{"title":"Centralized Management of Data Collection over Hybrid Networks","authors":"","doi":"10.1109/INTERNET.2010.39","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.39","url":null,"abstract":"This paper presents an example of technology integration useful for the Public Administrations in order to offer services to their citizens. In particular, we describe some applications of sensor networks that exploit hybrid access networks (fiber, wireless, TETRA) based on real prototypes realized by Lepida S.p.A., a company owned by the Public Administrations promoted by the Italian Emilia Romagna Region. A centralized architecture devoted to the data collection, management and publication is discussed and some possible solutions in order to integrate pre-existent autonomous sensor systems in the new efficient centralized one are presented. This system offers the Public Administrations a promising solution for reducing the total costs of the whole service.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Satellite Challenges","authors":"William W. Wu","doi":"10.1109/INTERNET.2010.15","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.15","url":null,"abstract":"The current extension of communications, embracing terrestrial and space domains, raises a few legit questions in terms of business model, compatibility, and sustainability. Related to Internet satellites, this paper considers the following questions: Who are the US-based major operational Internet satellite organizations? What was the ambitious plan, and why did it fail? What are the basic incompatibilities of Internet and satellite communications, in terms of system philosophy, operational efficiency, and network architectures? Why are there so many difficulties for practical improvement? How to prevent large-scale Internet breakdowns? What may be the potential solutions?","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128698479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Overview IEEE 802.16e QoS Scheduling Algorithms","authors":"Daniel Ndiki, H. Helgert, S. Hussein","doi":"10.1109/INTERNET.2010.22","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.22","url":null,"abstract":"One of the most significant promises in today’s integrated packet-switched broadband wireless networks (such as WiMAX) is providing Quality of Service (QoS) guarantees to data, voice and video applications. These applications range from real-time applications with stringent QoS requirements, to best effort applications with no required guarantees. These applications with different QoS requirements interact with one another when they are multiplexed at the same output links. Lack of control during packet interactions will degrade network performance. Using scheduling algorithms to provide QoS, wireless networks are able to integrate applications with a wide range of traffic characteristics. We present an overview of QoS mechanism in the media access control (MAC) sublayer of WIMAX wireless networks and provide a comparative overview of scheduling schemes architecture proposed in WIMAX research literature.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Accessibility on Spanish Universities","authors":"Juan Manuel Fernández, Jordi Roig, Vicenç Soler","doi":"10.1109/INTERNET.2010.43","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.43","url":null,"abstract":"The access to the Universities studies is one of the most important steps to obtain a total integration of the people with disabilities. Spanish laws about Web Accessibility, force to the public institutions, including Universities, to accomplish the basic normative WCAG since 2002. In this paper we present a study of the accessibility on the Spanish University’s Web sites. We want to determine how the level of fulfilment, 8 years later, is. It is focused on the selected Universities at “Campus of International Excellence” program and it analyzes the correctness of the accessibility’s normative and also the compliance to the standards of the grammar on the used languages.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Yampolskiy, Wolfgang Hommel, B. Lichtinger, Wolfgang Fritz, M. Hamm
{"title":"Multi-domain End-to-End (E2E) Routing with Multiple QoS Parameters - Considering Real World User Requirements and Service Provider Constraints","authors":"M. Yampolskiy, Wolfgang Hommel, B. Lichtinger, Wolfgang Fritz, M. Hamm","doi":"10.1109/INTERNET.2010.12","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.12","url":null,"abstract":"The growing amount of international collaborations in research, education, and business fields has raised once again the demand for quality assurance of network connections, which the projects and applications are realized upon. A large spectrum of examples with diverse requirements is found in areas such as emph{GRID} and emph{cloud computing}, eLearning, video on demand, and video-conferencing. The consequences of these diverse project and application requirements culminate in the urgent necessity to provide an End-to-End (E2E) guarantee for any user-tailored combination of service-specific Quality of Service (QoS) parameters. The quality of the overall network connections provided to users directly depends on the quality of the involved connection parts. This means that already during the routing process the quality of available connection parts has to be considered. Especially for international connections it is common that multiple service providers (SPs) realize different connection segments. At the same time the inter-domain routing is driven mostly by the combination of business interests and restrictive information policies. This means that during the routing not only the optimality of the available connection parts has to be considered, but also the preferences and restrictions of the involved provider domains. In this paper, we present an inter-domain routing algorithm for distinguishing the E2E route for dedicated point-to-point connections. The proposed algorithm considers both the E2E user requirements for service quality and the service provider constraints. The proposed algorithm is not restricted to consider a sole quality parameter and can therefore be used for the establishment of connections with the user-tailored combination of connection properties, including service quality as well as connection management functionality.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"53 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129979166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Gateway Discovery Techniques: IPv6-Based Wireless Sensor Networks","authors":"Dhananjay Singh, Daeyeoul Kim","doi":"10.1109/INTERNET.2010.47","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.47","url":null,"abstract":"The paper is devoted to logical implication of MANet’s protocols for gateway discovery in IPv6 Wireless Sensor Networks (IPv6-WSN). We implement three approaches in NS-2 simulator and evaluate its performance under the specified field of the networks of gateway discovery. The performance results present the packet delivery ratio and delay of end to end communication networks. The AODV protocol is used to modify and implement an IPv6-WSN. We use three types of configuration phase for gateway discovery, proactive, reactive, and hybrid gateway discovery. We discuss the mechanisms of this gateway method and packet formats. The IPv6-WSN network is used for transmission of IPv6 packets. It is based on the combinations of IEEE802.15.4 and IPv6. The IPv6-WSN is based on a 6 lowpan (IPv6 over low power wireless personal area network) stack specified into the rfc’s and drafts of IETF working group.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thiago Stahlschmidt, Walter Godoy Junior, A. Foronda
{"title":"A Resource Management Framework Based on the Many Sources Asymptotic for Video-on-Demand Servers","authors":"Thiago Stahlschmidt, Walter Godoy Junior, A. Foronda","doi":"10.1109/INTERNET.2010.24","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.24","url":null,"abstract":"This paper proposes a framework for admission control of pre-stored video streams, which provide deterministic guarantees on the maximum delay of video traffic and increase the network resource utilization. The framework take advantage of the fact that video streams can be processed off-line to calculate the space and time parameters in order to estimate its effective bandwidth under the many sources asymptotic regime. To bypass the traffic prediction problem, since the off-line estimation does not capture the exact dynamics of the video stream in the time domain, the link is divided into several virtual links, where only streams with same content are multiplexed (group multiplexing approach). The efficiency of the model is analyzed and compared with the deterministic approach. It achieves accuracy and high channel utilization.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114314854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlled Access to the Internet, Prevention of Illicit Uses and Fundamental Rights - A Criminal Law Experience in Light of the Italian \"Google Case\"","authors":"Gabriele Marra","doi":"10.1109/INTERNET.2010.48","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.48","url":null,"abstract":"The sentence of an Italian criminal court against three top mangers of Google received much attention in Italy and abroad. It may be considered a “leading case” on the debate over the criminal responsibility of Service Providers (abbr. SP) for the omission of the duty to monitor the use of the Internet for illicit scopes and to prevent the commission of computer related crimes. The sentence did not recognize the existence of such general duty but sentenced to jail the three managers for the infringement of Italian privacy law. According to Court opinion the three manager did not complain with the duty to acquire the consent of all the individuals before the treatment of their personal data. A duty extended by the Court’s decision to the case of the uploading, in GoogleVideo, of a defamatory video even if the treatment of personal data of the victim was made not by Google but by the uploader of the video. The Court bringing out the contents of privacy regulation created, at least, for the all SP, a de facto duty to prevent criminal conducts committed by others. This statement will be discussed underling that the active collaboration of SP with criminal law enforcement agencies is necessary for real security reasons but may be considered a lawful tool in the social control of computer related crime only if pressing limits of proportionality principle are satisfies.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Traffic Prediction Capability of Neural Networks Using Sliding Window and Multi-task Learning Mechanisms","authors":"J. Rodrigues, A. Nogueira, P. Salvador","doi":"10.1109/INTERNET.2010.11","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.11","url":null,"abstract":"Due to the diversity of network services and the unpredictability of their behaviors, there is an increasing need for tools that can aid in the global management of IP networks. Being able to predict network data can be very useful to anticipate network upgrading decisions or changes on the network functional operation. This paper proposes a practical approach, based on neural networks, that is able to predict network traffic in a specific network link. In order to improve the prediction capabilities of the different neural network models, sliding window and multi-task learning mechanisms are introduced and tested. By applying this prediction framework to different network links, it will be possible to predict the evolution of the global network traffic and use this information for network security, management and planning purposes. The results obtained by applying the proposed model to realistic network scenarios show that this concept can achieve excellent performance in the prediction of the network traffic on the selected links. The prediction is accurate even when there are significant changes in the number of users and their respective profiles. Moreover, the proposed prediction approach is generic and can be used to predict different network data with a very satisfactory accuracy, even with simple and small NN models.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125515328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving VoIP Traffic Performance in WiMAX Networks","authors":"Iwan Adhicandra","doi":"10.1109/INTERNET.2010.49","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.49","url":null,"abstract":"Recently, a promising technology called WiMAX is providing wireless last-mile connectivity due to its high speed data rates, low cost of deployment, and large coverage area. Both MAC and Physical layer of this technology refer to the IEEE 802.16e standard, which defines five different data delivery service classes that can be used in order to satisfy Quality of Service (QoS) requirements of different applications, such as VoIP, FTP, videoconference, Web, etc. The main aim of this paper is to examine a case of QoS large cell deployment over a cellular WiMAX network. In particular, the paper compares the performance obtained using ertPS service class for voice application in static and mobile conditions. Results indicate that on WiMAX connection statistics, traffic contract was made correctly by considering the overheads, and the performance of voice in mobile environment showed an acceptable level for Mean Opinion Score at around 3.55 until 100 seconds.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"1172 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}