In MIMO systems, channel estimation is important to distinguish transmit signals from multiple transmit antennas. When MIMO systems are introduced in cellular systems, we have to measure the received power from all the connectable base station (BS), as well as to identify all the channel state information (CSI) for the combination of transmitter and receiver antenna elements. One of the most typical channel estimation schemes for MIMO in a cellular system is to employ a code division multiplexing (CDM) based scheme in which a unique spreading code is assigned to identify both BS and MS antenna elements. However, by increasing the number of transmit antenna elements, a large spreading code and pilot symbols are required to estimate an accurate CSI. To reduce this problem, in this paper, we propose a high time resolution carrier interferometry (HTRCI) for MIMO/OFDM to achieve an accurate CSI without increasing the number of pilot symbols.
{"title":"High Time Resolution Carrier Interferometry for MIMO/OFDM","authors":"C. Ahn","doi":"10.1109/CCNC08.2007.94","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.94","url":null,"abstract":"In MIMO systems, channel estimation is important to distinguish transmit signals from multiple transmit antennas. When MIMO systems are introduced in cellular systems, we have to measure the received power from all the connectable base station (BS), as well as to identify all the channel state information (CSI) for the combination of transmitter and receiver antenna elements. One of the most typical channel estimation schemes for MIMO in a cellular system is to employ a code division multiplexing (CDM) based scheme in which a unique spreading code is assigned to identify both BS and MS antenna elements. However, by increasing the number of transmit antenna elements, a large spreading code and pilot symbols are required to estimate an accurate CSI. To reduce this problem, in this paper, we propose a high time resolution carrier interferometry (HTRCI) for MIMO/OFDM to achieve an accurate CSI without increasing the number of pilot symbols.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125133668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital rights management (DRM) is widely used to protect intellectual property for content owners but consumer privacy is sacrificed. A user's playing statistics can be collected by the client DRM module and the license server. In this paper, we propose a DRM system in which the license server can generate the content decryption key for a user to play an encrypted content object without gaining any information to link to the specific content object encrypted by the content encryption key. This is achieved by applying a (partially) blind signature primitive in the license acquisition protocol and by adopting a key scheme that a content encryption key depends on the information retrieved from the content object and a secret that only the license server knows. By requesting that the client DRM module does not send any information about a user's playing statistics and all the messages the client DRM module sends out are in plain text for easy checking by a user if the client DRM module abides by this rule, consumer privacy is fully protected in our DRM system.
{"title":"A DRM System Protecting Consumer Privacy","authors":"Min Feng, Bin B. Zhu","doi":"10.1109/CCNC08.2007.244","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.244","url":null,"abstract":"Digital rights management (DRM) is widely used to protect intellectual property for content owners but consumer privacy is sacrificed. A user's playing statistics can be collected by the client DRM module and the license server. In this paper, we propose a DRM system in which the license server can generate the content decryption key for a user to play an encrypted content object without gaining any information to link to the specific content object encrypted by the content encryption key. This is achieved by applying a (partially) blind signature primitive in the license acquisition protocol and by adopting a key scheme that a content encryption key depends on the information retrieved from the content object and a secret that only the license server knows. By requesting that the client DRM module does not send any information about a user's playing statistics and all the messages the client DRM module sends out are in plain text for easy checking by a user if the client DRM module abides by this rule, consumer privacy is fully protected in our DRM system.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130896263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. V. Prasad, V. Rao, H. N. Shankar, P. Pawełczak, R. Muralishankar, I. Niemegeers
VoIP packets, when transported over the Internet, experience loss and variable delay. The effect of the network not only depends on the background flows but also on the parameters of VoIP packets itself, such as VoIP packet size and the packet generation intervals. While higher sized packets experience more losses, they experience less delay jitter and handling them is thus easy at the playout buffer. To investigate the effect of various network conditions on VoIP session holistically, we present a complete end to end study considering various states of the underlying network. We present as a case study of G.711 coded packets generated at 20 and 40 ms intervals for comparison. While packets carrying 20 ms data are better when the network is loaded, 40 ms packetization is favored when the network is not saturated. This affects the jitter and loss thus affecting the quality. We explain this trade-off using mean opinion scores.
{"title":"A Holistic Study of VoIP Session Quality - The Knobs that Control","authors":"R. V. Prasad, V. Rao, H. N. Shankar, P. Pawełczak, R. Muralishankar, I. Niemegeers","doi":"10.1109/CCNC08.2007.191","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.191","url":null,"abstract":"VoIP packets, when transported over the Internet, experience loss and variable delay. The effect of the network not only depends on the background flows but also on the parameters of VoIP packets itself, such as VoIP packet size and the packet generation intervals. While higher sized packets experience more losses, they experience less delay jitter and handling them is thus easy at the playout buffer. To investigate the effect of various network conditions on VoIP session holistically, we present a complete end to end study considering various states of the underlying network. We present as a case study of G.711 coded packets generated at 20 and 40 ms intervals for comparison. While packets carrying 20 ms data are better when the network is loaded, 40 ms packetization is favored when the network is not saturated. This affects the jitter and loss thus affecting the quality. We explain this trade-off using mean opinion scores.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130935587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Dominici, G. Marucco, P. Mulassano, A. Defina, K. Charqane
This paper has the goal to present the advancements in the design, development and test of a hybrid NAV/COM platform tailored to emergency operations. In particular, the system here discussed, named NICE - navigation in case of emergency, has been defined with the support of the alpine rescue team members of the Piemonte Region (Italy) that contributed towards the system requirements definition as well as the system operational tests. It is important to highlight that NICE is a technology created to support the management of the rescuers in the field (the mountain environment). It is a network-based positioning system exploiting the advantages of both the european geostationary navigation overlay system (EGNOS) associated to GPS and the available VHF communication infrastructure. The positioning system is based on the raw GPS measurements collected by the user terminal and transmitted to a local element by VHF radio channels (or GPRS when available). Present R&D activities are also considering the integration of NICE with the terrestrial trunked radio (TETRA) communication infrastructure in use by several European civil protection agencies.
{"title":"Navigation In Case of Emergency (NICE): An Integrated NAV/COM Technology for Emergency Management","authors":"F. Dominici, G. Marucco, P. Mulassano, A. Defina, K. Charqane","doi":"10.1109/CCNC08.2007.141","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.141","url":null,"abstract":"This paper has the goal to present the advancements in the design, development and test of a hybrid NAV/COM platform tailored to emergency operations. In particular, the system here discussed, named NICE - navigation in case of emergency, has been defined with the support of the alpine rescue team members of the Piemonte Region (Italy) that contributed towards the system requirements definition as well as the system operational tests. It is important to highlight that NICE is a technology created to support the management of the rescuers in the field (the mountain environment). It is a network-based positioning system exploiting the advantages of both the european geostationary navigation overlay system (EGNOS) associated to GPS and the available VHF communication infrastructure. The positioning system is based on the raw GPS measurements collected by the user terminal and transmitted to a local element by VHF radio channels (or GPRS when available). Present R&D activities are also considering the integration of NICE with the terrestrial trunked radio (TETRA) communication infrastructure in use by several European civil protection agencies.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130219954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangjin Hahm, Changseob Park, Keunsoo Park, Munchurl Kim
Scalable Video Coding (SVC) can be applicable in mobile broadcasting environment due to the flexibility of spatial, temporal and quality scalability. Recently, SVC technology becomes mature rapidly but its reference SW encoder isn't optimized yet. Therefore, we have developed a real-time SW SVC encoder for broadcasting. In this paper, we show our SVC encoder that can provide two spatial layers: QVGA(320 x 240) and VGA(640 x 480). The base layer can be fully compatible with H.264/AVC. Our encoder is performing real-time operation on a normal PC by optimizing SVC algorithm.
可扩展视频编码(Scalable Video Coding, SVC)由于具有空间、时间和质量可扩展性的灵活性,可以应用于移动广播环境。近年来,SVC技术迅速成熟,但其参考SW编码器尚未得到优化。因此,我们开发了一种用于广播的实时SW SVC编码器。在本文中,我们展示了我们的SVC编码器,可以提供两个空间层:QVGA(320 x 240)和VGA(640 x 480)。基础层可以完全兼容H.264/AVC。我们的编码器通过优化SVC算法在普通PC上进行实时操作。
{"title":"Implementation on a Real-Time SVC Encoder for Mobile Broadcasting","authors":"Sangjin Hahm, Changseob Park, Keunsoo Park, Munchurl Kim","doi":"10.1109/CCNC08.2007.285","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.285","url":null,"abstract":"Scalable Video Coding (SVC) can be applicable in mobile broadcasting environment due to the flexibility of spatial, temporal and quality scalability. Recently, SVC technology becomes mature rapidly but its reference SW encoder isn't optimized yet. Therefore, we have developed a real-time SW SVC encoder for broadcasting. In this paper, we show our SVC encoder that can provide two spatial layers: QVGA(320 x 240) and VGA(640 x 480). The base layer can be fully compatible with H.264/AVC. Our encoder is performing real-time operation on a normal PC by optimizing SVC algorithm.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128918218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research into the performance issues of TCP over wireless networks has been the focus of much attention in recent years. Specifically, many homes and offices are now fully equipped with WLAN technologies enabling users and devices to connect to the Internet that predominantly run over TCP for reliable service delivery. It is therefore a common scenario today for TCP segments originating from a TCP server in the Internet to traverse a wireless link in the last-hop portion of the connection on its way to a wireless TCP client. We present an experimental testbed that allows researchers to experiment with real TCP implementations over a real-world last-hop IEEE 802.11 WLAN, capturing the true end-to-end behaviour of TCP connections over an emulated Internet. Also, the results obtained from the testbed allowed us to establish the distribution of 802.11 frame losses in a real-world WLAN, which may be insightful to research in the area of packet-loss control techniques such as erasure control coding. The testbed and our initial results are a step forward in making TCP more robust for future wireless environments.
{"title":"An Experimental Testbed for Evaluating End-to-End TCP Performance Over Wired-to-Wireless Paths","authors":"Ritesh K. Taank, Xiaohong Peng","doi":"10.1109/CCNC08.2007.122","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.122","url":null,"abstract":"Research into the performance issues of TCP over wireless networks has been the focus of much attention in recent years. Specifically, many homes and offices are now fully equipped with WLAN technologies enabling users and devices to connect to the Internet that predominantly run over TCP for reliable service delivery. It is therefore a common scenario today for TCP segments originating from a TCP server in the Internet to traverse a wireless link in the last-hop portion of the connection on its way to a wireless TCP client. We present an experimental testbed that allows researchers to experiment with real TCP implementations over a real-world last-hop IEEE 802.11 WLAN, capturing the true end-to-end behaviour of TCP connections over an emulated Internet. Also, the results obtained from the testbed allowed us to establish the distribution of 802.11 frame losses in a real-world WLAN, which may be insightful to research in the area of packet-loss control techniques such as erasure control coding. The testbed and our initial results are a step forward in making TCP more robust for future wireless environments.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123755066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces a novel peak-to-average power ratio (PAPR) reduction method in orthogonal frequency division multiplexing (OFDM) systems by deploying wavelet packet pre-processing of the quadrature amplitude modulation (QAM) symbols. Specifically, joint inverse discrete wavelet packet and Fourier transformations (IDWPT and IDFT) of QAM symbols are calculated at the transmitter with the purpose of minimizing the PAPR of the OFDM frame to be transmitted. The wavelet packet tree representing a reversible IDWPT chosen at the transmitter is communicated to the receiver as side information, where the output of the DFT block is passed through the DWPT to recover the QAM symbols. As the DWPT is a orthonormal transformation, the proposed method preserves the average transmitted energy while maintaining the integrity of the transmitted information. With a small level of redundancy for side information, the proposed scheme achieves 5.5 dB reduction in PAPR over the traditional OFDM system as measured using the complementary cumulative distribution function (CCDF) of the OFDM signals at the clipping probability of 10-4.
{"title":"PAPR Reduction in OFDM Using Wavelet Packet Pre-Processing","authors":"M. Baro, J. Ilow","doi":"10.1109/CCNC08.2007.50","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.50","url":null,"abstract":"This paper introduces a novel peak-to-average power ratio (PAPR) reduction method in orthogonal frequency division multiplexing (OFDM) systems by deploying wavelet packet pre-processing of the quadrature amplitude modulation (QAM) symbols. Specifically, joint inverse discrete wavelet packet and Fourier transformations (IDWPT and IDFT) of QAM symbols are calculated at the transmitter with the purpose of minimizing the PAPR of the OFDM frame to be transmitted. The wavelet packet tree representing a reversible IDWPT chosen at the transmitter is communicated to the receiver as side information, where the output of the DFT block is passed through the DWPT to recover the QAM symbols. As the DWPT is a orthonormal transformation, the proposed method preserves the average transmitted energy while maintaining the integrity of the transmitted information. With a small level of redundancy for side information, the proposed scheme achieves 5.5 dB reduction in PAPR over the traditional OFDM system as measured using the complementary cumulative distribution function (CCDF) of the OFDM signals at the clipping probability of 10-4.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121196722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the broadband access becomes ubiquitous it enables enhanced communication experiences when combined with the mobile phone capabilities and multimedia capable consumer electronics (CE) devices. In this paper we outline a framework and architecture to unleash converged services experiences to users on their mobile devices and in-home CE devices. A system architecture consisting of bridging mobile network (SIP) technologies with the home network (UPnP) technologies and hosting the convergence function on the in-home broadband Residential Gateway is further detailed.
{"title":"Converged Services for Home Using a SIP/UPnP Software Bridge Solution","authors":"S. Chintada, P. Ramalingam, Glen Goffin","doi":"10.1109/CCNC08.2007.183","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.183","url":null,"abstract":"As the broadband access becomes ubiquitous it enables enhanced communication experiences when combined with the mobile phone capabilities and multimedia capable consumer electronics (CE) devices. In this paper we outline a framework and architecture to unleash converged services experiences to users on their mobile devices and in-home CE devices. A system architecture consisting of bridging mobile network (SIP) technologies with the home network (UPnP) technologies and hosting the convergence function on the in-home broadband Residential Gateway is further detailed.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a highly secure Wi-Fi infrastructure, in which smart cards are used as EAP client and EAP server, respectively on client's terminal and RADIUS server. Although cheap and secure, this architecture is scalable, because hundreds of EAP smart cards may be deployed on the server side.
{"title":"Open Two-Factor Authentication Tokens, for Emerging Wireless LANs","authors":"P. Urien","doi":"10.1109/CCNC08.2007.293","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.293","url":null,"abstract":"This paper presents a highly secure Wi-Fi infrastructure, in which smart cards are used as EAP client and EAP server, respectively on client's terminal and RADIUS server. Although cheap and secure, this architecture is scalable, because hundreds of EAP smart cards may be deployed on the server side.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124032561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a fully distributed architecture to support massively multiplayer games (MMGs) on a peer-to-peer (P2P) overlay network. P2P networks provide a scalable and robust solution for MMGs. Furthermore, similarly to real world interactions, MMG players interact with their surrounding, i.e., with visible players and objects in the virtual world. Thus, self-organization of peers based on their visibility property is essential for efficient overlay network support in MMGs. Also, the overlay network must be re-organized consistently in the face of players' position changes. In this paper, we achieve these goals by designing a peer-to-peer overlay network based on the Voronoi diagram. Each player has a responsibility region that includes nearby objects, and is responsible for updates' dissemination occurring in this region to provide game state consistency among the players who are concerned by the updates. As a proof of concept, we simulated a simple game application to demonstrate the feasibility of our architecture.
{"title":"Data Management in Voronoi-Based P2P Gaming","authors":"Eliya Buyukkaya, M. Abdallah","doi":"10.1109/CCNC08.2007.239","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.239","url":null,"abstract":"This paper proposes a fully distributed architecture to support massively multiplayer games (MMGs) on a peer-to-peer (P2P) overlay network. P2P networks provide a scalable and robust solution for MMGs. Furthermore, similarly to real world interactions, MMG players interact with their surrounding, i.e., with visible players and objects in the virtual world. Thus, self-organization of peers based on their visibility property is essential for efficient overlay network support in MMGs. Also, the overlay network must be re-organized consistently in the face of players' position changes. In this paper, we achieve these goals by designing a peer-to-peer overlay network based on the Voronoi diagram. Each player has a responsibility region that includes nearby objects, and is responsible for updates' dissemination occurring in this region to provide game state consistency among the players who are concerned by the updates. As a proof of concept, we simulated a simple game application to demonstrate the feasibility of our architecture.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121546674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}