Impacts of Internet Traffic on LEC Networks and Switching Systems

نویسندگان

  • Amir Atai
  • James Gordon
چکیده

The past year has seen explosive growth in internet traffic. Currently, the most common way of accessing the internet is via the switching systems and the interoffice trunk facilities of the Public Switched Telephone Network (PSTN). The PSTN was designed to carry voice calls that have an average call holding time of about 3 minutes. The nominal 3 minute call assumption pervades all aspects of telco equipment design such as switch engineering, line concentration ratios, and trunk group sizes. However, internet calls violate this fundamental assumption and have a mean holding time of the order of 20 minutes with some calls lasting for many hours. This long holding time traffic severely taxes the PSTN. It requires additional equipment to be provisioned, without compensating revenues, and potentially affects service performance for all users. Internet traffic, which is packet data in nature, can in principle be carried much more efficiently on data networks. However, since the PSTN currently represents the only nearuniversal access method, any long term solution necessarily involves a staged migration from the present mode of operation towards some packet network solution. This paper reviews the impacts of internet traffic on the PSTN. It summarizes the impact of internet traffic on transmission and switching equipment, the need for comprehensive revisions to existing engineering and planning algorithms, and the implications of these issues for operational practices and operations support systems. It also provides analysis of the cost of supporting internet traffic on the PSTN. Finally, it describes a number of possible solutions. In each case the current barriers to implementing the solution are discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Alternatives to Redistribution Communities in Inter-domain traffic Engineering

Today’s internet routing mainly concentrates on controlling the ingress and egress traffic which occurs through border routers. There are different ways by which we can control the traffic between autonomous systems. In most cases redistribution communities are used for the control over traffic engineering. In this paper we focus on alternative approaches like Multi Protocol Label Switching (MP...

متن کامل

Internet traffic engineering using multi-protocol label switching (MPLS)

With the rising popularity of the Internet there have arisen corresponding requirements for network reliability, efficiency, and service quality. Internet service providers are responding to these developments by critically examining every aspect of their operational environment, looking for opportunities to scale their networks and optimize performance. In this context, traffic engineering has...

متن کامل

Inter-Domain MPLS and GMPLS Traffic Engineering - Resource Reservation Protocol-Traffic Engineering (RSVP-TE) Extensions

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes procedur...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996