WINSYS 2007 Abstracts


Full Papers
Paper Nr: 107
Title:

A FRAMEWORK FOR THE DYNAMIC CONFIGURATION OF ADAPTIVE TRANSPORT PROTOCOLS - Application to QoS Requirements

Authors:

F. Armando, N. Van Wambeke, C. Chassot, E. Exposito and K. Drira

Abstract: Self-adaptation of communication protocols is a major issue in the conception of future QoS-oriented services for the ambient Internet. Our approach is based on behavioural and architectural adaptation properties of dynamically configurable Transport protocols. This paper proposes an architecture for the QoS provisioning at the Transport level. To fulfil this provisioning, the decision process follows a policy-based framework, using different external models in order to have an extensible design. We illustrate the use of this framework in a case study for the QoS optimization of a mobile user, roaming from a wired network to a wireless network.
Download

Paper Nr: 108
Title:

THE QUEST FOR SELF-MODEL IN SELF-MANAGING NETWORKS

Authors:

Burak Simsek and Hakan Coskun

Abstract: Although autonomic networking has been discussed in related research activities in the last few years, there is neither a commonly accepted model nor a common understanding of the necessary components of an autonomic networking environment, which are also practically applicable. We present a simple model based on the notion of self that is perceived by human beings and deduce its components from the originating point which is the need for autonomic behavior. We also introduce three use cases that we implemented for solving different problems of IEEE 802.11e networks.
Download

Paper Nr: 109
Title:

POLICY BASED QOS MONITORING - Automated Learning Strategies for Policy Enhancement

Authors:

Pedro A. Aranda Gutierrez, David Wagner, Ilka Miloucheva, Christof Brandauer and Ulrich Hofmann

Abstract: A challenge of today’s measurement architectures for QoS/SLA monitoring in heterogeneous network environment is enhanced intelligence in order to minimise measurements and derive automatically optimised measurement strategies for the network operators. Such optimisations can be done with different goals – avoid redundant measurements, sharing of measurements for different QoS monitoring goals and enhancement of measurement strategies considering QoS/SLA measurement requests. For automated optimisation of measurement strategies, QoS measurement policies are proposed whose parameters are adapted dynamically based on specified learning algorithms and rules. For the policy adaptation different kinds of learning can be used, as for instance reinforcement and supervised learning. The integration of the proposed policy based strategies into policy management architecture is discussed. A learning component collecting rules and algorithms for measurement policy adaptation is proposed which can be used by different tools of a policy management system. A graphical user interface (GUI) for a realistic policy based measurement scenario is discussed which aims to optimise the measurement strategies of the network operator.
Download

Paper Nr: 110
Title:

A SCALABLE AND BUSINESS-ORIENTED FRAMEWORK FOR INTER-DOMAIN QUALITY-OF-SERVICE

Authors:

Vitor Jesus, Susana Sargento and Rui L. Aguiar

Abstract: This paper presents and discusses a framework for end-to-end Quality-of-Service in a network operator environment. We focus on the inter-operator segment. Contrary to usual approaches, we consider that, in the current state-of-the-art, the interdomain QoS problem complexity resides on the business relations between administrative domains. Therefore, we attempt to decouple the technical problem of providing end-to-end traffic assurances from the business problem of setting up partnerships. We combine the two aspects to build a framework that allows a smooth integration of the inter-domain, the intra-domain and the access segments. We also provide an IntServ-over-DiffServ architecture that is able to cope with mobility scenarios.
Download

Paper Nr: 113
Title:

QOS-AWARE POLICY BASED ROUTING FOR MESH NETWORK ENVIRONMENTS

Authors:

Mathias Kretschmer, Ilka Miloucheva and Dirk Hetzer

Abstract: The design of a policy oriented configurable multi-path routing architecture for enhanced mesh network infrastructures is discussed. The goal is optimal routing path selection between mesh clients and mesh router gateways dependent on application classes. Policies are used to dynamically configure the route path selection for QoS-aware applications taking into account resource reservation requests for application traffic (in advance reservation, on-demand resource allocation, etc) and business goals of the policy actors, i.e. end-users, service providers and network operators. Interactions of the mesh routing protocol facilities with the policy management and resource planning components for advance and on-demand resource allocation are considered. Scenarios are aimed at supporting QoS-aware applications (such as IPTV, VoD, GRID, VoIP, real-time, mission critical, content delivery on-demand, software and large file downloads) using a wireless mesh network backbone infrastructure (based on IEEE 802.11, IEEE 802.16) enhanced with broadcast technologies (DVB-T, DVB-H).
Download

Paper Nr: 115
Title:

A SEMANTIC APPROACH TO POLICY-BASED MANAGEMENT - Linking Policies to Ontologies

Authors:

S. Avallone, Salvatore D'Antonio and Simon Pietro Romano

Abstract: The possibility of dynamically managing Quality of Service (QoS) in heterogeneous networks represents a key element for telecom operators which aim at making their communication infrastructures able to support new emerging multimedia services. The large success of triple play services together with the ongoing migration of voice carriers towards the NGN (Next Generation Network) architecture imposes a new way of controlling and utilizing network resources in order to fulfill user’s requirements. The use of network level policies to configure and manage QoS-based communication networks allows network operators to automatically adapt the managed systems to changing requirements of the new operational and business scenarios. In this paper we present an innovative approach to policy-based network management which ensures flexibility and effectiveness to all processes composing the service life cycle, from negotiation to delivery. In order to allow users and applications to modify their QoS requirements, thus triggering the SLA re-negotiation, at the same time optimizing the configuration of network elements we implemented a novel framework capable to automatically translate user’s requirements into network policies. Such framework relies on the adoption of ontologies as means to describe heterogeneous realms such as those associated with the fruition and delivery of innovative services. Ontologies are used to represent user’s needs and preferences, which feed the policy creation and enforcement process. Different real world scenarios are depicted to validate the effectiveness of the proposed approach.
Download

Area 1 - Wireless Information Networks

Full Papers
Paper Nr: 41
Title:

TAG NUMBER ESTIMATION SCHEME IN GEN2 PROTOCOL BASED RFID SYSTEM

Authors:

Cheng-Hao Quan, Hee-Sook Mo and Gil-Young Choi

Abstract: Recently, the RFID(Radio Frequency Identification) technology has gained significant attention. One of the performance issues in RFID systems is to resolve the tag collision among responses from RFID tags. In this paper, we proposed a Gen2 Protocol based Tag Number Estimation Scheme for estimation of the number of tags in the reader filed. The scheme is used by anti-collision algorithm to identify multiple tags efficiently. We also present the simulation result that shows the proposed scheme to estimate tags efficiently and also to improve the systems efficiency.
Download

Paper Nr: 58
Title:

DESIGN OF A PASSWORD-BASED AUTHENTICATION METHOD FOR WIRELESS NETWORKS

Authors:

Andrea Manganaro, Mingyur Koblensky Koblensky and Michele Loreti

Abstract: In recent years, amendments to IEEE standards for wireless networks added support for authentication algorithms based on the Extensible Authentication Protocol (EAP). Available solutions generally use digital certificates or pre-shared keys but the management of the resulting implementations is complex or unlikely to be scalable. In this paper we present EAP-SRP-256, an authentication method proposal that relies on the SRP-6 protocol and provides a strong password-based authentication mechanism. It is intended to meet the IETF security and key management requirements for wireless networks.
Download

Paper Nr: 95
Title:

OPTIMAL ENERGY ALLOCATION FOR DETECTION IN WIRLESS SENSOR NETWORKS

Authors:

Krishna Gunturu and Mort Naraghi-Pour

Abstract: The problem of binary hypothesis testing in a wireless sensor network is studies in the presence of noisy channels and for non-identical sensors. We have devised an energy allocation scheme for individual sensors in order to optimize a cost function with a constraint on the total network energy. Two cost functions were considered; the probability of error and the J-divergence distance measure. We have also designed a mathematically tractable fusion rule for which optimal energy allocation can be achieved. Results of optimal energy allocation and the resulting probability of error are presented for different sensor network configurations.
Download

Short Papers
Paper Nr: 21
Title:

VESMP (VERY SHORT MESSAGE PROTOCOL) AN SMS-BASED PROTOCOL FOR PROCESS MONITORING AND SYSTEM REMOTE ADMINISTRATION

Authors:

Thomas Ndie Djotio, Claude Tangha and Kouamou Georges Edouard

Abstract: In this paper we propose a Very Short Message protocol (VeSMp), a simple SMS-based protocol for process monitoring and system remote administration. This protocol offers the system administrator an additional means of supervising and monitoring the activity or the state of processes and services via a mobile terminal. VeSMp transforms a Global Mobile Standard (GSM) terminal by means of SMS service into a true station of system administration as well as a PC connected to a corporate network. This protocol uses an original concept which we call VeSM (for Very Short Message). VeSM represents a very short message, an alias or extensible shortcut which makes it possible to implicitly exceed the conventional limit of 160 characters maximum used in SMS.
Download

Paper Nr: 29
Title:

EFFICIENT PLACEMENT OF WIRELESS BASE-STATIONS IN URBAN ENVIRONMENT

Authors:

Mansour Aldajani

Abstract: This work proposes a novel approach for placing wireless base-stations in urban environments. The new approach solves the placement problem using 2-D convolution. Convolution searches for the best locations of base stations based on highest consumption criteria. Convolution theorem is then used to substantially cut the computation load of the proposed approach. The approach allows simple user-interface and arbitrary demand and supply patterns of power. Simulations show that the new approach can be used to efficiently model and place wireless base-stations.
Download

Paper Nr: 33
Title:

WIRELESS TEMPERATURE SENSOR NETWORK - Wireless Sensor Data Transfer as Well as Processing

Authors:

Miroslav Husak, Petr Oberreiter and Julius Foit

Abstract: The realized system for wireless measurement of temperature in the many different places is described. The paper describes a new architecture of a multisensor system for remote temperature measurement using wireless communications. The system is composed of temperature sensors with digital output. The system ensures RF wireless data transfer, wireless communication between control unit and sensors as well as wireless switch unit. The integrated RF chip nRF9E5 ensures wireless communication. The control unit controls communications, sensor data processing as well as switching of actuator unit. The control unit contains main control microprocessor ATMEL as well as wireless communication unit. The actuator switch unit communicates with control unit using RF wireless way. Partial control programmes were designed for wireless unit control. There are many program functions implemented. The control software of the whole system has been designed. The designed system, i.e. hardware and software has been realized and tested. The system can operated in the range of 300 m in the free space. The number of sensor can be extensible. The system can be use to operate with different type of sensor, i.e. for measurement other type of quantities. PDA or mobile phone can be used to communication with control unit.
Download

Paper Nr: 35
Title:

TRANSMISSION POWER CONTROL FOR AVOIDING CELL OVERLAPPING IN MICRO-CELLULAR NETWORKS

Authors:

Akiko Miyagawa, Masahiro Sasabe and Hirotaka Nakano

Abstract: In a cellular system, a base station can smoothly communicate with nodes in its cell by avoiding overlap of frequency range with its adjacent cells. From the viewpoint of graph theory, that needs to divide the original frequency range into at least four sub-ranges. This leads to deteriorate the transmission rate. To tackle this problem, we propose Complete Cell Partitioning (CCP) that enables a base station to use the whole of the original frequency range by avoiding overlap of its own cell with the adjacent cells. CCP is achieved by appropriately controlling the transmission power on base stations. We first analytically derive success probability of CCP when nodes are randomly located in the whole region. Then, we verify the analysis by comparing with simulation results. The analytical and simulation results show that CCP enables to use the original frequency range more effectively than the traditional cellular system regardless of the number of nodes in a cell.
Download

Paper Nr: 35
Title:

TRANSMISSION POWER CONTROL FOR AVOIDING CELL OVERLAPPING IN MICRO-CELLULAR NETWORKS

Authors:

Akiko Miyagawa, Masahiro Sasabe and Hirotaka Nakano

Abstract: In a cellular system, a base station can smoothly communicate with nodes in its cell by avoiding overlap of frequency range with its adjacent cells. From the viewpoint of graph theory, that needs to divide the original frequency range into at least four sub-ranges. This leads to deteriorate the transmission rate. To tackle this problem, we propose Complete Cell Partitioning (CCP) that enables a base station to use the whole of the original frequency range by avoiding overlap of its own cell with the adjacent cells. CCP is achieved by appropriately controlling the transmission power on base stations. We first analytically derive success probability of CCP when nodes are randomly located in the whole region. Then, we verify the analysis by comparing with simulation results. The analytical and simulation results show that CCP enables to use the original frequency range more effectively than the traditional cellular system regardless of the number of nodes in a cell.
Download

Paper Nr: 45
Title:

KNOWLEDGE BASED SYSTEM FOR RELIABLE PERIMETER PROTECTION USING SENSOR NETWORKS

Authors:

Constantin Volosencu, Daniel Ioan Curiac, Ovidiu Banias, Alex Doboli and Octavian Dranga

Abstract: This paper provides a strategy for perimeter protection using sensor networks with hardware and analytical redundancy. The sensor network reliability is augmented using a knowledge-based system, which implicates the analysis of the trustworthiness of each sensor. For this, we used two stratagems: one that relies on hardware redundancy based on the Confidence Weighted Voting Algorithm and one that relies on analytical redundancy based on a neural perceptron predictor that uses past and present values obtained from neighbouring nodes. This solution can be also a way to discover the malfunctioning nodes that were subjects of an attack and it is localized at the base station level being suitable even for large-scale sensor networks.
Download

Paper Nr: 54
Title:

A PRAGMATIC APPROACH FOR QOS IN WIRELESS MESH NETWORKS

Authors:

André Herms and Georg Lukas

Abstract: In this paper we present a QoS routing protocol for IEEE-802.11 based mesh networks. The main challenge for providing QoS in terms of bandwidth and latency is that the medium is shared between all nodes in close range, which complicates reservation of medium time. Furthermore, the use of standard compliant hardware components requires an integration of the existing medium access mechanism, which is designed for best-effort communication only. A cluster-based structure is used for representing the local domains of the shared medium and allowing reservation of medium time. On top of this reservation an optimistic reactive algorithm is used for discovery and reservation of routes that fulfil the application specified QoS requirements. Simulation results are presented that prove the correctness of this approach.
Download

Paper Nr: 60
Title:

EVALUATION OF MULTI-RADIO EXTENSIONS TO DSR FOR WIRELESS MULTI-HOP NETWORKS

Authors:

Saad Biaz, Bing Qi, Shaoen Wu and Yiming Ji

Abstract: Performance on multi-hop networks suffers from limited throughput capacity and poor scalability problems as the network size or density increases (Gupta and Kumar, 2000). One way to alleviate these problems is to equip each node with multiple radios. As hardware cost drops, this approach becomes more and more appealing and feasible. By tuning radios into non-interfering channels, the wireless spectrum can be more efficiently utilized, thus enhancing the whole network performance. This work extensively evaluates Dynamic Source Routing Protocol(DSR) (Johnson and Maltz, 1996) for multi-radio multi-hop networks. Through simulations, DSR with multi-radio extensions exhibits an overall performance improvement for throughput, packet delivery rate and latency.
Download

Paper Nr: 62
Title:

WIRELESS HOME NETWORK CONTORL MECHANISM FOR STANDBY POWER REDUCTION

Authors:

Joon Heo, Choong Seon Hong, Seok Bong Kang and Sang Soo Jeon

Abstract: Standby power is electric power that a device consumes when not in present use, but plugged in to a source of power and ready to be used. Present estimates indicate that standby power consumption reaches 10 to 15 percent of total residential electrical use. In this paper, we propose a Host-Agent based standby power control mechanism in home network environment. It uses the IEEE 802.15.4 based ZigBee communication protocol between Host and Agent for transmission and secure network. The Agent can acquire the local context information from various embedded sensor and sends the sensing information to the Host. The Host compares this context information from Agent with database and sends the standby power control message to the Agent. To prove the necessity and the efficiency of the proposed control mechanism, we have developed prototype devices and carried out simulation according to control scenario.
Download

Paper Nr: 86
Title:

REVISITING THE MARKOV CHAIN MODEL OF IEEE 802.11E EDCA AND INTRODUCING THE VIRTUAL COLLISION PHENOMENON

Authors:

Mohamad El Masri, Guy Juanole and Slim Abdellatif

Abstract: IEEE 802.11e specifies the Enhanced Distributed Channel Access (EDCA) for distributed access with traffic differentiation to a Wireless Local Area Network (WLAN). Traffic differentiation led to introducing several traffic queues within each station, thus introducing virtual collision. In this paper, we present a pattern based Markov chain model of EDCA including the virtual collision phenomenon not found in previous work. We also correct the misconceptions found in existing Markov chain models of EDCA (Kong et al., 2004). We thus obtain a more realistic model of IEEE 802.11e EDCA which will allow a more precise performance analysis that may be used for admission control.
Download

Paper Nr: 92
Title:

ROLE BASED CROSS-LAYER COMMUNITIES ON WMN

Authors:

João Paulo Barraca, Susana Sargento and Rui L. Aguiar

Abstract: The community notion can be exploited as a rational concept leading users to cooperate in sharing resources on Wireless Mesh Networks. We propose a novel concept for self-organizing networks, where multiple entities (network elements or users) collaborate to achieve common goals, and in particular, to establish the basic connectivity and service delivery infrastructures. The resulting architecture is based on wireless mesh communications, with different entities taking different roles in the communities in a cross-layer approach. These communities can collaborate, leading to increasingly complex and geographically extended scenarios.
Download

Paper Nr: 99
Title:

A RELAXED PROBING RATE ADAPTATION IN IEEE802.11 WLANS

Authors:

Saad Biaz and Shaoen Wu

Abstract: The availability of multiple rates in IEEE802.11 WLANs and instability of wireless channel conditions call for data rate adaption algorithms to optimize network performance. Rate adaption is the process of assessing instantaneous channel conditions and determining the most appropriate data rate. This paper presents a relaxed probing rate adaptation scheme to determine the most appropriate instantaneous data rate for both downlink and uplink channels, especially in the case where control frames such as RTS/CTS are not available. For this goal, the proposed scheme exploits the mandatory management beacon frame, thus without requiring probing frames like RTS/CTS necessary for other so far proposed schemes. Ns-2 simulations with IEEE802.11b of the proposed scheme yield more than 100% throughput improvement in high density networks. Also, simulations show that the proposed scheme is insensitive to beacon interval.
Download

Paper Nr: 36
Title:

WIRELESS MULTIMEDIA CONTINUOUS PACKET CONNECTIVITY (CPC), POWER AMPLIFIER (PA) BACK-OFF AND THE CUBIC METRIC (CM)

Authors:

Terence Dodgson and Mark Horgan

Abstract: With the every-increasing complexity of (e.g. multi media) signal waveforms generated by transmitters of modern digital communications systems, there comes a corresponding demand for transmitters to continue to operate efficiently (e.g. from a cost per bit and power output point of view) and to produce minimum distortion, within specified limits. This paper looks at how a particular CPC scheme (for efficient resource usage) might be devised and what the resulting impact is on the CM measure. The work uses, as a basis for simulations, mainly the Uplink of the third generation (3G) Wideband Code Division Multiple Access (WCDMA) Release six (R6) system.
Download

Area 2 - Wireless Networking Technologies

Full Papers
Paper Nr: 66
Title:

WIRELESS POSITION LOCATION SYSTEM FOR INDOOR ENVIRONMENTS

Authors:

Matthew D'souza, Adam Postula and Montserrat Ros

Abstract: Location systems are used for a variety of navigation applications. Current Location systems are designed to provide accurate distance position coordinates. There are tracking or logistic applications where actual position coordinates are not necessary. Determining the room in a building an object is located can be more useful then the actual coordinates. We present an inexpensive and robust wireless location beacon network that can track the location of emergency responders or users in an indoor environment. Location beacons are placed at predetermined positions in a building. The location beacons are used to determine the presence of the user in an area of a building. The location beacon network does not track the user's coordinates. The location beacon network uses the ZigBee/802.15.4 wireless communications protocol. Our paper examines the use of the Zigbee protocol to determine a user’s location. Two realtime location tracking mechanisms are also analysed and tested. A successful prototype of the location beacon network was created and tested.
Download

Paper Nr: 96
Title:

RESOURCE ALLOCATION FOR OFDM SYSTEMS IN THE PRESENCE OF TIME-VARYING CHANNELS

Authors:

Mort Naraghi-Pour and Xiang Gao

Abstract: Adaptive resource allocation schemes for OFDM systems designed assuming static channels are known to experience significant performance loss when the channel is time-varying. The inaccuracy in channel state information (CSI) due to outdated channel estimates has been recognized as the main reason for this problem. To mitigate this effect, we present robust bit and power allocation schemes based on the predicted channel state information. Simulation results show that channel prediction schemes can significantly improve the performance of resource allocation algorithms over time-varying channels.
Download

Short Papers
Paper Nr: 27
Title:

THROUGHPUT ENHANCEMENT USING ADAPTIVE DELAY BARRIER FUNCTION OVER HSDPA SYSTEM IN MIXED TRAFFIC SCENARIOS

Authors:

Yong-Seok Kim

Abstract: In this paper, we consider a method to enhance the throughput of HSDPA system in the mixed traffic scenario. Adaptive delay barrier (DB) function and adaptation method are proposed to maximize throughput of best-effort (BE) traffic with satisfying the delay latency of voice over internet protocol (VoIP) service. Moreover, in order to guarantee quality-of-service (QoS) for the mixed traffics, a design of modified scheduling scheme is provided in this paper. Simulation results show that the throughput of BE traffic service with a channel-adaptive DB function increases up to 30%, compared with the conventional scheme, without degrading the capacity of VoIP service over HSDPA system.
Download

Paper Nr: 31
Title:

DESIGN CONSIDERATIONS FOR MULTI-CARRIER CDMA BTS POWER AMPLIFIERS

Authors:

Osama Ata

Abstract: System manufacturers that provide wireless telecommunications equipment to cellular operators, often do not manufacture their own transceivers. They get their own supplies from various base station power amplifier vendors. Unfortunately cellular operators and system providers take design considerations of those primary power amplifiers for granted. The consequences are: Operators are overpaying for base station amplifiers to meet power and capacity demands. Base stations are complicated systems and the optimum technical design considerations of the power amplifier sub-systems have a major impact on multi-carrier Code Division Multiple Access (CDMA) Base Transceiver Station (BTS) performance. This paper discusses those power amplifier vendor claims, demonstrates design considerations and economic design solutions of consequent savings for the operator, based on a realistic market case. We realize that upfront savings, in power amplifier units, in a US market of approximately 550 multi carrier basestation sectors would exceed $ 10 M.
Download

Paper Nr: 40
Title:

TURBO SPACE TIME CODES FOR TAILBITING TRANSMISSION

Authors:

Piotr Remlein and Filip Lecki

Abstract: This paper studies a novel technique that combines turbo tailbiting codes over the ring with symbol interleaved space-time modulation. After initial theoretical introduction and analysis, the simulation results are presented. It is shown that for different antenna array sizes, different packet sizes and two kinds of channels the Turbo space time tailbiting coding have a clear advantage over the transmission method with direct truncation.
Download

Paper Nr: 69
Title:

A NEW MULTICAST ROUTING ALGORITHM FOR ZIGBEE NETWORKS

Authors:

Bilge Kartal, Radosveta Sokullu and Tapio Suihko

Abstract: In recent years, wireless sensor networks have become widely spread in many areas including medical applications. Some of these applications outgrow the traditional communication model applied to wireless sensor networks according to which data is flowing towards a single receiver (sink). In the case of medical data acquisition systems more then one receiver is a viable model. In this paper we discuss details on data broadcast algorithms for the 802.15.4 based ZigBee network standard and their applicability to creating sensor networks for medical data applications, focusing especially on transmitting data to multiple receivers (multicast concept). The multicast concept is not currently supported by ZigBee. So we have focused on introducing a multicast communication model and suggested a new algorithm based on ZigBee which is specifically optimized to support multiple sinks. Further on the paper describes our experiences with developing M-Bee, a multicast routing algorithm platform, using the open Microchip’s ZigBee software stack.
Download

Paper Nr: 24
Title:

APPLICATION OF CAUCHY INTEGRAL TO APPROXIMATE THE FIELD COMPONENTS AND CURRENT IN METAL & DIELECTRICAL POLYGONS - Method of the Field (Current) Restoration Inside and Outside Flat Closed Contour based on Its Known Values at the Contour

Authors:

Alexander Ashikhmin, Yu. G. Pasternak, S. L. Podvalny and Yu. A. Rembovsky

Abstract: The Cauchy integral was proposed as a means to approximate the field components and current in metal and dielectrical polygons. The report illustrates that such a technique can significantly scale down electromagnetic issues solved in spatial- frequency domain. The technique also makes it possible to evaluate the strength of electromagnetic field not only inside the considered closed contour, but outside it even in case when there is no a prior information about object configuration and its physical characteristics.
Download

Paper Nr: 75
Title:

A NOVEL APPROACH FOR DESIGNING FRACTAL ANTENNAS

Authors:

David Ni and Chou Hsin Chin

Abstract: Designing fractal antennas for broadband communications, various modifications and optimisations to the fractal patterns, such as Koch or Sierpinski, are adopted for better frequency responses. In this article, we explore a new approach by defining a set of complex functions, zq ΠCi, where Ci=exp(i*gi(z))[(z-vi)/(1-viz)], and then using the shapes of the solution domains of the functions directly as patterns of fractal antennas.
Download

Paper Nr: 84
Title:

CONTRIBUTION AND LIMITS OF A LOSSLESS DATA COMPRESSTION METHOD FOR PERFORMANCE OF OPTICAL WIRELESS CHANNELS IN DIGITAL MULTIMEDEA APPLICATIONS

Authors:

Kamel Moustafa

Abstract: For the digital multimedia communication systems, the modification of the transmission rate, transmission capacity and the bandwidth, parameters are an important for the performance of the Optical Wireless Channel (OWLC). Multilevel-Digital pulse Interval Modulation (M-DPIM) is the most method which contributes in the improving of these parameters. The large size of multimedia sources has been performed the main problem for the data transmission. Thus, in this paper a lossless images compression method by Minimizing Pixels Number of Objects (MPNO) is applied. The properties of the Digital Images Transmission (DIT) with and without compression by using MPNO method are discussed. The compression ratio of the MPNO method compared with other compression methods is evaluated. Transmission Parameters Values (TPV) of the M-DPIM system with and without compressed input by using MPNO method are computed. Finally, for special types of the DIT, the MPNO method has been satisfied good results.
Download

Paper Nr: 97
Title:

ON THE DVB-SH SYSTEM ARCHITECTURE INCORPORATING T-DMB

Authors:

Min Su Shin, Duk-Gil Oh, Un-Rak Choi and Bo-seok Seo

Abstract: In this paper, we investigate the transmission system architecture to incorporate the terrestrial digital multimedia broadcasting (T-DMB) service contents into the DVB-SH systems. The T-DMB is operating in Korea to provide a TV-like service in mobile or static environments. The DVB-SH system provides a variety of mobile multimedia services through hybrid satellite and terrestrial links and has a universal coverage. We propose two methods to provide the T-DMB contents to handheld or mobile terminals via DVB-SH architectures and investigate the features of them.
Download

Area 3 - Mobile Software and Services

Full Papers
Paper Nr: 61
Title:

MATCHING FOR MOBILE USERS IN THE PUBLISH/SUBSCRIBE PARADIGM

Authors:

Ali Roumani and D. B. Skillicorn

Abstract: In a mobile publish/subscribe paradigm, user service discovery and recommendation requires matching user preferences with properties of published services. For example, a user may want to find if there is a moderately priced Chinese restaurant that does not require reservations close by. To generate accurate recommendations, the properties of each user subscription must be matched with those of existing services as accurately as possible. This is a difficult problem when users are mobile, wirelessly connected to a network, and dynamically roaming to different locations. The available data is very large, and the matching must be computed in real time. Existing heuristics are quite ineffective. We propose novel algorithms that use singular value decomposition as a dimension-reduction technique. We introduce “positive” nearest-neighbor matching to find services whose attribute values exceed those of a new user subscription. Making this idea effective requires careful attention to details such as normalization. Performance and quality of matches are reported for datasets representing applications in the mobile publish/subscribe paradigm. For n services and m preference attributes, reasonable matches can be found in time O (m log n), using O (nm) storage.
Download

Paper Nr: 73
Title:

AN INTEGRATED APPROACH TO DEVELOP PERVASIVE MOBILE APPLICATIONS

Authors:

Hiata Anderson de O. Coelho, Ricardo De Oliveira Anido and Alisson Luiz Da Cruz

Abstract: This article introduces the QuickFrame, a development tool that allows mobile applications to run in several different types of mobile devices. That is only possible due to the fact that the QuickFrame possesses a standard specification language and has the capability of defining the application interface, verifying the target devices’ specifications and pre-visualizing the user interface. Therefore, several of the problems caused by the large number of mobile device models available and their different specifications are eliminated. Thru reaching to that goal we have a tool to make mobile applications more pervasive.
Download

Paper Nr: 88
Title:

A FIRE MONITORING APPLICATION FOR SCATTERED WIRELESS SENSOR NETWORKS - A Peer-to-Peer Cross-layering Approach

Authors:

Rodolfo Oliveira, Rodolfo Oliveira, Ricardo Tiago and Paulo Pinto

Abstract: A cross-layering alarm application is proposed for supporting fire fighting operations. It runs on scattered wireless sensor networks (WSN) composed by several isolated WSNs, where sensor nodes can be destroyed by fire. Mobile patrol nodes deploy the alarm monitoring application and collect the alarm records, containing the set of sensor measurements above the threshold values. The application was implemented in TinyOS 2.0, on Telos B motes. It uses a new Multimode Hybrid MAC, which can be controlled by the application. The application uses asynchronous mode when no alarms are active to optimise energy consumption; changes to full on mode (without sleeping) to minimise delay during fire handling situations; and uses the synchronous mode (with reserved bandwidth) during the transference of alarm records to the patrol node, balancing delay and energy saving. The alarm application organises sensor nodes into a clustered virtual overlay network and run a peer-to-peer searching service on top of it. This service is used to locate nodes outside the danger area, and to locate alarm records. The application performance was tested using TOSSIM simulations. Simulations results show the application capacity to capture a fire evolution.
Download

Paper Nr: 103
Title:

THUMBTRIBES: LOW BANDWIDTH, LOCATION-AWARE COMMUNICATION

Authors:

John Moore

Abstract: Mobile application developers need to design their applications with the constraints of the network in mind. In comparison to inexpensive home broadband networks, mobile networks often exhibit high levels of latency and have limited bandwidth. Another significant difference between these networks is the cost of transporting data. Mobile network operators often apply usage tariffs, especially if the customer is on a prepaid service. In such situations, mobile Internet use can prove costly. To help reduce costs, application developers should try to minimise the amount of data their applications communicate. In this paper we present, thumbtribes, an open source project which attempts to add location-awareness to Internet Relay Chat (IRC) in a network efficient manner.
Download

Short Papers
Paper Nr: 63
Title:

INTUITIVE INTERACTION FOR HOME ICT ENVIRONMENTS USING RFID AND BLUETOOTH WIRELESS TECHNOLOGY

Authors:

Montserrat Ros, Matthew D'souza and Adam Postula

Abstract: Different forms of interaction with RFID and Bluetooth enabled devices allow users to access various services. This paper explores intuitive mechanisms for use in the home environment using Bluetooth and Radio Frequency ID (RFID) tag technology. Our approach combines the mobility of wireless communication and the ability to detect user commands by localisation. We discuss the implementation of embedded access points that facilitate the intuitive mechanisms for use with interactive devices such as the digital pen/paper, interactive information board and mobile computing devices. A form of interaction includes the access of web content or services by a user’s mobile computing device by placing it on one of the regions of the interactive information board. Implicit and explicit modes of interaction are also discussed in this paper.
Download

Paper Nr: 65
Title:

A PERSONAL FILE SYSTEM OVER EMAIL STORAGES - Developing Towards a Persistent Internet Storage for Mobile Users

Authors:

Chih-Yin Lin, Shih-Fang Chang and Chen-hwa Song

Abstract: In 2004 Jones (Jones, 2004) developed a software tool called GmailFS that turns GoogleTM Gmail into a two-gigabyte file folder in the personal computer. Such virtual folder is not just an interesting innovation but quite useful as a backup depot hosted remotely at Google. GmailFS is technically sound but relies critically on the hypertext scripts of Gmail web pages. Thus, it can be easily averted by the mail server administrator with minor changes of the html scripts or web topology. In this paper, we use another approach to achieve the same goal of GmailFS and extend the capability to accommodate all email servers rather than just Gmail. The proposed system is named ePFS that utilizes three primitive email protocols, i.e. SMTP and POP3/IMAP, to respectively store and retrieve the data in and from the e-mail servers. In addition, we enforce security features of user privacy, data confidentiality and error recovery in ePFS. The proposed system is a work in progress heading toward a persistent Internet storage for mobile applications.
Download

Paper Nr: 71
Title:

LOCATION BASED GUIDANCE SERVICES IN A MUSEUM ENVIRONMENT: DEPLOYMENT ISSUES AND A PROPOSED ARCHITECTURAL APPROACH

Authors:

Anastasios Zafeiropoulos, Nikolaos Konstantinou, Stavroula Zoi, Emmanuel Solidakis, Panagiotis Stathopoulos and Nikolas Mitrou

Abstract: In this paper we examine the requirements for deploying advanced Location Based Guidance Services in museum and/or exhibition environments, and we propose an architectural approach that copes with these requirements. The proposed architecture provides automatic and on demand audiovisual content retrieval, both on-site and through the Web, to different classes of users. On-site services are provided through Java-enabled devices, which exploit the user’s contextual state, mainly defined as visitor location and organization of exhibits. The main distinguishing characteristic of the proposed architecture is that it separates the positioning system from the content access mechanisms, while being generic to the selection of the localization technology and the terminal device characteristics. Furthermore, it is built as an open, modular platform comprising a core of reusable components and interfaces for supporting different types of services and devices, including widespread Java and Bluetooth enabled smart phones, while being able to reuse already existing content structures. A test case of a museum e-guidance application for Bluetooth enabled smart phones is presented.
Download

Paper Nr: 76
Title:

ON THE USE OF VARIOUS POWER LEVELS TO IMPROVE WIRELESS LAN-BASED POSITIONING - Using Multiple Power Levels With Fingerprinting Algorithms

Authors:

Hendrik Lemelson, Thomas King, Stephan Kopf and Wolfgang Effelsberg

Abstract: When talking about location-based services, one of the key factors influencing the overall service quality is the positioning accuracy that the system can rely upon. Nowadays, wireless LAN hardware supports the variation of the transmission power in a wide range. In this paper, two novel algorithms suitable for extension of common wireless LAN-based positioning systems are presented. These novel algorithms exploit the additional information that can be gained by using one or more non-standard transmission power levels. Our findings indicate that the overall positioning accuracy and reliability can be increased with such an approach.
Download

Paper Nr: 89
Title:

MOBILEAUDIT - A Tool for Contextual Knowledge Management

Authors:

Olaf Thiele, Hartwig Knapp, Martin Schader and Nicolas Prat

Abstract: In many professional activities, the ability to retrieve and store knowledge in a mobile situation is crucial. This need, together with the progress of mobile devices, has led to the emergence of mobile knowledge management. In this paper, we propose a context-aware knowledge management architecture for mobile environments and apply it to an auditing use case. We developed the MobileAudit prototype using the proposed architecture. MobileAudit enables environmental audits according to US as well as European EMAS (ISO 14001) legislation.
Download

Paper Nr: 55
Title:

A FLEXIBLE MOBILE NETWORK MONITORING TOOL

Authors:

Rodrigo Gonçalves, Bruno Miranda and Francisco Cercas

Abstract: This article presents a model to implement an information system to monitor mobile networks using Key Performance Indicators (KPIs). The proposed model encloses not only the KPI calculations but the translation, importing and presentation of data. It also addresses more advanced topics such as system configuration, node dependencies and routing. A description of the system’s implementation is also presented, from two perspectives: high-level components and technology-related issues. The paper finishes with the presentation of a system application: monitoring a KPI using a data plot generated by the system.
Download

Paper Nr: 83
Title:

LINUX MOBILE - A Platform for Advanced Future Mobile Services

Authors:

Frode Sivertsen, Ivar Jørstad and Thanh Van Do

Abstract: Linux has for some time been the operating system of choice for many types of embedded devices (e.g. network devices like routers, as well as multimedia devices like set-top-boxes). Currently, Linux is also gaining momentum as an operating system for mobile phones. This paper studies what it takes to make Linux "go mobile", i.e., what adaptations are necessary to make the Linux kernel fit as a mobile operating system, what is the architecture of such a platform, and what are the major benefits.
Download

Area 4 - Wireless Information Policy, Risk Assessment and Management

Full Papers
Paper Nr: 91
Title:

CHALLENGES OF BUILDING END-TO-END NETWORK TOPOLOGIES FOR MULTI-SERVICE NETWORKS

Authors:

Anne-Marie Bosneag and David Cleary

Abstract: Building an end-to-end view of the network in multi-service networks is a very important building block in creating a correct view of the capabilities of the network and is therefore crucial for service deployment, activation and management. At the same time, it is a very difficult task to achieve. Current inventory solutions are static in nature, which introduces problems of data consistency between the managed domain and the view at the management node. An end-to-end view of the network is also hard to achieve because no common data model is in use today, and inventory information between different domains is very hard, if not impossible, to obtain using the current solutions. This paper discusses the challenges of building an end-to-end view of the network topology, discusses existing solutions, and proposes Stratus, a flexible unified SOA-based architecture that has been implemented and deployed in our lab. Stratus is based on the MTOSI recommendations for inventory retrieval, and comes with a mechanism for data mapping from domain managers for Public Ethernet and Core Wireline Access Networks to the MTOSI model. It also provides dynamic discovery of the different domains in the network, automatic end-to-end topology creation, and notification systems for automatic updates of the topology based on updates in the network. The experiments show that the proposed solution is technically feasible and compatible with existing inventory solutions.
Download

Short Papers
Paper Nr: 49
Title:

A NEW METHODOLOGY FOR ESTIMATING THE SPECTRUM REQUIREMENTS WITH DATA TRAFFIC

Authors:

Eun-Saem Yang, Hwa-Jong Kim and Won-seok Yang

Abstract: In this paper, we present a new methodology for estimating the spectrum requirements of next generation mobile network with multimedia data traffic. In order to fully reflect the characteristics of mobile multimedia data traffic in the spectrum requirement estimation, we take senven factors into account: self-similarity of the data traffic, the layered structure of the data traffic, asymmetry of the data traffic between uplink and downlink, engineered capacity considering QoS, regional simultaneous FA increase, uneven traffic pattern among base stations, and handoff traffic overhead.
Download