M. Cesana, A. Redondi, N. Tiglao, A. Grilo, J. Barceló-Ordinas, Mohammad Alaei, P. Todorova
{"title":"Real-time multimedia monitoring in large-scale wireless multimedia sensor networks: Research challenges","authors":"M. Cesana, A. Redondi, N. Tiglao, A. Grilo, J. Barceló-Ordinas, Mohammad Alaei, P. Todorova","doi":"10.1109/NGI.2012.6252168","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252168","url":null,"abstract":"Wireless Sensor Networks (WSNs) have enjoyed dramatic developments over the last decade. The availability of CMOS cameras and microphones enlarged the scope of WSNs paving the way to the development of Wireless Multimedia Sensor Networks (WMSN). Among the envisaged WMSN applications, Real-time Multimedia Monitoring constitutes one of the most promising. However, the resource requirements of these applications place difficult challenges in terms of network lifetime and scalability. This paper starts by identifying the main characteristics and requirements of Real-time Multimedia Monitoring applications and then highlights key research directions that may help to overcome those challenges.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact on retail prices of non-neutral wholesale prices for content providers","authors":"G. D'Acquisto, P. Maillé, M. Naldi, B. Tuffin","doi":"10.1109/NGI.2012.6252142","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252142","url":null,"abstract":"The impact of wholesale prices is examined in a context where the end customer access both free content and pay-per-use content, delivered by two different providers through a common network provider. We formulate and solve the game between the network provider and the pay-per-use content provider, where both use the price they separately charge the end customer with as a leverage to maximize their profits. In the neutral case (the network provider charges equal wholesale prices to the two content providers), the benefits coming from wholesale price reductions are largely retained by the pay-per-use content provider. When the free content provider is charged more than its pay-per-use competitor, both the network provider and the pay-per-use content provider see their profit increase, while the end customer experiences a negligible reduction in the retail price.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131208343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beacon-enabled cognitive access for dynamic spectrum access","authors":"Said Rutabayiro Ngoga, Yong Yao, Adrian Popescu","doi":"10.1109/NGI.2012.6252164","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252164","url":null,"abstract":"In dynamic spectrum access networks, the unused licensed spectrum used by primary users (PU) is opened to unlicensed secondary users (SU) for improving spectrum efficiency. We design a simple time-based threshold policy for collective protection of PUs, enabled by an out-of-band channel. In particular, multiple SUs may be widely distributed in a geographic location. The interference that collocated SUs cause to each other, termed self-interference, becomes a major source that may degrade the SUs communication performance. We establish an analytical framework for carrier sense multiple access (CSMA) based coexistence mechanisms when integrated into a family of time based threshold policies, and study its performance though theoretical analysis.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Collange, Mahdi Hajji, Junaid M. Shaikh, M. Fiedler, P. Arlos
{"title":"User impatience and network performance","authors":"D. Collange, Mahdi Hajji, Junaid M. Shaikh, M. Fiedler, P. Arlos","doi":"10.1109/NGI.2012.6252146","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252146","url":null,"abstract":"In this work, we analyze from passive measurements the correlations between the user-induced interruptions of TCP connections and different end-to-end performance metrics. The aim of this study is to assess the possibility for a network operator to take into account the customers' experience for network monitoring. We first observe that the usual connection-level performance metrics of the interrupted connections are not very different, and sometimes better than those of normal connections. However, the request-level performance metrics show stronger correlations between the interruption rates and the network quality-of-service. Furthermore, we show that the user impatience could also be used to characterize the relative sensitivity of data applications to various network performance metrics.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Giner, P. Wüchner, Diego Pacheco-Paramo, H. Meer
{"title":"Combined contention and TDMA-based communication in wireless sensor networks","authors":"V. Giner, P. Wüchner, Diego Pacheco-Paramo, H. Meer","doi":"10.1109/NGI.2012.6252158","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252158","url":null,"abstract":"Wireless sensor networks usually consist of a large number of very small, energy-constrained sensor nodes. The nodes capture information from their immediate environment to send it to a destination node (sink) in a timely manner. This work proposes a combined contention and TDMA-based approach for load balancing and a discrete-time Markov model that allows to study the trade-off between energy consumption and transfer delay in clustered wireless sensor networks. Our investigations show that the length of the TDMA frame needs to be configured close to the minimum that is capable of transferring the offered load for optimizing energy efficiency and minimizing the delay.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128288581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Guijarro, V. Pla, B. Tuffin, P. Maillé, Pierre Coucheney
{"title":"A game theory-based analysis of search engine non-neutral behavior","authors":"L. Guijarro, V. Pla, B. Tuffin, P. Maillé, Pierre Coucheney","doi":"10.1109/NGI.2012.6252143","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252143","url":null,"abstract":"In recent years, there has been a rising concern about the policy of major search engines, and more specifically about their ranking in so-called organic results corresponding to keywords searches. The associated proposition is that their behavior should be regulated. The concern comes from search bias, which refers to search rankings based on some principle different from the expected automated relevance. In this paper, we analyze one behavior that results in search bias: the payment by content providers to the search engine in order to improve the chances to be located and accessed by a search engine user. A simple game theory-based model is presented where both a search engine and a content provider interact strategically, and the aggregated behavior of users is modeled by a demand function. The utility of each stakeholder when the search engine is engaged in such a non-neutral behavior is compared with the neutral case when no such side payment is present.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Grilo, A. Casaca, P. Pereira, L. Buttyán, José Gonçalves, C. Fortunato
{"title":"A Wireless Sensor and Actuator Network for improving the electrical power grid dependability","authors":"A. Grilo, A. Casaca, P. Pereira, L. Buttyán, José Gonçalves, C. Fortunato","doi":"10.1109/NGI.2012.6252167","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252167","url":null,"abstract":"This paper presents an overview of a Wireless Sensor and Actuator Network (WSAN) used to monitor an electrical power grid distribution infrastructure. The WSAN employs appropriate sensors to monitor key grid components, integrating both safety and security services, which improve the grid distribution dependability. The supported applications include, among others, video surveillance of remote secondary substations, which imposes special requirements from the point of view of quality of service and reliability. The paper presents the hardware and software architecture of the system together with performance results.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outage probability, average transmission time, and quality of experience for cognitive radio networks over general fading channels","authors":"Hung Tran, H. Zepernick, M. Fiedler, Hoc Phan","doi":"10.1109/NGI.2012.6252159","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252159","url":null,"abstract":"In this paper, we examine the delay performance in cognitive radio networks (CRNs) over general fading channels where secondary users are allowed to simultaneously access the spectrum licensed by primary users. In particular, subject to the peak interference power constraint, we investigate the effect of general fading channels on the delivery delay of data packets and acknowledgements (ACKs). A lower bound of outage probability and an upper bound of average transmission time are derived by utilizing the concept of timeout. Specifically, we apply the above results to investigate the quality of experience (QoE) for various fading channels, such as one-sided Gaussian, Rayleigh, Nakagami-m and Weibull channels. The numerical results indicate that the delay of ACKs under severe fading leads to a degradation of system performance.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Martínez-Bauset, Alexandru Popescu, V. Pla, Adrian Popescu
{"title":"Cognitive radio networks with elastic traffic","authors":"J. Martínez-Bauset, Alexandru Popescu, V. Pla, Adrian Popescu","doi":"10.1109/NGI.2012.6252160","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252160","url":null,"abstract":"We model and evaluate an infrastructure based cognitive radio network where impatient unlicensed or secondary users (SUs) offer elastic traffic. The interference created by SUs to the licensed users is analyzed when the secondary network uses two different spectrum access schemes, the conventional random access scheme and a new scheme we refer to as access with preference. To further control the interference, a limit is set to the number of channels SUs have access to. With this new constraint, the abandonment probability, the mean delay and throughput of the SUs degrades significantly. To improve the QoS perceived by the active SUs, we define and evaluate an admission control scheme for the SUs.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128379171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast but economical: A simulative comparison of structured peer-to-peer systems","authors":"I. Baumgart, Bernhard Heep","doi":"10.1109/NGI.2012.6252169","DOIUrl":"https://doi.org/10.1109/NGI.2012.6252169","url":null,"abstract":"In the past many proposals for structured peer-to-peer protocols have been published. They differ in properties like overlay topology and routing table maintenance. Furthermore, each protocol exhibits various parameters e.g. to adjust the size of the routing table or stabilization intervals, making it difficult to choose an optimal protocol and parameter set for a given scenario (e.g. churn rate, number of nodes). For this purpose, we developed the overlay simulation framework OverSim and implemented six well known structured overlay protocols. In this paper we first compare these protocols among each other. Furthermore, we study several recursive and iterative routing variants and show the effect of routing table redundancy and lookup parallelism on routing latency and bandwidth costs. For each overlay protocol we identify an optimal parameter set for a typical peer-to-peer scenario. Finally, we show how overlay protocols adapt to variations in churn rate and network size. Our results show considerable advantages of the protocols Kademlia and Bamboo, while De Bruijn based protocols reveal a lack of stability under churn.","PeriodicalId":314384,"journal":{"name":"Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127835424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}