{"title":"Optimal link scheduling for multimedia QoS support in Wireless Mesh Network","authors":"T. Abdelkader, S. Naik, A. Nayak","doi":"10.1109/IMSAA.2008.4753924","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753924","url":null,"abstract":"Supporting multimedia quality of service (QoS) is a necessary and critical requirement for next generation wireless networks. Wireless Mesh Networking is envisioned as an economically viable paradigm and a promising technology for supporting multimedia QoS. The non-mobile mesh routers with the capability of having less-constrained transmission power are the distinct characteristics for this type of wireless networks. Exploiting these capabilities provides better solutions for allocating network resources such as bandwidth, and supports satisfying QoS requirements. Using these characteristics, we propose a QoS-aware link scheduling scheme for wireless mesh networks (WMNs). The scheme allocates time slots and transmission power to the network nodes in a way that maximizes the spatial reuse of the network bandwidth. In this paper, we study two cases: a mesh network with battery-powered devices and a network with outlet-powered devices. Using computer simulations, we show that the QoS constraints for the different traffic flows can be met, for the two cases, in addition to maximizing the network throughput.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121799973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deployment of IPTV over IMS architecture","authors":"Mohammad Zahid, M. Qadeer, Arshad Iqbal","doi":"10.1109/IMSAA.2008.4753940","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753940","url":null,"abstract":"IPTV is a system used to deliver digital television services to the consumers through broadband. This delivery of digital television is made possible by using Internet Protocol over a broadband connection, usually in a managed network rather than the public Internet to preserve quality of service guarantees. The Internet Protocol (IP) multimedia subsystem, better known as ldquoThe IMSrdquo, is based on the specification of the session initiation protocol (SIP) as standardized by the Internet Engineering Task Force (IETF). IMS is an architecture for the convergence of data, speech and mobile networks and is based on a wide range of protocols, of which most have been developed by the IETF. It combines and enhances them to allow real time services on top of the universal mobile telecommunications system (UMTS) packet-switched domain. This paper presents various standardization efforts for IPTV, deployment of IPTV over IP Multimedia Subsystem. It further also deals the advantage of IMS based IPTV, its implementation challenges, performance and capacity , and testing requirement.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131053845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility management for multihomed mobile networks using backup registration","authors":"Lu Li-hua, Li Yuan-An, Wang Qiu-Tian","doi":"10.1109/IMSAA.2008.4753922","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753922","url":null,"abstract":"Owing to inherited shortcomings such as poor survivability and limited resource in network mobility basic support protocol, multihoming mechanism is introduced to network mobility management to improve robustness, aggregate Bandwidth, provide reliability and achieve ubiquitous access. In this paper a mobility management solution is proposed for multihomed mobile networks based on backup registration. By extending binding unique identifier sub-option with backup flag, mobile router can register its backup care-of address on its home agent to create backup entry which can be used not only to transmit packets after MRpsilas current link can not work well but also to share load as normal registration. Then packets can be delivered through multiple paths, even if MRpsilas link is broken, packets can get to destination through backup care-of address. Handover can be implemented before entire mobile network totally disconnects from current visiting network, so no communication interruption will be caused during handover. By adopting the idea of getting information before connecting, mobile router can choose proper router as its new access point to achieve route optimization.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134645694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PhishGuard: A browser plug-in for protection from phishing","authors":"Y. Joshi, S. Saklikar, D. Das, S. Saha","doi":"10.1109/IMSAA.2008.4753929","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753929","url":null,"abstract":"Phishing is an act of identity theft aimed at acquiring sensitive information such as usernames, passwords, credit card detail etc., by masquerading as a trustworthy entity in an electronic communication. Phishers use a number of different social engineering mechanism such as spoofed e-mail to try to trick their victims. Data suggests that some of the phishing attacks have convinced up to 5% of their recipients to provide sensitive information to spoofed websites resulting in a direct loss of multi Billion Dollars across the countries. Though there are many existing anti-phishing solutions, Phishers continue to succeed to lure victims. In this paper, we have proposed a novel algorithm which aims at identifying a forged website by submitting random credentials before the actual credentials in a login process of a website. We have also proposed a mechanism for analysing the responses from the server against the submissions of all those credentials to determine if the website is original or phished one. Though our idea is generic and would work in any authentication technologies which are based on exchange of any credentials, our current prototype is developed for sites supporting HTTP Digest Authentication and accepting userid and password pair as credential. Our algorithm is developed within a browser plug-in for Mozilla FireFox v3.0. and can detect phishing attack conclusively.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"64 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115277596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Miura, M. Kusaka, K. Sasaki, K. Sato, Y. Takeda, T. Nishikata
{"title":"A development of Local Area Tele-Conference Network","authors":"Y. Miura, M. Kusaka, K. Sasaki, K. Sato, Y. Takeda, T. Nishikata","doi":"10.1109/IMSAA.2008.4753915","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753915","url":null,"abstract":"In recent days, the environment of communication is developed. In such environment, when multimedia contents such as video and audio data are transmitted, it seemed to be able to realize pleasant environment of communications to encode or transmit adaptively to resources such as terminal or network. In response to this situation, we previously developed a software-based real-time MPEG (Moving Picture Experts Group) system for streaming live video. We are now implementing this system in our laboratory for use as a tele-conference system. For this system, we proposed a VOP decision-making algorithm that can adaptively choose the arrangement of VOPs (Video Object Planes) according to the CPU power of a terminal. When live movies from video cameras are streamed in real-time environments, low latency is necessary so that users are not bothered by system latency. In this paper, we describe the outline of the local area tele-conference network and we report how to estimate the cost for time of encoding and communication when transmitting MPEG-4 objects in our system.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Avudaiammal, R. SivaSubramanian, R. Pandian, P. Seethalakshmi
{"title":"Implementation of packet classification algorithm in NetworkProcessor based router to enhance multimedia applications","authors":"R. Avudaiammal, R. SivaSubramanian, R. Pandian, P. Seethalakshmi","doi":"10.1109/IMSAA.2008.4753935","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753935","url":null,"abstract":"The objective of this paper is to implement the Tuple Pruning Search(TPS) based packet classification algorithm in two different mappings namely Parallel mapping and Pipelined mapping for Network Processor(NP) based router to support multimedia applications. The performance is evaluated using Intel IXP2400 NP Simulator. The results demonstrate that, TPS has better classification rate and lesser memory occupancy than Tuple Space Search algorithm. Parallel mapping of TPS based algorithm achieves better performance than the Pipelined mapping and is well suited to achieve high speed packet classification to support multimedia applications.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":" November","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A declarative authentication and authorization framework for convergent IMS/Web application servers based on aspect oriented code injection","authors":"Luis López Fernández, Micael Gallego Carrillo","doi":"10.1109/IMSAA.2008.4753912","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753912","url":null,"abstract":"Incorporating security to large Java applications is a tricky and sometimes difficult task, which may increase code complexity, development costs and unmaintainability. For these reasons, some frameworks are emerging which facilitate the inclusion of security processes (i.e. authentication and authorization) in a declarative way through aspect weaving. In this context, ACEGI is the reference framework being used today by thousands of large web applications. However, there is not such a framework when dealing with SIP/IMS development. In this direction, the objective of this paper is to present an extension of ACEGI, which enables developers a seamless use of this powerful framework for creating secured Java applications based on SIP. This approach has a number of advantages including the fact that authorization and authentication processes can be incorporated easily into SIP/IMS applications and that we can use the same security framework for developing convergent SIP/Web secured applications without the need of duplicating the security code.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of mobile handset recovery from radio link failure in a multi-RATS environment","authors":"D. Das, S. Saha","doi":"10.1109/IMSAA.2008.4753932","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753932","url":null,"abstract":"Radio link failure (RLF) is a common phenomenon in all radio access technologies like GSM or UMTS or wireless-LAN etc., when the radio channel signal strength is weak to continue with the application. RLF is a local event detected by mobile handset (or user equipment-UE) immediately and network nodes come to know later. It is also difficult to recover for the UE due to low signal. Hence, RLF has to be dealt locally by the UE. In case of RLF, 3GPP specification indicates to release of dedicated data and signaling resources which leads to discontinuation of the application. In order to avoid discontinuation of application one of the solution proposed to use other available RAT (radio access technology) from multi-RATs in the UE. A few literatures present the possibility of single-RAT or multi-RATs RLF recovery [2-11]. However, to the best of authorspsila knowledge, none of these publications present any performance evaluation for selecting an available RAT from multi-RATs environment after a RLF. In this paper, the authors have investigated the impact of three key parameters namely, RSSI (received signal strength identifier), QoS (quality of service), connection re-establishment time for RLF recovery across all available RATs. The analytical studies show that, two times increase in radio resources along with three times increase in number of mobile handsets experiencing RLF, the probability of success of RLF recovery increases significantly. Furthermore, one of the studies reveals that, when mean utilization of resources in the cells increases by 50% and the number of mobile handsets suffering from RLF increase by two times, the probability of success of RLF recovery decreases by 15%.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134359079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A context sensitive, yet private experience towards a contextually apt recommendation of service","authors":"A. Seetharam, R. Ramakrishnan","doi":"10.1109/IMSAA.2008.4753941","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753941","url":null,"abstract":"With a growing number of services, a greater demand on end-user time and falling average revenues per user, context sensitive applications can provide the needed enhanced experiences. The question arises as to whether such context sensitive experiences can be delivered while simultaneously addressing the apparently conflicting demand of end-user privacy. To put the problem in perspective a framework to gauge the success of such applications is presented. In the light of a specific experience enhancing application, sensitive to end-user context namely the recommendation of services, we propose an architecture. Also described is a semantic knowledge model for the recommendation of service, a key enabling artifact for the ldquoright service in the right contextrdquo experience. The paper ends with an examination of the feasibility of the proposed solution.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zero-Cost Negative-Cost (ZCNC) mobile messaging","authors":"R. Avasarala, S. Saha, S. Saklikar, P. Subramanya","doi":"10.1109/IMSAA.2008.4753914","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753914","url":null,"abstract":"In this paper, we present a novel application for subsidizing the cost of SMS-based messaging, especially in mobile operator networks which have started showing the ldquointentional missed callrdquo phenomenon. The existing SMS infrastructure is augmented with an advertisement capability, borrowed from the Internet model to either subsidize the cost of or even provide a credit to the SMS originating User. In addition to user-to-user messaging, this application can also find acceptance in small and medium sized enterprises, which rely on SMS-messaging to reach their consumers. We describe an overall architecture for the proposed Zero-Cost Negative-Cost (ZCNC) mobile messaging, with related discussion on itpsilas different usage scenarios.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}