This recommendation provides methods for estimating traffic offered to a circuit-switched telecommunication network based on measurements. It describes procedures to estimate the traffic offered to a circuit group and the origin-destination traffic based on circuit group measurements. Formulas are presented to account for factors like congestion when estimating traffic from busy-hour measurements. Annexes provide additional details on the estimation methods, including a simplified model, derivation of key formulas, and examples of applying the techniques.
This document defines concepts and methodologies for measuring traffic intensity in communication networks. It describes the concepts of normal and high load conditions and discusses how measured traffic intensities can be used to dimension network resources. Daily and monthly measurement methods are outlined to determine representative normal and high load traffic intensities over different time periods. The assumptions and objectives of the traffic intensity measurements are ensuring measurements capture stationary traffic processes and offered load to adequately size networks.
This document defines the functional building blocks and rules for combining them to describe the optical transport network functionality within equipment, such as optical transmission section termination, optical multiplex section termination, optical channel termination, and optical channel cross-connect functionality. It uses a specification methodology based on functional decomposition and defines functional blocks for the OCh, OTU, and ODU layers of the optical transport network architecture. The functional blocks can be combined to specify UNI and NNI interfaces. Optical technology-dependent aspects are not defined to allow for technology changes within optical subnetworks.
This document defines traffic measurement requirements for digital telecommunications exchanges. It establishes a generic traffic measurement model based on entities, objects, and traffic flows. Key points:
1. Measurements are defined at different levels, including overall, selectable objects, services, control units, and call records.
2. Major services covered are basic telephone, ISDN, and Intelligent Network (IN) services.
3. A measurement consists of measurement set information, time information, and output routing/scheduling information.
This document provides an overview of ITU-T recommendations related to traffic engineering. It discusses the four major tasks of traffic engineering: 1) traffic demand characterization, 2) establishing grade of service objectives, 3) traffic control and network dimensioning, and 4) performance monitoring. The recommendations covered relate to modeling, measuring and forecasting traffic, setting quality of service targets, and techniques for circuit-switched, packet-switched and signaling networks. The document is intended to introduce practitioners to the suite of ITU-T traffic engineering standards.
Upu telematics cooperatives added value to the unionDr Lendy Spires
This document discusses the value that the Universal Postal Union's Telematics Cooperative (TC) provides to various stakeholders. The TC reduces the digital divide by providing affordable IT solutions to all member posts, allows small businesses global market access, and ensures a modern postal service. It benefits designated operators, especially those in developing countries, by keeping them up to date with affordable standardized IT systems. The TC also benefits the International Bureau by providing software development and hosting UPU publications. Given these benefits, the document concludes that the current practice of financing TC institutional support costs through the regular UPU budget, according to Congress Resolution C59/2012, is well founded.
This document provides an overview of Nguyen Quynh Nhu including her education, career objectives, and relevant experience. Some key points include:
- She is studying for a Bachelor of Accounting degree expected to complete in September 2014.
- Her career objectives are to become a junior copywriter by 2018 and a creative director by 2028.
- Her relevant experience includes work as a marketing assistant, editor for various publications, and involvement in community organizations.
- She cites qualities like curiosity, responsibility, and organized thinking as strengths and loves the copywriting field. Her dream is to work for an interactive agency on well-known brands.
The document summarizes research on the use of meditation in therapy. It discusses how meditation can positively impact those with mental illness both physically and mentally by helping to reduce stress, anxiety and tension. It reviews three studies that showed how meditation can increase control over brain functions, build hope and a sense of support in those with spiritual experiences, and that patients and doctors recognize the importance of spiritual elements like meditation in healing. It concludes that meditation can be beneficial for those with mental illnesses by helping to make their lives more fulfilling.
This document defines concepts and methodologies for measuring traffic intensity in communication networks. It describes the concepts of normal and high load conditions and discusses how measured traffic intensities can be used to dimension network resources. Daily and monthly measurement methods are outlined to determine representative normal and high load traffic intensities over different time periods. The assumptions and objectives of the traffic intensity measurements are ensuring measurements capture stationary traffic processes and offered load to adequately size networks.
This document defines the functional building blocks and rules for combining them to describe the optical transport network functionality within equipment, such as optical transmission section termination, optical multiplex section termination, optical channel termination, and optical channel cross-connect functionality. It uses a specification methodology based on functional decomposition and defines functional blocks for the OCh, OTU, and ODU layers of the optical transport network architecture. The functional blocks can be combined to specify UNI and NNI interfaces. Optical technology-dependent aspects are not defined to allow for technology changes within optical subnetworks.
This document defines traffic measurement requirements for digital telecommunications exchanges. It establishes a generic traffic measurement model based on entities, objects, and traffic flows. Key points:
1. Measurements are defined at different levels, including overall, selectable objects, services, control units, and call records.
2. Major services covered are basic telephone, ISDN, and Intelligent Network (IN) services.
3. A measurement consists of measurement set information, time information, and output routing/scheduling information.
This document provides an overview of ITU-T recommendations related to traffic engineering. It discusses the four major tasks of traffic engineering: 1) traffic demand characterization, 2) establishing grade of service objectives, 3) traffic control and network dimensioning, and 4) performance monitoring. The recommendations covered relate to modeling, measuring and forecasting traffic, setting quality of service targets, and techniques for circuit-switched, packet-switched and signaling networks. The document is intended to introduce practitioners to the suite of ITU-T traffic engineering standards.
Upu telematics cooperatives added value to the unionDr Lendy Spires
This document discusses the value that the Universal Postal Union's Telematics Cooperative (TC) provides to various stakeholders. The TC reduces the digital divide by providing affordable IT solutions to all member posts, allows small businesses global market access, and ensures a modern postal service. It benefits designated operators, especially those in developing countries, by keeping them up to date with affordable standardized IT systems. The TC also benefits the International Bureau by providing software development and hosting UPU publications. Given these benefits, the document concludes that the current practice of financing TC institutional support costs through the regular UPU budget, according to Congress Resolution C59/2012, is well founded.
This document provides an overview of Nguyen Quynh Nhu including her education, career objectives, and relevant experience. Some key points include:
- She is studying for a Bachelor of Accounting degree expected to complete in September 2014.
- Her career objectives are to become a junior copywriter by 2018 and a creative director by 2028.
- Her relevant experience includes work as a marketing assistant, editor for various publications, and involvement in community organizations.
- She cites qualities like curiosity, responsibility, and organized thinking as strengths and loves the copywriting field. Her dream is to work for an interactive agency on well-known brands.
The document summarizes research on the use of meditation in therapy. It discusses how meditation can positively impact those with mental illness both physically and mentally by helping to reduce stress, anxiety and tension. It reviews three studies that showed how meditation can increase control over brain functions, build hope and a sense of support in those with spiritual experiences, and that patients and doctors recognize the importance of spiritual elements like meditation in healing. It concludes that meditation can be beneficial for those with mental illnesses by helping to make their lives more fulfilling.
This document summarizes ITU-T Recommendation P.862, which describes an objective method called Perceptual Evaluation of Speech Quality (PESQ) for predicting the subjective quality of narrow-band telephone networks and speech codecs. PESQ can assess the quality of 3.1 kHz handset telephony and narrow-band speech codecs by comparing the original speech signal with the degraded signal processed through the system under test. The recommendation provides a high-level description of the PESQ algorithm, guidance on its use, and results from benchmark tests validating its accuracy in predicting subjective listening quality scores. It includes an ANSI-C reference implementation of PESQ and conformance testing procedures in an electronic attachment.
T rec-j.94-200010-s service information for digital broadcasting in cable tel...frankyao23
This amendment defines a standard for Service Information (SI) on cable compatible with digital multiplex bit streams. It defines the syntax and semantics for a set of tables providing the necessary data for navigation devices to discover and access digital and analogue services offered on cable. This SI protocol is delivered in a separate out-of-band physical channel outside the actual program content transport streams. It includes specifications for the Network Information Table, Network Text Table, Virtual Channel Tables, System Timetable, Master Guide Table, Event Information Tables, and descriptors for audio, captions, content ratings, and other service properties.
The document provides routing guidelines for efficient routing methods in TDM, ATM and IP networks. It recommends using bandwidth reservation and avoiding long paths under congestion to improve efficiency. While state-dependent routing is emphasized in ATM and IP networks, the document suggests using event-dependent routing or more efficient information dissemination to avoid inefficient flooding. It also recommends quality of service routing rules to ensure performance quality.
This document summarizes an ITU-T recommendation that specifies maximum limits for jitter and wander in digital networks based on the Synchronous Digital Hierarchy (SDH). It defines network interface limits for jitter and wander to ensure interoperability between equipment from different manufacturers and satisfactory network performance. It also specifies minimum equipment tolerance requirements for jitter and wander at SDH network interfaces. The recommendation provides a framework for controlling and limiting the accumulation of jitter and wander throughout SDH networks.
This document defines standards for interfaces in optical transport networks. It specifies requirements for optical transport module signals, including optical transport hierarchy, overhead functionality, frame structures, bit rates, and client signal mapping formats. The standards support multiplexing of client signals and wavelength division multiplexing. The document has been revised multiple times to include additional amendments and support new client signals.
This document describes internal monitoring of network performance using specific metrics like Answer Seizure Ratio (ASR) and Answer Bid Ratio (ABR). Internal monitoring allows collection of a large volume of records to evaluate daily network performance and troubleshoot issues. Supplementary data on signaling faults, subscriber behavior, and network failures is also exchanged quarterly to further analyze quality of service. Internal automatic observations provide advantages over external monitoring in monitoring network performance.
This document describes the transmission convergence layer specification for Gigabit-capable Passive Optical Networks (G-PON). It defines the frame structure, encapsulation, dynamic bandwidth allocation, operations, administration and maintenance (OAM) functionality, security, and other aspects of the transmission convergence layer. The transmission convergence layer provides the interface between the optical distribution network and the payload data and is responsible for the transmission of different traffic types over the G-PON infrastructure. It allows the transport of services such as voice, video and data at rates up to 2.5 Gbps downstream and 1.25 Gbps upstream through encapsulation using the G-PON Encapsulation Method (GEM).
This document specifies procedures for establishing, maintaining, and clearing network connections at the ISDN user-network interface. It defines messages exchanged over the D-channel of basic and primary rate interfaces. The messages control circuit-switched calls, packet-mode access connections, and temporary signaling connections. Call states are defined for the user and network sides of the interface, as well as for the global call reference. Message formats and coding of information elements are also specified.
The document describes a low power protocol for wide area wireless networks called LoRaWAN. It is optimized for battery-powered devices that may be mobile or stationary. Key aspects covered include physical packet formats, MAC frame formats, MAC commands for functions like device activation and configuration, and retransmission procedures. The protocol is technically equivalent to the LoRaWAN specification.
The document is ITU-T Recommendation G.651.1 which recommends characteristics for a 50/125 μm multimode graded index optical fibre cable for use in optical access networks, specifically in multi-tenant building sub-networks. It defines fibre and cable attributes such as dimensions, optical properties, transmission characteristics etc. and provides reference values in tables to ensure compatibility with network equipment standards such as IEEE 802.3. The recommended fibre type is a improved version of the widely used 50/125 μm multimode fibre, allowing cost-effective 1 Gbps Ethernet connectivity over link lengths up to 550m.
This document provides recommendations for defining transmission-related parameters and their test methods for various optical components and subsystems used in long-haul and access networks. It identifies key parameters for components like optical add/drop multiplexers, attenuators, filters, connectors, and more. The recommendations are intended to help standardize how these components are characterized so their performance can be understood and interoperability ensured across systems. Test methods and example parameter values are defined based on other ITU recommendations for different network applications.
New ITU Standard on Identity & Access ManagementITU
This document proposes requirements for assigning business meaning to identity and access management (IAM) roles and permissions by developing an IAM taxonomy and ontology model. The taxonomy would semantically identify IAM processes and phases to represent the full IAM lifecycle. The ontology model would semantically define IAM role and permission types, their syntax and relationships. This aims to address issues like incorrectly assigned access rights and inability to implement separation of duties controls across applications due to the current lack of business context for IAM roles and permissions.
This document provides a framework for quality of service (QoS) routing and related traffic engineering methods for IP, ATM, and TDM multiservice networks. It outlines traffic engineering functions including traffic management through call and connection routing, QoS resource management, routing table management, and dynamic transport routing. It also outlines capacity management functions. Recommended traffic engineering methods aim to optimize network performance for reliable traffic movement through control of routing and network design in response to traffic demands. Subsequent recommendations provide more detailed descriptions and analysis of specific traffic engineering methods.
The document discusses the optical transport network (OTN) standard defined in ITU-T G.709. It describes the OTN layered structure, interfaces and rates, frame structure and overhead, and techniques for testing OTN elements. The OTN architecture allows more efficient transport of client signals using optical channels and standardized overhead to manage network functions like multiplexing and forward error correction.
The years approaching 2020 will see Internet of Things (IoT) technologies enabling the interconnection of billions of devices, things and objects to achieve the efficiencies borne of innovations such as intelligent buildings and transportation systems, and smart energy and water networks.
IoT is contributing to the convergence of industry sectors, with utilities, healthcare and transportation among the many sectors with a stake in the future of IoT. The new ITU-T Study Group 20 established in June 2015 provides the specialized IoT standardization platform necessary for this convergence to rest on a cohesive set of international standards.
Today we are faced with the challenge of addressing the standardization requirements of the many vertical industries applying information and communication technologies (ICTs) as enabling technologies. This is particularly evident in the field of IoT, where IoT platforms are being developed independently, according to the specific needs of each sector. This divergence in IoT development and deployment has led to an urgent need for stakeholders to come together to mitigate the risk of data “silos” emerging in different industry sectors.
ITU-T Study Group 20 has taken up this challenge, providing government, industry and academia with a unique global platform to collaborate in the development of international IoT standards. One of the group’s primary objectives is to support the creation of an inclusive, interoperable IoT ecosystem capable of making full use of the data generated by IoT-enabled systems.
The Study Group is building on over ten years of ITU-T experience in IoT standardization, developing international standards to enable the coordinated development of IoT technologies, including radio-frequency identification, ubiquitous sensor networks and machine-to-machine communications. A central part of this study is the standardization of end-to-end architectures for IoT, and mechanisms for the interoperability of IoT applications and datasets employed by various vertical industries. An important aspect of the group’s work is the development of standards that leverage IoT technologies to address urban-development challenges.
This flipbook presents a compendium of the first set of ITU international standards for IoT, providing a resource of great value to standards experts interested in contributing to the work of ITU-T Study Group 20. This compendium is also expected to assist the wide variety of stakeholders interested in implementing these IoT standards or calling for adherence to standards in policy and regulatory frameworks relevant to IoT. This compendium will be updated continuously, according to the progress of IoT developments in ITU.
For more information on how to join ITU-T Study Group 20 on Internet of Things, please visit: http://www.itu.int/en/ITU-T/about/groups/Pages/sg20.aspx
This document provides electromagnetic compatibility (EMC) requirements for information perception equipment (IPE) used in the perception layer of Internet of things (IoT) networks. It defines IPE as a collective name for individual devices that collect information and provide it to communication networks. The document classifies IPE into different categories, outlines potential EMC problems in IoT, describes electromagnetic environments, and establishes EMC emission and immunity requirements for IPE used in various locations. It aims to ensure proper operation of IPE in the presence of electromagnetic disturbances.
LTE Mobile Broadband Ecosystem:The Global OpportunityGoing LTE
The report finds that there is strong industry commitment to deploying LTE mobile broadband networks over the next few years. Major mobile operators like Verizon, NTT DoCoMo, China Mobile, and TeliaSonera have announced plans to launch LTE networks and many vendors have developed LTE technology roadmaps. Growing demand for mobile data driven by services like video will require the improved capabilities of LTE such as higher speeds and capacity. End users are enthusiastic about mobile broadband applications and see opportunities for new location and vehicle-based services enabled by LTE. For LTE to succeed, the ecosystem of devices, infrastructure and applications will need to develop to support the new network technology and meet rising user expectations around performance and functionality
Referenced in presentation, "The Seven Wonders of China's Mobile World"
http://www.slideshare.net/ckeikofunahashi/m-learncon-session-907-ckeikofunahashi
This document describes various performance metrics for measuring different components of an SGSN network, including LLC (logical link control), BSSGP (base station subsystem GPRS protocol), and SNDCP (subnetwork dependent convergence protocol). It provides definitions, measurement units, and formulas for over 25 metrics related to data and signaling packet processing, throughput, errors, and retransmissions across each component and on the Gb interface.
This document provides an overview and planning considerations for the Gb interface, which connects the BSS (base station subsystem) and SGSN (serving GPRS support node) in a GPRS network. It discusses topics like the Gb protocol stack, logical connections, frame relay interface planning, BSC and SGSN dimensioning, and topology planning. Examples are also provided for dimensioning the number of PCUs (packet control units) in the BSCs and required Gb links based on estimated GPRS traffic loads and overhead factors.
This document summarizes ITU-T Recommendation P.862, which describes an objective method called Perceptual Evaluation of Speech Quality (PESQ) for predicting the subjective quality of narrow-band telephone networks and speech codecs. PESQ can assess the quality of 3.1 kHz handset telephony and narrow-band speech codecs by comparing the original speech signal with the degraded signal processed through the system under test. The recommendation provides a high-level description of the PESQ algorithm, guidance on its use, and results from benchmark tests validating its accuracy in predicting subjective listening quality scores. It includes an ANSI-C reference implementation of PESQ and conformance testing procedures in an electronic attachment.
T rec-j.94-200010-s service information for digital broadcasting in cable tel...frankyao23
This amendment defines a standard for Service Information (SI) on cable compatible with digital multiplex bit streams. It defines the syntax and semantics for a set of tables providing the necessary data for navigation devices to discover and access digital and analogue services offered on cable. This SI protocol is delivered in a separate out-of-band physical channel outside the actual program content transport streams. It includes specifications for the Network Information Table, Network Text Table, Virtual Channel Tables, System Timetable, Master Guide Table, Event Information Tables, and descriptors for audio, captions, content ratings, and other service properties.
The document provides routing guidelines for efficient routing methods in TDM, ATM and IP networks. It recommends using bandwidth reservation and avoiding long paths under congestion to improve efficiency. While state-dependent routing is emphasized in ATM and IP networks, the document suggests using event-dependent routing or more efficient information dissemination to avoid inefficient flooding. It also recommends quality of service routing rules to ensure performance quality.
This document summarizes an ITU-T recommendation that specifies maximum limits for jitter and wander in digital networks based on the Synchronous Digital Hierarchy (SDH). It defines network interface limits for jitter and wander to ensure interoperability between equipment from different manufacturers and satisfactory network performance. It also specifies minimum equipment tolerance requirements for jitter and wander at SDH network interfaces. The recommendation provides a framework for controlling and limiting the accumulation of jitter and wander throughout SDH networks.
This document defines standards for interfaces in optical transport networks. It specifies requirements for optical transport module signals, including optical transport hierarchy, overhead functionality, frame structures, bit rates, and client signal mapping formats. The standards support multiplexing of client signals and wavelength division multiplexing. The document has been revised multiple times to include additional amendments and support new client signals.
This document describes internal monitoring of network performance using specific metrics like Answer Seizure Ratio (ASR) and Answer Bid Ratio (ABR). Internal monitoring allows collection of a large volume of records to evaluate daily network performance and troubleshoot issues. Supplementary data on signaling faults, subscriber behavior, and network failures is also exchanged quarterly to further analyze quality of service. Internal automatic observations provide advantages over external monitoring in monitoring network performance.
This document describes the transmission convergence layer specification for Gigabit-capable Passive Optical Networks (G-PON). It defines the frame structure, encapsulation, dynamic bandwidth allocation, operations, administration and maintenance (OAM) functionality, security, and other aspects of the transmission convergence layer. The transmission convergence layer provides the interface between the optical distribution network and the payload data and is responsible for the transmission of different traffic types over the G-PON infrastructure. It allows the transport of services such as voice, video and data at rates up to 2.5 Gbps downstream and 1.25 Gbps upstream through encapsulation using the G-PON Encapsulation Method (GEM).
This document specifies procedures for establishing, maintaining, and clearing network connections at the ISDN user-network interface. It defines messages exchanged over the D-channel of basic and primary rate interfaces. The messages control circuit-switched calls, packet-mode access connections, and temporary signaling connections. Call states are defined for the user and network sides of the interface, as well as for the global call reference. Message formats and coding of information elements are also specified.
The document describes a low power protocol for wide area wireless networks called LoRaWAN. It is optimized for battery-powered devices that may be mobile or stationary. Key aspects covered include physical packet formats, MAC frame formats, MAC commands for functions like device activation and configuration, and retransmission procedures. The protocol is technically equivalent to the LoRaWAN specification.
The document is ITU-T Recommendation G.651.1 which recommends characteristics for a 50/125 μm multimode graded index optical fibre cable for use in optical access networks, specifically in multi-tenant building sub-networks. It defines fibre and cable attributes such as dimensions, optical properties, transmission characteristics etc. and provides reference values in tables to ensure compatibility with network equipment standards such as IEEE 802.3. The recommended fibre type is a improved version of the widely used 50/125 μm multimode fibre, allowing cost-effective 1 Gbps Ethernet connectivity over link lengths up to 550m.
This document provides recommendations for defining transmission-related parameters and their test methods for various optical components and subsystems used in long-haul and access networks. It identifies key parameters for components like optical add/drop multiplexers, attenuators, filters, connectors, and more. The recommendations are intended to help standardize how these components are characterized so their performance can be understood and interoperability ensured across systems. Test methods and example parameter values are defined based on other ITU recommendations for different network applications.
New ITU Standard on Identity & Access ManagementITU
This document proposes requirements for assigning business meaning to identity and access management (IAM) roles and permissions by developing an IAM taxonomy and ontology model. The taxonomy would semantically identify IAM processes and phases to represent the full IAM lifecycle. The ontology model would semantically define IAM role and permission types, their syntax and relationships. This aims to address issues like incorrectly assigned access rights and inability to implement separation of duties controls across applications due to the current lack of business context for IAM roles and permissions.
This document provides a framework for quality of service (QoS) routing and related traffic engineering methods for IP, ATM, and TDM multiservice networks. It outlines traffic engineering functions including traffic management through call and connection routing, QoS resource management, routing table management, and dynamic transport routing. It also outlines capacity management functions. Recommended traffic engineering methods aim to optimize network performance for reliable traffic movement through control of routing and network design in response to traffic demands. Subsequent recommendations provide more detailed descriptions and analysis of specific traffic engineering methods.
The document discusses the optical transport network (OTN) standard defined in ITU-T G.709. It describes the OTN layered structure, interfaces and rates, frame structure and overhead, and techniques for testing OTN elements. The OTN architecture allows more efficient transport of client signals using optical channels and standardized overhead to manage network functions like multiplexing and forward error correction.
The years approaching 2020 will see Internet of Things (IoT) technologies enabling the interconnection of billions of devices, things and objects to achieve the efficiencies borne of innovations such as intelligent buildings and transportation systems, and smart energy and water networks.
IoT is contributing to the convergence of industry sectors, with utilities, healthcare and transportation among the many sectors with a stake in the future of IoT. The new ITU-T Study Group 20 established in June 2015 provides the specialized IoT standardization platform necessary for this convergence to rest on a cohesive set of international standards.
Today we are faced with the challenge of addressing the standardization requirements of the many vertical industries applying information and communication technologies (ICTs) as enabling technologies. This is particularly evident in the field of IoT, where IoT platforms are being developed independently, according to the specific needs of each sector. This divergence in IoT development and deployment has led to an urgent need for stakeholders to come together to mitigate the risk of data “silos” emerging in different industry sectors.
ITU-T Study Group 20 has taken up this challenge, providing government, industry and academia with a unique global platform to collaborate in the development of international IoT standards. One of the group’s primary objectives is to support the creation of an inclusive, interoperable IoT ecosystem capable of making full use of the data generated by IoT-enabled systems.
The Study Group is building on over ten years of ITU-T experience in IoT standardization, developing international standards to enable the coordinated development of IoT technologies, including radio-frequency identification, ubiquitous sensor networks and machine-to-machine communications. A central part of this study is the standardization of end-to-end architectures for IoT, and mechanisms for the interoperability of IoT applications and datasets employed by various vertical industries. An important aspect of the group’s work is the development of standards that leverage IoT technologies to address urban-development challenges.
This flipbook presents a compendium of the first set of ITU international standards for IoT, providing a resource of great value to standards experts interested in contributing to the work of ITU-T Study Group 20. This compendium is also expected to assist the wide variety of stakeholders interested in implementing these IoT standards or calling for adherence to standards in policy and regulatory frameworks relevant to IoT. This compendium will be updated continuously, according to the progress of IoT developments in ITU.
For more information on how to join ITU-T Study Group 20 on Internet of Things, please visit: http://www.itu.int/en/ITU-T/about/groups/Pages/sg20.aspx
This document provides electromagnetic compatibility (EMC) requirements for information perception equipment (IPE) used in the perception layer of Internet of things (IoT) networks. It defines IPE as a collective name for individual devices that collect information and provide it to communication networks. The document classifies IPE into different categories, outlines potential EMC problems in IoT, describes electromagnetic environments, and establishes EMC emission and immunity requirements for IPE used in various locations. It aims to ensure proper operation of IPE in the presence of electromagnetic disturbances.
LTE Mobile Broadband Ecosystem:The Global OpportunityGoing LTE
The report finds that there is strong industry commitment to deploying LTE mobile broadband networks over the next few years. Major mobile operators like Verizon, NTT DoCoMo, China Mobile, and TeliaSonera have announced plans to launch LTE networks and many vendors have developed LTE technology roadmaps. Growing demand for mobile data driven by services like video will require the improved capabilities of LTE such as higher speeds and capacity. End users are enthusiastic about mobile broadband applications and see opportunities for new location and vehicle-based services enabled by LTE. For LTE to succeed, the ecosystem of devices, infrastructure and applications will need to develop to support the new network technology and meet rising user expectations around performance and functionality
Referenced in presentation, "The Seven Wonders of China's Mobile World"
http://www.slideshare.net/ckeikofunahashi/m-learncon-session-907-ckeikofunahashi
This document describes various performance metrics for measuring different components of an SGSN network, including LLC (logical link control), BSSGP (base station subsystem GPRS protocol), and SNDCP (subnetwork dependent convergence protocol). It provides definitions, measurement units, and formulas for over 25 metrics related to data and signaling packet processing, throughput, errors, and retransmissions across each component and on the Gb interface.
This document provides an overview and planning considerations for the Gb interface, which connects the BSS (base station subsystem) and SGSN (serving GPRS support node) in a GPRS network. It discusses topics like the Gb protocol stack, logical connections, frame relay interface planning, BSC and SGSN dimensioning, and topology planning. Examples are also provided for dimensioning the number of PCUs (packet control units) in the BSCs and required Gb links based on estimated GPRS traffic loads and overhead factors.
This document summarizes a recommendation from the International Telecommunication Union (ITU) regarding traffic measurement data analysis. It discusses analyzing measurement data from telecommunication networks to support planning, engineering, and managing networks. The analysis can process data to remove unnecessary values, replace missing data, and calculate parameters. Analysis results like traffic data records and reports can then be used for applications like network dimensioning and performance monitoring.
This document provides procedures for estimating traffic offered to network components based on measurements of carried traffic and call attempts.
Section 2 describes a method to estimate traffic offered to a circuit group experiencing significant congestion based on measurements of carried traffic and blocking probability. Section 3 covers estimating traffic offered to a high-usage group with no congestion on the final group based on simultaneous measurements of traffic on both groups. Section 4 provides a method to estimate equivalent origin-destination traffic offered using trunk group traffic measurements when direct origin-destination measurements are unavailable.
The document discusses principles for measuring telephone traffic intensity and number of bids. It describes different methods for measuring traffic, including yearly continuous measurements, yearly non-continuous measurements, and daily continuous measurements. It recommends taking measurements continuously throughout the day and calculating the busy hour value as either the peak value of the mean daily profile (time-consistent busy hour) or the average of daily peak values (average daily peak hour). Factors for estimating normal and high traffic loads from limited sample measurements are also provided.
The document discusses traffic reference periods, which are time periods used for traffic observations related to quality control and network dimensioning. Normal and high load periods are defined to monitor grade of service. For circuit-switched networks, the normal load is the 4th highest daily peak period in a month, and the high load is the 2nd highest. Reference periods are also defined for different types of networks and services, such as public switched telephone networks, signaling system no. 7, and broadband ISDN. Measurement methods include continuous, scheduled, manual, and automatic collection of data.
ZXWR R8840 is an outdoor radio remote unit from ZTE's SDR series for UMTS networks. It has a compact design that is lightweight and easy to install without requiring dedicated equipment space. It supports expanding from 1 to 4 carriers through software upgrades and uses an efficient Doherty + DPD power amplifier design for lower power consumption. The R8840 also has flexible power supply options and security features suitable for outdoor installations.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
CAKE: Sharing Slices of Confidential Data on Blockchain
T rec-e.501-199705-i!!pdf-e
1. INTERNATIONAL TELECOMMUNICATION UNION
)45
4 %
TELECOMMUNICATION
STANDARDIZATION SECTOR
OF ITU
(05/97)
SERIES E: OVERALL NETWORK OPERATION,
TELEPHONE SERVICE, SERVICE OPERATION AND
HUMAN FACTORS
Quality of service, network management and traffic
engineering – Traffic engineering – Measurement and
recording of traffic
%STIMATION OF TRAFFIC OFFERED IN THE NETWORK
ITU-T Recommendation E.501
(Previously CCITT Recommendation)
2. ITU-T E-SERIES RECOMMENDATIONS
OVERALL NETWORK OPERATION, TELEPHONE SERVICE, SERVICE OPERATION AND HUMAN
FACTORS
For further details, please refer to ITU-T List of Recommendations.
OPERATION, NUMBERING, ROUTING AND MOBILE SERVICES
INTERNATIONAL OPERATION E.100–E.229
OPERATIONAL PROVISIONS RELATING TO CHARGING AND ACCOUNTING IN
THE INTERNATIONAL TELEPHONE SERVICE
E.230–E.299
UTILIZATION OF THE INTERNATIONAL TELEPHONE NETWORK FOR NON-
TELEPHONY APPLICATIONS
E.300–E.329
ISDN PROVISIONS CONCERNING USERS E.330–E.399
QUALITY OF SERVICE, NETWORK MANAGEMENT AND TRAFFIC ENGINEERING
NETWORK MANAGEMENT E.400–E.489
International service statistics E.400–E.409
International network management E.410–E.419
Checking the quality of the international telephone service E.420–E.489
TRAFFIC ENGINEERING E.490–E.799
Measurement and recording of traffic E.490–E.505
Forecasting of traffic E.506–E.509
Determination of the number of circuits in manual operation E.510–E.519
Determination of the number of circuits in automatic and semi-automatic operation E.520–E.539
Grade of service E.540–E.599
Definitions E.600–E.699
ISDN traffic engineering E.700–E.749
Mobile network traffic engineering E.750–E.799
QUALITY OF TELECOMMUNICATION SERVICES: CONCEPTS, MODELS,
OBJECTIVES AND DEPENDABILITY PLANNING
E.800–E.899
Terms and definitions related to the quality of telecommunication services E.800–E.809
Models for telecommunication services E.810–E.844
Objectives for quality of service and related concepts of telecommunication services E.845–E.859
Use of quality of service objectives for planning of telecommunication networks E.860–E.879
Field data collection and evaluation on the performance of equipment, networks and services E.880–E.899
3. Recommendation E.501 (05/97) i
ITU-T RECOMMENDATION E.501
ESTIMATION OF TRAFFIC OFFERED IN THE NETWORK
Summary
This Recommendation contains estimation procedures for the traffic offered to a circuit-switched network. Methods to
estimate the traffic offered to a circuit group and the origin-destination traffic, based on circuit group measurements, are
described.
Source
ITU-T Recommendation E.501 was revised by ITU-T Study Group 2 (1997-2000) and was approved under the WTSC
Resolution No. 1 procedure on the 26th of May 1997.
5. Recommendation E.501 (05/97) iii
CONTENTS
Page
1 Introduction.................................................................................................................................................... 1
2 Scope.............................................................................................................................................................. 2
3 References...................................................................................................................................................... 2
4 Only-path circuit group.................................................................................................................................. 2
4.1 No significant congestion ................................................................................................................. 2
4.2 Significant congestion ...................................................................................................................... 2
5 High-usage/final circuit group arrangement................................................................................................... 3
5.1 High-usage group with no significant congestion on the final group ............................................... 3
5.2 High-usage group with significant congestion on the final group.................................................... 3
6 Origin-destination equivalent traffic offered.................................................................................................. 4
6.1 Determination of origin-destination traffic offered when origin-destination traffic measurements
on the totality of call attempts are available ..................................................................................... 4
6.2 Determination of origin-destination traffic offered when origin-destination traffic measurements
only on a sampling basis are available.............................................................................................. 4
6.3 Determination of origin-destination traffic offered when only circuit-group based measurements
of traffic intensity are available ........................................................................................................ 4
7 History............................................................................................................................................................ 5
8 Bibliography................................................................................................................................................... 5
Annex A – A simplified model for the formula presented in 4.2.............................................................................. 5
Annex B – Equivalent traffic offered ........................................................................................................................ 10
Annex C – Methods for determination of origin-destination traffic offered when only the measurements of traffic
intensity on circuit group basis are available ................................................................................................. 10
C.1 Notation, derivation, and solution of Formula 6-1 in 6.3 ................................................................. 10
C.2 The pseudo-inverse........................................................................................................................... 12
C.3 The iterative algorithm...................................................................................................................... 12
Bibliography................................................................................................................................................... 14
Annex D – Examples of application of the methods described in Annex C ............................................................. 14
D.1 Example 1......................................................................................................................................... 14
D.2 Example 2......................................................................................................................................... 16
Annex E – A sample performance evaluation of the pseudo-inverse and of the iterative algorithm ........................ 19
6.
7. Recommendation E.501 (05/97) 1
Recommendation E.501
Recommendation E.501 (05/97)
ESTIMATION OF TRAFFIC OFFERED IN THE NETWORK
(revised 1997)
1 Introduction
For planning the growth of the network, the following quantities must be estimated from measurements:
– traffic offered to circuit groups;
– traffic offered to destinations, on an origin-destination basis;
– traffic offered to exchanges;
– call attempts offered to exchanges;
– traffic offered to signalling links.
These quantities are normally estimated from measurements of busy-hour carried traffic and call attempts, but there are a
number of factors which may need to be taken into account within the measurement and estimation procedures:
a) Measurements may need to be subdivided, e.g. on a destination basis, or by call type (for example, calls using
different signalling systems).
b) It may not be possible to obtain a complete record of traffic carried. For example, in a network with high usage and
final groups, it may not be possible to measure the traffic overflowing from each high usage group.
c) Measurements may be affected by congestion. This will generally result in a decrease in traffic carried, but the
decrease may be affected by customer’s repeat attempts and by the actions (for example, automatic repeat attempts)
of other network components.
d) When high levels of congestion persist for a lengthy period (many days), some customers may avoid making calls
during the congested period of each day. This apparent missing component of offered traffic is known as
suppressed traffic. It should be taken into account in planning since the offered traffic will increase when the
equipment is augmented. At present, suitable algorithms for estimating suppressed traffic have not been defined.
Three situations should be distinguished:
i) Congestion upstream of the measurement point – This is not directly observable.
ii) Congestion due to the measured equipment – Congestion measurements should be used to detect this.
iii) Congestion downstream of the measurement point – This can often be detected from measurements of ineffective
traffic or completion ratio. Note that where groups are both way, congestion elsewhere in the network may be both
upstream and downstream of the measurement point for different parcels of traffic.
When congestion is due to the measured equipment, this must be properly accounted for in the estimation of traffic
offered which is used for planning the growth of the measured equipment.
When congestion arises elsewhere in the network, the planner needs to consider whether or not the congestion will
remain throughout the considered planning period. This may be difficult if he does not have control of the congested
equipment.
This Recommendation presents estimation procedures for two of the situations described above. Clauses 4 and 5 have
the aim of the determination of traffic offered to circuit group, and namely clause 4 deals with the estimation of traffic
offered to a fully-operative only-path circuit group which may be in significant congestion. Clause 5 deals with a high-
usage and final group arrangement with no significant congestion. Clause 6 provides a procedure to determine traffic
offered to destinations on an origin-destination basis, when only measurements of traffic intensity on circuit groups are
available or when direct measurements on origin-destination traffic offered are also available.
In clause 6 the estimated traffic offered is the equivalent traffic offered used in the pure lost call model as defined in
Annex B, while in clauses 4 and 5 in the evaluation of traffic offered, the user’s repeat attempts are taken into account.
8. 2 Recommendation E.501 (05/97)
These estimation procedures should be applied to individual busy-hour measurements. The resulting estimates of traffic
offered in each hour should then be accumulated according to the procedures described in Recommendation E.500.
2 Scope
This Recommendation provides means of estimating the traffic offered to circuit groups based on measurements of
traffic carried and means of estimating origin-destination traffic flows based on circuit group measurements.
3 References
The following ITU-T Recommendations and other references contain provisions which, through reference in this text,
constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All
Recommendations and other references are subject to revision; all users of this Recommendation are therefore
encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other
references listed below. A list of the currently valid ITU-T Recommendations is regularly published.
– CCITT Recommendation E.500 (1992), Traffic intensity measurement principles.
– CCITT Recommendation E.502 (1992), Traffic measurement requirements for digital telecommunication
exchanges.
4 Only-path circuit group
4.1 No significant congestion
Traffic offered will equal traffic carried measured according to Recommendation E.500. No estimation is required.
4.2 Significant congestion
Let AC be the traffic carried on the circuit group. Then, on the assumption that augmentation of the circuit group would
have no effect on the mean holding time of calls carried or on the completion ratio of calls carried, the traffic offered to
the circuit group may be expressed as:
A A
WB
B
C=
–(1
( )
)
1 − (4-1)
where B is the present average loss probability for all call attempts to the considered circuit group, and W is a parameter
representing the effect of call repetitions. Models for W are presented in Annex A.
To facilitate the quick determination of offered traffic according to the approximate procedure in Annex A, Table A.1
including numerical values of the factor (1 – WB)/(1 – B) was prepared for a wide range of B, H and r’(for the definition
of H and r’, see Annex A). For the use of Table A.1, see Note 2 in Annex A.
NOTE 1 – Annex A gives a derivation of this relationship, and also describes a more complex model which may be of use when
measurements of completion ratios are available.
NOTE 2 – When measurements of completion ratios are not available a W value may be selected from the range 0.6 to 0.9. It should
be noted that a lower value of W corresponds to a higher estimate of traffic offered. Administrations are encouraged to exchange the
values of W that they propose to use.
NOTE 3 – Administrations should maintain records of data collected before and after augmentations of circuit groups. This data will
enable a check on the validity of the above formula, and on the validity of the value of W used.
NOTE 4 – In order to apply this formula, it is normally assumed that the circuit group is in a fully operative condition or that any
faulty circuits have been taken out of service. If faulty circuits or faulty transmission or signalling equipment associated with these
circuits remain in service, then the formula may give incorrect results.
9. Recommendation E.501 (05/97) 3
5 High-usage/final circuit group arrangement
5.1 High-usage group with no significant congestion on the final group
5.1.1 Where a relation is served by a high-usage and final group arrangement, it is necessary to take simultaneous
measurements on both circuit groups.
Let AH be the traffic carried on the high-usage group, and AF the traffic overflowing from this high-usage group and
carried on the final group. With no significant congestion on the final group, the traffic offered to the high-usage group
is:
A A + AH F= (5-1)
5.1.2 Two distinct types of procedure are recommended, each with several possible approaches. The method given
in 5.1.2.1 a) is preferred because it is the most accurate, although it may be the most difficult to apply. The methods of
5.1.2.2 may be used as additional estimates.
5.1.2.1 Simultaneous measurements are taken of AH and the total traffic carried on the final group. Three methods are
given for estimating AF, in decreasing order of preference:
a) AF is measured directly. In most circumstances this may be achieved by measuring traffic carried on the final group
on a destination basis.
b) The total traffic carried on the final group is broken down by destination in proportion to the number of effective
calls to each destination.
c) The traffic carried on the final group is broken down according to ratios between the bids from the high-usage
groups and the total number of bids to the final group.
5.1.2.2 Two alternative methods are given for estimating the traffic offered to the high-usage group which, in this
circumstance, equals the equivalent traffic offered:
a) A is estimated from the relationship:
A A E AH N= [1 – ( )] (5-2)
here EN (A) is the Erlang loss formula, N is the number of working circuits on the high-usage group. The estimation
may be made by an iterative computer programme, or manually by the use of tables or graphs.
The accuracy of this method may be adversely affected by the non-randomness of the offered traffic, intensity
variation during the measurement period, or use of an incorrect value for N.
b) A is estimated from:
A A BH= / (1 – ) (5-3)
where B is the measured overflow probability. The accuracy of this method may be aversely affected by the
presence of repeat bids generated by the exchange if they are included in the circuit group bid register.
It is recommended to apply both methods a) and b); any significant discrepancy would then require further investigation.
It should be noted however that both of these methods may become unreliable for high-usage groups with high overflow
probability; in this situation a longer measurement period may be required for reliable results.
5.2 High-usage group with significant congestion on the final group
In this case, estimation of the traffic offered requires a combination of the methods of 4.2 and 5.1. A proper
understanding of the different parameters, through further study, is required before a detailed procedure can be recom-
mended.
10. 4 Recommendation E.501 (05/97)
6 Origin-destination equivalent traffic offered
This clause deals with the determination of equivalent traffic model according to the model described in Annex B.
An accurate estimate of origin-destination traffic offered is essential to design, engineer and service any communications
network. This is especially, but not uniquely, true for dynamic routing networks.
The accuracy of this estimation depends on the availability of measurements and on the network structure.
As a matter of fact, the origin-destination offered traffic can be obtained in three different ways, by elaborating:
i) the measurements of traffic dispersion and duration (see Recommendation E.502), accomplished by the network
switches on the total traffic;
ii) the measurements of traffic dispersion and duration (see Recommendation E.502), accomplished by the network
switches on a sampling basis;
iii) the measurements on the circuit groups and nodes.
6.1 Determination of origin-destination traffic offered when origin-destination traffic measure-
ments on the totality of call attempts are available
In this case the problem of determining the origin-destination traffic offered is directly solved by the measurements as it
is specified in 4.2.4/E.502, and no further computations are needed.
6.2 Determination of origin-destination traffic offered when origin-destination traffic measure-
ments only on a sampling basis are available
These measurements should be supported by consistent measurements on the traffic volume (erlang) on the totality of
outgoing traffic. More precisely, if the set of origin-destination measurements, as specified in 4.2.4/E.502, type 15:
traffic dispersion, is a sampling of the total traffic outgoing the exchange, the relevant measurements on traffic volume
should be the overall measurements on originating outgoing traffic and on transit traffic (type 3 and type 6 respectively
of Recommendation E.502). If the traffic dispersion is performed on a specific circuit group, of course the relevant
measurement on traffic volume should be performed on the same circuit group (measurement type 10). The
determination of the traffic offered from measurements of the carried traffic should be achieved by using the procedure
described in clause 4.
6.3 Determination of origin-destination traffic offered when only circuit-group based measure-
ments of traffic intensity are available
This subclause refers to the switches which do not perform any origin-destination measurements but only circuit group
based traffic intensity measurements. The following method [1] can be applied to hierarchical and non-hierarchical
networks whose routing scheme can be either fixed or updated periodically with period dT, provided that the updated
interval dT is long enough to guarantee the stationary traffic conditions.
These three assumptions are made:
i) on each link, calls from different traffic relations see the same blocking which is the given measured circuit group
blocking;
ii) the event that a call will be blocked on a path link is independent of the event that it will be blocked on the other
links;
iii) a path is composed by at least two links.
Simulation studies have shown that these assumptions produce estimates of traffic offered for individual origin-
destination pairs that are within 6% to 7% of actual values when the network congestion values are as low as the ones
assumed in the network dimensioning.
The following information is supposed to be available at each time interval:
i) the circuit group measurements which include the carried load and blocking on each circuit group TG;
ii) the (fixed) routing sequence during the dT period.
11. Recommendation E.501 (05/97) 5
Under the above assumptions, it can be shown that the following equation holds:
TG Z a= ⋅ (6-1)
where TG is a vector whose elements are the carried traffic of each circuit group, a is a vector whose elements are the
origin-destination traffic offered, and Z is a matrix whose elements are defined by the blocking on each circuit group and
the routing sequence. The equation 6-1 is formally valid even if the above assumptions i) and iii) are not made.
The origin-destination traffic offered, a, is obtained by solving equation 6-1. Generally the solution can be derived by
the classical mathematical methods, as the one described in Annex C. Nevertheless, when the node number is high, the
solution of the equation system can be complex and methods of unknown variable reduction become essential. The
suggestion of some of these methods is for further studies. Examples of the application of pseudo-inverse method are
reported in Annex D. A sample performance evaluation of both the pseudo-inverse and the iterative algorithm is
provided in Annex E.
The notations, as well as the derivation and solution of equation 6-1 are described in Annex C when two link paths are
adopted. The extension to paths with more than two links is for further study.
7 History
This Recommendation was first published in 1984. It was revised in 1992 and 1997.
8 Bibliography
[1] TU (M.): Estimation of Point-to-Point Traffic Demand in the Public Switched Telephone Network, IEEE
Transactions on Communications, Vol. 42, Nos. 2/3/4, pp. 840-845, February/March/April 1994.
Annex A
A simplified model for the formula presented in 4.2
The call attempts arriving at the considered circuit group may be classified as shown in Figure A.1.
The total call attempt rate at the circuit group is:
N N + N + NNR LR= 0 (A-1)
We must consider N0 + NNR which would be the call attempt rate if there were no congestion on the circuit group.
Let:
B =
N
N
L
measured blocking probability on the circuit group; (A-2)
W =
N
N
LR
L
proportion of blocked call attempts that re-attempt. (A-3)
12. 6 Recommendation E.501 (05/97)
T0203470-92/d01
.0 ..2
.,2
.#
.,2
..2
..
.,
Rest of network
and called subscriber
First
attempts
Carried
Lost
Repeated
Effective
Not
effective
Repeated
Abandoned
Abandoned
Considered
circuit group
.0 First attempt calls
.# Carried calls
., Lost calls
.,2 Lost calls repeated
.. Non-effective calls
..2 Non-effective calls repeated
Figure A.1/E.501
FIGURE A.1/E.501...[D01] = 11.5 CM
We have:
N N N N N N
N
N
N
N N
N N
N
BW
B
NR LR LR
C
C
C
LR
L
C0
1
1
+ = − = − =
−
−
=
−
−
( )
(
( )
( )
( )
)
(A-4)
The above model is actually a simplification since the rate NNR would be changed by augmentation of the circuit group.
Multiplying by the mean holding time of calls carried on the circuit group, h, gives:
A A
WB
B
C=
(1 – )
( – )1 (A-5)
where AC is the traffic carried on the circuit group.
The above model is actually a simplification since the rate NNR would be changed by augmentation of the circuit group.
An alternative procedure is to estimate an equivalent persistence W from the following formulae:
W
r H
– H – r
=
′
′1 (1 ) (A-6)
13. Recommendation E.501 (05/97) 7
H
–
– r
=
β
β
1
(1 ) (A-7)
β =
All call attempts
First call attempts (A-8)
where r′ is the completion ratio for seizures on the considered circuit group and r is the completion ratio for call attempts
to the considered circuit group.
These relationships may be derived by considering the situation after augmentation (see Figure A.2).
T0203480-92/d02
.0
. #
. .2
. .
Considered
circuit group
Rest of network
and called subscriber
First
attempts
Carried
Effective
Not
effective
Repeated
Abandoned
Figure A.2/E.501
FIGURE A.2/E.501...[D02] = 9 CM
It is required to estimate N′,C, the calls to be carried when there is no congestion on the circuit group. This may be done
by establishing relationships between NC and N0 (before augmentation) and between N′,C, and N0 (after augmentation),
since the first attempt rate N0 is assumed to be unchanged. We introduce the following parameters:
• H is the overall subscriber persistence;
• r′ is the completion ratio for seizures on the circuit group.
Before augmentation:
H
N N
N N
NR NL
N L
=
+
+ (A-9)
′ =r
N – N
N
C N
C (A-10)
14. 8 Recommendation E.501 (05/97)
After augmentation:
H
N
N
NR
N
=
′
′ (A-11)
′ =
′ ′
′
r
N – N
N
C
C
N
(A-12)
It is assumed for simplicity that H and r′ are unchanged by the augmentation. The following two relationships may be
readily derived:
N
N – H – r – r BH
– B
C
0 =
′ ′[1 (1 ) ]
1 (A-13)
N N – H – rC0 = ′ ′[1 (1 )] (A-14)
Hence:
′ =
−
′
− − ′
−
N
N
r H
H r
B
B
C
C 1
1 1
1
( )
(A-15)
On multiplying by the mean call holding time, h, this provides our estimate of traffic offered in terms of traffic carried.
The relationship:
H
–
– r
=
β
β
1
)(1 (A-16)
is valid both before and after augmentation, as may easily be derived from the above diagrams.
NOTE 1 – Some Administrations may be able to provide information on the call completion ratio to the considered destination.
NOTE 2 – The procedure of estimating the factor W above is based on the assumptions that H, r′ and h remain unchanged after
augmentation. The elimination of congestion in the group considered, leads to a change in H and in practical cases, this causes an
underestimation of the factor W and consequently an overestimation of offered traffic in the formula of 4.2. A relevant study in the
period 1985-1988 has shown that the overestimation is practically negligible if B ≤ 0.2 and r′ ≥ 0.6. For larger B and smaller r′ values,
the overestimation may be significant unless other factors, not having been taken into account by the study, do not counteract.
Therefore, caution is required in using Table A.1 in the indicated range. In the case of dynamically developing networks, the
overestimation of offered traffic and relevant overprovisioning may be tolerated, but this may not be.
16. 10 Recommendation E.501 (05/97)
Annex B
Equivalent traffic offered
In the lost call model the equivalent traffic offered corresponds to the traffic which produces the observed carried traffic
in accordance with the relation:
y A B= (1 )– (B-1)
where:
y: is the carried traffic;
A: is the equivalent traffic offered;
B: is the call congestion through the part of the network considered.
NOTE 1 – This is a purely mathematical concept. Physically, it is only possible to detect bids whose effect on occupancies tells
whether these attempts give rise to very brief seizures or to calls.
NOTE 2 – The equivalent traffic offered, which is greater than the traffic carried and therefore, greater than the effective traffic, is
greater than the traffic offered when the subscriber is very persistent.
NOTE 3 – B is evaluated on a purely mathematical basis so that it is possible to establish a direct relationship between the traffic
carried and call congestion B and to dispense with the role of the equivalent traffic offered A.
Annex C
Methods for determination of origin-destination traffic offered when only the
measurements of traffic intensity on circuit group basis are available
C.1 Notation, derivation, and solution of Formula 6-1 in 6.3
The following notations are adopted:
L: the number of links;
P: the number of traffic relations;
a(i): the offered traffic for traffic relation i;
Path ij: denote the j-th path for traffic relation i;
OL(ij): the traffic relation i offered to path ij;
PB(ij): the path blocking of path ij;
CL(ij): the traffic intensity of relation i carried on path ij;
CL ij OL ij PB ij( ) = ( ) [1 – ( )]⋅ (C-1)
Path link ijk: denotes the k-th circuit group of Path ij:
– k = 1 or 2 since only 1-link and 2-link paths are considered (the extension to n-link path is straightforward);
– each path link ijk corresponds to a unique circuit group q (q = 1, 2, ..., L), but each circuit group q may correspond
to a number of path links ijk. This relationship is denoted by a mapping X, i.e.:
X(ijk) = q (C-2)
The term q either denotes a circuit group or is equal to zero so that:
– if X(ij1) = 0, it means that traffic relation i has at most j – 1 paths;
– if X(ij2) = 0 and X(ij1) ≠ 0, it means that j-th path for traffic relation i is a 1-link path;
17. Recommendation E.501 (05/97) 11
LB(ijk): the link blocking of link ijk;
TG(q): the total traffic carried on circuit group q.
Because of the assumptions on the independence of the call blocking on each link of a path, the path blocking is a simple
function of its circuit group blockings:
PB ij LB ij LB ij LB ij LB ij( ) = ( 1) + ( 2) – ( 1) ( 2)⋅ (C-3)
When there is the crankback capability, the following equation can be derived:
OL ij a i PB it
t
j
( ) ( ) ( )= ⋅
=
−
∏
1
1
(C-4)
Therefore, from formulae C-1 and C-4:
CL ij a i PB ij PB it s ij a i
t
j
( ) ( ) [ ( )] ( ) ( ) ( )= ⋅ − ⋅ = ⋅
=
−
∏1
1
1
(C-5)
where:
s ij PB ij PB it
t
j
( ) [ ( )] ( )= − ⋅
=
−
∏1
1
1
(C-6)
Then the total carried traffic on each circuit group q is:
TG q CL ij s ij a i
X ijk q X ijk q
( ) ( ) ( ) ( )
( ) ( )
= = ⋅
= =
∑ ∑
(C-7)
When there is no crankback capability, a call will be routed in the next path in the routing sequence only if it is blocked
on the first link of path ij. The call will be abandoned if it is blocked on the second link. In this case the formula C-4
must be rewritten in the following way:
OL ij a i LB it
t
j
( ) ( ) ( )= ⋅
=
−
∏ 1
1
1
(C-8)
From formulae C-1 and C-8:
CL ij a i PB ij LB it
t
j
( ) ( ) [ ( )] ( )= ⋅ − ⋅
=
−
∏1 1
1
1
(C-9)
and assuming in this case (no crankback capability):
s ij PB ij LB it
t
j
( ) [ ( )] ( )= − ⋅
=
−
∏1 1
1
1
(C-10)
the final equation can be written as in C-7.
The offered traffic for each relation can be derived from the set of formula C-7, in which the definition of s(ij) is
depending on the presence of crankback capability on the network.
18. 12 Recommendation E.501 (05/97)
Pseudo-inverse and various iterative methods can be applied to solve the equation system C-7, that can be written in the
following matrix form:
TG Z a= ⋅ (C-11)
where:
TG TG TG L
a a a P
Z z uv
T
T
L P
= [ (1) , . . ., ( )]
= [ (1) , . . . , ( )]
= [ ( )] × (C-12)
where z(uv)=s(vr) if circuit group u is a circuit group of the r-th path of relation v; otherwise is equal to zero.
At present, two methods here have been proposed to solve the system C-11: the pseudo-inverse and an iterative
algorithm.
C.2 The pseudo-inverse
If the pseudo-inverse method is used, the solution of the system C-11 is:
a Zo o
= ⋅ TG (C-13)
where ao is the estimated offered traffic relation and Zo is the pseudo-inverse of Z (C-1).
If the system is square, namely the number of equations is equal to the number of unknowns and therefore, the network
is fully meshed, the solution is univocally determined, in fact:
Z Z –o
= 1
(C-14)
where Z–1 is the inverse matrix (if existing) of Z.
For non-fully connected networks, namely the number of equations is less than the number of unknowns, the equation
system does not have a unique solution, therefore the offered traffic for each relation must be estimated, introducing in
this way an error that is greater as the number of circuit groups decreases. In this case:
Z = Z Z ZT T –o
( )⋅ ⋅ 1
(C-15)
where ZT is the transpose matrix of Z.
Finally, there can also be the case in which the number of equations is greater than the number of unknowns
(overdetermined systems). This can happen, for example, when other network measurements, such as the office totals,
are added. In this case:
Z Z Z ZT – To
( )= ⋅ ⋅1
(C-16)
In any case, ao is the optimal estimate of a, in the least-square sense, based on the available measurements.
C.3 The iterative algorithm
In the iterative method a(0), an initial estimate of a , is first given. Then, from the current estimate a(k) at the k-th step, a
new estimate a(k+1) is generated as follows:
a a w vk k k k( ) ( ) ( ) ( )+
= + ⋅1
(C-17)
19. Recommendation E.501 (05/97) 13
In this equation the scalar quantity w(k) and the generic r-th component of the vector v(k) are obtained by properly
weighting the error ∆TG(k) = Z É a (k) – TG, according to the following expressions (C-2):
v a
TG
TG
z r Pr
k
r
k i
k
ii
L
i r
( ) ( )
( )
, , ,...,= =
=
∑
∆
1
1 2
(C-18)
( )
( )
w
TG Z v
v Z Z v
k
k T k
k T T k
( )
( ) ( )
( ) ( )
=
⋅
⋅
∆
(C-19)
These equations are derived so as to minimize the distance between ∆TG and the update w v⋅ at each iteration. This
process terminates when the relative variation of the estimate
a a
a
k k
k
( 1) ( )
( )
+
−
(C-20)
is less than a preset limit (e.g. 10–3
).
The accuracy and/or the speed of the method may depend on the closeness of the initial estimate a(0) to the true value
of a.
A convenient expression for the initial estimate of the origin-destination traffic can be reached through the following
steps:
1) Estimation of the probability PR|T (r|k) that the traffic carried on the circuit group k belongs to the origin-destination
relation r through the equation:
P r k
z
z
R T
k r
k ii
|
,
,
( | ) =
∑ (C-21)
where zk,r is the element in the k-th row and r-th column of z;
2) Estimation of the origin-destination traffic carried on each path, made up of one or more circuit groups, through the
equation:
[ ]a P r k TGr q
k
R T i k
i
i,
*
|min ( | )=
(C-22)
where the subscript i covers all the circuit groups of the path q;
3) Estimation of the total traffic carried on the circuit group k as the sum of the estimates for the traffic due to all the
relations using that circuit group through the equation:
TG ak
est
r qr q
= ∑ ,
*
,
(C-23)
4) Normalization of the estimate obtained at step 2):
a a
TG
TG
r q r q
k
k
est,
**
,
*
= 1
1 (C-24)
20. 14 Recommendation E.501 (05/97)
5) Estimation of the offered origin-destination traffic by using the estimated origin-destination traffic carried on each
path and the estimated loss for each origin-destination pair:
a
a
PB
r
r q
q
r
( )
,
**
0
1
=
−
∑
(C-25)
where loss PBr for the relation r is estimated from the measured losses on the circuit groups by assuming that each
relation using the same circuit group undergoes the same loss.
NOTE 1 – Different traffic relations do not see the same blocking on a circuit group, especially if circuit reservation is used. The
proposed method can make use of the traffic relation blocking probabilities. In both cases, LB(ijk) should be interpreted as the circuit
group blocking seen by the traffic relation i on the circuit group ijk. The derived equations remain unchanged. The evaluation of the
relation blocking by analytical models is for further study.
NOTE 2 – In the case of large networks the solution of the system of linear equations C-11 may be affected by computational
problems (e.g. instability). In addition, the convergence of the iterative algorithms is not proven in a rigorous mathematical way, but it
has been obtained in the examined practical cases. A reduction of the system’s dimensions to reduce the computational load is highly
desirable. The specific method for reducing the computational load is for further study.
Bibliography
– ALBERT (A.): Regression and the Moore-Penrose Pseudoinverse, Academic Press, New York, 1972.
– KIM (N.): A point-to-point traffic estimation from circuit group and office measurement for large network, 13th
International Teletraffic Congress, pp. 465-469, Copenhagen, 19-26 June 1991.
Annex D
Examples of application of the methods described in Annex C
D.1 Example 1
Consider the following 3-node network (see Figures D.1 and D.2):
A
B C
Q2
Q1
T0206910-97/d03
Q3
Q4
Figure D.1/E.501 – The one-way circuit group case
FIGURE D.1/E.501...[D03] = 4.5 CM
21. Recommendation E.501 (05/97) 15
A
B C
Q2
Q1
T0206920-97/d04
Figure D.2/E.501 – The two-way circuit group case
FIGURE D.2/E.501...[D04] = 4.5 CM
The origin-destination pairs and their paths are given in the following tables:
For the one-way case
For the two-way case
Based on the routing table, the mapping X(ijk) = q can be expressed as follows:
For the one-way case
For the two-way case
The Z matrix is:
Z
s s
s s
s s
s s
=
( ) ( )
( ) ( )
( ) ( )
( ) (51)
11 0 0 0 0 61
0 21 0 0 0 61
0 0 31 41 0 0
0 0 31 0 0
for the one-way case;
Z
s
s
s
s
s
s
s
s
=
( )
( )
( )
( )
( )
(51)
( )
( )
11
0
0
21
31
31
41
0
0 61
61
for the two-way case.
Origin-destination (A, B) (B, C) (C, A) (B, A) (C, B) (A, C)
i 1 2 3 4 5 6
Path q1 q2 q4, q3 q3 q4 q1, q2
Origin-destination (A, B) (B, C) (C, A) (B, A) (C, B) (A, C)
i 1 2 3 4 5 6
Path q1 q2 q2, q1 q1 q2 q1, q2
ijk q ijk q ijk q ijk q ijk q ijk q
111 1 211 2 311 4 411 3 511 4 611 1
112 0 212 0 312 3 412 0 512 0 612 2
ijk q ijk q ijk q ijk q ijk q ijk q
111 1 211 2 311 2 411 1 511 2 611 1
112 0 212 0 312 1 412 0 512 0 612 2
22. 16 Recommendation E.501 (05/97)
Let us assume that also for the two-way circuit groups all the links have the same blocking value of 0.1, then we obtain
the values for s(ij): s(i1) = 0.9 for i = 1, 2, 4 and 5, and s(i1) = 0.81 for i = 3 and 6.
Thus we have:
TG
TG
( )
( )
. .
. .
1
2
09 0 081
0 0 9 081
=
a a
a a
a a
( ) ( )
( ) (5)
( ) ( )
1 4
2
3 6
+
+
+
.
Assuming TG(1) = 5 E, and TG(2) = 7 E, we obtain:
a a
a a
a a
(1) + (4)
(2) + (5)
(3) + (6)
=
1.43 E
3.65 E
4.58 E
.
That is, the two-way offered traffic between the endpoints A and B is 1.43 E, between the endpoints B and C is 3.65 E,
and between the endpoints A and C is 4.58 E.
For the one-way circuit group case we obtain the values for s(i1): s(i1) = 0.9 for i = 1,2,4 and 5, and s(i1) = 0.81 for
i = 3 and 6. Then we have:
TG
TG
TG
TG
a
a
a
a
a
a
( )
( )
( )
( )
. . . . . .
. . . . . .
. . . . . .
. . . . . .
( )
( )
( )
( )
(5)
( )
1
2
3
4
0 90 0 00 0 00 0 00 0 00 081
0 00 0 90 0 00 0 00 0 00 081
0 00 0 00 081 0 90 0 00 0 00
0 00 0 00 081 0 00 0 90 0 00
1
2
3
4
6
=
.
Assuming:
TG =
2 5
35
2 5
35
.
.
.
.
,
By the application of the pseudo-inverse we obtain:
a
a
a
a
a
a
( )
( )
( )
( )
(5)
( )
.
.
.
.
.
.
1
2
3
4
6
0 716709
182782
2 29008
0 716709
182782
2 29008
=
.
D.2 Example 2
Consider the following network (see Figures D.3 and D.4):
23. Recommendation E.501 (05/97) 17
A
B C
Q2
Q1
T0206930-97/d05
Q4
Q5
Q3
Q6
Figure D.3/E.501 – The one-way circuit group case
FIGURE D.3/e.501...[D05] = 4.5 CM
A
B C
Q2
Q1
T0206940-97/d06
Q3
Figure D.4/E.501 – The two-way circuit group case
FIGURE D.4/E.501...[D06] = 5 CM
The origin-destination nodes and their routing sequences are given in the following tables.
For the one-way case
For the two-way case
Based on the routing table, the mapping X(ijk) = q can be expressed as follows:
For the one-way case
Origin-destination nodes (A, B) (B, C) (C, A) (B, A) (C, B) (A, C)
i 1 2 3 4 5 6
1st choice path q1 q2 q3 q4 q5 q6
2nd choice path q6, q5 q4, q6 q5, q4 q2, q3 q3, q1 q1, q2
Origin-destination nodes (A, B) (B, C) (C, A) (B, A) (C, B) (A, C)
i 1 2 3 4 5 6
1st choice path q1 q2 q3 q1 q2 q3
2nd choice path q3, q2 q1, q3 q2, q1 q2, q3 q3, q1 q1, q2
ijk q ijk q ijk q ijk q ijk q ijk q
111 1 211 2 311 3 411 4 511 5 611 6
112 0 212 0 312 0 412 0 512 0 612 0
121 6 221 4 321 5 421 2 521 3 621 1
122 5 222 6 322 4 422 3 522 1 622 2
24. 18 Recommendation E.501 (05/97)
For the two-way case
The matrix Z is:
Z
s s s
s s s
s s s
s s s
s s s
s s s
=
( ) (52) ( )
( ) ( ) ( )
( ) ( ) (52)
( ) ( ) ( )
( ) ( ) (51)
( ) ( ) ( )
11 0 0 0 62
0 21 0 42 0 62
0 0 31 42 0
0 22 32 41 0 0
12 0 32 0 0
12 22 0 0 0 61
for the one-way case;
Z
s s s s s s
s s s s s s
s s s s s s
=
( ) ( ) ( ) ( ) (52) ( )
( ) ( ) ( ) ( ) (51) ( )
( ) ( ) ( ) ( ) (52) ( )
11 22 32 41 62
12 21 32 42 62
12 22 31 42 62
for the two-way case.
Let us assume also that for the two-way circuit groups all the links have the same blocking value of 0.1. Then, we obtain
the following values for s(ij) for both with and without crankback: s(i1) = 0.9 and s(i2) = 0.081.
Thus we have:
TG
TG
TG
( )
( )
( )
. . .
. . .
. . .
1
2
3
0 981 0 081 0 081
0 081 0 981 0 081
0 081 0 081 0 981
=
a a
a a
a a
( ) ( )
( ) ( )
( ) ( )
1 4
2 5
3 6
+
+
+
.
Assuming TG(1) = 5 E, TG(2) = 7 E, and TG(3) = 10 E, we obtain:
a a
a a
a a
(1) + (4)
(2) + (5)
(3) + (6)
=
3.82 E
6.05 E
9.38 E
.
That is, the two-way offered traffic between the endpoints A and B is 3.82 E, between the endpoints B and C is 6.05 E,
and between the endpoints A and C is 9.38 E.
For the one-way circuit group case we obtain the values for s(ij): s(i1) = 0.9 and s(i2) = 0.081 for i = 1, ...6. Then we
have:
TG
TG
TG
TG
TG
TG
( )
( )
( )
( )
(5)
( )
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . .
1
2
3
4
6
0 900 0 000 0 000 0 000 0 081 0 081
0 000 0 900 0 000 0 081 0 000 0 081
0 000 0 000 0 900 0 081 0 081 0 000
0 000 0 081 0 081 0 900 0 000 0 000
0 081 0 000 0 081 0 000 0 900 0 000
0 081 0 081 0 000 0 000 0
=
000 0 900
1
2
3
4
6.
( )
( )
( )
( )
(5)
( )
a
a
a
a
a
a
.
ijk q ijk q ijk q ijk q ijk q ijk q
111 1 211 2 311 3 411 1 511 2 611 3
112 0 212 0 312 0 412 0 512 0 612 0
121 3 221 1 321 2 421 2 521 3 621 1
122 2 222 3 322 1 422 3 522 1 622 2
25. Recommendation E.501 (05/97) 19
Assuming:
TG =
2 5
35
50
2 5
35
50
.
.
.
.
.
.
,
by the application of the pseudo-inverse we obtain:
a
a
a
a
a
a
( )
( )
( )
( )
(5)
( )
.
.
.
.
.
.
1
2
3
4
6
2 0281
32491
508061
2 0281
32491
508061
=
.
Annex E
A sample performance evaluation of the pseudo-inverse and of the iterative algorithm
In order to evaluate both methods a medium-sized network, made up of 15 nodes and shown in Figure E.1, has been
considered. The network is connected in a partially meshed fashion with a 65% connectivity.
The routing plan is fixed allowing for no more than 3 paths, composed of one or two links, for each origin-destination
couples.
For this network two basic sets of origin/destination traffic values have been considered, obtained by scaling the real
ones in such a way to produce an average grade of service equal to 2.5% and 7.1% respectively. Each basic set has then
being randomly perturbed (within a ± 10% range), in order to obtain 2 groups of 100 sets.
Each set has been input to a network analysis tool, which has supplied us with the values of the traffic carried on the
circuit groups and the associated losses. After forming the system of equations C-11 for each set of origin-destination
traffic values, both methods (the pseudo-inverse and the iterative algorithm) have been applied, leading to 2 groups of
100 sets of estimated origin-destination traffic values for each method. The starting point for the iterative algorithm has
been set to 1 erlang for all origin-destination couples.
26. 20 Recommendation E.501 (05/97)
To evaluate the performance of both methods two indicators have been used: the Norm-2 and the Norm-infinity relative
errors, respectively defined as:
e
a a
a
a a
a
s
s h h
h
h
h
2
2
2
2
2
= =
∑
∑
–
( – ),
, (E-1)
e Max
a a
a
h
s h h
h
∞
= , –
. (E-2)
where a is the true vector and as is the estimated vector (either via the pseudo-inverse or through the iterative algorithm).
The mean value and the standard deviation of the two indicators are reported in Tables E.1 and E.2.
Table E.1/E.501 – Norm-2 error (Average ± standard deviation)
Table E.2/E.501 – Norm-infinity error (Average ± standard deviation)
Though the Norm-infinity error is very large in both methods, it refers generally to light traffic relations.
The average number of iteration needed to reach the solution was 17.8 for the 2.5% loss and 20.2 for the 7.1% loss (the
algorithm was stopped when the relative variation introduced by a new iteration was less than 10–4).
As can be seen, both methods lead to acceptable results.
Case A
(Avg. Loss ≅ 2.5%)
Case B
(Avg. Loss ≅ 7.1%)
Pseudo-inverse 9.28 ± 0.26 % 9.49 ± 0.28 %
Iterative Flat initialization 8.33 ± 0.26 % 8.95 ± 0.30 %
algorithm Annex E
initialization
5.84 ± 0.12 % 6.57 ± 0.27 %
Case A
(Avg. Loss ≅ 2.5%)
Case B
(Avg. Loss ≅ 7.1%)
Pseudo-inverse 212 ± 15 % 237 ± 14 %
Iterative Flat initialization 268 ± 22 % 282 ± 21 %
algorithm Annex E
initialization
140 ± 10 % 142 ± 11 %
29. ITU-T RECOMMENDATIONS SERIES
Series A Organization of the work of the ITU-T
Series B Means of expression: definitions, symbols, classification
Series C General telecommunication statistics
Series D General tariff principles
Series E Overall network operation, telephone service, service operation and human
factors
Series F Non-telephone telecommunication services
Series G Transmission systems and media, digital systems and networks
Series H Audiovisual and multimedia systems
Series I Integrated services digital network
Series J Transmission of television, sound programme and other multimedia signals
Series K Protection against interference
Series L Construction, installation and protection of cables and other elements of outside
plant
Series M TMN and network maintenance: international transmission systems, telephone
circuits, telegraphy, facsimile and leased circuits
Series N Maintenance: international sound programme and television transmission circuits
Series O Specifications of measuring equipment
Series P Telephone transmission quality, telephone installations, local line networks
Series Q Switching and signalling
Series R Telegraph transmission
Series S Telegraph services terminal equipment
Series T Terminals for telematic services
Series U Telegraph switching
Series V Data communication over the telephone network
Series X Data networks and open system communication
Series Z Programming languages