{"title":"PG: a novel scheme to distinguish bursty packet loss from random loss in heterogeneous network","authors":"Jinsen Xu, Weidong Chen","doi":"10.1109/ICESS.2005.75","DOIUrl":"https://doi.org/10.1109/ICESS.2005.75","url":null,"abstract":"In this paper, we propose a PG scheme. PG is a group of packets, which consists of more than two packets sent back to back with no delay between consecutive packets. The packets sent in such a fashion are not only for transmitting the data, but also for probing network state. Through this scheme, the bursty packet loss can be discriminated from the random packet loss at the receiver in the wired/wireless heterogeneous network. The experiments are conducted in the emulated heterogeneous network, and the results show that this scheme works well and efficiently.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated access device (IAD) solution using Intel IXP2350 network processor","authors":"Yan Chen, Naiqi Liu, Kecheng Zhang","doi":"10.1109/ICESS.2005.65","DOIUrl":"https://doi.org/10.1109/ICESS.2005.65","url":null,"abstract":"This paper introduces a solution of integrated access device (IAD) using IXP2350. Firstly, this paper describes IAD and IXP2350 hardware architecture and the benefit of using IXP2350 for an IAD solution. Then this article introduces the hardware and software design of this IAD solution. This solution use Intel IXP-C and auto-partitioning programming model and implements the basic functions IAD needs including voice and wireless processing, DiffServ, traffic management, etc.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"25 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116834154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective vertical handoff scheme supporting multiple applications in ubiquitous computing environment","authors":"Chung-Pyo Hong, Tae-Hoon Kang, Shin-Dug Kim","doi":"10.1109/ICESS.2005.24","DOIUrl":"https://doi.org/10.1109/ICESS.2005.24","url":null,"abstract":"An intelligent network management should be designed to satisfy all the requirements of applications designed for ubiquitous computing environment. Recently there may be several heterogeneous network interfaces in the same location, where a mobile terminal needs switching from one wireless interface to another. However, most of vertical handoff mechanisms are based on the network information or requirements of any single application. Thus, they cannot perform vertical handoff (VHO) at the right time and do not satisfy all the applications running on any mobile terminal. To overcome this problem, we propose an efficient scheme to solve multi-application situation by designing application manager and VHO decision manager. The proposed scheme performs VHO after checking the quality of service (QoS) in factor by factor. Factors of the abstracted profile are used to verify the QoS of networks. By performing VHO in this way, we can design an effective handoff decision algorithm and consequently this algorithm provides a multi-application oriented and QoS enhanced VHO scheme.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129993032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile NodeID based P2P algorithm for the heterogeneous network","authors":"Kyungbaek Kim, D. Park","doi":"10.1109/ICESS.2005.69","DOIUrl":"https://doi.org/10.1109/ICESS.2005.69","url":null,"abstract":"A lot of research papers discussed the distributed hash table (DHT) based p2p algorithms to promise that idle resources may be efficiently harvested. However, p2p systems are composed of components with extremely heterogeneous availabilities and to handle churn, the system will generate the heavy information maintenance traffic to keep the efficiency of the DHT based p2p algorithms. In this paper, we suggest the mobile ID based p2p algorithm to reduce the overhead by exploiting the heterogeneity of participant nodes efficiently. Unlike the DHT based p2p algorithms, the node ID of a node changes according to its characteristic to support the p2p system efficiency and each nodes takes the different responsibility in accordance with its node ID. We classify nodes into the two types according to the characteristics of nodes : the reliable nodes and the leaf nodes. The reliable node has the load-balanced ID to balance the loads and the leaf nodes has the load-free ID to reduce the responsibility. We examine the efficiency of our p2p algorithm via a event driven simulation and show that the information maintenance traffic reduces and the routing process is more efficient.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wireless payment system","authors":"Jerry Gao, Jacky H. Cai, Kiran Patel, Simon Shim","doi":"10.1109/ICESS.2005.17","DOIUrl":"https://doi.org/10.1109/ICESS.2005.17","url":null,"abstract":"The swift advance of wireless networking, communication, and mobile technology is making a big impact to daily life. The significant increase of mobile device users in the recent years causes a strong demand on secured wireless information services and reliable mobile commerce (m-commerce) applications. Since mobile payment (m-payment) is a critical part of most wireless information services and applications, how to generate secured m-payment systems has become a hot research topic. This paper proposes a peer-to-peer m-payment system, known as P2P-Paid to allow mobile users to conduct wireless payments over the Bluetooth communications and to perform related secured transactions with the server. This paper introduces backgrounds, related work, and the system communication protocol, and provides system overview, security solution as well as implementation report.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A task-specific approach to dynamic device power management for embedded system","authors":"Wang Yue, Zhao Xia, Chen Xiangqun","doi":"10.1109/ICESS.2005.12","DOIUrl":"https://doi.org/10.1109/ICESS.2005.12","url":null,"abstract":"One of the major challenges of dynamic device power management lies in the uncertain length of the idle periods of devices. In this paper, we focus on the problem of the accuracy of prediction when tasks change their request modes, leading the change of the device idle periods. We notice that there are some reasons causing the change of the idle periods. In order to capture these reasons, we first establish a two-level power management mechanism in the operating system. Then we provide a task-specific approach, which is based on the relationship between tasks and devices and takes dynamic weight of predictive value and actual value. Experiments show that our approach could save more than 40% power consumption and was more efficient and accurate than previous predictive policies.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of wireless gateway communication protocol for distributed monitoring systems","authors":"Zhiping Jia, Zheng Liu","doi":"10.1109/ICESS.2005.45","DOIUrl":"https://doi.org/10.1109/ICESS.2005.45","url":null,"abstract":"This paper is concerned with the problems of the wireless gateway communication protocol for distributed monitoring systems. For large-scale monitoring systems, the wireless gateway is needed to improve the communicating ability. We present the framework of the wireless gateway protocol stacks, which can be used in embedded systems. By introducing the mechanism of segment caching and local retransmission to the TCP protocol, the process working mode of the protocol stacks can be improved. The result of this paper demonstrates that the scheme can effectively raise the real-time character and compatibility of the wireless gateway communication protocol.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132945780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved dominating set indices for mobile peer-to-peer networks","authors":"Shanping Li, Wei Shi, Xin Lin, C. Nizamuddin","doi":"10.1109/ICESS.2005.64","DOIUrl":"https://doi.org/10.1109/ICESS.2005.64","url":null,"abstract":"According to 2-hop neighborhood information, dynamic dominant index set (DDIS) (W. Shi and S. Li, 2005) is constructed to cache metadata of shared resources in mobile ad hoc network (MANET). However, DDIS presents poor performance on system overhead and user satisfaction. To adapt network mobility, peers in DDIS have to periodically advertise their shared resources over the entire network, which consumes more bandwidth. In this paper, an improved dominating set indexing mechanism (IDSIM) for mobile peer-to-peer networks is proposed. In IDSIM, partial dominating sets automatically adjust themselves to the change of network topology in a distributed fashion. Metadata of identical resources belonged to deferent peers is clustered in one dominating set. This potentially increases in amount of query results with short latency to achieve considerable high user satisfaction. Based on random walk (C. Gkantsidis et al., 2004), query message roams in the network to maximize the number of results. Experiments indicate that besides greatly reducing the system overhead, IDSIM simplifies search process and, at the same time, improves user satisfaction without sacrifice of user response time.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The implement of status-checking on the platform of IXP1200 [implement read as implementation]","authors":"Bo Ning, Yichao Li, Naiqi Liu","doi":"10.1109/ICESS.2005.94","DOIUrl":"https://doi.org/10.1109/ICESS.2005.94","url":null,"abstract":"On the platform of IXP1200, we implement the status-checking module. We explain the core of the status-checking, the details in implementation and the influence on the performance. In this paper we introduce some new techniques in the implementation which is much different with the implementation before. And we analyze the feasibility of implementing the status-checking on the IXP2000 platform, based on the MicroACE architecture, from the whole dataflow, key technique and the performance influence. At last we get some test data to show the influence range.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116254964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Test case generation based on time constraints","authors":"A. Cavalli, E. Vieira","doi":"10.1109/ICESS.2005.89","DOIUrl":"https://doi.org/10.1109/ICESS.2005.89","url":null,"abstract":"In real-time systems there are some messages exchanged within the system which must respect a certain delay, otherwise, the system cannot be considered correct. The test phase is essential in order to guarantee the correctness of these systems, and this phase cannot be correctly carried out unless all these factors are taken into account. This paper presents a test generation approach that looks at the use of time constraints and the messages exchange among the components for test purposes. In order to achieve our goal, we have adopted an efficient algorithm, called hit-or-jump, provided in a tool called Sirius, which supports the complete test generation phase.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122842165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}