scispace - formally typeset
Search or ask a question

Showing papers presented at "International Conference on Mobile Networks and Management in 2011"


Book ChapterDOI
21 Sep 2011
TL;DR: An analytical models for the Trickle algorithm’s behaviour for the time to consistency are introduced and this model is compared with simulation results for a set of network topologies and enables to discover efficient settings of the algorithm for various application areas, such as logistics.
Abstract: The Trickle algorithm has proven to be of great benefit to the Wireless Sensor Networking area. It has shown general applicability in this field, e.g. for code distribution to smart objects and routing information distribution between smart objects. Up to now analysis of the algorithm has focussed on simulation studies and measurement campaigns. This paper introduces an analytical models for the algorithm’s behaviour for the time to consistency. The model is compared with simulation results for a set of network topologies and enables to discover efficient settings of the algorithm for various application areas, such as logistics.

35 citations


Book ChapterDOI
21 Sep 2011
TL;DR: From the analysis of the collected data it is possible to demonstrate that the interest level has a strong influence in the subjective assessment of the video quality.
Abstract: Nowadays, Service Providers are increasingly concerned about the concept of Quality of Experience (QoE),, even more, when talking about Internet TV or WebTV, where no guarantees of delivery are provided. This paper describes the research and the results on the influence of the level of interest (on a particular sport) in the subjective quality assessment of the corresponding broadcasted media. This analysis is motivated by the work being developed in the European Project My-eDirector 2012, which has the capability to cover the London Olympic Games 2011 via the Web. Therefore, a subjective test was prepared and performed where each observer visioned and assessed the perceived video quality of a set of six sports, encoded in four different bitrate/resolution sets. From the analysis of the collected data it is possible to demonstrate that the interest level has a strong influence in the subjective assessment of the video quality. Based on these results, an empiric formula was deduced to estimate the Mean Opinion Source (MOS) as a function of bitrate and interest level.

16 citations


Book ChapterDOI
21 Sep 2011
TL;DR: An integer linear programming formulation is proposed to solve the virtual network embedding problem, as a simultaneous optimization of virtual nodes and links placement, providing the optimal boundary for each virtual network mapping.
Abstract: Network Virtualization is claimed to be a key component of the Future Internet by enabling the coexistence of heterogeneous (virtual) networks on the same physical infrastructure, providing the dynamic creation and support of different networks with different paradigms and mechanisms in the same physical network. A major challenge in the dynamic provision of virtual networks resides on the efficient embedding of virtual resources into physical ones. Since this problem is known to be \(\mathcal{NP}\)-hard, previous research focused on designing heuristic-based algorithms; most of them do not consider a simultaneous optimization of the node and the link mapping, leading to non-optimal solutions. This paper proposes an integer linear programming formulation to solve the virtual network embedding problem, as a simultaneous optimization of virtual nodes and links placement, providing the optimal boundary for each virtual network mapping. A link − node formulation is used and the multi-commodity flow constrain is applied. In addition, a heuristic algorithm for virtual network embedding is also proposed and compared against the optimal formulation. The performance of the integer linear programming formulation and of the heuristic is evaluated by means of simulation. Simulation experiments show significant improvements of the virtual network acceptance ratio, in average additional 10% of the virtual network requests are accepted when using the integer linear programming formulation, which corresponds, in average, to more 7 virtual networks accommodated on the physical network.

12 citations


Book ChapterDOI
21 Sep 2011
TL;DR: In this article, the FP7 MEDIEVAL project has defined the necessary evolutions over today's mobile Internet architecture, in order to more efficiently support the upcoming growth of video services, in mobile wireless environments.
Abstract: The FP7 MEDIEVAL project, which started in 2010, has been defining the necessary evolutions over today’s mobile Internet architecture, in order to more efficiently support the upcoming growth of video services, in mobile wireless environments. This paper evolves from these initial definitions, by taking into consideration the requirements placed by a core set of next generation video services and defining a global architecture. We describe its main functionalities and subsystems as well as the necessary interfaces, towards the operation of these services in different use cases.

6 citations


Book ChapterDOI
21 Sep 2011
TL;DR: In this paper, the authors present a flexible, scalable and easy-to-configure simulation platform, which is primarily conceived so as to evaluate access selection algorithms, thus leading to multiaccess, multiinterface, multi-service and multi-operator scenarios.
Abstract: This work presents the design of a flexible, scalable and easy-to-configure simulation platform, which is primarily conceived so as to evaluate access selection algorithms. As opposed to other similar tools, the simulator offers the possibility to deploy highly configurable scenarios, with various types of users, services, terminals and technologies. It also enables the analysis of large and complex scenarios (comprising many users and access elements), thanks to the abstraction techniques which have been considered during its design phase, without incurring in a high computational overhead. In addition, it can be used to evaluate algorithms using multi-operator strategies, thus leading to multi-access, multi-interface, multi-service and multi-operator scenarios.

5 citations


Book ChapterDOI
21 Sep 2011
TL;DR: This paper presents a system to capture, process, and display the vital signs of team members, which are made available to a first responders’ team leader, for coordination and monitoring.
Abstract: Every day, thousands of first responders work to save the lives of others, sometimes without the adequate surveillance of health conditions. The VitalResponder is a project that aims at monitoring and control teams of first responders in emergency scenarios, using mobile technologies to capture and use real-time data to support real-time coordination. In this paper we present a system to capture, process, and display the vital signs of team members, which are made available to a first responders’ team leader, for coordination and monitoring. The system addresses specific requirements of the field action, such as the mobility of actors, combining two of the most recent mobile technologies: the iPad (for the coordination view) and Android OS-based smartphones (for real-time sensor data acquisition).

5 citations


Book ChapterDOI
21 Sep 2011
TL;DR: This paper illustrates the arising problems of mobility in CCN for real-time applications and proposes three different solutions and shows that the presented approaches can reduce the delay time and also reduce signaling overhead.
Abstract: The current Internet architecture was not designed to fullfil the requirements of nowadays services, therefore it faces a lot of challenges. There exist several projects, which target to redesign the Internet architecture completely. Content Centric Networking (CCN) is one of them. CCN is based on naming content instead of hosts. It has been shown that CCN can also support point-to-point conversions, for example voice calls. However, it has not been defined how node mobility can be achieved in such a real-time scenario with strong time constraints. This paper illustrates the arising problems of mobility in CCN for real-time applications and proposes three different solutions. The results and the analyses show that the presented approaches can reduce the delay time and also reduce signaling overhead.

5 citations


Book ChapterDOI
21 Sep 2011
TL;DR: In this paper, the authors propose a bootstrapping and discovery mechanism that uses the concept of Hide & Seek, where the entities change their role dynamically according to events in the network, with dynamic probing intervals according to the number of Seekers entering or leaving the network.
Abstract: The main role of a communication framework in distributed autonomic management is to support the dissemination of management information between network nodes In distributed autonomic management, each network node intelligently self-adapts its behavior through collaboration and cooperation between the several nodes In this paper, we propose a set of communication mechanisms between self-managed network nodes, comprehending the several stages of communication, including a bootstrapping, discovery and election of entities, and ensure the base of communication of information between nodes to perform the collaborative decisions and to enforce these decisions We propose a bootstrapping and discovery mechanism that uses the concept of Hide & Seek, where the entities change their role dynamically according to events in the network, with dynamic probing intervals according to the number of Seekers entering or leaving the network We compare our discovery approach with current solutions, and we show that our mechanism is more efficient both in terms of control messages overhead and convergence time

5 citations


Book ChapterDOI
21 Sep 2011
TL;DR: This work proposes a fully distributed architecture employing context user-agents co-located with data-mining agents that creates and maintains local schemas using ranking of global context information based on context proximity.
Abstract: Context-aware applications require local access to current and relevant views of context information derived from global sensors. Existing approaches provide only limited support, because they either rely on a network broker service precluding open-ended searches, or they adopt a presence model which has scalability issues. To this end, we propose a fully distributed architecture employing context user-agents co-located with data-mining agents. These agents create and maintain local schemas using ranking of global context information based on context proximity. Continually evolving context information thus provides applications with current and relevant context views derived from global sensors. Furthermore, we present an evaluation model for assessing the effort required to present local applications with current and relevant contextual views. We show in a comparison with earlier work that the approach achieves the provisioning of evolving context information to applications within predictable time bounds, circumventing earlier limitations.

4 citations


Book ChapterDOI
21 Sep 2011
TL;DR: In this article, the authors considered optimal relay station deployment for IEEE 802.16j networks and proposed a relay deployment mechanism to maximize network capacity for every user or to maximize total network capacity, and therefore to reach greater network capacity values while employing smaller number of relay stations.
Abstract: In this paper, we consider optimal relay station deployment for the IEEE 802.16j networks. IEEE 802.16j is an emerging wireless broadband networking standard that integrates infrastructure base stations with multihop relay technology. The proposed relay deployment mechanism allows us to maximize network capacity for every user or to maximize total network capacity, and, therefore, to reach greater network capacity values while employing smaller number of relay stations. With the proposed approach, the necessary number of relays for a region can be found.

4 citations


Book ChapterDOI
21 Sep 2011
TL;DR: The recent advances on networking technologies together with the ever-increasing requirements of the end-users and their applications/services call for an open approach, yet with a clear migration strategy, so as to avoid the well-known shortcomings and limitations of clean-slate approaches.
Abstract: The recent advances on networking technologies (both at the access and the core realms) together with the ever-increasing requirements of the end-users and their applications/services call for an open approach, yet with a clear migration strategy, so as to avoid the well-known shortcomings and limitations of clean-slate approaches. These requirements have streamlined the design of a novel (yet not revolutionary) architecture framework based on the identification of functional entities and their interfaces. The most distinguishing feature is its flexibility, allowing its adaptation to already existing protocols/technologies/algorithms as well as to novel solutions.

Book ChapterDOI
21 Sep 2011
TL;DR: A management framework is described which enables the automatic, policy-driven coordination of SON control functions, and introduces future necessary evolutions that will allow to fully benefiting from the SON paradigm in operational networks.
Abstract: Future wireless access networks, eg LTE and LTE-Advanced, will be empowered by Self-Organizing Network (SON) mechanisms with the objective to increase performance, reduce the cost of operations, and simplify the network management This article describes a management framework which enables the automatic, policy-driven coordination of SON control functions, and introduces future necessary evolutions that will allow to fully benefiting from the SON paradigm in operational networks

Book ChapterDOI
21 Sep 2011
TL;DR: In this paper, conflict detection between functions in self-organizing networks (SON) is reviewed from a knowledge management perspective, and the advantages of model-based conflict detection over algorithmic alternatives are analyzed.
Abstract: In this article, conflict detection between functions in self-organizing networks (SON) is reviewed. SON coordination is of crucial importance to management automation of fourth-generation networks. In particular, conflict detection is studied from knowledge management perspective. The advantages of model-based conflict detection over algorithmic alternatives are analyzed.

Book ChapterDOI
21 Sep 2011
TL;DR: Different price management strategies are analyzed, since it is sensible to believe that in the mid-term, operators would need to rethink their current strategies, which are mostly based on constant fees.
Abstract: The appearance of new services, as well as the unstoppable increase of the available radio access technologies, leads to a departure from the traditional strategies for the different actors involved in the wireless communications realm. It becomes necessary tackling the design of an architecture able to support the new challenges, being a key aspect breaking with some of the traditional solutions, which are unable to cope with the new requirements. One of the most important aspects is to address a holistic design, enforcing an open and flexible cooperation between the different entities, which is not usually possible with patches to the currently available alternatives. This is the framework of the Cognitive and Cooperative Communications and autonomous SErvices Management (C3SEM) project, which is founded on the cooperation and integration of the subjacent communication substratum with the service management architecture. In this paper, we describe one of its current open lines of research, in which we analyze different price management strategies, since it is sensible to believe that in the mid-term, operators would need to rethink their current strategies, which are mostly based on constant fees.

Book ChapterDOI
21 Sep 2011
TL;DR: In this article, the authors proposed the integration of different types of devices into one intelligent glove, which has a build-in sensor node to reduce the number of equipments that a fire fighter must carry.
Abstract: Fire fighters often work in dangerous environments, therefore protection is essential. Nowadays fire fighters are equipped with different types of devices, each of which supplies a specific functionality. This paper studies the possibility of integrating some of these functionalities into one intelligent glove, which has a build-in sensor node. Merging different functionalities into one device will reduce the number of equipments that a fire fighter must carry. The concept of networking the intelligent gloves using Wireless Sensor Networks (WSNs) is validated by doing application requirements analysis, transmission range experiments, and performance evaluations of a dedicated routing protocol. Results show that the IEEE 802.15.4 based WSN can be applied in fire fighting scenarios.

Book ChapterDOI
21 Sep 2011
TL;DR: This paper proposes a promiscuous wireless passive monitoring classification approach that can accurately create users’ profiles in terms of the used web-applications and does not require authentication with the wireless Access Point.
Abstract: The Internet can be seen as a mix of several services and applications running on top of common protocols The emergence of several web-applications changed the users’ interaction paradigm by placing them in a more active role allowing them to share photos, videos and much more The analysis of the profile of each user, both in wired and wireless networks, becomes very interesting for tasks such as network resources optimization, service personalization and security In this paper, we propose a promiscuous wireless passive monitoring classification approach that can accurately create users’ profiles in terms of the used web-applications and does not require authentication with the wireless Access Point By extracting appropriate layer 2 traffic metrics, performing a Wavelet Decomposition and analyzing the obtained scalograms, it is possible to analyze the traffic’s time and frequency components An appropriate communication profile can then be defined in order to describe this frequency spectrum which is characteristic to each web-based application Consequently, it is possible to identify the applications that are being used by the different connected clients and build user-profiles Wireless traffic generated by several connected clients running some of the most significant web-based applications was captured and analyzed and the obtained results show that it is possible to obtain an accurate application traffic mapping and an accurate user profiling

Book ChapterDOI
21 Sep 2011
TL;DR: This paper defines a novel context-aware distributed control framework to allow users’ associations to fitting VNs, and to create, extend, or remove VNs on-demand to be adapted to the dynamics of WMN environments and mesh clients.
Abstract: Using the flexibility of Wireless Mesh Networks (WMNs), we provide personalized access for highly dynamic mesh clients by splitting a WMN into several logical networks, each one configured to meet a set of specific levels of users’ context demands (context can span from security, mobility, cost, services’ requirements). In such approach, users can be grouped according to similarity of their context, and can be associated to the logical networks matching their context, built through virtualization (Virtual Networks - VNs). To break the traditional centralized architectures for the control of nodes and networks, this paper defines a novel context-aware distributed control framework to allow users’ associations to fitting VNs, and to create, extend, or remove VNs on-demand to be adapted to the dynamics of WMN environments and mesh clients. Moreover, WMN nodes are endowed with autonomous capabilities that allow them to co-operatively control VN topologies based on indicators of resource availability and users’ perceived Quality-of-Experience (QoE).

Book ChapterDOI
21 Sep 2011
TL;DR: An architecture that enables intermediate, crossover setups combining elements of the simulator and of the prototype, and the key idea is system-wide decoupling of the cyber domain from the physical domain, by means of a dedicated entity.
Abstract: Consider the development of a new middleware targeted at cooperating smart objects. Each smart object should have an embedded node connected to the object’s sensors and actuators. Building a prototype of such a middleware is inherently labor-intensive, especially when it comes to crossing the cyber-physical boundary, i.e., node-to-object interfacing. Also, soon one needs to be able to validate the middleware’s emerging API. Consequently, two separate “products” are usually developed: a programmer-oriented simulator and an actual, node-based prototype. Both are less than perfect for testing and demonstration purposes, and there is hardly any reuse of work invested in producing them. We propose an architecture that enables intermediate, crossover setups combining elements of the simulator and of the prototype. The key idea is system-wide decoupling of the cyber domain from the physical domain, by means of a dedicated entity. The architecture emphasizes incremental formation of testing and demonstration setups, reusability of elements needed to create them, and flexibility in combining those elements. We validate our architecture with a proof-of-concept infrastructure and a number of experimental setups.

Book ChapterDOI
21 Sep 2011
TL;DR: This work proposes a new mobility architecture and several enhancements on handover signaling to provide seamless mobility between IMT-Advanced candidates and legacy wireless technologies, and compares the proposed mobility framework with current approaches, showing the advantages of the integrated approach.
Abstract: The main motivation of IMT-Advanced is to enable the mobile users with capacity to handle high data rates and low delay services such as high quality video and online gaming. Two technologies are competing in this field: LTE-Advanced and Mobile WiMAX. Following the Always Best Connected (ABC) paradigm, the integration of these two technologies with legacy ones is imminent. The Evolved Packet Core (EPC) is the 3GPP new core network which aims to integrate 3GPP and non-3GPP access networks through an All-IP core network. The IEEE 802.21 standard is another important contribution, optimizing vertical handovers, by providing a common framework between the data link and network layers. Although the 3GPP has already defined optimized vertical mobility procedures, these are dependent on the technology, and much effort is needed in order to achieve the so desired seamless mobility. In our work, we propose a new mobility architecture and several enhancements on handover signaling to provide seamless mobility between IMT-Advanced candidates and legacy wireless technologies. We further compare our proposed mobility framework with current approaches, showing the advantages of the integrated approach.

Book ChapterDOI
21 Sep 2011
TL;DR: In this article, an approach for exploiting opportunistic networks in order to extend the capacity in wireless access and backhaul segments for efficient application provisioning, as well as an evaluation of an indicative test case as a proof of concept of the aforementioned approach is presented.
Abstract: It is expected that the wireless world will migrate towards an era that will comprise more local/temporary structures which, for instance, can be called Opportunistic Networks (ONs). Operator-governed ONs are dynamically created, temporary, coordinated extensions of the infrastructure. This paper presents an approach for exploiting such ONs in order to extend the capacity in wireless access and backhaul segments for efficient application provisioning, as well as an evaluation of an indicative test case as a proof of concept of the aforementioned approach.

Book ChapterDOI
21 Sep 2011
TL;DR: A Wireless Mesh Network (WMN) is an effective solution to provide Internet connectivity to large areas and its efficiency may increase if multiple radio channels are used in the mesh backbone as mentioned in this paper.
Abstract: A Wireless Mesh Network (WMN) is an effective solution to provide Internet connectivity to large areas and its efficiency may increase if multiple radio channels are used in the mesh backbone.

Book ChapterDOI
21 Sep 2011
TL;DR: In this paper, a virtualization-based key management system called e-VKM is proposed to work on scenarios in which nodes can be preloaded with secure information before joining the system.
Abstract: Cryptography is widely known as the best technique to provide security on data communications in all kinds of networks. Cryptographic methods rely on keys to perform their operations, such as encryption, decryption, and signature. In Wireless Ad Hoc Networks (WANETs), key management is a critical service as it must handle all security threats in a self-organized and decentralized way. Several kinds of attacks can compromise the key management on WANETs, such as Sybil and bad mouthing. This article presents the enhanced VKM, called e-VKM, a virtualization-based key management system resistant to Sybil and bad mouthing attacks. e-VKM is proposed to work on scenarios in which nodes can be preloaded with secure information before joining the system. Examples of these scenarios include but are not limited to sensor networks, meeting conferences, battlefield operations or health care solutions. Results show that e-VKM is highly resistant to Sybil attacks and bad mouthing, presenting 100% of resistance even under 20% of attackers.

Book ChapterDOI
21 Sep 2011
TL;DR: Q-OSys (QoS- routing with Systematic Access), a distributed QoS-routing approach for enhancing future networks with autonomous mechanisms orchestrating admission control, per-class overprovisioning, IP Multicast and load-balancing to efficiently support multi-user multimedia sessions is introduced.
Abstract: The increasing demand for real-time multimedia applications targeting groups of users, together with the need for assuring high quality support for end-to-end content distribution, is motivating the scientific community and industry to develop novel control, management and optimization mechanisms with Quality of Service (QoS) and Quality of Experience (QoE) support. In this context, this paper introduces Q-OSys (QoS-routing with Systematic Access), a distributed QoS-routing approach for enhancing future networks with autonomous mechanisms orchestrating admission control, per-class overprovisioning, IP Multicast and load-balancing to efficiently support multi-user multimedia sessions. Simulation experiments were carried to show the efficiency and impact of Q-OSys on network resources (bandwidth utilization and packet delay). Q-OSys is also evaluated from a user point-of-view, by measuring well-known objective and subjective QoE metrics, namely Peak Signal to Noise Ratio (PSNR), Structural Similarity (SSM) Video Quality Metric (VQM) and Mean Opinion Score (MOS).

Book ChapterDOI
21 Sep 2011
TL;DR: In this paper, the authors present a prototype implementation of the routing architecture based on parallel routing tables, which is an easy and clean alternative to current practises in order to avoid routing configurations that intend to have effect on a scoped area of the Internet are leaked outside it.
Abstract: The explosion of the Internet’s routing tables has been a concern in the last years Specially after IANA assigned the last /8 prefixes on the 3 rd of February, 2011, two fronts are open for the Internet community: the growth of the IPv4 routing table due to fragmentation introduced by the last assignments made by RIR and the strategy to follow for the new IPv6 Internet This paper analyses the behaviour of the IPv4 routing table in the Internet’s Default Free Zone in 2010 and presents the evolution and the current status of the IPv6 routing table in the DFZ These paper also presents a prototype implementation of the routing architecture based on parallel routing tables This prototype implementation was tested in an emulated environment using Netkit This implementation demonstrates that parallel routing tables are an easy and clean alternative to current practises in order to avoid routing configurations that intend to have effect on a scoped area of the Internet are leaked outside it This characteristic makes parallel routing tables a good candidate for Traffic Engineering configurations in IPv6

Book ChapterDOI
21 Sep 2011
TL;DR: This paper proposes a full EV charging network architecture, based on the current test-pilot of a national energy provider, that follows a modular approach, allowing multi-communication technologies, such as, General Packet Radio Service (GPRS), Wi-Fi and Ethernet.
Abstract: This paper proposes a full EV charging network architecture, based on the current test-pilot of a national energy provider. The Electric Vehicle Charging Station (EVCS) follows a modular approach, allowing multi-communication technologies, such as, General Packet Radio Service (GPRS), Wi-Fi and Ethernet. The EVCS was verified both in the functional, as well as in the electrical domain. The prototype implementation of the EVCS is already fully operational and integrated in an energy operator EVCS network.

Book ChapterDOI
21 Sep 2011
TL;DR: This paper analyzes the performance of a discovery mechanism by means of which agents are able to locate managers, and associate to them, over a hierarchical/distributed management architecture, defined to be used over personal networks.
Abstract: The management tasks which have been traditionally employed over traditional wired networks should also play a key role for ensuring the proper operation of the so-called Personal Networks, with certain particular characteristics which make their management quite a complex task. Amongst all the challenges which need to be coped with, there is one which outstands over the rest, being ensuring an autonomous operation, qualifying them as self-* manageable/configurable/... networks. This paper analyzes, over a hierarchical/distributed management architecture, defined to be used over personal networks, the performance of a discovery mechanism by means of which agents are able to locate managers, and associate to them. A complete implementation of the whole architecture has been made in the framework of the ns-2 simulator (based on SNMP), including the mechanisms and procedures required to handle the discovery and association between managers and agents.

Book ChapterDOI
21 Sep 2011
TL;DR: This work introduces an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points and implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system.
Abstract: The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users’ quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users’ concerns on security but also indirectly affects connection quality due to proactive measures against security attacks.

Book ChapterDOI
21 Sep 2011
TL;DR: In this article, service-based interconnected networks (SIN) aims to develop an interoperability system between service discovery protocols in a wireless heterogeneous framework for existing protocols and devices, providing the possibility to transparently search and find services across neighbor networks and through several protocols, resulting in gathering all services features.
Abstract: In an ideal world, service discovery protocols would be available across different wireless networks ensuring that most of the services would be searchable and accessible, anytime, everywhere. Yet, typical service discovery protocols were designed for specific scenarios and not conceived with user mobility in mind, where it would be possible to search for services through whatever access network might be available. To help increase the users’ mobility, service-based interconnected networks (SIN) aims to develop an interoperability system between service discovery protocols in a wireless heterogeneous framework for existing protocols and devices. SIN provides the possibility to transparently search and find services across neighbour networks and through several protocols, resulting in gathering all services features. SIN was experimentally evaluated in a test-bed built to exercise a dynamic and pervasive service environment and used to prove the concept of service discovery interworking.

Book ChapterDOI
21 Sep 2011
TL;DR: In this paper, the authors propose a power control mechanism for multimedia multicast data distribution in next generation multimedia networks, which makes possible to reduce the transmitted power enabling an effective multimedia multicasting data distribution to mobile groups.
Abstract: Mobile Operators have to meet the growing demand for multimedia services. The Social Networking trend and the Mobile TV are just a few examples of multimedia services that are seriously crowding the operators’ infrastructure. Since the content is to be shared by large groups of users it makes sense to use a point-to-multipoint technology to convey the multimedia information. MBMS (Multimedia Broadcast and Multicast Service) and E-MBMS (Evolved MBMS) are the 3GPP systems used to delivery multimedia contents to mobile communities. But these technologies do not support power control which leads to an inefficient data distribution. This paper devises a mechanism that makes possible to reduce the transmitted power enabling an effective multimedia multicast data distribution to mobile groups leading to significant gains on the radio interface on next generation multimedia networks.

Book ChapterDOI
21 Sep 2011
TL;DR: The GEYSERS project as mentioned in this paper proposes an approach for provisioning full infrastructures as a service by using IT and transport network resource virtualization, which allows for operator-tailored planning of infrastructure, which also allows for a dynamic re-planning of infrastructure depending on service needs.
Abstract: In this article we propose the GEYSERS project approach for Future Internet based on provisioning full infrastructures as a service by using IT and transport network resource virtualization. An overview of the project’s architecture is provided that shows the layering scheme empowering the definition of Virtual Infrastructure service. The Logical Infrastructure Composition Layer in the architecture allows for operator-tailored planning of infrastructures, which also allows for a dynamic re-planning of the infrastructure depending on service needs. The rest of the article elaborates on the concept, characteristics and variants for modifying Virtual Infrastructures, as well as their implications.