R. Sureswaran, H. A. Bazar, O. Abouabdalla, Ahmad M. Manasrah, Homam el-Taj
{"title":"Active e-mail system SMTP protocol monitoring algorithm","authors":"R. Sureswaran, H. A. Bazar, O. Abouabdalla, Ahmad M. Manasrah, Homam el-Taj","doi":"10.1109/ICBNMT.2009.5348490","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348490","url":null,"abstract":"E-mail system is one of the most ubiquitous Internet-based applications today. It enables users to send and receive E-mail messages among each other within and from outside of the local area network. E-mail system is used every day in almost all organizations as a communication tool between managers, employees, customers, and partners for better information flow and conduct business which requires communication with people outside the organization, or from different geographical locations. The E-mail system offers a fast, reliable and easy solution for such communication. SMTP (Simple Mail Transfer Protocol) is a transportation protocol used to transfer E-mail messages over the Internet. All E-mail servers use the SMTP to send E-mails from one E-mail server to another. SMTP is also used to send E-mail messages from E-mail clients to E-mail servers. In this paper, the SMTP E-mail system protocol will be briefly explained. New Active monitoring algorithm architecture is also proposed to improve the current E-mail system protocol functions and detect the SMTP protocol failure during the process of sending E-mail messages.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116728585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the implementation of secure UPnP architecture","authors":"Hu Jia, Zhang Qi","doi":"10.1109/ICBNMT.2009.5348530","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348530","url":null,"abstract":"Universal Plug and Play, or UPnP in short, is a “plug and play” methodology used in network environment. It's designed to share resources, connect network devices and offer control over services. It implements zero-configuration. Developer can save the cost of network setup and concentrate on the offering services only and do not need to concern the under layer protocol. As the wide spreading of UPnP protocol, building a secure UPnP system is becoming more important. The paper introduces a secure UPnP architecture based on the UPnP network and implements the protocols and algorithms of the secure architecture. It is different from create a secure communication channel point to point based on the UPnP devices. We adopted the decentralized mechanisms for key management, analysed the limits of our protocol and proposed the corresponding measures. Finally, we compared with two important protocols using decentralized key management mechanisms, stated their limits and solutions of our scheme.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study and analysis of network delay by simulation","authors":"G. Lijuan, Jiang Taijie, Gao Xiaoling","doi":"10.1109/ICBNMT.2009.5347852","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347852","url":null,"abstract":"Presently, It is paid much attention to network performance, as a main criterion, delay is becoming more and more important. A network model for a certain network is built by simulation software. It analyses the relations among delay, throughput, user number and bandwidth. Then it points out the direction to decrease the network delay by simulation and it can optimize the network performance with the simulation model in the future.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Half-step fotward switch in EPFTS","authors":"Xu Deng-yuan, Zhang Ben-niu","doi":"10.1109/ICBNMT.2009.5347825","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347825","url":null,"abstract":"Most of works, such as looking-up table, queuing and scheduling, are dealt with in traditional switch in serial, which makes the handling capacity in traditional switch become the bottle affecting the switch performance. A novel switch technique called Half-step Forward Switch (HFS) is proposed in this paper to optimize the switch process. HFS makes looking-up table and scheduling be dealt with in parallel, which can relieve the works in switch and can reduce delay and delay jitter in switch node. Simulation results shows that HFS switch can reduce by 6.7% in average delay and reduce by 8.1% in delay jitter compared to conventional switch.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122400096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gao Ying, Lu Xuqing, Wang Xiu-liang, Fei Yi, Guo Shuxia
{"title":"Design and realization of 3D character animation engine","authors":"Gao Ying, Lu Xuqing, Wang Xiu-liang, Fei Yi, Guo Shuxia","doi":"10.1109/ICBNMT.2009.5347860","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347860","url":null,"abstract":"Character animation which is used to show human figure has been extensively applied in VR (Visual Reality) field. Because too much initial work is being repeated, it usually costs more than needed to make character animation, and the technical difficulty is also at a high level. Large game corporations incline to keep the core technologies of character animation as commercial secrets, thus block its development. In this paper, the main framework of a “3D character animation engine” is designed. Great emphasis is put on the principle of different types of character animation and their realization methods. The 3D character animation engine provides consistent APIs for key-frame animation, mixed animation and morph animation. It enable users make character animation through programming in a fast and easy way.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122522872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhang Lin, Sun Hui, Sun Qiang, Guo Changjian, Huang Xueyou, Xun Xiaowei
{"title":"Design and implementation of wireless sensor network node in environment monitoring","authors":"Zhang Lin, Sun Hui, Sun Qiang, Guo Changjian, Huang Xueyou, Xun Xiaowei","doi":"10.1109/ICBNMT.2009.5348542","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348542","url":null,"abstract":"In terms of the demands on environment monitoring, by taking monitoring the area polluted and weather environment as application background, temperature and humidity etc as inspecting parameters, tiny wireless sensor network nodes are designed, the node took the MSP430 ultra low power MCU as the core, and used 2.4G CC2420 RF chip, the solution and implementation of hardware structure of the node were introduced. An experiment for the wireless sensor network nodes communication is made, the experiments results of testing nodes indicate that nodes can gather and process data effectively and communicate successfully between nodes, the technical feasibility of the design are verified by practical testing.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive-factors-based scheduling algorithm for P2P media streaming","authors":"Zheng Quan, Wang Peng, L. Jun, Z. Le, Wang Song","doi":"10.1109/ICBNMT.2009.5348394","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348394","url":null,"abstract":"A comprehensive-factors-based (CFB) scheduling algorithm is proposed for Peer-to-Peer media streaming. In CFB, considering the number of chunks' suppliers and urgency, a priority is defined for each data chunk and the neighbours' bandwidth is effectively evaluated. A peer requests chunks from neighbors according to priorities as well as bandwidth. Simulation results show that the proposed CFB scheduling algorithm for Peer-to-Peer media streaming outperforms conventional scheduling algorithms in peer average throughput, continuity index and start delay.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An interface language of value-added service creation based on capability-injection","authors":"Pang Yuanyuan, Li Jinglin","doi":"10.1109/ICBNMT.2009.5347799","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347799","url":null,"abstract":"Resource-Oriented Architecture is a new Web service modeling method. Based on Capability-Injection (CI) pattern, ROA could be extended for telecommunication value-added service description and creation. With the CI based ROA requirements analysis, a Pub/Sub based capability injection method is proposed in this paper. The Pub/Sub capability utilization will transform the value-added service control logic from interface control to resource statement monitoring. Therefore, the CI interface can be described as uniformed Pub/Sub method. Finally, a new extended language named RSML-QL is introduced to support the Pub/Sub capability. RSML-QL provides method guarantee for service building based on CI model.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A context-aware autonomic packet marking mechanism","authors":"G. Xiang-yang, Li Yan, Cheng Jieyao, W. Wendong","doi":"10.1109/ICBNMT.2009.5347819","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347819","url":null,"abstract":"Autonomic network is an important research field in network architectures. Since autonomic attributes such as context-aware, self-configuration, self-optimizing and self-management are introduced, autonomic network is capable of adapting to the heterogeneous and complex network environments. In this paper, context-aware and autonomic mechanisms are introduced into the DiffServ QoS framework and a novel context-aware autonomic packet marking mechanism (CAPM) is proposed. CAPM is capable of collecting various QoS related contexts, and adaptively adjusting network behavior to provide QoS guarantee according to users' QoS requirements and network conditions. Simulation results show that CAPM provides better performance than traditional packet marker, and improves user's quality of experience.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wireless video transmission system using RCPT/FEC","authors":"Duan Da-gao, Han Zhongming, Li Wenzheng","doi":"10.1109/ICBNMT.2009.5348467","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348467","url":null,"abstract":"The real-time delivery of video data over wireless is a big challenge due to the unreliable and dynamic characteristics of wireless networks, limited bandwidth and high QoS requirements for multimedia applications. According to features of wireless channels, this paper proposes a robust scheme using Rate Compatible Punctured Turbo (RCPT) codes and Forward Error Correction (FEC) parity codes for video stream distribution in wireless access environments. In the scheme, the rate of video data is adjusted based on statistics of Packet Loss Ratio (PLR) and Bit Error Ratio (BER). The RTCP feedback information to the sending end which carries bit error ratio, network packet loss ratio and transmission delay, is used to adjust the RCPT codes and FEC parity encoding. At the same time the packet video data is packed into the different size. The experiment shows that this scheme can provide more satisfied video playback quality in 3G wireless networks with different bit error ratio and packet loss ratio, and also can improve overall network utilization efficiency.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132129221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}