R. V. Prasad, J. Kuri, H. Jamadagni, Haresh Dagale, R. Ravindranath
{"title":"Automatic addition and deletion of clients in VoIP conferencing","authors":"R. V. Prasad, J. Kuri, H. Jamadagni, Haresh Dagale, R. Ravindranath","doi":"10.1109/ISCC.2001.935403","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935403","url":null,"abstract":"In a conference, considering the packets only from a set of selected clients can reduce the degradation of the quality of speech because mixing packets from all clients can lead to lack of clarity in the speech of any participants. The automatic selection should be smooth and should not cause frequent interruptions. A method of selecting the clients for mixing is suggested here based on a new quantifier of the voice activity called loudness number (LN). The dependence of the loudness number on the amplitude of the packet at present and the past activity is clearly brought out. The structure of the packet used has been explained. A method to avoid echo and enhance the quality of the conference is presented. The contributions of the paper are expected to aid in the implementation of H.323 recommendations for the multipoint processors (MP). A working prototype based on the proposed loudness number is already functional.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114684302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Abdel-Hamid, S. Ghanem, K. Maly, H. Abdel-Wahab
{"title":"The software architecture of an interactive remote instruction system for heterogeneous network environments","authors":"A. Abdel-Hamid, S. Ghanem, K. Maly, H. Abdel-Wahab","doi":"10.1109/ISCC.2001.935451","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935451","url":null,"abstract":"At Old Dominion University, we have designed and implemented a Java-based distance education system, which we term IRI-h (for Interactive Remote Instruction-heterogeneous). IRI-h is designed to function on a number of heterogeneous platforms, and within heterogeneous network environments. IRI-h builds on the success of its predecessor system IRI, but attempts to avoid a number of identified pitfalls and deficiencies such as platform dependence, poor scalability, and the need for a homogeneous controlled network environment. We present the design and software architecture of IRI-h which continues to offer audio, video, and tool sharing services within a synchronous virtual classroom environment, albeit in a platform independent manner. Furthermore, the proposed architecture accommodates class participants with no multicast capabilities, or limited connectivity bandwidth by offering tunneling, and rate adaptation services.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130101921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of packetized layered space-time detection over wireless links","authors":"S. Sfar, R. Murch, K. Letaief","doi":"10.1109/ISCC.2001.935435","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935435","url":null,"abstract":"ALOHA systems are some of the most attractive options for wireless applications which include packet transmission. However, despite their flexibility and simplicity, they present a very low channel throughput. The objective of this paper is to analyze the performance of such a protocol based layered space-time scheme over wireless communication links. A multiuser environment is hence considered in which each user carries only one transmit antenna. A generalization of Vertical-Layered Space-Time (V-BLAST) technique for BPSK modulation is then invoked to detect the transmitted signals through the use of multiple receive antennas at the base station. We asses in this paper the gain achieved by the proposed receiver; denoted by rT-BLAST, compared to the conventional V-BLAST system. We first consider the performance of this system over flat fading channels for a variety of system parameters. Then, throughput and delay performance are analyzed under different packetized traffics. It is demonstrated through simulation results that a significant improvement in system capacity, throughput and delay are achieved.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124672206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ghassan Chaddoud, Isabelle Chrisment, André Schaff
{"title":"Dynamic group communication security","authors":"Ghassan Chaddoud, Isabelle Chrisment, André Schaff","doi":"10.1109/ISCC.2001.935354","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935354","url":null,"abstract":"If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. We present the protocol, Baal, as a scalable solution to group key management problems and show how Baal resolves the user's revocation problem. This protocol is based on decentralized group key management with only one key shared among group members. We use then Network Simulator ns-2, in order to evaluate the performance of our protocol in the case of group initialization, and compare it with single key distribution center (SKDC) approaches.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124884645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPMoA: Integrated Personal Mobility Architecture","authors":"Binh Thai, A. Seneviratne","doi":"10.1109/ISCC.2001.935419","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935419","url":null,"abstract":"The high expectations and demand for users to access the Internet from anywhere at anytime has made user mobility an important part of the design and development of the next generation mobile communications and computing. Traditionally user mobility has been divided into two areas: terminal mobility and personal mobility. Terminal mobility has been the focus of researchers, with personal mobility somewhat lagging behind. Although there are research in personal mobility, researchers have taken a very discrete approach of the two directions in this area: personal mobility in communications and personalisation of operating environments. We introduce a new personal mobility framework called IPMoA (Integrated Personal Mobility Architecture), with the use of mobile agents, integrates both aspects of personal mobility to provide a complete personal mobility solution.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Bettahar, Christophe Beaujean, A. Bouabdallah, S. Cateloin
{"title":"A simple resource reservation protocol for multicast communications","authors":"H. Bettahar, Christophe Beaujean, A. Bouabdallah, S. Cateloin","doi":"10.1109/ISCC.2001.935366","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935366","url":null,"abstract":"In this paper we propose a framework for a simple resource reservation protocol for multicast communications in the Internet. In contrast to RSVP, where heavy setup mechanisms are used, our protocol is traffic driven and does not use special messages for resource reservation, refresh or release. The reservation session is managed by the flow data packets themselves. Our protocol is suitable for resource reservation in dynamic and rearrangeable multicast environments. It also tolerates nodes and links failures by instantaneously allowing a new resource reservation on alternative paths.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Auto-adaptive preliminary approach to compose multimedia telecom services","authors":"Z. Choukair, S. Sfar","doi":"10.1109/ISCC.2001.935423","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935423","url":null,"abstract":"The upcoming 3/sup rd/ telecommunication telephony generation is setting forth a new set of challenges in the development and deployment of numerous telecom services which follow the requirements and expectations of end-users. This paper describes our approach to provide the user with an environment to set up his own preferences when using such multimedia telecom services. Our purpose is to keep services, profiles and behaviors unchanged and just compose them in a safe way in purpose to generate added value services that answer to the end user expectations. The first implementation is provided and tested on Web applications where we integrate the user profiles with no modification on the XML document. In particular we describe how we adapt the representation according to the end-user requirements. Then we extend our approach to a more flexible system. Our purpose was to provide an environment for end-user QoS control of multimedia telecom services that integrate behavior as well as profiles. We also present our evaluation of the approach that has been realized and the future study.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An AAA architecture extension for providing differentiated services to mobile IP users","authors":"T. Braun, L. Ru, G. Stattenberger","doi":"10.1109/ISCC.2001.935417","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935417","url":null,"abstract":"Differentiated services (DiffServ) are not yet fully adapted and integrated with mobile environments, especially when mobile IP is used as the mobility management protocol in the Internet. When a mobile node visits a foreign network and requests services based on service level agreements (SLAs), the DiffServ Internet service providers (ISPs) must care about how to charge the mobile user. In addition, SLAs have to be renegotiated between home/foreign links and their ISPs. Authentication, authorization and accounting (AAA) procedures must be provided. This paper proposes a concept to combine the service location protocol and the mobile IP AAA based architecture. It is independent of the availability of a foreign agent (FA) and works for IPv4 or IPv6 in a uniform manner. The architecture supports mobile telephony over packet-based IP networks without requiring GSM-like mobility management and accounting schemes.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicast for small conferences","authors":"T. Braun, Linqing Liu","doi":"10.1109/ISCC.2001.935367","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935367","url":null,"abstract":"This paper describes a concept to support scalable multicast communications for small audio/video conferencing groups on the Internet. The solution presented in this paper is based on extensions of IPv6 and the session description protocol (SDP). A goal of the concept called multicast for small conferences (MSC) is the smooth deployment in the Internet.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of wideband smart antenna systems using different frequency compensation techniques","authors":"M. Hefnawi, G. Delisle","doi":"10.1109/ISCC.2001.935381","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935381","url":null,"abstract":"Smart antenna systems have recently played a central role in removing narrowband multiple-access interference (MAI) in wireless communications. However, if these adaptive systems are proposed for wideband wireless communications the addition of some form of frequency compensation is required. The frequency compensation methods which have been examined are the spectral decomposition, focussing and interpolating techniques. Their performances are compared on the basis of the resulting array patterns. The three frequency compensation techniques are combined with the constant modulus algorithm (CMA) for the adjustment of adaptation weights. Simulation results showing the performance of the system with and without compensation are given and discussed.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117001629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}