Ubiquitous Multimedia

Size: px
Start display at page:

Download "Ubiquitous Multimedia"

Transcription

1 Ubiquitous Multimedia and Mobile Agents: Models and Implementations Susmit Bagchi Gyeongsang National University, South Korea REFERENCE

2 Detailed Table of Contents Preface xii Acknowledgment xv Chapter 1 Quality-Oriented Mobility Management for Multimedia Content Delivery to Mobile Users 1 Bogdan Ciubotaru, Dublin City University, Ireland Gabriel-Miro Muntean, Dublin City University, Ireland The latest advances in wireless data access technologies and increased popularity ofmobile computing have enabled the development of the future mobile Internet. The various wireless technologies and stan dards already developed or under development support the existence of a highly heterogeneous wireless communication environment in whichmobileusers accessthe network from diverse devices andexchange dataofvarious types. In the contextof such a heterogeneous wireless and mobile environment, maintaining certain level of Quality of Service required by some applications and consequently providing high user Quality of Experience is very challenging. This chapter analyzes the state of the art in quality-oriented mobility management in heterogeneous wireless environments in the context of mobile multimedia ap plications. Most important wireless access technologies and multimedia support systems and protocols for wireless delivery are presented, while requirements for quality-oriented mobility management are identified. Handover management is discussed as the component of the mobility management system with the greatest impact on the quality as measured by the user. Finally a novel multimedia mobility management framework is presented which aims at maintaining high user perceived quality while ef ficiently exploiting all the communication resources available in a heterogeneous wireless environment. Chapter 2 Mobile Agent Systems 31 Farhan Siddiqui, Walden University, USA Sherali Zeadally, University of the District ofcolumbia, USA Kashinath Basu, Oxford Brookes University, UK The mobile agent paradigm has received considerable attention in recent years for its wide applications in various areas of computing technology. This has led to the development of several commercial, as well as research oriented mobile agent systems. Recently, mobile agent technology is being employed for providing mobility support in networking and telecommunication environments. This article outlines

3 various uses and types ofmobile agents, along with their benefits, and limitations. We provide an insight into the application of mobile agents to support mobility management, focusing on ongoing research and recent research development efforts. Potential challenges associated with using mobile agents for mobility purposes are also discussed. Chapter 3 An Agent-Based Approach to Adapt Multimedia Web Content in Ubiquitous Environment 60 Domenico Rosaci, University of Reggio Calabria, DIMET, Italy Giuseppe M.L. Same, University ofreggio Calabria, DIMET, Italy Nowadays, Ubiquitous Computing allows a high number of multime-'dia contents to be accessible any where and anytime by using several devices, also characterized from limited computational and storage resources. To support users in multimedia choices, different recommender systems have been proposed in the past, but any of them considers the effects of the exploited devices, even though users show dif ferent behaviours in presence of different devices. This paper tries to give a contribution in. this setting, proposing a new agent-based recommender system in which each device is provided with a client agent able to monitor the user's behaviour performed on that device. Aunique server agent associated with that user collects from his/her de^vices this information to build a global profile, periodically returned to the client agents. Finally, recommendations of multimedia resources are generated from the collaboration among a recommender agent, associated with a Web site, and the client agent running on the device currently exploited by the user. generated by the proposed approach. Some experiments confirm the high quality of the recommendations Chapter 4 Personalized Content Representation through Hybridization of Mobile Agent and Interface Agent 85 Priti Srinivas Sajja, Sardar Patel University, India Mobile agent has an ability to co-operate with heterogeneous network environment. There are specific predefined techniques to impart mobility to an agent. As a result, the agent behaves only in predefined way. To impart other features beside mobility that helps in interfacing the destination network to com plete the intended job, a mobile agent need to be incorporated with additional functionalities. One of such functionalities is need to access local user profiles, preferences, and other resources as well as other local agents to present information in user's context. To meet this demand, hybridization of mobile and interface agent that facilitates development of customized application is discussed in this chapter, The multi-agent architecture, described in this chapter, encompasses this hybrid agent to access user profile and fuzzy indicator matrix. Both the profile and matrix are further utilized to construct content prefer ence list according to users' perspectives. The indicator matrix enlists typical interest and preferences of a group, such as purpose of surfing/using the system (research, teaching, learning, problem solving, etc.); level information needed (highly technical, conceptual, mixed, etc.), media preference (type of document such as text, code, video, etc.). The system is designed as multi-tier structure called resource tier, service tier, and application tier to provide resources, third party services, and application support to learners, instructors, and administrator groups. The chapter utilizes the proposed generic multi tier architecture for a personalized learning (p-learning) system and discusses its design in detail including working of different agents, mobility and ticket management, user profile structure, and risk management policies. The chapter concludes with discussion on results and future research directions.

4 Chapter 5 Mobile Agent-Based Collaborative Computing Framework for Handling Constraint Resources 113 Anil Kakarla, Missouri University of Science and Technology, USA Sanjeev Agarwal, Missouri University of Science and Technology, USA Sanjay K Madria, Missouri University of Science and Technology, USA Information processing and collaborative computing using agents over a distributed network of hetero geneous platforms are important for many defense and civil applications. In this paper, a mobile agent based collaborative and distributed computing framework for network centric information processing is presented using a military application. In this environment, the challenge is to continue processing efficiently while satisfying multiple constraints like computational cost, communicationbandwidth, and energy in a distributed network. We use mobile agent technology for distributed computing to speed up data processing using the available systems resources in the network. The proposed framework pro vides a mechanism to bridge the gap between computation resources and dispersed data sources under variable bandwidth constraints. For every computation task raised in the network, a viable system that has resources and data to compute the task is identified and sent to the viable system for completion. Experimental evaluation under the real platform is reported. It shows that in spite of an increase of the communication load in comparison with other solutions the proposed framework leads to a decrease of the computation time. Chapter 6 Mobile Agent-Based Multimedia Content Discovery 135 S. Venkatesan, Indian Institute ofinformation Technology-Allahabad, India C. Chellappan, Anna University, India Anurika Vaish, Indian Institute ofinformation Technology-Allahabad, India Content discovery is an important aspect in the context of ever-growing internet based information ser vices and management. Especially multimedia content discovery is an essential aspect because it is an effective and efficient way to deliver the concept to the people or making them understands easily. For this multimedia content discovery, a well known search engine Google is using different kind of linking techniques. But the challenge arises, in case the multimedia content location is not available with the link, then it is not able to discover the content location. To overcome the above limitation, we propose this mobile agent based multimedia content discovery model. Here, mobile agent would be send to the location of the server where the content is available and bring it to the real world environment. Also with the advantage of the mobile agent, the contents location. we can reduce the network traffic and also we can discover all Chapter 7 Adaptive Content Delivery in E-Learning Systems using Mobile Agents 148 S. R. Mangalwede, Gogte Institute of Technology, India D. H. Rao, Jain College ofengineering, India The e-learning refers to the use ofnetworkingtechnologies to create, foster, deliver and facilitate learning anytime, anywhere. This chapter discusses our research on personalization of e-learning content based on the learner's profile. After justifying the feasibility of using mobile agents in distributed computing

5 systems for information retrieval, processing and mining, the authors deal with the relevance of mobile agents in e-learning domain. The chapter discusses the proposed Case-Based Reasoning (CBR) approach to context-aware adaptive content delivery. Different parameters like technological, cultural and educational background of a learner are taken as the basis for forming the case-base that determines the type of content to be delivered. Along with the CBR, a diagnostic assessment to gauge an insight into the student's current skills is done to determine the type of content to deliver. The implementation observations of such implementation vis-a-vis traditional e-learning are also documented. as an Chapter 8 Workflow Management and Mobile Agents: How to Get the Best of Both Approaches 167 Antonio Corradi, University of Bologna, Italy Alex Landini, Emil Data S.r.l., Italy Stefano Monti, Service composition is University ofbologna, Italy an extremely powerful and versatile way to aggregate and reuse distributed services and software components into richer and complex scenarios. Workflow Management Systems have emerged as one of the leading technologies to execute service compositions but typically fail to support distributed scenarios, where distributed services should be invoked in a scalable and effective way. Mobile Agent platforms propose a suitable framework to distribute the execution of complex service compositions, and therefore to enable scalability and improve performance. However, currentproposals for MA-based WFMSs still target rather static and poorly distributed scenarios and exploit agent migra tion benefits only in a partial and insufficient way. Our model proposes to overcome these problems via a richer and more effective agent delegation strategy that can also cope with dynamic scenarios where services can move and replicate, in order to achieve a better integration by taking advantage technologies. of both Chapter 9 Recovery of Ubiquitous Multimedia Content Discovery Mobile Agent 215 S. Venkatesan, Indian Institute of Information Technology-Allahabad, India C. Chellappan, Anna University, India P. Dhavachelvan, Pondicherry University, India Multimedia content is ubiquitous; therefore it is very difficult to bring all the hidden contents to the every one of universe. Mobile agent technology is the efficient technique to discover and bring the multimedia content to the universe with the help of dynamic itinerary movement. While mobile agent is roaming to discover the ubiquitous content, it has to go and visit multiple servers with different character in na ture (that is server may be legitimate or hostile; hostile intention is to disturb the agent functionalities either by killing the agent or modifying the agent functionalities). Whenever the agent is disturbed (agent is altered or killed) by the hostile servers while roaming to discover the content, we should have the recovery mechanism to rollback the agent. This chapter adopts the K-response recovery model to rollback the original agent even then it is cracked or killed by the malicious servers while discovering the multimedia content.

6 Chapter 10 Algorithms for Secure Multimedia Delivery over Mobile Devices and Mobile Agents 232 Amit Pande, University of California Davis, USA Joseph Zambreno, Iowa State University, USA Rapid advances in embedded systems and mobile communications have flooded the market with a large volume of multimedia data. In this chapter, we present a summary of multimedia compression and encryption schemes, the way they have evolved over the decades. We first discuss the traditional approach to data encryption and their extension to video encryption. Next, we present the next genera tion algorithms for secure multimedia delivery, namely the Joint Video Compression and Encryption (JVCE) approach and give the reader an introduction to these approaches, the underlying assumption, advantages and limitations. We discuss the implementation of JVCE algorithms in light of requirements of mobile devices and propose how mobile agents can facilitate such an implementation. Chapter 11 Distributed Video Coding and Content Analysis for Resource Constraint Multimedia Applications 251 Praveen Kumar, GRIET, India Amit Pande, University ofcalifornia Davis, USA Ankush Mittal, College of Engineering Roorkee, India Abhisek Mudgal, Iowa State University, USA Video coding and analysis for low power and low bandwidth multimedia applications has always been a great challenge. The limited computational resources on ubiquitous multimedia devices like cameras along with low and varyingbandwidth over wireless network lead to serious bottlenecks in delivering real-time streaming ofvideos for such applications. This work presents a Content-based Network-adaptive Videotransmission (CbNaVt) framework which can waive off the requirements of low bandwidth. This is done by transmitting important content only to the end user. The framework is illustrated with the example of video streaming in the context of remote laboratory setup. A framework for distributed processing using mobile agents is discussed with the example of Distributed Video Surveillance (DVS). In this regard, the increased computational costs due to video processing tasks like object segmentation and tracking are shared by the cameras and a local base station called as Processing Proxy Server (PPS).However, in a distributed scenario like traffic surveillance, where moving objects is tracked using multiple cameras, the processing tasks needs to be dynamically distributed. This is done intelligently using mobile agents by migrating from one PPS to another for tracking an individual case object and transmitting required information to the end users. Although the authors propose a specific implementation for CbNaVt and DVS systems, the general ideas in design of such systems exemplify the way information can be intel ligently transmitted in any ubiquitous multimedia applications along with the use of mobile agents for real-time processing and retrieval of video signal.

7 Chapter 12 Security Management in Heterogeneous Distributed Sensor Networks... Al-Sakib Khan Pathan, International Islamic University, Malaysia 274 A Heterogeneous Distributed Sensor Network (HDSN) is a type of distributed sensor network where sensors with different functional types participate at the same time. In this sensor network model, the sensors are associated with different deployment groups but they cooperate with each other within and out of their respective groups. The heterogeneity of HDSN refers to the functional heterogeneity of the sensors participating in the network unlike the heterogeneity considered (e.g., considering transmission range, energy level, computation ability, sensing range) for traditional heterogeneous sensor networks. Taking this model into consideration, in this chapter we present a secure group association authentica tion mechanism using one-way accumulator which ensures that; before collaborating for a particular association of task, any pair of nodes in the same deployment group can verify the legitimacy of group each other. Secure addition and deletion of sensors are supported in this approach. In addition, a policybased sensor addition procedure is also suggested. For secure handling ofdisconnected nodes of a group, we use an efficient pairwise key derivation scheme. Side by side proposing our mechanisms, we also discuss the characteristics of HDSN, its scopes, applicability, efficiency, challenges, and future. Before concluding the chapter, we also talk about the applicability of our security management framework for secure mobile multimedia delivery over sensor networks. Compilation of References 295 About the Contributors 319 Index 325

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

Websense Web Security Solutions

Websense Web Security Solutions Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS

MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS Marco Picone, Marco Muro, Vincenzo Micelli, Michele Amoretti, Francesco Zanichelli Distributed Systems

More information

Security & Privacy Issues in Mobile Cloud Computing

Security & Privacy Issues in Mobile Cloud Computing Security & Privacy Issues in Mobile Cloud Computing Manmohan Chaturvedi,1, Sapna Malik, Preeti Aggarwal and Shilpa Bahl Ansal University, Gurgaon- 122011, India 1 mmchaturvedi@ansaluniversity.edu.in Indian

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliane Bodanese 1, Liljana Gavrilovska 2, Veselin Rakocevic 3, Robert Stewart 4 1 Electronic Engineering Department, Queen

More information

Secure Network Monitoring System using Mobile Agent

Secure Network Monitoring System using Mobile Agent 1 Secure Network Monitoring System using Mobile Agent G. M. Gaikwad 1, A. M. Kanthe 2, M. S. Chaudhari 3 1,2,3 Department of Computer Engg. Sinhgad Institute of Technology, Lonavala (India) 1 gmgaikwad@gmail.com

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Diagram 1: Islands of storage across a digital broadcast workflow

Diagram 1: Islands of storage across a digital broadcast workflow XOR MEDIA CLOUD AQUA Big Data and Traditional Storage The era of big data imposes new challenges on the storage technology industry. As companies accumulate massive amounts of data from video, sound, database,

More information

Summer projects for Dept. of IT students in the summer 2015

Summer projects for Dept. of IT students in the summer 2015 Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

VoIP Conferencing. The latest in IP technologies deliver the next level of service innovation for better meetings. Global Collaboration Services

VoIP Conferencing. The latest in IP technologies deliver the next level of service innovation for better meetings. Global Collaboration Services Global Collaboration Services VoIP Conferencing The latest in IP technologies deliver the next level of service innovation for better meetings. ENERGIZE YOUR CONNECTIONS Table of Contents > > Contents...

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Background The command over cloud computing infrastructure is increasing with the growing demands of IT infrastructure during the changed business scenario of the 21 st Century.

More information

Towards service awareness and autonomic features in a SIPenabled

Towards service awareness and autonomic features in a SIPenabled features in a SIP-enabled network 1 Towards service awareness and autonomic features in a SIPenabled network Guillaume Delaire Laurent Walter Goix Giuseppe Valetto Telecom Italia Lab Outline 2 Context

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG > White Paper Enterprise IPTV and Video Streaming with the Blue Coat ProxySG > Table of Contents INTRODUCTION................................................... 2 SOLUTION ARCHITECTURE.........................................

More information

Agent vs. Agent-less auditing

Agent vs. Agent-less auditing Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Peer-to-peer data storage software Specification and source code

Peer-to-peer data storage software Specification and source code GLORIA is funded by the European Union 7th Framework Programme (FP7/2007-2013) under grant agreement n 283783 Specification and source code CODE: DEL-050 VERSION: 01 DATE: November 28 th, 2012 Authors:

More information

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

An Experimental Study on Wireless Security Protocols over Mobile IP Networks An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: akagarwa@unity.ncsu.edu Jorinjit S. Gill Department of Electrical and

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

T a c k l i ng Big Data w i th High-Performance

T a c k l i ng Big Data w i th High-Performance Worldwide Headquarters: 211 North Union Street, Suite 105, Alexandria, VA 22314, USA P.571.296.8060 F.508.988.7881 www.idc-gi.com T a c k l i ng Big Data w i th High-Performance Computing W H I T E P A

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

SDN, a New Definition of Next-Generation Campus Network

SDN, a New Definition of Next-Generation Campus Network SDN, a New Definition of Next-Generation Campus Network Contents Campus Evolution and Development Trends... 1 Three Changes to Drive the Campus Network Development... 2 Fundamental Changes in User Behaviors...2

More information

Duncan McCaffery. Personal homepage URL: http://info.comp.lancs.ac.uk/computing/staff/person.php?member_id=140

Duncan McCaffery. Personal homepage URL: http://info.comp.lancs.ac.uk/computing/staff/person.php?member_id=140 Name: Institution: PhD thesis submission date: Duncan McCaffery Lancaster University, UK Not yet determined Personal homepage URL: http://info.comp.lancs.ac.uk/computing/staff/person.php?member_id=140

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Mobile and Wireless ATM (WATM)

Mobile and Wireless ATM (WATM) Mobile and Wireless ATM (WATM) Defense Information Systems Network (DISN) Syed Shah Larry Bowman Robert Riehl Defense Information Systems Agency Center for Systems Engineering Reston, VA20191 Abstract:

More information

PART II. OPS-based metro area networks

PART II. OPS-based metro area networks PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Lecture Notes in Computer Science: Media-Oriented Service Overlay Network Architecture over Future Internet Research for Sustainable Testbed

Lecture Notes in Computer Science: Media-Oriented Service Overlay Network Architecture over Future Internet Research for Sustainable Testbed Lecture Notes in Computer Science: Media-Oriented Overlay Network Architecture over Future Internet Research for Sustainable Testbed Sungwon Lee 1, Sang Woo Han 2, Jong Won Kim 2, and Seung Gwan Lee 1.

More information

Deploying VSaaS and Hosted Solutions Using CompleteView

Deploying VSaaS and Hosted Solutions Using CompleteView SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

Multimedia Traffic Security Architecture for the Internet of Things

Multimedia Traffic Security Architecture for the Internet of Things Multimedia Traffic Security Architecture for the Internet of Things Liang Zhou, Nanjng University of Posts and Telecommunications Han-Chieh Chao, National Ilan University Abstract An important challenge

More information

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

An E-learning Service Management Architecture

An E-learning Service Management Architecture An E-learning Service Architecture Theodore K. Apostolopoulos Anna Kefala Department of Informatics Athens University of Economics and Business 76 Patission st., 10434 Athens, Greece Tel.: +30 210 8203234,

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Carrier Ethernet: New Game Plan for Media Converters

Carrier Ethernet: New Game Plan for Media Converters Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet

More information

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Russell Bennett UC Insights www.ucinsights.com russell@ucinsights.com Introduction Those familiar with unified communications

More information

Domus, the connected home

Domus, the connected home Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,

More information

Traffic Management Solutions for Social Innovation Business

Traffic Management Solutions for Social Innovation Business Traffic Management Solutions for Social Innovation Business Hitachi Review Vol. 63 (2014), No. 1 51 Tatsuya Shimizu Yusuke Shomura, Dr. Eng. Hirofumi Masukawa Yukiko Takeda OVERVIEW: The spread of smartphones

More information

LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD

LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD Mitesh Patel 1, Kajal Isamaliya 2, Hardik kadia 3, Vidhi Patel 4 CE Department, MEC, Surat, Gujarat, India 1 Asst.Professor, CSE Department,

More information

Overview of the Internet of things

Overview of the Internet of things Overview of the Internet of things Tatiana Kurakova, International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland Abstract. This article provides an overview of the Internet of things

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

Big Data Driven Knowledge Discovery for Autonomic Future Internet

Big Data Driven Knowledge Discovery for Autonomic Future Internet Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems

Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems Brochure More information from http://www.researchandmarkets.com/reports/2172101/ Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential

More information

The Emerging Market for Collaborative Applications

The Emerging Market for Collaborative Applications The Emerging Market for Collaborative Applications Unified Collaboration for the real-time enterprise and rapid advancements in telephony are transforming the way organizations do business today. Globalization

More information

List of Projects in Application

List of Projects in Application List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com

More information

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk

More information

Index Terms: Internet of Things (IoT), IPv6, IPv4, RFID, Machine to Machine Communication, WSN Network.

Index Terms: Internet of Things (IoT), IPv6, IPv4, RFID, Machine to Machine Communication, WSN Network. Internet of Things (IoT): IPv6 Implementation for Smart Vision of the World Aditya Bhardwaj 1, Pawan Kumar 2, Amit Doegar. 3 Department of Computer Science & Engineering, NITTTR Chandigarh-160019, INDIA.

More information

QAME Support for Policy-Based Management of Country-wide Networks

QAME Support for Policy-Based Management of Country-wide Networks QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department

More information

Panasonic Video Surveillance Solutions One Partner. One Solution.

Panasonic Video Surveillance Solutions One Partner. One Solution. Panasonic Video Surveillance Solutions One Partner. One Solution. IP Video Analog Video Hybrid Video Integrated Business System solutions that completely integrate with you. Panasonic delivers innovative

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

Masters Project Proxy SG

Masters Project Proxy SG Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

New Cloud Computing Network Architecture Directed At Multimedia

New Cloud Computing Network Architecture Directed At Multimedia 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.16 New Cloud Computing Network

More information

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Mobility

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

A very short history of networking

A very short history of networking A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the

More information

Chapter 5. Regression Testing of Web-Components

Chapter 5. Regression Testing of Web-Components Chapter 5 Regression Testing of Web-Components With emergence of services and information over the internet and intranet, Web sites have become complex. Web components and their underlying parts are evolving

More information

Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data

Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

Building Web-based Infrastructures for Smart Meters

Building Web-based Infrastructures for Smart Meters Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.

More information

Wireless Video Best Practices Guide

Wireless Video Best Practices Guide Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager

More information

Advanced Analytics. The Way Forward for Businesses. Dr. Sujatha R Upadhyaya

Advanced Analytics. The Way Forward for Businesses. Dr. Sujatha R Upadhyaya Advanced Analytics The Way Forward for Businesses Dr. Sujatha R Upadhyaya Nov 2009 Advanced Analytics Adding Value to Every Business In this tough and competitive market, businesses are fighting to gain

More information

Coronado Unified School District

Coronado Unified School District B r i n g Y o u r O w n D e v i c e BYOD: a district approach Coronado Unified School District Coronado, California CoronadoUSD.net Dr. Jeffrey Felix, Superintendent, jfelix@coronadousd.net, @jeffrey_felix

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

Cisco Remote Management Services for Security

Cisco Remote Management Services for Security Cisco Remote Management Services for Security Innovation: Many Take Advantage of It, Some Strive for It, Cisco Delivers It. Cisco Remote Management Services (RMS) for Security provide around the clock

More information

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX

More information