scispace - formally typeset
Search or ask a question

Showing papers by "TeliaSonera published in 2012"


Rami Lehtonen1, Toni Paila2, Vincent Roca, Michael Luby3, Rod Walsh2 
06 Nov 2012
TL;DR: FLUTE, a protocol for the unidirectional delivery of files over the Internet, which is particularly suited to multicast networks, is defined.
Abstract: This document defines FLUTE, a protocol for the unidirectional delivery of files over the Internet, which is particularly suited to multicast networks. The specification builds on Asynchronous Layered Coding, the base protocol designed for massively scalable multicast distribution. This memo defines an Experimental Protocol for the Internet community.

340 citations


Proceedings ArticleDOI
14 Nov 2012
TL;DR: This paper studies access patterns in a large TV-on-Demand system over four months, and finds that the share of requests for the top most popular programs grows during prime time, and the change rate among them decreases, which is important for caching.
Abstract: Today increasingly large volumes of TV and video are distributed over IP-networks and over the Internet. It is therefore essential for traffic and cache management to understand TV program popularity and access patterns in real networks. In this paper we study access patterns in a large TV-on-Demand system over four months. We study user behaviour and program popularity and its impact on caching. The demand varies a lot in daily and weekly cycles. There are large peaks in demand, especially on Friday and Saturday evenings, that need to be handled. We see that the cacheability, the share of requests that are not first-time requests, is very high. Furthermore, there is a small set of programs that account for a large fraction of the requests. We also find that the share of requests for the top most popular programs grows during prime time, and the change rate among them decreases. This is important for caching. The cache hit ratio increases during prime time when the demand is the highest, and aching makes the biggest difference when it matters most. We also study the popularity (in terms of number of requests and rank) of individual programs and how that changes over time. Also, we see that the type of programs offered determines what the access pattern will look like.

60 citations


Journal ArticleDOI
TL;DR: The objective of this study was to examine the distribution of the output power of mobile phones and other terminals connected to a 3G network in Sweden and found that the average terminal output power for 3G voice calls was below 1 mW for any environment including rural, urban, and dedicated indoor networks.
Abstract: The objective of this study was to examine the distribution of the output power of mobile phones and other terminals connected to a 3G network in Sweden. It is well known that 3G terminals can operate with very low output power, particularly for voice calls. Measurements of terminal output power were conducted in the Swedish TeliaSonera 3G network in November 2008 by recording network statistics. In the analysis, discrimination was made between rural, suburban, urban, and dedicated indoor networks. In addition, information about terminal output power was possible to collect separately for voice and data traffic. Information from six different Radio Network Controllers (RNCs) was collected during at least 1 week. In total, more than 800000 h of voice calls were collected and in addition to that a substantial amount of data traffic. The average terminal output power for 3G voice calls was below 1 mW for any environment including rural, urban, and dedicated indoor networks. This is <1% of the maximum available output power. For data applications the average output power was about 6-8 dB higher than for voice calls. For rural areas the output power was about 2 dB higher, on average, than in urban areas.

54 citations


Proceedings ArticleDOI
04 Sep 2012
TL;DR: This paper argues that embracing cloud computing solutions is fundamental for the telecommunication industry to remain competitive and defines a set of privacy, security and trust requirements that must be taken into account before these solutions can be fully integrated and deployed by telecommunication providers.
Abstract: The telecommunication industry has been successful in turning the Internet into a mobile service and stimulating the creation of a new set of networked, remote services. In this paper we argue that embracing cloud computing solutions is fundamental for the telecommunication industry to remain competitive. However, there are legal, regulatory, business, market related and technical challenges that must be considered. In this paper we list such challenges and define a set of privacy, security and trust requirements that must be taken into account before cloud computing solutions can be fully integrated and deployed by telecommunication providers.

33 citations


Journal Article
TL;DR: The IP (Internet Protocol) core network operated by TeliaSonera in Sweden has been studied according to a described definition (system boundary) and extrapolated to a national level for Sweden and a method is proposed where the amount of data traffic is used to allocate the IP core network on different usage.
Abstract: The IP (Internet Protocol) core network operated by TeliaSonera in Sweden has been studied according to a described definition (system boundary) and extrapolated to a national level for Sweden. A top-down and a bottom-up data collection approach have been used to quantify network equipment and energy consumption. The electricity consumption of the IP core network was about one fourth of the total energy consumption of the connected mobile and fixed access networks. The use stage results for the Swedish IP core network is about 0.08 kWh per GB (Gigabyte) of data traffic corresponding to about 19 g CO 2 e/GB when applying a Swedish electricity mix. If instead a global average electricity mix is used, the resulting green house gas emission would be about 64 g CO 2 e/GB. A method is also proposed where the amount of data traffic is used to allocate the IP core network on different usage. The method is exemplified by the 3G mobile broadband data traffic in Sweden.

22 citations


Patent
15 Aug 2012
TL;DR: In this paper, a method for cell reselection in a mobile communication network is described, where a mobile terminal measures several characteristics of a radio channel to determine for each of the cells if the characteristics of the radio channel meet corresponding predetermined criteria compared to the received threshold values.
Abstract: A method to be utilized in cell reselection in a mobile communication network offers a cell reselection mechanism based on absolute priorities. The mobile terminal measures several characteristics of a radio channel. The mobile terminal is configured to determine for each of the cells if the characteristics of the radio channel meet corresponding predetermined criteria compared to the received threshold values, and in response to outcome of the comparison determining at least one radio channel for reselection of a cell. A mobile terminal and a system for implementing the method are also described.

17 citations


Patent
Jussila Olli1
03 Feb 2012
TL;DR: In this paper, an authentication request message is sent to the NFC reader and the data requested is delivered to the reader based on the identification information authentication related data on a service provider of NFC service is retrieved from a database.
Abstract: The invention relates to a method, a user terminal and a system for performing a NFC operation by a NFC equipped user terminal. According to a method a common application residing in a secure element of the user terminal can be authenticated by receiving, in the common application, an authentication request message comprising identification information on at least service provider of the NFC reader. Based on the identification information authentication related data on a service provider of NFC service is retrieved from a database. Furthermore, a data request message is received from the NFC reader. The data is retrieved, on the basis of identification information on at least service provider of the NFC reader and identification information for data, from the database residing in the secure element of the user terminal. The data requested is delivered to the NFC reader.

10 citations


Patent
Böjeryd Nils1
07 Nov 2012
TL;DR: In this paper, the authors proposed a method for delivering information on a serving mobile switching center server for a user equipment between a first communication network and a second communication network. But this method is not suitable for wireless networks.
Abstract: The invention relates to a method for delivering information on a serving mobile switching centre server for a user equipment between a first communication network and a second communication network. The method comprises a step of requesting an attachment of the user equipment to the second communication network by signaling between the user equipment and a network node of the second communication network, the signaling comprising at least part of information on the mobile switching centre server serving the user equipment in the first communication network. Additionally, the invention relates to a user equipment and a network node implementing the aspects of the method.

8 citations


Patent
15 Aug 2012
TL;DR: In this article, the authors proposed an approach for cell reselection in UTRAN and E-UTRA networks, in which the user terminal is configured to measure characteristics of radio channel of currently serving cell and neighbouring cells that are necessary for cell re-lection.
Abstract: The application relates to cell reselection, in particular for UTRAN and E-UTRA networks. The user terminal is configured to measure characteristics of radio channel of currently serving cell and neighbouring cells that are necessary for cell reselection. Typically such characteristics are measures relating to a signal strength and/or signal quality, such as CPICH RSCP, CPICH Ec/No in UTRAN, RSRP, and RSRQ in E-UTRA. However, utilization of either measure indicating signal strength or a measure indicating signal quality as a characteristic of a radio signal may cause serious problems, since e.g. in UTRAN the CPICH RSCP gives information on the coupling loss, but does not say anything on the interference. This problem is solved by configuring the mobile terminal to measure a value indicating signal strength and a value indicating signal quality as characteristics of a radio channel, i.e. the determination of a cell to be reselected is carried out by measuring values indicating signal strengths and values indicating signal quality.

5 citations


Patent
29 Jun 2012
TL;DR: In this article, the authors propose a solution for providing pricing information to a client device by means of a network connection, where the pricing information relates to at least one contact information appearing in the client device.
Abstract: The invention relates to a solution for providing pricing information to a client device. The pricing information is delivered from the operator system to the client device by means of a network connection. The pricing information relates to at least one contact information appearing in the client device. The client device is then configured to display the pricing information relating to the contact information in the client device.

4 citations


Patent
Böjeryd Nils1
14 Mar 2012
TL;DR: In this article, a method for modifying information stored in a mobile communication network includes steps of receiving, in a network element, a request for an operation in the mobile communications network relating to a user equipment; deriving information on the first register on the basis of the request; determining information on a second register for the user equipment in the network element; comparing information on first register derived on basis of request with information on second register determined for the device in the node element; and if the outcome of the comparison indicates a mismatch between the information on both registers, the second register is
Abstract: A method for modifying information stored in a mobile communication network includes steps of receiving, in a network element, a request for an operation in the mobile communication network relating to a user equipment; deriving information on the first register on the basis of the request; determining information on a second register for the user equipment in the network element; comparing information on the first register derived on the basis of the request with information on the second register determined for the user equipment in the network element; and if the outcome of the comparison indicates a mismatch between the information on the first and second registers, the second register is requested to initiate the modification of information in a third register. A network element implementing at least part of the steps of the method is also described.

Patent
Marijus Masteika1
23 Apr 2012
TL;DR: In this paper, a method for notifying a user of a mobile terminal of one or more missed connection attempts in a mobile communication network is proposed, where at least one unsuccessful connection attempt is detected in a network element.
Abstract: The invention relates to a method for notifying a user of a mobile terminal of one or more missed connection attempt in a mobile communication network. According to the method at least one unsuccessful connection attempt is detected in a network element. Information on at least one unsuccessful connection attempt is at least temporarily stored in the network element. The information from at least one connection attempt is retrieved in the network element and a predetermined notification message comprising information on at least one missed connection attempt is created. The notification message is delivered in the network. Additionally, the invention relates to a network element for implementing the method as described.

Patent
23 Mar 2012
TL;DR: In this article, a system and a method for publication of presence information associated with a user is described, where the presence information comprises a human-readable address for the user, and a request for establishing an emergency session from the user is received to a session processing server, which routes the emergency session to a public safety answering point node.
Abstract: The invention relates to a system and a method. In the method publication of presence information associated with a user is received by a presence server, the presence information comprises a human-readable address for the user. A request for establishing an emergency session from the user is received to a session processing server, which routes the emergency session to a public safety answering point node. In response to receiving the emergency session, the public safety answering point node sends a subscription for at least part of the presence information to the presence server, the at least part of the presence information comprising the human-readable address for the user. The presence server provides in response the at least part of the presence information to the public safety answering point node.

Patent
Ilkka Keisala1
27 Jul 2012
TL;DR: In this article, the authors present a method for delivering data dedicated to a functional application over a mobile communication network in a predetermined message form, interpreting the data in the message, and instructing a functionality of the functional application on a basis of the message.
Abstract: The invention concerns in general the technical field of transferring data to a functional application and a utilization of resources of mobile communication network in the context of functional applications. A method according to the invention for delivering data dedicated to a functional application comprises at least the following steps: receiving a message containing data dedicated to a functional application and transmitted at least partly over a mobile communication network in a predetermined message form, interpreting the data in the message, and instructing a functionality of the functional application on a basis of the data in the message. The invention also concerns a user terminal and a system for implementing at least part of the functionalities of the method and related into it.