A. Rodríguez, Marc Moreno, E. Cespedes-Borras, J. Carrabina
{"title":"Platform-independent web-based iTV services through DVB-PCF transcoding","authors":"A. Rodríguez, Marc Moreno, E. Cespedes-Borras, J. Carrabina","doi":"10.1109/ICBNMT.2009.5348538","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348538","url":null,"abstract":"Production and maintenance of interactive digital television (iTV) services can be a hard task due to the diversity of deployed digital television (DTV) platforms and the differences in terms of capabilities and functionalities between the receiver devices. The Digital Video Broadcasting (DVB) Portable Content Format (PCF) is a standard platform-independent service description which specifies the viewer experience in an iTV platform. It allows a unified authoring through a later transcoding to the final device. This paper proposes a workflow to produce and maintain platform-independent web-based iTV services from the application design level to the final deployed service through that standard. Moreover, this paper details the main characteristics of an implemented PCF to web-based platform transcoder, which can be applied to most IPTV and WebTV platforms.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129854103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new mobile multicast method based on the THMLD protocol","authors":"Jianfeng Guan, Huachun Zhou, Li Xi, Hongke Zhang","doi":"10.1109/ICBNMT.2009.5347848","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347848","url":null,"abstract":"Some mobile multicast schemes have been proposed in the past few years, but most of them study the reconstruction of multicast delivery tree, but little consider the mobile group membership management. In this paper, we propose a new mobile multicast method based on Two-Hop Multicast Listener Discovery (THMLD) protocol which provides the mobile multicast membership management function by forwarding the MLD messages to its neighboring subnets. To evaluate its performance, we set up the simulation platform and compare it with the traditional mobile multicast methods. The simulation results show that the proposed method can reduce the multicast join delay significantly.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127872840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LESG: Learning and economic based scheduler implementation","authors":"L. M. Khanli, Nahideh Derakhshan Fard","doi":"10.1109/ICBNMT.2009.5347796","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347796","url":null,"abstract":"In a dynamic environment like grid with huge number of subtasks, flexible approach is necessary to manage resource allocation. Grid is a robust technique in parallel computing. The central component of grid is resource management system (RMS). The main functions of RMS are scheduling and allocation of subtasks. The goal of this paper is to provide an optimal learning solution for dynamically choosing appropriate resource. In this paper we introduce an intelligent approach to schedule subtasks based on reinforcement learning. That is named LESG. In LESG a flexible allocation according to subtasks and resources attributes, increases performance of gird.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121484851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fairness evaluation of the default highspeed TCP in common operating systems","authors":"Xuening Miao, Qiu Feng, Dong Ping, Qin Yajuan, Zhang Sidong, Zhang Hongke","doi":"10.1109/ICBNMT.2009.5347821","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347821","url":null,"abstract":"Since the TCP protocol implements in the internet, the AIMD algorithm has always been the dominating congest control algorithm for about 20 years, and most of the common operating systems follow the recommendation of the IETF to adopt the AIMD algorithm in their TCP variations. But in recent years, many high-speed congest control algorithms have been proposed for fast data transfer over high speed and long distance networks, and many operating systems take the high-speed TCP variations as default: the Linux kernel uses CUBIC TCP as default since version 2.6.18, while Compound TCP becomes default TCP in Windows Server 2008 and a part of Microsoft Windows Vista, where it is easy to be enabled. As there are still not sufficient and comprehensive performance comparison of the high-speed TCP variations, the deployment of them as default TCP in the operating systems raises concerns about the future of congest control in the internet and worries about the fairness problem. This paper is an attempt to evaluate the fairness of the default TCP in the newest Linux and Microsoft Windows. The simulation results indicate that between CUBIC TCP and Compound TCP it indeed exhibits unfairness. The CUBIC TCP is too aggressive to the Compound TCP in the high bandwidth-delay product network, and the performance of Compound TCP is unacceptable comparing to CUBIC TCP.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132324343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new reliable multicast scheme for multimedia applications in wireless environment","authors":"Wang Chaohui, L. Yuhong, Han-Chiang Li, Ma Jian","doi":"10.1109/ICBNMT.2009.5347781","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347781","url":null,"abstract":"With the constant development of multimedia technologies and mobile devices, the demand of transmitting multimedia streams to mobile devices will be one of the major applications in wireless networks. However, IEEE 802.11 does not support reliable multicast due to its inability to exchange ACKs with multiple recipients and the influence of signal interference, congestion and hidden terminal problems. It is not suitable for the real-time multimedia transmission in this environment. In this paper, we propose a new reliable multicast scheme to solve the above problems by using a three-layer scheme. Our simulation results show that the performance of the wireless network with this proposed reliable scheme is much better than the original 802.11 protocol. The loss rate of the packets transmitted in this reliable 802.11 environment decreased a lot and the throughput of this reliable wireless environment performed constantly well compared with the original 802.11 protocol for mobile nodes.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High performance Deep Packet Inspection on multi-core platform","authors":"Wang Cong, J. Morris, W. Xiaojun","doi":"10.1109/ICBNMT.2009.5347845","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347845","url":null,"abstract":"Deep Packet Inspection (DPI) provides the ability to perform Quality of Service (QoS) and Intrusion Detection on network packets. But since the explosive growth of Intrnet, performance and scalability issues have been raised due to the gap between network and end-system speeds. This article describles how a desirable DPI system with multi-gigabits throughput and good scalability should be like by exploiting parallelism on Network Interface Card, network stack and user applications. Connection-based Parallelism, Affinity-based Scheduling and Lock-free Data Structure are the main technologies introduced to alleviate the performance and scalability issues. A common DPI application L7-Filter is used as an example to illustrate the applicaiton level parallelism.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116868202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection mechanism with differentiated service reliability in multi-domain optical networks based on conditional risk disjunction degree","authors":"Z. Jihong, Qu Hua, Wang Li","doi":"10.1109/ICBNMT.2009.5348517","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348517","url":null,"abstract":"In order to improve survivability of Multi-Domain Optical Network (MDON) and differentiate service reliability, this paper provides a Protection mechanism with Differentiated Service Reliability in MDON based on Conditional Risk Disjunction Degree (CRDD), called PDRC. Firstly, defines CRDD, provides Intra-domain virtual links Reflection arithmetic based on CRDD considering wavelength Continuity (IRCC) to form aggregation topology, then provides Arithmetic of Computing work route and backup route with Differentiated service reliability based on CRDD (ACDC) to compute work route and backup route in aggregation topology. The results verify that the proposed protection mechanism not only differentiate service reliability, but also reduce blocking rate of service and improve usability of network.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"25 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114013558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of hierarchical vulnerability assessment method","authors":"L. Rui, Yan Dan-feng, Lin Fan, Y. Fangchun","doi":"10.1109/ICBNMT.2009.5348535","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348535","url":null,"abstract":"Network vulnerability assessment has carried out a certain degree of research work in relative field. The common method for vulnerability assessment is hierarchical asset vulnerability assessment, in which vulnerability value is fixed and the weight of service is subjective. Thus the accuracy of calculation depends on experience and judgment. In this paper, according to CVSS (Common Vulnerability Assessment System) theory, a method that takes environment factors into consideration is proposed for asset vulnerability assessment using information collected by vulnerability scanning tool. As an optimization of original method, this method is more accurate than original method.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Header extraction with SOA-MZI in optical packet networks","authors":"Niu Changliu, Zhang Min, Ye Peida","doi":"10.1109/ICBNMT.2009.5348508","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348508","url":null,"abstract":"In this paper, a novel approach based on Semiconductor Optical Amplifier Mach-Zehnder interferometer (SOA-MZI) for extracting the bit-serial header from optical packet is proposed Numerical analysis and simulation show that more than 15dB contrast ratio of the separated header at 2.5Gbit/s to the suppressed payload at 40Gbit/s achieved. In addition, the SOA-MZI parameters are discussed and designed to optimize the performance of the proposed scheme.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115605188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of high-speed modulaiton of 1.3μm InAs/InGaAs quantum dot VCSELs","authors":"C. Tong, D.W. Xu, S. Yoon, Y. Ding, W. Fan","doi":"10.1109/ICBNMT.2009.5347816","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347816","url":null,"abstract":"The influence of quantum dot (QD) density, uniformity and layer number on the 3dB bandwidth of 1.3μm InAs-InGaAs QD VCSELs is investigated by the small signal analysis of all-pathway rate equations. The dependence of bandwidth on the QD density is shown. Linearly dependence of bandwidth on the QD uniformity is demonstrated. High speed operation (> 10GHz) of QD VCSEL emitting at 1.3μm is predicated.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}