7,466 research outputs found

    The MobyDick Project: A Mobile Heterogeneous All-IP Architecture

    Get PDF
    Proceedings of Advanced Technologies, Applications and Market Strategies for 3G (ATAMS 2001). Cracow, Poland: 17-20 June, 2001.This paper presents the current stage of an IP-based architecture for heterogeneous environments, covering UMTS-like W-CDMA wireless access technology, wireless and wired LANs, that is being developed under the aegis of the IST Moby Dick project. This architecture treats all transmission capabilities as basic physical and data-link layers, and attempts to replace all higher-level tasks by IP-based strategies. The proposed architecture incorporates aspects of mobile-IPv6, fast handover, AAA-control, and Quality of Service. The architecture allows for an optimised control on the radio link layer resources. The Moby dick architecture is currently under refinement for implementation on field trials. The services planned for trials are data transfer and voice-over-IP.Publicad

    Fairs for e-commerce: the benefits of aggregating buyers and sellers

    Full text link
    In recent years, many new and interesting models of successful online business have been developed. Many of these are based on the competition between users, such as online auctions, where the product price is not fixed and tends to rise. Other models, including group-buying, are based on cooperation between users, characterized by a dynamic price of the product that tends to go down. There is not yet a business model in which both sellers and buyers are grouped in order to negotiate on a specific product or service. The present study investigates a new extension of the group-buying model, called fair, which allows aggregation of demand and supply for price optimization, in a cooperative manner. Additionally, our system also aggregates products and destinations for shipping optimization. We introduced the following new relevant input parameters in order to implement a double-side aggregation: (a) price-quantity curves provided by the seller; (b) waiting time, that is, the longer buyers wait, the greater discount they get; (c) payment time, which determines if the buyer pays before, during or after receiving the product; (d) the distance between the place where products are available and the place of shipment, provided in advance by the buyer or dynamically suggested by the system. To analyze the proposed model we implemented a system prototype and a simulator that allow to study effects of changing some input parameters. We analyzed the dynamic price model in fairs having one single seller and a combination of selected sellers. The results are very encouraging and motivate further investigation on this topic

    Exploring potential implementations of PCE in IoT world

    Get PDF
    © . This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/The recently coined Internet of Things (IoT) paradigm leverages a large volume of heterogeneous Network Elements (NEs) demanding broad connectivity anywhere, anytime and anyhow, fueling the deployment of innovative Internet services, such as Cloud or Fog Computing, Data Center Networks (DCNs), Smart Cities or Smart Transportation. The proper deployment of these novel Internet services is imposing hard connectivity constraints, such as high transmission capacity, reliable communications, as well as an efficient control scheme capable of enabling an agile coordination of actions in large heterogeneous scenarios. In recent years, novel control schemes, such as the so-called Path Computation Element (PCE) has gained momentum in the network research community turning into real PCE implementations. Indeed, there is a wealth of studies assessing the PCE performance, clearly showing the potential benefits of decoupling routing control tasks from the forwarding nodes. Nevertheless, recognized the need for a control solution in IoT scenarios, there is not much published information analyzing PCE benefits in these IoT scenarios. In this paper, we distill how the PCE may gracefully provide for service composition in an agile manner, handling the specific constraints and requirements found in IoT scenarios. To this end, we propose a novel PCE strategy referred to as Service-Oriented PCE (SPCE), which enables network-aware service composition.Peer ReviewedPostprint (author's final draft

    A Survey on Service Composition Middleware in Pervasive Environments

    Get PDF
    The development of pervasive computing has put the light on a challenging problem: how to dynamically compose services in heterogeneous and highly changing environments? We propose a survey that defines the service composition as a sequence of four steps: the translation, the generation, the evaluation, and finally the execution. With this powerful and simple model we describe the major service composition middleware. Then, a classification of these service composition middleware according to pervasive requirements - interoperability, discoverability, adaptability, context awareness, QoS management, security, spontaneous management, and autonomous management - is given. The classification highlights what has been done and what remains to do to develop the service composition in pervasive environments

    A New Charging and Billing Model and Architecture for the Ubiquitous Consumer Wireless World

    Get PDF
    In a Ubiquitous Consumer Wireless World (UCWW) environment the provision, administration and management of the authentication, authorization and accounting (AAA) policies and business services are provided by third-party AAA service providers (3P-AAA-SPs) who are independent of the wireless access network providers (ANPs). In this environment the consumer can freely choose any suitable ANP, based on his/her own preferences. This new AAA infrastructural arrangement necessitates assessing the impact and re-thinking the design, structure and location of ‘charging and billing’ (C&B) functions and services. This paper addresses C&B issues in UCWW, proposing potential architectural solutions for C&B realization. Implementation approaches of these novel solutions together with a software testbed for validation and performance evaluation are addressed

    Novel Model of Adaptive Module for Security and QoS Provisioning in Wireless Heterogeneous Networks

    Get PDF
    Considering the fact that Security and Quality-Of-Service (QoS) provisioning for multimedia traffic in Wireless Heterogeneous Networks are becoming increasingly important objectives, in this paper we are introducing a novel adaptive Security and QoS framework. This framework is planned to be implemented in integrated network architecture (UMTS, WiMAX and WLAN). The aim of our novel framework is presenting a new module that shall provide the best QoS provisioning and secure communication for a given service using one or more wireless technologies in a given time

    An embodied conversational agent for intelligent web interaction on pandemic crisis communication

    Get PDF
    In times of crisis, an effective communication mechanism is paramount in providing accurate and timely information to the community. In this paper we study the use of an intelligent embodied conversational agent (EGA) as the front end interface with the public for a Crisis Communication Network Portal (CCNet). The proposed system, CCNet, is an integration of the intelligent conversation agent, AINI, and an Automated Knowledge Extraction Agent (AKEA). AKEA retrieves first hand information from relevant sources such as government departments and news channels. In this paper, we compare the interaction of AINI against two popular search engines, two question answering systems and two conversational systems

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
    corecore