110 research outputs found

    THE ROLE OF AN INTEGRATED E-LEARNING PLATFORM IN INCREASING THE PROCESSMANAGEMENT EFFICIENCY

    Get PDF
    This paper aims to present the steps taken and solutions implemented at the Cisco Networking Academy of the University of Bucharest in order to increase the process-management efficiency and the student satisfaction degree, mainly via the implementation of an own e-learning learning platform.The results are a significant improvement of work relationships, due to the fact that everyone's responsibilities are clearly defined together with the expectations for each employee. Furthermore, productivity tools enable us and our instructors to concentrate on increasing the quality of our students' learning experience in order to obtain even higher degrees of student satisfaction, retention, and promovability as a direct measure of teaching/learning success.Instructor Experience, User satisfaction, E-learning platform, Management Module, Student Assessment

    Evaluation of CupCarbon Network Simulator for Wireless Sensor Networks

    Full text link
    [EN] Wireless sensor networks (WSNs) are a technology in continuous evolution with great future and a huge quantity of applications. The implementation and deployment of a WSN imply important expenses, so it is interesting to simulate the operation of our design before deploying it. In addition, WSNs are limited by a set of parameters such as the low processing capacity, low storing capacity or limited energy. Energy consumption is the most limiting parameter since the network stability and availability depends on the survival of the nodes. To check the correct operation of a network, currently, there are several network simulators and day by day new proposals are launched. This paper presents the evaluation of a new network simulator called CupCarbon. Along the document, we present the main characteristics of this simulator and check its operation by an example. To evaluate the ease of use of this new network simulator, we propose a modified version of Dijkstra algorithm. In addition of considering the cost route to calculate the best route, it considers the remaining energy in nodes as an additional parameter to evaluate the best route. CupCarbon allows implementing our proposal and the results show that our proposal is able to offer a more stable network with an increase of the network lifetime of the 20%. Finally, to extract some conclusions from our experiences, we compare the characteristics and results of CupCarbon with the most common network simulators currently used by researchers. Our conclusions point out that CupCarbon can be used as a complementary tool for those simulators that are not able to monitor the energy consumption in nodes. However, it needs some improvements to reach the level of functionality of the most used simulators. CupCarbon could be an interesting option for academic environments.López-Pavón, C.; Sendra, S.; Valenzuela-Valdés, JF. (2018). Evaluation of CupCarbon Network Simulator for Wireless Sensor Networks. Network Protocols and Algorithms. 10(2):1-27. https://doi.org/10.5296/npa.v10i2.13201S12710

    Analytical Investigation of On-Path Caching Performance in Information Centric Networks

    Get PDF
    Information Centric Networking (ICN) architectures are proposed as a solution to address the shift from host-centric model toward an information centric model in the Internet. In these architectures, routing nodes have caching functionality that can influence the network traffic and communication quality since the data items can be sent from nodes far closer to the requesting users. Therefore, realizing effective caching networks becomes important to grasp the cache characteristics of each node and to manage system resources, taking into account networking metrics (e.g., higher hit ratio) as well as user’s metrics (e.g. shorter delay). This thesis studies the methodologies for improving the performance of cache management in ICNs. As individual sub-problems, this thesis investigates the LRU-2 and 2-LRU algorithms, geographical locality in distribution of users’ requests and efficient caching in ICNs. As the first contribution of this thesis, a mathematical model to approximate the behaviour of the LRU-2 algorithm is proposed. Then, 2-LRU and LRU-2 cache replacement algorithms are analyzed. The 2-LRU caching strategy has been shown to outperform LRU. The main idea behind 2-LRU and LRU-2 is considering both frequency (i.e. metric used in LFU) and recency (i.e. metric used in LRU) together for cache replacement process. The simulation as well as numeric results show that the proposed LRU-2 model precisely approximates the miss rate for LRU-2 algorithm. Next, the influence of geographical locality in users’ requests on the performance of network of caches is investigated. Geographically localized and global request patterns have both been observed to possess Zipf (i.e. a power-law distribution in which few data items have high request frequencies while most of data items have low request frequencies) properties, although the local distributions are poorly correlated with the global distribution. This suggests that several independent Zipf distributions combine to form an emergent Zipf distribution in real client request scenarios. An algorithm is proposed that can generate realistic synthetic traffic to regional caches that possesses Zipf properties as well as produces a global Zipf distribution. The simulation results show that the caching performance could have different behaviour based on what distribution the users’ requests follow. Finally, the efficiency of cache replacement and replication algorithms in ICNs are studied since ICN literature still lacks an empirical and analytical deep understanding of benefits brought by in-network caching. An analytical model is proposed that optimally distributes a total cache budget among the nodes of ICN networks for LRU cache replacement and LCE cache replication algorithms. The results will show how much user-centric and system-centric benefits could be gained through the in-network caching compared to the benefits obtained through caching facilities provided only at the edge of the network

    Classic and Agent-Based Evolutionary Heuristics for Shape Optimization of Rotating Discs

    Get PDF
    The article presents a metaheuristic solution for the problem of shape optimization of a rotating annular disc. Such discs are important structural components of e.g. jet engines, steam turbines or disc brakes. The design goal is to find the disc shape that would ensure its maximal carrying capacity (corresponding to the speed of rotation), which is a variational problem with the objective functional defined by L-infinity norm. Such a definition makes the problem impossible to solve using analytical methods so utilization of metaheuristics is necessary. We present different algorithms to solve the problem starting with a classic evolutionary one, followed by agent-based and hybrid agent-based memetic algorithms, which are the main focus of this paper. The reason for this is that agent-based computing systems proved to be versatile as an optimization technique being especially efficient for the problems with complex fitness functions. The obtained experimental results encourage further application of such an approach to similar engineering problems

    An Autonomous Engine for Services Configuration and Deployment.

    Full text link
    The runtime management of the infrastructure providing service-based systems is a complex task, up to the point where manual operation struggles to be cost effective. As the functionality is provided by a set of dynamically composed distributed services, in order to achieve a management objective multiple operations have to be applied over the distributed elements of the managed infrastructure. Moreover, the manager must cope with the highly heterogeneous characteristics and management interfaces of the runtime resources. With this in mind, this paper proposes to support the configuration and deployment of services with an automated closed control loop. The automation is enabled by the definition of a generic information model, which captures all the information relevant to the management of the services with the same abstractions, describing the runtime elements, service dependencies, and business objectives. On top of that, a technique based on satisfiability is described which automatically diagnoses the state of the managed environment and obtains the required changes for correcting it (e.g., installation, service binding, update, or configuration). The results from a set of case studies extracted from the banking domain are provided to validate the feasibility of this propos

    Coherent, automatic address resolution for vehicular ad hoc networks

    Get PDF
    Published in: Int. J. of Ad Hoc and Ubiquitous Computing, 2017 Vol.25, No.3, pp.163 - 179. DOI: 10.1504/IJAHUC.2017.10001935The interest in vehicular communications has increased notably. In this paper, the use of the address resolution (AR) procedures is studied for vehicular ad hoc networks (VANETs). We analyse the poor performance of AR transactions in such networks and we present a new proposal called coherent, automatic address resolution (CAAR). Our approach inhibits the use of AR transactions and instead increases the usefulness of routing signalling to automatically match the IP and MAC addresses. Through extensive simulations in realistic VANET scenarios using the Estinet simulator, we compare our proposal CAAR to classical AR and to another of our proposals that enhances AR for mobile wireless networks, called AR+. In addition, we present a performance evaluation of the behaviour of CAAR, AR and AR+ with unicast traffic of a reporting service for VANETs. Results show that CAAR outperforms the other two solutions in terms of packet losses and furthermore, it does not introduce additional overhead.Postprint (published version

    A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification

    Get PDF
    Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world

    Providing security and fault tolerance in P2P connections between clouds for mHealth services

    Full text link
    [EN] The mobile health (mHealth) and electronic health (eHealth) systems are useful to maintain a correct administration of health information and services. However, it is mandatory to ensure a secure data transmission and in case of a node failure, the system should not fall down. This fact is important because several vital systems could depend on this infrastructure. On the other hand, a cloud does not have infinite computational and storage resources in its infrastructure or would not provide all type of services. For this reason, it is important to establish an interrelation between clouds using communication protocols in order to provide scalability, efficiency, higher service availability and flexibility which allow the use of services, computing and storage resources of other clouds. In this paper, we propose the architecture and its secure protocol that allows exchanging information, data, services, computing and storage resources between all interconnected mHealth clouds. The system is based on a hierarchic architecture of two layers composed by nodes with different roles. The routing algorithm used to establish the connectivity between the nodes is the shortest path first (SPF), but it can be easily changed by any other one. Our architecture is highly scalable and allows adding new nodes and mHealth clouds easily, while it tries to maintain the load of the cloud balanced. Our protocol design includes node discovery, authentication and fault tolerance. We show the protocol operation and the secure system design. Finally we provide the performance results in a controlled test bench.Lloret, J.; Sendra, S.; Jimenez, JM.; Parra-Boronat, L. (2016). Providing security and fault tolerance in P2P connections between clouds for mHealth services. Peer-to-Peer Networking and Applications. 9(5):876-893. doi:10.1007/s12083-015-0378-3S87689395The Fifty-eighth World Health Assembly, Resolutions and Decisions. Document: A58/21. Available at: http://www.who.int/healthacademy/media/WHA58-28-en.pdf . [Last access: Dec. 30, 2014]World Health organization. Topics of eHealth. In WHO website. Available at: http://www.who.int/topics/eHealth/en/ . [Last access: Dec. 30, 2014]Pickup JC, Freeman SC, Sutton AJ (2011) Glycaemic control in type 1 diabetes during real time continuous glucose monitoring compared with self monitoring of blood glucose: meta-analysis of randomised controlled trials using individual patient data. BMJ 343:d3805Promotional Material Digital health: working in partnership. Department of Health. UK. (2014) Available at: https://www.gov.uk/government/publications/digital-health-working-in-partnership/digital-health-working-in-partnerships#digital-health---harnessing-technology-for-patient-benefit . [Last access: Dec. 30, 2014]eHealth for a Healthier Europe!– opportunities for a better use of healthcare resources. Available at: https://joinup.ec.europa.eu/sites/default/files/files_epractice/sites/eHealth%20for%20a%20Healthier%20Europe %20-%20Opportunities%20for%20a%20better%20use%20of%20healthcare%20resources.pdf. [Last access: Dec. 30, 2014]Adibi S (2012) Link technologies and BlackBerry mobile health (mHealth) solutions: a review. IEEE Trans Inf Technol Biomed 16(4):586–597Chiarini G, Ray P, Akter S, Masella C, Ganz A (2013) mHealth technologies for chronic diseases and elders: a systematic review. IEEE J Sel Areas Commun 31(9):6–18Lopes IM, Silva BM, Rodrigues JJ, Lloret J, Proenca ML (2011) A mobile health monitoring solution for weight control. In proceedings of the 2011 International Conference on Wireless Communications and Signal Processing (WCSP 2011), Nanjing, pp 1–5Lopes IM, Silva BM, Rodrigues JJPC, Lloret J (2012) Performance evaluation of cooperation mechanisms for m-health applications. In proceedings of the 2012 I.E. Global Communications Conference (GLOBECOM 2012), AnaheimKyriacou EC, Pattichis CS, Pattichis MS (2009) An overview of recent health care support systems for eEmergency and mHealth applications. In proceedings of the 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2009), Hilton Minneapolis, pp 1246–1249Nkosi MT, Mekuria F (2010) Cloud computing for enhanced mobile health applications. In proceedings of the 2010 I.E. Second International Conference on Cloud Computing Technology and Science (CloudCom 2010), Indianapolis, pp 629–633Sultan N (2014) Making use of cloud computing for healthcare provision: opportunities and challenges. Int J Inf Manag 34(2):177–184Pandey S, Voorsluys W, Niu S, Khandoker A, Buyya R (2012) An autonomic cloud environment for hosting ECG data analysis services. Futur Gener Comput Syst 28(1):147–154Xia H, Asif I, Zhao X (2013) Cloud-ECG for real time ECG monitoring and analysis. Comput Methods Prog Biomed 110(3):253–259Bourouis A, Feham M, Bouchachia A (2012) A new architecture of a ubiquitous health monitoring system: a prototype of cloud mobile health monitoring system. arXiv preprint. Reference: arXiv:1205.6910Chen KR, Lin YL, Huang MS (2011) A mobile biomedical device by novel antenna technology for cloud computing resource toward pervasive healthcare. In proceedings of the 11th International Conference on Bioinformatics and Bioengineering (BIBE 2011), Taichung, pp 133–136Lacuesta R, Lloret J, Sendra S, Peñalver L (2014), Spontaneous ad hoc mobile cloud computing network. Sci World J (Article ID 232419): 1–19Ghafoor KZ, Bakar KA, Mohammed MA, Lloret J (2013) Vehicular cloud computing: trends and challenges (Chapter 14). In Mobile Networks and Cloud computing Convergence for Progressive Services and Applications. IGI Global. pp. 262–274. DOI: 10.4018/978-1-4666-4781-7.ch014Wan J, Zhang D, Zhao S, Yang LT, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges and solutions. IEEE Commun Mag 52(8):106–113. doi: 10.1109/MCOM.2014.6871677Rodrigues JJPC, Zhou L, Mendes LDP, Lin K, Lloret J (2012) Distributed media-aware flow scheduling in cloud computing environment. Comput Commun 35(15):1819–1827Dutta R, Annappa B (2014) Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing. Netw Protoc Algoritm 6(1):58–75Modares H, Lloret J, Moravejosharieh A, Salleh R (2013) Security in mobile cloud computing (Chapter 5). In Mobile Networks and Cloud computing Convergence for Progressive Services and Applications. IGI Global. pp. 79–91Mehmood A, Song H, Lloret J (2014) Multi-agent based framework for secure and reliable communication among open clouds. Netw Protoc Algoritm 6(4):60–76Mendes LDP, Rodrigues JJPC, Lloret J, Sendra S (2014) Cross-layer dynamic admission control for cloud-based multimedia sensor networks. IEEE Syst J 8(1):235–246Xiong J, Li F, Ma J, Liu X, Yao Z, Chen PS (2014) A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Netw Appl 1–13Yang H, Kim H, Mtonga K (2014) An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw Appl 1–11Silva BM, Rodrigues JJ, Canelo F, Lopes IM, Lloret J (2014) Towards a cooperative security system for mobile-health applications. Electron Commer Re 1–27Flynn D, Gregory P, Makki H, Gabbay M (2009) Expectations and experiences of eHealth in primary care: a qualitative practice-based investigation. Int J Med Inform 78(9):588–604Thampi SM (2010) Survey of search and replication schemes in unstructured P2P networks. Netw Protoc Algoritm 2(1):93–131Khan SM, Mallesh N, Nambiar A, Wright M (2010) The dynamics of salsa: a robust structured P2P system. Netw Protoc Algoritm 2(4):40–60Garcia M, Hammoumi M, Canovas A, Lloret J (2011) Controlling P2P file-sharing networks’ traffic. Netw Protoc Algoritm 3(4):54–92Lloret J, Garcia M, Tomas J, Rodrigues JJPC (2014) Architecture and protocol for InterCloud communication. Inf Sci 258:434–451Chowdhury CR (2014) A survey of cloud based health care system. Int J Innov Res Comput Commun Eng 2(8):5477–5481Ghosh R, Papapanagiotou I, Boloor KA (2014) Survey on research initiatives for healthcare clouds. Cloud Computing Applications for Quality Health Care Delivery. IGI Global 1–18Donahue S (2010) Can cloud computing help fix health care? Cloudbook J 1(6):1–6Deng M, Petkovic M, Nalin M, Baroni IA (2011) Home healthcare system in the cloud--addressing security and privacy challenges. In proceedings of the 2011 I.E. International Conference on Cloud Computing (CLOUD 2011), Washington, pp 549–556Wang X, Gui Q, Liu B, Chen Y, Jin Z (2013) Leveraging mobile cloud for telemedicine: a performance study in medical monitoring. In proceedings of the 39th Annual Northeast Bioengineering Conference (NEBEC 2013), Syracuse, pp 49–50Alamri A (2012) Cloud-based e-health multimedia framework for heterogeneous network. In proceedings of the 2012 I.E. International Conference on Multimedia and Expo Workshops (ICMEW 2012), Melbourne, pp 447–452Constantinescu L, Kim J, Feng DD (2012) Sparkmed: a framework for dynamic integration of multimedia medical data into distributed m-health systems. IEEE Trans Inf Technol Biomed 16(1):40–52Botts N, Thoms B, Noamani A, Horan TA (2010) Cloud computing architectures for the underserved: public health cyberinfrastructures through a network of healthatms. In proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS 2010), Honolulu, pp 1–10Fan L, Buchanan W, Thummler C, Lo O, Khedim A, Uthmani O, Lawson A, Bell D (2011) DACAR platform for eHealth services cloud. In proceedings of the 2011 I.E. International Conference on Cloud Computing (CLOUD 2011), Washington, pp 219–226Ruiz-Zafra A, Benghazi K, Noguera M, Garrido JL (2013) Zappa: An Open Mobile Platform to Build Cloud-Based m-Health Systems. In proceedings of the 4th International Symposium on Ambient Intelligence (ISAmI 2013), Salamanca, pp 87–94Nijon S, Dickerson RF, Asare P, Li Q, Hong D, Stankovic JA, Hu P, Shen G, Jiang X (2013) Auditeur: a mobile-cloud service platform for acoustic event detection on smartphones. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, Taipei, pp 403–416Lloret J, Diaz JR, Boronat F, Jiménez JM (2006) A fault-tolerant P2P-based protocol for logical networks interconnection. In proceedings of the International Conference on Networking and Services (ICNS’06), Silicon ValleyLloret J, Palau C, Boronat F, Tomas J (2008) Improving networks using group-based topologies. Comput Commun 31(14):3438–3450Lloret J, Boronat Segui F, Palau C, Esteve M (2005) Two levels SPF-based system to interconnect partially decentralized P2P file sharing networks. In proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services.(ICAS-ICNS 2005), Papeete, p 39Cramer C, Kutzner K, Fuhrmann T (2004) Bootstrapping locality-aware P2P networkS. In proceedings of the 12th IEEE International Conference on Networks (ICON 2004), Singapore, pp 357–361FIPS 180-1 - Secure Hash Standard, SHA-1. National Institute of Standards and Technology. http://www.itl.nist.gov/fipspubs/fip180-1.htm [Last access: Dec. 30, 2014]Eastlake D., Jones P., US Secure Hash Algorithm 1 (SHA1),(2001). In IETF website, Available at: http://www.ietf.org/rfc/rfc3174.txt [Last access: March 20, 2015]Lacuesta R, Lloret J, Garcia M, Peñalver L (2011) Two secure and energy-saving spontaneous Ad-Hoc protocol for wireless mesh client networks. J Netw Comput Appl 3(2):492–50

    A Network Algorithm for 3D/2D IPTV Distribution using WiMAX and WLAN Technologies

    Full text link
    The final publication is available at link.springer.comThe appearance of new broadband wireless technologies jointly with the ability to offer enough quality of service to provide IPTV over them, have made possible the mobility and ubiquity of any type of device to access the IPTV network. The minimum bandwidth required in the access network to provide appropriate quality 3D/2D IPTV services jointly with the need to guarantee the Quality of Experience (QoE) to the end user, makes the need of algorithms that should be able to combine different wireless standards and technologies. In this paper, we propose a network algorithm that manages the IPTV access network and decides which type of wireless technology the customers should connect with when using multiband devices, depending on the requirements of the IPTV client device, the available networks, and some network parameters (such as the number of loss packets and packet delay), to provide the maximum QoE to the customer. The measurements taken in a real environment from several wireless networks allow us to know the performance of the proposed system when it selects each one of them. The measurements taken from a test bench demonstrate the success of our system.This work has been partially supported by the Polytechnic University of Valencia, though the PAID-15-10 multidisciplinary projects, by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT - Fundacao para a Ciencia e a Tecnologia through the PEst-OE/EEI/LA0008/2011 Project.Lloret, J.; Cánovas Solbes, A.; Rodrigues, JJPC.; Lin, K. (2013). A Network Algorithm for 3D/2D IPTV Distribution using WiMAX and WLAN Technologies. Multimedia Tools and Applications. 67(1):7-30. https://doi.org/10.1007/s11042-011-0929-4S730671Abukharis S, MacKenzie R, Farrell TO (2009) Improving QoS of Video Transmitted Over 802.11 WLANs Using Frame Aggregation. London Communications Symposium.. London, United Kingdom, September 03–04Alejandro Canovas, Fernando Boronat, Carlos Turro and Jaime Lloret (2009) Multicast TV over WLAN in a University Campus Network, The Fifth International Conference on Networking and Services (ICNS 2009), Valencia (Spain), April 20–25Alfonsi B (2005) “I want my IPTV: Internet Protocol television predicted a winner,” IEEE Distributed Systems Online, vol.6, no.2Birlik F, Gurbuz Ö, Ercetin O (2009) IPTV Home Networking via 802.11 Wireless Mesh Networks: An Implementation Experience. IEEE Trans. on Consumer Electronics, Vol. 55, No. 3Cai LX, Ling X, Shen X, Mark JW, Cai L (2009) Supporting voice and video applications over IEEE 802.11n WLANs. Wireless Networks 15:443–454Cunningham G, Perry P, Murphy J, Murphy L (2009) Seamless Handover of IPTV Streams in a Wireless LAN Network. Transactions on Broadcasting, IEEE 55(4):796–801Dai Z, Fracchia R, Gosteau J, Pellati P, Vivier G (2008) Vertical Handover Criteria and Algorithm in IEEE802.11 and 802.16 Hybrid Networks, IEEE International Conference on Communications, 2008. ICC’08. Beijing, China, 19–23Gidlund M, Ekling J (2008) VoIP and IPTV distribution over wireless mesh networks in indoor environment. IEEE Trans Consum Electron 54(4):1665–1671Hellberg C, Greene D, Boyes T (2007) Broadband network architectures: designing and deploying triple-play services. Prentice Hall PTR Upper Saddle River, NJ, USAHsu H-T, Kuo F-Y, Lu P-H (2010) Design of WiFi/WiMAX dual-band E-shaped patch antennas through cavity model approach. Microw Opt Technol Lett 52(2):471–474IEEE 802.11 Working Group, At http://www.ieee802.org/11/index.shtml [last access: July 2011]IEEE Std 802.11™-2007 - IEEE Standard for Information Technology— Telecommunications and information exchange between systems— Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) SpecificationsIEEE Std 802.16™-2009, IEEE Standard for Local and metropolitan area networks, Part 16: Air Interface for Broadband Wireless Access Systems. At http://standards.ieee.org/getieee802/download/802.16-2009.pdf [last access: July 2011]inCode Telecom group Inc. (2006) The Quad-Play—the First Wave of the Converged Services Evolution. White paper, FebruaryIPTV Focus Group, Available at http://www.itu.int/ITU-T/IPTV/ [last access: July 2011]Jindal S, Jindal A, Gupta N (2005) Grouping WI-MAX, 3 G and WI-FI for wireless broadband, The First IEEE and IFIP International Conference in Central Asia on Internet 2005, September 26–29, Bishkek, KyrgyzstanJin-Yu Zhang, Man-Gui Liang (2008) “IPTV QoS Implement Mechanism in WLAN,” Int. Conference on Intelligent Information Hiding and Multimedia Signal Processing. pp 117-120, 15–17Karen Fernanda Medina Velez and Ivonne Alexandra Revelo Arias (2006) Diseño y planificación de una red inalámbrica basada en los estandares IEEE 802.16 (WIMAX) y 802.11 (WIFI) para proveer de internet de banda ancha a poblaciones de las provincias de Loja y Zamora Chinchipe, Tesis Electrónica y Telecomunicaciones (IET), Escuela Politécnica Nacional, Quito, EcuadorKnightson K, Morita N, Towle T (2005) NGN architecture: generic principles, functional architecture, and implementation. IEEE Commun Mag 43(10):49–56Lai C, Min Chen (2011) Playback-Rate Based Streaming Services for Maximum Network Capacity in IP Multimedia Subsystem, IEEE System Journal, doi: 10.1109/JSYST.2011.2165190Lee K-H, Trong ST, Lee B-G, Kim Y-T (2008) QoS-Guaranteed IPTV Service Provisioning in Home Network with IEEE 802.11e Wireless LAN,” IEEE Network Operations and Management Symposium. pp 71-76Marcelo Atenas, Sandra Sendra, Miguel Garcia, Jaime Lloret (2010) IPTV Performance in IEEE 802.11n WLANs, IEEE Global Communications Conference (IEEE Globecomm 2010), Miami (USA), December 6–10Miguel Garcia, Jaime Lloret, Miguel Edo, Raquel Lacuesta (2009) IPTV Distribution Network Access System Using WiMAX and WLAN Technologies, International Symposium on High Performance Distributed Computing (HPDC 2009), Munich (Germany), June 11–13Park AH, Choi JK (2007) “QoS guaranteed IPTV service over Wireless Broadband network”, The 9th Int. Conference on Advanced Communication Technology 2:1077–1080Retnasothie FE, Ozdemir MK, YÄucek T, Zhang J, Celebi H, Muththaiah R (2006) “Wireless IPTV over WiMAX: Challenges and applications”. IEEE Wamicon, Clearwater, FLSchollmeier G, Winkler C (2004) Providing sustainable QoS in next-generation networks. IEEE Communication Magazine 42(6):102–107She J, Hou F, Ho P-H, Xie L-L (2007) IPTV over WiMAX: Key Success Factors, Challenges, and Solutions [Advances in Mobile Multimedia]. IEEE Commun Mag 45(8):87–93Shihab E, Cai L, Wan F, Gulliver TA, Tin N (2008) Wireless mesh networks for in-home IPTV distribution. IEEE Netw 22(1):52–57Shihab E, Wan F, Cai L, Gulliver A, Tin N (2007) “Performance Analysis of IPTV in Home Networks”, IEEE Global Telecommunications (GLOBECOM 2007), Washington, DC, pp 26–30Singh H, ChangYeul Kvvon, Seong Soo Kim, Chiu Ngo (2008) “IPTV over WirelessLAN: Promises and Challenges,” 5th IEEE Consumer Communications and Networking Conference, pp.626-631Super AG technologies, At http://www.digicom.it/italiano/supporto/WhitePaper/Wireless108M_whitepaper.pdf [last access: July 2011]VLC Media Player, Available at www.videolan.org [last access: July 2011]Wen-Hsing Kuo, Tehuang Liu, Wanjiun Liao (2007) Utility-Based Resource Allocation for Layer-Encoded IPTV Multicast in IEEE 802.16 (WiMAX) Wireless Networks. IEEE International Conference on Communications 2007 (ICC 2007), 24–28. Glasgow, Scotland pp 1754-1759Wireshark Network Protocol Analyzer, Available at www.wireshark.org [last access: July 2011]Xiao Y, Du X, Zhang J, Hu F, Guizani S (2007) Internet protocol television (IPTV): the killer application for the next-generation internet. IEEE Commun Mag 45(11):126–134Yarali A, Rahman S, Mbula B (2008) WIMAX: The innovate Broadband Wireless access technology. Journal of Communications 3(2):53–6
    corecore