture (XIA) as it is the most secure and open-source Content-Centric Network (CCN). CCN is claimed by the Future Content Networks (FCN) Group to be the Future Internet (FI). However, XIA does not have any mechanisms to mitigate the replaying attack, thus, this paper proposes and implements a solution to mitigate it. Several existing solutions have been analyzed to derive the requirements for the proposed solution. By implementing the proposed protocol, XIA is now able to mitigate all of the reviewed network attacks. The evaluation shows that the proposed solution is more secure and less complex over the existing solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cloud platform for QoE evaluation: QoXcloud

    Page(s): 241 - 247
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2832 KB)  

    The current financial situation, together with the new market conditions, has led to major changes in the ICT sector over the last few years. Many of the services that were once only offered by operators are now being provided by third parties through the cloud. This situation has promoted new business models against the traditional ones. Furthermore, these economic changes have conducted to socio-cultural transformations with great impact on the user's behaviors. In this paper a cloud platform for the measurement and evaluation of the Quality of Experience (QoE) is presented. The platform is based in a model (QoXphere) that ensures the user satisfaction in terms of Quality of Service (QoS) and the provider economic benefits, as demanded in current market situation. In addition, the proposed cloud architecture intends to aid to advance in the work item opened recently in ITU-T to establish an ITU recognition procedure of testing laboratories with competence in ITU-T Recommendations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standardizing the Internet of Things in an evolutionary way

    Page(s): 249 - 254
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (846 KB)  

    The current situation of technology separation among the different application domains of the Internet of Things (IoT) results in a market separation per application domain. This issue hinders the technical innovation and investments in the IoT business. In order to solve the issue, it is necessary to standardize common technologies of the IoT across the different application domains. This paper argues that the key direction of the future standardization of the IoT is not standardizing specific technologies, but building over a standardized new architecture reference model for the IoT. Based on the analysis of existing key activities concerning the standardization of OSI, NGN and IoT from a functional architecture perspective, it suggests that the IoT standardization work be progressed in an evolutionary way in order to enable the integration of existing technologies, and focus on the interactions among the functional entities of the IoT to impose minimum constraints on future technical innovations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a dual diversity reception base on OFDM RoFSO systems over correlated log-normal fading channel

    Page(s): 263 - 268
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (493 KB)  

    Free space optical (FSO) communication has been receiving growing attention with recent commercialization successes as a cost-effective and high bandwidth optical access technique. A major impairment in FSO system is the turbulence induced the fading which impairs the transmission performance improvement. Spatial diversity can be used to mitigate the turbulence and improve the system performance. In this paper, an analytical approach is presented to evaluate the transmission performance of OFDM FSO system with dual diversity reception considering effect of channel correlation. We investigate the system performance of OFDM FSO links over correlated log-normal weak turbulence fading channel among dual diversity receivers. Meanwhile, based on the proposed architecture, both MRC and EGC diversity combining scheme are used at receiver end for system performance evaluation. The obtained results can be useful for giving an insight into the real designing and evaluation on the FSO system under actual condition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software defined approach to unified IPv6 transition

    Page(s): 9 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (732 KB)  

    The IPv6 transition has been an ongoing process throughout the world due to the exhaustion of the IPv4 address space. However, this transition leads to costly end-to-end network upgrades and poses new challenges of managing a large number of devices with a variety of transition protocols. Recognizing these difficulties, we propose a software defined approach which provides a unified, novel way to deploy IPv6 in a cost-effective, flexible manner. Our deployment and experiments demonstrate significant benefits of this approach, including low complexity and high flexibility of adopting different existing transition mechanisms, as well as low cost because there is no need for upgrading network terminals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global convergence in digital identity and attribute management: Emerging needs for standardization

    Page(s): 15 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (99 KB)  

    In a converging world, where borders between countries are surpassed in the digital environment, it is necessary to develop systems that effectively replace the recognition “vis-a-vis” with digital means of recognizing and identifying entities and people. In this work we summarize the current standardization efforts in the area of digital identity management. We identify a number of open challenges that need to be addressed in the near future to ensure the interoperability and usability of digital identity management services in an efficient and privacy maintaining international framework. These challenges for standardization include: the management of identifiers for digital identities at the global level; attribute management including attribute format, structure, and assurance; procedures and protocols to link attributes to digital identities. Attention is drawn to key elements that should be considered in addressing these issues through standardization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Demand-side management with load uncertainty

    Page(s): 23 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (209 KB)  

    In this paper, we consider load control in a multiple residence setup where energy consumption scheduling (ECS) devices in smart meters are employed for Demand-side management (DSM). Several residential end-users share the same energy source and each residential user has non adjustable loads, adjustable loads and a storage device. The ECS devices interact automatically by running an iterative distributed algorithm to find the optimal energy consumption schedule for each end-user, in order to reduce the total energy cost as well as the peak-to-average-ratio (PAR) in load demand in the system. Simulation results are provided to evaluate the performance of the proposed game theoretic based distributed DSM technique. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal of “cyber parallel traffic world” cloud service

    Page(s): 29 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (587 KB)  

    Remarkable progress has been made in intelligent transportation systems. For example, an autonomous vehicle can detect its position, other vehicles, pedestrians, and obstacles. Pedestrians with a smartphone can determine their position and send this information to the Internet. Even though vehicles and pedestrians can instantly determine their positions that information is mostly used within a narrow area and is rarely sent to a cloud service. Here we propose a new cloud service, the “cyber parallel traffic world (CPTW),” in which vehicles, pedestrians, and temporary obstacles move in synchronization with their real-world movements. The CPTW service could thus be used to help prevent traffic accidents, provide people gaining experience in driving on roads throughout the world as a driving simulator, etc. Virtual structures in CPTW are constructed by extracting road data from maps covering the world and by gathering the traffic rules for each country. We describe a development scheme to complete CPTW. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards converged 5G mobile networks-challenges and current trends

    Page(s): 39 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (589 KB)  

    With the rapid development of wireless technologies, the concept of the Fifth Generation (5G) wireless communication system started to emerge and it is foreseen that it will be a result of standards convergence. The expectations towards 5G are set much higher in terms of capacity and maximum throughput when compared with Fourth Generation (4G). There are also some new technical challenges the system will need to face, like Machine to Machine (M2M) communication, energy efficiency, complete ubiquity and autonomous management. This paper analyses new technologies that could enable 5G networking, discusses potential standardisation and development directions, and presents recent research efforts in the area of future mobile networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of WiBro and TD-LTE through the social network analysis

    Page(s): 47 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB)  

    Drawing on the social network analysis, this paper visualized the networks of WiBro and TD-LTE deployment in the global market. It also compared the two standards' networks and found three differences: first, widespread deployment of WiBro in the global market; second, critical role of China in the TD-LTE network; and third, active participation of the world's top telecoms gear vendors in the TD-LTE deployment. The authors concluded that these differences can be attributed to the failure of WiBro and success of TD-LTE, and drew some implications for a standard policy design. Firms, if trying to successfully deploy a new technology standard in the global telecoms market, should consider partnerships with players which have massive purchasing power, such as China Mobile. For a government, it may issue a license for the commercialization of a new standard to telecom service providers which are least likely to be affected by a possible cannibalization effect on the operators' existing standard-based sales. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and performance analysis of pre-emption based radio admission control scheme for video conferencing over LTE

    Page(s): 53 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (628 KB)  

    We perceive emerging developments in information and communication technologies (ICTs) in various areas of our dynamic live. The concept of getting services and applications “any time” and “any place” imposes the corresponding development in cellular networks. The rapid worldwide deployment of 4G LTE networks and increasing demand for new services are the key ICT trends that highlight the need for future improvements in technologies underling LTE. Although 3GPP concentrates all standardization activities in LTE, ITU-T recommendations reflect the main quality of service (QoS) requirements in ICTs. Nevertheless, not all QoS related ITU-T recommendations (i.e. E.800-E.899, G.1000-G.1999, Y.1500-Y.1599, Y.2100-Y.2199 series) correspond to today's variety of products and services provided by cellular networks. This fact raises the need for updates in these recommendations. In this paper, we explore QoS measures specific to LTE services adaptively occupying radio resources. This so-called pre-emption process assumes the service degradation as well as service interruption. We propose a pre-emption based radio admission control (RAC) model for two resource demanding video services - video conferencing and video on demand. We apply teletraffic and queuing theories to get a recursive algorithm for calculating its performance measures, namely, blocking probability, pre-emption probability, and mean bit rate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.