T. Nissila, K. Pentikousis, I. Harjula, J. Huusko, M. Katz
This research presents an advanced model of WiMAX adapter. The proposed adapter architecture can serve multiple adaptive applications and processes by utilising a convergence mechanism to differentiate the conversations with each utilised vendor equipment. This paper presents the Adapter architecture, and experiments for the efficient use of the system bandwidth for the management purposes. The experiments are focused on the aggregation of SNMP monitoring requests on WiMAX link. The derived aggregation results point a radical gain that can be achieved in SNMP monitoring when requesting more data at once. For WiMAX link the maximum goodput increase due to applied aggregation was 45-folds and for Ethernet link 6-folds. Even the lower aggregation levels lead to good results for both. This research motivates the use of a general Adapter solution for WiMAX technology, but also supports the vendor specific management approach. The WiMAX Adapter solution also supports both the user-end (UE) and the network controlled management approaches in the limits of the user privileges.
{"title":"Advanced WiMAX Adapter to Serve Adaptive Applications/Processes in Convergenced Manner","authors":"T. Nissila, K. Pentikousis, I. Harjula, J. Huusko, M. Katz","doi":"10.1109/NGMAST.2008.84","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.84","url":null,"abstract":"This research presents an advanced model of WiMAX adapter. The proposed adapter architecture can serve multiple adaptive applications and processes by utilising a convergence mechanism to differentiate the conversations with each utilised vendor equipment. This paper presents the Adapter architecture, and experiments for the efficient use of the system bandwidth for the management purposes. The experiments are focused on the aggregation of SNMP monitoring requests on WiMAX link. The derived aggregation results point a radical gain that can be achieved in SNMP monitoring when requesting more data at once. For WiMAX link the maximum goodput increase due to applied aggregation was 45-folds and for Ethernet link 6-folds. Even the lower aggregation levels lead to good results for both. This research motivates the use of a general Adapter solution for WiMAX technology, but also supports the vendor specific management approach. The WiMAX Adapter solution also supports both the user-end (UE) and the network controlled management approaches in the limits of the user privileges.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133587246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-09-16DOI: 10.1504/IJIPT.2009.024167
Ian McDonald, Richard Nelson
In a traditional network stack, data from an application is transmitted in the order that it is received. An algorithm is proposed where information about the priority of packets and expiry times is used by the transport layer to reorder or discard packets at the time of transmission to optimise the use of available bandwidth. This can be used for video conferencing to prioritise important data. This scheme is implemented and compared to unmodified datagram congestion control protocol (DCCP). This algorithm is implemented as an interface to DCCP and tested using traffic modelled on video conferencing software. The results show improvement can be made to video conferencing during periods of congestion - substantially more audio packets arrive on time with the algorithm, which leads to higher quality video conferencing. In many cases video packet arrival rate also increases and adopting the algorithm gives improvements to video conferencing that are better than using unmodified queuing for DCCP. The algorithm proposed is implemented on the server only, so benefits can be obtained on the client without changes being required to the client.
{"title":"Application-Level QoS: Improving Video Conferencing Quality through Sending the Best Packet Next","authors":"Ian McDonald, Richard Nelson","doi":"10.1504/IJIPT.2009.024167","DOIUrl":"https://doi.org/10.1504/IJIPT.2009.024167","url":null,"abstract":"In a traditional network stack, data from an application is transmitted in the order that it is received. An algorithm is proposed where information about the priority of packets and expiry times is used by the transport layer to reorder or discard packets at the time of transmission to optimise the use of available bandwidth. This can be used for video conferencing to prioritise important data. This scheme is implemented and compared to unmodified datagram congestion control protocol (DCCP). This algorithm is implemented as an interface to DCCP and tested using traffic modelled on video conferencing software. The results show improvement can be made to video conferencing during periods of congestion - substantially more audio packets arrive on time with the algorithm, which leads to higher quality video conferencing. In many cases video packet arrival rate also increases and adopting the algorithm gives improvements to video conferencing that are better than using unmodified queuing for DCCP. The algorithm proposed is implemented on the server only, so benefits can be obtained on the client without changes being required to the client.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. MacQuire, A. Brampton, N. Race, L. Mathy, M. Fry
With the advent of numerous video distribution services, content distribution networks (CDNs) are under increasing demand. Given the associated expenses, many organisations have made use of peer-to-peer (P2P) approaches to offset bandwidth costs. Unfortunately, using clients as part of the delivery process can vastly increase load on service providers' networks. Furthermore, many approaches thus far lack the ability for interactive, on-demand viewing. For these reasons, this paper considers how 'hybrid' methods could alleviate these issues, through simulations of delivery methodologies in a CDN context. As it is unlikely that any one method will suffice for all content, network and audience types, a successful system should adapt in response to changes, as outlined in this paper.
{"title":"A Case for Hybrid Content Distribution for Interactive Video-on-Demand","authors":"A. MacQuire, A. Brampton, N. Race, L. Mathy, M. Fry","doi":"10.1109/NGMAST.2008.68","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.68","url":null,"abstract":"With the advent of numerous video distribution services, content distribution networks (CDNs) are under increasing demand. Given the associated expenses, many organisations have made use of peer-to-peer (P2P) approaches to offset bandwidth costs. Unfortunately, using clients as part of the delivery process can vastly increase load on service providers' networks. Furthermore, many approaches thus far lack the ability for interactive, on-demand viewing. For these reasons, this paper considers how 'hybrid' methods could alleviate these issues, through simulations of delivery methodologies in a CDN context. As it is unlikely that any one method will suffice for all content, network and audience types, a successful system should adapt in response to changes, as outlined in this paper.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"1 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113932082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
LAMP is the widely used open source Web development stack for building dynamic Web sites. In this paper, we discuss PAMP (Personal AMP), which is a port of the stack to the Symbian/S60 mobile phone platform. We illustrate the possibilities of PAMP with a couple of examples, share our experiences in bringing the stack to resource-constrained devices, and discuss the lessons learned. The existence of the dominant development environment on handheld devices allows easier development of mobile services with familiar high-level tools. Moreover, it enables reuse of existing solutions like content management systems and integration with other Web services such as Facebook.
{"title":"Open Source Web Application Development Stack for Symbian-Based Mobile Phones","authors":"J. Wikman, J. Nurminen","doi":"10.1109/NGMAST.2008.25","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.25","url":null,"abstract":"LAMP is the widely used open source Web development stack for building dynamic Web sites. In this paper, we discuss PAMP (Personal AMP), which is a port of the stack to the Symbian/S60 mobile phone platform. We illustrate the possibilities of PAMP with a couple of examples, share our experiences in bringing the stack to resource-constrained devices, and discuss the lessons learned. The existence of the dominant development environment on handheld devices allows easier development of mobile services with familiar high-level tools. Moreover, it enables reuse of existing solutions like content management systems and integration with other Web services such as Facebook.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel mechanism that enables mobile devices to efficiently participate in Distributed Hash Tables (DHTs). By selectively dropping messages, we can significantly reduce traffic and thus the energy consumption of mobile nodes with only minor performance degradation. The protocol extension preserves compatibility with existing widely used DHT systems. We evaluate the solution by measuring the energy-consumption of mobile phones participating in the Kademlia-based Mainline BitTorrent DHT, which consists of over one million nodes. We further analyze the impact of our mechanism on the performance of the DHT by means of an analytical model.
{"title":"Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-Based Distributed Hash Tables","authors":"I. Kelényi, J. Nurminen","doi":"10.1109/NGMAST.2008.59","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.59","url":null,"abstract":"This paper presents a novel mechanism that enables mobile devices to efficiently participate in Distributed Hash Tables (DHTs). By selectively dropping messages, we can significantly reduce traffic and thus the energy consumption of mobile nodes with only minor performance degradation. The protocol extension preserves compatibility with existing widely used DHT systems. We evaluate the solution by measuring the energy-consumption of mobile phones participating in the Kademlia-based Mainline BitTorrent DHT, which consists of over one million nodes. We further analyze the impact of our mechanism on the performance of the DHT by means of an analytical model.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shoppers with an Internet-enabled computer have a wealth of product information available to them. By browsing to a variety of Websites, users can conduct searches and compare prices, read reviews, and learn more about a product. These sites are pivot points for a user; once they are at Amazon.com's landing page, for example, they can navigate outwards to a million different products. The idiom of browsing to a central page for a site and then navigating outwards is acceptable when browsing is convenient, with large displays and useful input devices. This process becomes inconvenient, however, when the user is out and about in the world. We have built a system, Pivot, that uses physical objects as pivot points for the user. Specifically, Pivot uses the 1-D barcodes present on every product to deliver powerful services and options to a user on his or her cellphone. These services are chosen to be most useful to a user in the moment and trying to make a purchase decision. This paper describes the motivations for the system, the system itself, its current real-world deployment, and our intended future work.
{"title":"Pivot: Automatically Offering Information and Services to Real-World Shoppers","authors":"N. Nichols, K. Hammond, L. Birnbaum, L. Gandy","doi":"10.1109/NGMAST.2008.44","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.44","url":null,"abstract":"Shoppers with an Internet-enabled computer have a wealth of product information available to them. By browsing to a variety of Websites, users can conduct searches and compare prices, read reviews, and learn more about a product. These sites are pivot points for a user; once they are at Amazon.com's landing page, for example, they can navigate outwards to a million different products. The idiom of browsing to a central page for a site and then navigating outwards is acceptable when browsing is convenient, with large displays and useful input devices. This process becomes inconvenient, however, when the user is out and about in the world. We have built a system, Pivot, that uses physical objects as pivot points for the user. Specifically, Pivot uses the 1-D barcodes present on every product to deliver powerful services and options to a user on his or her cellphone. These services are chosen to be most useful to a user in the moment and trying to make a purchase decision. This paper describes the motivations for the system, the system itself, its current real-world deployment, and our intended future work.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"53 44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Santos, A. Pinto, M. Ricardo, T. Almeida, F. Fontes
Network operators have been reluctant to deploy IP multicast services mainly due to the lack of native control over multicast groups. This lack of control does not only prevent operators from generating revenue from multicast-based services but also hinders regular network management. In this work we identified the network elements where admission control should be enforced for multicast sessions spawning over heterogeneous access networks. The architecture proposed uses existing AAA functionality to perform user identification and multicast session admission control. This control is made at the network layer with no protocol modifications. Three access networks were considered: xDSL, WiMAX and UMTS.
{"title":"Admission Control in IP Multicast over Heterogeneous Access Networks","authors":"P. Santos, A. Pinto, M. Ricardo, T. Almeida, F. Fontes","doi":"10.1109/NGMAST.2008.37","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.37","url":null,"abstract":"Network operators have been reluctant to deploy IP multicast services mainly due to the lack of native control over multicast groups. This lack of control does not only prevent operators from generating revenue from multicast-based services but also hinders regular network management. In this work we identified the network elements where admission control should be enforced for multicast sessions spawning over heterogeneous access networks. The architecture proposed uses existing AAA functionality to perform user identification and multicast session admission control. This control is made at the network layer with no protocol modifications. Three access networks were considered: xDSL, WiMAX and UMTS.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thanks to the rapidly-developing Web, pervasive computing and mobile technologies, learning activities are being shifted to a new era which is characterized by ubiquitous adoption of information and communication technologies (ICT). ICT-based Learning (IBL), like mobile-learning, fosters high quality learning practices offering great freedom to learners while, at the same time, coming along with undesirable side-effects. This paper focuses on these issues after a brief summary of IBL background and gives possible solutions to them. The paper concludes with an objective view towards IBL and calls equal attention to the other side of IBL research, so that a balanced research can be achieved and better IBL system solutions can be reached.
{"title":"ICT-Based Learning – More Freedom, More Side-Effects?","authors":"Xu Xinhao, Zhou Wei, Li Min","doi":"10.1109/NGMAST.2008.46","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.46","url":null,"abstract":"Thanks to the rapidly-developing Web, pervasive computing and mobile technologies, learning activities are being shifted to a new era which is characterized by ubiquitous adoption of information and communication technologies (ICT). ICT-based Learning (IBL), like mobile-learning, fosters high quality learning practices offering great freedom to learners while, at the same time, coming along with undesirable side-effects. This paper focuses on these issues after a brief summary of IBL background and gives possible solutions to them. The paper concludes with an objective view towards IBL and calls equal attention to the other side of IBL research, so that a balanced research can be achieved and better IBL system solutions can be reached.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115677376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are many parameters that affect video quality but their combined effect is not well identified and understood when video is transmitted over mobile/wireless networks. In this paper our aim is twofold. First, to study and analyze the behaviour of video quality for wide range variations of a set of selected parameters. Second, to develop a learning model based on ANFIS to estimate the visual perceptual quality in terms of the mean opinion score (MOS) and decodable frame rate (Q value). We trained three ANFIS-based ANNs for the three distinct content types using a combination of network level and application level parameters such as frame rate, send bitrate, link bandwidth and packet error rate and tested the ANN models using unseen dataset. We found that the video quality is more sensitive to network level parameters compared to application level parameters. Preliminary results show that a good prediction accuracy was obtained from the ANFIS-based ANN model. The work should help in the development of a reference-free video prediction model and quality of service (QoS) control methods for video over wireless/mobile networks.
{"title":"An ANFIS-Based Hybrid Video Quality Prediction Model for Video Streaming over Wireless Networks","authors":"A. Khan, Lingfen Sun, E. Ifeachor","doi":"10.1109/NGMAST.2008.72","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.72","url":null,"abstract":"There are many parameters that affect video quality but their combined effect is not well identified and understood when video is transmitted over mobile/wireless networks. In this paper our aim is twofold. First, to study and analyze the behaviour of video quality for wide range variations of a set of selected parameters. Second, to develop a learning model based on ANFIS to estimate the visual perceptual quality in terms of the mean opinion score (MOS) and decodable frame rate (Q value). We trained three ANFIS-based ANNs for the three distinct content types using a combination of network level and application level parameters such as frame rate, send bitrate, link bandwidth and packet error rate and tested the ANN models using unseen dataset. We found that the video quality is more sensitive to network level parameters compared to application level parameters. Preliminary results show that a good prediction accuracy was obtained from the ANFIS-based ANN model. The work should help in the development of a reference-free video prediction model and quality of service (QoS) control methods for video over wireless/mobile networks.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Cheng, Henry Song, Hyuk Cho, S. Jeong, Swaroop Kalasapur, A. Messer
With more and more applications available on mobile devices, it has become increasingly difficult for users to find a desired application. Although research has been conducted for situation-awarere commendations on mobile devices, none addresses this problem; most research is for media content recommendations. Moreover, existing approaches assume predefined situations and/or user-specified profiles; some require users to intentionally train their devices before using them for recommendations. We believe that what defines a situation and what applications are preferred in the situation not only vary from user to user but also change over time, and therefore these assumptions and requirements are impractical for ordinary consumers. In this paper, we will describe our approach of using unsupervised learning, specifically co-clustering, to derive latent situation-based patterns from usage logs of user interactions with the device and environments and use the patterns for task and communication mode recommendations.
{"title":"Mobile Situation-Aware Task Recommendation Application","authors":"D. Cheng, Henry Song, Hyuk Cho, S. Jeong, Swaroop Kalasapur, A. Messer","doi":"10.1109/NGMAST.2008.104","DOIUrl":"https://doi.org/10.1109/NGMAST.2008.104","url":null,"abstract":"With more and more applications available on mobile devices, it has become increasingly difficult for users to find a desired application. Although research has been conducted for situation-awarere commendations on mobile devices, none addresses this problem; most research is for media content recommendations. Moreover, existing approaches assume predefined situations and/or user-specified profiles; some require users to intentionally train their devices before using them for recommendations. We believe that what defines a situation and what applications are preferred in the situation not only vary from user to user but also change over time, and therefore these assumptions and requirements are impractical for ordinary consumers. In this paper, we will describe our approach of using unsupervised learning, specifically co-clustering, to derive latent situation-based patterns from usage logs of user interactions with the device and environments and use the patterns for task and communication mode recommendations.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124839517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}