41,416 research outputs found

    On the feasibility of a user-operated mobile content distribution network

    Get PDF
    The vast majority of mobile data transfers today follow the traditional client-server model. Although in the fixed network P2P approaches have been exploited and shown to be very efficient, in the mobile domain there has been limited attempt to leverage on P2P (D2D) for large-scale content distribution (i.e., not DTN-like, point-to-point message transfers). In this paper, we explore the potential of a user-operated, smartphone-centric content distribution model for smartphone applications. In particular, we assume source nodes that are updated directly from the content provider (e.g., BBC, CNN), whenever updates are available; destination nodes are then directly updated by source nodes in a D2D manner. We leverage on sophisticated information-aware and application-centric connectivity techniques to distribute content between mobile devices in densely-populated urban environments. Our target is to investigate the feasibility of an opportunistic content distribution network in an attempt to achieve widespread distribution of heavy content (e.g., video files) to the majority of the destination nodes. We propose ubiCDN as a ubiquitous, user-operated and distributed CDN for mobile applications

    On participatory service provision at the network edge with community home gateways

    Get PDF
    Edge computing is considered as a technology to enable new types of services which operate at the network edge. There are important use cases in ambient intelligence and the Internet of Things (IoT) for edge computing driven by huge business potentials. Most of today's edge computing platforms, however, consist of proprietary gateways, which are either closed or fairly restricted to deploy any third-party services. In this paper we discuss a participatory edge computing system running on home gateways to serve as an open environment to deploy local services. We present first motivating use cases and review existing approaches and design considerations for the proposed system. Then we show our platform which materializes the principles of an open and participatory edge environment, to lower the entry barriers for service deployment at the network edge. By using containers, our platform can flexibly enable third-party services, and may serve as an infrastructure to support several application domains of ambient intelligence.Peer ReviewedPostprint (author's final draft

    Value Creation in a QoE Environment

    Get PDF
    User behavior of multimedia services currently undergoes strong changes. This is reflected in several recent trends, e.g. the increase of rich media content consumption, preferences for more individual and personalized services and the higher sensitivity of end users for quality issues. These changes will eventually lead to strong changes in network traffic characteristics: rising congestion in peak times and less availability of bandwidth for the individual user. As a result, the quality as perceived by the end-user will decrease if network operators and service providers do not anticipate the required changes for the network. Measurable network requirements such as available video and speech quality, security and reliability are addressed by technologies that are commonly summed up in the Quality of Service (QoS) concept. However, the end-users' perception of quality is only reflected in the wider concept of Quality of Experience (QoE). This takes the measurable network requirements into account as well as customer needs, wants and preferences. For the implementation of QoE technologies several network components need to be added or changed resulting in high capital expenditures. Yet, it is not clear if these costs can be compensated with efficiency increases. Thus, new revenue streams for the network operator are necessary to incentivize investments in QoE technologies. In this paper we address four new value creation models that can serve as basis for more elaborated business models for network operators and other actors. We show how interest in QoE of the user, the content provider, the service provider and the advertiser induces new revenue streams. These models are embedded in five possible future QoE scenarios that reveal regulation, end user quality sensibility and end-to-end support as major issues for the future. --Business Models,Quality of Experience (QoE),Quality of Service (QoS),Value Creation

    CAMMD: Context Aware Mobile Medical Devices

    Get PDF
    Telemedicine applications on a medical practitioners mobile device should be context-aware. This can vastly improve the effectiveness of mobile applications and is a step towards realising the vision of a ubiquitous telemedicine environment. The nomadic nature of a medical practitioner emphasises location, activity and time as key context-aware elements. An intelligent middleware is needed to effectively interpret and exploit these contextual elements. This paper proposes an agent-based architectural solution called Context-Aware Mobile Medical Devices (CAMMD). This framework can proactively communicate patient records to a portable device based upon the active context of its medical practitioner. An expert system is utilised to cross-reference the context-aware data of location and time against a practitioners work schedule. This proactive distribution of medical data enhances the usability and portability of mobile medical devices. The proposed methodology alleviates constraints on memory storage and enhances user interaction with the handheld device. The framework also improves utilisation of network bandwidth resources. An experimental prototype is presented highlighting the potential of this approach

    What Would You Ask to Your Home if It Were Intelligent? Exploring User Expectations about Next-Generation Homes

    Get PDF
    Ambient Intelligence (AmI) research is giving birth to a multitude of futuristic home scenarios and applications; however a clear discrepancy between current installations and research-level designs can be easily noticed. Whether this gap is due to the natural distance between research and engineered applications or to mismatching of needs and solutions remains to be understood. This paper discusses the results of a survey about user expectations with respect to intelligent homes. Starting from a very simple and open question about what users would ask to their intelligent homes, we derived user perceptions about what intelligent homes can do, and we analyzed to what extent current research solutions, as well as commercially available systems, address these emerging needs. Interestingly, most user concerns about smart homes involve comfort and household tasks and most of them can be currently addressed by existing commercial systems, or by suitable combinations of them. A clear trend emerges from the poll findings: the technical gap between user expectations and current solutions is actually narrower and easier to bridge than it may appear, but users perceive this gap as wide and limiting, thus requiring the AmI community to establish a more effective communication with final users, with an increased attention to real-world deploymen

    Defending against Sybil Devices in Crowdsourced Mapping Services

    Full text link
    Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based {\em Sybil devices} that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources can cause havoc on Waze, reporting false congestion and accidents and automatically rerouting user traffic. More importantly, we describe techniques to generate Sybil devices at scale, creating armies of virtual vehicles capable of remotely tracking precise movements for large user populations while avoiding detection. We propose a new approach to defend against Sybil devices based on {\em co-location edges}, authenticated records that attest to the one-time physical co-location of a pair of devices. Over time, co-location edges combine to form large {\em proximity graphs} that attest to physical interactions between devices, allowing scalable detection of virtual vehicles. We demonstrate the efficacy of this approach using large-scale simulations, and discuss how they can be used to dramatically reduce the impact of attacks against crowdsourced mapping services.Comment: Measure and integratio

    Spatial and Social Paradigms for Interference and Coverage Analysis in Underlay D2D Network

    Get PDF
    The homogeneous Poisson point process (PPP) is widely used to model spatial distribution of base stations and mobile terminals. The same process can be used to model underlay device-to-device (D2D) network, however, neglecting homophilic relation for D2D pairing presents underestimated system insights. In this paper, we model both spatial and social distributions of interfering D2D nodes as proximity based independently marked homogeneous Poisson point process. The proximity considers physical distance between D2D nodes whereas social relationship is modeled as Zipf based marks. We apply these two paradigms to analyze the effect of interference on coverage probability of distance-proportional power-controlled cellular user. Effectively, we apply two type of functional mappings (physical distance, social marks) to Laplace functional of PPP. The resulting coverage probability has no closed-form expression, however for a subset of social marks, the mark summation converges to digamma and polygamma functions. This subset constitutes the upper and lower bounds on coverage probability. We present numerical evaluation of these bounds on coverage probability by varying number of different parameters. The results show that by imparting simple power control on cellular user, ultra-dense underlay D2D network can be realized without compromising the coverage probability of cellular user.Comment: 10 pages, 10 figure

    Distributed storage manager system for synchronized and scalable AV services across networks

    Get PDF
    This article has been made available through the Brunel Open Access Publishing Fund - Copyright @ 2011 Hindawi Publishing CorporationThis paper provides an innovative solution, namely, the distributed storage manager that opens a new path for highly interactive and personalized services. The distributed storage manager provides an enhancement to the MHP storage management functionality acting as a value added middleware distributed across the network. The distributed storage manager system provides multiple protocol support for initializing and downloading both streamed and file-based content and provides optimum control mechanisms to organize the storing and retrieval of content that are remained accessible to other multiple heterogeneous devices
    corecore