B. Staehle, Matthias Hirth, R. Pries, Florian Wamser, D. Staehle
{"title":"Aquarema in action: Improving the YouTube QoE in wireless mesh networks","authors":"B. Staehle, Matthias Hirth, R. Pries, Florian Wamser, D. Staehle","doi":"10.1109/BCFIC-RIGA.2011.5733220","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733220","url":null,"abstract":"Internet access networks in general and wireless mesh access networks in particular, are the bottleneck of today's communication networks and consequently most strongly responsible for determining the user satisfaction. The limited bandwidth and the fact that access network are most often used as mere bit pipes are however unfavorable for the users' quality of experience (QoE). The lack of application-specific service guarantees is especially inadequate in the face of an increasing degree of heterogeneity of Internet applications and their individual service requirements. Application and quality of experience resource management, Aquarema for short, addresses this challenge by enabling application specific network resource management and thereby improves the user QoE. This is achieved by the interaction of application comfort (AC) monitoring tools, running at the clients, and a network advisor which may trigger different resource management tools. AC quantifies how well an application is running and in particular, enables a prediction of the user experience, thereby allowing the network advisor to act upon an imminent QoE degradation. We demonstrate the appeal of Aquarema at the example of YouTube video streaming in a congested IEEE 802.11 based mesh testbed where AC-aware traffic shaping guarantees the successful video playback.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116694810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takeshi Takahashi, H. Hazeyama, Daisuke Miyamoto, Y. Kadobayashi
{"title":"Taxonomical approach to the deployment of traceback mechanisms","authors":"Takeshi Takahashi, H. Hazeyama, Daisuke Miyamoto, Y. Kadobayashi","doi":"10.1109/BCFIC-RIGA.2011.5733214","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733214","url":null,"abstract":"The development of cyber society has fostered the emergence of e-commerce, which is active with business and private transactions. Nevertheless, it also emboldened malicious activities that damage users' profit in the society. Among these activities, Distributed Denial of Services (DDoS), which imposes an excessive workload on network entities such as hosts, is one of the most devastating form of attacks and can cause complete malfunctioning of cyber society's infrastructure. In order to counter DDoS and facilitate secure and reliable functioning of cyber societies, various types of traceback mechanisms have been proposed that trace the entire attack path or partial attack path of the attacks. In the future, networks will need to accommodate such traceback functionalities. This paper proposes a taxonomy of traceback mechanisms and describes their characteristics. It also discusses issues toward the deployment of the mechanisms over the Internet.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The influence of WPA2 security on the UDP performance of IPv4 and IPv6 using 802.11n WLAN in Windows 7-Windows 2008 environment","authors":"S. S. Kolahi, H. Singla, M. Ehsan, Clarence Dong","doi":"10.1109/BCFIC-RIGA.2011.5733211","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733211","url":null,"abstract":"The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP was noticed at packet size 1408 bytes where IPv4 provided 31.48 Mbps and IPv6 provided 24.33 Mbps higher throughput in the open environment. The performance of IPv4 and IPv6 are also compared.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise security perimeter — E-mail server protection","authors":"Nikita Skabcovs, A. Latkov","doi":"10.1109/BCFIC-RIGA.2011.5733237","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733237","url":null,"abstract":"Nowadays, a problem of data protection is the main research object of numerous companies and scientists. Email gateway always will be one of the main components of security perimeter. It helps to protect the internal network from the large varieties of hacker's attacks such as phishing and social engineering. In our previous research we have developed concept and prototype of protection system. Now we bring it to live.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy preservation for personalised services in smart spaces","authors":"Were Oyomno, P. Jappinen, Esa Kerttula","doi":"10.1109/BCFIC-RIGA.2011.5733234","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733234","url":null,"abstract":"Context-awareness in pervasive smart spaces exposes intuitively useful services. These services implicitly annotate users' personal information with contextual cues to individualise experiences. Mobile terminals have positioned most domestic and business users as potential consumers of these services. To alleviate the inconveniences of small screens, compact keyboards and users' limited attention span, personalised services tend towards transparency. As the services become more transparent requiring less user intervention, the more personal and context information they solicit. Richer contextual and deeper personal information facilitates better automation and adaptation. Unfortunately, transparent soliciting, acquiring and handling of personalisation constructs raises privacy concerns. We argue that, privacy policies enforced through reputable authority preserves and safeguards compromises regarding personal information. To this we propose a Privacy Policy Enforcement Authority to monitor and regulate service adherence to policy stipulations. Addressed concerns are; disclosures, retention, use and repurpose of personalisation attributes.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134221857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Questioning flooding as a routing benchmark in Opportunistic Networks","authors":"Muhammad Arshad Islam, M. Waldvogel","doi":"10.1109/BCFIC-RIGA.2011.5733215","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733215","url":null,"abstract":"Routing in Opportunistic Networks, as a relatively young discipline, still lacks coherent, simple and valid benchmarks. It is customary to use epidemic routing as performance benchmark for Opportunistic Networks. We identify and describe the current simulation practices that do not expose the shortcomings of flooding as an upper bound. In this paper to provide a step towards a routing benchmark, which is flexible, provides results close to an upper bound, is simple to implement, and thus might be a candidate for a common benchmark. This new method called EPO1, does not suffer from bottlenecks that limit the performance of epidemic flooding, even when bandwidth is scarce. Our analysis shows that networks are not suffering from that much severe congestion as suggested by flooding and thus giving a better insight to the underlying network.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125776849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Efthymios Koutsogiannis, Fani Tsapeli, V. Tsaoussidis
{"title":"Bundle Layer End-to-end Retransmission Mechanism","authors":"Efthymios Koutsogiannis, Fani Tsapeli, V. Tsaoussidis","doi":"10.1109/BCFIC-RIGA.2011.5733233","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733233","url":null,"abstract":"Delay Tolerant Networking (DTN) has been proposed as a global overlay architecture to provide network connectivity in challenged environments such as deep-space communications field. Bundle Protocol along with its convergence layer protocols transform end-to-end reliability into questionable hop-by-hop reliable communication and imposes a two-tier routing policy that allows flexible routes only within regions. In this paper we propose a Bundle layer end-to-end reliability mechanism (BLER) and evaluate its performance in a DTN testbed in conjunction with similar mechanisms. We highlight the advantages of BLER mechanism in space communication scenarios which cannot be adequately addressed by the current DTN architecture and hop-by-hop reliability mechanisms in general.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DCF/DSDMA: Enhanced DCF with SDMA downlink transmissions for WLANs","authors":"Ruizhi Liao, B. Bellalta, C. Cano, M. Oliver","doi":"10.1109/BCFIC-RIGA.2011.5733223","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733223","url":null,"abstract":"Multi-user MIMO is a promising technology to enhance the performance of WLANs. However, the MAC protocol of the IEEE 802.11 standard (the DCF MAC protocol) is not able to solve the new coordination and synchronization issues that are needed to enable multiple simultaneous transmissions. This paper presents an enhanced MAC protocol for Downlink SDMA in WLANs where only the Access Point is equipped with multiple antennas. Compared to the traditional WLANs, results show that the proposed protocol is able to exploit the benefit of multiple antennas at the Access Point, providing significant performance gains in terms of throughput and delay as well as the most suitable number of active users that a WLAN can support.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active ring antenna with tunable local oscillator","authors":"J. Verhaevert, P. Van Torre","doi":"10.1109/BCFIC-RIGA.2011.5733209","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733209","url":null,"abstract":"In this paper research on active integrated antennas is reported. Those active integrated antennas are able to send and receive modulated data with very simple hardware. For this purpose an existing microstrip antenna design is examined and further adapted and improved. The adapted antenna is hence integrated into the design of a receiver with a tunable local oscillator (LO). The necessary hardware for this tunable LO is also presented. The frequency is selected by means of a Voltage Controlled Oscillator (VCO) based on a PLL (Phase Locked Loop). A 60 dB amplifier is additionally placed at the output of the antenna. The antenna described in this paper can be used to send and receive different types of modulated data, for a wide range of applications.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129114948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of Experience based optimization of heterogeneous multimedia sessions in IMS","authors":"A. Brajdic, A. Kassler, M. Matijasevic","doi":"10.1109/BCFIC-RIGA.2011.5733210","DOIUrl":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733210","url":null,"abstract":"For delivering multimedia services over (wireless) networks it is important that the mechanisms which negotiate and optimize content delivery under resource constraints take into account user perceived quality in order to improve user satisfaction. Within the scope of the IP Multimedia Subsystem (IMS) architecture a novel application server may be added which handles multi-user multi-flow Quality of Experience (QoE) negotiation and adaptation for heterogeneous user sessions. Based on a mathematical model, which takes into account the characteristics of audio, video and data sessions for QoE optimization, we develop several optimization algorithms to be used by the application server to maximize overall user defined QoE parameters for all ongoing multimedia sessions, subject to network resource constraints. Our results show that a greedy based approach provides a reasonable compromise in terms of run-time and sub-optimality for the overall QoE based resource allocations.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134220357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}