{"title":"Collecting and analyzing mobility data from mobile network","authors":"Yanfeng Weixiong Zhu Shang, Zhou Jin, Ying Chun","doi":"10.1109/ICBNMT.2009.5347791","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347791","url":null,"abstract":"Collecting and analyzing massive mobility data from mobile network is becoming an emerging research topic in past years. It is proved to have great potential in lots of domains, e.g. intelligence traffic system, urban analysis, public safety etc. However, due to variety of data collection mechanisms, the data characteristics are various and need to be abstracted. In this paper, we outline the mobility data collection approaches and identify the differentiation in data characteristics and data process requirements. Then we propose an extendable framework which provides general data abstraction and universal data process flow for various mobility data. The experiment results are also presented to prove the framework.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114597437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threshold-based mechanism for analysing multiple flows TCP congestion behavior","authors":"Zhu Ming, Z. Lijun","doi":"10.1109/ICBNMT.2009.5348503","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348503","url":null,"abstract":"In this paper we present new modeling and analysis a threshold-based mechanism for characterizing the TCP congestion avoidance during multiple connections. We develop two models which are source centric model and network centric model that relative to the threshold respectively. We obtain the closed form solution for TCP throughput via simple analysis and present the pseudo-code for the threshold mechanism. The performance of our model are verified and compared with the actual date by ns simulations. Results indicate that our model is able to capture the behaviour of TCP throughput quite accurately. Our technique enables simple analysis of TCP and other TCP-like congestion control mechanism.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Nana, Gan Yong, Chen Chang-hai, Feng Yuan, Chen Yan
{"title":"Probability of packet success of ad hoc networks with sib based power control","authors":"Li Nana, Gan Yong, Chen Chang-hai, Feng Yuan, Chen Yan","doi":"10.1109/ICBNMT.2009.5347822","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347822","url":null,"abstract":"Probability of packet success of ad hoc networks is determined by two factors, one is the probability of successful transmission at the receiver, and the other is the probability of successful detection at the detector. In this paper, we study the probability of successful transmission by using the Poisson model with SIR based power control. Taking direct sequence scheme with binary phase shift keying for example, the expression to the probability of packet success is derived. For the exact expression to the probability of packet success can not be obtained, we provide the asymptotic expression. Finally, the performance of probability of packet success and the accuracy of asymptotic expression are studied by using simulation and numerical results.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A buffer level clock recovery based on least mean squares in PTN","authors":"Lv Shuai, Lu Yueming, Jia Yuefeng","doi":"10.1109/ICBNMT.2009.5347827","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347827","url":null,"abstract":"Packet Transport Network (PTN) supports multiple services, including legacy TDM service. Clock recovery mechanism is essential technology for TDM over packet networks. As the buffer level clock recovery method in PTN is highly sensitive to the Packet Delay Variation (PDV), a buffer level clock recovery based on least mean squares (LBL) is proposed. Simulation results show that LBL can effectively remove the negative contribution of packet delay jitter and provide more accurate clock recovery at the destination than traditional scheme.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An advanced location based service (A-LBS) on mobile social network","authors":"Fengyu Dong, Xuerong Gou","doi":"10.1109/ICBNMT.2009.5347780","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347780","url":null,"abstract":"Advances in the innovation about service pattern, and the rapidly growing number of mobile personal devices result in the fast growth of Mobile Social Network Service (MSNS). This paper just analyzes and compares the existing MSNS applications, and proposes the concept of MSNS. In this paper we also concentrate on the realization of the interaction method between the three-dimensional virtual world of the Internet and the human real world, and this service pattern is named as “A-LBS”. The implement of the system platform make users have a possibility to experience the similarly real life in the virtual world. Besides, the application of new technologies, such as Geographic Information System, is also one of the innovation points in the industry of MSNS. Finally, the initial stage of interaction platform has already been proposed and implemented.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121904661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A P2P streaming model based on IPv4/IPv6 coexisting network environment","authors":"Chen Zhuo, Ou Yang, Li Yan","doi":"10.1109/ICBNMT.2009.5347833","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347833","url":null,"abstract":"Peer-to-peer (P2P) technology has become as a promising scalable solution to offer high-quality streaming multimedia to a large number of consumers at reasonable cost. Many existing systems have been deployed based on IPv4 network environment 1] ^ [2]. IPv6 protocol has been seemed as a core component in Next Generation Internet(NGI) and the P2P streaming scheme which can be implemented in a IPv4 and IPv6 coexisting network environment is rarely concerned. This paper addresses the architectural and fundamental design issues for supporting P2P streaming applications based on IPv4 and IPv6 coexist network environment. Our motivation is P2P streaming systems can be designed and implemented through a layered model and different layers in this novel model can implement different kinds of important functions. Our main focuses include the future P2P streaming applications design and their essential demands. Simulation results show that our model hold the higher efficiency than other protocol oftern in use, and can guarantee the data exchanging in a security way.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125981051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scheme based on mobility for on-demand route protocol in ad hoc networks","authors":"Z. Jie, Qu Zhaowei","doi":"10.1109/ICBNMT.2009.5347840","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347840","url":null,"abstract":"Broadcasting, which usually incurs serious problems by flooding, is a common operation in MANET (mobile Ad hoc networks), especially in on-demand route protocol. In order to relieve such limitations, in this paper, we propose an improvement over the former blind flooding approach by using a scheme based on the mobility of nodes (MON). In MON scheme, we categorize mobile hosts into active nodes and inactive nodes according to their relative high or low mobility. Inactive nodes forward packets for other nodes while active nodes do not. In simulation, we approve the advantages of our approach in most cases by comparing it with AODV in terms of several metrics. Finally, the advantages and disadvantages of MON are concretely analyzed in theory.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129562057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel queuing model for IMS-based IPTV system","authors":"W. Jianhui, Jin Hao, Wu Wenguang","doi":"10.1109/ICBNMT.2009.5347855","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347855","url":null,"abstract":"IPTV is considered as one of the killer applications in the future. Many standardization organizations such as ITU-T and ETSI are working on standardizing the Next Generation IPTV system. Basically, two different approaches have been defined for Next Generation IPTV system, namely IMS-based solution which reuses the IMS core components as its service controller, and non-IMS approach which has its own service control subsystem known as black box. This paper follows the IMS-based approach and presents a testbed including the basic components of the IMS-based IPTV, which can be used to simulate the real communication environment and test the performances of the IMS-based IPTV system. The IMS registration delay and IPTV call setup time obtained from the testbed are provided, and a novel queuing model for basic IMS-based IPTV system which is verified by the results of our testbed is shown in this paper.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126502492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient video similarity search strategy for video-on-demand systems","authors":"Cao Zheng, Zhu Ming","doi":"10.1109/ICBNMT.2009.5348473","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348473","url":null,"abstract":"The video-on-demand systems and video share web are more and more popular in recent years. Video similarity search for content-based video retrieval is important in web service and research field. There is still no satisfying search method for scalable fast similarity search in large video database. In order to solve two challenging problems: video similarity measure and fast search method in large database, a novel efficient video similarity search strategy for video-on-demand systems is proposed in this paper. A compact video signature was computed according to image histogram and spatial-temporal features of video. The video similarity is measured by the computation of the distance of video signature. For the scalable computing requirement, a new search method based on Clustering Index Table was presented by index clustering. The experimental results from the query tests in large database show this method is highly efficient and effective for similar video search.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121566071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The development research of IPSEC-VPN based on address-split-mapping mechanism","authors":"Zhou Hua-chun, Liu Ying, Guan Jianfeng","doi":"10.1109/ICBNMT.2009.5347846","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347846","url":null,"abstract":"Currently, Internet, adopting the TCP/IP suits, is an end-to-end architecture. TCP/IP is an open architecture, and its design principle only focuses on the efficiency of information transmission, while it does not consider the security issues. IPsec VPN has been proposed to solve the core network security issue. However, it is believed that the current use of IP addresses to denote both the location and the identity of a host is seen as the source of many Internet problems. Address-split-mapping network cleanly separates location from identity of host, and divides Internet into the backbone network and access network. This mechanism helps to solve the Internet problems such as security, mobility, multihoming, etc. Based our previous research work on Address-Split-Mapping mechanism, this paper describes the design, implementation and experiment results of IPsec-VPN based on Address-split-mapping.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122981844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}