12 research outputs found

    A personalized system for scalable distribution of multimedia content in multicast wireless networks

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s11042-014-2139-3This paper presents a novel architecture for scalable multimedia content delivery over wireless networks. The architecture takes into account both the user preferences and context in order to provide personalized contents to each user. In this way, third-party applications filter the most appropriate contents for each client in each situation. One of the key characteristics of the proposal is the scalability, which is provided, apart from the use of filtering techniques, through the transmission in multicast networks. In this sense, content delivery is carried out by means of the FLUTE (File Delivery over Unidirectional Transport) protocol, which provides reliability in unidirectional environments through different mechanisms such as AL-FEC (Application Layer Forward Error Correction) codes, used in this paper. Another key characteristic is the context-awareness and personalization of content delivery, which is provided by means of context information, user profiles, and adaptation. The system proposed is validated through several empirical studies. Specifically, the paper presents evaluations of two types that collect objective and subjective measures. The first evaluate the efficiency of the transmission protocol, analyzing how the use of appropriate transmission parameters reduces the download time (and thus increasing the Quality of Experience), which can be minimized by using caching techniques. On the other hand, the subjective measures present a study about the user experience after testing the application and analyze the accuracy of the filtering process/strategy. Results show that using AL-FEC mechanisms produces download times until four times lower than when no protection is used. Also, results prove that there is a code rate that minimizes the download time depending on the losses and that, in general, code rates 0.7 and 0.9 provide good download times for a wide range of losses. On the other hand, subjective measures indicate a high user satisfaction (more than 80 %) and a relevant degree of accuracy of the content adaption.This work is supported in part by the Ministerio de Economia y Competitividad of the Government of Spain under project COMINN (IPT-2012-0883-430000) and by the project PAID/2012/313 from the PAID-05-12 program of the Vicerrectorado de Investigacion of the Universitat Politecnica de Valencia.De Fez Lava, I.; Gil Pascual, M.; Fons Cors, JJ.; Guerri Cebollada, JC.; Pelechano Ferragud, V. (2014). A personalized system for scalable distribution of multimedia content in multicast wireless networks. Multimedia Tools and Applications. 1-27. https://doi.org/10.1007/s11042-014-2139-3S127AdAdge (2013) A majority of U.S. mobile users are now smartphone users. Available at: http://adage.com/article/digital/a-majority-u-s-mobile-users-smartphone-users/241717 . Accessed November 2013Adomavicius G, Tuzhilin E (2005) Toward the next generation of recommender Systems: a survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering 17:734–749Adomavicius G, Tuzhilin A (2010) Context-aware recommender systems. Recommender Systems Handbook (Chapter 7): 217–253Androjena, Jena Android Porting (2013). Available at: https://code.google.com/p/androjena . Accessed December 2013Anind KD (2001) Understanding and Using Context. Personal Ubiquitous Comput 5:4–7Assad M, Carmichael DJ, Kay J, Kummerfeld B (2007) PersonisAD: distributed, active, scrutable model framework for context-aware services. Proc. of Pervasive Computing, Toronto, Canada:55–72Bai H, Atiquzzaman M (2003) Error modeling schemes for fading channels in wireless communications: a survey. IEEE Communications Surveys and Tutorials 5(2):2–9Baldauf M, Dustdar S, Rosenberg F (2007) A survey on context-aware systems. Int. J. AdHoc and Ubiquitous Computing, Springer-Verlag 2:263–277Barquero D, Bria A (2007) Forward Error Correction file delivery in DVB-H. Proc. of IEEE Vehicular Technology Conference (VTC), Dublin, Ireland:2951–2955Bright A, Kay J, Ler D, Ngo K, Niu W, Nuguid A (2005) Adaptively recommending museum tours. Proc. of the UbiComp Workshop on Smart Environments and their Applications to Cultural Heritage, Tokyo, Japan:29–32Chatfield C, Carmichael D, Hexel R, Kay J, Kummerfeld B (2005) Personalisation in intelligent environments: managing the information flow. Proc. of the OZCHI Computer-human interaction, Canberra, Australia:1–10Chen YFR, Jana R, Stern D, Wei B, Yang M, Sun H, Dyaberi J (2010) Zebroid: using IPTV data to support STB-assisted VoD content delivery. Multimedia System Journal 16(3):199–214Chen G, Kotz D (2000) A survey on context-aware mobile computing research. Technical Report TR2000-381, Dartmouth Computer ScienceCommunity Research and Development Information Service (CORDIS) – Seventh Framework Programme (FP7). Available at: http://cordis.europa.eu/fp7/home_en.html . Accesed October 2013de Fez I, Fraile F, Belda R, Guerri JC (2011) Performance evaluation of AL-FEC LDPC codes for push content applications in wireless unidirectional environments. Multimedia Tools and Applications 60(3):669–688de Fez I, Fraile F, Belda R, Guerri JC (2012) Analysis and evaluation of adaptive LDPC AL-FEC codes for content download services. IEEE Transactions on Multimedia 14(3):641–650de Fez I, Fraile F, Guerri JC (2013) Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol. Computer Communications 36(12):1298–1309de Fez I, Guerri JC (2014) An adaptive mechanism for optimal content download in wireless networks. IEEE Transactions on Multimedia 16(4):1140–1155Du R, Safavi-Naini R, Susilo W (2003) Web filtering using text classification (2003). Proc. of the Int Conf on Networks (ICON), Sydney, Australia:325–330ETSI TS 102 034 (2008), Transport of MPEG-2 TS Based DVB Services over IP based Networks (and associated XML), v1.4.1, available online: www.etsi.org/deliver/etsi_ts/102000_102099/102034/01.04.01_60/ts_102034v010401p.pdfETSI TS 102 472 (2009), Digital Video Broadcasting (DVB); IP Datacast over DVB-H: Content Delivery Protocols, v1.3.1, available online: www.etsi.org/deliver/etsi_ts/102400_102499/102472/01.03.01_60/ts_102472v010301p.pdfETSI TS 126 346 (2013), Universal Mobile Telecommunications System (UMTS); LTE; Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs (release 10), v11.3.0, available online: www.etsi.org/deliver/etsi_ts/126300_126399/126346/11.03.00_60/ts_126346v110300p.pdfFelfernig A, Jeran M, Ninaus G, Reinfrank F, Reiterer S (2013) Toward the next generation of recommender systems: applications and research challenges. Multimedia Services in Intelligent Environments 24 (Chapter 5): 81–98Fraile F, de Fez I, Guerri JC (2009) Modela-TV: service personalization and business model management for mobile TV. Proc. of 7th European Interactive TV Conference (EuroITV), Leuven, Belgium:1–6Fraile F, de Fez I, Guerri JC (2014) Evaluation of background push content download services to mobile devices over DVB networks. IEEE Transactions on Broadcasting 60(1):1–15Gallager RG (1962) Low density parity check codes. IRE Transactions on Information Theory 8(1):21–28Gil M, Giner P, Pelechano V (2012) Personalization for unobtrusive service interaction. Personal Ubiquitous Comput 16(5):543–561Guillen J, Miranda J, Berrocal J, Garcia-Alonso J, Murillo J, Canal C (2014) People as a service: a mobile-centric model for providing collective sociological profiles. IEEE Software 31(2):48–53Hrvoje J, Stockhammer T, Xu W, Abdel Samad W (2006) Efficient video-on-demand services over mobile datacast channels. Journal of Zhejiang University 7(5):873–884Hsieh CC, Lin CH, Chang WT (2009) Design and implementation of the interactive multimedia broadcasting services in DVB-H. IEEE Transactions on Consumer Electronics 55(4):1779–1787Kellerer H, Pferschy U, Pisinger D (2004) Knapsack problems. SpringerKorpipaa P, Malm EJ, Rantakokko T, Kyllonen V, Kela J, Mantyjarvi J, Hakkila J, Kansala I (2006) Customizing user interaction in smart phones. IEEE Pervasive Computing 5:82–90Kuppusamy KS, Aghila G (2012) A personalized web page content filtering model based on segmentation. Int Journal of Information Sciences and Techniques (IJIST) 2(1):41–51Kutscher D, Greifenberg J, Loos K (2007) Scalable DTN distribution over uni-directional links. Proc. of the SIGCOMM workshop on networked systems in developing regions (NSDR), Kyoto, Japan: article no. 6Lewis JR (1995) Ibm computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. Int J Hum Comput Interact 7(1):57–78Liang L, Cruichkshank H, Sun Z, Kulatunga C, Fairhurst G (2010) The integration of TESLA and FLUTE over satellite networks. Proc. of the IEEE Global Telecommunications Conference (Globecom), Miami, FL, USA:1–6Lohmar T, Huschke J (2009) Radio resource optimization for MBMS file transmissions. Proc. of the IEEE Int Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Bilbao, Spain:1–7Neumann C, Roca V, Walsh R (2005) Large scale content distribution protocols. ACM Computer Communication Review 35(5):85–92Paila T, Walsh R, Luby M, Roca V, Lehtonen R (2012) FLUTE – File Delivery Over Unidirectional Transport. IETF RFC 6726Paolini E, Varrella M, Chiani M, Matuz B, Liva G (2008) Low-complexity LDPC codes with near-optimum performance over the BEC. Proc. Adv Satellite Mobile Systems (ASMS), Bologna, Italy:274–282Papastergiou G, Psaras I, Tsaoussidis V (2009) Deep-space transport protocol: a novel transport scheme for space DTNs. Computer Communications 32(16):1757–1767Peltotalo J, Harju J, Saukko M, Väätämöinen L, Bouazizi I, Curcio I (2008) Personal mobile broadcasting based on the 3GPP MBMS System. Proc. of MoMM, Linz, Austria:156–162Peltotalo J, Peltotalo S, Harju J, Walsh R (2007) Performance analysis of a file delivery system based on the FLUTE protocol. Int Journal of Communication Systems 20(6):633–659Podlipnig S, Böszörmenyi L (2003) A survey of web cache replacement strategies. ACM Computing Surveys 35(4):374–398Roca V, Neumann C, Furodet D (2008) Low density parity check (LDPC) staircase and triangle forward error correction (FEC) schemes. IETF RFC 5170Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131–164Schiller JH, Voisard A (2004) Location-based services. Kaufmann, MorganSerral E, Gil M, Valderas P, Pelechano V (2013) Automating unobtrusive personalized services in ambient media environments. Multimedia Tools and Applications, Springer US, available online, doi: 10.1007/s11042-013-1634-2Serral E, Valderas P, Pelechano V (2010) Towards the model driven development of context-aware pervasive systems. Pervasive and Mobile Computing 6(2):254–280Streefkerk JW, van Esch-Bussemakers MP, Neerincx MA (2006) Designing personal attentive user interfaces in the mobile public safety domain. Comput Hum Behav 22:749–770Valtonen M, Vainio AM, Vanhala J (2009) Proactive and adaptive fuzzy profile control for mobile phones. Proc. of the IEEE Int Conf on Pervasive Computing and Communications (PerCom), Galveston, Texas, USA:1–3van Woensel W, Gil M, Casteleyn S, Serral E, Pelechano V (2012) Adapting the obtrusiveness of service interactions in dynamically discovered environments. Proc. of MobiQuitous, Beijing, China:250–262W3C (2012), OWL 2Web Ontology Language Document Overview, Recommendation 11. Available at: http://www.w3.org/TR/owl2-overview. Accesed: November 2013Weld DS, Anderson C, Domingos P, Etzioni O, Gajos K, Lau T, Wolf S (2003) Automatically personalizing user interfaces. Proc. of the Int Joint Conference on Artificial Intelligence (IJCAI), Acapulco, Mexico:1613–1619Xu J, Hu Q, Lee W, Lee DL (2004) Performance evaluation of an optimal cache replacement policy for wireless data dissemination. IEEE Transactions on Knowledge and Data Engineering 16(1):125–139Yetgin Z, Çelik T (2012) Efficient progressive downloading over multimedia broadcast multicast service. Computer Networks 56(2):533–547Zheng Q, Zhu P, Wang Y, Xu M (2010) EPSP: Enhancing network protocol with social-aware plane. Proc. of IEEE/ACM Int Conference on Green Computing and Communications (GreenCom) and Int Conference on Cyber, Ohysical and Social Computing (CPSCom), Hangzhou, China:578–58

    Evaluation of background push content download services to mobile devices over DVB networks

    Full text link
    © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.This paper proposes a multicast content download service based on the use of residual network capacity to push multimedia content to available local storage in personal multimedia devices. The service under study is based on the FLUTE protocol. Specifically, FLUTE packets fill the spare capacity in the IP tunnels reserved for the primary streaming service (opportunistic insertion). The paper also evaluates the use of AL-FEC parity to overcome transmission errors,object multiplexing to send the most popular multimedia contents more frequently and cache management policies that consider user preferences in order to keep in storage the most useful items. The service has been evaluated through simulations and measurements performed with an application prototype based on the DVB-H standards. The results show that AL-FEC enables the use of residual capacity for background content download services. In turn, AL-FEC, as well as object multiplexing, improves the relation between the number of content items and the overall access time. Moreover, results show that high percentages of requests can be served from the local cache of the service, provided that it is possible to estimate the popularity of content items and the user preferences.This work was supported by the PAID-05-12 program of the UniversitatPolitecnica de Valencia.Fraile Gil, F.; De Fez Lava, I.; Guerri Cebollada, JC. (2014). Evaluation of background push content download services to mobile devices over DVB networks. IEEE Transactions on Broadcasting. 60(1):1-15. https://doi.org/10.1109/TBC.2013.2289639S11560

    Ant-based evidence distribution with periodic broadcast in attacked wireless network

    Get PDF
    In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so, searching for trust certicates will still become highly cost and delay especially when wireless network is suering CTS jamming attack. We believe the individual solution can lead us to solve this combination problems in the future. Therefore, in this work, we investigate the delay and cost of searching a distributed certicate and the adverse eects of fabiricated control packet attacks on channel throughput and delivery ratio respectively, and propose two techniques that can improve the eciency of searching for such certicates in the network and mitigate the CTS jamming attack's eect. Evidence Distribution based on Periodic Broadcast (EDPB) is the rst solution we presented to help node to quickly locate trust certicates in a large wireless sensor network. In this solution, we not only take advantages from swarm intelligence alogrithm, but also allow nodes that carrying certicates to periodically announce their existence. Such announcements, together with a swarm-intelligence pheromone pdate procedure, will leave traces on the nodes to lead query packets toward the certicate nodes. We then investigate the salient features of this schema and evaluate its performance in both static and mobile networks. This schema can also be used for other essential information dissemination in mobile ad hoc networks. The second technqiue, address inspection schema (AIS) xes vulnerabilities exist in distribution coordinating function (DCF) dened in IEEE 802.11 standard so that each node has the ability to beat the impact of CTS jamming attack and furthermore, benets network throughput. We then perform ns-2 simulations to evaluate the benet of AIS

    Pervasive Data Access in Wireless and Mobile Computing Environments

    Get PDF
    The rapid advance of wireless and portable computing technology has brought a lot of research interests and momentum to the area of mobile computing. One of the research focus is on pervasive data access. with wireless connections, users can access information at any place at any time. However, various constraints such as limited client capability, limited bandwidth, weak connectivity, and client mobility impose many challenging technical issues. In the past years, tremendous research efforts have been put forth to address the issues related to pervasive data access. A number of interesting research results were reported in the literature. This survey paper reviews important works in two important dimensions of pervasive data access: data broadcast and client caching. In addition, data access techniques aiming at various application requirements (such as time, location, semantics and reliability) are covered

    Performance optimizations for LTE User-Plane L2 software

    Get PDF
    Abstract. Nowadays modern mobile communication networks are expected to be able to compete with wired connections in both latency and speed. This places a lot of pressure on the mobile communication protocols, which are very complex, and much of their implementation depends on the software. The performance of the software directly affects the capacity of the network, which in turn affects the throughput and latency of the network’s users and the number of users the network can support. This thesis concentrates on identifying software components of LTE User-Plane radio interface protocols for improvements, and exploring the solutions for better performance. This study leans on system component tests and the performance profiler tool perf, which enables tracking the effects of software optimizations from function-level to the whole system-level accuracy. In addition to perf, performance counters provided by the processor are manually observed and they provide the verification on why specific optimizations affect the performance. Slow memory accesses or cache misses are identified as the most constraining factor in the software’s performance. Also many good practices are found during the optimization work, such as arranging code common path first. Surprisingly, separating hardly executed code from hotspots also has a positive impact on performance, in addition to shrinking the active binary. The optimization work results in the whole software’s load decreasing from 60% to 50% and in some individual functions load decreases of over 70% are achieved

    Research in Mobile Database Query Optimization and Processing

    Get PDF

    Caching concept for mobile engineering apps

    Get PDF
    Mobile apps in the engineering domain, have to deal with data coming from Product Data Management (PDM)-Systems. This data contains details about the products that are very large. Geometry data like 2D or 3D Computer Aided Design (CAD) representations are included. To get the data, the apps use wireless mediums like WiFi or mobile data networks (LTE, 3G, etc.). Transferring large size data over these mediums take a lot of time and can be aborted through intermittent connectivity. Also the energy consumption increases through the long-lasting transfers. In this master thesis a concept is created that overcomes these problems. A cache on the client is used that stores the relevant data for a fast access. As the disk space on mobile devices is limited, the data that is cached has to be chosen well. Only the data that is currently needed should be stored in the cache and provided to the app. To reduce the waiting times these data should be there before it is explicitly requested. To make this possible the concept of this thesis provides preemptive caching (hoarding). Thereby, the data is cached that will probably be needed next. To decide what data is needed, context is used. The information coming from the environment of the client is used, to derive situations. With the help of these situations the data is determined that gets cached. Besides this context-aware strategy, a traditional way of caching where all requested data gets cached is used in the concept. Furthermore, this thesis addresses the caching mechanism in its entirety. It determines a policy for the replacement of not needed data to free space. Also a strategy for invalidating obsolete data in the cache is determined. Finally, a prototypical implementation of the concept within an existing mobile engineering app is presented. With the help of this prototype the concept is evaluated

    Um modelo para compartilhamento consistente de dados em ambientes de computação móvel

    Get PDF
    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.Em ambientes de computação móveis, assistentes pessoais digitais podem gravar dados localmente para possibilitar o trabalho do dispositivo móvel mesmo quando ele não está na área de abrangência de uma rede sem fio. Estes mesmos dados gravados localmente podem ser compartilhados entre dois ou mais usuários, sendo necessários mecanismos para prover consistência neste compartilhamento de dados. Assim, é importante ter sempre à mão os dados mais recentes. Para resolver este problema, foi desenvolvido um mecanismo para atualização de dados em dispositivos móveis a partir de um servidor estacionário, usando um protocolo de timestamp. Tal mecanismo foi testado em um ambiente experimental, que possui um servidor em uma rede estruturada e dois clientes móveis buscando e enviando dados entre o cliente móvel e o servidor (quando este estiver na área de abrangência da rede sem fio estruturada) e entre os clientes móveis (quando não há cobertura pela rede sem fio estruturada) usando uma rede ad-hoc. Nesta dissertação, o modelo de compartilhamento de dados entre cliente e servidor, e entre os próprios clientes é descrito em detalhes, bem como o ambiente experimental e o desenvolvimento do protótipo

    Performance Evaluation of an Optimal Cache Replacement Policy for Wireless Data Dissemination

    No full text
    Data caching at mobile clients is an important technique for improving the performance of wireless data dissemination systems. However, variable data sizes, data updates, limited client resources, and frequent client disconnections make cache management a challenge. In this paper, we propose a gain-based cache replacement policy, Min-SAUD, for wireless data dissemination when cache consistency must be enforced before a cached item is used. Min-SAUD considers several factors that affect cache performance, namely, access probability, update frequency, data size, retrieval delay, and cache validation cost. This paper employs stretch as the major performance metric since it accounts for the data service time and, thus, is fair when items have different sizes. We prove that Min-SAUD achieves optimal stretch under some standard assumptions. Moreover, a series of simulation experiments have been conducted to thoroughly evaluate the performance of Min-SAUD under various system configurations. The simulation results show that, in most cases, the Min-SAUD replacement policy substantially outperforms two existing policies, namely, LRU and SAIU
    corecore