818 research outputs found

    The crowd as a cameraman : on-stage display of crowdsourced mobile video at large-scale events

    Get PDF
    Recording videos with smartphones at large-scale events such as concerts and festivals is very common nowadays. These videos register the atmosphere of the event as it is experienced by the crowd and offer a perspective that is hard to capture by the professional cameras installed throughout the venue. In this article, we present a framework to collect videos from smartphones in the public and blend these into a mosaic that can be readily mixed with professional camera footage and shown on displays during the event. The video upload is prioritized by matching requests of the event director with video metadata, while taking into account the available wireless network capacity. The proposed framework's main novelty is its scalability, supporting the real-time transmission, processing and display of videos recorded by hundreds of simultaneous users in ultra-dense Wi-Fi environments, as well as its proven integration in commercial production environments. The framework has been extensively validated in a controlled lab setting with up to 1 000 clients as well as in a field trial where 1 183 videos were collected from 135 participants recruited from an audience of 8 050 people. 90 % of those videos were uploaded within 6.8 minutes

    The Effect of Network and Infrastructural Variables on SPDY's Performance

    Get PDF
    HTTP is a successful Internet technology on top of which a lot of the web resides. However, limitations with its current specification, i.e. HTTP/1.1, have encouraged some to look for the next generation of HTTP. In SPDY, Google has come up with such a proposal that has growing community acceptance, especially after being adopted by the IETF HTTPbis-WG as the basis for HTTP/2.0. SPDY has the potential to greatly improve web experience with little deployment overhead. However, we still lack an understanding of its true potential in different environments. This paper seeks to resolve these issues, offering a comprehensive evaluation of SPDY's performance using extensive experiments. We identify the impact of network characteristics and website infrastructure on SPDY's potential page loading benefits, finding that these factors are decisive for SPDY and its optimal deployment strategy. Through this, we feed into the wider debate regarding HTTP/2.0, exploring the key aspects that impact the performance of this future protocol

    A network paradigm for very high capacity mobile and fixed telecommunications ecosystem sustainable evolution

    Full text link
    For very high capacity networks (VHC), the main objective is to improve the quality of the end-user experience. This implies compliance with key performance indicators (KPIs) required by applications. Key performance indicators at the application level are throughput, download time, round trip time, and video delay. They depend on the end-to-end connection between the server and the end-user device. For VHC networks, Telco operators must provide the required application quality. Moreover, they must meet the objectives of economic sustainability. Today, Telco operators rarely achieve the above objectives, mainly due to the push to increase the bit-rate of access networks without considering the end-to-end KPIs of the applications. The main contribution of this paper concerns the definition of a deployment framework to address performance and cost issues for VHC networks. We show three actions on which it is necessary to focus. First, limiting bit-rate through video compression. Second, contain the rate of packet loss through artificial intelligence algorithms for line stabilization. Third, reduce latency (i.e., round-trip time) with edge-cloud computing. The concerted and gradual application of these measures can allow a Telco to get out of the ultra-broadband "trap" of the access network, as defined in the paper. We propose to work on end-to-end optimization of the bandwidth utilization ratio. This leads to a better performance experienced by the end-user. It also allows a Telco operator to create new business models and obtain new revenue streams at a sustainable cost. To give a clear example, we describe how to realize mobile virtual and augmented reality, which is one of the most challenging future services.Comment: 42 pages, 4 tables, 6 figures. v2: Revised Englis

    Tradable Service Level Agreements to Manage Network Resources for Streaming Internet Services

    Get PDF
    In recent years, supply and demand of streaming applications via the Internet (e.g., video-on-demand, live TV coverage, video conferencing) have increased. The idea behind streaming Internet services is to avoid a time-consuming download, and instead, make the user view streaming content in real-time without delay. However, today’s Internet traffic is routed on a best effort basis without any support for guaranteed service provisioning. Missing traffic prioritization mechanisms to guarantee Quality of Service (QoS) and, additionally, the fact that traffic passes several Internet Service Providers (ISP) during transmission is very disadvantageous for the performance of streaming Internet services. Therefore, a solution is presented to enhance existing protocols with QoS mechanisms. Service Level Agreements (SLA) and Operational Level Agreements (OLA) between service providers and service customers are proposed to enforce service guarantees on an economic base and they serve ISPs and Content Service Providers (CSP) to efficiently manage network resources. The concatenation of such contractual agreements between ISPs enables end-to-end-based service provisioning with QoS assurance. A contracting protocol is introduced to control the settlement of contracts and user demands. With the help of service brokers, SLAs could even be traded in a marketplace established for efficient use of limited resources

    Unified messaging control platform

    Get PDF

    Information Assurance; Small Business and the Basics

    Get PDF
    Business is increasingly dependent on information systems to allow decision makers to gather process and disseminate information. As the information landscape becomes more interconnected, the threats to computing resources also increase. While the Internet has allowed information to flow, it has also exposed businesses to vulnerabilities. Whereas large businesses have information technology (IT) departments to support their security, small businesses are at risk because they lack personnel dedicated to addressing, controlling and evaluating their information security efforts. Further complicating this situation, most small businesses IT capabilities have evolved in an ad hoc fashion where few employees understand the scope of the network and fewer if any sat down and envisioned a secure architecture as capabilities were added. This paper examines the problem from the perspective that IT professionals struggle to bring adequate Information Assurance (IA) to smaller organizations where the tools are well known, but the organizational intent of the information security stance lacks a cohesive structure for system development and enforcement. This paper focuses on a process that will allow IT professionals to rapidly improve their organizations\u27 security stance with few changes using tools already in place or available at little or no cost. Starting with an initial risk assessment research provides the groundwork for the introduction of a secure system development life cycle (SSLDC) where continual evaluation improves the security stance and operation of a networked computer system

    Semantical rule-based false positive detection for IDS

    Get PDF

    Operational Technology Services to Support Business Activities

    Get PDF
    The operational technology (OT) environment is a vital part of several businesses around the world. While most of these businesses rely on the activities conducted there in order to generate revenue, it is not always correctly secured, and it is treated as a mere extension of the company's IT network. In this thesis it is described how OT-specific services were designed to protect the company business while, at the same time, keeping into consideration the needs of the people operating in the environment. It is also described how the design was implemented in practice, describing the technology and the entities involved. Finally, the use case definition and the testing phase is described to report what kind of problem arose only later and how they were approached to be solved. In short, this thesis follows the entire development of these services, starting from the very beginning until the present moment, meaning the successful conclusion of the testing phase and the start of the operational phase

    Supporting Quality-Of-Service of Mobile Commerce Transactions

    Get PDF
    With the deployment of 3G and 4G mobile networks, a sizable proportion of e-commerce traffic is expected to move to these networks. These transactions are likely to be diverse. Mobile transactions can include unique requirements such as atomicity (all or none steps), push or pull, security, and privacy. Because users are mobile, unpredictable link characteristics, and other problems associated with wireless networks, some mobile commerce transactions may not be completed causing significant annoyance to the users affected. Therefore, the probability of completing mobile transactions is an important parameter for measuring quality-of-service of a network supporting mobile commerce. The transaction completion probability measures the ability of networks to support completion of transactions. This research focuses on improving the support of mobile commerce transactions by the underlying wireless networks. Mobile commerce traffic is classified as messaging, information connectivity, and transactions in order to provide efficient quality-of-service to various applications. This paper introduces the use of priority, sociability and delegation to improve the transaction completion in wireless networks
    • …
    corecore