SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
1
The main area where we have supplied data is around international voice calling. This
service carries voice calls, from both landline and mobile phones, as well as IP telephony
services such as Vonage, Skype or a cable company calling package, between countries.
In this case, the network from which the call is coming is the customer – they pay us –
while the network where the call is going is the supplier – we pay them to complete the call
to the dialed number.
While in most cases the caller is on the customer network and the called party is on our
supplier network, this is not always true. There can be intermediary providers that might
aggregate calls from small regional players, for example, or other wholesale providers that
might be sending traffic to our network where we are the supplier. Similarly, suppliers may
not always be the network that the called party gets service from.
2
Some of the terms that will help you understand the international voice data set include
CDR, or the total record of one voice call, and the release code, which designates how a call
ended – no answer, bad number, lost connection, hang up, etc. Average call duration and
Answer Seizure ratio are both used to measure quality – a good connection with no static
or noise results in longer calls, while answer seizure ratio refers to the number of calls that
are answered versus the number of calls that don’t complete (i.e. are seized).
3
The magenta boxes show where in the call process the various data points come from:
Calligno= calling number
Cust_orgno = customer ID number
Servabbr = the service level we use to terminate the call, or take it to its destination via our
network of suppliers
Supp_orgno = the supplier id number
Pricingdestid = the ID of the pricing for the call
Routingdestcd = tells us where the call is going
Calldno = the called number
Calling and called numbers have been scrambled to preserve customer anonymity, so
please don’t try calling them! We have however preserved correlations, so a number is
always scrambled the same way each time it appears.
4
Our mobile signalling service is used to keep track of mobile user activity while they are
roaming. This allows the home network to bill the user appropriately, and pay the visited
network for the activity that takes place on their network.
Along with the data set is a detailed word document that describes the signalling messages
that pass across our network. Signalling messages can go both directions between the
home and visited network – in our data set they are described by the origination and
destination of the individual message, and not necessarily consistently in reference to the
subscriber.
5
IP transit is a service that carries information between networks connected to the Internet.
Typically, end users request information from content or application providers – companies
such as social networks, search engines, news or video sites, or any of the hundreds of
other websites you might visit every day. User networks, such as ISPs, mobile broadband
providers, or large enterprises, connect to our Tier 1 IP backbone as customers to reach the
other networks and content sources that make up the Internet, while content providers
connect to our network to reach the end users (known in the industry as “eyeballs”) that
consume their services.
A customer may take a circuit of any number of types, from a local loop from a regional
provider to a piece of fibre in a data center, to connect to via a dedicated port to one of our
routers at any of our Points of Presence, or physical places where we have located network
equipment.
6
These are some of the common terms to use to understand IP transit.
Data is sent across the Internet in units called packets, which are formatted pieces of data
that carry their origination and destination information, as well as a data packet.
Latency, jitter and packet loss are the standard measures of network quality. Latency is the
amount of time it takes the packet to pass through the various routers and fibre optic or
copper wires between its origination and destination. Latency is typically measured in
milliseconds – the latency between the East and West Coasts of the United States is
somewhere around 75 milliseconds.
Jitter is the variation in latency for packets – this is important because high variation can
result in packets arriving out of order, which affects the quality of applications such as voice
calls or streaming video.
Finally, packet loss refers to packets that are lost due to being dropped from the router
buffer when the network is overloaded.
7
There are three data sets that reference IP transit. The first focuses on the route that the
packet takes from the customer to our network. Remember that customers can be both
content and eyeball networks. Each magenta box shows where in the process each data
point references.
8
The second data set focuses on the connection between our network and the customer.
Speed refers to the amount of data flowing across that connection, while minimum
commitment references the minimum capacity that we’ve promised to provide to that
customer.
9
The third set of data focuses on what happens to packets as they cross our network,
measuring latency, jitter and packet loss as they move between two endpoints on our
network.
10
11

Más contenido relacionado

La actualidad más candente

Online Selling Business
Online Selling BusinessOnline Selling Business
Online Selling Businessfaisal ilyas
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)Frank Fang Kuo Yu
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Gaurav Chordia
 
Things to Ask an Internet Service Provider Before Taking Their Services
Things to Ask an Internet Service Provider Before Taking Their ServicesThings to Ask an Internet Service Provider Before Taking Their Services
Things to Ask an Internet Service Provider Before Taking Their Servicesnextraworld
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2MDHASNAIN23
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation tofael1
 
VoIP Literature review
VoIP Literature review VoIP Literature review
VoIP Literature review jodoh247
 
Week12presen
Week12presenWeek12presen
Week12presenbackxile
 
SIP Trunking White Paper
SIP Trunking White PaperSIP Trunking White Paper
SIP Trunking White PaperLeanne Bird
 
Isp final presentation
Isp final presentationIsp final presentation
Isp final presentationJAI BAMORIYA
 
Technologically Abbreviated
Technologically AbbreviatedTechnologically Abbreviated
Technologically AbbreviatedAmal Biswas
 

La actualidad más candente (19)

Online Selling Business
Online Selling BusinessOnline Selling Business
Online Selling Business
 
Research paper on VOIP Technology
Research paper on VOIP TechnologyResearch paper on VOIP Technology
Research paper on VOIP Technology
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Communications from A to Z
Communications from A to ZCommunications from A to Z
Communications from A to Z
 
Things to Ask an Internet Service Provider Before Taking Their Services
Things to Ask an Internet Service Provider Before Taking Their ServicesThings to Ask an Internet Service Provider Before Taking Their Services
Things to Ask an Internet Service Provider Before Taking Their Services
 
Computer network lab note 2
Computer network lab note 2Computer network lab note 2
Computer network lab note 2
 
Isp
IspIsp
Isp
 
Isp
IspIsp
Isp
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation
 
VoIP Literature review
VoIP Literature review VoIP Literature review
VoIP Literature review
 
Week12presen
Week12presenWeek12presen
Week12presen
 
Lasseq f can
Lasseq f canLasseq f can
Lasseq f can
 
SIP Trunking White Paper
SIP Trunking White PaperSIP Trunking White Paper
SIP Trunking White Paper
 
Isp final presentation
Isp final presentationIsp final presentation
Isp final presentation
 
Isp
IspIsp
Isp
 
Voip Ppt
Voip PptVoip Ppt
Voip Ppt
 
Networks
Networks Networks
Networks
 
Technologically Abbreviated
Technologically AbbreviatedTechnologically Abbreviated
Technologically Abbreviated
 

Destacado

Webinar UI/UX by Francesco Marcellino
Webinar UI/UX by Francesco MarcellinoWebinar UI/UX by Francesco Marcellino
Webinar UI/UX by Francesco MarcellinoBeMyApp
 
SALESmanago: Buyer Persona in Marketing Automation
SALESmanago: Buyer Persona in Marketing AutomationSALESmanago: Buyer Persona in Marketing Automation
SALESmanago: Buyer Persona in Marketing Automationsalesmanago
 
How to build a persona - Introduction of the 7C model
How to build a persona - Introduction of the 7C modelHow to build a persona - Introduction of the 7C model
How to build a persona - Introduction of the 7C modelRalph Poldervaart
 
UX - How I created personas from just five interview questions
UX - How I created personas from just five interview questionsUX - How I created personas from just five interview questions
UX - How I created personas from just five interview questionsvinnyflab
 
Design Thinking With Persona
Design Thinking With PersonaDesign Thinking With Persona
Design Thinking With PersonaFranki Chamaki
 

Destacado (7)

Webinar UI/UX by Francesco Marcellino
Webinar UI/UX by Francesco MarcellinoWebinar UI/UX by Francesco Marcellino
Webinar UI/UX by Francesco Marcellino
 
UX 101: Personas
UX 101: PersonasUX 101: Personas
UX 101: Personas
 
SALESmanago: Buyer Persona in Marketing Automation
SALESmanago: Buyer Persona in Marketing AutomationSALESmanago: Buyer Persona in Marketing Automation
SALESmanago: Buyer Persona in Marketing Automation
 
Persona examples
Persona examplesPersona examples
Persona examples
 
How to build a persona - Introduction of the 7C model
How to build a persona - Introduction of the 7C modelHow to build a persona - Introduction of the 7C model
How to build a persona - Introduction of the 7C model
 
UX - How I created personas from just five interview questions
UX - How I created personas from just five interview questionsUX - How I created personas from just five interview questions
UX - How I created personas from just five interview questions
 
Design Thinking With Persona
Design Thinking With PersonaDesign Thinking With Persona
Design Thinking With Persona
 

Similar a DataHack14, Tata communications data set explanations

MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF InfoCom
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it worksshahnaz10
 
Individual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docxIndividual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docxdirkrplav
 
Chapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docxChapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docxchristinemaritza
 
Nortel cs-1000-voip-phone-system-technical
Nortel cs-1000-voip-phone-system-technicalNortel cs-1000-voip-phone-system-technical
Nortel cs-1000-voip-phone-system-technicalSlayer King
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia
 
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...Videoguy
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)mashiur
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 

Similar a DataHack14, Tata communications data set explanations (20)

MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
 
Individual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docxIndividual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docx
 
Chapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docxChapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docx
 
Nortel cs-1000-voip-phone-system-technical
Nortel cs-1000-voip-phone-system-technicalNortel cs-1000-voip-phone-system-technical
Nortel cs-1000-voip-phone-system-technical
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
 
Report
ReportReport
Report
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, English
 
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Dial up security
Dial up securityDial up security
Dial up security
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Voip
VoipVoip
Voip
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 

Más de BeMyApp

Introduction to epid
Introduction to epidIntroduction to epid
Introduction to epidBeMyApp
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetupBeMyApp
 
Présentation des APIs cognitives IBM Watson
Présentation des APIs cognitives IBM WatsonPrésentation des APIs cognitives IBM Watson
Présentation des APIs cognitives IBM WatsonBeMyApp
 
Crédit Agricole S.A. Personae et Parcours
Crédit Agricole S.A. Personae et ParcoursCrédit Agricole S.A. Personae et Parcours
Crédit Agricole S.A. Personae et ParcoursBeMyApp
 
Cisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroBeMyApp
 
Tumeurs Neuroendocrines : une vue d'ensemble
Tumeurs Neuroendocrines : une vue d'ensembleTumeurs Neuroendocrines : une vue d'ensemble
Tumeurs Neuroendocrines : une vue d'ensembleBeMyApp
 
Building your first game in Unity 3d by Sarah Sexton
Building your first game in Unity 3d  by Sarah SextonBuilding your first game in Unity 3d  by Sarah Sexton
Building your first game in Unity 3d by Sarah SextonBeMyApp
 
Using intel's real sense to create games with natural user interfaces justi...
Using intel's real sense to create games with natural user interfaces   justi...Using intel's real sense to create games with natural user interfaces   justi...
Using intel's real sense to create games with natural user interfaces justi...BeMyApp
 
Introduction to using the R200 camera & Realsense SDK in Unity3d - Jon Collins
Introduction to using the R200 camera & Realsense SDK in Unity3d - Jon CollinsIntroduction to using the R200 camera & Realsense SDK in Unity3d - Jon Collins
Introduction to using the R200 camera & Realsense SDK in Unity3d - Jon CollinsBeMyApp
 
Audio Mixer in Unity5 - Andy Touch
Audio Mixer in Unity5 - Andy TouchAudio Mixer in Unity5 - Andy Touch
Audio Mixer in Unity5 - Andy TouchBeMyApp
 
Shaders - Claudia Doppioslash - Unity With the Best
Shaders - Claudia Doppioslash - Unity With the BestShaders - Claudia Doppioslash - Unity With the Best
Shaders - Claudia Doppioslash - Unity With the BestBeMyApp
 
[HACKATHON CISCO PARIS] Slideshow du workshop Smart City
[HACKATHON CISCO PARIS] Slideshow du workshop Smart City[HACKATHON CISCO PARIS] Slideshow du workshop Smart City
[HACKATHON CISCO PARIS] Slideshow du workshop Smart CityBeMyApp
 
Tools to Save Time
Tools to Save TimeTools to Save Time
Tools to Save TimeBeMyApp
 
[Workshop e résidents] présentation intent, craft ai, dalkia et incubateur
[Workshop e résidents] présentation intent, craft ai, dalkia et incubateur[Workshop e résidents] présentation intent, craft ai, dalkia et incubateur
[Workshop e résidents] présentation intent, craft ai, dalkia et incubateurBeMyApp
 
[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...
[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...
[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...BeMyApp
 
[IoT World Forum Webinar] Review of CMX Cisco technology
[IoT World Forum Webinar] Review of CMX Cisco technology[IoT World Forum Webinar] Review of CMX Cisco technology
[IoT World Forum Webinar] Review of CMX Cisco technologyBeMyApp
 
HP Helion Episode 6: Cloud Foundry Summit Recap
HP Helion Episode 6: Cloud Foundry Summit RecapHP Helion Episode 6: Cloud Foundry Summit Recap
HP Helion Episode 6: Cloud Foundry Summit RecapBeMyApp
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsBeMyApp
 
HP Helion Webinar #4 - Open stack the magic pill
HP Helion Webinar #4 - Open stack the magic pillHP Helion Webinar #4 - Open stack the magic pill
HP Helion Webinar #4 - Open stack the magic pillBeMyApp
 
HP Helion European Webinar Series ,Webinar #3
HP Helion European Webinar Series ,Webinar #3 HP Helion European Webinar Series ,Webinar #3
HP Helion European Webinar Series ,Webinar #3 BeMyApp
 

Más de BeMyApp (20)

Introduction to epid
Introduction to epidIntroduction to epid
Introduction to epid
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetup
 
Présentation des APIs cognitives IBM Watson
Présentation des APIs cognitives IBM WatsonPrésentation des APIs cognitives IBM Watson
Présentation des APIs cognitives IBM Watson
 
Crédit Agricole S.A. Personae et Parcours
Crédit Agricole S.A. Personae et ParcoursCrédit Agricole S.A. Personae et Parcours
Crédit Agricole S.A. Personae et Parcours
 
Cisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - Intro
 
Tumeurs Neuroendocrines : une vue d'ensemble
Tumeurs Neuroendocrines : une vue d'ensembleTumeurs Neuroendocrines : une vue d'ensemble
Tumeurs Neuroendocrines : une vue d'ensemble
 
Building your first game in Unity 3d by Sarah Sexton
Building your first game in Unity 3d  by Sarah SextonBuilding your first game in Unity 3d  by Sarah Sexton
Building your first game in Unity 3d by Sarah Sexton
 
Using intel's real sense to create games with natural user interfaces justi...
Using intel's real sense to create games with natural user interfaces   justi...Using intel's real sense to create games with natural user interfaces   justi...
Using intel's real sense to create games with natural user interfaces justi...
 
Introduction to using the R200 camera & Realsense SDK in Unity3d - Jon Collins
Introduction to using the R200 camera & Realsense SDK in Unity3d - Jon CollinsIntroduction to using the R200 camera & Realsense SDK in Unity3d - Jon Collins
Introduction to using the R200 camera & Realsense SDK in Unity3d - Jon Collins
 
Audio Mixer in Unity5 - Andy Touch
Audio Mixer in Unity5 - Andy TouchAudio Mixer in Unity5 - Andy Touch
Audio Mixer in Unity5 - Andy Touch
 
Shaders - Claudia Doppioslash - Unity With the Best
Shaders - Claudia Doppioslash - Unity With the BestShaders - Claudia Doppioslash - Unity With the Best
Shaders - Claudia Doppioslash - Unity With the Best
 
[HACKATHON CISCO PARIS] Slideshow du workshop Smart City
[HACKATHON CISCO PARIS] Slideshow du workshop Smart City[HACKATHON CISCO PARIS] Slideshow du workshop Smart City
[HACKATHON CISCO PARIS] Slideshow du workshop Smart City
 
Tools to Save Time
Tools to Save TimeTools to Save Time
Tools to Save Time
 
[Workshop e résidents] présentation intent, craft ai, dalkia et incubateur
[Workshop e résidents] présentation intent, craft ai, dalkia et incubateur[Workshop e résidents] présentation intent, craft ai, dalkia et incubateur
[Workshop e résidents] présentation intent, craft ai, dalkia et incubateur
 
[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...
[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...
[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...
 
[IoT World Forum Webinar] Review of CMX Cisco technology
[IoT World Forum Webinar] Review of CMX Cisco technology[IoT World Forum Webinar] Review of CMX Cisco technology
[IoT World Forum Webinar] Review of CMX Cisco technology
 
HP Helion Episode 6: Cloud Foundry Summit Recap
HP Helion Episode 6: Cloud Foundry Summit RecapHP Helion Episode 6: Cloud Foundry Summit Recap
HP Helion Episode 6: Cloud Foundry Summit Recap
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond Firewalls
 
HP Helion Webinar #4 - Open stack the magic pill
HP Helion Webinar #4 - Open stack the magic pillHP Helion Webinar #4 - Open stack the magic pill
HP Helion Webinar #4 - Open stack the magic pill
 
HP Helion European Webinar Series ,Webinar #3
HP Helion European Webinar Series ,Webinar #3 HP Helion European Webinar Series ,Webinar #3
HP Helion European Webinar Series ,Webinar #3
 

Último

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

DataHack14, Tata communications data set explanations

  • 1. 1
  • 2. The main area where we have supplied data is around international voice calling. This service carries voice calls, from both landline and mobile phones, as well as IP telephony services such as Vonage, Skype or a cable company calling package, between countries. In this case, the network from which the call is coming is the customer – they pay us – while the network where the call is going is the supplier – we pay them to complete the call to the dialed number. While in most cases the caller is on the customer network and the called party is on our supplier network, this is not always true. There can be intermediary providers that might aggregate calls from small regional players, for example, or other wholesale providers that might be sending traffic to our network where we are the supplier. Similarly, suppliers may not always be the network that the called party gets service from. 2
  • 3. Some of the terms that will help you understand the international voice data set include CDR, or the total record of one voice call, and the release code, which designates how a call ended – no answer, bad number, lost connection, hang up, etc. Average call duration and Answer Seizure ratio are both used to measure quality – a good connection with no static or noise results in longer calls, while answer seizure ratio refers to the number of calls that are answered versus the number of calls that don’t complete (i.e. are seized). 3
  • 4. The magenta boxes show where in the call process the various data points come from: Calligno= calling number Cust_orgno = customer ID number Servabbr = the service level we use to terminate the call, or take it to its destination via our network of suppliers Supp_orgno = the supplier id number Pricingdestid = the ID of the pricing for the call Routingdestcd = tells us where the call is going Calldno = the called number Calling and called numbers have been scrambled to preserve customer anonymity, so please don’t try calling them! We have however preserved correlations, so a number is always scrambled the same way each time it appears. 4
  • 5. Our mobile signalling service is used to keep track of mobile user activity while they are roaming. This allows the home network to bill the user appropriately, and pay the visited network for the activity that takes place on their network. Along with the data set is a detailed word document that describes the signalling messages that pass across our network. Signalling messages can go both directions between the home and visited network – in our data set they are described by the origination and destination of the individual message, and not necessarily consistently in reference to the subscriber. 5
  • 6. IP transit is a service that carries information between networks connected to the Internet. Typically, end users request information from content or application providers – companies such as social networks, search engines, news or video sites, or any of the hundreds of other websites you might visit every day. User networks, such as ISPs, mobile broadband providers, or large enterprises, connect to our Tier 1 IP backbone as customers to reach the other networks and content sources that make up the Internet, while content providers connect to our network to reach the end users (known in the industry as “eyeballs”) that consume their services. A customer may take a circuit of any number of types, from a local loop from a regional provider to a piece of fibre in a data center, to connect to via a dedicated port to one of our routers at any of our Points of Presence, or physical places where we have located network equipment. 6
  • 7. These are some of the common terms to use to understand IP transit. Data is sent across the Internet in units called packets, which are formatted pieces of data that carry their origination and destination information, as well as a data packet. Latency, jitter and packet loss are the standard measures of network quality. Latency is the amount of time it takes the packet to pass through the various routers and fibre optic or copper wires between its origination and destination. Latency is typically measured in milliseconds – the latency between the East and West Coasts of the United States is somewhere around 75 milliseconds. Jitter is the variation in latency for packets – this is important because high variation can result in packets arriving out of order, which affects the quality of applications such as voice calls or streaming video. Finally, packet loss refers to packets that are lost due to being dropped from the router buffer when the network is overloaded. 7
  • 8. There are three data sets that reference IP transit. The first focuses on the route that the packet takes from the customer to our network. Remember that customers can be both content and eyeball networks. Each magenta box shows where in the process each data point references. 8
  • 9. The second data set focuses on the connection between our network and the customer. Speed refers to the amount of data flowing across that connection, while minimum commitment references the minimum capacity that we’ve promised to provide to that customer. 9
  • 10. The third set of data focuses on what happens to packets as they cross our network, measuring latency, jitter and packet loss as they move between two endpoints on our network. 10
  • 11. 11