In last few years, a smart antenna has been envisaged to enhance the GPRS system implementing at Base Station. This results in the problem of complexity and expense. Alternatively, this paper considers employing switched beam antenna at Mobile Station, such as Laptop, instead. The simulation results reveal that utilizing switched beam antenna provides higher performance in term of C/I and throughput compared with using existing antenna. As being spaced by half-wavelength of the operational frequency, the array size is too large to build in Laptop. On the other hand, the reduction of array spacing affects the system throughput because of mutual coupling effect. Also, the decoupling techniques proposed in literatures are not practical for implementing in Mobile Station. Therefore, this paper also presents the trade off between throughput and array size. From the obtained results, we can reduce the array spacing according to the desired throughput. This is considerably useful for the GPRS designer.
{"title":"Investigation into GPRS Transmission Employing Switched Beam Antenna at Mobile Station","authors":"P. Sriploy, M. Uthansakul, R. Wongsan","doi":"10.1109/NGMAST.2008.38","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.38","url":null,"abstract":"In last few years, a smart antenna has been envisaged to enhance the GPRS system implementing at Base Station. This results in the problem of complexity and expense. Alternatively, this paper considers employing switched beam antenna at Mobile Station, such as Laptop, instead. The simulation results reveal that utilizing switched beam antenna provides higher performance in term of C/I and throughput compared with using existing antenna. As being spaced by half-wavelength of the operational frequency, the array size is too large to build in Laptop. On the other hand, the reduction of array spacing affects the system throughput because of mutual coupling effect. Also, the decoupling techniques proposed in literatures are not practical for implementing in Mobile Station. Therefore, this paper also presents the trade off between throughput and array size. From the obtained results, we can reduce the array spacing according to the desired throughput. This is considerably useful for the GPRS designer.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flexible charging and QoS provisioning are two of the main motivations behind the IP multimedia subsystem (IMS), defined by 3GPP. We have previously proposed a call differentiation solution for 3G networks. This solution defines different grades of calls with different QoS profiles, and uses a preemptive approach to give priority to more important calls over others. This idea of multi-grade services enables the users to choose the appropriate grade of call for each of their sessions, depending on the priorities/ guarantees they require. A suitable charging model is needed for the effective charging and billing of such services. In this paper, we focus on the charging aspects of multi-grade IMS services. The IMS online and offline charging mechanisms are leveraged and extended to tackle this issue. Furthermore, a proof-of-concept prototype, showcasing different multi-grade service charging scenarios, is presented.
{"title":"Charging for Multi-grade Services in the IP Multimedia Subsystem","authors":"M. Barachi, R. Glitho, R. Dssouli","doi":"10.1109/NGMAST.2008.48","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.48","url":null,"abstract":"Flexible charging and QoS provisioning are two of the main motivations behind the IP multimedia subsystem (IMS), defined by 3GPP. We have previously proposed a call differentiation solution for 3G networks. This solution defines different grades of calls with different QoS profiles, and uses a preemptive approach to give priority to more important calls over others. This idea of multi-grade services enables the users to choose the appropriate grade of call for each of their sessions, depending on the priorities/ guarantees they require. A suitable charging model is needed for the effective charging and billing of such services. In this paper, we focus on the charging aspects of multi-grade IMS services. The IMS online and offline charging mechanisms are leveraged and extended to tackle this issue. Furthermore, a proof-of-concept prototype, showcasing different multi-grade service charging scenarios, is presented.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128246585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Personalization has proven to be of significant value to educational systems, which provide learning contents tailored to the knowledge, interests and other characteristics of the learners. Location-based E-Learning raises new opportunities and challenges in this field, as learning activities become mobile and location-aware. Integration of personalization and location-awareness even context-awareness will greatly improve the effectiveness of E-Learning. In this paper, we introduce the process of personalization for location-based E-Learning, discuss the personalization techniques regarding learning context modeling, content organization and selection, recommendations and ranking as well as personalized multimedia presentation. A prototypical application is presented at the end of the paper.
{"title":"Personalization for Location-Based E-Learning","authors":"R. Zhou, K. Rechert","doi":"10.1109/NGMAST.2008.20","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.20","url":null,"abstract":"Personalization has proven to be of significant value to educational systems, which provide learning contents tailored to the knowledge, interests and other characteristics of the learners. Location-based E-Learning raises new opportunities and challenges in this field, as learning activities become mobile and location-aware. Integration of personalization and location-awareness even context-awareness will greatly improve the effectiveness of E-Learning. In this paper, we introduce the process of personalization for location-based E-Learning, discuss the personalization techniques regarding learning context modeling, content organization and selection, recommendations and ranking as well as personalized multimedia presentation. A prototypical application is presented at the end of the paper.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Blom, P. de Bruin, J. Eman, M. Folke, H. Hannu, M. Naslund, M. Stlnacke, P. Synnergren
We propose a concept for public safety communication realized with IMS (IP multimedia subsystem), the cellular standards of 3GPP and packet switched transmission. Basing the solution on mainstream cellular technology leverages the economy of scale of today's commercial networks and enables migration of technical solutions and applications. Important requirements of the public safety sector are group communication, low latency, high capacity, security, reliability and interoperability for voice and broadband data services. Our analysis shows that the concept has the technology potential to meet these public safety requirements.
{"title":"Public Safety Communication Using Commercial Cellular Technology","authors":"R. Blom, P. de Bruin, J. Eman, M. Folke, H. Hannu, M. Naslund, M. Stlnacke, P. Synnergren","doi":"10.1109/NGMAST.2008.78","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.78","url":null,"abstract":"We propose a concept for public safety communication realized with IMS (IP multimedia subsystem), the cellular standards of 3GPP and packet switched transmission. Basing the solution on mainstream cellular technology leverages the economy of scale of today's commercial networks and enables migration of technical solutions and applications. Important requirements of the public safety sector are group communication, low latency, high capacity, security, reliability and interoperability for voice and broadband data services. Our analysis shows that the concept has the technology potential to meet these public safety requirements.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"471 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132474972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines the driving forces behind the IP Multimedia Subsystem (IMS) and the Web 2.0 worlds. IMS moves operators' vertically integrated model to a horizontal infrastructure, enabling operators to reduce operating and capital expenses. On the other hand, Web 2.0 reflects the change of people's views about technology. Web 2.0 embodies a new perception of the network as a platform, which revolutionizes the world with services such as social networking sites. This paper explores the benefits of using the synergies of both the IMS and the Web 2.0 world. In pursuit of this purpose, the IMS 2.0 service architecture concept is proposed. The IMS 2.0 service architecture's goal is to combine the IMS and Web 2.0 worlds, namely, by opening up IMS assets to the Web 2.0 world, adopting Web 2.0 principles in the IMS world and providing an environment that would facilitate converged applications to users.
{"title":"The IMS 2.0 Service Architecture","authors":"Menuka Jain, Maria Prokopi","doi":"10.1109/NGMAST.2008.92","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.92","url":null,"abstract":"This paper examines the driving forces behind the IP Multimedia Subsystem (IMS) and the Web 2.0 worlds. IMS moves operators' vertically integrated model to a horizontal infrastructure, enabling operators to reduce operating and capital expenses. On the other hand, Web 2.0 reflects the change of people's views about technology. Web 2.0 embodies a new perception of the network as a platform, which revolutionizes the world with services such as social networking sites. This paper explores the benefits of using the synergies of both the IMS and the Web 2.0 world. In pursuit of this purpose, the IMS 2.0 service architecture concept is proposed. The IMS 2.0 service architecture's goal is to combine the IMS and Web 2.0 worlds, namely, by opening up IMS assets to the Web 2.0 world, adopting Web 2.0 principles in the IMS world and providing an environment that would facilitate converged applications to users.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreas Häber, Martin Gerdes, F. Reichert, A. Fasbender, Ram Kumar
Service providers are nowadays offering a variety of services, and in particular multimedia content delivery. Besides, consumer appliances are increasingly becoming digitalized including support for communication networks. However, it is difficult, and in many cases impossible, to use these services with standard consumer appliances, such as TV and media player devices. Rather, usage is often restricted so that they can only be accessed through web browsers from PCs, mobile phones and similar terminals. This is unfortunate, because dedicated consumer appliances are often better suited to handle the content and thereby give consumers a better experience. Within this paper, three design approaches that support such services are described and compared, along with a prototype that shows this concept.
{"title":"Delivering Services to Residential Appliances by Utilizing Remote Resource Awareness","authors":"Andreas Häber, Martin Gerdes, F. Reichert, A. Fasbender, Ram Kumar","doi":"10.1109/NGMAST.2008.85","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.85","url":null,"abstract":"Service providers are nowadays offering a variety of services, and in particular multimedia content delivery. Besides, consumer appliances are increasingly becoming digitalized including support for communication networks. However, it is difficult, and in many cases impossible, to use these services with standard consumer appliances, such as TV and media player devices. Rather, usage is often restricted so that they can only be accessed through web browsers from PCs, mobile phones and similar terminals. This is unfortunate, because dedicated consumer appliances are often better suited to handle the content and thereby give consumers a better experience. Within this paper, three design approaches that support such services are described and compared, along with a prototype that shows this concept.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Nissila, K. Pentikousis, I. Harjula, J. Huusko, M. Katz
This research presents an advanced model of WiMAX adapter. The proposed adapter architecture can serve multiple adaptive applications and processes by utilising a convergence mechanism to differentiate the conversations with each utilised vendor equipment. This paper presents the Adapter architecture, and experiments for the efficient use of the system bandwidth for the management purposes. The experiments are focused on the aggregation of SNMP monitoring requests on WiMAX link. The derived aggregation results point a radical gain that can be achieved in SNMP monitoring when requesting more data at once. For WiMAX link the maximum goodput increase due to applied aggregation was 45-folds and for Ethernet link 6-folds. Even the lower aggregation levels lead to good results for both. This research motivates the use of a general Adapter solution for WiMAX technology, but also supports the vendor specific management approach. The WiMAX Adapter solution also supports both the user-end (UE) and the network controlled management approaches in the limits of the user privileges.
{"title":"Advanced WiMAX Adapter to Serve Adaptive Applications/Processes in Convergenced Manner","authors":"T. Nissila, K. Pentikousis, I. Harjula, J. Huusko, M. Katz","doi":"10.1109/NGMAST.2008.84","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.84","url":null,"abstract":"This research presents an advanced model of WiMAX adapter. The proposed adapter architecture can serve multiple adaptive applications and processes by utilising a convergence mechanism to differentiate the conversations with each utilised vendor equipment. This paper presents the Adapter architecture, and experiments for the efficient use of the system bandwidth for the management purposes. The experiments are focused on the aggregation of SNMP monitoring requests on WiMAX link. The derived aggregation results point a radical gain that can be achieved in SNMP monitoring when requesting more data at once. For WiMAX link the maximum goodput increase due to applied aggregation was 45-folds and for Ethernet link 6-folds. Even the lower aggregation levels lead to good results for both. This research motivates the use of a general Adapter solution for WiMAX technology, but also supports the vendor specific management approach. The WiMAX Adapter solution also supports both the user-end (UE) and the network controlled management approaches in the limits of the user privileges.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133587246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-09-16DOI: 10.1504/IJIPT.2009.024167
Ian McDonald, Richard Nelson
In a traditional network stack, data from an application is transmitted in the order that it is received. An algorithm is proposed where information about the priority of packets and expiry times is used by the transport layer to reorder or discard packets at the time of transmission to optimise the use of available bandwidth. This can be used for video conferencing to prioritise important data. This scheme is implemented and compared to unmodified datagram congestion control protocol (DCCP). This algorithm is implemented as an interface to DCCP and tested using traffic modelled on video conferencing software. The results show improvement can be made to video conferencing during periods of congestion - substantially more audio packets arrive on time with the algorithm, which leads to higher quality video conferencing. In many cases video packet arrival rate also increases and adopting the algorithm gives improvements to video conferencing that are better than using unmodified queuing for DCCP. The algorithm proposed is implemented on the server only, so benefits can be obtained on the client without changes being required to the client.
{"title":"Application-Level QoS: Improving Video Conferencing Quality through Sending the Best Packet Next","authors":"Ian McDonald, Richard Nelson","doi":"10.1504/IJIPT.2009.024167","DOIUrl":"https://doi.org/10.1504/IJIPT.2009.024167","url":null,"abstract":"In a traditional network stack, data from an application is transmitted in the order that it is received. An algorithm is proposed where information about the priority of packets and expiry times is used by the transport layer to reorder or discard packets at the time of transmission to optimise the use of available bandwidth. This can be used for video conferencing to prioritise important data. This scheme is implemented and compared to unmodified datagram congestion control protocol (DCCP). This algorithm is implemented as an interface to DCCP and tested using traffic modelled on video conferencing software. The results show improvement can be made to video conferencing during periods of congestion - substantially more audio packets arrive on time with the algorithm, which leads to higher quality video conferencing. In many cases video packet arrival rate also increases and adopting the algorithm gives improvements to video conferencing that are better than using unmodified queuing for DCCP. The algorithm proposed is implemented on the server only, so benefits can be obtained on the client without changes being required to the client.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A virtual private network (VPN) can be defined as a way to provide secure communication between members of a group through use of public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. There are many different VPN solutions out there, and just deciding which one to choose can be difficult since they all have advantages and disadvantages. VPNs can be categorized as Secure or Trusted VPNs, Client-based or Web-based VPNs, Customer Edge-based or Provider Edge-based VPNs, or Outsourced or In-house VPNs. These categories often overlap each other. In order to decide what VPN solutions to choose for different parts of the enterprise infrastructure, the chosen solution should be the one that best meets the requirements of the enterprise. The purpose of this paper is to serve as a basis when creating an enterprise WAN which connects sites and users together using VPN technology. The purpose of creating such a WAN is to allow the resources of a company to be remotely accessed.
{"title":"Proper Virtual Private Network (VPN) Solution","authors":"A.A. Jaha, F. Ben Shatwan, M. Ashibani","doi":"10.1109/NGMAST.2008.18","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.18","url":null,"abstract":"A virtual private network (VPN) can be defined as a way to provide secure communication between members of a group through use of public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. There are many different VPN solutions out there, and just deciding which one to choose can be difficult since they all have advantages and disadvantages. VPNs can be categorized as Secure or Trusted VPNs, Client-based or Web-based VPNs, Customer Edge-based or Provider Edge-based VPNs, or Outsourced or In-house VPNs. These categories often overlap each other. In order to decide what VPN solutions to choose for different parts of the enterprise infrastructure, the chosen solution should be the one that best meets the requirements of the enterprise. The purpose of this paper is to serve as a basis when creating an enterprise WAN which connects sites and users together using VPN technology. The purpose of creating such a WAN is to allow the resources of a company to be remotely accessed.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile ad hoc networks (MANETs) rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, misbehaving nodes may not follow the cooperation paradigm and cause a serious affect on network performance. Nodes misbehave because they are malicious, selfish or malfunctioning. In this paper, we present a simulation study of the effects of misbehaving nodes on DSR routing protocol performances and discuss some countermeasures to mitigate misbehaving node effects.
{"title":"A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks","authors":"A. Babakhouya, Y. Challal, A. Bouabdallah","doi":"10.1109/NGMAST.2008.56","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.56","url":null,"abstract":"Mobile ad hoc networks (MANETs) rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, misbehaving nodes may not follow the cooperation paradigm and cause a serious affect on network performance. Nodes misbehave because they are malicious, selfish or malfunctioning. In this paper, we present a simulation study of the effects of misbehaving nodes on DSR routing protocol performances and discuss some countermeasures to mitigate misbehaving node effects.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}